Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

PDF

Computer Engineering

Institution
Keyword
Publication Year
Publication

Articles 31 - 60 of 7989

Full-Text Articles in Engineering

Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer Nov 2023

Closing The Gap: Leveraging Aes-Ni To Balance Adversarial Advantage And Honest User Performance In Argon2i, Nicholas Harrell, Nathaniel Krakauer

CERIAS Technical Reports

The challenge of providing data privacy and integrity while maintaining efficient performance for honest users is a persistent concern in cryptography. Attackers exploit advances in parallel hardware and custom circuit hardware to gain an advantage over regular users. One such method is the use of Application-Specific Integrated Circuits (ASICs) to optimize key derivation function (KDF) algorithms, giving adversaries a significant advantage in password guessing and recovery attacks. Other examples include using graphical processing units (GPUs) and field programmable gate arrays (FPGAs). We propose a focused approach to close the gap between adversarial advantage and honest user performance by leveraging the …


Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson Nov 2023

Security Datasets For Network Research, Bruce Hartpence, Bill Stackpole, Daryl Johnson

Data

This document describes the content of the security traffic datasets included in this collection and the conditions under which the packets were collected. These datasets were assembled from 2023 onward. There will be periodic updates or additions to the dataset collection. The current collection includes a variety of nmap intense scans, an Address Resolution Protocol Man in the Middle (ARP MITM) attack, an Internet Control Message Protocol (ICMP) Redirect MITM and an active directory enumeration attack.

When referencing these datasets, please use the following DOI: 10.57673/gccis-qj60


Poster: Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutiso Mutua, Ruairí De Fréin, Ali Malik, Kibanza Eliel, Sahbane Marco, Pantel Maxime Nov 2023

Poster: Optimising Electric Vehicle Charging Infrastructure In Dublin Using Geecharge, Alexander Mutiso Mutua, Ruairí De Fréin, Ali Malik, Kibanza Eliel, Sahbane Marco, Pantel Maxime

Conference papers

Range anxiety is a significant challenge affecting electric vehicles use as drivers fear running out of charge without finding a charging point on time. We develop methods to optimise the distribution of charging points. EV portacharge and GEECharge solutions distribute charging points in a city by considering the population density and Points Of Interest (POI) or road traffic. This paper focuses on (1) developing and evaluating methods to distribute Charging Points (CPs) in Dublin city; (2) optimising CP allocation; (3) visualising paths in the graph network to show the most used roads and points of interest; (4) describing a way …


Room Temperature Two-Dimensional Electron Gas Scattering Time, Effective Mass, And Mobility Parameters In AlXGa1−XN/Gan Heterostructures (0.07 ≤ X ≤ 0.42), Sean Knight, Steffen Richter, Alexis Papamichail, Philipp Kühne, Nerijus Armakavicius, Shiqi Guo, Axel R. Persson, Vallery Stanishev, Viktor Rindert, Per O. Å. Persson, Plamen P. Paskov, Mathias Schubert, Vanya Darakchieva Nov 2023

Room Temperature Two-Dimensional Electron Gas Scattering Time, Effective Mass, And Mobility Parameters In AlXGa1−XN/Gan Heterostructures (0.07 ≤ X ≤ 0.42), Sean Knight, Steffen Richter, Alexis Papamichail, Philipp Kühne, Nerijus Armakavicius, Shiqi Guo, Axel R. Persson, Vallery Stanishev, Viktor Rindert, Per O. Å. Persson, Plamen P. Paskov, Mathias Schubert, Vanya Darakchieva

Department of Electrical and Computer Engineering: Faculty Publications

AlxGa1-xN/GaN high-electron-mobility transistor (HEMT) structures are key components in electronic devices operating at gigahertz or higher frequencies. In order to optimize such HEMT structures, understanding their electronic response at high frequencies and room temperature is required. Here, we present a study of the room temperature free charge carrier properties of the two-dimensional electron gas (2DEG) in HEMT structures with varying Al content in the AlxGa1-xN barrier layers between x = 0:07 and x = 0:42. We discuss and compare 2DEG sheet density, mobility, effective mass, sheet resistance, and scattering times, …


Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua Nov 2023

Six-Degree-Of-Freedom Optimal Feedback Control Of Pinpoint Landing Using Deep Neural Networks, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua

Student Works

Machine learning regression techniques have shown success at feedback control to perform near-optimal pinpoint landings for low fidelity formulations (e.g. 3 degree-of-freedom). Trajectories from these low-fidelity landing formulations have been used in imitation learning techniques to train deep neural network policies to replicate these optimal landings in closed loop. This study details the development of a near-optimal, neural network feedback controller for a 6 degree-of-freedom pinpoint landing system. To model disturbances, the problem is cast as either a multi-phase optimal control problem or a triple single-phase optimal control problem to generate examples of optimal control through the presence of disturbances. …


Study On Debinding And Sintering Conditions In Extrusion-Based Additive Manufacturing Of 316l And 316l + Cu, Jean-François Silvain, Daniel Lincoln Gifford, Sébastien Fourcade, Laurent Cuzacq, Jean-Luc Grosseau-Poussard, Catherine Debiemme-Chouvy, Nicolas Tessier Doyen, Yongfeng Lu Nov 2023

Study On Debinding And Sintering Conditions In Extrusion-Based Additive Manufacturing Of 316l And 316l + Cu, Jean-François Silvain, Daniel Lincoln Gifford, Sébastien Fourcade, Laurent Cuzacq, Jean-Luc Grosseau-Poussard, Catherine Debiemme-Chouvy, Nicolas Tessier Doyen, Yongfeng Lu

Department of Electrical and Computer Engineering: Faculty Publications

This study investigates the use of a methylcellulose binder in extrusion additive manufacturing of 316L as an alternative to common wax-based binders. Various quantities of copper (Cu) powder were also added in the paste composition to attempt to reduce the sintering temperature by promoting persistent liquid phase sintering. Debinding experiments were conducted under different temperatures and dwell times using argon (Ar), Ar/5%H2, and Ar/1%O2 atmospheres. Debinding reduced carbon (C) content to 0.032 wt.% by using a two-step debinding process of Ar/5%H2 and Ar/1%O2 thermal treatments. Using this debinding process, sintering was conducted at 1200 o …


An Ontology Design Pattern For Representing Causality, Utkarshani Jaimini, Cory Henson, Amit Sheth Nov 2023

An Ontology Design Pattern For Representing Causality, Utkarshani Jaimini, Cory Henson, Amit Sheth

Publications

The causal pattern is a proposed ontology design pattern for representing the structure of causal relations in a knowledge graph. This pattern is grounded in the concepts defined and used by the CausalAI community i.e., Causal Bayesian Networks and do-calculus. Specifically, the pattern models three primary concepts: (1) causal relations, (2) causal event roles, and (3) causal effect weights. Two use cases involving a sprinkler system and asthma patients are provided along with their relevant competency questions.


Continuous Time Recurrent Network For Human Activity Detection, Abdallah Al Zubi Nov 2023

Continuous Time Recurrent Network For Human Activity Detection, Abdallah Al Zubi

Durham School of Architectural Engineering and Construction: Dissertations, Thesis, and Student Research

Human activity detection is crucial to personalize the control of the building environment. For example, understanding certain human activities (e.g., walking, sitting, etc.) for an occupant in a building helps provide the proper thermal comfort control. However, these applications require large-scale neural networks that are challenging to implement and train.

In this thesis, we implemented a continuous-time recurrent neural network implementation (CTRNN) network that can solve real-time human activity detection with a smaller-size network. The CTRNN uses differential equations with a time constant to describe the neuron equations. It was implemented and trained for the first time using TensorFlow. Specifically, …


Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks Nov 2023

Examining The Externalities Of Highway Capacity Expansions In California: An Analysis Of Land Use And Land Cover (Lulc) Using Remote Sensing Technology, Serena E. Alexander, Bo Yang, Owen Hussey, Derek Hicks

Mineta Transportation Institute Publications

There are over 590,000 bridges dispersed across the roadway network that stretches across the United States alone. Each bridge with a length of 20 feet or greater must be inspected at least once every 24 months, according to the Federal Highway Act (FHWA) of 1968. This research developed an artificial intelligence (AI)-based framework for bridge and road inspection using drones with multiple sensors collecting capabilities. It is not sufficient to conduct inspections of bridges and roads using cameras alone, so the research team utilized an infrared (IR) camera along with a high-resolution optical camera. In many instances, the IR camera …


Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu Nov 2023

Data Provenance Via Differential Auditing, Xin Mu, Ming Pang, Feida Zhu

Research Collection School Of Computing and Information Systems

With the rising awareness of data assets, data governance, which is to understand where data comes from, how it is collected, and how it is used, has been assuming evergrowing importance. One critical component of data governance gaining increasing attention is auditing machine learning models to determine if specific data has been used for training. Existing auditing techniques, like shadow auditing methods, have shown feasibility under specific conditions such as having access to label information and knowledge of training protocols. However, these conditions are often not met in most real-world applications. In this paper, we introduce a practical framework for …


Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden Oct 2023

Executive Order On The Safe, Secure, And Trustworthy Development And Use Of Artificial Intelligence, Joseph R. Biden

Copyright, Fair Use, Scholarly Communication, etc.

Section 1. Purpose. Artificial intelligence (AI) holds extraordinary potential for both promise and peril. Responsible AI use has the potential to help solve urgent challenges while making our world more prosperous, productive, innovative, and secure. At the same time, irresponsible use could exacerbate societal harms such as fraud, discrimination, bias, and disinformation; displace and disempower workers; stifle competition; and pose risks to national security. Harnessing AI for good and realizing its myriad benefits requires mitigating its substantial risks. This endeavor demands a society-wide effort that includes government, the private sector, academia, and civil society.

My Administration places the highest urgency …


A Dynamic Online Dashboard For Tracking The Performance Of Division 1 Basketball Athletic Performance, Erica Juliano, Chelsea Thakkar, Christopher B. Taber, Mehul S. Raval, Kaya Tolga, Samah Senbel Oct 2023

A Dynamic Online Dashboard For Tracking The Performance Of Division 1 Basketball Athletic Performance, Erica Juliano, Chelsea Thakkar, Christopher B. Taber, Mehul S. Raval, Kaya Tolga, Samah Senbel

School of Computer Science & Engineering Undergraduate Publications

Using Data Analytics is a vital part of sport performance enhancement. We collect data from the Division 1 'Women's basketball athletes and coaches at our university, for use in analysis and prediction. Several data sources are used daily and weekly: WHOOP straps, weekly surveys, polar straps, jump analysis, and training session information. In this paper, we present an online dashboard to visually present the data to the athletes and coaches. R shiny was used to develop the platform, with the data stored on the cloud for instant updates of the dashboard as the data becomes available. The performance of athletes …


Feasibility And Outcomes Of Supplemental Gait Training By Robotic And Conventional Means In Acute Stroke Rehabilitation, Mukul Talaty, Alberto Esquenazi Oct 2023

Feasibility And Outcomes Of Supplemental Gait Training By Robotic And Conventional Means In Acute Stroke Rehabilitation, Mukul Talaty, Alberto Esquenazi

Moss-Magee Rehabilitation Papers

INTRODUCTION: Practicality of implementation and dosing of supplemental gait training in an acute stroke inpatient rehabilitation setting are not well studied but can have positive impact on outcomes.

OBJECTIVES: To determine the feasibility of early, intense supplemental gait training in inpatient stroke rehabilitation, compare functional outcomes and the specific mode of delivery.

DESIGN AND SETTING: Assessor blinded, randomized controlled trial in a tertiary Inpatient Rehabilitation Facility.

PARTICIPANTS: Thirty acute post-stroke patients with unilateral hemiparesis (≥ 18 years of age with a lower limb MAS ≤ 3).

INTERVENTION: Lokomat® or conventional gait training (CGT) in addition to standard mandated therapy time. …


Nitrogen Radiofrequency Plasma Treatment Of Graphene, Antoine Bident, Nathalie Caillault, Florence Delange, Christine Labrugere, Guillaume Aubert, Cyril Aymonier, Etienne Durand, Alain Demourgues, Yongfeng Lu, Jean-François Silvain Oct 2023

Nitrogen Radiofrequency Plasma Treatment Of Graphene, Antoine Bident, Nathalie Caillault, Florence Delange, Christine Labrugere, Guillaume Aubert, Cyril Aymonier, Etienne Durand, Alain Demourgues, Yongfeng Lu, Jean-François Silvain

Department of Electrical and Computer Engineering: Faculty Publications

The incorporation of nitrogen (N) atoms into a graphitic network such as graphene (Gr) remains a major challenge. However, even if the insertion mechanisms are not yet fully understood, it is certain that the modification of the electrical properties of Gr is possible according to the configuration adopted. Several simulations work, notably using DFT, have shown that the incorporation of N in Gr can induce an increase in the electrical conductivity and N acts as an electron donor; this increase is linked to the amount of N, the sp2/sp3 carbon configuration, and the nature of C-N bonding. …


Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua Oct 2023

Stability Of Deep Neural Networks For Feedback-Optimal Pinpoint Landings, Omkar S. Mulekar, Hancheol Cho, Riccardo Bevilacqua

Student Works

The ability to certify systems driven by neural networks is crucial for future rollouts of machine learning technologies in aerospace applications. In this study, the neural networks are used to represent a fuel-optimal feedback controller for two different 3-degree-of-freedom pinpoint landing problems. It is shown that the standard sum-ofsquares Lyapunov candidate is too restrictive to assess the stability of systems with fuel-optimal control profiles. Instead, a parametric Lyapunov candidate (i.e. a neural network) can be trained to sufficiently evaluate the closed-loop stability of fuel-optimal control profiles. Then, a stability-constrained imitation learning method is applied, which simultaneously trains a neural network …


Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala Oct 2023

Building A Benchmark For Industrial Iot Application, Pranay K. Tiru, Soma Tummala

College of Engineering Summer Undergraduate Research Program

In this project, we have developed a rather robust means of processing and displaying large sums of IoT data using several cutting-edge, industry-standard technologies. Our data pipeline integrates physical sensors that send various environmental data like temperature, humidity, and pressure. Once created, the data is then collected at an MQTT broker, streamed through a Kafka cluster, processed within a Spark Cluster, and stored in a Cassandra database.

In order to test the rigidity of the pipeline, we also created virtual sensors. This allowed us to send an immense amount of data, which wasn’t necessarily feasible with just the physical sensors. …


Exploring Cognition And Affect During Human-Cobot Interaction, Angelika T. Canete, Javier Gonzalez-Sanchez, Rafael Guerra Silva Oct 2023

Exploring Cognition And Affect During Human-Cobot Interaction, Angelika T. Canete, Javier Gonzalez-Sanchez, Rafael Guerra Silva

College of Engineering Summer Undergraduate Research Program

Collaborative robots (Cobots) have recently gained popularity due to their capability to work collaboratively with human operators. This collaborative relationship has been named under the robotics discipline of Human-Robot Collaboration (HRC), in which humans and robots work together to accomplish a common task while also being in the same physical space. An important part of collaboration is the human's decision-making, which is largely affected by their affective and cognitive state. A cobot lacks this fundamental understanding of the human operator. In this research, we utilize a server-client program to communicate the affective states of a human user to a Raspberry …


Drones For Marine Science And Agriculture, David Caldera, Sai Murthy Oct 2023

Drones For Marine Science And Agriculture, David Caldera, Sai Murthy

College of Engineering Summer Undergraduate Research Program

Our research project was launched at Cal Poly in 2019 with the goal of assisting researchers at the CSULB Shark Lab in detecting sharks from aerial images. Under the guidance of Dr. Franz J. Kurfess, students trained an object detection algorithm using shark images and were able to achieve high rate of detection. Following this success, the team has constructed multiple drones and expanded their research to include applications in the fields of agriculture and ecology. This summer the goal is to use a iPhone 14 Pro in lieu of a traditional camera system for real-time object recognition. Object detection …


Columnas: The Honors Program Newsletter At Bentley University, Hailey Jennato, Samson Shen, Clara Williams Oct 2023

Columnas: The Honors Program Newsletter At Bentley University, Hailey Jennato, Samson Shen, Clara Williams

Honors Program

Page 1: HOW AI IS IMPACTING THE BENTLEY CLASSROOM AND EDUCATION OVERALL ~ by Nayeli Franco ’24

Page 2: A BEAUTY OF DIVERSITY ~ by Yun Song ’26

Page 3: RESURRECTING THE DEAD THROUGH COMPUTER TECHNOLOGY: HONORING THEIR MEMORY OR EXPLOITING THEIR LEGACY? ~ by Hailey Jennato ’24

Page 4: THE IMPORTANCE OF DEVELOPING EMOTIONAL INTELLIGENCE ~ by Isa Ramirez Perdomo ’26

Page 5: FROM STRUGGLE TO STRENGTH: THRIVING AS AN INTERNATIONAL STUDENT ~ by Ledion Hoti ’25

Page 6: CHASING BUTTERFLIES ~ by Alyssa Galin ’27


2023 (Fall) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department Oct 2023

2023 (Fall) Ensi Informer Magazine, Morehead State University. Engineering Sciences Department

ENSI Informer Magazine Archive

The ENSI Informer Magazine published in the fall of 2023.


Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei Oct 2023

Objectfusion: Multi-Modal 3d Object Detection With Object-Centric Fusion, Q. Cai, Y. Pan, T. Yao, Chong-Wah Ngo, T. Mei

Research Collection School Of Computing and Information Systems

Recent progress on multi-modal 3D object detection has featured BEV (Bird-Eye-View) based fusion, which effectively unifies both LiDAR point clouds and camera images in a shared BEV space. Nevertheless, it is not trivial to perform camera-to-BEV transformation due to the inherently ambiguous depth estimation of each pixel, resulting in spatial misalignment between these two multi-modal features. Moreover, such transformation also inevitably leads to projection distortion of camera image features in BEV space. In this paper, we propose a novel Object-centric Fusion (ObjectFusion) paradigm, which completely gets rid of camera-to-BEV transformation during fusion to align object-centric features across different modalities for …


Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng Oct 2023

Owner-Free Distributed Symmetric Searchable Encryption Supporting Conjunctive Queries, Qiuyun Tong, Xinghua Li, Yinbin Miao, Yunwei Wang, Ximeng Liu, Robert H. Deng

Research Collection School Of Computing and Information Systems

Symmetric Searchable Encryption (SSE), as an ideal primitive, can ensure data privacy while supporting retrieval over encrypted data. However, existing multi-user SSE schemes require the data owner to share the secret key with all query users or always be online to generate search tokens. While there are some solutions to this problem, they have at least one weakness, such as non-supporting conjunctive query, result decryption assistance of the data owner, and unauthorized access. To solve the above issues, we propose an Owner-free Distributed Symmetric searchable encryption supporting Conjunctive query (ODiSC). Specifically, we first evaluate the Learning-Parity-with-Noise weak Pseudorandom Function (LPN-wPRF) …


Prirpt: Practical Blockchain-Based Privacy-Preserving Reporting System With Rewards, Rui. Shi, Yang Yang, Huamin. Feng, Feng. Yuan, Huiqin. Xie, Jianyi. Zhang Oct 2023

Prirpt: Practical Blockchain-Based Privacy-Preserving Reporting System With Rewards, Rui. Shi, Yang Yang, Huamin. Feng, Feng. Yuan, Huiqin. Xie, Jianyi. Zhang

Research Collection School Of Computing and Information Systems

In order to obtain evidence of a crime timely, most authorities encourage whistleblowers to provide valuable reports by rewarding them with prizes. However, criminals will try their best to delete or tamper with the reports and even threaten and revenge the whistleblowers to escape punishment. Hence, to make the reporting system work, it is essential to ensure the integrity of reported messages and the anonymity of the reporting and rewarding procedures in the reporting system. Most existing schemes for this problem are generally based on ring signatures, which incur high computational overhead and imperfect anonymity. In this paper, we introduce …


Detection Of Cancer-Associated Gene Mutations In Urinary Cell-Free Dna Among Prostate Cancer Patients In South Africa, Dada Oluwaseyi Temilola, Martha Wium, Juliano Paccez, Azola Samkele Salukazana, Solomon O. Rotimi, Hasan H. Otu, Giuseppina M. Carbone, Lisa Kaestner, Stefano Cacciatore, Luiz Fernando Zerbini Sep 2023

Detection Of Cancer-Associated Gene Mutations In Urinary Cell-Free Dna Among Prostate Cancer Patients In South Africa, Dada Oluwaseyi Temilola, Martha Wium, Juliano Paccez, Azola Samkele Salukazana, Solomon O. Rotimi, Hasan H. Otu, Giuseppina M. Carbone, Lisa Kaestner, Stefano Cacciatore, Luiz Fernando Zerbini

Department of Electrical and Computer Engineering: Faculty Publications

Prostate cancer (PCa) is the most common cause of cancer death among African men. The presence of tumor-specific variations in cell-free DNA (cfDNA), such as mutations, microsatellite instability, and DNA methylation, has been explored as a source of biomarkers for cancer diagnosis. In this study, we investigated the diagnostic role of cfDNA among South African PCa patients. We performed whole exome sequencing (WES) of urinary cfDNA. We identified a novel panel of 31 significantly deregulated somatic mutated genes between PCa and benign prostatic hyperplasia (BPH). Additionally, we performed whole-genome sequencing (WGS) on matching PCa and normal prostate tissue in an …


Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever Sep 2023

Analysing Child Sexual Abuse Activities In The Dark Web Based On An Efficient Csam Detection Algorithm, Vuong Ngo, Christina Thorpe, Susan Mckeever

Articles

Abstract: Child sexual abuse material (CSAM) activities are prevalent on the Dark Web to evade detection, posing a global challenge for law enforcement. Our objective is to analyze CSAM discussions in this concealed space using a Support Vector Machine model, achieving an accuracy of 87.6%. Across eight forums, approximately 28.4% of posts contained CSAM, with victim ages most commonly reported as 12, 14, 13, and 11 years old for YouTube, Skype, Instagram, and Facebook, respectively. Additionally, in forums discussing boys, the most frequently mentioned nationalities in CSAM posts were English, German, and American, accounting for 12%, 7.8%, and 6% of …


Ai Is Here. Here’S How New Mexicans Can Prepare, Sonia Gipson Rankin, Melanie E. Moses Sep 2023

Ai Is Here. Here’S How New Mexicans Can Prepare, Sonia Gipson Rankin, Melanie E. Moses

Faculty Scholarship

Last December we asked the AI chatbot ChatGPT to solve a programming assignment given to computer science students at UNM. It wrote some Python code, but it generated an error. We gave the chatbot the error message and were astounded by how good its response was.


Laser-Direct-Drive Fusion Target Design With A High-Z Gradient-Density Pusher Shell, S. S. Hu, L. Ceurvorst, J. L. Peebles, A. Mao, P. Li, Yongfeng Lu, A. Shvydky, V. N. Goncharov, R. Epstein, K. A. Nichols, R. M. N. Goshadze, M. Ghosh, J. Hinz, V. V. Karasiev, S. Zhang, N. R. Shaffer, D. I. Mihaylov, J. Cappelletti, D. R. Harding, C. K. Li, E. M. Campbell, R. C. Shah, T. J. B. Collins, S. P. Regan, C. Deeney Sep 2023

Laser-Direct-Drive Fusion Target Design With A High-Z Gradient-Density Pusher Shell, S. S. Hu, L. Ceurvorst, J. L. Peebles, A. Mao, P. Li, Yongfeng Lu, A. Shvydky, V. N. Goncharov, R. Epstein, K. A. Nichols, R. M. N. Goshadze, M. Ghosh, J. Hinz, V. V. Karasiev, S. Zhang, N. R. Shaffer, D. I. Mihaylov, J. Cappelletti, D. R. Harding, C. K. Li, E. M. Campbell, R. C. Shah, T. J. B. Collins, S. P. Regan, C. Deeney

Department of Electrical and Computer Engineering: Faculty Publications

Laser-direct-drive fusion target designs with solid deuterium-tritium (DT) fuel, a high-Z gradient-density pusher shell (GDPS), and a Au-coated foam layer have been investigated through both 1D and 2D radiationhydrodynamic simulations. Compared with conventional low-Z ablators and DT-push-on-DT targets, these GDPS targets possess certain advantages of being instability-resistant implosions that can be high adiabat (α ≽ 8) and low hot-spot and pusher-shell convergence (CRhs ≈22 and CRPS ≈17), and have a low implosion velocity (vimp < 3 × 107 cm/s). Using symmetric drive with laser energies of 1.9 to 2.5 MJ, 1D LILAC simulations of these GDPS implosions can result …


Aptamer-Based Proteomics Measuring Preoperative Cerebrospinal Fluid Protein Alterations Associated With Postoperative Delirium, Simon T. Dillon, Sarinnapha M. Vasunilashorn, Hasan H. Otu, Long Ngo, Tamara Fong, Xuesong Gu, Michele Cavallari, Alexandra Touroutoglou, Mouhsin Shafi, Sharon K. Inouye, Zhongcong Xie, Edward R. Marcantonio, Towia A. Libermann Sep 2023

Aptamer-Based Proteomics Measuring Preoperative Cerebrospinal Fluid Protein Alterations Associated With Postoperative Delirium, Simon T. Dillon, Sarinnapha M. Vasunilashorn, Hasan H. Otu, Long Ngo, Tamara Fong, Xuesong Gu, Michele Cavallari, Alexandra Touroutoglou, Mouhsin Shafi, Sharon K. Inouye, Zhongcong Xie, Edward R. Marcantonio, Towia A. Libermann

Department of Electrical and Computer Engineering: Faculty Publications

Delirium is a common postoperative complication among older patients with many adverse outcomes. Due to a lack of validated biomarkers, prediction and monitoring of delirium by biological testing is not currently feasible. Circulating proteins in cerebrospinal fluid (CSF) may reflect biological processes causing delirium. Our goal was to discover and investigate candidate protein biomarkers in preoperative CSF that were associated with the development of postoperative delirium in older surgical patients. We employed a nested case–control study design coupled with high multiplex affinity proteomics analysis to measure 1305 proteins in preoperative CSF. Twenty-four matched delirium cases and non-delirium controls were selected …


Integrating Glycolysis, Citric Acid Cycle, Pentose Phosphate Pathway, And Fatty Acid Beta‑Oxidation Into A Single Computational Model, Sylwester M. Kloska, Krzysztof Pałczyński, Tomasz Marciniak, Tomasz Talaśka, Beata J. Wysocki, Paul H. Davis, Tadeusz A. Wysocki Sep 2023

Integrating Glycolysis, Citric Acid Cycle, Pentose Phosphate Pathway, And Fatty Acid Beta‑Oxidation Into A Single Computational Model, Sylwester M. Kloska, Krzysztof Pałczyński, Tomasz Marciniak, Tomasz Talaśka, Beata J. Wysocki, Paul H. Davis, Tadeusz A. Wysocki

Department of Electrical and Computer Engineering: Faculty Publications

The metabolic network of a living cell is highly intricate and involves complex interactions between various pathways. In this study, we propose a computational model that integrates glycolysis, the pentose phosphate pathway (PPP), the fatty acids beta-oxidation, and the tricarboxylic acid cycle (TCA cycle) using queueing theory. The model utilizes literature data on metabolite concentrations and enzyme kinetic constants to calculate the probabilities of individual reactions occurring on a microscopic scale, which can be viewed as the reaction rates on a macroscopic scale. However, it should be noted that the model has some limitations, including not accounting for all the …


Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali Sep 2023

Use Of Mobile Technology To Identify Behavioral Mechanisms Linked To Mental Health Outcomes In Kenya: Protocol For Development And Validation Of A Predictive Model, Willie Njoroge, Rachel Maina, Frank Elena, Lukoye Atwoli, Anthony Ngugi, Srijan Sen, Stephen Wong, Linda Khakali, Andrew Aballa, James Orwa, Moses Nyongesa, Jasmit Shah, Amina Abubakar, Zul Merali

Brain and Mind Institute

Objective:This study proposes to identify and validate weighted sensor stream signatures that predict near-term risk of a major depressive episode and future mood among healthcare workers in Kenya.

Approach: The study will deploy a mobile application (app) platform and use novel data science analytic approaches (Artificial Intelligence and Machine Learning) to identifying predictors of mental health disorders among 500 randomly sampled healthcare workers from five healthcare facilities in Nairobi, Kenya.

Expectation: This study will lay the basis for creating agile and scalable systems for rapid diagnostics that could inform precise interventions for mitigating depression and ensure a healthy, resilient …