Browse Articles

Assessing grass water use efficiency through smartphone imaging and ImageJ analysis

Shen et al. | Jul 27, 2022

Assessing grass water use efficiency through smartphone imaging and ImageJ analysis

Overwatering and underwatering grass are widespread issues with environmental and financial consequences. This study developed an accessible method to assess grass water use efficiency (WUE) combining smartphone imaging with open access color unmixing analysis. The method can be applied in automated irrigation systems or apps, providing grass WUE assessment for regular consumer use.

Read More...

Development and Implementation of Enzymatic and Volatile Compound-based Approaches for Instantaneous Detection of Pathogenic Staphylococcus aureus

Nori et al. | Feb 20, 2021

Development and Implementation of Enzymatic and Volatile Compound-based Approaches for Instantaneous Detection of Pathogenic <i>Staphylococcus aureus</i>

Staphylococcus aureus (S. aureus) has a mortality rate of up to 30% in developing countries. The purpose of this experiment was to determine if enzymatic and volatile compound-based approaches would perform more quickly in comparison to existing S. aureus diagnostic methods and to evaluate these novel methods on accuracy. Ultimately, this device provided results in less than 30 seconds, which is much quicker than existing methods that take anywhere from 10 minutes to 48 hours based on approach. Statistical analysis of accuracy provides preliminary confirmation that the device based on enzymatic and volatile compound-based approaches can be an accurate and time-efficient tool to detect pathogenic S. aureus.

Read More...

Blockchain databases: Encrypted for efficient and secure NoSQL key-store

Mehrota et al. | Mar 18, 2023

Blockchain databases: Encrypted for efficient and secure NoSQL key-store
Image credit: Ayushi Mehrota & David Kim

Although commonly associated with cryptocurrency, blockchains offer security that other databases could benefit from. These student authors tested a blockchain database framework, and by tracking runtime of four independent variables, they prove this framework is feasible for application.

Read More...