Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1141 - 1170 of 5573

Full-Text Articles in Physical Sciences and Mathematics

Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali Aug 2005

Identification Of Ip Information Of Pakistan & Vulnerability Assessment, Nizar Diamond Ali

International Conference on Information and Communication Technologies

Detailed IP information of Pakistan was not available prior to this study - at least not to the general public. It was not known how to harvest this information, from where and using which tools. This study came as answer to this challenge and shows how the IP information can be collected, what sources of information to use, methodologies to adopt and tools to utilize for this purpose. The next step was find out areas where network security lapses are present - i.e., to see which servers and which services are vulnerable to known attacks and vulnerabilities. In this way, …


Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb Aug 2005

Real Time Object Tracking Using Bma, Zeeshan Hameed Khan, Muhammad Aurangzeb

International Conference on Information and Communication Technologies

This paper describes real time object tracking using block matching algorithm (BMA). Emphasis is made on the development of techniques for tracking a user-selected object through digital image sequences in multimedia systems. The ability to track objects in sequences is useful in situations where the motion of objects is important. It is also useful when a moving object is difficult to see and needs to be highlighted. A tracking tool is also of benefit to the developers of a multimedia system to automatically 'mark up' a moving object so a user of the system can select it and manipulate it.


Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan Aug 2005

Exploring The Possibility Of Implementing Telecommuting At University Utara Malaysia (Uum), Dr. Wan Rozaini Sheik Osman, Haitham Rashdan

International Conference on Information and Communication Technologies

Global technology has quickly progressed to provide more accessible business modes of communication. The image of the traditional workplace as a particular place to go to work is being replaced with employees working wherever they can be most efficient and productive, whether at home, on a plane, on the road, or a telework center. The availability of affordable technology has been one of the major contributors to the "any time, any place" telecommuting trend. The purpose of this study is to investigate the possibility of the implementation of teleworking at University Utara Malaysia (UUM), the suitable job selection criteria, the …


A Survey On Intrusion Detection Approaches, A Murali M. Rao Aug 2005

A Survey On Intrusion Detection Approaches, A Murali M. Rao

International Conference on Information and Communication Technologies

Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …


G-Value Decoding Of Greedy Codes, Khalil Ahmad Aug 2005

G-Value Decoding Of Greedy Codes, Khalil Ahmad

International Conference on Information and Communication Technologies

Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …


Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid Aug 2005

Optimization Of Semantic Caching For Xml Database, Sharifullah Khan, Awais Hamid

International Conference on Information and Communication Technologies

The availability of information on the Internet has increased exponentially the Internet users in the last few years. This made the web servers overloaded. Semantic caches store the semantics and results of the previously asked queries close to the users, in order to answer new queries. The caching reduces the burden of the web servers and optimizes their performance. This paper presents the SMOCE Cache, a framework for semantic caching of XML database. Specialized techniques such as indexing and broadening of semantic regions are proposed for the optimization of semantic caching. The evaluation of prototype proved the significance of proposed …


Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui Aug 2005

Knowledge Management In Public Sector Universities Of Pakistan, Eram Abbasi, Arshad Siddiqui

International Conference on Information and Communication Technologies

In the modern era of globalization of business, 'Information & Knowledge' is considered as the most vital resource for organizational stability. Businesses significantly depend on efficient management of 'Information' and transforming it into 'Knowledge'. Even though Information and Knowledge have been recognized as the vital resource, still the concepts of 'Information Systems' and 'Knowledge Management' are yet misunderstood. The paper firstly reviews the foundations of Information Systems to establish the basis for the conceptual understanding of 'Knowledge Management'. With these theoretical bases, then a generalized model for 'Knowledge Management' has been proposed. The discussion continues with concepts as to how …


A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta Aug 2005

A Dynamic Weight Assignment Approach For Ir Systems, M. Shoaib, Prof Dr. Abad Ali Shah, A. Vashishta

International Conference on Information and Communication Technologies

Weights are assigned to the extracted keywords for partial matching and computing ranking in an IR system. Weight assignment technique is suggested by the IR model that is used for an IR system. Currently suggested weight assignment techniques are static which means that once weight is assigned a keyword it remains unchanged during life-span of an IR system. In this paper, we suggest a dynamic weight assignment technique. This technique can be used by any IR model that supports partial matching.


Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat Aug 2005

Using Agents For Unification Of Information Extraction And Data Mining, Sharjeel Imtiaz, Azmat Hussain, Dr. Sikandar Hiyat

International Conference on Information and Communication Technologies

Early work for unification of information extraction and data mining is motivational and problem stated work. This paper proposes a solution framework for unification using intelligent agents. A Relation manager agent extracted feature with cross feedback approach and also provide a Unified Undirected graphical handle. An RPM agent an approach to minimize loop back proposes pooling and model utilization with common parameter for both text and entity level abstractions.


Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid Aug 2005

Design Phase Analysis Of Software Reliability Using Aspect-Oriented Programming, Farhan Rafique, Khalid Mahmood, Tauseef-U- Rehman, Khalid Rashid

International Conference on Information and Communication Technologies

Software system may have various nonfunctional requirements such as reliability, security, performance and schedulability. If we can predict how well the system will meet such requirements at an early phase of software development, we can significantly save the total development cost and time. Among non-functional requirements, reliability is commonly required as the essential property of the system being developed. Therefore, many analysis methods have been proposed but methods that can be practically performed in the design phase are rare. In this paper we show how design-level aspects can be used to separate reliability concerns from essential functional concerns during software …


Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez Aug 2005

Study Of Data Provenance And Annotation Model For Information Reliability Suggested For Pathological Laboratory Environment In Pakistan, Naila Aamir, Aslam Pervez

International Conference on Information and Communication Technologies

Trust and reliability of information is a very critical issue of today's information age. Keeping provenance of data not only ensures us about its origination but it also keeps track of all the changes that happen to the data through out its life cycle. In this paper we have discussed the importance of data provenance, difference between Where & Why Provenance and different models for keeping such information. The objective of this study is to select a provenance model which can be implemented in scientific environment of our country. For this purpose we have taken the annotation model and have …


Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi Aug 2005

Ergonomics: Implications On Computer End-Users, Maheen Ghauri, Dr. Arshad Siddiqi

International Conference on Information and Communication Technologies

Ergonomics is the application of scientific information related to humans to the design of objects, systems and environment for human use. The objective is to apply human characteristics to the design of computer-based work environments to reduce problems of people at work. Lack of ergonomics has serious repercussions on end-users, including physical and mental illnesses. Using ergonomics to design computer-intensive environments would maximize efficiency, productivity and job satisfaction of employees. Unfortunately, in the Government Sector in Pakistan, there is no application of ergonomics in computer-based environments, and this leads to inefficiencies, errors, and safety and health issues. The purpose of …


Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah Aug 2005

Visualization Of Retrieved Positive Data Using Blending Function, Muhammad Shoaib, Habib -Ur- Rehman, Dr. Abad Ali Shah

International Conference on Information and Communication Technologies

Data visualization is an important technique used in data mining. We present the retrieved data into visual format to discover features and trends inherent to the data. Some features of the data to be retrieved are already known to us. Visualization should preserve these known features inherent to the data. Positivity is one such known feature that is inherent to most of the scientific and business data sets. For example, mass, volume and percentage concentration are meaningful only when they are positive values. However certain visualization techniques do not guarantee to preserve this feature while constructing visualization of retrieved data …


Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad Aug 2005

Keynote: Role Of Values & Culture In Information Technology, Prof. Dr. Anis Ahmad

International Conference on Information and Communication Technologies

It is no longer unusual to see, in a remote town in northern area in Pakistan, a practically non-literate wagon driver calling from his Nokia cell phone his uncle in Dubai or in Karachi. He enjoys sharing with him about his success in business and the settlement of family disputes. While he is driving on dangerous curvy roads and having this conversation, in the back seat of the wagon a comparatively young person is playing games on his cell phone. All this was unimaginable a quarter of a century ago.


Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia Aug 2005

Keynote: Hexagonal Structure For Intelligent Vision, Xiangjian He, Wenjing Jia

International Conference on Information and Communication Technologies

Using hexagonal grids to represent digital images have been studied for more than 40 years. Increased processing capabilities of graphic devices and recent improvements in CCD technology have made hexagonal sampling attractive for practical applications and brought new interests on this topic. The hexagonal structure is considered to be preferable to the rectangular structure due to its higher sampling efficiency, consistent connectivity and higher angular resolution and is even proved to be superior to square structure in many applications. Since there is no mature hardware for hexagonal-based image capture and display, square to hexagonal image conversion has to be done …


Assessing The Health Of Fringing Salt Marshes Along The Fore River And Its Tributaries, Pamela A. Morgan, Lucas Curci, Cayce Dalton, Jeremy Miller Aug 2005

Assessing The Health Of Fringing Salt Marshes Along The Fore River And Its Tributaries, Pamela A. Morgan, Lucas Curci, Cayce Dalton, Jeremy Miller

Environmental Studies Faculty Publications

Casco Bay has experienced two significant oil spills in recent history - the Tamano Tanker spill in 1972 and the Julie N spill in 1996. In addition, the Fore River and its tributaries have experienced numerous small spills over the years, including the August 2002 fuel oil spill (2,900 gallons) and the April 2003 jet fuel spill (6,000 gallons). The impacts of these spills on the fringing salt marshes that line the edges of the Fore River and its tributaries are not well understood. Are these salt marshes resilient enough to withstand these impacts and still act as healthy marshes …


Modeling Tephra Sedimentation From A Ruapehu Weak Plume Eruption, Costanza Bonadonna, J. C. Phillips, B. F. Houghton Aug 2005

Modeling Tephra Sedimentation From A Ruapehu Weak Plume Eruption, Costanza Bonadonna, J. C. Phillips, B. F. Houghton

Geology Faculty Publications

We present a two-dimensional model for sedimentation of well-mixed weak plumes, accounting for lateral spreading of the cloud, downwind advection, increase of volumetric flux in the rising stage, and particle transport during fallout. The 17 June 1996 subplinian eruption of Ruapehu produced a bent-over plume that rose to a height of 8.5 km in a wind field with an average velocity of 24 m s−1 and generated a narrow deposit on land extending up to 200 km from vent. The sedimentation from the Ruapehu plume was dominated by coarse ash, with all the blocks and most of the lapilli …


Observed And Predicted Responses Of Plant Growth To Climate Across Canada, Andrew Godard Bunn, Scott J. Goetz, Gergory J. Fiske Aug 2005

Observed And Predicted Responses Of Plant Growth To Climate Across Canada, Andrew Godard Bunn, Scott J. Goetz, Gergory J. Fiske

Environmental Sciences Faculty and Staff Publications

Using satellite observations from 1981–2000, and data interpolated from surface weather stations, we examined the association between gross photosynthetic activity (Pg) and climate across the boreal forest and tundra of Canada. The response of annual and interannual Pg was tightly coupled to climate, and seasonal associations between Pg and climate varied with plant functional types. The most important variable for modeling summer growth of conifer forests was the previous spring minimum temperature, whereas tundra responded primarily to summer maximum temperature. Using general circulation model predictors to 2050, we project that tundra will continue to grow vigorously in the coming decades …


Direct Effect Models, Mark J. Van Der Laan, Maya L. Petersen Aug 2005

Direct Effect Models, Mark J. Van Der Laan, Maya L. Petersen

U.C. Berkeley Division of Biostatistics Working Paper Series

The causal effect of a treatment on an outcome is generally mediated by several intermediate variables. Estimation of the component of the causal effect of a treatment that is mediated by a given intermediate variable (the indirect effect of the treatment), and the component that is not mediated by that intermediate variable (the direct effect of the treatment) is often relevant to mechanistic understanding and to the design of clinical and public health interventions. Under the assumption of no-unmeasured confounders for treatment and the intermediate variable, Robins & Greenland (1992) define an individual direct effect as the counterfactual effect of …


Statistical Inference For Variable Importance, Mark J. Van Der Laan Aug 2005

Statistical Inference For Variable Importance, Mark J. Van Der Laan

U.C. Berkeley Division of Biostatistics Working Paper Series

Many statistical problems involve the learning of an importance/effect of a variable for predicting an outcome of interest based on observing a sample of n independent and identically distributed observations on a list of input variables and an outcome. For example, though prediction/machine learning is, in principle, concerned with learning the optimal unknown mapping from input variables to an outcome from the data, the typical reported output is a list of importance measures for each input variable. The typical approach in prediction has been to learn the unknown optimal predictor from the data and derive, for each of the input …


Dark-Energy Evolution Across The Cosmological-Constant Boundary, Robert R. Caldwell, Michael Doran Aug 2005

Dark-Energy Evolution Across The Cosmological-Constant Boundary, Robert R. Caldwell, Michael Doran

Dartmouth Scholarship

We explore the properties of dark-energy models for which the equation of state, w, defined as the ratio of pressure to energy density, crosses the cosmological-constant boundary w=−1. We adopt an empirical approach, treating the dark energy as an uncoupled fluid or a generalized scalar field. We describe the requirements for a viable model, in terms of the equation of state and sound speed. A generalized scalar field cannot safely traverse w=−1, although a pair of scalars with w>−1 and w<−1 will work. A fluid description with a well-defined sound speed can also cross the boundary. Contrary to expectations, such a crossing model does not instantaneously resemble a cosmological constant at the moment w=−1 since the density and pressure perturbations do not necessarily vanish. But because a dark energy with w<−1 dominates only at very late times, and because the dark energy is not generally prone to gravitational clustering, then crossing the cosmological-constant boundary leaves no distinct imprint.


Cut-And-Solve: A Linear Search Strategy For Combinatorial Optimization Problems, Sharlee Climer, Weixiong Zhang Aug 2005

Cut-And-Solve: A Linear Search Strategy For Combinatorial Optimization Problems, Sharlee Climer, Weixiong Zhang

All Computer Science and Engineering Research

Branch-and-bound and branch-and-cut use search trees to identify optimal solutions. In this paper, we introduce a linear search strategy which we refer to as cut-and-solve and prove optimality and completeness for this method. This search is different from traditional tree searching as there is no branching. At each node in the search path, a relaxed problem and a sparse problem are solved and a constraint is added to the relaxed problem. The sparse problems provide incumbent solutions. When the constraining of the relaxed problem becomes tight enough, its solution value becomes no better than the incumbent solution value. At this …


The Role Of White Hat Hackers In Information Security, Amit Anand Jagnarine Aug 2005

The Role Of White Hat Hackers In Information Security, Amit Anand Jagnarine

Honors College Theses

No abstract is available.


Opnet, Arne, And The Classroom, Philip Doane Aug 2005

Opnet, Arne, And The Classroom, Philip Doane

Regis University Student Publications (comprehensive collection)

This paper examines OPNET Technology, Inc's management programs, and Regis University's Academic Research Network (ARNe) needs to find out which OPNET programs can meet the needs of ARNe. The method used was to examine ARNe's needs, and research Microsoft's SMF/MOF management framework, research OPNET's program and module offerings, research OPNET's University Program, and research how OPNET's programs are used at some other universities. The research was used to create a match up between Microsoft's Service Management Functions and OPNET's programs and modules. And it was used to create a list of textbooks, labs, and lab manuals that would work with …


Post-Translational Regulation Of Adipose Differentiation-Related Protein By The Ubiquitin/Proteasome Pathway, John Tansey Aug 2005

Post-Translational Regulation Of Adipose Differentiation-Related Protein By The Ubiquitin/Proteasome Pathway, John Tansey

Chemistry Faculty Scholarship

Adipose differentiation-related protein (ADRP) is localized to lipid droplets in most mammalian cells. ADRP, proposed to regulate
fatty acid mobilization and lipid droplet formation, is linked to lipid accumulation in foam cells of human atherosclerotic
lesions. In this report, we show that ADRP protein accumulates in Chinese hamster ovary fibroblastic cells cultured in the
presence of oleic acid but is destabilized when fatty acid sources are removed from culture serum. The latter effect was blocked
by the proteasome inhibitor MG132, whereas inhibitors of other proteolytic processes were ineffective. Pulse-chase experiments
confirmed that ADRP degradation is inhibited by MG132. Conditions that …


Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu Aug 2005

Achieving Minimum Coverage Breach Under Bandwidth Constraints In Wireless Sensor Networks, Maggie Xiaoyan Cheng, Lu Ruan, Weili Wu

Computer Science Faculty Research & Creative Works

This paper addresses the coverage breach problem in wireless sensor networks with limited bandwidths. In wireless sensor networks, sensor nodes are powered by batteries. To make efficient use of battery energy is critical to sensor network lifetimes. When targets are redundantly covered by multiple sensors, especially in stochastically deployed sensor networks, it is possible to save battery energy by organizing sensors into mutually exclusive subsets and alternatively activating only one subset at any time. Active nodes are responsible for sensing, computing and communicating. While the coverage of each subset is an important metric for sensor organization, the size of each …


Final Environmental Assessment: Proposed Demolition Of 12 Structures, Hill Air Force Base, Utah, Randal Klein, Kay Winn Aug 2005

Final Environmental Assessment: Proposed Demolition Of 12 Structures, Hill Air Force Base, Utah, Randal Klein, Kay Winn

All U.S. Government Documents (Utah Regional Depository)

Hill AFB proposes to accommodate current United States Air Force (USAF) missions by demolishing 12 structures on Hill AFB. All 12 buildings have both aged and deteriorated to the point they cannot be economically repaired or remodeled. Seven of the 12 buildings would be demolished without being replaced in kind. For five of the 12 buildings, military construction (MILCON) projects would provide new facilities to house the activities that are or were being performed in the deteriorated structures. The proposed action and the no action alternative were both considered in detail. Following the demolition phase, backfill and revegetation operations would …


Building Efficient Systems From Data In A Computational Intelligence Framework, Debrup Chakraborty Dr. Aug 2005

Building Efficient Systems From Data In A Computational Intelligence Framework, Debrup Chakraborty Dr.

Doctoral Theses

There are problems of interest for which precise mathematical or physical understanding is yet to come. Let us illustrate this with an example. Suppose, for a mining operation one needs to blast a certain portion of the soil/rock using some specific ex- plosives. Before the blast is made, the miners want to know the intensity of vibration that would be produced at a certain distance from the site of blasting. The intensity of vibration may de pend on several factors. For example, it will depend on the characteristics and quantity of the explosive used, the rock characteristics of the region, …


Chemical Composition In The Globular Cluster M71 From Keck Hires Spectra Of Turnoff Stars, Ann Merchant Boesgaard, Jeremy R. King, Ann Marie Cody, Alex Stephens, Constantine P. Deliyannis Aug 2005

Chemical Composition In The Globular Cluster M71 From Keck Hires Spectra Of Turnoff Stars, Ann Merchant Boesgaard, Jeremy R. King, Ann Marie Cody, Alex Stephens, Constantine P. Deliyannis

Publications

We have made observations with the Keck I telescope and HIRES at a resolution of ∼45,000 of five nearly identical stars at the turn-off of the metal-rich globular cluster M 71. Our mean Fe abundance, [Fe/H]=-0.80 +-0.02, is in excellent agreement with previous cluster determinations from both giants and near-turnoff stars. There is no clear evidence for any star-to-star abundance differences or correlations in our sample. Abundance ratios of the Fe-peak elements (Cr, Ni) are similar to Fe. The turn-off stars in M71 have remarkably consistent enhancements of 0.2 - 0.3 dex in [Si/Fe], [Ca/Fe] and [Ti/Fe] -- like the …


Computing The Total Sample Size When Group Sizes Are Not Fixed, Mithat Gonen Aug 2005

Computing The Total Sample Size When Group Sizes Are Not Fixed, Mithat Gonen

Memorial Sloan-Kettering Cancer Center, Dept. of Epidemiology & Biostatistics Working Paper Series

This article is concerned with computing the total sample size required for a two-sample comparison when the sizes of the two groups to be compared cannot be fixed in advance. This is frequently encountered when group membership depends on a variable which is observable only after the subject is enrolled to the study, such as a genetic or a biological marker. The most common way of circumventing this problem is assuming a fixed number for the prevalence of the condition that will determine the group membership and compute the required sample size conditionally. In this article this practice is formalized …