UPPSC Mains Paper III Updated 2019

Total Page:16

File Type:pdf, Size:1020Kb

UPPSC Mains Paper III Updated 2019 UPPSC Mains Paper III Updated 2019 Development Experience And Development Planning Of India .cs29D35F49{color:#000000;background-color:transparent;font-family:Arial;font-size:14pt;font- weight:bold;font-style:normal;} .cs3B54119A{text-align:justify;text-indent:0pt;margin:0pt 0pt 10pt 0pt;line-height:1.5} .csA7555675{color:#000000;background-color:transparent;font-family:Arial;font-size:12pt;font- weight:normal;font-style:normal;} .cs2020DE62{text-align:center;text-indent:0pt;margin:0pt 0pt 10pt 0pt;line-height:1.5} .csC57700C4{color:#000000;background-color:transparent;font-family:Arial;font- size:12pt;font-weight:bold;font-style:normal;} .cs7B3A08D0{text-align:justify;margin:0pt 0pt 0pt 3pt;line-height:1.5;list-style- type:square;color:#000000;background-color:transparent;font-family:Wingdings;font- size:12pt;font-weight:normal;font-style:normal} Development Experience and Development Planning of India Poverty, low per capita income, under-development, unemployment, prompted the newly established Indian polity to adopt economic planning for the development of the country. The idea of economic planning can be traced to 1934, when M. Visvesverayya in his book 'Planned Economy of India', advocated for planning to increase the national income. It was taken up by the Indian National Congress in 1938 when it formed the National Planning Committee under the chairmanship of Jawaharlal Nehru. The Bombay Plan, the People's Plan and Gandhian Plan, provided further impetus in the direction of economic planning. After independence, a Planning Commission was set up in March 1950 by a Cabinet Resolution with the Prime Minister as its ex-officio Chairman to formulate five year plans for the economic development of the country. Role of Planning In India Accelerating Economic Growth: There were two main features of India‘s economic policy that emphasized the role of planning and intervention by the State in the development process of the Indian economy in the first three decades of planning. First, to accelerate economic growth economists and planners recognized that raising the rate of saving and investment was essential to accelerate the rate of economic growth. Emphasis on Industrialisation, Second, the strategy of development, adopted since the adoption of Second Five Year Plan which was based on Mahalanobis growth model, laid stress on the Pscnotes.com Page 1 UPPSC Mains Paper III Updated 2019 industrialisation with an emphasis on the development of basic heavy industries and capital goods industries. To Compensate for Market Failures The dominant view in development economics in the fifties and sixties also laid stress on the planning by the State to compensate for ‗market failures‘. It was argued that while market mechanism was efficient in distributing a given stock of available goods, it was quite inefficient in allocating resources over time for investment. Regulatory Role of the State There is another important aspect of the role of State and planning in the development of the Indian economy which dominated economic thinking in the pre-reform period. Though the private sector was given an important role to play in the framework of mixed economy, to achieve optimal allocation of resources among different industries according to plan priorities, economic activities in the private sector were required to be regulated by the State. Further, to achieve other objectives of planning such as restraining the concentration of economic power in a few big business houses, the private sector was subjected to industrial licensing controls. Tackling the Problems of Poverty and Unemployment The other problem which makes role of planning and state intervention important is the need to tackle the problems of poverty and unemployment. Since the beginning of the seventies the Indian planners realised, especially in the Fifth, Sixth and Seventh Five Year Plans, that even if growth rate of GDP was raised to 5 to 6 per cent per annum, it was not possible to make a significant dent on the problems of mass poverty and unemployment prevailing in the Indian economy. India‘s rate of economic development has not been very impressive by most standards. But compared to what it was prior to independence, there is cause for celebration. At independence in 1947, India was an extremely poor country with an annual per capita income of only $50 for its 350 million people. Life expectancy was 32 years and literacy rate was 17 percent. National savings rate was around 10 percent. Agriculture accounted for 60 percent of GDP and 80 percent of employment. Per capita food production and per capita income had been declining continuously for nearly the prior fifty years. After independence, even under the growth-retarding effects of Nehruvian socialism and central planning, India‘s performance improved. In a study of cross-country growth experience of 85 countries from 1960 to 1992, India‘s performance is almost precisely average. This is poor in relation to the potential that India has given the degree of human, institutional, and natural capital at its command. Economists such as Jagdish Bhagwati have attributed that failure to the ―nearly three decades of illiberal and autarkic policies‖ before the reforms of the early 1990s. Some observers have called the change from an inward-looking autarkic economy to an open, market-driven one since 1990 as the Indian Growth Miracle. The neo-liberal economic reforms Pscnotes.com Page 2 UPPSC Mains Paper III Updated 2019 propelled India to become one of the fastest-growing economies in the world. Yet India should have been one of the fastest growing economies in the decades before 1990, and not just in the post 1990 period. It did not because its planners chose to insulate the economy from the global economy. That conferred some benefits in terms of shielding India from external shocks, but it paid a very high price in terms of foregone growth. From planning commission to NITI ayog Reflecting the spirit and the changed dynamics of the new India, the institutions of governance and policy have to adapt to new challenges and must be built on the founding principles of the Constitution of India, the wealth of knowledge from our civilizational history and the present- day socio-cultural-economic contexts. The aspirations of India and its citizens require institutional reforms in governance and dynamic policy shifts that can seed and nurture unprecedented change. In keeping with these changing times, the Government of India has decided to set up NITI Aayog (National Institution for Transforming India), in place of the erstwhile Planning Commission, as a means to better serve the needs and aspirations of the people of India. In essence, effective governance in India will rest on following ‗pillars‘: Pro-people agenda that fulfils the aspirations of the society as well as individual, Pro-active in anticipating and responding to their needs, Participative, by involvement of citizenry, Inclusion of all groups, Equality of opportunity to our country‘s youth, Sustainable development, by protecting environment, Transparency that uses technology to make government visible and responsive. Issues related to Poverty The World Bank defines poverty in absolute terms. The bank defines extreme poverty as living on less than US$1.90 per day> (PPP), and moderate poverty as less than $3.10 a day. Types of Poverty Absolute poverty measures poverty in relation to the amount of money necessary to meet basic needs such as food, clothing, and shelter. The concept of absolute poverty is not concerned with broader quality of life issues or with the overall level of inequality in society. The concept of absolute poverty is based on absolute norms for living (measured in terms of consumption expenditure) laid down according: to specified minimum standard and all such individuals or groups whose consumption expenditure is found to be below this standard are classified as poor. Under the relative concept of poverty, a family (or an individual) is deemed to be poor if its level of income or consumption expenditure falls below a predetermined level. Pscnotes.com Page 3 UPPSC Mains Paper III Updated 2019 Poverty in India is measured as the head-count ratio of the population living below the official ‗poverty line‘, which is calculated using the methodology prescribed by the Expert Group on Methodology for Estimation of Poverty appointed by the Planning Commission in order to arrive at a threshold consumption level of both food and non-food items. The methodology uses the Consumer Expenditure Surveys (CES) conducted by the National Sample Survey Office (NSSO) of India once every five years to attain the poverty line; and, hence, poverty figures in India are obtained once every five years. The Planning Commission‘s latest poverty line, using methodology suggested by the Tendulkar Committee in 2010, is apparently defined as the spending of Rs. 27.20 per capita per day in rural areas and Rs.33.40 per capita per day in urban areas. Unemployment is a phenomenon that occurs when a person who is actively searching for employment is unable to find work. Unemployment is often used as a measure of the health of the economy.Different types of Unemployment are as follows:- Structural unemployment focuses on the structural problems within an economy and inefficiencies in labor markets. Structural unemployment occurs when a labor market is not able to provide jobs for everyone who is seeking employment. Frictional unemployment is when workers leave their old jobs but haven't yet found new ones. Most of the time workers leave voluntarily, either because they need to move, or they've saved up enough money to allow them to look for a better job.Frictional unemployment is short-term and a natural part of the job search process. Cyclical unemployment is a type of unemployment that occurs when there is not enough aggregate demand in the economy to provide jobs for everyone who wants to work.
Recommended publications
  • Symantec Report on Rogue Security Software July 08 – June 09
    REPORT: SYMANTEC ENTERPRISE SECURITY SYMANTEC REPORT: Symantec Report on Rogue Security Software July 08 – June 09 Published October 2009 Confidence in a connected world. White Paper: Symantec Enterprise Security Symantec Report on Rogue Security Software July 08 – June 09 Contents Introduction . 1 Overview of Rogue Security Software. 2 Risks . 4 Advertising methods . 7 Installation techniques . 9 Legal actions and noteworthy scam convictions . 14 Prevalence of Rogue Security Software . 17 Top reported rogue security software. 17 Additional noteworthy rogue security software samples . 25 Top rogue security software by region . 28 Top rogue security software installation methods . 29 Top rogue security software advertising methods . 30 Analysis of Rogue Security Software Distribution . 32 Analysis of Rogue Security Software Servers . 36 Appendix A: Protection and Mitigation. 45 Appendix B: Methodologies. 48 Credits . 50 Symantec Report on Rogue Security Software July 08 – June 09 Introduction The Symantec Report on Rogue Security Software is an in-depth analysis of rogue security software programs. This includes an overview of how these programs work and how they affect users, including their risk implications, various distribution methods, and innovative attack vectors. It includes a brief discussion of some of the more noteworthy scams, as well as an analysis of the prevalence of rogue security software globally. It also includes a discussion on a number of servers that Symantec observed hosting these misleading applications. Except where otherwise noted, the period of observation for this report was from July 1, 2008, to June 30, 2009. Symantec has established some of the most comprehensive sources of Internet threat data in the world through the Symantec™ Global Intelligence Network.
    [Show full text]
  • Watch out for Fake Virus Alerts
    State of West Virginia Cyber Security Tip ALERT West Virginia Office of Information Security and Controls – Jim Richards, WV Chief Information Security Officer WATCH OUT FOR FAKE VIRUS ALERTS Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective (i.e. free virus scan) but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions. How does rogue security software get on my computer? Rogue security software designers create legitimate looking pop-up windows that advertise security update software. These windows might appear on your screen while you surf the web. The "updates" or "alerts" in the pop-up windows call for you to take some sort of action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or spyware. When you click, the rogue security software downloads to your computer. Rogue security software might also appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer. What does rogue security software do? Rogue security software might report a virus, even though your computer is actually clean. The software might also fail to report viruses when your computer is infected. Inversely, sometimes, when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect. Some rogue security software might also: Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program).
    [Show full text]
  • A Study of Emergent Norms in Socio-Hydrology
    EGU Journal Logos (RGB) Open Access Open Access Open Access Advances in Annales Nonlinear Processes Geosciences Geophysicae in Geophysics Open Access Open Access Natural Hazards Natural Hazards and Earth System and Earth System Sciences Sciences Discussions Open Access Open Access Atmospheric Atmospheric Chemistry Chemistry and Physics and Physics Discussions Open Access Open Access Atmospheric Atmospheric Measurement Measurement Techniques Techniques Discussions Open Access Open Access Biogeosciences Biogeosciences Discussions Open Access Open Access Climate Climate of the Past of the Past Discussions Open Access Open Access Earth System Earth System Dynamics Dynamics Discussions Open Access Geoscientific Geoscientific Open Access Instrumentation Instrumentation Methods and Methods and Data Systems Data Systems Discussions Open Access Open Access Geoscientific Geoscientific Model Development Model Development Discussions Discussion Paper | Discussion Paper | Discussion Paper | Discussion Paper | Open Access Open Access Hydrol. Earth Syst. Sci. Discuss., 10,Hydrology 7517–7536, 2013and Hydrology and www.hydrol-earth-syst-sci-discuss.net/10/7517/2013/ Earth System doi:10.5194/hessd-10-7517-2013 Earth System HESSD Sciences Sciences © Author(s) 2013. CC Attribution 3.0 License. 10, 7517–7536, 2013 Discussions Open Access Open Access Ocean Science This discussion paper is/hasOcean been under Science review for the journal Hydrology and Earth System Reconstructing the Sciences (HESS). Please refer to the corresponding final paper in HESS if available.Discussions duty of water: a study of emergent norms in Open Access Open Access socio-hydrology Solid Earth Solid Earth Discussions J. L. Wescoat Jr. Reconstructing the dutyOpen Access of water: a studyOpen Access Title Page of emergentThe norms Cryosphere in socio-hydrologyThe Cryosphere Discussions Abstract Introduction J.
    [Show full text]
  • Gone Rogue: an Analysis of Rogue Security Software Campaigns (Invited Paper)
    Gone Rogue: An Analysis of Rogue Security Software Campaigns (Invited Paper) Marco Cova∗, Corrado Leitay, Olivier Thonnardz, Angelos Keromytisy and Marc Daciery ∗University of California, Santa Barbara, [email protected] ySymantec Research Labs, fCorrado Leita,Angelos Keromytis,Marc [email protected] zRoyal Military Academy, Belgium, [email protected] Abstract technique consists of attracting victims on malicious web sites that exploit vulnerabilities in the client In the past few years, Internet miscreants have software (typically, the browser or one of its plugins) developed a number of techniques to defraud and to download and install the rogue programs without make a hefty profit out of their unsuspecting victims. any user intervention. A troubling, recent example of this trend is cyber- Rogue AV programs are distributed by cyber- criminals distributing rogue security software, that is criminals to generate a financial profit. In fact, after malicious programs that, by pretending to be legitimate the initial infection, victims are typically tricked into security tools (e.g., anti-virus or anti-spyware), deceive paying for additional tools or services (e.g., to upgrade users into paying a substantial amount of money in to the full version of the program or to subscribe to an exchange for little or no protection. update mechanism), which are most often fictitious or While the technical and economical aspects of rogue completely ineffective. The cost of these scams range security software (e.g., its distribution and monetiza- from $30–$100. tion mechanisms) are relatively well-understood, much Despite its reliance on traditional and relatively less is known about the campaigns through which this unsophisticated techniques, rogue AV has emerged as type of malware is distributed, that is what are the un- a major security threat, in terms of the size of the derlying techniques and coordinated efforts employed affected population (Symantec’s sensors alone reported by cyber-criminals to spread their malware.
    [Show full text]
  • Prof.Islam-Social Engineering
    Project Title: Distributed and Cloud-based Network Defense System for NRENs (DCNDS) Series 2 Workshop (20-21 November, 2019) Botnet Mitigation Best Practices and System Evaluation Workshop Social Engineering and Botnet Proliferation by Md. Saiful Islam Institute of Information and Communication Technology Bangladesh University of Engineering and Technology 2 Outline • Security & human factor in security • Social Engineering (SE) • Threat actors using social engineering • Characteristics of social engineer • Basic tendencies of human nature • SE categories & SE cycle • SE attack vectors: tailgating, impersonating, phishing etc. • Attack tools of an social engineer • Why do cybercriminals use botnet attacks? • Botnet defense- best practices 3 Security? • Security can be defined as - “The state of being free from danger or threat” . Security is all about knowing who and what to trust. It is important to know when and when not to take a person at their word and when the person you are communicating with & what they say who they are. 4 Security’s weakest link ? A company may have purchased – - The best security technologies that money can buy, - Trained their people so well that they lock up all their secrets before going home at night, and - Hired building guards from the best security firm in the business. That company is still totally vulnerable. 5 Security’s weakest link ? An Individuals may follow: - Every best-security practice recommended by the experts, - Slavishly install every recommended security products, - Be thoroughly vigilant about proper system configuration and - Apply various security patches regularly. Those individuals are still completely vulnerable . 6 Human Factor: Security’s weakest link • Anyone who thinks that security products alone offer true security is settling for the illusion of security.
    [Show full text]
  • Fossil Folklore from India: the Siwalik Hills and the Mahaˆbhaˆrata
    Folklore 119 (April 2008): 71–92 RESEARCH ARTICLE Fossil Folklore from India: The Siwalik Hills and the Mahaˆbhaˆrata Alexandra van der Geer, Michael Dermitzakis, and John de Vos Abstract All over the world, from antiquity to the present, people have often explained fossil discoveries as proof of the historical truth of legends and myths, or used them as a basis for a new legend. Most often, large vertebrate fossils have been explained as bones and teeth of giant humans, dragons and monsters, saints and heroes. Smaller invertebrate fossils were often interpreted as sacred or curious relics based upon their resemblance to familiar or sacred objects. India is no exception to this practice. Fossil ammonites (salagramas), for example, are worshipped as the disc (chakra) of the Hindu god Vishnu. The Siwalik Hills, below the Himalayas, are strewn with impressive Plio-Pleistocene vertebrate fossils. This paper suggests that the region was seen as the historical stage for the legendary battle as described in the Indian epic Mahaˆbhaˆrata, during which hundreds of mighty, and sometimes gigantic, heroes, horses, and war elephants are said to have died. Their remains are seen in the fossil bones, skulls, jaws, and tusks of hippopotamuses (Hexaprotodon), proboscideans (Stegodon, Archidiskodon), four- horned giraffes (Sivatherium, Giraffokeryx), giant tortoises (Geochelone), sabre- toothed cats (Paramachairodus), camels (Camelus), and other species found on the surface of the Siwalik Hills. Moreover, thousands of ancient bronze javelins and spears are also found there after rains. These archaeological artefacts, along with the paleontological remains, appear to have influenced the setting and context of the great battle in the Indian epic.
    [Show full text]
  • The Gunpowder Age and Global History
    The Age of Gunpowder 1 Introduction: The Gunpowder Age and Global History Tonio Andrade Professor of History, Emory University When Chinese alchemists invented the “fire drug” in the 800s AD, they unleashed one of the most transformative technologies in world history. Early gunpowder was not the explosive that it later became. It took centuries of development before it became capable of propelling projectiles. The Chinese used the early gunpowder mixtures for weapons, of course, but they were conflagratives and fire spewers, used for burning structures and people. Proper guns emerged in the 1200s, and by the mid-1300s the new weapons had begun transforming warfare, used in huge numbers in the fierce battles that led, eventually, to the triumph of the Ming Dynasty, which has been rightly referred to as the world’s first gunpowder empire.1 Guns and gunpowder quickly spread beyond China, and this issue of Emory Endeavors in History is devoted to exploring their effects – and other issues of military modernization and innovation – in world history. China’s closest neighbors found themselves forced to adapt to gun warfare quickly, and one of the pioneers of early gunpowder history, historian Sun Laichen of California State University, Fullerton, has famously described this process for Vietnam and other parts of Southeast Asia.2 Yet equally important, but much less well understood, is the adoption of guns by China’s northeastern neighbors, Korea and Japan. Although Japan is not usually considered an early gun adopter (it is known much more for its later adoption of Portuguese-style arquebuses in the 1 Sun Laichen, “Ming-Southeast Asian Overland Interactions, 1368-1644,” Ph.D.
    [Show full text]
  • What Are Kernel-Mode Rootkits?
    www.it-ebooks.info Hacking Exposed™ Malware & Rootkits Reviews “Accessible but not dumbed-down, this latest addition to the Hacking Exposed series is a stellar example of why this series remains one of the best-selling security franchises out there. System administrators and Average Joe computer users alike need to come to grips with the sophistication and stealth of modern malware, and this book calmly and clearly explains the threat.” —Brian Krebs, Reporter for The Washington Post and author of the Security Fix Blog “A harrowing guide to where the bad guys hide, and how you can find them.” —Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. “The authors tackle malware, a deep and diverse issue in computer security, with common terms and relevant examples. Malware is a cold deadly tool in hacking; the authors address it openly, showing its capabilities with direct technical insight. The result is a good read that moves quickly, filling in the gaps even for the knowledgeable reader.” —Christopher Jordan, VP, Threat Intelligence, McAfee; Principal Investigator to DHS Botnet Research “Remember the end-of-semester review sessions where the instructor would go over everything from the whole term in just enough detail so you would understand all the key points, but also leave you with enough references to dig deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A top-notch reference for novices and security professionals alike, this book provides just enough detail to explain the topics being presented, but not too much to dissuade those new to security.” —LTC Ron Dodge, U.S.
    [Show full text]
  • The Gunpowder Age China, Military Innovation, and the Rise of the West in World History 1St Edition Download Free
    THE GUNPOWDER AGE CHINA, MILITARY INNOVATION, AND THE RISE OF THE WEST IN WORLD HISTORY 1ST EDITION DOWNLOAD FREE Tonio Andrade | 9780691135977 | | | | | Tonio Andrade Finally the Jin made a frontal assault and the Rise of the West in World History 1st edition the walls and scaled them, after which followed a merciless hunt for soldiers, officers, and officials of every level. Interaction with the outside world and adaptation in Southeast Asian society — His answer is a clarification of previously common answers. All in all a great read that helps also set the context for how China may view its c A fascinating look at why China 'fell behind' even though it was a leading pioneer of Gunpowder use in warfare. Anyone interested in the long view of the co-evolution of war and society—and what this means for the big questions of Military Innovation history—would do well to pick up this book. Gunpowder technology also spread to naval warfare and in Song decreed that all warships were to be fitted with trebuchets for hurling gunpowder bombs. They had bam-boo rods, a rocket-body lashed to the rod, and iron points. What happened? One of the first, if not the first of these weapons was the fire arrow. Interestingly, Andrade doesn't attribute discipline and drill among those innovations. February 4, The other was the 'flame-spouting lance' t'u huo ch'iang. January As Andrade explains, these would fail in the face of Western power largely because of confusion stemming from the Chinese court — even though Manchu emperors, themselves Confucians, understood the importance of warfare.
    [Show full text]
  • Weil, Benjamin. "The Rivers Come: Colonial Flood Control and Knowledge Systems in the Indus Basin, 1840S–1930S." Environment and History 12, No
    The White Horse Press Full citation: Weil, Benjamin. "The Rivers Come: Colonial Flood Control and Knowledge Systems in the Indus Basin, 1840s–1930s." Environment and History 12, no. 1 (February 2006): 3–29. http://www.environmentandsociety.org/node/3253. Rights: All rights reserved. © The White Horse Press 2006. Except for the quotation of short passages for the purpose of criticism or review, no part of this article may be reprinted or reproduced or utilised in any form or by any electronic, mechanical or other means, including photocopying or recording, or in any information storage or retrieval system, without permission from the publishers. For further information please see http://www.whpress.co.uk. The Rivers Come: Colonial Flood Control and Knowledge Systems in the Indus Basin, 1840s–1930s BENJAMIN WEIL Department of Environmental Studies Interdisciplinary Sciences Building University of California, Santa Cruz 1156 High Street, Santa Cruz, CA 95064, USA Email: [email protected] ABSTRACT This essay traces the development of the physical and cultural infrastructure of colonial flood control in the Indus valley. Reconstructing investigations into the causes of a series of floods illustrates the conflict between the idiosyncratic, local knowledge-based, approach of generalists and the reductionist, technologi- cal mentality of engineers. Repeated attempts to protect towns from the Indus River illustrate the growing dominance during the second half of the nineteenth century of an engineering mentality, despite its practical shortcomings.
    [Show full text]
  • Chapter 17 Rocket Science
    Rocket science Chapter 17 Rocket science 17-1. What makes a good rocket The first rockets as we know them were invented by the Chinese around 600 AD following their invention of gun powder1. They called them fire-arrows and used them to create colorful displays during festivals, not unlike our contemporary fireworks. In the late 1700s, the Kingdom of Mysore in India developed rockets and used them as weapons against the British East India Company2, and in retaliation the British military developed the Congreve rocket3 circa 1804. Both were effectively tiny missiles with very limited range and destructive power. The Mysorean rockets consisted of a tube of soft hammered iron about 20 cm long, closed at one end which contained packed black powder and served as a combustion chamber. A rocket with one pound of powder could travel about 900 m. In contrast, the European rockets, which were not made of iron, could not take large chamber pressures and were incapable of reaching similar distances. Figure 17-1. The early Chinese fire-arrow (left) and the Mysorean rocket (right). Note that each has a tail consisting of long bamboo stick, presumably for directional stability. (Photo credits: NASA and painting by Charles H. Hubbell, Western Reserve Historical Society, Cleveland, Ohio) Aside from adequate propulsion power, a main challenge was the stability of flight. The early Chinese fire-arrows and Mysorean rockets had a long bamboo stick attached as a tail (Figure 17-1), presumably to create rear drag thus guarding somewhat against wobbling. By the middle of the 19th Century, studies conducted separately in France and the United States indicated that rockets would be more accurate if they were spun, in a way similar to a bullet exiting a striated gun barrel.
    [Show full text]
  • JETIR Research Journal
    © 2019 JETIR May 2019, Volume 6, Issue 5 www.jetir.org (ISSN-2349-5162) Design Optimization and Analysis of Rocket Structure for Aerospace Applications 1Chethan S, 2Niranjan Hiremath 1M.Tech Machine Design Student, 2Associate Professor 1,2 School of Mechanical Engineering, REVA University, Rukmini Knowledge Park, Kattigenahalli, Yelahanka, Bengaluru, India Abstract: The aim of this study is to perform techniques such as pressure mapping of the missile structure, Inertia Relief Analysis for Rocket Structure in the effective way with the low cost. And the analysis plays important role in the structural design and safety. Due to the advances with numerical software’s, the simulation helps in estimating the safety of the structures without actual prototype built up and testing. Firstly we design the Rocket parts by the help of modelling tools using solid edge v19, Catia v6 and assembled it later. In order to find pressure distribution on the missile surface and to find the stress and deformation of missile structure by pressure mapping using CFD mesh in Acusolve on to the Rocket Structure, Pressure values in “X, Y and Z” co-ordinate with magnitudes are obtained in CSV file format. And later we study behavior of the missile parts like Nose, Nose cone, Body, Tail and Fins when the surface remains same from nose to tail and the fins with the varying thickness. And we use the Maraging Steel 250 grade as the material and its properties is assigned to the mesh. And the mesh thickness of the outer shell material is increased for different cases along with a speed of Mach number 0.75 and 5.
    [Show full text]