Matching Items (7)

134262-Thumbnail Image.png

We Are Nature

Description

Humans are undeniably a part of nature. Without Earth's and her resources, we cease to exist. However, in recent years society has lacked the foresight or possibly care to understand

Humans are undeniably a part of nature. Without Earth's and her resources, we cease to exist. However, in recent years society has lacked the foresight or possibly care to understand the impact of our actions both on the planet and ourselves. Resources that industrialized societies are based on are dwindling in reserves and the impact of our actions in getting such resources has been largely harmful. In order to change cycles of overexertion both in our selves and the planet, we must change the ways we think. I propose that humans, very much like the Earth, have limited resources and need to be more mindful in our choices. Wellness and sustainability are two branches of sustaining a larger system and our collective future. On an individual scale, wellness is sustaining our individual resources (i.e. time, energy, thoughts), and can be aided through simple practices to encourage healthy patterns and processes. Sustainability in terms of the planet is sustaining our common resources. This requires a change in our individual selves as well as cooperation to change the larger systems that we are parts of. I separated wellness into three components, core values, positivity, and time management. Sustainability is separated into lifestyle, systems thinking, and learning from life. For each of the six components, I briefly describe their importance and benefits.

Contributors

Agent

Created

Date Created
  • 2017-05

135843-Thumbnail Image.png

Copper, Cowboys, and Converts: Resurrecting Arizona "Ghost" Towns

Description

In Arizona, people flock the streets of Tombstone in droves, chatting in period costume while gunshots ring down the street. Others in Bisbee walk in the Queen Mine, listening to

In Arizona, people flock the streets of Tombstone in droves, chatting in period costume while gunshots ring down the street. Others in Bisbee walk in the Queen Mine, listening to the tour guide discuss how the miners extracted ore. Still others drive up the precarious road to Jerome, passing through the famed Grand Hotel. As former Arizona mining towns, Tombstone, Jerome and Bisbee have a shared identity as former mining boomtowns, all of which experienced subsequent economic and population decline. Left with the need to reinvent themselves in order to survive, the past takes on a different role in each city. In Jerome, visitors seem content to "kill a day" against the backdrop of the historic town. In Bisbee, time seems stuck in the 1970s, the focus having shifted from the mining to the "hippies" who are considered to have resuscitated the town from near-extinction. Tombstone seem to inspire devotion, rooted in the influence of the 1993 film titled after the town. By memorializing portions of their past, these three towns have carved out new lives for themselves in the twenty-first century. As visitors are informed by the narrative of the "Old West," as shaped by the Western movie and television genre, they in turn impact how the towns present themselves in order to attract tourists. In all these sites, the past is present and like a kaleidoscope, continually recreated into new formations. While the designation of Jerome, Bisbee and Tombstone as "ghost towns" is disputed by individuals in each site, these stories of visitors and residents reveal the intricate ways in which these towns have acquired new life.

Contributors

Created

Date Created
  • 2016-05

135239-Thumbnail Image.png

Nitrate and Selenate Microbial Reduction in the Membrane Biofilm Reactor for Artificial Mining Wastewater

Description

Nitrate (NO3- ) and selenate (SeO42-) are common contaminants found in mining wastewater. Biological treatment has proved successful using bacteria capable of respiring NO3- into nitrogen gas and SeO42- into

Nitrate (NO3- ) and selenate (SeO42-) are common contaminants found in mining wastewater. Biological treatment has proved successful using bacteria capable of respiring NO3- into nitrogen gas and SeO42- into Se°. The Membrane Biofilm Reactor (MBfR) utilizes biofilm communities on the surface of hollow-fiber membranes to transform oxidized water contaminants into innocuous reduced products. For this project, I set up two MBfRs in a lead and lag configuration to reduce NO3- [input at ~40-45 mg NO3-N/L] and SeO42- [0.62 mg/L], while avoiding sulfate (SO42-) [~1600-1660 mg/L] reduction. Over the course of three experimental phases, I controlled two operating conditions: the applied hydrogen pressure and the total electron acceptor loading. NO3- in the lead MBfR showed average reductions of 50%, 94%, and 91% for phases I, II, and III, respectively. In the lag MBfR, NO3- was reduced by 40%, 96%, and 100% for phases I, II, and III. NO2- was formed in Stage I when NO3- was not reduced completely; nevertheless NO2- accumulation was absent for the remainder of operation. In the lead MBfR, SeO42- was reduced by 65%, 87%, and 50% for phases I, II, and III. In the lag MBfR, SeO42- was reduced 60%, 27%, and 23% for phases I, II, and III. SO42- was not reduced in either MBfR. Biofilm communities were composed of denitrifying bacteria Rhodocyclales and Burkholderiales, Dechloromonas along with the well-known SeO42--reducing Thauera were abundant genera in the biofilm communities. Although SO42- reduction was suppressed, sulfate-reducing bacteria were present in the biofilm. To optimize competition for electron donor and space in the biofilm, optimal operational conditions were hydrogen pressures of 26 and 7 psig and total electron acceptor loading of 3.8 and 3.4 g H2/m2 day for the lead and lag MBfR, respectively.

Contributors

Created

Date Created
  • 2016-05

147891-Thumbnail Image.png

Cryptojacking Detection: A Classification and Comparison of Malicious Cryptocurrency Mining Detection Systems

Description

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.

Contributors

Agent

Created

Date Created
  • 2021-05

135558-Thumbnail Image.png

Value of Twitter: Using Text Mining Methods to Gain Insight into the 2016 Presidential Race

Description

This project analyzes the tweets from the 2016 US Presidential Candidates' personal Twitter accounts. The goal is to define distinct patterns and differences between candidates and parties use of social

This project analyzes the tweets from the 2016 US Presidential Candidates' personal Twitter accounts. The goal is to define distinct patterns and differences between candidates and parties use of social media as a platform. The data spans the period of September 2015 to March 2016, which was during the primary races for the Republicans and Democrats. The overall purpose of this project is to contribute to finding new ways of driving value from social media, in particular Twitter.

Contributors

Created

Date Created
  • 2016-05

155162-Thumbnail Image.png

Analysis of heat dissipation in AlGaN/GaN HEMT with GaN micropits at GaN-SiC interface

Description

Gallium Nitride (GaN) based microelectronics technology is a fast growing and most exciting semiconductor technology in the fields of high power and high frequency electronics. Excellent electrical properties of GaN

Gallium Nitride (GaN) based microelectronics technology is a fast growing and most exciting semiconductor technology in the fields of high power and high frequency electronics. Excellent electrical properties of GaN such as high carrier concentration and high carrier motility makes GaN based high electron mobility transistors (HEMTs) a preferred choice for RF applications. However, a very high temperature in the active region of the GaN HEMT leads to a significant degradation of the device performance by effecting carrier mobility and concentration. Thus, thermal management in GaN HEMT in an effective manner is key to this technology to reach its full potential.

In this thesis, an electro-thermal model of an AlGaN/GaN HEMT on a SiC substrate is simulated using Silvaco (Atlas) TCAD tools. Output characteristics, current density and heat flow at the GaN-SiC interface are key areas of analysis in this work. The electrical characteristics show a sharp drop in drain currents for higher drain voltages. Temperature profile across the device is observed. At the interface of GaN-SiC, there is a sharp drop in temperature indicating a thermal resistance at this interface. Adding to the existing heat in the device, this difference heat is reflected back into the device, further increasing the temperatures in the active region. Structural changes such as GaN micropits, were introduced at the GaN-SiC interface along the length of the device, to make the heat flow smooth rather than discontinuous. With changing dimensions of these micropits, various combinations were tried to reduce the temperature and enhance the device performance. These GaN micropits gave effective results by reducing heat in active region, by spreading out the heat on to the sides of the device rather than just concentrating right below the hot spot. It also helped by allowing a smooth flow of heat at the GaN-SiC interface. There was an increased peak current density in the active region of the device contributing to improved electrical characteristics. In the end, importance of thermal management in these high temperature devices is discussed along with future prospects and a conclusion of this thesis.

Contributors

Agent

Created

Date Created
  • 2016

153583-Thumbnail Image.png

Understanding legacy workflows through runtime trace analysis

Description

When scientific software is written to specify processes, it takes the form of a workflow, and is often written in an ad-hoc manner in a dynamic programming language. There is

When scientific software is written to specify processes, it takes the form of a workflow, and is often written in an ad-hoc manner in a dynamic programming language. There is a proliferation of legacy workflows implemented by non-expert programmers due to the accessibility of dynamic languages. Unfortunately, ad-hoc workflows lack a structured description as provided by specialized management systems, making ad-hoc workflow maintenance and reuse difficult, and motivating the need for analysis methods. The analysis of ad-hoc workflows using compiler techniques does not address dynamic languages - a program has so few constrains that its behavior cannot be predicted. In contrast, workflow provenance tracking has had success using run-time techniques to record data. The aim of this work is to develop a new analysis method for extracting workflow structure at run-time, thus avoiding issues with dynamics.

The method captures the dataflow of an ad-hoc workflow through its execution and abstracts it with a process for simplifying repetition. An instrumentation system first processes the workflow to produce an instrumented version, capable of logging events, which is then executed on an input to produce a trace. The trace undergoes dataflow construction to produce a provenance graph. The dataflow is examined for equivalent regions, which are collected into a single unit. The workflow is thus characterized in terms of its treatment of an input. Unlike other methods, a run-time approach characterizes the workflow's actual behavior; including elements which static analysis cannot predict (for example, code dynamically evaluated based on input parameters). This also enables the characterization of dataflow through external tools.

The contributions of this work are: a run-time method for recording a provenance graph from an ad-hoc Python workflow, and a method to analyze the structure of a workflow from provenance. Methods are implemented in Python and are demonstrated on real world Python workflows. These contributions enable users to derive graph structure from workflows. Empowered by a graphical view, users can better understand a legacy workflow. This makes the wealth of legacy ad-hoc workflows accessible, enabling workflow reuse instead of investing time and resources into creating a workflow.

Contributors

Agent

Created

Date Created
  • 2015