skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: (Hexamethylbenzene)Ru catalysts for the Aldehyde-Water Shift reaction
The Aldehyde-Water Shift (AWS) reaction uses H 2 O as a benign oxidant to convert aldehydes to carboxylic acids, producing H 2 , a valuable reagent and fuel, as its sole byproduct. (Hexamethylbenzene)Ru II complexes are demonstrated to have higher activity and selectivity (up to 95%) for AWS over disproportionation than previously reported catalysts.  more » « less
Award ID(s):
1827457
PAR ID:
10219769
Author(s) / Creator(s):
; ; ; ; ;
Date Published:
Journal Name:
Green Chemistry
Volume:
23
Issue:
4
ISSN:
1463-9262
Page Range / eLocation ID:
1609 to 1615
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. A growing body of evidence suggests that the solar wind is powered to a large extent by an Alfvén-wave (AW) energy flux. AWs energize the solar wind via two mechanisms: heating and work. We use high-resolution direct numerical simulations of reflection-driven AW turbulence (RDAWT) in a fast-solar-wind stream emanating from a coronal hole to investigate both mechanisms. In particular, we compute the fraction of the AW power at the coronal base ( $$P_\textrm {AWb}$$ ) that is transferred to solar-wind particles via heating between the coronal base and heliocentric distance $$r$$ , which we denote by $$\chi _{H}(r)$$ , and the fraction that is transferred via work, which we denote by $$\chi _{W}(r)$$ . We find that $$\chi _{W}(r_{A})$$ ranges from 0.15 to 0.3, where $$r_{A}$$ is the Alfvén critical point. This value is small compared with one because the Alfvén speed $$v_{A}$$ exceeds the outflow velocity $$U$$ at $$r < r_{A}$$ , so the AWs race through the plasma without doing much work. At $$r>r_{A}$$ , where $$v_{A} < U$$ , the AWs are in an approximate sense ‘stuck to the plasma’, which helps them do pressure work as the plasma expands. However, much of the AW power has dissipated by the time the AWs reach $$r=r_{A}$$ , so the total rate at which AWs do work on the plasma at $$r>r_{A}$$ is a modest fraction of $$P_\textrm {AWb}$$ . We find that heating is more effective than work at $$r < r_{A}$$ , with $$\chi _{H}(r_{A})$$ ranging from 0.5 to 0.7. The reason that $$\chi _{H} \geq 0.5$$ in our simulations is that an appreciable fraction of the local AW power dissipates within each Alfvén-speed scale height in RDAWT, and there are a few Alfvén-speed scale heights between the coronal base and $$r_{A}$$ . A given amount of heating produces more magnetic moment in regions of weaker magnetic field. Thus, paradoxically, the average proton magnetic moment increases robustly with increasing $$r$$ at $$r>r_{A}$$ , even though the total rate at which AW energy is transferred to particles at $$r>r_{A}$$ is a small fraction of $$P_\textrm {AWb}$$ . 
    more » « less
  2. In the last few years, Cloud computing technology has benefited many organizations that have embraced it as a basis for revamping the IT infrastructure. Cloud computing utilizes Internet capabilities in order to use other computing resources. Amazon Web Services (AWS) is one of the most widely used cloud providers that leverages the endless computing capabilities that the cloud technology has to offer. AWS is continuously evolving to offer a variety of services, including but not limited to, infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service. Among the other important services offered by AWS is Video Surveillance as a Service (VSaaS) that is a hosted cloud-based video surveillance service. Even though this technology is complex and widely used, some security experts have pointed out that some of its vulnerabilities can be exploited in launching attacks aimed at cloud technologies. In this paper, we present a holistic security analysis of cloud-based video surveillance systems by examining the vulnerabilities, threats, and attacks that these technologies are susceptible to. We illustrate our findings by implementing several of these attacks on a test bed representing an AWS-based video surveillance system. The main contributions of our paper are: (1) we provided a holistic view of the security model of cloud based video surveillance summarizing the underlying threats, vulnerabilities and mitigation techniques (2) we proposed a novel taxonomy of attacks targeting such systems (3) we implemented several related attacks targeting cloud-based video surveillance system based on an AWS test environment and provide some guidelines for attack mitigation. The outcome of the conducted experiments showed that the vulnerabilities of the Internet Protocol (IP) and other protocols granted access to unauthorized VSaaS files. We aim that our proposed work on the security of cloud-based video surveillance systems will serve as a reference for cybersecurity researchers and practitioners who aim to conduct research in this field. 
    more » « less
  3. The concept of Internet of Things (IoT) has received considerable attention and development in recent years. There have been significant studies on access control models for IoT in academia, while companies have already deployed several cloud-enabled IoT platforms. However, there is no consensus on a formal access control model for cloud-enabled IoT. The access-control oriented (ACO) architecture was recently proposed for cloud-enabled IoT, with virtual objects (VOs) and cloud services in the middle layers. Building upon ACO, operational and administrative access control models have been published for virtual object communication in cloud-enabled IoT illustrated by a use case of sensing speeding cars as a running example. In this paper, we study AWS IoT as a major commercial cloud- IoT platform and investigate its suitability for implementing the afore-mentioned academic models of ACO and VO communication control. While AWS IoT has a notion of digital shadows closely analogous to VOs, it lacks explicit capability for VO communication and thereby for VO communication control. Thus there is a significant mismatch between AWS IoT and these academic models. The principal contribution of this paper is to reconcile this mismatch by showing how to use the mechanisms of AWS IoT to effectively implement VO communication models. To this end, we develop an access control model for virtual objects (shadows) communication in AWS IoT called AWS-IoT-ACMVO. We develop a proof-of-concept implementation of the speeding cars use case in AWS IoT under guidance of this model, and provide selected performance measurements. We conclude with a discussion of possible alternate implementations of this use case in AWS IoT. 
    more » « less
  4. Developers are always on the lookout for simple solutions to manage their applications on cloud platforms. Major cloud providers have already been offering automatic elasticity management solutions (e.g., AWS Lambda, Azure durable function) to users. However, many cloud applications are stateful --- while executing, functions need to share their state with others. Providing elasticity for such stateful functions is much more challenging, as a deployment/elasticity decision for a stateful entity can strongly affect others in ways which are hard to predict without any application knowledge. Existing solutions either only support stateless applications (e.g., AWS Lambda) or only provide limited elasticity management (e.g., Azure durable function) to stateful applications. PLASMA (Programmable Elasticity for Stateful Cloud Computing Applications) is a programming framework for elastic stateful cloud applications. It includes (1) an elasticity programming language as a second "level" of programming (complementing the main application programming language) for describing elasticity behavior, and (2) a novel semantics-aware elasticity management runtime that tracks program execution and acts upon application features as suggested by elasticity behavior. We have implemented 10+ applications with PLASMA. Extensive evaluation on Amazon AWS shows that PLASMA significantly improves their efficiency, e.g., achieving same performance as a vanilla setup with 25% fewer resources, or improving performance by 40% compared to the default setup. 
    more » « less
  5. Abstract. A new meteorological dataset derived from records of Antarctic automatic weather stations (here called the AntAWS dataset) at 3 h, daily and monthly resolutions including quality control information is presented here. This dataset integrates the measurements ofair temperature, air pressure, relative humidity, and wind speed anddirection from 267 Antarctic AWSs obtained from 1980 to 2021. The AWS spatial distribution remains heterogeneous, with the majority of instrumentslocated in near-coastal areas and only a few inland on the East Antarctic Plateau. Among these 267 AWSs, 63 have been operating for more than 20 years and 27 of them in excess of more than 30 years. Of the fivemeteorological parameters, the measurements of air temperature have the bestcontinuity and the highest data integrity. The overarching aim of thiscomprehensive compilation of AWS observations is to make these data easilyand widely accessible for efficient use in local, regional and continentalstudies; it may be accessed at https://doi.org/10.48567/key7-ch19 (Wang et al., 2022). This dataset isinvaluable for improved characterization of the surface climatology acrossthe Antarctic continent, to improve our understanding of Antarctic surfacesnow–atmosphere interactions including precipitation events associated with atmospheric rivers and to evaluate regional climate models ormeteorological reanalysis products. 
    more » « less