Browse Articles

Access to public parks, drinking fountains, and clean public drinking water in the Bay Area is not driven by income

Zaroff et al. | Jul 15, 2021

Access to public parks, drinking fountains, and clean public drinking water in the Bay Area is not driven by income

Access to green space—an area of grass, trees, or other vegetation set apart for recreational or aesthetic purposes in an urban environment—and clean drinking water can be unequally distributed in urban spaces, which are often associated with income inequality. Little is known about public drinking water and green space inequities in the Bay Area. For our study, we sought to understand how public park access, drinking fountain access, and the quality of public drinking water differ across income brackets in the Bay Area. Though we observed smaller-scale instances of inequalities, in the park distribution in the Bay Area as a whole, and in the Southern Bay’s water quality and park distribution, our results indicate that other factors could be influencing water quality, and park and fountain access in the Bay Area.

Read More...

A Temperature-Based Comparison of Compounds Found in Bao Chong Tea, Green Tea, and Black Tea

Lin et al. | May 14, 2019

A Temperature-Based Comparison of Compounds Found in Bao Chong Tea, Green Tea, and Black Tea

While tea has a complex history, recently the health benefits of this beverage have come into focus. In this study, researchers sought to compare the levels of caffeine, catechins and L-theanine between different types of tea using NMR spectroscopy. Further, the impact of brewing temperature on the release of these compounds was also assessed. Of those tested, Bao Chong tea had the highest levels of these compounds. Brewing temperatures between 45ºC and 75ºC were found to be optimal for compound release. These results can help consumers make informed choices about their tea preparation and intake.

Read More...

Determining the Habitable Zone Around a Star

Lee et al. | May 29, 2013

Determining the Habitable Zone Around a Star

Life requires many things, including a hospitable temperature, elements, and energy. Here the authors utilize Newton's laws of physics and information relating a star's luminosity and temperature to determine the minimum and maximum masses and luminosities of planets and stars that would support life as we know it. This work can be used to determine the likelihood of a planet being able to support life based on attributes we can measure from here on Earth.

Read More...

A meta-analysis on NIST post-quantum cryptographic primitive finalists

Benny et al. | Sep 21, 2024

A meta-analysis on NIST post-quantum cryptographic primitive finalists
Image credit: Benny et al. 2024

The advent of quantum computing will pose a substantial threat to the security of classical cryptographic methods, which could become vulnerable to quantum-based attacks. In response to this impending challenge, the field of post-quantum cryptography has emerged, aiming to develop algorithms that can withstand the computational power of quantum computers. This study addressed the pressing concern of classical cryptographic methods becoming vulnerable to quantum-based attacks due to the rise of quantum computing. The emergence of post-quantum cryptography has led to the development of new resistant algorithms. Our research focused on four quantum-resistant algorithms endorsed by America’s National Institute of Standards and Technology (NIST) in 2022: CRYSTALS-Kyber, CRYSTALS-Dilithium, FALCON, and SPHINCS+. This study evaluated the security, performance, and comparative attributes of the four algorithms, considering factors such as key size, encryption/decryption speed, and complexity. Comparative analyses against each other and existing quantum-resistant algorithms provided insights into the strengths and weaknesses of each program. This research explored potential applications and future directions in the realm of quantum-resistant cryptography. Our findings concluded that the NIST algorithms were substantially more effective and efficient compared to classical cryptographic algorithms. Ultimately, this work underscored the need to adapt cryptographic techniques in the face of advancing quantum computing capabilities, offering valuable insights for researchers and practitioners in the field. Implementing NIST-endorsed quantum-resistant algorithms substantially reduced the vulnerability of cryptographic systems to quantum-based attacks compared to classical cryptographic methods.

Read More...