Search results
1 – 6 of 6Yun Liu, Weiyuan Yu, Xuemin Sun and Fengfeng Wang
This paper aims to investigate the effect of ultrasonic vibration (USV) on the evolution of intermetallic compounds (IMCs), grain morphology and shear strength of soldered…
Abstract
Purpose
This paper aims to investigate the effect of ultrasonic vibration (USV) on the evolution of intermetallic compounds (IMCs), grain morphology and shear strength of soldered Ni/Sn/Ni samples.
Design/methodology/approach
The Ni/Sn/Ni joints were obtained through ultrasonic-assisted soldering. The formation of IMCs, their composition, grain morphology and the fractured-surface microstructures from shear tests were characterized using scanning electron microscopy and energy-dispersive x-ray spectroscopy.
Findings
Without USV, a planar interfacial Ni3Sn4 layer was formed at the Ni/Sn interface, and a few Ni3Sn4 grains were distributed in the soldered joint. The morphology of these grains was needle-shaped. With USV, several grooves were formed at the interfacial Ni3Sn4 layer due to ultrasonic cavitation. Some deepened grooves led to “neck” connections at the roots of the Ni3Sn4 grains, which accelerated the strong detachment of Ni3Sn4 from the substrate. In addition, two types of Ni3Sn4 grains, needle-shaped and granular-shaped, were observed at the interface. Furthermore, the shear strength increased with longer USV time, which was attributed to the thinning of the interfacial IMC layers and dispersion strengthening from the Ni3Sn4 particles distributed evenly in the joint.
Originality/value
The novelty of the paper is the detailed study of the effect of USV on the morphology, size changes of interfacial IMC and joint strength. This provides guidance for the application of ultrasonic-assisted soldering in electronics packaging.
Details
Keywords
Bo Tang, Xuemin Wang, Leilei Wei and Xindong Zhang
This paper aims to apply fractional variational iteration method using He's polynomials (FVIMHP) to obtain exact solutions for variable-coefficient fractional heat-like and…
Abstract
Purpose
This paper aims to apply fractional variational iteration method using He's polynomials (FVIMHP) to obtain exact solutions for variable-coefficient fractional heat-like and wave-like equations with fractional order initial and boundary conditions.
Design/methodology/approach
The approach is based on FVIMHP. The authors choose as some examples to illustrate the validity and the advantages of the method.
Findings
The results reveal that the FVIMHP method provides a very effective, convenient and powerful mathematical tool for solving fractional differential equations.
Originality/value
The variable-coefficient fractional heat-like and wave-like equations with fractional order initial and boundary conditions are solved first. Illustrative examples are included to demonstrate the validity and applicability of the method.
Details
Keywords
Alan Dahgwo Yein, Chih-Hsueh Lin, Yu-Hsiu Huang, Wen-Shyong Hsieh, Chung-Nan Lee and Pin-Chun Kuo
Riding on the wave of intelligent transportation systems, the vehicular ad hoc network (VANET) is becoming a popular research topic. VANET is designed to build an environment…
Abstract
Purpose
Riding on the wave of intelligent transportation systems, the vehicular ad hoc network (VANET) is becoming a popular research topic. VANET is designed to build an environment where the vehicles can exchange information about the traffic conditions or vehicle situation to help the vehicles avoid traffic accidents or traffic jams. In order to keep the privacy of vehicles, the vehicles must be anonymous and the routing must be untraceable while still being able to be verified as legal entities. The paper aims to discuss these issues.
Design/methodology/approach
The exchanged messages must be authenticated to be genuine and verified that they were sent by a legal vehicle. The vehicles also can mutually trust and communicate confidentially. In VANETs, road-side units (RSUs) are installed to help the vehicles to obtain message authentication or communicate confidentially. However, the coverage of RSUs is limited due to the high cost of wide area installation. Therefore the vehicles must be able to obtain message authentication by themselves – without an RSU.
Findings
The authors take the concept of random key pre-distribution used in wireless sensor networks, modify it into a random secret pre-distribution, and integrate it with identity-based cryptography to make anonymous message authentication and private communication easier and safer. The authors construct a two-tier structure. The tier 1, trust authority, assigns n anonymous identities and embeds n secrets into these identities to be the private secret keys for the tier 2, registered vehicles. At any time, the vehicles can randomly choose one of n anonymous identities to obtain message authentication or communicate confidentially with other vehicles.
Originality/value
The processes of building neighbor set, setting pairing value, and message authenticating are proposed in this paper. The proposed method can protect against the attacks of compromising, masquerading, forging, and replying, and can also achieve the security requirements of VANET in message authentication, confidential communication, anonymity, and un-traceability. The performance of the proposed method is superior to the related works.
Details
Keywords
Vitus Mwinteribo Tabie, Chong Li, Wang Saifu, Jianwei Li and Xiaojing Xu
This paper aims to present a broad review of near-a titanium alloys for high-temperature applications.
Abstract
Purpose
This paper aims to present a broad review of near-a titanium alloys for high-temperature applications.
Design/methodology/approach
Following a brief introduction of titanium (Ti) alloys, this paper considers the near-α group of Ti alloys, which are the most popular high-temperature Ti alloys developed for a high-temperature application, particularly in compressor disc and blades in aero-engines. The paper is relied on literature within the past decade to discuss phase stability and microstructural effect of alloying elements, plastic deformation and reinforcements used in the development of these alloys.
Findings
The near-a Ti alloys show high potential for high-temperature applications, and many researchers have explored the incorporation of TiC, TiB SiC, Y2O3, La2O3 and Al2O3 reinforcements for improved mechanical properties. Rolling, extrusion, forging and some severe plastic deformation (SPD) techniques, as well as heat treatment methods, have also been explored extensively. There is, however, a paucity of information on SiC, Y2O3 and carbon nanotube reinforcements and their combinations for improved mechanical properties. Information on some SPD techniques such as cyclic extrusion compression, multiaxial compression/forging and repeated corrugation and straightening for this class of alloys is also limited.
Originality/value
This paper provides a topical, technical insight into developments in near-a Ti alloys using literature from within the past decade. It also outlines the future developments of this class of Ti alloys.
Details
Keywords
Zhen Li, Zhao Lei, Hengyang Sun, Bin Li and Zhizhong Qiao
The purpose of this study was to validate the feasibility of the proposed microstructure-based model by comparing the simulation results with experimental data. The study also…
Abstract
Purpose
The purpose of this study was to validate the feasibility of the proposed microstructure-based model by comparing the simulation results with experimental data. The study also aimed to investigate the relationship between the orientation of graphite flakes and the failure behavior of the material under compressive loads as well as the effect of image size on the accuracy of stress–strain behavior predictions.
Design/methodology/approach
This paper presents a microstructure-based model that utilizes the finite element method (FEM) combined with representative volume elements (RVE) to simulate the hardening and failure behavior of ferrite-pearlite matrix gray cast iron under uniaxial loading conditions. The material was first analyzed using optical microscopy, scanning electron microscopy (SEM), energy-dispersive X-ray spectroscopy (EDS) and X-ray diffraction (XRD) to identify the different phases and their characteristics. High-resolution SEM images of the undeformed material microstructure were then converted into finite element meshes using OOF2 software. The Johnson–Cook (J–C) model, along with a damage model, was employed in Abaqus FEA software to estimate the elastic and elastoplastic behavior under assumed plane stress conditions.
Findings
The findings indicate that crack initiation and propagation in gray cast iron begin at the interface between graphite particles and the pearlitic matrix, with microcrack networks extending into the metal matrix, eventually coalescing to cause material failure. The ferritic phase within the material contributes some ductility, thereby delaying crack initiation.
Originality/value
This study introduces a novel approach by integrating microstructural analysis with FEM and RVE techniques to accurately model the hardening and failure behavior of gray cast iron under uniaxial loading. The incorporation of high-resolution SEM images into finite element meshes, combined with the J–C model and damage assessment in Abaqus, provides a comprehensive method for predicting material performance. This approach enhances the understanding of the microstructural influences on crack initiation and propagation, offering valuable insights for improving the design and durability of gray cast iron components.
Details
Keywords
Daniel Esene Okojie, Adisa Abdul-Ganiyu Jimoh, Yskandar Hamam and Adebayo Ademola Yusuff
This paper aims to survey the need for full capacity utilisation of transmission lines in power systems network operations. It proposes a review of the N-1 security criterion that…
Abstract
Purpose
This paper aims to survey the need for full capacity utilisation of transmission lines in power systems network operations. It proposes a review of the N-1 security criterion that does not ensure reliable dispatch of optimum power flow during outage contingency. The survey aims to enlarge the network capacity utilisation to rely on the entire transmission lines network operation.
Design/methodology/approach
The paper suggests transmission line switching (TLS) approach as a viable corrective mechanism for power dispatch. The TLS process is incorporated into a constraint programming language extension optimisation solver that selects the switchable line candidates as integer variables in the mixed integer programming problem.
Findings
The paper provides a practical awareness of reserve capacity in the lines that provide network security in outage contingency. At optimum power flow dispatch, the TLS is extended to optimal transmission line switching (OTLS) that indicates optimal capacity utilisation (OCU) of the available reserve capacity (ARC) in the network lines.
Practical implications
Computational efficiency influenced the extension of the OTLS to optimal transmission switching of power flow (OTSPF). The application of OTSPF helps reduce the use of flexible AC transmission systems (FACTS) and construction of new transmission lines..
Originality/value
The paper surveys TLS efforts in network capacity utilisation. The suggested ARC fulfils the need for an index with which the dispatchable lines may be identified for the optimal capacity utilisation of transmission lines network.