Engineering Science and Technology, an International Journal最新文献

筛选
英文 中文
On the free vibration of a perforated Rayleigh beam with deformable ends 关于端部可变形的穿孔瑞利梁的自由振动
Engineering Science and Technology, an International Journal Pub Date : 2024-08-11 DOI: 10.1016/j.jestch.2024.101787
Uğur Kafkas
{"title":"On the free vibration of a perforated Rayleigh beam with deformable ends","authors":"Uğur Kafkas","doi":"10.1016/j.jestch.2024.101787","DOIUrl":"https://doi.org/10.1016/j.jestch.2024.101787","url":null,"abstract":"The development of perforation technology has increased the use of perforated structures in many engineering fields, from nano/micro to macro scales. This paper proposes a solution method to analyze the free vibration characteristics of perforated Rayleigh beams with both deformable and rigid boundary conditions and equal square holes along their vertical axes, modeled using elastic collapse springs at the beam ends. Using Rayleigh Beam Theory and an eigenvalue-based methodology using the Stokes transform and Fourier series, the research investigates the effects of parameters such as the number of holes, filling ratio, and boundary deformability on the vibration dynamics. The challenges associated with achieving rigid boundary conditions in actual engineering applications make it essential to examine the impact of deformable boundary conditions on the vibration characteristics of perforated beams. Key findings indicate that the number of perforations and boundary stiffness significantly influence the vibrational characteristics, which can be utilized to optimize the design and application of such beams in various engineering fields. Particularly noteworthy is the effect of symmetrical or asymmetrical variation of the stiffness parameters of the springs placed at the ends of the perforated beam on the vibration behavior. These results contribute to a deeper understanding of the dynamic behavior of perforated beams and provide practical insights for structural design.","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust data hiding method based on frequency coefficient variance in repetitive compression 基于重复压缩中频率系数方差的稳健数据隐藏方法
Engineering Science and Technology, an International Journal Pub Date : 2024-07-14 DOI: 10.1016/j.jestch.2024.101756
Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, Aditya Kumar Sahu
{"title":"Robust data hiding method based on frequency coefficient variance in repetitive compression","authors":"Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, Aditya Kumar Sahu","doi":"10.1016/j.jestch.2024.101756","DOIUrl":"https://doi.org/10.1016/j.jestch.2024.101756","url":null,"abstract":"Sharing accurate and lossless images with higher quality through digital mediums is challenging, particularly, images shared on social media platforms can serve as good carriers for sending hidden data. However, social media platforms apply severe compression when transferring images end-to-end to serve efficient network transporting bandwidth and provide enough storage space to the users. Within the scope of this research, the proposed method introduces a novel approach by combining cryptographic and steganographic techniques, providing a robust solution to protect hidden data even when subjected to repeatedly compression. The method first encrypts the secret data to be hidden using the Advanced Encryption Standard Cipher Block Chaining (AES-CBC) technique. Then, data hiding is performed on the coefficients obtained by applying Discrete Cosine Transform (DCT) to repeatedly compressed JPEG images, coefficients that are minimally affected by compression or remain unaffected are specifically selected for data hiding. Therefore, secret data is extracted with high accuracy. Experimental results show that the proposed method outperforms the state-of-the-art in achieving robust and effective data hiding techniques based on bit error rate.","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141775930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COMPARATIVE ANALYSIS OF STEEL CORROSION RESISTANCE 钢材耐蚀性对比分析
Engineering Science and Technology, an International Journal Pub Date : 2020-06-23 DOI: 10.51594/ESTJ.V1I2.113
Chao Zhang, Xiang Yin, Chunyan Qing
{"title":"COMPARATIVE ANALYSIS OF STEEL CORROSION RESISTANCE","authors":"Chao Zhang, Xiang Yin, Chunyan Qing","doi":"10.51594/ESTJ.V1I2.113","DOIUrl":"https://doi.org/10.51594/ESTJ.V1I2.113","url":null,"abstract":"The objective of the study was to conduct the comparative analysis of steel types corrosion resistance. Three selected steel types were used in the study. The selected types were structural steel, stainless steel, and MMFX steel. The methodology we adopted is that we evaluated the steel parts resistance towards corrosion by doing in-salt spray experiment and the immersion of aqueous solution of sodium chloride. For salt spray test, we used guidelines by ASTM B117. This practice provides a controlled corrosion environment which is used for exposing specimen to salt spray chamber. For immersion test, test specimens are analyzed at regular time interval as the first rust is appeared. For carbon steel, we used three specimen and mostly initial rust appeared in initial 13 to 15 hours. For stainless steel, inter granular corrosion were analyzed. The results show that the first cycle started after about 46 hours; the second cycle started about 1% and the third cycle started with the rage of about 2 to 30%. For MMFX 2 steel, the results show that for MMFX carbon steel, the chloride threshold ratio is about 6 times higher than black bars and more than double of other types. The conclusion of the study is that in big structures like bridges, the MMFX steel should be used.","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS OF ENERGY CONSUMPTION OF SELECTED CLUSTER TECHNIQUE 所选聚类技术的能耗分析
Engineering Science and Technology, an International Journal Pub Date : 2019-12-29 DOI: 10.51594/estj.v1i2.117
W. David, Chang Bing
{"title":"ANALYSIS OF ENERGY CONSUMPTION OF SELECTED CLUSTER TECHNIQUE","authors":"W. David, Chang Bing","doi":"10.51594/estj.v1i2.117","DOIUrl":"https://doi.org/10.51594/estj.v1i2.117","url":null,"abstract":"The study is about wireless sensor networks which plays important role in modern human life. The wireless sensor networks pose crucial problem of energy consumption which is investigated in this study. Three types of cluster technique including K-means, Fuzzy, and SOM were analyzed in the present study based on 50 nodes and 100 nodes network. The results were compared based on various velocity m/s and percentage of energy decay in the network. The results show that among the three cluster techniques, the Fuzzy method turned out to be the most energy efficient method. ","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84202336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LARGE DATA EMBEDDING; PROBLEM & SOLUTION 大数据嵌入;问题与解决方案
Engineering Science and Technology, an International Journal Pub Date : 2019-12-29 DOI: 10.51594/estj.v1i2.114
Akubuilo K., Rix Torimiro
{"title":"LARGE DATA EMBEDDING; PROBLEM & SOLUTION","authors":"Akubuilo K., Rix Torimiro","doi":"10.51594/estj.v1i2.114","DOIUrl":"https://doi.org/10.51594/estj.v1i2.114","url":null,"abstract":"The objective of the study was to propose a high capacity data embedding system from DCT domain. The default quantization table is used for fixed mask projection quantization steps. Accordingly, DCT coefficient of the host image from low to higher frequency bands and embed bits from band to band with specially designed base vectors called Hadamard vectors. The embedding scheme procedure is described step wise. The proposed system can be used for data embedding and can be associated with another encryption method to make it safer. The proposed system is reported to be highly robust and secure","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80418196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信