The utility of high-throughput, computational screening has become an invaluable asset to the field of materials science. In the hierarchy of computational methods, the most accurate methods are often the most computationally expensive. However, as both the efficiency and fidelity of numerical techniques advance, high-quality screening of large materials datasets...
Toxin production by cyanobacterial harmful algal blooms (cyanoHABs) in freshwater systems has lasting ecological and human impacts. Nutrients, light availability, hydrology, and microbial community composition impact the frequency and intensity of toxic cyanoHABs. Climate change will exacerbate toxic cyanoHABs, making real time and predictive monitoring a vital tool for managing...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...
Nuclear fuel management is an optimization problem on many levels. Finding “viable” solutions for the core reload design problem is difficult without expert knowledge and software automation. Small modular reactors with a shared used fuel pool demonstrate a novel opportunity for fuel cycle optimization.
A Python package was developed and...
RNAs play important roles in multiple cellular processes, and many of their functions rely on folding to specific structures. To maintain their functions, secondary structures of RNA homologs are conserved across evolution. These conserved structures provide critical targets for diagnostics and therapeutics. Thus, there is a need for developing fast...
Secure two-party computation (2PC) is the task of performing arbitrary calculations on secret inputs provided by two parties, while maintaining secrecy if at least one party is honest. 2PC has been applied to privacy-preserving record linkage and machine learning, in areas such as medicine where maintaining privacy is crucial. One...
The self-help literature is full of texts on both self-compassion and postpartum depression. However, there has been minimal scientific exploration of the literature on these topics. As such, mental health researchers and practitioners have little sense of the psycholinguistic discourse contained in this literature. This study aimed to fill this...
Hop (Humulus lupulus L. var. lupulus) is a diploid, dioecious plant with an extensive history of cultivation and use in brewing, as a textile, and for its therapeutic properties. Hop is prized for its ability to produce a variety of aromatic and flavor compounds, as well as compounds with anti-microbial...
My dissertation title is, “Applied economic strategies to evaluate policies and environmental outcomes: case studies from immigration and ecosystem services.” The first two chapters of this dissertation concern the relationship between local immigration policies and societal welfare. The third chapter examines the impact of human activity on the environment and...
The distribution of mobile marine predators often reflects underlying dynamic ecological processes. The geographical focus of this PhD is the South Taranaki Bight (STB) of New Zealand, where wind-driven coastal upwelling generates productivity and prey to support a blue whale foraging ground. The STB is also New Zealand’s most industrial...