Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1051 - 1080 of 6758

Full-Text Articles in Physical Sciences and Mathematics

Radical Impact Of Change In Actions And Confidence Index On Reverse Decision Making An Application Based Study, Swatee Trimbak Paithankar Oct 2007

Radical Impact Of Change In Actions And Confidence Index On Reverse Decision Making An Application Based Study, Swatee Trimbak Paithankar

Engineering Management & Systems Engineering Theses & Dissertations

While making decisions under uncertainty, people are often unaware of the logical approach to form the decision process. It is assumed that collecting details, analyzing and evaluating data is enough to make 'proper' decisions. However, past research in the decision making arena has significantly validated that there exists a class of decision problems which is complex, ill-structured and not defined to the level where decision makers can draw logical conclusions based on existing traditional decision approaches. RDM (reverse decision making), one of the novel approaches of decision making under conditions of uncertainty, has shown potential towards addressing some of these …


Parmela Based Simulations On Jefferson Lab Free Electron Laser Injector, Deepesh Kumar Koppunuru Oct 2007

Parmela Based Simulations On Jefferson Lab Free Electron Laser Injector, Deepesh Kumar Koppunuru

Electrical & Computer Engineering Theses & Dissertations

Free Electron Lasers (FELs) have many applications and are under continuing development to meet various needs and in areas from materials processing to life sciences research. This is because of its unique capability of generating high-average power, coherent, and wavelength tunable light by employing relativistic beam of un-bounded electrons. The main challenge in FEL development is the generation of a high intensity, high-quality electron beam in an injector. Further acceleration to relativistic energies is accomplished in a linear accelerator (LINAC) for producing laser light in a device known as wiggler. The Jefferson Lab FEL team intents to increase the injector …


Neighborhood Defined Adaboost Based Mixture Of Color Components For Efficient Skin Segmentation, Ramya Reddy Maaram Oct 2007

Neighborhood Defined Adaboost Based Mixture Of Color Components For Efficient Skin Segmentation, Ramya Reddy Maaram

Electrical & Computer Engineering Theses & Dissertations

A skin segmentation algorithm robust to illumination changes and skin-like backgrounds is developed in this thesis. So far skin pixel classification has been limited to only individual color spaces and there has not been a comprehensive evaluation of which color components or combination of color components would provide the best classification accuracy, Color components in a given color space form the feature set for the classification of skin pixels. The combination of the color components or the features present within a single color space may not be the best when it comes to skin pixel classification as the discriminatory power …


A Robust Method For Multiple Face Tracking Using Kalman Filter, Zaheer Shaik Oct 2007

A Robust Method For Multiple Face Tracking Using Kalman Filter, Zaheer Shaik

Electrical & Computer Engineering Theses & Dissertations

A robust method for tracking faces of multiple people moving in a scene using a Kalman filter is proposed. This method overcomes the problem of partial and total occlusion for a short period. The method uses a combination of face detection and cloth matching to track and differentiate between people. A Template matching technique for face and a non-parametric distribution for cloth are used. Face templates are obtained from the first frame of a video sequence by applying the Viola-Jones face detection method. Cloth color distribution is obtained from people's clothes, assuming that the bodies move along with the faces. …


A Modular Kernel Linear Discriminant Analysis Of Gabor Features For Improved Face Recognition, Neeharika Gudur Oct 2007

A Modular Kernel Linear Discriminant Analysis Of Gabor Features For Improved Face Recognition, Neeharika Gudur

Electrical & Computer Engineering Theses & Dissertations

Automatic face recognition is one of the major challenges in computer vision and pattern analysis. This thesis presents an efficient face recognition system that is robust with regards to changes in illumination, facial expressions and partial occlusions. Modular Kernel Linear Discriminant Analysis performed on Gabor Features obtained from the face images is employed for improving face recognition accuracy. A face image is pre-processed using the 2D Gabor wavelet transform to achieve invariance to illumination in images. Modular approaches that divide the pre-processed images into smaller sub-images provide improved accuracy, as the facial variations in an image are confined to local …


An Adaptive And Non-Linear Technique For Enhancement Of High Contrast Images, Saibabu Arigela Oct 2007

An Adaptive And Non-Linear Technique For Enhancement Of High Contrast Images, Saibabu Arigela

Electrical & Computer Engineering Theses & Dissertations

In night time surveillance, there is a possibility of having extremely bright and dark regions in some image frames of a video sequence. Neither the object details in the low intensity areas nor in the high intensity areas can be clearly interpreted. Several image processing techniques have been developed to retrieve meaningful information under low lighting conditions. The algorithm based on integrated neighborhood dependency of pixel characteristics, and that based on the illuminance reflectance model perform well for improving the visual quality of digital images captured under extremely low and nonuniform lighting conditions. But these techniques cannot perform well in …


Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown Oct 2007

Lazy Preservation: Reconstructing Websites From The Web Infrastructure, Frank Mccown

Computer Science Theses & Dissertations

Backup or preservation of websites is often not considered until after a catastrophic event has occurred. In the face of complete website loss, webmasters or concerned third parties have attempted to recover some of their websites from the Internet Archive. Still others have sought to retrieve missing resources from the caches of commercial search engines. Inspired by these post hoc reconstruction attempts, this dissertation introduces the concept of lazy preservation{ digital preservation performed as a result of the normal operations of the Web Infrastructure (web archives, search engines and caches). First, the Web Infrastructure (WI) is characterized by its preservation …


Self-Organization In Cathode Boundary Layer Discharges, Nobuhiko Takano Oct 2007

Self-Organization In Cathode Boundary Layer Discharges, Nobuhiko Takano

Electrical & Computer Engineering Theses & Dissertations

Cathode boundary layer (CBL) discharge, which has been developed as a UV light source, operates in a direct current between a planar cathode and a ring-shape anode that are separated by a dielectric with an opening of the same diameter as the anode. The nonthermal CBL discharges operate in a medium pressure range down to 30 Torr, emitting excimer radiation when operated with noble gases. The radiant excimer emittance at 172 nm in xenon reaches 1.7 W/cm2, and a maximum excimer efficiency of 6 % has been obtained. The high excimer radiant emittance, in addition to low cost …


Integrating Game Technology And Discrete Event Simulation To Analyze Mass Casualty Scenarios, Jason Loveland Oct 2007

Integrating Game Technology And Discrete Event Simulation To Analyze Mass Casualty Scenarios, Jason Loveland

Computational Modeling & Simulation Engineering Theses & Dissertations

In the last 10 years, video games have become complex simulation environments with high resolution 3D graphics enabled by powerhouse rendering engines, multi-player client server networks, user friendly displays and graphical user interface , while remaining relatively inexpensive. There is a critical need for systems engineering analysis and rapid trade studies due to changes in operations caused by current events such as terrorist attacks, asymmetric threats, natural disasters, etc. Modem games provide a unique way to visualize and interact with these complex environments, scenarios, missions, and operations. A discrete event simulator (DES) provides an environment to model system architecture behavior, …


Salt Fluxes At The Chesapeake Bay Entrance, Ruth Lane Oct 2007

Salt Fluxes At The Chesapeake Bay Entrance, Ruth Lane

OES Theses and Dissertations

Underway measurements of salinity and flow profiles were used to compute salt fluxes at the mouth of the Chesapeake Bay in spring and summer. Waters were sampled along a cross-bay transect over four tidal cycles in 1997: at the end of April, during neap tides, and in mid-July, during spring tides. Data were interpolated onto a uniform grid along the transect area. A least squares regression with semidiurnal and diurnal harmonics was fit on both salinity and flow at each point of the grid to separate tidal from non-tidal influences. The results of the least squares fit were used to …


Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali Oct 2007

Distributed Cluster-Based Outlier Detection In Wireless Sensor Networks, Swetha Gali

Electrical & Computer Engineering Theses & Dissertations

Wireless sensor networks find several potential applications in a variety of fields, such as environmental monitoring and control, battlefields, surveillance, smart buildings, human health monitoring, etc. These sensor networks consist of a large number of very tiny, inexpensive, and low power sensor nodes, which are deployed in a variety of harsh environments that may result in the sensor data getting corrupted. It is thus critical to detect and report these abnormal values in the sensor data, in order to have a better understanding of the monitored environment. Detection of the abnormal values is of special interest for the sensor network …


Limb Regeneration After Multiple Autotomy And Coxae Removal In The Blue Crab Callinectes Sapidus, Jennifer Ambler Oct 2007

Limb Regeneration After Multiple Autotomy And Coxae Removal In The Blue Crab Callinectes Sapidus, Jennifer Ambler

OES Theses and Dissertations

This study investigated limb regeneration in the juvenile blue crab, Callinectes sapidus, specifically the role of the coxa and pedal nerve innervation of the regenerative limb bud over time. The coxa is a leg segment that has been defined as the source of positional, cellular, and neuronal information needed for limb regeneration in brachyuran crabs. This study indicates that removal of coxae under regenerative and non-regenerative conditions did not deter limb regeneration. The coxa is not the exclusive location of limb regenerative information since limbs re-grew with normal positional and functional arrangement in 86% of crabs showing regeneration at removal …


Analyzing Service Usage Patterns: Methodology And Simulation, Qianhui (Althea) Liang, Jen-Yao Chung Oct 2007

Analyzing Service Usage Patterns: Methodology And Simulation, Qianhui (Althea) Liang, Jen-Yao Chung

Research Collection School Of Computing and Information Systems

This paper proposes that service mining technology will power the construction of new business services via both intra- and inter-enterprise service assembly within the Service Oriented Architecture (SOA) framework. We investigate the methodologies of service mining at the component level of service usage. We also demonstrate how mining of service usage patterns is intended to be used to improve different aspects of service composition. Simulation experiments conducted for mining at the component level are analyzed. The processing details within a general service mining deployment are demonstrated.


Flexible Access Control To Jpeg 2000 Image Code-Streams, Yongdong Wu, Di Ma, Robert H. Deng Oct 2007

Flexible Access Control To Jpeg 2000 Image Code-Streams, Yongdong Wu, Di Ma, Robert H. Deng

Research Collection School Of Computing and Information Systems

JPEG 2000 is an international standard for still image compression in the 21st century. Part 8 of the standard, named JPSEC, is concerned with all the security aspects, in particular to access control and authentication. This paper presents a novel access control scheme for JPEG 2000 image code-streams. The proposed scheme is secure against collusion attacks and highly efficient. The scheme is also very flexible, allowing access control to JPEG 2000 image code-streams according to any combination of resolution, quality layer and region of interest. The "encrypt once, decrypt many ways" property of our scheme is designed to work seamlessly …


A Multitude Of Opinions: Mining Online Rating Data, Hady Wirawan Lauw, Ee Peng Lim Oct 2007

A Multitude Of Opinions: Mining Online Rating Data, Hady Wirawan Lauw, Ee Peng Lim

Research Collection School Of Computing and Information Systems

Online rating system is a popular feature of Web 2.0 applications. It typically involves a set of reviewers assigning rating scores (based on various evaluation criteria) to a set of objects. We identify two objectives for research on online rating data, namely achieving effective evaluation of objects and learning behaviors of reviewers/objects. These two objectives have conventionally been pursued separately. We argue that the future research direction should focus on the integration of these two objectives, as well as the integration between rating data and other types of data.


I Tube, You Tube, Everybody Tubes: Analyzing The World’S Largest User Generated Content Video System, Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, Sue. Moon Oct 2007

I Tube, You Tube, Everybody Tubes: Analyzing The World’S Largest User Generated Content Video System, Meeyoung Cha, Haewoon Kwak, Pablo Rodriguez, Yong-Yeol Ahn, Sue. Moon

Research Collection School Of Computing and Information Systems

User Generated Content (UGC) is re-shaping the way people watch video and TV, with millions of video producers and consumers. In particular, UGC sites are creating new viewing patterns and social interactions, empowering users to be more creative, and developing new business opportunities. To better understand the impact of UGC systems, we have analyzed YouTube, the world's largest UGC VoD system. Based on a large amount of data collected, we provide an in-depth study of YouTube and other similar UGC systems. In particular, we study the popularity life-cycle of videos, the intrinsic statistical properties of requests and their relationship with …


Effects Of Electrolyte Concentration On Surfactant Adsorption To A Qcm Immersed In Surfactant + Electrolyte Solutions, S. Ray, R. Counce, Samuel Morton Sep 2007

Effects Of Electrolyte Concentration On Surfactant Adsorption To A Qcm Immersed In Surfactant + Electrolyte Solutions, S. Ray, R. Counce, Samuel Morton

Samuel A Morton

No abstract provided.


Investigation Of Ionic Liquids For The Separation Of Butanol And Water, Samuel Morton, S. Davis, A. Jermusyk, N Newman, D. Shlossman Sep 2007

Investigation Of Ionic Liquids For The Separation Of Butanol And Water, Samuel Morton, S. Davis, A. Jermusyk, N Newman, D. Shlossman

Samuel A Morton

No abstract provided.


Approaches To Mitigating Decayed Buried Timber Within Railway Embankments, Barry A. Palynchuk Phd Sep 2007

Approaches To Mitigating Decayed Buried Timber Within Railway Embankments, Barry A. Palynchuk Phd

Barry A. Palynchuk PhD

During the last three years, several sinkholes have been observed along CPR railway lines in Southern Ontario. The sinkholes have formed as a result of the decay of buried timber trestles in railway embankments. Although it has not occurred the sinkholes could result in hazardous changes in track geometry under load. This study summarizes the site investigation results and remedial methods implemented at five sites in southern Ontario. Remedial methods include placement geosynthetic reinforcement, soil-cement column reinforcement and grouting of voids at the trestle bents. The design, installation methods and construction constraints for the remedial options are described in this …


Nevada Interagency Volunteer Program: Helping Hands Across Public Lands – Phase Ii: Quarterly Progress Report, Period Covering July 1 - September 30, 2007, Margaret N. Rees Sep 2007

Nevada Interagency Volunteer Program: Helping Hands Across Public Lands – Phase Ii: Quarterly Progress Report, Period Covering July 1 - September 30, 2007, Margaret N. Rees

Get Outdoors Nevada

  • The number of records in the volunteer database increased 11% over last quarter. The database now contains 4,343 records.
  • Website activity increased, recording an average of 121,313 hits per month, an increase of 31% from last quarter, with an average of 11,475 pages viewed per month.
  • Volunteer fall training has been scheduled, developed and publicized.
  • Three National Public Land Day Events are planned.
  • Volunteer recognition banquet event is being planned and developed.
  • Transition in the program manager position took place. The position is currently filled with an interim volunteer program associate.


Blacklistable Anonymous Credentials: Blocking Misbehaving Users Without Ttps (Extended Version), Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith Sep 2007

Blacklistable Anonymous Credentials: Blocking Misbehaving Users Without Ttps (Extended Version), Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith

Computer Science Technical Reports

Several credential systems have been proposed in which users can authenticate to services anonymously. Since anonymity can give users the license to misbehave, some variants allow the selective deanonymization (or linking) of misbehaving users upon a complaint to a trusted third party (TTP). The ability of the TTP to revoke a user's privacy at any time, however, is too strong a punishment for misbehavior. To limit the scope of deanonymization, systems such as ``e-cash'' have been proposed in which users are deanonymized under only certain types of well-defined misbehavior such as ``double spending.'' While useful in some applications, it is …


Back Matter Sep 2007

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Interagency Science And Research: Quarterly Progress Report, Period Ending September 30, 2007, Margaret N. Rees Sep 2007

Interagency Science And Research: Quarterly Progress Report, Period Ending September 30, 2007, Margaret N. Rees

Interagency Science and Research Strategy

  • Met with Dr. Michael Collopy (UNR) to discuss the development of the Tahoe Science Consortium and associated research strategy, peer review process, and organization.
  • Presented the S&R Team PowerPoint to federal land managers from Nevada, Utah, and Arizona who are planning a Mojave Desert Initiative.
  • Coordinated external peer reviews for two SNPLMA Round 8 CI nominations.
  • Hosted an all-agency natural resource management staff science workshop to assist with the selection of interagency goals, sub-goals, science questions, and associated tasks.


Lake Mead National Recreation Area Vegetation Monitoring And Analysis: Year-End Progress Report, October 1, 2006 To September 30, 2007, Margaret N. Rees Sep 2007

Lake Mead National Recreation Area Vegetation Monitoring And Analysis: Year-End Progress Report, October 1, 2006 To September 30, 2007, Margaret N. Rees

Vegetation Monitoring

Executive Summary

  • The Weed Sentry program surveyed more than 750 miles of federal lands in Clark County for invasive, exotic plant species.
  • Weed Sentry also removed more than 600,000 individual invasive plants from federal
    lands. These removals represent pro-active efforts that may have forestalled large
    infestations difficult and costly to eradicate.
  • In response to a request by the manager of the Fish and Wildlife Service Desert National
    Wildlife Refuge, a major effort of surveying springs for plant community composition
    and invasive plants provided unique knowledge services by the Weed Sentry program.
    No such baseline information existed for the Sheep Range. …


Lake Mead National Recreation Area Monitoring And Evaluation Of Sensitive Wildlife: Annual Progress Report, Period Ending September 30, 2007, Margaret N. Rees Sep 2007

Lake Mead National Recreation Area Monitoring And Evaluation Of Sensitive Wildlife: Annual Progress Report, Period Ending September 30, 2007, Margaret N. Rees

Wildlife Monitoring

Project 1. Relict Leopard Frog Monitoring, Management, and Research

  • Diurnal and nocturnal surveys completed at all natural and translocation sites during the spring – the most striking finding was the lack of frogs observed at Rogers Springs and lower Blue Point despite repeated survey efforts.
  • Relict leopard frog annual translocation effort completed – a total of 1365 late stage tadpoles and 592 post-metamorphic frogs from the head-start facilities were released at existing translocation sites.
  • Mark-recapture effort at Rogers Spring abandoned because of the lack of frogs; assistance provided for a mark-recapture study at upper Blue Point Spring.
  • Potential translocation sites …


Gnep Quarterly Input – Unlv July 1 Through September 30, 2007, Harry Reid Center For Environmental Studies. Nuclear Science And Technology Division Sep 2007

Gnep Quarterly Input – Unlv July 1 Through September 30, 2007, Harry Reid Center For Environmental Studies. Nuclear Science And Technology Division

Transmutation Research Program Reports (TRP)

Quarterly report highlighting research projects, activities and objectives of the Transmutation Research Program at the Nuclear Science & Technology Division, Harry Reid Research Center.

The University of Nevada, Las Vegas supports the Global Nuclear Energy Partnership (GNEP) through research and development of technologies for economic and environmentally sound refinement of spent nuclear fuel. The UNLV program has four components: infrastructure, international collaboration, student-based research, and management and program support.


Front Matter Sep 2007

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Sep 2007

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Population Biology And Monitoring Of The Cuban Hutia At Guantanamo Bay, Cuba, Gary W. Witmer, Martin Lowney Sep 2007

Population Biology And Monitoring Of The Cuban Hutia At Guantanamo Bay, Cuba, Gary W. Witmer, Martin Lowney

United States Department of Agriculture Wildlife Services: Staff Publications

The Cuban hutia (Capromys pilorides) is the largest native mammal occurring in Cuba. Endemic to the West Indies, most species of hutia are rare or extinct because of over-harvesting, exotic species introductions, and habitat modifications by humans. An exception is Guantanamo Bay, Cuba, where the Cuban hutia is very common and is responsible for a variety of damage and conflicts, including damage to landscaping, gnawing through cables, damage to vehicles, the accumulation of large amounts of feces in residential areas, and damage to native vegetation, with little subsequent regeneration of many plant species. Current management focuses on population …


Realizing The Relationship Web: Morphing Information Access On The Web From Today's Document- And Entity-Centric Paradigm To A Relationship-Centric Paradigm, Amit P. Sheth Sep 2007

Realizing The Relationship Web: Morphing Information Access On The Web From Today's Document- And Entity-Centric Paradigm To A Relationship-Centric Paradigm, Amit P. Sheth

Kno.e.sis Publications

No abstract provided.