Abel W. Ourgessa, A. Aniley, Ababo G. Gudisa, Ibsa Neme, A. Bekele
{"title":"Effect of Alkaline Concentration and Solid Liquid Ratio on the Acid Resistance of Fly Ash Based Geopolymer Mortar","authors":"Abel W. Ourgessa, A. Aniley, Ababo G. Gudisa, Ibsa Neme, A. Bekele","doi":"10.11648/J.AJSET.20190404.14","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.14","url":null,"abstract":"Ordinary Portland cement (OPC) is one of the most widely used binders in building materials. However, OPC production is related with high CO2 emission and high energy consumption. Currently geopolymer cements are found to be the alternative substitute for OPC. Geopolymers most commonly are covalently bonded alkali-aluminosilicates which are X-ray amorphous at ambient and medium temperatures. The current study focusses on fly ash which is a byproduct of coal combustion process and due to its amorphous nature and chemistry, it is considered an appropriate raw material for geopolymer synthesis. In this study the effect of alkali concentration and solid liquid ratio on the acid resistance of fly ash based geopolymer mortar was studied. The fly ash was obtained from ayka Addis Textile, Addis Ababa, Ethiopia. Samples were prepared with different solid to liquid ratio and NaOH molarity and were tested for mechanical and durability properties. It was found that as the molarity of NaOH solution and solid to liquid ratio increase the initial and final setting time become shorter. Compressive and flexural strength show that after 28 days of curing sample with high Liquid to solid ratio and higher molarity show higher strength and smaller water absorption percentage. Sample were immersed in a 2% H2SO4 solution for 25 days and the sample with higher strength with smaller water absorption percentage show higher resistance.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"468 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88767306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Pavement Distress for Asphalt Pavement Using Pavement Condition Index: Case Study from Adama to Awash Arba","authors":"Ashebir Belete Werkineh, B. Demissie","doi":"10.11648/J.AJSET.20190404.13","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.13","url":null,"abstract":"Pavement distress is a common problem for an opening road network and this distress is caused due to overloading of vehicles, poor maintenance, rapid traffic growth and improper design and implementation. This research study focused in Adama to Awash-Arba road section. The main objective of this research work was to evaluate the pavement distress using pavement condition index for the road section from Adama to Awash Arba. The result of the research show that the PCI value range from 8 to 97.1 and this shows that all section of the road have all types of pavement condition rating (Good, Satisfactory, Fair, Very Poor, Poor, Serious and Failed) in which 12.12% good, 9.09% satisfactory, 18.18% fair, 21.21% poor, 18.18% very poor, 18.18% serious and 3.03% was failed. Based on the pavement condition rating, seven soil samples was collected for the failed and serious road section using manual hand auger. Samples were air-dried before taken to laboratory test determination of subgrade soil. According to the pavement condition survey the road section from Adama to Awash Arba required maintenance and based on this, possible maintenance option had been recommended for pavement distress with respect to level of severity on the pavement condition of the study area in order to sustain the design life of the Pavement.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75094915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Swamynathan Kudiyarasan, P. Sivakumar, Sanjeevi Umapathi, M. Chander
{"title":"Challenges and Safety in Erection and Commissioning of 280/85 Tons Single Failure Proof EOT Crane at PFBR","authors":"Swamynathan Kudiyarasan, P. Sivakumar, Sanjeevi Umapathi, M. Chander","doi":"10.11648/J.AJSET.20190404.12","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.12","url":null,"abstract":"The Electric overhead traveling (EOT) crane installed in Prototype Fast Breeder Reactor (PFBR), Reactor Containment Building (RCB) is the largest capacity EOT crane installed in any nuclear power plants in India with some unique features of its own. It has been built with a single failure proof concept which is one of the prime requirements of a nuclear facility as per the standards of NUREG/IS. It is a double bridge girder type; the girder used in this crane is a single structure having a length of 34.8m without any joints as designed by IGCAR/BHAVINI (first of its kind). The span of the EOT crane is 33.4m and installed at a height of 42m from the ground level with the lifting height of 42.5m. This crane was manufactured by an Indian company M/s. UNIQUE CRANE, NASIK. Two hooks (280 tons / 85 tons) are connected in the same trolley sharing the Long Travel (LT). Load testing of the complete crane was done at factory before transporting it to PFBR site. The components of the crane were assembled in PFBR site. The erection methodology adopted was distinct w. r. t the site condition, as the components which were handled were very heavy, available space for installation was restricted and the head room was also very less. This erection has been completed successfully and very safely without any notable incidents. This activity is a biggest achievement / milestone in the nuclear industry in India. Later the EOT crane was commissioned, load tested with 350 tons load (negligible deflection) and being operated successfully without any incidents so far. This was achieved by accurate erection procedure, stringent Quality Assurance Plan (QAP), Job Hazard Analysis (JHA) and Safe Operation Procedure (SOP). Many challenges were faced during manufacturing, testing, erection and load testing at site. This paper deliberates those challenges.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80736670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Protection and Artificial Intelligence Law: Europe Australia Singapore - An Actual or Perceived Dichotomy","authors":"Robert Walters, Matthew Coghlan","doi":"10.11648/J.AJSET.20190404.11","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.11","url":null,"abstract":"Artificial Intelligence (AI) is moving so rapidly policy makers, regulators, governments and the legal profession are struggling to keep up. However, AI is not new and it has been used for more than two decades. Coupled with AI, personal data, along with cyber security law, and the challenges posed by the current legal frameworks are nothing short of immense. They are, in part, at odds with each other, and are doing very different things. This paper explores some of the challenges emerging in Australia, Europe and Singapore. The challenge of the interrelationship between personal data and AI arguably begins with who has manufactured the AI. Secondly, who owns the AI. Another challenge that has also emerged is defining AI. Most people are able to understand what AI is and how it is beginning to impact the economy and our daily lives. However, there is no clear legal definition of AI, because AI is so nebulous. This burgeoning area of law is going to challenge society, privacy and economic experts, regulators, innovators of technology, as there continues to be a collision between them. Furthermore, the collection of personal data by AI challenges the notion of where responsibility lies. That is, AI may collect, use and disclose personal data at different points along the technology chain. It will be highlighted how the current data protection laws rather than promote AI projects, largely inhibit its development. This paper identifies some of the tensions between data protection law and AI. This paper argues that there is a need for an urgent and detailed understanding of the opportunities, legal and ethical issues associated with data protection and AI. Doing so will ensure an ongoing balance between the economic and social issues that are attached to the two areas of the law.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82246352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. E. Grini, S. Salmi, A. Azouaoui, A. Hourmatallah, K. Bouslykhane, M. Hamedoun, N. Benzakour
{"title":"Magnetic Properties of Diluted Spinels MgxNi1−xFe2O4 Systems: Are Studied by Green’s Functions and Mean Field Theories","authors":"A. E. Grini, S. Salmi, A. Azouaoui, A. Hourmatallah, K. Bouslykhane, M. Hamedoun, N. Benzakour","doi":"10.11648/j.ajset.20190403.12","DOIUrl":"https://doi.org/10.11648/j.ajset.20190403.12","url":null,"abstract":"Many-body Green's function, and mean field theories have been developed for magnetic systems MgxNi1−xFe2O4. We apply this theory to evaluate thermal magnetization and magnetic susceptibility for different values of magnetic field and dilution x, by considering all components of the magnetisation when an external magnetic field is applied in (x-z)-plane. The critical temperatures of MgxNi1−xFe2O4 systems in the range 0 ≤ x ≤ 1 have been deduced. The Green's function results are compared with the results of high temperature series expansion technique, and experimental magnetic measurements.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"155 8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83151440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Paper Histological Study of Lavatera Maritima in the Region of Marsa Ben Mehidi","authors":"G. Sarra, Hassani Faiçal","doi":"10.11648/J.AJSET.20190402.11","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190402.11","url":null,"abstract":"The present work concerns a self-ecological study of Lavatera maritima (malvaceae) in the region of Marsa benmehidi, for this study we are based on histological criteria. Plant organisms and especially flowering plants are distinguished from most animal organisms by remarkable characters. These plants are practically immobile and fixed in the soil. As a result, they depend on the environment around them. This study aims to explore the structure of living organisms, the constitutive and functional relationships between their elements, as well as the renewal of tissues. It allowed us to know the tissues, organs following the leaf, the stem, the root and the different tissues such as xylem, phloem... etc.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83386662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Behavioral-based malware clustering and classification","authors":"I. Alsmadi, B. Al-Ahmad, Iyad Alazzam","doi":"10.15864/ajse.1105","DOIUrl":"https://doi.org/10.15864/ajse.1105","url":null,"abstract":"Detection of malwares and security attacks is a complex process that can vary in its details, analysis activities, etc. As part of the detection process, malware scanners try to categorize a malware once it is detected under one of the known malware categories (e.g. worms, spywares,\u0000 viruses, etc.). However, many studies and researches indicate problems with scanners categorizing or identifying a particular malware under different categories. There are different reasons for such challenges where different malware scanners, and sometime the same malware scanner, will categorize\u0000 the same malware under different categories in different times or instances. In this paper, we evaluated this problem summarizing existing approaches on malware classification.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81695788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT security threats analysis based on components, layers and devices","authors":"I. Alsmadi, Fahad Mira","doi":"10.15864/ajse.1101","DOIUrl":"https://doi.org/10.15864/ajse.1101","url":null,"abstract":"Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security\u0000 threats and attacks that can come through those devices impact us seriously. In this systematic literature review paper, we evaluated security threats and attacks on IoTs based on different categories such as: IoT vulnerabilities, threats and attacks based on IoT architecture layers, and IoT\u0000 vulnerabilities, threats and attacks based on IoT components. We showed areas of open research based on those categories. Due to the large spectrum of applications for IoTs, we hope that this classification can help researchers in this area focus their research to target one specific domain,\u0000 category or threats.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85339271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Analysis of Sub-Communities Behavior in Social Networks","authors":"I. Alsmadi, Chuck Easttom","doi":"10.15864/ajse.1103","DOIUrl":"https://doi.org/10.15864/ajse.1103","url":null,"abstract":"Clique relations are useful in understanding the dynamics of a wide range of social interactions. One application of studying clique relations involves studying how such “detection of abnormal cliques’ behaviors” can be used to detect sub-communities’ behaviors\u0000 based on information from Online Social Networks (OSNs).In social networks, a clique represents a sub-group of the larger group in which every member in the clique is directly associated with every other member in the clique. Those cliques often possess a containment relation with each\u0000 other where large cliques can contain small size cliques. Thus, finding the extent of the clique, or the maximum clique is an important research questions. In our approach, we evaluated adding the weight factor and integrating graph theory to clique algorithm in order to derive more data about\u0000 the clique. In this regard clique activities are not like those in group discussions where an activity is posted by one user and is visible by all others. Our algorithm calculates the overall weight of the clique based on individual edges. Users post frequent activities. Their clique members,\u0000 just like other entities, may or may not interact with all those activities.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90208254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling and Simulation of Data Centers to Predict Behavior","authors":"M. Levy","doi":"10.15864/ajse.1102","DOIUrl":"https://doi.org/10.15864/ajse.1102","url":null,"abstract":"Data center modeling and simulation help to estimate and predict key parameters under certain a-priori known conditions. Data center systems must adopt end-to-end resource management, covering both cyber and physical components. This paper describes a systematic, easy-to-follow approach\u0000 for data center modeling and simulation using a cyber-physical systems lens. The methodology is aimed to facilitate the estimation of quality of service, airflow and power requirements, and key indicators to assess data centers, and to then compare them to one another, or compare different\u0000 scenarios under which data centers operate. The results contribute to communicate and better understand data center behavior and areas of improvement.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85178866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}