A. Baghdady, Walid Sayed Abdulgalil, Ahmad Asran, I. Nosier
{"title":"Optimization Of Cementitious Material Content For Sustainable Concrete Mixtures Through Value Engineering Approach","authors":"A. Baghdady, Walid Sayed Abdulgalil, Ahmad Asran, I. Nosier","doi":"10.2139/ssrn.3375588","DOIUrl":"https://doi.org/10.2139/ssrn.3375588","url":null,"abstract":"This paper studies the effectiveness of applying value engineering to actual concrete mixtures. The study was conducted in the State of Qatar on a number of strategic construction projects with international engineering specifications for the 2022 World Cup projects. The study examined the concrete mixtures of Doha Metro project and the development of KAHRAMAA’s (Qatar Electricity and Water Company) Abu Funtas Strategic Desalination Plant, in order to generally improve the quality and productivity of ready-mixed concrete used in construction and hydraulic projects. <br><br>The application of value engineering to such concrete mixtures resulted in the following: <br><br>• Improving the quality of concrete mixtures and increasing the durability of buildings in which they are used; <br><br>• Reducing the waste of excess materials of concrete mixture, optimizing the use of resources, and enhancing sustainability; <br><br>• Reducing the use of cement, thus reducing CO2 emissions which ensures the protection of environment and public health; <br><br>• Reducing actual costs of concrete mixtures and, in turn, reducing the costs of construction projects; and <br><br>• Increasing the market share and competitiveness of concrete producers. <br><br>This research shows that applying the methodology of value engineering to ready-mixed concrete is an effective way to save around 5% of the total cost of concrete mixtures supplied to construction and hydraulic projects, improve the quality according to the technical requirements and as per the standards and specifications for ready-mixed concrete, improve the environmental impact, and promote sustainability.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82095275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noise Pollution, Awareness, Prevention and Control","authors":"D. Gandhi, Atul M. Raghatate, S. Pande","doi":"10.2139/ssrn.3374908","DOIUrl":"https://doi.org/10.2139/ssrn.3374908","url":null,"abstract":"Rapid growth in population, Urbanization and Industrialization in the world causes increase in noise levels leading to several adverse effects on ecology and human health. Noise annoys, distracts, disturbs, and when exposure to its sufficient, noise can cause physiological effects leading deafness. Annoyance results from the interference with sleep and with speech. Noise pollution affects the quality of the life and so can be thought of a social and economical cost. Noise reduction can be one of the components in achieving sustainability. This paper focus on realizing the several causes of noise pollution, effects of noise pollution and importance of reducing noise pollution. In the present study noise level is assessed at two locations in Wardha city and it is found that noise level exceeds the permissible limit.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"63 4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90142934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zakarya Laffane, Y. Boualia, Fethi Saidi, Fatima Zohra Kihel, B. Hamoudi
{"title":"Numerical Investigation of Flow Control by Passive Blowing","authors":"Zakarya Laffane, Y. Boualia, Fethi Saidi, Fatima Zohra Kihel, B. Hamoudi","doi":"10.2139/ssrn.3376788","DOIUrl":"https://doi.org/10.2139/ssrn.3376788","url":null,"abstract":"Identifying the performance of a free and moving hydrofoil requires extensive numerical and experimental investigations. This research topic is devoted to the study of hydrofoils used in the maritime domain. The stall of the boundary layer poses a problem of instability of the marine vehicle influencing the hydrodynamic performance, for these circumstances a method to force the attachment of these boundary layers by natural means has been proposed. In this context, a hydrofoil model was studied numerically based on a three-dimensional approach using CFD techniques for three configurations of which the first is smooth, the second with three holes and the third with seven holes from the intrados to the extrados inclined 23 ° relative to the X axis. The numerical result shows an advantageous gain in the lift force and a decrease in the drag force.<br>","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82494956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Johnson, M. Mahmoudi, Bing Zhang, R. Seede, Xueqin Huang, J. T. Maier, H. Maier, I. Karaman, A. Elwany, R. Arróyave
{"title":"Assessing Printability Maps in Additive Manufacturing of Metal Alloys","authors":"L. Johnson, M. Mahmoudi, Bing Zhang, R. Seede, Xueqin Huang, J. T. Maier, H. Maier, I. Karaman, A. Elwany, R. Arróyave","doi":"10.2139/ssrn.3358841","DOIUrl":"https://doi.org/10.2139/ssrn.3358841","url":null,"abstract":"Abstract We propose a methodology for predicting the printability of an alloy, subject to laser powder bed fusion additive manufacturing. Regions in the process space associated with keyhole formation, balling, and lack of fusion are assumed to be strong functions of the geometry of the melt pool, which in turn is calculated for various combinations of laser power and scan speed via a Finite Element thermal model that incorporates a novel vaporization-based transition from surface to volumetric heating upon keyhole formation. Process maps established from the Finite Element simulations agree with experiments for a Ni-5wt.%Nb alloy and an equiatomic CoCrFeMnNi High Entropy Alloy and suggest a strong effect of chemistry on alloy printability. The printability maps resulting from the use of the simpler Eagar-Tsai model, on the other hand, are found to be in disagreement with experiments due to the oversimplification of this approach. Uncertainties in the printability maps were quantified via Monte Carlo sampling of a multivariate Gaussian Processes surrogate model trained on simulation outputs. The printability maps generated with the proposed method can be used in the selection—and potentially the design—of alloys best suited for Additive Manufacturing.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77393653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determination of Mechanical Properties of Mortar by Using Fine Crushed Glass (FCG) and Waste Rubber (WR)","authors":"H. Jain, Vijay Kumar Baradiya","doi":"10.2139/ssrn.3353639","DOIUrl":"https://doi.org/10.2139/ssrn.3353639","url":null,"abstract":"Concrete contain more amount of cement which will release more CO2 and effects the environment, therefore to reduce the amount of cement in a concrete one should have approach towards replacement of cement with other waste and cost effective material such as glass. Since waste glass is not biodegradable and therefore alternative usage of it is required. Such can be used as coarse aggregate and substitute of cement constituents in concrete and mortar. Also disposal of waste glass into landfills is one of the major issues that have been come across. This study aims on reducing such problems by the usage of waste glass as one of the replacing material in cement mortar. The pozzolanic activity of glass powder and properties of glass powder blended cement were evaluated. Also the mechanical and chemical properties of such blended mortar has been evaluated. The cement is replaced 0%, 5%, 10%, 15% and 20% by glass powder content by weight of cement. The test results shows that on adding the optimum amount of waste glass the compressive strength of mortar has been increased. Also at 5% replacement of cement with waste glass powder gives the best proportion to increase compressive strength and reduce the cost of conventional mortar.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79460071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Empirical Thresholding and Feature Extraction Based Back Propagation - Artificial Neural Network Model for Fruit Grade","authors":"P. Tripathi, R. Belwal, A. Bhatt","doi":"10.2139/ssrn.3386114","DOIUrl":"https://doi.org/10.2139/ssrn.3386114","url":null,"abstract":"This paper explains a new feature extraction image pre-processing system followed by back propagation- artificial neural networks based system for class categorization of apple fruit images. Scale Conjugate Gradient (SCG) algorithm is used for back propagation. The methodology comprises of three stages in this work. Firstly, various external image based attributes of apple were taken and process in MATLAB. Size and weight features were also considered as important parameters as only color is not sufficient to judge the quality. Secondly, features extraction was done at image pre-processing for making the algorithm lighter by focusing only key features. Support vector machine (SVM) algorithm is also popular for development of relatively light weight classification models. This work uses artificial neural network toolbox in MATLAB for classification. A single hidden layer BP-ANN (Back propagation- artificial neural network) was used with sigmoid activation functions. The result came in terms of suitable output variable which is the quality class of the apple which is chosen A, B, C and D respectively. The modeling result indicates the tremendous match between the data used in training and assumed output values. It also has shorter calculation time due to the SCG algorithm. It is also possible for apple producers and distributors to classify their fruit using this model and reduce the cost by avoiding manual classification.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"16 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75497633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sumita Lamba, M. Diwakar, Dev Baloni, Alok Nautiyal, Ravi Dhaundiyal
{"title":"HOSVD Based Image Encryption Using DSCT and Shearlet Transform","authors":"Sumita Lamba, M. Diwakar, Dev Baloni, Alok Nautiyal, Ravi Dhaundiyal","doi":"10.2139/ssrn.3403407","DOIUrl":"https://doi.org/10.2139/ssrn.3403407","url":null,"abstract":"This paper presents a completely unique scheme for image encryption the usage of HOSVD in DCST and Non Subsampled Shearlet Transform (NSST) domain for the enhancement of virtual picture safety. In the proposed scheme, virtual pix are encrypted using a number of bands of DCST and Shearlet Transform together with the parameters of HOSVD. Decryption may be aptly recognized through extracting the statistics in correct order. To ratify the authenticity, the proposed scheme is compared with diverse gift techniques and from the experimental evaluation, it become analyzed that the outcomes of the proposed scheme are finer than the existing schemes. To find out the energy of the proposed scheme, assaults like noise, blurring, artifacts were accomplished on the enter image further to an encrypted photo. The experimental consequences confirm that the proposed scheme’s electricity towards the attacks is advanced in assessment to the present method.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79577201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Analysis on Security Threats of Black-Hole and Jellyfish Attacks in Mobile Ad-Hoc Network Using HTTP Traffic","authors":"Dewan Juel Rahman, Faisal Ahmed, Sayma Rashid","doi":"10.21276/IJRE.2019.6.2.1","DOIUrl":"https://doi.org/10.21276/IJRE.2019.6.2.1","url":null,"abstract":"Mobile ad-hoc network (MANET) is an infrastructure less network. This network is a collection of randomly moving mobile nodes. As MANET does not have any centralized management, this network can form anywhere with the participation of randomly moving nodes. Because of such vulnerable behavior of MANET, this network has to face many security problems. There are so many security threats of MANET, which does not have any solution. Even detection of those problems is not easy. Some of the security threats are very severe. Those threats can even destroy the whole network. Researchers are working to find out the solution of those threats. Among those threats, we have worked with two security threats, which are Black-hole attack and Jellyfish attack. Here, we have found out the threats using HTTP traffic. We use OPNET modeler 14.5 as simulator AODV routing protocol. The aim of this paper is to find out the impact of security threats on MANET using HTTP traffic. We decide the impact using number of events and average number of events utilizing throughput of the OPNET modeler.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"EM-25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84528602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Autonomic Provisioning in Software Development Life Cycle Process","authors":"Pooja Dehraj, Arun Sharma","doi":"10.2139/ssrn.3349295","DOIUrl":"https://doi.org/10.2139/ssrn.3349295","url":null,"abstract":"Advancement in software technologies has helped IT developers to work efficiently and enhance quality of the products but simultaneously; it has also presented the problem of increasing complexity in terms of software architectures, programming code and software management task. These issues raise chances of vulnerabilities in the software system. Run-time solution to the faults and failures of software need to be done. One such solution for handling run-time management tasks is Autonomic Computing. Autonomic computing technique, automate the management task to prevent the occurrence of vulnerability based issues. Further, to reduce the occurrence of system failures, an idea to provide an autonomic advisor to the Software Development Life Cycle process has been proposed in this paper. The autonomic advisor gives autonomic features based required suggestions to the developers during the software development process. It will also help to perform risk analysis during development. This will lead to the development of quality and efficient software systems. This paper also provides a review of the existing work of the autonomic computing including its challenges and their effects on management process of the system.","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73291560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhanced Security in Cloud Using Data Partitioning Technique","authors":"Taranpreet Singh Ruprah, A. Dange","doi":"10.2139/ssrn.3351651","DOIUrl":"https://doi.org/10.2139/ssrn.3351651","url":null,"abstract":"Cloud computing is now one of most popular technology in the computer science. Due to the invention of cloud, the perception of everyone has changes with infrastructure, deployment and development of software. The cloud provide various type of services like software as a service (SaaS),platform as a service (PaaS), and infrastructure as a service (IaaS).The sharing of data is the most important facility of the cloud. The emphasis of this paper is to provide a second layer of security to existing cloud storage solutions. The data is split into number of block and individual blocks are encrypt with the help of respective encryption keys within an image file and store the same on local hardware storage.<br>","PeriodicalId":18731,"journal":{"name":"Materials Processing & Manufacturing eJournal","volume":"44 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81151872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}