Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2006

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2581 - 2610 of 5872

Full-Text Articles in Physical Sciences and Mathematics

Engineering A Suburban Ad-Hoc Network, Mike Tyson, Ronald D. Pose, Carlo Kopp, Mohammad Rokonuzzaman, Muhammad Mahmudul Islam Apr 2006

Engineering A Suburban Ad-Hoc Network, Mike Tyson, Ronald D. Pose, Carlo Kopp, Mohammad Rokonuzzaman, Muhammad Mahmudul Islam

Australian Information Warfare and Security Conference

Networks are growing in popularity, as wireless communication hardware, both fixed and mobile, becomes more common and affordable. The Monash Suburban Ad-Hoc Network (SAHN) project has devised a system that provides a highly secure and survivable ad-hoc network, capable of delivering broadband speeds to co-operating users within a fixed environment, such as a residential neighbourhood, or a campus. The SAHN can be used by residents within a community to exchange information, to share access to the Internet, providing last-mile access, or for local telephony and video conferencing. SAHN nodes are designed to be self-configuring and selfmanaging, relying on no experienced …


Deception On The Network: Thinking Differently About Covert Channels, Maarten Van Horenbeeck Apr 2006

Deception On The Network: Thinking Differently About Covert Channels, Maarten Van Horenbeeck

Australian Information Warfare and Security Conference

The concept of covert channels has been visited frequently by academia in a quest to analyse their occurrence and prevention in trusted systems. This has lead to a wide variety of approaches being developed to prevent and identify such channels and implement applicable countermeasures. However, little of this research has actually trickled down into the field of operational security management and risk analysis. Quite recently a number of covert channels and enabling tools have appeared that did have a significant impact on the operational security of organizations. This paper identifies a number of those channels and shows the relative ease …


2nd Annual Undergraduate Research Conference Abstract Book, University Of Missouri--Rolla Apr 2006

2nd Annual Undergraduate Research Conference Abstract Book, University Of Missouri--Rolla

Undergraduate Research Conference at Missouri S&T

No abstract provided.


Honeypots: How Do You Know When You Are Inside One?, Simon Innes, Craig Valli Apr 2006

Honeypots: How Do You Know When You Are Inside One?, Simon Innes, Craig Valli

Australian Digital Forensics Conference

This paper will discuss honeypots and their use and effectiveness as a security measure in an IT environment. It will specifically discuss various methods of honeypot implementations. Furthermore, this paper will look into the weaknesses within a honeypot system. This will include attacks against honeypots and methods a hacker may use to detect the presence of a honeypot or the fact that he/she is actually inside one. Finally this paper will discuss methods of further securing honeypots and ways the community is dealing with security flaws as they are identified


Enhancing The Forensic Icq Logfile Extraction Tool, Kim Morfitt Apr 2006

Enhancing The Forensic Icq Logfile Extraction Tool, Kim Morfitt

Australian Digital Forensics Conference

Programmers of forensic tools need to ensure that their tools are of suitable use, robustness and correctness for their output to be used as evidence. One tool for logfile extraction that is currently under development and is intended for forensic use extracts information from ICQ clients has several limitations that need to be overcome before it is of significant value to forensic investigators. This paper covers the process and research involved in further developing the tool, and overcoming a subset of the limitations of the tool. It also documents what was learnt in the process about the logfiles and the …


Structural Analysis Of The Log Files Of The Icq Client Version 2003b, Kim Morfitt Apr 2006

Structural Analysis Of The Log Files Of The Icq Client Version 2003b, Kim Morfitt

Australian Digital Forensics Conference

Instant messenger programs can generate log files of user interactions which are of interest to forensic investigators. Some of the log files are in formats that are difficult for investigators to extract useful and accurate information from. The official ICQ client is one such program. Users log files are stored in a binary format that is difficult to understand and often changes with different client versions. Previous research has been performed that documents the format of the log files, however this research only covers earlier versions of the client. This paper explores the 2003b version of the ICQ client. It …


Personal Firewalls - Testing Robustness, Patryk Szewczyk, Craig Valli Apr 2006

Personal Firewalls - Testing Robustness, Patryk Szewczyk, Craig Valli

Australian Digital Forensics Conference

Consumers require personal firewalls that are highly secure, easy to use, configurable and uptodate with the latest signatures to detect malicious network activity. Robustness tests were performed on a selection of the ten most popular firewalls by market share. The test system used was a vanilla installation of Windows XP with SP2 and all the most recent updates and patches. Each firewall was installed with its default configuration following the didactic instructions given by the firewall. The investigation was carried out by performing an installation, penetration, performance and update test. A third party bitTorrent application was also installed mimicking a …


Forensic Analysis Of The Contents Of Nokia Mobile Phones, B. Williamson, P. Apeldoorn, B. Cheam, M. Mcdonald Apr 2006

Forensic Analysis Of The Contents Of Nokia Mobile Phones, B. Williamson, P. Apeldoorn, B. Cheam, M. Mcdonald

Australian Digital Forensics Conference

Acquiring information from a mobile phone is now an important issue in many criminal investigations. Mobile phones can contain large amounts of information which can be of use in an investigation. These include typical mobile device data including SMS, phone records and calendar and diary entries. As the difference between a PDA and a mobile phone is now blurred, the data that can reside on a mobile phone is somewhat endless. This report focuses on the performance of different mobile phone forensic software devices, and reports the findings. All aspects of the different software pieces will be reported, as well …


Liars - Laptop Inspector And Recovery System, Andrew Woodward Apr 2006

Liars - Laptop Inspector And Recovery System, Andrew Woodward

Australian Digital Forensics Conference

Of the many notebook computers which are stolen, a large number are subsequently recovered. However, if the device is password protected, and the serial number has been removed, then it is difficult for police or other authorities to trace the legitimate owner. The squad dedicated to computer related crime do not have sufficient resources to conduct a thorough forensic examination of every laptop in order to determine its rightful owner. This project aims to produce a tool which can be used by virtually any police officer, or other person, which does not alter the hard drive in any fashion. This …


Freeware Live Forensics Tools Evaluation And Operation Tips, Ricci Ieong Apr 2006

Freeware Live Forensics Tools Evaluation And Operation Tips, Ricci Ieong

Australian Digital Forensics Conference

Highlighted by a digital forensics investigation specialists from FBI in DFRWS 2006, live forensics investigations already become one of the most important procedures in digital forensics investigations. Many digital forensics investigation product companies have already joint the battlefield in developing their only live forensics tools. However, similar to the development trend in traditional digital forensics, evaluation criteria for Live Digital Forensics could only be standardized after operating procedures being standardized. One way to standardize the Live Digital Forensics Investigation procedure is to define the investigation objectives around the core digital forensics principles. Through the use of FORZA framework, a more …


A Fuzzy Approach For Detecting Anomalous Behaviour In E-Mail Traffic, Mark Jynhuey Lim, Michael Negnevitsky, Jacky Hartnett Apr 2006

A Fuzzy Approach For Detecting Anomalous Behaviour In E-Mail Traffic, Mark Jynhuey Lim, Michael Negnevitsky, Jacky Hartnett

Australian Digital Forensics Conference

This paper investigates the use of fuzzy inference for detection of abnormal changes in email traffic communication behaviour. Several communication behaviour measures and metrics are defined for extracting information on the traffic communication behaviour of email users. The information from these behaviour measures is then combined using a hierarchy of fuzzy inference systems, to provide an abnormality rating for overall changes in communication behaviour of suspect email accounts. The use of fuzzy inference is then demonstrated with a case study investigating the email traffic behaviour of a person’s email accounts from the Enron email corpus.


Voice Over Ip: Forensic Computing Implications, Matthew Simon, Jill Slay Apr 2006

Voice Over Ip: Forensic Computing Implications, Matthew Simon, Jill Slay

Australian Digital Forensics Conference

The issues faced by law enforcement authorities concerning VoIP are very different from that of traditional telephony. VoIP provides strong encryption and a decentralised databased network. Wiretapping is not applicable to VoIP calls and packet capturing is negated by encryption. New methods are required to collect evidence from systems running VoIP software. This paper presents work in progress and, based on a literature review of the field, explores a methodology that may be used to advance this research area.


Validation Of Forensic Computing Software Utilizing Black Box Testing Techniques, Tom Wilsdon, Jill Slay Apr 2006

Validation Of Forensic Computing Software Utilizing Black Box Testing Techniques, Tom Wilsdon, Jill Slay

Australian Digital Forensics Conference

The process of validating the correct operation of software is difficult for a variety of reasons. The need to validate software utilised as forensic computing tools suffers the same fate and is hampered to a greater extent with the source code of said tools usually not being accessible. Therefore a testing regime must be developed that offers a high degree of correctness and high probability of finding software faults with limited ability to view source code. Software testing is a complex component of software engineering in its own right. This complexity is encountered with an infinite number of environments posed …


The Elegance Of The Elegant Universe: Unity, Beauty, And Harmony In Brian Greene’S Popularization Of Superstring Theory, Rachel Edford Apr 2006

The Elegance Of The Elegant Universe: Unity, Beauty, And Harmony In Brian Greene’S Popularization Of Superstring Theory, Rachel Edford

EGS Content

The emergence of string theory into popular culture can be seen recent episodes of Joan of Arcadia and the NOVA series based on Brian Greene’s best-selling book, The Elegant Universe. Greene’s book has played a significant role in string theory’s emergence into popular culture. In order to persuade the general public to accept the new and controversial theory of superstrings as a revolutionary scientific theory, Greene carefully constructs his argument in The Elegant Universe, reinforcing the elegance and beauty of string theory and downplaying string theory’s lack of experimental verification. The Elegant Universe itself is an elegantly constructed argument, in …


Physical And Chemical Predictors Of Diatom Dissolution In Freshwater And Saline Lake Sediments In North America And West Greenland, David B. Ryves, Richard W. Battarbee, Stephen Juggins, Sherilyn C. Fritz, N. John Anderson Apr 2006

Physical And Chemical Predictors Of Diatom Dissolution In Freshwater And Saline Lake Sediments In North America And West Greenland, David B. Ryves, Richard W. Battarbee, Stephen Juggins, Sherilyn C. Fritz, N. John Anderson

Department of Earth and Atmospheric Sciences: Faculty Publications

Diatom dissolution in surface sediment samples from two regional lake datasets in the Northern Great Plains (NGP; n = 64) and West Greenland (n = 40) is assessed using a morphological approach categorizing valves during routine diatom analysis. Two dissolution indices are derived to parameterize diatom dissolution, and, when compared between two analysts in a blind test, show good correspondence and are closely correlated to diatom fragmentation. We explore the relationships between hydrochemical and physical lake parameters (including meromixis) on dissolution within both lake regions using multivariate methods and modeled with logistic regression. Salinity is the sole significant predictor …


Infrared Spectroscopy Of Symbiotic Stars. Iv. V2116 Ophiuchi/Gx 1+4, The Neutron Star Symbiotic, Kenneth H. Hinkle, Francis C. Fekel, Richard R. Joyce, Peter R. Wood, Verne V. Smith, Thomas Lebzelter Apr 2006

Infrared Spectroscopy Of Symbiotic Stars. Iv. V2116 Ophiuchi/Gx 1+4, The Neutron Star Symbiotic, Kenneth H. Hinkle, Francis C. Fekel, Richard R. Joyce, Peter R. Wood, Verne V. Smith, Thomas Lebzelter

Information Systems and Engineering Management Research Publications

We have computed, using 17 infrared radial velocities, the first set of orbital elements for the M giant in the symbiotic binary V2116 Ophiuchi. The giant's companion is a neutron star, the bright X-ray source GX 1+4. We rule out the previously proposed period of 304 days and instead find an orbital period of 1161 days, by far the longest of any known X-ray binary. The orbit has a modest eccentricity of 0.10, with an orbital circularization time of ≲5 × 106 yr. The large mass function of the orbit significantly restricts the mass of the M giant. Adopting a …


Electric Field-Induced Force Between Two Identical Uncharged Spheres, B. J. Cox, N. Thamwattana, James M. Hill Apr 2006

Electric Field-Induced Force Between Two Identical Uncharged Spheres, B. J. Cox, N. Thamwattana, James M. Hill

Faculty of Informatics - Papers (Archive)

The problem of electric field-induced force between spheres is fundamental to electrorheological fluids. Previously published experimental results indicate that the interaction force between two spheres under an external field is not adequately explained by the existing approximate and numerical methods. The specific models compared were dipole, dipole with local field corrections and a finite-element analysis. This letter employs an exact solution (via the equivalent multipole-moment method) to the electrostatic problem which accurately predicts the low-frequency experimental results at all measured interstices. The solution presented later is self-contained and addresses specifically the geometry of the previously mentioned experimental results. While more …


Post-Outburst Infrared Spectra Of V1647 Ori, The Illuminating Star Of Mcneil's Nebula, Erika Gibb, T Rettig, S Brittain, D Wasikowski, Theodore Simon, William Vacca, Michael Cushing Apr 2006

Post-Outburst Infrared Spectra Of V1647 Ori, The Illuminating Star Of Mcneil's Nebula, Erika Gibb, T Rettig, S Brittain, D Wasikowski, Theodore Simon, William Vacca, Michael Cushing

Physics Faculty Works

V1647 Ori is a low-mass star in the L1630 star-forming region that underwent an outburst in late 2003 and early 2004. We present postoutburst infrared spectra obtained with NIRSPEC (Keck II) and SpeX (IRTF) and compare these to spectra taken during the outburst. The results show that the temperature of the hot CO formed in the inner part of the disk has declined by ~800 K, while the water and CO ice and low-J CO gas features remained unchanged, consistent with previous assertions that the latter, low-temperature features arise in the foreground cloud. The P Cygni profiles of the Paschen …


Erratum: “Terahertz Studies Of The Dielectric Response And Second-Order Phonons In A Gase Crystal” [Appl. Phys. Lett.87, 182104 (2005)], B. L. Yu, F. Zeng, V. Kartazayev, R. R. Alfano, K. C. Mandal Apr 2006

Erratum: “Terahertz Studies Of The Dielectric Response And Second-Order Phonons In A Gase Crystal” [Appl. Phys. Lett.87, 182104 (2005)], B. L. Yu, F. Zeng, V. Kartazayev, R. R. Alfano, K. C. Mandal

Faculty Publications

No abstract provided.


Patterns In Body Mass Distributions: Sifting Among Alternative Hypotheses, Craig R. Allen, A. S. Garmestani, T. D. Havlicek, P. A. Marquet, G. D. Peterson, C. Restrepo, C. A. Stow, B. E. Weeks Apr 2006

Patterns In Body Mass Distributions: Sifting Among Alternative Hypotheses, Craig R. Allen, A. S. Garmestani, T. D. Havlicek, P. A. Marquet, G. D. Peterson, C. Restrepo, C. A. Stow, B. E. Weeks

School of Natural Resources: Faculty Publications

Understanding how animals interact with their environment is critical for evaluating, mitigating and coping with anthropogenic alteration of Earth’s biosphere. Researchers have attempted to understand some aspects of these interactions by examining patterns in animal body mass distributions. Energetic, phylogenetic, biogeographical, textural discontinuity and community interaction hypotheses have been advanced to explain observed patterns. Energetic and textural discontinuity hypotheses focus upon the allometry of resource use. The community interaction hypothesis contends that biotic interactions within assemblages of species are of primary importance. Biogeographical and phylogenetic hypotheses focus on the role of constraints on the organization of communities. This paper examines …


Post-Outburst Infrared Spectra Of V1647 Ori, The Illuminating Star Of Mcneil's Nebula, Erika Gibb, T W. Rettig, S D. Brittain, D Wasikowski, Theodore Simon, William D. Vacca, Michael C. Cushing Apr 2006

Post-Outburst Infrared Spectra Of V1647 Ori, The Illuminating Star Of Mcneil's Nebula, Erika Gibb, T W. Rettig, S D. Brittain, D Wasikowski, Theodore Simon, William D. Vacca, Michael C. Cushing

Erika Gibb

V1647 Ori is a low-mass star in the L1630 star-forming region that underwent an outburst in late 2003 and early 2004. We present postoutburst infrared spectra obtained with NIRSPEC (Keck II) and SpeX (IRTF) and compare these to spectra taken during the outburst. The results show that the temperature of the hot CO formed in the inner part of the disk has declined by ~800 K, while the water and CO ice and low-J CO gas features remained unchanged, consistent with previous assertions that the latter, low-temperature features arise in the foreground cloud. The P Cygni profiles of the Paschen …


The Electronic Structure Of 1,2-Pcb10H11 Molecular Films: A Precursor To A Novel Semiconductor, Snjezana Balaz, D.I. Dimov, N.M. Boag, K. Nelson, B. Montag, Jennifer I. Brand, Peter A. Dowben Apr 2006

The Electronic Structure Of 1,2-Pcb10H11 Molecular Films: A Precursor To A Novel Semiconductor, Snjezana Balaz, D.I. Dimov, N.M. Boag, K. Nelson, B. Montag, Jennifer I. Brand, Peter A. Dowben

Peter Dowben Publications

The band gaps and electronic structure of un doped films of molecular icosahedra of closo-1-phospha-2 carbadodecaborane (1,2-PCB10H11) are reported. 1,2-PCB10H11 adsorbs on Au and Ag substrates to generate molecular thin films with the Fermi level(chemical potential) placed closer to the lowest unoccupied molecular orbital than has been observed with closo-1,2-dicarbadodecaborane (1,2-C2B10H12, orthocarborane) adsorbed on Co, Cu or Ag. Both 1,2-PCB10H11 and 1,2-C2B10H12 molecular films exhibit an unoccupied molecular defect state above the Fermi level. The vibrational modes, observed in …


Global Residues For Sparse Polynomial Systems, Ivan Soprunov Apr 2006

Global Residues For Sparse Polynomial Systems, Ivan Soprunov

Mathematics and Statistics Faculty Publications

We consider families of sparse Laurent polynomials f1, . . . , fn with a finite set of common zeros Z f in the torus Tn = (C − {0})n. The global residue assigns to every Laurent polynomial g the sum of its Grothendieck residues over Z f . We present a new symbolic algorithm for computing the global residue as a rational function of the coefficients of the fi when the Newton polytopes of the fi are full-dimensional. Our results have consequences in sparse polynomial interpolation and lattice point enumeration in Minkowski sums of polytopes.


Erratum: Strain Induced Half-Metal To Semiconductor Transition In Gdn, Chun-Gang Duan, R.F. Sabiryanov, Jianjun Liu, Wai-Ning Mei, Peter A. Dowben, J.R. Hardy Apr 2006

Erratum: Strain Induced Half-Metal To Semiconductor Transition In Gdn, Chun-Gang Duan, R.F. Sabiryanov, Jianjun Liu, Wai-Ning Mei, Peter A. Dowben, J.R. Hardy

Peter Dowben Publications

The minus sign of the Heisenberg Hamiltonian on p. 3 should be removed since in this Letter we use the negative value to represent ferromagnetic interaction.


2006 - The Eleventh Annual Symposium Of Student Scholars Apr 2006

2006 - The Eleventh Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Eleventh Annual Symposium of Student Scholars, held on April 7, 2006. Includes abstracts from the presentations and posters.


Chemo-Enzymatic Route To Synthesis Of Biodegradable Polymers And Glycolipid Analogs, Surbhi Bhatt Apr 2006

Chemo-Enzymatic Route To Synthesis Of Biodegradable Polymers And Glycolipid Analogs, Surbhi Bhatt

USF Tampa Graduate Theses and Dissertations

New catalytic synthetic methods in organic chemistry that satisfy increasingly stringent environmental constraints are in great demand by the pharmaceutical and chemical industries. Studies over last 15 years have revealed that activity of enzymes can be increased in organic solvents rather than their natural aqueous environment. Because of their ease of use, high selectivity and environment friendliness, enzymes are enjoying increasing popularity in today's synthesis world.

Chapter 1 describes chemo-enzymatic synthesis of various glycolipid analogs. A highly regioselective macrolactonization was achieved using lipase from Candida antarctica as a catalyst. It also describes evaluation of lipases from different source and their …


Swindew-S: Extending P2p Workflow Systems For Adaptive Composite Web Services, Jun Shen, Jun Yan, Yun Yang Apr 2006

Swindew-S: Extending P2p Workflow Systems For Adaptive Composite Web Services, Jun Shen, Jun Yan, Yun Yang

Faculty of Informatics - Papers (Archive)

SwinDeW, an innovative decentralised workflow management system, has established an underlying framework for peer-to-peer (p2p) based business process coordination environments. SwinDeW-S extends SwinDeW to support adaptive composite service orchestration in the era of service-oriented computing. This paper comprehensively presents features of SwinDeW-S, including the p2p network establishment, the messaging mechanism, the service deployment and enactment, the service discovery and advertisement, and the service flow execution. The prototypical extension of SwinDeW to SwinDeW-S and the advantages of SwinDeW-S are also examined and analysed. With the innovative integration of service and p2p-based enterprise application techniques, SwinDeW-S can support composite service orchestration, deployment …


Survival Analysis With Change Point Hazard Functions, Melody S. Goodman, Yi Li, Ram C. Tiwari Apr 2006

Survival Analysis With Change Point Hazard Functions, Melody S. Goodman, Yi Li, Ram C. Tiwari

Harvard University Biostatistics Working Paper Series

No abstract provided.


Some Remarks On Heegner Point Computations, Mark Watkins Apr 2006

Some Remarks On Heegner Point Computations, Mark Watkins

Mathematics - All Scholarship

We explain how to find a rational point on a rational elliptic curve of rank 1 using Heegner points. We give some examples, and list new algorithms that are due to Cremona and Delaunay. These are notes from a short course given at the Institut Henri Poincare in December 2004.


Nondipole Effects In Double Photoionization Of He At 450 Ev Excess Energy, Andrei Y. Istomin, Anthony F. Starace, N.L. Manakov, A.V. Meremianin, A. S. Kheifets, Igor Bray Apr 2006

Nondipole Effects In Double Photoionization Of He At 450 Ev Excess Energy, Andrei Y. Istomin, Anthony F. Starace, N.L. Manakov, A.V. Meremianin, A. S. Kheifets, Igor Bray

Anthony F. Starace Publications

Convergent close-coupling results for the triply differential cross section for double photoionization of He that include dipole–quadrupole terms are shown to have improved agreement (as compared to dipole approximation results) with recent experiments using linearly polarized light (Knapp A et al 2005 J. Phys. B: At. Mol. Opt. Phys. 38 615) for a number of kinematical configurations.