Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Engineering

Randomly Generating The 3d Mesostructure Of Soil Rock Mixtures Based On The Full In Situ Digital Image Processed Information, Zhengsheng Li, Haiyang Yi, Cheng Zhu, Zhuang Zhuo, Guoshuan Liu Oct 2022

Randomly Generating The 3d Mesostructure Of Soil Rock Mixtures Based On The Full In Situ Digital Image Processed Information, Zhengsheng Li, Haiyang Yi, Cheng Zhu, Zhuang Zhuo, Guoshuan Liu

Henry M. Rowan College of Engineering Faculty Scholarship

Understanding the occurrence and evolution of geological disasters, such as landslides and debris flows, is facilitated by research on the performance of soil rock mixes (SRM). Recently, more and more researchers have been interested in studying the mesostructure reconstruction process of SRM. The present mesostructure generation approaches, however, have several weaknesses. One of the weaknesses is that they do not consider the impact of particle shape and therefore cannot ensure similarity to the in situ SRMs. In this study, a new mesostructure generation method that randomly generates SRMs based on the full in situ digital image processing (DIP) information is …


Investigation Of Adhesion, Deformation Mechanics, And Electrical Properties Of Ag/Sio2/Pdms Tri-Layers For Stretchable Electronic Applications, Rhandy Joe Paladines Sep 2022

Investigation Of Adhesion, Deformation Mechanics, And Electrical Properties Of Ag/Sio2/Pdms Tri-Layers For Stretchable Electronic Applications, Rhandy Joe Paladines

Theses and Dissertations

The motivation behind this research is to improve the interfacial layer bonding of metallic thin films to PDMS substrates with the aid of a buffer layer. The physical vapor deposition (PVD) technique of sputtering was used to deposit bilayer thin films of silver (Ag) and silicon dioxide (SiO2) on PDMS. Two chamber pressures were used in this work, 5 and 20 mTorr, to investigate the role of this parameter in determining the interfacial adhesion and the role in determining the resistance sensitivity. Studies of the surface energy and increased bonding strength for metallization are carried out. Surface characterization using atomic …


A Machine Learning Framework For Automatic Speech Recognition In Air Traffic Control Using Word Level Binary Classification And Transcription, Fowad Shahid Sohail Sep 2022

A Machine Learning Framework For Automatic Speech Recognition In Air Traffic Control Using Word Level Binary Classification And Transcription, Fowad Shahid Sohail

Theses and Dissertations

Advances in Artificial Intelligence and Machine learning have enabled a variety of new technologies. One such technology is Automatic Speech Recognition (ASR), where a machine is given audio and transcribes the words that were spoken. ASR can be applied in a variety of domains to improve general usability and safety. One such domain is Air Traffic Control (ATC). ASR in ATC promises to improve safety in a mission critical environment. ASR models have historically required a large amount of clean training data. ATC environments are noisy and acquiring labeled data is a difficult, expertise dependent task. This thesis attempts to …


Development Of Software Tools For Efficient And Sustainable Process Development And Improvement, Jake P. Stengel Jun 2022

Development Of Software Tools For Efficient And Sustainable Process Development And Improvement, Jake P. Stengel

Theses and Dissertations

Infrastructure is a key component in the well-being of our society that leads to its growth, development, and productive operations. A well-built infrastructure allows the community to be more competitive and promotes economic advancement. In 2021, the ASCE (American Society of Civil Engineers) ranked the American infrastructure as substandard, with an overall grade of C-. The overall ranking suffers when key infrastructure categories are not maintained according to the needs of the population. Therefore, there is a need to consider alternative methods to improve our infrastructure and make it more sustainable to enhance the overall grade. One of the challenges …


An Injury Severity Prediction-Driven Accident Prevention System, Gulsum Alicioglu, Bo Sun, Shen-Shyang Ho May 2022

An Injury Severity Prediction-Driven Accident Prevention System, Gulsum Alicioglu, Bo Sun, Shen-Shyang Ho

Faculty Scholarship for the College of Science & Mathematics

Traffic accidents are inevitable events that occur unexpectedly and unintentionally. Therefore, analyzing traffic data is essential to prevent fatal accidents. Traffic data analysis provided insights into significant factors and driver behavioral patterns causing accidents. Combining these patterns and the prediction model into an accident prevention system can assist in reducing and preventing traffic accidents. This study applied various machine learning models, including neural network, ordinal regression, decision tree, support vector machines, and logistic regression to have a robust prediction model in injury severity. The trained model provides timely and accurate predictions on accident occurrence and injury severity using real-world traffic …


Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari Mar 2022

Malware Binary Image Classification Using Convolutional Neural Networks, John Kiger, Shen-Shyang Ho, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

The persistent shortage of cybersecurity professionals combined with enterprise networks tasked with processing more data than ever before has led many cybersecurity experts to consider automating some of the most common and time-consuming security tasks using machine learning. One of these cybersecurity tasks where machine learning may prove advantageous is malware analysis and classification. To evade traditional detection techniques, malware developers are creating more complex malware. This is achieved through more advanced methods of code obfuscation and conducting more sophisticated attacks. This can make the manual process of analyzing malware an infinitely more complex task. Furthermore, the proliferation of malicious …


Technical Analysis Of Thanos Ransomware, Ikuromor Ogiriki, Christopher Beck, Vahid Heydari Mar 2022

Technical Analysis Of Thanos Ransomware, Ikuromor Ogiriki, Christopher Beck, Vahid Heydari

Faculty Scholarship for the College of Science & Mathematics

Ransomware is a developing menace that encrypts users’ files and holds the decryption key hostage until the victim pays a ransom. This particular class of malware has been in charge of extortion hundreds of millions of dollars every year. Adding to the problem, generating new variations is cheap. Therefore, new malware can detect antivirus and intrusion detection systems and evade them or manifest in ways to make themselves undetectable. We must first understand the characteristics and behavior of various varieties of ransomware to create and construct effective security mechanisms to combat them. This research presents a novel dynamic and behavioral …