Prof. Mary Kraft and her research group have developed a computational reconstruction strategy to reshape 3D images acquired from depth profiling mode on secondary ion...
Prof. Mary Kraft and her research group have developed a computational reconstruction strategy to reshape 3D images acquired from depth profiling mode on secondary ion mass spectrometry (SIMS). This strategy can enhance understanding of structure function relationship of materials using SIMs (e.g. subcellular biological processes). For samples with nonplanar surfaces, secondary ions detected in the same SIMS depth profiling image, and thus depicted at the same z-position with respect to the surface may be from molecules with different z positions. 3D SIMS image depth correction strategy is needed when both substrate signals and atomic force microscopy data are not available for NanoSIMS depth profiling. The reconstruction strategy accurately captures the basic shape of the cell as well as the surface features, in addition to reducing time for complementary instrumental data collection.
Figure 1. Comparison of 3D 18O-Enrichment 3D SIMS Images of 18O-Cholesterol (left: uncorrected, right: corrected with the reconstruction strategy)
Dr. Gabriel Weaver and Dr. Lavanya Marla have developed a cyber/physical disruption model for shipping port operations that allows port authorities to anticipate, prepare...
Dr. Gabriel Weaver and Dr. Lavanya Marla have developed a cyber/physical disruption model for shipping port operations that allows port authorities to anticipate, prepare and avoid damages from various different disruptive events, both malicious and natural. This model has been improved with fundamental changes to the optimization algorithm, which is an inherent part of the data processing pipeline, and to the cyber layer of the pipeline. These changes allow for a more diverse cyber layer by allowing an additional data source, which, in turn, affects the transportation layer of the pipeline. This extends the grid-based approach to integrate into a network-based approach to critical infrastructure risk assessment. These changes allow for a more complete analysis of possible economic disruptions based on the input data given.
The invention is software to measure economic impacts of cyber/physical disruptions to port operations. It can be used to bolster port security by identifying points of weakness as well as improve training on how to respond to crises that may occur. It includes cyber disruptions which are currently neglected in port security efforts as evidenced by recent malware attacks. It also estimates economic impact for the port and the end stakeholders. This will be of special interest to port insurers, commanders, the US Coast Guard and other security agencies as well as the shipping companies that depend on smooth port logistics to move their freight efficiently.
Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware...
Dr. Huang has developed RSSD, a ransomware-aware solid-state drive. This solid-state drive has been meticulously designed and tested to withstand 3 new types of ransomware attacks by transferring data to a cloud server through NVMe over Ethernet. RSSD faces no performance impacts and even allows for post-attack analysis to carefully identify the cause and methodology of any ransomware attacks faced by the RSSD. RSSD enhances security support from typical ransomware attacks which assume conventional SSDs perform like HDDs by preemptively protecting against 3 novel types of ransomware attacks designed by Dr. Huang. Furthermore, RSSD ensures that stale data is not discarded after a limited amount of time as current SSDs behave, instead opting to allocate the stale data to the cloud storage in a time-dependent order. This cloud storage effectively removes the limitation of storage on SSDs by providing a space to store an infinite amount of data. The NVMe over Ethernet is the novel design that serves to protect from ransomware attacks the transfer of data from the local SSD to the cloud storage.