skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Prospective Life Cycle Assessment of Nonwoven Mat Manufacturing: Comparing Pre-Consumer Wood Waste Fibers to Post-Consumer Recycled Apparel Fibers
Award ID(s):
2236100
PAR ID:
10578297
Author(s) / Creator(s):
; ;
Publisher / Repository:
American Society of Mechanical Engineers International Design Engineering Technical Conferences and Computers and Information in Engineering Conference
Date Published:
Volume:
88391
Page Range / eLocation ID:
V005T05A020
Format(s):
Medium: X
Location:
Washington DC
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract The increasing availability of high‐frequency freshwater ecosystem metabolism data provides an opportunity to identify links between metabolic regimes, as gross primary production and ecosystem respiration patterns, and consumer energetics with the potential to improve our current understanding of consumer dynamics (e.g., population dynamics, community structure, trophic interactions). We describe a conceptual framework linking metabolic regimes of flowing waters with consumer community dynamics. We use this framework to identify three emerging research needs: (1) quantifying the linkage of metabolism and consumer production data via food web theory and carbon use efficiencies, (2) evaluating the roles of metabolic dynamics and other environmental regimes (e.g., hydrology, light) in consumer dynamics, and (3) determining the degree to which metabolic regimes influence the evolution of consumer traits and phenology. Addressing these needs will improve the understanding of consumer biomass and production patterns as metabolic regimes can be viewed as an emergent property of food webs. 
    more » « less
  2. null (Ed.)
    Cholesteryl ester liquid crystals exhibit thermochromic properties related to the existence of a twisted nematic phase. We formulate ternary mixtures of cholesteryl benzoate (CB), cholesteryl pelargonate (CP), and cholesteryl oleyl carbonate (COC) to achieve thermochromic behavior. We aim to achieve thermochromic fibers by incorporating the liquid crystal formulations into electrospun fibers. Two methods of incorporating the liquid crystal (LC) are compared: (1) blend electrospinning and (2) coaxial electrospinning using the same solvent system for the liquid crystal. For blend electrospinning, intermolecular interactions seem to be important in facilitating fiber formation since addition of LC can suppress bead formation. Coaxial electrospinning produces fibers with higher nominal fiber production rates (g/hr) and with higher nominal LC content in the fiber (wt. LC/wt. polymer assuming all of the solvent evaporates) but larger fiber size distributions as quantified by the coefficient of variation in fiber diameter than blend electrospinning with a single nozzle. Importantly, our proof-of-concept experiments demonstrate that coaxially electrospinning with LC and solvent in the core preserves the thermochromic properties of the LC so that thermochromic fibers are achieved. 
    more » « less
  3. null (Ed.)
  4. Small-scale unmanned aerial vehicles (UAVs) have become an increased presence in recent years due to their decreasing price and ease of use. Similarly, ways to detect drones through easily accessible programs like WireShark have raised more potential threats, including an increase in ease of jamming and spoofing drones utilizing commercially of the shelf (COTS) equipment like software defined radio (SDR). Given these advancements, an active area of research is drone security. Recent research has focused on using a HackRF SDR to perform eavesdropping or jamming attacks; however, most have failed to show a proposed remediation. Similarly, many research papers show post analysis of communications, but seem to lack a conclusive demonstration of command manipulation. Our security assessment shows clear steps in the manipulation of a WiFi drone using the aircrack-ng suite without the need for additional equipment like a SDR. This shows that anyone with access to a computer could potentially take down a drone. Alarmingly, we found that the COTS WiFi drone in our experiment still lacked the simple security measure of a password, and were very easily able to take over the drone in a deauthorization attack. We include a proposed remediation to mitigate the preformed attack and assess the entire process using the STRIDE and DREAD models. In doing so, we demonstrate a full attack process and provide a resolution to said attack. 
    more » « less
  5. null (Ed.)