Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1369)
- Environmental Sciences (1027)
- Physics (870)
- Engineering (762)
- Chemistry (692)
-
- Life Sciences (595)
- Earth Sciences (528)
- Mathematics (475)
- Social and Behavioral Sciences (422)
- Computer Engineering (320)
- Statistics and Probability (298)
- Oceanography and Atmospheric Sciences and Meteorology (243)
- Astrophysics and Astronomy (216)
- Geology (206)
- Electrical and Computer Engineering (204)
- Natural Resources Management and Policy (167)
- Applied Mathematics (165)
- Databases and Information Systems (150)
- Natural Resources and Conservation (149)
- Education (148)
- Environmental Health and Protection (147)
- Physical Chemistry (136)
- Information Security (117)
- Materials Science and Engineering (116)
- Environmental Monitoring (113)
- Water Resource Management (105)
- Medicine and Health Sciences (101)
- Plant Sciences (94)
- Law (90)
- Institution
-
- University of Nebraska - Lincoln (699)
- University of Wollongong (344)
- Wright State University (228)
- TÜBİTAK (218)
- Selected Works (167)
-
- University of Nevada, Las Vegas (146)
- Missouri University of Science and Technology (142)
- Brigham Young University (127)
- Singapore Management University (120)
- University of Kentucky (109)
- William & Mary (105)
- SelectedWorks (104)
- Louisiana State University (103)
- COBRA (101)
- Old Dominion University (101)
- California Polytechnic State University, San Luis Obispo (96)
- Edith Cowan University (93)
- Chinese Chemical Society | Xiamen University (89)
- Air Force Institute of Technology (88)
- University of Tennessee, Knoxville (75)
- Embry-Riddle Aeronautical University (73)
- Portland State University (72)
- Utah State University (71)
- Georgia State University (70)
- University of Central Florida (69)
- Dartmouth College (68)
- University of Massachusetts Amherst (66)
- Washington University in St. Louis (62)
- The University of Maine (59)
- University of Texas at Arlington (56)
- Keyword
-
- College for Professional Studies (51)
- MS Computer and Information Technology (47)
- School of Computer & Information Science (43)
- Regis University MSCIT thesis (31)
- Research and Technical Reports (30)
-
- Algorithms (26)
- Mathematics (26)
- Physics (26)
- Outdoor education (25)
- Data (24)
- Management (23)
- CMMB (22)
- GIS (22)
- Western Australia (22)
- Security (21)
- GeoQUEST (18)
- [RSTDPub] (18)
- For (17)
- Water quality (17)
- Chesapeake Bay (16)
- Education (16)
- Groundwater (16)
- Privacy (16)
- Synthesis (16)
- United States (15)
- Agriculture (14)
- Chemistry (14)
- Conservation (14)
- Engineering (14)
- Shoreline Inventories (14)
- Publication
-
- Faculty of Informatics - Papers (Archive) (220)
- Theses and Dissertations (211)
- Computer Science & Engineering Syllabi (156)
- Research Collection School Of Computing and Information Systems (114)
- Electronic Theses and Dissertations (102)
-
- Faculty of Science - Papers (Archive) (97)
- Journal of Electrochemistry (89)
- Faculty Publications (83)
- United States Department of Agriculture Wildlife Services: Staff Publications (80)
- Turkish Journal of Chemistry (78)
- All Computer Science and Engineering Research (62)
- Dartmouth Scholarship (55)
- Turkish Journal of Physics (55)
- LSU Doctoral Dissertations (53)
- Regis University Student Publications (comprehensive collection) (51)
- Physics Faculty Research & Creative Works (50)
- Doctoral Dissertations (49)
- LSU Master's Theses (48)
- United States Geological Survey: Staff Publications (48)
- Reports (45)
- Physics (44)
- Masters Theses (43)
- Publications (43)
- Kenneth Bloom Publications (42)
- Dissertations (41)
- Thai Environment (41)
- Chemistry Faculty Publications (40)
- Physics Faculty Publications (40)
- Bird Strike Committee-USA/Canada Joint Annual Meeting: 8th (2006) (39)
- Theses Digitization Project (37)
- Publication Type
Articles 5821 - 5850 of 5872
Full-Text Articles in Physical Sciences and Mathematics
A New Type Of Orthogonality In Banach Spaces, Abeer Hasan
A New Type Of Orthogonality In Banach Spaces, Abeer Hasan
Abeer Hasan
Metric Modifications For A Massive Spin 1 Particle, Br Holstein
Metric Modifications For A Massive Spin 1 Particle, Br Holstein
Barry R Holstein
Previous evaluations of long range one-photon and one-graviton-loop corrections to the energy-momentum tensor and the metric tensor describing spacetime in the vicinity of massive spinless and spin 1/2 systems have been extended to particles with unit spin and speculations are confirmed concerning universal properties of such forms.
Detecting Acromegaly: Screening For Disease With A Morphable Model, Erik G. Learned-Miller, Qifeng Lung, Angela Paisley, Peter Trainer, Volker Blanz, Katrin Dedden, Ralph Miller
Detecting Acromegaly: Screening For Disease With A Morphable Model, Erik G. Learned-Miller, Qifeng Lung, Angela Paisley, Peter Trainer, Volker Blanz, Katrin Dedden, Ralph Miller
Erik G Learned-Miller
Acromegaly is a rare disorder which affects about 50 of every million people. The disease typically causes swelling of the hands, feet, and face, and eventually permanent changes to areas such as the jaw, brow ridge, and cheek bones. The disease is often missed by physicians and progresses beyond where it might if it were identified and treated earlier. We consider a semi-automated approach to detecting acromegaly, using a novel combination of support vector machines (SVMs) and a morphable model. Our training set consists of 24 frontal photographs of acromegalic patients and 25 of disease-free subjects. We modelled each subject's …
Privacy Issues Of Applying Rfid In Retail Industry, Haifei Li, Patrick C.K. Hung, Jia Zhang, David Ahn
Privacy Issues Of Applying Rfid In Retail Industry, Haifei Li, Patrick C.K. Hung, Jia Zhang, David Ahn
Jia Zhang
This case study describes the privacy issues of applying Radio Frequency Identification (RFID) in the retail industry. With the dramatic price drop of RFID tags, it is possible that RFID be applied to individual items sold by a retailer. However, the RFID technology poses critical privacy challenges. In this study, we analyze the potential privacy issue of RFID utilization, and we propose a privacy authorization model aiming for precisely defining RFID privacy policies for the retail industry.
On The Convergence Of The Summation Formulas Constructed By Using A Symbolic Operator Approach, Tian-Xiao He, Leetsch C. Hsu, Peter J.-S. Shiue
On The Convergence Of The Summation Formulas Constructed By Using A Symbolic Operator Approach, Tian-Xiao He, Leetsch C. Hsu, Peter J.-S. Shiue
Tian-Xiao He
This paper deals with the convergence of the summation of power series of the form Σa ≤ k ≤ bf(k)xk, where 0 ≤ a ≤ b < ∞, and {f(k)} is a given sequence of numbers with k ∈ [a, b) or f(t) a differentiable function defined on [a, b). Here, the summation is found by using the symbolic operator approach shown in [1]. We will give a different type of the remainder of the summation formulas. The convergence of the corresponding power series will be determined consequently. Several examples such as the generalized Euler's transformation series will also be given. In addition, we will compare the convergence of the given series transforms.
Metric Modifications For A Massive Spin 1 Particle, Barry R. Holstein
Metric Modifications For A Massive Spin 1 Particle, Barry R. Holstein
Barry R Holstein
Previous evaluations of long range one-photon and one-graviton-loop corrections to the energy-momentum tensor and the metric tensor describing spacetime in the vicinity of massive spinless and spin 1/2 systems have been extended to particles with unit spin and speculations are confirmed concerning universal properties of such forms.
Observation Of Multiple Thresholds In The Cavity Qed Microlaser", Christopher Fang-Yen, C C. Yu, S Ha, K An, R R. Dasari, M S. Feld
Observation Of Multiple Thresholds In The Cavity Qed Microlaser", Christopher Fang-Yen, C C. Yu, S Ha, K An, R R. Dasari, M S. Feld
Christopher Fang-Yen
No abstract provided.
Absolute Equal Distribution Of The Eigenvalues Of Discrete Sturm-Liouville Problems, William F. Trench
Absolute Equal Distribution Of The Eigenvalues Of Discrete Sturm-Liouville Problems, William F. Trench
William F. Trench
No abstract provided.
Numerical Approximation To Ζ(2n+1), Tian-Xiao He, Michael J. Dancs
Numerical Approximation To Ζ(2n+1), Tian-Xiao He, Michael J. Dancs
Tian-Xiao He
In this short paper, we establish a family of rapidly converging series expansions ζ(2n +1) by discretizing an integral representation given by Cvijovic and Klinowski [3] in Integral representations of the Riemann zeta function for odd-integer arguments, J. Comput. Appl. Math. 142 (2002) 435–439. The proofs are elementary, using basic properties of the Bernoulli polynomials.
Functional Perturbations Of Nonoscillatory Second Order Difference Equations, William F. Trench
Functional Perturbations Of Nonoscillatory Second Order Difference Equations, William F. Trench
William F. Trench
No abstract provided.
Brain Correlates Of Discourse Processing: An Fmri Investigation Of Irony And Conventional Metaphor Comprehension, Zohar Eviatar, Marcel Adam Just
Brain Correlates Of Discourse Processing: An Fmri Investigation Of Irony And Conventional Metaphor Comprehension, Zohar Eviatar, Marcel Adam Just
Marcel Adam Just
No abstract provided.
Reflections On The Growth Of Astronomy At The University Of Massachusetts And The Five College Astronomy Department, William M. Irvine
Reflections On The Growth Of Astronomy At The University Of Massachusetts And The Five College Astronomy Department, William M. Irvine
William M. Irvine
No abstract provided.
On The Generalized Möbius Inversion Formulas, Tian-Xiao He, Peter J. S. Shiue3, Leetsch C. Hsu
On The Generalized Möbius Inversion Formulas, Tian-Xiao He, Peter J. S. Shiue3, Leetsch C. Hsu
Tian-Xiao He
We provide a wide class of M¨obius inversion formulas in terms of the generalized M¨obius functions and its application to the setting of the Selberg multiplicative functions.
Sentence Comprehension In Autism: Thinking In Pictures With Decreased Functional Connectivity, Rajesh K. Kana, Timothy A. Keller, Vladimir L. Cherkassky, Nancy J. Minshew, Marcel Adam Just
Sentence Comprehension In Autism: Thinking In Pictures With Decreased Functional Connectivity, Rajesh K. Kana, Timothy A. Keller, Vladimir L. Cherkassky, Nancy J. Minshew, Marcel Adam Just
Marcel Adam Just
No abstract provided.
Algorithms For Optimizing Bandwidth Costs On The Internet, Micah Adler, Ramesh Sitaraman, Harish Venkataramani
Algorithms For Optimizing Bandwidth Costs On The Internet, Micah Adler, Ramesh Sitaraman, Harish Venkataramani
Ramesh Sitaraman
Content Delivery Networks (CDNs) deliver web content to end-users from a large distributed platform of web servers hosted in data centers belonging to thousands of Internet Service Providers (ISPs) around the world. The bandwidth cost incurred by a CDN is the sum of the amounts it pays each ISP for routing traffic from its servers located in that ISP out to end-users. A large enterprise may also contract with multiple ISPs to provide redundant Internet access for its origin infrastructure using technologies such as multihoming and mirroring, thereby incurring a significant bandwidth cost across multiple ISPs. This paper initiates the …
Auction-Based Pricing Model For Web Service Providers, Jia Zhang, Ning Zhang, Liang-Jie Zhang
Auction-Based Pricing Model For Web Service Providers, Jia Zhang, Ning Zhang, Liang-Jie Zhang
Jia Zhang
Applying auctions to Web services selection and invocation calls for examination due to the unique features of Web services, such as interoperable machine-to-machine interactions and reenterable bargaining services. In this paper we propose a formal model for Web services-based auctions. Examining one-sided sealed auction type, we prove mathematically that service requestors’ risk preferences could lead to different pricing strategies for service providers towards higher profit. We argue that Service Level Agreement (SLA) documents can be used to analyze service requestors’ preferences. On top of WS-Agreement, we propose a basic service requestor risk preference elicitation algorithm, as well as a historical …
Relation Between Rotational And Translational Dynamic Heterogeneities In Water, M. Mazza, N. Giovambattista, Francis W. Starr, H. E. Stanley
Relation Between Rotational And Translational Dynamic Heterogeneities In Water, M. Mazza, N. Giovambattista, Francis W. Starr, H. E. Stanley
Francis Starr
No abstract provided.
Data Driven Image Models Through Continuous Joint Alignment, Erik G. Learned-Miller
Data Driven Image Models Through Continuous Joint Alignment, Erik G. Learned-Miller
Erik G Learned-Miller
This paper presents a family of techniques that we call congealing for modeling image classes from data. The idea is to start with a set of images and make them appear as similar as possible by removing variability along the known axes of variation. This technique can be used to eliminate "nuisance” variables such as affine deformations from handwritten digits or unwanted bias fields from magnetic resonance images. In addition to separating and modeling the latent images—i.e., the images without the nuisance variables—we can model the nuisance variables themselves, leading to factorized generative image models. When nuisance variable distributions are …
A Hierarchical, Hmmbased Automatic Evaluation Of Ocr Accuracy For A Digital Library Of Books, Shaolei Feng, R. Manmatha
A Hierarchical, Hmmbased Automatic Evaluation Of Ocr Accuracy For A Digital Library Of Books, Shaolei Feng, R. Manmatha
R. Manmatha
A number of projects are creating searchable digital libraries of printed books. These include the Million Book Project, the Google Book project and similar efforts from Yahoo and Microsoft. Content-based on line book retrieval usually requires first converting printed text into machine readable (e.g. ASCII) text using an optical character recognition (OCR) engine and then doing full text search on the results. Many of these books are old and there are a variety of processing steps that are required to create an end to end system. Changing any step (including the scanning process) can affect OCR performance and hence a …
Joint Feature Selection For Object Detection And Recognition, Jerod J. Weinman, Allen Hanson, Erik G. Learned-Miller
Joint Feature Selection For Object Detection And Recognition, Jerod J. Weinman, Allen Hanson, Erik G. Learned-Miller
Erik G Learned-Miller
Object detection and recognition systems, such as face detectors and face recognizers, are often trained separately and operated in a feed-forward fashion. Selecting a small number of features for these tasks is important to prevent over-fitting and reduce computation. However, when a system has such related or sequential tasks, selecting features for these tasks independently may not be optimal. We propose a framework for choosing features to be shared between object detection and recognition tasks. The result is a system that achieves better performance by joint training and is faster because some features for identification have already been computed for …
Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara
Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara
Qing Hu
With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …
Discriminative Training Of Hyper-Feature Models For Object Identification, Vidit Jain, Erik G. Learned-Miller
Discriminative Training Of Hyper-Feature Models For Object Identification, Vidit Jain, Erik G. Learned-Miller
Erik G Learned-Miller
Object identification is the task of identifying specific objects belonging to the same class such as cars. We often need to recognize an object that we have only seen a few times. In fact, we often observe only one example of a particular object before we need to recognize it again. Thus we are interested in building a system which can learn to extract distinctive markers from a single example and which can then be used to identify the object in another image as “same ” or “different”. Previous work by Ferencz et al. introduced the notion of hyper-features, which …
A Mobile Agents-Based Approach To Test The Reliability Of Web Services, Jia Zhang
A Mobile Agents-Based Approach To Test The Reliability Of Web Services, Jia Zhang
Jia Zhang
The paradigm of web services has been transforming the internet from a repository of data into a repository of services, or so-called web services. As more and more web services are published on the internet, how to opt for an appropriate and trustworthy web service poses a big challenge. In this paper we propose a mobile agents-based approach that selects reliable web service components in a cost-effective manner.
Shape-Persistent V-Shaped Mesogens-Formation Of Nematic Phases With Biaxial Order, Matthias Lehmann, Shin-Woong Kang, Christiane Köhn, Sönke Haseloh, Ute Kolb, Dieter Schollmeyer, Qingbing Wang, Satyendra Kumar
Shape-Persistent V-Shaped Mesogens-Formation Of Nematic Phases With Biaxial Order, Matthias Lehmann, Shin-Woong Kang, Christiane Köhn, Sönke Haseloh, Ute Kolb, Dieter Schollmeyer, Qingbing Wang, Satyendra Kumar
Satyendra Kumar
A homologous series of shape-persistent V-shaped molecules has been designed to form the biaxial nematic phase. Phenyleneethynylene moieties are attached to a bent fluorenone unit to create an apex angle of about 90°, which is determined from the single crystal structure. Two mesogens, one symmetric and another unsymmetric, have been synthesized by attaching a cyano group to one or both of the peripheral phenyl units, respectively. These groups introduce local dipoles essential for the formation of the nematic phases. The tendency to form a crystalline phase is reduced by laterally substituted hexyloxy chains which allow the nematic phase to be …
Neural Basis Of Dyslexia: A Comparison Between Dyslexic And Non-Dyslexic Children Equated For Reading Ability, Fumiko Hoeft, Arvel Hernandez, Glenn Mcmillon, Heather Taylor-Hill, Jennifer L. Martindale, Ann Meyler, Timothy A. Keller, Wai Ting Siok, Gayle K. Deutsch, Marcel Adam Just, Susan Whitfield-Gabrieli, John D. E. Gabrieli
Neural Basis Of Dyslexia: A Comparison Between Dyslexic And Non-Dyslexic Children Equated For Reading Ability, Fumiko Hoeft, Arvel Hernandez, Glenn Mcmillon, Heather Taylor-Hill, Jennifer L. Martindale, Ann Meyler, Timothy A. Keller, Wai Ting Siok, Gayle K. Deutsch, Marcel Adam Just, Susan Whitfield-Gabrieli, John D. E. Gabrieli
Marcel Adam Just
No abstract provided.
Improving Recognition Of Novel Input With Similarity, Jerod J. Weinman, Erik G. Learned-Miller
Improving Recognition Of Novel Input With Similarity, Jerod J. Weinman, Erik G. Learned-Miller
Erik G Learned-Miller
Many sources of information relevant to computer vision and machine learning tasks are often underused. One example is the similarity between the elements from a novel source, such as a speaker, writer, or printed font. By comparing instances emitted by a source, we help ensure that similar instances are given the same label. Previous approaches have clustered instances prior to recognition. We propose a probabilistic framework that unifies similarity with prior identity and contextual information. By fusing information sources in a single model, we eliminate unrecoverable errors that result from processing the information in separate stages and improve overall accuracy. …
An Euler-Type Formula For Ζ(2k +1), Tian-Xiao He, Michael J. Dancs
An Euler-Type Formula For Ζ(2k +1), Tian-Xiao He, Michael J. Dancs
Tian-Xiao He
In this short paper, we give several new formulas for ζ(n) when n is an odd positive integer. The method is based on a recent proof, due to H. Tsumura, of Euler’s classical result for even n. Our results illuminate the similarities between the even and odd cases, and may give some insight into why the odd case is much more difficult.
Quantum Trajectory Studies Of Many-Atom And Finite Transit-Time Effects In A Cavity Qed Microlaser Or Micromaser, Christopher Fang-Yen
Quantum Trajectory Studies Of Many-Atom And Finite Transit-Time Effects In A Cavity Qed Microlaser Or Micromaser, Christopher Fang-Yen
Christopher Fang-Yen
No abstract provided.
Catalyzing Mass Production Of Solar Photovoltaic Cells Using University Driven Green Purchasing, Joshua M. Pearce
Catalyzing Mass Production Of Solar Photovoltaic Cells Using University Driven Green Purchasing, Joshua M. Pearce
Joshua M. Pearce
Formation And Maintenance Of Shear Zones, Caleb Holyoke, Jan Tullis
Formation And Maintenance Of Shear Zones, Caleb Holyoke, Jan Tullis
Caleb Holyoke
No abstract provided.