Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 37 of 37

Full-Text Articles in Physical Sciences and Mathematics

Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li Jan 2023

Mwirgan: Unsupervised Visible-To Mwir Image Translation With Generative Adversarial Network, Mohammad Shahab Uddin, Chiman Kwan, Jiang Li

Electrical & Computer Engineering Faculty Publications

Unsupervised image-to-image translation techniques have been used in many applications, including visible-to-Long-Wave Infrared (visible-to-LWIR) image translation, but very few papers have explored visible-to-Mid-Wave Infrared (visible-to-MWIR) image translation. In this paper, we investigated unsupervised visible-to-MWIR image translation using generative adversarial networks (GANs). We proposed a new model named MWIRGAN for visible-to-MWIR image translation in a fully unsupervised manner. We utilized a perceptual loss to leverage shape identification and location changes of the objects in the translation. The experimental results showed that MWIRGAN was capable of visible-to-MWIR image translation while preserving the object’s shape with proper enhancement in the translated images and …


Electron Beam Treatment For The Removal Of 1,4-Dioxane In Water And Wastewater, Robert Pearce, Xi Li, John Vennekate, Gianluigi Ciovati, Charles Bott Jan 2023

Electron Beam Treatment For The Removal Of 1,4-Dioxane In Water And Wastewater, Robert Pearce, Xi Li, John Vennekate, Gianluigi Ciovati, Charles Bott

Electrical & Computer Engineering Faculty Publications

Electron beam (e-beam) treatment uses accelerated electrons to form oxidizing and reducing radicals when applied to water without the use of external chemicals. In this study, electron beam treatment was used to degrade 1,4-dioxane in several water matrices. Removal improved in the progressively cleaner water matrices and removals as high as 94% to 99% were observed at a dose of 2.3 kGy in secondary effluent. 1,4-dioxane removal was confirmed to be primarily through hydroxyl radical oxidation. The calculated electrical energy per order was found to be 0.53, 0.26, and 0.08 kWh/m3/order for secondary effluent (Avg. total organic carbon …


Long-Range Aceo Phenomena In Microfluidic Channel, Diganta Dutta, Keifer Smith, Xavier Palmer Jan 2023

Long-Range Aceo Phenomena In Microfluidic Channel, Diganta Dutta, Keifer Smith, Xavier Palmer

Electrical & Computer Engineering Faculty Publications

Microfluidic devices are increasingly utilized in numerous industries, including that of medicine, for their abilities to pump and mix fluid at a microscale. Within these devices, microchannels paired with microelectrodes enable the mixing and transportation of ionized fluid. The ionization process charges the microchannel and manipulates the fluid with an electric field. Although complex in operation at the microscale, microchannels within microfluidic devices are easy to produce and economical. This paper uses simulations to convey helpful insights into the analysis of electrokinetic microfluidic device phenomena. The simulations in this paper use the Navier–Stokes and Poisson Nernst–Planck equations solved using COMSOL …


A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat Jan 2023

A Review Of Iot Security And Privacy Using Decentralized Blockchain Techniques, Vinay Gugueoth, Sunitha Safavat, Sachin Shetty, Danda Rawat

Electrical & Computer Engineering Faculty Publications

IoT security is one of the prominent issues that has gained significant attention among the researchers in recent times. The recent advancements in IoT introduces various critical security issues and increases the risk of privacy leakage of IoT data. Implementation of Blockchain can be a potential solution for the security issues in IoT. This review deeply investigates the security threats and issues in IoT which deteriorates the effectiveness of IoT systems. This paper presents a perceptible description of the security threats, Blockchain based solutions, security characteristics and challenges introduced during the integration of Blockchain with IoT. An analysis of different …


Quantum Efficiency And Lifetime Study For Negative Electron Affinity Gaas Nanopillar Array Photocathode, Md Aziz Ar Rahman, Md Abdullah Mamun, Shukui Zhang, Hani E. Elsayed-Ali Jan 2023

Quantum Efficiency And Lifetime Study For Negative Electron Affinity Gaas Nanopillar Array Photocathode, Md Aziz Ar Rahman, Md Abdullah Mamun, Shukui Zhang, Hani E. Elsayed-Ali

Electrical & Computer Engineering Faculty Publications

Recent studies showed significant improvement in quantum efficiency (QE) by negative electron affinity (NEA) GaAs nanopillar array (NPA) photocathodes over their flat surface peers, particularly at 500 ─ 800 nm waveband. However, the underlying physics is yet to be well understood for further improvement in its performance. In this report, NEA GaAs NPA photocathodes with different dimensions were studied. The diameter of the nanopillars varied from 200 ─ 360 nm, the height varied from 230 ─ 1000 nm and the periodicity varied from 470 ─ 630 nm. The QE and photocathode lifetime were measured. Mie-resonance enhancement was observed at tunable …


Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco Jan 2023

Ict Security Tools And Techniques Among Higher Education Institutions: A Critical Review, Miko Nuñez, Xavier-Lewis Palmer, Lucas Potter, Chris Jordan Aliac, Lemuel Clark Velasco

Electrical & Computer Engineering Faculty Publications

Higher education institutions (HEIs) are increasingly relying on digital technologies for classroom and organizational management, but this puts them at higher risk for information and communication (ICT security attacks. Recent studies show that HEIs have experienced more security breaches in ICT security composed of both cybersecurity an information security. A literature review was conducted to identify common ICT security practices in HEIs over the last decade. 11 journal articles were profiled and analyzed, revealing threats to HEIs’ security and protective measures in terms of organizational security, technological security, physical security, and standards and frameworks. Security tools and techniques were grouped …


Commentary On Healthcare And Disruptive Innovation, Hilary Finch, Affia Abasi-Amefon, Woosub Jung, Lucas Potter, Xavier-Lewis Palmer Jan 2023

Commentary On Healthcare And Disruptive Innovation, Hilary Finch, Affia Abasi-Amefon, Woosub Jung, Lucas Potter, Xavier-Lewis Palmer

Electrical & Computer Engineering Faculty Publications

Exploits of technology have been an issue in healthcare for many years. Many hospital systems have a problem with “disruptive innovation” when introducing new technology. Disruptive innovation is “an innovation that creates a new market by applying a different set of values, which ultimately overtakes an existing market” (Sensmeier, 2012). Modern healthcare systems are historically slow to accept new technological advancements. This may be because patient-based, provider-based, or industry-wide decisions are tough to implement, giving way to dire consequences. One potential consequence is that healthcare providers may not be able to provide the best possible care to patients. For example, …