Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2004

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2221 - 2250 of 4447

Full-Text Articles in Physical Sciences and Mathematics

Phoneme-Based Transliteration Of Foreign Names For Oov Problem, Wei Gao, Kam-Fai Wong, Wai Lam Mar 2004

Phoneme-Based Transliteration Of Foreign Names For Oov Problem, Wei Gao, Kam-Fai Wong, Wai Lam

Research Collection School Of Computing and Information Systems

A proper noun dictionary is never complete rendering name translation from English to Chinese ineffective. One way to solve this problem is not to rely on a dictionary alone but to adopt automatic translation according to pronunciation similarities, i.e. to map phonemes comprising an English name to the phonetic representations of the corresponding Chinese name. This process is called transliteration. We present a statistical transliteration method. An efficient algorithm for aligning phoneme chunks is described. Unlike rule-based approaches, our method is data-driven. Compared to source-channel based statistical approaches, we adopt a direct transliteration model, i.e. the direction of probabilistic estimation …


Student Explorations Of Quantum Effects In Leds And Luninescent Devices, Lawrence Escalada, N. Sanjay Rebekki, Dean A. Zollman Mar 2004

Student Explorations Of Quantum Effects In Leds And Luninescent Devices, Lawrence Escalada, N. Sanjay Rebekki, Dean A. Zollman

Faculty Publications

We developed activity-based instructional units to introduce basic quantum principles to students with limited physics and mathematics backgrounds. To emphasize the practical applications of contemporary physics, we introduced concepts using the contexts of light-emitting devices such as light-emitting diodes (LEDs), fluorescent lamps, and glow-in-the-dark toys. As our standard of living becomes more dependent on the latest developments in science and technology, our students' literacy must be at a level that enables them to make educated decisions on science- and technology-related issues and their everyday applications. Students need to have at least a basic understanding of 20th-century physics and its applications …


Neutron Cross Sections For He-3 At Epithermal Energies, C. D. Keith, Z. Chowdhuri, D. R. Rich, W. M. Snow, J. D. Bowman, S. L. Penttila, D. A. Smith, M. B. Leuschner, V. R. Pomeroy, Gordon L. Jones, E. I. Sharapov Mar 2004

Neutron Cross Sections For He-3 At Epithermal Energies, C. D. Keith, Z. Chowdhuri, D. R. Rich, W. M. Snow, J. D. Bowman, S. L. Penttila, D. A. Smith, M. B. Leuschner, V. R. Pomeroy, Gordon L. Jones, E. I. Sharapov

Articles

High accuracy, absolute measurements of the neutron total cross section for He-3 are reported for incident neutron energies 0.1-400 eV. The measurements were performed at the LANSCE short-pulse neutron spallation source. Using the previously determined cross section for neutron elastic scattering, 3.367+/-0.019 b, we extract a new value for the energy dependence of the He-3(n,p)He-3 reaction cross section, sigma(np)=(849.77+/-0.14+/-1.02)E-1/2-(1.253+/-0.00+/-(+0.008)(-0.049))b, where the neutron energy is expressed in eV. The first uncertainty is statistical, the second systematic.


The Second Law Mystique, Alexey V. Nikulov, D. P. Sheehan Mar 2004

The Second Law Mystique, Alexey V. Nikulov, D. P. Sheehan

Physics and Biophysics: Faculty Scholarship

No abstract provided.


Modeling A Field Application Of In Situ Bioremediation Of Perchlorate-Contaminated Groundwater Using Horizontal Flow Treatment Wells (Hftws), Peter G. Chosa Mar 2004

Modeling A Field Application Of In Situ Bioremediation Of Perchlorate-Contaminated Groundwater Using Horizontal Flow Treatment Wells (Hftws), Peter G. Chosa

Theses and Dissertations

Perchlorate contaminated groundwater is rapidly becoming a significant environmental remediation issue for the Department of Defense. In this study, an existing numerical model that simulates the operation of a Horizontal Flow Treatment Well (HFTW) system to effect the in situ biodegradation of perchlorate through the addition of an electron donor is modified to include a submodel that describes bioclogging. Bioclogging restricts flow out of the HFTW due to the accumulation of biomass directly adjacent to the well. The modified model is then applied to an existing perchlorate contaminated site that will be used for an evaluation of the HFTW technology. …


An Evaluation Of Vegetated Roofing Technology: Application At Air Force Plant Four, Building 15, Benjamin J. Morgan Mar 2004

An Evaluation Of Vegetated Roofing Technology: Application At Air Force Plant Four, Building 15, Benjamin J. Morgan

Theses and Dissertations

The United States Air Force maintains thousands of facilities around the world. Many of these facilities have asphalt built up roofs or some other less than sustainable roofing system. In an effort to find roofing systems suitable for Air Force facilities that are both economically and environmentally friendly, this thesis investigated vegetated roofing as a possible alternative to conventional roofing systems. While vegetated roofs are a relatively new roofing system, they exhibit performance qualities that seem to be in line with Air Force needs. An investigation into the feasibility of vegetated roofing technology revealed that this roofing system has many …


Application Of Horizontal Flow Treatment Wells For In Situ Treatment Of Mtbe-Contaminated Groundwater, Preston F. Rufe Mar 2004

Application Of Horizontal Flow Treatment Wells For In Situ Treatment Of Mtbe-Contaminated Groundwater, Preston F. Rufe

Theses and Dissertations

This study utilized a three-dimensional numerical model to evaluate the potential application of HFTWs to manage MTBE-contaminated groundwater. HFTWs consist of two dual-screened treatment wells. One well operates in an upflow mode, with MTBE-contaminated water extracted from an aquifer through a screen in the deep portion of an aquifer and injected into the aquifer through a shallow well screen, while the adjacent well operates in a downflow mode, extracting water from the shallow zone of the aquifer and injecting it into the deep zone. As the MTBE-contaminated water flows through the wells, an electron acceptor and/or another electron donor is …


Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver Mar 2004

Investigation Of Geobase Implementation Issues: Case Study Of Information Resource Management, Mario L. Oliver

Theses and Dissertations

Billions of dollars have been wasted on failed information system (IS) projects over the last decade in the private and public sectors. More specifically, the tri-service environment of the U.S. military has not implemented a single successful geospatial IS (GIS). The lack of a service-wide insertion process for GIS was cited as the most significant cause for military GIS failures. GeoBase represents the USAF's most recent GIS implementation. The GeoBase program focuses on Information Resource Management (IRM) and cultural issues. The GeoBase Sustainment Model (GSM), anecdotally developed by GeoBase leadership to reflect implementation issues and the IRM practices of the …


Explaining Death Row's Population And Racial Composition, John H. Blume, Theodore Eisenberg, Martin T. Wells Mar 2004

Explaining Death Row's Population And Racial Composition, John H. Blume, Theodore Eisenberg, Martin T. Wells

Cornell Law Faculty Publications

Twenty-three years of murder and death sentence data show how murder demographics help explain death row populations. Nevada and Oklahoma are the most death-prone states; Texas's death sentence rate is below the national mean. Accounting for the race of murderers establishes that black representation on death row is lower than black representation in the population of murder offenders. This disproportion results from reluctance to seek or impose death in black defendant-black victim cases, which more than offsets eagerness to seek and impose death in black defendant-white victim cases. Death sentence rates in black defendant-white victim cases far exceed those in …


Attorney Fees In Class Action Settlements: An Empirical Study, Theodore Eisenberg, Geoffrey P. Miller Mar 2004

Attorney Fees In Class Action Settlements: An Empirical Study, Theodore Eisenberg, Geoffrey P. Miller

Cornell Law Faculty Publications

Study of two comprehensive class action case data sets covering 1993-2002 shows that the amount of client recovery is overwhelmingly the most important determinant of the attorney fee award. Even in cases in which the courts engage in the lodestar calculation (the product of reasonable hours and a reasonable hourly rate), the client's recovery generally explains the pattern of awards better than the lodestar. Thus, the time and expense of a lodestar calculation may be wasteful. We also find no robust evidence that either recoveries for plaintiffs or fees of their attorneys increased overtime. The mean fee award in common …


Spectral Dependence Of Coherent Backscattering Of Light In A Narrow-Resonance Atomic System, D. V. Kupriyanov, I. M. Sokolov, N. V. Larionov, P. Kulatunga, C. I. Sukenik, S. Balik, M. D. Havey Mar 2004

Spectral Dependence Of Coherent Backscattering Of Light In A Narrow-Resonance Atomic System, D. V. Kupriyanov, I. M. Sokolov, N. V. Larionov, P. Kulatunga, C. I. Sukenik, S. Balik, M. D. Havey

Physics Faculty Publications

We report a combined theoretical and experimental study of the spectral and polarization dependence of near-resonant radiation coherently backscattered from an ultracold gas of 85Rb atoms. Measurements in a 6 MHz range about the 5s 2S1/25p 2P3/2, F=3F'=4 hyperfine transition are compared with simulations based on a realistic model of the experimental atomic density distribution. In the simulations, the influence of heating of the atoms in the vapor, magnetization of the vapor, finite spectral bandwidth, and other nonresonant hyperfine transitions are considered. Good agreement is found between the simulations and measurements.


The Evolution Of Research On Information Systems: A Fiftieth Year Survey Of The Literature In Management Science, Rajiv D. Banker, Robert J. Kauffman Mar 2004

The Evolution Of Research On Information Systems: A Fiftieth Year Survey Of The Literature In Management Science, Rajiv D. Banker, Robert J. Kauffman

Research Collection School Of Computing and Information Systems

The development of the information systems (IS) literature in Management Science during the past 50 years reflects the inception, growth, and maturation of several different research streams. The five research streams we identify incorporate different definitions of the managerial problems that relate to IS, the alternate theoretical perspectives and different methodological paradigms to study them, and the levels of the organization at which their primary results impact managerial practice. The decision support and design science research stream studies the application of computers in decision support, control, and managerial decision making. The value of information research stream reflects relationships established based …


Tool Support For Model Based Architectural Design For Automotive Control Systems, Kevin Steppe Mar 2004

Tool Support For Model Based Architectural Design For Automotive Control Systems, Kevin Steppe

Research Collection School Of Computing and Information Systems

In conjunction with Ford Motor Company, we built a tool to support multilevel architectural design. The tool, called Synergy, allows Ford to visually design architectures of vehicle control components. The components are imported from existing Simulink models; then the tool automatically generates a detailed view showing all required connections and ports. The resulting model is exported to Simulink for further analysis. In this paper we describe the conceptual and technical challenges encountered in building Synergy and our design choices for solving them.


Security Analysis Of Some Proxy Signature, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng Mar 2004

Security Analysis Of Some Proxy Signature, Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

Research Collection School Of Computing and Information Systems

A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former. Such schemes have been suggested for use in a number of applications, particularly in distributed computing where delegation of rights is quite common. Followed by the first schemes introduced by Mambo, Usuda and Okamoto in 1996, a number of new schemes and improvements have been proposed. In this paper, we present a security analysis of four such schemes newly proposed. By successfully identifying several interesting forgery attacks, we show that …


Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo Mar 2004

Automated Agent Ontology Creation For Distributed Databases, Austin A. Bartolo

Theses and Dissertations

In distributed database environments, the combination of resources from multiple sources requiring different interfaces is a universal problem. The current solution requires an expert to generate an ontology, or mapping, which contains all interconnections between the various fields in the databases. This research proposes the application of software agents in automating the ontology creation for distributed database environments with minimal communication. The automatic creation of a domain ontology alleviates the need for experts to manually map one database to other databases in the environment. Using several combined comparison methods, these agents communicate and negotiate similarities between information sources and retain …


An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias Mar 2004

An Analysis Of The Performance And Security Of J2sdk 1.4 Jsse Implementation Of Ssl/Tls, Danny R. Bias

Theses and Dissertations

The Java SSL/TLS package distributed with the J2SE 1.4.2 runtime is a Java implementation of the SSLv3 and TLSv1 protocols. Java-based web services and other systems deployed by the DoD will depend on this implementation to provide confidentiality, integrity, and authentication. Security and performance assessment of this implementation is critical given the proliferation of web services within DoD channels. This research assessed the performance of the J2SE 1.4.2 SSL and TLS implementations, paying particular attention to identifying performance limitations given a very secure configuration. The performance metrics of this research were CPU utilization, network bandwidth, memory, and maximum number of …


Netwars Based Study Of A Joint Stars Link-16 Network, Charlie I. Cruz Mar 2004

Netwars Based Study Of A Joint Stars Link-16 Network, Charlie I. Cruz

Theses and Dissertations

Both secure and anti-jam resistant, the Link-16 is the primary communications channel used by the Joint Surveillance Target Attack Radar System (Joint STARS) for the exchange of real-time tactical data among various ground, air, and sea platforms of the United States of America and North Atlantic Treaty Organization forces. This research explored the effect of increasing network traffic for imagery transfer to the mean delay when operating under different network topologies. Using Network Warfare Simulation (NETWARS), three different missions were simulated to run on five network topologies having a different number of participants, different assigned time slots, and stacked nets. …


Software Development Outsourcing Decision Support Tool With Neural Network Learning, James D. Newberry Mar 2004

Software Development Outsourcing Decision Support Tool With Neural Network Learning, James D. Newberry

Theses and Dissertations

The Air Force (AF) needs an evolving software tool for guiding decision makers through the complexities of software outsourcing. Previous research identified specific outsourcing strategies and linked them to goals and consequences through a variety of relationship rules. These strategies and relationship rules were inserted into a decision support tool. Since that time, more historical data and outsourcing literature has been collected thus necessitating an update to such a tool. As the number of software outsourcing projects are completed, the AF must capture the outsourcing decision experiences which guided the projects and their outcomes. In order to efficiently incorporate this …


An Evaluation Of Formate As An Electron Donor To Facilitate Palladium (Pd) - Catalyzed Destruction Of Chlorinated Aliphatic Hydrocarbons, Matthew D. Welling Mar 2004

An Evaluation Of Formate As An Electron Donor To Facilitate Palladium (Pd) - Catalyzed Destruction Of Chlorinated Aliphatic Hydrocarbons, Matthew D. Welling

Theses and Dissertations

Chlorinated aliphatic hydrocarbons (CAHs) such as trichloroethylene (TCE), tetrachloroethylene (PCE), and trichloroethane (TCA) are probable human carcinogens that have been used widely within the DoD, primarily as solvents for cleaning and metal degreasing. These compounds are frequently found to be groundwater contaminants. In fact, TCE and PCE are the first and third most commonly detected groundwater contaminants nationwide. The focus of this study was to determine the effectiveness of using a palladium (Pd) catalyst with formate as a reductant to treat CAH-contaminated groundwater. TCE was used as a model CAH. Other investigators have focused on hydrogen gas (H2) …


Fish Stock And Fishery Enhancement In Western Australia. A Summary Report., Department Of Fisheries Mar 2004

Fish Stock And Fishery Enhancement In Western Australia. A Summary Report., Department Of Fisheries

Fisheries management papers

This summary paper provides an overview of the key proposals set out in the full policy discussion paper, Fisheries Management Paper No 175. It does not discuss the theoretical background for the framework presented and therefore readers interested in such discussion are directed to Fisheries Management Paper No 175.

Both papers have been prepared to encourage public involvement in the development of policy for stock enhancement within Western Australian waters. Stock enhancement can involve an existing fishery or creation of a new fishery through the translocation of fish. It affects both public and private waters.


Machine Learning Techniques For Characterizing Ieee 802.11b Encrypted Data Streams, Michael J. Henson Mar 2004

Machine Learning Techniques For Characterizing Ieee 802.11b Encrypted Data Streams, Michael J. Henson

Theses and Dissertations

As wireless networks become an increasingly common part of the infrastructure in industrialized nations, the vulnerabilities of this technology need to be evaluated. Even though there have been major advancements in encryption technology, security protocols and packet header obfuscation techniques, other distinguishing characteristics do exist in wireless network traffic. These characteristics include packet size, signal strength, channel utilization and others. Using these characteristics, windows of size 11, 31, and 51 packets are collected and machine learning (ML) techniques are trained to classify applications accessing the 802.11b wireless channel. The four applications used for this study included E-Mail, FTP, HTTP, and …


Packet Analysis Of Unmodified Bluetooth Communication Devices, Neal A. Watts Mar 2004

Packet Analysis Of Unmodified Bluetooth Communication Devices, Neal A. Watts

Theses and Dissertations

Bluetooth technology has potential for widespread use within the Department of Defense and the Air Force. An office environment using Bluetooth technology can wirelessly connect computers, printers, and other office equipment in order to share information over short distances. The clutter and annoyance of cables connecting equipment can be eliminated. Bluetooth provides a standard interface for connection, as opposed to many different proprietary cables. The research is conducted indoors in a climate controlled environment, with minimal obstructions, to closely follow free-space signal propagation. Four different antenna orientations are used. The factors varied are the distance between devices, and the antenna …


Agent Based Simulation Seas Evaluation Of Dodaf Architecture, Gregory V. Destefano Mar 2004

Agent Based Simulation Seas Evaluation Of Dodaf Architecture, Gregory V. Destefano

Theses and Dissertations

With Department of Defense (DoD) weapon systems being deeply rooted in the command, control, communications, computers, intelligence, surveillance, and reconnaissance (C4ISR) structure, it is necessary for combat models to capture C4ISR effects in order to properly assess military worth. Unlike many DoD legacy combat models, the agent based model System Effectiveness and Analysis Simulation (SEAS) is identified as having C4ISR analysis capabilities. In lieu of requirements for all new DoD C4ISR weapon systems to be placed within a DoD Architectural Framework (DoDAF), investigation of means to export data from the Framework to the combat model SEAS began. Through operational, system, …


Characterization Of Chlorinated Solvent Degradation Profile Due To Microbial And Chemical Processes In A Constructed Wetland, Teresa A. Sobolewski Mar 2004

Characterization Of Chlorinated Solvent Degradation Profile Due To Microbial And Chemical Processes In A Constructed Wetland, Teresa A. Sobolewski

Theses and Dissertations

Perchloroethene (PCE) and its degradation products are among the most common organic groundwater contaminants in the United States. Constructed wetlands are a relatively new approach to dealing with this contamination problem. With their upward flow capability it is possible to introduce an aerobic and anaerobic environment with a consortium of microorganisms available to degrade the contaminants to within acceptable levels established by the Environmental Protection Agency (EPA). This study is a follow-up to the previous two years of research on PCE degradation in cell 1 at Wright-Patterson Air Force Base. This thesis was conducted in order to study the wetland …


Making The Business Case For Sustainable Design In The Department Of Defense, David M. Warnke Mar 2004

Making The Business Case For Sustainable Design In The Department Of Defense, David M. Warnke

Theses and Dissertations

Buildings are one of the largest consumers of natural resources, a major source of ecological pollution, and occasionally toxic to human health. Sustainable design is the common term associated with buildings which, during their construction, use, and eventual disposal, seek to minimize their negative impact on the environment and human health. The U.S. Green Building Council's Leadership in Energy and Environmental Design (LEED) rating system helps to assess a building's sustainability level. In the Federal Government's push to set the example for the rest of the nation, nearly every Federal Agency has chosen to adopt the LEED assessment tool. Each …


Sulfide Mineralization In Deep-Water Marine Sediments Related To Methane Transport, Methane Consumption, And Methane Gas Hydrates, Matthew K. Thompson, Walter S. Borowski, Charles K. Paull, William Ussler Iii Mar 2004

Sulfide Mineralization In Deep-Water Marine Sediments Related To Methane Transport, Methane Consumption, And Methane Gas Hydrates, Matthew K. Thompson, Walter S. Borowski, Charles K. Paull, William Ussler Iii

EKU Faculty and Staff Scholarship

Patterns of sulfide sulfur concentration and sulfur isotopic composition (d34 S) are perhaps related to upward methane transport, especially in sediments underlain by methane gas hydrate deposits. Increased methane delivery augments the effect of anaerobic methane oxidation (AMO) occurring at the sulfate-methane interface (SMI). Sulfate and methane co-consumption results in production of dissolved sulfide at the interface that is eventually sequestered within sulfide minerals (elemental sulfur, iron monosulfide, pyrite).

We examine the sediments of two piston cores collected over the Blake Ridge gas hydrate deposits (offshore southeastern United States) by extracting total sedimentary sulfide using chromium reduction. We use …


An Analysis Of Coast Guard Hh-65 Engine Reliability: A Comparison Of Malfunctions To Component Removals, Donna L. Cottrell Mar 2004

An Analysis Of Coast Guard Hh-65 Engine Reliability: A Comparison Of Malfunctions To Component Removals, Donna L. Cottrell

Theses and Dissertations

The Coast Guard HH-65 helicopter experienced 31 in-flight loss of power incidents during FY 2003 and 21 during the first two months of FY 2003. Concurrent with this apparent decrease in reliability, the Coast Guard seeks ways to expand the HH- 65’s Airborne Use of Force capabilities as a result of the September 11th, 2001 terrorists’ attacks. This study is an exploratory, empirical analysis of engine and airframe component replacements as related to engine mishaps and reliability in the HH-65. We use contingency table analysis, ordinary least squares regression, and logistic regression to examine the mishap history and component replacement …


Groundwater Trends In The Central Agricultural Region, S Ghauri Mar 2004

Groundwater Trends In The Central Agricultural Region, S Ghauri

Resource management technical reports

This report provides an update of groundwater data and interpretation for each of the hydrozones of the central agricultural region in Western Australia.


Groundwater Study Of The Narrogin Townsite, Edward K. Crossley Mar 2004

Groundwater Study Of The Narrogin Townsite, Edward K. Crossley

Resource management technical reports

A groundwater study was carried out in the townsite of Narrogin, Western Australia, in April 2002. The study consisted of a drilling program to install a network of groundwater monitoring bores. This report contains background information for the town and its catchment, the climatic, geological and hydrogeological investigations, and conclusions on the town's salinity risk and recommendations for improved water management.


Authenticating Query Results In Edge Computing, Hwee Hwa Pang, Kian-Lee Tan Mar 2004

Authenticating Query Results In Edge Computing, Hwee Hwa Pang, Kian-Lee Tan

Research Collection School Of Computing and Information Systems

Edge computing pushes application logic and the underlying data to the edge of the network, with the aim of improving availability and scalability. As the edge servers are not necessarily secure, there must be provisions for validating their outputs. This paper proposes a mechanism that creates a verification object (VO) for checking the integrity of each query result produced by an edge server - that values in the result tuples are not tampered with, and that no spurious tuples are introduced. The primary advantages of our proposed mechanism are that the VO is independent of the database size, and that …