Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2911 - 2940 of 6758

Full-Text Articles in Physical Sciences and Mathematics

Dna-Templated Nanomaterials, Hector Alejandro Becerril-Garcia Apr 2007

Dna-Templated Nanomaterials, Hector Alejandro Becerril-Garcia

Theses and Dissertations

Nanomaterials display interesting physical and chemical properties depending on their shape, size and composition. Self assembly is an intriguing route to producing nanomaterials with controllable compositions and morphologies. DNA has been used to guide the self assembly of materials, resulting in: (1) metal nanowires; (2) metal or semiconductor nanorods; (3) carbon nanotubes; and (4) semiconductor, metal or biological nanoparticles. My work expands the range of DNA templated nanomaterials and develops novel ways of using DNA to pattern nanostructures on surfaces. I have performed the first synthesis of silver nanorods on single stranded DNA, an attractive material for localizing DNA coupled …


The Successful Eradication Of Introduced Roof Rats (Rattus Rattus) From Buck Island Using Diphacinone, Followed By An Irruption Of House Mice (Mus Musculus), Gary W. Witmer, Frank Boyd, Zandy Hillis-Starr Apr 2007

The Successful Eradication Of Introduced Roof Rats (Rattus Rattus) From Buck Island Using Diphacinone, Followed By An Irruption Of House Mice (Mus Musculus), Gary W. Witmer, Frank Boyd, Zandy Hillis-Starr

United States Department of Agriculture Wildlife Services: Staff Publications

The United States National Park Service and the United States Wildlife Services made a planned and sustained effort to eradicate the introduced roof rats (Rattus rattus) from Buck Island Reef National Monument in the Caribbean Sea during 1998–2000. The rats were causing substantial damage to a variety of the 80-ha island’s floral and faunal resources. An island-wide grid of elevated bait stations containing anticoagulant (0.005% diphacinone; 50 ppm) rodenticide bait blocks were used to eradicate the rats. The bait stations were modified several times to assure ready access by rats while minimizing access by non-target animals, especially crabs …


Long-Range Coupling And Scalable Architecture For Superconducting Flux Qubits, Britton Plourde, Austin G. Fowler Apr 2007

Long-Range Coupling And Scalable Architecture For Superconducting Flux Qubits, Britton Plourde, Austin G. Fowler

Physics - All Scholarship

Constructing a fault-tolerant quantum computer is a daunting task. Given any design, it is possible to determine the maximum error rate of each type of component that can be tolerated while still permitting arbitrarily large-scale quantum computation. It is an underappreciated fact that including an appropriately designed mechanism enabling long-range qubit coupling or transport substantially increases the maximum tolerable error rates of all components. With this thought in mind, we take the superconducting flux qubit coupling mechanism described in PRB 70, 140501 (2004) and extend it to allow approximately 500 MHz coupling of square flux qubits, 50 um a side, …


Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian Apr 2007

Textbooks For Computer Forensic Courses: A Preliminary Study, Jigang Liu, Larry Gottschalk, Kuodi Jian

Annual ADFSL Conference on Digital Forensics, Security and Law

As computer forensics develops into one of the fastest-growing areas in the computer related fields, many universities and colleges are offering or are planning to offer a course in computer forensics. When instructors begin to develop a new course in the area, one of critical questions they would ask is what textbook should be used. To better answer the question, we conducted a study in which we tried to find which textbooks are being used in computer forensic courses. We believe that the results and analysis of our study will help instructors in choosing adequate textbooks for their new course …


Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli Apr 2007

Do Current Erasure Programs Remove Evidence Of Bittorrent Activity?, Andrew Woodward, Craig Valli

Annual ADFSL Conference on Digital Forensics, Security and Law

This research in progress aims to evaluate the effectiveness of commercial programs to erase traces of the use of BitTorrent software. The erasure programs MaxErase, P2PDoctor, Privacy Suite, Window Washer and R-Clean and Wipe were used on a machine that had used the BitTorrent client Azureus to download two torrent files. The drive was imaged and then searched for torrent files. The registry was also examined on the source machine. The program R-Clean and Wipe left evidence in both the registry and the image of the name and type of files that had been downloaded with this software. Of greater …


The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo Apr 2007

The Case For Teaching Network Protocols To Computer Forensics Examiners, Gary C. Kessler, Matt Fasulo

Annual ADFSL Conference on Digital Forensics, Security and Law

Most computer forensics experts are well-versed in basic computer hardware technology, operating systems, common software applications, and computer forensics tools. And while many have rudimentary knowledge about the Internet and simple network-lookup tools, they are not trained in the analysis of network communication protocols and the use of packet sniffers. This paper describes digital forensics applications for network analysis and includes four case studies.

Keywords: computer forensics education, network forensics, protocol analysis


Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb Apr 2007

Defending Against Insider Use Of Digital Steganography, James E. Wingate, Glenn D. Watt, Marc Kurtz, Chad W. Davis, Robert Lipscomb

Annual ADFSL Conference on Digital Forensics, Security and Law

The trusted insider is among the most harmful and difficult to detect threats to information security, according to the Federal Plan for Information Assurance and Cyber Security Research and Development released in April 2006. By default, employees become trusted insiders when granted the set of privileges needed to do their jobs, which typically includes access to the Internet. It is generally presumed the insiders are loyally working to achieve the organization’s goals and objectives and would not abuse the privileges given to them. However, some insiders will inevitably abuse some of their privileges. For example, a trusted insider might abuse …


Computer Geolocation Using Extracted Features, Chad M.S. Steel Apr 2007

Computer Geolocation Using Extracted Features, Chad M.S. Steel

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper compares the extracted feature data from a sample set of hard drive images in an effort to relate the features to the physical location of the drive. A list of probable zip codes, phone numbers, place names, and IP addresses are extracted from raw drive images and compared to manually identified geolocation data. The results of the individual extractions are then analyzed to determine the feasibility in using automated extraction and analysis techniques for geolocating hard drives.

Keywords: hard disk forensics, geocoding, geolocation


Ice Core Paleovolcanic Records From The St. Elias Mountains, Yukon, Canada, Kaplan Yalcin, Cameron P. Wake, Karl J. Kreutz, Mark S. Germani, Sallie I. Whitlow Apr 2007

Ice Core Paleovolcanic Records From The St. Elias Mountains, Yukon, Canada, Kaplan Yalcin, Cameron P. Wake, Karl J. Kreutz, Mark S. Germani, Sallie I. Whitlow

Earth Science Faculty Scholarship

We previously reported a record of regionally significant volcanic eruptions in the North Pacific using an ice core from Eclipse Icefield (St. Elias Mountains, Yukon, Canada). The acquisition of two new ice cores from Eclipse Icefield, along with the previously available Eclipse Icefield and Mount Logan Northwest Col ice cores, allows us to extend our record of North Pacific volcanism to 550 years before present using a suite of four ice cores spanning an elevation range of 3 - 5 km. Comparison of volcanic sulfate flux records demonstrates that the results are highly reproducible, especially for the largest eruptions such …


2007 Sonia Kovalevsky Math For Girls Day Featured Workshop: Knot Theory, Association For Women In Mathematics, Lincoln University Of Missouri Apr 2007

2007 Sonia Kovalevsky Math For Girls Day Featured Workshop: Knot Theory, Association For Women In Mathematics, Lincoln University Of Missouri

Math for Girls Day Documents

2nd Annual Lincoln University Sonia Kovalevsky Math for Girls Day featured workshop by Mrs. Bernadette Turner on the topic of knot theory.


Anisotropic Diffusion Techniques On Synthetic Aperture Radar Data, Josef Vaughn De Allen, Emile Ganthier, Gnana Bhaskar Tenali Apr 2007

Anisotropic Diffusion Techniques On Synthetic Aperture Radar Data, Josef Vaughn De Allen, Emile Ganthier, Gnana Bhaskar Tenali

Mathematics and System Engineering Faculty Publications

Speckle in SAR imagery is a by-product of constructive and destructive interference between scatterers within a resolution cell. This speckle phenomenon gives SAR imagery a "noise-like" appearance and is often exploited in near angle and/or coherent stereo pairs. However, in many cases, this speckle is unwanted and can be considered noise or interference. We use partial differential equation (PDE) methods for speckle mitigation in detected imagery and the collected complex image data. In particular, we study the effects of non-linear anisotropic diffusion filters on collected SAR image data. In the past, anisotropic diffusion (AD) techniques have been successfully used in …


Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes Apr 2007

Education For Cyber Crime Investigators, David Greer, Joe Mulenex, John Hale, Gavin W. Manes

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics and cyber crime investigations are continually growing, rapidly changing fields requiring law enforcement agencies to meet very rigorous training requirements. New opportunities for committing criminal activity against persons, organization or property are presented every day with the proliferation of personal digital devices, computers, the internet, computer networks, and automated data systems. Whether the crime involves attacks against computer systems, electronic information, or more traditional crimes such as murder, money laundering or fraud, electronic evidence is becoming more prevalent. It is no surprise that law enforcement and criminal justice officials are being overwhelmed by the volume of investigations and …


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song Apr 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki Jung Lee, Il-Yeol Song

Annual ADFSL Conference on Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


Electric Field Induced Hopping Conductivity And Polarization In Hytrel, Steve Hart Apr 2007

Electric Field Induced Hopping Conductivity And Polarization In Hytrel, Steve Hart

Senior Theses and Projects

The focus of my 4900 research project is centered on the conductivity of Hytrel, a complex, newly developed block co-polymer. I first began to study Hytrel during the summer of 2006, as part of the USU College of Science Mini-Grant program1. My general objective was to study the relationship between the resistivity of Hytrel and hopping conductivity. Hopping conductivity is a theory of electron transport for nonconducting solids, originally developed for amorphous semiconductors2,3. The theory will be examined in greater detail later in this document. While studying this relationship last summer, I noticed an unusual phenomenon …


Cattail Distribution End Abundance In North Dakota, Scott T. Ralston, G. M. Linz, W. J. Bleier, H. J. Homan Apr 2007

Cattail Distribution End Abundance In North Dakota, Scott T. Ralston, G. M. Linz, W. J. Bleier, H. J. Homan

United States Department of Agriculture Wildlife Services: Staff Publications

Wetlands in the Prairie Pothole Region (PPR) of North Dalcota provide important habitats for a plethora of invertebrate and vertebrate animals. Since 1991, glyphosate-based (N-phosphonomethyl-glycine) herbicides have been used to manage dense cattail (Typha spp. L.) stands on 29,522 ha of wetlands in the PPR to disperse blackbird roosts. Limited information exists on the abundance and distribution of this important habitat. We took aerial photographs and used geospatial analysis tools to identify wetland basins and cattail coverage on randomly selected sample sites within the PPR. We found that average wetland density and size were 13 wetlands/ km2 and …


Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale Apr 2007

Towards Redaction Of Digital Information From Electronic Devices, Gavin W. Manes, Lance Watson, David Greer, Alex Barclay, John Hale

Annual ADFSL Conference on Digital Forensics, Security and Law

In the discovery portion of court proceedings, it is necessary to produce information to opposing counsel. Traditionally, this information is in paper form with all privileged information removed. Increasingly, the information requested during discovery exists in digital form and savvy counsel is requesting direct access to the original digital source: a broad spectrum of additional digital information can be often be extracted using digital forensics. This paper describes the major problems which must be solved to redact digital information from electronic devices. The primary hurdle facing digital redaction is the lack of a rational process for systematically handling encoded, encrypted, …


Searching For A Stochastic Background Of Gravitational Waves With The Laser Interferometer Gravitational-Wave Observatory, B. Abbott, R. Abbott, R. Adhikari, J. Agresti, P. Ajith, B. Allen, R. Amin, S. B. Anderson, W. G. Anderson, M. Araya, H. Armandula, M. Ashley, S. Aston, C. Aulbert, S. Babak, S. Ballmer, B. C. Barish, C. Barker, D. Barker, B. Barr, P. Barriga, M. A. Barton, K. Bayer, K. Belczynski, J. Betzwieser, P. Beyersdorf, B. Bhawal, I. A. Bilenko, G. Billingsley, E. Black Apr 2007

Searching For A Stochastic Background Of Gravitational Waves With The Laser Interferometer Gravitational-Wave Observatory, B. Abbott, R. Abbott, R. Adhikari, J. Agresti, P. Ajith, B. Allen, R. Amin, S. B. Anderson, W. G. Anderson, M. Araya, H. Armandula, M. Ashley, S. Aston, C. Aulbert, S. Babak, S. Ballmer, B. C. Barish, C. Barker, D. Barker, B. Barr, P. Barriga, M. A. Barton, K. Bayer, K. Belczynski, J. Betzwieser, P. Beyersdorf, B. Bhawal, I. A. Bilenko, G. Billingsley, E. Black

Physics and Astronomy Faculty Publications and Presentations

The Laser Interferometer Gravitational-Wave Observatory (LIGO) has performed the fourth science run, S4, with significantly improved interferometer sensitivities with respect to previous runs. Using data acquired during this science run, we place a limit on the amplitude of a stochastic background of gravitational waves. For a frequency independent spectrum, the new Bayesian 90% upper limit is ΩGW × [H0/(12 km s-1 Mpc-1)]2 < 6.5 × 10-5. This is currently the most sensitive result in the frequency range 51-150 Hz, with a factor of 13 improvement over the previous LIGO result. We discuss the complementarity of the new result with other constraints on a stochastic background of gravitational waves, and we investigate implications of the new result for different models of this background. © 2007. The American Astronumical Society. All rights reserved.


A Simple Organic Solar Cell, Gordon Patrick Whyburn Apr 2007

A Simple Organic Solar Cell, Gordon Patrick Whyburn

Pomona Senior Theses

Finding renewable sources of energy is becoming an increasingly important component of scientific research. Greater competition for existing sources of energy has strained the world’s supply and demand balance and has increased the prices of traditional sources of energy such as oil, coal, and natural gas. The experiment discussed in this paper is designed to identify and build an inexpensive and simple method for creating an effective organic solar cell.


Solar Energy Research And Development In California, Brett T. Close Apr 2007

Solar Energy Research And Development In California, Brett T. Close

Pomona Senior Theses

The energy crisis of 2001, high prices for gas and electricity and worries of climate change have caused a growing awareness about energy issues in California. The problems are clear. This paper looks at the next step of finding and implementing solutions. In this case the contribution that solar photovoltaic and solar thermal generation could make toward solving the problem. This paper looks at technological change, the current state of solar energy research, current government policies on solar energy, and finally makes policy recommendations to meet the stated problem.


Anticipating Semilinear Spdes (International Conference Stochastic Analysis And Stochastic Geometry), Salah-Eldin A. Mohammed Apr 2007

Anticipating Semilinear Spdes (International Conference Stochastic Analysis And Stochastic Geometry), Salah-Eldin A. Mohammed

Miscellaneous (presentations, translations, interviews, etc)

No abstract provided.


The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack Apr 2007

The Gap Between Theory And Practice In Digital Forensics, Joseph C. Sremack

Annual ADFSL Conference on Digital Forensics, Security and Law

Digital forensics is a young field that is being defined by the reactive nature of its development – in terms of both research and practice. As technology develops, digital forensics is forced to react and adapt. The rapid development of technology and the lack of an established theoretical foundation has led to a disconnect between the theory and practice of digital forensics. While the base theoretical issues are being worked on by researchers, practitioners are dealing with entirely new sets of issues. The complexity of investigations is increasing, and anti-forensics techniques are advancing as well. The disconnect will be resolved …


Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Teams Responsibilities For Digital Forensic Process, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper presents a detailed digital forensics process model and the responsible teams to perform it. The discussed model presents three teams and a forensic leader who coordinate between the three teams; these teams are physical crime scene team, laboratory examination team and courtroom team. These teams are responsible of achieving the digital forensic model by applying five main phases which are preparation phase, physical forensics and investigation phase, digital forensics phase, reporting and presentation phase and closure phase.

Most of the existing models in this field are either theoretical that deals with data processing or based on a legal …


Understanding Atomic (Hydrogenic) Orbitals, Part 2, D-Orbitals, Carl W. David Apr 2007

Understanding Atomic (Hydrogenic) Orbitals, Part 2, D-Orbitals, Carl W. David

Chemistry Education Materials

This material extends earlier discussions to the d-orbitals.


Adaptation And Mitigation Strategies In Agriculture: An Analysis Of Potential Synergies, Cynthia Rosenzweig, Francesco Nicola Tubiello Apr 2007

Adaptation And Mitigation Strategies In Agriculture: An Analysis Of Potential Synergies, Cynthia Rosenzweig, Francesco Nicola Tubiello

United States National Aeronautics and Space Administration: Publications

As climate changes due to rising concentrations of greenhouse gases in the atmosphere, agriculture will be one of the key human activities affected. Projections show that while overall global food production in the coming decades may keep pace with the food requirements of a growing world population, climate change might worsen existing regional disparities because it will reduce crop yields mostly in lands located at lower latitudes where many developing countries are situated. Strategies to enhance local adaptation capacity are therefore needed to minimize climatic impacts and to maintain regional stability of food production. At the same time, agriculture as …


Longitudinal Curves For Behaviors Of Children Diagnosed With A Brain Tumor, Huayan Chai Apr 2007

Longitudinal Curves For Behaviors Of Children Diagnosed With A Brain Tumor, Huayan Chai

Mathematics Theses

Change in adaptive outcomes of children who are treated for brain tumors is examined using longitudinal data. The children received different types of treatment from none to any combinations of three treatments, which are surgery, radiation and chemotherapy. In this thesis, we use mixed model to find the significant variables that predict change in outcomes of communication skill, daily living skills and socialization skill. Fractional polynomial transformation method and Gompertz method are applied to build non-linear longitudinal curves. We use PRESS as the criterion to compare these two methods. Comparison analysis shows the effect of each significant variable on adaptive …


New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley Apr 2007

New Federal Rules And Digital Evidence, Gavin W. Manes, Elizabeth Downing, Lance Watson, Christopher Thrutchley

Annual ADFSL Conference on Digital Forensics, Security and Law

The newly revised Federal Rules of Civil Procedure and developments under the Federal Rules of Evidence have a significant impact on the use, collection, and treatment of digital evidence for legal proceedings. The Rules now formally grant electronic documents and digital evidence the same status as paper and other forms of tangible evidence. As a result, the availability and proper preservation of potentially relevant electronic evidence must be considered, at the very latest, in the preliminary stages of litigation and, at the earliest, as soon as litigation is reasonably anticipated. It is important for professionals to be familiar with the …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Apr 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Annual ADFSL Conference on Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros Apr 2007

An Exploratory Analysis Of Computer Mediated Communications On Cyberstalking Severity, Stephen D. Barnes, David P. Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

The interaction between disjunctive interpersonal relationships, those where the parties to the relationship disagree on the goals of the relationship, and the use of computer mediated communications channels is a relatively unexplored domain. Bargh (2002) suggests that CMC channels can amplify the development of interpersonal relationships, and notes that the effect is not constant across communications activities. This proposal suggests a line of research that explores the interaction between computer mediated communications (CMC) and stalking, which is a common form of disjunctive relationships. Field data from cyberstalking cases will be used to look at the effects of CMC channels on …


The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers Apr 2007

The General Digital Forensics Model, Steven Rigby, Marcus K. Rogers

Annual ADFSL Conference on Digital Forensics, Security and Law

The lack of a graphical representation of all of the principles, processes, and phases necessary to carry out an digital forensic investigation is a key inhibitor to effective education in this newly emerging field of study. Many digital forensic models have been suggested for this purpose but they lack explanatory power as they are merely a collection of lists or one-dimensional figures. This paper presents a new multi-dimensional model, the General Digital Forensics Model (GDFM), that shows the relationships and inter-connectedness of the principles and processes needed within the domain of digital forensics.

Keywords: process model, computer forensics, expert learning, …


Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem Apr 2007

Guideline Model For Digital Forensic Investigation, Salma Abdalla, Sherif Hazem, Sherif Hashem

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper proposes a detailed guideline model for digital forensics; the proposed model consists of five main phases, Preparation phase, Physical Forensics and Investigation Phase, Digital Forensics Phase, Reporting and Presentation Phase, and Closure Phase.

Most of the existing models in this field do not cover all aspects of digital forensic investigations, as they focus mainly on the processing of digital evidence or on the legal points. Although they gave good information to base on it a guide, but they are not detailed enough to describe fully the investigative process in a way that can be used by investigators during …