Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1513)
- Environmental Sciences (1353)
- Physics (1038)
- Chemistry (951)
- Life Sciences (894)
-
- Engineering (866)
- Mathematics (789)
- Social and Behavioral Sciences (704)
- Earth Sciences (686)
- Statistics and Probability (427)
- Oceanography and Atmospheric Sciences and Meteorology (425)
- Education (306)
- Astrophysics and Astronomy (298)
- Applied Mathematics (285)
- Natural Resources and Conservation (282)
- Computer Engineering (275)
- Natural Resources Management and Policy (244)
- Electrical and Computer Engineering (221)
- Business (214)
- Databases and Information Systems (207)
- Arts and Humanities (202)
- Science and Mathematics Education (197)
- Sustainability (191)
- Environmental Health and Protection (180)
- Geology (168)
- Physical Chemistry (160)
- Water Resource Management (156)
- Law (154)
- Medicine and Health Sciences (152)
- Institution
-
- University of Nebraska - Lincoln (765)
- Selected Works (403)
- University of Wollongong (349)
- TÜBİTAK (214)
- Utah State University (208)
-
- Wright State University (201)
- Singapore Management University (198)
- University of Nevada, Las Vegas (194)
- SelectedWorks (185)
- Missouri University of Science and Technology (161)
- Louisiana State University (158)
- Old Dominion University (139)
- Technological University Dublin (124)
- Brigham Young University (115)
- Portland State University (115)
- Clemson University (102)
- Wayne State University (95)
- William & Mary (95)
- University of South Florida (94)
- Chinese Chemical Society | Xiamen University (87)
- University of Kentucky (87)
- Western Kentucky University (86)
- University of Massachusetts Amherst (85)
- Air Force Institute of Technology (81)
- California Polytechnic State University, San Luis Obispo (80)
- Embry-Riddle Aeronautical University (75)
- Virginia Commonwealth University (72)
- Dartmouth College (67)
- Syracuse University (67)
- COBRA (66)
- Keyword
-
- Climate change (43)
- Sustainability (38)
- Mathematics (34)
- Education (31)
- Research and Technical Reports (30)
-
- CMMB (29)
- Chemistry (29)
- Western Australia (29)
- GeoQUEST (28)
- West (28)
- 2009 (26)
- Management (25)
- Nanoparticles (25)
- Human–wildlife conflicts (24)
- Australia (23)
- Water (23)
- Water policy (23)
- Water quality (23)
- Western water law (23)
- College for Professional Studies (22)
- School of Computer & Information Science (22)
- Simulation (22)
- Water law (22)
- GIS (21)
- Security (21)
- Data (20)
- Galaxies: evolution (20)
- Groundwater (20)
- Algorithms (19)
- Colorado (19)
- Publication
-
- Research Collection School Of Computing and Information Systems (194)
- Theses and Dissertations (194)
- Faculty of Informatics - Papers (Archive) (158)
- Faculty of Science - Papers (Archive) (156)
- Faculty Publications (143)
-
- Computer Science & Engineering Syllabi (100)
- United States Department of Agriculture Wildlife Services: Staff Publications (95)
- Electronic Theses and Dissertations (94)
- Journal of Electrochemistry (87)
- Turkish Journal of Chemistry (82)
- Physics Faculty Publications (79)
- Nebraska Tractor Tests (75)
- LSU Doctoral Dissertations (67)
- Physics Faculty Research & Creative Works (66)
- Journal of Modern Applied Statistical Methods (64)
- Open Access Theses & Dissertations (63)
- Sci-Tech News (62)
- Dissertations (59)
- School of Natural Resources: Faculty Publications (54)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (54)
- All Dissertations (52)
- LSU Master's Theses (52)
- Doctoral Dissertations (50)
- Publications (49)
- Dartmouth Scholarship (47)
- Articles (45)
- Chemistry Faculty Publications (45)
- Master's Projects (45)
- Chemistry Faculty Research and Publications (43)
- The Mathematics Enthusiast (43)
- Publication Type
Articles 241 - 270 of 7616
Full-Text Articles in Physical Sciences and Mathematics
Field Evaluation Of The Immunocontraceptive Gonacontm In Reducing Eastern Gray Squirrel Fecundity In Urban Areas, Murali Pai
All Dissertations
The purpose of this study was to evaluate the immunocontraceptive GonaConTM in reducing fecundity in Eastern gray squirrel (EGS) (Sciurus carolinensis) in urban areas. Using a modified box trap design, 317 EGS were captured during four trapping sessions on a 5.66 ha site on Clemson University's main campus. EGS were handled using a restraint cone and sexed, weighed, ear-tagged and implanted with a microchip at the nape of the neck on all 'original' captures and later identified in subsequent captures as 'recaptures.' Blood samples and morphometric data were obtained on EGS before the immunocontraceptive GonaConTM was administered by …
Synthesis, Modification Of Mesoporous Carbons And Their Application In Polymer Electrolyte Membrane Fuel Cells, Bing Liu
All Dissertations
Mesoporous carbon materials of carbon xerogel (CX) and silica-templated carbon (MC) were synthesized and explored as catalyst supports alternative to the most-commonly-used carbon black (CB) support, for polymer-electrolyte-membrane fuel cell (PEMFC) application. Pt catalyst was loaded on these carbons and electrodes were fabricated from them. These Pt-loaded carbon supports were characterized with XRD, TEM, ex-situ and in-situ cyclic voltammetry, etc. The fabricated electrodes were evaluated in single-cell testing in comparison with commercial CB-supported Pt catalyst fabricated electrodes. The experimental results showed that CX-supported Pt catalyst had close or better performance than that of CB-supported Pt, possibly due to CX's 3-D …
Examining The Dynamics Of Managing Information Systems Development Projects: A Control Loss Perspective, Ravi Narayanaswamy
Examining The Dynamics Of Managing Information Systems Development Projects: A Control Loss Perspective, Ravi Narayanaswamy
All Dissertations
The failure rate of information systems development (ISD) projects continues to pose a big challenge for organizations. The success rate of ISD projects is less then forty percent. Factors such as disagreements and miscommunications among project manager and team members, poor monitoring and intermediary problems contribute to project failure.
Agency theory and leader member exchange (LMX) theories offer potential explanations for project failure. In particular, three monitoring strategies - control strategy, decision rights, and influence tactics were found to be effective in promoting project success. LMX theorists suggest that achieving congruence between the manager and subordinate regarding each other actions …
Climate Change, Coral Reef Ecosystems, And Management Options For Marine Protected Areas, Brian D. Keller, Daniel F. Gleason, Elizabeth Mcleod, Christa M. Woodley, Satie Airame, Billy D. Causey, Alan M. Friedlander, Rikki Grober-Dunsmore, Johanna E. Johnson, Steven Miller, Robert S. Steneck
Climate Change, Coral Reef Ecosystems, And Management Options For Marine Protected Areas, Brian D. Keller, Daniel F. Gleason, Elizabeth Mcleod, Christa M. Woodley, Satie Airame, Billy D. Causey, Alan M. Friedlander, Rikki Grober-Dunsmore, Johanna E. Johnson, Steven Miller, Robert S. Steneck
Marine & Environmental Sciences Faculty Articles
Marine protected areas (MPAs) provide place-based management of marine ecosystems through various degrees and types of protective actions. Habitats such as coral reefs are especially susceptible to degradation resulting from climate change, as evidenced by mass bleaching events over the past two decades. Marine ecosystems are being altered by direct effects of climate change including ocean warming, ocean acidification, rising sea level, changing circulation patterns, increasing severity of storms, and changing freshwater influxes. As impacts of climate change strengthen they may exacerbate effects of existing stressors and require new or modified management approaches; MPA networks are generally accepted as an …
Security Requirements Engineering-The Reluctant Oxymoron, Michael N. Johnstone
Security Requirements Engineering-The Reluctant Oxymoron, Michael N. Johnstone
Australian Information Security Management Conference
Security is a focus in many systems that are developed today, yet this aspect of systems development is often relegated when the shipping date for a software product looms. This leads to problems post-implementation in terms of patches required to fix security defects or vulnerabilities. A simplistic answer is that if the code was correct in the first instance, then vulnerabilities would not exist. The reality of a complex software artefact is however, driven by other concerns. Rather than probing programs for coding errors that lead to vulnerabilities, it is perhaps more beneficial to look at the root causes of …
Security Issues Challenging Facebook, S Leitch, M Warren
Security Issues Challenging Facebook, S Leitch, M Warren
Australian Information Security Management Conference
The advancement in Internet and bandwidth capability has resulted in a number of new applications to be developed; many of these newer applications are described as being Web 2. A Web 2 application such as Facebook has allowed people around the world to interact together. One of the interesting aspects of Facebook is the use of third parties applications and the interactions that this allows.Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism also exist in online Web 2 environments. This paper explores and categorises several security issues within the Facebook environment. It contributes …
When You Can't See The Forest For The Domains: Why A Two Forest Model Should Be Used To Achieve Logical Segregation Between Scada And Corporate Networks, Andrew Woodward, Brett Turner
When You Can't See The Forest For The Domains: Why A Two Forest Model Should Be Used To Achieve Logical Segregation Between Scada And Corporate Networks, Andrew Woodward, Brett Turner
Australian Information Warfare and Security Conference
The increasing convergence of corporate and control systems networks creates new challenges for the security of critical infrastructure. There is no argument that whilst this connection of what was traditionally an isolated network, to a usually internet enabled corporate network, is unavoidable, segregation must be maintained. One such challenge presented is how to properly and appropriately configure an active directory environment to allow for exchange of required data, but still maintain the security goal of separation of the two networks. This paper argues that while separate domains may seem to achieve this goal, the reality is that a domain is …
Tactical Analysis Of Attack In Physical And Digital Security Incidents:Towards A Model Of Asymmetry, Atif Ahmad
Tactical Analysis Of Attack In Physical And Digital Security Incidents:Towards A Model Of Asymmetry, Atif Ahmad
Australian Information Warfare and Security Conference
Asymmetric warfare is frequently described as a conflict where ‘weaker’ parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This research-in-progress paper develops a concept model of asymmetric warfare that represents the leverage available to the ‘weaker’ party over the ‘stronger’ party simply because the former is attacking rather than defending. Points of leverage include choice of timing, location, method of attack, best use of limited resources and time to prepare. The resulting concept model is used to discuss generic defensive strategies that can be applied by ‘stronger’ parties in the physical …
Culture Jamming: From Activism To Hactivism, Kay Hearn, Rachel J. Mahncke, Patricia A. Williams
Culture Jamming: From Activism To Hactivism, Kay Hearn, Rachel J. Mahncke, Patricia A. Williams
Australian Information Warfare and Security Conference
A new kind of Internet threat has emerged. Hacking is increasingly being used as a weapon by individuals to promote their political ideologies by engaging in distributed citizen-based warfare. Their aim is to disrupt communications using internet enabled networks and organisations. Examples of these online assaults during 2009 were evident during the Iranian protests and the Melbourne International Film Festival. Such attacks use denial of service techniques and utilised social networking websites such as Facebook, Twitter and You Tube to post links to access hacking instructions. Posts on social networking websites and news stories from a variety of sources online, …
Ascent Of Asymmetric Risk In Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, Atif Ahmad
Ascent Of Asymmetric Risk In Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, Atif Ahmad
Australian Information Warfare and Security Conference
Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security, which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes …
Remarks On The Stability Of Some Size-Structured Population Models Vi: The Case When The Death Rate Depends On Juveniles Only And The Growth Rate Depends On Size Only And The Case When Both Rates Depend On Size Only, M. El-Doma
Applications and Applied Mathematics: An International Journal (AAM)
We continue our study of size-structured population dynamics models when the population is divided into adults and juveniles, started in El-Doma (to appear 1) and continued in El-Doma (to appear 2). We concentrate our efforts in two special cases, the first is when the death rate depends on juveniles only and the growth rate depends on size only, and, the second is when both the death rate and the growth rate depend on size only. In both special cases we assume that the maximum size for an individual in the population is infinite. We identify three demographic parameters and show …
Higher Order Difference Schemes For Heat Equation, Jianzhong Wang
Higher Order Difference Schemes For Heat Equation, Jianzhong Wang
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, we construct the explicit difference schemes for the heat equation with arbitrary high orders. We also show the validity of the new schemes by numerical simulations.
Explicit And Exact Solutions With Multiple Arbitrary Analytic Functions Of Jimbo–Miwa Equation, Sheng Zhang, Ying-Na Sun, Jin-Mei Ba, Ling Dong
Explicit And Exact Solutions With Multiple Arbitrary Analytic Functions Of Jimbo–Miwa Equation, Sheng Zhang, Ying-Na Sun, Jin-Mei Ba, Ling Dong
Applications and Applied Mathematics: An International Journal (AAM)
In this paper, a generalized F-expansion method is used to construct exact solutions of the (3+1)-dimensional Jimbo–Miwa equation. As a result, many new and more general exact solutions are obtained including single and combined non-degenerate Jacobi elliptic function solutions, hyperbolic function solutions and trigonometric function solutions, each of which contains six arbitrary analytic functions. It is shown that with the aid of symbolic computation the generalized F-expansion method may provide a straightforward and effective mathematical tool for solving nonlinear partial differential equations.
Similarity Solutions For A Steady Mhd Falkner-Skan Flow And Heat Transfer Over A Wedge Considering The Effects Of Variable Viscosity And Thermal Conductivity, M. A. Seddeek, A. A. Afify, A. M. Al-Hanaya
Similarity Solutions For A Steady Mhd Falkner-Skan Flow And Heat Transfer Over A Wedge Considering The Effects Of Variable Viscosity And Thermal Conductivity, M. A. Seddeek, A. A. Afify, A. M. Al-Hanaya
Applications and Applied Mathematics: An International Journal (AAM)
An analysis is carried out to study the Falkner–Skan flow and heat transfer of an incompressible, electrically conducting fluid over a wedge in the presence of variable viscosity and thermal conductivity effects. The similarity solutions are obtained using scaling group of transformations. Furthermore the similarity equations are solved numerically by employing Kellr-Box method. Numerical results of the local skin friction coefficient and the local Nusselt number as well as the velocity and the temperature profiles are presented for different physical parameters.
Analysis Of The Total Food Folate Intake Data From The National Health And Nutrition Exa-Amination Survey (Nhanes) Using Generalized Linear Model, Kyung Ah Lee
Mathematics Theses
The National health and nutrition examination survey (NHANES) is a respected nation-wide program in charge of assessing the health and nutritional status of adults and children in United States. Recent cal research found that folic acid play an important role in preventing baby birth defects. In this paper, we use the generalized estimating equation (GEE) method to study the generalized linear model (GLM) with compound symmetric correlation matrix for the NHANES data and investigate significant factors to ence the intake of food folic acid.
Proposed Framework For Understanding Information Security Culture And Practices In The Saudi Context, Mohammed Alnatheer, Karen Nelson
Proposed Framework For Understanding Information Security Culture And Practices In The Saudi Context, Mohammed Alnatheer, Karen Nelson
Australian Information Security Management Conference
An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information …
Playing Safe: A Prototype Game For Raising Awareness Of Social Engineering, Michael Newbould, Stephen Furnell
Playing Safe: A Prototype Game For Raising Awareness Of Social Engineering, Michael Newbould, Stephen Furnell
Australian Information Security Management Conference
Social engineering is now a major threat to users and systems in the online context, and it is therefore vital to educate potential victims in order to reduce their susceptibility to the related attacks. However, as with other aspects of security education, this firstly requires a means of getting the user’s attention. This paper presents details of an awarenessraising game that was developed in order to educate users in a more interactive way. A board game approach, combining reference material with themed multiple-choice questions, was implemented as an initial prototype, and evaluated with 21 users. The results suggested that the …
Electronic-Supply Chain Information Security: A Framework For Information, Alizera Bolhari
Electronic-Supply Chain Information Security: A Framework For Information, Alizera Bolhari
Australian Information Security Management Conference
Over the last few years, the materials and distribution management has developed into a broader strategic approach known as electronic supply chain management by means of information technology. This paper attempts to visibly describe supply chain management information security concepts which are necessary for managers to know about. So, the depth of information presented in this paper is calibrated for managers, not technical security employees or agents. Global supply chains are exposed to diverse types of risks that rise along with increasing globalization. Electronic supply chains will be more vulnerable from information security (IS) aspect among other types of supply …
Assessment Of Internationalised Domain Name Homograph Attack Mitigation, Peter Hannay, Christopher Bolan
Assessment Of Internationalised Domain Name Homograph Attack Mitigation, Peter Hannay, Christopher Bolan
Australian Information Security Management Conference
With the advent of internationalised domains the threat posed by non-english character sets has eventuated. Whilst this phenomenon remains well known in the development and internet industry the actual implementations of popular applications have been tested to determine their resilience to homograph based attack. The research found that most provided features that overcome such attacks, but there remain a few notable exceptions. Should an attacker take advantage of such oversights a victim would likely not be able to spot a fraudulent site or email and thus provide a perfect platform for subsequent attack.
A Characterization Of Caffeine Imprinted Polypyrrole Electrode, Deepika Mandadi
A Characterization Of Caffeine Imprinted Polypyrrole Electrode, Deepika Mandadi
Masters Theses & Specialist Projects
Nanotechnology holds great potential for improving our lives by creating many new materials and devices in medical sciences, electronics and also in energy production. Molecularly imprinted polymers (MIPs) are highly stable synthetic polymers that possess molecular recognition properties due to cavities created in the polymer matrix that are complementary to an analyte both in shape and in positioning of functional groups. These MIPs have been widely employed for diverse applications (e.g., in chromatographic separation, drug screening, chemosensors, catalysis, immunoassays etc) due to their specificity towards the target molecules and high stability against physicochemical perturbations. Conductive polymers, (CPs) such as polypyrrole, …
Some Contributions In Statistical Discrimination Of Different Pathogens Using Observations Through Ftir, Dongmei Wang
Some Contributions In Statistical Discrimination Of Different Pathogens Using Observations Through Ftir, Dongmei Wang
Mathematics Theses
Fourier Transform Infrared (FTIR) has been use to discriminate different pathogens by signals from cells infected with these versus normal cells as references. To do the statistical analysis, Partial Least Square Regression (PLSR) was utilized to distinguish any two kinds of virus‐infected cells and normal cells. Validation using Bootstrap method and Cross‐validations were employed to calculate the shrinkages of Area Under the ROC Curve (AUC) and specificities corresponding to 80%, 90%, and 95% sensitivities. The result shows that our procedure can significantly discriminate these pathogens when we compare infected cells with the normal cells. On the height of this success, …
Theoretical And Numerical Study Of Tikhonov's Regularization And Morozov's Discrepancy Principle, Marygeorge L. Whitney
Theoretical And Numerical Study Of Tikhonov's Regularization And Morozov's Discrepancy Principle, Marygeorge L. Whitney
Mathematics Theses
A concept of a well-posed problem was initially introduced by J. Hadamard in 1923, who expressed the idea that every mathematical model should have a unique solution, stable with respect to noise in the input data. If at least one of those properties is violated, the problem is ill-posed (and unstable). There are numerous examples of ill- posed problems in computational mathematics and applications. Classical numerical algorithms, when used for an ill-posed model, turn out to be divergent. Hence one has to develop special regularization techniques, which take advantage of an a priori information (normally available), in order to solve …
Analyzing Gene Expression Data In Terms Of Gene Sets: Gene Set Enrichment Analysis, Wei Li
Analyzing Gene Expression Data In Terms Of Gene Sets: Gene Set Enrichment Analysis, Wei Li
Mathematics Theses
The DNA microarray biotechnology simultaneously monitors the expression of thousands of genes and aims to identify genes that are differently expressed under different conditions. From the statistical point of view, it can be restated as identify genes strongly associated with the response or covariant of interest. The Gene Set Enrichment Analysis (GSEA) method is one method which focuses the analysis at the functional related gene sets level instead of single genes. It helps biologists to interpret the DNA microarray data by their previous biological knowledge of the genes in a gene set. GSEA has been shown to efficiently identify gene …
Comparative Studies Between Robotic Laparoscopic Myomectomy And Abdominal Myomectomy With Factors Affecting Short-Term Surgical Outcomes, Amy N. Fomo
Mathematics Theses
The purpose of this study is to compare short-term surgical outcomes of robotic and abdominal myomectomy and to analyze the factors affecting the total operative time, estimated blood loss and length of hospital stay from a retrospective study of a consecutive case series of 122 pa-tients with symptomatic leiomyomata. Wilcoxon, t tests, multiple linear and logistic regressions analyses were performed. Patients in abdominal group had larger number of leiomyomata, larger tumor size and BMI. The operative time was longer in robotic group and was affected by the size and number of tumors, parity and interaction between parity and BMI. Estimated …
Four-Body Model For Transfer Excitation, Allison L. Harris, Jerry Peacher, Don H. Madison, James Colgan
Four-Body Model For Transfer Excitation, Allison L. Harris, Jerry Peacher, Don H. Madison, James Colgan
Physics Faculty Research & Creative Works
We present here a four-body model for transfer-excitation collisions, which we call the four-body transfer-excitation (4BTE) model. Each two-body interaction is explicitly included in the 4BTE model, allowing us to study the effects of individual two-body interactions. We apply our model to fully differential cross sections for proton+helium collisions, and study the effect of the incident projectile-atom interaction, the scattered projectile-ion interaction, the projectile-nuclear interaction, and electron correlation within the target atom.
Systematic Analysis Of Double-Ionization Dynamics Based On Four-Body Dalitz Plots, Daniel Fischer, Michael Schulz, Katharina R. Schneider, Marcelo F. Ciappina, Tom Kirchner, Aditya H. Kelkar, S. Hagman, Manfred Grieser, Kai Uwe Kuhnel, Robert Moshammer, Joachim Hermann Ullrich
Systematic Analysis Of Double-Ionization Dynamics Based On Four-Body Dalitz Plots, Daniel Fischer, Michael Schulz, Katharina R. Schneider, Marcelo F. Ciappina, Tom Kirchner, Aditya H. Kelkar, S. Hagman, Manfred Grieser, Kai Uwe Kuhnel, Robert Moshammer, Joachim Hermann Ullrich
Physics Faculty Research & Creative Works
We report on an experimental and theoretical systematic study of double ionization of helium by ion impact in terms of four-particle Dalitz plots. Several collision systems covering abroad range of perturbation parameters η (projectile charge to speed ratio) were investigated. With increasing η we observe a systematic trend from features, characteristic to correlated double-ionization mechanisms, to signatures of higher-order processes not requiring electron-electron correlations [the mechanism called "two-step-two projectile-electron interaction" (TS-2)]. The data for the largest η can qualitatively be amazingly well described by a simple model only including the TS-2 mechanism.
Fully Exponential Laplace Approximation Em Algorithm For Nonlinear Mixed Effects Models, Meijian Zhou
Fully Exponential Laplace Approximation Em Algorithm For Nonlinear Mixed Effects Models, Meijian Zhou
Department of Statistics: Dissertations, Theses, and Student Work
Nonlinear mixed effects models provide a flexible and powerful platform for the analysis of clustered data that arise in numerous fields, such as pharmacology, biology, agriculture, forestry, and economics. This dissertation focuses on fitting parametric nonlinear mixed effects models with single- and multi-level random effects. A new, efficient, and accurate method that gives an error of order O(1/n2), fully exponential Laplace approximation EM algorithm (FELA-EM), for obtaining restricted maximum likelihood (REML) estimates in nonlinear mixed effects models is developed. Sample codes for implementing FELA-EM algorithm in R are given. Simulation studies have been conducted to evaluate …
Study Of Thermal Frontal Polymerization Utilizing Reactive And Non-Reactive Additives, Veronika Grace Viner
Study Of Thermal Frontal Polymerization Utilizing Reactive And Non-Reactive Additives, Veronika Grace Viner
Dissertations
Thermal frontal polymerization is a process that involves a propagating front travelling through a monomer/initiator solution and converting monomer into polymer. The effects of different reactive and non-reactive additives on front temperature, front velocity, and pot life were studied in a thermal frontal polymerization system of multifunctional acrylates. One issue with thermal frontal polymerization of acrylate monomers is the amount of smoke and fumes produced due to high front temperatures. The effect of thermally-expandable microspheres was studied utilizing a variety of monomers. Solid additives including fillers, inert phase changer materials, and high thermal conductive fillers were investigated. The addition of …
From The Bronx Into The Wild! My Adventurous Experience At The Bronx Zoo, Lauren Noll
From The Bronx Into The Wild! My Adventurous Experience At The Bronx Zoo, Lauren Noll
Student Theses 2001-2013
Many people defend zoos, claiming that they provide great opportunities in education, scientific research, and the overall preservation of wildlife worldwide. However, many people will take the opposing side, arguing that it is wrong to deprive animals of their natural habitats and lifestyles. One of the greatest controversies of our time pertains to the moral issues associated with keeping animals in captivity, such as in zoos and aquariums.
Measurement Of J/Ψ Helicity Distributions In Inelastic Photoproduction At Hera, S. Chekanov, M. Derrick, S. Magill, B. Musgrave, D. Nicholass, J. Repond, R. Yoshida, Margarita C. K. Mattingly, P. Antonioli, G. Bari, L. Bellagamba, D. Boscherini, A. Bruni, G. Bruni, F. Cindolo, M. Corradi, G. Iacobucci, A. Margotti, R. Nania, A. Polini, S. Antonelli, M. Basile, M. Bindi, L. Cifarelli, A. Contin, S. De Pasquale, G. Sartorelli, A. Zichichi, D. Bartsch, I. Brock, H. Hartmann
Measurement Of J/Ψ Helicity Distributions In Inelastic Photoproduction At Hera, S. Chekanov, M. Derrick, S. Magill, B. Musgrave, D. Nicholass, J. Repond, R. Yoshida, Margarita C. K. Mattingly, P. Antonioli, G. Bari, L. Bellagamba, D. Boscherini, A. Bruni, G. Bruni, F. Cindolo, M. Corradi, G. Iacobucci, A. Margotti, R. Nania, A. Polini, S. Antonelli, M. Basile, M. Bindi, L. Cifarelli, A. Contin, S. De Pasquale, G. Sartorelli, A. Zichichi, D. Bartsch, I. Brock, H. Hartmann
Faculty Publications
The J/ψ decay angular distributions have been measured in inelastic photo-production in ep collisions with the ZEUS detector at HERA, using an integrated luminosity of 468 pb-1. The range in photon-proton centre-of-mass energy, W, was 50 < W < 180 GeV. The J/ψ mesons were identified through their decay into muon pairs. The polar and azimuthal angles of the μ+ were measured in the J/ψ rest frame and compared to theoretical predictions at leading and next-to-leading order in QCD. © SISSA 2009.