Mechanisms

Masters
Lab Report
Technology
Pages 3 (753 words)
Download 0
Various elements confer the properties of steel in terms of providing toughness, wear-resistance and so on. The alloying property of these elements enables them to promote the formation of certain phase. These elements can be grouped into austenite-forming, ferrite-forming, carbide-forming and nitride-forming elements…

Introduction

The main focus of this experiment was to investigate the characterization of austenite structure prior to the transformation. This investigation is carried out with respect with grain-size distribution. The outcome of this investigation shows that different ratios of picric and hydrochloric acids were required by different alloys and different thermomechanical treatments. This can be controlled by carefully measuring pH- value. Etching techniques and quantitative metallography is used to characterize transformation structure.
The results indicate that steel A, B, and D are of same strength, whereas steel C demonstrates less strength. This different behavior is due to the structural differences. It is also found that the transformed structure consist bainite and ferrite. Where the ferrite content in steel A, B, and D is 40%, the ferrite content in steel c is 50%. The ferrite grains are much coarser which is inherited from the coarser austenite structure.
High impact energy values are found with steel A and B up to -90'C. This is caused by small and homogeneous austenite grains. There are differences in recrystallization behavior which makes is necessary to investigate the precipitation process and its influence on recrystallization.
The examination of steel B exhibit following results: some Al-rich particles found after short holding time. ...
Download paper
Not exactly what you need?

Related papers

Information Technology
It helps system in smooth change by adopting change and configuration management process (Gray & Larson, 2006).…
Congestion control
But this presumption of congestion by sender TCP while using constant threshold technique is not an impeccable procedure and may cause several problems. The TCP design vehemently relies on in-order packet delivery despite the fact that the reordering process is quite possible in the network. The static nature of segment retransmission totally undermines the possibility of delay in the network…
Information Assurance and Governance
It has been argued that the IT governance system established in many organisations is incongruent as it has been designed in several different patches of problem solving mechanisms. The designing activity of the governance system reduces the synergy level and limits the opportunities for strategic impact from IT. In order to deal with the issue it is important for the management of the…
Ubiquitous Computing
Ubiquitous computing is a model of computing in which computer functions are integrated into everyday life, often in an invisible way. The model requires both small, inexpensive computers and wired and wireless ("dumb") devices connected to larger computers. A household controlled by ubiquitous computing might have remote-controlled lighting, automated sprinklers, a home entertainment center,…
Mechanisms
The main focus of this experiment was to investigate the characterization of austenite structure prior to the transformation. This investigation is carried out with respect with grain-size distribution. The outcome of this investigation shows that different ratios of picric and hydrochloric acids were required by different alloys and different thermomechanical treatments. This can be controlled by…
Distributed Systems assessment
Because the number of processes in an MPI computation is normally fixed, processes can use point-to-point communication operations to send a message from one named process to another. These operations can be used to implement local and unstructured communications. A group of processes can call collective communication operations to perform commonly used global operations such as summation and…
Safety at construction sites
There is this select group of people who would then by identified as the stakeholders. This group is composed of people who all have stakes in the success of the project and, therefore, are contributors to the success of the project and the safety of everyone involved.…