Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2005

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1531 - 1560 of 5573

Full-Text Articles in Physical Sciences and Mathematics

The Quantum Anharmonic Potential With The Linear Delta Expansion, Luis M. Sandoval Jul 2005

The Quantum Anharmonic Potential With The Linear Delta Expansion, Luis M. Sandoval

Graduate Student Papers (Physics)

In this report the problem of solving the Schrödinger equation for an anharmonic potential is treated using the technique known as the linear delta expansion. The method works by identifying three different scales in the problem: an asymptotic scale, which depends uniquely on the form of the potential at large distances; an intermediate scale, still characterized by an exponential decay of the wavefunction; and, finally, a short distance scale, in which the wavefunction is sizable. The method is found to be suitable to obtain both energy eigenvalues and wavefunctions.


Design Concepts And Process Analysis For Transmuter Fuel Manufacturing: Quarterly Progress Report #3, Jamil M. Renno, Georg F. Mauer Jul 2005

Design Concepts And Process Analysis For Transmuter Fuel Manufacturing: Quarterly Progress Report #3, Jamil M. Renno, Georg F. Mauer

Fuels Campaign (TRP)

Value Engineering (VE) is used to maximize the product of a process while utilizing the minimum amount of resources. In previous reporting periods a powder processing hot cell was designed and simulated. A VE study will be initiated for this work cell. A manipulator reliability study and a workspace study are performed in this work period. The above noted studies can be combined, and improvements can be made in the operations of the work cell.


Faster Owl Using Split Programs, Denny Vrandecic, Pascal Hitzler Jul 2005

Faster Owl Using Split Programs, Denny Vrandecic, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Knowledge representation and reasoning on the Semantic Web is done by means of ontologies. While the quest for suitable ontology languages is still ongoing, OWL [5] has been established as a core standard. It comes in three flavours, as OWL Full, OWL DL and OWL Lite, where OWL Full contains OWL DL, which in turn contains OWL Lite. The latter two coincide semantically with certain description logics and can thus be considered fragments of first-order predicate logic.


Structural Analysis Of Social Networks With Wireless Users, Guanling Chen, David Kotz Jul 2005

Structural Analysis Of Social Networks With Wireless Users, Guanling Chen, David Kotz

Computer Science Technical Reports

Online interactions between computer users form Internet-based social networks. In this paper we present a structural analysis of two such networks with wireless users. In one network the wireless users participate in a global file-sharing system, and in the other they interact with each other through a local music-streaming application.


Towards Tiny Trusted Third Parties, Alexander Iliev, Sean Smith Jul 2005

Towards Tiny Trusted Third Parties, Alexander Iliev, Sean Smith

Computer Science Technical Reports

Many security protocols hypothesize the existence of a {\em trusted third party (TTP)} to ease handling of computation and data too sensitive for the other parties involved. Subsequent discussion usually dismisses these protocols as hypothetical or impractical, under the assumption that trusted third parties cannot exist. However, the last decade has seen the emergence of hardware-based devices that, to high assurance, can carry out computation unmolested; emerging research promises more. In theory, such devices can perform the role of a trusted third party in real-world problems. In practice, we have found problems. The devices aspire to be general-purpose processors but …


Mining Frequent And Periodic Association Patterns, Guanling Chen, Heng Huang, Minkyong Kim Jul 2005

Mining Frequent And Periodic Association Patterns, Guanling Chen, Heng Huang, Minkyong Kim

Computer Science Technical Reports

Profiling the clients' movement behaviors is useful for mobility modeling, anomaly detection, and location prediction. In this paper, we study clients' frequent and periodic movement patterns in a campus wireless network. We use offline data-mining algorithms to discover patterns from clients' association history, and analyze the reported patterns using statistical methods. Many of our results reflect the common characteristics of a typical academic campus, though we also observed some unusual association patterns. There are two challenges: one is to remove noise from data for efficient pattern discovery, and the other is to interpret discovered patterns. We address the first challenge …


More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties, Alexander Iliev, Sean Smith Jul 2005

More Efficient Secure Function Evaluation Using Tiny Trusted Third Parties, Alexander Iliev, Sean Smith

Computer Science Technical Reports

Secure Function Evaluation (SFE) problems. We assume that a really trustworthy TTP device will have very limited protected memory and computation environment---a \emph{tiny TTP}. This precludes trivial solutions like "just run the function in the TTP". Traditional scrambled circuit evaluation approaches to SFE have a very high overhead in using indirectly-addressed arrays---every array access's cost is linear in the array size. The main gain in our approach is that array access can be provided with much smaller overhead---$O(\sqrt{N}\log N)$. This expands the horizon of problems which can be efficiently solved using SFE. Additionally, our technique provides a simple way to …


Summer 2005 Research Symposium Abstract Book, Trinity College Jul 2005

Summer 2005 Research Symposium Abstract Book, Trinity College

Science Symposia Abstracts

Summer 2005 volume of abstracts for science research projects conducted by Trinity College students.


Cs 240: Computer Science - I, Ronald F. Taylor Jul 2005

Cs 240: Computer Science - I, Ronald F. Taylor

Computer Science & Engineering Syllabi

Basic concepts of programming and programming languages are introduced. Emphasis is on structured programming and stepwise refinement. For CS/CEO majors with familiarity of a high-level programming language. Co-requisite: MTH 130 and 131; or MTH 134. 4 credit hours.


Cs 400/600: Data Structures And Software Design, Jack Jean Jul 2005

Cs 400/600: Data Structures And Software Design, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.


Cs 466/666: Introduction To Formal Languages, Krishnaprasad Thirunarayan Jul 2005

Cs 466/666: Introduction To Formal Languages, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course introduces the theory of formal languages and automata. The primary focus is on the two methods of defining languages: using generators (e.g., grammars/regular expressions) and using recognizers (e.g., finite state machines). Along with presenting the fundamentals, this course will develop and examine relationships among the various specification methods for the regular languages and the context-free languages, in detail. Overall, we plan to cover the first seven chapters of the text book.


Cs 241: Computer Science Ii, Eric Maston Jul 2005

Cs 241: Computer Science Ii, Eric Maston

Computer Science & Engineering Syllabi

This course is the second in the Introduction to Computer Science (24X) series. It focuses on object oriented concepts and an introduction to data structures.


Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan Jul 2005

Cs 480/680: Comparative Languages, Krishnaprasad Thirunarayan

Computer Science & Engineering Syllabi

This course will introduce fundamental concepts and paradigms underlying the design of modern programming languages. For concreteness, we study the details of an object-oriented language (e.g. Java), and a functional language (e.g., Scheme). The overall goal is to enable comparison and evaluation of existing languages. The programming assignments will be coded in Java 5 and in Scheme.


Ceg 720-01: Computer Architecture, Jack Jean Jul 2005

Ceg 720-01: Computer Architecture, Jack Jean

Computer Science & Engineering Syllabi

No abstract provided.


Ceg 360/560-01: Digital System Design, Travis E. Doom Jul 2005

Ceg 360/560-01: Digital System Design, Travis E. Doom

Computer Science & Engineering Syllabi

Design of digital systems. Topics include flip-flops, registers, counters, programmable logic devices, memory devices, register-level design, and microcomputer system organization. Students must show competency in the design of digital systems. 3 hours lecture, 2 hours lab. Prerequisite: CEG260.


Ceg 460/660-01: Introduction To Software Computer Engineering, John A. Reisner Jul 2005

Ceg 460/660-01: Introduction To Software Computer Engineering, John A. Reisner

Computer Science & Engineering Syllabi

This course introduces established practices for engineering large-scale software systems. Emphasis is placed on both the technical and managerial aspects of software engineering, and the software development process. This includes techniques for requirements elicitation, analysis, design, testing, and project management. The course emphasizes object-oriented development with the Unified Modeling Language (UML). Hands-on experience is provided through individual homework problems and a group project.


Morphisms In Context, Markus Krotzsch, Guo-Qiang Zhang, Pascal Hitzler Jul 2005

Morphisms In Context, Markus Krotzsch, Guo-Qiang Zhang, Pascal Hitzler

Computer Science and Engineering Faculty Publications

Morphisms constitute a general tool for modelling complex relationships between mathematical objects in a disciplined fashion. In Formal Concept Analysis (FCA), morphisms can be used for the study of structural properties of knowledge represented in formal contexts, with applications to data transformation and merging. In this paper we present a comprehensive treatment of some of the most important morphisms in FCA and their relationships, including dual bonds, scale measures, infomorphisms, and their respective relations to Galois connections. We summarize our results in a concept lattice that cumulates the relationships among the considered morphisms. The purpose of this work is to …


The Use Of Multi-Beam Sonars To Image Bubbly Ship Wakes, R Lee Culver, Thomas C. Weber, David L. Bradley Jul 2005

The Use Of Multi-Beam Sonars To Image Bubbly Ship Wakes, R Lee Culver, Thomas C. Weber, David L. Bradley

Center for Coastal and Ocean Mapping

During the past five years, researchers at Penn State University (PSU) have used upward-looking multi-beam (MB) sonar to image the bubbly wakes of surface ships. In 2000, a 19-beam, 5° beam width, 120° sector, 250 kHz MB sonar integrated into an autonomous vehicle was used to obtain a first-of-a-kind look at the three-dimensional variability of bubbles in a large ship wake. In 2001 we acquired a Reson 8101 MB sonar, which operates at 240 kHz and features 101-1.5º beams spanning a 150º sector. In July 2002, the Reson sonar was deployed looking upward from a 1.4 m diameter buoy moored …


The Model Dependence Of Solar Energetic Particle Mean Free Paths Under Weak Scattering, Gang Qin, Joseph R. Dwyer, Hamid K. Rassoul, Glenn M. Mason Jul 2005

The Model Dependence Of Solar Energetic Particle Mean Free Paths Under Weak Scattering, Gang Qin, Joseph R. Dwyer, Hamid K. Rassoul, Glenn M. Mason

Aerospace, Physics, and Space Science Faculty Publications

The mean free path is widely used to measure the level of solar energetic particles' diffusive transport. We model a solar energetic particle event observed by Wind STEP at 0.31-0.62 MeV nucleonˉ¹, by solving the focused transport equation using the Markov stochastic process theory. With different functions of the pitch angle diffusion coefficient D μμ, we obtain different parallel mean free paths for the same event. We show that the different values of the mean free path are due to the high anisotropy of the solar energetic particles. This makes it problematic to use just the mean free path to …


Using Spatial Cues For Meeting Speech Segmentation, E Cheng, J Lukasiak, Ian S. Burnett, David A. Stirling Jul 2005

Using Spatial Cues For Meeting Speech Segmentation, E Cheng, J Lukasiak, Ian S. Burnett, David A. Stirling

Faculty of Informatics - Papers (Archive)

This work investigates the validity and accuracy of using spatialcues with Time-Delay Estimation (TDE) as a method of segmenting multichannel recorded speech by speaker location. In environments such as meetings where speakers do not significantly alter position, segmentation by speaker location essentially leads to segmentation by speaker ‘ turn’. The proposed system calculates location information using TDEs and spatial cues extracted from multichannel meeting audio recordings. This location information is then input into a simple segmentation algorithm. Experiments have been performed on both theoretical and real meeting recordings with non-overlapping speakers, and theoretical recordings with overlapping speakers. Segmentation results reveal …


Exchanging Xml Multimedia Containers Using A Binary Xml Protocol, S. J. Davis, I. Burnett Jul 2005

Exchanging Xml Multimedia Containers Using A Binary Xml Protocol, S. J. Davis, I. Burnett

Faculty of Informatics - Papers (Archive)

XML is becoming increasingly popular as the ubiquitous standard for metadata; consequently, it is being incorporated into many multimedia applications, such as those based on MPEG-7 and MPEG-21. However, XML is often verbose and transmitting the large filescan be wasteful in bandwidth and power-limited mobile applications. This paper introduces an XML access mechanism, RXEP, which combines XML compression with a fragment access protocol. RXEP ensures that essential information is exchanged efficiently while minimising superfluous XML content transmission. This makes XML containers an attractive technique for multimedia content delivery.


Ontology-Based Resource Descriptions For Distributed Information Sources, Hui Yang, Minjie Zhang Jul 2005

Ontology-Based Resource Descriptions For Distributed Information Sources, Hui Yang, Minjie Zhang

Faculty of Informatics - Papers (Archive)

Content-based resource description is the key to find appropriate information sources that are most likely to contain the relevant documents for a given user query. However, semantic heterogeneity makes it difficult to acquire accurate and meaningful resource descriptions from distributed, heterogeneous information sources. To address this problem, we describe an ontology-based approach which uses domain-specific ontologies to extract content-related information from information sources, and to generate ontology-based resource descriptions. The preliminary experimental results demonstrate that our ontology-based approach could improve selection accuracy.


Compression Transparent Low-Level Description Of Audio Signals, Jason Lukasiak, C. Mcelroy, E Cheng Jul 2005

Compression Transparent Low-Level Description Of Audio Signals, Jason Lukasiak, C. Mcelroy, E Cheng

Faculty of Informatics - Papers (Archive)

A new low level audio descriptor that represents the psycho acoustic noise floor shape of an audio frame is proposed. Results presented indicate that the proposed descriptor is far more resilient to compression noise than any of the MPEG-7 low level audio descriptors. In fact, across a wide range of files, on average the proposed scheme fails to uniquely identify only five frames in every ten thousand. In addition, the proposed descriptor maintains a high resilience to compression noise even when decimated to use only one quarter of the values per frame to represent the noise floor. This characteristic indicates …


Mmse-Optimal Approximation Of Continuous-Phase Modulated Signal As Superposition Of Linearly Modulated Pulses, Xiaojing Huang, Y. Li Jul 2005

Mmse-Optimal Approximation Of Continuous-Phase Modulated Signal As Superposition Of Linearly Modulated Pulses, Xiaojing Huang, Y. Li

Faculty of Informatics - Papers (Archive)

The optimal linear modulation approximation of any M-ary continuous-phase modulated (CPM) signal under the minimum mean-square error (MMSE) criterion is presented in this paper. With the introduction of the MMSE signal component, an M-ary CPM signal is exactly represented as the superposition of a finite number of MMSE incremental pulses, resulting in the novel switched linear modulation CPM signal models. Then, the MMSE incremental pulse is further decomposed into a finite number of MMSE pulse-amplitude modulated (PAM) pulses, so that an M-ary CPM signal is alternatively expressed as the superposition of a finite number of MMSE PAM components, similar to …


Querying Private Data In Moving-Object Environments, Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar Jul 2005

Querying Private Data In Moving-Object Environments, Reynold Cheng, Yu Zhang, Elisa Bertino, Sunil Prabhakar

Department of Computer Science Technical Reports

No abstract provided.


Po2v: Network Layer Position Verification In Multi-Hopo Wireless Networks, Xizoxin Wu, Cristina Nita-Rotaru Jul 2005

Po2v: Network Layer Position Verification In Multi-Hopo Wireless Networks, Xizoxin Wu, Cristina Nita-Rotaru

Department of Computer Science Technical Reports

No abstract provided.


Sole: Scalable On-Line Execution Of Continuous Queries On Spatio-Temporal Data Streams, Mohamed F. Mokbel, Walid G. Aref Jul 2005

Sole: Scalable On-Line Execution Of Continuous Queries On Spatio-Temporal Data Streams, Mohamed F. Mokbel, Walid G. Aref

Department of Computer Science Technical Reports

No abstract provided.


Optical Photometry And Spectroscopy Of The Suspected "Cool Algol" Av Delphini: Determination Of The Physical Properties, Jeff A. Mader, Laurence A. Marschall, Guillermo Torres, Akbar H. Rizvi Jul 2005

Optical Photometry And Spectroscopy Of The Suspected "Cool Algol" Av Delphini: Determination Of The Physical Properties, Jeff A. Mader, Laurence A. Marschall, Guillermo Torres, Akbar H. Rizvi

Physics and Astronomy Faculty Publications

We present new spectroscopic and BVRI photometric observations of the double-lined eclipsing binary AV Del ( period = 3:85 days) conducted over six observing seasons. A detailed radial velocity and light-curve analysis of the optical data shows the system to be most likely semidetached, with the less massive and cooler star filling its Roche lobe. The system is probably a member of the rare class of ‘‘cool Algol’’ systems, which are distinguished from the ‘‘classical’’ Algol systems in that the mass-gaining component is also a late-type star rather than a B- or A-type star. By combining the spectroscopic and photometric …


Scwds Briefs: Volume 21, Number 2 (July 2005), Michael J. Yabsley Jul 2005

Scwds Briefs: Volume 21, Number 2 (July 2005), Michael J. Yabsley

Southeastern Cooperative Wildlife Disease Study: Publications


Unexplained Sea Bird Mortality: Since June 12, 2005, there have been numerous reports of dead or dying sea birds along the beaches of the eastern seaboard from Florida to Maryland.
Deer as Hosts of Anaplasmosis: Anaplasma phagocytophilum is the causative agent of human granulocytic anaplasmosis (HGA)
Vesicular Stomatitis Update: Vesicular stomatitis New Jersey virus (VSNJV) infection was confirmed in New Mexico, Arizona, Colorado, Texas, and Utah.
The Centers for Disease Control and Prevention (CDC) reported that four transplant recipients had developed severe illnesses after receiving organs from a Rhode Island donor. Lymphocytic choriomeningitis virus (LCMV) infection was confirmed in all …


Is Plasminogen Deployed As A Streptococcus Pyogenes Virulence Factor?, Mark J. Walker, Jason D. Mcarthur, F. Mckay, M. Ranson Jul 2005

Is Plasminogen Deployed As A Streptococcus Pyogenes Virulence Factor?, Mark J. Walker, Jason D. Mcarthur, F. Mckay, M. Ranson

Faculty of Science - Papers (Archive)

Streptococcus pyogenes (group A streptococcus) causes human skin and throat infections as well as highly invasive diseases including necrotising fasciitis. Group A streptococcal infections and invasive disease have made a resurgence in developed countries over the last two decades. S. pyogenes utilise multiple pathways for the acquisition and activation of human plasminogen, securing potent proteolytic activity on the bacterial cell surface. Recent experimental evidence using a humanised transgenic mouse model suggests a critical role for human plasminogen in the dissemination of S. pyogenes in vivo.