Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2024

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 4921 - 4950 of 7954

Full-Text Articles in Physical Sciences and Mathematics

Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow Apr 2024

Computational Modeling And Analysis Of Facial Expressions And Gaze For Discovery Of Candidate Behavioral Biomarkers For Children And Young Adults With Autism Spectrum Disorder, Megan Anita Witherow

Electrical & Computer Engineering Theses & Dissertations

Facial expression production and perception in autism spectrum disorder (ASD) suggest the potential presence of behavioral biomarkers that may stratify individuals on the spectrum into prognostic or treatment subgroups. High-speed internet and the ease of technology have enabled remote, scalable, affordable, and timely access to medical care, such as measurements of ASDrelated behaviors in familiar environments to complement clinical observation. Machine and deep learning (DL)-based analysis of video tracking (VT) of expression production and eye tracking (ET) of expression perception may aid stratification biomarker discovery for children and young adults with ASD. However, there are open challenges in 1) facial …


Broadband Dielectric Spectroscopic Detection Of Volatile Organic Compounds With Zinc Oxide And Metal-Organic Frameworks As Solid-State Sensor Materials, Papa Kojo Amoah Apr 2024

Broadband Dielectric Spectroscopic Detection Of Volatile Organic Compounds With Zinc Oxide And Metal-Organic Frameworks As Solid-State Sensor Materials, Papa Kojo Amoah

Electrical & Computer Engineering Theses & Dissertations

The industrial revolution drove technological progress but also increased the release of harmful pollutants, posing significant risks to human health and the environment. Volatile organic compounds (VOCs), which have various anthropogenic and natural sources, are particularly concerning due to their impact on public health, especially in urban areas. Addressing these adverse effects requires comprehensive strategies for mitigation as traditional gas sensing techniques have limitations and there is a need for innovative approaches to VOC detection.

VOCs encompass a diverse group of chemicals with high volatility, emitted from various human activities and natural sources. These compounds play a crucial role in …


Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia Apr 2024

Editorial: Emerging On-Demand Passenger And Logistics Systems: Modelling, Optimization, And Data Analytics, Jintao Ke, Hai Wang, Neda Masoud, Maximilian Schiffer, Goncalo H. A. Correia

Research Collection School Of Computing and Information Systems

The proliferation of smart personal devices and mobile internet access has fueled numerous advancements in on-demand transportation services. These services are facilitated by online digital platforms and range from providing rides to delivering products. Their influence is transforming transportation systems and leaving a mark on changing individual mobility, activity patterns, and consumption behaviors. For instance, on-demand transportation companies such as Uber, Lyft, Grab, and DiDi have become increasingly vital for meeting urban transportation needs by connecting available drivers with passengers in real time. The recent surge in door-to-door food delivery (e.g., Uber Eats, DoorDash, Meituan); grocery delivery (e.g., Amazon Fresh, …


Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin Apr 2024

Marco: A Stochastic Asynchronous Concolic Explorer, Jie Hu, Yue Duan, Heng Yin

Research Collection School Of Computing and Information Systems

Concolic execution is a powerful program analysis technique for code path exploration. Despite recent advances that greatly improved the efficiency of concolic execution engines, path constraint solving remains a major bottleneck of concolic testing. An intelligent scheduler for inputs/branches becomes even more crucial. Our studies show that the previously under-studied branch-flipping policy adopted by state-of-the-art concolic execution engines has several limitations. We propose to assess each branch by its potential for new code coverage from a global view, concerning the path divergence probability at each branch. To validate this idea, we implemented a prototype Marco and evaluated it against the …


Teaching Software Development For Real-World Problems Using A Microservice-Based Collaborative Problem-Solving Approach, Yi Meng Lau, Christian Michael Koh, Lingxiao Jiang Apr 2024

Teaching Software Development For Real-World Problems Using A Microservice-Based Collaborative Problem-Solving Approach, Yi Meng Lau, Christian Michael Koh, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Experienced and skillful software developers are needed in organizations to develop software products effective for their business with shortened time-to-market. Such developers will not only need to code but also be able to work in teams and collaboratively solve real-world problems that organizations arefacing. It is challenging for educators to nurture students to become such developers with strong technical, social, and cognitive skills. Towards addressing the challenge, this study presents a Collaborative Software Development Project Framework for a course that focuses on learning microservices architectures anddeveloping a software application for a real-world business. Students get to work in teams to …


W4-Groups: Modeling The Who, What, When And Where Of Group Behavior Via Mobility Sensing, Akansha Atrey, Camellia Zakaria, Rajesh Krishna Balan, Prashant Shenoy Apr 2024

W4-Groups: Modeling The Who, What, When And Where Of Group Behavior Via Mobility Sensing, Akansha Atrey, Camellia Zakaria, Rajesh Krishna Balan, Prashant Shenoy

Research Collection School Of Computing and Information Systems

Human social interactions occur in group settings of varying sizes and locations, depending on the type of social activity. The ability to distinguish group formations based on their purposes transforms how group detection mechanisms function. Not only should such tools support the effective detection of serendipitous encounters, but they can derive categories of relation types among users. Determining who is involved, what activity is performed, and when and where the activity occurs are critical to understanding group processes in greater depth, including supporting goal-oriented applications (e.g., performance, productivity, and mental health) that require sensing social factors. In this work, we …


Improving Automated Code Reviews: Learning From Experience, Hong Yi Lin, Patanamon Thongtanunam, Christoph Treude, Wachiraphan Charoenwet Apr 2024

Improving Automated Code Reviews: Learning From Experience, Hong Yi Lin, Patanamon Thongtanunam, Christoph Treude, Wachiraphan Charoenwet

Research Collection School Of Computing and Information Systems

Modern code review is a critical quality assurance process that is widely adopted in both industry and open source software environments. This process can help newcomers learn from the feedback of experienced reviewers; however, it often brings a large workload and stress to reviewers. To alleviate this burden, the field of automated code reviews aims to automate the process, teaching large language models to provide reviews on submitted code, just as a human would. A recent approach pre-trained and fine-tuned the code intelligent language model on a large-scale code review corpus. However, such techniques did not fully utilise quality reviews …


Dronlomaly: Runtime Log-Based Anomaly Detector For Dji Drones, Wei Minn, Naing Tun Yan, Lwin Khin Shar, Lingxiao Jiang Apr 2024

Dronlomaly: Runtime Log-Based Anomaly Detector For Dji Drones, Wei Minn, Naing Tun Yan, Lwin Khin Shar, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

We present an automated tool for realtime detection of anomalous behaviors while a DJI drone is executing a flight mission. The tool takes sensor data logged by drone at fixed time intervals and performs anomaly detection using a Bi-LSTM model. The model is trained on baseline flight logs from a successful mission physically or via a simulator. The tool has two modules --- the first module is responsible for sending the log data to the remote controller station, and the second module is run as a service in the remote controller station powered by a Bi-LSTM model, which receives the …


Extracting Relevant Test Inputs From Bug Reports For Automatic Test Case Generation, Wendkuuni C. Ouédraogo, Laura Plein, Kader Kaboré, Andrew Habib, Jacques Klein, David Lo, Tegawende F. Bissyandé Apr 2024

Extracting Relevant Test Inputs From Bug Reports For Automatic Test Case Generation, Wendkuuni C. Ouédraogo, Laura Plein, Kader Kaboré, Andrew Habib, Jacques Klein, David Lo, Tegawende F. Bissyandé

Research Collection School Of Computing and Information Systems

The pursuit of automating software test case generation, particularly for unit tests, has become increasingly important due to the labor-intensive nature of manual test generation [6]. However, a significant challenge in this domain is the inability of automated approaches to generate relevant inputs, which compromises the efficacy of the tests [6].


Test Optimization In Dnn Testing: A Survey, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon Apr 2024

Test Optimization In Dnn Testing: A Survey, Qiang Hu, Yuejun Guo, Xiaofei Xie, Maxime Cordy, Lei Ma, Mike Papadakis, Yves Le Traon

Research Collection School Of Computing and Information Systems

This article presents a comprehensive survey on test optimization in deep neural network (DNN) testing. Here, test optimization refers to testing with low data labeling effort. We analyzed 90 papers, including 43 from the software engineering (SE) community, 32 from the machine learning (ML) community, and 15 from other communities. Our study: (i) unifies the problems as well as terminologies associated with low-labeling cost testing, (ii) compares the distinct focal points of SE and ML communities, and (iii) reveals the pitfalls in existing literature. Furthermore, we highlight the research opportunities in this domain.


Code Search Is All You Need? Improving Code Suggestions With Code Search, Junkai Chen, Xing Hu, Zhenhao Li, Cuiyun Gao, Xin Xia, David Lo Apr 2024

Code Search Is All You Need? Improving Code Suggestions With Code Search, Junkai Chen, Xing Hu, Zhenhao Li, Cuiyun Gao, Xin Xia, David Lo

Research Collection School Of Computing and Information Systems

Modern integrated development environments (IDEs) provide various automated code suggestion techniques (e.g., code completion and code generation) to help developers improve their efficiency. Such techniques may retrieve similar code snippets from the code base or leverage deep learning models to provide code suggestions. However, how to effectively enhance the code suggestions using code retrieval has not been systematically investigated. In this paper, we study and explore a retrieval-augmented framework for code suggestions. Specifically, our framework leverages different retrieval approaches and search strategies to search similar code snippets. Then the retrieved code is used to further enhance the performance of language …


Unveiling Memorization In Code Models, Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, Donggyun Han, David Lo Apr 2024

Unveiling Memorization In Code Models, Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, Donggyun Han, David Lo

Research Collection School Of Computing and Information Systems

The availability of large-scale datasets, advanced architectures, and powerful computational resources have led to effective code models that automate diverse software engineering activities. The datasets usually consist of billions of lines of code from both open-source and private repositories. A code model memorizes and produces source code verbatim, which potentially contains vulnerabilities, sensitive information, or code with strict licenses, leading to potential security and privacy issues.This paper investigates an important problem: to what extent do code models memorize their training data? We conduct an empirical study to explore memorization in large pre-trained code models. Our study highlights that simply extracting …


Greening Large Language Models Of Code, Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo Apr 2024

Greening Large Language Models Of Code, Jieke Shi, Zhou Yang, Hong Jin Kang, Bowen Xu, Junda He, David Lo

Research Collection School Of Computing and Information Systems

Large language models of code have shown remarkable effectiveness across various software engineering tasks. Despite the availability of many cloud services built upon these powerful models, there remain several scenarios where developers cannot take full advantage of them, stemming from factors such as restricted or unreliable internet access, institutional privacy policies that prohibit external transmission of code to third-party vendors, and more. Therefore, developing a compact, efficient, and yet energy-saving model for deployment on developers' devices becomes essential.To this aim, we propose Avatar, a novel approach that crafts a deployable model from a large language model of code by optimizing …


Coca: Improving And Explaining Graph Neural Network-Based Vulnerability Detection Systems, Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu Apr 2024

Coca: Improving And Explaining Graph Neural Network-Based Vulnerability Detection Systems, Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu

Research Collection School Of Computing and Information Systems

Recently, Graph Neural Network (GNN)-based vulnerability detection systems have achieved remarkable success. However, the lack of explainability poses a critical challenge to deploy black-box models in security-related domains. For this reason, several approaches have been proposed to explain the decision logic of the detection model by providing a set of crucial statements positively contributing to its predictions. Unfortunately, due to the weakly-robust detection models and suboptimal explanation strategy, they have the danger of revealing spurious correlations and redundancy issue.In this paper, we propose Coca, a general framework aiming to 1) enhance the robustness of existing GNN-based vulnerability detection models to …


Exploiting Library Vulnerability Via Migration-Based Automated Test Generation, Zirui Chen, Xing Hu, Xin Xia, Yi Gao, Tongtong Xu, David Lo, Xiaohu Yang Apr 2024

Exploiting Library Vulnerability Via Migration-Based Automated Test Generation, Zirui Chen, Xing Hu, Xin Xia, Yi Gao, Tongtong Xu, David Lo, Xiaohu Yang

Research Collection School Of Computing and Information Systems

In software development, developers extensively utilize third-party libraries to avoid implementing existing functionalities. When a new third-party library vulnerability is disclosed, project maintainers need to determine whether their projects are affected by the vulnerability, which requires developers to invest substantial effort in assessment. However, existing tools face a series of issues: static analysis tools produce false alarms, dynamic analysis tools require existing tests and test generation tools have low success rates when facing complex vulnerabilities.Vulnerability exploits, as code snippets provided for reproducing vulnerabilities after disclosure, contain a wealth of vulnerability-related information. This study proposes a new method based on vulnerability …


Curiosity-Driven Testing For Sequential Decision-Making Process, Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo Apr 2024

Curiosity-Driven Testing For Sequential Decision-Making Process, Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo

Research Collection School Of Computing and Information Systems

Sequential decision-making processes (SDPs) are fundamental for complex real-world challenges, such as autonomous driving, robotic control, and traffic management. While recent advances in Deep Learning (DL) have led to mature solutions for solving these complex problems, SDMs remain vulnerable to learning unsafe behaviors, posing significant risks in safety-critical applications. However, developing a testing framework for SDMs that can identify a diverse set of crash-triggering scenarios remains an open challenge. To address this, we propose CureFuzz, a novel curiosity-driven black-box fuzz testing approach for SDMs. CureFuzz proposes a curiosity mechanism that allows a fuzzer to effectively explore novel and diverse scenarios, …


Deep Reinforcement Learning For Dynamic Algorithm Selection: A Proof-Of-Principle Study On Differential Evolution, Hongshu Guo, Yining Ma, Zeyuan Ma, Jiacheng Chen, Xinglin Zhang, Zhiguang Cao, Jun Zhang, Yue-Jiao Gong Apr 2024

Deep Reinforcement Learning For Dynamic Algorithm Selection: A Proof-Of-Principle Study On Differential Evolution, Hongshu Guo, Yining Ma, Zeyuan Ma, Jiacheng Chen, Xinglin Zhang, Zhiguang Cao, Jun Zhang, Yue-Jiao Gong

Research Collection School Of Computing and Information Systems

Evolutionary algorithms, such as differential evolution, excel in solving real-parameter optimization challenges. However, the effectiveness of a single algorithm varies across different problem instances, necessitating considerable efforts in algorithm selection or configuration. This article aims to address the limitation by leveraging the complementary strengths of a group of algorithms and dynamically scheduling them throughout the optimization progress for specific problems. We propose a deep reinforcement learning-based dynamic algorithm selection framework to accomplish this task. Our approach models the dynamic algorithm selection a Markov decision process, training an agent in a policy gradient manner to select the most suitable algorithm according …


Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh Apr 2024

Discovering Significant Topics From Legal Decisions With Selective Inference, Jerrold Tsin Howe Soh

Research Collection Yong Pung How School Of Law

We propose and evaluate an automated pipeline for discovering significant topics from legal decision texts by passing features synthesized with topic models through penalized regressions and post-selection significance tests. The method identifies case topics significantly correlated with outcomes, topic-word distributions which can be manually interpreted to gain insights about significant topics, and case-topic weights which can be used to identify representative cases for each topic. We demonstrate the method on a new dataset of domain name disputes and a canonical dataset of European Court of Human Rights violation cases. Topic models based on latent semantic analysis as well as language …


State Energy Research Center, University Of North Dakota. Energy And Environmental Research Center Apr 2024

State Energy Research Center, University Of North Dakota. Energy And Environmental Research Center

EERC Brochures and Fact Sheets

Fact sheet about the Energy & Environmental Research Center and its role as North Dakota's State Energy Research Center (SERC). Includes SERC accomplishments.


Reevaluating The Origin Of Detectable Cataclysmic Variables In Globular Clusters: Testing The Importance Of Dynamics, Liliana Rivera Sandoval, Diogo Belloni, Miriam Ramos Arevalo Apr 2024

Reevaluating The Origin Of Detectable Cataclysmic Variables In Globular Clusters: Testing The Importance Of Dynamics, Liliana Rivera Sandoval, Diogo Belloni, Miriam Ramos Arevalo

Physics and Astronomy Faculty Publications and Presentations

Based on the current detectable cataclysmic variable (CV) population in Galactic globular clusters (GCs), we show that there is not a clear relation between the number of sources per unit of mass and the stellar encounter rate, the cluster mass, or the cluster central density. If any, only in the case of core-collapsed GCs could there be an anticorrelation with the stellar encounter rate. Our findings contrast with previous studies where clear positive correlations were identified. Our results suggest that correlations between faint X-ray sources, from which often conclusions for the CV population are drawn, and the GC parameters considered …


Exploring N-H Bond Activation And C-H Bond Activation By Tripodal Tris(Nitroxide) Aluminum And Gallium Complexes, Vivian W. Guo , '24 Apr 2024

Exploring N-H Bond Activation And C-H Bond Activation By Tripodal Tris(Nitroxide) Aluminum And Gallium Complexes, Vivian W. Guo , '24

Senior Theses, Projects, and Awards

The activation of H–X (X = O, N, C) bonds is a common primary step in introducing alcohols, amines, and hydrocarbons into catalytic processes used in various industries. Precious metal complexes are commonly used as catalysts to activate H–X bonds through formal metal-based oxidative addition. However, since precious metals are scarce, expensive, toxic, and environmentally harmful, developing non-precious metal coordination complexes for H–X bond activation is essential. As a result, we investigate the activation of O–H, N–H, and C–H bonds through tripodal tris(nitroxide) aluminum and gallium complexes to develop a green strategy for broad-based H–X bond activation. Past members of …


A Computer Vision Solution To Cross-Cultural Food Image Classification And Nutrition Logging​, Rohan Sethi, George K. Thiruvathukal Apr 2024

A Computer Vision Solution To Cross-Cultural Food Image Classification And Nutrition Logging​, Rohan Sethi, George K. Thiruvathukal

Computer Science: Faculty Publications and Other Works

The US is a culturally and ethnically diverse country, and with this diversity comes a myriad of cuisines and eating habits that expand well beyond that of western culture. Each of these meals have their own good and bad effects when it comes to the nutritional value and its potential impact on human health. Thus, there is a greater need for people to be able to access the nutritional profile of their diverse daily meals and better manage their health. A revolutionary solution to democratize food image classification and nutritional logging is using deep learning to extract that information from …


Large Sample Statistical Study Of Three-Dimensional Magnetic Reconnection At The Swarthmore Spheromak Experiment, Solomon Murdock , '24 Apr 2024

Large Sample Statistical Study Of Three-Dimensional Magnetic Reconnection At The Swarthmore Spheromak Experiment, Solomon Murdock , '24

Senior Theses, Projects, and Awards

Many plasmas can be described by ideal magnetohydrodynamics (MHD). A key result of ideal MHD is the frozen-in-flux theorem which states that the magnetic field stretches and bends with the motion of the plasma. The frozen-in-flux theorem is violated during magnetic reconnection, the annihilation of magnetic flux within a plasma. During reconnection, non-ideal MHD effects dominate plasma dynamics. The dynamics of magnetic reconnection is an unsolved problem in plasma physics. Most prior laboratory studies of magnetic reconnection examined reconnection in 2D scenarios, scenarios with a single ignorable coordinate. The SSX device was used to merge twisted ropes of plasma called …


Integrating Artificial Intelligence For Automated Storytelling In Turn-Based Strategy Games, Timothy Ripper Apr 2024

Integrating Artificial Intelligence For Automated Storytelling In Turn-Based Strategy Games, Timothy Ripper

Theses

This project is inspired by turn-based strategy games, Final Fantasy Tactics, X-Com 2, and modern turn-based strategy games. This project is structured around the use of artificial intelligence for storytelling within strategy games. The focus of this project utilizes artificial intelligence in creating a quest generation system for storytelling. The resulting quest system creates new quests dynamically after communicating with an artificial intelligence allowing players to potentially experience an ever-expanding story from quests


Graph Neural Network Guided By Feature Selection And Centrality Measures For Node Classification On Homophilic And Heterophily Graphs, Asmaa M. Mahmoud, Heba F. Eid, Abeer S. Desuky, Hoda A. Ali Apr 2024

Graph Neural Network Guided By Feature Selection And Centrality Measures For Node Classification On Homophilic And Heterophily Graphs, Asmaa M. Mahmoud, Heba F. Eid, Abeer S. Desuky, Hoda A. Ali

Al-Azhar Bulletin of Science

One of the most recent developments in the fields of deep learning and machine learning is Graph Neural Networks (GNNs). GNNs core task is the feature aggregation stage, which is carried out over the node's neighbours without taking into account whether the features are relevant or not. Additionally, the majority of these existing node representation techniques only consider the network's topology structure while completely ignoring the centrality information. In this paper, a new technique for explaining graph features depending on four different feature selection approaches and centrality measures in order to identify the important nodes and relevant node features is …


Multi-Aspect Rule-Based Ai: Methods, Taxonomy, Challenges And Directions Towards Automation, Intelligence And Transparent Cybersecurity Modeling For Critical Infrastructures, Iqbal H. Sarker, Helge Janicke, Mohamed A. Ferrag, Alsharif Abuadbba Apr 2024

Multi-Aspect Rule-Based Ai: Methods, Taxonomy, Challenges And Directions Towards Automation, Intelligence And Transparent Cybersecurity Modeling For Critical Infrastructures, Iqbal H. Sarker, Helge Janicke, Mohamed A. Ferrag, Alsharif Abuadbba

Research outputs 2022 to 2026

Critical infrastructure (CI) typically refers to the essential physical and virtual systems, assets, and services that are vital for the functioning and well-being of a society, economy, or nation. However, the rapid proliferation and dynamism of today's cyber threats in digital environments may disrupt CI functionalities, which would have a debilitating impact on public safety, economic stability, and national security. This has led to much interest in effective cybersecurity solutions regarding automation and intelligent decision-making, where AI-based modeling is potentially significant. In this paper, we take into account “Rule-based AI” rather than other black-box solutions since model transparency, i.e., human …


Matrix Profile Data Mining For Bgp Anomaly Detection, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson Apr 2024

Matrix Profile Data Mining For Bgp Anomaly Detection, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk, Steven Richardson

Research outputs 2022 to 2026

The Border Gateway Protocol (BGP), acting as the communication protocol that binds the Internet, remains vulnerable despite Internet security advancements. This is not surprising, as the Internet was not designed to be resilient to cyber-attacks, therefore the detection of anomalous activity was not of prime importance to the Internet creators. Detection of BGP anomalies can potentially provide network operators with an early warning system to focus on protecting networks, systems, and infrastructure from significant impact, improve security posture and resilience, while ultimately contributing to a secure global Internet environment. In this paper, we present a novel technique for the detection …


Nonstationary Recharge Responses To A Drying Climate In The Gnangara Groundwater System, Western Australia, Simone Gelsinari, Sarah Bourke, James Mccallum, Don Mcfarlane, Joel Hall, Richard Silberstein, Sally Thompson Apr 2024

Nonstationary Recharge Responses To A Drying Climate In The Gnangara Groundwater System, Western Australia, Simone Gelsinari, Sarah Bourke, James Mccallum, Don Mcfarlane, Joel Hall, Richard Silberstein, Sally Thompson

Research outputs 2022 to 2026

The response of groundwater recharge to climate change needs to be understood to enable sustainable management of groundwater systems today and in the future, yet observations of recharge over long-enough time periods to reveal responses to climate trends are scarce. Here we present a meta-analysis of 60 years of recharge studies over the Gnangara Groundwater System of South-West Western Australia, covering a period of sustained drying consistent with climate change projections. The recharge process in the area is defined by a wet winter during which rain saturates a deep, highly permeable soil profile with very low water storage capacity. Measurements …


Analyzing The Influence Of Design And Operating Conditions On Combustion And Emissions In Premixed Turbulent Flames: A Comprehensive Review, Medhat Elkelawy Prof. Dr. Eng., E. A. El Shenawy Prof. Dr., Hagar Alm-Eldin Bastawissi, Ibrahim Ali Mousa Eng., Mohamed M. Abdel-Raouf Ibrahim Dr. Eng. Mar 2024

Analyzing The Influence Of Design And Operating Conditions On Combustion And Emissions In Premixed Turbulent Flames: A Comprehensive Review, Medhat Elkelawy Prof. Dr. Eng., E. A. El Shenawy Prof. Dr., Hagar Alm-Eldin Bastawissi, Ibrahim Ali Mousa Eng., Mohamed M. Abdel-Raouf Ibrahim Dr. Eng.

Journal of Engineering Research

Recently, premixed combustion has dominated the field of combustion research worldwide. The current work is a review that addresses the effects of design and operating regimes on the combustion and emission characteristics of premixed turbulent flames. The study accounts for recent developments aimed at overcoming combustor operability issues that influence emissions and flame stability. Various experimental setups have been utilized in investigations, with results pertaining to performance and emissions concerning premixed turbulent flames. Thus, the objective of this paper is to provide a comprehensive review of the effects of swirl vane angles and equivalence fuel-air ratios for tests conducted both …


Building For Safety: Design Considerations For Refuge Areas In Tall Buildings From Quality Management Perspective, Enass. A. Salama, Heba. M. Gaber, Ahmed. M. Selim Mar 2024

Building For Safety: Design Considerations For Refuge Areas In Tall Buildings From Quality Management Perspective, Enass. A. Salama, Heba. M. Gaber, Ahmed. M. Selim

Journal of Engineering Research

New El Alamein City is one of the largest urban projects in Egypt, and the largest project on the north coast. Tall buildings (super high-rise buildings) are considered the prevailing trend by architectural designers to obtain the maximum view of the Mediterranean Sea. The provision of safety evacuation in emergencies for these buildings’ occupants is a crucial challenge from the Quality management point of view. In contrast, there are no sufficient architectural design guidelines for the tall buildings provided by the Egyptian code for protecting buildings from fire, especially the design of the refuge areas. This study aims to investigate …