Several studies have applied different machine learning (ML) techniques to the area of forecasting solar photovoltaic power production. Most of these studies use weather data as inputs to predict power production; however, there are numerous practical issues with the procurement of this data. This study proposes models that do not use weather data as inputs, but rather use past power production data as a more practical substitute to weather-based models. Our proposed models demonstrate a better, cheaper, and more reliable alternatives to current weather models.
Here, seeking to develop an understanding of the properties that determine the viability of piezoelectric flexible materials for applications in electro-mechanical sensors, the authors investigated the effects of the inclusion BaTiO3 nanoparticles in electrospun Polyvinyledene Fluoride. They found the voltage generated had a piecewise linear dependence on the applied force at a few temperatures.
Seeking an approach to address the increasing levels of methane and chlorinated hydrocarbons that threaten the environment, the authors worked to develop a novel, low-cost biotrickling filter for use as an ex situ method tailored to marine environments. By using methanotrophic bacteria in the filter, they observed methane degradation, suggesting the feasibility of chlorinated hydrocarbon degradation.
In this study the authors develop an app for faster chess game entry method to help chess learners improve their game. This culminated in the Augmented Reality Chess Analyzer (ARChessAnalyzer) which uses traditional image and vision techniques for chess board recognition and Convolutional Neural Networks (CNN) for chess piece recognition.
The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.
In this paper, we measured the privacy budgets and utilities of different differentially private mechanisms combined with different machine learning models that forecast traffic congestion at future timestamps. We expected the ANNs combined with the Staircase mechanism to perform the best with every value in the privacy budget range, especially with the medium high values of the privacy budget. In this study, we used the Autoregressive Integrated Moving Average (ARIMA) and neural network models to forecast and then added differentially private Laplacian, Gaussian, and Staircase noise to our datasets. We tested two real traffic congestion datasets, experimented with the different models, and examined their utility for different privacy budgets. We found that a favorable combination for this application was neural networks with the Staircase mechanism. Our findings identify the optimal models when dealing with tricky time series forecasting and can be used in non-traffic applications like disease tracking and population growth.
The Human Immunodeficiency Virus (HIV) infects approximately 40 million people globally, and one million people die every year from Acquired Immune Deficiency Syndrome (AIDS)-related illnesses. This study examined the interactions between the HIV-1 envelope glycoprotein gp120 and the human lymphocyte receptor integrin α4β7, the putative first long-range receptor for the envelope glycoprotein of the virus in mucosal tissues. Presented data support the claim that the V1 loop is involved in the binding between α4β7 and the HIV-1 envelope glycoprotein through molecular dockings.
In this study, the authors investigate the anti-cancer effects of Annona Reticulata (Ramphal or custard apple) by testing whether its extract could inhibit HeLa cell viability.
Biomimicry is the practice of applying models and systems found in nature to improve the efficiency and usefulness of human technologies. In this study, the authors designed helicopter blades with tubercle structures similar to those found on the tails of humpback whales. The authors found that certain arrangements of these tubercle structures improved the windspeed and efficiency of a model helicopter.