This document discusses heat treatment methods for controlling material properties of metals and alloys. It describes how heating metals to certain temperatures can cause phase changes that modify microstructures and influence properties like strength, hardness, and wear resistance. Specific heat treatment methods are outlined, including hardening, annealing, normalizing, and tempering, and how they impact phase transformations and material properties on iron-carbon phase diagrams. Surface hardening techniques are also mentioned.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
PPT Includes physical Metallurgy for Titanium and its alloys, Weld ability of them and two welding processes : GTAW and EBW. PPT also describes the Problems with the Welding of Titanium and alloys.
PPT Includes physical Metallurgy for Titanium and its alloys, Weld ability of them and two welding processes : GTAW and EBW. PPT also describes the Problems with the Welding of Titanium and alloys.
Part a). Pearlite - Pearlite is a two-phased, lamellar (or l.pdfannaelctronics
>> Part a).
>> Pearlite :- Pearlite is a two-phased, lamellar (or layered) structure composed of alternating
layers of ferrite (88 wt%) and cementite (12 wt%) that occurs in some steels and cast irons. In
fact, the lamellar appearance is misleading since the individual lamellae within a colony are
connected in three dimensions; a single colony is therefore an interpenetrating bicrystal of ferrite
and cementite. In an iron-carbon alloy, during slow cooling pearlite forms by a eutectoid reaction
as austenite cools below 727 °C (1,341 °F) (the eutectoid temperature). Pearlite is a
microstructure occurring in many common grades of steels.
>> Cementite :- Cementite, also known as iron carbide, is an interstitial compound of iron and
carbon, more precisely an intermediate transition metal carbide with the formula Fe3C. By
weight, it is 6.67% carbon and 93.3% iron. It has an orthorhombic crystal structure. It is a hard,
brittle material, normally classified as a ceramic in its pure form, though it is more important in
ferrous metallurgy. While iron carbide is present in most steels and cast irons, it is produced as a
raw material in the Iron Carbide process, which belongs to the family of alternative ironmaking
technologies.
>> Austenite :- Austenite, also known as gamma-phase iron (-Fe), is a metallic, non-magnetic
allotrope of iron or a solid solution of iron, with analloying element. In plain-carbon steel,
austenite exists above the critical eutectoid temperature of 1,000 K (1,340 °F; 730 °C); other
alloys of steel have different eutectoid temperatures. It is Face Centred Cubic Configuration
(FCC).
>> Eutectoid Phase :- When the solution above the transformation point is solid, rather than
liquid, an analogous eutectoid transformation can occur. For instance, in the iron-carbon system,
the austenite phase can undergo a eutectoidtransformation to produce ferrite and cementite, often
in lamellar structures such as pearlite and bainite.
>> Proeutectoid :- When a hot steel with carbon content very close to 0.8%, is cooled down
slowly, there is a temperature (723 deg C) at which a constant-temperature transformation takes
place. This is called eutectoid transformation. And this results in formation of alternate layers of
Ferrite and Iron-Carbide (Fe3C).
But if the carbon content in this hot steel is much less than 0.8%, and it is cooled down slowly,
then till the temperature reduces to 723 deg C, a part of Austenite (also called gamma iron) gets
transformed to Ferrite by rejecting carbon from the solution. This is not a constant-temperature
process and occurs over a range of temperature. The ferrite so formed is called Proeutectoid...At
723 deg C, all the remaining Austenite get converted to Pearlite at this constant temperature -
which is nothing but alternate layers of Ferrite and cementite
>> Martensite :- Martensite, most commonly refers to a very hard form of steel crystalline
structure, but it can also refer to any crystal structure that is form.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Phase Diagram & Heat Treatment Of Metals
1. Dr. Pulak M. Pandey
http:/ / paniit.iitd.ac.in/ ~ pmpandey
2. Metals and alloys may not posses all the desired
properties in the finished product. Alloying and heat
treatment are two methods which are extensively
used for controlling material properties.
In heat treatment, the microstructures of materials
are modified. The resulting phase transformation
influences mechanical properties like strength,
ductility, toughness, hardness and wear resistance.
Purpose of heat treatment is to increase service life
of a product by increasing its strength of hardness, or
prepare the material for improved manufacturability
The basis of change in properties is phase or
equilibrium diagrams
3.
4. FE-C Phase Diagram
In the phase diagram Carbon percentage is shown up to 6% only
since commercially pure iron contains up to 0.008% C, Steels up to
2.11% C and C.I.s up to 6.67% C.
Pure iron melts at 1583o C. When it cools first it forms delta ferrite,
then austenite and finally alpha ferrite.
Alpha ferrite or ferrite is a solid solution of BCC iron with a maximum
solid solubility of 0.022% C at a temperature of 727oC.
Delta ferrite has no practical significance as it is stable only at high
temperatures.
Ferrite (derived from Latin word Ferrum) is relatively soft and ductile
and is magnetic up to 768oC.
Iron, between 1394 to 912oC, undergoes transformation form BCC to
FCC structure to give Gamma iron, commonly known as Austenite.
The solid solubility of Austenite is much higher than ferrite and is up to
2.11 % C. Austenite is denser than ferrite and more ductile at higher
temperatures.
Steel in austenitic form is non-magnetic.
Cementite, represented by right hand boundary of the phase diagram,
is 100% iron carbide with 6.67% C. Cementite is very hard and brittle
inter-metallic compound.
5. Eutectic point
Hyper-eutectic sttel
Hypo-eutectic
steel
XX: Eutectoid Reaction
6. Eutectoid Reaction
When iron containing 0.77%C, is cooled from
1100oC, in the austenitic phase (line XX), a reaction
takes place, when the temperature reaches 727oC,
which converts it to ferrite (BCC) and cementite.
This reaction is called Eutectoid Reaction.
The resultant microstructure of eutectoid steel is
called Pearlite which contains alternate layers of
ferrite and cementite.
Mech. Prop. Of Pearlite is therefore in between soft
and ductile ferrite and hard and brittle cementite.
7. Hypo-eutectoid Steel
Similarly when the carbon content is less than 0.77%
(line YY) the material is entirely austenitic at higher
temperature, but cooling it enters the region of stable
ferrite and austenite.
At 727oC the austenite is of eutectoid composition
and has 0.77%C, and on further cooing the
remaining austenite transforms into pearlite. The
resulting structure is proeutectoid ferrite and pearlite.
8. Hyper-eutectoid Steel
When steel cool along line ZZ, the proeutectoid
phase is ferrite than austenite. As the carbon-rich
phase forms, the remaining austenite decreases in
carbon content and reaches eutectoid composition at
727oC.
Any remaining austenite, transforms into pearlite
below 727oC.
The resulting structure has continuous network of
cementite which causes the material to be extremely
brittle.
Point to be noted here that these transformations
are obtained during slow cooling, however by rapid
cooling entirely different results are obtained since
sufficient time is not available for phase reaction to
occur.
9. Time-Temperature-Transformation
(TTT) Diagram for Steel
Pearlite is produced if
cooling rate is slow like
in air or in a furnace.
Fine pearlite is harder
and less ductile than
coarse pearlite.
Bainite is a very fine
microstructure,
consisiting of ferrite and
cementite, somewhat
like Pearlite but have
different
morphology.This phase
is stronger and more
ductile than pearlite.
TTT diagram of Eutectic Steel
10. When austenite is
cooled at a very high
rate, such as quenching
it in water, its FCC
structure transforms to
Body Centered
Tetragonal (BCT) known
as Martensite.
It is a extremely hard
and brittle phase which
lacks toughness, so
limited use.
11. Microstructures
Unit cells of FCC, BCC, BCT structures
Pearlite Martensite 99% Matensite
12. Hardening
Hardening is performed to impart strength and hardness to
alloys by heating up to a certain temperature, depending
on the material, and cooling it rapidly.
Steel is heated up to austenitic region and held there until
its carbon is dissolved, and then cooled rapidly, the carbon
does not get sufficient time to escape and get dissipated in
the lattice structure. This helps in locking the dislocation
movements when stresses are applied.
Quenching is performed to cool hot metal rapidly by
immersing it in brine (salt water), water, oil, molten salt,
air or gas. Quenching sets up residual stresses in the
workpiece and sometimes results in cracks. Residual
stresses are removed by another process called annealing.
13. Annealing
Annealing is performed to reduce
hardness, remove residual
stresses, improve toughness,
restore ductility, and to alter
various mechanical, electrical or
magnetic properties of material
trough refinement of grains.
Cooling rate is very slow around
10oC per hour. Process is carried
out in a controlled atmosphere of
inert gas to avoid oxidation.
Partial annealing is incomplete
annealing and there is partial
phase transformation however in
sub-critical annealing there is no
phase transformation.
Used to achieve ductility in work
hardened steels.
14. Normalizing
The process is similar to annealing and is carried out to avoid
excessive softness in the material.
The material is heated above austenitic phase and then cooled
in air . This gives relatively faster cooing and hence enhanced
hardness and less ductility.
In this process, austenite is decomposed in ferrite and carbide
at relatively lower temperature and fine pearlite is produced.
Normalizing is less expensive than annealing.
In normalization variation in properties of different sections of a
part is achieved.
The selection of heat treatment operations is strongly influenced
by the carbon content in th esteel.
16. Tempering
Martensite is very hard and
brittle.
Tempering is applied to hardened
steel to reduce brittleness,
increase ductility, and toughness
and relieve stresses in martensite
structure.
In this process, the steel is
heated to lower critical
temperature keeping it there for
about one hour and then cooled
slowly at prescribed rate.
This process increses ductility and
toughness but also reduces
hardness, strength and wear
resistance marginally. Increase in
tempering temperature lowers
the hardness.
17. Surface Hardening
Heat treatment methods in general change the properties
of entire material.
Hardening improves wear resistance of material but lowers
impact resistance and fatigue life. Therefore sometimes
there is requirement of surface hardening
Two methods are used, first is heating and cooing to get
required phase, and second is thermo-chemical treatment.
Induction heating
Flame hardening
High frequency resistance heating
Laser beam hardening
Electron beam hardening
Carburizing
Nitriding
Cyanding
18. This document was created with Win2PDF available at http://www.daneprairie.com.
The unregistered version of Win2PDF is for evaluation or non-commercial use only.