Matching Items (215)
151012-Thumbnail Image.png
Description
Polymeric materials containing nanometer (nm) size particles are being introduced to provide compact shapes for low and medium voltage insulation equipment. The nanocomposites may provide superior electrical performance when compared with those available currently, such as lower dielectric losses and increased dielectric strength, tracking and erosion resistance, and surface hydrophobicity.

Polymeric materials containing nanometer (nm) size particles are being introduced to provide compact shapes for low and medium voltage insulation equipment. The nanocomposites may provide superior electrical performance when compared with those available currently, such as lower dielectric losses and increased dielectric strength, tracking and erosion resistance, and surface hydrophobicity. All of the above mentioned benefits can be achieved at a lower filler concentration (< 10%) than conventional microfillers (40-60%). Also, the uniform shapes of nanofillers provide a better electrical stress distribution as compared to irregular shaped microcomposites which can have high internal electric stress, which could be a problem for devices with active electrical parts. Improvement in electrical performance due to addition of nanofillers in an epoxy matrix has been evaluated in this work. Scanning Electron Microscopy (SEM) was done on the epoxy samples to confirm uniform dispersion of nano-sized fillers as good filler dispersion is essential to realize the above stated benefits. Dielectric spectroscopy experiments were conducted over a wide range of frequencies as a function of temperature to understand the role of space charge and interfaces in these materials. The experiment results demonstrate significant reduction in dielectric losses in samples containing nanofillers. High voltage experiments such as corona resistance tests were conducted over 500 hours to monitor degradation in the samples due to corona. These tests revealed improvements in partial discharge endurance of nanocomposite samples. These improvements could not be adequately explained using a macroscopic quantity such as thermal conductivity. Thermo gravimetric analysis (TGA) showed higher weight loss initiation temperatures for nanofilled samples which is in agreement with the corona resistance experimental results. Theoretical models have also been developed in this work to complement the results of the corona resistance experiment and the TGA analysis. Degradation model was developed to map the erosion path using Dijkstra's shortest path algorithm. A thermal model was developed to calculate the localized temperature distribution in the micro and nano-filled samples using the PDE toolbox in MATLAB. Both the models highlight the fact that improvement in nanocomposites is not limited to the filler concentrations that were tested experimentally.
ContributorsIyer, Ganpathy (Author) / Gorur, Ravi S (Thesis advisor) / Vittal, Vijay (Committee member) / Richert, Ranko (Committee member) / Karady, George G. (Committee member) / Arizona State University (Publisher)
Created2012
151013-Thumbnail Image.png
Description
This research presents potential and electric field calculations on medium voltage (MV) epoxy insulated outdoor current transformers (CTs) using a numeri-cal calculation approach. Two designs of MV dry-type epoxy insulated CTs were modeled using 3D field simulation software COULOMB® 9.0. Potential and elec-tric fields were calculated based on boundary element

This research presents potential and electric field calculations on medium voltage (MV) epoxy insulated outdoor current transformers (CTs) using a numeri-cal calculation approach. Two designs of MV dry-type epoxy insulated CTs were modeled using 3D field simulation software COULOMB® 9.0. Potential and elec-tric fields were calculated based on boundary element method. Different condi-tions such as dry exterior surface, wet exterior surface and internal voids were considered. The research demonstrates that the presence of internal conductors in CTs results in a less severe surface electric field distribution when compared to outdoor insulators of the same voltage range and type. The high electric field near the exited end triple-point of the CT reduces. This remained true even under wet conditions establishing better outdoor performance of CTs than outdoor insulators which have no internal conductors. The effect of internal conductors on voids within the insulation structure was also established. As a down side, internal voids in CTs experience higher electric field stress than in conductor-less insulators. The work recognizes that internal conducting parts in dry type CTs improves their outdoor performance when compared to electrical equipment without internal conductors.
ContributorsLakshmichand Jain, Sandeep Kumar (Author) / Gorur, Ravi (Thesis advisor) / Karady, George G. (Committee member) / Ayyanar, Raja (Committee member) / Arizona State University (Publisher)
Created2012
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
150827-Thumbnail Image.png
Description
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more

In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud systems has become an extremely important prerequisite for bringing interoperability and efficient management to the healthcare industry. Since a shared electronic health record (EHR) essentially represents a virtualized aggregation of distributed clinical records from multiple healthcare providers, sharing of such integrated EHRs may comply with various authorization policies from these data providers. In this work, we focus on the authorized and selective sharing of EHRs among several parties with different duties and objectives that satisfies access control and compliance issues in healthcare cloud computing environments. We present a secure medical data sharing framework to support selective sharing of composite EHRs aggregated from various healthcare providers and compliance of HIPAA regulations. Our approach also ensures that privacy concerns need to be accommodated for processing access requests to patients' healthcare information. To realize our proposed approach, we design and implement a cloud-based EHRs sharing system. In addition, we describe case studies and evaluation results to demonstrate the effectiveness and efficiency of our approach.
ContributorsWu, Ruoyu (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
151127-Thumbnail Image.png
Description
Renewable energy has been a very hot topic in recent years due to the traditional energy crisis. Incentives that encourage the renewables have been established all over the world. Ordinary homeowners are also seeking ways to exploit renewable energy. In this thesis, residential PV system, wind turbine system and a

Renewable energy has been a very hot topic in recent years due to the traditional energy crisis. Incentives that encourage the renewables have been established all over the world. Ordinary homeowners are also seeking ways to exploit renewable energy. In this thesis, residential PV system, wind turbine system and a hybrid wind/solar system are all investigated. The solar energy received by the PV panels varies with many factors. The most essential one is the irradiance. As the PV panel been installed towards different orientations, the incident insolation received by the panel also will be different. The differing insolation corresponds to the different angles between the irradiance and the panel throughout the day. The result shows that for PV panels in the northern hemisphere, the ones facing south obtain the highest level insolation and thus generate the most electricity. However, with the two different electricity rate plans, flat rate plan and TOU (time of use) plan, the value of electricity that PV generates is different. For wind energy, the wind speed is the most significant variable to determine the generation of a wind turbine. Unlike solar energy, wind energy is much more regionally dependent. Wind resources vary between very close locations. As expected, the result shows that, larger wind speed leads to more electricity generation and thus shorter payback period. For the PV/wind hybrid system, two real cases are analyzed for Altamont and Midhill, CA. In this part, the impact of incentives, system cost and system size are considered. With a hybrid system, homeowners may choose different size combinations between PV and wind turbines. It turns out that for these two locations, the system with larger PV output always achieve a shorter payback period due to the lower cost. Even though, for a longer term, the system with a larger wind turbine in locations with excellent wind resources may lead to higher return on investment. Meanwhile, impacts of both wind and solar incentives (mainly utility rebates) are analyzed. At last, effects of the cost of both renewables are performed.
ContributorsAn, Wen (Author) / Holbert, Keith E. (Thesis advisor) / Karady, George G. (Committee member) / Tylavsky, Daniel (Committee member) / Arizona State University (Publisher)
Created2012
151133-Thumbnail Image.png
Description
In this thesis, an issue is post at the beginning, that there is limited experience in connecting a battery analytical model with a battery circuit model. Then it describes the process of creating a new battery circuit model which is referred to as the kinetic battery model. During this process,

In this thesis, an issue is post at the beginning, that there is limited experience in connecting a battery analytical model with a battery circuit model. Then it describes the process of creating a new battery circuit model which is referred to as the kinetic battery model. During this process, a new general equation is derived. The original equation in the kinetic battery model is only valid at a constant current rate, while the new equation can be used for not only constant current but also linear or nonlinear current. Following the new equation, a circuit representation is built based on the kinetic battery model. Then, by matching the two sets of differential equations of the two models together, the ability to connect the analytical model with the battery circuit model is found. To verify the new battery circuit model is built correctly, the new circuit model is implemented into PSpice simulation software to test the charging performance with constant current, and Matlab/Simulink is also employed to simulate a realistic battery charging process with two-stage charging method. The results have shown the new circuit model is available to be used in realistic scenarios. And because the kinetic battery model can describe different types of rechargeable batteries, the new circuit model is also capable to be used for various battery types.
ContributorsKong, Dexinghui (Author) / Holbert, Keith E. (Thesis advisor) / Karady, George G. (Committee member) / Ayyanar, Raja (Committee member) / Arizona State University (Publisher)
Created2012
151097-Thumbnail Image.png
Description
Power generation in remote isolated places is a tough problem. Presently, a common source for remote generation is diesel. However, diesel generation is costly and environmental unfriendly. It is promising to replace the diesel generation with some clean and economical generation sources. The concept of renewable generation offers a solution

Power generation in remote isolated places is a tough problem. Presently, a common source for remote generation is diesel. However, diesel generation is costly and environmental unfriendly. It is promising to replace the diesel generation with some clean and economical generation sources. The concept of renewable generation offers a solution to remote generation. This thesis focuses on evaluation of renewable generation penetration in the remote isolated grid. A small town named Coober Pedy in South Australia is set as an example. The first task is to build the stochastic models of solar irradiation and wind speed based on the local historical data. With the stochastic models, generation fluctuations and generation planning are further discussed. Fluctuation analysis gives an evaluation of storage unit size and costs. Generation planning aims at finding the relationships between penetration level and costs under constraint of energy sufficiency. The results of this study provide the best penetration level that makes the minimum energy costs. In the case of Coober Pedy, cases of wind and photovoltaic penetrations are studied. The additional renewable sources and suspended diesel generation change the electricity costs. Results show that in remote isolated grid, compared to diesel generation, renewable generation can lower the energy costs.
ContributorsZhu, Yujia (Author) / Holbert, Keith E. (Thesis advisor) / Karady, George G. (Committee member) / Tylavsky, Daniel J (Committee member) / Arizona State University (Publisher)
Created2012
136132-Thumbnail Image.png
Description
Calcium hydroxide carbonation processes were studied to investigate the potential for abiotic soil improvement. Different mixtures of common soil constituents such as sand, clay, and granite were mixed with a calcium hydroxide slurry and carbonated at approximately 860 psi. While the carbonation was successful and calcite formation was strong on

Calcium hydroxide carbonation processes were studied to investigate the potential for abiotic soil improvement. Different mixtures of common soil constituents such as sand, clay, and granite were mixed with a calcium hydroxide slurry and carbonated at approximately 860 psi. While the carbonation was successful and calcite formation was strong on sample exteriors, a 4 mm passivating boundary layer effect was observed, impeding the carbonation process at the center. XRD analysis was used to characterize the extent of carbonation, indicating extremely poor carbonation and therefore CO2 penetration inside the visible boundary. The depth of the passivating layer was found to be independent of both time and choice of aggregate. Less than adequate strength was developed in carbonated trials due to formation of small, weakly-connected crystals, shown with SEM analysis. Additional research, especially in situ analysis with thermogravimetric analysis would be useful to determine the causation of poor carbonation performance. This technology has great potential to substitute for certain Portland cement applications if these issues can be addressed.
ContributorsHermens, Stephen Edward (Author) / Bearat, Hamdallah (Thesis director) / Dai, Lenore (Committee member) / Mobasher, Barzin (Committee member) / Barrett, The Honors College (Contributor) / Chemical Engineering Program (Contributor)
Created2015-05
136523-Thumbnail Image.png
Description
Cyber threats are growing in number and sophistication making it important to continually study and improve all dimensions of digital forensics. Teamwork in forensic analysis has been overlooked in systems even though forensics relies on collaboration. Forensic analysis lacks a system that is flexible and available on different electronic devices

Cyber threats are growing in number and sophistication making it important to continually study and improve all dimensions of digital forensics. Teamwork in forensic analysis has been overlooked in systems even though forensics relies on collaboration. Forensic analysis lacks a system that is flexible and available on different electronic devices which are being used and incorporated into everyday life. For instance, cellphones or tablets that are easy to bring on-the-go to sites where the first steps of forensic analysis is done. Due to the present day conversion to online accessibility, most electronic devices connect to the internet. Squeegee is a proof of concept that forensic analysis can be done on the web. The forensic analysis expansion to the web opens many doors to collaboration and accessibility.
ContributorsJuntiff, Samantha Maria (Author) / Ahn, Gail-Joon (Thesis director) / Kashiwagi, Jacob (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2015-05