Browsing by Department "Engineering Technology"
Results Per Page
Sort Options
-
Item3D PRINTING BODY PARTS: AN OVERVIEW OF HOW ADDITIVE MANUFACTURING IS SHAPING TISSUE ENGINEERING(Middle Tennessee State University, 2014-2-23) Cross, Grant ; Boraiko, Carol ; Engineering TechnologyAdditive manufacturing, commonly referred to as 3D printing, is a manufacturing technique that emerged in the 1980 s mainly focused on engineering prototyping. Recent advances in the precision and cost of the techniques, as well as the widespread use of 3D modeling have increased 3D printing s scope of use from high-end engineering prototypes to a large variety of uses in manufacturing. 3D printing has been shown to improve the processing time, reduce waste, and increase the level of customization of certain products by eliminating the need for the specialty tooling and dies that are traditionally used in manufacturing. Additionally, the ability to physically print complex shapes based on a computer model has given rise to new products that would otherwise be simply impossible to create. The field of tissue engineering has taken advantage of this technology by printing organic cells and inorganic biomaterials with levels of control and precision that surpass previous production techniques. Furthermore, 3D printing allows for applications that can be customized on a case-by-case basis to fit the needs of individual patients. This review will overview the 3D printing-based techniques being used in tissue engineering, and discuss the current applications and challenges of this rapidly advancing field.
-
Item4-Bit Cellular Automata Encryption Analysis(Middle Tennessee State University, 2017-07-13) Leitner, Dallas ; Salman, Karim ; Boles, Walter ; Sbenaty, Saleh ; Engineering TechnologyForms of cellular automata have been used for decades in various niches. One such use is random number generation for data encryption. There are numerous ways that have been developed for this purpose, but they are largely centered on the use of the 3-bit rule space. While this rule space has been tested and proven to possess the desired traits, limiting CA to only the 3-bit rule space severely limits the potential for extreme levels of complexity. To that end, this research aims to explore the 4-bit rule space to find new potential rules that possess the desired level of complexity with the hope that the methods used can be applied to still greater rule spaces.
-
Item4-Bit Cellular Automata Encryption Analysis(Middle Tennessee State University, 2017-07-13) Leitner, Dallas ; Salman, Karim ; Boles, Walter ; Sbenaty, Saleh ; Engineering TechnologyForms of cellular automata have been used for decades in various niches. One such use is random number generation for data encryption. There are numerous ways that have been developed for this purpose, but they are largely centered on the use of the 3-bit rule space. While this rule space has been tested and proven to possess the desired traits, limiting CA to only the 3-bit rule space severely limits the potential for extreme levels of complexity. To that end, this research aims to explore the 4-bit rule space to find new potential rules that possess the desired level of complexity with the hope that the methods used can be applied to still greater rule spaces.
-
ItemCellular Automata: Optimal Analysis, Coding, and Testing for Encryption(Middle Tennessee State University, 2016-03-16) Faulkenberry, Stephen James ; Salman, Karim ; Sbenaty, Saleh ; Boles, Walter ; Engineering TechnologyCellular automata are a set of discrete structures generated and manipulated by predetermined rules, in which each state (or evolution) is influenced by the previous. Utilizing the simplicity of this fundamental structure, a number of configurations have been organized and derived from elementary (single dimensional) cellular automata. By harvesting the evolution of these structures as output, they lend greatly to random number generation and by extension, encryption. Analyzing, testing, and programming these methods has led to observations on optimal approaches to each. Utilizing the Diehard testing suite and the National Institute of Standards and Technology (NIST) Statistical Testing Suite (STS), configurations can be judged against each other as well as external systems. Optimal methods for generating configurations, visual observation and data analysis are compiled in a workbook program. A complete analysis for the state diagrams of k [1, 27] in the 3-bit rule space is included and a Cellular Automata Standard of Encryption (CASE) is suggested for real world use.
-
ItemDesign and Fabrication of Erect Rotary Valve for Internal Combustion Engine(Middle Tennessee State University, 2016-04-19) Dong, Wenbo ; Perry, Charles ; Perry, Charles ; Boles, Walter ; Bedekar, Vishwas ; Engineering TechnologyThe internal combustion engine, performing mechanical work by harnessing combustion, has proved to be a convenient, efficient and reliable path in the last decades. However, the complexity of the inner structures and mechanisms act as the essential barrier which limits the further improvement of the internal combustion engine. The valve train, the structure that operates the combination gas exchange, contributes its friction to the internal mechanism loss which consumes power and confines the thermal efficiency. Based on the shape and operation of conventional poppet valves, a manufacturer has to sacrifice the piston top design and compression ratio to prevent valve-piston interference.
-
ItemIDENTIFY HAZARDS AND BARRIERS IN A PETROLEUM COMPANY FOR IMPLEMENTATION OF THE OHSAS 18001 OCCUPATIONAL HEALTH AND SAFETY MANAGEMENT SYSTEM(Middle Tennessee State University, 2013-12-25) Aras, Selin ; Boraiko, Carol ; Boles, Walter ; Welborn, Cliff ; Engineering TechnologyTurkish Petroleum Corporation (TPAO) has exploration, drilling, production and well completion, natural gas storage, oil and natural gas pipeline project activities in the oil sector. There are critical hazards in the petroleum industry. Identifying the hazards and implementing the Occupational Health and Safety Management System (OHSMS) to minimize the risks and prevent the accidents/injuries are effective methods to control hazards. This research was focused on the hazard identification, risk assessment and employee awareness and competence following the voluntary standard, OHSAS 18001 Occupational Health and Safety Management Standard. These risk assessments were related especially to working at height and emergency preparedness on the processes.
-
ItemNot another Meeting!(Middle Tennessee State University, 2016-03) Clements, Joel S. ; Engineering TechnologyA meeting should help an organization better accomplish its mission. Many times our meetings do not achieve this goal. This does not have to be the case. Individuals and organizations invest significant time and resources in meetings, but they can fall short of the desired results. When meeting participants are not engaged, there is a real but frequently hidden cost on both the entire organization and individuals. These costs can include hard dollars due to wasted or misdirected efforts and soft dollar costs associated with individuals stress and morale. Once an organization has an understanding of the cost and benefits associated with meetings, there are many best practices which can be used to help achieve the results needed. These practices are designed to make it easy to do the right thing and hard to do the wrong thing. This research provides a prioritized list of best practices that can improve the meeting experience, outcomes, and build organizational capabilities. Prioritization is based on empirical data from literature as well as limited survey results and personal experiences.
-
ItemOptimum Cellular Automata Configurations for Encryption(Middle Tennessee State University, 2015-04-14) Nichols, Daniel ; Salman, Karim ; Boles, Walter ; Sbenaty, Saleh ; Engineering TechnologyElementary cellular automata (ECA) is using Boolean logic functions to generate populations of ones and zeros. Population takes place temporally; each row of bits are populated based on the data from the previous row. The rules followed for generation of the next row are the functions mentioned above. Some rules produce very linear and predictable sets of binary data whereas some of them are chaotic in nature, like rule 30, and can be used to produce pseudo-random populations. This state by state calculation is ideal for cryptography in that it relies on an initial state (password or key) and can be streamed or generated as more data is transferred; the patterns are also largely unknown and are not predictable or linear in some cases. Currently, research shows many promising configurations of population generation that can be used for securing digital data or communications. Unfortunately the chaotic rules tend to repeat themselves after a given amount of temporal generation. This cyclic behavior is non-linear and near impossible to detect without generating the ECA. This research is aimed at finding the relationships between row length and cycle length in an effort to make a given key more effective by lengthening or eliminating this repetitious behavior.
-
ItemPseudo Random Number Generation Using Hardware Implementation of Elementary Cellular Automata(Middle Tennessee State University, 2016-10-28) Schenck, William ; Salman, Karim ; Sbenaty, Saleh ; Boles, Walter ; Engineering TechnologyStephen Wolfram suggested cellular automata may be a good candidate for
-
ItemREMOTE HUMIDITY AND TEMPERATURE REAL TIME MONITORING SYSTEM FOR STUDYING SEED BIOLOGY(Middle Tennessee State University, 2013-10-31) Balachandran, Thiruparan ; Sbenaty, Saleh ; Walck, Jeffrey ; Chen, Chong ; Engineering TechnologyThis thesis discusses the design, prototyping, and testing of a remote monitoring system that is used to study the biology of seeds under various controlled conditions. Seed scientists use air-tight boxes to maintain relative humidity, which influences seed longevity and seed dormancy break. The common practice is the use of super-saturated solutions either with different chemicals or different concentrations of LiCl to create various relative humidity. Theretofore, no known system has been developed to remotely monitor the environmental conditions inside these boxes in real time. This thesis discusses the development of a remote monitoring system that can be used to accurately monitor and measure the relative humidity and temperature inside sealed boxes for the study of seed biology. The system allows the remote and real-time monitoring of these two parameters in five boxes with different conditions. It functions as a client that is connected to the internet using Wireless Fidelity (Wi-Fi) technology while Google spreadsheet is used as the server for uploading and plotting the data. This system directly gets connected to the Google sever through Wi-Fi and uploads the sensors' values in a Google spread sheet. Application-specific software is created and the user can monitor the data in real time and/or download the data into Excel for further analyses. Using Google drive app the data can be viewed using a smart phone or a tablet. Furthermore, an electronic mail (e-mail) alert is also integrated into the system. Whenever measured values go beyond the threshold values, the user will receive an e-mail alert.
-
ItemTHE STUDY OF POWER CONSUMPTION DURING RADIAL AND AXIAL SEGREGATION IN HORIZONTAL ROTATING CYLINDERS(Middle Tennessee State University, 2013-06-28) Amin, Amin Haje ; Boles, Walter ; Nasab, Ahad ; Perry, Charles ; Engineering TechnologyWhen binary granules of different material properties are rotated in a horizontal rotating drum they often segregate. Within the first few seconds, the smaller particles move towards the radial core in what is known as radial segregation. Depending on granular properties, drum speeds, and drum dimensions, the granules can segregate into "bands" known as axial segregation. Prior experiments by Gebrehiwot show that while rotating black beans and rice at a mixed state axial segregation as well as power dissipation were observed. Similar experiments were performed using barley, black beans, lentils, pintos, rice, and safflower. In the experiments that axial segregation occurred there was a substantial decrease in torque and power. Density, particle size by volume, and static angle of repose calculated by the fixed funnel method were measured for each granule. Axial segregation only occurred when the density ratio of the materials was between 1-1.2 (similar density's), and the size ratio was greater than 4 (large size difference). In relation to static angle of repose, axial segregation was observed when the angle ratio of the mixed granules was 0-1 (similar) and 1.1-3 (different). A separate experiment using nylon hose shows that radial segregation does occur in the absence of the avalanche effect where the larger granule concentrates to the core.