Matching Items (122)
151078-Thumbnail Image.png
Description
A unique feature, yet a challenge, in cognitive radio (CR) networks is the user hierarchy: secondary users (SU) wishing for data transmission must defer in the presence of active primary users (PUs), whose priority to channel access is strictly higher.Under a common thread of characterizing and improving Quality of Service

A unique feature, yet a challenge, in cognitive radio (CR) networks is the user hierarchy: secondary users (SU) wishing for data transmission must defer in the presence of active primary users (PUs), whose priority to channel access is strictly higher.Under a common thread of characterizing and improving Quality of Service (QoS) for the SUs, this dissertation is progressively organized under two main thrusts: the first thrust focuses on SU's throughput by exploiting the underlying properties of the PU spectrum to perform effective scheduling algorithms; and the second thrust aims at another important QoS performance of the SUs, namely delay, subject to the impact of PUs' activities, and proposes enhancement and control mechanisms. More specifically, in the first thrust, opportunistic spectrum scheduling for SU is first considered by jointly exploiting the memory in PU's occupancy and channel fading. In particular, the underexplored scenario where PU occupancy presents a {long} temporal memory is taken into consideration. By casting the problem as a partially observable Markov decision process, a set of {multi-tier} tradeoffs are quantified and illustrated. Next, a spectrum shaping framework is proposed by leveraging network coding as a {spectrum shaper} on the PU's traffic. Such shaping effect brings in predictability of the primary spectrum, which is utilized by the SUs to carry out adaptive channel sensing by prioritizing channel access order, and hence significantly improve their throughput. On the other hand, such predictability can make wireless channels more susceptible to jamming attacks. As a result, caution must be taken in designing wireless systems to balance the throughput and the jamming-resistant capability. The second thrust turns attention to an equally important performance metric, i.e., delay performance. Specifically, queueing delay analysis is conducted for SUs employing random access over the PU channels. Fluid approximation is taken and Poisson driven stochastic differential equations are applied to characterize the moments of the SUs' steady-state queueing delay. Then, dynamic packet generation control mechanisms are developed to meet the given delay requirements for SUs.
ContributorsWang, Shanshan (Author) / Zhang, Junshan (Thesis advisor) / Xue, Guoliang (Committee member) / Hui, Joseph (Committee member) / Duman, Tolga (Committee member) / Arizona State University (Publisher)
Created2012
151063-Thumbnail Image.png
Description
Interference constitutes a major challenge for communication networks operating over a shared medium where availability is imperative. This dissertation studies the problem of designing and analyzing efficient medium access protocols which are robust against strong adversarial jamming. More specifically, four medium access (MAC) protocols (i.e., JADE, ANTIJAM, COMAC, and SINRMAC)

Interference constitutes a major challenge for communication networks operating over a shared medium where availability is imperative. This dissertation studies the problem of designing and analyzing efficient medium access protocols which are robust against strong adversarial jamming. More specifically, four medium access (MAC) protocols (i.e., JADE, ANTIJAM, COMAC, and SINRMAC) which aim to achieve high throughput despite jamming activities under a variety of network and adversary models are presented. We also propose a self-stabilizing leader election protocol, SELECT, that can effectively elect a leader in the network with the existence of a strong adversary. Our protocols can not only deal with internal interference without the exact knowledge on the number of participants in the network, but they are also robust to unintentional or intentional external interference, e.g., due to co-existing networks or jammers. We model the external interference by a powerful adaptive and/or reactive adversary which can jam a (1 − ε)-portion of the time steps, where 0 < ε ≤ 1 is an arbitrary constant. We allow the adversary to be adaptive and to have complete knowledge of the entire protocol history. Moreover, in case the adversary is also reactive, it uses carrier sensing to make informed decisions to disrupt communications. Among the proposed protocols, JADE, ANTIJAM and COMAC are able to achieve Θ(1)-competitive throughput with the presence of the strong adversary; while SINRMAC is the first attempt to apply SINR model (i.e., Signal to Interference plus Noise Ratio), in robust medium access protocols design; the derived principles are also useful to build applications on top of the MAC layer, and we present SELECT, which is an exemplary study for leader election, which is one of the most fundamental tasks in distributed computing.
ContributorsZhang, Jin (Author) / Richa, Andréa W. (Thesis advisor) / Scheideler, Christian (Committee member) / Sen, Arunabha (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2012
151000-Thumbnail Image.png
Description
Gels are three-dimensional polymer networks with entrapped solvent (water etc.). They bear amazing features such as stimuli-responsive (temperature, PH, electric field etc.), high water content and biocompatibility and thus find a lot of applications. To understand the complex physics behind gel's swelling phenomenon, it is important to build up fundamental

Gels are three-dimensional polymer networks with entrapped solvent (water etc.). They bear amazing features such as stimuli-responsive (temperature, PH, electric field etc.), high water content and biocompatibility and thus find a lot of applications. To understand the complex physics behind gel's swelling phenomenon, it is important to build up fundamental mechanical model and extend to complicated cases. In this dissertation, a coupled large deformation and diffusion model regarding gel's swelling behavior is presented. In this model, free-energy of the total gel is constituted by polymer stretching energy and polymer-solvent mixing energy. In-house nonlinear finite element code is implemented with fast computational capability. Complex phenomenon such as buckling and healing of cracked gel by swelling are studied. Due to the wide coverage of polymeric materials and solvents, solvent diffusion in gels not only follows Fickian diffusion law where concentration map is continuous but also follows non-Fickian diffusion law where concentration map shows high gradient. Phenomenological model with viscoelastic polymer constitutive and concentration dependent diffusivity is created. The model well captures this special diffusion phenomenon such as sharp diffusion front and distinctive swollen and unswollen region.
ContributorsZhang, Jiaping (Author) / Jiang, Hanqing (Thesis advisor) / Peralta, Pedro (Committee member) / Dai, Lenore (Committee member) / Rajan, Subramaniam D. (Committee member) / Chawla, Nikhilesh (Committee member) / Arizona State University (Publisher)
Created2012
151236-Thumbnail Image.png
Description
With increasing concerns of the intrinsic toxicity of lead (Pb) in electronics, a series of tin (Sn) based alloys involving silver (Ag) and copper (Cu) have been proposed as replacements for Pb-Sn solder and widely accepted by industry. However, they have a higher melting point and often exhibit poorer damage

With increasing concerns of the intrinsic toxicity of lead (Pb) in electronics, a series of tin (Sn) based alloys involving silver (Ag) and copper (Cu) have been proposed as replacements for Pb-Sn solder and widely accepted by industry. However, they have a higher melting point and often exhibit poorer damage tolerance than Pb-Sn alloys. Recently, a new class of alloys with trace amount of rare-earth (RE) elements has been discovered and investigated. In previous work from Prof. Chawla's group, it has been shown that cerium (Ce)-based Pb-free solder are less prone to oxidation and Sn whiskering, and exhibit desirable attributes of microstructural refinement and enhanced ductility relative to lanthanum (La)-based Sn-3.9Ag-0.7Cu (SAC) alloy. Although the formation of RESn3 was believed to be directly responsible for the enhanced ductility in RE-containing SAC solder by allowing microscopic voids to nucleate throughout the solder volume, this cavitation-based mechanism needs to be validated experimentally and numerically. Additionally, since the previous study has exhibited the realistic feasibility of Ce-based SAC lead-free solder alloy as a replacement to conventional SAC alloys, in this study, the proposed objective focuses on the in in-depth understanding of mechanism of enhanced ductility in Ce-based SAC alloy and possible issues associated with integration of this new class of solder into electronic industry, including: (a) study of long-term thermal and mechanical stability on industrial metallization, (b) examine the role of solder volume and wetting behavior of the new solder, relative to Sn-3.9Ag-0.7Cu alloys, (c) conduct experiments of new solder alloys in the form of mechanical shock and electromigration. The research of this new class alloys will be conducted in industrially relevant conditions, and the results would serve as the first step toward integration of these new, next generation solders into the industry.
ContributorsXie, Huxiao (Author) / Chawla, Nikhilesh (Thesis advisor) / Krause, Stephen (Committee member) / Solanki, Kiran (Committee member) / Mirpuri, Kabir (Committee member) / Arizona State University (Publisher)
Created2012
Description
This dissertation investigates the potential for enzyme induced carbonate cementation as an alternative to Portland cement for creating building material from sand aggregate. We create a solution of urease enzyme, calcium chloride (CaCl2), and urea in water and added sand. The urease catalyzes the synthesis of carbonate from urea, and

This dissertation investigates the potential for enzyme induced carbonate cementation as an alternative to Portland cement for creating building material from sand aggregate. We create a solution of urease enzyme, calcium chloride (CaCl2), and urea in water and added sand. The urease catalyzes the synthesis of carbonate from urea, and the carbonate then bonds with a dissociated calcium ion and precipitates from the solution as calcium carbonate (CaCO3). This precipitate can form small crystal bridges at contacts between sand grains that lock the sand grains in place. Using enzyme induced carbonate precipitation we created a cemented sand sample with a maximum compressive strength of 319 kPa and an elastic modulus of approximately 10 MPa. Images from the SEM showed that a major failure mechanism in the cemented samples was the delamination of the CaCO3 from the sand grains. We observed that CaCO3 cementation did not when solutions with high concentrations of CaCl2 and urea were used.
ContributorsBull, Michael Ryan (Author) / Kavazanjian, Edward (Thesis director) / Chawla, Nikhilesh (Committee member) / Barrett, The Honors College (Contributor) / Materials Science and Engineering Program (Contributor)
Created2014-05
149501-Thumbnail Image.png
Description
Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In

Peer-to-peer systems are known to be vulnerable to the Sybil attack. The lack of a central authority allows a malicious user to create many fake identities (called Sybil nodes) pretending to be independent honest nodes. The goal of the malicious user is to influence the system on his/her behalf. In order to detect the Sybil nodes and prevent the attack, a reputation system is used for the nodes, built through observing its interactions with its peers. The construction makes every node a part of a distributed authority that keeps records on the reputation and behavior of the nodes. Records of interactions between nodes are broadcast by the interacting nodes and honest reporting proves to be a Nash Equilibrium for correct (non-Sybil) nodes. In this research is argued that in realistic communication schedule scenarios, simple graph-theoretic queries such as the computation of Strongly Connected Components and Densest Subgraphs, help in exposing those nodes most likely to be Sybil, which are then proved to be Sybil or not through a direct test executed by some peers.
ContributorsCárdenas-Haro, José Antonio (Author) / Konjevod, Goran (Thesis advisor) / Richa, Andréa W. (Thesis advisor) / Sen, Arunabha (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2010
131639-Thumbnail Image.png
Description
Aluminum alloys are commonly used for engineering applications due to their high strength to weight ratio, low weight, and low cost. Pitting corrosion, accelerated by saltwater environments, leads to fatigue cracks and stress corrosion cracking during service. Two-dimensional (2D) characterization methods are typically used to identify and characterize corrosion; however,

Aluminum alloys are commonly used for engineering applications due to their high strength to weight ratio, low weight, and low cost. Pitting corrosion, accelerated by saltwater environments, leads to fatigue cracks and stress corrosion cracking during service. Two-dimensional (2D) characterization methods are typically used to identify and characterize corrosion; however, these methods are destructive and do not enable an efficient means of quantifying mechanisms of pit initiation and growth. In this study, lab-scale x-ray microtomography was used to non-destructively observe, quantify, and understand pit growth in three dimensions over a 20-day corrosion period in the AA7075-T651 alloy. The XRT process, capable of imaging sample volumes with a resolution near one micrometer, was found to be an ideal tool for large-volume pit examination. Pit depths were quantified over time using renderings of sample volumes, leading to an understanding of how inclusion particles, oxide breakdown, and corrosion mechanisms impact the growth and morphology of pits. This process, when carried out on samples produced with two different rolling directions and rolling extents, yielded novel insights into the long-term macroscopic corrosion behaviors impacted by alloy production and design. Key among these were the determinations that the alloy’s rolling direction produces a significant difference in the average growth rate of pits and that the corrosion product layer loses its passivating effect as a result of cyclic immersion. In addition, a new mechanism of pitting corrosion is proposed which is focused on the pseudo-random spatial distribution of iron-rich inclusion particles in the alloy matrix, which produces a random distribution of pit depths based on the occurrence of co-operative corrosion near inclusion clusters.
ContributorsSinclair, Daniel Ritchie (Author) / Chawla, Nikhilesh (Thesis director) / Jiao, Yang (Committee member) / Bale, Hrishikesh (Committee member) / School of International Letters and Cultures (Contributor) / Materials Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
134914-Thumbnail Image.png
Description
Many forms of programmable matter have been proposed for various tasks. We use an abstract model of self-organizing particle systems for programmable matter which could be used for a variety of applications, including smart paint and coating materials for engineering or programmable cells for medical uses. Previous research using this

Many forms of programmable matter have been proposed for various tasks. We use an abstract model of self-organizing particle systems for programmable matter which could be used for a variety of applications, including smart paint and coating materials for engineering or programmable cells for medical uses. Previous research using this model has focused on shape formation and other spatial configuration problems, including line formation, compression, and coating. In this work we study foundational computational tasks that exceed the capabilities of the individual constant memory particles described by the model. These tasks represent new ways to use these self-organizing systems, which, in conjunction with previous shape and configuration work, make the systems useful for a wider variety of tasks. We present an implementation of a counter using a line of particles, which makes it possible for the line of particles to count to and store values much larger than their individual capacities. We then present an algorithm that takes a matrix and a vector as input and then sets up and uses a rectangular block of particles to compute the matrix-vector multiplication. This setup also utilizes the counter implementation to store the resulting vector from the matrix-vector multiplication. Operations such as counting and matrix multiplication can leverage the distributed and dynamic nature of the self-organizing system to be more efficient and adaptable than on traditional linear computing hardware. Such computational tools also give the systems more power to make complex decisions when adapting to new situations or to analyze the data they collect, reducing reliance on a central controller for setup and output processing. Finally, we demonstrate an application of similar types of computations with self-organizing systems to image processing, with an implementation of an image edge detection algorithm.
ContributorsPorter, Alexandra Marie (Author) / Richa, Andrea (Thesis director) / Xue, Guoliang (Committee member) / School of Music (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
161577-Thumbnail Image.png
Description
This dissertation considers the question of how convenient access to copious networked observational data impacts our ability to learn causal knowledge. It investigates in what ways learning causality from such data is different from -- or the same as -- the traditional causal inference which often deals with small scale

This dissertation considers the question of how convenient access to copious networked observational data impacts our ability to learn causal knowledge. It investigates in what ways learning causality from such data is different from -- or the same as -- the traditional causal inference which often deals with small scale i.i.d. data collected from randomized controlled trials? For example, how can we exploit network information for a series of tasks in the area of learning causality? To answer this question, the dissertation is written toward developing a suite of novel causal learning algorithms that offer actionable insights for a series of causal inference tasks with networked observational data. The work aims to benefit real-world decision-making across a variety of highly influential applications. In the first part of this dissertation, it investigates the task of inferring individual-level causal effects from networked observational data. First, it presents a representation balancing-based framework for handling the influence of hidden confounders to achieve accurate estimates of causal effects. Second, it extends the framework with an adversarial learning approach to properly combine two types of existing heuristics: representation balancing and treatment prediction. The second part of the dissertation describes a framework for counterfactual evaluation of treatment assignment policies with networked observational data. A novel framework that captures patterns of hidden confounders is developed to provide more informative input for downstream counterfactual evaluation methods. The third part presents a framework for debiasing two-dimensional grid-based e-commerce search with observational search log data where there is an implicit network connecting neighboring products in a search result page. A novel inverse propensity scoring framework that models user behavior patterns for two-dimensional display in e-commerce websites is developed, which aims to optimize online performance of ranking algorithms with offline log data.
ContributorsGuo, Ruocheng (Author) / Liu, Huan (Thesis advisor) / Candan, K. Selcuk (Committee member) / Xue, Guoliang (Committee member) / Kiciman, Emre (Committee member) / Arizona State University (Publisher)
Created2021
171769-Thumbnail Image.png
Description
Electromigration, the net atomic diffusion associated with the momentum transfer from electrons moving through a material, is a major cause of device and component failure in microelectronics. The deleterious effects from electromigration rise with increased current density, a parameter that will only continue to increase as our electronic devices get

Electromigration, the net atomic diffusion associated with the momentum transfer from electrons moving through a material, is a major cause of device and component failure in microelectronics. The deleterious effects from electromigration rise with increased current density, a parameter that will only continue to increase as our electronic devices get smaller and more compact. Understanding the dynamic diffusional pathways and mechanisms of these electromigration-induced and propagated defects can further our attempts at mitigating these failure modes. This dissertation provides insight into the relationships between these defects and parameters of electric field strength, grain boundary misorientation, grain size, void size, eigenstrain, varied atomic mobilities, and microstructure.First, an existing phase-field model was modified to investigate the various defect modes associated with electromigration in an equiaxed non-columnar microstructure. Of specific interest was the effect of grain boundary misalignment with respect to current flow and the mechanisms responsible for the changes in defect kinetics. Grain size, magnitude of externally applied electric field, and the utilization of locally distinct atomic mobilities were other parameters investigated. Networks of randomly distributed grains, a common microstructure of interconnects, were simulated in both 2- and 3-dimensions displaying the effects of 3-D capillarity on diffusional dynamics. Also, a numerical model was developed to study the effect of electromigration on void migration and coalescence. Void migration rates were found to be slowed from compressive forces and the nature of the deformation concurrent with migration was examined through the lens of chemical potential. Void migration was also validated with previously reported theoretical explanations. Void coalescence and void budding were investigated and found to be dependent on the magnitude of interfacial energy and electric field strength. A grasp on the mechanistic pathways of electromigration-induced defect evolution is imperative to the development of reliable electronics, especially as electronic devices continue to miniaturize. This dissertation displays a working understanding of the mechanistic pathways interconnects can fail due to electromigration, as well as provide direction for future research and understanding.
ContributorsFarmer, William McHann (Author) / Ankit, Kumar (Thesis advisor) / Chawla, Nikhilesh (Committee member) / Jiao, Yang (Committee member) / McCue, Ian (Committee member) / Arizona State University (Publisher)
Created2022