Masters Theses
Permanent URI for this collection
Browse
Browsing Masters Theses by Department "Engineering Technology"
Results Per Page
Sort Options
-
Item4-Bit Cellular Automata Encryption Analysis(Middle Tennessee State University, 2017-07-13) Leitner, Dallas ; Salman, Karim ; Boles, Walter ; Sbenaty, Saleh ; Engineering TechnologyForms of cellular automata have been used for decades in various niches. One such use is random number generation for data encryption. There are numerous ways that have been developed for this purpose, but they are largely centered on the use of the 3-bit rule space. While this rule space has been tested and proven to possess the desired traits, limiting CA to only the 3-bit rule space severely limits the potential for extreme levels of complexity. To that end, this research aims to explore the 4-bit rule space to find new potential rules that possess the desired level of complexity with the hope that the methods used can be applied to still greater rule spaces.
-
Item4-Bit Cellular Automata Encryption Analysis(Middle Tennessee State University, 2017-07-13) Leitner, Dallas ; Salman, Karim ; Boles, Walter ; Sbenaty, Saleh ; Engineering TechnologyForms of cellular automata have been used for decades in various niches. One such use is random number generation for data encryption. There are numerous ways that have been developed for this purpose, but they are largely centered on the use of the 3-bit rule space. While this rule space has been tested and proven to possess the desired traits, limiting CA to only the 3-bit rule space severely limits the potential for extreme levels of complexity. To that end, this research aims to explore the 4-bit rule space to find new potential rules that possess the desired level of complexity with the hope that the methods used can be applied to still greater rule spaces.
-
ItemCellular Automata: Optimal Analysis, Coding, and Testing for Encryption(Middle Tennessee State University, 2016-03-16) Faulkenberry, Stephen James ; Salman, Karim ; Sbenaty, Saleh ; Boles, Walter ; Engineering TechnologyCellular automata are a set of discrete structures generated and manipulated by predetermined rules, in which each state (or evolution) is influenced by the previous. Utilizing the simplicity of this fundamental structure, a number of configurations have been organized and derived from elementary (single dimensional) cellular automata. By harvesting the evolution of these structures as output, they lend greatly to random number generation and by extension, encryption. Analyzing, testing, and programming these methods has led to observations on optimal approaches to each. Utilizing the Diehard testing suite and the National Institute of Standards and Technology (NIST) Statistical Testing Suite (STS), configurations can be judged against each other as well as external systems. Optimal methods for generating configurations, visual observation and data analysis are compiled in a workbook program. A complete analysis for the state diagrams of k [1, 27] in the 3-bit rule space is included and a Cellular Automata Standard of Encryption (CASE) is suggested for real world use.
-
ItemDesign and Fabrication of Erect Rotary Valve for Internal Combustion Engine(Middle Tennessee State University, 2016-04-19) Dong, Wenbo ; Perry, Charles ; Perry, Charles ; Boles, Walter ; Bedekar, Vishwas ; Engineering TechnologyThe internal combustion engine, performing mechanical work by harnessing combustion, has proved to be a convenient, efficient and reliable path in the last decades. However, the complexity of the inner structures and mechanisms act as the essential barrier which limits the further improvement of the internal combustion engine. The valve train, the structure that operates the combination gas exchange, contributes its friction to the internal mechanism loss which consumes power and confines the thermal efficiency. Based on the shape and operation of conventional poppet valves, a manufacturer has to sacrifice the piston top design and compression ratio to prevent valve-piston interference.
-
ItemIDENTIFY HAZARDS AND BARRIERS IN A PETROLEUM COMPANY FOR IMPLEMENTATION OF THE OHSAS 18001 OCCUPATIONAL HEALTH AND SAFETY MANAGEMENT SYSTEM(Middle Tennessee State University, 2013-12-25) Aras, Selin ; Boraiko, Carol ; Boles, Walter ; Welborn, Cliff ; Engineering TechnologyTurkish Petroleum Corporation (TPAO) has exploration, drilling, production and well completion, natural gas storage, oil and natural gas pipeline project activities in the oil sector. There are critical hazards in the petroleum industry. Identifying the hazards and implementing the Occupational Health and Safety Management System (OHSMS) to minimize the risks and prevent the accidents/injuries are effective methods to control hazards. This research was focused on the hazard identification, risk assessment and employee awareness and competence following the voluntary standard, OHSAS 18001 Occupational Health and Safety Management Standard. These risk assessments were related especially to working at height and emergency preparedness on the processes.
-
ItemOptimum Cellular Automata Configurations for Encryption(Middle Tennessee State University, 2015-04-14) Nichols, Daniel ; Salman, Karim ; Boles, Walter ; Sbenaty, Saleh ; Engineering TechnologyElementary cellular automata (ECA) is using Boolean logic functions to generate populations of ones and zeros. Population takes place temporally; each row of bits are populated based on the data from the previous row. The rules followed for generation of the next row are the functions mentioned above. Some rules produce very linear and predictable sets of binary data whereas some of them are chaotic in nature, like rule 30, and can be used to produce pseudo-random populations. This state by state calculation is ideal for cryptography in that it relies on an initial state (password or key) and can be streamed or generated as more data is transferred; the patterns are also largely unknown and are not predictable or linear in some cases. Currently, research shows many promising configurations of population generation that can be used for securing digital data or communications. Unfortunately the chaotic rules tend to repeat themselves after a given amount of temporal generation. This cyclic behavior is non-linear and near impossible to detect without generating the ECA. This research is aimed at finding the relationships between row length and cycle length in an effort to make a given key more effective by lengthening or eliminating this repetitious behavior.
-
ItemPseudo Random Number Generation Using Hardware Implementation of Elementary Cellular Automata(Middle Tennessee State University, 2016-10-28) Schenck, William ; Salman, Karim ; Sbenaty, Saleh ; Boles, Walter ; Engineering TechnologyStephen Wolfram suggested cellular automata may be a good candidate for
-
ItemREMOTE HUMIDITY AND TEMPERATURE REAL TIME MONITORING SYSTEM FOR STUDYING SEED BIOLOGY(Middle Tennessee State University, 2013-10-31) Balachandran, Thiruparan ; Sbenaty, Saleh ; Walck, Jeffrey ; Chen, Chong ; Engineering TechnologyThis thesis discusses the design, prototyping, and testing of a remote monitoring system that is used to study the biology of seeds under various controlled conditions. Seed scientists use air-tight boxes to maintain relative humidity, which influences seed longevity and seed dormancy break. The common practice is the use of super-saturated solutions either with different chemicals or different concentrations of LiCl to create various relative humidity. Theretofore, no known system has been developed to remotely monitor the environmental conditions inside these boxes in real time. This thesis discusses the development of a remote monitoring system that can be used to accurately monitor and measure the relative humidity and temperature inside sealed boxes for the study of seed biology. The system allows the remote and real-time monitoring of these two parameters in five boxes with different conditions. It functions as a client that is connected to the internet using Wireless Fidelity (Wi-Fi) technology while Google spreadsheet is used as the server for uploading and plotting the data. This system directly gets connected to the Google sever through Wi-Fi and uploads the sensors' values in a Google spread sheet. Application-specific software is created and the user can monitor the data in real time and/or download the data into Excel for further analyses. Using Google drive app the data can be viewed using a smart phone or a tablet. Furthermore, an electronic mail (e-mail) alert is also integrated into the system. Whenever measured values go beyond the threshold values, the user will receive an e-mail alert.
-
ItemTHE STUDY OF POWER CONSUMPTION DURING RADIAL AND AXIAL SEGREGATION IN HORIZONTAL ROTATING CYLINDERS(Middle Tennessee State University, 2013-06-28) Amin, Amin Haje ; Boles, Walter ; Nasab, Ahad ; Perry, Charles ; Engineering TechnologyWhen binary granules of different material properties are rotated in a horizontal rotating drum they often segregate. Within the first few seconds, the smaller particles move towards the radial core in what is known as radial segregation. Depending on granular properties, drum speeds, and drum dimensions, the granules can segregate into "bands" known as axial segregation. Prior experiments by Gebrehiwot show that while rotating black beans and rice at a mixed state axial segregation as well as power dissipation were observed. Similar experiments were performed using barley, black beans, lentils, pintos, rice, and safflower. In the experiments that axial segregation occurred there was a substantial decrease in torque and power. Density, particle size by volume, and static angle of repose calculated by the fixed funnel method were measured for each granule. Axial segregation only occurred when the density ratio of the materials was between 1-1.2 (similar density's), and the size ratio was greater than 4 (large size difference). In relation to static angle of repose, axial segregation was observed when the angle ratio of the mixed granules was 0-1 (similar) and 1.1-3 (different). A separate experiment using nylon hose shows that radial segregation does occur in the absence of the avalanche effect where the larger granule concentrates to the core.