Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 14431 - 14460 of 302506

Full-Text Articles in Physical Sciences and Mathematics

Development Of A Cost-Constrained Intelligent Prosthetic Knee With Real-Time Machine Learning, Predictive Stumble Control, Lucas Jonathan Galey May 2023

Development Of A Cost-Constrained Intelligent Prosthetic Knee With Real-Time Machine Learning, Predictive Stumble Control, Lucas Jonathan Galey

Open Access Theses & Dissertations

The field of biomechatronics is evolving quickly with advances in computer science, biology, and electrical and mechanical engineering. Coupled with increased interests in machine learning (ML) across all industry sectors, there are opportunities to leverage advanced analytics in uniquely complex problems. This study aimed to deploy real-time ML predictions in a novel microprocessor-controlled prosthetic knee (MPK) device capable of identifying and responding to stumble-events to reduce amputee fall prevalence. Innately, stumbling is a chaotic event. Current MPKs operate by detecting gait characteristics and reacting to preprogrammed states. While these systems are beneficial in significant ways, such as energy expenditure and …


Spin Trapping Behavior Of Some Selected Melatonin Derivatives For Hydroxyl Radicals: A Computational Study, Aaron Caesar May 2023

Spin Trapping Behavior Of Some Selected Melatonin Derivatives For Hydroxyl Radicals: A Computational Study, Aaron Caesar

Electronic Theses and Dissertations

Melatonin (N-acetyl-5-methoxytryptamin, MLT) is a naturally occurring antioxidant which has shown some potential for use as a spin trap. Spin traps react with short lived hydroxyl radicals (HO·) to produce more stable products called spin adducts which may be characterized by electron paramagnetic resonance spectroscopy. However, the relative stability of hydroxyl spin adducts of melatonin derivatives (MLTD) compared to 2-hydroxymelatonin (HO-MLT) has not been examined computationally. Computational studies have been done on four selected MLTD; methylmelatonin (Me-MLT), chloromelatonin (Cl-MLT), cyanomelatonin (CN-MLT), and nitromelatonin (NO2-MLT). Geometry of the structures were optimized at the HF/6-31G(d), cc-pVXZ, (X=D and T) and …


The P-Adic Numbers And Conic Sections, Abdelhadi Zaoui May 2023

The P-Adic Numbers And Conic Sections, Abdelhadi Zaoui

Electronic Theses and Dissertations

This thesis introduces the p-adic metric on the rational numbers. We then present the basic properties of this metric. Using this metric, we explore conic sections, viewed as equidistant sets. Lastly, we move on the sequences and series, and from there, we define p-adic expansions and the analytic completion of Q with respect to the p-adic metric, which leads to exploring some arithmetic properties of Qp.


Roots Of Quaternionic Polynomials And Automorphisms Of Roots, Olalekan Ogunmefun May 2023

Roots Of Quaternionic Polynomials And Automorphisms Of Roots, Olalekan Ogunmefun

Electronic Theses and Dissertations

The quaternions are an extension of the complex numbers which were first described by Sir William Rowan Hamilton in 1843. In his description, he gave the equation of the multiplication of the imaginary component similar to that of complex numbers. Many mathematicians have studied the zeros of quaternionic polynomials. Prominent of these, Ivan Niven pioneered a root-finding algorithm in 1941, Gentili and Struppa proved the Fundamental Theorem of Algebra (FTA) for quaternions in 2007. This thesis finds the zeros of quaternionic polynomials using the Fundamental Theorem of Algebra. There are isolated zeros and spheres of zeros. In this thesis, we …


First Skulls Of Arctomeles Dimolodontus (Mustelidae: Melinae) From The Gray Fossil Site (Early Pliocene, Tn) Reveal Extreme Intraspecific Variation, Charles Bruce May 2023

First Skulls Of Arctomeles Dimolodontus (Mustelidae: Melinae) From The Gray Fossil Site (Early Pliocene, Tn) Reveal Extreme Intraspecific Variation, Charles Bruce

Electronic Theses and Dissertations

Here, a morphological description of the extinct meline badger Arctomeles dimolodontus from the Gray Fossil Site (GFS), Tennessee is provided with comparison to extant Meles meles. Originally described solely on upper teeth of a single individual, the recovery of several crania and jaws provides a sample of at least five individuals, affording the largest known fossil sample in North America of the enigmatic Melinae. Examination of A. dimolodontus skull material reveals extreme intraspecific variation in previously identified diagnostic characters, highlighting the need for caution when identifying fossil taxa based on similarly fragmentary remains. Dental variation is likely a result …


Assessing A Pandemic: Spatiotemporal Analysis Of Covid-19 In Tennessee School-Age Children, Omobolaji Olawuyi May 2023

Assessing A Pandemic: Spatiotemporal Analysis Of Covid-19 In Tennessee School-Age Children, Omobolaji Olawuyi

Electronic Theses and Dissertations

This study is a spatiotemporal analysis of the COVID-19 pandemic in school-age children (5-18 years) in Tennessee, from 2020-03-19 to 2022-02-12. Trend Analysis, Emerging Hot Spot Analysis, and a time series revealed three significant waves in both age groups. Therefore, Change Point Detection at the county level was completed using six defined change points to identify the wax and wane of the three COVID-19 waves. Hierarchical Cluster Analysis grouped counties with similar change points into six clusters. No spatial pattern was observed in distribution of the six clusters, however, when each change point was evaluated separately, spatial autocorrelation was present, …


Time Varied Self-Reliance Aerial Ground Traffic Monitoring System With Pre-Recognition Collision Avoidance, Seungheyon Lee, Sooeon Lee, Yumin Choi, Jalel Ben-Othman, Lynda Mokdad, Hyunbum Kim May 2023

Time Varied Self-Reliance Aerial Ground Traffic Monitoring System With Pre-Recognition Collision Avoidance, Seungheyon Lee, Sooeon Lee, Yumin Choi, Jalel Ben-Othman, Lynda Mokdad, Hyunbum Kim

All Works

In this letter, we introduce a time varied self-reliance aerial ground traffic monitoring system which provides pre-recognition collision avoidance among mobile robots and smart UAVs for virtual emotion security. Then, with ILP (Integer Linear Programming), we make a formal definition of the problem whose objective is to minimize a total spent time by smart UAVs (Unmanned Aerial Vehicles) and mobile robots without conflicts on condition that the demanded number of self-reliance security barriers are formed. To solve the defined problem, we develop two approaches, time-differentiated pre-stop movement and approximated equal segments movement. Then, those schemes are implemented through expanded experiments …


Msrl-Net: A Multi-Level Semantic Relation-Enhanced Learning Network For Aspect-Based Sentiment Analysis, Zhenda Hu, Zhaoxia Wang, Yinglin Wang, Ah-Hwee Tan May 2023

Msrl-Net: A Multi-Level Semantic Relation-Enhanced Learning Network For Aspect-Based Sentiment Analysis, Zhenda Hu, Zhaoxia Wang, Yinglin Wang, Ah-Hwee Tan

Research Collection School Of Computing and Information Systems

Aspect-based sentiment analysis (ABSA) aims to analyze the sentiment polarity of a given text towards several specific aspects. For implementing the ABSA, one way is to convert the original problem into a sentence semantic matching task, using pre-trained language models, such as BERT. However, for such a task, the intra- and inter-semantic relations among input sentence pairs are often not considered. Specifically, the semantic information and guidance of relations revealed in the labels, such as positive, negative and neutral, have not been completely exploited. To address this issue, we introduce a self-supervised sentence pair relation classification task and propose a …


Applying Information Theory To Software Evolution, Adriano Torres, Sebastian Baltes, Christoph Treude, Markus Wagner May 2023

Applying Information Theory To Software Evolution, Adriano Torres, Sebastian Baltes, Christoph Treude, Markus Wagner

Research Collection School Of Computing and Information Systems

Although information theory has found success in disciplines, the literature on its applications to software evolution is limit. We are still missing artifacts that leverage the data and tooling available to measure how the information content of a project can be a proxy for its complexity. In this work, we explore two definitions of entropy, one structural and one textual, and apply it to the historical progression of the commit history of 25 open source projects. We produce evidence that they generally are highly correlated. We also observed that they display weak and unstable correlations with other complexity metrics. Our …


A Classification Of Tensors In Ecsk Theory, Joshua James Leiter May 2023

A Classification Of Tensors In Ecsk Theory, Joshua James Leiter

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

You might have heard of Einstein’s theory of General relativity (GR): it is the one where mass and energy curve the fabric of spacetime to create gravity. This is the major theory which allows communication through satellites and our GPS to work too! Wormholes have interested me, but there are some issues about forming them in GR. Interestingly enough, elementary particles are also characterized by their spin in the standard model. However, intrinsic spin is nowhere geometrically coupled to the geometry of spacetime in Einstein’s theory. Later, Élie Cartan, Dennis Sciama, and Tom Kibble all flushed out adding different aspects …


Deep Learning With Attention Mechanisms In Breast Ultrasound Image Segmentation And Classification, Meng Xu May 2023

Deep Learning With Attention Mechanisms In Breast Ultrasound Image Segmentation And Classification, Meng Xu

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

Breast cancer is a great threat to women’s health. Breast ultrasound (BUS) imaging is commonly used in the early detection of breast cancer as a portable, valuable, and widely available diagnosis tool. Automated BUS image analysis can assist radiologists in making accurate and fast decisions. Generally, automated BUS image analysis includes BUS image segmentation and classification. BUS image segmentation automatically extracts tumor regions from a BUS image. BUS image classification automatically classifies breast tumors into benign or malignant categories. Multi-task learning accomplishes segmentation and classification simultaneously, which makes it more appealing and practical than an either individual task. Deep neural …


Cross-Boundary Stewardship In Protected Area Centered Ecosystems: Perceptions Of Success And Characteristics Of Cooperative Engagement, Ryan D. Tarver May 2023

Cross-Boundary Stewardship In Protected Area Centered Ecosystems: Perceptions Of Success And Characteristics Of Cooperative Engagement, Ryan D. Tarver

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The legal boundaries of protected areas, such as national parks are established and enforced by humans. Therefore, jurisdictional boundaries are ultimately have human meaning but not necessarily ecological relevance as natural phenomena such as watersheds and wildlife habitat often extend beyond a jurisdictional boundary. When considering the extent of natural system, we find that protected areas only make up part of a given ecosystem. The result is a large expanse of lands that fall under a various ownership types that include both publicly and privately designated tracts of land. This presents a management challenge when attempting to manage at the …


A. Overview Of The Flathead Lake Seismic Survey, Robert Lankston May 2023

A. Overview Of The Flathead Lake Seismic Survey, Robert Lankston

1970 Flathead Lake Seismic Survey

This book contains a summary of the key phases of acquisition and use of the reflection seismic data that were collected in 1970 on Flathead Lake and the evolution of the physical and digital archives of that seismic project.


Multidimensional Investigation Of Tennessee’S Urban Forest, Jillian L. Gorrell May 2023

Multidimensional Investigation Of Tennessee’S Urban Forest, Jillian L. Gorrell

Doctoral Dissertations

Preserving existing trees in urban areas and properly cultivating urban forest conservation and management opportunities is valuable to the ever-growing urban environment and necessary for creating optimal experiences and educational tools to meet the needs of increasing urban populations. This dissertation contains studies investigating several facets of the urban forest, including environmental effects of deforestation and urbanization, tree equity, and urban forest facility management and accessibility. Community education and outreach at arboreta about the importance of the tree canopy can help promote environmental stewardship. A digital questionnaire was electronically distributed to representatives of arboreta certified through the Tennessee Division of …


The Development Of Tailored Amphiphilic Copolymers For Detergent-Free Integral Membrane Protein Extraction, Cameron Edward Workman May 2023

The Development Of Tailored Amphiphilic Copolymers For Detergent-Free Integral Membrane Protein Extraction, Cameron Edward Workman

Doctoral Dissertations

Integral membrane proteins are prolific targets for the design, development, and delivery of pharmaceuticals. In fact, over 60% of all currently available drugs target these proteins to accomplish their therapeutic effect. However, integral membrane proteins remain the least characterized class of all proteins, accounting for only ~2% of all solved protein structures. One of the primary reasons for this low number of solved protein structures is that many membrane proteins lose their native conformation when extracted using conventional methods (e.g. detergents), convoluting accurate structure determination. In contrast, amphiphilic styrene-maleic acid copolymers (SMAs) were recently discovered to readily isolate membrane proteins …


Development Of Surface-Modified Liposomes For Drug Delivery Applications, Megan Louise Qualls May 2023

Development Of Surface-Modified Liposomes For Drug Delivery Applications, Megan Louise Qualls

Doctoral Dissertations

Liposomes are spherical vesicles composed of a lipid bilayer membrane that assembles around an internal aqueous core. This duality gives liposomes the ability to encapsulate both hydrophobic cargo within the lipid bilayer and hydrophilic cargo in the aqueous core, making them versatile molecular carriers for drug delivery. Liposome platforms have many advantages and are promising drug delivery carriers, and research is ongoing to improve their designs for continued clinical applications. Many liposome types have been developed, but further work is needed to improve surface modification, site-specific targeting, and triggered cargo release in order to further the therapeutic applications of these …


Determination Of Cadmium Uptake In Crassostrea Virginica Shell Under Controlled Conditions, Joseph John Pavelites Ii May 2023

Determination Of Cadmium Uptake In Crassostrea Virginica Shell Under Controlled Conditions, Joseph John Pavelites Ii

<strong> Theses and Dissertations </strong>

The objective of this thesis was to meet growing demand for the development of environmental biomonitors that protect ecosystems and public health. To do this, I determined the potential of oyster shell as a bioindicator of cadmium (Cd) in the environment by determining the mode of Cd uptake and relationships between Cd concentrations in the environment, shell, and soft tissues of juvenile eastern oysters (Crassostrea virginica Gmelin). I performed a review of the literature on the ability of oyster shell to retain metal contaminants and the factors that could affect this process (Chapter 2). I then reared C. virginica …


Realtime In-Network Cyberattack Detection In Power Grid Systems Using A Programmable Network, Luke Waind May 2023

Realtime In-Network Cyberattack Detection In Power Grid Systems Using A Programmable Network, Luke Waind

Computer Science and Computer Engineering Undergraduate Honors Theses

Power grid communication networks are important systems to detect intrusions from an attacker due to them being necessary to maintain critical infrastructure. This thesis applies recent advancements in P4 technology to detect cyberattacks in SCADA systems. In previous work, a list has been compiled of potential attacks that exploit one of the most common protocols in SCADA systems, DNP3. Solutions for detecting these attacks can be categorized by the broad methods that they use. The two methods that are focused on are single-packet inspection and multiple-packet inspection. For each of these, a specific attack is chosen and a detection algorithm …


Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield May 2023

Critical Infrastructure Workforce Development Pods For Teaching Cybersecurity Using Netlab+, Gideon Sutterfield

Computer Science and Computer Engineering Undergraduate Honors Theses

As digital automation for Industrial Control Systems has grown, so has its vulnerability to cyberattacks. The world of industry has responded effectively to this, but the world of academia is still lagging as its emphasis is still almost entirely on information technology. Considering this, we created a workforce development pod that serves as a hands-on learning module for teaching students key cybersecurity ideas surrounding operational technology using the NETLAB+ platform. A pod serves as the virtual environment where the learning exercise takes place. This project’s implementation involved the creation of a segmented network within the pod where a student starts …


Linux Malware Obfuscation, Brian Roden May 2023

Linux Malware Obfuscation, Brian Roden

Computer Science and Computer Engineering Undergraduate Honors Theses

Many forms of malicious software use techniques and tools that make it harder for their functionality to be parsed, both by antivirus software and reverse-engineering methods. Historically, the vast majority of malware has been written for the Windows operating system due to its large user base. As such, most efforts made for malware detection and analysis have been performed on that platform. However, in recent years, we have seen an increase in malware targeting servers running Linux and other Unix-like operating systems resulting in more emphasis of malware research on these platforms. In this work, several obfuscation techniques for Linux …


Analysis Of A Federated Learning Framework For Heterogeneous Medical Image Data: Privacy And Performance Perspective, Julia Brixey May 2023

Analysis Of A Federated Learning Framework For Heterogeneous Medical Image Data: Privacy And Performance Perspective, Julia Brixey

Computer Science and Computer Engineering Undergraduate Honors Theses

The massive amount of data available in our modern world and the increase of computational efficiency and power have allowed for great advancements in several fields such as computer vision, image processing, and natural languages. At the center of these advancements lies a data-centric learning approach termed deep learning. However, in the medical field, the application of deep learning comes with many challenges. Some of the fundamental challenges are the lack of massive training datasets, unbalanced and heterogenous data between health applications and health centers, security and privacy concerns, and the high cost of wrong inference and prediction. One of …


Reverse Engineering Post-Quantum Cryptography Schemes To Find Rowhammer Exploits, Sam Lefforge May 2023

Reverse Engineering Post-Quantum Cryptography Schemes To Find Rowhammer Exploits, Sam Lefforge

Computer Science and Computer Engineering Undergraduate Honors Theses

Post-quantum cryptography is a necessary countermeasure to protect against attacks from quantum computer. However, the post-quantum cryptography schemes are potentially vulnerable to side channel attacks. One such method of attacking involves creating bit-flips in victim memory through a process called Rowhammer. These attacks can vary in nature, but can involve rowhammering bits to raise the encryption scheme's decryption failure rate, or modifying the scheme's random seed. With a high enough decryption failure rate, it becomes feasible to generate sufficient information about the secret key to perform a key recovery attack. This thesis proposed two attacks on proposed post-quantum cryptography algorithms, …


Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France May 2023

Culture In Computing: The Importance Of Developing Gender-Inclusive Software, Creighton France

Computer Science and Computer Engineering Undergraduate Honors Theses

The field of computing as we know it today exists because of the contributions of numerous female mathematicians, computer scientists, and programmers. While working with hardware was viewed as “a man’s job” during the mid-20th century, computing and programming was viewed as a noble and high-paying field for women to occupy. However, as time has progressed, the U.S. has seen a decrease in the number of women pursuing computer science. The idea that computing is a masculine discipline is common in the U.S. today for reasons such as male-centered marketing of electronics and gadgets, an inaccurate representation of what it …


Chicken Keypoint Estimation, Rohit Kala May 2023

Chicken Keypoint Estimation, Rohit Kala

Computer Science and Computer Engineering Undergraduate Honors Theses

Poultry is an important food source across the world. To facilitate the growth of the global population, we must also improve methods to oversee poultry with new and emerging technologies to improve the efficiency of poultry farms as well as the welfare of the birds. The technology we explore is Deep Learning methods and Computer Vision to help automate chicken monitoring using technologies such as Mask R-CNN to detect the posture of the chicken from an RGB camera. We use Meta Research's Detectron 2 to implement the Mask R-CNN model to train on our dataset created on videos of chickens …


A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine May 2023

A Survey And Comparative Study On Vulnerability Scanning Tools, Cassidy Khounborine

Computer Science and Computer Engineering Undergraduate Honors Theses

Vulnerability scanners are a tool used by many organizations and developers as part of their vulnerability management. These scanners aid in the security of applications, databases, networks, etc. There are many different options available for vulnerability scanners that vary in the analysis method they encompass or target for which they scan, among many other features. This thesis explores the different types of scanners available and aims to ease the burden of selecting the ideal vulnerability scanner for one’s needs by conducting a survey and comparative analysis of vulnerability scanners. Before diving into the vulnerability scanners available, background information is provided …


Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton May 2023

Developing A Multi-Platform Application To Facilitate Internal Campus Hiring, Carissa Patton

Computer Science and Computer Engineering Undergraduate Honors Theses

Undergraduate research has proven to be highly beneficial to students, yet there are many students who do not know how to get involved or who are too timid to approach professors to inquire about potential research opportunities. Our hypothesis is that a cross-platform application has the potential to bridge the gap and help more students get involved in undergraduate research by providing them information about open positions and the faculty or staff members who are mentoring the projects. The key focus of this thesis is to develop an application that provides details about participating faculty or staff including their research …


Characterization Of 2d Quantum Materials Using Ai And Large-Scale Quantum Data Collection, Apoorva Bisht May 2023

Characterization Of 2d Quantum Materials Using Ai And Large-Scale Quantum Data Collection, Apoorva Bisht

Computer Science and Computer Engineering Undergraduate Honors Theses

2D materials like hexagonal boron nitride, graphene, and tungsten diselenide are widely utilized for studying their unique mechanical and opto-electronic properties to exploit them to make transistors and fabricating a variety of other devices. All these applications require that the 2D materials used be of specific uniform thickness. Until very recently, this process has been largely manual and tedious. However, few applications exploit the characteristic color-to-thickness correspondence of these near-transparent materials. To continue this effort, in this work we create a large-scale dataset for three different materials (hBN, graphene, and WSe$_2$) to train and test an image segmentation model along …


Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard May 2023

Universal Computation Using Self-Assembling, Crisscross Dna Slats, Jackson S. Bullard

Computer Science and Computer Engineering Undergraduate Honors Theses

I first give a brief introduction to formal models of computation. I then present three different approaches for computation in the aTAM. I later detail generating systems of crisscross slats given an arbitrary algorithm encoded in the form of a Turing machine. Crisscross slats show potential due to their high levels of cooperativity, so it is hoped that implementations utilizing slats are more robust to various growth errors compared to the aTAM. Finally, my software converts arbitrary crisscross slat systems into various physical representations that assist in analyzing their potential to be realized in experiments.


Testing The Interaction Between A Substellar Companion And A Debris Disk In The Hr 2562 System, Stella Yimiao Zhang, Gaspard Duchêne, Robert J. De Rosa, Megan Ansdell, Quinn Konopacky, Thomas Esposito, Eugene Chiang, Malena Rice, Brenda Matthews, Paul Kalas, Bruce Macintosh, Franck Marchis, Stan Metchev, Jenny Patience, Julien Rameau, Kimberly Ward-Duong, Schuyler Wolff, Michael P. Fitzgerald, Vanessa P. Bailey, Travis S. Barman, Joanna Bulger, Christine H. Chen, Jeffrey K. Chilcotte, Tara Cotten, René Doyon, Katherine B. Follette, Benjamin L. Gerard, Stephen Goodsell, James R. Graham, Alexandra Z. Greenbaum, Pascale Hibon, Li Wei Hung May 2023

Testing The Interaction Between A Substellar Companion And A Debris Disk In The Hr 2562 System, Stella Yimiao Zhang, Gaspard Duchêne, Robert J. De Rosa, Megan Ansdell, Quinn Konopacky, Thomas Esposito, Eugene Chiang, Malena Rice, Brenda Matthews, Paul Kalas, Bruce Macintosh, Franck Marchis, Stan Metchev, Jenny Patience, Julien Rameau, Kimberly Ward-Duong, Schuyler Wolff, Michael P. Fitzgerald, Vanessa P. Bailey, Travis S. Barman, Joanna Bulger, Christine H. Chen, Jeffrey K. Chilcotte, Tara Cotten, René Doyon, Katherine B. Follette, Benjamin L. Gerard, Stephen Goodsell, James R. Graham, Alexandra Z. Greenbaum, Pascale Hibon, Li Wei Hung

Astronomy: Faculty Publications

The HR 2562 system is a rare case where a brown dwarf companion resides in a cleared inner hole of a debris disk, offering invaluable opportunities to study the dynamical interaction between a substellar companion and a dusty disk. We present the first ALMA observation of the system as well as the continued Gemini Planet Imager monitoring of the companion's orbit with six new epochs from 2016 to 2018. We update the orbital fit, and in combination with absolute astrometry from GAIA, place a 3σ upper limit of 18.5 M J on the companion's mass. To interpret the ALMA observations, …


Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis May 2023

Trace Dna Detection Using Diamond Dye: A Recovery Technique To Yield More Dna, Leah Davis

Master's Theses

This study aspires to find a new screening approach to trace DNA recovery techniques to yield a higher quantity of trace DNA from larger items of evidence. It takes the path of visualizing trace DNA on items of evidence with potential DNA so analysts can swab a more localized area rather than attempting to recover trace DNA through the general swabbing technique currently used for trace DNA recovery. The first and second parts consisted of observing trace DNA interaction with Diamond Dye on porous and non-porous surfaces.

The third part involved applying the Diamond Dye solution by spraying it onto …