Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2498)
- Chemistry (1318)
- Physics (1078)
- Engineering (1076)
- Earth Sciences (875)
-
- Geology (669)
- Mathematics (649)
- Environmental Sciences (545)
- Statistics and Probability (545)
- Life Sciences (496)
- Oceanography and Atmospheric Sciences and Meteorology (410)
- Electrical and Computer Engineering (308)
- Applied Mathematics (276)
- Biochemistry, Biophysics, and Structural Biology (273)
- Biochemistry (245)
- Optics (212)
- Astrophysics and Astronomy (210)
- Information Security (200)
- Atmospheric Sciences (173)
- Operations Research, Systems Engineering and Industrial Engineering (153)
- Artificial Intelligence and Robotics (145)
- Social and Behavioral Sciences (143)
- Biostatistics (141)
- Computer Engineering (133)
- Software Engineering (129)
- Meteorology (126)
- Atomic, Molecular and Optical Physics (122)
- Medicine and Health Sciences (122)
- Civil and Environmental Engineering (116)
- Institution
-
- Air Force Institute of Technology (2216)
- Brigham Young University (1837)
- University of Wisconsin Milwaukee (872)
- University of South Carolina (805)
- Virginia Commonwealth University (691)
-
- University for Business and Technology in Kosovo (399)
- University of Texas Rio Grande Valley (364)
- University of North Dakota (347)
- Florida Institute of Technology (340)
- Illinois State University (109)
- Mississippi State University (103)
- Columbus State University (99)
- Rowan University (72)
- American University in Cairo (38)
- City University of New York (CUNY) (31)
- St. John's University (6)
- Nova Southeastern University (5)
- Pepperdine University (3)
- Utah State University (3)
- Texas A&M International University (1)
- Keyword
-
- Machine learning (152)
- Physical Sciences and Mathematics, Chemistry (84)
- #antcenter (80)
- Geology (70)
- Deep learning (65)
-
- Pure sciences (60)
- Machine Learning (58)
- Software engineering (49)
- Computer networks--Security measures (47)
- Synthesis (46)
- Chemistry (45)
- Computer security (44)
- Algorithms (43)
- Nanoparticles (41)
- Artificial intelligence (40)
- Simulation (38)
- Optimization (37)
- Mass spectrometry (36)
- Computer vision (35)
- Adaptive optics (34)
- Applied sciences (32)
- Image processing (32)
- Catalysis (31)
- Remote sensing (31)
- Neural networks (Computer science) (30)
- Bayesian (29)
- Physical Sciences and Mathematics, Mathematics (29)
- Classification (28)
- Security (27)
- Object-oriented programming (Computer science) (26)
- Publication Year
- File Type
Articles 6721 - 6750 of 8341
Full-Text Articles in Physical Sciences and Mathematics
Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers
Accelerating Missile Threat Engagement Simulations Using Personal Computer Graphics Cards, Sean E. Jeffers
Theses and Dissertations
The 453rd Electronic Warfare Squadron supports on-going military operations by providing battlefield commanders with aircraft ingress and egress routes that minimize the risk of shoulder or ground-fired missile attacks on our aircraft. To determine these routes, the 453rd simulates engagements between ground-to-air missiles and allied aircraft to determine the probability of a successful attack. The simulations are computationally expensive, often requiring two-hours for a single 10-second missile engagement. Hundreds of simulations are needed to perform a complete risk assessment which includes evaluating the effectiveness of countermeasures such as flares, chaff, jammers, and missile warning systems. Thus, the need for faster …
An Analysis Of Perturbed Quantization Steganography In The Spatial Domain, Matthew D. Spisak
An Analysis Of Perturbed Quantization Steganography In The Spatial Domain, Matthew D. Spisak
Theses and Dissertations
Steganography is a form of secret communication in which a message is hidden into a harmless cover object, concealing the actual existence of the message. Due to the potential abuse by criminals and terrorists, much research has also gone into the field of steganalysis - the art of detecting and deciphering a hidden message. As many novel steganographic hiding algorithms become publicly known, researchers exploit these methods by finding statistical irregularities between clean digital images and images containing hidden data. This creates an on-going race between the two fields and requires constant countermeasures on the part of steganographers in order …
Detection Of Bacillus Spores By Aptamer Selectivity Using Atomic Force Microscopy, Nina M. Houtkooper
Detection Of Bacillus Spores By Aptamer Selectivity Using Atomic Force Microscopy, Nina M. Houtkooper
Theses and Dissertations
The anthrax attack of Oct 2001 demonstrates the need for a rapid detector for spores of Bacillus anthracis (BA). Current technology requires cultures of BA to be grown for 24 hours. Using aptamers, a type of nucleic acid ligand selective for a target molecule, to select BA spores for measurement without culturing is a possible solution for quicker detection. An aptamer having a specially selected structure is expected to selectively bind to the surface of its target spore, separating it from other material. An atomic force microscopy (AFM) method was developed to test this selectivity. Aptamers having structure selected to …
An Evolutionary Algorithm To Generate Ellipsoid Detectors For Negative Selection, Joseph M. Shapiro
An Evolutionary Algorithm To Generate Ellipsoid Detectors For Negative Selection, Joseph M. Shapiro
Theses and Dissertations
Negative selection is a process from the biological immune system that can be applied to two-class (self and nonself) classification problems. Negative selection uses only one class (self) for training, which results in detectors for the other class (nonself). This paradigm is especially useful for problems in which only one class is available for training, such as network intrusion detection. Previous work has investigated hyper-rectangles and hyper-spheres as geometric detectors. This work proposes ellipsoids as geometric detectors. First, the author establishes a mathematical model for ellipsoids. He develops an algorithm to generate ellipsoids by training on only one class of …
Optical Detection Of Ultracold Neutral Calcium Plasmas, Elizabeth Ann Cummings
Optical Detection Of Ultracold Neutral Calcium Plasmas, Elizabeth Ann Cummings
Theses and Dissertations
We demonstrate an optical method to detect calcium ions in an ultracold plasma. We probe the plasma with a 397 nm laser beam tuned to a calcium ion transition. The probe laser beam is focused to a 160 µm waist allowing fine spatial resolution. Ions are detected by measuring fluorescence using a Photo-Multiplier Tube (PMT). The signal, an average of 4000 acquisitions, has a temporal resolution of 120 ns. We present the details of this method, potential improvements, and prospects of imaging the expanding plasma ions. We also present preliminary work on spatially resolved absorption measurements, as well as additional …
A Framework For Extraction Plans And Heuristics In An Ontology-Based Data-Extraction System, Alan E. Wessman
A Framework For Extraction Plans And Heuristics In An Ontology-Based Data-Extraction System, Alan E. Wessman
Theses and Dissertations
Extraction of information from semi-structured or unstructured documents, such as Web pages, is a useful yet complex task. Research has demonstrated that ontologies may be used to achieve a high degree of accuracy in data extraction while maintaining resiliency in the face of document changes. Ontologies do not, however, diminish the complexity of a data-extraction system. As research in the field progresses, the need for a modular data-extraction system that de-couples the various functional processes involved continues to grow.
In this thesis we propose a framework for such a system. The nature of the framework allows new algorithms and ideas …
Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill
Java Performance Of The Rijndael Encryption Algorithm Across Compilers And Virtual Machines, Gregory Leavitt Orgill
Theses and Dissertations
The Rijndael encryption algorithm has recently been published as the Advanced Encryption Standard (AES), a Federal Information Processing Standard, and is being accepted by developers and designers as the algorithm of choice where encryption is required. Java is becoming the language of choice for E-Business applications, many of which require cryptography. The performance of any Java application is dependent on the compiler and virtual machine used to compile and interpret. Prior research has provided performance information for the Rijndael algorithm in Java for specific virtual machines. This research includes the development of a Rijndael implementation in Java. Using Java system …
Computer-Simulation-Assisted Lean Manufacturing Training, Luoding Wang
Computer-Simulation-Assisted Lean Manufacturing Training, Luoding Wang
Theses and Dissertations
This thesis assesses the potential of using computer simulation to aid existing lean manufacturing training methods such as lecture and live simulation. An investigation of this possibility was carried out in conjunction with UMEP's Lean 101 class. In the study, two experimental computer simulation models demonstrating the push and pull production scenarios were constructed using ProModel software. Simulation models were equipped with a Visual Basic interface to aid trainees to manipulate the model via ActiveX. Constructed computer simulation was compared with live simulation to answer these research questions: 1. Was computer simulation able to teach additional lean concepts not covered …
The Effect Of Sample Size On Rapid Bioassessment Scores And Management Efficiency, Uttam Kumar Rai
The Effect Of Sample Size On Rapid Bioassessment Scores And Management Efficiency, Uttam Kumar Rai
Theses and Dissertations
The rapid bioassessment method for stream bio monitoring generally uses a fixed count of 200 macro invertebrates as the standard subsample size. This number has been argued to be too small to provide accurate estimates on the richness of macro invertebrate communities and is believed to give misleading information pertaining to stream health. In this study, I used data collected from multiple habitats from 29 streams located in several subecoregions of Georgia to examine how the rapid bioassessment scores perform across subsample sizes of 100, 200, and 300 organisms. Subsample sizes of 100 and 200 organisms were found to underestimate …
An Application Of Combinatorial Methods, Yingying Yang
An Application Of Combinatorial Methods, Yingying Yang
Theses and Dissertations
Probability theory is a branch of mathematics concerned with determining the long run frequency or chance that a given event will occur. This chance is determined by dividing the number of selected events by the number of total events possible, assuming these events are equally likely. Probability theory is simply enumerative combinatorial analysis when applied to finite sets. For a given finite sample space, probability questions are usually "just" a lot of counting. The purpose of this thesis is to provide some in depth analysis of several combinatorial methods, including basic principles of counting, permutations and combinations, by specifically exploring …
Measuring Community Consensus In Facial Characterization Using Spatial Databases And Fuzzy Logic, James Lee Mastros
Measuring Community Consensus In Facial Characterization Using Spatial Databases And Fuzzy Logic, James Lee Mastros
Theses and Dissertations
Spatial databases store geometric objects and capture spatial relationships that can be used to represent key features of the human face. One can search spatial databases for these objects, and seek the relationships between them, using fuzzy logic to provide a natural way to describe the human face for the purposes of facial characterization. This study focuses on community perception of short, average, or long nose length. Three algorithms were used to update community opinion of nose length. All three methods showed similar trends in nose length classification which could indicate that the effort to extract spatial data from images …
Fuzzy Membership Function Initial Values: Comparing Initialization Methods That Expedite Convergence, Stephanie Scheibe Lee
Fuzzy Membership Function Initial Values: Comparing Initialization Methods That Expedite Convergence, Stephanie Scheibe Lee
Theses and Dissertations
Fuzzy attributes are used to quantify imprecise data that model real world objects. To effectively use fuzzy attributes, a fuzzy membership function must be defined to provide the boundaries for the fuzzy data. The initialization of these membership function values should allow the data to converge to a stable membership value in the shortest time possible. The paper compares three initialization methods, Random, Midpoint and Random Proportional, to determine which method optimizes convergence. The comparison experiments suggest the use of the Random Proportional method.
Stm Studies Of Oxygen Etching Of Silicon Surfaces, Mary L. Willis
Stm Studies Of Oxygen Etching Of Silicon Surfaces, Mary L. Willis
Theses and Dissertations
This study uses atomic force microscopy (AFM) to investigate the oxygen etching behavior of the following silicon surface orientations: (001), (111), (113), (5 5 12) and (112). Most etching was performed at sample temperatures between 650 °C and 800 °C, at pressures of 3.3×10-7 and 1.5×10-7 Torr, and at an exposure of 200 L. Surface orientation strongly influences the morphology resulting from extended etching. The surface orientations that are stable against etching and remain flat include Si(001), Si(111), and Si(113). Such surfaces also include island structures, which result from etching around oxide-induced pinning sites. The density of these islands increases …
Attribute-Level Versioning: A Relational Mechanism For Version Storage And Retrieval, Charles Andrew Bell
Attribute-Level Versioning: A Relational Mechanism For Version Storage And Retrieval, Charles Andrew Bell
Theses and Dissertations
Data analysts today have at their disposal a seemingly endless supply of data and repositories hence, datasets from which to draw. New datasets become available daily thus making the choice of which dataset to use difficult. Furthermore, traditional data analysis has been conducted using structured data repositories such as relational database management systems (RDBMS). These systems, by their nature and design, prohibit duplication for indexed collections forcing analysts to choose one value for each of the available attributes for an item in the collection. Often analysts discover two or more datasets with information about the same entity. When combining this …
Afm And C-Afm Studies Of Gan Films, Katherine Cooper
Afm And C-Afm Studies Of Gan Films, Katherine Cooper
Theses and Dissertations
This thesis uses the techniques of atomic force microscope (AFM) and conductive AFM (C-AFM) to study the conduction properties of n-type GaN films. A total of 16 samples were examined and grouped according to their surface morphologies and conduction behaviors. The most common type of surface morpliology was that of Ga-rich samples having undulating "hillocks" with interspersed holes. Although most of the samples had this common morphology, their local conduction behaviors were not all similar. Local I-V spectra of the tip-sample Schottky contact could be grouped according to three major types: low leakage, high leakage, and "p-type". The highest quality …
Feedback Stabilization Of Inverted Pendulum Models, Bruce Cox
Feedback Stabilization Of Inverted Pendulum Models, Bruce Cox
Theses and Dissertations
Many mechanical systems exhibit nonlinear movement and are subject to perturbations from a desired equilibrium state. These perturbations can greatly reduce the efficiency of the systems. It is therefore desirous to analyze the asymptotic stabilizability of an equilibrium solution of nonlinear systems; an excellent method of performing these analyses is through study of Jacobian linearization's and their properties. Two enlightening examples of nonlinear mechanical systems are the Simple Inverted Pendulum and the Inverted Pendulum on a Cart (PoC). These examples provide insight into both the feasibility and usability of Jacobian linearizations of nonlinear systems, as well as demonstrate the concepts …
Carbon Monoxide Oxidation On Nanoparticle Catalysts And Gas Phase Reactions Of Small Molecules And Volatile Organics With Metal Cations, Khaled Mohammad Eqab Saoud
Carbon Monoxide Oxidation On Nanoparticle Catalysts And Gas Phase Reactions Of Small Molecules And Volatile Organics With Metal Cations, Khaled Mohammad Eqab Saoud
Theses and Dissertations
This dissertation demonstrates the application of a vapor phase method to synthesize supported and unsupported nanoparticle catalysts for CO oxidation. The method is based on the Laser Vaporization/Controlled Condensation (LVCC) technique. The first part of this dissertation presents the vapor phase synthesis and characterization of gold nanoparticles supported on a variety of oxide supports such as CeO2, TiO2, CuO and MgO.The results indicate that Au nanoparticles supported on CeO2 exhibit higher catalytic activity than Au supported on other oxides. The high activity of the Au/CeO2 catalyst is attributed to the strong interaction of Au with CeO2. The results also indicate …
Analysis Of Perturbation-Based Testing Methodology As Applied To A Real-Time Control System Problem, Richard A. Stutler
Analysis Of Perturbation-Based Testing Methodology As Applied To A Real-Time Control System Problem, Richard A. Stutler
Theses and Dissertations
Perturbation analysis is a software analysis technique used to study the tail function of a program by inserting an error into an executing program using data state mutation. The impact of this induced error on the output is then measured. This methodology can be used to evaluate the effectiveness of a given test set and in fact can be used as a means to derive a test set which provides coverage for a given program. Previous research has shown that there is a "coupling effect" such that test sets that identify simple errors will also identify more complex errors. Thus …
Integration Of Vmc++ Into A Commercial Treatment Planning System, Joseph Kingsley Gardner
Integration Of Vmc++ Into A Commercial Treatment Planning System, Joseph Kingsley Gardner
Theses and Dissertations
Recently, there has been interest to integrate VMC++ into the commercial treatment planning system at VCU as another Monte Carlo code option, since it has been shown to increase efficiency dramatically without introducing a significant amount of systematic error. Also, independent validation of VMC++ for photon beams is of interest since this has not been performed previously in literature. This study included several tests required to integrate VMC++. Output factor normalization was performed and found to agree with experiment to within 1% for all field sizes except 1x1 cm2. Geometric validation was successful. Dosimetric validation was performed with respect to …
Intelligent Autonomous Data Categorization, Edward Graham Finegan
Intelligent Autonomous Data Categorization, Edward Graham Finegan
Theses and Dissertations
The goal of this research was to determine if the results of a simple comparison algorithm (SCA) could be improved by adding a hyperspace analogue to language model of memory (HAL) layer to form NCA. The HAL layer provides contextual data that otherwise would be unavailable for consideration. It was found that NCA did improve the results when compared to SCA alone. However, NCA added complexity problems that limit its practicality. The complexity of this algorithm is On3 where n is equal to the number of unique symbols in the data. While there is a relativity reasonable soft upper bound …
Assessing Recharge And Discharge Across The Prairie Pothole Landscape: Application Of Spatial Hydrological Data And Statistical Analysis In A Groundwater Flow Model, Christopher D. Laveau
Assessing Recharge And Discharge Across The Prairie Pothole Landscape: Application Of Spatial Hydrological Data And Statistical Analysis In A Groundwater Flow Model, Christopher D. Laveau
Theses and Dissertations
Quantifying the spatial and temporal dynamics between groundwater recharge, discharge, and wetlands is a necessary step to develop effective water management strategies. Wetlands in the northern Great Plains play a role in flood control, water supply, and regional ecology. The water budget of a wetland in the northern prairies is often an unequal balance between moisture input and output in which the permanence of a wetland depends on its groundwater budget. Identifying and quantifying groundwater recharge and discharge zones has applications in predicting the spatial and temporal distribution of wetlands.
The current work involved the application of a groundwater model …
Geomechanics Applied To Reservoir Development In The Coso Geothermal Field, Andrew J. Nygren
Geomechanics Applied To Reservoir Development In The Coso Geothermal Field, Andrew J. Nygren
Theses and Dissertations
The Coso geothermal field is located approximately 220 kilometers north of Los Angeles, CA. In 2002, a project began to develop the east flank of the Coso geothermal field into an enhanced geothermal system (EGS); in such a system water is injected via injection well(s) into hot dry basement rock through naturally occurring or stimulated fractures. The injected water gathers heat from the reservoir rock before being extracted for direct use or energy production. To develop such a reservoir, adequate understanding of the reservoir geomechanics is necessary. This thesis investigates the state of stress and rock fractures, the existing permeable …
Isotopic Tracers As Evidence Of Denitrification In The Karlsruhe Aquifer, Eben J. Spencer
Isotopic Tracers As Evidence Of Denitrification In The Karlsruhe Aquifer, Eben J. Spencer
Theses and Dissertations
The Karlsruhe Aquifer of north-central North Dakota has experienced considerable nitrate contamination sparking an investigation by the North Dakota State Water Commission. Certain portions of the aquifer have experienced nitrate-N concentrations of up to seven times the drinking water standard. Although contamination is evident it is possible the NO₃¯ is naturally being eliminated by denitrification, whereby bacteria reduce NO₃¯ to nitrogen gas. Evidence of denitrification may be illustrated by accelerated reduction of NO₃¯ relative to the conservative tracer Cl¯ coupled with an increase in the heavy isotopes of 15N and 18O within the NO₃¯ ion. Such an increase is not …
Regional Stratigraphy Of The Newcastle Formation (Lower Cretaceous) In Eastern Montana And Western North Dakota, Adam J. Ulishney
Regional Stratigraphy Of The Newcastle Formation (Lower Cretaceous) In Eastern Montana And Western North Dakota, Adam J. Ulishney
Theses and Dissertations
The Newcastle Formation (Lower Cretaceous) consists of sandstone with interbedded shale, siltstone, and mudstone facies. This work shows that the regional stratigraphy of the unit is detailed enough for the interpretation of its depositional history and environments in eastern Montana. This work also illustrates the possible lowstand position of the Western Interior Seaway along with probable source areas providing sediments into the study area.
A total of 3446 geophysical wireline logs were used to determine formation tops of the Greenhorn, Mowry, Newcastle, Skull Creek, and Inyan Kara Formations. The log character of the Newcastle Formation was also described for all …
Hydrology Of The Springs, Seeps, And Fens At The Nature Conservancy's Pigeon Point Preserve, Ransom County, North Dakota, Corey W. Askin
Hydrology Of The Springs, Seeps, And Fens At The Nature Conservancy's Pigeon Point Preserve, Ransom County, North Dakota, Corey W. Askin
Theses and Dissertations
Pigeon Point lies along the Sheyenne River in the west-central part of the Sheyenne Delta Aquifer, southeastern North Dakota. Groundwater discharges along a north-facing bluff at Pigeon Point and forms springs, seeps, and fens 'hosting atypical boreal species. The Nature Conservancy owns 231 ha at Pigeon Point, a tract that also includes the largest and least disturbed spring-fed stream in the region as well as some of the finest riparian forest in the state. In response to possible future groundwater diversion, the objectives of this study are: 1) to characterize the Sheyenne Delta Aquifer up-gradient from Pigeon Point, 2) to …
Reevaluation Of Species Concepts Of Uppermost Cretaceous Unionidae (Mollusca: Bivalvia) : Hell Creek Formation, Montana, U.S.A., Marron J. Bingle
Reevaluation Of Species Concepts Of Uppermost Cretaceous Unionidae (Mollusca: Bivalvia) : Hell Creek Formation, Montana, U.S.A., Marron J. Bingle
Theses and Dissertations
Species are the basic units of life relative to taxonomy, and a practical definition of species is imperative to paleontology in order to promote reproducible, unambiguous criteria for accurately interpreting past species relationships. The need for a well-defined rubric for identifying species is evident in the freshwater mussel assemblage (Family Unionidae) in the Hell Creek Formation. The Hell Creek Formation unionid species were first described by Whitfield in 1903 and 1907. His descriptions were often based on differences of a single trait. In 197 6, Russell reevaluated the original species descriptions, I but still based the classification of species on …
Atomic Force Microscope Conductivity Measurements Of Single Ferritin Molecules, Degao Xu
Atomic Force Microscope Conductivity Measurements Of Single Ferritin Molecules, Degao Xu
Theses and Dissertations
Conductive Atomic Force Microscope (c-AFM) was used to measure the conductivity of single horse spleen ferritin (HoSF) and azotobacter vinelandii bacterial ferritin (AvBF) molecules deposited on flat gold surfaces. A 500 micron diameter gold ball was also used as a contact probe to measure the conductivity of a thin film of ferritin molecules. The average current measured for holo HoSF was 13 and 5 times larger than that measured for apo HoSF as measured by c-AFM at 1V and gold ball at 2V and respectively, which indicates that the core of ferritin is more conductive than the protein shell and …
Wave Scattering From Infinite Cylindrical Obstacles Of Arbitrary Cross-Section, Matthew B. Weber
Wave Scattering From Infinite Cylindrical Obstacles Of Arbitrary Cross-Section, Matthew B. Weber
Theses and Dissertations
In this work the scattering of an incident plane wave propagating along a plane perpendicular to the xy-plane is studied. The wave is scattered from an infinitely long cylindrical object of arbitrary cross-section. Due to the arbitrary geometry of the obstacle, a finite differences numerical method is employed to approximate the solution of the scattering problems. The wave equation is expressed in terms of generalized curvilinear coordinates. Boundary conforming grids are generated using elliptic grid generators. Then, a explicit marching in time scheme is implemented over these grids. It is found that as time grows the numerical solution converges to …
Hydrogeologic Model Of A Leachate Plume In An Unconfined Coastal Plain Aquifer And Chemical Transport Mechanisms Of Metals And Dense Non-Aqueous Phase Liquids, Thomas Lindblad
Theses and Dissertations
Groundwater contamination is of increasing environmental concern as many aquifers across the globe have experienced a decrease in water quality in recent time. The growth of the world's population over the last couple of decades has caused a dramatic increase in the rate of groundwater use. One potential source of groundwater contamination is waste material in landfills. The 1 st Division Road Sanitary landfill at Fort Benning Military Reservation was studied to evaluate the potential effect on local groundwater and a leachate plume was recognized using data from 16 groundwater monitoring wells located around the facility. The study site is …
Annotation Manager: An Automated Web-Based Content Management System For Digital Libraries With Annotated Bibliographies, Frenny Thomas
Annotation Manager: An Automated Web-Based Content Management System For Digital Libraries With Annotated Bibliographies, Frenny Thomas
Theses and Dissertations
With the expansion of the World Wide Web in the 90s, individuals (especially students) are always on a quest for information resources especially in the form of Web sites. Yet many of them are overwhelmed when faced with deciding which site will best suit their research needs. As a result, these individuals may select a resource for less than optimal reasons. To ease some of the burden, libraries have made great advances to provide a place to organize information resources. Such places are called library portals, and they typically provide a gateway to web resources by categorizing and annotating them …