American journal of engineering, science and technology最新文献

筛选
英文 中文
Effect of Alkaline Concentration and Solid Liquid Ratio on the Acid Resistance of Fly Ash Based Geopolymer Mortar 碱浓度和料液比对粉煤灰基地聚合物砂浆耐酸性能的影响
American journal of engineering, science and technology Pub Date : 2019-12-19 DOI: 10.11648/J.AJSET.20190404.14
Abel W. Ourgessa, A. Aniley, Ababo G. Gudisa, Ibsa Neme, A. Bekele
{"title":"Effect of Alkaline Concentration and Solid Liquid Ratio on the Acid Resistance of Fly Ash Based Geopolymer Mortar","authors":"Abel W. Ourgessa, A. Aniley, Ababo G. Gudisa, Ibsa Neme, A. Bekele","doi":"10.11648/J.AJSET.20190404.14","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.14","url":null,"abstract":"Ordinary Portland cement (OPC) is one of the most widely used binders in building materials. However, OPC production is related with high CO2 emission and high energy consumption. Currently geopolymer cements are found to be the alternative substitute for OPC. Geopolymers most commonly are covalently bonded alkali-aluminosilicates which are X-ray amorphous at ambient and medium temperatures. The current study focusses on fly ash which is a byproduct of coal combustion process and due to its amorphous nature and chemistry, it is considered an appropriate raw material for geopolymer synthesis. In this study the effect of alkali concentration and solid liquid ratio on the acid resistance of fly ash based geopolymer mortar was studied. The fly ash was obtained from ayka Addis Textile, Addis Ababa, Ethiopia. Samples were prepared with different solid to liquid ratio and NaOH molarity and were tested for mechanical and durability properties. It was found that as the molarity of NaOH solution and solid to liquid ratio increase the initial and final setting time become shorter. Compressive and flexural strength show that after 28 days of curing sample with high Liquid to solid ratio and higher molarity show higher strength and smaller water absorption percentage. Sample were immersed in a 2% H2SO4 solution for 25 days and the sample with higher strength with smaller water absorption percentage show higher resistance.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"468 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88767306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of Pavement Distress for Asphalt Pavement Using Pavement Condition Index: Case Study from Adama to Awash Arba 用路面状况指数评价沥青路面路面损伤——以阿达玛至阿瓦什阿尔巴为例
American journal of engineering, science and technology Pub Date : 2019-12-13 DOI: 10.11648/J.AJSET.20190404.13
Ashebir Belete Werkineh, B. Demissie
{"title":"Evaluation of Pavement Distress for Asphalt Pavement Using Pavement Condition Index: Case Study from Adama to Awash Arba","authors":"Ashebir Belete Werkineh, B. Demissie","doi":"10.11648/J.AJSET.20190404.13","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.13","url":null,"abstract":"Pavement distress is a common problem for an opening road network and this distress is caused due to overloading of vehicles, poor maintenance, rapid traffic growth and improper design and implementation. This research study focused in Adama to Awash-Arba road section. The main objective of this research work was to evaluate the pavement distress using pavement condition index for the road section from Adama to Awash Arba. The result of the research show that the PCI value range from 8 to 97.1 and this shows that all section of the road have all types of pavement condition rating (Good, Satisfactory, Fair, Very Poor, Poor, Serious and Failed) in which 12.12% good, 9.09% satisfactory, 18.18% fair, 21.21% poor, 18.18% very poor, 18.18% serious and 3.03% was failed. Based on the pavement condition rating, seven soil samples was collected for the failed and serious road section using manual hand auger. Samples were air-dried before taken to laboratory test determination of subgrade soil. According to the pavement condition survey the road section from Adama to Awash Arba required maintenance and based on this, possible maintenance option had been recommended for pavement distress with respect to level of severity on the pavement condition of the study area in order to sustain the design life of the Pavement.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"76 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75094915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Challenges and Safety in Erection and Commissioning of 280/85 Tons Single Failure Proof EOT Crane at PFBR PFBR 280/85吨单防故障EOT起重机安装调试的挑战与安全
American journal of engineering, science and technology Pub Date : 2019-12-11 DOI: 10.11648/J.AJSET.20190404.12
Swamynathan Kudiyarasan, P. Sivakumar, Sanjeevi Umapathi, M. Chander
{"title":"Challenges and Safety in Erection and Commissioning of 280/85 Tons Single Failure Proof EOT Crane at PFBR","authors":"Swamynathan Kudiyarasan, P. Sivakumar, Sanjeevi Umapathi, M. Chander","doi":"10.11648/J.AJSET.20190404.12","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.12","url":null,"abstract":"The Electric overhead traveling (EOT) crane installed in Prototype Fast Breeder Reactor (PFBR), Reactor Containment Building (RCB) is the largest capacity EOT crane installed in any nuclear power plants in India with some unique features of its own. It has been built with a single failure proof concept which is one of the prime requirements of a nuclear facility as per the standards of NUREG/IS. It is a double bridge girder type; the girder used in this crane is a single structure having a length of 34.8m without any joints as designed by IGCAR/BHAVINI (first of its kind). The span of the EOT crane is 33.4m and installed at a height of 42m from the ground level with the lifting height of 42.5m. This crane was manufactured by an Indian company M/s. UNIQUE CRANE, NASIK. Two hooks (280 tons / 85 tons) are connected in the same trolley sharing the Long Travel (LT). Load testing of the complete crane was done at factory before transporting it to PFBR site. The components of the crane were assembled in PFBR site. The erection methodology adopted was distinct w. r. t the site condition, as the components which were handled were very heavy, available space for installation was restricted and the head room was also very less. This erection has been completed successfully and very safely without any notable incidents. This activity is a biggest achievement / milestone in the nuclear industry in India. Later the EOT crane was commissioned, load tested with 350 tons load (negligible deflection) and being operated successfully without any incidents so far. This was achieved by accurate erection procedure, stringent Quality Assurance Plan (QAP), Job Hazard Analysis (JHA) and Safe Operation Procedure (SOP). Many challenges were faced during manufacturing, testing, erection and load testing at site. This paper deliberates those challenges.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80736670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Protection and Artificial Intelligence Law: Europe Australia Singapore - An Actual or Perceived Dichotomy 数据保护和人工智能法律:欧洲,澳大利亚,新加坡-实际或感知的二分法
American journal of engineering, science and technology Pub Date : 2019-12-05 DOI: 10.11648/J.AJSET.20190404.11
Robert Walters, Matthew Coghlan
{"title":"Data Protection and Artificial Intelligence Law: Europe Australia Singapore - An Actual or Perceived Dichotomy","authors":"Robert Walters, Matthew Coghlan","doi":"10.11648/J.AJSET.20190404.11","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190404.11","url":null,"abstract":"Artificial Intelligence (AI) is moving so rapidly policy makers, regulators, governments and the legal profession are struggling to keep up. However, AI is not new and it has been used for more than two decades. Coupled with AI, personal data, along with cyber security law, and the challenges posed by the current legal frameworks are nothing short of immense. They are, in part, at odds with each other, and are doing very different things. This paper explores some of the challenges emerging in Australia, Europe and Singapore. The challenge of the interrelationship between personal data and AI arguably begins with who has manufactured the AI. Secondly, who owns the AI. Another challenge that has also emerged is defining AI. Most people are able to understand what AI is and how it is beginning to impact the economy and our daily lives. However, there is no clear legal definition of AI, because AI is so nebulous. This burgeoning area of law is going to challenge society, privacy and economic experts, regulators, innovators of technology, as there continues to be a collision between them. Furthermore, the collection of personal data by AI challenges the notion of where responsibility lies. That is, AI may collect, use and disclose personal data at different points along the technology chain. It will be highlighted how the current data protection laws rather than promote AI projects, largely inhibit its development. This paper identifies some of the tensions between data protection law and AI. This paper argues that there is a need for an urgent and detailed understanding of the opportunities, legal and ethical issues associated with data protection and AI. Doing so will ensure an ongoing balance between the economic and social issues that are attached to the two areas of the law.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"122 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82246352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Magnetic Properties of Diluted Spinels MgxNi1−xFe2O4 Systems: Are Studied by Green’s Functions and Mean Field Theories 用格林函数和平均场理论研究了稀释尖晶石MgxNi1−xFe2O4体系的磁性能
American journal of engineering, science and technology Pub Date : 2019-10-29 DOI: 10.11648/j.ajset.20190403.12
A. E. Grini, S. Salmi, A. Azouaoui, A. Hourmatallah, K. Bouslykhane, M. Hamedoun, N. Benzakour
{"title":"Magnetic Properties of Diluted Spinels MgxNi1−xFe2O4 Systems: Are Studied by Green’s Functions and Mean Field Theories","authors":"A. E. Grini, S. Salmi, A. Azouaoui, A. Hourmatallah, K. Bouslykhane, M. Hamedoun, N. Benzakour","doi":"10.11648/j.ajset.20190403.12","DOIUrl":"https://doi.org/10.11648/j.ajset.20190403.12","url":null,"abstract":"Many-body Green's function, and mean field theories have been developed for magnetic systems MgxNi1−xFe2O4. We apply this theory to evaluate thermal magnetization and magnetic susceptibility for different values of magnetic field and dilution x, by considering all components of the magnetisation when an external magnetic field is applied in (x-z)-plane. The critical temperatures of MgxNi1−xFe2O4 systems in the range 0 ≤ x ≤ 1 have been deduced. The Green's function results are compared with the results of high temperature series expansion technique, and experimental magnetic measurements.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"155 8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83151440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Paper Histological Study of Lavatera Maritima in the Region of Marsa Ben Mehidi Marsa Ben Mehidi地区海洋Lavatera martima的组织学研究
American journal of engineering, science and technology Pub Date : 2019-07-23 DOI: 10.11648/J.AJSET.20190402.11
G. Sarra, Hassani Faiçal
{"title":"Paper Histological Study of Lavatera Maritima in the Region of Marsa Ben Mehidi","authors":"G. Sarra, Hassani Faiçal","doi":"10.11648/J.AJSET.20190402.11","DOIUrl":"https://doi.org/10.11648/J.AJSET.20190402.11","url":null,"abstract":"The present work concerns a self-ecological study of Lavatera maritima (malvaceae) in the region of Marsa benmehidi, for this study we are based on histological criteria. Plant organisms and especially flowering plants are distinguished from most animal organisms by remarkable characters. These plants are practically immobile and fixed in the soil. As a result, they depend on the environment around them. This study aims to explore the structure of living organisms, the constitutive and functional relationships between their elements, as well as the renewal of tissues. It allowed us to know the tissues, organs following the leaf, the stem, the root and the different tissues such as xylem, phloem... etc.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83386662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Behavioral-based malware clustering and classification 基于行为的恶意软件聚类和分类
American journal of engineering, science and technology Pub Date : 2019-06-01 DOI: 10.15864/ajse.1105
I. Alsmadi, B. Al-Ahmad, Iyad Alazzam
{"title":"Behavioral-based malware clustering and classification","authors":"I. Alsmadi, B. Al-Ahmad, Iyad Alazzam","doi":"10.15864/ajse.1105","DOIUrl":"https://doi.org/10.15864/ajse.1105","url":null,"abstract":"Detection of malwares and security attacks is a complex process that can vary in its details, analysis activities, etc. As part of the detection process, malware scanners try to categorize a malware once it is detected under one of the known malware categories (e.g. worms, spywares,\u0000 viruses, etc.). However, many studies and researches indicate problems with scanners categorizing or identifying a particular malware under different categories. There are different reasons for such challenges where different malware scanners, and sometime the same malware scanner, will categorize\u0000 the same malware under different categories in different times or instances. In this paper, we evaluated this problem summarizing existing approaches on malware classification.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81695788","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT security threats analysis based on components, layers and devices 基于组件、层和设备的物联网安全威胁分析
American journal of engineering, science and technology Pub Date : 2019-06-01 DOI: 10.15864/ajse.1101
I. Alsmadi, Fahad Mira
{"title":"IoT security threats analysis based on components, layers and devices","authors":"I. Alsmadi, Fahad Mira","doi":"10.15864/ajse.1101","DOIUrl":"https://doi.org/10.15864/ajse.1101","url":null,"abstract":"Internet of Things (IoTs) continue to grow to cover different types of applications to connect us, our appliances, our gadgets, etc. with the Internet. Information uploaded from those devices or exchanged with them is very vital and can affect us significantly. As a result, security\u0000 threats and attacks that can come through those devices impact us seriously. In this systematic literature review paper, we evaluated security threats and attacks on IoTs based on different categories such as: IoT vulnerabilities, threats and attacks based on IoT architecture layers, and IoT\u0000 vulnerabilities, threats and attacks based on IoT components. We showed areas of open research based on those categories. Due to the large spectrum of applications for IoTs, we hope that this classification can help researchers in this area focus their research to target one specific domain,\u0000 category or threats.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85339271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Analysis of Sub-Communities Behavior in Social Networks 社会网络中的子社区行为分析
American journal of engineering, science and technology Pub Date : 2019-06-01 DOI: 10.15864/ajse.1103
I. Alsmadi, Chuck Easttom
{"title":"The Analysis of Sub-Communities Behavior in Social Networks","authors":"I. Alsmadi, Chuck Easttom","doi":"10.15864/ajse.1103","DOIUrl":"https://doi.org/10.15864/ajse.1103","url":null,"abstract":"Clique relations are useful in understanding the dynamics of a wide range of social interactions. One application of studying clique relations involves studying how such “detection of abnormal cliques’ behaviors” can be used to detect sub-communities’ behaviors\u0000 based on information from Online Social Networks (OSNs).In social networks, a clique represents a sub-group of the larger group in which every member in the clique is directly associated with every other member in the clique. Those cliques often possess a containment relation with each\u0000 other where large cliques can contain small size cliques. Thus, finding the extent of the clique, or the maximum clique is an important research questions. In our approach, we evaluated adding the weight factor and integrating graph theory to clique algorithm in order to derive more data about\u0000 the clique. In this regard clique activities are not like those in group discussions where an activity is posted by one user and is visible by all others. Our algorithm calculates the overall weight of the clique based on individual edges. Users post frequent activities. Their clique members,\u0000 just like other entities, may or may not interact with all those activities.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90208254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling and Simulation of Data Centers to Predict Behavior 数据中心行为预测的建模与仿真
American journal of engineering, science and technology Pub Date : 2019-06-01 DOI: 10.15864/ajse.1102
M. Levy
{"title":"Modeling and Simulation of Data Centers to Predict Behavior","authors":"M. Levy","doi":"10.15864/ajse.1102","DOIUrl":"https://doi.org/10.15864/ajse.1102","url":null,"abstract":"Data center modeling and simulation help to estimate and predict key parameters under certain a-priori known conditions. Data center systems must adopt end-to-end resource management, covering both cyber and physical components. This paper describes a systematic, easy-to-follow approach\u0000 for data center modeling and simulation using a cyber-physical systems lens. The methodology is aimed to facilitate the estimation of quality of service, airflow and power requirements, and key indicators to assess data centers, and to then compare them to one another, or compare different\u0000 scenarios under which data centers operate. The results contribute to communicate and better understand data center behavior and areas of improvement.","PeriodicalId":93409,"journal":{"name":"American journal of engineering, science and technology","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85178866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信