
Interpretation:
The principle of grain-size strengthening is to be explained. Also, its
Concept Introduction:
The method of increasing the strength of a material by altering their average crystalline size is known as grain-size strengthening.

Explanation of Solution
In a material, its grain boundary is considered invincible for the dislocations. These dislocations affect the stress buildup in the adjacent grain in the material and activate the dislocation sources and enable the deformation in the neighboring grain.
Changing the size of the grain by different means changes the number of dislocations which are there in that grain boundary.Thus, it increases the strength of the material.
At high temperatures, a small portion of this material with dislocated grain is subjected to solidification which generates crystal seeds and the rest of the material use this seed as template when they begin to solidify.
Want to see more full solutions like this?
Chapter 10 Solutions
Essentials Of Materials Science And Engineering
- Hints: Find the closed loop transfer function and then plot the step response for diFerentvalues of K in MATLAB. Show step response plot for different values of K. Auto Controls Show solutions and provide matlab code NO COPIED ANSWERS OR WILL REPORTarrow_forwardObtain the response of the system shown below for a parabolic or acceleration input r(t);where Auto Controls Show full solutionarrow_forward8. Name and Email AddressesWrite a program that keeps names and email addresses in a dictionary as key-value pairs. The program should display a menu that lets the user look up a person’s email address, add a new name and email address, change an existing email address, and delete an existing name and email address. The program should pickle the dictionary and save it to a file when the user exits the program. Each time the program starts, it should retrieve the dictionary from the file and unpickle it. How would the user be able to use the program?arrow_forward
- Problem Statement A large plate of insulating material 8 cm thick has in it a 3 cm-diam hole, with axis normal to the surface. The temperature of the surroundings are 1800 K at one side of the plate and 400 K on the other side. Insulating plate D= 3 cm H= 8 cm Considering the sides of the hole to be black, (a) Draw a system of resistors that can be used to solve for the various heat transfer rates. For full credit you must label all "voltages", "currents," and resistances present. (b) Estimate the radiative heat transfer through the hole.arrow_forwardhoph - AT 10x AT 10.076 ht 0.076 0 0-1846112 14884 xh T 1.632m h-4- (1-22) h = 1.022m 14. The 4-ft-diameter cylinder, 4 ft long, is acted upon by water on the left and oil of sp gr 0.800 on the right. Determine (a) the normal force at B if the cylinder weighs 4000 lb and (b) the horizontal force due to oil and water if the oil level drops 1 ft. Solution Water Oil Barrow_forward3. The following data was collected for the traverse shown in Figure 2. a. Determine the latitudes and departures for all sides. b. Determine the linear error of closure and the accuracy ratio. C. Correct and balance the latitudes and departures. A N80°27'E 467.81 ft 497.50 ft N56°46' W B S34°51'E 483.69 ft 325.06 ft D N81°48' Warrow_forward
- Q2: Solve the equation using the simplex method Max. Z 13x1 +11x2 Subject to constraints 4x1 +5x21500 5x1 +3x21575 x1 +2x2 <420 x1, x2≥0arrow_forwardBasically, you must build a desktop/android application that utilizes cryptographic techniques/protocols to secure communication (or data at rest). Try to achieve confidentiality, integrity, availability, authentication, non-repudiation (preferably all of them, otherwise few of them based on the requirement).You must demonstrate the use of these cryptographic techniques by showing some outputs/visualization results or captured traffic such as through Wireshark.1. Secure Chat ApplicationDescription: Build an encrypted chat application for desktop or Android that ensures confidentiality, integrity, authentication, and non-repudiation.Features:-- End-to-end encryption using AES-256 or Signal Protocol.--Digital signatures for non-repudiation.--Message integrity verification using HMAC.Secure login using two-factor authentication (2FA).--Server-side availability mechanisms (e.g., load balancing, backup storage). Technologies: Python (PyQt + PyCryptodome), Java (Android), Firebase for…arrow_forwardQ1: Draw the equation of z with constraints according to the graphic method Max Z-3 P1+5 P2 s.t. P1 4 P2 6 3 P1+2 P2 <18 P1, P2 20arrow_forward
- Using MATLAB, plot the unit-step response curve for the following transfer function and Using MATLAB, obtain the rise time, peak time, maximum overshoot, and settling time. Auto Controls Provide codesarrow_forwardUse Routh's stability criterion to determine how many roots with positive real partsthe following equations have Auto Controls Show full solutionsarrow_forwardPlease answer the questions in the picture. Thank you for your help!arrow_forward
- MATLAB: An Introduction with ApplicationsEngineeringISBN:9781119256830Author:Amos GilatPublisher:John Wiley & Sons IncEssentials Of Materials Science And EngineeringEngineeringISBN:9781337385497Author:WRIGHT, Wendelin J.Publisher:Cengage,Industrial Motor ControlEngineeringISBN:9781133691808Author:Stephen HermanPublisher:Cengage Learning
- Basics Of Engineering EconomyEngineeringISBN:9780073376356Author:Leland Blank, Anthony TarquinPublisher:MCGRAW-HILL HIGHER EDUCATIONStructural Steel Design (6th Edition)EngineeringISBN:9780134589657Author:Jack C. McCormac, Stephen F. CsernakPublisher:PEARSONFundamentals of Materials Science and Engineering...EngineeringISBN:9781119175483Author:William D. Callister Jr., David G. RethwischPublisher:WILEY





