Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1493)
- Environmental Sciences (1342)
- Physics (942)
- Chemistry (921)
- Engineering (912)
-
- Life Sciences (739)
- Earth Sciences (649)
- Mathematics (646)
- Social and Behavioral Sciences (622)
- Statistics and Probability (418)
- Oceanography and Atmospheric Sciences and Meteorology (323)
- Computer Engineering (312)
- Education (279)
- Natural Resources and Conservation (274)
- Astrophysics and Astronomy (268)
- Environmental Health and Protection (237)
- Natural Resources Management and Policy (214)
- Electrical and Computer Engineering (212)
- Geology (201)
- Applied Mathematics (188)
- Databases and Information Systems (184)
- Arts and Humanities (172)
- Physical Chemistry (171)
- Science and Mathematics Education (162)
- Mechanical Engineering (159)
- Sustainability (155)
- Water Resource Management (141)
- Business (137)
- Medicine and Health Sciences (136)
- Institution
-
- University of Nebraska - Lincoln (793)
- Selected Works (565)
- University of Wollongong (328)
- Wright State University (278)
- TÜBİTAK (216)
-
- University of Nevada, Las Vegas (195)
- Clemson University (182)
- Singapore Management University (161)
- Missouri University of Science and Technology (147)
- Louisiana State University (133)
- SelectedWorks (133)
- University of Massachusetts Amherst (127)
- Brigham Young University (118)
- Old Dominion University (106)
- Utah State University (106)
- Portland State University (105)
- Air Force Institute of Technology (95)
- William & Mary (92)
- Chinese Chemical Society | Xiamen University (90)
- COBRA (85)
- California Polytechnic State University, San Luis Obispo (85)
- Dartmouth College (84)
- University of Kentucky (84)
- Edith Cowan University (83)
- Syracuse University (78)
- University of Texas at Arlington (73)
- Wayne State University (73)
- University of Tennessee, Knoxville (70)
- Embry-Riddle Aeronautical University (69)
- University of South Florida (69)
- Keyword
-
- Otto Vogl (64)
- History of Polymer Science (49)
- Photographs of polymer scientists (46)
- Scientific memoirs (46)
- Climate change (39)
-
- Water (34)
- 2008 (29)
- Mathematics (29)
- Sustainability (29)
- Natural resources (28)
- 05. Who Was Who in Polymer Science (27)
- Forecasting (27)
- Security (27)
- Condensed matter (26)
- CMMB (24)
- Privacy (23)
- West (23)
- 06. Who is Who in Polymer Science (22)
- Ethics (21)
- GeoQUEST (21)
- Publications (21)
- Resources (21)
- Western water law (21)
- American West (20)
- Education (20)
- For (20)
- Landscapes (20)
- Research and Technical Reports (20)
- College for Professional Studies (19)
- Computer security (19)
- Publication
-
- Theses and Dissertations (187)
- Faculty of Informatics - Papers (Archive) (180)
- Computer Science & Engineering Syllabi (162)
- Research Collection School Of Computing and Information Systems (158)
- Faculty Publications (127)
-
- Faculty of Science - Papers (Archive) (122)
- S.C. Water Resources Conference (101)
- Nebraska Tractor Tests (96)
- Journal of Electrochemistry (90)
- Electronic Theses and Dissertations (76)
- Turkish Journal of Chemistry (74)
- Physics Faculty Publications (71)
- Otto Vogl (64)
- Professor Jennifer Seberry (62)
- Dartmouth Scholarship (61)
- J. Scott Armstrong (58)
- Thai Environment (58)
- Masters Theses (57)
- Physics - All Scholarship (57)
- Doctoral Dissertations (55)
- Journal of Modern Applied Statistical Methods (55)
- Dissertations (54)
- LSU Doctoral Dissertations (50)
- Bird Strike Committee-USA/Canada Joint Annual Meeting: 10th (2008) (49)
- School of Natural Resources: Faculty Publications (49)
- Kenneth Bloom Publications (48)
- Kno.e.sis Publications (47)
- The Mathematics Enthusiast (47)
- United States Geological Survey: Staff Publications (46)
- Dissertations, Theses, and Masters Projects (45)
- Publication Type
Articles 7081 - 7110 of 7321
Full-Text Articles in Physical Sciences and Mathematics
As Particles Collide: Extra Dimensions And Heavy Leptons, Erin Kathleen De Pree
As Particles Collide: Extra Dimensions And Heavy Leptons, Erin Kathleen De Pree
Dissertations, Theses, and Masters Projects
Despite excellent agreement with experiment, the Standard Model leaves several issues unresolved. These issues will be explored and several extensions to the Standard Model introduced: models with extra dimensions and a fourth family of particles.;In extra dimensional models, there are Fourier modes of the Standard Model particles. We study the detection of bound states of one of the modes and its Standard Model particle.;We then explore a particular model of extra dimensions known as Randall-Sundrum or warped extra dimensions. We will see how this model affects top quark measurements at the proposed International Linear Collider.;Finally we will study the detection …
Measurement Of Inclusive Proton Double -Spin Asymmetries And Polarized Structure Functions, Robert G. Fersch
Measurement Of Inclusive Proton Double -Spin Asymmetries And Polarized Structure Functions, Robert G. Fersch
Dissertations, Theses, and Masters Projects
The scattering of polarized electrons from a polarized proton target provides a means for studying the internal spin structure of the proton. The CLAS (CEBAF Large Acceptance Spectrometer) EG1b experiment in Hall-B at Jefferson Laboratory measured double-spin inclusive and exclusive electron-nucleon scattering asymmetries using longitudinally polarized frozen NH3 and ND3 targets and a longitudinally polarized electron beam at 4 different energies (1.6, 2.5, 4.2, 5.6 GeV). Extraction of the virtual photon asymmetry Ap1 (for 0.05 GeV2 < Q2 < 5.0 GeV2) provides precision measurements of the polarized proton spin-structure function gp1 in and above the resonance region. Linear regression of data between the varying energies yields new constraints on the virtual photon asymmetry Ap2 (and thus the structure function gp2 ) in the resonance region (for 0.3 GeV2 < Q2 < 1.0 GeV2). Measurements of these structure functions and their moments allows testing of perturbative Quantum Chromodynamics (pQCD) models and evaluation of moments of the structure functions in the Operator Product Expansion. Testing of Chiral Perturbation Theory (chiPT) at Q2 < 0.2 GeV 2 is enabled by the new data. Other applications of polarized structure functions include measurement of foward-spin polarizability, evaluation of high-order corrections in 1H hyperfine splitting, and testing of quark-hadron duality.
Status, Distribution And Reproductive Rates Of American Oystercatchers In Virginia, Alexandra Lee Wilke
Status, Distribution And Reproductive Rates Of American Oystercatchers In Virginia, Alexandra Lee Wilke
Dissertations, Theses, and Masters Projects
No abstract provided.
Broad Spatial Trends In Osprey Provisioning, Reproductive Success, And Population Growth Within Lower Chesapeake Bay, Kenneth Andrew Glass
Broad Spatial Trends In Osprey Provisioning, Reproductive Success, And Population Growth Within Lower Chesapeake Bay, Kenneth Andrew Glass
Dissertations, Theses, and Masters Projects
No abstract provided.
Mercury Levels In Newly Independent Songbirds, Anne Moire Condon
Mercury Levels In Newly Independent Songbirds, Anne Moire Condon
Dissertations, Theses, and Masters Projects
No abstract provided.
Automatically Generating Random Test Data For Relevant And Implicitly Defined Subdomains, John Alexander Murphy
Automatically Generating Random Test Data For Relevant And Implicitly Defined Subdomains, John Alexander Murphy
Dissertations, Theses, and Masters Projects
No abstract provided.
Organotitanium-Aluminum Promoted Carbometalations Of Alkynols: Substituent Effects, Nikola A. Nikolic
Organotitanium-Aluminum Promoted Carbometalations Of Alkynols: Substituent Effects, Nikola A. Nikolic
Dissertations, Theses, and Masters Projects
No abstract provided.
Time-Resolved Magnetic Flux And Ac-Current Distributions In Superconducting Yttrium Barium Copper Oxide Thin Films And Multifilaments, Ran Yang
Dissertations, Theses, and Masters Projects
Time-resolved magneto-optical imaging (TRMOI) technique allows dynamic ac transport measurements on superconductors. The high time and spatial resolutions of the measurements also offer good quantitative data analysis of the MO images. YBa2Cu 3O7-delta (YBCO) was discovered as a high-temperature superconductor (HTSC) which has wide applications due to its high critical temperature of Tc = 91 K, and high critical current density Jc in the order of 106-7 Acm-2. Many of the applications require high ac current load and a high magnetic field. We study the interaction behavior of YBCO thin films in an ac transport current and a dc magnetic …
Improving Community Water Conservation Behavior In Chachoengsao, Thailand, Kuakul Sathapornvajana
Improving Community Water Conservation Behavior In Chachoengsao, Thailand, Kuakul Sathapornvajana
Theses: Doctorates and Masters
The issue of water supply throughout the world is of concern for many reasons. It is projected that by the year 2025 two-thirds of the world's population will encounter moderate to severe water shortages. As a result of unsustainable development over the past decade, Thailand has faced pollution problems as well as the depletion of many natural resources. These problems have impacted on the country's main rivers (Chaopraya River, Thachine River, and the Bangpakong River), that are crucial to a sustainable economy, society, and culture. There needs to be a concentrated effort at all levels (individual to community) to address …
Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead
Adapting Information Operations To A Changing World: Future Options For The United States Government, Edwin L. Armistead
Theses: Doctorates and Masters
In 1998, the Department of Defense in the United States released the first of a series of seminal policies on Information Operations (IO). Entitled Joint Publication 3-13, this instruction laid out for the first time, in an unclassified format, how the American military forces could utilise this particular element of power. As a relative newly defined activity, this publication proposed to revolutionise the manner in which warfare, diplomacy, business and a number of other areas are conducted. However, this radical transformation in the United States government with regard to IQ has not occurred over the last decade and a significant …
Water Centrality For Water And Society, Ute Goeft
Water Centrality For Water And Society, Ute Goeft
Theses: Doctorates and Masters
The current approach to water management in Western societies, including Australia, is based on allocating water between different users. Appropriate for commercial uses, this commodity view of water has proved difficult for the inclusion of environmental and social concerns. Issues, such as which aspects have precedence, how much water should be allocated to each and how to make trade-offs in cases of insufficient water, pose problems that are yet to be worked out. In addition, there is a lack of knowledge regarding the identification of environmental as well as social water needs. The latter has prompted the writing of this …
Middle Crustal Ductile Deformation Patterns In Southern Tibet: Insights From Vorticity Studies In Mabja Dome, Jackie Langille
Middle Crustal Ductile Deformation Patterns In Southern Tibet: Insights From Vorticity Studies In Mabja Dome, Jackie Langille
All Master's Theses
Mabja Dome, southern Tibet, exposes mid-crustal rocks proposed to have originated from a southward flowing mid-crustal channel. Kinematic, mean kinematic vorticity (Wm), and metamorphic petrography analyses on these mid-crustal rocks were performed to test this hypothesis. Kinematic indicators show a transition with structural depth from top-north and top-south shear to solely top-south shear. Along the northernmost transects, Wm in schists and orthogneisses range from 0.52–0.84 (63–36% pure shear). Wm for quartzites ranges from 0.9–0.99 (27–1% pure shear). Deformation temperatures increase from ~450 °C in the chloritoid-zone to ~700 °C in the sillimanite-zone and were recorded between ~35–16 Ma. These patterns …
Energy Budget Analysis Of Slow-Slip Tremor Events Along The Cascadia Subduction Zone Using Continuous Gps Array Data, James Steven Chapman
Energy Budget Analysis Of Slow-Slip Tremor Events Along The Cascadia Subduction Zone Using Continuous Gps Array Data, James Steven Chapman
All Master's Theses
Seismic hazards poised to cities by subduction zones are strongly controlled by fault slip along the deeper extent of the two plate interaction closest to population densities. In Cascadia, where Mw=9 size events are known to occur from a variety of sources, modeling of leveling data has suggested that the region of maximum slip lies well offshore and diminishes rapidly inland. However, over two dozen slow slip distributions have been imaged using Global Positioning System (GPS) along the lower reaches of the northern Cascadia locked zone between 30 and 40 km in depth. Averaged over many episodic tremor and slip …
Comparison Of Landslides And Their Related Outburst Flood Deposits, Owyhee River, Southeastern Oregon, Shannon Marian Othus
Comparison Of Landslides And Their Related Outburst Flood Deposits, Owyhee River, Southeastern Oregon, Shannon Marian Othus
All Master's Theses
Numerous landslides have entered the Owyhee River canyon north of Rome, Oregon. As the river flows through different lithologic units, the style of mass wasting changes from large slump events and small rock falls to large earthflows. The change in mechanism of mass wasting from upstream to downstream seems to depend on several factors: (1) the ratio of the basalt cap to the exposed underlying sediments, (2) the composition of underlying sediments, (3) the canyon geometry, and (4) the extent and frequency of mass wasting. All three mechanisms of mass wasting have the ability to block the river channel and …
Personalized Web Content With Fuzzy System, Bassam Almogahed
Personalized Web Content With Fuzzy System, Bassam Almogahed
Master's Projects
In this paper, we will develop a new computational intelligence methodology to automatically analyze and summarize web content during a user surfing sessions. The output of this process is meaningful keywords or phrases which will be used to bring the user other contents such as images that closely relate to the web pages that he or she is currently surfing.
Web Security Detection Tool, Abhishek Agashe
Web Security Detection Tool, Abhishek Agashe
Master's Projects
According to Government Computer News (GCN) web attacks have been marked as all- time high this year. GCN says that some of the leading security software like SOPHOS detected about 15,000 newly infected web pages daily in initial three months of 2008 [13]. This has lead to the need of efficient software to make web applications robust and sustainable to these attacks. While finding information on different types of attacks, I found that SQL injection and cross site scripting are the most famous among attackers. These attacks are used extensively since, they can be performed using different techniques and it …
Efficient Resource Management Mechanism For 802.16 Wireless Networks Based On Weighted Fair Queuing, Kiran Rangula
Efficient Resource Management Mechanism For 802.16 Wireless Networks Based On Weighted Fair Queuing, Kiran Rangula
Master's Projects
Wireless Networking continues on its path of being one of the most commonly used means of communication. The evolution of this technology has taken place through the design of various protocols. Some common wireless protocols are the WLAN, 802.16 or WiMAX, and the emerging 802.20, which specializes in high speed vehicular networks, taking the concept from 802.16 to higher levels of performance. As with any large network, congestion becomes an important issue. Congestion gains importance as more hosts join a wireless network. In most cases, congestion is caused by the lack of an efficient mechanism to deal with exponential increases …
Sql Injection Analysis, Detection And Prevention, Jagdish Halde
Sql Injection Analysis, Detection And Prevention, Jagdish Halde
Master's Projects
Web sites are dynamic, static, and most of the time a combination of both. Web sites need protection in their database to assure security. An SQL injection attacks interactive web applications that provide database services. These applications take user inputs and use them to create an SQL query at run time. In an SQL injection attack, an attacker might insert a malicious SQL query as input to perform an unauthorized database operation. Using SQL injection attacks, an attacker can retrieve or modify confidential and sensitive information from the database. It may jeopardize the confidentiality and security of Web sites which …
Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank
Adaptive Software Transactional Memory: Dynamic Contention Management, Joel Frank
Master's Projects
This thesis addresses the problem of contention management in Software Transactional Memory (STM), which is a scheme for managing shared memory in a concurrent programming environment. STM views shared memory in a way similar to that of a database; read and write operations are handled through transactions, with changes to the shared memory becoming permanent through commit operations. Research on this subject reveals that there are currently varying methods for collision detection, data validation, and contention management, each of which has different situations in which they become the preferred method. This thesis introduces a dynamic contention manager that monitors current …
Intelligent Query For Real Estate Search, Mandeep Jandir
Intelligent Query For Real Estate Search, Mandeep Jandir
Master's Projects
The purpose of this project is to improve search query accuracy in a real estate website by developing an intelligent query system which provides the best matching result for standard search criteria. This intelligent query website utilizes fuzzy logic and partial membership to filter query results based on user input data. Fuzzy logic helps obtain results that are otherwise not attainable from a non-fuzzy search. A non-fuzzy search entails search results that match exactly with the given criteria. This project also allows a user to do a free keyword search. This type of search uses synonyms of the keywords to …
The Prosody Of Uncertainty For Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones
The Prosody Of Uncertainty For Spoken Dialogue Intelligent Tutoring Systems, Bevan Jones
Master's Projects
The speech medium is more than an audio conveyance of word strings. It contains meta information about the content of the speech. The prosody of speech, pauses and intonation, adds an extra dimension of diagnostic information about the quality of a speaker's answers, suggesting an important avenue of research for spoken dialogue tutoring systems. Tutoring systems that are sensitive to such cues may employ different tutoring strategies based on detected student uncertainty, and they may be able to perform more precise assessment of the area of student difficulty. However, properly identifying the cues can be challenging, typically requiring thousands of …
Online Recommendation System, Ankit Khera
Online Recommendation System, Ankit Khera
Master's Projects
The vast amount of data available on the Internet has led to the development of recommendation systems. This project proposes the use of soft computing techniques to develop recommendation systems. It addresses the limitations of current algorithms used to implement recommendation systems, evaluation of experimental results, and conclusion. This report provides a detailed summary of the project “Online Recommendation System” as part of fulfillment of the Master's Writing Project, Computer Science Department, San Jose State University’s. The report includes a description of the topic, system architecture, and provides a detailed description of the work done till point. Included in the …
Practical Detection Of Metamorphic Computer Viruses, Sharmidha Govindaraj
Practical Detection Of Metamorphic Computer Viruses, Sharmidha Govindaraj
Master's Projects
Metamorphic virus employs code obfuscation techniques to mutate itself. It absconds from signature-based detection system by modifying internal structure without compromising original functionality. However, it has been proved that machine learning technique like Hidden Markov model (HMM) can detect such viruses with high probability. HMM is a state machine where each state observes the input data with appropriate observation probability. HMM learns statistical properties of “virus features” rather than “signatures” and relies on such statistics to detect same family virus. Each HMM is trained with variants of same family viruses that are generated by same metamorphic engine so that HMM …
Trust-Networks In Recommender Systems, Kristen Mori
Trust-Networks In Recommender Systems, Kristen Mori
Master's Projects
Similarity-based recommender systems suffer from significant limitations, such as data sparseness and scalability. The goal of this research is to improve recommender systems by incorporating the social concepts of trust and reputation. By introducing a trust model we can improve the quality and accuracy of the recommended items. Three trust-based recommendation strategies are presented and evaluated against the popular MovieLens [8] dataset.
Peer-To-Peer Botnets: Analysis And Detection, Jeet Morparia
Peer-To-Peer Botnets: Analysis And Detection, Jeet Morparia
Master's Projects
Attacks such as spamming, distributed denial of service and phishing have become commonplace on the Internet. In the past, attackers would use high bandwidth Internet connection servers to accomplish their tasks. Since desktop users today have high-speed Internet connections, attackers infect users’ desktops and harness their computing power to perform malicious activities over the Internet. As attackers develop new methods to attack from distributed locations as well as avoid being detected, there is a need to develop efficient methods to detect and mitigate this epidemic of infection of hosts on the network. In this project, we aim to analyze the …
Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker
Botnets And Distributed Denial Of Service Attacks, Anilkumar Panicker
Master's Projects
With their ever increasing malicious capabilities and potential to infect a vast majority of computers on the Internet, botnets are emerging as the single biggest threat to Internet security. The aim of this project is to perform a detailed analysis of botnets and the vulnerabilities exploited by them to spread themselves and perform various malicious activities such as DDoS attacks. DDoS attacks are without doubt the most potent form of attacks carried out by botnets. In order to better understand this growing phenomenon and develop effective counter measures, it is necessary to be able to simulate DDoS attacks in a …
Accelerometer Based Motion Gestures For Mobile Devices, Neel Parikh
Accelerometer Based Motion Gestures For Mobile Devices, Neel Parikh
Master's Projects
Many smart phones today use tiny sensors called accelerometers to provide enhanced user interface controls. Accelerometers measure the linear acceleration in the x, y, z directions based on the movement of the phone. These sensors basically reduce the need of dedicated navigation and function keys on the mobile device. Accelerometer based mobile devices use this principle for creating applications like games, controlling the orientation of the display screen, etc. The goal of this project is to extend the WebKit browser interface of Google’s mobile development platform called ‘Android’ by creating accelerometer based motion features like shake feature, orientation of images, …
Code Obfuscation And Virus Detection, Ashwini Venkatesan
Code Obfuscation And Virus Detection, Ashwini Venkatesan
Master's Projects
Typically, computer viruses and other malware are detected by searching for a string of bits which is found in the virus or malware. Such a string can be viewed as a “fingerprint” of the virus. These “fingerprints” are not generally unique; however they can be used to make rapid malware scanning feasible. This fingerprint is often called a signature and the technique of detecting viruses using signatures is known as signaturebased detection [8]. Today, virus writers often camouflage their viruses by using code obfuscation techniques in an effort to defeat signature-based detection schemes. So-called metamorphic viruses are viruses in which …
Fuzzy Content Mining For Targeted Advertisement, Yezhou Wang
Fuzzy Content Mining For Targeted Advertisement, Yezhou Wang
Master's Projects
Content-targeted advertising system is becoming an increasingly important part of the funding source of free web services. Highly efficient content analysis is the pivotal key of such a system. This project aims to establish a content analysis engine involving fuzzy logic that is able to automatically analyze real user-posted Web documents such as blog entries. Based on the analysis result, the system matches and retrieves the most appropriate Web advertisements. The focus and complexity is on how to better estimate and acquire the keywords that represent a given Web document. Fuzzy Web mining concept will be applied to synthetically consider …
Fuzzy Range Query In Xml, Dexiong Zhang
Fuzzy Range Query In Xml, Dexiong Zhang
Master's Projects
This writing project presents a new approach to implement a fuzzy range query solution for retrieving Extensible Markup Language (XML) data. Ever since XML was introduced, it has become a web standard to describe data on the Internet. The need for performing range query against XML data is growing day by day. Many search service providers are eager to improve their solutions on range query against XML data. The project studies and analyzes the limitations on the current range query solutions. The project also proposes a new solution using fuzzy semantic analysis to quantify XML data so that it can …