Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

Computer Sciences

Institution
Keyword
Publication Year
Publication
File Type

Articles 31 - 60 of 4778

Full-Text Articles in Engineering

An Algorithm Based On Priority Rules For Solving A Multi-Drone Routing Problem In Hazardous Waste Collection, Youssef Harrath Dr., Jihene Kaabi Dr. Jan 2024

An Algorithm Based On Priority Rules For Solving A Multi-Drone Routing Problem In Hazardous Waste Collection, Youssef Harrath Dr., Jihene Kaabi Dr.

Faculty Research & Publications

This research investigates the problem of assigning pre-scheduled trips to multiple drones to collect hazardous waste from different sites in the minimum time. Each drone is subject to essential restrictions: maximum flying capacity and recharge operation. The goal is to assign the trips to the drones so that the waste is collected in the minimum time. This is done if the total flying time is equally distributed among the drones. An algorithm was developed to solve the problem. The algorithm is based on two main ideas: sort the trips according to a given priority rule and assign the current trip …


Optimal Algorithm For Managing On-Campus Student Transportation, Youssef Harrath Dr. Jan 2024

Optimal Algorithm For Managing On-Campus Student Transportation, Youssef Harrath Dr.

Faculty Research & Publications

This study analyzed the transportation issues at the University of Bahrain Sakhir campus, where a bus system with an unorganized and fixed number of buses allocated each semester was in place. Data was collected through a survey, on-site observations, and student schedules to estimate the number of buses needed. The study was limited to students who require to move between buildings for academic purposes and not those who choose to ride buses for other reasons. An algorithm was designed to calculate the optimal number of buses for each time slot, and for each day. This solution could improve transportation efficiency, …


Enhancing Water Safety: Exploring Recent Technological Approaches For Drowning Detection, Salman Jalalifar, Andrew Belford, Eila Erfani, Amir Razmjou, Rouzbeh Abbassi, Masoud Mohseni-Dargah, Mohsen Asadnia Jan 2024

Enhancing Water Safety: Exploring Recent Technological Approaches For Drowning Detection, Salman Jalalifar, Andrew Belford, Eila Erfani, Amir Razmjou, Rouzbeh Abbassi, Masoud Mohseni-Dargah, Mohsen Asadnia

Research outputs 2022 to 2026

Drowning poses a significant threat, resulting in unexpected injuries and fatalities. To promote water sports activities, it is crucial to develop surveillance systems that enhance safety around pools and waterways. This paper presents an overview of recent advancements in drowning detection, with a specific focus on image processing and sensor-based methods. Furthermore, the potential of artificial intelligence (AI), machine learning algorithms (MLAs), and robotics technology in this field is explored. The review examines the technological challenges, benefits, and drawbacks associated with these approaches. The findings reveal that image processing and sensor-based technologies are the most effective approaches for drowning detection …


Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar Jan 2024

Multimodal Fusion For Audio-Image And Video Action Recognition, Muhammad B. Shaikh, Douglas Chai, Syed M. S. Islam, Naveed Akhtar

Research outputs 2022 to 2026

Multimodal Human Action Recognition (MHAR) is an important research topic in computer vision and event recognition fields. In this work, we address the problem of MHAR by developing a novel audio-image and video fusion-based deep learning framework that we call Multimodal Audio-Image and Video Action Recognizer (MAiVAR). We extract temporal information using image representations of audio signals and spatial information from video modality with the help of Convolutional Neutral Networks (CNN)-based feature extractors and fuse these features to recognize respective action classes. We apply a high-level weights assignment algorithm for improving audio-visual interaction and convergence. This proposed fusion-based framework utilizes …


Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances Dec 2023

Passive Physical Layer Distinct Native Attribute Cyber Security Monitor, Christopher M. Rondeau, Michael A. Temple, Juan Lopez Jr, J. Addison Betances

AFIT Patents

A method for cyber security monitor includes monitoring a network interface that is input-only configured to surreptitiously and covertly receive bit-level, physical layer communication between networked control and sensor field devices. During a training mode, a baseline distinct native attribute (DNA) fingerprint is generated for each networked field device. During a protection mode, a current DNA fingerprint is generated for each networked field device. The current DNA fingerprint is compared to the baseline DNA fingerprint for each networked field device. In response to detect at least one of RAA and PAA based on a change in the current DNA fingerprint …


Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl Dec 2023

Enhanced Privacy-Enabled Face Recognition Using Κ-Identity Optimization, Ryan Karl

Department of Electrical and Computer Engineering: Dissertations, Theses, and Student Research

Facial recognition is becoming more and more prevalent in the daily lives of the common person. Law enforcement utilizes facial recognition to find and track suspects. The newest smartphones have the ability to unlock using the user's face. Some door locks utilize facial recognition to allow correct users to enter restricted spaces. The list of applications that use facial recognition will only increase as hardware becomes more cost-effective and more computationally powerful. As this technology becomes more prevalent in our lives, it is important to understand and protect the data provided to these companies. Any data transmitted should be encrypted …


On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez Dec 2023

On Dyadic Parity Check Codes And Their Generalizations, Meraiah Martinez

Department of Mathematics: Dissertations, Theses, and Student Research

In order to communicate information over a noisy channel, error-correcting codes can be used to ensure that small errors don’t prevent the transmission of a message. One family of codes that has been found to have good properties is low-density parity check (LDPC) codes. These are represented by sparse bipartite graphs and have low complexity graph-based decoding algorithms. Various graphical properties, such as the girth and stopping sets, influence when these algorithms might fail. Additionally, codes based on algebraically structured parity check matrices are desirable in applications due to their compact representations, practical implementation advantages, and tractable decoder performance analysis. …


Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike Dec 2023

Pollutant Forecasting Using Neural Network-Based Temporal Models, Richard Pike

Masters Theses & Specialist Projects

The Jing-Jin-Ji region of China is a highly industrialized and populated area of the country. Its periodic high pollution and smog includes particles smaller than 2.5 μm, known as PM2.5, linked to many respiratory and cardiovascular illnesses. PM2.5 concentration around Jing-Jin-Ji has exceeded China’s urban air quality safety threshold for over 20% of all days in 2017 through 2020.

The quantity of ground weather stations that measure the concentrations of these pollutants, and their valuable data, is unfortunately small. By employing many machine learning strategies, many researchers have focused on interpolating finer spatial grids of PM2.5, or hindcasting PM2.5. However, …


Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce Dec 2023

Vertical Free-Swinging Photovoltaic Racking Energy Modeling: A Novel Approach To Agrivoltaics, Koami Soulemane Hayibo, Joshua M. Pearce

Electrical and Computer Engineering Publications

To enable lower-cost building materials, a free-swinging bifacial vertical solar photovoltaic (PV) rack has been proposed, which complies with Canadian building codes and is the lowest capital-cost agrivoltaics rack. The wind force applied to the free-swinging PV, however, causes it to have varying tilt angles depending on the wind speed and direction. No energy performance model accurately describes such a system. To provide a simulation model for the free-swinging PV, where wind speed and direction govern the array tilt angle, this study builds upon the open-source System Advisor Model (SAM) using Python. After the SAM python model is validated, a …


Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink Dec 2023

Understanding The Impact Of Trade Policy Effect Uncertainty On Firm-Level Innovation Investment: A Deep Learning Approach, Daniel Chang, Nan Hu, Peng Liang, Morgan Swink

Research Collection School Of Computing and Information Systems

Integrating the real options perspective and resource dependence theory, this study examines how firms adjust their innovation investments to trade policy effect uncertainty (TPEU), a less studied type of firm specific, perceived environmental uncertainty in which managers have difficulty predicting how potential policy changes will affect business operations. To develop a text-based, context-dependent, time-varying measure of firm-level perceived TPEU, we apply Bidirectional Encoder Representations from Transformers (BERT), a state-of-the-art deep learning approach. We apply BERT to analyze the texts of mandatory Management Discussion and Analysis (MD&A) sections of annual reports for a sample of 22,669 firm-year observations from 3,181 unique …


A Poisson-Based Distribution Learning Framework For Short-Term Prediction Of Food Delivery Demand Ranges, Jian Liang, Jintao Ke, Hai Wang, Hongbo Ye, Jinjun Tang Dec 2023

A Poisson-Based Distribution Learning Framework For Short-Term Prediction Of Food Delivery Demand Ranges, Jian Liang, Jintao Ke, Hai Wang, Hongbo Ye, Jinjun Tang

Research Collection School Of Computing and Information Systems

The COVID-19 pandemic has caused a dramatic change in the demand composition of restaurants and, at the same time, catalyzed on-demand food delivery (OFD) services—such as DoorDash, Grubhub, and Uber Eats—to a large extent. With massive amounts of data on customers, drivers, and merchants, OFD platforms can achieve higher efficiency with better strategic and operational decisions; these include dynamic pricing, order bundling and dispatching, and driver relocation. Some of these decisions, and especially proactive decisions in real time, rely on accurate and reliable short-term predictions of demand ranges or distributions. In this paper, we develop a Poisson-based distribution prediction (PDP) …


On The Effect Of Emotion Identification From Limited Translated Text Samples Using Computational Intelligence, Madiha Tahir, Zahid Halim, Muhmmad Waqas, Shanshan Tu Dec 2023

On The Effect Of Emotion Identification From Limited Translated Text Samples Using Computational Intelligence, Madiha Tahir, Zahid Halim, Muhmmad Waqas, Shanshan Tu

Research outputs 2022 to 2026

Emotion identification from text data has recently gained focus of the research community. This has multiple utilities in an assortment of domains. Many times, the original text is written in a different language and the end-user translates it to her native language using online utilities. Therefore, this paper presents a framework to detect emotions on translated text data in four different languages. The source language is English, whereas the four target languages include Chinese, French, German, and Spanish. Computational intelligence (CI) techniques are applied to extract features, dimensionality reduction, and classification of data into five basic classes of emotions. Results …


Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang Dec 2023

Neural Airport Ground Handling, Yaoxin Wu, Jianan Zhou, Yunwen Xia, Xianli Zhang, Zhiguang Cao, Jie Zhang

Research Collection School Of Computing and Information Systems

Airport ground handling (AGH) offers necessary operations to flights during their turnarounds and is of great importance to the efficiency of airport management and the economics of aviation. Such a problem involves the interplay among the operations that leads to NP-hard problems with complex constraints. Hence, existing methods for AGH are usually designed with massive domain knowledge but still fail to yield high-quality solutions efficiently. In this paper, we aim to enhance the solution quality and computation efficiency for solving AGH. Particularly, we first model AGH as a multiple-fleet vehicle routing problem (VRP) with miscellaneous constraints including precedence, time windows, …


Analysis And Requirement Generation For Defense Intelligence Search: Addressing Data Overload Through Human–Ai Agent System Design For Ambient Awareness, Mark C. Duncan, Michael E. Miller, Brett J. Borghetti Nov 2023

Analysis And Requirement Generation For Defense Intelligence Search: Addressing Data Overload Through Human–Ai Agent System Design For Ambient Awareness, Mark C. Duncan, Michael E. Miller, Brett J. Borghetti

Faculty Publications

This research addresses the data overload faced by intelligence searchers in government and defense agencies. The study leverages methods from the Cognitive Systems Engineering (CSE) literature to generate insights into the intelligence search work domain. These insights are applied to a supporting concept and requirements for designing and evaluating a human-AI agent team specifically for intelligence search tasks. Domain analysis reveals the dynamic nature of the ‘value structure’, a term that describes the evolving set of criteria governing the intelligence search process. Additionally, domain insight provides details for search aggregation and conceptual spaces from which the value structure could be …


Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer Nov 2023

Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer

CERIAS Technical Reports

The challenge of providing data privacy and integrity while maintaining efficient performance for honest users is a persistent concern in cryptography. Attackers exploit advances in parallel hardware and custom circuit hardware to gain an advantage over regular users. One such method is the use of Application-Specific Integrated Circuits (ASICs) to optimize key derivation function (KDF) algorithms, giving adversaries a significant advantage in password guessing and recovery attacks. Other examples include using graphical processing units (GPUs) and field programmable gate arrays (FPGAs). We propose a focused approach to close the gap between adversarial advantage and honest user performance by leveraging the …


An Overview Of Elements And Relations: Aspects Of A Scientific Metaphysics, Martin Zwick Nov 2023

An Overview Of Elements And Relations: Aspects Of A Scientific Metaphysics, Martin Zwick

Systems Science Faculty Publications and Presentations

A talk on my book, Elements and Relations: Aspects of a Scientific Metaphysics. Book description:

This book develops the core proposition that systems theory is an attempt to construct an “exact and scientific metaphysics,” a system of general ideas central to science that can be expressed mathematically. Collectively, these ideas would constitute a non-reductionist “theory of everything” unlike what is being sought in physics. Inherently transdisciplinary, systems theory offers ideas and methods that are relevant to all of the sciences and also to professional fields such as systems engineering, public policy, business, and social work. To demonstrate the generality …


S-Net: A Multiple Cross Aggregation Convolutional Architecture For Automatic Segmentation Of Small/Thin Structures For Cardiovascular Applications, Nan Mu, Zonghan Lyu, Mostafa Rezaeitaleshmahalleh, Cassie Bonifas, Jordan Gosnell, Marcus Haw, Joseph Vettukattil, Jingfeng Jiang Nov 2023

S-Net: A Multiple Cross Aggregation Convolutional Architecture For Automatic Segmentation Of Small/Thin Structures For Cardiovascular Applications, Nan Mu, Zonghan Lyu, Mostafa Rezaeitaleshmahalleh, Cassie Bonifas, Jordan Gosnell, Marcus Haw, Joseph Vettukattil, Jingfeng Jiang

Michigan Tech Publications, Part 2

With the success of U-Net or its variants in automatic medical image segmentation, building a fully convolutional network (FCN) based on an encoder-decoder structure has become an effective end-to-end learning approach. However, the intrinsic property of FCNs is that as the encoder deepens, higher-level features are learned, and the receptive field size of the network increases, which results in unsatisfactory performance for detecting low-level small/thin structures such as atrial walls and small arteries. To address this issue, we propose to keep the different encoding layer features at their original sizes to constrain the receptive field from increasing as the network …


Motif-Cluster: A Spatial Clustering Package For Repetitive Motif Binding Patterns, Mengyuan Zhou Nov 2023

Motif-Cluster: A Spatial Clustering Package For Repetitive Motif Binding Patterns, Mengyuan Zhou

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Previous efforts in using genome-wide analysis of transcription factor binding sites (TFBSs) have overlooked the importance of ranking potential significant regulatory regions, especially those with repetitive binding within a local region. Identifying these homogenous binding sites is critical because they have the potential to amplify the binding affinity and regulation activity of transcription factors, impacting gene expression and cellular functions. To address this issue, we developed an open-source tool Motif-Cluster that prioritizes and visualizes transcription factor regulatory regions by incorporating the idea of local motif clusters. Motif-Cluster can rank the significant transcription factor regulatory regions without the need for experimental …


Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks Nov 2023

Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks

Mineta Transportation Institute Publications

There are over 590,000 bridges dispersed across the roadway network that stretches across the United States alone. Each bridge with a length of 20 feet or greater must be inspected at least once every 24 months, according to the Federal Highway Act (FHWA) of 1968. This research developed an artificial intelligence (AI)-based framework for bridge and road inspection using drones with multiple sensors collecting capabilities. It is not sufficient to conduct inspections of bridges and roads using cameras alone, so the research team utilized an infrared (IR) camera along with a high-resolution optical camera. In many instances, the IR camera …


Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu Nov 2023

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Joint Location And Cost Planning In Maximum Capture Facility Location Under Random Utilities, Ngan H. Duong, Tien Thanh Dam, Thuy Anh Ta, Tien Mai Nov 2023

Joint Location And Cost Planning In Maximum Capture Facility Location Under Random Utilities, Ngan H. Duong, Tien Thanh Dam, Thuy Anh Ta, Tien Mai

Research Collection School Of Computing and Information Systems

We study a joint facility location and cost planning problem in a competitive market under random utility maximization (RUM) models. The objective is to locate new facilities and make decisions on the costs (or budgets) to spend on the new facilities, aiming to maximize an expected captured customer demand, assuming that customers choose a facility among all available facilities according to a RUM model. We examine two RUM frameworks in the discrete choice literature, namely, the additive and multiplicative RUM. While the former has been widely used in facility location problems, we are the first to explore the latter in …


Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman Nov 2023

Cyberattacks And Security Of Cloud Computing: A Complete Guideline, Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman

Research outputs 2022 to 2026

Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, …


Robust Maximum Capture Facility Location Under Random Utility Maximization Models, Tien Thanh Dam, Thuy Anh Ta, Tien Mai Nov 2023

Robust Maximum Capture Facility Location Under Random Utility Maximization Models, Tien Thanh Dam, Thuy Anh Ta, Tien Mai

Research Collection School Of Computing and Information Systems

We study a robust version of the maximum capture facility location problem in a competitive market, assuming that each customer chooses among all available facilities according to a random utility maximization (RUM) model. We employ the generalized extreme value (GEV) family of models and assume that the parameters of the RUM model are not given exactly but lie in convex uncertainty sets. The problem is to locate new facilities to maximize the worst-case captured user demand. We show that, interestingly, our robust model preserves the monotonicity and submodularity from its deterministic counterpart, implying that a simple greedy heuristic can guarantee …


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


Demo-Abstract: A Dtn System For Tracking Miners Using Gae-Lstm And Contact Graph Routing In An Underground Mine, Abhay Goyal, Sanjay Kumar Madria, Samuel Frimpong Oct 2023

Demo-Abstract: A Dtn System For Tracking Miners Using Gae-Lstm And Contact Graph Routing In An Underground Mine, Abhay Goyal, Sanjay Kumar Madria, Samuel Frimpong

Computer Science Faculty Research & Creative Works

Localization and prediction of movement of miners in underground mines have been a constant problem more so during a mine disaster. Due to the unavailability of GPS signals, the pillars are used as a method to locate these miners, and thus, location prediction is also carried out with reference to these pillars. In this work, we demon- strate a Delay-tolerant Network (DTN) system called Miner-Finder that leverages Machine Learning (ML) framework (GAE-LSTM) that works on edge devices (e.g., mobile phones, tablets) to predict the location of miners in an underground mine. The information such as speed, angle, time, nearest pillar …


A Dynamic Online Dashboard For Tracking The Performance Of Division 1 Basketball Athletic Performance, Erica Juliano, Chelsea Thakkar, Christopher B. Taber, Mehul S. Raval, Kaya Tolga, Samah Senbel Oct 2023

A Dynamic Online Dashboard For Tracking The Performance Of Division 1 Basketball Athletic Performance, Erica Juliano, Chelsea Thakkar, Christopher B. Taber, Mehul S. Raval, Kaya Tolga, Samah Senbel

School of Computer Science & Engineering Undergraduate Publications

Using Data Analytics is a vital part of sport performance enhancement. We collect data from the Division 1 'Women's basketball athletes and coaches at our university, for use in analysis and prediction. Several data sources are used daily and weekly: WHOOP straps, weekly surveys, polar straps, jump analysis, and training session information. In this paper, we present an online dashboard to visually present the data to the athletes and coaches. R shiny was used to develop the platform, with the data stored on the cloud for instant updates of the dashboard as the data becomes available. The performance of athletes …


Statistical And Machine Learning Approaches To Describe Factors Affecting Preweaning Mortality Of Piglets, Md Towfiqur Rahman, Tami M. Brown-Brandl, Gary A. Rohrer, Sudhendu R. Sharma, Vamsi Manthena, Yeyin Shi Oct 2023

Statistical And Machine Learning Approaches To Describe Factors Affecting Preweaning Mortality Of Piglets, Md Towfiqur Rahman, Tami M. Brown-Brandl, Gary A. Rohrer, Sudhendu R. Sharma, Vamsi Manthena, Yeyin Shi

Biological Systems Engineering: Papers and Publications

High preweaning mortality (PWM) rates for piglets are a significant concern for the worldwide pork industries, causing economic loss and well-being issues. This study focused on identifying the factors affecting PWM, overlays, and predicting PWM using historical production data with statistical and machine learning models. Data were collected from 1,982 litters from the United States Meat Animal Research Center, Nebraska, over the years 2016 to 2021. Sows were housed in a farrowing building with three rooms, each with 20 farrowing crates, and taken care of by well-trained animal caretakers. A generalized linear model was used to analyze the various sow, …


Evolution Of Glassy Carbon Derived From Pyrolysis Of Furan Resin, Josh Kemppainen, Ivan Gallegos, Aaron Krieg, Jacob R. Gissinger, Kristopher E. Wise, Margaret Kowalik, Julia A. King, S. Gowtham, Adri Van Duin, Gregory Odegard Oct 2023

Evolution Of Glassy Carbon Derived From Pyrolysis Of Furan Resin, Josh Kemppainen, Ivan Gallegos, Aaron Krieg, Jacob R. Gissinger, Kristopher E. Wise, Margaret Kowalik, Julia A. King, S. Gowtham, Adri Van Duin, Gregory Odegard

Michigan Tech Publications, Part 2

Glassy carbon (GC) material derived from pyrolyzed furan resin was modeled by using reactive molecular dynamics (MD) simulations. The MD polymerization simulation protocols to cure the furan resin precursor material are validated via comparison of the predicted density and Young's modulus with experimental values. The MD pyrolysis simulations protocols to pyrolyze the furan resin precursor is validated by comparison of calculated density, Young's modulus, carbon content, sp carbon content, the in-plane crystallite size, out-of-plane crystallite stacking height, and interplanar crystallite spacing with experimental results from the literature for furan resin derived GC. The modeling methodology established in this work can …


Machine Learning Prediction Of Hea Properties, Nicholas J. Beaver, Nathaniel Melisso, Travis Murphy Oct 2023

Machine Learning Prediction Of Hea Properties, Nicholas J. Beaver, Nathaniel Melisso, Travis Murphy

College of Engineering Summer Undergraduate Research Program

High-entropy alloys (HEA) are a very new development in the field of metallurgical materials. They are made up of multiple principle atoms unlike traditional alloys, which contributes to their high configurational entropy. The microstructure and properties of HEAs are are not well predicted with the models developed for more common engineering alloys, and there is not enough data available on HEAs to fully represent the complex behavior of these alloys. To that end, we explore how the use of machine learning models can be used to model the complex, high dimensional behavior in the HEA composition space. Based on our …


Development Of User Interface And Testing Harness, Jacob Amezquita, William Albertini Oct 2023

Development Of User Interface And Testing Harness, Jacob Amezquita, William Albertini

College of Engineering Summer Undergraduate Research Program

No abstract provided.