Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 961 - 990 of 15207

Full-Text Articles in Physical Sciences and Mathematics

Enabling Collaborative Video Sensing At The Edge Through Convolutional Sharing, Kasthuri Jayarajah, Wanniarachchige Dhanuja Tharith Wanniarachchi, Archan Misra Dec 2020

Enabling Collaborative Video Sensing At The Edge Through Convolutional Sharing, Kasthuri Jayarajah, Wanniarachchige Dhanuja Tharith Wanniarachchi, Archan Misra

Research Collection School Of Computing and Information Systems

While Deep Neural Network (DNN) models have provided remarkable advances in machine vision capabilities, their high computational complexity and model sizes present a formidable roadblock to deployment in AIoT-based sensing applications. In this paper, we propose a novel paradigm by which peer nodes in a network can collaborate to improve their accuracy on person detection, an exemplar machine vision task. The proposed methodology requires no re-training of the DNNs and incurs minimal processing latency as it extracts scene summaries from the collaborators and injects back into DNNs of the reference cameras, on-the-fly. Early results show promise with improvements in recall …


Learning To Dispatch For Job Shop Scheduling Via Deep Reinforcement Learning, Cong Zhang, Wen Song, Zhiguang Cao, Jie Zhang, Puay Siew Tan, Xu Chi Dec 2020

Learning To Dispatch For Job Shop Scheduling Via Deep Reinforcement Learning, Cong Zhang, Wen Song, Zhiguang Cao, Jie Zhang, Puay Siew Tan, Xu Chi

Research Collection School Of Computing and Information Systems

Priority dispatching rule (PDR) is widely used for solving real-world Job-shop scheduling problem (JSSP). However, the design of effective PDRs is a tedious task, requiring a myriad of specialized knowledge and often delivering limited performance. In this paper, we propose to automatically learn PDRs via an end-to-end deep reinforcement learning agent. We exploit the disjunctive graph representation of JSSP, and propose a Graph Neural Network based scheme to embed the states encountered during solving. The resulting policy network is size-agnostic, effectively enabling generalization on large-scale instances. Experiments show that the agent can learn high-quality PDRs from scratch with elementary raw …


A Study Of Multi-Task And Region-Wise Deep Learning For Food Ingredient Recognition, Jingjing Chen, Bin Zhu, Chong-Wah Ngo, Tat-Seng Chua, Yu-Gang Jiang Dec 2020

A Study Of Multi-Task And Region-Wise Deep Learning For Food Ingredient Recognition, Jingjing Chen, Bin Zhu, Chong-Wah Ngo, Tat-Seng Chua, Yu-Gang Jiang

Research Collection School Of Computing and Information Systems

Food recognition has captured numerous research attention for its importance for health-related applications. The existing approaches mostly focus on the categorization of food according to dish names, while ignoring the underlying ingredient composition. In reality, two dishes with the same name do not necessarily share the exact list of ingredients. Therefore, the dishes under the same food category are not mandatorily equal in nutrition content. Nevertheless, due to limited datasets available with ingredient labels, the problem of ingredient recognition is often overlooked. Furthermore, as the number of ingredients is expected to be much less than the number of food categories, …


Smartfuzz: An Automated Smart Fuzzing Approach For Testing Smartthings Apps, Lwin Khin Shar, Nguyen Binh Duong Ta, Lingxiao Jiang, David Lo, Wei Minn, Kiah Yong Glenn Yeo, Eugene Kim Dec 2020

Smartfuzz: An Automated Smart Fuzzing Approach For Testing Smartthings Apps, Lwin Khin Shar, Nguyen Binh Duong Ta, Lingxiao Jiang, David Lo, Wei Minn, Kiah Yong Glenn Yeo, Eugene Kim

Research Collection School Of Computing and Information Systems

As IoT ecosystem has been fast-growing recently, there have been various security concerns of this new computing paradigm. Malicious IoT apps gaining access to IoT devices and capabilities to execute sensitive operations (sinks), e.g., controlling door locks and switches, may cause serious security and safety issues. Unlike traditional mobile/web apps, IoT apps highly interact with a wide variety of physical IoT devices and respond to environmental events, in addition to user inputs. It is therefore important to conduct comprehensive testing of IoT apps to identify possible anomalous behaviours. On the other hand, it is also important to optimize the number …


Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan Dec 2020

Prediction Of Nocturia In Live Alone Elderly Using Unobtrusive In-Home Sensors, Barry Nuqoba, Hwee-Pink Tan

Research Collection School Of Computing and Information Systems

Nocturia, or the need to void (or urinate) one or more times in the middle of night time sleeping, represents a significant economic burden for individuals and healthcare systems. Although it can be diagnosed in the hospital, most people tend to regard nocturia as a usual event, resulting in underreported diagnosis and treatment. Data from self-reporting via a voiding diary may be irregular and subjective especially among the elderly due to memory problems. This study aims to detect the presence of nocturia through passive in-home monitoring to inform intervention (e.g., seeking diagnosis and treatment) to improve the physical and mental …


Analysis Of Online Posts To Discover Student Learning Challenges And Inform Targeted Curriculum Improvement Actions, Michelle L. F. Cheong, Jean Y. C. Chen, Bingtian Dai Dec 2020

Analysis Of Online Posts To Discover Student Learning Challenges And Inform Targeted Curriculum Improvement Actions, Michelle L. F. Cheong, Jean Y. C. Chen, Bingtian Dai

Research Collection School Of Computing and Information Systems

Past research on analysing end-of-term student feedback tend to result in only high-level course improvement suggestions, and some recent research even argued that student feedback is a poor indicator of teaching effectiveness and student learning. Our intelligent Q&A platform with machine learning prediction and engagement features allow students to ask self-directed questions and provide answers in an out-of-class informal setting. By analysing such high quality and truthful posts which represent the students’ queries and knowledge about the course content, we can better identify the exact course topics which the students face learning challenges. We have implemented our Q&A platform for …


Co-Embedding Attributed Networks With External Knowledge, Pei-Chi Lo, Ee-Peng Lim Dec 2020

Co-Embedding Attributed Networks With External Knowledge, Pei-Chi Lo, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Attributed network embedding aims to learn representations of nodes and their attributes in a low-dimensional space that preserves their semantics. The existing embedding models, however, consider node connectivity and node attributes only while ignoring external knowledge that can enhance node representations for downstream applications. In this paper, we propose a set of new VAE-based embedding models called External Knowledge-Aware Co-Embedding Attributed Network (ECAN) Embeddings to incorporate associations among attributes from relevant external knowledge. Such external knowledge can be extracted from text corpus and knowledge graphs. We use multi-VAE structures to model the attribute associations. To cope with joint encoding of …


Confronting Wicked Crypto: Wicked Problems, Encryption Policy, And Exceptional Access Technology, Kevin Nicholas Kredit Dec 2020

Confronting Wicked Crypto: Wicked Problems, Encryption Policy, And Exceptional Access Technology, Kevin Nicholas Kredit

Masters Theses

Public debate has resumed on the topic of exceptional access (EA), which refers to alternative means of decryption intended for law enforcement use. The resumption of this debate is not a renege on a resolute promise made at the end of the 1990s “crypto war”; rather, it represents a valid reassessment of optimal policy in light of changing circumstances. The imbalance between privacy, access, and security in the context of constantly changing society and technology is a wicked problem that has and will continue to evade a permanent solution. As policymakers consider next steps, it is necessary that the technical …


Introduction To Neutrosophic Genetics, Florentin Smarandache Dec 2020

Introduction To Neutrosophic Genetics, Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

Neutrosophic Genetics is the study of genetics using neutrosophic logic, set, probability, statistics, measure and other neutrosophic tools and procedures. In this paper, based on the Neutrosophic Theory of Evolution (that includes degrees of Evolution, Neutrality (or Indeterminacy), and Involution) – as extension of Darwin’s Theory of Evolution, we show the applicability of neutrosophy in genetics, and we present within the frame of neutrosophic genetics the following concepts: neutrosophic mutation, neutrosophic speciation, and neutrosophic coevolution.


Stratigraphy, Petrology, Diagenesis, Paleontology, And Depositional Environments Of The Harrisburg Member Of The Kaibab Formation In Northern Arizona And Southern Utah, Zachery T. Case Dec 2020

Stratigraphy, Petrology, Diagenesis, Paleontology, And Depositional Environments Of The Harrisburg Member Of The Kaibab Formation In Northern Arizona And Southern Utah, Zachery T. Case

Electronic Theses and Dissertations

The Kaibab Formation has two members, the Fossil Mountain Member below and the Harrisburg Member above. They were deposited in shallow-marine shelf to restricted coastal settings. Stratigraphically above are the Rock Canyon Conglomerate and the Moenkopi Formation; consisting of the Timpoweap and Lower Red members; which are the only members present in the study area. The Rock Canyon Conglomerate was deposited in depressions and as a regolith. The Timpoweap and Lower Red members were deposited in shallow marine to tidal environments.

Nine stratigraphic units were identified in the Harrisburg Member. Units one, two, three, five, six, seven, and nine are …


A Social Network Analysis Of Jobs And Skills, Derrick Ming Yang Lee, Dion Wei Xuan Ang, Grace Mei Ching Pua, Lee Ning Ng, Sharon Purbowo, Eugene Wen Jia Choy, Kyong Jin Shim Dec 2020

A Social Network Analysis Of Jobs And Skills, Derrick Ming Yang Lee, Dion Wei Xuan Ang, Grace Mei Ching Pua, Lee Ning Ng, Sharon Purbowo, Eugene Wen Jia Choy, Kyong Jin Shim

Research Collection School Of Computing and Information Systems

In this study, we analyzed job roles and skills across industries in Singapore. Using social network analysis, we identified job roles with similar required skills, and we also identified relationships between job skills. Our analysis visualizes such relationships in an intuitive way. Insights derived from our analyses are expected to assist job seekers, employers as well as recruitment agencies wanting to understand trending and required job roles and skills in today’s fast changing world.


Evaluating The Reproducibility Of Physiological Stress Detection Models, Varun Mishra, Sougata Sen, Grace Chen, Tian Hao, Jeffrey Rogers, Ching-Hua Chen, David Kotz Dec 2020

Evaluating The Reproducibility Of Physiological Stress Detection Models, Varun Mishra, Sougata Sen, Grace Chen, Tian Hao, Jeffrey Rogers, Ching-Hua Chen, David Kotz

Dartmouth Scholarship

Recent advances in wearable sensor technologies have led to a variety of approaches for detecting physiological stress. Even with over a decade of research in the domain, there still exist many significant challenges, including a near-total lack of reproducibility across studies. Researchers often use some physiological sensors (custom-made or off-the-shelf), conduct a study to collect data, and build machine-learning models to detect stress. There is little effort to test the applicability of the model with similar physiological data collected from different devices, or the efficacy of the model on data collected from different studies, populations, or demographics.

This paper takes …


Stochastic Risk Measures For The Lundberg Model With Reinsurance And Investment, Benie Justine N'Gozan Dec 2020

Stochastic Risk Measures For The Lundberg Model With Reinsurance And Investment, Benie Justine N'Gozan

Mathematics Dissertations

Risk measures emerge in fields such as economics, insurance, finance and are concerned with a stochastic representation of uncertainties stemming from the unpredictability of the real world events. In essence, risk analysis amounts to quantifying the chances of undesirable events and developing a model that limits the impact of potential losses. Assets and liabilities in the Insurance industry, as well as financial goals of Investment companies rely on calculating the probability that their respective portfolios satisfy the preset constraints. On the flip side, risk measures serve both industries by providing optimal strategies for minimizing losses. Our research is concerned with …


Structured Data Mining Networks, Time Series, And Time Series Of Networks, Lin Zhang Dec 2020

Structured Data Mining Networks, Time Series, And Time Series Of Networks, Lin Zhang

Legacy Theses & Dissertations (2009 - 2024)

The rate at which data is generated in modern applications has created an unprecedented demand for novel methods to effectively and efficiently extract insightful patterns. Methods aware of known domain-specific structure in the data tend to be advantageous. In particular, a joint temporal and networked view of observations offers a holistic lens to many real-world systems. Example domains abound: activity of social network users, gene interactions over time, a temporal load of infrastructure networks, and others. Existing analysis and mining approaches for such data exhibit limited quality and scalability due to their sensitivity to noise, missing observations, and the need …


On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill Dec 2020

On The Generation, Structure, And Semantics Of Grammar Patterns In Source Code Identifiers, Christian D. Newman,, Reem S. Alsuhaibani, Michael J. Decker, Anthony Peruma, Dishant Kaushik, Mohamed Wiem Mkaouer, Emily Hill

Articles

Identifier names are the atoms of program comprehension. Weak identifier names decrease developer productivity and degrade the performance of automated approaches that leverage identifier names in source code analysis; threatening many of the advantages which stand to be gained from advances in artificial intelligence and machine learning. Therefore, it is vital to support developers in naming and renaming identifiers. In this paper, we extend our prior work, which studies the primary method through which names evolve: rename refactorings. In our prior work, we contextualize rename changes by examining commit messages and other refactorings. In this extension, we further consider data …


A Hybrid Approach For Detecting Prerequisite Relations In Multi-Modal Food Recipes, Liangming Pan, Jingjing Chen, Shaoteng Liu, Chong-Wah Ngo, Min-Yen Kan, Tat-Seng Chua Dec 2020

A Hybrid Approach For Detecting Prerequisite Relations In Multi-Modal Food Recipes, Liangming Pan, Jingjing Chen, Shaoteng Liu, Chong-Wah Ngo, Min-Yen Kan, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

Modeling the structure of culinary recipes is the core of recipe representation learning. Current approaches mostly focus on extracting the workflow graph from recipes based on text descriptions. Process images, which constitute an important part of cooking recipes, has rarely been investigated in recipe structure modeling. We study this recipe structure problem from a multi-modal learning perspective, by proposing a prerequisite tree to represent recipes with cooking images at a step-level granularity. We propose a simple-yet-effective two-stage framework to automatically construct the prerequisite tree for a recipe by (1) utilizing a trained classifier to detect pairwise prerequisite relations that fuses …


Lightning-Fast And Privacy-Preserving Outsourced Computation In The Cloud, Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang Dec 2020

Lightning-Fast And Privacy-Preserving Outsourced Computation In The Cloud, Ximeng Liu, Robert H. Deng, Pengfei Wu, Yang Yang

Research Collection School Of Computing and Information Systems

In this paper, we propose a framework for lightning-fast privacy-preserving outsourced computation framework in the cloud, which we refer to as LightCom. Using LightCom, a user can securely achieve the outsource data storage and fast, secure data processing in a single cloud server different from the existing multi-server outsourced computation model. Specifically, we first present a general secure computation framework for LightCom under the cloud server equipped with multiple Trusted Processing Units (TPUs), which face the side-channel attack. Under the LightCom, we design two specified fast processing toolkits, which allow the user to achieve the commonly-used secure integer computation and …


Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas Dec 2020

Nearest Centroid: A Bridge Between Statistics And Machine Learning, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In order to guide our students of machine learning in their statistical thinking, we need conceptually simple and mathematically defensible algorithms. In this paper, we present the Nearest Centroid algorithm (NC) algorithm as a pedagogical tool, combining the key concepts behind two foundational algorithms: K-Means clustering and K Nearest Neighbors (k- NN). In NC, we use the centroid (as defined in the K-Means algorithm) of the observations belonging to each class in our training data set and its distance from a new observation (similar to k-NN) for class prediction. Using this obvious extension, we will illustrate how the concepts of …


Secure And Verifiable Inference In Deep Neural Networks, Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haoming Yang, Kan Yang, Robert H. Deng Dec 2020

Secure And Verifiable Inference In Deep Neural Networks, Guowen Xu, Hongwei Li, Hao Ren, Jianfei Sun, Shengmin Xu, Jianting Ning, Haoming Yang, Kan Yang, Robert H. Deng

Research Collection School Of Computing and Information Systems

Outsourced inference service has enormously promoted the popularity of deep learning, and helped users to customize a range of personalized applications. However, it also entails a variety of security and privacy issues brought by untrusted service providers. Particularly, a malicious adversary may violate user privacy during the inference process, or worse, return incorrect results to the client through compromising the integrity of the outsourced model. To address these problems, we propose SecureDL to protect the model’s integrity and user’s privacy in Deep Neural Networks (DNNs) inference process. In SecureDL, we first transform complicated non-linear activation functions of DNNs to low-degree …


Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen Dec 2020

Audee: Automated Testing For Deep Learning Frameworks, Qianyu Guo, Xiaofei Xie, Yi Li, Xiaoyu Zhang, Yang Liu, Xiaohong Li, Chao Shen

Research Collection School Of Computing and Information Systems

Deep learning (DL) has been applied widely, and the quality of DL system becomes crucial, especially for safety-critical applications. Existing work mainly focuses on the quality analysis of DL models, but lacks attention to the underlying frameworks on which all DL models depend. In this work, we propose Audee, a novel approach for testing DL frameworks and localizing bugs. Audee adopts a search-based approach and implements three different mutation strategies to generate diverse test cases by exploring combinations of model structures, parameters, weights and inputs. Audee is able to detect three types of bugs: logical bugs, crashes and Not-a-Number (NaN) …


Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu Dec 2020

Sadt: Syntax-Aware Differential Testing Of Certificate Validation In Ssl/Tls Implementations, Lili Quan, Qianyu Guo, Hongxu Chen, Xiaofei Xie, Xiaohong Li, Yang Liu, Jing Hu

Research Collection School Of Computing and Information Systems

The security assurance of SSL/TLS critically depends on the correct validation of X.509 certificates. Therefore, it is important to check whether a certificate is correctly validated by the SSL/TLS implementations. Although differential testing has been proven to be effective in finding semantic bugs, it still suffers from the following limitations: (1) The syntax of test cases cannot be correctly guaranteed. (2) Current test cases are not diverse enough to cover more implementation behaviours. This paper tackles these problems by introducing SADT, a novel syntax-aware differential testing framework for evaluating the certificate validation process in SSL/TLS implementations. We first propose a …


Adelaidecyc At Semeval-2020 Task 12: Ensemble Of Classifiers For Offensive Language Detection In Social Media, Mahen Herath, Thushari Atapattu, Hoang Anh Dung, Christoph Treude, Katrina Falkner Dec 2020

Adelaidecyc At Semeval-2020 Task 12: Ensemble Of Classifiers For Offensive Language Detection In Social Media, Mahen Herath, Thushari Atapattu, Hoang Anh Dung, Christoph Treude, Katrina Falkner

Research Collection School Of Computing and Information Systems

This paper describes the systems our team (AdelaideCyC) has developed for SemEval Task 12 (OffensEval 2020) to detect offensive language in social media. The challenge focuses on three subtasks – offensive language identification (subtask A), offense type identification (subtask B), and offense target identification (subtask C). Our team has participated in all the three subtasks. We have developed machine learning and deep learning-based ensembles of models. We have achieved F1-scores of 0.906, 0.552, and 0.623 in subtask A, B, and C respectively. While our performance scores are promising for subtask A, the results demonstrate that subtask B and C still …


The Persistence Of Acid Mine Drainage At An East Texas Coal Mine, Sarah Zagurski Dec 2020

The Persistence Of Acid Mine Drainage At An East Texas Coal Mine, Sarah Zagurski

Electronic Theses and Dissertations

The objective of this study was to estimate the time it will take for acid forming materials (pyrite) to be weathered to a state of equilibrium and thus cease to produce acid in ground and surface waters within Oak Hill Mine. This was accomplished using an ex-situ kinetic leaching study incorporating a humidity cell in a controlled laboratory setting. Leaching was conducted on soil cores obtained from the vadose zone at Oak Hill Mine and the humidity cell was used to accelerate oxidation of the pyrite within the cores.

An in-situ field study was also conducted that monitored groundwater conditions …


Transfer-To-Transfer Learning Approach For Computer Aided Detection Of Covid-19 In Chest Radiographs, Barath Narayanan Narayanan, Russell C. Hardie, Vignesh Krishnaraja, Christina Karam, Venkata Salini Priyamvada Davuluru Dec 2020

Transfer-To-Transfer Learning Approach For Computer Aided Detection Of Covid-19 In Chest Radiographs, Barath Narayanan Narayanan, Russell C. Hardie, Vignesh Krishnaraja, Christina Karam, Venkata Salini Priyamvada Davuluru

Electrical and Computer Engineering Faculty Publications

The coronavirus disease 2019 (COVID-19) global pandemic has severely impacted lives across the globe. Respiratory disorders in COVID-19 patients are caused by lung opacities similar to viral pneumonia. A Computer-Aided Detection (CAD) system for the detection of COVID-19 using chest radiographs would provide a second opinion for radiologists. For this research, we utilize publicly available datasets that have been marked by radiologists into two-classes (COVID-19 and non-COVID-19). We address the class imbalance problem associated with the training dataset by proposing a novel transfer-to-transfer learning approach, where we break a highly imbalanced training dataset into a group of balanced mini-sets and …


Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu Dec 2020

Walls Have Ears: Eavesdropping User Behaviors Via Graphics-Interrupt-Based Side Channel, Haoyu Ma, Jianwen Tian, Debin Gao, Jia Chunfu

Research Collection School Of Computing and Information Systems

Graphics Processing Units (GPUs) are now playing a vital role in many devices and systems including computing devices, data centers, and clouds, making them the next target of side-channel attacks. Unlike those targeting CPUs, existing side-channel attacks on GPUs exploited vulnerabilities exposed by application interfaces like OpenGL and CUDA, which can be easily mitigated with software patches. In this paper, we investigate the lower-level and native interface between GPUs and CPUs, i.e., the graphics interrupts, and evaluate the side channel they expose. Being an intrinsic profile in the communication between a GPU and a CPU, the pattern of graphics interrupts …


Secure Answer Book And Automatic Grading, Manoj Thulasidas Dec 2020

Secure Answer Book And Automatic Grading, Manoj Thulasidas

Research Collection School Of Computing and Information Systems

In response to the growing need to perform assessments online, we have developed a secure answer book, as well as a tool for automatically grading it for our course on spread- sheet modeling. We applied these techniques to a cohort of about 160 students who took the course last term. In this paper, we describe the design, implementation and the techniques employed to enhance both the security of the answer book and the ease, accuracy and consistency of grading. In addition, we summarize the experience and takeaways, both from the instructor and the student perspectives. Although the answer book and …


Puerto Rico’S Electric Power System: An Analysis Of Contemporary Failures And The Opportunity To Rebuild A More Resilient Grid, Including The Development Of A Utility-Scale Solar Farm On The Island Municipality Of Culebra, Federico Sotomayor Dec 2020

Puerto Rico’S Electric Power System: An Analysis Of Contemporary Failures And The Opportunity To Rebuild A More Resilient Grid, Including The Development Of A Utility-Scale Solar Farm On The Island Municipality Of Culebra, Federico Sotomayor

Sustainability and Social Justice

Puerto Rico’s grid was decimated in 2017 after experiencing back-to-back hurricanes – Maria and Irma. Although the hurricanes caused tremendous damage and hardship to the island, it also created the right circumstances for the local energy landscape to transition toward a more resilient and sustainable model. Through an analysis of recent challenges by the local electric utility PREPA, and subsequent fallout from the hurricanes, we see that they now hold a unique opportunity to redeem themselves by taking advantage of catalyzed resources to rebuild a better system. One region that could greatly benefit from an improved and reimagined grid are …


Optimizing Raman Spectral Collection For Quartz And Zircon Crystals For Elastic Geothermobarometry, Mayara F. Cizina Dec 2020

Optimizing Raman Spectral Collection For Quartz And Zircon Crystals For Elastic Geothermobarometry, Mayara F. Cizina

Boise State University Theses and Dissertations

Raman microspectroscopy is widely used to identify and characterize organic and inorganic compounds. In the geosciences, Raman microspectroscopy has been used to identify mineral and fluid inclusions in host crystals, as well as to calculate pressure-temperature (P-T) conditions using mineral inclusions in host crystals, such as quartz-in-garnet barometry (QuiG). For thermobarometric applications, the reproducibility of Raman peak position measurements is crucial to obtain accurate P-T estimates. In this study, we explored how to optimize Raman spectral collection of quartz and zircon inclusions and reference crystals by monitoring machine stability and by varying spectral parameters. We also monitored a reference Hg …


Buried Soil Carbon Vulnerability To Decomposition With Landscape Disturbance, Abby Mcmurtry Dec 2020

Buried Soil Carbon Vulnerability To Decomposition With Landscape Disturbance, Abby Mcmurtry

Boise State University Theses and Dissertations

Buried layers of ancient soil organic carbon (SOC) can store significant amounts carbon (C). Persistence of this C is favored by burial, which disconnects the soil from atmospheric conditions and limits plant derived C inputs, thus reducing microbial activity. However, erosion exposes buried paleosols to modern surface conditions and results in influx of root-derived C through the processes of root exudation and root turnover. These C inputs stimulate microbial activity and leave paleosol C vulnerable to decomposition. Understanding turnover of ancient soil C is critical for predicting the response of this large C reservoir to environmental change and feedbacks to …


Analytic Solutions For Diffusion On Path Graphs And Its Application To The Modeling Of The Evolution Of Electrically Indiscernible Conformational States Of Lysenin, K. Summer Ware Dec 2020

Analytic Solutions For Diffusion On Path Graphs And Its Application To The Modeling Of The Evolution Of Electrically Indiscernible Conformational States Of Lysenin, K. Summer Ware

Boise State University Theses and Dissertations

Memory is traditionally thought of as a biological function of the brain. In recent years, however, researchers have found that some stimuli-responsive molecules exhibit memory-like behavior manifested as history-dependent hysteresis in response to external excitations. One example is lysenin, a pore-forming toxin found naturally in the coelomic fluid of the common earthworm Eisenia fetida. When reconstituted into a bilayer lipid membrane, this unassuming toxin undergoes conformational changes in response to applied voltages. However, lysenin is able to "remember" past history by adjusting its conformational state based not only on the amplitude of the stimulus but also on its previous …