Ask Question, Ask an Expert


Ask Electrical & Electronics Expert

1) prepare the emf equation for d.c. generator.

2) Describe why armature core in d.c machines is constructed with laminated steel sheets instead of solid steel sheets?

3) describe why commutator is employed in d.c.machines?

4) prepare down the difference between shunt and series field coil construction.

5) Describe how does d.c. motor differ from d.c. generator in construction?

6) How will you modify the direction of rotation of d.c.motor?

7) What do you mean by back emf in d.c. motor?

8) describe the function of no-voltage release coil in d.c. motor starter.

9) prepare down the factors on which speed of d.c.motor depends.

10) Under what situation, does a dc shunt generator fail to generate?

11) A 50 Hz, 400v, 4-pole cylindrical synchronous generator has 36 slots, two –layer winding with full pitch coils of 8 turns each. Mean air –gap diameter is 0.16m, axial length 0.12m and uniform air gap of 2mm. Compute the value of resultant AT/pole and peak air gap flux density. The machine is developing electromagnetic torque of 60 Nm as a generator at a torque angle of 260. What must be the rotor AT/pole? What is the stator AT and the angle it makes with the resultant AT? Also determine the stator current.

Electrical & Electronics, Engineering

  • Category:- Electrical & Electronics
  • Reference No.:- M911381

Have any Question? 

Related Questions in Electrical & Electronics

In example 612 we represented the function in fig 623 by

In Example 6.12, we represented the function in Fig. 6.23 by Legendre polynomials. a. Use the results in Example 6.12 to represent the signal g(t) in Fig. P6.5-8 by Legendre polynomials. b. Compute the error energy for t ...

Audio amplifier multistageaudio amplifier power output

Audio Amplifier (Multistage) Audio Amplifier Power Output selection: 3.2 W, 5.6 W, 7.1 W, 8.4 W, 11.5 W, and 16.3 W Audio Amplifier Input Voltage (peak) selection: 150mVpeak, 200mVpeak, 250mVpeak Audio Frequency: 20 Hz - ...

1 what are the 3 positions of the toggle switch which one

1. What are the 3 positions of the toggle switch? Which one cannot be used? 2. Explain the configuration of a breadboard. What holes are connected? How is it powered? 3. What components in the circuits implemented in thi ...

1 derive the weak form of a two-dimensional steady-state

1. Derive the weak form of a two-dimensional, steady-state heat transfer problem. 2. Derive the weak form of a simply supported beam problem.

1 what are apparent wavelengths why are they longer than

1. What are apparent wavelengths? Why are they longer than the wavelength along the direction of propagation? 2. What are apparent phase velocities? Why are they greater than the phase velocity along the direction of pro ...

Consider a nonlinear elastic uniaxial bar element under tip

Consider a nonlinear elastic uniaxial bar element under tip force F = 100 N shown in Figure. The stress-strain relation is given in terms of Cauchy stress and engineering strain in the deformed geometry: σ11 = Eε 11 . Us ...

1 fluid flows between two parallel plates a distance h

1. Fluid flows between two parallel plates, a distance h apart. The upper plate moves at velocity, v 0 ; the lower plate is stationary. For what value of pressure gradient will the shear stress at the lower wall be zero? ...

Download the matlab program ofdmallocm which simulates

Download the MATLAB program "ofdm_alloc.m", which simulates power and bit allocation for a 64 channel OFDM system, assuming that all channel symbol streams have equal power allocation P k = E [|s k [m]| 2 ] = 1, and that ...

Assume we have a very simple message digest our unrealistic

Assume we have a very simple message digest. Our unrealistic message digest is just one number between 0 and 25. The digest is initially set to 0. The cryptographic hash function adds the current value of the digest to t ...

Another method used in a ciphertext attack see previous

Another method used in a ciphertext attack (see previous problem) is called the statistical approach, in which the intruder intercepts a long ciphertext and tries to analyze the statistics of the characters in the cipher ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen