Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (4)
- Computer Sciences (3)
- Mechanical Engineering (2)
- Artificial Intelligence and Robotics (1)
- Biomedical Engineering and Bioengineering (1)
-
- Business (1)
- Chemistry (1)
- Civil and Environmental Engineering (1)
- Computer Engineering (1)
- Digital Communications and Networking (1)
- Earth Sciences (1)
- Ecology and Evolutionary Biology (1)
- Electrical and Computer Engineering (1)
- Environmental Chemistry (1)
- Environmental Sciences (1)
- Heat Transfer, Combustion (1)
- Hydrology (1)
- Life Sciences (1)
- OS and Networks (1)
- Ocean Engineering (1)
- Organic Chemistry (1)
- Other Ecology and Evolutionary Biology (1)
- Physics (1)
- Power and Energy (1)
- Structural Engineering (1)
- Technology and Innovation (1)
- Water Resource Management (1)
Articles 1 - 6 of 6
Full-Text Articles in Physical Sciences and Mathematics
Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali
Elevation-Distributed Multistage Reverse Osmosis Desalination With Seawater Pumped Storage, Hani E. Elsayed-Ali
Electrical & Computer Engineering Faculty Publications
A seawater reverse osmosis (RO) plant layout based on multistage RO with stages located at different elevations above sea level is described. The plant uses the weight of a seawater column from pumped storage as head pressure for RO (gravity-driven multistage RO) or to supplement high-pressure pumps used in RO (gravity-assisted multistage RO). The use of gravitational force reduces the specific energy for RO compared to using high-pressure pumps. By locating the RO stages at different elevations based on demand sites, the total specific energy consumption for RO and permeate transport to different elevations above sea level is reduced from …
Thermotrophy Exploratory Study, James Weifu Lee
Thermotrophy Exploratory Study, James Weifu Lee
Chemistry & Biochemistry Faculty Publications
The question of whether environmental heat energy could be utilized as a source of energy for biological metabolism is the center of this exploratory research. In 1979, this author postulated a hypothesis for the existence of thermotrophs that could isothermally utilize environmental heat energy as a source of their energy on Earth. According to this hypothesis, the thermotrophs could be the first primitive forms of life in the early Earth environment. The chemotrophs and phototrophs that we currently are all well familiar with might have been evolved somehow from the primitive thermotrophs. Furthermore, all the organisms currently regarded as the …
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Machine-Learning-Based Vulnerability Detection And Classification In Internet Of Things Device Security, Sarah Bin Hulayyil, Shancang Li, Li Da Xu
Information Technology & Decision Sciences Faculty Publications
Detecting cyber security vulnerabilities in the Internet of Things (IoT) devices before they are exploited is increasingly challenging and is one of the key technologies to protect IoT devices from cyber attacks. This work conducts a comprehensive survey to investigate the methods and tools used in vulnerability detection in IoT environments utilizing machine learning techniques on various datasets, i.e., IoT23. During this study, the common potential vulnerabilities of IoT architectures are analyzed on each layer and the machine learning workflow is described for detecting IoT vulnerabilities. A vulnerability detection and mitigation framework was proposed for machine learning-based vulnerability detection in …
Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty
Energy-Efficient Multi-Rate Opportunistic Routing In Wireless Mesh Networks, Mohammad Ali Mansouri Khah, Neda Moghim, Nasrin Gholami, Sachin Shetty
VMASC Publications
Opportunistic or anypath routing protocols are focused on improving the performance of traditional routing in wireless mesh networks. They do so by leveraging the broadcast nature of the wireless medium and the spatial diversity of the network. Using a set of neighboring nodes, instead of a single specific node, as the next hop forwarder is a crucial aspect of opportunistic routing protocols, and the selection of the forwarder set plays a vital role in their performance. However, most opportunistic routing protocols consider a single transmission rate and power for the nodes, which limits their potential. To address this limitation, this …
Solutions For Fermi Questions, April 2021, Larry Weinstein
Solutions For Fermi Questions, April 2021, Larry Weinstein
Physics Faculty Publications
Larry Weinstein estimates: How many trees began to bloom (flower) today in the U.S.? How much energy does a human use in his/her lifetime?
Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti
Optimal Layout Of Multicast Groups Using Network Embedded Multicast Security In Ad Hoc Sensor Networks, Richard R. Brooks, Brijesh Pillai, Michele C. Weigle, Matthew Pirretti
Computer Science Faculty Publications
This paper considers the security of sensor network applications. Our approach creates multicast regions that use symmetric key cryptography for communications. Each multicast region contains a single keyserver that is used to perform key management and maintain the integrity of a multicast region. Communications between two multicast regions is performed by nodes that belong to both regions. To ease the network management burden, it is desirable for the networks to self-organize into regions and dynamically select their keyservers. This paper shows how to determine the number of keyservers (k) to use and the size in the number of hops (h) …