Home / Journals / ICCES / Vol.5, No.4, 2008
Table of Content
  • Open Access

    ABSTRACT

    The Tribological and Fatigue Properties of Steel modified by Hybrid Surface Modification combining Super Rapid Induction Heating & Quenching and DLC coating

    T. Aizawa1, H. Akebono2, H.Suzuki1
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 193-198, 2008, DOI:10.3970/icces.2008.005.193
    Abstract In order to achieve power transmission parts like a compact gearwheel which indicates high performance properties, hybrid surface modification was performed by combining Super Rapid Induction Heating & Quenching(SRIQ) which creates high fatigue strength and Diamond Like Carbon (DLC) coating which are well known for their high hardness, low friction and excellent wear resistance. And, in order to prevent the base material from decreasing its fatigue strength, DLC was coated by using Unbalanced Magnetron Sputtering (UBMS) method which can coat at low temperature. Rotational bending fatigue tests and friction-wear tests were carried out. It was clear that it is possible… More >

  • Open Access

    ABSTRACT

    Computational Flow Simulations around Circular Cylinders Using a Finite Element Method

    Kazuhiko Kakuda1, Masayuki Sakai1, Shinichiro Miura2
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 199-204, 2008, DOI:10.3970/icces.2008.005.199
    Abstract The applications of a finite element scheme to three-dimensional incompressible viscous fluid flows around circular cylinders are presented. The scheme is based on the Petrov-Galerkin weak formulation with exponential weighting functions. The incompressible Navier-Stokes equations are numerically integrated in time by using a fractional step strategy with second-order accurate Adams-Bashforth scheme for both advection and diffusion terms. Numerical solutions for flow around a circular cylinder are presented. The parallelization and the performance of the present scheme are also checked. More >

  • Open Access

    ABSTRACT

    Formation of Nanobubbles at the Water-Graphite Interface

    Prabhakar Misra1, Silvina M. Gatica1, Obafemi Otelaja2
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 205-210, 2008, DOI:10.3970/icces.2008.005.205
    Abstract Nanobubbles form either spontaneously or by induction at the surface of certain solids immersed in a liquid. Atomic Force Microscopy observations have confirmed their formation. Such bubbles have sizes in the range 10-100 nm and have important ramifications for properties of interfaces and could be responsible for long-range hydrophobic attractive forces. In addition, as a potential application, the use of nanobubbles -- in tandem with ultrasound -- has been proposed for the treatment of strokes. Formation of nanobubbles at the water-graphite interface influences the adsorption of nanoparticles and the corresponding wetting properties. An important parameter relevant to the stability of… More >

  • Open Access

    ABSTRACT

    Accuracy and Computational Efficiency of the Finite Volume Method Combined with the Meshless Local Petrov-Galerkin in Comparison with the Finite Element Method in Elasto-static Problem

    M.R. Moosavi1, A. Khelil1
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 211-238, 2008, DOI:10.3970/icces.2008.005.211
    Abstract In this paper, a combined formulation of the Finite Volume Method (FVM) and the Meshless Local Petrov-Galerkin (MLPG) is investigated to solve elasto-static problem. Accuracy and computational efficiency study between the combined formulation and the Finite Element Method (FEM) is presented. Some problems of beam under various loading and boundary conditions are analyzed by the proposed method, and the numerical results are compared with analytical solution and result of other numerical method which is obtained by well-known FEM software ABAQUS. The advantages of the FVM combined MLPG (FVMLPG) with respect to the FEM are illustrated. Higher accuracies and computational efficiencies… More >

  • Open Access

    ABSTRACT

    Study on Band Gaps and Localization Phenomenon in 2D Ordered and Randomly Disordered Phononic Crystals

    A.L. Chen, Y.S. Wang1
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 239-244, 2008, DOI:10.3970/icces.2008.005.239
    Abstract Band gaps and localization phenomenon for both in-plane and anti-plane elastic waves propagating in 2D ordered and disordered phononic crystals are studied in this paper. The localization of wave propagation due to random disorder is discussed by introducing the concept of the localization factor which is calculated by the plane-wave-based transfer-matrix method. More >

  • Open Access

    ABSTRACT

    Thermomechanical Constitution of Shape Memory Polymer

    Z.D. Wang1, D.F Li1
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 245-254, 2008, DOI:10.3970/icces.2008.005.245
    Abstract The thermo-mechanical constitution of shape memory polymers (SMPs) is critical for predicting their deformation and recovery characteristics under different constraints. In this study, a new, physical-based, temperature and time-dependent constitutive model is proposed for simulating the thermomechanical response of SMPs. The deformation mechanisms of shape fix and shape recovery are analyzed. Different models are compared to compare strain and stress recovery responses with the experimental results. More >

  • Open Access

    ABSTRACT

    Faster RSA Algorithm for Decryption Using Chinese Remainder Theorem

    G.N. Shinde1, H.S. Fadewar2
    The International Conference on Computational & Experimental Engineering and Sciences, Vol.5, No.4, pp. 255-262, 2008, DOI:10.3970/icces.2008.005.255
    Abstract E-business security is an overarching business issues that, based of an analyzed risks, and establishes the threat acceptance and reduction parameters for the safe use of technology. As an overarching issue, e-business security can be thought of as being absolutely fundamental to the effective and efficient use of Information Technology in support of e-business.
    This paper proposed four time faster RSA-CRT algorithm for decryption of data and effective representation of encryption using Chinese Remainder Theorem (CRT) for the data security. The algorithm is implemented in Java source code. More >

Share Link

WeChat scan