Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2008

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 7081 - 7110 of 7321

Full-Text Articles in Physical Sciences and Mathematics

As Particles Collide: Extra Dimensions And Heavy Leptons, Erin Kathleen De Pree Jan 2008

As Particles Collide: Extra Dimensions And Heavy Leptons, Erin Kathleen De Pree

Dissertations, Theses, and Masters Projects

Despite excellent agreement with experiment, the Standard Model leaves several issues unresolved. These issues will be explored and several extensions to the Standard Model introduced: models with extra dimensions and a fourth family of particles.;In extra dimensional models, there are Fourier modes of the Standard Model particles. We study the detection of bound states of one of the modes and its Standard Model particle.;We then explore a particular model of extra dimensions known as Randall-Sundrum or warped extra dimensions. We will see how this model affects top quark measurements at the proposed International Linear Collider.;Finally we will study the detection …


Measurement Of Inclusive Proton Double -Spin Asymmetries And Polarized Structure Functions, Robert G. Fersch Jan 2008

Measurement Of Inclusive Proton Double -Spin Asymmetries And Polarized Structure Functions, Robert G. Fersch

Dissertations, Theses, and Masters Projects

The scattering of polarized electrons from a polarized proton target provides a means for studying the internal spin structure of the proton. The CLAS (CEBAF Large Acceptance Spectrometer) EG1b experiment in Hall-B at Jefferson Laboratory measured double-spin inclusive and exclusive electron-nucleon scattering asymmetries using longitudinally polarized frozen NH3 and ND3 targets and a longitudinally polarized electron beam at 4 different energies (1.6, 2.5, 4.2, 5.6 GeV). Extraction of the virtual photon asymmetry Ap1 (for 0.05 GeV2 < Q2 < 5.0 GeV2) provides precision measurements of the polarized proton spin-structure function gp1 in and above the resonance region. Linear regression of data between the varying energies yields new constraints on the virtual photon asymmetry Ap2 (and thus the structure function gp2 ) in the resonance region (for 0.3 GeV2 < Q2 < 1.0 GeV2). Measurements of these structure functions and their moments allows testing of perturbative Quantum Chromodynamics (pQCD) models and evaluation of moments of the structure functions in the Operator Product Expansion. Testing of Chiral Perturbation Theory (chiPT) at Q2 < 0.2 GeV 2 is enabled by the new data. Other applications of polarized structure functions include measurement of foward-spin polarizability, evaluation of high-order corrections in 1H hyperfine splitting, and testing of quark-hadron duality.


Status, Distribution And Reproductive Rates Of American Oystercatchers In Virginia, Alexandra Lee Wilke Jan 2008

Status, Distribution And Reproductive Rates Of American Oystercatchers In Virginia, Alexandra Lee Wilke

Dissertations, Theses, and Masters Projects

No abstract provided.


Broad Spatial Trends In Osprey Provisioning, Reproductive Success, And Population Growth Within Lower Chesapeake Bay, Kenneth Andrew Glass Jan 2008

Broad Spatial Trends In Osprey Provisioning, Reproductive Success, And Population Growth Within Lower Chesapeake Bay, Kenneth Andrew Glass

Dissertations, Theses, and Masters Projects

No abstract provided.


Mercury Levels In Newly Independent Songbirds, Anne Moire Condon Jan 2008

Mercury Levels In Newly Independent Songbirds, Anne Moire Condon

Dissertations, Theses, and Masters Projects

No abstract provided.


Automatically Generating Random Test Data For Relevant And Implicitly Defined Subdomains, John Alexander Murphy Jan 2008

Automatically Generating Random Test Data For Relevant And Implicitly Defined Subdomains, John Alexander Murphy

Dissertations, Theses, and Masters Projects

No abstract provided.


Organotitanium-Aluminum Promoted Carbometalations Of Alkynols: Substituent Effects, Nikola A. Nikolic Jan 2008

Organotitanium-Aluminum Promoted Carbometalations Of Alkynols: Substituent Effects, Nikola A. Nikolic

Dissertations, Theses, and Masters Projects

No abstract provided.


Time-Resolved Magnetic Flux And Ac-Current Distributions In Superconducting Yttrium Barium Copper Oxide Thin Films And Multifilaments, Ran Yang Jan 2008

Time-Resolved Magnetic Flux And Ac-Current Distributions In Superconducting Yttrium Barium Copper Oxide Thin Films And Multifilaments, Ran Yang

Dissertations, Theses, and Masters Projects

Time-resolved magneto-optical imaging (TRMOI) technique allows dynamic ac transport measurements on superconductors. The high time and spatial resolutions of the measurements also offer good quantitative data analysis of the MO images. YBa2Cu 3O7-delta (YBCO) was discovered as a high-temperature superconductor (HTSC) which has wide applications due to its high critical temperature of Tc = 91 K, and high critical current density Jc in the order of 106-7 Acm-2. Many of the applications require high ac current load and a high magnetic field. We study the interaction behavior of YBCO thin films in an ac transport current and a dc magnetic …


Improving Community Water Conservation Behavior In Chachoengsao, Thailand, Kuakul Sathapornvajana Jan 2008

Improving Community Water Conservation Behavior In Chachoengsao, Thailand, Kuakul Sathapornvajana

Theses: Doctorates and Masters

The issue of water supply throughout the world is of concern for many reasons. It is projected that by the year 2025 two-thirds of the world's population will encounter moderate to severe water shortages. As a result of unsustainable development over the past decade, Thailand has faced pollution problems as well as the depletion of many natural resources. These problems have impacted on the country's main rivers (Chaopraya River, Thachine River, and the Bangpakong River), that are crucial to a sustainable economy, society, and culture. There needs to be a concentrated effort at all levels (individual to community) to address …


Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead Jan 2008

Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead

Theses: Doctorates and Masters

In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant …


Water Centrality For Water And Society, Ute Goeft Jan 2008

Water Centrality For Water And Society, Ute Goeft

Theses: Doctorates and Masters

The current approach to water management in Western societies, including Australia, is based on allocating water between different users. Appropriate for commercial uses, this commodity view of water has proved difficult for the inclusion of environmental and social concerns. Issues, such as which aspects have precedence, how much water should be allocated to each and how to make trade-offs in cases of insufficient water, pose problems that are yet to be worked out. In addition, there is a lack of knowledge regarding the identification of environmental as well as social water needs. The latter has prompted the writing of this …


Middle Crustal Ductile Deformation Patterns In Southern Tibet: Insights From Vorticity Studies In Mabja Dome, Jackie Langille Jan 2008

Middle Crustal Ductile Deformation Patterns In Southern Tibet: Insights From Vorticity Studies In Mabja Dome, Jackie Langille

All Master's Theses

Mabja Dome, southern Tibet, exposes mid-crustal rocks proposed to have originated from a southward flowing mid-crustal channel. Kinematic, mean kinematic vorticity (Wm), and metamorphic petrography analyses on these mid-crustal rocks were performed to test this hypothesis. Kinematic indicators show a transition with structural depth from top-north and top-south shear to solely top-south shear. Along the northernmost transects, Wm in schists and orthogneisses range from 0.52–0.84 (63–36% pure shear). Wm for quartzites ranges from 0.9–0.99 (27–1% pure shear). Deformation temperatures increase from ~450 °C in the chloritoid-zone to ~700 °C in the sillimanite-zone and were recorded between ~35–16 Ma. These patterns …


Energy Budget Analysis Of Slow-Slip Tremor Events Along The Cascadia Subduction Zone Using Continuous Gps Array Data, James Steven Chapman Jan 2008

Energy Budget Analysis Of Slow-Slip Tremor Events Along The Cascadia Subduction Zone Using Continuous Gps Array Data, James Steven Chapman

All Master's Theses

Seismic hazards poised to cities by subduction zones are strongly controlled by fault slip along the deeper extent of the two plate interaction closest to population densities. In Cascadia, where Mw=9 size events are known to occur from a variety of sources, modeling of leveling data has suggested that the region of maximum slip lies well offshore and diminishes rapidly inland. However, over two dozen slow slip distributions have been imaged using Global Positioning System (GPS) along the lower reaches of the northern Cascadia locked zone between 30 and 40 km in depth. Averaged over many episodic tremor and slip …


Comparison Of Landslides And Their Related Outburst Flood Deposits, Owyhee River, Southeastern Oregon, Shannon Marian Othus Jan 2008

Comparison Of Landslides And Their Related Outburst Flood Deposits, Owyhee River, Southeastern Oregon, Shannon Marian Othus

All Master's Theses

Numerous landslides have entered the Owyhee River canyon north of Rome, Oregon. As the river flows through different lithologic units, the style of mass wasting changes from large slump events and small rock falls to large earthflows. The change in mechanism of mass wasting from upstream to downstream seems to depend on several factors: (1) the ratio of the basalt cap to the exposed underlying sediments, (2) the composition of underlying sediments, (3) the canyon geometry, and (4) the extent and frequency of mass wasting. All three mechanisms of mass wasting have the ability to block the river channel and …


Personalized Web Content With Fuzzy System, Bassam Almogahed Jan 2008

Personalized Web Content With Fuzzy System, Bassam Almogahed

Master's Projects

In this paper, we will develop a new computational intelligence methodology to automatically analyze and summarize web content during a user surfing sessions. The output of this process is meaningful keywords or phrases which will be used to bring the user other contents such as images that closely relate to the web pages that he or she is currently surfing.


Web Security Detection Tool, Abhishek Agashe Jan 2008

Web Security Detection Tool, Abhishek Agashe

Master's Projects

According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]. This has lead to the need of efficient software to make web applications robust and sustainable to these attacks. While finding information on different types of attacks, I found that SQL injection and cross site scripting are the most famous among attackers. These attacks are used extensively since, they can be performed using different techniques and it …


Efficient Resource Management Mechanism For 802.16 Wireless Networks Based On Weighted Fair Queuing, Kiran Rangula Jan 2008

Efficient Resource Management Mechanism For 802.16 Wireless Networks Based On Weighted Fair Queuing, Kiran Rangula

Master's Projects

Wireless Networking continues on its path of being one of the most commonly used means of communication. The evolution of this technology has taken place through the design of various protocols. Some common wireless protocols are the WLAN, 802.16 or WiMAX, and the emerging 802.20, which specializes in high speed vehicular networks, taking the concept from 802.16 to higher levels of performance. As with any large network, congestion becomes an important issue. Congestion gains importance as more hosts join a wireless network. In most cases, congestion is caused by the lack of an efficient mechanism to deal with exponential increases …


Sql Injection Analysis, Detection And Prevention, Jagdish Halde Jan 2008

Sql Injection Analysis, Detection And Prevention, Jagdish Halde

Master's Projects

Web sites are dynamic, static, and most of the time a combination of both. Web sites need protection in their database to assure security. An SQL injection attacks interactive web applications that provide database services. These applications take user inputs and use them to create an SQL query at run time. In an SQL injection attack, an attacker might insert a malicious SQL query as input to perform an unauthorized database operation. Using SQL injection attacks, an attacker can retrieve or modify confidential and sensitive information from the database. It may jeopardize the confidentiality and security of Web sites which …


Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank Jan 2008

Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank

Master's Projects

This thesis addresses the problem of contention management in Software Transactional Memory (STM), which is a scheme for managing shared memory in a concurrent programming environment. STM views shared memory in a way similar to that of a database; read and write operations are handled through transactions, with changes to the shared memory becoming permanent through commit operations. Research on this subject reveals that there are currently varying methods for collision detection, data validation, and contention management, each of which has different situations in which they become the preferred method. This thesis introduces a dynamic contention manager that monitors current …


Intelligent Query For Real Estate Search, Mandeep Jandir Jan 2008

Intelligent Query For Real Estate Search, Mandeep Jandir

Master's Projects

The purpose of this project is to improve search query accuracy in a real estate website by developing an intelligent query system which provides the best matching result for standard search criteria. This intelligent query website utilizes fuzzy logic and partial membership to filter query results based on user input data. Fuzzy logic helps obtain results that are otherwise not attainable from a non-fuzzy search. A non-fuzzy search entails search results that match exactly with the given criteria. This project also allows a user to do a free keyword search. This type of search uses synonyms of the keywords to …


The Prosody Of Uncertainty For Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones Jan 2008

The Prosody Of Uncertainty For Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones

Master's Projects

The speech medium is more than an audio conveyance of word strings. It contains meta information about the content of the speech. The prosody of speech, pauses and intonation, adds an extra dimension of diagnostic information about the quality of a speaker's answers, suggesting an important avenue of research for spoken dialogue tutoring systems. Tutoring systems that are sensitive to such cues may employ different tutoring strategies based on detected student uncertainty, and they may be able to perform more precise assessment of the area of student difficulty. However, properly identifying the cues can be challenging, typically requiring thousands of …


Online Recommendation System, Ankit Khera Jan 2008

Online Recommendation System, Ankit Khera

Master's Projects

The vast amount of data available on the Internet has led to the development of recommendation systems. This project proposes the use of soft computing techniques to develop recommendation systems. It addresses the limitations of current algorithms used to implement recommendation systems, evaluation of experimental results, and conclusion. This report provides a detailed summary of the project “Online Recommendation System” as part of fulfillment of the Master's Writing Project, Computer Science Department, San Jose State University’s. The report includes a description of the topic, system architecture, and provides a detailed description of the work done till point. Included in the …


Practical Detection Of Metamorphic Computer Viruses, Sharmidha Govindaraj Jan 2008

Practical Detection Of Metamorphic Computer Viruses, Sharmidha Govindaraj

Master's Projects

Metamorphic virus employs code obfuscation techniques to mutate itself. It absconds from signature-based detection system by modifying internal structure without compromising original functionality. However, it has been proved that machine learning technique like Hidden Markov model (HMM) can detect such viruses with high probability. HMM is a state machine where each state observes the input data with appropriate observation probability. HMM learns statistical properties of “virus features” rather than “signatures” and relies on such statistics to detect same family virus. Each HMM is trained with variants of same family viruses that are generated by same metamorphic engine so that HMM …


Trust-Networks In Recommender Systems, Kristen Mori Jan 2008

Trust-Networks In Recommender Systems, Kristen Mori

Master's Projects

Similarity-based recommender systems suffer from significant limitations, such as data sparseness and scalability. The goal of this research is to improve recommender systems by incorporating the social concepts of trust and reputation. By introducing a trust model we can improve the quality and accuracy of the recommended items. Three trust-based recommendation strategies are presented and evaluated against the popular MovieLens [8] dataset.


Peer-To-Peer Botnets: Analysis And Detection, Jeet Morparia Jan 2008

Peer-To-Peer Botnets: Analysis And Detection, Jeet Morparia

Master's Projects

Attacks such as spamming, distributed denial of service and phishing have become commonplace on the Internet. In the past, attackers would use high bandwidth Internet connection servers to accomplish their tasks. Since desktop users today have high-speed Internet connections, attackers infect users’ desktops and harness their computing power to perform malicious activities over the Internet. As attackers develop new methods to attack from distributed locations as well as avoid being detected, there is a need to develop efficient methods to detect and mitigate this epidemic of infection of hosts on the network. In this project, we aim to analyze the …


Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker Jan 2008

Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker

Master's Projects

With their ever increasing malicious capabilities and potential to infect a vast majority of computers on the Internet, botnets are emerging as the single biggest threat to Internet security. The aim of this project is to perform a detailed analysis of botnets and the vulnerabilities exploited by them to spread themselves and perform various malicious activities such as DDoS attacks. DDoS attacks are without doubt the most potent form of attacks carried out by botnets. In order to better understand this growing phenomenon and develop effective counter measures, it is necessary to be able to simulate DDoS attacks in a …


Accelerometer Based Motion Gestures For Mobile Devices, Neel Parikh Jan 2008

Accelerometer Based Motion Gestures For Mobile Devices, Neel Parikh

Master's Projects

Many smart phones today use tiny sensors called accelerometers to provide enhanced user interface controls. Accelerometers measure the linear acceleration in the x, y, z directions based on the movement of the phone. These sensors basically reduce the need of dedicated navigation and function keys on the mobile device. Accelerometer based mobile devices use this principle for creating applications like games, controlling the orientation of the display screen, etc. The goal of this project is to extend the WebKit browser interface of Google’s mobile development platform called ‘Android’ by creating accelerometer based motion features like shake feature, orientation of images, …


Code Obfuscation And Virus Detection, Ashwini Venkatesan Jan 2008

Code Obfuscation And Virus Detection, Ashwini Venkatesan

Master's Projects

Typically, computer viruses and other malware are detected by searching for a string of bits which is found in the virus or malware. Such a string can be viewed as a “fingerprint” of the virus. These “fingerprints” are not generally unique; however they can be used to make rapid malware scanning feasible. This fingerprint is often called a signature and the technique of detecting viruses using signatures is known as signaturebased detection [8]. Today, virus writers often camouflage their viruses by using code obfuscation techniques in an effort to defeat signature-based detection schemes. So-called metamorphic viruses are viruses in which …


Fuzzy Content Mining For Targeted Advertisement, Yezhou Wang Jan 2008

Fuzzy Content Mining For Targeted Advertisement, Yezhou Wang

Master's Projects

Content-targeted advertising system is becoming an increasingly important part of the funding source of free web services. Highly efficient content analysis is the pivotal key of such a system. This project aims to establish a content analysis engine involving fuzzy logic that is able to automatically analyze real user-posted Web documents such as blog entries. Based on the analysis result, the system matches and retrieves the most appropriate Web advertisements. The focus and complexity is on how to better estimate and acquire the keywords that represent a given Web document. Fuzzy Web mining concept will be applied to synthetically consider …


Fuzzy Range Query In Xml, Dexiong Zhang Jan 2008

Fuzzy Range Query In Xml, Dexiong Zhang

Master's Projects

This writing project presents a new approach to implement a fuzzy range query solution for retrieving Extensible Markup Language (XML) data. Ever since XML was introduced, it has become a web standard to describe data on the Internet. The need for performing range query against XML data is growing day by day. Many search service providers are eager to improve their solutions on range query against XML data. The project studies and analyzes the limitations on the current range query solutions. The project also proposes a new solution using fuzzy semantic analysis to quantify XML data so that it can …