This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 74
152030-Thumbnail Image.png
Description
Recently, the use of zinc oxide (ZnO) nanowires as an interphase in composite materials has been demonstrated to increase the interfacial shear strength between carbon fiber and an epoxy matrix. In this research work, the strong adhesion between ZnO and carbon fiber is investigated to elucidate the interactions at the

Recently, the use of zinc oxide (ZnO) nanowires as an interphase in composite materials has been demonstrated to increase the interfacial shear strength between carbon fiber and an epoxy matrix. In this research work, the strong adhesion between ZnO and carbon fiber is investigated to elucidate the interactions at the interface that result in high interfacial strength. First, molecular dynamics (MD) simulations are performed to calculate the adhesive energy between bare carbon and ZnO. Since the carbon fiber surface has oxygen functional groups, these were modeled and MD simulations showed the preference of ketones to strongly interact with ZnO, however, this was not observed in the case of hydroxyls and carboxylic acid. It was also found that the ketone molecules ability to change orientation facilitated the interactions with the ZnO surface. Experimentally, the atomic force microscope (AFM) was used to measure the adhesive energy between ZnO and carbon through a liftoff test by employing highly oriented pyrolytic graphite (HOPG) substrate and a ZnO covered AFM tip. Oxygen functionalization of the HOPG surface shows the increase of adhesive energy. Additionally, the surface of ZnO was modified to hold a negative charge, which demonstrated an increase in the adhesive energy. This increase in adhesion resulted from increased induction forces given the relatively high polarizability of HOPG and the preservation of the charge on ZnO surface. It was found that the additional negative charge can be preserved on the ZnO surface because there is an energy barrier since carbon and ZnO form a Schottky contact. Other materials with the same ionic properties of ZnO but with higher polarizability also demonstrated good adhesion to carbon. This result substantiates that their induced interaction can be facilitated not only by the polarizability of carbon but by any of the materials at the interface. The versatility to modify the magnitude of the induced interaction between carbon and an ionic material provides a new route to create interfaces with controlled interfacial strength.
ContributorsGalan Vera, Magdian Ulises (Author) / Sodano, Henry A (Thesis advisor) / Jiang, Hanqing (Committee member) / Solanki, Kiran (Committee member) / Oswald, Jay (Committee member) / Speyer, Gil (Committee member) / Arizona State University (Publisher)
Created2013
151523-Thumbnail Image.png
Description
Shock loading is a complex phenomenon that can lead to failure mechanisms such as strain localization, void nucleation and growth, and eventually spall fracture. Studying incipient stages of spall damage is of paramount importance to accurately determine initiation sites in the material microstructure where damage will nucleate and grow and

Shock loading is a complex phenomenon that can lead to failure mechanisms such as strain localization, void nucleation and growth, and eventually spall fracture. Studying incipient stages of spall damage is of paramount importance to accurately determine initiation sites in the material microstructure where damage will nucleate and grow and to formulate continuum models that account for the variability of the damage process due to microstructural heterogeneity. The length scale of damage with respect to that of the surrounding microstructure has proven to be a key aspect in determining sites of failure initiation. Correlations have been found between the damage sites and the surrounding microstructure to determine the preferred sites of spall damage, since it tends to localize at and around the regions of intrinsic defects such as grain boundaries and triple points. However, considerable amount of work still has to be done in this regard to determine the physics driving the damage at these intrinsic weak sites in the microstructure. The main focus of this research work is to understand the physical mechanisms behind the damage localization at these preferred sites. A crystal plasticity constitutive model is implemented with different damage criteria to study the effects of stress concentration and strain localization at the grain boundaries. A cohesive zone modeling technique is used to include the intrinsic strength of the grain boundaries in the simulations. The constitutive model is verified using single elements tests, calibrated using single crystal impact experiments and validated using bicrystal and multicrystal impact experiments. The results indicate that strain localization is the predominant driving force for damage initiation and evolution. The microstructural effects on theses damage sites are studied to attribute the extent of damage to microstructural features such as grain orientation, misorientation, Taylor factor and the grain boundary planes. The finite element simulations show good correlation with the experimental results and can be used as the preliminary step in developing accurate probabilistic models for damage nucleation.
ContributorsKrishnan, Kapil (Author) / Peralta, Pedro (Thesis advisor) / Mignolet, Marc (Committee member) / Sieradzki, Karl (Committee member) / Jiang, Hanqing (Committee member) / Oswald, Jay (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
153495-Thumbnail Image.png
Description
Recent studies of the occurrence of post-flutter limit cycle oscillations (LCO) of the F-16 have provided good support to the long-standing hypothesis that this phenomenon involves a nonlinear structural damping. A potential mechanism for the appearance of nonlinearity in the damping are the nonlinear geometric effects that arise when the

Recent studies of the occurrence of post-flutter limit cycle oscillations (LCO) of the F-16 have provided good support to the long-standing hypothesis that this phenomenon involves a nonlinear structural damping. A potential mechanism for the appearance of nonlinearity in the damping are the nonlinear geometric effects that arise when the deformations become large enough to exceed the linear regime. In this light, the focus of this investigation is first on extending nonlinear reduced order modeling (ROM) methods to include viscoelasticity which is introduced here through a linear Kelvin-Voigt model in the undeformed configuration. Proceeding with a Galerkin approach, the ROM governing equations of motion are obtained and are found to be of a generalized van der Pol-Duffing form with parameters depending on the structure and the chosen basis functions. An identification approach of the nonlinear damping parameters is next proposed which is applicable to structures modeled within commercial finite element software.

The effects of this nonlinear damping mechanism on the post-flutter response is next analyzed on the Goland wing through time-marching of the aeroelastic equations comprising a rational fraction approximation of the linear aerodynamic forces. It is indeed found that the nonlinearity in the damping can stabilize the unstable aerodynamics and lead to finite amplitude limit cycle oscillations even when the stiffness related nonlinear geometric effects are neglected. The incorporation of these latter effects in the model is found to further decrease the amplitude of LCO even though the dominant bending motions do not seem to stiffen as the level of displacements is increased in static analyses.
ContributorsSong, Pengchao (Author) / Mignolet, Marc P (Thesis advisor) / Chattopadhyay, Aditi (Committee member) / Oswald, Jay (Committee member) / Arizona State University (Publisher)
Created2015
153325-Thumbnail Image.png
Description
The football helmet is a device used to help mitigate the occurrence of impact-related traumatic (TBI) and minor traumatic brain injuries (mTBI) in the game of American football. The current design methodology of using a hard shell with an energy absorbing liner may be adequate for minimizing TBI, however it

The football helmet is a device used to help mitigate the occurrence of impact-related traumatic (TBI) and minor traumatic brain injuries (mTBI) in the game of American football. The current design methodology of using a hard shell with an energy absorbing liner may be adequate for minimizing TBI, however it has had less effect in minimizing mTBI. The latest research in brain injury mechanisms has established that the current design methodology has produced a helmet to reduce linear acceleration of the head. However, angular accelerations also have an adverse effect on the brain response, and must be investigated as a contributor of brain injury.

To help better understand how the football helmet design features effect the brain response during impact, this research develops a validated football helmet model and couples it with a full LS-DYNA human body model developed by the Global Human Body Modeling Consortium (v4.1.1). The human body model is a conglomeration of several validated models of different sections of the body. Of particular interest for this research is the Wayne State University Head Injury Model for modeling the brain. These human body models were validated using a combination of cadaveric and animal studies. In this study, the football helmet was validated by laboratory testing using drop tests on the crown of the helmet. By coupling the two models into one finite element model, the brain response to impact loads caused by helmet design features can be investigated. In the present research, LS-DYNA is used to study a helmet crown impact with a rigid steel plate so as to obtain the strain-rate, strain, and stress experienced in the corpus callosum, midbrain, and brain stem as these anatomical regions are areas of concern with respect to mTBI.
ContributorsDarling, Timothy (Author) / Rajan, Subramaniam D. (Thesis advisor) / Muthuswamy, Jitendran (Thesis advisor) / Oswald, Jay (Committee member) / Mignolet, Marc (Committee member) / Arizona State University (Publisher)
Created2014
153327-Thumbnail Image.png
Description
Monte Carlo simulations are traditionally carried out for the determination of the amplification of forced vibration response of turbomachine/jet engine blades to mistuning. However, this effort can be computationally time consuming even when using the various reduced order modeling techniques. Accordingly, some investigations in the past have focused on obtaining

Monte Carlo simulations are traditionally carried out for the determination of the amplification of forced vibration response of turbomachine/jet engine blades to mistuning. However, this effort can be computationally time consuming even when using the various reduced order modeling techniques. Accordingly, some investigations in the past have focused on obtaining simple approximate estimates for this amplification. In particular, two of these have proposed the use of harmonic patterns of the blade properties around the disk as an approximate alternative to the many random patterns of Monte Carlo analyses. These investigations, while quite encouraging, have relied solely on single degree of freedom per sector models of the rotor.

In this light, the overall focus of the present effort is a revisit of harmonic

mistuning of rotors focusing first the confirmation of the previously obtained findings with a more detailed model of the blisk in both conditions of an isolated blade-dominated resonance and of a veering between blade and disk dominated modes. The latter condition cannot be simulated by a single degree of freedom per sector model. Further, the analysis will consider the distinct cases of mistuning due to variations of material properties (Young's modulus) and geometric properties (geometric mistuning). In the single degree of freedom model, both mistuning types are equivalent but they are not, as demonstrated here, in more realistic models. The difference arises because changes in geometry induce not only changes in natural frequencies of the blades alone but of their modes and the importance of these two sources of variability is discussed with both Monte Carlo simulation and harmonic mistuning results.

The present investigation focuses also on the possible extension of the harmonic mistuning concept and of its quantitative information that can be derived from such analyses. From it, a novel measure of blade-disk coupling is introduced and assessed in comparison with the coupling index introduced in the past. In conclusions, the low cost of harmonic mistuning computations in comparison with full Monte Carlo simulations is

demonstrated to be worthwhile to elucidate the basic behavior of the mistuned rotor in a random setting.
ContributorsSahoo, Saurav (Author) / Mignolet, Marc Paul (Thesis advisor) / Chattopadhyay, Aditi (Committee member) / Oswald, Jay (Committee member) / Arizona State University (Publisher)
Created2014
153099-Thumbnail Image.png
Description
In this dissertation, the results of our comprehensive computational studies of disordered jammed (i.e., mechanically stable) packings of hard particles are presented, including the family of superdisks in 2D and ellipsoids in 3D Euclidean space. Following a very brief introduction to the hard-particle systems, the event driven molecular dynamics (EDMD)

In this dissertation, the results of our comprehensive computational studies of disordered jammed (i.e., mechanically stable) packings of hard particles are presented, including the family of superdisks in 2D and ellipsoids in 3D Euclidean space. Following a very brief introduction to the hard-particle systems, the event driven molecular dynamics (EDMD) employed to generate the packing ensembles will be discussed. A large number of 2D packing configurations of superdisks are subsequently analyzed, through which a relatively accurate theoretical scheme for packing-fraction prediction based on local particle contact configurations is proposed and validated via additional numerical simulations. Moreover, the studies on binary ellipsoid packing in 3D are briefly discussed and the effects of different geometrical parameters on the final packing fraction are analyzed.
ContributorsXu, Yaopengxiao (Author) / Jiao, Yang (Thesis advisor) / Oswald, Jay (Committee member) / Liu, Yongming (Committee member) / Arizona State University (Publisher)
Created2014
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014
153180-Thumbnail Image.png
Description
This research examines several critical aspects of the so-called "film induced cleavage" model of stress corrosion cracking using silver-gold alloys as the parent-phase material. The model hypothesizes that the corrosion generates a brittle nanoporous film, which subsequently fractures forming a high-speed crack that is injected into the uncorroded parent-phase alloy.

This research examines several critical aspects of the so-called "film induced cleavage" model of stress corrosion cracking using silver-gold alloys as the parent-phase material. The model hypothesizes that the corrosion generates a brittle nanoporous film, which subsequently fractures forming a high-speed crack that is injected into the uncorroded parent-phase alloy. This high speed crack owing to its kinetic energy can penetrate beyond the corroded layer into the parent phase and thus effectively reducing strength of the parent phase. Silver-gold alloys provide an ideal system to study this effect, as hydrogen effect can be ruled out on thermodynamic basis. During corrosion of the silver-gold alloy, the less noble metal i.e. silver is removed from the system leaving behind a nanoporous gold (NPG) layer. In the case of polycrystalline material, this corrosion process proceeds deeper along the grain boundary than the matrix grain. All of the cracks with apparent penetration beyond the corroded (dealloyed) layer are intergranular. Our aim was to study the crack penetration depth along the grain boundary to ascertain whether the penetration occurs past the grain-boundary dealloyed depth. EDS and imaging in high-resolution aberration corrected scanning transmission electron microscope (STEM) and atom probe tomography (APT) have been used to evaluate the grain boundary corrosion depth.

The mechanical properties of monolithic NPG are also studied. The motivation behind this is two-fold. The crack injection depth depends on the speed of the crack formed in the nanoporous layer, which in turn depends on the mechanical properties of the NPG. Also NPG has potential applications in actuation, sensing and catalysis. The measured value of the Young's modulus of NPG with 40 nm ligament size and 28% density was ~ 2.5 GPa and the Poisson's ratio was ~ 0.20. The fracture stress was observed to be ~ 11-13 MPa. There was no significant change observed between these mechanical properties on oxidation of NPG at 1.4 V. The fracture toughness value for the NPG was ~ 10 J/m2. Also dynamic fracture tests showed that the NPG is capable of supporting crack velocities ~ 100 - 180 m/s.
ContributorsBadwe, Nilesh (Author) / Sieradzki, Karl (Thesis advisor) / Peralta, Pedro (Committee member) / Oswald, Jay (Committee member) / Mahajan, Ravi (Committee member) / Arizona State University (Publisher)
Created2014