Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Environmental Sciences (253)
- Life Sciences (215)
- Oceanography and Atmospheric Sciences and Meteorology (172)
- Computer Sciences (151)
- Chemistry (130)
-
- Social and Behavioral Sciences (129)
- Natural Resources and Conservation (112)
- Marine Biology (108)
- Fresh Water Studies (103)
- Ecology and Evolutionary Biology (85)
- Education (70)
- Physics (69)
- Medicine and Health Sciences (62)
- Statistics and Probability (60)
- Terrestrial and Aquatic Ecology (60)
- Engineering (51)
- Earth Sciences (49)
- Mathematics (49)
- Library and Information Science (47)
- Arts and Humanities (39)
- Business (39)
- Sustainability (39)
- Applied Mathematics (30)
- Medical Sciences (28)
- Public Health (25)
- Information Security (24)
- Higher Education (23)
- Teacher Education and Professional Development (23)
- Clinical Trials (22)
- Institution
-
- Western Washington University (110)
- City University of New York (CUNY) (54)
- Selected Works (53)
- SelectedWorks (47)
- Western Kentucky University (41)
-
- Colby College (36)
- Valparaiso University (32)
- University of Lynchburg (28)
- University of Nebraska at Omaha (25)
- Utah State University (23)
- Roseman University of Health Sciences (22)
- Liberty University (20)
- Murray State University (18)
- Ursinus College (18)
- William & Mary (18)
- Loyola Marymount University and Loyola Law School (14)
- Syracuse University (14)
- Arkansas Tech University (13)
- Kennesaw State University (12)
- Minnesota State University Moorhead (12)
- Western University (12)
- University of Rhode Island (10)
- Dartmouth College (9)
- Longwood University (9)
- Pepperdine University (9)
- Ouachita Baptist University (8)
- The University of San Francisco (8)
- Southern Adventist University (7)
- DePaul University (6)
- Elizabethtown College (6)
- Keyword
-
- Scholarly Presentations (Powerpoint Files) (29)
- Cybersecurity (18)
- CHSD Presentations (13)
- Corporate Governance and Finance (12)
- Antitrust (9)
-
- Competition (9)
- Mathematics Education (9)
- Social Network Analysis (7)
- GIS (6)
- Law and Economics (6)
- Mesosphere (6)
- Statistics (6)
- Wavelets (6)
- Board turnover (5)
- Chemistry (5)
- Corporate governance (5)
- Digital collections (5)
- Empirical corporate finance (5)
- Interlocking directorships (5)
- Mathematical Modeling (5)
- Physical Sciences Presentations (5)
- Primary sources (5)
- Spectroscopy (5)
- Board Turnover (4)
- Corporate Governance (4)
- Ecology (4)
- Empirical Corporate Finance (4)
- Geology (4)
- Gravity waves (4)
- Interlocking Directorships (4)
- Publication Year
- Publication
-
- Salish Sea Ecosystem Conference (106)
- CLAS: Colby Liberal Arts Symposium (36)
- U.S. - Japan Bilateral Workshop on the Tropical Tropopause Layer: State of the Current Science and Future Observational Needs (32)
- Publications and Research (28)
- Student Scholar Showcase (28)
-
- Open Educational Resources (26)
- UNO Student Research and Creative Activity Fair (25)
- Presentations (24)
- Annual Research Symposium (22)
- Amber Settle (19)
- Liberty University Research Week (18)
- Chris E Johnson (15)
- Civil and Environmental Engineering (14)
- ATU Research Symposium (13)
- Bruce Kessler (12)
- Student Academic Conference (12)
- Undergraduate Student Research Internships Conference (12)
- Posters-at-the-Capitol (11)
- Symposium of Student Scholars (11)
- Education for Sustainability Summer Institute (10)
- Scholars Week (10)
- Senior Honors Projects (10)
- Chemistry 52, Gordon Gribble lectures on Special Topics (9)
- Seaver College Research And Scholarly Achievement Symposium (9)
- Arkansas Women in STEM Conference (8)
- Carlo Drago (8)
- Creative Activity and Research Day - CARD (8)
- Student Research Conference Select Presentations (8)
- Campus Research Day (7)
- 2017 Academic High Altitude Conference (6)
Articles 331 - 360 of 827
Full-Text Articles in Physical Sciences and Mathematics
Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 11: Identity & Access Management, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "11: Identity & Access Management" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 18-19: Anatomy Of A Breach, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "18-19: Anatomy of a Breach" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Cybersecurity (Cs 3550): Lecture 12: Network & Endpoint Security, Michael Whiteman, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 3550: Cybersecurity - "12: Network & Endpoint Security" delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Confidentiality, Integrity, Availability, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability" (Week One) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Vulnerabilities And Exploits, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities and Exploits" (Week Two) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.
Field Relations, Geochemistry, And Geochronology Of The Rocks At Perkins Point, Castine, Maine, Robert Knowles, Douglas Reusch
Field Relations, Geochemistry, And Geochronology Of The Rocks At Perkins Point, Castine, Maine, Robert Knowles, Douglas Reusch
Individual Projects
Northwest of Castine, Maine is the coastline known as Perkins Point, which is home to about 500 meters of bedrock exposure. Previous mapping projects of Penobscot Bay indicate a discrepancy in rock type for this area, and therefore the origin of the rocks is unclear. Preliminary observations suggest that these rocks are mostly volcanic. The goal of this project is to determine the field relations, geochronology, and geochemistry to conclude the true nature of these rocks and ultimately create a geological map.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Hackers, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers" (Week Three) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Wilson Sensor Footballs: Consistency Metric, Kenneth Eaton
Wilson Sensor Footballs: Consistency Metric, Kenneth Eaton
Honors Capstone Enhancement Presentations
No abstract provided.
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Cis 356: Fundamentals Of Cybersecurity And Intelligence Gathering - Encryption And Hashing, Fahad Chowdhury, Nyc Tech-In-Residence Corps
Open Educational Resources
Lecture for the course: CIS 356: Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption and Hashing" (Week Four) delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the NYC Tech-in-Residence Corps program.
Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton
Automated Tool Support - Repairing Security Bugs In Mobile Applications, Larry Singleton
UNO Student Research and Creative Activity Fair
Cryptography is often a critical component in secure software systems. Cryptographic primitive misuses often cause several vulnerability issues. To secure data and communications in applications, developers often rely on cryptographic algorithms and APIs which provide confidentiality, integrity, and authentication based on solid mathematical foundations. While many advanced crypto algorithms are available to developers, the correct usage of these APIs is challenging. Turning mathematical equations in crypto algorithms into an application is a difficult task. A mistake in cryptographic implementations can subvert the security of the entire system. In this research, we present an automated approach for Finding and Repairing Bugs …
Characterization Of Dimerization Domains On The Mannose-6-Phosphate/Insulin-Like Growth Factor 2 Receptor, Tyler Degener
Characterization Of Dimerization Domains On The Mannose-6-Phosphate/Insulin-Like Growth Factor 2 Receptor, Tyler Degener
UNO Student Research and Creative Activity Fair
The mannose-6-phosphate/insulin-like growth factor 2 (M6P/IGF2) receptor is a transmembrane protein with the ability to sequester growth factors from the extracellular matrix. This behavior links the receptor to tumor suppression. On a structural level, the extracellular portion of the protein is segmented into 15 homologous repeats, which can be divided further into 5 triplet domains, labelled 1-3, 4-6, 7-9, 10-12, and 13-15. Each triplet receptor displays its own unique ligand binding affinity, including the ability to form dimers with triplets on a second M6P/IGF2 receptor. In fact, previous studies indicate that this protein functions optimally when dimerized. Thus, the purpose …
Design, Construction, And Characterization Of A Low-Cost Spectrometer With Interchangeable Parts, Jack Godek
Design, Construction, And Characterization Of A Low-Cost Spectrometer With Interchangeable Parts, Jack Godek
UNO Student Research and Creative Activity Fair
A low-cost spectrometer was designed for the purpose of teaching spectroscopy. The spectrometer can be built by the student and contains interchangeable pieces such as slit width, grating, and lenses. This will allow the student to understand how changing these variables effects resolution. The spectrometer was constructed from PVC pipe, a plastic electrical box, and a USB webcam. The actual resolution of the spectrometer is close to the theoretical value, depending on which lens and grating is used. In addition, an extra piece can be added that allows absorption spectra to be collected. Having the student piece together the spectrometer …
What Is The Most Threatening Disaster To The Continental United States?, Aaron Spomer, Elijah Kaufman, Julisa Prieto-Garcia, Brooke Aschwanden
What Is The Most Threatening Disaster To The Continental United States?, Aaron Spomer, Elijah Kaufman, Julisa Prieto-Garcia, Brooke Aschwanden
UNO Student Research and Creative Activity Fair
Our goal for our project is to fully understand which natural disaster is the most destructive to the United States. We have chosen to compare hurricanes, floods, tornadoes, wildfires, earthquakes, and nor’easters. We have researched the cost of the total damage and repair, how the warning systems have improved over time, the death tolls from each, and also the frequency at which each one occurs. Each group member will research a different disaster impact, and the data will create a comprehensive view of the level of devastation each disaster has. We collected data all the way from the early 1900s …
A Writing Intensive Upper Division Astrophysics/Planetary Science Course, Laura M. Woodney
A Writing Intensive Upper Division Astrophysics/Planetary Science Course, Laura M. Woodney
Q2S Enhancing Pedagogy
This poster describes the major writing components of an upper division Astronomy or Planetary Science course. These components are intended to be integrated throughout the semester along with the content of the course. The papers the instructor chooses for the scaffolded assignments should compliment/enhance the content the students are learning in the course. This project used the "Backwards Design" method from Bean (2011, citation in poster): where the instructor first identifies the final project, determines what challenges the students will encounter attempting to do that project, and then builds scaffolded assignments intended to address each of these challenges. This presentation …
Everyone Loves Gummi Bears! Removing The Intimidation Factor From Research Data Management With Yummy Fun., Dawn N. Cannon-Rech, Jeffrey M. Mortimore
Everyone Loves Gummi Bears! Removing The Intimidation Factor From Research Data Management With Yummy Fun., Dawn N. Cannon-Rech, Jeffrey M. Mortimore
Georgia International Conference on Information Literacy
How do you get students excited about research data management and attract over 70 participants to a voluntary workshop? How do you get Librarians excited about teaching a research data management workshop to undergraduates? With the promise of Gummi Bears and hands-on fun! During this workshop session, presenters will break down their experience overhauling a faculty workshop into an active learning session to expose students of all experience levels to basic research data management concepts and techniques. Presenters will walk participants through their design process from inception to delivery, highlighting how Gummi Bears lessened students’ intimidation with this complex topic …
Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage
Reverse Osmosis; Addressing Freshwater Shortage With Sustainable Desalination, Jessica Savage
Sustainability Conference
Water security is an imperative part of high-functioning societies. Currently, large populations of the globe live in water-impoverished or water-stressed areas. With climate change and growing global populations, projections show more people being impacted by issues of water shortage.
One solution to water security is the implementation of desalination, specifically with reverse osmosis systems. This presentation walks through the history, capabilities, future work, and explanations on how reverse osmosis systems work. With continued research on improving desalination, communities in both developed and developing nations around the world can work towards total water security.
Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis
Recovering From Industrial Overshoot: Thermal Removal Of Atmospheric Co2, Ted Von Hippel, Sandra Boetcher, Matthew Traum, Farshid Azadian Ph.D., William Mackunis
Sustainability Conference
Humanity will soon overshoot a safe level of atmospheric CO2, if it hasn't done so already. Countries, industries, and the global economy need to dramatically and quickly alter their behavior and technology to avoid this dangerous overshoot, yet this appears unlikely. Direct Air Capture of CO2 represents an insurance policy for society - a way of removing excess atmospheric CO2. I will present an approach to this problem based on thermal physics that cools cubic kilometers of air to extract CO2 as it sublimates. I propose a combination of an efficient heat exchanger, radiative cooling, and refrigeration, all at industrial …
Public Interest Technology: Coding For The Public Good, Devorah Kletenik
Public Interest Technology: Coding For The Public Good, Devorah Kletenik
Open Educational Resources
These slides are used to guide a discussion with students introducing them to the notion of public interest technology and coding for the public good. The lesson is intended to spark a discussion with students about different sorts of technology and their societal ramifications.
Accessibility: The Whys And The Hows, Devorah Kletenik
Accessibility: The Whys And The Hows, Devorah Kletenik
Open Educational Resources
This presentation introduces Computer Science students to the notion of accessibility: developing software for people with disabilities. This lesson provides a discussion of why accessibility is important (including the legal, societal and ethical benefits) as well as an overview of different types of impairments (visual, auditory, motor, neurological/cognitive) and how developers can make their software accessible to users with those disabilities. This lesson includes videos and links to readings and tutorials for students.
Historical Milestones In Astronomy: As Shown Through The Byu Special Collections Archives, Dan Broadbent
Historical Milestones In Astronomy: As Shown Through The Byu Special Collections Archives, Dan Broadbent
Faculty Publications
Science Research: The “Long Conversation”
- Ideas in science can take a long time to develop.
- How do they develop?
- These books document a part of a conversation that began 447 years ago and spanned a 153 year period… documenting:
- how the overall nature of the universe was worked out,
- the establishment of the scientific method, and the boundaries of religious authority,
- and culminated in Isaac Newton’s book that presented his three laws of motion that allow us to explore the universe to this day.
Security Camera Using Raspberry Pi, Tejendra Khatri
Security Camera Using Raspberry Pi, Tejendra Khatri
Student Academic Conference
Making a security camera using raspberry pi utilizing OpenCV for facial recognition, upper body recognition or full-body recognition
Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner
Transfer Equivalency Site For The Registrar, Janelle N. Rohrbach, Alissa C. Cielecki, Jules A. Turner
Capstone Showcase
The website, arcadia-transfer-equiv.com, was drafted and created for Bill Enick, Registrar at Arcadia University. This was an expansion of a preliminary version of the website created by Caleigh Diefenthaler, Christian Charney, and Dylan Power. The site includes two transfer equivalency tools which can be used to search for course equivalencies by academic institution or by a given Arcadia course. The tools, which pull from a database maintained by the Registrar, will display courses that have transferred to the University successfully. The website also hosts two interactive forms. These forms allow Arcadia students to request approval for courses that have or …
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
The Privacy Preserving Framework With Virtual Ring And Identity-Based Cryptography For Smart Grid, Leonard Sutanto
Publications and Research
One of the main challenges in the smart grid is how to efficiently manage the high-volume data from smart meters and sensors and preserve the privacy from the consumption data to avoid potential attacks (e.g., identity theft) for the involved prosumers, retail electricity providers and other clusters of distributed energy resources. This poster proposes a two-layer framework with the cloud computing infrastructure. The virtual ring and identity-based cryptography are utilized in each layer to preserve privacy efficiently. The methods of the virtual ring and identity-based cryptography are introduced. The purposes and needs are discussed at the end of this poster.
An Application Of The Ising Model, Juliano A. Everett
An Application Of The Ising Model, Juliano A. Everett
Publications and Research
Understanding how the Ising model works,what it represents, and how it can be applied to neurology. Given that an Ising model is an Entropy model that could be representative of the firing of neurons, some assumptions of the system are made and then the process is simulated through Monte Carlo methods.
Seminole State College Cure Research Program: From The Classroom To Collaboration, Maya Patrice Byfield Phd
Seminole State College Cure Research Program: From The Classroom To Collaboration, Maya Patrice Byfield Phd
Florida Statewide Symposium: Best Practices in Undergraduate Research
It is believed that if students are taught inductively in their first 2 years, it could induce many of them to seek research experiences later in their academic careers. To do this, we initiated an effort to promote engagement in research topics and faculty development. First, collaboration between one faculty member at SSC and a Principal Investigator at the Sanford-Burnham Institute was developed. This collaboration resulted in the creation of several internships at the Institute for students in the newly developed STEM research class. Second, to increase student engagement, the biology department developed a research focused colloquium series. Each fall …
Galaxy And Mass Assembly: A Comparison Between Galaxy-Galaxy Lens Searches In Kids/Gama, Shawn Knabel, Benne Holwerda
Galaxy And Mass Assembly: A Comparison Between Galaxy-Galaxy Lens Searches In Kids/Gama, Shawn Knabel, Benne Holwerda
Posters-at-the-Capitol
Strong gravitational lenses are cases where a distant background galaxy is located directly behind a massive foreground galaxy, whose gravity causes the light from the background galaxy to bend around the foreground galaxy. In addition to being visually stunning, these rare events are useful laboratories for furthering our understanding of gravity and cosmology and to determine properties, such as the mass and dark matter content, of the lensing galaxies themselves. The trouble is finding enough of these strong gravitational lenses for further study. The immensity of the catalogs being collected by state-of-the-art telescopes requires equally innovative methods for interpreting that …
The Effects Of Erosion Structures On Triplett Creek From The Fall Of 2016, 2017, And 2018, Haylee Winters
The Effects Of Erosion Structures On Triplett Creek From The Fall Of 2016, 2017, And 2018, Haylee Winters
Posters-at-the-Capitol
Triplett Creek is a tributary of the Licking River. It runs through Morehead, KY, where we are conducting our research.
The creek was modified in the 1970s but construction was halted before the project was complete. Unfortunately, the result was an increase in overflow and subsequent riverbank erosion. The city installed sediment trap rocks in hopes of slowing down the water and decreasing erosion. We are using drones and photogrammetric software to map the area and compare images of the river to determine erosion rates. The new images will be compared to ones taken in previous years to visualize the …
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Finding Needles In A Haystack: A Case Study Of Text Mining The Corpus Of 15 Academic Journals, Eric A. Kowalik, Tara Baillargeon, Jennifer M. Cook
Eric A. Kowalik
Seeing With A Climate Lens, Jane Ganion
Seeing With A Climate Lens, Jane Ganion
Year on Climate Change: Events
Join Jana Ganion from the Blue Lake Rancheria and Kit Batten, an independent climate change consultant previously at Pacific Gas & Electric to talk about a zero-emission future and your role in it. We will discuss insights and lessons learned from the clean energy and sustainability field through our work to shape a grid of the future. If you don’t yet know exactly what you want to do or you are have been working in these fields for decades, join us to talk about sustainability, electrical grids, climate, international diplomacy, the future, and you.
Opening Of An Epoxide Ring Using Azide To Form A Triazole, Emily Hufnagel, Jeffrey A. Hansen
Opening Of An Epoxide Ring Using Azide To Form A Triazole, Emily Hufnagel, Jeffrey A. Hansen
Annual Student Research Poster Session
No abstract provided.