Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Physical Sciences and Mathematics

Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali Jan 2023

Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali

Electrical & Computer Engineering Faculty Publications

A seawater reverse osmosis (RO) plant layout based on multistage RO with stages located at different elevations above sea level is described. The plant uses the weight of a seawater column from pumped storage as head pressure for RO (gravity-driven multistage RO) or to supplement high-pressure pumps used in RO (gravity-assisted multistage RO). The use of gravitational force reduces the specific energy for RO compared to using high-pressure pumps. By locating the RO stages at different elevations based on demand sites, the total specific energy consumption for RO and permeate transport to different elevations above sea level is reduced from …


Thermotrophy Exploratory Study, James Weifu Lee Jan 2023

Thermotrophy Exploratory Study, James Weifu Lee

Chemistry & Biochemistry Faculty Publications

The question of whether environmental heat energy could be utilized as a source of energy for biological metabolism is the center of this exploratory research. In 1979, this author postulated a hypothesis for the existence of thermotrophs that could isothermally utilize environmental heat energy as a source of their energy on Earth. According to this hypothesis, the thermotrophs could be the first primitive forms of life in the early Earth environment. The chemotrophs and phototrophs that we currently are all well familiar with might have been evolved somehow from the primitive thermotrophs. Furthermore, all the organisms currently regarded as the …


Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu Jan 2023

Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu

Information Technology & Decision Sciences Faculty Publications

Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …


Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty Jan 2023

Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty

VMASC Publications

Opportunistic or anypath routing protocols are focused on improving the performance of traditional routing in wireless mesh networks. They do so by leveraging the broadcast nature of the wireless medium and the spatial diversity of the network. Using a set of neighboring nodes, instead of a single specific node, as the next hop forwarder is a crucial aspect of opportunistic routing protocols, and the selection of the forwarder set plays a vital role in their performance. However, most opportunistic routing protocols consider a single transmission rate and power for the nodes, which limits their potential. To address this limitation, this …


Solutions For Fermi Questions, April 2021, Larry Weinstein Jan 2021

Solutions For Fermi Questions, April 2021, Larry Weinstein

Physics Faculty Publications

Larry Weinstein estimates: How many trees began to bloom (flower) today in the U.S.? How much energy does a human use in his/her lifetime?


Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti Jan 2007

Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti

Computer Science Faculty Publications

This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …