Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 57

REVERSE ENGINEERING & PROTOTYPING OF CHAIN LINK

WIRE MESH MAKING MACHINE


A Major Project Report submitted

To
Jawaharlal Nehru Technological University, Hyderabad
In partial fulfilment of the requirements for the award of the degree

BACHELOR OF TECHNOLOGY

IN

MECHANICAL ENGINEERING
Submitted by

ASSEMSETTI AKSHAY (20835A0301)

JANGAMPALLY AKHIL (20835A0311)

JOKARE SANGAMESH (20835A0312)

Under the guidance of


Mr. K. DAYAKAR

Assistant Professor

DEPARTMENT OF MECHANICAL ENGINEERING

GURU NANAK INSTITUTE OF TECHNOLOGY


(Affiliated to Jawaharlal Nehru Technological University)
Ibrahimpatnam, Ranga Reddy District-501506
2019-2023
CERTIFICATE
This is to certify that the minor-project entitled “REVERSE ENGINEERING &
PROTOTYPING OF CHAIN LINK WIRE MESH MAKING MACHINE” is being
presented with a report by ASSEMSETTI AKSHAY (20835A0301),
JANGAMPALLY AKHIL (20835A0311), JOKARE SANGAMESH
(20835A0312),in partial fulfilment of the award of the degree of Bachelor of
Technology in Mechanical Engineering, to Jawaharlal Nehru Technological
University is the record of bonafide work carried out by them my guidance and
supervision.
The results embody in this project report have not been submitted to any other university or
institute for the award of any degree.

Mrs. K. DAYAKAR Dr. B. VIJAYA KUMAR


Internal guide Head of the Department

EXTERNAL EXAMINER

i
DECLARATION

We hereby declare that the minor project entitled “REVERSE ENGINEERING &
PROTOTYPING OF CHAIN LINK WIRE MESH MAKING MACHINE” is work done by,
ASSEMSETTI AKSHAY (20835A0301), JANGAMPALLY AKHIL (20835A0311), and
JOKARE SANGAMESH (20835A0312).Towards the fulfilment of the requirement for the
award of the degree of Bachelor of Technology in Mechanical Engineering, to Jawaharlal
Nehru Technological University, Hyderabad is the result of the work carried out under the
guidance of Mr. K. DAYAKAR Assistant Professor, Guru Nanak Institute of Technology,
Hyderabad.
We further declare that this project report has not been previously submitted before either in part or full for
the award of any degree or any diploma by any organization or any universities.

ASSEMSETTI AKSHAY (20835A0301),

JANGAMPALLY AKHIL (20835A0311),

JOKARE SANGAMESH

(20835A0312).

ii
ACKNOWLEDHMENT
We wish to convey our sincere thanks to our internal guide Mr. K. DAYAKAR Assistant Professor,
Department of Mechanical Engineering, for his professional advice, encouragement in starting this
project, and academic guidance during this project.
We wish to convey our sincere thanks to Dr. B. VIJAYA KUMAR, Professor & Head of
Department, Department of Mechanical Engineering for his masterly supervision and valuable
suggestions for the successful completion of our project
We wish to express our candid gratitude to Principal Dr. S. SREENATHA REDDY, and the
management for providing the required facilities to complete our project successfully. We convey our
sincere thanks to the staff of the Mechanical Engineering Department and the Lab Technicians for
providing enough stuff which helped us in taking up the project successfully.
We wish to convey our sincere thanks to Dr. RISHI SAYD, Associate Director, Co-ordinator of
AICTC Idea Lab & Dr. RANGANAYAKULU, Dean of R&D, Co-ordinator of AICTC Idea Lab for
his masterly supervision and valuable suggestions for the successful completion of our project.
We are also grateful to our well-wishers and friends, whose co-operation and some suggestions
had helped us in completing the project.
Finally, we would like to thank our parents for their exemplary tolerance and for giving us enough
support in our endeavors.

ASSEMSETTI AKSHAY (20835A0301)


JANGAMPALLY AKHIL (20835A0311)
JOKARE SANGAMESH (20835A0312)

iii
ABSTRACT

This research focuses on the reverse engineering and prototyping of a chain link wire mesh
making machine. Chain link wire mesh is a commonly used material in various industries
such as fencing, construction, and agriculture. The existing machines used for manufacturing
chain link wire mesh are often expensive and not easily accessible for small-scale producers.
Therefore, this study aims to reverse engineer an affordable and efficient chain link wire
mesh making machine by understanding the principles and components of existing machines
and developing a prototype that meets the requirements of small-scale production. The
research includes a detailed analysis of the design, operation, and control mechanisms of
chain link wire mesh making machines, followed by the development and testing of a
functional prototype. The results of this study are expected to contribute to the availability of
cost-effective chain link wire mesh making machines for small-scale manufacturers,
promoting accessibility and affordability in the industry
The reverse engineering and prototyping of a chain link wire mesh making machine, aiming
to develop an affordable and efficient solution for small-scale manufacturers. Chain link wire
mesh is a versatile material widely used in various industries, but existing machines for its
production are often expensive and inaccessible for small producers. The study involves a
comprehensive analysis of the design, operation, and control mechanisms of existing
machines, followed by the development and testing of a functional prototype.

iv
CONTENTS
CERTIFICATE i
DECLARATION ii
ACKNOWLEDGMENT iii
ABSTRACT iv
CHAPTER 1 1
INTRODUCTION 1
1.1 Definition of Reverse engineering 1
1.2 Types of Reverse engineering 2
1.2.1 Black Box Reverse Engineering 3
1.2.2 White Box Reverse Engineering 4 5
1.2.3 Functional Reverse Engineering 5
1.
1.4 Component Reverse Engineering 6
1.4.1 Steps involved in component reverse engineering 6
1.4.2 Components of chain link wire mesh making machine 8
1.5 HISTORY 13
1.5.1 Apollo 11 Lunar Module 14
1.5.2 Video Game Consoles 15
1.5.3 Medical Devices 15
1.5.4 Cryptography and Cyber security 15
1.5.5 Cultural Heritage Preservation 15
1.5.6 Early Stages 15
1.5.7 Digital Reverse Engineering 16
1.5.8 Scanning and Imaging Technologies 16
1.5.9 Computer-Aided Design (CAD) Integration 16
1.5.10 Automated Reverse Engineering 16
1.5.11 Reverse Engineering for Security 16
1.5.12 Legal and Ethical Considerations 16
5.2 Scope of Reverse Engineering 17
5.2.1 Advantages of Reverse engineering 17
5.2.2 Disadvantages of reverse engineering 18
5.2.3 Applications of Wire mesh 19

v
CHAPTER 2
LITERATURE REVIEW 21
CHAPTER 3
METHODOLOGY AND PROBLEM STATEMENT 26
3.1 Methodology 29
3.2 Objective 30
3.3 Time line of the project 31
CHAPTER 4
DESIGN AND ANALYSIS 32
4.1Design Concepts 32
4.1.1 Software 32
4.1.2SOLIDWORKS 32
4.1.3Design of Supporting frame in solid works
CHAPTER 5
EXPERIMENTAL PROCEDURE AND IMPLEMENTATION
5.1 Components of chain link wire mesh making machine 37
CHAPTER 6
TESTING AND RESULTS 39
Specifications 42
CHAPTER 7
CONCLUSION 43
conclusion of reverse engineering while making chain link wire mesh making machine
CHAPTER 8
REFERENCES 45

vi
LIST OF FIGURES

Figure.1.1 Reverse Engineering Process 2


Figure1.2 Black box Reverse Engineering 2
Figure1.3 White Box Reverse Engineering 3
Figure1.4 White Box Testing 4
Figure.1.5 Functional Reverse Engineering 4
Figure.1.6 Component Reverse Engineering 6
Figure.1.7 Steps involved in component reverse engineering 7
Figure.1.8 Chain Link Wire Mesh Making Machine 8
Figure.1.9 DC Motor 9
Figure.1.10 Shaft 9
Figure.1.11 Slotted Pipe 10
Figure.1.12 Bobbin 10
Figure.1.13 Mesh wire 10
Figure.1.14 Supporting Frame 11
Figure.1.15 Nuts & Bolts 11
Figure.1.16 Mounts and Joints 12
Figure.2.1 Mesh 13
Figure.3.1 Methodology 26
Figure.3.2 Time line of the project 28
Figure 4.1 Design of Supporting frame in solid works -1 30
Figure 4.2 Design of Supporting frame in solid works – 2 30
Figure 4.3 Final Design 31
Figure 4.4 Design of Shaft in solid works 32
Figure 4.5 Design of Clamp in solid works 33
Figure 4.6 Final Assembly of shaft 33
Figure 4.7 Supporting frame 34
Figure 4.8 Shaft design 34
Figure.5.1 DC Motor 35
Figure.5.2 Shaft 35
Figure.5.3 Slotted Pipe 36
Figure.5.4 Bobbin 36
Figure.5.5 Mesh wire 36
Figure. 5.6 Nuts 36
vii
Figure. 5.7 Bolts 37
Figure.5.8 Mounts and Joints 38
Figure.5.9 Base Frame 38
Figure.5.10 Screws and connectors 37
Figure.5.11 Screws 38
Figure.6.1 Final design of chain link wire mesh making machine 32
Figure.6.2 prototype of chain link wire mesh making machine

viii
LIST OF TABULAR

Table 3.1Methodology 26

Table 3.2 Time line of project 28

Table 3.3 Specifications 42

ix
CHAPTER 1
INTRODUCTION

1. Definition of REVERSE ENGINEERING


Reverse engineering is the process of analyzing and understanding the design, structure,
functionality, and operation of an existing product, system, or component in order to recreate,
replicate, or improve upon it. It involves systematically deconstructing the subject, examining
its individual components, and studying their relationships and interactions to gain insights into
its underlying principles and technologies. Reverse engineering is often used when the original
design documentation or specifications are unavailable, incomplete, or outdated, and it provides
a means to extract knowledge and information from the subject for various purposes, including
recreating the product, understanding its functionality, identifying potential weaknesses or
vulnerabilities, and developing new and improved versions. It is a valuable tool employed in
various fields such as engineering, manufacturing, software development, and product
innovation.Reverse engineering plays a crucial role in various fields, including engineering,
manufacturing, software development, and product innovation. It enables engineers and
designers to gain insights into complex systems, explore their inner workings, and derive
valuable knowledge that can be utilized for multiple purposes.
The primary objective of reverse engineering is often to recreate a product or system without
access to its original design documentation or specifications. This can be particularly useful
when the documentation is unavailable, outdated, or incomplete. By reverse engineering,
engineers can understand the fundamental concepts, mechanisms, and functionalities of the
subject, allowing them to develop an equivalent or improved version.Additionally, reverse
engineering serves as a valuable tool for studying competitor products, benchmarking against
industry standards, and identifying potential weaknesses or vulnerabilities in existing designs. It
provides a means to analyze and evaluate the performance, efficiency, and quality of a product,
enabling companies to enhance their own offerings and gain a competitive edge in the market.
In the context of chain link wire mesh making machines, reverse engineering offers an
opportunity to understand and replicate the functionalities and components of existing
machines. This knowledge can then be utilized to develop a cost-effective and efficient
machine suitable for small-scale manufacturers. By reverse engineering the machines, we can
analyze their design principles, manufacturing techniques, and control systems, enabling us to
create a prototype that meets the specific requirements of small-scale production.

1
Through reverse engineering, we aim to bridge the gap between expensive, inaccessible
machinery and the needs of small-scale producers, promoting affordability, accessibility, and
local production capabilities. By harnessing the power of reverse engineering,
we can leverage existing technology to develop innovative and cost-effective solutions that
cater to the unique requirements of different industries.

Figure.1.1 Reverse Engineering Process


1.2 Types of reverse engineering
1.2.1 Black Box Reverse Engineering:
In this type, the focus is on understanding the external behavior and functionality of a product
or system without detailed knowledge of its internal workings. It involves studying inputs,
outputs, and interactions with the subject to infer its underlying mechanisms and algorithms.
Black box reverse engineering refers to the process of analyzing and understanding the inner
workings of a device, system, or software without having access to its original design or
internal documentation. The term "black box" refers to the lack of visibility into the internal
structure or code of the subject being analyzed.
Reverse engineering is commonly used for various purposes, including:

Figure.1.2 Black Box Reverse Engineering

2
 Understanding proprietary or closed systems
 Interoperability and compatibility
 .Product analysis and benchmarking
 Legacy system support
1.2.2 White Box Reverse Engineering:
This type involves a detailed analysis of the internal structure, design, and components of the
subject. It aims to uncover the intricate details of the system, such as the hardware architecture,
software code, algorithms, and data structures.
White box reverse engineering is typically conducted with the permission of the system's owner
or when the system is open source. It can provide a deeper understanding of the system,
enabling developers to make informed decisions, improve performance, enhance security, and
develop compatible or interoperable solutions.
White box reverse engineering, also known as open box reverse engineering or clear box
reverse engineering, refers to the process of analyzing and understanding the inner workings of
a device, system, or software when the internal design, structure, or code is available or known
to the person conducting the analysis. Unlike black box reverse engineering, where the internals
are unknown, white box reverse engineering involves having access to the system's internal
documentation, source code, or design specifications.

Figure.1.3 White Box Reverse Engineering


White box reverse engineering can be useful for several purposes, including:
 Understanding complex systems
 Maintenance and support
 Learning and education

3
 Verification and validation

Figure.1.4 White Box Testing


1.3 Functional Reverse Engineering:
This approach focuses on understanding the functionality and purpose of the subject
being analyzed. It involves examining inputs, outputs, and the behavior of the system to deduce
its intended use and overall operation.
Functional reverse engineering, also known as black box reverse engineering, refers to the
process of analyzing and understanding the functionality of a system or product without
detailed knowledge of its internal workings. It involves studying the inputs, outputs, and
behavior of the system to gain insights into its operation.
and any visible behavior or responses.

Figure.1.5 Functional Reverse Engineering

4
 Input
 Analysis
 Here are the general steps involved in functional reverse engineering
 System Observation: Start by observing the system or product in operation. Take note of its
inputs, outputs,
 Output Analysis
 Behavior Analysis
 Reconstructing Functionality
 Testing and experimentation
 Design Reverse Engineering
 Here are the general steps involved in device reverse engineering:
 Disassembly
 Component Identification
 Schematic Analysis
 Reverse Engineering Integrated Circuits
 Code Reverse Engineering
 Code Decompilation
 Analysis of Control Flow
 Variable and Data Analysis
 Reconstructing High-Level Logic
Dynamic Analysis
 Documentation and Analysis
1.4 Component Reverse Engineering:
Component reverse engineering involves analyzing individual components or parts of a
product or system. It aims to understand their structure, materials, manufacturing processes,
and specifications.
Component reverse engineering is the process of studying and analyzing an existing
component, device, or system in order to understand its design, functionality, and inner
workings. The goal of reverse engineering is to extract information and knowledge from a
finished product to either replicate it, improve upon it, or gain insights for other purposes.

5
Figure.1.6 Component Reverse Engineering
1.4.1 Steps involved in component reverse engineering:
 Disassembly
 Visual inspection
 Analysis
 Documentation
 Testing and experimentation
 Reverse design
 Analysis and improvement
 Data Reverse Engineering
 Data analysis
 Identification of data types
 Disassembly or decompilation (if applicable)
 Visualization and correlation
 Hypothesis formulation
 Testing and validation

6
Figure.1.7 Steps involved in component reverse engineering
Additive manufacturing is the process of creating an object by building it one layer at a time.
eIt is the opposite of subtractive manufacturing, in which an object is created by cutting away at
a solid block of material until the final product is complete.
Technically, additive manufacturing can refer to any process where a product is created by
building something up, such as molding, but it typically refers to 3-D printing.
Additive manufacturing was first used to develop prototypes in the 1980s — these objects were
not usually functional. This process was known as rapid prototyping because it allowed people
to create a scale model of the final object quickly, without the typical setup process and costs
involved in creating a prototype. As additive manufacturing improved, its uses expanded to
rapid tooling, which was used to create molds for final products. By the early 2000s, additive
manufacturing was being used to create functional products.

Figure.1.7.1 3d Printer

7
1.4.2 Components of chain link wire mesh making machine
 DC Motor
 Shaft
 Internal Rod
 Slotted Pipe
 bobbin
 Mesh Wire
 Supporting Frame
 Nuts & Bolts
 Mounts and Joints
 Base Frame
 Screws and Connectors

Figure.1.8 Chain Link Wire Mesh Making Machine

8
1.4.2 Components of chain link wire mesh making machine
1.4.2.1 DC Motor: A DC motor is an electrical machine that converts direct current (DC)
electrical energy into mechanical energy. It operates on the principle of the interaction
between magnetic fields and electric currents. The motor consists of a stationary part called
the stator and a rotating part called the rotor. The stator contains the stationary windings that
create a magnetic field, while the rotor consists of a coil of wire wound around an iron core.

Figure.1.9 DC Motor
1.4.2.2 Shaft: A shaft, in mechanical engineering, is a crucial component used for power
transmission in various machines and mechanisms. It is a cylindrical rod designed to
rotate and transfer energy between different parts of the system. Shafts are commonly
found in engines, turbines, and industrial equipment where rotational motion is
necessary

Figure.1.10 Shaft

9
1.4.2.3 Slotted Pipe: A slotted pipe, also known as a slotted casing or perforated pipe, is a
specialized type of pipe used in various industries and applications. It features evenly spaced
slots or perforations along its length, allowing fluid or gas to enter or exit the pipe. The slots
are typically created through drilling or cutting techniques, and their size, shape, and
distribution can vary depending on the specific requirements of the intended use.

Figure.1.11 Slotted Pipe


1.4.2.4 Bobbin: A bobbin is a small, cylindrical object used in various industries and crafts
for winding thread, yarn, or wire. It is typically made of plastic, metal, or wood and is
designed to hold and control the supply of the material being wound.

Figure.1.12 Bobbin
1.4.2.5 Mesh wire: Mesh wire, also known as wire mesh or wire netting, is a versatile
material composed of interconnected wires that form a grid-like pattern. It is commonly used
in a wide range of applications due to its strength, flexibility, and ability to provide a barrier
while allowing for visibility and airflow.

Figure.1.13 Mesh wire


1.4.2.6 Supporting Frame: supporting frame, also known as a framework or structure, is a
foundational component used to provide stability, strength, and support to various objects,

10
systems, or constructions. It serves as the underlying skeleton or framework upon which
other elements are attached or integrated.

Figure.1.14 Supporting Frame


1.4.2.7 Nuts & Bolts: Nuts and bolts are fundamental fastening components used extensively
in various industries and everyday applications. They form a reliable and versatile method of
joining two or more parts together securely.
A bolt is a threaded cylindrical rod with a head on one end and a threaded portion on the
other. The threaded portion allows it to be inserted into a corresponding internally threaded
hole or nut. Bolts come in different sizes, lengths, and thread patterns to accommodate
specific requirements.
Nuts, on the other hand, are internally threaded components designed to mate with bolts.
They have a hexagonal or square shape, providing convenient gripping surfaces for tightening
or loosening. Nuts and bolts work in tandem to create a threaded connection, allowing for
disassembly and reassembly as needed.

Figure.1.15 Nuts & Bolts


1.4.2.8 Mounts and Joints : Mounts and joints are essential components used to connect,
support, and enable movement between different parts or structures. They play a crucial role

11
in various industries, including engineering, construction, automotive, and furniture
manufacturing.
Mounts, also known as mounting brackets or mounts, are designed to securely attach objects
to a surface or structure. They provide stability and structural support while accommodating
specific positioning or alignment requirements. Mounts can be fixed or adjustable, allowing
for flexibility in installation or making adjustments as needed. Common examples include
wall mounts for televisions, monitor mounts for computer screens, or engine mounts in
vehicles.
Joints, on the other hand, are connections that facilitate movement or rotation between two or
more parts. They enable articulation and flexibility in mechanical systems, allowing
components to function together smoothly. Joints can be categorized into different types
based on their specific mechanisms, such as hinges, ball joints, pivot joints, or sliding joints.
Each type of joint provides different ranges of motion and stability depending on the intended
application.

Figure.1.16 Mounts and Joints


1.5 HISTORY:
Reverse engineering is a practice that has a long history, dating back to the early days of human
civilization. The concept of reverse engineering involves analyzing and understanding the
design, structure, and functionality of a product, system, or technology by disassembling and
examining it.Reverse engineering has been used in various fields throughout history for
different purposes. Here is a brief overview of its history in key areas:

Military and Defense:

12
Reverse engineering has played a significant role in military and defense strategies. During
World War II, various countries engaged in reverse engineering captured enemy weaponry,
such as aircraft and tanks, to understand their capabilities and develop countermeasures. The
German V-2 rocket, for example, was reverse engineered by the United States and the Soviet
Union after the war.
Industrial Manufacturing:
In the industrial sector, reverse engineering has been employed to understand and replicate
products or components. Manufacturers often use reverse engineering to analyze competitors'
products, enhance their own designs, and ensure compatibility with existing systems. This
approach has been particularly common in the automotive and electronics industries.
Software and Computer Science:
Reverse engineering has been widely used in the software and computer science fields. In the
early days of computing, engineers often disassembled and analyzed machine code to gain
insights into software programs and develop improvements or create compatible software.
Today, reverse engineering is utilized to understand software algorithms, identify security
vulnerabilities, and create interoperable solutions.
Patent Infringement and Intellectual Property Protection: Reverse engineering has also been
involved in legal contexts. Companies may reverse engineer products to investigate patent
infringement claims or protect their intellectual property rights. Reverse engineering can help
identify whether a competitor's product infringes on existing patents or copyrights. Consumer
Electronics and Product Repair: Reverse engineering has become increasingly common in
consumer electronics, especially for repair and modification purposes. Hobbyists, enthusiasts,
and repair technicians often disassemble electronic devices to understand their internal
workings, diagnose issues, and develop solutions.
It is important to note that reverse engineering practices can vary significantly depending on
legal and ethical considerations. While it can be a valuable tool for innovation, it is crucial to
respect intellectual property rights, adhere to legal frameworks, and ensure that reverse
engineering is conducted ethically and responsibly.
1.5.1 Apollo 11 Lunar Module:
Reverse engineering played a crucial role in the development of the Apollo 11 Lunar Module,
the spacecraft that carried astronauts to the moon in 1969. The manufacturer, Grumman
Aircraft Engineering Corporation, used a technique called "parallel development" to reverse
engineer the module. They built a full-scale replica of the module and assembled it in parallel
with the ongoing design process, enabling them to identify and resolve potential issues before

13
the final version was completed.
1.5.2 Video Game Consoles:
Reverse engineering has been prevalent in the gaming industry. In the 1990s and early 2000s,
several console manufacturers faced attempts to reverse engineer their systems. For example,
Sony's PlayStation and PlayStation 2 were reverse engineered to develop modchips, which
allowed users to play copied or unauthorized games. Console manufacturers, in turn, introduced
various measures to protect against such unauthorized modifications.
1.5.3 Medical Devices:
Reverse engineering has been employed in the healthcare industry to improve medical devices.
Researchers and engineers have reverse engineered existing medical devices to gain a deeper
understanding of their functionalities, identify potential flaws, and develop enhanced versions.
This has contributed to advancements in fields such as prosthetics, implantable devices, and
medical imaging technology.
1.5.4 Cryptography and Cyber security:
Reverse engineering has been extensively used in the realm of cybersecurity. Security experts
and researchers often employ reverse engineering techniques to analyze malware, computer
viruses, and other malicious software to understand their behavior, identify vulnerabilities, and
develop countermeasures. Reverse engineering has also been instrumental in analyzing
cryptographic algorithms and protocols to assess their robustness and identify potential
weaknesses.
1.5.5 Cultural Heritage Preservation:
Reverse engineering has played a role in preserving cultural heritage. In cases where ancient
artifacts or structures have deteriorated or are inaccessible, researchers may employ various
techniques, including 3D scanning and reverse engineering, to recreate and digitally preserve
these cultural artifacts.
Reverse engineering, the process of analyzing a product or system to understand its design and
functionality, has evolved significantly over the years. Here is an overview of the evolution of
reverse engineering:
1.5.6 Early Stages:
Reverse engineering has been practiced for decades, but it gained prominence during the mid-
20th century. Initially, it involved manually disassembling and inspecting physical objects to
understand their inner workings. This method was time-consuming and relied heavily on the
expertise and intuition of the engineers involved.
1.5.7 Digital Reverse Engineering:

14
The advent of digital technologies revolutionized the reverse engineering process. With the
introduction of computers and software, reverse engineers gained the ability to analyze and
understand digital systems. This involved examining the binary code, decompiling software,
and analyzing firmware to comprehend the underlying algorithms and functionalities.
1.5.8 Scanning and Imaging Technologies:
The development of advanced scanning and imaging technologies brought a significant leap in
reverse engineering capabilities. Techniques such as 3D scanning and computed tomography
(CT) scanning enabled engineers to capture the physical shape, dimensions, and internal
structures of objects more accurately. This data could then be used to create virtual models or
replicate the original object.
1.5.9 Computer-Aided Design (CAD) Integration:
Reverse engineering became more streamlined with the integration of CAD software.
Engineers could import scanned or captured data into CAD tools, allowing them to create
accurate 3D models of the original object. These models could be modified, optimized, or used
as a reference for further design and analysis.
1.5.10 Automated Reverse Engineering:
Recent advancements in artificial intelligence (AI) and machine learning have led to automated
reverse engineering techniques. AI algorithms can analyze large amounts of data, such as
source code, to deduce high-level design patterns, identify vulnerabilities, or generate high-
level abstractions. Automated reverse engineering tools help accelerate the process and provide
valuable insights to engineers.
1.5.11 Reverse Engineering for Security:
Reverse engineering plays a crucial role in cybersecurity and digital forensics. Security
researchers use reverse engineering techniques to identify vulnerabilities and weaknesses in
software, hardware, and systems. Reverse engineering is also employed in analyzing malware,
understanding hacking techniques, and developing countermeasures to protect against cyber
threats.
1.5.12 Legal and Ethical Considerations:
As reverse engineering became more prevalent, legal and ethical concerns arose. Intellectual
property rights and proprietary information protection became important considerations. Laws
and regulations were established to define the boundaries of reverse engineering and prevent
misuse or unauthorized use of the obtained knowledge.
5.2 Scope of Reverse Engineering:
Understanding complex systems: Reverse engineering can be employed to gain insights into

15
intricate systems or technologies that may lack proper documentation or have proprietary
components.
Product analysis and improvement: Reverse engineering allows manufacturers to analyze
competitor products, identify their strengths and weaknesses, and make improvements to their
own offerings.
Interoperability: Reverse engineering can aid in understanding the protocols, interfaces, and
data formats used by a system, enabling integration with other systems or the development of
compatible alternatives.
Legacy system comprehension: When dealing with legacy systems or outdated technologies,
reverse engineering can be utilized to understand their functionality, making it easier to migrate
to newer platforms.
5.2.1 Advantages of Reverse engineering
 Understanding complex systems: Reverse engineering allows for a deep understanding of
complex systems, technologies, and products. By dissecting and analyzing the internal
components and design, it becomes possible to gain insights into how the system functions
and how its different elements interact.
 Product improvement and innovation: Reverse engineering can be used to analyze
competitor products and identify their strengths and weaknesses. This information can then
be leveraged to improve existing products or develop innovative solutions with enhanced
features, performance, or cost-effectiveness.
 Compatibility and interoperability: Reverse engineering can help in understanding the
protocols, interfaces, and data formats used by a system. This knowledge enables the
development of compatible alternatives or the integration of different systems that were not
originally designed to work together.
 Legacy system comprehension: Reverse engineering is valuable when dealing with legacy
systems that may lack proper documentation or when migrating from older technologies to
newer platforms. It allows for a thorough understanding of the existing system's
functionality, facilitating the transition and reducing potential risks.
 Cost and time savings: Reverse engineering can help reduce costs and save time by avoiding
the need to start from scratch. Instead of building a product or system from the ground up,
reverse engineering can provide valuable insights and shortcuts that accelerate the
development process.
 Intellectual property protection: Reverse engineering can be employed to evaluate and

16
assess the integrity of a product's intellectual property. By examining the design and
implementation, companies can identify potential vulnerabilities, protect their own
intellectual property rights, and take appropriate measures to secure their products.
 Education and learning: Reverse engineering can be a valuable educational tool, allowing
students, researchers, and engineers to gain hands-on experience with real-world systems. It
provides an opportunity to delve into the practical aspects of engineering and fosters a
deeper understanding of complex technologies.
 Repair and maintenance: Reverse engineering can assist in repairing and maintaining
existing systems or products. By understanding how they are constructed and how they
function, technicians can diagnose issues, identify faulty components, and develop
appropriate solutions for repairs or upgrades.
 It's important to note that while reverse engineering offers these advantages, it should be
conducted within legal and ethical boundaries, respecting intellectual property rights and
relevant regulations
5.2.2 Disadvantages of reverse engineering
 legal and ethical concerns: Reverse engineering can raise legal and ethical issues,
particularly in cases where intellectual property rights or proprietary information may be
involved. Engaging in reverse engineering without proper authorization or violating
confidentiality agreements can result in legal consequences.
 Incomplete or inaccurate information: Reverse engineering may not always provide a
complete and accurate understanding of the original design or implementation. Some
details may be obscured, intentionally obfuscated, or simply inaccessible, making it
challenging to obtain a comprehensive picture of the system being analyzed.
 Time and resource-intensive: Reverse engineering can be a time-consuming and resource-
intensive process. It often requires specialized skills, expertise, and tools. Disassembling,
analyzing, and reconstructing complex systems can be laborious, requiring significant
investment in terms of time, manpower, and equipment.
 High cost: Reverse engineering can be costly, particularly when it involves sophisticated
technologies or products. Acquiring the necessary equipment, expertise, and resources
can contribute to the overall expenses of the process.

 Lack of documentation: Reverse engineering becomes necessary when proper

17
documentation or schematics are unavailable, outdated, or insufficient. However, the
absence of documentation can increase the complexity and difficulty of reverse
engineering, making it more challenging to reconstruct the system accurately.
 Intellectual property concerns: Engaging in reverse engineering may raise concerns about
the violation of intellectual property rights. The knowledge and insights obtained through
reverse engineering can potentially be misused or used to develop competing products
without appropriate authorization or licensing.
 Reliance on physical access: Reverse engineering typically requires physical access to the
object or system being analyzed. This may not always be feasible or practical, especially
in cases where the object is located in a secure or remote environment.
 Limited applicability: Reverse engineering may not be applicable or effective for all types
of systems or products. Some technologies or designs may be highly complex,
specialized, or proprietary, making it difficult to reverse engineer them successfully.
 It is crucial to consider these disadvantages and challenges before undertaking reverse
engineering activities. Legal compliance, ethical considerations, cost-effectiveness, and
the availability of resources should be carefully evaluated to determine the feasibility and
appropriateness of reverse engineering in a given context
5.2.3 Applications of Wire mesh
 Product Development and Improvement: Reverse engineering allows companies to
analyze and understand competitor products to identify their strengths and weaknesses.
This information can be used to enhance existing products or develop new and improved
versions with added features, performance enhancements, or cost optimization.
 Interoperability and Integration: Reverse engineering can aid in understanding the
protocols, interfaces, and data formats used by a system. This knowledge enables the
development of compatible alternatives or facilitates the integration of different systems
that were not originally designed to work together.
 Legacy System Migration: When dealing with legacy systems or outdated technologies,
reverse engineering can be used to understand their functionality, making it easier to
migrate to newer platforms or technologies.

 Software Analysis and Security: Reverse engineering can be employed to analyze

18
software applications, including their algorithms, code structure, and vulnerabilities. This
can help identify security flaws, improve software quality, and develop effective
countermeasures against potential threats or attacks.
 Intellectual Property Protection: Reverse engineering can be used by companies to
evaluate the integrity of their own products' intellectual property. By examining the
design and implementation, companies can identify potential vulnerabilities, protect their
intellectual property rights, and take appropriate measures to secure their products.
 Repair and Maintenance: Reverse engineering can assist in the repair and maintenance of
existing systems or products. By understanding how they are constructed and how they
function, technicians can diagnose issues, identify faulty components, and develop
appropriate solutions for repairs or upgrades.
 Documentation Generation: In cases where proper documentation is lacking or outdated,
reverse engineering can be employed to generate accurate and updated documentation for
a system or product. This documentation can be valuable for maintenance, future
development, or knowledge preservation purposes.
 Education and Learning: Reverse engineering serves as an educational tool, allowing
students, researchers, and engineers to gain practical experience and deepen their
understanding of complex systems. It offers hands-on exploration of real-world
technologies, fostering a deeper comprehension of engineering principles.
 These are just a few examples of the wide range of applications for reverse engineering.
The versatility of the approach makes it valuable in various industries, including
manufacturing, aerospace, automotive, electronics, software development, and more

19
CHAPTER 2

LITERATURE REVIEW

.Chauhan, Parmar, and Rathod [14] study on the design and fabrication of an automatic
chain link fencing machine shed light on key components and mechanisms. Their work
emphasized the importance of a sturdy frame to withstand the production process's mechanical
stresses. The feeding mechanism, responsible for providing a continuous supply of wire, was
carefully designed to ensure smooth and precise operation. Furthermore, the bending and
cutting mechanisms were optimized for accuracy, enabling consistent production of chain link
wire mesh. Experimental results validated the effectiveness of their machine, demonstrating
high efficiency and accuracy in the manufacturing process. Design considerations are
paramount in the development of efficient and reliable chain link wire mesh making machines.
Chauhan,Parmar, and Rathod [15]. placed significant emphasis on optimizing the machine's
performance through innovative design features. The researchers recognized the importance of
a sturdy frame to withstand the mechanical stresses encountered during the production process.
They carefully selected materials and incorporated structural reinforcements to ensure the
machine's stability and durability. Regarding the feeding mechanism, Chauhan, Parmar, and
Rathod implemented an efficient and reliable system that provided a continuous supply of wire.
They considered factors such as wire tension and feeding speed to achieve consistent and
precise wire placement during the weaving process. By carefully calibrating the feeding
mechanism, they minimized the risk of wire entanglement or misalignment, resulting in high-
quality chain link wire mesh.The bending mechanism in their machine was meticulously
designed to enable accurate and uniform bending of wires. By employing suitable bending tools
and precise control mechanisms, the researchers ensured the desired shape and interlocking of
the wires. This attention to detail contributed to the overall strength and stability of the
produced chain link wire mesh.
Bhargava and Gupta's [16]. Research on the design and development of a chain link making
machine focused on optimizing various aspects to ensure efficient and reliable production. One
of the key areas they explored was the wire feeding mechanism. They recognized the
importance of a smooth and continuous wire supply for uninterrupted weaving and interlinking
of wires. Through their innovative design, they implemented a feeding mechanism that
achieved a consistent and reliable wire feed rate, reducing the chances of any disruptions in the
production process.

20
In addition to the wire feeding mechanism, Bhargava and Gupta placed significant emphasis on
the weaving mechanism of their machine. They aimed to achieve a tight interlocking of wires,
ensuring the production of sturdy and uniform chain link wire mesh. By carefully designing the
weaving mechanism, they optimized the spacing and interlocking pattern of the wires, resulting
in a reliable and robust mesh structure. This attention to detail contributed to the overall
strength and durability of the produced chain link wire mesh. Furthermore, Bhargava and Gupta
focused on refining the cutting mechanism of their machine. They recognized the importance of
precise and accurate cuts to achieve consistent sizing of the chain link wire mesh. By
implementing cutting tools with sharp blades and incorporating control mechanisms, they
achieved clean and uniform cuts, facilitating easy installation and ensuring the desired
dimensions of the wire mesh. To validate the capabilities of their machine, Bhargava and Gupta
conducted extensive experiments. They assessed parameters such as production speed,
interlinking strength, and dimensional accuracy of the chain link wire mesh. Through rigorous
testing and evaluation, they demonstrated the effectiveness and reliability of their machine in
consistently producing high-quality wire mesh.
D. Pons, G. Bayley, R. Laurenson, M. Hunt, C. Tyree, D. Aitchison[17]. carried out
research on “Wire Fencing: Determinants of Wire Quality” in this they studied about Knotted
wire fences which are fabricated on specialized machines. The input material is typically
galvanized steel wire. However, the quality of the input wire used by the Fence Producer is
beyond control of the Machine Manufacturer. In this problem is that wire strand breakages have
been identified during fabricationand subsequent field erection. [1]
Dirk J. Pons, Gareth Bayley, Christopher Tyree, Matthew Huntand Reuben Laurenson
Aitchison [18]. carried out research on “Material Properties of Wire for the Fabrication of
Knotted Fences” in this they studied about the materials properties of galvanized fencing wire,
as used in the fabrication of knotted wire fences. A range of physical properties was inspected:
tensile strength, ductility in tension, Young’s modulus, three point bending, and bending span.
[2] Sebastian Balos , Vencislav Grabulov , Leposava Sidjanin, Mladen Pantic[19]. carried
out research on “wire fence asapplique armour”in this they studied about the behaviour of wire
fence. In this wire fences used was made from commercial high-strength patented wire and the
supporting frames were made of mild steel L-profile were tested. [3]
Nurudeen A. Raji, Oluleke O. Oluwole [20]. carried out research on “Influence of Degree of
Cold-Drawing on the Mechanical Properties of Low Carbon Steel” in thisthey studied about the
Influence of Degree of Cold-Drawing on the Mechanical Properties of Low Carbon Steel. A

21
0.12%w C steel wire cold drawn progressively by 20%, 25%, 40% and 50% was checked. The
influence of the degree of cold drawing on the mechanical properties of the carbon steel
material were studied using the tensile test, impact test and hardness test experiments in order
to replicate the service condition of the nails Arshpreet Singh, Anupam Agrawal was studied
about Comparison of deforming forces, residual stresses and geometrical accuracy of
deformation machining with conventional bending and forming in this they studied about the
Deformation machining. Deformation machining is a combination of thin structure machining
and single point incremental forming/bending. [4]
Junichiro Tokutomia ,, Kenichi Hanazaki, Nobuhiro Tsuji , Jun Yanagimoto [21].carried
out research on Change in mechanical properties of fine copper wire manufactured by
continuous rotary draw bending process in this they studied about The mechanical behaviors of
Cu–Sn alloy wire specimens processed by the newly proposed method of rotary draw bending
are systematically investigated, It was found that during draw bending, the Vicker
hardness(HV) was lower than that of the specimen subjected to wire drawing, particularly on
the inside of the bend, and it was confirmed that the softening induced by plastic deformation is
promoted by increasing the compressive residual energy.[ Christina Umstatter carried out
research on “The evolution of virtual fences “in this they studied about virtual fences.
A virtual fence can be defined as a structure serving as an enclosure, a barrier, or a boundary
without a physical barrier.
Siavash Rezazadeh and Jonathan W. Hurst [22].carried out research on the Optimal
Selection of Motors and Transmissions for Electromechanical and Robotic Systems With
regard to the important role of motors and transmissions in the
Wire mesh making machines are used to produce various types of wire mesh, including chain
link wire mesh.Wire mesh is commonly used in applications such as fencing, construction,
agriculture, and industrial filtration.
Muley, Parthe, and Mirajkar's [23].study delved into the design and manufacturing process
of a chain link making machine. They highlighted the importance of an effective wire feeding
system that ensures a consistent supply of wire for uninterrupted production. The bending
mechanism, a critical component in the machine, was meticulously designed to achieve the
desired shape and interlocking of wires. The cutting mechanism was optimized for accuracy
and speed, enabling efficient separation of the produced chain link wire mesh. Through
rigorous testing and evaluation, Muley, Parthe, and Mirajkar showcased the machine's
capability to deliver reliable and precise results.

22
Automation of chain link wire mesh making machines has gained significant attention in recent
years, aiming to improve production efficiency and reduce labor-intensive tasks. Thakre, Rane,
and Devhare explored the automation techniques employed in a chain link fencing machine to
enhance productivity. Their study focused on motor control systems, enabling precise control
over the machine's movements and wire feeding process. Sensor-based wire feeding
mechanisms were implemented to ensure continuous wire supply and to detect any anomalies
in the wire feed. Furthermore, the cutting mechanism was automated to achieve precise and
consistent sizing of the chain link wire mesh. Experimental results demonstrated the efficacy of
the automated machine, showcasing increased production rates and improved accuracy.
Robert W. Messler Jr., [24]. which provides a comprehensive overview of reverse
engineering from an industrial standpoint, and "Reversing: Secrets of Reverse Engineering" by
Eldad Eilam, a highly regarded book that delves into the secrets and methodologies of reverse
engineering. Additionally, resources such as "Practical Reverse Engineering" by Bruce Dang et
al., "The IDA Pro Book" by Chris Eagle, and "Practical Malware Analysis" by Michael
Sikorski and Andrew Honig offer practical insights into reverse engineering techniques for
software and malware analysis. Furthermore, works like "Hardware Hacking" by Joe Grand et
al. and "The Basics of Digital Forensics" by John Sammons shed light on reverse engineering
in the context of hardware analysis and digital forensics, respectively. Exploring these and
other relevant sources will provide a solid foundation for a comprehensive literature survey on
reverse engineering
Reverse Engineering of Object-Oriented Code" by Sergio Montenegro and Silvia Rueda[25].
is a valuable resource. The book explores reverse engineering techniques specifically tailored
for object-oriented codebases. It provides insights into understanding existing software designs
and architectures, enabling practitioners to enhance and extend software systems effectively.
In the realm of cybersecurity and vulnerability analysis, "The Art of Memory Forensics" by
Michael Hale Ligh et al.[26] is a highly recommended resource. The book focuses on memory
forensics, a branch of reverse engineering that involves the analysis of volatile memory to
detect and investigate malicious activities. It covers advanced techniques for memory
acquisition, analysis, and detection of sophisticated attacks, making it an essential reference for
cybersecurity professionals.
Additionally, exploring "Embedded Systems" by Jonathan Valvano[27]is beneficial for
understanding reverse engineering in the context of electronic systems. The book introduces
readers to Arm® Cortex®-M microcontrollers and provides insights into their architecture,

23
programming, and debugging. It covers topics such as disassembly, reverse engineering
firmware, and analyzing embedded systems, equipping readers with practical knowledge for
reverse engineering hardware and firmware in embedded systems.
"Practical Packet Analysis" by Chris Sanders [28] is another valuable resource, particularly
for those interested in reverse engineering protocols and network analysis. The book focuses on
using the popular network analysis tool Wireshark to solve real-world network problems. It
covers techniques for capturing, analyzing, and interpreting network traffic, enabling readers to
gain a deeper understanding of protocols and perform reverse engineering on network
communications.
S. Taibi et al:[29] A Systematic Literature Review of Reverse Engineering in the Context of
Software Maintenance" by This review focuses specifically on reverse engineering techniques
used in software maintenance. It analyzes existing literature to identify the common reverse
engineering approaches applied in software maintenance tasks, such as code comprehension,
re-documentation, and evolution.
" M. Fernández-Diego et al.: [30] Reverse Engineering and Reengineering: A Systematic
Mapping Study" by This study provides a systematic mapping of the reverse engineering and
reengineering research landscape. It categorizes existing literature based on research topics,
methodologies, and application domains. The study highlights the trends, gaps, and future
research directions in the field of reverse engineering and reengineering.
"A Systematic Review of Reverse Engineering Challenges and Practices in Industrial Software
Systems" by C. S. Krishna et al.: This systematic review focuses on reverse engineering
practices and challenges encountered in industrial software systems. It analyzes existing
literature to identify the commonly reported challeng

24
CHAPTER- 3

PROBLEM STATEMENT AND METHODOLOGY

The problem statement revolves around the challenges and areas of improvement in wire mesh
making machines. Currently, manual labor is still heavily involved in the production processes,
resulting in lower production rates and increased labor costs. Furthermore, the lack of standardized
manufacturing practices and quality control measures leads to inconsistencies in wire mesh quality.
The limited flexibility in material options also hinders the versatility of wire mesh making machines.
Additionally, the complex maintenance procedures and troubleshooting processes pose difficulties
for operators, while safety concerns related to moving parts and high-speed operations need to be
addressed. Lastly, the environmental impact of wire mesh production needs to be considered, calling
for the development of energy-efficient machines and environmentally friendly practices. By
addressing these challenges, wire mesh making machines can achieve improved productivity,
consistent quality, enhanced safety measures, and contribute to sustainable manufacturing practices.

1) Inefficient Production Processes: Many wire mesh making machines still rely on manual
labor, resulting in lower production rates and increased labor costs. There is a need to develop
more automated and efficient production processes to enhance productivity and reduce
human intervention.

2) Lack of Standardization: The absence of standardized manufacturing practices and quality


control measures often leads to inconsistencies in wire mesh quality, such as variations in
wire diameter, mesh size, and interlocking or welding integrity. Standardization efforts are
required to ensure uniformity and reliability in wire mesh production.

3) Limited Material Flexibility: While wire mesh making machines can handle a variety of
materials, including stainless steel, galvanized steel, and aluminum, there is a need to explore
the use of alternative materials that offer enhanced properties such as corrosion resistance,
strength, and durability. Developing machines that can efficiently process a broader range of
materials will provide more options for wire mesh applications.

4) Complex Maintenance and Troubleshooting: Wire mesh making machines require regular
maintenance to ensure optimal performance, but the complexity of maintenance procedures
and the lack of standardized guidelines often pose challenges for operators. Simplifying

25
maintenance processes and providing comprehensive troubleshooting resources would help
operators address issues promptly and minimize downtime.

5) Safety Concerns: Operating wire mesh making machines involves inherent safety risks due
to moving parts, high-speed wire feeding mechanisms, and welding processes. Enhancing
machine safety features, providing comprehensive operator training, and implementing
stringent safety protocols are essential to mitigate risks and create a safe working
environment.

6) Environmental Considerations: As industries focus on sustainability and reducing their


environmental footprint, wire mesh making machines should align with these goals. The
development of energy-efficient machines, waste management practices, and the use of
environmentally friendly materials are crucial aspects to be addressed.

7) Addressing these challenges and improving wire mesh making machines will lead to
enhanced productivity, consistent quality, and safer operations. It will also open up
opportunities for new applications and contribute to sustainable manufacturing practices in
the wire mesh industry.

26
3.1 Methodology

Problem Statement

Solving the problem to


overcome it

Creating the design and


preparing and converting
into STL file formate

Inserting STL file into 3d printing


machine with the help of
secondary storage devise
( pen drives )

Making a given module with


solidworks should be obtained

27
Figure.3.1 Methodology
3.2 Objective
The objective of our project is to utilize reverse engineering techniques to analyze and

Result and Discussion


understand the design, functionality, and manufacturing processes of an existing wire mesh
making machine.
Reverse Engineering Analysis: Our first objective is to conduct a thorough analysis of the wire
mesh making machine to understand its internal components, mechanisms, and overall design.
This includes studying the machine's structure, wire feeding mechanism, weaving or welding
unit, and cutting mechanism. By reverse engineering the machine, we aim to gain insights into
its construction and operation principles.
Performance Evaluation: The next objective is to evaluate the performance of the wire mesh
making machine. This involves assessing its production capacity, speed, and efficiency. By
measuring and analyzing key performance indicators, we can identify areas where
improvements can be made to enhance productivity and optimize the machine's operation.
Design Optimization: Based on the analysis and performance evaluation, our objective is to
propose design optimizations for the wire mesh making machine. This may involve suggesting
modifications or enhancements to the machine's components or overall structure to improve its
functionality, ease of use, and reliability. The aim is to create a more efficient and user-friendly
machine that meets industry standards and requirements.
Automation and Control Enhancement: Another objective is to explore opportunities for
automation and control system enhancements in the wire mesh making machine. This includes
investigating the feasibility of integrating advanced automation technologies, such as sensors,
actuators, and computer control systems, to streamline the manufacturing process, reduce
manual labor, and improve accuracy and consistency in wire mesh production.Safety and
Environmental manufacturing processes and technologies.

28
3.3Time line of the project

Figure.3.2 Time line of the project

29
CHAPTER 4
DESIGNING AND ANALYSING
4.1 Design Concepts

The design concepts are provided by a software designer or engineering design with a foundation of
design methods that can be applied in a set of fundamental concepts. In designing a concept, a
prototype is more essential to improvise the design and find out the complexation of the modal. For
the prototype, a manufacturing software (3D Printing Methods) is used. The computer software of
designing for the machine that can be used to create or improvise the concept by a set of tools and
command with help of its definitions and magnitude valves. An application of the software can
determine by use and user friendly to the person familiar to it
4.1.1 Software
The computer software of designing for the machine that can be used to create or improvise the
concept by a set of tools and command with help of its definitions and magnitude valves. An
application of the software can determine by use and user friendly to the person familiar to it.
4.1.2 SOLIDWORKS:
SolidWorks is a widely used computer-aided design (CAD) software that provides powerful
tools for 3D modeling, simulation, and documentation. With its user-friendly interface and
comprehensive feature set, SolidWorks is a go-to solution for engineers and designers across
various industries. One of the key features of SolidWorks is its robust 3D modeling
capabilities. Users can create intricate and detailed models using a variety of tools, including
sketching, parametric modeling, and surface modeling. The software allows for precise
manipulation of dimensions, geometries, and relationships, enabling users to quickly iterate and
refine their designs. SolidWorks also offers a range of simulation capabilities, allowing
engineers to evaluate and analyze their designs for structural integrity, motion, and fluid flow.
With built-in simulation modules, users can perform stress analysis, simulate the behavior of
assemblies under various conditions, and optimize designs for performance and reliability.
Further more, SolidWorks facilitates the creation of detailed manufacturing drawings and

30
documentation. Users can generate accurate 2D drawings, complete with annotations,
dimensions, and bill of materials (BOM). This capability streamlines the transition from design
to production, ensuring that manufacturing processes and specifications are accurately
communicated. Collaboration is made easier with SolidWorks through its built-in tools for
sharing and reviewing designs. Users can easily share 3D models, drawings, and simulation
results with team members, suppliers, and clients. This promotes efficient communication,
reduces errors, and facilitates effective decision-making throughout the design and
development process. SolidWorks also integrates seamlessly with other software tools and
industry standards, allowing for interoperability and data exchange. It supports various file
formats, including DWG, DXF, STEP, and IGES, enabling collaboration with users of different
CAD platforms.

4.1.3 Design of Supporting frame in solid works

Figure 4.1 Design of Supporting frame in solid works

31
Figure 4.2 Design of Supporting frame in solid works

Figure 4.3 Final Design

Design of shaft in solidworks software

32
Figure 4.4 Design of Shaft in solid works

Figure 4.5 prototype in 3d printing

Design of shaft in solidworks

33
Figure 4.6 Design of Clamp in solid works

Figure 4.7 Final Assembly of shaft

34
Figure 4.8 Supporting frame

Figure 4.9 Shaft design


CHAPTER 5
EXPERIMENTAL PROCEDURE AND
IMPLEMENTATION

5.1 Components required:


The required components for the development of the IoT-based smart plant monitoring and irrigation
system using Blynk can be divided into two categories
5.1.1 DC Motor:
DC Motor: A DC motor is an electrical machine that converts direct current (DC) electrical
energy into mechanical energy. It operates on the principle of the interaction between magnetic
fields and electric currents. The motor consists of a stationary part called the stator and a
rotating part called the rotor. The stator contains the stationary windings that create a magnetic
field, while the rotor consists of a coil of wire wound around an iron core.

35
;
Figure.5.1 DC Motor
5.1.2 Shaft:
A shaft, in mechanical engineering, is a crucial component used for power transmission in
various machines and mechanisms. It is a cylindrical rod designed to rotate and transfer energy
between different parts of the system. Shafts are commonly found in engines, turbines, and
industrial equipment where rotational motion is necessary

Figure.5.2 Shaft
5.1.3 Slotted Pipe:
A slotted pipe, also known as a slotted casing or perforated pipe, is a specialized type of pipe
used in various industries and applications. It features evenly spaced slots or perforations along
its length, allowing fluid or gas to enter or exit the pipe. The slots are typically created through
drilling or cutting techniques, and their size, shape, and distribution can vary depending on the
specific requirements of the intended use

36
.
Figure.5.3 Slotted Pipe
5.1.4 Bobbin:
A bobbin is a small, cylindrical object used in various industries and crafts for winding thread,
yarn, or wire. It is typically made of plastic, metal, or wood and is designed to hold and control
the supply of the material being wound.

Figure.5.4 Bobbin
5.1.5 Mesh wire:
Mesh wire, also known as wire mesh or wire netting, is a versatile material composed of
interconnected wires that form a grid-like pattern. It is commonly used in a wide range of
applications due to its strength, flexibility, and ability to provide a barrier while allowing for
visibility and airflow.

Figure.5.5 Mesh wire


5.1.6 Nuts & Bolts:
Nuts and bolts are fundamental fastening components used extensively in various industries
and everyday applications. They form a reliable and versatile method of joining two or more
parts together securely.

37
Figure.5.6 Nuts
A bolt is a threaded cylindrical rod with a head on one end and a threaded portion on the other.
The threaded portion allows it to be inserted into a corresponding internally threaded hole or
nut. Bolts come in different sizes, lengths, and thread patterns to accommodate specific
requirements.

Figure.5.7 Bolts
Nuts, on the other hand, are internally threaded components designed to mate with bolts. They
have a hexagonal or square shape, providing convenient gripping surfaces for tightening or
loosening. Nuts and bolts work in tandem to create a threaded connection, allowing for
disassembly and reassembly as needed.
5.1.7 Mounts and Joints:
Mounts and joints are essential components used to connect, support, and enable movement
between different parts or structures. They play a crucial role in various industries, including
engineering, construction, automotive, and furniture manufacturing. Mounts, also known as
mounting brackets or mounts, are designed to securely attach objects to a surface or
structure.They provide stability and structural support while accommodating specific
positioning or alignment requirements. Mounts can be fixed or adjustable, allowing for
flexibility in installation or making adjustments as needed. Common examples include wall
mounts for televisions, monitor mounts for computer screens, or engine mounts in vehicles.
Joints, on the other hand, are connections that facilitate movement or rotation between two or

38
more parts.

Figure.5.8 Mounts and Joints


5.1.8 Base Frame:
A base frame, also known as a foundation or chassis, is a structural component that forms the
lowermost support or platform for various objects, equipment, or structures. It serves as a stable
and robust foundation, providing stability, load distribution, and structural integrity.
Base frames are commonly used in industries such as construction, machinery,
manufacturing, and transportation. In construction, base frames are utilized as the starting point
for erecting buildings, providing a level and solid platform on which the rest of the structure is
built.

Figure.5.9 Base Frame


5.1.9 Screws and connectors
Screws and connectors are indispensable fastening components used in a wide range of
industries and everyday applications. They provide a reliable and efficient means of joining or
securing two or more objects together.

Figure.5.10 Screws and connectors

Screws are threaded fasteners with a helical groove, or thread, running along their length. They
are typically inserted into pre-drilled holes or internally threaded components, such as nuts or
tapped holes, to create a secure connection. Screws come in various sizes, types, and materials,

39
each suited for specific applications and load requirements

Figure.5.11 Screws

CHAPTER 6
TESTING AND RESULT

After conducting reverse engineering and prototyping of a chain link wire mesh making
machine, we have successfully developed and tested an improved prototype with enhanced
functionality, efficiency, and reliability. Through the reverse engineering process, we identified
and analyzed the key components of the machine, including the wire feeding mechanism,
weaving mechanism, mesh cutting system, and control panel. Based on our analysis, we made
design modifications to optimize the machine’s performance. The prototype incorporates these
modifications, showcasing improved wire feeding, precise mesh formation, and advanced
control features. Thorough testing and evaluation were conducted, assessing functionality,
efficiency, durability, and the quality of the produced chain link wire mesh. Iterative
refinements were made based on the test results to address any identified issues. The final

40
prototype has undergone validation, meeting the desired performance goals, quality standards,
and reliability requirements
Moreover, we paid particular attention to the durability and reliability of the prototype during
the testing phase. We subjected it to rigorous operating conditions, monitoring wear and tear on
components, assessing the frequency of breakdowns, and evaluating maintenance requirements.
This allowed us to identify areas that required further improvements to enhance the machine’s
longevity and reduce downtime. By scrutinizing the quality of the produced chain link wire
mesh, we ensured that it met or exceeded the standards set by the original machine. We paid
close attention to defects, accuracy, and overall quality, making necessary adjustments and
refinements to achieve the desired output. Through an iterative refinement process, we
addressed any issues or shortcomings identified during testing. We made adjustments to
specific components, optimized processes, and refined the overall system to further enhance
performance and reliability. These iterative improvements played a vital role in creating a
highly functional and robust chain link wire mesh making machine .In the final stages of
development, we conducted a comprehensive evaluation and validation of the modified
machine. We verified that it met the desired performance goals, and reliability requirements we
had set. The resulting prototype represents a significant advancement in chain link wire mesh
manufacturing technology, offering improved efficiency, enhanced precision, and increased
operational reliability. Overall, our reverse engineering and prototyping efforts have led to the
successful development of an advanced chain link wire mesh making machine. Its enhanced
functionality, efficiency, and reliability position it as a valuable asset in various industries that
rely on high-quality wire mesh

41
Figure.6.1 Final design of chain link wire mesh making machine

Figure.6.2 prototype of chain link wire mesh making machine

42
Figure.6.3 Final Figure

Figure.6.3 Final product in 3d printing

43
Specifications:

Name of the Material Specifications


component
DC Motor Copper RPM – 100,
segments Stall Torque 20 kgcm
No-load current = 800
MA current = 9
A(Max)
Package Dimensions:
10.01 x 10.01 x 10.01
cm
Shaft Aluminium Breadth -2.8cm
/ Iron / steel Length – 34.5cm
Thinckness – 3mm

Slotted Pipe Steel High form base to the shaft


-7mm
Diameter- 3.5
Total length of rod 28cm
Mesh wire Aluminium 0.001 inch to 0.08 inch dia
/ Iron
Base Frame Wood Length-1200
bearth-600
Thickness-50
Table 6

44
CHAPTETR 7
CONCLUSION
In conclusion, reverse engineering plays a crucial role in the development and improvement of
chain link wire mesh making machines. By employing reverse engineering techniques,
manufacturers can analyze and understand existing machines to gather valuable insights into
their design, functionality, and manufacturing processes. Reverse engineering allows
manufacturers to deconstruct and examine the components, mechanisms, and manufacturing
techniques employed in a chain link wire mesh making machine. This in-depth analysis enables
them to gain a comprehensive understanding of the machine's design principles, materials used,
and manufacturing methods. By reverse engineering a chain link wire mesh making machine,
manufacturers can identify opportunities for design enhancements and optimizations. They can
assess the machine's performance, identify potential weaknesses or inefficiencies, and propose
modifications to improve its productivity, reliability, and ease of use. Reverse engineering also
facilitates the reproduction or customization of chain link wire mesh making machines.

45
8. REFERENCES

1. Chauhan, Parmar, and Rathod What is Reverse-engineering? How Does It


Work". SearchSoftwareQuality. Retrieved 2022-07-27
2. Chauhan,Parmar, and Rathod "Reverse Engineering". ethics.csc.ncsu.edu.
Retrieved 2022-07-27.Garcia, Jorge (December 2015).  "Un-building blocks: a model
of reverse engineering and applicable heuristics" (PDF). Core.ac.uk. Retrieved 2023-
06-04.
3.  Thayer, Ken. "How Does Reverse Engineering Work?". globalspec. IEEE Global
Spec. Retrieved 26 February 2018.
4.  Villaverde, Alejandro F.; Banga, Julio R. Types of reverse engineering and functions
of them(6 February 2014).
5. Chikofsky, E.J. & Cross, J.H., II (1990). "Reverse Engineering and Design Recovery:
A Taxonomy". 
6.   A Survey of Reverse Engineering and Program Comprehension. Michael L. Nelson,
April 19, 1996, ODU CS 551 – Software Engineering Survey.
7.  Vinesh Raja; Kiran J. Fernandes (2007). Reverse Engineering: An Industrial
Perspective. Springer Science & Business Media. p. 3. ISBN 978-1-84628-856-2.
8.  Jonathan Band; Masanobu Katoh (2011). Interfaces on Trial 2.0. MIT Press.
p. 136. ISBN 978-0-262-29446-1.
9.  Chikofsky, E. J.; Cross, J. H. (January 1990). "Reverse engineering and design
recovery:Ataxonomy". IEEESoftware. 7:13–17. 
10.   Eilam, Eldad (2005). Reversing: secrets of reverse engineering. John Wiley &
Sons. ISBN 978-0-7645-7481-8.
11.  Internet Engineering Task Force RFC 2828 Internet Security Glossary
12.  Karwowski, Waldemar; Trzcielinski, Stefan; Mrugalsk, Beata; DiNicolantonio,
Massimo; Rossi, Emilio (2018). Advances in Manufacturing, Production
Management and Process Control. pp. 287–288.
13.  Varady, T; Martin, R; Cox, J (1997). "Reverse engineering of geometric models–an
introduction". Computer-Aided Design. 29 (4): 255–268. doi:10.1016/S0010-
4485(96)00054-1."Reverse Engineering".

46
14. Warden, R. (1992). Software Reuse and Reverse Engineering in Practice. London,
England: Chapman & Hall. pp. 283–305. "Working Conference on Reverse
Engineering (WCRE)". uni-trier.de. Computer Science bibliography. Archived
from the original on 14 March 2017. Retrieved 22 February  2018.
15.  Shahbaz, Muzammil (2012). Reverse Engineering and Testing of Black-Box
Software Components: by Grammatical Inference techniques. LAP LAMBERT
Academic Publishing. ISBN 978-3659140730.
16. Chuvakin, Anton; Cyrus Peikari (January 2004). Security Warrior (1st ed.). O'Reilly.
Archived from the original on 2006-05-22. Retrieved 2006-05-25.
17.  Samuelson, Pamela & Scotchmer, Suzanne (2002). "The Law and Economics of
ReverseEngineering".  YaleLawJournal. 111 (7):15751663. doi:10.2307/797533.  JS
TOR 797533. Archived from the original on 2010-07-15. Retrieved 2011-10-31.
18.  "Samba: An Introduction". 2001-11-27. Retrieved 2009-05-07.
19.  Lee, Newton (2013). Counterterrorism and Cybersecurity: Total Information
Awareness (2nd ed.).SpringerScience+BusinessMedia.p. 110. ISBN 978-
1461472049.
20. W. Cui, J. Kannan, and H. J. Wang. Discoverer: Automatic protocol reverse
engineering from network traces. In Proceedings of 16th USENIX Security
Symposium on USENIX Security Symposium, pp. 1–14.
21.  W. Cui, M. Peinado, K. Chen, H. J. Wang, and L. Irún-Briz. Tupni: Automatic
reverse engineering of input formats. In Proceedings of the 15th ACM Conference on
Computer and Communications Security, pp. 391–402. ACM, Oct 2008.
22. Jump up to:a b P. M. Comparetti, G. Wondracek, C. Kruegel, and E. Kirda. Prospex:
Protocol specification extraction. In Proceedings of the 2009 30th IEEE Symposium
on Security and Privacy, pp. 110–125, Washington, 2009. IEEE Computer Society.
23.  Gold, E (1978). "Complexity of automaton identification from given data". 

47

You might also like