You are on page 1of 60

REVERSE ENGINEERING & PROTOTYPING OF CHAIN LINK

WIRE MESH MAKING MACHINE


A Major Project Review Report

BACHELOR OF TECHNOLOGY

IN

MECHANICAL ENGINEERING
Submitted by

ASSEMSETTI AKSHAY (20835A0301)

JANGAMPALLY AKHIL (20835A0311)

JOKARA SANGAMESH (20835A0312)

Under the
guidance of

Mr. K. DAYAKAR

Assistant Professor

DEPARTMENT OF MECHANICAL ENGINEERING

GURUNANAK INSTITUTE OF TECHNOLOGY


(Affiliated to Jawaharlal Nehru Technological University)

Ibrahimpatnam, Ranga Reddy District-

5015062019-2023

GURU NANAK INSTITUTE OF TECHNOLOGY


(Approved by A.I.C.T.E, New Delhi, Affiliated to J.N.T.U-Hyderabad)
CERTIFICATE

This is to certify that the minor-project entitled “REVERSE ENGINEERING &


PROTOTYPING OF CHAIN LINK WIRE MESH MAKING MACHINE”
is being presented with a report by ASSEMSETTI AKSHAY (20835A0301),
JANGAMPALLY AKHIL (20835A0311), JOKARA SANGAMESH (20835A0312),
in partial fulfilment of the award of the degree of Bachelor of Technology in
Mechanical Engineering, to Jawaharlal Nehru Technological University is the record
of bonafide work carried out by them my guidance and supervision.
The results embody in this project report have not been submitted to any other university
or institute for the award of any degree.

Mrs. K. DAYAKAR Dr. B. VIJAYA KUMAR


Internal guide Head of the Department

EXTERNAL EXAMINER

i
DECLARATION

We hereby declare that the minor project entitled “REVERSE ENGINEERING &
PROTOTYPING OF CHAIN LINK WIRE MESH MAKING MACHINE” is work done by,
ASSEMSETTI AKSHAY (20835A0301), JANGAMPALLY AKHIL (20835A0311), and
JOKARA SANGAMESH (20835A0312).

Towards the fulfilment of the requirement for the award of the degree of Bachelor of
Technology in Mechanical Engineering, to Jawaharlal Nehru Technological University,
Hyderabad is the result of the work carried out under the guidance of Mr. K. DAYAKAR
Assistant Professor, Guru Nanak Institute of Technology, Hyderabad.

We further declare that this project report has not been previously submitted before either in part
or full for the award of any degree or any diploma by any organization or any universities.

ASSEMSETTI AKSHAY (20835A0301),

JANGAMPALLY AKHIL (20835A0311),

JOKARA SANGAMESH (20835A0312).

ii
ACKNOWLEDHMENT
We wish to convey our sincere thanks to our internal guide Mr. K. DAYAKAR Assistant Professor,
Department of Mechanical Engineering, for his professional advice, encouragement in starting this project,
and academic guidance during this project.

We wish to convey our sincere thanks to Dr. RISHI SAYD, Associate Director, Co-ordinator of
AICTC Idea Lab & Dr. RANGANAYAKULU, Dean of R&D, Co-ordinator of AICTC Idea Lab
for his masterly supervision and valuable suggestions for the successful completion of our project.

We wish to convey our sincere thanks to Dr. B. VIJAYA KUMAR, Professor & Head of
Department, Department of Mechanical Engineering for his masterly supervision and valuable
suggestions for the successful completion of our project

We wish to express our candid gratitude to Principal Dr. S. SREENATHA REDDY, and the
management for providing the required facilities to complete our project successfully. We convey
our sincere thanks to the staff of the Mechanical Engineering Department and the Lab
Technicians for providing enough stuff which helped us in taking up the project successfully.
We are also grateful to our well-wishers and friends, whose co-operation and some
suggestions had helped us in completing the project.
Finally, we would like to thank our parents for their exemplary tolerance and for giving us enough
support in our endeavors.

ASSEMSETTI AKSHAY (20835A0301)

JANGAMPALLY AKHIL (20835A0311)

JOKARA SANGAMESH (20835A0312)

iii
ABSTRACT

This research focuses on the reverse engineering and prototyping of a chain link wire mesh
making machine. Chain link wire mesh is a commonly used material in various industries
such as fencing, construction, and agriculture. The existing machines used for manufacturing
chain link wire mesh are often expensive and not easily accessible for small-scale producers.
Therefore, this study aims to reverse engineer an affordable and efficient chain link wire
mesh making machine by understanding the principles and components of existing machines
and developing a prototype that meets the requirements of small-scale production. The
research includes a detailed analysis of the design, operation, and control mechanisms of
chain link wire mesh making machines, followed by the development and testing of a
functional prototype. The results of this study are expected to contribute to the availability of
cost-effective chain link wire mesh making machines for small-scale manufacturers,
promoting accessibility and affordability in the industry.
This research focuses on the reverse engineering and prototyping of a chain link wire mesh
making machine, aiming to develop an affordable and efficient solution for small-scale
manufacturers. Chain link wire mesh is a versatile material widely used in various industries,
but existing machines for its production are often expensive and inaccessible for small
producers. The study involves a comprehensive analysis of the design, operation, and control
mechanisms of existing machines, followed by the development and testing of a functional
prototype.

1.4.2 Components of chain link wire mesh making machine


 DC Motor
 Shaft
 Internal Rod
 Slotted Pipe
 bobbin
 Mesh Wire
 Supporting Frame
 Nuts & Bolts
 Mounts and Joints
 Base Frame
 Screws and Connectors

iv
CONTENTS
CERTIFICATE i
DECLARATION ii
ACKNOWLEDGMENT iii
ABSTRACT iv
CHAPTER 1 1

INTRODUCTION 1

1.1 Definition of Reverse engineering 1

1.2 Types of Reverse engineering

1.2.1 Black Box Reverse Engineering

1.2.2 White Box Reverse Engineering


1.3 Functional Reverse Engineering
1.4 Component Reverse Engineering
1.4.1 Steps involved in component reverse engineering
1.4.2 Components of chain link wire mesh making machine
1.5 HISTORY
1.5.1 Apollo 11 Lunar Module
1.5.2 Video Game Consoles
1.5.3 Medical Devices
1.5.4 Cryptography and Cyber security
1.5.5 Cultural Heritage Preservation
1.5.6 Early Stages
1.5.7 Digital Reverse Engineering
1.5.8 Scanning and Imaging Technologies
1.5.9 Computer-Aided Design (CAD) Integration
1.5.10 Automated Reverse Engineering
1.5.11 Reverse Engineering for Security
1.5.12 Legal and Ethical Considerations
5.2 Scope of Reverse Engineering
5.2.1 Advantages of Reverse engineering
5.2.2 Disadvantages of reverse engineering
5.2.3 Applications of Wire mesh
CHAPTER 2
LITERATURE REVIEW

v
2.1 Introduction
History
CHAPTER 3
METHODOLOGY AND PROBLEM STATEMENT
3.1 Methodology
3.2 Objective
3.3 Time line of the project
CHAPTER 4
DESIGN AND ANALYSIS
4.1Design Concepts
4.1.1 Software
4.1.2SOLIDWORKS
4.1.3Design of Supporting frame in solid
works
CHAPTER 5
EXPERIMENTAL PROCEDURE AND
IMPLEMENTATION
5.1 Components of chain link wire mesh making machine
CHAPTER 6
TESTING AND RESULTS
Specifications
CHAPTER 7
CONCLUSION
conclusion of reverse engineering while making chain link wire
mesh making machine
CHAPTER 8
REFERENCES

vi
LIST OF FIGURES

Figure.1.1 Reverse Engineering Process


Figure1.2 Black box Reverse Engineering
Figure1.3 White Box Reverse Engineering
Figure1.4 White Box Testing
Figure.1.5 Functional Reverse Engineering
Figure.1.6 Component Reverse Engineering
Figure.1.7 Steps involved in component reverse engineering
Figure.1.8 Chain Link Wire Mesh Making Machine
Figure.1.9 DC Motor
Figure.1.10 Shaft
Figure.1.11 Slotted Pipe
Figure.1.12 Bobbin
Figure.1.13 Mesh wire
Figure.1.14 Supporting Frame
Figure.1.15 Nuts & Bolts
Figure.1.16 Mounts and Joints
Figure.2.1 Mesh

Figure.3.1 Methodology
Figure.3.2 Time line of the project
Figure 4.1 Design of Supporting frame in solid works -1

Figure 4.2 Design of Supporting frame in solid works – 2


Figure 4.3 Final Design
Figure 4.4 Design of Shaft in solid works
Figure 4.5 Design of Clamp in solid works
Figure 4.6 Final Assembly of shaft
Figure 4.7 Supporting frame
Figure 4.8 Shaft design
Figure.5.1 DC Motor
Figure.5.2 Shaft
Figure.5.3 Slotted Pipe
Figure.5.4 Bobbin
Figure.5.5 Mesh wire
vii
Figure. 5.6 Nuts
Figure. 5.7 Bolts
Figure.5.8 Mounts and Joints
Figure.5.9 Base Frame
Figure.5.10 Screws and connectors
Figure.5.11 Screws
Figure.6.1 Final design of chain link wire mesh making machine
Figure.6.2 prototype of chain link wire mesh making machine

viii
LIST OF TABULAR

Table 3.1

Figure 3.2

Figure 3.3

Table 5.1
Table 5.2 : Accuracy Test
Table5.3: Depth measurement

Table 5.4:
Speed Test

ix
CHAPTER 1
INTRODUCTION

1. Definition of REVERSE ENGINEERING


Reverse engineering is the process of analyzing and understanding the design, structure,
functionality, and operation of an existing product, system, or component in order to recreate,
replicate, or improve upon it. It involves systematically deconstructing the subject, examining
its individual components, and studying their relationships and interactions to gain insights into
its underlying principles and technologies. Reverse engineering is often used when the original
design documentation or specifications are unavailable, incomplete, or outdated, and it provides
a means to extract knowledge and information from the subject for various purposes, including
recreating the product, understanding its functionality, identifying potential weaknesses or
vulnerabilities, and developing new and improved versions. It is a valuable tool employed in
various fields such as engineering, manufacturing, software development, and product
innovation.Reverse engineering plays a crucial role in various fields, including engineering,
manufacturing, software development, and product innovation. It enables engineers and
designers to gain insights into complex systems, explore their inner workings, and derive
valuable knowledge that can be utilized for multiple purposes.
The primary objective of reverse engineering is often to recreate a product or system without
access to its original design documentation or specifications. This can be particularly useful
when the documentation is unavailable, outdated, or incomplete. By reverse engineering,
engineers can understand the fundamental concepts, mechanisms, and functionalities of the
subject, allowing them to develop an equivalent or improved version.Additionally, reverse
engineering serves as a valuable tool for studying competitor products, benchmarking against
industry standards, and identifying potential weaknesses or vulnerabilities in existing designs. It
provides a means to analyze and evaluate the performance, efficiency, and quality of a product,
enabling companies to enhance their own offerings and gain a competitive edge in the market.
In the context of chain link wire mesh making machines, reverse engineering offers an
opportunity to understand and replicate the functionalities and components of existing
machines. This knowledge can then be utilized to develop a cost-effective and efficient
machine suitable for small-scale manufacturers. By reverse engineering the machines, we can
analyze their design principles, manufacturing techniques, and control systems, enabling us to
create a prototype that meets the specific requirements of small-scale production.

1
Through reverse engineering, we aim to bridge the gap between expensive, inaccessible
machinery and the needs of small-scale producers, promoting affordability, accessibility, and
local production capabilities. By harnessing the power of reverse engineering,
we can leverage existing technology to develop innovative and cost-effective solutions that
cater to the unique requirements of different industries.

Figure.1.1 Reverse Engineering Process


1.2Types of reverse engineering
1.2.1 Black Box Reverse Engineering:
In this type, the focus is on understanding the external behavior and functionality of a product
or system without detailed knowledge of its internal workings. It involves studying inputs,
outputs, and interactions with the subject to infer its underlying mechanisms and algorithms.
Black box reverse engineering refers to the process of analyzing and understanding the inner
workings of a device, system, or software without having access to its original design or
internal documentation. The term "black box" refers to the lack of visibility into the internal
structure or code of the subject being analyzed.
Reverse engineering is commonly used for various purposes, including:

Figure.1.2 Black Box Reverse Engineering

2
 Understanding proprietary or closed systems
 Interoperability and compatibility
 .Product analysis and benchmarking
 Legacy system support
1.2.2 White Box Reverse Engineering:
This type involves a detailed analysis of the internal structure, design, and components of the
subject. It aims to uncover the intricate details of the system, such as the hardware architecture,
software code, algorithms, and data structures.
White box reverse engineering is typically conducted with the permission of the system's owner
or when the system is open source. It can provide a deeper understanding of the system,
enabling developers to make informed decisions, improve performance, enhance security, and
develop compatible or interoperable solutions.
White box reverse engineering, also known as open box reverse engineering or clear box
reverse engineering, refers to the process of analyzing and understanding the inner workings of
a device, system, or software when the internal design, structure, or code is available or known
to the person conducting the analysis. Unlike black box reverse engineering, where the internals
are unknown, white box reverse engineering involves having access to the system's internal
documentation, source code, or design specifications.

Figure.1.3 White Box Reverse Engineering


White box reverse engineering can be useful for several purposes, including:
 Understanding complex systems
 Maintenance and support
 Learning and education

3
 Verification and validation

Figure.1.4 White Box Testing


1.3Functional Reverse Engineering:
This approach focuses on understanding the functionality and purpose of the subject being
analyzed. It involves examining inputs, outputs, and the behavior of the system to deduce its
intended use and overall operation.
Functional reverse engineering, also known as black box reverse engineering, refers to the
process of analyzing and understanding the functionality of a system or product without
detailed knowledge of its internal workings. It involves studying the inputs, outputs, and
behavior of the system to gain insights into its operation.
and any visible behavior or responses.

Figure.1.5 Functional Reverse Engineering

4
 Input
 Analysis
 Here are the general steps involved in functional reverse engineering
 System Observation: Start by observing the system or product in operation. Take note of its
inputs, outputs,
 Output Analysis
 Behavior Analysis
 Reconstructing Functionality
 Testing and experimentation
 Design Reverse Engineering
 Here are the general steps involved in device reverse engineering:
 Disassembly
 Component Identification
 Schematic Analysis
 Reverse Engineering Integrated Circuits
 Code Reverse Engineering
 Code Decompilation
 Analysis of Control Flow
 Variable and Data Analysis
 Reconstructing High-Level Logic
Dynamic Analysis
 Documentation and Analysis
1.4 Component Reverse Engineering:
Component reverse engineering involves analyzing individual components or parts of a product
or system. It aims to understand their structure, materials, manufacturing processes, and
specifications.
Component reverse engineering is the process of studying and analyzing an existing
component, device, or system in order to understand its design, functionality, and inner
workings. The goal of reverse engineering is to extract information and knowledge from a
finished product to either replicate it, improve upon it, or gain insights for other purposes.

5
Figure.1.6 Component Reverse Engineering
1.4.1 Steps involved in component reverse engineering:
 Disassembly
 Visual inspection
 Analysis
 Documentation
 Testing and experimentation
 Reverse design
 Analysis and improvement
 Data Reverse Engineering
 Data analysis
 Identification of data types
 Disassembly or decompilation (if applicable)
 Visualization and correlation
 Hypothesis formulation
 Testing and validation

6
Figure.1.7 Steps involved in component reverse engineering

Additive manufacturing
Additive manufacturing is the process of creating an object by building it one layer at a time.
eIt is the opposite of subtractive manufacturing, in which an object is created by cutting away
at a solid block of material until the final product is complete.
Technically, additive manufacturing can refer to any process where a product is created by
building something up, such as molding, but it typically refers to 3-D printing.
Additive manufacturing was first used to develop prototypes in the 1980s — these objects
were not usually functional. This process was known as rapid prototyping because it allowed
people to create a scale model of the final object quickly, without the typical setup process
and costs involved in creating a prototype. As additive manufacturing improved, its uses
expanded to rapid tooling, which was used to create molds for final products. By the early
2000s, additive manufacturing was being used to create functional products.

Figure.1.7.1 3d Printer

7
1.4.2 Components of chain link wire mesh making machine
 DC Motor
 Shaft
 Internal Rod
 Slotted Pipe
 bobbin
 Mesh Wire
 Supporting Frame
 Nuts & Bolts
 Mounts and Joints
 Base Frame
 Screws and Connectors

Figure.1.8 Chain Link Wire Mesh Making Machine

8
1.4.2 Components of chain link wire mesh making machine
 1.4.2.1 DC Motor: A DC motor is an electrical machine that converts direct current
(DC) electrical energy into mechanical energy. It operates on the principle of the
interaction between magnetic fields and electric currents. The motor consists of a
stationary part called the stator and a rotating part called the rotor. The stator contains
the stationary windings that create a magnetic field, while the rotor consists of a coil of
wire wound around an iron core.

Figure.1.9 DC Motor
 1.4.2.2 Shaft: A shaft, in mechanical engineering, is a crucial component used for power
transmission in various machines and mechanisms. It is a cylindrical rod designed to
rotate and transfer energy between different parts of the system. Shafts are commonly
found in engines, turbines, and industrial equipment where rotational motion is
necessary

Figure.1.10 Shaft

9
 1.4.2.3 Slotted Pipe: A slotted pipe, also known as a slotted casing or perforated pipe,
is a specialized type of pipe used in various industries and applications. It features
evenly spaced slots or perforations along its length, allowing fluid or gas to enter or exit
the pipe. The slots are typically created through drilling or cutting techniques, and their
size, shape, and distribution can vary depending on the specific requirements of the
intended use.

Figure.1.11 Slotted Pipe

 1.4.2.4 Bobbin: A bobbin is a small, cylindrical object used in various industries and
crafts for winding thread, yarn, or wire. It is typically made of plastic, metal, or wood
and is designed to hold and control the supply of the material being wound.

Figure.1.12 Bobbin
 1.4.2.5 Mesh wire: Mesh wire, also known as wire mesh or wire netting, is a versatile
material composed of interconnected wires that form a grid-like pattern. It is commonly
used in a wide range of applications due to its strength, flexibility, and ability to provide
a barrier while allowing for visibility and airflow.

Figure.1.13 Mesh wire

10
 1.4.2.6 Supporting Frame : supporting frame, also known as a framework or structure,
is a foundational component used to provide stability, strength, and support to various
objects, systems, or constructions. It serves as the underlying skeleton or framework
upon which other elements are attached or integrated.

Figure.1.14 Supporting Frame


 1.4.2.7 Nuts & Bolts : Nuts and bolts are fundamental fastening components used
extensively in various industries and everyday applications. They form a reliable and
versatile method of joining two or more parts together securely.
A bolt is a threaded cylindrical rod with a head on one end and a threaded portion on
the other. The threaded portion allows it to be inserted into a corresponding internally
threaded hole or nut. Bolts come in different sizes, lengths, and thread patterns to
accommodate specific requirements.
Nuts, on the other hand, are internally threaded components designed to mate with
bolts. They have a hexagonal or square shape, providing convenient gripping surfaces
for tightening or loosening. Nuts and bolts work in tandem to create a threaded
connection, allowing for disassembly and reassembly as needed.

Figure.1.15 Nuts & Bolts

11
 1.4.2.8 Mounts and Joints : Mounts and joints are essential components used to
connect, support, and enable movement between different parts or structures. They play
a crucial role in various industries, including engineering, construction, automotive, and
furniture manufacturing.
Mounts, also known as mounting brackets or mounts, are designed to securely attach
objects to a surface or structure. They provide stability and structural support while
accommodating specific positioning or alignment requirements. Mounts can be fixed or
adjustable, allowing for flexibility in installation or making adjustments as needed.
Common examples include wall mounts for televisions, monitor mounts for computer
screens, or engine mounts in vehicles.
Joints, on the other hand, are connections that facilitate movement or rotation between
two or more parts. They enable articulation and flexibility in mechanical systems,
allowing components to function together smoothly. Joints can be categorized into
different types based on their specific mechanisms, such as hinges, ball joints, pivot
joints, or sliding joints. Each type of joint provides different ranges of motion and
stability depending on the intended application.

Figure.1.16 Mounts and Joints

12
 1.5 HISTORY :
Reverse engineering is a practice that has a long history, dating back to the early days of human
civilization. The concept of reverse engineering involves analyzing and understanding the
design, structure, and functionality of a product, system, or technology by disassembling and
examining it.
Reverse engineering has been used in various fields throughout history for different purposes.
Here is a brief overview of its history in key areas:
Military and Defense:
Reverse engineering has played a significant role in military and defense strategies. During
World War II, various countries engaged in reverse engineering captured enemy weaponry,
such as aircraft and tanks, to understand their capabilities and develop countermeasures. The
German V-2 rocket, for example, was reverse engineered by the United States and the Soviet
Union after the war.
Industrial Manufacturing:
In the industrial sector, reverse engineering has been employed to understand and replicate
products or components. Manufacturers often use reverse engineering to analyze competitors'
products, enhance their own designs, and ensure compatibility with existing systems. This
approach has been particularly common in the automotive and electronics industries.
Software and Computer Science:
Reverse engineering has been widely used in the software and computer science fields. In the
early days of computing, engineers often disassembled and analyzed machine code to gain
insights into software programs and develop improvements or create compatible software.
Today, reverse engineering is utilized to understand software algorithms, identify security
vulnerabilities, and create interoperable solutions.
Patent Infringement and Intellectual Property Protection: Reverse engineering has also been
involved in legal contexts. Companies may reverse engineer products to investigate patent
infringement claims or protect their intellectual property rights. Reverse engineering can help
identify whether a competitor's product infringes on existing patents or copyrights.Consumer
Electronics and Product Repair:Reverse engineering has become increasingly common in
consumer electronics, especially for repair and modification purposes. Hobbyists, enthusiasts,
and repair technicians often disassemble electronic devices to understand their internal
workings, diagnose issues, and develop solutions.

13
It is important to note that reverse engineering practices can vary significantly depending on
legal and ethical considerations. While it can be a valuable tool for innovation, it is crucial to
respect intellectual property rights, adhere to legal frameworks, and ensure that reverse
engineering is conducted ethically and responsibly.
1.5.1 Apollo 11 Lunar Module:
Reverse engineering played a crucial role in the development of the Apollo 11 Lunar Module,
the spacecraft that carried astronauts to the moon in 1969. The manufacturer, Grumman
Aircraft Engineering Corporation, used a technique called "parallel development" to reverse
engineer the module. They built a full-scale replica of the module and assembled it in parallel
with the ongoing design process, enabling them to identify and resolve potential issues before
the final version was completed.
1.5.2 Video Game Consoles:
Reverse engineering has been prevalent in the gaming industry. In the 1990s and early 2000s,
several console manufacturers faced attempts to reverse engineer their systems. For example,
Sony's PlayStation and PlayStation 2 were reverse engineered to develop modchips, which
allowed users to play copied or unauthorized games. Console manufacturers, in turn, introduced
various measures to protect against such unauthorized modifications.
1.5.3 Medical Devices:
Reverse engineering has been employed in the healthcare industry to improve medical devices.
Researchers and engineers have reverse engineered existing medical devices to gain a deeper
understanding of their functionalities, identify potential flaws, and develop enhanced versions.
This has contributed to advancements in fields such as prosthetics, implantable devices, and
medical imaging technology.
1.5.4 Cryptography and Cyber security:
Reverse engineering has been extensively used in the realm of cybersecurity. Security experts
and researchers often employ reverse engineering techniques to analyze malware, computer
viruses, and other malicious software to understand their behavior, identify vulnerabilities, and
develop countermeasures. Reverse engineering has also been instrumental in analyzing
cryptographic algorithms and protocols to assess their robustness and identify potential
weaknesses.
1.5.5 Cultural Heritage Preservation:
Reverse engineering has played a role in preserving cultural heritage. In cases where ancient
artifacts or structures have deteriorated or are inaccessible, researchers may employ various
techniques, including 3D scanning and reverse engineering, to recreate and digitally preserve

14
these cultural artifacts.
Reverse engineering, the process of analyzing a product or system to understand its design and
functionality, has evolved significantly over the years. Here is an overview of the evolution of
reverse engineering:
1.5.6 Early Stages:
Reverse engineering has been practiced for decades, but it gained prominence during the mid-
20th century. Initially, it involved manually disassembling and inspecting physical objects to
understand their inner workings. This method was time-consuming and relied heavily on the
expertise and intuition of the engineers involved.
1.5.7 Digital Reverse Engineering:
The advent of digital technologies revolutionized the reverse engineering process. With the
introduction of computers and software, reverse engineers gained the ability to analyze and
understand digital systems. This involved examining the binary code, decompiling software,
and analyzing firmware to comprehend the underlying algorithms and functionalities.

1.5.8 Scanning and Imaging Technologies:


The development of advanced scanning and imaging technologies brought a significant leap in
reverse engineering capabilities. Techniques such as 3D scanning and computed tomography
(CT) scanning enabled engineers to capture the physical shape, dimensions, and internal
structures of objects more accurately. This data could then be used to create virtual models or
replicate the original object.
1.5.9 Computer-Aided Design (CAD) Integration:
Reverse engineering became more streamlined with the integration of CAD software.
Engineers could import scanned or captured data into CAD tools, allowing them to create
accurate 3D models of the original object. These models could be modified, optimized, or used
as a reference for further design and analysis.
1.5.10 Automated Reverse Engineering:
Recent advancements in artificial intelligence (AI) and machine learning have led to automated
reverse engineering techniques. AI algorithms can analyze large amounts of data, such as
source code, to deduce high-level design patterns, identify vulnerabilities, or generate high-
level abstractions. Automated reverse engineering tools help accelerate the process and provide
valuable insights to engineers.

15
1.5.11 Reverse Engineering for Security:
Reverse engineering plays a crucial role in cybersecurity and digital forensics. Security
researchers use reverse engineering techniques to identify vulnerabilities and weaknesses in
software, hardware, and systems. Reverse engineering is also employed in analyzing malware,
understanding hacking techniques, and developing countermeasures to protect against cyber
threats.
1.5.12 Legal and Ethical Considerations:
As reverse engineering became more prevalent, legal and ethical concerns arose. Intellectual
property rights and proprietary information protection became important considerations. Laws
and regulations were established to define the boundaries of reverse engineering and prevent
misuse or unauthorized use of the obtained knowledge.
In summary, reverse engineering has evolved from manual disassembly to sophisticated digital
techniques and automated processes. With the integration of advanced technologies and AI,
reverse engineering has become more efficient, accurate, and applicable to various fields,
including manufacturing, cybersecurity, and

16
5.2 Scope of Reverse Engineering:
Understanding complex systems: Reverse engineering can be employed to gain insights into
intricate systems or technologies that may lack proper documentation or have proprietary
components.
Product analysis and improvement: Reverse engineering allows manufacturers to analyze
competitor products, identify their strengths and weaknesses, and make improvements to
their own offerings.
Interoperability: Reverse engineering can aid in understanding the protocols, interfaces, and
data formats used by a system, enabling integration with other systems or the development of
compatible alternatives.
Legacy system comprehension: When dealing with legacy systems or outdated technologies,
reverse engineering can be utilized to understand their functionality, making it easier to
migrate to newer platforms.

5.2.1 Advantages of Reverse engineering


 Understanding complex systems: Reverse engineering allows for a deep understanding of
complex systems, technologies, and products. By dissecting and analyzing the internal
components and design, it becomes possible to gain insights into how the system functions
and how its different elements interact.
 Product improvement and innovation: Reverse engineering can be used to analyze
competitor products and identify their strengths and weaknesses. This information can then
be leveraged to improve existing products or develop innovative solutions with enhanced
features, performance, or cost-effectiveness.
 Compatibility and interoperability: Reverse engineering can help in understanding the
protocols, interfaces, and data formats used by a system. This knowledge enables the
development of compatible alternatives or the integration of different systems that were not
originally designed to work together.
 Legacy system comprehension: Reverse engineering is valuable when dealing with legacy
systems that may lack proper documentation or when migrating from older technologies to
newer platforms. It allows for a thorough understanding of the existing system's
functionality, facilitating the transition and reducing potential risks.
 Cost and time savings: Reverse engineering can help reduce costs and save time by avoiding

17
the need to start from scratch. Instead of building a product or system from the ground up,
reverse engineering can provide valuable insights and shortcuts that accelerate the
development process.
 Intellectual property protection: Reverse engineering can be employed to evaluate and
assess the integrity of a product's intellectual property. By examining the design and
implementation, companies can identify potential vulnerabilities, protect their own
intellectual property rights, and take appropriate measures to secure their products.
 Education and learning: Reverse engineering can be a valuable educational tool, allowing
students, researchers, and engineers to gain hands-on experience with real-world systems. It
provides an opportunity to delve into the practical aspects of engineering and fosters a
deeper understanding of complex technologies.
 Repair and maintenance: Reverse engineering can assist in repairing and maintaining
existing systems or products. By understanding how they are constructed and how they
function, technicians can diagnose issues, identify faulty components, and develop
appropriate solutions for repairs or upgrades.
 It's important to note that while reverse engineering offers these advantages, it should be
conducted within legal and ethical boundaries, respecting intellectual property rights and
relevant regulations

5.2.2 Disadvantages of reverse engineering


 legal and ethical concerns: Reverse engineering can raise legal and ethical issues,
particularly in cases where intellectual property rights or proprietary information may be
involved. Engaging in reverse engineering without proper authorization or violating
confidentiality agreements can result in legal consequences.
 Incomplete or inaccurate information: Reverse engineering may not always provide a
complete and accurate understanding of the original design or implementation. Some
details may be obscured, intentionally obfuscated, or simply inaccessible, making it
challenging to obtain a comprehensive picture of the system being analyzed.
 Time and resource-intensive: Reverse engineering can be a time-consuming and resource-
intensive process. It often requires specialized skills, expertise, and tools. Disassembling,
analyzing, and reconstructing complex systems can be laborious, requiring significant
investment in terms of time, manpower, and equipment.
 High cost: Reverse engineering can be costly, particularly when it involves sophisticated

18
technologies or products. Acquiring the necessary equipment, expertise, and resources
can contribute to the overall expenses of the process.
 Lack of documentation: Reverse engineering becomes necessary when proper
documentation or schematics are unavailable, outdated, or insufficient. However, the
absence of documentation can increase the complexity and difficulty of reverse
engineering, making it more challenging to reconstruct the system accurately.
 Intellectual property concerns: Engaging in reverse engineering may raise concerns about
the violation of intellectual property rights. The knowledge and insights obtained through
reverse engineering can potentially be misused or used to develop competing products
without appropriate authorization or licensing.
 Reliance on physical access: Reverse engineering typically requires physical access to the
object or system being analyzed. This may not always be feasible or practical, especially
in cases where the object is located in a secure or remote environment.
 Limited applicability: Reverse engineering may not be applicable or effective for all types
of systems or products. Some technologies or designs may be highly complex,
specialized, or proprietary, making it difficult to reverse engineer them successfully.
 It is crucial to consider these disadvantages and challenges before undertaking reverse
engineering activities. Legal compliance, ethical considerations, cost-effectiveness, and
the availability of resources should be carefully evaluated to determine the feasibility and
appropriateness of reverse engineering in a given context.

5.2.3 Applications of Wire mesh

 Product Development and Improvement: Reverse engineering allows companies to


analyze and understand competitor products to identify their strengths and weaknesses.
This information can be used to enhance existing products or develop new and improved
versions with added features, performance enhancements, or cost optimization.

 Interoperability and Integration: Reverse engineering can aid in understanding the


protocols, interfaces, and data formats used by a system. This knowledge enables the
development of compatible alternatives or facilitates the integration of different systems
that were not originally designed to work together.

19
 Legacy System Migration: When dealing with legacy systems or outdated technologies,
reverse engineering can be used to understand their functionality, making it easier to
migrate to newer platforms or technologies. This is particularly relevant when
documentation or support for the original system is limited.

 Software Analysis and Security: Reverse engineering can be employed to analyze


software applications, including their algorithms, code structure, and vulnerabilities. This
can help identify security flaws, improve software quality, and develop effective
countermeasures against potential threats or attacks.

 Intellectual Property Protection: Reverse engineering can be used by companies to


evaluate the integrity of their own products' intellectual property. By examining the
design and implementation, companies can identify potential vulnerabilities, protect their
intellectual property rights, and take appropriate measures to secure their products.

 Repair and Maintenance: Reverse engineering can assist in the repair and maintenance of
existing systems or products. By understanding how they are constructed and how they
function, technicians can diagnose issues, identify faulty components, and develop
appropriate solutions for repairs or upgrades.

 Documentation Generation: In cases where proper documentation is lacking or outdated,


reverse engineering can be employed to generate accurate and updated documentation for
a system or product. This documentation can be valuable for maintenance, future
development, or knowledge preservation purposes.

 Education and Learning: Reverse engineering serves as an educational tool, allowing


students, researchers, and engineers to gain practical experience and deepen their
understanding of complex systems. It offers hands-on exploration of real-world
technologies, fostering a deeper comprehension of engineering principles.

 These are just a few examples of the wide range of applications for reverse engineering.
The versatility of the approach makes it valuable in various industries, including
manufacturing, aerospace, automotive, electronics, software development, and more

20
CHAPTER 2

LITERATURE REVIEW

D. Pons, G. Bayley, R. Laurenson, M. Hunt, C.Tyree, D. Aitchison carried out research on


“WireFencing: Determinants of Wire Quality” in this they studied about Knotted wire fences
which arefabricated on specialized machines. The input material is typically galvanized steel
wire. However,the quality of the input wire used by the Fence Producer is beyond control of the
MachineManufacturer. In this problem is that wire strand breakages have been identified during
fabricationand subsequent field erection. [1] Dirk J. Pons, Gareth Bayley, Christopher Tyree,
Matthew Huntand Reuben Laurenson Aitchison carried out research on “Material Properties of
Wire for the Fabrication of Knotted Fences” in this they studied about the materials properties
of galvanized fencing wire, as used in the fabrication of knotted wire fences. A range of
physical properties was inspected: tensile strength, ductility in tension, Young’s modulus, three
point bending, and bending span. [2] Sebastian Balos , Vencislav Grabulov, Leposava Sidjanin,
Mladen Pantic carried out research on “wire fence asapplique armour”in this they studied
about the behaviour of wire fence. In this wire fences used was made from commercial high-
strength patented wire and the supporting frames were made of mild steel L-profile were tested.
[3] Nurudeen A. Raji, Oluleke O. Oluwole carried out research on “Influence of Degree of
Cold-Drawing on the Mechanical Properties of Low Carbon Steel” in thisthey studied about the
Influence of Degree of Cold-Drawing on the Mechanical Properties of Low Carbon Steel. A
0.12%w C steel wire cold drawn progressively by 20%, 25%, 40% and 50% was checked. The
influence of the degree of cold drawing on the mechanical properties of the carbon steel
material were studied using the tensile test, impact test and hardness test experiments in order
to replicate the service condition of the nails Arshpreet Singh, Anupam Agrawal was studied
about Comparison of deforming forces, residual stresses and geometrical accuracy of
deformation machining with conventional bending and forming in this they studied about the
Deformation machining. Deformation machining is a combination of thin structure machining
and single point incremental forming/bending. Junichiro Tokutomia ,, Kenichi Hanazaki,
Nobuhiro Tsuji , Jun Yanagimoto carried out research on Change in mechanical properties of
fine copper wire manufactured by continuous rotary draw bending process in this they studied
about The mechanical behaviors of Cu–Sn alloy wire specimens processed by the newly
proposed method of rotary draw bending are systematically investigated, It was found that
during draw bending, the Vicker hardness(HV) was lower than that of the specimen subjected

21
to wire drawing, particularly on the inside of the bend, and it was confirmed that the softening
induced by plastic deformation is promoted by increasing the compressive residual energy.
[ Christina Umstatter carried out research on “The evolution of virtual fences “in this they
studied about virtual fences.
A virtual fence can be defined as a structure serving as an enclosure, a barrier, or a boundary
without a physical barrier. Siavash Rezazadeh and Jonathan W. Hurst carried out research on
the Optimal Selection of Motors and Transmissions for Electromechanical and Robotic
Systems With regard to the important role of motors and transmissions in the

2.1 Introduction:
Wire mesh making machines are used to produce various types of wire mesh, including chain
link wire mesh.
Wire mesh is commonly used in applications such as fencing, construction, agriculture, and
industrial
filtration.
Machine Design and Components:
or welding unit, and cutting mechanism.
Wire mesh making machines consist of a frame or structure, wire feeding mechanism, weaving
The design of the machine ensures proper alignment, tension, and movement of wires during
the manufacturing process.
Fabrication Techniques:
Wire mesh making machines use different techniques based on the desired type of wire mesh,
such as chain link, welded mesh, or expanded metal mesh.
 Chain link wire mesh is typically fabricated by weaving interlocking wires in a
diamond pattern.

1) Automation and Control:


 Modern wire mesh making machines often incorporate automation and computer
control systems to improve efficiency and accuracy.
 Automatic wire feeding, weaving, and cutting mechanisms reduce manual labor and
increase production rates.

2) Material Selection:
 The choice of wire material depends on the intended application and desired
properties of the wire mesh.

22
 Common materials include stainless steel, galvanized steel, aluminum, and various
alloys.

3) Machine Operation and Parameters:


 Operators set parameters such as wire diameter, mesh size, and weaving speed to
achieve the desired characteristics of the wire mesh.
 The machine should be properly calibrated and adjusted for optimal performance.

4) Quality Control:
 Quality control measures are essential to ensure the uniformity and integrity of the
wire mesh produced.
 Inspections may include checking for wire diameter consistency, mesh size
accuracy, and proper interlocking of wires.
5) Maintenance and Troubleshooting:
 Regular maintenance, including cleaning, lubrication, and replacement of worn
parts, is crucial for machine performance and longevity.
 Troubleshooting techniques help identify and resolve issues such as wire breakage,
misalignment, or irregular weaving.
6) Safety Considerations:
 Wire mesh making machines involve moving parts and potential hazards, so safety
measures such as guards and emergency stop buttons are important.
 Operators should receive appropriate training and follow safety protocols to prevent
accidents.
7) Industrial Applications:
 Wire mesh produced by these machines is used in a wide range of applications,
including fencing, partitions, reinforcement, filtration, and protective barriers.
 These key points provide a general overview of wire mesh making machines. For
more in-depth information on specific aspects, please let me know, and I'll be glad
to assist you further.
8) Types of Wire Mesh:
 Wire mesh making machines can produce various types of wire mesh, including but
not limited to chain link, welded mesh, woven mesh, and expanded metal mesh.
 Each type has its unique characteristics, such as strength, flexibility, and open area
ratio, making them suitable for different applications.

23
9) Wire Feeding Mechanism:
 The wire feeding mechanism in the machine ensures a continuous supply of wire for
the weaving or welding process.
 It may include wire spools, rollers, or other mechanisms to guide and feed the wire
into the machine accurately.
10) Weaving Mechanism:
 For chain link wire mesh, the weaving mechanism interlocks the wires in a diamond
pattern.
 The machine utilizes a series of moving parts, including hooks, shuttles, or needles,
to create the desired weave structure.
11) Welding Mechanism:
 In the case of welded wire mesh, the machine uses welding electrodes or other
welding techniques to fuse the intersecting wires together.
 The welding mechanism ensures strong and consistent welds throughout the mesh.

12) Wire Diameter and Mesh Size Range:


 Wire mesh making machines are designed to accommodate a range of wire diameters
and mesh sizes.
 The machine's specifications define the minimum and maximum wire diameter it can
handle, as well as the mesh size range it can produce.
13) Speed and Production Capacity:
 The production capacity of wire mesh making machines varies depending on factors
such as machine design, automation level, and wire mesh type.
 Speed adjustments allow operators to control the production rate based on their
requirements.
14) Customization and Flexibility:
 Some wire mesh making machines offer flexibility in terms of adjusting parameters
to produce customized wire mesh designs or sizes.
 Modular designs or interchangeable components can enhance the machine's
versatility and adaptability.

24
Integration with Other Processes:
 Wire mesh making machines can be integrated into production lines or combined
with other processes, such as wire drawing or coating, to produce specialized wire
mesh products.
15) Advancements and Innovations:
 Ongoing research and development efforts focus on improving machine efficiency,
automation, energy consumption, and product quality.
 Advancements in computer control systems, machine learning, and artificial
intelligence may further enhance the capabilities of wire mesh making machines.

2.2 History
From England to the Jersey shore, chain link fencing has a long and special history. First
invented in the United Kingdom during the mid 19th century, chain link fencing is cost-
effective, durable, versatile and has low maintenance qualities. Explore the history of chain
link fencing to learn more about one of the most popular fencing materials in the world

What do cloth and chain link fences have in common? More than you might suspect,
actually. Back in 1844, a British man named Charles Barnard developed a process to
produce chain link fencing based on cloth weaving machines. In fact, the manufacturing of
chain-link fencing is called weaving. After all, a chain link is little more than woven steel
wire, most commonly produced today in a diamond pattern. This innovation made creating
lengthy stretches of fencing fast and easy. It wasn’t long before metal fencing became
wildly popular throughout England and eventually spread around the world. Nearly 50
years after the first chain-link fence was assembled, the New Jersey-based Anchor Post
Fence Co. bought the rights to Barnard’s weaving machine and became the first company to
manufacture chain link fences in the United States.Later on, during World War II in
London, many of the original iron and steel fences surrounding parks were removed for
scrap materials, giving chain link an important prominence during the 1940s. Chain link
fences also have historic ties to some older neighborhoods, as they are economical and easy
to install. In 2011, homeowners in Old Town Alexandria in Washington D.C.
were surprised to find out that their chain link fences were considered historic and removing
them resulted in issues with the city’s historic preservation office.

25
Figure.2.1 Mesh

Since they were invented, metal fencing has truly taken off. Simple, easy to produce, and highly
functional, chain link fencing is popular for both commercial and residential use. According to
the Department of Commerce, half of all fences sold in the United States today are made of chain-
link material.

This type of fence provides high security and visibility, and because it is incredibly modular, it can
be customized to suit nearly any application. It remains a popular choice for security fencing
specifically, as its design provides easy access control and provides clear visibility. The top of chain-
link fences can be customized with a razor to the barbed wire for additional protective measures to
help prevent intrusion. On the other hand, if privacy is more of a concern, this type of fence can be
easily fitted with wooden or vinyl slats in either diagonal, vertical, or horizontal patterns to block
outside view. Many people falsely assume this type of fence all have the same basic metallic look
and feel. However, vinyl coatings can provide a smoother finish, prevent rusting, and are available in
many colors to help blend into the background. Black is often the most popular color due to its
versatility, but green and brown are also frequent choices. Privacy slats can also be painted in any
color and stained to enhance the curb appeal of chain link fences.

26
CHAPTER- 3

METHODOLOGY AND PROBLEM STATEMENT

The problem statement revolves around the challenges and areas of improvement in wire mesh
making machines. Currently, manual labor is still heavily involved in the production processes,
resulting in lower production rates and increased labor costs. Furthermore, the lack of standardized
manufacturing practices and quality control measures leads to inconsistencies in wire mesh quality.
The limited flexibility in material options also hinders the versatility of wire mesh making machines.
Additionally, the complex maintenance procedures and troubleshooting processes pose difficulties
for operators, while safety concerns related to moving parts and high-speed operations need to be
addressed. Lastly, the environmental impact of wire mesh production needs to be considered, calling
for the development of energy-efficient machines and environmentally friendly practices. By
addressing these challenges, wire mesh making machines can achieve improved productivity,
consistent quality, enhanced safety measures, and contribute to sustainable manufacturing practices.

1) Inefficient Production Processes: Many wire mesh making machines still rely on manual
labor, resulting in lower production rates and increased labor costs. There is a need to develop
more automated and efficient production processes to enhance productivity and reduce
human intervention.

2) Lack of Standardization: The absence of standardized manufacturing practices and quality


control measures often leads to inconsistencies in wire mesh quality, such as variations in
wire diameter, mesh size, and interlocking or welding integrity. Standardization efforts are
required to ensure uniformity and reliability in wire mesh production.

3) Limited Material Flexibility: While wire mesh making machines can handle a variety of
materials, including stainless steel, galvanized steel, and aluminum, there is a need to explore
the use of alternative materials that offer enhanced properties such as corrosion resistance,
strength, and durability. Developing machines that can efficiently process a broader range of
materials will provide more options for wire mesh applications.

4) Complex Maintenance and Troubleshooting: Wire mesh making machines require regular
maintenance to ensure optimal performance, but the complexity of maintenance procedures
and the lack of standardized guidelines often pose challenges for operators. Simplifying

27
maintenance processes and providing comprehensive troubleshooting resources would help
operators address issues promptly and minimize downtime.

5) Safety Concerns: Operating wire mesh making machines involves inherent safety risks due
to moving parts, high-speed wire feeding mechanisms, and welding processes. Enhancing
machine safety features, providing comprehensive operator training, and implementing
stringent safety protocols are essential to mitigate risks and create a safe working
environment.

6) Environmental Considerations: As industries focus on sustainability and reducing their


environmental footprint, wire mesh making machines should align with these goals. The
development of energy-efficient machines, waste management practices, and the use of
environmentally friendly materials are crucial aspects to be addressed.

7) Addressing these challenges and improving wire mesh making machines will lead to
enhanced productivity, consistent quality, and safer operations. It will also open up
opportunities for new applications and contribute to sustainable manufacturing practices in
the wire mesh industry.

28
3.1 Methodology

Problem Statement

Solving the problem to


overcome it

Creating the design and


preparing and converting
into STL file formate

Inserting STL file into 3d printing


machine with the help of
secondary storage devise
( pen drives )

Making a given module with


solidworks should be obtained

29
Result and Discussion

Figure.3.1 Methodology
3.2 Objective
The objective of our project is to utilize reverse engineering techniques to analyze and
understand the design, functionality, and manufacturing processes of an existing wire mesh
making machine.
Reverse Engineering Analysis: Our first objective is to conduct a thorough analysis of the wire
mesh making machine to understand its internal components, mechanisms, and overall design.
This includes studying the machine's structure, wire feeding mechanism, weaving or welding
unit, and cutting mechanism. By reverse engineering the machine, we aim to gain insights into
its construction and operation principles.
Performance Evaluation: The next objective is to evaluate the performance of the wire mesh
making machine. This involves assessing its production capacity, speed, and efficiency. By
measuring and analyzing key performance indicators, we can identify areas where
improvements can be made to enhance productivity and optimize the machine's operation.
Design Optimization: Based on the analysis and performance evaluation, our objective is to
propose design optimizations for the wire mesh making machine. This may involve suggesting
modifications or enhancements to the machine's components or overall structure to improve its
functionality, ease of use, and reliability. The aim is to create a more efficient and user-friendly
machine that meets industry standards and requirements.
Automation and Control Enhancement: Another objective is to explore opportunities for
automation and control system enhancements in the wire mesh making machine. This includes
investigating the feasibility of integrating advanced automation technologies, such as sensors,
actuators, and computer control systems, to streamline the manufacturing process, reduce
manual labor, and improve accuracy and consistency in wire mesh production.Safety and
Environmental manufacturing processes and technologies.

30
3.3Time line of the project

Figure.3.2 Time line of the project

31
CHAPTER 4
DESIGNING AND ANALYSING
4.1Design Concepts

The design concepts are provided by a software designer or engineering design with a foundation of
design methods that can be applied in a set of fundamental concepts. In designing a concept, a
prototype is more essential to improvise the design and find out the complexation of the modal. For
the prototype, a manufacturing software (3D Printing Methods) is used. The computer software of
designing for the machine that can be used to create or improvise the concept by a set of tools and
command with help of its definitions and magnitude valves. An application of the software can
determine by use and user friendly to the person familiar to it
4.1.1 Software
The computer software of designing for the machine that can be used to create or improvise the
concept by a set of tools and command with help of its definitions and magnitude valves. An
application of the software can determine by use and user friendly to the person familiar to it.
4.1.2SOLIDWORKS :
SolidWorks is a widely used computer-aided design (CAD) software that provides powerful tools
for 3D modeling, simulation, and documentation. With its user-friendly interface and
comprehensive feature set, SolidWorks is a go-to solution for engineers and designers across
various industries. One of the key features of SolidWorks is its robust 3D modeling capabilities.
Users can create intricate and detailed models using a variety of tools, including sketching,
parametric modeling, and surface modeling. The software allows for precise manipulation of
dimensions, geometries, and relationships, enabling users to quickly iterate and refine their
designs. SolidWorks also offers a range of simulation capabilities, allowing engineers to evaluate
and analyze their designs for structural integrity, motion, and fluid flow. With built-in simulation
modules, users can perform stress analysis, simulate the behavior of assemblies under various

32
conditions, and optimize designs for performance and reliability. Further more, SolidWorks
facilitates the creation of detailed manufacturing drawings and documentation. Users can generate
accurate 2D drawings, complete with annotations, dimensions, and bill of materials (BOM). This
capability streamlines the transition from design to production, ensuring that manufacturing
processes and specifications are accurately communicated. Collaboration is made easier with
SolidWorks through its built-in tools for sharing and reviewing designs. Users can easily share
3D models, drawings, and simulation results with team members, suppliers, and clients. This
promotes efficient communication, reduces errors, and facilitates effective decision-making
throughout the design and development process. SolidWorks also integrates seamlessly with
other software tools and industry standards, allowing for interoperability and data exchange. It
supports various file formats, including DWG, DXF, STEP, and IGES, enabling collaboration
with users of different CAD platforms.

4.1.3Design of Supporting frame in solid works

Figure 4.1 Design of Supporting frame in solid works

33
Figure 4.2 Design of Supporting frame in solid works

Figure 4.3 Final Design

Design of shaft in solidworks software

34
Figure 4.4 Design of Shaft in solid works

Figure 4.5 prototype in 3d printing

Design of shaft in solidworks

35
Figure 4.6 Design of Clamp in solid works

Figure 4.7 Final Assembly of shaft

36
Figure 4.8 Supporting frame

Figure 4.9 Shaft design


CHAPTER 5
EXPERIMENTAL PROCEDURE AND
IMPLEMENTATION

5.1 Components required

The required components for the development of the IoT-based smart plant monitoring and irrigation system
using Blynk can be divided into two categories
5.1 Components of chain link wire mesh making machine
 DC Motor
 Shaft
 Internal Rod
 Slotted Pipe
 bobbin
 Mesh Wire

37
 Supporting Frame
 Nuts & Bolts
 Mounts and Joints
 Base Frame
 Screws and Connectors

5.1.1 DC Motor:
DC Motor: A DC motor is an electrical machine that converts direct current (DC) electrical
energy into mechanical energy. It operates on the principle of the interaction between magnetic
fields and electric currents. The motor consists of a stationary part called the stator and a
rotating part called the rotor. The stator contains the stationary windings that create a magnetic
field, while the rotor consists of a coil of wire wound around an iron core.

;
Figure.5.1 DC Motor
5.1.2 Shaft:
A shaft, in mechanical engineering, is a crucial component used for power transmission in
various machines and mechanisms. It is a cylindrical rod designed to rotate and transfer energy
between different parts of the system. Shafts are commonly found in engines, turbines, and
industrial equipment where rotational motion is necessary

38
Figure.5.2 Shaft
5.1.3Slotted Pipe:
A slotted pipe, also known as a slotted casing or perforated pipe, is a specialized type of pipe
used in various industries and applications. It features evenly spaced slots or perforations along
its length, allowing fluid or gas to enter or exit the pipe. The slots are typically created through
drilling or cutting techniques, and their size, shape, and distribution can vary depending on the
specific requirements of the intended use

.
Figure.5.3 Slotted Pipe
5.1.4Bobbin:
A bobbin is a small, cylindrical object used in various industries and crafts for winding thread,
yarn, or wire. It is typically made of plastic, metal, or wood and is designed to hold and control
the supply of the material being wound.

39
Figure.5.4 Bobbin
5.1.5 Mesh wire:
Mesh wire, also known as wire mesh or wire netting, is a versatile material composed of
interconnected wires that form a grid-like pattern. It is commonly used in a wide range of
applications due to its strength, flexibility, and ability to provide a barrier while allowing for
visibility and airflow.

Figure.5.5 Mesh wire


5.1.6 Nuts & Bolts:
Nuts and bolts are fundamental fastening components used extensively in various industries
and everyday applications. They form a reliable and versatile method of joining two or more
parts together securely.

Figure.5.6 Nuts
A bolt is a threaded cylindrical rod with a head on one end and a threaded portion on the other.
The threaded portion allows it to be inserted into a corresponding internally threaded hole or
nut. Bolts come in different sizes, lengths, and thread patterns to accommodate specific
requirements.

40
Figure.5.7 Bolts
Nuts, on the other hand, are internally threaded components designed to mate with bolts. They
have a hexagonal or square shape, providing convenient gripping surfaces for tightening or
loosening. Nuts and bolts work in tandem to create a threaded connection, allowing for
disassembly and reassembly as needed.
5.1.6 Mounts and Joints:
Mounts and joints are essential components used to connect, support, and enable movement
between different parts or structures. They play a crucial role in various industries, including
engineering, construction, automotive, and furniture manufacturing. Mounts, also known as
mounting brackets or mounts, are designed to securely attach objects to a surface or
structure.They provide stability and structural support while accommodating specific
positioning or alignment requirements. Mounts can be fixed or adjustable, allowing for
flexibility in installation or making adjustments as needed. Common examples include wall
mounts for televisions, monitor mounts for computer screens, or engine mounts in vehicles.
Joints, on the other hand, are connections that facilitate movement or rotation between two or
more parts.

Figure.5.8 Mounts and Joints


5.1.7 Base Frame:
A base frame, also known as a foundation or chassis, is a structural component that forms the
lowermost support or platform for various objects, equipment, or structures. It serves as a stable

41
and robust foundation, providing stability, load distribution, and structural integrity.
Base frames are commonly used in industries such as construction, machinery,
manufacturing, and transportation. In construction, base frames are utilized as the starting point
for erecting buildings, providing a level and solid platform on which the rest of the structure is
built.

Figure.5.9 Base Frame


5.1.8 Screws and connectors
Screws and connectors are indispensable fastening components used in a wide range of
industries and everyday applications. They provide a reliable and efficient means of joining or
securing two or more objects together.

Figure.5.10 Screws and connectors

Screws are threaded fasteners with a helical groove, or thread, running along their length. They are
typically inserted into pre-drilled holes or internally threaded components, such as nuts or tapped
holes, to create a secure connection. Screws come in various sizes, types, and materials, each suited
for specific applications and load requirements

Figure.5.11 Screws

CHAPTER 6
TESTING AND RESULT

42
After conducting reverse engineering and prototyping of a chain link wire mesh making
machine, we have successfully developed and tested an improved prototype with enhanced
functionality, efficiency, and reliability. Through the reverse engineering process, we identified
and analyzed the key components of the machine, including the wire feeding mechanism,
weaving mechanism, mesh cutting system, and control panel. Based on our analysis, we made
design modifications to optimize the machine’s performance. The prototype incorporates these
modifications, showcasing improved wire feeding, precise mesh formation, and advanced
control features. Thorough testing and evaluation were conducted, assessing functionality,
efficiency, durability, and the quality of the produced chain link wire mesh. Iterative
refinements were made based on the test results to address any identified issues. The final
prototype has undergone validation, meeting the desired performance goals, quality standards,
and reliability requirements
Moreover, we paid particular attention to the durability and reliability of the prototype during
the testing phase. We subjected it to rigorous operating conditions, monitoring wear and tear on
components, assessing the frequency of breakdowns, and evaluating maintenance requirements.
This allowed us to identify areas that required further improvements to enhance the machine’s
longevity and reduce downtime.By scrutinizing the quality of the produced chain link wire
mesh, we ensured that it met or exceeded the standards set by the original machine. We paid
close attention to defects, accuracy, and overall quality, making necessary adjustments and
refinements to achieve the desired output.Through an iterative refinement process, we
addressed any issues or shortcomings identified during testing. We made adjustments to
specific components, optimized processes, and refined the overall system to further enhance
performance and reliability. These iterative improvements played a vital role in creating a
highly functional and robust chain link wire mesh making machine.In the final stages of
development, we conducted a comprehensive evaluation and validation of the modified
machine. We verified that it met the desired performance goals, and reliability requirements we
had set. The resulting prototype represents a significant advancement in chain link wire mesh
manufacturing technology, offering improved efficiency, enhanced precision, and increased
operational reliability.Overall, our reverse engineering and prototyping efforts have led to the
successful development of an advanced chain link wire mesh making machine. Its enhanced
functionality, efficiency, and reliability position it as a valuable asset in various industries that
rely on high-quality wire mesh

43
Figure.6.1 Final design of chain link wire mesh making machine

Figure.6.2 prototype of chain link wire mesh making machine

44
Figure.6.3 Final Figure

Figure.6.3 Final product in 3d


printing

45
Specifications
Name of the Material Specifications
component
DC Motor Copper RPM – 100,
segments Stall Torque 20 kgcm
No-load current = 800
MA current = 9
A(Max)
Package Dimensions:
10.01 x 10.01 x 10.01
cm
Shaft Aluminium Breadth -2.8cm
/ Iron / steel Length – 34.5cm
Thinckness – 3mm

Slotted Pipe Steel High form base to the shaft


-7mm
Diameter- 3.5
Total length of rod
28cm
Mesh wire Aluminium 0.001 inch to 0.08 inch dia
/ Iron
Base Frame Wood Length-1200
bearth-600
Thickness-50
Table 6

46
CHAPTETR 7
CONCLUSION
In conclusion, reverse engineering plays a crucial role in the development and improvement of chain
link wire mesh making machines. By employing reverse engineering techniques, manufacturers can
analyze and understand existing machines to gather valuable insights into their design, functionality,
and manufacturing processes. Reverse engineering allows manufacturers to deconstruct and examine
the components, mechanisms, and manufacturing techniques employed in a chain link wire mesh
making machine. This in-depth analysis enables them to gain a comprehensive understanding of the
machine's design principles, materials used, and manufacturing methods. By reverse engineering a
chain link wire mesh making machine, manufacturers can identify opportunities for design
enhancements and optimizations. They can assess the machine's performance, identify potential
weaknesses or inefficiencies, and propose modifications to improve its productivity, reliability, and
ease of use. Reverse engineering also facilitates the reproduction or customization of chain link wire
mesh making machines.

47
8. REFERENCES

1. "What is Reverse-engineering? How Does It Work". SearchSoftwareQuality. Retrieved  2022-07-27.


2. ^ "Reverse Engineering". ethics.csc.ncsu.edu. Retrieved 2022-07-27.
3. ^ Garcia, Jorge (December 2015). "Un-building blocks: a model of reverse engineering and
applicable heuristics" (PDF). Core.ac.uk. Retrieved 2023-06-04.
4. ^ Thayer, Ken. "How Does Reverse Engineering Work?". globalspec. IEEE Global Spec.
Retrieved 26 February 2018.
5. ^ Villaverde, Alejandro F.; Banga, Julio R. (6 February 2014). "Reverse engineering and
identification in systems biology: strategies, perspectives and challenges". Journal of the Royal
Society Interface. 11  (91):
20130505. doi:10.1098/rsif.2013.0505. PMC 3869153. PMID 24307566.
6. ^ Jump up to:a b c Chikofsky, E.J. & Cross, J.H., II (1990). "Reverse Engineering and Design
Recovery: A Taxonomy". IEEE Software. 7 (1): 13–17. doi:10.1109/52.43044. S2CID 16266661.
7. ^ Jump up to:a b A Survey of Reverse Engineering and Program Comprehension. Michael L. Nelson,
April 19, 1996, ODU CS 551 – Software Engineering Survey.arXiv:cs/0503068v1
8. ^ Vinesh Raja; Kiran J. Fernandes (2007). Reverse Engineering: An Industrial Perspective.
Springer Science & Business Media. p. 3. ISBN 978-1-84628-856-2.
9. ^ Jonathan Band; Masanobu Katoh (2011). Interfaces on Trial 2.0. MIT Press. p. 136. ISBN 978-0-
262-29446-1.
10. ^ Jump up to:a b c Chikofsky, E. J.; Cross, J. H. (January 1990). "Reverse engineering and design
recovery: A taxonomy" (PDF). IEEE Software. 7: 13–17. doi:10.1109/52.43044. S2CID 16266661.
Archived from the original (PDF) on 2018-04-17. Retrieved 2012-07-02.
11. ^ Jump up to:a b c d e f g h Eilam, Eldad (2005). Reversing: secrets of reverse engineering. John Wiley
& Sons. ISBN 978-0-7645-7481-8.
12. ^ Internet Engineering Task Force RFC 2828 Internet Security Glossary
13. ^ Karwowski, Waldemar; Trzcielinski, Stefan; Mrugalsk, Beata; DiNicolantonio, Massimo; Rossi,
Emilio (2018). Advances in Manufacturing, Production Management and Process Control. pp.  287–
288.
14. ^ Varady, T; Martin, R; Cox, J (1997). "Reverse engineering of geometric models–an
introduction". Computer-Aided Design. 29 (4): 255–268. doi:10.1016/S0010-4485(96)00054-1.

48
15. ^ "Reverse Engineering".
16. ^ Warden, R. (1992). Software Reuse and Reverse Engineering in Practice. London, England:
Chapman & Hall. pp. 283–305.
17. ^ "Working Conference on Reverse Engineering (WCRE)". uni-trier.de. Computer Science
bibliography. Archived from the original on 14 March 2017. Retrieved 22 February 2018.
18. ^ Shahbaz, Muzammil (2012). Reverse Engineering and Testing of Black-Box Software Components:
by Grammatical Inference techniques. LAP LAMBERT Academic Publishing. ISBN 978-
3659140730.
19. ^ Chuvakin, Anton; Cyrus Peikari (January 2004). Security Warrior (1st  ed.). O'Reilly. Archived
from the original on 2006-05-22. Retrieved 2006-05-25.
20. ^ Samuelson, Pamela & Scotchmer, Suzanne (2002). "The Law and Economics of Reverse
Engineering". Yale Law Journal. 111 (7): 1575–1663. doi:10.2307/797533. JSTOR 797533.
Archived from the original on 2010-07-15. Retrieved 2011-10-31.
21. ^ "Samba: An Introduction". 2001-11-27. Retrieved 2009-05-07.
22. ^ Lee, Newton (2013). Counterterrorism and Cybersecurity: Total Information Awareness (2nd  ed.).
Springer Science+Business Media. p.  110. ISBN 978-1461472049.
23. ^ W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse engineering from
network traces. In Proceedings of 16th USENIX Security Symposium on USENIX Security
Symposium, pp. 1–14.
24. ^ W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irún-Briz. Tupni: Automatic reverse engineering
of input formats. In Proceedings of the 15th ACM Conference on Computer and Communications
Security, pp. 391–402. ACM, Oct 2008.
25. ^ Jump up to:a b P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda. Prospex: Protocol
specification extraction. In Proceedings of the 2009 30th IEEE Symposium on Security and Privacy,
pp. 110–125, Washington, 2009. IEEE Computer Society.
26. ^ Gold, E (1978). "Complexity of automaton identification from given data". Information and
Control. 37 (3): 302–320. doi:10.1016/S0019-9958(78)90562-4.
27. ^ D. Angluin (1987). "Learning regular sets from queries and counterexamples". Information and
Computation. 75 (2): 87–106. doi:10.1016/0890-5401(87)90052-6.
28. ^ C.Y. Cho, D. Babic, R. Shin, and D. Song. Inference and Analysis of Formal Models of Botnet
Command and Control Protocols, 2010 ACM Conference on Computer and Communications
Security.

49
29. ^ Polyglot: automatic extraction of protocol message format using dynamic binary analysis. J.
Caballero, H. Yin, Z. Liang, and D. Song. Proceedings of the 14th ACM conference on Computer
and communications security, pp. 317–329.

50

You might also like