Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1369)
- Environmental Sciences (1027)
- Physics (870)
- Engineering (762)
- Chemistry (692)
-
- Life Sciences (595)
- Earth Sciences (528)
- Mathematics (475)
- Social and Behavioral Sciences (422)
- Computer Engineering (320)
- Statistics and Probability (298)
- Oceanography and Atmospheric Sciences and Meteorology (243)
- Astrophysics and Astronomy (216)
- Geology (206)
- Electrical and Computer Engineering (204)
- Natural Resources Management and Policy (167)
- Applied Mathematics (165)
- Databases and Information Systems (150)
- Natural Resources and Conservation (149)
- Education (148)
- Environmental Health and Protection (147)
- Physical Chemistry (136)
- Information Security (117)
- Materials Science and Engineering (116)
- Environmental Monitoring (113)
- Water Resource Management (105)
- Medicine and Health Sciences (101)
- Plant Sciences (94)
- Law (90)
- Institution
-
- University of Nebraska - Lincoln (699)
- University of Wollongong (344)
- Wright State University (228)
- TÜBİTAK (218)
- Selected Works (167)
-
- University of Nevada, Las Vegas (146)
- Missouri University of Science and Technology (142)
- Brigham Young University (127)
- Singapore Management University (120)
- University of Kentucky (109)
- William & Mary (105)
- SelectedWorks (104)
- Louisiana State University (103)
- COBRA (101)
- Old Dominion University (101)
- California Polytechnic State University, San Luis Obispo (96)
- Edith Cowan University (93)
- Chinese Chemical Society | Xiamen University (89)
- Air Force Institute of Technology (88)
- University of Tennessee, Knoxville (75)
- Embry-Riddle Aeronautical University (73)
- Portland State University (72)
- Utah State University (71)
- Georgia State University (70)
- University of Central Florida (69)
- Dartmouth College (68)
- University of Massachusetts Amherst (66)
- Washington University in St. Louis (62)
- The University of Maine (59)
- University of Texas at Arlington (56)
- Keyword
-
- College for Professional Studies (51)
- MS Computer and Information Technology (47)
- School of Computer & Information Science (43)
- Regis University MSCIT thesis (31)
- Research and Technical Reports (30)
-
- Algorithms (26)
- Mathematics (26)
- Physics (26)
- Outdoor education (25)
- Data (24)
- Management (23)
- CMMB (22)
- GIS (22)
- Western Australia (22)
- Security (21)
- GeoQUEST (18)
- [RSTDPub] (18)
- For (17)
- Water quality (17)
- Chesapeake Bay (16)
- Education (16)
- Groundwater (16)
- Privacy (16)
- Synthesis (16)
- United States (15)
- Agriculture (14)
- Chemistry (14)
- Conservation (14)
- Engineering (14)
- Shoreline Inventories (14)
- Publication
-
- Faculty of Informatics - Papers (Archive) (220)
- Theses and Dissertations (211)
- Computer Science & Engineering Syllabi (156)
- Research Collection School Of Computing and Information Systems (114)
- Electronic Theses and Dissertations (102)
-
- Faculty of Science - Papers (Archive) (97)
- Journal of Electrochemistry (89)
- Faculty Publications (83)
- United States Department of Agriculture Wildlife Services: Staff Publications (80)
- Turkish Journal of Chemistry (78)
- All Computer Science and Engineering Research (62)
- Dartmouth Scholarship (55)
- Turkish Journal of Physics (55)
- LSU Doctoral Dissertations (53)
- Regis University Student Publications (comprehensive collection) (51)
- Physics Faculty Research & Creative Works (50)
- Doctoral Dissertations (49)
- LSU Master's Theses (48)
- United States Geological Survey: Staff Publications (48)
- Reports (45)
- Physics (44)
- Masters Theses (43)
- Publications (43)
- Kenneth Bloom Publications (42)
- Dissertations (41)
- Thai Environment (41)
- Chemistry Faculty Publications (40)
- Physics Faculty Publications (40)
- Bird Strike Committee-USA/Canada Joint Annual Meeting: 8th (2006) (39)
- Theses Digitization Project (37)
- Publication Type
Articles 4951 - 4980 of 5872
Full-Text Articles in Physical Sciences and Mathematics
Optical Susceptibilities Of Supported Indium Tin Oxide Thin Films, Jonathan L. Humphrey, Darius Kuciauskas
Optical Susceptibilities Of Supported Indium Tin Oxide Thin Films, Jonathan L. Humphrey, Darius Kuciauskas
Chemistry Publications
The third-order nonlinear optical susceptibility of indium tin oxide (ITO) thin films on glass substrates, χ(3)ITO, was determined in the near-IR spectral region using degenerate four wave mixing (DFWM)spectroscopy with 100fs laser pulses. A DFWM method for measuring thin films on thick substrates was refined for the characterization of films less than 100nm thick and applied to ∼25nm thick ITO films. It was found that χ(3)ITO is purely electronic at 900–1300nm (11000–7700cm−1) and has a value of (2.16±0.18)×10−18m2V−2. Theχ(3)ITO value reaches (3.36±0.28)×10−18m2V−2 at 1500nm (6700cm−1) due to two-photon absorption by free carriers (electrons). Ultrafast electron relaxation was also observed. The …
Study Of Causal Component Placement In An Active Sound Cancellation System, Eileen Anderson, Andrew B. Wright
Study Of Causal Component Placement In An Active Sound Cancellation System, Eileen Anderson, Andrew B. Wright
Journal of the Arkansas Academy of Science
In a feedforward Active Sound Cancellation (ASC) system, the acoustic delay between a primary source and an error microphone must be greater than the delay between the measurement of that source by the reference microphone and the arrival of the secondary source's wave at the error microphone. Such a configuration is called a causal configuration. For periodic disturbances, cancellation can still be achieved in non-causal configuration. Since the waveform is periodic, each cycle of the waveform is identical, and the cycle being canceled is not the measured part of the waveform, but a subsequent cycle in the waveform. Non-periodic sources …
Petrological And Geochemical Investigations Of Deep Sea Turbidite Sands In The Pandora And Moresby Troughs: Source To Sink Papua New Guinea Focus Area, Luke Jeremiah Patterson
Petrological And Geochemical Investigations Of Deep Sea Turbidite Sands In The Pandora And Moresby Troughs: Source To Sink Papua New Guinea Focus Area, Luke Jeremiah Patterson
LSU Master's Theses
The Moresby and Pandora Troughs of the northern Coral Sea are components of the deep-sea depositional system that is the ultimate sink for the Source to Sink Papua New Guinea (PNG) Focus Area. Cores collected from the R/V Melville during March-April 2004 reveal marine volcaniclastic and terrigenous turbidites deposited in these troughs during the Quaternary. Constraining the spatial, temporal, and provenance characteristics for these terrigenous sands through mineralogical, chemical, and textural analysis is the primary focus of this study. All cores contain thinly-bedded sandy turbidite packages interlayered with hemipelagic marls and typical centimeter-to-meter-thick turbidite sequences. The Moresby Trough core JPC22 …
Development Of A Service-Oriented Communication Platform For Heterogeneous Voice Over Ip Networks., Aisling O'Driscoll
Development Of A Service-Oriented Communication Platform For Heterogeneous Voice Over Ip Networks., Aisling O'Driscoll
Theses
As broadband services have become more widespread in recent years due to a variety of government initiatives and the establishment of Wireless Internet Service Providers, user requirements have evolved and the market has become more competitive. Whilst this is beneficial for consumers it means that Internet Service Providers must offer a more diverse range of services coupled with standard broadband packages to distinguish themselves from their competitors, generate new revenue and strengthen their competitive advantage. Therefore many providers are looking to Service Oriented Architectures (SOAs) to provide communication platforms, enabling services such as Voice over IP (VoIP) along with other …
Automated Photo-Identification Of Cetaceans : An Integrated Software Solution, Daniel Griggs
Automated Photo-Identification Of Cetaceans : An Integrated Software Solution, Daniel Griggs
Theses : Honours
This study investigates current techniques used for automated photo-identification of cetaceans (i.e. dolphins and whales). The primary focus constitutes various techniques that can be applied to identify and extract dorsal fins from digital photographs. A comprehensive analysis of these techniques demonstrates the most effective software solution. To further support this analysis, four prototypes are developed to demonstrate the effectiveness of each technique in a practical environment. The analysis bases its final conclusions on test results generated from these prototype software examples. Final conclusions provide recommendations for an effective, accurate, and practical software solution. This software solution allows dorsal fins to …
A Computational Framework For Analyzing Chemical Modification And Limited Proteolysis Experimental Data Used For High Confidence Protein Structure Prediction, Paul E. Anderson
A Computational Framework For Analyzing Chemical Modification And Limited Proteolysis Experimental Data Used For High Confidence Protein Structure Prediction, Paul E. Anderson
Browse all Theses and Dissertations
Prediction of protein tertiary structure based on amino acid sequence is one of the most challenging open questions in computational molecular biology. Experimental methods for protein structure determination remain relatively time consuming and expensive, and are not applicable to all proteins. While a diverse array of algorithms have been developed for prediction of protein structure from amino acid sequence information, the accuracy and reliability of these methods are not yet comparable to experimental structure determination techniques. Computational models of protein structure can, however, be improved by the incorporation of experimental information. Relatively rapid and inexpensive protein modification experiments can be …
Investigating The Male-Driven Evolution Hypothesis Using Human AluRepeat Elements, Sridhar Ramachandran
Investigating The Male-Driven Evolution Hypothesis Using Human AluRepeat Elements, Sridhar Ramachandran
Browse all Theses and Dissertations
Thousands of copies of short interspersed repeats (SINEs) are scattered essentially ran-domly through the human genome. Although copies of each repeat subfamily are identical at the time of their insertion, they become subject to individual substitutions after insertion. As the relative time of insertion is known for many of these repeats, such "junk DNA" can be used to provide a sizeable number of time-series data points for studying substitution effects in a variety of genomic contexts. This dissertation specifically discusses the usefulness of the Alufamily of SINE repeats towards addressing open problems in genomics, population genetics, and biology in …
Geostatistical Characterization Of Heterogeneity In The Aberjona River Aquifer, Woburn, Massachusetts, James Ralph Damico
Geostatistical Characterization Of Heterogeneity In The Aberjona River Aquifer, Woburn, Massachusetts, James Ralph Damico
Browse all Theses and Dissertations
Ground water flow and contaminant transport patterns are largely controlled by the distribution of high- and low-permeability sediments. Therefore, an accurate description of the aquifer architecture is paramount to producing a representative ground water model. Models of contaminant fate and transport in the aquifer near Woburn, Massachusetts, have previously been created by others using a deterministic approach. As a complement to these prior studies, the proportions, geometry, and juxtaposition of the different lithofacies of the aquifer were statistically characterized for developing stochastic models for the aquifer system. The descriptions of lithology from boreholes were separated into eleven categories based primarily …
An Implementation Of The It Fundamentals Knowledge Area In An Introductory It Course, Cheryl L. Aasheim, Choong Kwon Lee, Han Reichgelt
An Implementation Of The It Fundamentals Knowledge Area In An Introductory It Course, Cheryl L. Aasheim, Choong Kwon Lee, Han Reichgelt
Department of Information Technology Faculty Publications
The recently promulgated IT model curriculum contains IT fundamentals (ITF) as one of its knowledge areas. It is intended to give students a broad understanding of (1) the IT profession and the skills that students must develop to become successful IT professionals and (2) the academic discipline of IT and its relationship to other disciplines. The model curriculum recommends 33 lecture hours to complete the IT fundamentals knowledge. The model curriculum also recommends that the material relevant to the IT fundamentals knowledge area be offered early in the curriculum, for example in an Introduction to IT course; however, many institutions …
Electronic Properties Of Silicon-Based Nanostructures, Gian Giacomo Guzman-Verri
Electronic Properties Of Silicon-Based Nanostructures, Gian Giacomo Guzman-Verri
Browse all Theses and Dissertations
We have developed a new unifying tight-binding theory that can account for the electronic properties of recently proposed Si-based nanostructures, namely, Si graphene-like sheets and Si nanotubes. We considered the sp2s* and sp3 models up to first- and second-nearest neighbors, respectively. Our results show that the corresponding Si nanotubes follow the so-called Hamada's rule. Comparison to a recent ab initio calculation is made.
Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka
Electronic Data Discovery: Integrating Due Process Into Cyber Forensic Practice, John W. Bagby, John C. Ruhnka
Journal of Digital Forensics, Security and Law
Most organizations and government agencies regularly become engaged in litigation with suppliers, customers, clients, employees, competitors, shareholders, prosecutors or regulatory agencies that nearly assures the need to organize, retain, find and produce business records and correspondence, emails, accounting records or other data relevant to disputed issues. This article discusses some high visibility cases that constrain how metadata and content is routinely made available to opposing parties in civil litigation, to prosecutors in criminal prosecutions and to agency staff in regulatory enforcement litigation. Public policy, as implemented in the rules of evidence and pretrial discovery, restrict electronic data discovery (EDD) as …
Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz
Development Of An Ontology Based Forensic Search Mechanism: Proof Of Concept, Jill Slay, Fiona Schulz
Journal of Digital Forensics, Security and Law
This paper examines the problems faced by Law Enforcement in searching large quantities of electronic evidence. It examines the use of ontologies as the basis for new forensic software filters and provides a proof of concept tool based on an ontological design. It demonstrates that efficient searching is produced through the use of such a design and points to further work that might be carried out to extend this concept.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Journal of Digital Forensics, Security and Law
Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.
The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …
Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Journal of Digital Forensics, Security and Law
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …
Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Forensic Tools For Mobile Phone Subscriber Identity Modules, Wayne Jansen, Rick Ayers
Journal of Digital Forensics, Security and Law
Mobile phones and other handheld devices incorporating cellular capabilities, such as Personal Digital Assistants, are ubiquitous. Besides placing calls, these devices allow users to perform other useful tasks, including text messaging and phonebook entry management. When cell phones and cellular devices are involved in a crime or other incident, forensic specialists require tools that allow the proper retrieval and speedy examination of data present on the device. For devices conforming to the Global System for Mobile Communications (GSM) standards, certain data such as dialed numbers, text messages, and phonebook entries are maintained on a Subscriber Identity Module (SIM). This paper …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Journal of Digital Forensics, Security and Law
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …
The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas
The 2006 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Iain Sutherland, Paula Thomas
Journal of Digital Forensics, Security and Law
All organisations, whether in the public or private sector, use computers for the storage and processing of information relating to their business or services, their employees and their customers. A large proportion of families and individuals in their homes now also use personal computers and, both intentionally and inadvertently, often store on those computers personal information. It is clear that most organisations and individuals continue to be unaware of the information that may be stored on the hard disks that the computers contain, and have not considered what may happen to the information after the disposal of the equipment.
In …
A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli
A Forensic Log File Extraction Tool For Icq Instant Messaging Clients, Kim Morfitt, Craig Valli
Journal of Digital Forensics, Security and Law
Instant messenger programs such as ICQ are often used by hackers and criminals for illicit purposes and consequently the log files from such programs are of interest in a forensic investigation. This paper outlines research that has resulted in the development of a tool for the extraction of ICQ log file entries. Detailed reconstruction of data from log files was achieved with a number of different ICQ software. There are several limitations with the current design including timestamp information not adjusted for the time zone, data could be altered, and conversations must be manually reconstructed. Future research will aim to …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns
A Curriculum For Teaching Information Technology Investigative Techniques For Auditors, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Recent prosecutions of highly publicized white-collar crimes combined with public outrage have resulted in heightened regulation of financial reporting and greater emphasis on systems of internal control. Because both white-collar and cybercrimes are usually perpetrated through computers, internal and external auditors’ knowledge of information technology (IT) is now more vital than ever. However, preserving digital evidence and investigative techniques, which can be essential to fraud examinations, are not skills frequently taught in accounting programs and instruction in the use of computer assisted auditing tools and techniques – applications that might uncover fraudulent activity – is limited. Only a few university-level …
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox
Journal of Digital Forensics, Security and Law
The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …
Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl
Is Forensic Computing A Profession? Revisiting An Old Debate In A New Field, Bernd C. Stahl
Journal of Digital Forensics, Security and Law
Forensic Computing is a new and quickly developing field. It is in the process of becoming an academic discipline or sub-discipline with all the features from full undergraduate and postgraduate course provision to conferences and journals. An important question in this process of turning into an established discipline is whether it will coincide with the recognition of the graduates as professionals. This paper hopes to stimulate the debate as to whether forensic computing is or should be a discipline. In order to approach this question, the paper will discuss the concept of forensic computing including the most salient topics of …
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the first Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Iowa Academy Of Science 118th Annual Meeting [2006]: Advance Program, Iowa Academy Of Science
Iowa Academy Of Science 118th Annual Meeting [2006]: Advance Program, Iowa Academy Of Science
Iowa Academy of Science Documents
Contains information about the schedule and presentations for the 2006 annual meeting of the Iowa Academy of Science.
Iowa Academy Of Science: The New Bulletin, V02n1, Winter 2006, Iowa Academy Of Science
Iowa Academy Of Science: The New Bulletin, V02n1, Winter 2006, Iowa Academy Of Science
New Bulletin
Inside This Issue:
--Message from the Executive Director
--Pare Lorentz Award for Iowa Documentary
--118th Iowa Academy of Science Annual Meeting
--Iowa Summit on Mathematics, Science, and Technology Education
--Iowa Science Teachers Journal
--Considering Reorganizing the IAS Sections
--GLOBE ONE
--Grants & Award Program Announcements
--IAS Honors New Fellows
--Now Accepting 2006 Fellows Nominations
The Convergence Of V-Cycle Multigrid Algorithms For Axisymmetric Laplace And Maxwell Equations, Jay Gopalakrishnan, Joseph E. Pasciak
The Convergence Of V-Cycle Multigrid Algorithms For Axisymmetric Laplace And Maxwell Equations, Jay Gopalakrishnan, Joseph E. Pasciak
Mathematics and Statistics Faculty Publications and Presentations
We investigate some simple finite element discretizations for the axisymmetric Laplace equation and the azimuthal component of the axisymmetric Maxwell equations as well as multigrid algorithms for these discretizations. Our analysis is targeted at simple model problems and our main result is that the standard V-cycle with point smoothing converges at a rate independent of the number of unknowns. This is contrary to suggestions in the existing literature that line relaxations and semicoarsening are needed in multigrid algorithms to overcome difficulties caused by the singularities in the axisymmetric Maxwell problems. Our multigrid analysis proceeds by applying the well known regularity …
Development Of A Fourier Transform Far Infrared (Ftfir) Spectrometer To Characterize Broadband Transmission Properties Of Common Materials In The Terahertz Region, William Paul Ford
Development Of A Fourier Transform Far Infrared (Ftfir) Spectrometer To Characterize Broadband Transmission Properties Of Common Materials In The Terahertz Region, William Paul Ford
Browse all Theses and Dissertations
With sub-millimeter wave or terahertz devices becoming more readily available, there is interest in developing sensors in this region of the spectra. To support this interest, we have developed a Fourier Transform Far InfraRed (FTFIR) spectrometer to characterize broadband transmission and reflectance coefficients of materials. The spectrometer utilizes a broadband blackbody source, a Michelson interferometer, and silicon bolometer. The path difference in the Michelson is obtained using a linear stage and data acquisition and stage control were both implemented in a Labview programming environment. The details of the experimental setup and experimental results are presented in this thesis. The instrument …