Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Selected Works

Discipline
Keyword
Publication Year
Publication
File Type

Articles 3271 - 3300 of 16838

Full-Text Articles in Physical Sciences and Mathematics

The Methodology For Evaluating Response Cost For Intrusion Response Systems, Christopher Roy Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong Jun 2017

The Methodology For Evaluating Response Cost For Intrusion Response Systems, Christopher Roy Strasburg, Natalia Stakhanova, Samik Basu, Johnny S. Wong

Johnny Wong

Recent advances in the field of intrusion detection brought new requirements to intrusion prevention and response. Traditionally, the response to the detected attack was selected and deployed manually, in the recent years the focus has shifted towards developing automated and semi-automated methodologies for responding to intrusions. In this context, the cost-sensitive intrusion response models have gained the most interest mainly due to their emphasis on the balance between potential damage incurred by the intrusion and cost of the response. However, one of the challenges in applying this approach is defining consistent and adaptable measurement of these cost factors on the …


A Taxonomy Of Intrusion Response Systems, Natalia Stakhanova, Samik Basu, Johnny S. Wong Jun 2017

A Taxonomy Of Intrusion Response Systems, Natalia Stakhanova, Samik Basu, Johnny S. Wong

Johnny Wong

Recent advances in intrusion detection field brought new requirements to intrusion prevention and response. Traditionally, the response to an attack was manually triggered by an administrator. However, increased complexity and speed of the attack-spread during recent years showed acute necessity for complex dynamic response mechanisms. Although intrusion detection systems are being actively developed, research efforts in intrusion response are still isolated. In this work we present taxonomy of intrusion response systems, together with a review of current trends in intrusion response research. We also provide a set of essential fetures as a requirement for an ideal intrusion response system.


Design And Implementation Of A Media Uploading System, Mu Zhang, Johnny S. Wong, Wallapak Tavanapong Jun 2017

Design And Implementation Of A Media Uploading System, Mu Zhang, Johnny S. Wong, Wallapak Tavanapong

Johnny Wong

This paper presents the design and performance analysis of an uploading system that automatically uploads multimedia files to a centralized server given client hard deadlines. If not uploaded by the deadlines, existing files may be lost or new files cannot be recorded. The uploading systems with hard deadlines have several important applications in practice. For instance, such systems can be used in hospitals to gather videos generated from medical devices from various operating rooms for post-procedure analysis and in law enforcement to collect video recordings from police cars during routine patrolling. In this paper, we study the uploading system with …


Cable Footprint History: Spatio-Temporal Technique For Instrument Detection In Gastrointestinal Endoscopic Procedures, Chuanhai Zhang, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen, Junghwan Oh Jun 2017

Cable Footprint History: Spatio-Temporal Technique For Instrument Detection In Gastrointestinal Endoscopic Procedures, Chuanhai Zhang, Wallapak Tavanapong, Johnny S. Wong, Piet C. De Groen, Junghwan Oh

Johnny Wong

We propose a new fast spatio-temporal technique that detects an operation scene---a video segment corresponding to a single purpose diagnosis action or a single purpose therapeutic action. The technique utilizes (1) color contrast of the cable region and the background, (2) the new area-based coordinate system to compute spatial features, and (3) the history of locations of detected cables of the instrument in a video to discard false regions. The proposed technique and software are useful for (1) automatic documentation of diagnostic or therapeutic operations at the end of the procedure, (2) a second review for causes of complications due …


Specification Synthesis For Monitoring And Analysis Of Manet Protocols, Natalia Stakhanova, Samik Basu, Zhang Wensheng, Xia Wang, Johnny S. Wong Jun 2017

Specification Synthesis For Monitoring And Analysis Of Manet Protocols, Natalia Stakhanova, Samik Basu, Zhang Wensheng, Xia Wang, Johnny S. Wong

Johnny Wong

This paper introduces an approach to automatic synthesis of the specification models of rout- ing protocol behavior from the observed flow of the network traffic. In particular, our technique generalizes the monitored sequences of routing messages constructing a high-level abstract view of the protocol. The basis of our method is similar to Inductive Logic Programming technique that derives a sound hypothesis from the individual examples. We conduct preliminary experi- ments on the example of AODV and DSR ad-hoc routing protocols and discuss the effectiveness of the generated specification models in detecting protocol misuses.


Utility-Theoretic Heuristics For Intelligent Adaptive Routing In Large Communcation Networks, Armin Mikler, Vasant Honavar, Johnny S. Wong Jun 2017

Utility-Theoretic Heuristics For Intelligent Adaptive Routing In Large Communcation Networks, Armin Mikler, Vasant Honavar, Johnny S. Wong

Johnny Wong

Utility theory offers an elegant and powerful theoretical framework for design and analysis of autonomous adaptive communication networks. Routing of messages in such networks presents a real-time instance of a multi-criterion quasi-optimization problem in a dynamic and uncertain environment. In this paper, we examine several heuristic decision functions that can be used to guide messages along a near-optimal (e.g., minimum delay) path in a large network. We present an analysis of properties of such heuristics under a set of simplifying assumptions about the network topology and load dynamics. In particular, we identify the conditions under which one such utility-theoretic heuristic …


Automated Caching Of Behavioral Patterns For Efficient Run-Time, Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny S. Wong Jun 2017

Automated Caching Of Behavioral Patterns For Efficient Run-Time, Natalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny S. Wong

Johnny Wong

Run-time monitoring is a powerful approach for dy- namically detecting faults or malicious activity of software systems. However, there are often two obsta- cles to the implementation of this approach in prac- tice: (1) that developing correct and/or faulty be- havioral patterns can be a difficult, labor-intensive process, and (2) that use of such pattern-monitoring must provide rapid turn-around or response time. We present a novel data structure, called extended action graph, and associated algorithms to overcome these drawbacks. At its core, our technique relies on ef- fectively identifying and caching specifications from (correct/faulty) patterns learnt via machine-learning algorithm. We …


The Potential Of Three Computer-Based Communication Activities For Supporting Older Adult Independent Living, Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser Jun 2017

The Potential Of Three Computer-Based Communication Activities For Supporting Older Adult Independent Living, Melinda Heinz, Jinmyoung Cho, Norene Kelly, Peter Martin, Johnny Wong, Warren Franke, Wen-Hua Hsieh, Joan Blaser

Johnny Wong

Technology has become an increasingly integral part of life. For example, technology allows individuals to stay in touch with loved ones, obtain medical services through telehealthcare, and enjoy an overall higher quality of life. Particularly for older adults, using technology increases the likelihood that they will maintain their independence and autonomy. Long-distance caregiving has recently become a feasible option where caregivers for older adults can access reports and information about their loved one’s patterns that day (e.g., food and medication intake). Technology may be able to offset age-related challenges (e.g., caregiving, accessing healthcare, decreased social networks) by applying technology to …


A Brief Review On Leading Big Data Models, Sugam Sharma, Udoyara S. Tim, Johnny S. Wong, Shashi Gadia, Subhash Sharma Jun 2017

A Brief Review On Leading Big Data Models, Sugam Sharma, Udoyara S. Tim, Johnny S. Wong, Shashi Gadia, Subhash Sharma

Johnny Wong

Today, science is passing through an era of transformation, where the inundation of data, dubbed data deluge is influencing the decision making process. The science is driven by the data and is being termed as data science. In this internet age, the volume of the data has grown up to petabytes, and this large, complex, structured or unstructured, and heterogeneous data in the form of “Big Data” has gained significant attention. The rapid pace of data growth through various disparate sources, especially social media such as Facebook, has seriously challenged the data analytic capabilities of traditional relational databases. The velocity …


Contextual Motivation In Physical Activity By Means Of Association Rule Mining, Sugam Sharma, Udoyara Sunday Tim, Marinelle Payton, Hari Cohly, Shashi Gadia, Johnny Wong, Sudharshanam Karakala Jun 2017

Contextual Motivation In Physical Activity By Means Of Association Rule Mining, Sugam Sharma, Udoyara Sunday Tim, Marinelle Payton, Hari Cohly, Shashi Gadia, Johnny Wong, Sudharshanam Karakala

Johnny Wong

The primary thrust of this work is to demonstrate the applicability of association rule mining in public health domain, focusing on physical activity and exercising. In this paper, the concept of association rule mining is shown assisting to promote the physical exercise as regular human activity. Specifically, similar to the prototypical example of association rule mining, market basket analysis, our proposed novel approach considers two events – exercise (sporadic) and sleep (regular) as the two items of the frequent set; and associating the former, exercise event, with latter, the daily occurring activity sleep at night, helps strengthening the frequency of …


Ipm Information Technology, John K. Vandyk Jun 2017

Ipm Information Technology, John K. Vandyk

John K. VanDyk

The use of information technology to obtain and manage IPM information will continue to grow. By applying the basic principles of information taxonomies such as tagging information with terms from vocabularies, filtering and aggregation, knowledge workers will have the necessary tools to become increasingly informed about the realm ofiPM.


Prediction Of Remaining Life Of Power Transformers Based On Left Truncated And Right Censored Lifetime Data, Yili Hong, William Q. Meeker, James D. Mccalley Jun 2017

Prediction Of Remaining Life Of Power Transformers Based On Left Truncated And Right Censored Lifetime Data, Yili Hong, William Q. Meeker, James D. Mccalley

James McCalley

Prediction of the remaining life of high-voltage power transformers is an important issue for energy companies because of the need for planning maintenance and capital expenditures. Lifetime data for such transformers are complicated because transformer lifetimes can extend over many decades and transformer designs and manufacturing practices have evolved. We were asked to develop statistically-based predictions for the lifetimes of an energy company’s fleet of high-voltage transmission and distribution transformers. The company’s data records begin in 1980, providing information on installation and failure dates of transformers. Although the dataset contains many units that were installed before 1980, there is no …


Song_Pccp(2017)_Theory_H2o+ + Hd.Pdf, Hongwei Song Jun 2017

Song_Pccp(2017)_Theory_H2o+ + Hd.Pdf, Hongwei Song

Yuntao Xu

No abstract provided.


Highly Directional Receiver And Source Antennas Using Photonic Band Gap Crystals, Rana Biswas, Gary L. Tuttle, Ekmel Ozbay, Burak Temelkuran, Mihail Sigalas, Kai-Ming Ho Jun 2017

Highly Directional Receiver And Source Antennas Using Photonic Band Gap Crystals, Rana Biswas, Gary L. Tuttle, Ekmel Ozbay, Burak Temelkuran, Mihail Sigalas, Kai-Ming Ho

Gary Tuttle

A directional antenna made with photonic band gap structures has been presented. The directional antenna is formed with two photonic band gap structures oriented back to back and separated from each other by a distance to form a resonant cavity between the photonic band gap structures. An antenna element is placed in the resonant cavity. The resonant frequency of the cavity is tuned by adjusting the distance between the photonic band gap structures. The resonant cavity can be asymmetrical or symmetrical.


Weak Anti-Localization And Quantum Oscillations Of Surface States In Topological Insulator Bi2se2te, Lihong Bao, Liang He, Nicholas R. Meyer, Xufeng Kou, Peng Zhang, Zhi-Gang Chen, Alexei V. Fedorov, Trevor M. Riedemann, Thomas A. Lograsso, Kang L. Wang, Gary Tuttle, Faxian Xiu Jun 2017

Weak Anti-Localization And Quantum Oscillations Of Surface States In Topological Insulator Bi2se2te, Lihong Bao, Liang He, Nicholas R. Meyer, Xufeng Kou, Peng Zhang, Zhi-Gang Chen, Alexei V. Fedorov, Trevor M. Riedemann, Thomas A. Lograsso, Kang L. Wang, Gary Tuttle, Faxian Xiu

Gary Tuttle

Topological insulators, a new quantum state of matter, create exciting opportunities for studying topological quantum physics and for exploring spintronic applications due to their gapless helical metallic surface states. Here, we report the observation of weak anti-localization and quantum oscillations originated from surface states in Bi2Se2Te crystals. Angle-resolved photoemission spectroscopy measurements on cleaved Bi2Se2Te crystals show a well-defined linear dispersion without intersection of the conduction band. The measured weak anti-localization effect agrees well with the Hikami-Larkin-Nagaoka model and the extracted phase coherent length shows a power-law dependence with temperature ( ∼T−0.44), indicating the presence of the surface states. …


Ferromagnetism Of Magnetically Doped Topological Insulators In Crxbi2− Xte3 Thin Films, Yan Ni, Z. Zhang, Ikenna C. Nlebedim, M. Ravi Hadimani, Gary L. Tuttle, David C. Jiles Jun 2017

Ferromagnetism Of Magnetically Doped Topological Insulators In Crxbi2− Xte3 Thin Films, Yan Ni, Z. Zhang, Ikenna C. Nlebedim, M. Ravi Hadimani, Gary L. Tuttle, David C. Jiles

Gary Tuttle

We investigated the effect of magnetic doping on magnetic and transport properties of Bi2Te3thin films. CrxBi2−xTe3 thin films with x = 0.03, 0.14, and 0.29 were grown epitaxially on mica substrate with low surface roughness (∼0.4 nm). It is found that Cr is an electron acceptor in Bi2Te3 and increases the magnetization of CrxBi2−xTe3. When x = 0.14 and 0.29,ferromagnetism appears in CrxBi2−xTe3 thin films, where anomalous Hall effect and weak localization of magnetoconductance were observed. The Curie temperature, coercivity, and remnant Hall resistance of thin films increase with increasing Cr concentration. The Arrott-Noakes plot demonstrates that the critical mechanism …


Winter Grazing Management, Stephen K. Barnhart, James R. Russell, Douglas L. Karlen, Michael J. Tidman Jun 2017

Winter Grazing Management, Stephen K. Barnhart, James R. Russell, Douglas L. Karlen, Michael J. Tidman

Douglas L Karlen

Why winter grazing? Beef cow herd and sheep flock records show that winter feeding costs are livestock producers' single largest production expense. Managing through winter weather while keeping feeding costs low is an essential part of maintaining a profitable operation. Iowa's climate generally allows forage growth only during a 7-to-8 month period. Extending the grazing of this forage--even an extra 3 or 4 weeks in late autumn and winter--is an economical way to maintain or increase livestock profitability. Some producers extend the grazing season by using stockpiled forage, whereas others use crop residue, and many combine the use of stockpiled …


Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis Jun 2017

Network Connection Blocker, Method, And Computer Readable Memory For Monitoring Connections In A Computer Network And Blocking The Unwanted Connections, Douglas W. Jacobson, James A. Davis

Douglas Jacobson

A network connection blocker for monitoring connections between host computers in a network and blocking the unwanted connections. The host computers transmit connection packets between each other in accordance with a network protocol suite when seeking to establish, providing network services with, and close the connections. The network protocol suite includes a connection oriented transport layer protocol. The network connection blocker comprises a network interface that receives the connection packets transmitted between the host computers. It also comprises a blocking module that processes the received connection packets to detect the unwanted connections. The blocking module then generates connection packets in …


Determining Graduation Rates In Engineering For Community College Transfer Students Using Data Mining, Marcia Laugerman, Diane T. Rover, Mack C. Shelley, Steven K. Mickelson Jun 2017

Determining Graduation Rates In Engineering For Community College Transfer Students Using Data Mining, Marcia Laugerman, Diane T. Rover, Mack C. Shelley, Steven K. Mickelson

Diane Rover

This study presents a unique synthesized set of data for community college students entering the university with the intention of earning a degree in engineering. Several cohorts of longitudinal data were combined with transcript-level data from both the community college and the university to measure graduation rates in engineering. The emphasis of the study is to determine academic variables that had significant correlations with graduation in engineering, and levels of these academic variables. The article also examines the utility of data mining methods for understanding the academic variables related to achievement in science, technology, engineering, and mathematics. The practical purpose …


The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover Jun 2017

The Engineering Admissions Partnership Program: A Navigation Strategy For Community College Students Seeking A Pathway Into Engineering, Marcia R. Laugerman, Mack C. Shelley, Steven K. Mickelson, Diane T. Rover

Diane Rover

This paper presents the evaluation of a program designed to improve transfer outcomes for community college students pursuing an engineering degree. The program, the Engineering Admissions Partnership Program (E-APP), was designed to improve the navigational success of community college transfer students through connections to the university. These connections include coordinated academic advising, peer-mentoring, campus visits, and online social and professional networks. The objective of the study is to determine the efficacy of the E-APP and its interventions, which will be measured by increased participation rates and increased university retention rates for E-APP participants. Outcome data for the students are analyzed …


Propensity Score Analysis With Matching Weights, Liang Li Jun 2017

Propensity Score Analysis With Matching Weights, Liang Li

Liang Li

The propensity score analysis is one of the most widely used methods for studying the causal treatment effect in observational studies. This paper studies treatment effect estimation with the method of matching weights. This method resembles propensity score matching but offers a number of new features including efficient estimation, rigorous variance calculation, simple asymptotics, statistical tests of balance, clearly identified target population with optimal sampling property, and no need for choosing matching algorithm and caliper size. In addition, we propose the mirror histogram as a useful tool for graphically displaying balance. The method also shares some features of the inverse …


A Simple Method To Estimate The Time-Dependent Roc Curve Under Right Censoring, Liang Li, Bo Hu, Tom Greene Jun 2017

A Simple Method To Estimate The Time-Dependent Roc Curve Under Right Censoring, Liang Li, Bo Hu, Tom Greene

Liang Li

The time-dependent Receiver Operating Characteristic (ROC) curve is often used to study the diagnostic accuracy of a single continuous biomarker, measured at baseline, on the onset of a disease condition when the disease onset may occur at different times during the follow-up and hence may be right censored. Due to censoring, the true disease onset status prior to the pre-specified time horizon may be unknown on some patients, which causes difficulty in calculating the time-dependent sensitivity and specificity. We study a simple method that adjusts for censoring by weighting the censored data by the conditional probability of disease onset prior …


An Adaptive Time Reduction Technique For Video Lectures, Sreenivas P. Shenoy, Ashish Amresh, John Femiani May 2017

An Adaptive Time Reduction Technique For Video Lectures, Sreenivas P. Shenoy, Ashish Amresh, John Femiani

Ashish Amresh

Lecture videos are a widely used resource for learning. A simple way to create videos is to record live lectures, but these videos end up being lengthy, include long pauses and repetitive words making the viewing experience time consuming. While pauses are useful in live learning environments where students take notes, we question the value of pauses in video lectures. Techniques and algorithms that can shorten such videos can have a huge impact in saving students' time and reducing storage space. We study this problem of shortening videos by removing long pauses and adaptively modifying the playback rate by emphasizing …


Evidence-Based-Review-Of-Academic-Web-Search-Engines-Preprint.Pdf, Jody C. Fagan 5609471 May 2017

Evidence-Based-Review-Of-Academic-Web-Search-Engines-Preprint.Pdf, Jody C. Fagan 5609471

Jody C Fagan

Academic web search engines have become central to scholarly research. While the fitness of Google Scholar for research purposes has been examined repeatedly, Microsoft Academic and Google Books have not received much attention. Recent studies have much to tell us about the coverage and utility of Google Scholar, its coverage of the sciences, and its utility for evaluating researcher impact. But other aspects have been woefully understudied, such as coverage of the arts and humanities, books, and non-Western, non-English publications. User research has also tapered off. A small number of articles hint at the opportunity for librarians to become expert …


High Rate Detection Of Volatile Products Using Differential Electrochemical Mass Spectrometry: Combining An Electrode-Coated Membrane With Hydrodynamic Flow In A Wall-Tube Configuration, Subramanian Venkatachalam, Robert J. Angelici, L. Keith Woo, Andrew C. Hillier May 2017

High Rate Detection Of Volatile Products Using Differential Electrochemical Mass Spectrometry: Combining An Electrode-Coated Membrane With Hydrodynamic Flow In A Wall-Tube Configuration, Subramanian Venkatachalam, Robert J. Angelici, L. Keith Woo, Andrew C. Hillier

Andrew C. Hillier

We present an experimental system that combines differential electrochemical mass spectrometry with hydrodynamic flow consisting of an impinging jet in a wall-tube configuration. This assembly allows simultaneous detection of electrochemical signals along with monitoring of dissolved gas species using differential electrochemical mass spectrometry under well-defined hydrodynamic conditions and over a wide range of mass transfer rates. The working electrode is deposited directly onto a thin, hydrophobic membrane, which also serves as the inlet to the mass spectrometer. This inlet provides extremely rapid mass detection as well as a high flux of products from the electrode surface into the mass spectrometer. …


A New Method For Measuring The Neutron Lifetime Using An In Situ Neutron Detector, Christopher L. Morris, Edith R. Adamek, Leah J. Broussard, Nathan B. Callahan, Stephen M. Clayton, Chris Cude-Woods, Scott A. Currie, Xiaoping Ding, Walter Fox, Kevin P. Hickerson, Mark A. Hoffbauer, Anthony T. Holley, A. Komives, Chen Y. Liu, Mark Makela, Robert W. Pattie, John C. Ramsey, Daniel J. Salvat, Alexander Saunders, Susan J. Seestrom, E. I. Sharapov, S. K. Sjue, Zhijing Tang, J. Vanderwerp, R. Bruce Vogelaar, Peter L. Walstrom, Zhehui Wang, Wanchun Wei, Judith W. Wexler, Tanner L. Womack, Andrew R. Young, B. A. Zeck May 2017

A New Method For Measuring The Neutron Lifetime Using An In Situ Neutron Detector, Christopher L. Morris, Edith R. Adamek, Leah J. Broussard, Nathan B. Callahan, Stephen M. Clayton, Chris Cude-Woods, Scott A. Currie, Xiaoping Ding, Walter Fox, Kevin P. Hickerson, Mark A. Hoffbauer, Anthony T. Holley, A. Komives, Chen Y. Liu, Mark Makela, Robert W. Pattie, John C. Ramsey, Daniel J. Salvat, Alexander Saunders, Susan J. Seestrom, E. I. Sharapov, S. K. Sjue, Zhijing Tang, J. Vanderwerp, R. Bruce Vogelaar, Peter L. Walstrom, Zhehui Wang, Wanchun Wei, Judith W. Wexler, Tanner L. Womack, Andrew R. Young, B. A. Zeck

Robert W. Pattie Jr.

In this paper, we describe a new method for measuring surviving neutrons in neutron lifetime measurements using bottled ultracold neutrons (UCN), which provides better characterization of systematic uncertainties and enables higher precision than previous measurement techniques. An active detector that can be lowered into the trap has been used to measure the neutron distribution as a function of height and measure the influence of marginally trapped UCN on the neutron lifetime measurement. In addition, measurements have demonstrated phase-space evolution and its effect on the lifetime measurement.


A Period Examination Through Contemporary Energy Analysis Of Kevin Roche’S Fine Arts Center At University Of Massachusetts-Amherst, L Carl Fiocchi Jr May 2017

A Period Examination Through Contemporary Energy Analysis Of Kevin Roche’S Fine Arts Center At University Of Massachusetts-Amherst, L Carl Fiocchi Jr

L. Carl Fiocchi

Studies of buildings belonging to a subset of Modernist architecture, Brutalism, have included discussions pertaining to social and architectural history, critical reception, tectonic form and geometry inspirations, material property selections, period technology limitations, and migration of public perceptions. Evaluations of Brutalist buildings’ energy related performances have been restricted to anecdotal observations with particular focus on the building type’s poor thermal performance, a result of the preferred construction method, i.e. monolithic reinforced concrete used as structure, interior finish and exterior finish. A valid criticism, but one that served to dismiss discussion that the possibility of other positive design strategies limiting energy …


Self-Assessment And Student Improvement In An Introductory Computer Course At The Community College Level, Jama Spicer-Sutton, James Lampley, Donald W. Good May 2017

Self-Assessment And Student Improvement In An Introductory Computer Course At The Community College Level, Jama Spicer-Sutton, James Lampley, Donald W. Good

Donald W. Good

Excerpt:The purpose of this study was to determine a student’s computer knowledge upon course entry and if there was a difference in college students’ improvement scores as measured by the difference in pretest and post‐test scores of new or novice users, moderate users, and expert users at the end of a college level introductory computing class.


Toy Model For Uncommon Spin–Orbit-Driven Spin-Torque Terms .Pdf, Raymond Walter, Charles Paillard, Surendra Singh, Brahim Dkhil, Laurent Bellaiche May 2017

Toy Model For Uncommon Spin–Orbit-Driven Spin-Torque Terms .Pdf, Raymond Walter, Charles Paillard, Surendra Singh, Brahim Dkhil, Laurent Bellaiche

Raymond Walter

A toy model combining the angular magneto electric (AME) coupling Hamitonian (Mondal et al 2015 Phys. Rev. B 92 100402) with long-range magnetic dipolar interactions is used
to investigate spin-torque phenomena in a magnetic spin valve. It is found that such model (1) gives rise to spin-torque expressions that are analogous in form to those of the common spin-transfer torques; but also (2) predicts additional spin-torque terms, which are generated by an electrical current oriented along unconventional, in-plane directions. The magnitude of the AME induced terms is estimated and the conditions under which they may contribute signi cantly are explored. 


Rank-Based Test Procedures For Interaction In The Two-Way Layout With One Observation Per Cell, Brad Hartlaub May 2017

Rank-Based Test Procedures For Interaction In The Two-Way Layout With One Observation Per Cell, Brad Hartlaub

Brad Hartlaub

ABSTRACT New aligned-rank test procedures for the composite null hypothesis of no interaction effects (without placing restrictions on the two main e#ects) against appropriate composite general alternatives are developed for the standard two-way layout with a single observation per cell. Relative power performances of the two new aligned-rank procedures and existing tests due to Tukey (1949) and de Kroon & van der Laan (1981) are examined via Monte Carlo simulation. Extensive power studies conducted on the 56and59two-way layouts with one observation per cell show superior performance of the new procedures for a variety of interaction e#ects. Simulated critical values for …