Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1498)
- Environmental Sciences (1305)
- Physics (905)
- Engineering (810)
- Chemistry (762)
-
- Life Sciences (712)
- Social and Behavioral Sciences (672)
- Earth Sciences (632)
- Mathematics (595)
- Oceanography and Atmospheric Sciences and Meteorology (358)
- Statistics and Probability (354)
- Computer Engineering (338)
- Astrophysics and Astronomy (234)
- Education (234)
- Geology (227)
- Natural Resources and Conservation (217)
- Arts and Humanities (201)
- Natural Resources Management and Policy (195)
- Databases and Information Systems (193)
- Electrical and Computer Engineering (185)
- Applied Mathematics (177)
- Environmental Indicators and Impact Assessment (175)
- Environmental Health and Protection (154)
- Business (152)
- Science and Mathematics Education (152)
- Law (137)
- Sustainability (137)
- Water Resource Management (123)
- Information Security (121)
- Institution
-
- University of Nebraska - Lincoln (947)
- University of Wollongong (359)
- Wright State University (302)
- TÜBİTAK (220)
- Selected Works (185)
-
- Singapore Management University (163)
- Missouri University of Science and Technology (158)
- University of Nevada, Las Vegas (157)
- Brigham Young University (139)
- Louisiana State University (135)
- SelectedWorks (116)
- Old Dominion University (112)
- University of Kentucky (108)
- Utah State University (107)
- Embry-Riddle Aeronautical University (97)
- Edith Cowan University (92)
- Chinese Chemical Society | Xiamen University (86)
- Wayne State University (84)
- COBRA (83)
- Clemson University (81)
- Air Force Institute of Technology (76)
- William & Mary (76)
- Georgia State University (75)
- Portland State University (71)
- University of Central Florida (70)
- University of Massachusetts Amherst (70)
- University of Tennessee, Knoxville (69)
- Technological University Dublin (68)
- University of Northern Iowa (63)
- University of Texas at Arlington (62)
- Keyword
-
- Invasive species (66)
- Environmental science--Experiments; Ecology--Experiments; Atmospheric physics--Experiments; (37)
- CMMB (36)
- Human–wildlife conflicts (28)
- Water (28)
-
- Climate change (27)
- GeoQUEST (27)
- Groundwater (26)
- Mathematics (26)
- [RSTDPub] (26)
- Natural resources (25)
- Conservation (24)
- Coyote (24)
- Management (24)
- Data (23)
- Geology (23)
- 2007 (21)
- Natural resource management (21)
- Physics (21)
- College for Professional Studies (20)
- History (20)
- California (19)
- Chemistry (19)
- Computer science (19)
- Landslides (19)
- Research and Technical Reports (19)
- School of Computer & Information Science (19)
- United States (19)
- Environment (18)
- Machine learning (18)
- Publication
-
- Faculty of Informatics - Papers (Archive) (209)
- Theses and Dissertations (198)
- Computer Science & Engineering Syllabi (160)
- Research Collection School Of Computing and Information Systems (158)
- Faculty Publications (142)
-
- Faculty of Science - Papers (Archive) (120)
- United States Department of Agriculture Wildlife Services: Staff Publications (114)
- Electronic Theses and Dissertations (104)
- Journal of Electrochemistry (86)
- Turkish Journal of Chemistry (83)
- Nebraska Tractor Tests (75)
- Journal of Modern Applied Statistical Methods (64)
- Masters Theses (61)
- Kno.e.sis Publications (57)
- Managing Vertebrate Invasive Species (56)
- Physics Faculty Publications (56)
- Sci-Tech News (55)
- Human–Wildlife Interactions (54)
- LSU Master's Theses (52)
- Publications (52)
- United States Geological Survey: Staff Publications (50)
- Doctoral Dissertations (49)
- Turkish Journal of Mathematics (48)
- All Computer Science and Engineering Research (47)
- LSU Doctoral Dissertations (47)
- Physics Faculty Research & Creative Works (47)
- Browse all Theses and Dissertations (43)
- Dissertations (43)
- Thai Environment (43)
- Open Educational Resources (42)
- Publication Type
Articles 5821 - 5850 of 6763
Full-Text Articles in Physical Sciences and Mathematics
Ferromagnetic To Ferrimagnetic Crossover In Cr-Doped Gan Nanohole Arrays, Q. Wang, Q. Sun, Puru Jena, Y. Kawazoe
Ferromagnetic To Ferrimagnetic Crossover In Cr-Doped Gan Nanohole Arrays, Q. Wang, Q. Sun, Puru Jena, Y. Kawazoe
Physics Publications
Using spin-polarized density-functional theory with exchange and correlation potential, approximated by both the generalized gradient approximation (GGA) and the GGA+U methods, we show that the coupling between a pair of Cr atoms substituted in GaN nanoholes is ferromagnetic. The interaction between the two Cr atoms, each carrying an average magnetic moment of around 2.5μB, is short ranged and mediated by the neighboring N atom. As the concentration of Cr increases, clustering ensues and the coupling changes from ferromagnetic to ferrimagnetic resulting in a significant reduction in the average magnetic moment per Cr atom.
2007 Annual Report Of The Water Quality Monitoring Project For The Water Quality Protection Program Of The Florida Keys National Marine Sanctuary, Joseph N. Boyer, Henry O. Briceño
2007 Annual Report Of The Water Quality Monitoring Project For The Water Quality Protection Program Of The Florida Keys National Marine Sanctuary, Joseph N. Boyer, Henry O. Briceño
SERC Research Reports
No abstract provided.
University Of Rhode Island Neasc Self-Study 2007. Standard Seven: Library And Other Information Resources
Collection Development Reports and Documents
Self-Study report by the University of Rhode Island, prepared in fall 2006 for the 2006/07 accreditation visit of the New England Association of Schools and Colleges (NEASC). Included here is Standard Seven: Library and Other Information Resources.
This standard was prepared by Standard Seven Committee Chair Karen M. Ramsay, Associate Professor and Chair of the Department of Technical Services in the University Libraries. Also on the Standard Seven Committee were: Lisa DiPippo, Associate Professor, Department of Computer Science & Statistics; Karol Leuzarder, Senior Tech Programmer, TOPS; Mary MacDonald, Associate Professor, University Libraries; David Eifler, Graduate Student; Jim Loy, Professor, Anthropology; …
Antibacterial Targets In Fatty Acid Biosynthesis, H. Tonie Wright, Kevin A. Reynolds
Antibacterial Targets In Fatty Acid Biosynthesis, H. Tonie Wright, Kevin A. Reynolds
Chemistry Faculty Publications and Presentations
The fatty acid biosynthesis pathway is an attractive but still largely unexploited target for development of new anti-bacterial agents. The extended use of the anti-tuberculosis drug isoniazid and the antiseptic triclosan, which are inhibitors of fatty acid biosynthesis, validates this pathway as a target for anti-bacterial development. Differences in subcellular organization of the bacterial and eukaryotic multi-enzyme fatty acid synthase systems offer the prospect of inhibitors with host vs. target specificity. Platensimycin, platencin, and phomallenic acids, newly discovered natural product inhibitors of the condensation steps in fatty acid biosynthesis, represent new classes of compounds with antibiotic potential. An almost complete …
The Potential For Ch4-Enriched Biogas As A Transport Fuel In Ireland, Niamh Power
The Potential For Ch4-Enriched Biogas As A Transport Fuel In Ireland, Niamh Power
Theses
Ireland needs a biofuel industry- to aid compliance with the Kyoto Protocol, the Biofuels Directive and to secure its energ>' supply. The overall aim of this work is to assess the potential of CH4-enriched biogas as a transport fuel in Ireland. Biogas is produced during the anaerobic digestion of biomass. This work investigates biogas production from two different feedstocks; biodegradable municipal waste and agricultural crops. To assess the potential for biogas as a transport fuel the alternatives to biogas are investigated and compared. Thus digestion and composting of biodegradable municipal waste, and biogas and ethanol production from agricultural crops …
A Comparison Of Channel Morphology, Marsh Elevation, And Biological Processes In Natural And Dredged Tidal Salt Marshes In Louisiana, Jennifer S. Spicer
A Comparison Of Channel Morphology, Marsh Elevation, And Biological Processes In Natural And Dredged Tidal Salt Marshes In Louisiana, Jennifer S. Spicer
LSU Doctoral Dissertations
Channel networks in tidal marshes serve as conduits for the exchange of water between the estuary and the marsh surface and form the spatial structure that regulates the flow of organisms, materials, and energy throughout the marsh system. Canal dredging creates channels with distinct linear shapes, and the artificial levee created from the dredged material creates ‘spoil banks’ along either side of the channel edge. Differences in morphology and adjacent marsh surface elevation between natural and dredged channel systems have not been well quantified, but may have important implications for the functioning of tidal channels as habitat for marsh-dependent species. …
Reasonable Emissions Of Greenhouse Gases: Efficient Abatement For A Stock Pollutant, Howard F. Chang
Reasonable Emissions Of Greenhouse Gases: Efficient Abatement For A Stock Pollutant, Howard F. Chang
All Faculty Scholarship
No abstract provided.
Electron Trapping In A One-Dimensional Semiconductor Quantum Wire With Multiple Impurities, S. Tanaka, S. Garmon, Gonzalo Ordonez, T. Petrosky
Electron Trapping In A One-Dimensional Semiconductor Quantum Wire With Multiple Impurities, S. Tanaka, S. Garmon, Gonzalo Ordonez, T. Petrosky
Scholarship and Professional Work - LAS
We demonstrate the trapping of a conduction electron between two identical adatom impurities in a one-dimensional semiconductor quantum-dot array system (quantum wire). Bound steady states arise even when the energy of the adatom impurity is located in the continuous one-dimensional energy miniband. The steady state is a realization of the bound state in continuum (BIC) phenomenon first proposed by von Neuman and Wigner [Phys. Z. 30, 465 (1929)]. We analytically solve the dispersion equation for this localized state, which enables us to reveal the mechanism of the BIC. The appearance of the BIC state is attributed to the quantum …
Transformation Of Formally Defined Post-Conditions Into Target Language Statements, Swetha Padma Parvathaneni
Transformation Of Formally Defined Post-Conditions Into Target Language Statements, Swetha Padma Parvathaneni
Browse all Theses and Dissertations
For years software engineering researchers have been trying to come up with a software synthesis system that can transform a formal specification model into a design model from which executable code can be generated. AFIT Wide Spectrum Object Modeling Environment (AWSOME) is one such formal based software synthesis system. In this system formal specifications written in AWL are parsed into an AST (Abstract Syntax Tree). The intent of this thesis is to demonstrate the transformation of the postconditions of a method into target language statements. The methods in the classes are specified using pre-conditions and post-conditions. Transforms are developed to …
High Performance Text Document Clustering, Yanjun Li
High Performance Text Document Clustering, Yanjun Li
Browse all Theses and Dissertations
Data mining, also known as knowledge discovery in database (KDD), is the process to discover interesting unknown knowledge from a large amount of data. Text mining is to apply data mining techniques to extract interesting and nontrivial information and knowledge from unstructured text. Text clustering is one of important techniques of text mining, which is the unsupervised classification of similar documents into different groups.
This research focuses on improving the performance of text clustering. We investigated the text clustering algorithms in four aspects: document representation, documents closeness measurement, high dimension reduction and parallelization. We propose a group of high performance …
Fabrication And Study Of Zno Micro- And Nanostructures, Monica Morales-Masis
Fabrication And Study Of Zno Micro- And Nanostructures, Monica Morales-Masis
Browse all Theses and Dissertations
ZnO micro-structures and nano-structures have been grown on two types of substrate by reacting condensed Zn vapor with oxygen. The source material was either pure zinc powder or zinc acetate which was either evaporated or decomposed. This was done in the temperature range 500 C to 650 C, in a flowing Ar plus oxygen ambient at atmospheric pressure. Variations in the carrier gas composition, gas flow rate and the position of the substrate in the furnace were found to control the formation and the morphology of the nanostructures. Scanning electron microscopy images of samples grown from a Zn powder source …
Laser Initiated Chain Reactions: The Kinetics Of The Chlorine/Cyclohexane/Oxygen Chain System, Robert Alan Forlines
Laser Initiated Chain Reactions: The Kinetics Of The Chlorine/Cyclohexane/Oxygen Chain System, Robert Alan Forlines
Browse all Theses and Dissertations
The combination of laser photolysis with infrared chemiluminescence detection has proven an effective technique for determining the propagation rate coefficients of halogen + RH chain reactions. This thesis will extend the technique to cyclic alkanes by determining the propagation rate coefficients of the Cl2/ cyclohexane chain system as well as the rate coefficient for the primary chain termination mechanism, R + O2 → RO2. The following reaction scheme is supported by the kinetic analysis: Cl2 → 2Cl Laser Photolysis Cl + RH → HCl(v) + R First Propagation Step (k1) R + …
Synthetic Approach To Epibatidine From 1-(Phenylsulfonyl)Pyrrole, Brandon G. Vanness
Synthetic Approach To Epibatidine From 1-(Phenylsulfonyl)Pyrrole, Brandon G. Vanness
Browse all Theses and Dissertations
The goal of this research was to synthesize the natural product epibatidine, a non-opiate analgesic and nicotinic acetylcholine agonist isolated from Epipedobates tricolor. A synthetic pathway utilizing a Diels-Alder cycloaddition of a 3-pyridyl substituted pyrrole and tosylacetylene was conceived based upon the original mass spectral fragmentation pathway of epibatidine determined by Daly. Although this pathway had been previously attempted using 1-(triisopropyl)-3-[5-(2-chloropyridyl)]pyrrole in the key Diels-Alder step, the lack of cycloadduct suggested that a pyrrole with a more electron withdrawing protecting group was required for this step. Therefore, synthesis of 1-(phenylsulfonyl)-3-[5-(2-chloropyridyl)]pyrrole via a palladium catalyzed cross-coupling reaction of 1-(phenylsulfonyl)-3-pyrroline and …
Evidence Of A Pre-Mount Simon, Half-Graben In Greene County, Ohio By Reprocessing A Wright State University Seismic Line, John Sink
Browse all Theses and Dissertations
The reprocessing of the WSU2002 seismic line indicates the presence of a Precambrian half-graben. Also observed through this reprocessing is the possible presence of Paleozoic structures. Although Paleozoic features have been interpreted, variations in glacial drift thickness evidenced by glacial drift maps also may have contributed to a lower quality of stacked section in comparison to other seismic lines. WSU2002 was originally processed by Lauren Geophysical. The Lauren processing resulted in an image that was of much lower quality than corresponding seismic lines. The Lauren Geophysical processed section revealed many horizontal Paleozoic reflections, with no prominent reflectors beneath the Paleozoic. …
Summaritive Digest For Large Document Repositories With Application To E-Rulemaking, Lijun Chen
Summaritive Digest For Large Document Repositories With Application To E-Rulemaking, Lijun Chen
Browse all Theses and Dissertations
Large document repositories need to be organized and summarized to make them more accessible and understandable. Such needs exist in many applications, including web search, e-rulemaking (electronic rulemaking) and document archiving. Even though much has been done in the areas of document clustering and summarization, there are still many new challenges and issues that need to be addressed as the repositories become larger, more prevalent and dynamic. In this dissertation, we investigate more informative ways to organize and summarize large document repositories, especially e-rulemaking feedback repositories (ERFRs), so that the large repositories can be managed and digested more efficiently and …
Tailoring Branching For Poly (Arylene Ether)S Via Reactivity Ratio Controlled Polymerizations, Amanda Ike
Tailoring Branching For Poly (Arylene Ether)S Via Reactivity Ratio Controlled Polymerizations, Amanda Ike
Browse all Theses and Dissertations
The ability to control physical and mechanical properties of polymer systems has become an important aspect of polymer science. In order to tailor the branching in polymer systems, an understanding into the reactivity of the electrophilic sites in the monomer is important. Kinetic methods have been explored in order to determine the reactivity of monomers in preparing poly(arylene ether)s and to predict the degree of branching that will occur in a polymer of this kind. The reactivity of AB2 sulfones and phosphine oxides was explored, along with the reactivity of ABB'B'' sulfones. NMR spectroscopy was used as a probe into …
Porosity And Permeability Of Bimodal Sediment Mixtures Using Natural Sediment, Peter M. Phillips
Porosity And Permeability Of Bimodal Sediment Mixtures Using Natural Sediment, Peter M. Phillips
Browse all Theses and Dissertations
Porosity and permeability are parameters that affect the flow of ground water in the subsurface and have significant implications on the modeling of fate and transport of contaminants. However, little has been done to quantitatively examine the effect on porosity and permeability of packing in bimodal mixtures of natural sediment. This study compares measurements of porosity and permeability on model bimodal sediment mixtures with predictions from petrophysical models. The main goal is to evaluate how well these petrophysical models predict porosity and permeability in bimodal mixtures of natural sediment. The effect of the volume fraction of fines on porosity and …
Using Technology To Design Teaching Modules In Mathematics And Science, Ollie I. Manley
Using Technology To Design Teaching Modules In Mathematics And Science, Ollie I. Manley
Proceedings of the Annual Meeting of the Georgia Association of Mathematics Teacher Educators
Technology is changing the way in which mathematics and science are taught, and this radical transformation in teaching is causing teachers to take a closer look at how lessons are designed. In an effort to demonstrate how to design instructional modules using technology, this paper will include the following: 1)A review of the National Educational Technology Standards for teachers to establish a framework for the development of the teaching modules; 2)instructional designs and techniques with special emphasis on multiple intelligence and critical thinking skills; 3) strategies and techniques for infusing technology into a standard based curriculum; and 4) an analysis …
A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton
A Grounded Theory Approach To Identifying And Measuring Forensic Data Acquisition Tasks, Gregory H. Carlton
Journal of Digital Forensics, Security and Law
As a relatively new field of study, little empirical research has been conducted pertaining to computer forensics. This lack of empirical research contributes to problems for practitioners and academics alike.
For the community of practitioners, problems arise from the dilemma of applying scientific methods to legal matters based on anecdotal training methods, and the academic community is hampered by a lack of theory in this evolving field. A research study utilizing a multi-method approach to identify and measure tasks practitioners perform during forensic data acquisitions and lay a foundation for academic theory development was conducted in 2006 in conjunction with …
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay
Identifying Non-Volatile Data Storage Areas: Unique Notebook Identification Information As Digital Evidence, Nikica Budimir, Jill Slay
Journal of Digital Forensics, Security and Law
The research reported in this paper introduces new techniques to aid in the identification of recovered notebook computers so they may be returned to the rightful owner. We identify non-volatile data storage areas as a means of facilitating the safe storing of computer identification information. A forensic proof of concept tool has been designed to test the feasibility of several storage locations identified within this work to hold the data needed to uniquely identify a computer. The tool was used to perform the creation and extraction of created information in order to allow the analysis of the non-volatile storage locations …
Book Review: No Place To Hide, Gary C. Kessler
Book Review: No Place To Hide, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This issue presents the second Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Information Governance: A Model For Security In Medical Practice, Patricia A. Williams
Journal of Digital Forensics, Security and Law
Information governance is becoming an important aspect of organisational accountability. In consideration that information is an integral asset of most organisations, the protection of this asset will increasingly rely on organisational capabilities in security. In the medical arena this information is primarily sensitive patient-based information. Previous research has shown that application of security measures is a low priority for primary care medical practice and that awareness of the risks are seriously underestimated. Consequently, information security governance will be a key issue for medical practice in the future. Information security governance is a relatively new term and there is little existing …
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Monitoring And Surveillance In The Workplace: Lessons Learnt? – Investigating The International Legal Position, Verine Etsebeth
Journal of Digital Forensics, Security and Law
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or presence of monitoring and surveillance activities in a company holds serious legal consequences for companies. From the discussion in this paper it will become apparent that there is a vast difference in how most countries approach this …
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Information Technology Act 2000 In India - Authentication Of E-Documents, R. G. Pawar, B. S. Sawant, A. Kaiwade
Journal of Digital Forensics, Security and Law
The Information Technology Act 2000 has enacted in India on 9th June 2000. This Act has mentioned provision of authentication of electronic document. It is the need of hour at that time that such provision is needed in the Indian Law system, especially for electronic commerce and electronic governance. Electronic commerce”, which involve the use of alternatives to paper based methods of communication and storage information. To do electronic commerce there should be authentication of particular document. The working of internet is the documents are traveling in terms of bits from one destination to other destination, through various media like …
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Book Review: Conquest In Cyberspace: National Security And Information Warfare, Gary C. Kessler
Journal of Digital Forensics, Security and Law
This is the Book Review column for the JDFSL. It is an experiment to broaden the services that the journal provides to readers, so we are anxious to get your reaction. Is the column useful and interesting? Should we include more than one review per issue? Should we also review products? Do you have suggested books/products for review and/or do you want to write a review? All of this type of feedback -- and more -- is appreciated. Please feel free to send comments to Gary Kessler (gary.kessler@champlain.edu) or Glenn Dardick (gdardick@dardick.net).
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Investigating Information Structure Of Phishing Emails Based On Persuasive Communication Perspective, Ki J. Lee, Il-Yeol Song
Journal of Digital Forensics, Security and Law
Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a …
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Providing A Foundation For Analysis Of Volatile Data Stores, Timothy Vidas
Journal of Digital Forensics, Security and Law
Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate.
Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.