skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Search for: All records

Creators/Authors contains: "Roth, John"

Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

  1. Double-sided incremental forming (DSIF) is a die-less sheet metal forming process capable of fabricating complex parts. The flexibility of DSIF can be used for in-situ mechanical properties alteration, e.g., by controlling deformation-induced martensite transformation of austenitic stainless steels. In this paper, SS304L is deformed using DSIF at three different cooling conditions and two different tool paths to affect the martensite transformation. Additionally, finite element analyses were used to understandthe effect of tool paths on springback and plastic strain. Implementing a reforming tool path at the lowest achievable temperature resulted in a martensite volume fraction as high as 95%. 
    more » « less
  2. Sensor networks and IoT systems have been widely deployed in monitoring and controlling system. With its increasing utilization, the functionality and performance of sensor networks and their applications are not the only design aims; security issues in sensor networks attract more and more attentions. Security threats in sensor and its networks could be originated from various sectors: users in cyber space, security-weak protocols, obsolete network infrastructure, low-end physical devices, and global supply chain. In this work, we take one of the emerging applications, advanced manufacturing, as an example to analyze the security challenges in the sensor network. Presentable attacks—hardware Trojan attack, man-in-the-middle attack, jamming attack and replay attack—are examined in the context of sensing nodes deployed in a long-range wide-area network (LoRaWAN) for advanced manufacturing. Moreover, we analyze the challenges of detecting those attacks. 
    more » « less