Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Environmental Sciences (648)
- Physics (552)
- Computer Sciences (449)
- Chemistry (412)
- Earth Sciences (348)
-
- Life Sciences (324)
- Engineering (304)
- Mathematics (269)
- Oceanography and Atmospheric Sciences and Meteorology (198)
- Social and Behavioral Sciences (180)
- Education (167)
- Science and Mathematics Education (128)
- Water Resource Management (119)
- Natural Resources Management and Policy (114)
- Geology (112)
- Astrophysics and Astronomy (111)
- Natural Resources and Conservation (97)
- Physical Chemistry (93)
- Soil Science (86)
- Statistics and Probability (84)
- Computer Engineering (83)
- Arts and Humanities (79)
- Materials Science and Engineering (77)
- Materials Chemistry (74)
- Environmental Health and Protection (72)
- Agriculture (68)
- Applied Mathematics (67)
- Oceanography (66)
- Electrical and Computer Engineering (64)
- Institution
-
- University of Nebraska - Lincoln (476)
- TÜBİTAK (190)
- Selected Works (117)
- William & Mary (85)
- Old Dominion University (81)
-
- Chinese Chemical Society | Xiamen University (77)
- University of Wollongong (70)
- Department of Primary Industries and Regional Development, Western Australia (67)
- Utah State University (67)
- Air Force Institute of Technology (63)
- University of Northern Iowa (63)
- Dartmouth College (62)
- Missouri University of Science and Technology (61)
- The University of Maine (61)
- Claremont Colleges (60)
- University of Nevada, Las Vegas (47)
- University of New Hampshire (45)
- Wright State University (43)
- Chulalongkorn University (39)
- California Polytechnic State University, San Luis Obispo (38)
- Singapore Management University (37)
- Washington University in St. Louis (37)
- New Jersey Institute of Technology (36)
- University of Kentucky (35)
- Portland State University (34)
- Brigham Young University (32)
- SelectedWorks (32)
- Nova Southeastern University (30)
- University of Massachusetts Amherst (28)
- Virginia Commonwealth University (28)
- Keyword
-
- Western Australia (44)
- Groundwater (34)
- Geology (31)
- Salinity (31)
- Hydrology (29)
-
- Hydrogeology (28)
- Drainage (26)
- Towns (24)
- Flooding (23)
- Mathematics (21)
- Research and Technical Reports (19)
- Virginia (19)
- Physics (17)
- 2001 (15)
- Groundwater recharge (15)
- Water quality (14)
- Engineering (12)
- Chemistry (11)
- Chemistry and Biochemistry (11)
- Computer Science (11)
- Conservation (11)
- Emissions (11)
- Environment (11)
- Management (11)
- Atmospheric chemistry (10)
- Data (10)
- Ecology (10)
- Invasive species (10)
- Kentucky (10)
- Pollutants (10)
- Publication
-
- United States Department of Agriculture Wildlife Services: Staff Publications (97)
- Journal of Electrochemistry (77)
- Faculty Publications (71)
- Theses and Dissertations (70)
- Turkish Journal of Physics (65)
-
- Turkish Journal of Chemistry (62)
- Faculty of Informatics - Papers (Archive) (59)
- Electronic Theses and Dissertations (55)
- Journal of the Iowa Academy of Science: JIAS (52)
- Dissertations, Theses, and Masters Projects (39)
- Thai Environment (39)
- Turkish Journal of Mathematics (38)
- All Computer Science and Engineering Research (35)
- Research Collection School Of Computing and Information Systems (35)
- Dartmouth Scholarship (34)
- Physics Faculty Publications (34)
- Physics Faculty Research & Creative Works (34)
- Reports (33)
- Resource management technical reports (33)
- Humanistic Mathematics Network Journal (31)
- 2001 Bird Strike Committee-USA/Canada, Third Joint Annual Meeting, Calgary, AB (29)
- Theses (29)
- Dissertations (28)
- Conference on Applied Statistics in Agriculture (24)
- Department of Earth and Atmospheric Sciences: Faculty Publications (23)
- United States Geological Survey: Staff Publications (23)
- All HMC Faculty Publications and Research (22)
- Center for Coastal and Ocean Mapping (21)
- Department of Computer Science Technical Reports (21)
- Kenneth Bloom Publications (21)
- Publication Type
- File Type
Articles 1531 - 1560 of 3030
Full-Text Articles in Physical Sciences and Mathematics
Development Of Sarcocystis Falcatula In Its Intermediate Host, The Brown-Headed Cowbird (Molothrus Ater), Shannon L. Luznar, Michael L. Avery, John B. Dame, Robert J. Mackay, Ellis C. Greiner
Development Of Sarcocystis Falcatula In Its Intermediate Host, The Brown-Headed Cowbird (Molothrus Ater), Shannon L. Luznar, Michael L. Avery, John B. Dame, Robert J. Mackay, Ellis C. Greiner
United States Department of Agriculture Wildlife Services: Staff Publications
Sporocysts of Sarcocystis falcatula obtained from experimentally infected Virginia opossums (Didelphis virginiana) were inoculated orally to 60 wild-caught Brown-headed Cowbirds (Molothrus ater). Another 30 Brown-headed Cowbirds were not challenged and served as uninfected controls. Two inoculated and one control cowbird were necropsied every 2 weeks and the pectoral and thigh muscles were examined grossly for cyst development. Stained histologic sections of pectoral muscle, thigh muscle, and lung were examined by light microscopy and presence, density, and size of sarcocysts were determined. Sarcocysts were present by 6 weeks post-inoculation (PI) and were still growing at …
Bear Behavior In The Vicinity Of Supplemental Feeding Stations In Western Washington, Dale L. Nolte, Timothy J. Veenendaal, George J. Ziegltrum, Philipp Fersterer
Bear Behavior In The Vicinity Of Supplemental Feeding Stations In Western Washington, Dale L. Nolte, Timothy J. Veenendaal, George J. Ziegltrum, Philipp Fersterer
United States Department of Agriculture Wildlife Services: Staff Publications
Black bear can inflict severe negative Impacts on timber stands in the northwestern United States. A supplemental feeding program to provide bears an alternative food source during spring is practiced in the stat e of Washington, and to a lesser extent in other states. We initiated concurrent studies to assess characteristics of bear that forage at feeding stations, the interactions of bears around feeders, and impacts of the program on bear territories. Numerous bears fed at stations, including females with and without cubs, yearlings. and males. Bear feeding bouts at stations were generally short, less than 15 minutes. Bears generally …
A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett
A Process For Vectoring Offensive Information Warfare As A Primary Weapon Option Within The United States Air Force, Sheila G. Bennett
Theses and Dissertations
Consistently and comprehensively using Information Operations (IO) capabilities as primary weapon option within the Air Force is the next step to operationalizing IO within the Air Force. Doctrine and official guidance has set the variables of mission and concepts of operations, organizational structure, and IW players in place. The missing variable to operationalizing IO and probably the most difficult is the 'how' or process of the equation. This research will introduce a useable process that can be incorporated within the Air Force for integrating offensive IW activities into the current and given environment. The process is the basis for further …
Dissolution Of Chromium From Inhalable Primer Paint Particles Into A Simulated Lung Fluid, David A. Kauth
Dissolution Of Chromium From Inhalable Primer Paint Particles Into A Simulated Lung Fluid, David A. Kauth
Theses and Dissertations
The use of chromate as a corrosion inhibitor in primer paint is an essential component for the protection of aluminum-skinned aircraft and the primary source of hexavalent chromium (Cr (VI)) exposure to USAF aircraft painters. The objective of this research was to quantify the dissolution of chromate from freshly sprayed paint particles into a simulated lung fluid (SLF). Two primer paints were sprayed with a paint spray gun to generate overspray particles for collection into impingers filled with SLF. Particles were allowed to soak in SLF for 24 and 48 hours and then the particles were removed by centrifugation. The …
Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen
Malicious Hackers: A Framework For Analysis And Case Study, Laura J. Kleen
Theses and Dissertations
Recent years have seen an increase in the number and severity of Information Operations (IO) attacks upon DoD resources. At a higher level, the US as a whole has come under cyber attack by individuals and groups seeking thrills, monetary gain, publicity for their causes, and myriad other goals. This effort develops a first cut model of individual hacker mentality that can be utilized to improve threat assessment, mitigate Information Assurance (IA) vulnerabilities, and improve risk assessment. Further, it is a first step toward automated characterization of Information Warfare (IW) attacks based upon hacker types. All hackers are not the …
Scripting Maine’S Environmentalist Majority: The “Theater Of Oil,” 1968-1975, Christopher S. Beach
Scripting Maine’S Environmentalist Majority: The “Theater Of Oil,” 1968-1975, Christopher S. Beach
Maine History
Christopher Beach argues that Maine's contemporary environmental movement was created in the late 1960s when oil companies seeking sites for new refineries and tanker ports saw the Maine coast as ideally situated for expansion: close to southern New England and the mid-Atlantic coast, but relatively undeveloped and in need of economic re-energizing or so they thought. Hearings and conflict among fishers, state and local officials and politicians, residents (seasonal and permanent) and environmentalists created a long-term debate that in turn spawned a new understanding of Maine as a pastoral landscape for the modern world. Christopher Beach received his J.D. from …
New Solvable Singular Potentials , R. Dutt, Asim Gangopadhyaya, C. Rasinariu, Uday P. Sukhatne
New Solvable Singular Potentials , R. Dutt, Asim Gangopadhyaya, C. Rasinariu, Uday P. Sukhatne
Physics: Faculty Publications and Other Works
We obtain three new solvable, real, shape invariant potentials starting from the harmonic oscillator, Pöschl-Teller I and Pöschl-Teller II potentials on the half-axis and extending their domain to the full line, while taking special care to regularize the inverse square singularity at the origin. The regularization procedure gives rise to a delta-function behavior at the origin. Our new systems possess underlying non-linear potential algebras, which can also be used to determine their spectra analytically.
Analysis Of Cloud-To-Ground Lightning Clusters With Radar Composite Imagery, Rhonda B. Scott
Analysis Of Cloud-To-Ground Lightning Clusters With Radar Composite Imagery, Rhonda B. Scott
Theses and Dissertations
The most recent research conducted at the Air Force Institute of Technology involved studying a large volume of lightning data without coupling radar imagery (Parsons 2000). Parsons finding could not be acted on because no individual storms were studied. The primary goal of this research is to determine whether the techniques used by Parsons can be applied to storms by examining the radar imagery and lightning data. This research used the methodology applied to lightning data by Parsons and radar imagery to determine whether the location of lightning clusters were located near storms. A composite reflectivity radar image was generated …
The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey
The Effect Of Contextual-Based Training On Artifact-Based Deception Detection, Elizabeth A. Autrey
Theses and Dissertations
Air Force dependence on information technology (IT) creates vulnerabilities that it cannot ignore. With global availability of commercial IT and the Internet, the Air Force does not necessarily have the high technological advantage over potential adversaries that it once had. Furthermore, it is possible to directly and covertly manipulate information within information systems, or artifacts, without notice. This directly affects decision makers since the availability and integrity of information is critical. Air Force physical and network security measures taken to protect its information do not guarantee detection of direct information manipulation. This leaves it to information artifact users to detect …
Photoluminescence Of Single Quantum Well Structures In Gallium Arsenide, Christian A. Bartholomew
Photoluminescence Of Single Quantum Well Structures In Gallium Arsenide, Christian A. Bartholomew
Theses and Dissertations
The continued development of state-of the-art semiconductor technologies and devices by the United States Air Force and the Department of Defense requires accurate and efficient techniques to evaluate and model these new materials. Of particular interest to the Air Force are quantum well structures which can be used for small-scale laser sources in fly-by-light applications, as efficient infrared countermeasures to heat-seeking missiles, or as advanced seekers in optically guided missiles. This thesis provides the initial experimental procedures and data necessary to begin producing accurate yet robust models. Although carrier effective masses could not be evaluated using hot-electron photoluminescence, photoluminescence excitation …
A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner
A Semantic Interface To Scenario Component Reuse In Dod Simulation Systems, Lawrence A. Breighner
Theses and Dissertations
The Department of Defense utilizes various simulation systems to model employment of forces and weapons systems in operational environments. The data files that model these environments and weapons systems are extremely large and complex, and require many person-hours to develop. Compounding the problem, these data files are distributed across multiple systems in a heterogeneous environment. Currently, there is no automated means of identifying and retrieving reusable portions of these files for reuse in a new scenario under development. This work develops a multi-agent system that catalogs the files, and provides the user with a means of identifying and retrieving reusable …
Optimization Of Palladium-Catalyzed In Situ Destruction Of Trichloroethylene-Contaminated Groundwater Using A Genetic Algorithm, Manuel Fernandez
Optimization Of Palladium-Catalyzed In Situ Destruction Of Trichloroethylene-Contaminated Groundwater Using A Genetic Algorithm, Manuel Fernandez
Theses and Dissertations
Conventional technologies for the treatment of groundwater contaminated with chlorinated solvents have limitations that have motivated development of innovative technologies. One such technology currently under development involves using palladium-on-alumina (Pd/Al) as a catalyst to promote dechlorination. Pd/Al catalyst may be used in-well as part of a re-circulating horizontal flow treatment well (HFTW) system. An HFTW system involves two or more dual-screened wells, with in-well reactors, to capture and treat contaminated groundwater without the need to pump the water to the surface. In this study, objective and fitness functions, based on system costs and TCE concentration requirements, were developed to optimize …
Control And Characterization Of Line-Addressable Micromirror Arrays, Harris J. Hall
Control And Characterization Of Line-Addressable Micromirror Arrays, Harris J. Hall
Theses and Dissertations
This research involved the design and implementation of a complete line-addressable control system for a 32x32 electrostatic piston-actuated micromirror array device. Line addressing reduces the number of control lines from N2 to 2N making it possible to design larger arrays and arrays with smaller element sizes. The system utilizes the electromechanical bi-stability of individual elements to bold arbitrary bi-stable phase patterns. The control system applies pulse width modulated (PWM) signals to the rows and columns of the micromirror array. Three modes of operation were conceived and built into the system. The first was the traditional signal scheme which requires …
A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten
A Traffic Pattern-Based Comparison Of Bulk Image Request Response Times For A Virtual Distributed Laboratory, David B. Hooten
Theses and Dissertations
Various agencies throughout the Department of Defense possess intelligence imagery and electrooptical signature data required by researchers in the field of automatic target recognition (ATR). The Air Force Research Laboratory, Sensors Directorate, as been tasked with creating a virtual distributed laboratory (VDL) which will make this data available to ATR researchers via high speed networks such as the defense research and engineering network (DREN). For this research, a model for simulating potential operational network configurations and collaboration scenarios was developed and implemented using OPNET. The results of the simulations were analyzed using statistical methods to determine the impact on performance …
Validation And Characterization Of Ionospheric Densities Measured By Dmsp, Herbert L. Keyser
Validation And Characterization Of Ionospheric Densities Measured By Dmsp, Herbert L. Keyser
Theses and Dissertations
Future models of the thermosphere-ionosphere-magnetosphere system will require near real-time assimilation of ionospheric parameters to specify% and forecast these regions One of the current sensors that will be used in the GAIM model is the DMSP SSIES. Knowledge of the SSIES's reliability and data characteristics is key to using the data when relying on automated processes to ingest the data. To validate the DMSP value, the DMSP-measured density is compared to ground-based ISR measurements from solar minimum to solar maximum. The DMSP data are compared to data from the ISRs located at the Millstone Hill Observatory in Massachusetts and Sondrestrom …
Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley
Selecting A Software Engineering Methodology Using Multiobjective Decision Analysis, Scott A. O'Malley
Theses and Dissertations
With the emergence of agent-oriented software engineering methodologies, software developers have a new set of tools to solve complex software requirements. One problem software developers face is to determine which methodology is the best approach to take to developing a solution. A number of factors go into the decision process. This thesis defines a decision making process that can be used by a software engineer to determine whether or not a software engineering approach is an appropriate system development strategy. This decision analysis process allows the software engineer to classify and evaluate a set of methodologies while specifically considering the …
Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk
Using A Distributed Object-Oriented Database Management System In Support Of A High-Speed Network Intrusion Detection System Data Repository, Phillip W. Polk
Theses and Dissertations
The Air Force has multiple initiatives to develop data repositories for high-speed network intrusion detection systems (IDS). All of the developed systems utilize a relational database management system (RDBMS) as the primary data storage mechanism. The purpose of this thesis is to replace the RDBMS in one such system developed by AFRL, the Automated Intrusion Detection Environment (AIDE), with a distributed object-oriented database management system (DOODBMS) and observe a number of areas: its performance against the RDBMS in terms of IDS event insertion and retrieval, the distributed aspects of the new system, and the resulting object-oriented architecture. The resulting system, …
Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker
Determining The Value Of Groundwater Contamination Source Removal: A Methodology, Benjamin C. Recker
Theses and Dissertations
Subsurface contamination by industrial chemicals is one of the most prevalent and costly environmental problems facing the United States government. This contamination problem must be managed to protect human health and the environment. Two basic strategies are used to deal with subsurface contamination: source removal and contaminant containment. While much cost and performance data are available for individual technologies associated with each of these strategies, there have been very few studies that have examined the benefits of implementing source removal technologies in order to reduce contaminant containment (and hopefully total) costs. This study examines the tradeoff between extent of source …
Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder
Effects On The Red-Cockaded Woodpecker From Various Spatial And Temporal Applications Of Management Practices, Chad F. Schroeder
Theses and Dissertations
The Red-Cockaded Woodpecker (RCW) is an endangered species endemic to southeastern pine forests in the United States. RCWs are cooperative breeding birds that live together in clusters of old-growth pine trees in which they construct their nesting cavities. The cavities are constructed in living pines, which are predominantly longleaf pines. RCWs also forage upon older pines, preferably longleaf pine. The Endangered Species Act, along with other DoD regulations, requires DoD installations to protect the RCWs and restore their habitat. A popular management practice converts off-site (non-native) pines back to a region's indigenous pines. Conversion provides the best long term RCW …
Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman
Transforming Analysis Models Into Design Models For The Multiagent Engineering Systems (Mase) Methodology, Clint H. Sparkman
Theses and Dissertations
Agent technology has received much attention in the last few years because of the advantages that multiagent systems have in complex, distributed environments. For multiagent systems are to be effective, they must be reliable, robust, and secure. AFIT's Agent Research Group has developed a complete lifecycle methodology, called Multiagent Systems Engineering (MaSE), for analyzing, designing, and developing heterogeneous multiagent systems. However, developing multiagent systems is a complicated process, and there is no guarantee that the resulting system meets the initial requirements and will operate reliably with the desired behavior. The purpose of this research was to develop a semi-automated formal …
The Effects Of Budgetary Constraints, Multiple Strategy Selection, And Rationality On Equilibrium Attainment In An Information Warfare Simulation, Steven W. Tait
Theses and Dissertations
Information warfare (IW) has developed into a significant threat to the national security of the United States. Our critical infrastructures, linked together by information systems, are increasingly vulnerable to information attack. This study seeks to understand some of those factors which affect the ability of an individual to make accurate decisions in an IW environment. The study used game theory to analyze the behavior of decision-makers within an IW simulation. The IW game model is based on a set of games known as infinitely repeated games of incomplete information. It uses the Bayesian Nash equilibrium concept to determine the strategy …
Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas
Multicast Algorithms For Mobile Satellite Communication Networks, Ryan W. Thomas
Theses and Dissertations
With the rise of mobile computing and an increasing need for ubiquitous high speed data connections, Internet-in-the-sky solutions are becoming increasingly viable. To reduce the network overhead of one-to-many transmissions, the multicast protocol has been devised. The implementation of multicast in these Low Earth Orbit (LEO) constellations is a critical component to achieving an omnipresent network environment. This research examines the system performance associated with two terrestrial-based multicast mobility solutions, Distance Vector Multicast Routing Protocol (DVMRP) with mobile IP and On Demand Multicast Routing Protocol (ODMRP). These protocols are implemented and simulated in a six plane, 66 satellite LEO constellation. …
An Optical Survey Of Outlying Ejecta In Cassiopeia A: Evidence For A Turbulent, Asymmetric Explosion, Robert A. Fesen
An Optical Survey Of Outlying Ejecta In Cassiopeia A: Evidence For A Turbulent, Asymmetric Explosion, Robert A. Fesen
Dartmouth Scholarship
A deep optical survey of the Cassiopeia A supernova remnant has revealed dozens of new emissionline ejecta knots out beyond the remnantÏs bright nebular shell. Most of the newly detected knots exhibit a 4500È 7500 A. spectrum dominated by [N II ] jj 6548,6583 line emissions. After accounting for possible decelerations, the estimated space velocities for about four dozen of these [N II ] knots suggest a nearly isotropic ^ 10,000 km s~1 ejection velocity. However, a small group along the southwestern limb show signi‹cantly higher velocities of up to 12,000 km s~1 . Over 20 outlying O] S emission …
Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle
Atmospheric Conditions Associated With Lightning During Snow And Ice Events, Randall J. Haeberle
Theses and Dissertations
The purpose of this research was to find the atmospheric mechanisms associated with lightning in snow and ice events. The specific mechanisms that were examined were low-level wind shear, upper level divergence, surface temperature, low-level temperature, the -10 ° C level, and precipitable water. A chi-squared dependency test showed the strong association of low-level wind shear to each precipitation type (snow, sleet/freezing rain, rain) in two separate studies. Surface temperature appeared to have a relationship to lightning in all precipitation categories, while no significant relationship to lightning in all precipitation categories, while no significant relationship was found with upper level …
Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser
Simulating Wet Deposition Of Radiocesium From The Chernobyl Accident, Aaron M. Kinser
Theses and Dissertations
In response to the Chernobyl nuclear power plant accident of 1986, a cesium-137 deposition dataset was assembled. Most of the airborne Chernobyl cesium was wet deposited, either via interception by falling raindrops or via absorption into cloud droplets destined to become raindrops. The Hybrid Single-Particle Lagrangian rated Transport (HYSPLIT) model, developed at Air Resources Laboratory, is used to simulate the transport and deposition of Chernobyl cesium-137. A cloud base parameterization modification is tested and appears to slightly improve the accuracy of one HYSPLIT simulation of daily Chernobyl cesium-137 deposition over the course of the accident at isolated European sites, and …
Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood
Attenuation And Refraction Of An Electromagnetic Wave In An Electron Beam Generated Plasma, Nathaniel P. Lockwood
Theses and Dissertations
Artificially generated plasmas may be employed to alter the propagation characteristics of electromagnetic waves. The purpose of this report is to study the propagation of electromagnetic waves in an electron beam generated plasma. To understand the physics related to this concept requires the development of computational tools dealing with a plasma created by an electron beam, an assessment of the temporal and spatial evolution of the plasma, and a characterization of the refraction and attenuation of electromagnetic (EM) waves in a collisional plasma. Three computer programs were developed to characterize the effectiveness of an electron beam generated plasma in refracting …
Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson
Gss Technology As A Moderator Of Influence And Perceived Expertise, Kevin V. Thompson
Theses and Dissertations
Group Support System (355) research has found this content and process anonymity influence problem solving groups. However, previous studies report mixed results on how OSS technology changes social influence processes and recognition of expertise which affect group performance. This thesis explored content and process anonymity's affect on influence and perceived expertise using three treatments to derive possible explanations for the mixed results found in previous GSS research. The study developed a theoretical model of influence, perceived expertise, and performance. Using structural equation modeling the study tested the relationships between expertise and participation rates, and overall group performance. An experiment was …
An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga
An Objective Evaluation Of Four Sar Image Segmentation Algorithms, Jason B. Gregga
Theses and Dissertations
Because of the large number of SAR images the Air Force generates and the dwindling number of available human analysts, automated methods must be developed. A key step towards automated SAR image analysis is image segmentation. There are many segmentation algorithms, but they have not been tested on a common set of images, and there are no standard test methods. This thesis evaluates four SAR image segmentation algorithms by running them on a common set of data and objectively comparing them to each other and to human segmentors. This objective comparison uses a multi-metric a approach with a set of …
A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala
A Low Power Application-Specific Integrated Circuit (Asic) Implementation Of Wavelet Transform/Inverse Transform, Daniel N. Harvala
Theses and Dissertations
A unique ASIC was designed implementing the Haar Wavelet transform for image compression/decompression. ASIC operations include performing the Haar wavelet transform on a 512 by 512 square pixel image, preparing the image for transmission by quantizing and thresholding the transformed data, and performing the inverse Haar wavelet transform, returning the original image with only minor degradation. The ASIC is based on an existing four-chip FPGA implementation. Implementing the design using a dedicated ASIC enhances the speed, decreases chip count to a single die, and uses significantly less power compared to the FPGA implementation. A reduction of RAM accesses was realized …
Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry
Use Of Quantum Mechanical Calculations To Investigate Small Silicon Carbide Clusters, Jean W. Henry
Theses and Dissertations
Density Functional Theory (DFT) method was employed to model silicon carbide small clusters. Comparing the DFT calculation results with experimental results that observed by using photoelectron spectroscopy (PES), DFT predicts the same structures that experiment observed. For electron affinity, DFT results are in good agreement with experimental results, the root mean square negative offset 0.1 eV found using medium size of basis set (cc-pVDZ+) calculation. DFT results for vibrational frequencies are in good agreement with experiment results; the root mean square error is 72.5 cm-1 wave number. 16 ground state structures of SimCn (m ≤ 4, …