Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Engineering (3)
- Computer Sciences (2)
- Civil and Environmental Engineering (1)
- Computer Engineering (1)
- Digital Communications and Networking (1)
-
- Electrical and Computer Engineering (1)
- Environmental Engineering (1)
- Environmental Sciences (1)
- Information Security (1)
- Mathematics (1)
- Mechanical Engineering (1)
- Medical Sciences (1)
- Medical Specialties (1)
- Medicine and Health Sciences (1)
- Oil, Gas, and Energy (1)
- Oncology (1)
- Physics (1)
- Public Affairs, Public Policy and Public Administration (1)
- Social and Behavioral Sciences (1)
- Statistics and Probability (1)
- Transportation (1)
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
A One-Dimensional Analysis Of A Microbial Fuel Cell For Efficient Acetate Removal And Power Density Output, David Rouhani
A One-Dimensional Analysis Of A Microbial Fuel Cell For Efficient Acetate Removal And Power Density Output, David Rouhani
UNLV Theses, Dissertations, Professional Papers, and Capstones
Microbial fuel cells (MFCs) are electrochemical devices that utilize microorganisms to convert organic matter into electrical energy. MFCs have been discussed to have potential application for sustainable wastewater treatment due to their ability to generate electricity while simultaneously treating contaminated water. To optimize MFC performance, numerical models can be used to understand the complex electrochemical and biological processes occurring in the system. In this study, a numerical model was developed to simulate the performance of MFCs under varying operating conditions and to investigate the performance of a MFC for treating wastewater fuel. More specifically, the MFC was modeled to oxidize …
Bidirectional Testing For Repairable Systems Reliability: Power Asymmetries, Panel Of Control Charts, And Reliability Graphics, Sung Keun Koo
Bidirectional Testing For Repairable Systems Reliability: Power Asymmetries, Panel Of Control Charts, And Reliability Graphics, Sung Keun Koo
UNLV Theses, Dissertations, Professional Papers, and Capstones
To a practitioner who chooses to be on the safe side, we offer an option between a cocktail of tests and a solo one-size-fits-all test as a needed antidote to power asymmetries. Two bidirectional tests are first established to empower a basic pair of tests as asymmetrical performances. Unsurprisingly, we’ve seen either bidirectional device championing in one alternative setting, but also being turned against the very setting altered with just one of the composed elements. Progressing by filtering out the bad and enhancing the good, we assemble a hybrid from the empowered pair to restore power symmetries that are thought …
Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder
Gate Monte Carlo Simulations In A Cloud Computing Environment, Blake Austin Rowedder
UNLV Theses, Dissertations, Professional Papers, and Capstones
The GEANT4-based GATE is a unique and powerful Monte Carlo (MC) platform, which provides a single code library allowing the simulation of specific medical physics applications, e.g. PET, SPECT, CT, radiotherapy, and hadron therapy. However, this rigorous yet flexible platform is used only sparingly in the clinic due to its lengthy calculation time. By accessing the powerful computational resources of a cloud computing environment, GATE's runtime can be significantly reduced to clinically feasible levels without the sizable investment of a local high performance cluster. This study investigated a reliable and efficient execution of GATE MC simulations using a commercial cloud …
Simulation And Analysis Of Insider Attacks, Christopher Blake Clark
Simulation And Analysis Of Insider Attacks, Christopher Blake Clark
UNLV Theses, Dissertations, Professional Papers, and Capstones
An insider is an individual (usually an employee, contractor, or business partner) that has been trusted with access to an organization's systems and sensitive data for legitimate purposes. A malicious insider abuses this access in a way that negatively impacts the company, such as exposing, modifying, or defacing software and data.
Many algorithms, strategies, and analyses have been developed with the intent of detecting and/or preventing insider attacks. In an academic setting, these tools and approaches show great promise. To be sure of their effectiveness, however, these analyses need to be tested. While real data is available on insider attacks …
Traffic Modeling In Lagrangian Coordinates Using Smartphone Apps, Sergio Contreras
Traffic Modeling In Lagrangian Coordinates Using Smartphone Apps, Sergio Contreras
UNLV Theses, Dissertations, Professional Papers, and Capstones
Traditionally, one of the ways traffic flow has been studied is by using the kinematic wave model. This model is derived in the Eulerian framework by using conservation of the number of vehicles. Recently, the kinematic wave model has been transformed into Lagrangian coordinates. In this framework, the independent variables are unique
vehicles and time. The detailed change in framework, and the properties of the model in the changed framework are reviewed. Numerical results from different traffic cases are explained. Since vehicle trajectory data can be easily collected from smartphones,
a smartphone application is developed for this purpose. This data …