Matching Items (240)
161596-Thumbnail Image.png
Description
Additively Manufactured Thin-wall Inconel 718 specimens commonly find application in heat exchangers and Thermal Protection Systems (TPS) for space vehicles. The wall thicknesses in applications for these components typically range between 0.03-2.5mm. Laser Powder Bed Fusion (PBF) Fatigue standards assume thickness over 5mm and consider Hot Isostatic Pressing

Additively Manufactured Thin-wall Inconel 718 specimens commonly find application in heat exchangers and Thermal Protection Systems (TPS) for space vehicles. The wall thicknesses in applications for these components typically range between 0.03-2.5mm. Laser Powder Bed Fusion (PBF) Fatigue standards assume thickness over 5mm and consider Hot Isostatic Pressing (HIP) as conventional heat treatment. This study aims at investigating the dependence of High Cycle Fatigue (HCF) behavior on wall thickness and Hot Isostatic Pressing (HIP) for as-built Additively Manufactured Thin Wall Inconel 718 alloys. To address this aim, high cycle fatigue tests were performed on specimens of seven different thicknesses (0.3mm,0.35mm, 0.5mm, 0.75mm, 1mm, 1.5mm, and 2mm) using a Servohydraulic FatigueTesting Machine. Only half of the specimen underwent HIP, creating data for bothHIP and No-HIP specimens. Upon analyzing the collected data, it was noticed that the specimens that underwent HIP had similar fatigue behavior to that of sheet metal specimens. In addition, it was also noticed that the presence of Porosity in No-HIP specimens makes them more sensitive to changes in stress. A clear decrease in fatigue strength with the decrease in thickness was observed for all specimens.
ContributorsSaxena, Anushree (Author) / Bhate, Dhruv (Thesis advisor) / Liu, Yongming (Committee member) / Kwon, Beomjin (Committee member) / Arizona State University (Publisher)
Created2021
168634-Thumbnail Image.png
Description
Ultrasound has become one of the most popular non-destructive characterization tools for soft materials. Compared to conventional ultrasound imaging, quantitative ultrasound has the potential of analyzing detailed microstructural variation through spectral analysis. Because of having a better axial and lateral resolution, and high attenuation coefficient, quantitative high-frequency ultrasound analysis (HFUA)

Ultrasound has become one of the most popular non-destructive characterization tools for soft materials. Compared to conventional ultrasound imaging, quantitative ultrasound has the potential of analyzing detailed microstructural variation through spectral analysis. Because of having a better axial and lateral resolution, and high attenuation coefficient, quantitative high-frequency ultrasound analysis (HFUA) is a very effective tool for small-scale penetration depth application. One of the QUS parameters, peak density had recently shown a promising response with the variation in the soft material microstructure. Acoustic scattering is arguably the most important factor behind different parametric responses in ultrasound spectra. Therefore, to evaluate peak density, acoustic scattering at different frequency levels was investigated. Analytical, computational, and experimental analysis was conducted to observe both single and multiple scattering in different microstructural setups. It was observed that peak density was an effective tool to express different levels of acoustic scattering that occurred through microstructural variation. The feasibility of the peak density parameter was further evaluated in ultrasound C-scan imaging. The study was also extended to detect the relative position of the imaged structure in the direction of wave propagation. For this purpose, a derivative parameter of peak density named mean peak to valley distance (MPVD) was developed to address the limitations of peak density. The study was then focused on detecting soft tissue malignancy. The histology-based computational study of HFUA was conducted to detect various breast tumor (soft tissue) grades. It was observed that both peak density and MPVD parameters could identify tumor grades at a certain level. Finally, the study was focused on evaluating the feasibility of ultrasound parameters to detect asymptotic breast carcinoma i.e., ductal carcinoma in situ (DCIS) in the surgical margin of the breast tumor. In that computational study, breast pathologies were modeled by including all the phases of DCIS. From the similar analysis mentioned above, it was understood that both peak density and MPVD parameters could detect various breast pathologies like ductal hyperplasia, DCIS, and calcification during intraoperative margin analysis. Furthermore, the spectral features of the frequency spectrums from various pathologies also provided significant information to identify them conclusively.
ContributorsPaul, Koushik (Author) / Ladani, Leila (Thesis advisor) / Razmi, Jafar (Committee member) / Holloway, Julianne (Committee member) / Li, Xiangjia (Committee member) / Liu, Yongming (Committee member) / Arizona State University (Publisher)
Created2022
190725-Thumbnail Image.png
Description
Tire blowout often occurs during driving, which can suddenly disturb vehicle motions and seriously threaten road safety. Currently, there is still a lack of effective methods to mitigate tire blowout risks in everyday traffic, even for automated vehicles. To fundamentally study and systematically resolve the tire blowout issue for automated

Tire blowout often occurs during driving, which can suddenly disturb vehicle motions and seriously threaten road safety. Currently, there is still a lack of effective methods to mitigate tire blowout risks in everyday traffic, even for automated vehicles. To fundamentally study and systematically resolve the tire blowout issue for automated vehicles, a collaborative project between General Motors (GM) and Arizona State University (ASU) has been conducted since 2018. In this dissertation, three main contributions of this project will be presented. First, to explore vehicle dynamics with tire blowout impacts and establish an effective simulation platform for close-loop control performance evaluation, high-fidelity tire blowout models are thoroughly developed by explicitly considering important vehicle parameters and variables. Second, since human cooperation is required to control Level 2/3 partially automated vehicles (PAVs), novel shared steering control schemes are specifically proposed for tire blowout to ensure safe vehicle stabilization via cooperative driving. Third, for Level 4/5 highly automated vehicles (HAVs) without human control, the development of control-oriented vehicle models, controllability study, and automatic control designs are performed based on impulsive differential systems (IDS) theories. Co-simulations Matlab/Simulink® and CarSim® are conducted to validate performances of all models and control designs proposed in this dissertation. Moreover, a scaled test vehicle at ASU and a full-size test vehicle at GM are well instrumented for data collection and control implementation. Various tire blowout experiments for different scenarios are conducted for more rigorous validations. Consequently, the proposed high-fidelity tire blowout models can correctly and more accurately describe vehicle motions upon tire blowout. The developed shared steering control schemes for PAVs and automatic control designs for HAVs can effectively stabilize a vehicle to maintain path following performance in the driving lane after tire blowout. In addition to new research findings and developments in this dissertation, a pending patent for tire blowout detection is also generated in the tire blowout project. The obtained research results have attracted interest from automotive manufacturers and could have a significant impact on driving safety enhancement for automated vehicles upon tire blowout.
ContributorsLi, Ao (Author) / Chen, Yan (Thesis advisor) / Berman, Spring (Committee member) / Kannan, Arunachala Mada (Committee member) / Liu, Yongming (Committee member) / Lin, Wen-Chiao (Committee member) / Marvi, Hamidreza (Committee member) / Arizona State University (Publisher)
Created2023
189290-Thumbnail Image.png
Description
In this research, the chemical and mineralogical compositions, physical and mechanical properties, and failure mechanisms of two ordinary chondrite (OCs) meteorites Aba Panu (L3) and Viñales (L6), and the iron meteorite called Gibeon (IVA) were studied. OCs are dominated by anhydrous silicates with lesser amounts of sulfides and native Fe-Ni

In this research, the chemical and mineralogical compositions, physical and mechanical properties, and failure mechanisms of two ordinary chondrite (OCs) meteorites Aba Panu (L3) and Viñales (L6), and the iron meteorite called Gibeon (IVA) were studied. OCs are dominated by anhydrous silicates with lesser amounts of sulfides and native Fe-Ni metals, while Gibeon is primarily composed of Fe-Ni metals with scattered inclusions of graphite and troilite. The OCs were investigated to understand their response to compressive loading, using a three-dimensional (3-D) Digital Image Correlation (DIC) technique to measure full-field deformation and strain during compression. The DIC data were also used to identify the effects of mineralogical and structural heterogeneity on crack formation and growth. Even though Aba Panu and Viñales are mineralogically similar and are both classified as L ordinary chondrites, they exhibit differences in compressive strengths due to variations in chemical compositions, microstructure, and the presence of cracks and shock veins. DIC data of Aba Panu and Viñales show a brittle failure mechanism, consistent with the crack formation and growth from pre-existing microcracks and porosity. In contrast, the Fe-Ni phases of the Gibeon meteorite deform plastically without rupture during compression, whereas during tension, plastic deformations followed by necking lead to final failure. The Gibeon DIC results showed strain concentration in the tensile gauge region along the sample edge, resulting in the initiation of new damage surfaces that propagated perpendicular to the loading direction. Finally, an in-situ low-temperature testing method of iron meteorites was developed to study the response of their unique microstructure and failure mechanism.
ContributorsRabbi, Md Fazle (Author) / Chattopadhyay, Aditi (Thesis advisor) / Garvie, Laurence A.J. (Thesis advisor) / Liu, Yongming (Committee member) / Fard, Masoud Yekani (Committee member) / Cotto-Figueroa, Desiree (Committee member) / Arizona State University (Publisher)
Created2023
189245-Thumbnail Image.png
Description
Recent advances in cyber-physical systems, artificial intelligence, and cloud computing have driven the widespread deployment of Internet-of-Things (IoT) devices in smart homes. However, the spate of cyber attacks exploiting the vulnerabilities and weak security management of smart home IoT devices have highlighted the urgency and challenges of designing efficient mechanisms

Recent advances in cyber-physical systems, artificial intelligence, and cloud computing have driven the widespread deployment of Internet-of-Things (IoT) devices in smart homes. However, the spate of cyber attacks exploiting the vulnerabilities and weak security management of smart home IoT devices have highlighted the urgency and challenges of designing efficient mechanisms for detecting, analyzing, and mitigating security threats towards them. In this dissertation, I seek to address the security and privacy issues of smart home IoT devices from the perspectives of traffic measurement, pattern recognition, and security applications. I first propose an efficient multidimensional smart home network traffic measurement framework, which enables me to deeply understand the smart home IoT ecosystem and detect various vulnerabilities and flaws. I further design intelligent schemes to efficiently extract security-related IoT device event and user activity patterns from the encrypted smart home network traffic. Based on the knowledge of how smart home operates, different systems for securing smart home networks are proposed and implemented, including abnormal network traffic detection across multiple IoT networking protocol layers, smart home safety monitoring with extracted spatial information about IoT device events, and system-level IoT vulnerability analysis and network hardening.
ContributorsWan, Yinxin (Author) / Xue, Guoliang (Thesis advisor) / Xu, Kuai (Thesis advisor) / Yang, Yezhou (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2023
Description
The study aims to develop and evaluate failure prediction models that accurately predict crack initiation sites, fatigue life in additively manufactured Ti-6Al-4V, and burst pressure in relevant applications.The first part proposes a classification model to identify crack initiation sites in AM-built Ti-6Al-4V alloy. The model utilizes surface and pore-related parameters

The study aims to develop and evaluate failure prediction models that accurately predict crack initiation sites, fatigue life in additively manufactured Ti-6Al-4V, and burst pressure in relevant applications.The first part proposes a classification model to identify crack initiation sites in AM-built Ti-6Al-4V alloy. The model utilizes surface and pore-related parameters and achieves high accuracy (0.97) and robustness (F1 score of 0.98). Leveraging CT images for characterization and data extraction from the CT-images built STL files, the model effectively detects crack initiation sites while minimizing false positives and negatives. Data augmentation techniques, including SMOTE+Tomek Links, are employed to address imbalanced data distributions and improve model performance. This study proposes the Probabilistic Physics-guided Neural Network 2.0 (PPgNN) for probabilistic fatigue life estimation. The presented approach overcomes the limitations of classical regression machine models commonly used to analyze fatigue data. One key advantage of the proposed method is incorporating known physics constraints, resulting in accurate and physically consistent predictions. The efficacy of the model is demonstrated by training the model with multiple fatigue S-N curve data sets from open literature with relevant morphological data and tested using the data extracted from CT-built STL files. The results illustrate that PPgNN 2.0 is a flexible and robust model for predicting fatigue life and quantifying uncertainties by estimating the mean and standard deviation of the fatigue life. The loss function that trains the proposed model can capture the underlying distribution and reduce the prediction error. A comparison study between the performance of neural network models highlights the benefits of physics-guided learning for fatigue data analysis. The proposed model demonstrates satisfactory learning capacity and generalization, providing accurate fatigue life predictions to unseen examples. An elastic-plastic Finite Element Model (FEM) is developed in the second part to assess pipeline integrity, focusing on burst pressure estimation in high-pressure gas pipelines with interactive corrosion defects. The FEM accurately predicts burst pressure and evaluates the remaining useful life by considering the interaction between corrosion defects and neighboring pits. The FEM outperforms the well-known ASME-B31G method in handling interactive corrosion threats.
ContributorsBalamurugan, Rakesh (Author) / Liu, Yongming (Thesis advisor) / Zhuang, Houlong (Committee member) / Bhate, Dhruv (Committee member) / Arizona State University (Publisher)
Created2023
171718-Thumbnail Image.png
Description
Fatigue fracture is one of the most common types of mechanical failures seen in structures. Considering that fatigue failures usually initiate on surfaces, it is accepted that surface roughness has a detrimental effect on the fatigue life of components. Irregularities on the surface cause stress concentrations and form nucleation sites

Fatigue fracture is one of the most common types of mechanical failures seen in structures. Considering that fatigue failures usually initiate on surfaces, it is accepted that surface roughness has a detrimental effect on the fatigue life of components. Irregularities on the surface cause stress concentrations and form nucleation sites for cracks. As surface conditions are not always satisfactory, particularly for additively manufactured components, it is necessary to develop a reliable model for fatigue life estimation considering surface roughness effects and assure structural integrity. This research study focuses on extending a previously developed subcycle fatigue crack growth model to include the effects of surface roughness. Unlike other models that consider surface irregularities as series of cracks, the proposed model is unique in the way that it treats the peaks and valleys of surface texture as a single equivalent notch. First, an equivalent stress concentration factor for the roughness was estimated and introduced into an asymptotic interpolation method for notches. Later, a concept called equivalent initial flaw size was incorporated along with linear elastic fracture mechanics to predict the fatigue life of Ti-6Al-4V alloy with different levels of roughness under uniaxial and multiaxial loading conditions. The predicted results were validated using the available literature data. The developed model can also handle variable amplitude loading conditions, which is suggested for future work.
ContributorsKethamukkala, Kaushik (Author) / Liu, Yongming (Thesis advisor) / Jiao, Yang (Committee member) / Nian, Qiong (Committee member) / Arizona State University (Publisher)
Created2022
171925-Thumbnail Image.png
Description
The problem of monitoring complex networks for the detection of anomalous behavior is well known. Sensors are usually deployed for the purpose of monitoring these networks for anomalies and Sensor Placement Optimization (SPO) is the problem of determining where these sensors should be placed (deployed) in the network. Prior works

The problem of monitoring complex networks for the detection of anomalous behavior is well known. Sensors are usually deployed for the purpose of monitoring these networks for anomalies and Sensor Placement Optimization (SPO) is the problem of determining where these sensors should be placed (deployed) in the network. Prior works have utilized the well known Set Cover formulation in order to determine the locations where sensors should be placed in the network, so that anomalies can be effectively detected. However, such works cannot be utilized to address the problem when the objective is to not only detect the presence of anomalies, but also to detect (distinguish) the source(s) of the detected anomalies, i.e., uniquely monitoring the network. In this dissertation, I attempt to fill in this gap by utilizing the mathematical concept of Identifying Codes and illustrating how it not only can overcome the aforementioned limitation, but also it, and its variants, can be utilized to monitor complex networks modeled from multiple domains. Over the course of this dissertation, I make key contributions which further enhance the efficacy and applicability of Identifying Codes as a monitoring strategy. First, I show how Identifying Codes are superior to not only the Set Cover formulation but also standard graph centrality metrics, for the purpose of uniquely monitoring complex networks. Second, I study novel problems such as the budget constrained Identifying Code, scalable Identifying Code, robust Identifying Code etc., and present algorithms and results for the respective problems. Third, I present useful Identifying Code results for restricted graph classes such as Unit Interval Bigraphs and Unit Disc Bigraphs. Finally, I show the universality of Identifying Codes by applying it to multiple domains.
ContributorsBasu, Kaustav (Author) / Sen, Arunabha (Thesis advisor) / Davulcu, Hasan (Committee member) / Liu, Huan (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2022
171963-Thumbnail Image.png
Description
The Internet-of-Things (IoT) paradigm is reshaping the ways to interact with the physical space. Many emerging IoT applications need to acquire, process, gain insights from, and act upon the massive amount of data continuously produced by ubiquitous IoT sensors. It is nevertheless technically challenging and economically prohibitive for each IoT

The Internet-of-Things (IoT) paradigm is reshaping the ways to interact with the physical space. Many emerging IoT applications need to acquire, process, gain insights from, and act upon the massive amount of data continuously produced by ubiquitous IoT sensors. It is nevertheless technically challenging and economically prohibitive for each IoT application to deploy and maintain a dedicated large-scale sensor network over distributed wide geographic areas. Built upon the Sensing-as-a-Service paradigm, cloud-sensing service providers are emerging to provide heterogeneous sensing data to various IoT applications with a shared sensing substrate. Cyber threats are among the biggest obstacles against the faster development of cloud-sensing services. This dissertation presents novel solutions to achieve trustworthy IoT sensing-as-a-service. Chapter 1 introduces the cloud-sensing system architecture and the outline of this dissertation. Chapter 2 presents MagAuth, a secure and usable two-factor authentication scheme that explores commercial off-the-shelf wrist wearables with magnetic strap bands to enhance the security and usability of password-based authentication for touchscreen IoT devices. Chapter 3 presents SmartMagnet, a novel scheme that combines smartphones and cheap magnets to achieve proximity-based access control for IoT devices. Chapter 4 proposes SpecKriging, a new spatial-interpolation technique based on graphic neural networks for secure cooperative spectrum sensing which is an important application of cloud-sensing systems. Chapter 5 proposes a trustworthy multi-transmitter localization scheme based on SpecKriging. Chapter 6 discusses the future work.
ContributorsZhang, Yan (Author) / Zhang, Yanchao YZ (Thesis advisor) / Fan, Deliang (Committee member) / Xue, Guoliang (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2022
171813-Thumbnail Image.png
Description
This dissertation investigates the problem of efficiently and effectively prioritizing a vulnerability risk in a computer networking system. Vulnerability prioritization is one of the most challenging issues in vulnerability management, which affects allocating preventive and defensive resources in a computer networking system. Due to the large number of identified vulnerabilities,

This dissertation investigates the problem of efficiently and effectively prioritizing a vulnerability risk in a computer networking system. Vulnerability prioritization is one of the most challenging issues in vulnerability management, which affects allocating preventive and defensive resources in a computer networking system. Due to the large number of identified vulnerabilities, it is very challenging to remediate them all in a timely fashion. Thus, an efficient and effective vulnerability prioritization framework is required. To deal with this challenge, this dissertation proposes a novel risk-based vulnerability prioritization framework that integrates the recent artificial intelligence techniques (i.e., neuro-symbolic computing and logic reasoning). The proposed work enhances the vulnerability management process by prioritizing vulnerabilities with high risk by refining the initial risk assessment with the network constraints. This dissertation is organized as follows. The first part of this dissertation presents the overview of the proposed risk-based vulnerability prioritization framework, which contains two stages. The second part of the dissertation investigates vulnerability risk features in a computer networking system. The third part proposes the first stage of this framework, a vulnerability risk assessment model. The proposed assessment model captures the pattern of vulnerability risk features to provide a more comprehensive risk assessment for a vulnerability. The fourth part proposes the second stage of this framework, a vulnerability prioritization reasoning engine. This reasoning engine derives network constraints from interactions between vulnerabilities and network environment elements based on network and system setups. This proposed framework assesses a vulnerability in a computer networking system based on its actual security impact by refining the initial risk assessment with the network constraints.
ContributorsZeng, Zhen (Author) / Xue, Guoliang (Thesis advisor) / Liu, Huan (Committee member) / Zhao, Ming (Committee member) / Yang, Yezhou (Committee member) / Arizona State University (Publisher)
Created2022