Browsing by Subject "SSL"
Now showing 1 - 4 of 4
- Results Per Page
- Sort Options
Item Generation of Porous Structures Using Fused Deposition(1998) Bertoldi, M.; Yardimci, M. A; Pistor, C. M; Guceri, S.I; Danforth, S. C.The Fused Deposition Modeling process uses hardware and software machine-level language that are very similar to that of a pen-plotter. Consequently, the·use of patterns with poly-lines as basic geometric features, instead of the current method based on filled polygons (monolithic models), can increase its efficiency. In the current study, various toolpath planning methods have been developed to fabricate porous structures. Computational domain decomposition methods can be applied to the physical or to slice-level domains to generate structured and unstructured grids. Also, textures can be created using periodic tiling of the layer with unit cells (squares, honeycombs, etc). Methods 'based on curves include fractal space filling curves and.change of effective road width Within a layer or within a continuous curve. Individual phases can also be placed in binary compositions. In present investigation, a custom software has been developed and implemented to generate build files (SML) and slice files (SSL) for the above-mentioned structures, demonstrating the efficient control ofthe size, shape, and distribution ofporosity.Item Internet security for mobile computing(2017-05-04) Davis, Vincent Anthony; Julien, Christine, D. Sc.; Khurshid, SarfrazMobile devices are now the most dominant computer platform. Every time a mobile web application accesses the internet, the end user’s data is susceptible to malicious attacks. For instance, when paying a bill at a store with NFC mobile payment, navigating through a city operating GPS on a smartphone, or dictating the temperature at a household with a home automation device. These activities seem routine, yet, when vulnerabilities are present they can leave holes for hackers to access bank accounts, pinpoint a user’s recent location, or tell when someone is not at home. The awareness of the end user cannot be trusted. Device vendors and developers must provide safeguards. An ongoing issue is that the present security standards are outdated and were never envisioned with mobile devices in mind. It can be suggested that security is only idling the progress of mobile computing. Still, many application developers and IT professionals do not adopt security standards fast enough to keep up-to-date with known vulnerabilities. The main goals of the next generation of security standards, TLS, will provide developers with greater security efficiency and improved mobile throughput. These proposed capabilities of the TLS protocol will streamline mobile computing into the forefront of security practices. The analysis of this report demonstrates concepts on the direction mobile security, usability, and performance from a development standpoint.Item A Model for Partial Viscous Sintering(1991) Sun, Ming-shen; Nelson, Christian; Beaman, Joseph J.; Barlow, Joel J.A mathematical model describing the sintering rate of a viscous material powder bed is presented. This model assumes that the powder bed is composed of cubic packed, equal-size spherical particles. The sintering rate equation is derived in terms of a unit cell dimension or the relative density of a powder bed. A mathematical factor, fraction of sintering, is introduced to explain the phenomena of partial sintering. Key words: model, viscous sintering.Item Parametric Analysis of the Selective Laser Sintering Process(1990) Martin Sun, Ming-shen; Beaman, Joseph J.; Barlow, Joel W.Qualitative and quantitative analyses are required to develop Selective Laser Sintering into a viable Manufacturing process. A simplified mathematical model for sintering incorporating the heat tJ;ansfer equation. and the sintering rate equation, but using temperature independent thermal properties, is presented in this paper. A practical result is the calculation of sintering depthdeftned as the depth of powder where the void fraction is less than 0.1 as a function of control parameters, such as the laser power intensity, the laser scanning velocity, and the initial bedtemperature. We derive the general behavior of laser sintering. A comparison of model predictions with laser sinterlng tests is provided.