2 resultados para Upper bound method

em Digital Commons at Florida International University


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The present research concentrates on the fabrication of bulk aluminum matrix nanocomposite structures with carbon nanotube reinforcement. The objective of the work was to fabricate and characterize multi-walled carbon nanotube (MWCNT) reinforced hypereutectic Al-Si (23 wt% Si, 2 wt% Ni, 1 wt% Cu, rest Al) nanocomposite bulk structure with nanocrystalline matrix through thermal spray forming techniques viz. plasma spray forming (PSF) and high velocity oxy-fuel (HVOF) spray forming. This is the first research study, which has shown that thermal spray forming can be successfully used to synthesize carbon nanotube reinforced nanocomposites. Microstructural characterization based on quantitative microscopy, scanning and transmission electron microscopy (SEM and TEM), energy dispersive spectroscopy (EDS), X-ray diffraction (XRD), Raman spectroscopy and X ray photoelectron spectroscopy (XPS) confirms (i) retention and macro/sub-macro level homogenous distribution of multiwalled carbon nanotubes in the Al-Si matrix and (ii) evolution of nanostructured grains in the matrix. Formation of ultrathin β-SiC layer on MWCNT surface, due to chemical reaction of Si atoms diffusing from Al-Si alloy and C atoms from the outer walls of MWCNTs has been confirmed theoretically and experimentally. The presence of SiC layer at the interface improves the wettability and the interfacial adhesion between the MWCNT reinforcement and the Al-Si matrix. Sintering of the as-sprayed nanocomposites was carried out in an inert environment for further densification. As-sprayed PSF nanocomposite showed lower microhardness compared to HVOF, due to the higher porosity content and lower residual stress. The hardness of the nanocomposites increased with sintering time due to effective pore removal. Uniaxial tensile test on CNT-bulk nanocomposite was carried out, which is the first ever study of such nature. The tensile test results showed inconsistency in the data attributed to inhomogeneous microstructure and limitation of the test samples geometry. The elastic moduli of nanocomposites were computed using different micromechanics models and compared with experimentally measured values. The elastic moduli of nanocomposites measured by nanoindentation technique, increased gradually with sintering attributed to porosity removal. The experimentally measured values conformed better with theoretically predicted values, particularly in the case of Hashin-Shtrikman bound method.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^