Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 59581 - 59610 of 302515

Full-Text Articles in Physical Sciences and Mathematics

Anti-Inflammatory And Immunomodulatory Properties Of Fermsented Plant Food, Roghayeh Shahbazi, Farzaneh Sharifzad, Rana Bagheri, Nawal Alsadi, Hamed Yasavoli-Sharahi, Chantal Matar May 2021

Anti-Inflammatory And Immunomodulatory Properties Of Fermsented Plant Food, Roghayeh Shahbazi, Farzaneh Sharifzad, Rana Bagheri, Nawal Alsadi, Hamed Yasavoli-Sharahi, Chantal Matar

Chemistry Faculty Publications and Presentations

Fermented plant foods are gaining wide interest worldwide as healthy foods due to their unique sensory features and their health-promoting potentials, such as antiobesity, antidiabetic, antihypertensive, and anticarcinogenic activities. Many fermented foods are a rich source of nutrients, phytochemicals, bioactive compounds, and probiotic microbes. The excellent biological activities of these functional foods, such as anti-inflammatory and immunomodulatory functions, are widely attributable to their high antioxidant content and lactic acid-producing bacteria (LAB). LAB contribute to the maintenance of a healthy gut microbiota composition and improvement of local and systemic immunity. Besides, antioxidant compounds are involved in several functional properties of fermented …


Fine-Grained And Controllably Redactable Blockchain With Harmful Data Forced Removal, Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao May 2021

Fine-Grained And Controllably Redactable Blockchain With Harmful Data Forced Removal, Huiying Hou, Shidi Hao, Jiaming Yuan, Shengmin Xu, Yunlei Zhao

Research Collection School Of Computing and Information Systems

Notoriously, immutability is one of the most striking properties of blockchains. As the data contained in blockchains may be compelled to redact for personal and legal reasons, immutability needs to be skillfully broken. In most existing redactable blockchains, fine-grained redaction and effective deletion of harmful data are mutually exclusive. To close the gap, we propose a fine-grained and controllably redactable blockchain with harmful data forced removal. In the scheme, the originator of the transaction has fine-grained control over who can perform the redaction and which portions of the transaction can be redacted. The redaction transaction is performed after collecting enough …


Immigrant Families' Health-Related Information Behavior On Instant Messaging Platforms: Health-Related Information Exchange In Immigrant Family Groups On Instant Messaging Platforms, Lev Poretski, Taamannae Taabassum, Anthony Tang May 2021

Immigrant Families' Health-Related Information Behavior On Instant Messaging Platforms: Health-Related Information Exchange In Immigrant Family Groups On Instant Messaging Platforms, Lev Poretski, Taamannae Taabassum, Anthony Tang

Research Collection School Of Computing and Information Systems

For immigrant families, instant messaging family groups are a common platform forsharing and discussing health-related information. Immigrants often maintain contact with their family abroad and trust information in shared IM family groups more than the information from local authorities and sources. In this study, we aimed to understand health-related information behaviors of immigrant families in their IM family groups. Based on the interviews with 6 participants from immigrant families to Canada, we found that immigrant families’ discourse on IM platforms is motivated by love and care for other family members. The families used local and international sources of information, judged …


Visuo-Haptic Illusions For Linear Translation And Stretching Using Physical Proxies In Virtual Reality, Martin Feick, Niko Kleer, André Zenner, Anthony Tang, Antonio Kruger May 2021

Visuo-Haptic Illusions For Linear Translation And Stretching Using Physical Proxies In Virtual Reality, Martin Feick, Niko Kleer, André Zenner, Anthony Tang, Antonio Kruger

Research Collection School Of Computing and Information Systems

Providing haptic feedback when manipulating virtual objects is an essential part of immersive virtual reality experiences; however, it is challenging to replicate all of an object’s properties and characteristics. We propose the use of visuo-haptic illusions alongside physical proxies to enhance the scope of proxy-based interactions with virtual objects. In this work, we focus on two manipulation techniques, linear translation and stretching across different distances, and investigate how much discrepancy between the physical proxy and the virtual object may be introduced without participants noticing. In a study with 24 participants, we found that manipulation technique and travel distance significantly affect …


Automatic Solution Summarization For Crash Bugs, Haoye Wang, Xin Xia, David Lo, John C. Grundy, Xinyu Wang May 2021

Automatic Solution Summarization For Crash Bugs, Haoye Wang, Xin Xia, David Lo, John C. Grundy, Xinyu Wang

Research Collection School Of Computing and Information Systems

The causes of software crashes can be hidden anywhere in the source code and development environment. When encountering software crashes, recurring bugs that are discussed on Q&A sites could provide developers with solutions to their crashing problems. However, it is difficult for developers to accurately search for relevant content on search engines, and developers have to spend a lot of manual effort to find the right solution from the returned results. In this paper, we present CRASOLVER, an approach that takes into account both the structural information of crash traces and the knowledge of crash-causing bugs to automatically summarize solutions …


Infercode: Self-Supervised Learning Of Code Representations By Predicting Subtrees, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang May 2021

Infercode: Self-Supervised Learning Of Code Representations By Predicting Subtrees, Duy Quoc Nghi Bui, Yijun Yu, Lingxiao Jiang

Research Collection School Of Computing and Information Systems

Learning code representations has found many uses in software engineering, such as code classification, code search, code comment generation, and bug prediction. Although representations of code in tokens, syntax trees, dependency graphs, paths in trees, or the combinations of their variants have been proposed, existing learning techniques have a major limitation that these models are often trained on datasets labeled for specific downstream tasks, and the code representations may not be suitable for other tasks. Even though some techniques generate representations from unlabeled code, they are far from satisfactory when applied to downstream tasks. To overcome the limitation, this paper …


On The Root Of Trust Identification Problem, Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik May 2021

On The Root Of Trust Identification Problem, Ivan De Oliveira Nunes, Xuhua Ding, Gene Tsudik

Research Collection School Of Computing and Information Systems

Trusted Execution Environments (TEEs) are becoming ubiquitous and are currently used in many security applications: from personal IoT gadgets to banking and databases. Prominent examples of such architectures are Intel SGX, ARM TrustZone, and Trusted Platform Modules (TPMs). A typical TEE relies on a dynamic Root of Trust (RoT) to provide security services such as code/data confidentiality and integrity, isolated secure software execution, remote attestation, and sensor auditing. Despite their usefulness, there is currently no secure means to determine whether a given security service or task is being performed by the particular RoT within a specific physical device. We refer …


Edgeduet: Tiling Small Object Detection For Edge Assisted Autonomous Mobile Vision, Xu Wang, Zheng Yang, Jiahang Wu, Yi Zhao, Zimu Zhou May 2021

Edgeduet: Tiling Small Object Detection For Edge Assisted Autonomous Mobile Vision, Xu Wang, Zheng Yang, Jiahang Wu, Yi Zhao, Zimu Zhou

Research Collection School Of Computing and Information Systems

Accurate, real-time object detection on resource-constrained devices enables autonomous mobile vision applications such as traffic surveillance, situational awareness, and safety inspection, where it is crucial to detect both small and large objects in crowded scenes. Prior studies either perform object detection locally on-board or offload the task to the edge/cloud. Local object detection yields low accuracy on small objects since it operates on low-resolution videos to fit in mobile memory. Offloaded object detection incurs high latency due to uploading high-resolution videos to the edge/cloud. Rather than either pure local processing or offloading, we propose to detect large objects locally while …


Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar May 2021

Ship-Gan: Generative Modeling Based Maritime Traffic Simulator, Chaithanya Shankaramurthy Basrur, Arambam James Singh, Arunesh Sinha, Akshat Kumar

Research Collection School Of Computing and Information Systems

Modeling vessel movement in a maritime environment is an extremely challenging task given the complex nature of vessel behavior. Several existing multiagent maritime decision making frameworks require access to an accurate traffic simulator. We develop a system using electronic navigation charts to generate realistic and high fidelity vessel traffic data using Generative Adversarial Networks (GANs). Our proposed Ship-GAN uses a conditional Wasserstein GAN to model a vessel’s behavior. The generator can simulate the travel time of vessels across different maritime zones conditioned on vessels’ speeds and traffic intensity. Furthermore, it can be used as an accurate simulator for prior decision …


Unveiling The Mystery Of Api Evolution In Deep Learning Frameworks: A Case Study Of Tensorflow 2, Zejun Zhang, Yanming Yang, Xin Xia, David Lo, Xiaoxue Ren, John C. Grundy May 2021

Unveiling The Mystery Of Api Evolution In Deep Learning Frameworks: A Case Study Of Tensorflow 2, Zejun Zhang, Yanming Yang, Xin Xia, David Lo, Xiaoxue Ren, John C. Grundy

Research Collection School Of Computing and Information Systems

API developers have been working hard to evolve APIs to provide more simple, powerful, and robust API libraries. Although API evolution has been studied for multiple domains, such as Web and Android development, API evolution for deep learning frameworks has not yet been studied. It is not very clear how and why APIs evolve in deep learning frameworks, and yet these are being more and more heavily used in industry. To fill this gap, we conduct a large-scale and in-depth study on the API evolution of Tensorflow 2, which is currently the most popular deep learning framework. We first extract …


Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Paruchuri, Akshat Kumar May 2021

Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Paruchuri, Akshat Kumar

Research Collection School Of Computing and Information Systems

In modular reinforcement learning (MRL), a complex decision making problem is decomposed into multiple simpler subproblems each solved by a separate module. Often, these subproblems have conflicting goals, and incomparable reward scales. A composable decision making architecture requires that even the modules authored separately with possibly misaligned reward scales can be combined coherently. An arbitrator should consider different module's action preferences to learn effective global action selection. We present a novel framework called GRACIAS that assigns fine-grained importance to the different modules based on their relevance in a given state, and enables composable decision making based on modern deep RL …


Leveraging Multiple Relations For Fashion Trend Forecasting Based On Social Media, Yujuan Ding, Yunshan Ma, Lizi Liao, Wai Keung Wong, Tat-Seng Chua May 2021

Leveraging Multiple Relations For Fashion Trend Forecasting Based On Social Media, Yujuan Ding, Yunshan Ma, Lizi Liao, Wai Keung Wong, Tat-Seng Chua

Research Collection School Of Computing and Information Systems

—Fashion trend forecasting is of great research significance in providing useful suggestions for both fashion companies and fashion lovers. Although various studies have been devoted to tackling this challenging task, they only studied limited fashion elements with highly seasonal or simple patterns, which could hardly reveal the real complex fashion trends. Moreover, the mainstream solutions for this task are still statistical-based and solely focus on time-series data modeling, which limit the forecast accuracy. Towards insightful fashion trend forecasting, previous work [1] proposed to analyze more fine-grained fashion elements which can informatively reveal fashion trends. Specifically, it focused on detailed fashion …


Low-Power Downlink For The Internet Of Things Using Ieee 802.11-Compliant Wake-Up Receivers, Johannes Blobel, Vu Huy Tran, Archan Misra, Falko Dressler May 2021

Low-Power Downlink For The Internet Of Things Using Ieee 802.11-Compliant Wake-Up Receivers, Johannes Blobel, Vu Huy Tran, Archan Misra, Falko Dressler

Research Collection School Of Computing and Information Systems

Ultra-low power communication is critical for supporting the next generation of battery-operated or energy harvesting battery-less Internet of Things (IoT) devices. Duty cycling protocols and wake-up receiver (WuRx) technologies, and their combinations, have been investigated as energy-efficient mechanisms to support selective, event-driven activation of devices. In this paper, we go one step further and show how WuRx can be used for an efficient and multi-purpose low power downlink (LPD) communication channel. We demonstrate how to (a) extend the wake-up signal to support low-power flexible and extensible unicast, multicast, and broadcast downlink communication and (b) utilize the WuRx-based LPD to also …


Robot: Robustness-Oriented Testing For Deep Learning Systems, Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng May 2021

Robot: Robustness-Oriented Testing For Deep Learning Systems, Jingyi Wang, Jialuo Chen, Youcheng Sun, Xingjun Ma, Dongxia Wang, Jun Sun, Peng Cheng

Research Collection School Of Computing and Information Systems

Recently, there has been a significant growth of interest in applying software engineering techniques for the quality assurance of deep learning (DL) systems. One popular direction is deep learning testing, where adversarial examples (a.k.a. bugs) of DL systems are found either by fuzzing or guided search with the help of certain testing metrics. However, recent studies have revealed that the commonly used neuron coverage metrics by existing DL testing approaches are not correlated to model robustness. It is also not an effective measurement on the confidence of the model robustness after testing. In this work, we address this gap by …


Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Parachuri, Akshat Kumar May 2021

Action Selection For Composable Modular Deep Reinforcement Learning, Vaibhav Gupta, Daksh Anand, Praveen Parachuri, Akshat Kumar

Research Collection School Of Computing and Information Systems

In modular reinforcement learning (MRL), a complex decision making problem is decomposed into multiple simpler subproblems each solved by a separate module. Often, these subproblems have conflicting goals, and incomparable reward scales. A composable decision making architecture requires that even the modules authored separately with possibly misaligned reward scales can be combined coherently. An arbitrator should consider different module’s action preferences to learn effective global action selection. We present a novel framework called GRACIAS that assigns fine-grained importance to the different modules based on their relevance in a given state, and enables composable decision making based on modern deep RL …


A Novel Dynamic Analysis Infrastructure To Instrument Untrusted Execution Flow Across User-Kernel Spaces, Jiaqi Hong, Xuhua Ding May 2021

A Novel Dynamic Analysis Infrastructure To Instrument Untrusted Execution Flow Across User-Kernel Spaces, Jiaqi Hong, Xuhua Ding

Research Collection School Of Computing and Information Systems

Code instrumentation and hardware based event trapping are two primary approaches used in dynamic malware analysis systems. In this paper, we propose a new approach called Execution Flow Instrumentation (EFI) where the analyzer execution flow is interleaved with the target flow in user- and kernel-mode, at junctures flexibly chosen by the analyzer at runtime. We also propose OASIS as the system infrastructure to realize EFI with virtues of the current two approaches, however without their drawbacks. Despite being securely and transparently isolated from the target, the analyzer introspects and controls it in the same native way as instrumentation code. We …


Characterising The Knowledge About Primitive Variables In Java Code Comments, Mahfouth Alghamdi, Shinpei Hayashi, Takashi Kobayashi, Christoph Treude May 2021

Characterising The Knowledge About Primitive Variables In Java Code Comments, Mahfouth Alghamdi, Shinpei Hayashi, Takashi Kobayashi, Christoph Treude

Research Collection School Of Computing and Information Systems

Primitive types are fundamental components available in any programming language, which serve as the building blocks of data manipulation. Understanding the role of these types in source code is essential to write software. Little work has been conducted on how often these variables are documented in code comments and what types of knowledge the comments provide about variables of primitive types. In this paper, we present an approach for detecting primitive variables and their description in comments using lexical matching and advanced matching. We evaluate our approaches by comparing the lexical and advanced matching performance in terms of recall, precision, …


How Do Software Developers Use Github Actions To Automate Their Workflows?, Timothy Kinsman, Mairieli Wessel, Marco Gerosa, Christoph Treude May 2021

How Do Software Developers Use Github Actions To Automate Their Workflows?, Timothy Kinsman, Mairieli Wessel, Marco Gerosa, Christoph Treude

Research Collection School Of Computing and Information Systems

Automated tools are frequently used in social coding repositories to perform repetitive activities that are part of the distributed software development process. Recently, GitHub introduced GitHub Actions, a feature providing automated work-flows for repository maintainers. Although several Actions have been built and used by practitioners, relatively little has been done to evaluate them. Understanding and anticipating the effects of adopting such kind of technology is important for planning and management. Our research is the first to investigate how developers use Actions and how several activity indicators change after their adoption. Our results indicate that, although only a small subset of …


Research Artifact: The Potential Of Meta-Maintenance On Github, Hideaki Hata, Raula Kula, Takashi Ishio, Christoph Treude May 2021

Research Artifact: The Potential Of Meta-Maintenance On Github, Hideaki Hata, Raula Kula, Takashi Ishio, Christoph Treude

Research Collection School Of Computing and Information Systems

This is a research artifact for the paper “Same File, Different Changes: The Potential of Meta-Maintenance on GitHub”. This artifact is a data repository including a list of studied 32,007 repositories on GitHub, a list of targeted 401,610,677 files, the results of the qualitative analysis for RQ2, RQ3, and RQ4, the results of the quantitative analysis for RQ5, and survey material for RQ6. The purpose of this artifact is enabling researchers to replicate our mixed-methods results of the paper, and to reuse the results of our exploratory study for further software engineering research. This research artifact is available at https://github.com/NAIST-SE/MetaMaintenancePotential …


Same File, Different Changes: The Potential Of Meta-Maintenance On Github, Hideaki Hata, Raula Kula, Takashi Ishio, Christoph Treude May 2021

Same File, Different Changes: The Potential Of Meta-Maintenance On Github, Hideaki Hata, Raula Kula, Takashi Ishio, Christoph Treude

Research Collection School Of Computing and Information Systems

Online collaboration platforms such as GitHub have provided software developers with the ability to easily reuse and share code between repositories. With clone-and-own and forking becoming prevalent, maintaining these shared files is important, especially for keeping the most up-to-date version of reused code. Different to related work, we propose the concept of meta-maintenance-i.e., tracking how the same files evolve in different repositories with the aim to provide useful maintenance opportunities to those files. We conduct an exploratory study by analyzing repositories from seven different programming languages to explore the potential of meta-maintenance. Our results indicate that a majority of active …


Tensor Low-Rank Representation For Data Recovery And Clustering, Pan Zhou, Canyi Lu, Jiashi Feng, Zhouchen Lin, Shuicheng Yan May 2021

Tensor Low-Rank Representation For Data Recovery And Clustering, Pan Zhou, Canyi Lu, Jiashi Feng, Zhouchen Lin, Shuicheng Yan

Research Collection School Of Computing and Information Systems

Multi-way or tensor data analysis has attracted increasing attention recently, with many important applications in practice. This article develops a tensor low-rank representation (TLRR) method, which is the first approach that can exactly recover the clean data of intrinsic low-rank structure and accurately cluster them as well, with provable performance guarantees. In particular, for tensor data with arbitrary sparse corruptions, TLRR can exactly recover the clean data under mild conditions; meanwhile TLRR can exactly verify their true origin tensor subspaces and hence cluster them accurately. TLRR objective function can be optimized via efficient convex programing with convergence guarantees. Besides, we …


Silver Bow Creek/Butte Area Npl Site Butte Priority Soils Operable Unit, Pioneer Technical Services, Inc. May 2021

Silver Bow Creek/Butte Area Npl Site Butte Priority Soils Operable Unit, Pioneer Technical Services, Inc.

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Silver Bow Creek/Butte Area Npl Site Butte Priority Soils Operable Unit, Atlantic Richfield Company May 2021

Silver Bow Creek/Butte Area Npl Site Butte Priority Soils Operable Unit, Atlantic Richfield Company

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Butte Priority Soils Operable Unit Preliminary (30%) Design Butte Reduction Works Smelter Area Remedial Action Construction Drawings, Pioneer Technical Services, Inc. May 2021

Butte Priority Soils Operable Unit Preliminary (30%) Design Butte Reduction Works Smelter Area Remedial Action Construction Drawings, Pioneer Technical Services, Inc.

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Teachability And Interpretability In Reinforcement Learning, Jeevan Rajagopal May 2021

Teachability And Interpretability In Reinforcement Learning, Jeevan Rajagopal

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

There have been many recent advancements in the field of reinforcement learning, starting from the Deep Q Network playing various Atari 2600 games all the way to Google Deempind's Alphastar playing competitively in the game StarCraft. However, as the field challenges more complex environments, the current methods of training models and understanding their decision making become less effective. Currently, the problem is partially dealt with by simply adding more resources, but the need for a better solution remains.

This thesis proposes a reinforcement learning framework where a teacher or entity with domain knowledge of the task to complete can assist …


Association Between Dietary Inflammatory Index, Dietary Patterns, Plant-Based Dietary Index And The Risk Of Obesity, Yoko B. Wang, Nitin Shivappa, James R. Hébert Scd, Amanda J. Page, Yohannes Adama Melaku May 2021

Association Between Dietary Inflammatory Index, Dietary Patterns, Plant-Based Dietary Index And The Risk Of Obesity, Yoko B. Wang, Nitin Shivappa, James R. Hébert Scd, Amanda J. Page, Yohannes Adama Melaku

Faculty Publications

Evidence on the association between various dietary constructs and obesity risk is limited. This study aims to investigate the longitudinal relationship between different diet indices and dietary patterns with the risk of obesity. Non-obese participants (n = 787) in the North West Adelaide Health Study were followed from 2010 to 2015. The dietary inflammatory index (DII®), plant-based dietary index (PDI) and factor-derived dietary pattern scores were computed based on food frequency questionnaire data. We found the incidence of obesity was 7.62% at the 5-year follow up. In the adjusted model, results from multivariable log-binomial logistic regression showed that a prudent …


Development Of High Throughput Assays For Identification And Evaluation Of Small Molecule Inhibitors Of Microrna-31 Expression, Jackline A. Onyango May 2021

Development Of High Throughput Assays For Identification And Evaluation Of Small Molecule Inhibitors Of Microrna-31 Expression, Jackline A. Onyango

Masters Theses

Dysregulated expression of miRNAs has been linked to numerous cancers. On the other hand, miRNAs are potential drug targets due to the ability of their precursor molecules to fold into ligand binding structures. Small-molecule modulators of miRNAs offers opportunity for the development of new therapeutic agents and tools to further probe the mechanisms of miRNA functions. To facilitate the identification of miRNA modulators, the appropriate screening systems are needed, which would be adaptable for high-throughput applications, and allow for quantitative measurements. In this text, we present a molecular beacon-based assay to identify molecules that inhibit miRNA-31 processing by Dicer and …


A Process For Adm-300 Radiation Detector Modernization For Military Applications, Caesar R. Pereira May 2021

A Process For Adm-300 Radiation Detector Modernization For Military Applications, Caesar R. Pereira

UNLV Theses, Dissertations, Professional Papers, and Capstones

An investigation to re-evaluate the current use in military applications of the ADM-300 Multi-Functional Survey Instrument and its requirements are provided. This paper outlines a method to upgrade the ADM-300 due to its eventual obsolescence using newly developed requirements that meet the original justification for use in the USAF in 1992. The capabilities and features of various detectors are analyzed and compared to the ADM-300. Response curves are generated using Monte Carlo simulations. The detectors are prioritized based on their performance to create metrics. A metanalysis of the metrics is conducted to limit bias within the process and justify their …


Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto May 2021

Brave New World Reboot: Technology’S Role In Consumer Manipulation And Implications For Privacy And Transparency, Allie Mertensotto

Marketing Undergraduate Honors Theses

Most consumers are aware that our data is being obtained and collected through the use of our devices we keep in our homes or even on our person throughout the day. But, it is understated how much data is being collected. Conversations you have with your peers – in a close proximity of a device – are being used to tailor advertising. The advertisements you receive on your devices are uniquely catered to your individual person, due to the fact it consistently uses our data to produce efficient and personal ads. On the flip side, our government is also tapping …


The Bridge To Closing The Green Gap, Samantha Rife May 2021

The Bridge To Closing The Green Gap, Samantha Rife

Marketing Undergraduate Honors Theses

In today’s society, we have seen the theme of green consciousness and sustainability become more prevalent as the years pass by. Even as this concept seems to increase in consumer engagement there is not a proportional increase in consumer behavior. This is what is referred to as the gap between green consciousness and green consumerism. Many believe the root of this issue can be solved by increasing regulations. However, I believe this gap can be narrowed by using brands to shift consumers behaviors through their message. The main question that I want to focus in on is, “Can a brand …