URI researchers win $1.5 million NOAA grant to protect New England coastal communities, national parks, wildlife refuges from impact of sea-level rise, extreme weather

Researchers at the University of Rhode Island and Penn State University have been awarded a four-year, $1.5 million grant through the National Oceanic and Atmospheric Administration to study the effects of sea-level rise and how it may exacerbate the impact of extreme weather. The project will draw on expertise from researchers at URI’s Graduate School of Oceanography, its College of the Environment and Life Sciences, the Department of Ocean Engineering within the URI College of Engineering, and the URI Coastal Resources Center.

Other collaborative participants include the Schoodic Institute and the National Park Service. The overall goal of the project is to help communities, the National Park Service, and the U.S. Fish and Wildlife Service adapt and improve their resilience as the climate continues to change and extreme weather such as hurricanes and nor’easters continue to increase in terms of frequency and severity. Realistic 3D visualization for Eastham, Mass. along the Cape Cod National Seashore using Advanced Circulation (ADCIRC) modeling results of the March 2018 Nor'easter with 1.0 m sea level rise.

According to NOAA, the rate of sea-level rise is accelerating. Since 1993, the average global sea level has increased by 3.4 inches. By the end of the century, it is likely to rise at least one foot over 2000 levels. Sea level plays a role in flooding, shoreline erosion, and other hazards, affecting nearly 40 percent of the U.S. population living in high-population density coastal areas. However, despite what is known about sea-level rise, there is a lack of research available when it comes to how the impacts of nor’easters and hurricanes may be amplified as a result.

“There are a number of studies that have been done looking at just sea-level rise or just extreme weather, but what we’re really lacking in terms of clear understanding is the combined impact of these two phenomena,” said Isaac Ginis, professor of oceanography, who is leading the study. “This is especially important to us on the East Coast and in New England, where we’ve seen significant coastal flooding produced by waves and storm surge during nor’easters and hurricanes. How these effects are amplified by sea-level rise has been largely unexplored. This information gap inhibits our ability to properly plan for the future and is likely to lead to under-informed and ineffective adaptation measures.”    

The project will expand the body of research related to the effects of extreme weather and sea-level rise on five New England national parks and two wildlife refuges – Cape Cod National Seashore, Boston Harbor Islands National Recreation Area, and New Bedford Whaling National Historical Park in Massachusetts; Ninigret National Wildlife Refuge, Trustom Pond National Wildlife Refuge, and Roger Williams National Memorial in Rhode Island; and Acadia National Park in Maine – as well as their surrounding communities.

The project was supported by all four members of Rhode Island’s congressional delegation and received letters of support from more than 15 local communities and local non-profits.

“This federal research funding will help URI faculty and students gather valuable information to answer questions about changing sea levels and in turn protect coastal communities from the effects of climate change,” said U.S. Senator Jack Reed.

Using state-of-the-art atmosphere, storm surge and wave/erosion supercomputer modeling the team will provide high-resolution recreations of the impact of the future storm and sea-level rise scenarios, identifying vulnerabilities in the ecosystems and infrastructure of the identified sites and their adjacent communities. The modeling will also include hazard, risk, and adaptability assessments, as well as mitigation scenarios.

“Rising seas and worsening storms driven by climate change are two major challenges Rhode Island will face in the decades to come,” said U.S. Senator Sheldon Whitehouse.  “It’s fitting that the University of Rhode Island has been selected by NOAA to research ways to protect coastal areas from these dual threats.”

Researchers will work closely with the National Park Service, U.S. Fish and Wildlife Service, and stakeholders at the community level to tailor the research and translate the science in a way that can be incorporated into local resource management and adaptation measures to improve coastal resilience and to protect communities, people and infrastructure, and ecosystems.

“Each community has their own needs,” says Ginis, “but our modeling results will produce tailored and tangible information for local decision-makers – state and local governments, emergency management officials, town and city planners, and other stakeholders – to address their specific needs and enable them to plan and adapt as the sea level rises and the climate continues to change.”

Taking historical data into account as well as topography, geology, water depth, land elevation, natural processes such as shoreline changes, and human influence, the team will be able to project more than 50 years into the future, using 3-D visualization to provide computer simulations illustrating storm hazards and identifying potentially effective mitigation measures.

“As climate change continues to wreak havoc on communities across our state, it’s more important than ever to better understand the effects of rising sea levels and their impact during extreme weather events,” said Congressman Jim Langevin. “Devastating storms and flooding are becoming more frequent and severe, so we must invest in climate resiliency and adaption before it’s too late. I’m thrilled that the University of Rhode Island will now have the federal funding to lead the way on this critical area of research, and I look forward to reviewing the research.”

Ultimately, the project will open an important dialogue between researchers and local stakeholders, and Federal resource managers, and facilitate the development of practical and well-informed, science-based best practices that will guide future policies and resource management strategies to protect our coastal economy, environmental, cultural, and community resources.

“Climate change is one of the greatest challenges of our time, and we need to deal with this existential threat head-on,” said Congressman David Cicilline. “With the support of this federal grant, the University of Rhode Island and Penn State University will be able to study the impact climate-caused sea-level rise has on extreme weather. Their project will ultimately provide our coastal communities with the information they need to improve resiliency and plan for rising sea levels and severe weather events.”

IIT Bombay profs propose light-induced valleytronics in pristine graphene paves the way to quantum supercomputers

Valleytronics is an emerging field in which valleys, local minima in the energy band structure of solids, are used to encode, process, and store quantum information. Though graphene was thought to be unsuitable for valleytronics due to its symmetrical structure, researchers from the Indian Institute of Technology Bombay, India, have recently shown that this is not the case. Their findings may pave the way to small-sized quantum supercomputers that can operate at room temperature.

From the consumer’s side, it’s pretty easy to notice the giant strides that the field of electronics has made over the past few decades; with wearable gadgets, smart cities, self-driving cars, improved space missions, robots, holography, and supercomputers, the possibilities of technological advancement seem infinite. However, unbeknownst to most people, this accelerated trend of technological advancement fueled by electronics is rapidly coming to a halt as electronic components reach their practical limits. If we are to keep improving our computing power and capacity, we will need to find new ways to store and process data beyond the simple flow and charge of electrons, which is how modern electronics operate. Scientists find a way to use pristine graphene in valleytronics, a promising technology for encoding and processing quantum information

That is why quantum computers have recently become a hot topic. By encoding information in quantum phenomena, quantum supercomputers transcend the binary notion of each bit being either “0” or “1.” Instead, quantum bits exist as superpositions of “0” and “1” and can therefore take intermediate values. By exploiting superpositions through carefully designed algorithms, quantum computers could theoretically outperform conventional computers by several orders of magnitude in terms of speed. Sadly, it has proven difficult to find suitable quantum phenomena to encode information at room temperature. Existing computers, such as those owned by Google, IBM, and Microsoft, have to be kept at ultralow temperatures below –196.1°C, which makes them costly and impractical to operate.

Fortunately, there is a very promising approach for encoding quantum information that is actively being explored: valleytronics. Aside from their charge, electrons have another parameter that can be manipulated, namely their “valley pseudospin,” which is the valley that the electron occupies. These so-called valleys are local minima in the energy bands of solids, which dictate the energetic state and location of electrons. Valleys, with their occupation state governed by quantum mechanics, can be used to encode, process, and store quantum information at less restrictive temperatures.

Recently, a team of scientists from the Indian Institute of Technology (IIT) Bombay, India, and Max-Born Institut, Germany, achieved a breakthrough in the field of valleytronics. In their latest study, published in Optica, they present a way to perform valley operations in monolayer or pristine graphene, which was assumed to be impossible by other researchers in the field. As the poster child of carbon nanomaterials, graphene is made from carbon atoms in a hexagonal pattern and bears a plethora of favorable properties. Atomically thin layers of graphene have electron valleys but, due to the material’s inherent symmetry, they were deemed useless for valley operations.

Despite the odds, the team came up with a strategy to break graphene’s valley symmetry using light. Associate Professor Gopal Dixit from IIT Bombay, who led the study, explains: “By tailoring the polarization of two beams of light according to graphene’s triangular lattice, we found it possible to break the symmetry between two neighboring carbon atoms and exploit the electronic band structure in the regions close to the valleys, inducing valley polarization.” In other words, this enables the use of graphene’s valleys to effectively “write” information. Dr. Dixit also highlights that flashes of light can cause electrons to wiggle several hundred trillion times a second. In theory, this means valleytronics at petahertz rates is possible, which exceeds modern computational speeds by a million times.

One of the most attractive aspects of conducting valley operations in graphene is that it’s possible to do so at room temperature. “Our work could open the door to miniature, general-purpose quantum supercomputers that can be used by regular people, much like laptops,” remarks Dr. Dixit. With the higher computational speeds provided by quantum supercomputers, it will be much quicker to perform molecular simulations, big data analysis, deep learning, and other computationally intensive tasks. In turn, this will accelerate the development of new drugs and the elucidation of molecular structures, which will help in the search for cures to complex diseases including COVID-19. Let us hope this study helps quantum computers arrive at our lives sooner!

KU researcher wins NSF grant to develop hardware-cybersecurity education program

Phishing attacks, malware, distributed denial-of-service (DDoS) attacks, zero-day exploits. Many commonly reported cyberattacks focus on computer software vulnerabilities. But what about computer hardware? As complex global supply chains are stressed by the pandemic, risks increase of corporate or state espionage via hardware, such as malicious “trojan” circuits hidden on a motherboard by a shady third-party vendor.

Now, a new effort based at the University of Kansas School of Engineering aims to design course modules to train students in building and maintaining more secure computer hardware. The work is supported by a $400,000 grant from the National Science Foundation’s Secure and Trustworthy Cyberspace (SaTC) program. Of that, $163,000 will come to KU.

“When we think about cybersecurity, we think about software and network security, but hardware has become an important aspect of security — especially because the supply chain of electronic devices has become globalized,” said Tamzidul Hoque, principal investigator of the new grant and assistant professor of electrical engineering & computer science at KU. “Today, hardware is designed and manufactured by a number of different vendors, not just one specific vendor. For example, the Apple iPhone that you are using has components from untrusted vendors all over the world — that means security of the hardware is very critical.” Tamzidul Hoque, assistant professor of electrical engineering & computer science, discusses a simulation of hardware attacks with his graduate and undergraduate mentees. Hogue will manage KU's portion of a $400,000 grant from the National Science Foundation to design course modules that train college students to build and maintain more secure computer hardware.  CREDIT Tamzidul Hoque

Yet, most college and university curricula for electrical and computer engineering and computer science focus on software security rather than hardware security.

“Some universities are trying to offer courses so that students get training on hardware security and then can join the industry,” Hoque said. “But the problem is these courses are often hard to propose or develop by institutions that don’t have a lot of resources. You need to hire a faculty member who’s an expert on hardware security to develop such a new course — and because these courses are usually elective courses, only a few students take them.”

Hoque and his colleagues, Swarup Bhunia of the University of Florida and Tauhidur Rahman of Florida International University, plan to change this by developing course modules on hardware security that can plug seamlessly into existing courses. Once the modules are tested and evaluated at their own institutions, the team plans to offer them free to colleges and universities across the United States. The team considers it as a new paradigm of cybersecurity education that enables the foundational training on security, without offering a new course.

Their efforts could result in a new generation of computer engineers trained to build more secure computer equipment and detect the hardware that may be compromised or counterfeit.

“We want to include fundamental concepts of hardware security into existing core hardware design courses such as digital system design and embedded systems that are taken by all the students in a program,” Hoque said. “In that way, we can disseminate the concept of hardware security to everyone, without offering a new course. This integration of the basic concepts into existing courses could motivate many students to choose a career path in hardware security — in that case, they can take more advanced courses in future.”

Over the next three years, Hoque and his collaborators will design the modules and integrate them into classes already offered at their institutions: Embedded Systems at KU, Digital Logic at FIU, and Digital Systems at UF.

The modules the team will develop and implement in classrooms will encompass six critical hardware-security topics:

  • ·    Reverse engineering
  • ·    IP protection through obfuscation
  • ·    Hardware Trojan attacks
  • ·    Physical unclonable functions
  • ·    Bus snooping
  • ·    Side-channel attacks.

The modules will be internally evaluated by students, senior faculty, and the principal investigators themselves — and also evaluated externally by industry experts from firms like Cisco, Intel, Apple, and AMD.

According to Hoque, implementing the hardware-security modules into courses taken by all students in computer engineering and computer science programs also will boost the number of students from underrepresented groups who could pursue hardware-security careers.

“In general, the science and technology field has a very limited number of participants from underrepresented groups — and that’s particularly true for hardware security, where there are even fewer participants from those groups,” he said. “When we integrate these security concepts into a core course taken by all students, we automatically include students from underrepresented groups. As they learn something about hardware security, that will automatically enhance their participation in this security area in the future. For example, when it’s time to do a senior design project, a lot of them might do a senior design project on hardware security. Or, some might be planning to go to graduate school — and they’ll also consider pursuing research on hardware security because they learned interesting concepts when they took these core courses.”

What’s more, the development of the hardware-cybersecurity modules will support graduate students at all three institutions.

“Each institution will have one graduate student working throughout the project,” Hoque said. “They’ll be helping in the process of developing the course content and also helping when we offer the core courses in obtaining student feedback to see how the students are performing — especially if they’re facing difficulty in coping with these new concepts. This feedback will be used to improve the content in the subsequent semesters.”

The KU researcher said the introduction of hardware-security concepts into more general computer hardware courses should strengthen students’ grasp of the original core ideas central to those courses.

“When we integrate the security concept, it doesn’t make it difficult for students to learn the actual concept which was supposed to be taught in the course,” Hoque said. “We’ll integrate the security concepts into the original design concepts in a seamless manner. For example, when we teach a design concept, we’ll also give students some type of exercise to strengthen their understanding. Now, in our security integrated modules, we’ll teach that original concept — but when we give them an exercise, we’ll make it security-oriented.”