Pub Date : 2024-08-11DOI: 10.1016/j.jestch.2024.101787
Uğur Kafkas
The development of perforation technology has increased the use of perforated structures in many engineering fields, from nano/micro to macro scales. This paper proposes a solution method to analyze the free vibration characteristics of perforated Rayleigh beams with both deformable and rigid boundary conditions and equal square holes along their vertical axes, modeled using elastic collapse springs at the beam ends. Using Rayleigh Beam Theory and an eigenvalue-based methodology using the Stokes transform and Fourier series, the research investigates the effects of parameters such as the number of holes, filling ratio, and boundary deformability on the vibration dynamics. The challenges associated with achieving rigid boundary conditions in actual engineering applications make it essential to examine the impact of deformable boundary conditions on the vibration characteristics of perforated beams. Key findings indicate that the number of perforations and boundary stiffness significantly influence the vibrational characteristics, which can be utilized to optimize the design and application of such beams in various engineering fields. Particularly noteworthy is the effect of symmetrical or asymmetrical variation of the stiffness parameters of the springs placed at the ends of the perforated beam on the vibration behavior. These results contribute to a deeper understanding of the dynamic behavior of perforated beams and provide practical insights for structural design.
{"title":"On the free vibration of a perforated Rayleigh beam with deformable ends","authors":"Uğur Kafkas","doi":"10.1016/j.jestch.2024.101787","DOIUrl":"https://doi.org/10.1016/j.jestch.2024.101787","url":null,"abstract":"The development of perforation technology has increased the use of perforated structures in many engineering fields, from nano/micro to macro scales. This paper proposes a solution method to analyze the free vibration characteristics of perforated Rayleigh beams with both deformable and rigid boundary conditions and equal square holes along their vertical axes, modeled using elastic collapse springs at the beam ends. Using Rayleigh Beam Theory and an eigenvalue-based methodology using the Stokes transform and Fourier series, the research investigates the effects of parameters such as the number of holes, filling ratio, and boundary deformability on the vibration dynamics. The challenges associated with achieving rigid boundary conditions in actual engineering applications make it essential to examine the impact of deformable boundary conditions on the vibration characteristics of perforated beams. Key findings indicate that the number of perforations and boundary stiffness significantly influence the vibrational characteristics, which can be utilized to optimize the design and application of such beams in various engineering fields. Particularly noteworthy is the effect of symmetrical or asymmetrical variation of the stiffness parameters of the springs placed at the ends of the perforated beam on the vibration behavior. These results contribute to a deeper understanding of the dynamic behavior of perforated beams and provide practical insights for structural design.","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142201962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-14DOI: 10.1016/j.jestch.2024.101756
Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, Aditya Kumar Sahu
Sharing accurate and lossless images with higher quality through digital mediums is challenging, particularly, images shared on social media platforms can serve as good carriers for sending hidden data. However, social media platforms apply severe compression when transferring images end-to-end to serve efficient network transporting bandwidth and provide enough storage space to the users. Within the scope of this research, the proposed method introduces a novel approach by combining cryptographic and steganographic techniques, providing a robust solution to protect hidden data even when subjected to repeatedly compression. The method first encrypts the secret data to be hidden using the Advanced Encryption Standard Cipher Block Chaining (AES-CBC) technique. Then, data hiding is performed on the coefficients obtained by applying Discrete Cosine Transform (DCT) to repeatedly compressed JPEG images, coefficients that are minimally affected by compression or remain unaffected are specifically selected for data hiding. Therefore, secret data is extracted with high accuracy. Experimental results show that the proposed method outperforms the state-of-the-art in achieving robust and effective data hiding techniques based on bit error rate.
{"title":"Robust data hiding method based on frequency coefficient variance in repetitive compression","authors":"Serdar Solak, Abdiwahab Mohamed Abdirashid, Arsene Adjevi, Aditya Kumar Sahu","doi":"10.1016/j.jestch.2024.101756","DOIUrl":"https://doi.org/10.1016/j.jestch.2024.101756","url":null,"abstract":"Sharing accurate and lossless images with higher quality through digital mediums is challenging, particularly, images shared on social media platforms can serve as good carriers for sending hidden data. However, social media platforms apply severe compression when transferring images end-to-end to serve efficient network transporting bandwidth and provide enough storage space to the users. Within the scope of this research, the proposed method introduces a novel approach by combining cryptographic and steganographic techniques, providing a robust solution to protect hidden data even when subjected to repeatedly compression. The method first encrypts the secret data to be hidden using the Advanced Encryption Standard Cipher Block Chaining (AES-CBC) technique. Then, data hiding is performed on the coefficients obtained by applying Discrete Cosine Transform (DCT) to repeatedly compressed JPEG images, coefficients that are minimally affected by compression or remain unaffected are specifically selected for data hiding. Therefore, secret data is extracted with high accuracy. Experimental results show that the proposed method outperforms the state-of-the-art in achieving robust and effective data hiding techniques based on bit error rate.","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141775930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of the study was to conduct the comparative analysis of steel types corrosion resistance. Three selected steel types were used in the study. The selected types were structural steel, stainless steel, and MMFX steel. The methodology we adopted is that we evaluated the steel parts resistance towards corrosion by doing in-salt spray experiment and the immersion of aqueous solution of sodium chloride. For salt spray test, we used guidelines by ASTM B117. This practice provides a controlled corrosion environment which is used for exposing specimen to salt spray chamber. For immersion test, test specimens are analyzed at regular time interval as the first rust is appeared. For carbon steel, we used three specimen and mostly initial rust appeared in initial 13 to 15 hours. For stainless steel, inter granular corrosion were analyzed. The results show that the first cycle started after about 46 hours; the second cycle started about 1% and the third cycle started with the rage of about 2 to 30%. For MMFX 2 steel, the results show that for MMFX carbon steel, the chloride threshold ratio is about 6 times higher than black bars and more than double of other types. The conclusion of the study is that in big structures like bridges, the MMFX steel should be used.
{"title":"COMPARATIVE ANALYSIS OF STEEL CORROSION RESISTANCE","authors":"Chao Zhang, Xiang Yin, Chunyan Qing","doi":"10.51594/ESTJ.V1I2.113","DOIUrl":"https://doi.org/10.51594/ESTJ.V1I2.113","url":null,"abstract":"The objective of the study was to conduct the comparative analysis of steel types corrosion resistance. Three selected steel types were used in the study. The selected types were structural steel, stainless steel, and MMFX steel. The methodology we adopted is that we evaluated the steel parts resistance towards corrosion by doing in-salt spray experiment and the immersion of aqueous solution of sodium chloride. For salt spray test, we used guidelines by ASTM B117. This practice provides a controlled corrosion environment which is used for exposing specimen to salt spray chamber. For immersion test, test specimens are analyzed at regular time interval as the first rust is appeared. For carbon steel, we used three specimen and mostly initial rust appeared in initial 13 to 15 hours. For stainless steel, inter granular corrosion were analyzed. The results show that the first cycle started after about 46 hours; the second cycle started about 1% and the third cycle started with the rage of about 2 to 30%. For MMFX 2 steel, the results show that for MMFX carbon steel, the chloride threshold ratio is about 6 times higher than black bars and more than double of other types. The conclusion of the study is that in big structures like bridges, the MMFX steel should be used.","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":"65 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88536317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The study is about wireless sensor networks which plays important role in modern human life. The wireless sensor networks pose crucial problem of energy consumption which is investigated in this study. Three types of cluster technique including K-means, Fuzzy, and SOM were analyzed in the present study based on 50 nodes and 100 nodes network. The results were compared based on various velocity m/s and percentage of energy decay in the network. The results show that among the three cluster techniques, the Fuzzy method turned out to be the most energy efficient method.
{"title":"ANALYSIS OF ENERGY CONSUMPTION OF SELECTED CLUSTER TECHNIQUE","authors":"W. David, Chang Bing","doi":"10.51594/estj.v1i2.117","DOIUrl":"https://doi.org/10.51594/estj.v1i2.117","url":null,"abstract":"The study is about wireless sensor networks which plays important role in modern human life. The wireless sensor networks pose crucial problem of energy consumption which is investigated in this study. Three types of cluster technique including K-means, Fuzzy, and SOM were analyzed in the present study based on 50 nodes and 100 nodes network. The results were compared based on various velocity m/s and percentage of energy decay in the network. The results show that among the three cluster techniques, the Fuzzy method turned out to be the most energy efficient method. ","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":"97 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84202336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The objective of the study was to propose a high capacity data embedding system from DCT domain. The default quantization table is used for fixed mask projection quantization steps. Accordingly, DCT coefficient of the host image from low to higher frequency bands and embed bits from band to band with specially designed base vectors called Hadamard vectors. The embedding scheme procedure is described step wise. The proposed system can be used for data embedding and can be associated with another encryption method to make it safer. The proposed system is reported to be highly robust and secure
{"title":"LARGE DATA EMBEDDING; PROBLEM & SOLUTION","authors":"Akubuilo K., Rix Torimiro","doi":"10.51594/estj.v1i2.114","DOIUrl":"https://doi.org/10.51594/estj.v1i2.114","url":null,"abstract":"The objective of the study was to propose a high capacity data embedding system from DCT domain. The default quantization table is used for fixed mask projection quantization steps. Accordingly, DCT coefficient of the host image from low to higher frequency bands and embed bits from band to band with specially designed base vectors called Hadamard vectors. The embedding scheme procedure is described step wise. The proposed system can be used for data embedding and can be associated with another encryption method to make it safer. The proposed system is reported to be highly robust and secure","PeriodicalId":11760,"journal":{"name":"Engineering Science and Technology, an International Journal","volume":"71 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80418196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}