Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 5821 - 5850 of 6763

Full-Text Articles in Physical Sciences and Mathematics

Ferromagnetic To Ferrimagnetic Crossover In Cr-Doped Gan Nanohole Arrays, Q. Wang, Q. Sun, Puru Jena, Y. Kawazoe Jan 2007

Ferromagnetic To Ferrimagnetic Crossover In Cr-Doped Gan Nanohole Arrays, Q. Wang, Q. Sun, Puru Jena, Y. Kawazoe

Physics Publications

Using spin-polarized density-functional theory with exchange and correlation potential, approximated by both the generalized gradient approximation (GGA) and the GGA+U methods, we show that the coupling between a pair of Cr atoms substituted in GaN nanoholes is ferromagnetic. The interaction between the two Cr atoms, each carrying an average magnetic moment of around 2.5μB, is short ranged and mediated by the neighboring N atom. As the concentration of Cr increases, clustering ensues and the coupling changes from ferromagnetic to ferrimagnetic resulting in a significant reduction in the average magnetic moment per Cr atom.


2007 Annual Report Of The Water Quality Monitoring Project For The Water Quality Protection Program Of The Florida Keys National Marine Sanctuary, Joseph N. Boyer, Henry O. Briceño Jan 2007

2007 Annual Report Of The Water Quality Monitoring Project For The Water Quality Protection Program Of The Florida Keys National Marine Sanctuary, Joseph N. Boyer, Henry O. Briceño

SERC Research Reports

No abstract provided.


University Of Rhode Island Neasc Self-Study 2007. Standard Seven: Library And Other Information Resources Jan 2007

University Of Rhode Island Neasc Self-Study 2007. Standard Seven: Library And Other Information Resources

Collection Development Reports and Documents

Self-Study report by the University of Rhode Island, prepared in fall 2006 for the 2006/07 accreditation visit of the New England Association of Schools and Colleges (NEASC). Included here is Standard Seven: Library and Other Information Resources.

This standard was prepared by Standard Seven Committee Chair Karen M. Ramsay, Associate Professor and Chair of the Department of Technical Services in the University Libraries. Also on the Standard Seven Committee were: Lisa DiPippo, Associate Professor, Department of Computer Science & Statistics; Karol Leuzarder, Senior Tech Programmer, TOPS; Mary MacDonald, Associate Professor, University Libraries; David Eifler, Graduate Student; Jim Loy, Professor, Anthropology; …


Antibacterial Targets In Fatty Acid Biosynthesis, H. Tonie Wright, Kevin A. Reynolds Jan 2007

Antibacterial Targets In Fatty Acid Biosynthesis, H. Tonie Wright, Kevin A. Reynolds

Chemistry Faculty Publications and Presentations

The fatty acid biosynthesis pathway is an attractive but still largely unexploited target for development of new anti-bacterial agents. The extended use of the anti-tuberculosis drug isoniazid and the antiseptic triclosan, which are inhibitors of fatty acid biosynthesis, validates this pathway as a target for anti-bacterial development. Differences in subcellular organization of the bacterial and eukaryotic multi-enzyme fatty acid synthase systems offer the prospect of inhibitors with host vs. target specificity. Platensimycin, platencin, and phomallenic acids, newly discovered natural product inhibitors of the condensation steps in fatty acid biosynthesis, represent new classes of compounds with antibiotic potential. An almost complete …


The Potential For Ch4-Enriched Biogas As A Transport Fuel In Ireland, Niamh Power Jan 2007

The Potential For Ch4-Enriched Biogas As A Transport Fuel In Ireland, Niamh Power

Theses

Ireland needs a biofuel industry- to aid compliance with the Kyoto Protocol, the Biofuels Directive and to secure its energ>' supply. The overall aim of this work is to assess the potential of CH4-enriched biogas as a transport fuel in Ireland. Biogas is produced during the anaerobic digestion of biomass. This work investigates biogas production from two different feedstocks; biodegradable municipal waste and agricultural crops. To assess the potential for biogas as a transport fuel the alternatives to biogas are investigated and compared. Thus digestion and composting of biodegradable municipal waste, and biogas and ethanol production from agricultural crops …


A Comparison Of Channel Morphology, Marsh Elevation, And Biological Processes In Natural And Dredged Tidal Salt Marshes In Louisiana, Jennifer S. Spicer Jan 2007

A Comparison Of Channel Morphology, Marsh Elevation, And Biological Processes In Natural And Dredged Tidal Salt Marshes In Louisiana, Jennifer S. Spicer

LSU Doctoral Dissertations

Channel networks in tidal marshes serve as conduits for the exchange of water between the estuary and the marsh surface and form the spatial structure that regulates the flow of organisms, materials, and energy throughout the marsh system. Canal dredging creates channels with distinct linear shapes, and the artificial levee created from the dredged material creates ‘spoil banks’ along either side of the channel edge. Differences in morphology and adjacent marsh surface elevation between natural and dredged channel systems have not been well quantified, but may have important implications for the functioning of tidal channels as habitat for marsh-dependent species. …


Reasonable Emissions Of Greenhouse Gases: Efficient Abatement For A Stock Pollutant, Howard F. Chang Jan 2007

Reasonable Emissions Of Greenhouse Gases: Efficient Abatement For A Stock Pollutant, Howard F. Chang

All Faculty Scholarship

No abstract provided.


Electron Trapping In A One-Dimensional Semiconductor Quantum Wire With Multiple Impurities, S. Tanaka, S. Garmon, Gonzalo Ordonez, T. Petrosky Jan 2007

Electron Trapping In A One-Dimensional Semiconductor Quantum Wire With Multiple Impurities, S. Tanaka, S. Garmon, Gonzalo Ordonez, T. Petrosky

Scholarship and Professional Work - LAS

We demonstrate the trapping of a conduction electron between two identical adatom impurities in a one-dimensional semiconductor quantum-dot array system (quantum wire). Bound steady states arise even when the energy of the adatom impurity is located in the continuous one-dimensional energy miniband. The steady state is a realization of the bound state in continuum (BIC) phenomenon first proposed by von Neuman and Wigner [Phys. Z. 30, 465 (1929)]. We analytically solve the dispersion equation for this localized state, which enables us to reveal the mechanism of the BIC. The appearance of the BIC state is attributed to the quantum …


Transformation Of Formally Defined Post-Conditions Into Target Language Statements, Swetha Padma Parvathaneni Jan 2007

Transformation Of Formally Defined Post-Conditions Into Target Language Statements, Swetha Padma Parvathaneni

Browse all Theses and Dissertations

For years software engineering researchers have been trying to come up with a software synthesis system that can transform a formal specification model into a design model from which executable code can be generated. AFIT Wide Spectrum Object Modeling Environment (AWSOME) is one such formal based software synthesis system. In this system formal specifications written in AWL are parsed into an AST (Abstract Syntax Tree). The intent of this thesis is to demonstrate the transformation of the postconditions of a method into target language statements. The methods in the classes are specified using pre-conditions and post-conditions. Transforms are developed to …


High Performance Text Document Clustering, Yanjun Li Jan 2007

High Performance Text Document Clustering, Yanjun Li

Browse all Theses and Dissertations

Data mining, also known as knowledge discovery in database (KDD), is the process to discover interesting unknown knowledge from a large amount of data. Text mining is to apply data mining techniques to extract interesting and nontrivial information and knowledge from unstructured text. Text clustering is one of important techniques of text mining, which is the unsupervised classification of similar documents into different groups.

This research focuses on improving the performance of text clustering. We investigated the text clustering algorithms in four aspects: document representation, documents closeness measurement, high dimension reduction and parallelization. We propose a group of high performance …


Fabrication And Study Of Zno Micro- And Nanostructures, Monica Morales-Masis Jan 2007

Fabrication And Study Of Zno Micro- And Nanostructures, Monica Morales-Masis

Browse all Theses and Dissertations

ZnO micro-structures and nano-structures have been grown on two types of substrate by reacting condensed Zn vapor with oxygen. The source material was either pure zinc powder or zinc acetate which was either evaporated or decomposed. This was done in the temperature range 500 C to 650 C, in a flowing Ar plus oxygen ambient at atmospheric pressure. Variations in the carrier gas composition, gas flow rate and the position of the substrate in the furnace were found to control the formation and the morphology of the nanostructures. Scanning electron microscopy images of samples grown from a Zn powder source …


Laser Initiated Chain Reactions: The Kinetics Of The Chlorine/Cyclohexane/Oxygen Chain System, Robert Alan Forlines Jan 2007

Laser Initiated Chain Reactions: The Kinetics Of The Chlorine/Cyclohexane/Oxygen Chain System, Robert Alan Forlines

Browse all Theses and Dissertations

The combination of laser photolysis with infrared chemiluminescence detection has proven an effective technique for determining the propagation rate coefficients of halogen + RH chain reactions. This thesis will extend the technique to cyclic alkanes by determining the propagation rate coefficients of the Cl2/ cyclohexane chain system as well as the rate coefficient for the primary chain termination mechanism, R + O2 → RO2. The following reaction scheme is supported by the kinetic analysis: Cl2 → 2Cl Laser Photolysis Cl + RH → HCl(v) + R First Propagation Step (k1) R + …


Synthetic Approach To Epibatidine From 1-(Phenylsulfonyl)Pyrrole, Brandon G. Vanness Jan 2007

Synthetic Approach To Epibatidine From 1-(Phenylsulfonyl)Pyrrole, Brandon G. Vanness

Browse all Theses and Dissertations

The goal of this research was to synthesize the natural product epibatidine, a non-opiate analgesic and nicotinic acetylcholine agonist isolated from Epipedobates tricolor. A synthetic pathway utilizing a Diels-Alder cycloaddition of a 3-pyridyl substituted pyrrole and tosylacetylene was conceived based upon the original mass spectral fragmentation pathway of epibatidine determined by Daly. Although this pathway had been previously attempted using 1-(triisopropyl)-3-[5-(2-chloropyridyl)]pyrrole in the key Diels-Alder step, the lack of cycloadduct suggested that a pyrrole with a more electron withdrawing protecting group was required for this step. Therefore, synthesis of 1-(phenylsulfonyl)-3-[5-(2-chloropyridyl)]pyrrole via a palladium catalyzed cross-coupling reaction of 1-(phenylsulfonyl)-3-pyrroline and …


Evidence Of A Pre-Mount Simon, Half-Graben In Greene County, Ohio By Reprocessing A Wright State University Seismic Line, John Sink Jan 2007

Evidence Of A Pre-Mount Simon, Half-Graben In Greene County, Ohio By Reprocessing A Wright State University Seismic Line, John Sink

Browse all Theses and Dissertations

The reprocessing of the WSU2002 seismic line indicates the presence of a Precambrian half-graben. Also observed through this reprocessing is the possible presence of Paleozoic structures. Although Paleozoic features have been interpreted, variations in glacial drift thickness evidenced by glacial drift maps also may have contributed to a lower quality of stacked section in comparison to other seismic lines. WSU2002 was originally processed by Lauren Geophysical. The Lauren processing resulted in an image that was of much lower quality than corresponding seismic lines. The Lauren Geophysical processed section revealed many horizontal Paleozoic reflections, with no prominent reflectors beneath the Paleozoic. …


Summaritive Digest For Large Document Repositories With Application To E-Rulemaking, Lijun Chen Jan 2007

Summaritive Digest For Large Document Repositories With Application To E-Rulemaking, Lijun Chen

Browse all Theses and Dissertations

Large document repositories need to be organized and summarized to make them more accessible and understandable. Such needs exist in many applications, including web search, e-rulemaking (electronic rulemaking) and document archiving. Even though much has been done in the areas of document clustering and summarization, there are still many new challenges and issues that need to be addressed as the repositories become larger, more prevalent and dynamic. In this dissertation, we investigate more informative ways to organize and summarize large document repositories, especially e-rulemaking feedback repositories (ERFRs), so that the large repositories can be managed and digested more efficiently and …


Tailoring Branching For Poly (Arylene Ether)S Via Reactivity Ratio Controlled Polymerizations, Amanda Ike Jan 2007

Tailoring Branching For Poly (Arylene Ether)S Via Reactivity Ratio Controlled Polymerizations, Amanda Ike

Browse all Theses and Dissertations

The ability to control physical and mechanical properties of polymer systems has become an important aspect of polymer science. In order to tailor the branching in polymer systems, an understanding into the reactivity of the electrophilic sites in the monomer is important. Kinetic methods have been explored in order to determine the reactivity of monomers in preparing poly(arylene ether)s and to predict the degree of branching that will occur in a polymer of this kind. The reactivity of AB2 sulfones and phosphine oxides was explored, along with the reactivity of ABB'B'' sulfones. NMR spectroscopy was used as a probe into …


Porosity And Permeability Of Bimodal Sediment Mixtures Using Natural Sediment, Peter M. Phillips Jan 2007

Porosity And Permeability Of Bimodal Sediment Mixtures Using Natural Sediment, Peter M. Phillips

Browse all Theses and Dissertations

Porosity and permeability are parameters that affect the flow of ground water in the subsurface and have significant implications on the modeling of fate and transport of contaminants. However, little has been done to quantitatively examine the effect on porosity and permeability of packing in bimodal mixtures of natural sediment. This study compares measurements of porosity and permeability on model bimodal sediment mixtures with predictions from petrophysical models. The main goal is to evaluate how well these petrophysical models predict porosity and permeability in bimodal mixtures of natural sediment. The effect of the volume fraction of fines on porosity and …


Using Technology To Design Teaching Modules In Mathematics And Science, Ollie I. Manley Jan 2007

Using Technology To Design Teaching Modules In Mathematics And Science, Ollie I. Manley

Proceedings of the Annual Meeting of the Georgia Association of Mathematics Teacher Educators

Technology is changing the way in which mathematics and science are taught, and this radical transformation in teaching is causing teachers to take a closer look at how lessons are designed. In an effort to demonstrate how to design instructional modules using technology, this paper will include the following: 1)A review of the National Educational Technology Standards for teachers to establish a framework for the development of the teaching modules; 2)instructional designs and techniques with special emphasis on multiple intelligence and critical thinking skills; 3) strategies and techniques for infusing technology into a standard based curriculum; and 4) an analysis …


A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton Jan 2007

A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton

Journal of Digital Forensics, Security and Law

As a relatively new field of study, little empirical research has been conducted pertaining to computer forensics. This lack of empirical research contributes to problems for practitioners and academics alike.

For the community of practitioners, problems arise from the dilemma of applying scientific methods to legal matters based on anecdotal training methods, and the academic community is hampered by a lack of theory in this evolving field. A research study utilizing a multi-method approach to identify and measure tasks practitioners perform during forensic data acquisitions and lay a foundation for academic theory development was conducted in 2006 in conjunction with …


Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay Jan 2007

Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay

Journal of Digital Forensics, Security and Law

The research reported in this paper introduces new techniques to aid in the identification of recovered notebook computers so they may be returned to the rightful owner. We identify non-volatile data storage areas as a means of facilitating the safe storing of computer identification information. A forensic proof of concept tool has been designed to test the feasibility of several storage locations identified within this work to hold the data needed to uniquely identify a computer. The tool was used to perform the creation and extraction of created information in order to allow the analysis of the non-volatile storage locations …


Book Review: No Place To Hide, Gary C. Kessler Jan 2007

Book Review: No Place To Hide, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Information Governance: A Model For Security In Medical Practice, Patricia A. Williams Jan 2007

Information Governance: A Model For Security In Medical Practice, Patricia A. Williams

Journal of Digital Forensics, Security and Law

Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing …


Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth Jan 2007

Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth

Journal of Digital Forensics, Security and Law

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …


Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade Jan 2007

Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade

Journal of Digital Forensics, Security and Law

The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …


Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler Jan 2007

Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song Jan 2007

Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song

Journal of Digital Forensics, Security and Law

Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …


Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas Jan 2007

Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas

Journal of Digital Forensics, Security and Law

Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.

Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …


Table Of Contents Jan 2007

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.