Browse Articles

Survival of Escherichia coli K-12 in various types of drinking water

Hanna et al. | Sep 25, 2022

Survival of <i>Escherichia coli</i> K-12 in various types of drinking water

For public health, drinking water should be free of bacterial contamination. The objective of this research is to identify the fate of bacteria if drinking water becomes contaminated and inform consumers on which water type enables the least bacteria to survive. We hypothesized that bottled mineral water would provide the most sufficient conditions for E. coli to survive. We found that if water becomes contaminated, the conditions offered by the three water types at room temperature allow E. coli to survive up to three days. At 72 hours, the bottled spring water had the highest average colony forming units (CFUs), with tap and mineral water CFU values statistically lower than spring water but not significantly different from each other. The findings of this research highlight the need of implementing accessible quality drinking water for the underserved population and for the regulation of water sources.

Read More...

Are alkaline spices the future of antibiotics?

Jani et al. | Jan 23, 2022

Are alkaline spices the future of antibiotics?

The authors experimented with several commonly available alkaline spices (turmeric, cayenne pepper, and cinnamon) to study their antimicrobial properties, hypothesizing that alkaline spices would have antimicrobial activity. Results showed a zone of inhibition of bacterial growth, with the largest zone of inhibition being around turmeric, followed by cayenne pepper, and the smallest around cinnamon. These results are impactful, as common alkaline spices generally do show antibacterial properties and both bacteriostatic and bactericidal effects correlated with degree of alkalinity.

Read More...

Blockchain databases: Encrypted for efficient and secure NoSQL key-store

Mehrota et al. | Mar 18, 2023

Blockchain databases: Encrypted for efficient and secure NoSQL key-store
Image credit: Ayushi Mehrota & David Kim

Although commonly associated with cryptocurrency, blockchains offer security that other databases could benefit from. These student authors tested a blockchain database framework, and by tracking runtime of four independent variables, they prove this framework is feasible for application.

Read More...

Artificial intelligence assisted violin performance learning

Zhang et al. | Aug 30, 2023

Artificial intelligence assisted violin performance learning
Image credit: Philip Myrtorp

In this study the authors looked at the ability of artificial intelligence to detect tempo, rhythm, and intonation of a piece played on violin. Technology such as this would allow for students to practice and get feedback without the need of a teacher.

Read More...

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

Zhang et al. | Jul 19, 2020

LawCrypt: Secret Sharing for Attorney-Client Data in a Multi-Provider Cloud Architecture

In this study, the authors develop an architecture to implement in a cloud-based database used by law firms to ensure confidentiality, availability, and integrity of attorney documents while maintaining greater efficiency than traditional encryption algorithms. They assessed whether the architecture satisfies necessary criteria and tested the overall file sizes the architecture could process. The authors found that their system was able to handle larger file sizes and fit engineering criteria. This study presents a valuable new tool that can be used to ensure law firms have adequate security as they shift to using cloud-based storage systems for their files.

Read More...