Filtering by
- Creators: Computer Science and Engineering Program




Serial femtosecond crystallography requires reliable and efficient delivery of fresh crystals across the beam of an X-ray free-electron laser over the course of an experiment. We introduce a double-flow focusing nozzle to meet this challenge, with significantly reduced sample consumption, while improving jet stability over previous generations of nozzles. We demonstrate its use to determine the first room-temperature structure of RNA polymerase II at high resolution, revealing new structural details. Moreover, the double flow-focusing nozzles were successfully tested with three other protein samples and the first room temperature structure of an extradiol ring-cleaving dioxygenase was solved by utilizing the improved operation and characteristics of these devices.
Descriptive representation is important to building and maintaining a fair court system, especially within a context of historical oppression by race or gender. Using official government biographies, voter rolls, news articles, and press releases, I collected demographic information on the judges of Arizona and compared it to Census data, to show how under representative the state courts of Arizona currently are. Through the use of non-attorney judges, the Justice Court of Arizona has become the most representative level of the state court. Almost all of the BIPOC judges of the Justice Court are not attorneys. Allowing non-attorney Justices of the Peace has made it possible for the court to be more representative of Arizonans. However, even though it is the most representative state court, the Justice Court vastly under represents women and BIPOC as judges. As racial tension and movements for fairness under the law increase, it is important to challenge how the courts could better serve Arizona.
This paper outlines the design and testing of a z-scan spectrometer capable of measuring the third order refraction index of liquids. The spectrometer underwent multiple redesigns, with each explored in this paper with their benefits and drawbacks discussed. The first design was capable of measuring the third order refraction index for glass, and found a value of 8.43 +- 0.392 x 10^(-16) cm^2/W for the glass sample, with the literature stating glass has a refraction index between 1-100 x 10^(-16) cm^2/W. The second design was capable of measuring the third order refraction index of liquids, and found values of 1.23 $\pm$ 0.121 $\e{-16}$ and 9.43 +- 1.00 x 10^(-17) cm^2/W for water and ethanol respectively, with literature values of 2.7 x 10^(-16) and 5.0 x 10^(-17) cm^2/W respectively. The third design gave inconclusive results due to extreme variability in testing, and and the fourth design outlined has not been tested yet due to time constraints.
Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.
Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.
This research endeavor explores the 1964 reasoning of Irish physicist John Bell and how it pertains to the provoking Einstein-Podolsky-Rosen Paradox. It is necessary to establish the machinations of formalisms ranging from conservation laws to quantum mechanical principles. The notion that locality is unable to be reconciled with the quantum paradigm is upheld through analysis and the subsequent Aspect experiments in the years 1980-1982. No matter the complexity, any local hidden variable theory is incompatible with the formulation of standard quantum mechanics. A number of strikingly ambiguous and abstract concepts are addressed in this pursuit to deduce quantum's validity, including separability and reality. `Elements of reality' characteristic of unique spaces are defined using basis terminology and logic from EPR. The discussion draws directly from Bell's succinct 1964 Physics 1 paper as well as numerous other useful sources. The fundamental principle and insight gleaned is that quantum physics is indeed nonlocal; the door into its metaphysical and philosophical implications has long since been opened. Yet the nexus of information pertaining to Bell's inequality and EPR logic does nothing but assert the impeccable success of quantum physics' ability to describe nature.
This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.