Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 121 - 150 of 5872

Full-Text Articles in Physical Sciences and Mathematics

Network Forensics And Privacy Enhancing Technologies “Living” Together In Harmony, Giannakis Antoniou, Stefanos Gritzalis Dec 2006

Network Forensics And Privacy Enhancing Technologies “Living” Together In Harmony, Giannakis Antoniou, Stefanos Gritzalis

Australian Information Security Management Conference

Privacy Enhancing Technology (PET) is the technology responsible to hide the identification of Internet users, whereas network forensics is a technology responsible to reveal the identification of Internet users who perform illegal actions through the Internet. The paper identifies the collision of these opposite-goal technologies and describes what happens in case they come across. Can a Network Forensics protocol discover the identification of an Internet user who is trying to be anonymous behind a PET? The paper also proposes a way to bridge and eliminate the gap between these two technologies.


Electronic Surveillance In Hospitals: A Review, Sue Kennedy Dec 2006

Electronic Surveillance In Hospitals: A Review, Sue Kennedy

Australian Information Security Management Conference

This paper focuses on the increasing use of electronic surveillance systems in hospitals and the apparent lack of awareness of the implications of these systems for privacy of the individual. The systems are used for identification and tracking of equipment, staff and patients. There has been little public comment or analysis of these systems with regard to privacy as their implementation has been driven by security issues. The systems that gather this information include video, smart card and more recently RFID systems. The system applications include tracking of vital equipment, labelling of blood and other samples, tracking of patients, new …


Individuals’ Perceptions Of Wireless Security In The Home Environment, Patryk Szewczyk Dec 2006

Individuals’ Perceptions Of Wireless Security In The Home Environment, Patryk Szewczyk

Australian Information Security Management Conference

Research in 802.11 wireless networking has in the past focused predominantly on corporate wireless network use, or identifying the flaws in wireless security. This study was aimed to determine the individuals’ perceptions of wireless security in the home environment. 163 volunteers completed a survey on their perceptions, knowledge, experiences and attitudes towards wireless networking. The results of the survey indicated that there is little difference in knowledge between those who had worked in the IT industry, and those who did not. The sources of information used to configure wireless networks are not improving the knowledge respondents had on wireless security. …


Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams Dec 2006

Making Research Real: Is Action Research A Suitable Methodology For Medical Information Security Investigations?, Patricia A. Williams

Australian Information Security Management Conference

In the medical field, information security is an important yet vastly underrated issue. Research into the protection of sensitive medical data is often technically focused and does not address information systems and behavioural aspects integral to effective information security implementation. Current information security policy and guidelines are strategically oriented which, whilst relevant to large organisations, are less supportive to smaller enterprises such as primary care practices. Further, the conservative nature of the medical profession has been shown to hinder investigation into information technology use and management, making effective improvement based on research problematical. It is an environment which relies greatly …


Comparison Of Methods Used For Aligning Protein Sequences, Sangeetha Madangopal Dec 2006

Comparison Of Methods Used For Aligning Protein Sequences, Sangeetha Madangopal

Computer Science Theses

Comparing protein sequences is an essential procedure that has many applications in the field of bioinformatics. The recent advances in computational capabilities and algorithm design, simplified the comparison procedure of protein sequences from several databases. Various algorithms have emerged using state of the art approaches to match protein sequences based on structural and functional properties of the amino acids. The matching involves structural alignment, and this alignment may be global; comprising of the whole length of the protein, or local; comprising of the sub-sequences of the proteins. Families of related proteins are found by clustering sequence alignments. The frequency distributions …


Scalable Proxy Architecture For Mobile And Peer-To-Peer Networks, Praveena Jayanthi Dec 2006

Scalable Proxy Architecture For Mobile And Peer-To-Peer Networks, Praveena Jayanthi

Computer Science Theses

The growth of wireless telecommunications has stipulated the interest for anywhere-anytime computing. The synergy between networking and mobility will engender new collaborative applications with mobile devices on heterogeneous platforms. One such middleware is “SYSTEM ON MOBILE DEVICES”, SYD developed by the Yamacraw Embedded Systems research team. This type of middleware is an opening step towards Peer-to-Peer mobile networks. This project envisioned collaborative applications among mobile devices and PDAs were used as servers. This thesis studies various existing architectures in mobile computing and their scalability issues. We also proposed new scalable flexible thick client proxy system FTCPS, an architecture suitable for …


An Agent Based Transaction Manager For Multidatabase Systems, Sugandhi Madiraju Dec 2006

An Agent Based Transaction Manager For Multidatabase Systems, Sugandhi Madiraju

Computer Science Theses

A multidatabase system (MDBMS) is a facility that allows users to access data located in multiple autonomous database management systems (DBMSs) at different sites. To ensure global atomicity for multidatabase transactions, a reliable global atomic commitment protocol is a possible solution. In this protocol a centralized transaction manager (TM) receives global transactions, submits subtransactions to the appropriate sites via AGENTS. An AGENT is a component of MDBS that runs on each site; AGENTS after receiving subtransactions from the transaction manager perform the transaction and send the results back to TM. We have presented a unique proof-of-concept, a JAVA application for …


Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang Dec 2006

Toward A Heuristic Model For Evaluating The Complexity Of Computer Security Visualization Interface, Hsiu-Chung Wang

Computer Science Theses

Computer security visualization has gained much attention in the research community in the past few years. However, the advancement in security visualization research has been hampered by the lack of standardization in visualization design, centralized datasets, and evaluation methods. We propose a new heuristic model for evaluating the complexity of computer security visualizations. This complexity evaluation method is designed to evaluate the efficiency of performing visual search in security visualizations in terms of measuring critical memory capacity load needed to perform such tasks. Our method is based on research in cognitive psychology along with characteristics found in a majority of …


Life Data Analysis Of Repairable Systems: A Case Study On Brigham Young University Media Rooms, Stephen Oluaku Manortey Dec 2006

Life Data Analysis Of Repairable Systems: A Case Study On Brigham Young University Media Rooms, Stephen Oluaku Manortey

Theses and Dissertations

It is an undisputable fact that most systems, upon consistence usage are bound to fail in the performance of their intended functions at a point in time. When this occurs, various strategies are set in place to restore them back to a satisfactory performance. This may include replacing the failed component with a new one, swapping parts, resetting adjustable parts to mention but a few. Any such system is referred to as a repairable system. There is the need to study these systems and use statistical models to predict their failing time and be able to set modalities in place …


Visualization Of Polymer Processing At The Continuum Level, Jeremy Hicks Dec 2006

Visualization Of Polymer Processing At The Continuum Level, Jeremy Hicks

All Theses

Computer animation, coupled with scientific experimentation and modeling, allows scientists to produce detailed visualizations that potentially enable more comprehensive perception of physical phenomena and ultimately, new discoveries. With the use of Maya, an animation and modeling program that incorporates the natural laws of physics to control the behavior of virtual objects in computer animation, data from the modeling of physical processes such as polymer fibers and films can be explored in the visual realm. Currently, few attempts have been made at the continuum level to represent polymer properties via computer animation using advanced graphics. As a result, scientists may be …


Path Integral Formulation Of Langeinv Dynamics With Applications To Rare-Event Systems, Bradley Dickson Dec 2006

Path Integral Formulation Of Langeinv Dynamics With Applications To Rare-Event Systems, Bradley Dickson

All Dissertations

In the last decade great efforts have been made to efficiently study the behaviors of rare-event systems. The methods and theories developed in pursuit of this goal are far from unified and are instead applied on a case-by-case basis where one makes a best educated guess as to which approach may afford the greatest chance of studying the rare-event system in question. The work contained here is directed at further development of one of these sets of methods and theories. Specifically, a new theory of dynamics in the Langevin path space is developed with emphasis on generating and sampling Langevin …


Interview With Dan Lajoie, Departure: Architecture Planning, 2006 (Audio), Dan Lajoie Dec 2006

Interview With Dan Lajoie, Departure: Architecture Planning, 2006 (Audio), Dan Lajoie

All Sustainability History Project Oral Histories

Interview of Dan Lajoie by Tirsa Firncrook in SE Portland, Oregon on December 4th, 2006.

The interview index is available for download.


Linking Bioturbation And Sensory Biology: Chemoreception Mechanisms In Deposit-Feeding Polychaetes, Sara M. Lindsay, Paul Rawson Dec 2006

Linking Bioturbation And Sensory Biology: Chemoreception Mechanisms In Deposit-Feeding Polychaetes, Sara M. Lindsay, Paul Rawson

University of Maine Office of Research Administration: Grant Reports

Soft-sediment benthic habitats are ubiquitous in the marine environment and typically feature macrofaunal assemblages that include large numbers of deposit-feeding invertebrates such as polychaetes, bivalves, gastropods, crustaceans, holothurians, and hemichordates. Via their feeding, modulated in part by chemoreception, these organisms have profound effects on the ecology, biology, geology, and chemistry of their habitats. Very little is known, however, concerning the physiology and molecular biology of chemoreception in deposit feeders.

This research is a comprehensive investigation of the sensory mechanisms coordinating chemoreception in deposit feeding spionid polychaetes. It directly addresses this lack of information and will therefore have a significant impact …


Suboptimal Feedback Control Design Of Constrained Parabolic Systems In Uncertainty Conditions, Boris S. Mordukhovich Dec 2006

Suboptimal Feedback Control Design Of Constrained Parabolic Systems In Uncertainty Conditions, Boris S. Mordukhovich

Mathematics Research Reports

The paper concerns minimax control problems forlinear multidimensional parabolic systems with distributed uncertain perturbations and control functions acting in the Dirichlet boundary conditions. The underlying parabolic control system is functioning under hard/pointwise constraints on control and state variables. The main goal is to design a feedback control regulator that ensures the required state performance and robust stability under any feasible perturbations and minimize an energy-type functional under the worst perturbations from the given area. We develop an efficient approach to the minimax control design of constrained parabolic systems that is based on certain characteristic features of the parabolic dynamics including …


Stability Of Discrete Solitons In The Presence Of Parametric Driving, H. Susanto, Q. E. Hoq, Panos Kevrekidis Dec 2006

Stability Of Discrete Solitons In The Presence Of Parametric Driving, H. Susanto, Q. E. Hoq, Panos Kevrekidis

Panos Kevrekidis

In this Brief Report, we consider parametrically driven bright solitons in the vicinity of the anticontinuum limit. We illustrate the mechanism through which these solitons become unstable due to the collision of the phase mode with the continuous spectrum, or eigenvalues bifurcating thereof. We show how this mechanism typically leads to complete destruction of the bright solitary wave.


Interview With Steven Edward Koch, Koch Landscape Architecture, 2006, Steven Edward Koch Dec 2006

Interview With Steven Edward Koch, Koch Landscape Architecture, 2006, Steven Edward Koch

All Sustainability History Project Oral Histories

Interview of Steven Edward Koch by Robyn Russnogle on December 4th, 2006.

The interview index is available for download.


Compressed Text Indexing And Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, Jeffrey S. Vitter Dec 2006

Compressed Text Indexing And Range Searching, Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, Jeffrey S. Vitter

Department of Computer Science Technical Reports

No abstract provided.


Mapping The Consensual Knowledge Of Security Risk Management Experts, David J. Brooks Dec 2006

Mapping The Consensual Knowledge Of Security Risk Management Experts, David J. Brooks

Australian Information Warfare and Security Conference

The security industry comprises of diverse and multidisciplined practitioners, originating from many disciplines. It has been suggested that the industry has an undefined knowledge structure, although security experts contain a rich knowledge structure. There has also been limited research mapping security expert knowledge structure, reducing the ability of tertiary educators to provide industry focused teaching and learning. The study utilized multidimensional scaling (MDS) and expert interviews to map the consensual knowledge structure of security experts in their understanding of security risk. Security risk concepts were extracted and critiqued from West Australian university courses. Linguistic analysis categorised the more utilized security …


The Association Of Hypertension Diagnosis With Smoking Cessation: Application Of Multiple Logistic Regression Using Biostatistical And Epidemiological Methods, Latonia Clay Dec 2006

The Association Of Hypertension Diagnosis With Smoking Cessation: Application Of Multiple Logistic Regression Using Biostatistical And Epidemiological Methods, Latonia Clay

Mathematics Theses

The Association of Hypertension Diagnosis with Smoking Cessation: Application of Multiple Logistic Regression Using Biostatistical and Epidemiological Methods by LaTonia A. Clay Under the Direction of Yu-Sheng Hsu, PhD. ABSTRACT Hypertension and smoking are two major issues threatening the nation’s health. Previous studies examining their relationship have resulted in conflicting reports. The aim of this study is to determine if a relationship exists between smoking cessation and hypertension diagnosis. Data from the Third National Health and Nutrition Examination Survey (NHANES III) were used in this investigation. Physical examination measurements of blood pressure and self-reported diagnosis and smoking behavior were used …


Syntheses And Dna Interactions Of Acridine And Phenothiazine Based Photosensitizers, Beth Wilson Dec 2006

Syntheses And Dna Interactions Of Acridine And Phenothiazine Based Photosensitizers, Beth Wilson

Chemistry Dissertations

Photosensitizing molecules and/or metal complexes that interact with DNA via intercalation and groove binding have potential applications as molecular structural probes, as footprinting reagents and in photodynamic therapeutics. To this regard, small molecules that bind to DNA and the energetics involved in these interactions, acridine-based therapeutics, photosensitization, photodynamic therapy, phenothiazine-mediated photosensitization, DNA photocleavage reaction mechanisms and photosensitizing metal complexes are introduced in Chapter I. Next, in Chapter II, the synthesis of a photonuclease consisting of a 3,6-acridinediamine chromophore attached to four metal-coordinating imidazole rings is described. The DNA photocleavage yields, emission quantum yields, and thermal denaturation studies by this acridine-imadazole …


Estimate The True Pass Probability For Near-Real-Time Monitor Challenge Data Using Bayesian Analysis, Yuqing Xiao Dec 2006

Estimate The True Pass Probability For Near-Real-Time Monitor Challenge Data Using Bayesian Analysis, Yuqing Xiao

Mathematics Theses

The U.S. Army¡¯s Chemical Demilitarization are designed to store, treat and destroy the nation¡¯s aging chemical weapons. It operates Near-Real-Time Monitors and Deport Area Monitoring Systems to detect chemical agent at concentrations before they become dangerous to workers, public health and the environment. CDC recommends that the sampling and analytical methods measure within 25% of the true concentration 95% of the time, and if this criterion is not met the alarm set point or reportable level should be adjusted. Two methods were provided by Army¡¯s Programmatic Laboratory and Monitoring Quality Assurance Plan to evaluate the monitoring systems based on CDC …


Characterizations In Domination Theory, Andrew Robert Plummer Dec 2006

Characterizations In Domination Theory, Andrew Robert Plummer

Mathematics Theses

Let G = (V,E) be a graph. A set R is a restrained dominating set (total restrained dominating set, resp.) if every vertex in V − R (V) is adjacent to a vertex in R and (every vertex in V −R) to a vertex in V −R. The restrained domination number of G (total restrained domination number of G), denoted by gamma_r(G) (gamma_tr(G)), is the smallest cardinality of a restrained dominating set (total restrained dominating set) of G. If T is a tree of order n, then gamma_r(T) is greater than or equal to (n+2)/3. We show that gamma_tr(T) is …


Development Of Polymer Monoliths For The Analysis Of Peptides And Proteins, Binghe Gu Dec 2006

Development Of Polymer Monoliths For The Analysis Of Peptides And Proteins, Binghe Gu

Theses and Dissertations

Several novel polymer monoliths for the analysis of peptides and proteins were synthesized using polyethylene glycol diacrylate (PEGDA) as crosslinker. Photo-initiated copolymerization of polyethylene glycol methyl ether acrylate and PEGDA yielded an inert monolith that could be used for size exclusion liquid chromatography of peptides and proteins. This macroscopically uniform monolith did not shrink or swell in either water or tetrahydrofuran. More importantly, it was found to resist adsorption of both acidic and basic proteins in aqueous buffer without any organic solvent additives. A strong cation-exchange polymer monolith was synthesized by copolymerization of 2-acrylamido-2-methyl-1-propanesulfonic acid (AMPS) and PEGDA. A ternary …


Fuzzy-Granular Based Data Mining For Effective Decision Support In Biomedical Applications, Yuanchen He Dec 2006

Fuzzy-Granular Based Data Mining For Effective Decision Support In Biomedical Applications, Yuanchen He

Computer Science Dissertations

Due to complexity of biomedical problems, adaptive and intelligent knowledge discovery and data mining systems are highly needed to help humans to understand the inherent mechanism of diseases. For biomedical classification problems, typically it is impossible to build a perfect classifier with 100% prediction accuracy. Hence a more realistic target is to build an effective Decision Support System (DSS). In this dissertation, a novel adaptive Fuzzy Association Rules (FARs) mining algorithm, named FARM-DS, is proposed to build such a DSS for binary classification problems in the biomedical domain. Empirical studies show that FARM-DS is competitive to state-of-the-art classifiers in terms …


Cad Tools For Dna Micro-Array Design, Manufacture And Application, Nisar Hundewale Dec 2006

Cad Tools For Dna Micro-Array Design, Manufacture And Application, Nisar Hundewale

Computer Science Dissertations

Motivation: As the human genome project progresses and some microbial and eukaryotic genomes are recognized, numerous biotechnological processes have attracted increasing number of biologists, bioengineers and computer scientists recently. Biotechnological processes profoundly involve production and analysis of highthroughput experimental data. Numerous sequence libraries of DNA and protein structures of a large number of micro-organisms and a variety of other databases related to biology and chemistry are available. For example, microarray technology, a novel biotechnology, promises to monitor the whole genome at once, so that researchers can study the whole genome on the global level and have a better picture of …


64 X 64 Bit Multiplier Using Pass Logic, Shibi Thankachan Dec 2006

64 X 64 Bit Multiplier Using Pass Logic, Shibi Thankachan

Computer Science Theses

ABSTRACT Due to the rapid progress in the field of VLSI, improvements in speed, power and area are quite evident. Research and development in this field are motivated by growing markets of portable mobile devices such as personal multimedia players, cellular phones, digital camcorders and digital cameras. Among the recently popular logic families, pass transistor logic is promising for low power applications as compared to conventional static CMOS because of lower transistor count. This thesis proposes four novel designs for Booth encoder and selector logic using pass logic principles. These new designs are implemented and used to build a 64 …


A Characterization Of Wireless Network Interface Card Active Scanning Algorithms, Vaibhav Gupta Dec 2006

A Characterization Of Wireless Network Interface Card Active Scanning Algorithms, Vaibhav Gupta

Computer Science Theses

In this thesis, we characterize the proprietary active scanning algorithm of several wireless network interface cards. Our experiments are the first of its kind to observe the complete scanning process as the wireless network interface cards probe all the channels in the 2.4GHz spectrum. We discuss the: 1) correlation of channel popularity during active scanning and access point channel deployment popularity; 2) number of probe request frames statistics on each channel; 3) channel probe order; and 4) dwell time. The knowledge gained from characterizing wireless network interface cards is important for the following reasons: 1) it helps one understand how …


An Enhanced Algorithm To Find Dominating Set Nodes In Ad Hoc Wireless Networks, Naresh Nanuvala Dec 2006

An Enhanced Algorithm To Find Dominating Set Nodes In Ad Hoc Wireless Networks, Naresh Nanuvala

Computer Science Theses

A wireless ad hoc network is a collection of wireless mobile nodes forming a temporary network without the aid of any established infrastructure or centralized administration. A connection is achieved between two nodes through a single hop transmission if they are directly connected or multi-hop transmission if they are not. The wireless networks face challenges to form an optimal routing protocol. Some approaches are based on a dominating set, which has all the nodes either in the set or within its neighborhood. The proposed algorithm is an enhancement of the distributed algorithm proposed by Wu and Li. The simulation results …


Threshold Extension Of Gallium Arsenide/Aluminum Gallium Arsenide Terahertz Detectors And Switching In Heterostructures, Mohamed Buhary Rinzan Dec 2006

Threshold Extension Of Gallium Arsenide/Aluminum Gallium Arsenide Terahertz Detectors And Switching In Heterostructures, Mohamed Buhary Rinzan

Physics and Astronomy Dissertations

In this work, homojunction interfacial workfunction internal photoemission (HIWIP) detectors based on GaAs, and heterojunction interfacial workfunction internal photoemission (HEIWIP) detectors based mainly on the Gallium Arsenide/Aluminum Gallium Arsenide material system are presented. Design principles of HIWIP and HEIWIP detectors, such as free carrier absorption, photocarrier generation, photoemission, and responsivity, are discussed in detail. Results of p-type HIWIPs based on GaAs material are presented. Homojunction detectors based on p-type GaAs were found to limit their operating wavelength range. This is mainly due to band depletion arising through carrier transitions from the heavy/light hole bands to the split off band. Designing …


A Framework For Dynamic Terrain With Application In Off-Road Ground Vehicle Simulations, Anthony Scott Aquilio Dec 2006

A Framework For Dynamic Terrain With Application In Off-Road Ground Vehicle Simulations, Anthony Scott Aquilio

Computer Science Dissertations

The dissertation develops a framework for the visualization of dynamic terrains for use in interactive real-time 3D systems. Terrain visualization techniques may be classified as either static or dynamic. Static terrain solutions simulate rigid surface types exclusively; whereas dynamic solutions can also represent non-rigid surfaces. Systems that employ a static terrain approach lack realism due to their rigid nature. Disregarding the accurate representation of terrain surface interaction is rationalized because of the inherent difficulties associated with providing runtime dynamism. Nonetheless, dynamic terrain systems are a more correct solution because they allow the terrain database to be modified at run-time for …