Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of South Carolina (92)
- University for Business and Technology in Kosovo (89)
- Brigham Young University (81)
- University of Wisconsin Milwaukee (81)
- Air Force Institute of Technology (75)
-
- Florida Institute of Technology (50)
- University of Texas Rio Grande Valley (39)
- Virginia Commonwealth University (36)
- Illinois State University (12)
- Columbus State University (7)
- City University of New York (CUNY) (3)
- Rowan University (2)
- American University in Cairo (1)
- Nova Southeastern University (1)
- University of North Dakota (1)
- Keyword
-
- Center_CCR (11)
- Machine learning (10)
- Deep learning (9)
- Biological sciences (7)
- Computational Fluid Dynamics (7)
-
- Cybersecurity (6)
- Agriculture (5)
- Machine Learning (5)
- Natural Language Processing (5)
- Pure sciences (5)
- XPS (5)
- Analysis (4)
- Blockchain (4)
- Linear systems (4)
- Nitrogen (4)
- Spectroscopy (4)
- 3D printing (3)
- Boundary Layer (3)
- Causal structure (3)
- Chemistry (3)
- Computer vision (3)
- Entropy (3)
- Fluid Dynamics (3)
- Graphs (3)
- Health and environmental sciences (3)
- Metals (3)
- Nanoparticle (3)
- Nanoparticles (3)
- Necessary conditions (3)
- Neural Networks (3)
Articles 1 - 30 of 570
Full-Text Articles in Entire DC Network
Automatic Detection And Prevention Of Fake Key Attacks In Signal, Tarun Kumar Yadav
Automatic Detection And Prevention Of Fake Key Attacks In Signal, Tarun Kumar Yadav
Theses and Dissertations
The Signal protocol provides end-to-end encryption for billions of users in popular instant messaging applications like WhatsApp, Facebook Messenger, and Google Allo. The protocol relies on an app-specific central server to distribute public keys and relay encrypted messages between the users. Signal prevents passive attacks. However, it is vulnerable to some active attacks due to its reliance on a trusted key server. A malicious key server can distribute fake keys to users to perform man-in-the-middle or impersonation attacks. Signal applications support an authentication ceremony to detect these active attacks. However, this places an undue burden on the users to manually …
Controller Design For Coordinated Encirclement Of Moving Targets, Puneet Jain
Controller Design For Coordinated Encirclement Of Moving Targets, Puneet Jain
Theses and Dissertations
This thesis presents controllers that use relative range and bearing measurements to steer unmanned aerial vehicles (UAVs) to circular trajectories around stationary, constantly moving and constantly accelerating targets. The range and bearing to the target, along with their derivaties are estimated. These, along with the estimated local heading of the UAVs, are used in the control law, and to estimate the velocity of the target. In this work, six controllers are presented. The controller for a stationary target is derived using Lyapunov's direct method, and feedback linearization is used for the constant velocity and accelerating targets. A new controller is …
Inclusion Of Kinetic Proteomics In Multi-Omics Methods To Analyze Calorie Restriction Effects On Aging, Richard Hajime Carson
Inclusion Of Kinetic Proteomics In Multi-Omics Methods To Analyze Calorie Restriction Effects On Aging, Richard Hajime Carson
Theses and Dissertations
One of the greatest risk factors for disease is advanced age. As the human lifespan has increased, so too have the burdens of caring for an increasingly older population suffering from rising rates of cardiovascular disease, kidney disease, diabetes, and dementia. The need for improving medical technology and developing new therapies for age-related diseases is manifest. Yet our understanding of the processes of aging and how to attenuate the effects of aging remains incomplete. Various studies have established calorie restriction as a robust method for extending lifespan in laboratory organisms; however the mechanism is a topic of much debate. Advancing …
Exploring The Relationship Between Vocabulary Scaling And Algorithmic Performance In Text Classification For Large Datasets, Wilson Murray Fearn
Exploring The Relationship Between Vocabulary Scaling And Algorithmic Performance In Text Classification For Large Datasets, Wilson Murray Fearn
Theses and Dissertations
Text analysis is a significant branch of natural language processing, and includes manydifferent sub-fields such as topic modeling, document classification, and sentiment analysis.Unsurprisingly, those who do text analysis are concerned with the runtime of their algorithmsSome of these algorithms have runtimes that depend jointly on the size of the corpus beinganalyzed, as well as the size of that corpus's vocabulary. Trivially, a user may reduce theamount of data they feed into their model to speed it up, but we assume that users will behesitant to do this as more data tends to lead to better model quality. On the other …
Coordinated Persistent Homology And An Application To Seismology, Nickolas Brenten Callor
Coordinated Persistent Homology And An Application To Seismology, Nickolas Brenten Callor
Theses and Dissertations
The theory of persistent homology (PH), introduced by Edelsbrunner, Letscher, and Zomorodian in [1], provides a framework for extracting topological information from experimental data. This framework was then expanded by Carlsson and Zomorodian in [2] to allow for multiple parameters of analysis with the theory of multidimensional persistent homology (MPH). This particular generalization is considerably more difficult to compute and to apply than its predecessor. We introduce an intermediate theory, coordinated persistent homology (CPH), that allows for multiple parameters while still preserving the clarity and coherence of PH. In addition to introducing the basic theory, we provide a polynomial time …
Two Fields, One Pellet: Combining Demographics And Population Genetics Through Non-Invasive Sampling Of Snowshoe Hare Fecal Pellets In Michigan., Genelle Nicole Uhrig
Two Fields, One Pellet: Combining Demographics And Population Genetics Through Non-Invasive Sampling Of Snowshoe Hare Fecal Pellets In Michigan., Genelle Nicole Uhrig
Theses and Dissertations
As climate continues to change at a rapid rate, species are increasingly vulnerable to the resulting environmental changes. This is especially true for species whose fitness is closely linked to climate-associated environmental conditions. One of these vulnerable species is snowshoe hare, Lepus americanus, who depends on the timing and duration of snowfall to provide camouflage when they go through seasonal pelage changes from brown in the summer to white in the winter. Whereas snowshoe hare are stable across the core of their range, populations along the southern range edge are experiencing declines due to climate driven environmental changes that cause …
Image Encryption And Stegenography Based On Computational Single Pixel Imaging, Hossein Ghanbari Ghalehjoughi
Image Encryption And Stegenography Based On Computational Single Pixel Imaging, Hossein Ghanbari Ghalehjoughi
Theses and Dissertations
Multiple layers of information security are introduced based on computational ghost imaging (CGI). We show, in the first step, that it is possible to design a very reliable image encryption scheme using 3D computational ghost imaging with two single-pixel detectors sending data through two channels. Through the Normalized Root Mean Square scale, it is then shown that a further level of security can be achieved by merging data-carrying channels into one and using a coded order for their placement in the sequence of bucket data carried by the single channel. Yet another layer of security is introduced through hiding the …
A Game Modeling Of A Closed-Loop Supply Chain In A Water-Energy Nexus: Technology Advancement, Market Competition And Capacity Limit, Nabeel Hamoud
A Game Modeling Of A Closed-Loop Supply Chain In A Water-Energy Nexus: Technology Advancement, Market Competition And Capacity Limit, Nabeel Hamoud
Theses and Dissertations
Water and energy are two scarce and concerning resources interconnected in the water-energy nexus. In the nexus, production of energy needs water, and production of water needs energy. For better management of these resources in the nexus, this research considers a supply chain that consists of water suppliers, power suppliers, and consumers of these commodities. In the chain, water suppliers purchase power from power suppliers, and power suppliers purchase water from water suppliers. Other consumers can also buy these resources at the water and power markets. Each firm tries to maximize its own profit. The suppliers of water and power …
Quantifying The Variability In Heavy Metal Concentrations In Produce Grown In Metals-Rich Soil, Harris Lowell Byers
Quantifying The Variability In Heavy Metal Concentrations In Produce Grown In Metals-Rich Soil, Harris Lowell Byers
Theses and Dissertations
Childhood Pb exposure is associated with a multitude of poor health outcomes. In food-insecure areas, growing fresh produce in residential backyard gardens is one option for parents; however, commonly grown crops are known to accumulate Pb in consumable tissues when grown in metals-rich soils. A variety of produce representing a continuum of consumable tissues were grown in soils collected from two residential vegetable gardens, a former metal foundry, and commercial topsoil purchased from a local hardware store. The concentrations of heavy metals in crop tissues were measured with custom wavelength dispersive X-ray Fluorescence (WD-XRF) spectroscopy and portable energy dispersive X-ray …
The Dynamics And Speciation Of Arsenic In Drinking Water Wells In Eastern Wisconsin, Evvan Plank
The Dynamics And Speciation Of Arsenic In Drinking Water Wells In Eastern Wisconsin, Evvan Plank
Theses and Dissertations
Arsenic typically develops in Eastern Wisconsin groundwater as a result of oxidation of sulfide bearing minerals in the limestone bedrock (Schreiber et al. 2000). Naturally occurring arsenic exists in groundwater as oxyanions which have two oxidation states, As(III) and As(V). Under ambient pH conditions As(V) is primarily present as an anion (i.e., H2AsO4-) while As(III) tends to be uncharged (i.e., H3AsO3), making it much more difficult to remove through the existing treatment techniques such as adsorption and reverse osmosis (RO). Although many studies exist establishing arsenic concentrations across Wisconsin, there is a lack of investigations into the concentrations of each …
Seasonal Offshore/Inshore Migration Of Round Gobies, Erik Carlson
Seasonal Offshore/Inshore Migration Of Round Gobies, Erik Carlson
Theses and Dissertations
Since the invasion of round gobies (Neogobius melanostomus) in Lake Michigan, they have become integrated into both the nearshore and offshore food webs. Round gobies can be found in shallower water (<20 m) during the summer, but they disappear from these depths in early fall. They have been collected, occasionally, offshore in depths greater than 70 m during fall and early spring. These observations and other anecdotal evidence indicate that round goby migrate offshore during the fall and return in the spring. To study this, a large remotely operated vehicle (ROV) was used to conduct video transects offshore at various depths. The offshore sampling showed that round gobies migrated away from nearshore habitat in early October and were almost exclusively found deeper than 20 m by November. The round gobies remained offshore (>30 m) until mid-May, when they began the return to nearshore habitat. The cues to start the offshore and return migrations were not the focus of this project, but the fall offshore migrations coincided with decreasing temperatures nearshore in the fall, and in spring, the offshore movement of the thermal bar. The offshore migration in fall provide an increase in forage opportunity for deep, cold-water predators such as …20>
Zhvillimi I Ueb Aplikacionit Për Menaxhimin E Qendrave Të Karrierës: Ubt Campus, Elhame Krasniqi
Zhvillimi I Ueb Aplikacionit Për Menaxhimin E Qendrave Të Karrierës: Ubt Campus, Elhame Krasniqi
Theses and Dissertations
Ueb aplikacionet janë bërë pjesë e rëndësishme e bizneseve dhe institucioneve në përgjithësi pasi janë duke mundësuar shkëmbim dhe menaxhim të informacionit nga të gjitha vendet ku do që ndodhemi, rëndësia e ueb aplikacioneve responsive është një mundësi e mirë për tu përshtatur pajisjeve të ndryshme. Qëllimi i këtij studimi është të ofrojmë njohuri shtesë rreth praktikimit të këtyre aplikacioneve nga institucionet e arsimit të lartë, më saktësisht se si këto ueb aplikacioneve do të mund t’iu ofrojnë studenteve një ambient më të mirë për komunikim me njeri tjetrin e deri tek menaxhimi më i mirë i qendrave të karrierës …
Dizajnimi I Web Faqës Së Shpedicionit “Vjosa”, Fitore Bajrami
Dizajnimi I Web Faqës Së Shpedicionit “Vjosa”, Fitore Bajrami
Theses and Dissertations
Në këtë temë diplome do të trajtohet krijimi dhe dizajnimi i një Web faqeje të Agjensionit Doganor (shpedicioni) “VJOSA”.
Krijimi i Web faqes është bërë me gjuhët e shënjimit (markup language) siç janë HTML dhe JavaScript po ashtu edhe me programet e Adobe si Photoshop dhe Dreamweaver dhe duke i kushtuar shumë rëndësi dizajnit të Web-it.
Në kapitullin e fundit do të prezentojmë Web faqen e Shpedicionit Vjosa ku demonstrohen disa parime të cilat duhet t’i ketë nje web faqe për të tërhequr vizitorët siç janë: lehtësia për të naviguar, përmbajtja e mirë, informacione relevante dhe të sakta, funksione te …
Privatësia Ne Sistemet Rekomanduese, Krist Domgjoni
Privatësia Ne Sistemet Rekomanduese, Krist Domgjoni
Theses and Dissertations
Sistemet rekomanduese janë shumë të përdorshme në ditet e sotme. Ato përdoren në internet për të ndihmuar një shfrytëzues të gjej një produkt të deshiruar në kohë sa më të shpejtë. SR pothuajse gjenden në çdo faqe të internetit, sidomos në kompanitë e mëdha siç janë: Facebook, eBay, Amazon, NetFlix etj. Në raste konkrete këto sisteme ndihmojnë që përdoruesi të gjejë një libër, film, artikull, produkt me preferenca të tij, poashtu në rrjetet sociale përdoren për të takuar shokë që kanë interesa të njejta në fusha të ndryshme. Këto kompani I përdorin sistemet rekomanduese sepse sjellin përfitime marramendëse në kohë …
Efektet E Digjitalizimit Të Shërbimeve Publike Te Bizneset - Rast Studimi Komuna E Ferizajit, Ardit Mehmeti
Efektet E Digjitalizimit Të Shërbimeve Publike Te Bizneset - Rast Studimi Komuna E Ferizajit, Ardit Mehmeti
Theses and Dissertations
Zhvillimi dhe përdorimi i TIK-ut (Teknologjia e Informatave dhe Komunikimit) rezultoi me krijimin e Shoqërisë Informative, në epiqendrën e së cilës është roli i informatave në shoqërinë e sotme. Ky zhvillim aq i hovshëm ka ndikuar në masë të madhe edhe në marrëdhëniet në mes të institucioneve dhe komunitetit të biznesit. Biznesi elektronik është forma më bashkohore e organizimit e cila në masë të madhe varet nga përdorimi i teknologjisë informatike, përkatësisht përdorimi i këtyre aplikimeve, sistemeve apo platformave. TIK ka lehtësuar të bërit biznes duke zgjeruar me lehtë tregun, duke ulur kostot e shpenzimeve, kursimin e kohës, duke ngritur …
C# Implementimi I Capsule Network Në Detektimin E Objekteve Në Imazhe, Bashkim Salihu
C# Implementimi I Capsule Network Në Detektimin E Objekteve Në Imazhe, Bashkim Salihu
Theses and Dissertations
Rrjeti me kapsula apo CapsNet është një qasje e re dhe interesante për zgjidhjen e problemeve në Computer Vision. Me publikimet e fundit është vërtetuar se kjo qasje e re është e saktë në detektimin e objekteve edhe nëse ato objekte janë të shtrembëruara apo pamja është prej një këndi tjetër. Implementimi i CapsNet është realizuar në shumicën e gjuhëve programuese si Python, R, Java etj.
Në këtë temë është bërë implementimi në C# duke përdorur Microsoft Cognitive Toolkit (CNTK), si vegël per krijimin e modelit dhe trajnimin e tij. Rezultatet e fituara pas implementimit na tregojnë se implementimi në …
Arkitektura E Mikroshërbimeve Duke Perdorur .Net Core Dhe Reactjs, Gurakuq Krasniqi
Arkitektura E Mikroshërbimeve Duke Perdorur .Net Core Dhe Reactjs, Gurakuq Krasniqi
Theses and Dissertations
Në këtë punim diplome do të trajtohet implementimi i arkitekturës së mikroshërbimeve duke përdorur teknologjitë më bashkëkohore si .NET Core dhe React duke u bazuar në sistemin për menaxhimin e temës së diplomës. Mënyra e dizajnimit të arkitekturës softuerike ka evoluar që nga fillimi i përdorimit e deri në ditët e sotme dhe si rezultat i evoluconit kemi dizajne të ndryshme, ku secila nga to përdoret varësisht nga specifikat e sistemit dhe kërkesat që ato i përshtaten në mënyrën më efektive. Qëllimi kryesor i këtij punimi të diplomës është shtjellimi i realizimit dhe implementimit të sistemit për menaxhimin e temave …
Analiza E “Student Response System” Dhe Impakti I Tyre Në Ngritjen E Ndërveprimit Brenda Klasës, Kimete Haxhiu
Analiza E “Student Response System” Dhe Impakti I Tyre Në Ngritjen E Ndërveprimit Brenda Klasës, Kimete Haxhiu
Theses and Dissertations
Involvimi i teknologjisë po bëhet një komponentë thelbësore e klasës moderne dhe studentët kanë nevojë për mjete të tilla për të rritur interaktivitetin dhe të nxënit e tyre. Student Response Systems apo SRS, kujdesen pikërisht për këtë nevojë dhe përfaqësojnë disa nga teknologjitë më të mira dhe më të reja të arsimit që gjenden sot. Student Response System lejon mësimdhënësit të parashtrojnë pyetje ose të trajtojnë një problem në klasë, ku përmes tyre studentët japin përgjigjet e tyre në një pajisje dhe menjëherë grumbullohen përgjigjet e tyre për mësimdhënësin. Kjo ofron një mbështetje për procesin mësimor, duke marrë parasyshë që …
Zhvillimi I Sistemit Për Monitorim Të Ardhjes Dhe Largimit Nga Puna - Bazuar Në Java Sockets, Redon Bejtullahu
Zhvillimi I Sistemit Për Monitorim Të Ardhjes Dhe Largimit Nga Puna - Bazuar Në Java Sockets, Redon Bejtullahu
Theses and Dissertations
Sistemet për monitorimin e ardhjes dhe largimit nga puna bëjnë monitorimin e saktë dhe preciz të kohës së qëndrimit në orar të punës. Sistemet mund të gjenerojnë statistika komplekse rreth monitorimit të aktivitetit të punëtorit. Fokusi i zhvillimit të një sistemi të tillë është kontrolli i vijueshmërisë së punëtorëve në punë duke përfshirë largimet e hershme nga puna dhe tej zgjatjet e pauzave. Sistemi i monitorimit është i ndarë në dy pjesë atë administrative dhe pjesa raportuese, pjesa administrative kontrollon të gjithë sistemin dhe është përgjegjëse për monitorimin e tij, ndërsa pjesa raportuese përbëhet nga pajisja e cila bartet nga …
Cloud Based Iot Architecture, Nathan Roehl
Cloud Based Iot Architecture, Nathan Roehl
Theses and Dissertations
The Internet of Things (IoT) and cloud computing have grown in popularity over the past decade as the internet becomes faster and more ubiquitous. Cloud platforms are well suited to handle IoT systems as they are accessible and resilient, and they provide a scalable solution to store and analyze large amounts of IoT data. IoT applications are complex software systems and software developers need to have a thorough understanding of the capabilities, limitations, architecture, and design patterns of cloud platforms and cloud-based IoT tools to build an efficient, maintainable, and customizable IoT application. As the IoT landscape is constantly changing, …
A Taxonomy Of Security Features For The Comparison Of Home Automation Protocols, Amal Abdullah Alasiri
A Taxonomy Of Security Features For The Comparison Of Home Automation Protocols, Amal Abdullah Alasiri
Theses and Dissertations
Both academia and industry environments are getting significant attention to the Internet-of-Things (IoT) technology because of the unlimited benefits that this technology can bring to the environment. The technology presents a vision of a future Internet where computing systems, nodes, users, and daily nodes such as sensors and actuators cooperate with unprecedented convenience and economic benefits. The umbrella of IoT covers various applications as the following (smart home, transport, community, and national applications). Most of the studies focus on its technical and usage more than the security perspective. Especially, there are limited papers focus on smart home protocols security regarding …
Human-Robot Plan Communication, Rajaa A. Rahil
Human-Robot Plan Communication, Rajaa A. Rahil
Theses and Dissertations
Although the technical development of robots has made them more autonomous, they still benefit from some human skills and advice. Therefore, the robot needs to interact with a human and ask him for help to get out of difficulties in the best way. This dissertation addresses the problem of finding better mechanisms to communicate to a robot the directions for navigation in indoor environments. We identify which out of a set of combinations of speech, gestures, and drawing mechanisms are the most comfortable, easier to learn, and least error-prone for human users. Three different methods: a Speaking method, a Gesturing …
Social Groups Characterization And Dynamics: A Network Science Approach, Josemar Faustino Da Cruz
Social Groups Characterization And Dynamics: A Network Science Approach, Josemar Faustino Da Cruz
Theses and Dissertations
Over the course of our lives, we tend to transition through many social groups. From an early age, our first social group is our family, then we have our schoolmates, later in life, our coworkers, and likely another family. As we move from one group to another, we embed ourselves in the dynamics of social groups’ losses and gains of new members. These dynamics are a complex system of interactions, which at scale, form the structural basis of our societies. In many years of sociological research, the details of social group interactions remained poorly understood. Certainly, not because of lack …
Applying Formal Methods For Integrating Advanced Algorithms In Safety Critical Systems, Milton Stafford
Applying Formal Methods For Integrating Advanced Algorithms In Safety Critical Systems, Milton Stafford
Theses and Dissertations
In software engineering it is essential that updates are deployed for continual improvement. While software updates bring new functionality, updates also may introduce instability. This leads to failures of various kinds. This is especially problematic in safety-critical systems where there is a potential for injury or loss of life. However, newer and more sophisticated software carries potential advantages, including higher performance and reliability. Therefore, there are benefits in adopting newer software if the integration process is assured. In this thesis, I present a framework for assured integration; one that links requirements, design, and implementation. The proposed framework includes a new …
Some Free Boundary Problems For The Nonlinear Degenerate Multidimensional Parabolic Equations Modeling Reaction-Diffusion Processes, Amna Abu Weden
Some Free Boundary Problems For The Nonlinear Degenerate Multidimensional Parabolic Equations Modeling Reaction-Diffusion Processes, Amna Abu Weden
Theses and Dissertations
This dissertation presents a full classification of the short-time behavior of the interfaces or free boundaries for the nonlinear second order degenerate multidimensional parabolic partial differential equation (PDE) ut −∆u m +buβ = 0, x ∈ R N ,0 < t < T (1) with m > 0, β > 0,b ∈ R, arising in various applications in fluid mechanics, filtration of oil or gas in a porous media, plasma physics, reaction-diffusion equations in chemical kinetics, population dynamics in mathematical biology etc. as a mathematical model of nonlinear diffusion phenomena in the presence of the absorption or release of energy. Cauchy problem with compactly supported and nonnegative initial function …
A Sinking Feeling: The Fate Of Concrete Pyramids Deployed In Artificial Reefs In The Texas Gulf Of Mexico, Cameron J. Moody
A Sinking Feeling: The Fate Of Concrete Pyramids Deployed In Artificial Reefs In The Texas Gulf Of Mexico, Cameron J. Moody
Theses and Dissertations
The deployment of 2,611 concrete pyramids in Texas gulf waters represents a significant undertaking. In collaboration with Texas Parks and Wildlife, bathymetric sidescan data was collected at three reefs hit by Hurricane Harvey from 2017 to 2019. All reefs lost significant pyramid height between 2017 and 2019. The pyramids demonstrated greater subsidence in the year when Harvey occurred and minimal subsidence the following year. Pyramids that moved outside the reefs were due to hurricane forces and shrimp trawl activity. Pyramids that remained inside the reef remained at their deployment location for two reefs. The pyramids remaining in the third reef …
An Implementation Of Fully Convolutional Network For Surface Mesh Segmentation, Taiyu Zhang
An Implementation Of Fully Convolutional Network For Surface Mesh Segmentation, Taiyu Zhang
Theses and Dissertations
This thesis presents an implementation of a 3-Dimensional triangular surface mesh segmentation architecture named Shape Fully Convolutional Network, which is proposed by Pengyu Wang and Yuan Gan in 2018. They designed a deep neural network that has a similar architecture as the Fully Convolutional Network, which provides a good segmentation result for 2D images, on 3D triangular surface meshes. In their implementation, 3D surface meshes are represented as graph structures to feed the network. There are three main barriers when applying the Fully Convolutional Network to graph-based data structures.
• First, the pooling operation is much harder to apply to …
Chemical Self-Assembly Strategies Toward The Design Of Molecular Electronic Circuits, Dustin Olson
Chemical Self-Assembly Strategies Toward The Design Of Molecular Electronic Circuits, Dustin Olson
Theses and Dissertations
The field of molecular electronics is generally divided into one of two major categories, the first focusing on the unique functionalization of single molecules to produce electronic behavior, the other utilizing large assemblies of molecules to produce electronic behavior. The former approach is largely attributed to the seminal paper by Aviram and Ratner in which they proposed a molecular donor-bridge-acceptor (D-B-A) type architecture could lead to single molecule rectification producing electronic effects similar to conventional semiconductor based diodes. Extensive research has been carried out in both fields as it is foreseen that new approaches to electronics miniaturization will be necessary …
Evaluating The Resiliency Of Industrial Internet Of Things Process Control Using Protocol Agnostic Attacks, Hector L. Roldan
Evaluating The Resiliency Of Industrial Internet Of Things Process Control Using Protocol Agnostic Attacks, Hector L. Roldan
Theses and Dissertations
Improving and defending our nation's critical infrastructure has been a challenge for quite some time. A malfunctioning or stoppage of any one of these systems could result in hazardous conditions on its supporting populace leading to widespread damage, injury, and even death. The protection of such systems has been mandated by the Office of the President of the United States of America in Presidential Policy Directive Order 21. Current research now focuses on securing and improving the management and efficiency of Industrial Control Systems (ICS). IIoT promises a solution in enhancement of efficiency in ICS. However, the presence of IIoT …
Viability Of Wetland Crops For Use In Treatment Wetlands: Nitrogen Removal From Water And Production Of Food, Andrew Denson Corder
Viability Of Wetland Crops For Use In Treatment Wetlands: Nitrogen Removal From Water And Production Of Food, Andrew Denson Corder
Theses and Dissertations
Treatment wetlands are used to treat wastewater from a variety of sources, but their functionality depends on the macrophytes present therein. To better understand the viability of wetland macrophytes both as sources of food and as agents of nitrogen removal from wastewater, this study quantified plant growth, food production, and nitrogen removal capacity of three common wetland crops as well as three locally dominant graminoid species in a variety of relevant ecological contexts. All six plant species and a control were grown over a ten-week period in three related experiments: (1) under three moisture regimes, (2) with or without competition …