Open Access. Powered by Scholars. Published by Universities.®

Operations Research, Systems Engineering and Industrial Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Operations Research, Systems Engineering and Industrial Engineering

Strain Path Effect On Austenite Transformation And Ductility In Q&P 1180 Steel, Jeffrey Grant Cramer Dec 2017

Strain Path Effect On Austenite Transformation And Ductility In Q&P 1180 Steel, Jeffrey Grant Cramer

Theses and Dissertations

The ductility of Q&P 1180 steel was studied with regard to retained austenite transformation under different strain paths. Specimens were tested in uniaxial tension in a standard test frame as well as in situ in the scanning electron microscope (SEM). Then digital image correlation (DIC) was used to compute the effective strain at the level of the individual phases in the microstructure. Stretching experiments were also performed using limiting dome height (LDH) tooling, where specimens were strained in both biaxial and plane strain tension. The experiments were done incrementally, for each strain path, and the retained austenite at each level …


An Analysis Of The Size And Impact Of Digital Footprints, Whitney Nielsen Maxwell Dec 2017

An Analysis Of The Size And Impact Of Digital Footprints, Whitney Nielsen Maxwell

Theses and Dissertations

Personal information available online is known as a digital footprint. While many have a digital footprint, few if any, know what it encapsulates or how to control it. Technology and personal information are becoming more intertwined as technology becomes more integrated with everyday activities. Personal information can be defined as details that apply to a person such as race or shopping habits. Shopping habits are considered personal information by many corporations who spend money to track, or even predict purchases of individuals, whereas more traditional forms of personal information are details like gender, birthdate, and home town. With a wide …


Continuous Permeability Measurement During Unidirectional Vacuum Infusion Processing, David Wayne Hoagland Jul 2017

Continuous Permeability Measurement During Unidirectional Vacuum Infusion Processing, David Wayne Hoagland

Theses and Dissertations

Composite materials have traditionally been used in high-end aerospace parts and low-end consumer parts. The reason for this separation in markets is the wide gap in technology between pre-preg materials processed in an autoclave and chop strand fiberglass blown into an open mold. Liquid composite molding has emerged as a bridge between inexpensive tooling and large, technical parts. Processes such as vacuum infusion have made it possible to utilize complex layups of reinforcement materials in an open mold style set-up, creating optimal conditions for composites to penetrate many new markets with rapid innovation. Flow simulation for liquid composite molding is …


Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses Jun 2017

Measuring The Robustness Of Forensic Tools' Ability To Detect Data Hiding Techniques, Samuel Isaiah Moses

Theses and Dissertations

The goal of this research is to create a methodology that measures the robustness and effectiveness of forensic tools' ability to detect data hiding. First, an extensive search for any existing guidelines testing against data hiding was performed. After finding none, existing guidelines and frameworks in cybersecurity and cyber forensics were reviewed. Next, I created the methodology in this thesis. This methodology includes a set of steps that a user should take to evaluate a forensic tool. The methodology has been designed to be flexible and scalable so as new anti-forensic data hiding methods are discovered and developed, they can …


The Application Of Artificial Neural Networks For Prioritization Of Independent Variables Of A Discrete Event Simulation Model In A Manufacturing Environment, Rebecca Pires Dos Santos Jun 2017

The Application Of Artificial Neural Networks For Prioritization Of Independent Variables Of A Discrete Event Simulation Model In A Manufacturing Environment, Rebecca Pires Dos Santos

Theses and Dissertations

The high complexity existent in businesses has required managers to rely on accurate and up to date information. Over the years, many tools have been created to give support to decision makers, such as discrete event simulation and artificial neural networks. Both tools have been applied to improve business performance; however, most of the time they are used separately. This research aims to interpret artificial neural network models that are applied to the data generated by a simulation model and determine which inputs have the most impact on the output of a business. This would allow prioritization of the variables …


In Situ Characterization Of Voids During Liquid Composite Molding, Brock Don Zobell Jun 2017

In Situ Characterization Of Voids During Liquid Composite Molding, Brock Don Zobell

Theses and Dissertations

Global competition is pushing the composites industry to advance and become more cost effective. Liquid Composite Molding or LCM is a family of processes that has shown significant promise in its potential to reduce process times and cost while maintaining high levels of part quality. However, the majority of research and information on composite processes have been related to prepreg-autoclave processing which is significantly different than LCM. In order for LCM processes to gain large scale implementation, significant research is required in order to model and simulate the unique nature of the resin infusion process. The purpose of this research …


A Security Evaluation Methodology For Container Images, Brendan Michael Abbott Mar 2017

A Security Evaluation Methodology For Container Images, Brendan Michael Abbott

Theses and Dissertations

The goal of this research is to create a methodology that evaluates the security posture of container images and helps improve container security. This was done by first searching for any guidelines or standards that focus on container images and security. After finding none, I decided to create an evaluative methodology. The methodology is composed of actions that users should take to evaluate the security of a container image. The methodology was created through in-depth research on container images and the build instructions used to create them and is referred to as the Security Evaluation Methodology for Container Images. The …