Safety and reliability are primary concerns in launch vehicle performance due to the involved costs and risk. Pressure vessels are one of the significant subsystems of launch vehicles. In order to have minimal weight, high strength material viz. maraging steel M250 grade is used in realizing the pressure vessel casing hardware. Despite the best efforts in design methodology, quality evaluation in production and effective structural integrity assessment is still a farfetched goal. The evolution of such a system requires, first, identification of an appropriate technique and next its adoption to meet the challenges posed by advanced materials like maraging steels. In fact, a quick survey of the available Non-Destructive Evaluation (NDE) techniques suggests Acoustic Emission (AE) as an effective structural integrity assessment tool capable of identifying any impending failure or degradation at an earlier stage. Experience shows that the longitudinal welds in the pressure vessels are quite vulnerable to failure due to the fact that they experience the maximum stress (i.e. hoop stress). Loading welded tensile samples are quite synonymous to the hoop stress experienced by longitudinal welds. An attempt is made to compare the Acoustic Emission data acquired during tensile deformation of maraging steel welded specimens. A total of 16 welded specimen’s with known defects were studied for their tensile behaviour is in connection with Acoustic Emission data. The lowest failure load was 70.5 kN and the highest being 84.8 kN. AE activity graphs viz. cumulative AE activity, hit rate, energy rate, count rate, AE amplitude history, AE count history, AE energy history, amplitude-count correlation and hit amplitude distribution have been investigated and salient features with respect to the data have been critically studied and relevant correlations are arrived at.
The paper presents the susceptibility of AE44 magnesium alloy to electrochemical corrosion and stress corrosion cracking (SCC). The evaluation of the intensity of the interaction of the corrosive environment was carried out using the corrosion tests and the Slow Strain Rate Test (SSRT). Corrosion tests performed in 0.1 M Na2SO4 solution (immersion in solution and under cathodic polarization conditions) revealed that the layer of corrosion products was much thicker after immersion test. The results of SSRT showed that the AE44 alloy deformed in the solution was characterized by higher plasticity compared to the alloy deformed in the air after immersion in solution. Moreover, the fractures were characterized by different morphology. In the case of an alloy deformed in the solution under cathodic polarization many microcracks on the fracture were observed, which were not observed in the case of the alloy deformed in the air.
The results of the Charpy impact test of AE-type magnesium alloys produced by the high pressure die casting method are presented. Three alloys with different weight fractions of rare earth elements (RE; e.g. 1, 3 and 5 wt%) and the same mass fraction of aluminium (5 wt%) were prepared. The casts were fabricated using a typical cold chamber high pressure die casting machine with a 3.8 MN locking force. Microstructural analyses were performed by means of a scanning electron microscope (SEM). The impact strength (IS) was determined using a Charpy V hammer with an impact energy equal to 150 J. The microstructure of the experimental alloys consisted of an -Mg solid solution and Al11RE3, Al10Ce2Mn7 and Al2RE intermetallic compounds. The obtained results show the significant influence of the rare earth elements to aluminium ratio on the impact strength of the investigated materials. Lower the RE/Al ratio in the chemical composition of the alloy results in a higher impact strength of the material.
This article describes security mechanisms used by 3rd-7th layers in OSI/ISO network model. Many of commonly used protocols by these layers were designed with assumption that there are nointruders. Such assumption was true many years ago. The network situation has been changed for last few years and we should realize that some properties of existing protocols may be abused. Moreover, we should exchange some of them or create new versions. There are some methods and guidelines concerning secure programming, but there is also lack of guidelines about creating secure protocols. Authors see the necessity of such guideline and this article is an attempt at analysing existing solutions and selecting some universal and important patterns.