This growing collection consists of scholarly works authored by ASU-affiliated faculty, staff, and community members, and it contains many open access articles. ASU-affiliated authors are encouraged to Share Your Work in KEEP.

Displaying 1 - 10 of 29
Filtering by

Clear all filters

141463-Thumbnail Image.png
Description

Five immunocompetent C57BL/6-cBrd/cBrd/Cr (albino C57BL/6) mice were injected with GL261-luc2 cells, a cell line sharing characteristics of human glioblastoma multiforme (GBM). The mice were imaged using magnetic resonance (MR) at five separate time points to characterize growth and development of the tumor. After 25 days, the final tumor volumes of

Five immunocompetent C57BL/6-cBrd/cBrd/Cr (albino C57BL/6) mice were injected with GL261-luc2 cells, a cell line sharing characteristics of human glioblastoma multiforme (GBM). The mice were imaged using magnetic resonance (MR) at five separate time points to characterize growth and development of the tumor. After 25 days, the final tumor volumes of the mice varied from 12 mm3 to 62 mm3, even though mice were inoculated from the same tumor cell line under carefully controlled conditions. We generated hypotheses to explore large variances in final tumor size and tested them with our simple reaction-diffusion model in both a 3-dimensional (3D) finite difference method and a 2-dimensional (2D) level set method. The parameters obtained from a best-fit procedure, designed to yield simulated tumors as close as possible to the observed ones, vary by an order of magnitude between the three mice analyzed in detail. These differences may reflect morphological and biological variability in tumor growth, as well as errors in the mathematical model, perhaps from an oversimplification of the tumor dynamics or nonidentifiability of parameters. Our results generate parameters that match other experimental in vitro and in vivo measurements. Additionally, we calculate wave speed, which matches with other rat and human measurements.

ContributorsRutter, Erica (Author) / Stepien, Tracy (Author) / Anderies, Barrett (Author) / Plasencia, Jonathan (Author) / Woolf, Eric C. (Author) / Scheck, Adrienne C. (Author) / Turner, Gregory H. (Author) / Liu, Qingwei (Author) / Frakes, David (Author) / Kodibagkar, Vikram (Author) / Kuang, Yang (Author) / Preul, Mark C. (Author) / Kostelich, Eric (Author) / College of Liberal Arts and Sciences (Contributor)
Created2017-05-31
141494-Thumbnail Image.png
Description

Background:
Data assimilation refers to methods for updating the state vector (initial condition) of a complex spatiotemporal model (such as a numerical weather model) by combining new observations with one or more prior forecasts. We consider the potential feasibility of this approach for making short-term (60-day) forecasts of the growth and

Background:
Data assimilation refers to methods for updating the state vector (initial condition) of a complex spatiotemporal model (such as a numerical weather model) by combining new observations with one or more prior forecasts. We consider the potential feasibility of this approach for making short-term (60-day) forecasts of the growth and spread of a malignant brain cancer (glioblastoma multiforme) in individual patient cases, where the observations are synthetic magnetic resonance images of a hypothetical tumor.

Results:
We apply a modern state estimation algorithm (the Local Ensemble Transform Kalman Filter), previously developed for numerical weather prediction, to two different mathematical models of glioblastoma, taking into account likely errors in model parameters and measurement uncertainties in magnetic resonance imaging. The filter can accurately shadow the growth of a representative synthetic tumor for 360 days (six 60-day forecast/update cycles) in the presence of a moderate degree of systematic model error and measurement noise.

Conclusions:
The mathematical methodology described here may prove useful for other modeling efforts in biology and oncology. An accurate forecast system for glioblastoma may prove useful in clinical settings for treatment planning and patient counseling.

ContributorsKostelich, Eric (Author) / Kuang, Yang (Author) / McDaniel, Joshua (Author) / Moore, Nina Z. (Author) / Martirosyan, Nikolay L. (Author) / Preul, Mark C. (Author) / College of Liberal Arts and Sciences (Contributor)
Created2011-12-21
Description

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks

A relatively unexplored issue in cybersecurity science and engineering is whether there exist intrinsic patterns of cyberattacks. Conventional wisdom favors absence of such patterns due to the overwhelming complexity of the modern cyberspace. Surprisingly, through a detailed analysis of an extensive data set that records the time-dependent frequencies of attacks over a relatively wide range of consecutive IP addresses, we successfully uncover intrinsic spatiotemporal patterns underlying cyberattacks, where the term “spatio” refers to the IP address space. In particular, we focus on analyzing macroscopic properties of the attack traffic flows and identify two main patterns with distinct spatiotemporal characteristics: deterministic and stochastic. Strikingly, there are very few sets of major attackers committing almost all the attacks, since their attack “fingerprints” and target selection scheme can be unequivocally identified according to the very limited number of unique spatiotemporal characteristics, each of which only exists on a consecutive IP region and differs significantly from the others. We utilize a number of quantitative measures, including the flux-fluctuation law, the Markov state transition probability matrix, and predictability measures, to characterize the attack patterns in a comprehensive manner. A general finding is that the attack patterns possess high degrees of predictability, potentially paving the way to anticipating and, consequently, mitigating or even preventing large-scale cyberattacks using macroscopic approaches.

ContributorsChen, Yu-Zhong (Author) / Huang, Zi-Gang (Author) / Xu, Shouhuai (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-05-20
Description

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low

Supply-demand processes take place on a large variety of real-world networked systems ranging from power grids and the internet to social networking and urban systems. In a modern infrastructure, supply-demand systems are constantly expanding, leading to constant increase in load requirement for resources and consequently, to problems such as low efficiency, resource scarcity, and partial system failures. Under certain conditions global catastrophe on the scale of the whole system can occur through the dynamical process of cascading failures. We investigate optimization and resilience of time-varying supply-demand systems by constructing network models of such systems, where resources are transported from the supplier sites to users through various links. Here by optimization we mean minimization of the maximum load on links, and system resilience can be characterized using the cascading failure size of users who fail to connect with suppliers.

We consider two representative classes of supply schemes: load driven supply and fix fraction supply. Our findings are: (1) optimized systems are more robust since relatively smaller cascading failures occur when triggered by external perturbation to the links; (2) a large fraction of links can be free of load if resources are directed to transport through the shortest paths; (3) redundant links in the performance of the system can help to reroute the traffic but may undesirably transmit and enlarge the failure size of the system; (4) the patterns of cascading failures depend strongly upon the capacity of links; (5) the specific location of the trigger determines the specific route of cascading failure, but has little effect on the final cascading size; (6) system expansion typically reduces the efficiency; and (7) when the locations of the suppliers are optimized over a long expanding period, fewer suppliers are required. These results hold for heterogeneous networks in general, providing insights into designing optimal and resilient complex supply-demand systems that expand constantly in time.

ContributorsZhang, Si-Ping (Author) / Huang, Zi-Gang (Author) / Dong, Jia-Qi (Author) / Eisenberg, Daniel (Author) / Seager, Thomas (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-06-23
127885-Thumbnail Image.png
Description

Research has shown that construction projects in Saudi Arabia have exhibited poor performance for the past three decades. The traditional risk management practices have been ineffective at helping contractors deliver projects on time and within budget while meeting quality expectations. Studies have identified that client decision making is one of

Research has shown that construction projects in Saudi Arabia have exhibited poor performance for the past three decades. The traditional risk management practices have been ineffective at helping contractors deliver projects on time and within budget while meeting quality expectations. Studies have identified that client decision making is one of the main causes of risks that occur on projects in Saudi Arabia. This paper proposes a new risk management model that can minimize client decision making, and enable the client to utilize expertise, thereby improving project quality and performance. The model is derived from the Information Measurement Theory (IMT) and Performance Information Procurement System (PIPS), both developed at Arizona State University in the United States (U.S.). The model has been tested over 1800 times in both construction and non-construction projects, showing a decrease in required management by owner by up to 80% and an increase in efficiency up to 40%.

ContributorsAlgahtany, Mohammed (Author) / Alhammadi, Yasir (Author) / Kashiwagi, Dean (Author) / Ira A. Fulton School of Engineering (Contributor)
Created2016-05-20
127879-Thumbnail Image.png
Description

Brazil has had issues in efficiently providing the required amount of electricity to its citizens at a low cost. One of the main causes to the decreasing performance of energy is due to reoccurring droughts that decrease the power generated by hydroelectric facilities. To compensate for the decrease, Brazil brought

Brazil has had issues in efficiently providing the required amount of electricity to its citizens at a low cost. One of the main causes to the decreasing performance of energy is due to reoccurring droughts that decrease the power generated by hydroelectric facilities. To compensate for the decrease, Brazil brought into use thermal power plants. The power plants being on average 23.7% more expensive than hydroelectric. Wind energy is potentially an alternative source of energy to compensate for the energy decrease during droughts. Brazil has invested in wind farms recently, but, due to issues with the delivery method, only 34% of wind farms are operational. This paper reviews the potential benefit Brazil could receive from investing more resources into developing and operating wind farms. It also proposes that utilization of the best value approach in delivering wind farms could produce operational wind farms quicker and more efficiently than previously experienced.

ContributorsOliveira, Carlos (Author) / Zulanas, Charles (Author) / Kashiwagi, Dean (Author) / Ira A. Fulton School of Engineering (Contributor)
Created2016-05-20
127852-Thumbnail Image.png
Description

Delays are a major cause for concern in the construction industry in Saudi Arabia. This paper identifies the main causes of delay in infrastructure projects in Mecca, Saudi Arabia, and compares these with projects around the country and other Gulf countries. Data was obtained from 49 infrastructure projects undertaken by

Delays are a major cause for concern in the construction industry in Saudi Arabia. This paper identifies the main causes of delay in infrastructure projects in Mecca, Saudi Arabia, and compares these with projects around the country and other Gulf countries. Data was obtained from 49 infrastructure projects undertaken by the owner and were analyzed quantitatively to understand the severity and causes of delay. 10 risk factors were identified and were grouped into four categories. Average delay in infrastructure projects in Mecca was found to be 39%. The most severe cause of delay was found to be the land acquisition factor. This highlights the critical land ownership and acquisition issues that are prevailing in the city. Additionally, other factors that contribute to delay include contractors’ lack of expertise, re-designing, and haphazard underground utilities (line services). It is concluded that the majority of project delays were caused from the owner's side as compared to contractors, consultants, and other project's stakeholders. This finding matched with the research findings of the Gulf Countries Construction (GCC) Industry's literature. This study fills an important practice and research gap for improving the efficiency in delivering infrastructure projects in the holy city of Mecca and Gulf countries at large.

ContributorsElawi, Ghazi (Author) / Algahtany, Mohammed (Author) / Kashiwagi, Dean (Author) / Ira A. Fulton School of Engineering (Contributor)
Created2016-05-20
127847-Thumbnail Image.png
Description

This paper is part of doctoral research to improve the current Saudi Arabian (SA) procurement system. SA has the largest construction market in the Middle East. However, the use of the traditional procurement system in SA has been identified as one of the causes for poor performance in the delivery

This paper is part of doctoral research to improve the current Saudi Arabian (SA) procurement system. SA has the largest construction market in the Middle East. However, the use of the traditional procurement system in SA has been identified as one of the causes for poor performance in the delivery of construction. The system has been identified as a major risk to the SA government, due to consistent increased costs and delays of up to 70% on projects. A survey was conducted with 1396 participants including engineers, buyers, contractors, consultants, academics, and architects. The purpose of the survey was to identify the validity of the recent claims that the procurement system in SA is broken. The participants work in both the private and government sectors. The survey results showed that the procurement system is a major risk to projects, affects construction projects negatively, and is in need of improvement.

ContributorsAlofi, Ahmed (Author) / Kashiwagi, Jacob (Author) / Kashiwagi, Dean (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2016-05-20
129254-Thumbnail Image.png
Description

Over the past couple of decades, quality has been an area of increased focus. Multiple models and approaches have been proposed to measure the quality in the construction industry. This paper focuses on determining the quality of one of the types of roofing systems used in the construction industry, i.e.,

Over the past couple of decades, quality has been an area of increased focus. Multiple models and approaches have been proposed to measure the quality in the construction industry. This paper focuses on determining the quality of one of the types of roofing systems used in the construction industry, i.e., sprayed polyurethane foam roofs (SPF roofs). Thirty-seven urethane-coated SPF roofs that were installed in 2005/2006 were visually inspected to measure the percentage of blisters and repairs three times over a period of four years, six years, and seven years. A repairing criteria was established after a six-year mark based on the data that were reported to contractors as vulnerable roofs. Furthermore, the relation between four possible contributing time-of-installation factors—contractor, demographics, season, and difficulty (number of penetrations and size of the roof in square feet) that could affect the quality of the roof was determined. Demographics and difficulty did not affect the quality of the roofs, whereas the contractor and the season when the roof was installed did affect the quality of the roofs.

ContributorsGajjar, Dhaval (Author) / Kashiwagi, Dean (Author) / Sullivan, Kenneth (Author) / Kashiwagi, Jacob (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-04-01
129233-Thumbnail Image.png
Description

Most previous works on complete synchronization of chaotic oscillators focused on the one-channel interaction scheme where the oscillators are coupled through only one variable or a symmetric set of variables. Using the standard framework of master-stability function (MSF), we investigate the emergence of complex synchronization behaviors under all possible configurations

Most previous works on complete synchronization of chaotic oscillators focused on the one-channel interaction scheme where the oscillators are coupled through only one variable or a symmetric set of variables. Using the standard framework of master-stability function (MSF), we investigate the emergence of complex synchronization behaviors under all possible configurations of two-channel coupling, which include, for example, all possible cross coupling schemes among the dynamical variables. Utilizing the classic Rössler and Lorenz oscillators, we find a rich variety of synchronization phenomena not present in any previously extensively studied, single-channel coupling configurations. For example, in many cases two coupling channels can enhance or even generate synchronization where there is only weak or no synchronization under only one coupling channel, which has been verified in a coupled neuron system. There are also cases where the oscillators are originally synchronized under one coupling channel, but an additional synchronizable coupling channel can, however, destroy synchronization. Direct numerical simulations of actual synchronization dynamics verify the MSF-based predictions. Our extensive computation and heuristic analysis provide an atlas for synchronization of chaotic oscillators coupled through two channels, which can be used as a systematic reference to facilitate further research in this area.

ContributorsYang, Wenchao (Author) / Huang, Zi-Gang (Author) / Wang, Xingang (Author) / Huang, Liang (Author) / Yang, Lei (Author) / Lai, Ying-Cheng (Author) / Ira A. Fulton Schools of Engineering (Contributor)
Created2015-02-18