Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Data Science

Clemson University

Machine Learning

Publication Year
Publication

Articles 1 - 2 of 2

Full-Text Articles in Engineering

Physics-Informed Machine Learning Methods For Inverse Design Of Multi-Phase Materials With Targeted Mechanical Properties, Yunpeng Wu Aug 2024

Physics-Informed Machine Learning Methods For Inverse Design Of Multi-Phase Materials With Targeted Mechanical Properties, Yunpeng Wu

All Dissertations

Advances in machine learning algorithms and applications have significantly enhanced engineering inverse design capabilities. This work focuses on the machine learning-based inverse design of material microstructures with targeted linear and nonlinear mechanical properties. It involves developing and applying predictive and generative physics-informed neural networks for both 2D and 3D multiphase materials.

The first investigation aims to develop a machine learning method for the inverse design of 2D multiphase materials, particularly porous materials. We first develop machine learning methods to understand the implicit relationship between a material's microstructure and its mechanical behavior. Specifically, we use ResNet-based models to predict the elastic …


Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay Dec 2021

Analysis Of Deep Learning Methods For Wired Ethernet Physical Layer Security Of Operational Technology, Lucas Torlay

All Theses

The cybersecurity of power systems is jeopardized by the threat of spoofing and man-in-the-middle style attacks due to a lack of physical layer device authentication techniques for operational technology (OT) communication networks. OT networks cannot support the active probing cybersecurity methods that are popular in information technology (IT) networks. Furthermore, both active and passive scanning techniques are susceptible to medium access control (MAC) address spoofing when operating at Layer 2 of the Open Systems Interconnection (OSI) model. This thesis aims to analyze the role of deep learning in passively authenticating Ethernet devices by their communication signals. This method operates at …