Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 271 - 300 of 7616

Full-Text Articles in Physical Sciences and Mathematics

Extraction And Analysis Of Coral Reef Core Samples From Broward County, Florida., Anastasios Stathakopoulos Dec 2009

Extraction And Analysis Of Coral Reef Core Samples From Broward County, Florida., Anastasios Stathakopoulos

HCNSO Student Theses and Dissertations

The reefs off Broward County exist as three shore-parallel, sequentially deeper terraces named the "inner", "middle", and "outer" reefs and also a shallower, nearshore ridge complex. These structures span the continental coast of southeast Florida from Palm Beach County to southern Miami-Dade County and were characterized as relict, early Holocene shelf-edge and mid-shelf reefs along with limestone ridges. Presently, the reefs are colonized by a fauna characteristic of West Atlantic/Caribbean reef systems. Scleractinian coral cover is low except for a few dense patches of Acropora cervicornis, while Acropora palmata is absent except for a few individual living colonies.

Coral …


Relating Fires Affect On Forest Succession And Forest's Effect On Fire Severity In One Burned And Unburned Environment, Tyler Jay Seiboldt Dec 2009

Relating Fires Affect On Forest Succession And Forest's Effect On Fire Severity In One Burned And Unburned Environment, Tyler Jay Seiboldt

Department of Environmental Studies: Undergraduate Student Theses

Wildfires are a natural part of many forest ecosystems and play a vital role in maintaining their health. Wildfires can have a critical influence on a landscapes plant community through their relative frequency, seasonality, and severity. One of the most heavily influenced regions by wildfire disturbance is the Klamath Mountain region of California. I looked at the affect a wildfires severity had on the Whiskey creek valley within the Whiskeytown National Recreation Area. 8 tree species and 4 flower species were examined on both the burned and unburned regions within this valley nearly a year after the wildfire (May 17-23 …


Patterns Of Bison Hair Use In Nests Of Tallgrass Prairie Birds, Bryan R. Coppedge Dec 2009

Patterns Of Bison Hair Use In Nests Of Tallgrass Prairie Birds, Bryan R. Coppedge

The Prairie Naturalist

I examined patterns of bison (Bison bison L.) hair use by passerine birds nesting in the Tallgrass Prairie Preserve, Osage County, Oklahoma, 2002-2004. I collected and dissected 103 nests of 15 species into their constituent components. Nests were predominately composed of herbaceous material such as grass stems and leaves. Woody material and mud were rarely used. Bison hair was the most prominent zoological material used in nests, with lesser amounts and occurrence of arthropod silk, snake skin, feathers, jack rabbit (Lepus californicus Oray) fur, and man-made materials such as cellophane and string. At least one nest of 13 …


Observations Of Badgers Preying On Black-Tailed Prairie Dogs, Daniel S. Licht Dec 2009

Observations Of Badgers Preying On Black-Tailed Prairie Dogs, Daniel S. Licht

The Prairie Naturalist

American badgers (Taxidea taxus) often visit black-tailed prairie dog (Cynomys ludovicianus) colonies, most likely in search of prey (Lomolino and Smith 2004, Shaughnessy and Cifelli 2004). Badgers are well suited to hunting fossorial prey such as prairie dogs by excavating burrows and capturing individuals belowground (Lindzey 2003). However, the ecological literature is sparse regarding details of how badgers hunt and capture prairie dogs underground. Eads and Biggins (2008) documented three occurrences of a badger excavating prairie dogs. That badger (apparently the same individual) had a den within the prairie dog town where captures occurred. This note …


Monitoring Meadows With A Modified Robel Pole In The Northern Black Hills, South Dakota, Daniel W, Uresk, Daryl E. Mergen, Ted A. Benzon Dec 2009

Monitoring Meadows With A Modified Robel Pole In The Northern Black Hills, South Dakota, Daniel W, Uresk, Daryl E. Mergen, Ted A. Benzon

The Prairie Naturalist

We used a modified Robel pole to measure vegetation for a study conducted in the northern Black Hills, South Dakota. Objectives were to determine the relationship between visual obstruction readings and clipped standing herbage, and develop guidelines for monitoring standing herbage. The relationship between visual obstruction readings and standing herbage was linear and regression coefficients were significant (P≤ 0.001). Herbage ranged from 140 to 3313 kg· ha-1 with a mean of 1386 kg· ha-1 (SE = 320 kg· ha-1) for 123 transects. Visual obstruction readings (VOR) ranged from 0.6 to 30.4 (number of 1.27 cm bands …


Mortality Of Cranes (Gruidae) Associated With Powerlines Over A Major Roost On The Platte River, Nebraska, Gregory D. Wright, Timothy J. Smith, Robert K. Murphy, Jeffery T. Runge, Robert R. Harms Dec 2009

Mortality Of Cranes (Gruidae) Associated With Powerlines Over A Major Roost On The Platte River, Nebraska, Gregory D. Wright, Timothy J. Smith, Robert K. Murphy, Jeffery T. Runge, Robert R. Harms

The Prairie Naturalist

Two 69-kilovolt powerlines spanning the Platte River in south central Nebraska are suspected to cause substantial mortality to sandhill cranes (Grus canadensis) and pose a threat to endangered whooping cranes (G. americana) that roost overnight on the river during spring and fall migrations. Most studies of crane collisions with powerlines in the region have focused on counts of carcasses away from night roosts on the river and none have accounted for potential biases in detecting carcasses. We found 61 carcasses of sandhill cranes below over-river segments of the two powerlines during 4 March to 7 April …


Noteworthy Winter Prey Of Short-Eared Owls In Southern Texas: A Case Study, Damon Williford, Marc C. Woodin, Mary Kay Skoruppa Dec 2009

Noteworthy Winter Prey Of Short-Eared Owls In Southern Texas: A Case Study, Damon Williford, Marc C. Woodin, Mary Kay Skoruppa

The Prairie Naturalist

The winter range of North American short-eared owls (Asio flammeus) encompasses much of the United States, including southern Texas, where it is a common winter resident (Oberholser 1974, Rappole and Blacklock 1985). Winter food habits of short-eared owls are relatively weJl documented, but the majority of investigations have been conducted in eastern Canada and northeastern U.S. (Clark 1975, Holt 1993); midwestern U.S. (Colvin and Spaulding 1983); and British Columbia and Pacific northwestern U.S. (Bogiatto et al. 2001). The short-eared owl has a narrow trophic niche, generally preying on small mammals, with voles (Microtus spp.) and deer mice …


Bed Site Selection Of Fawn Pronghorn In Custer State Park, South Dakota, Chad P. Lehman, Jamin D. Hartland, Barbara J. Keller, Joshua J. Millspaugh, Gary C. Brundige Dec 2009

Bed Site Selection Of Fawn Pronghorn In Custer State Park, South Dakota, Chad P. Lehman, Jamin D. Hartland, Barbara J. Keller, Joshua J. Millspaugh, Gary C. Brundige

The Prairie Naturalist

We evaluated pronghorn (Antilocapra americana) fawn bedding site characteristics on a prairie and ponderosa pine (Pinus ponderosa) landscape interface in Custer State Park, South Dakota. We radio-marked 16 adult female pronghorn and collected bed site information from their fawns during 2007~2008. We compared bed site selection with random sites (n = 74) during 2 periods; the early hiding phase when fawns were 1 ~28 days of age (n = 23 bed sites) and the later group phase when fawns were 29~60 days of age (n = 52 bed sites). During the hiding phase fawns selected dry …


A Partial Inventory Of Islands In North Dakota: Potential For Breeding Waterfowl Management, Michael L. Szymanski Dec 2009

A Partial Inventory Of Islands In North Dakota: Potential For Breeding Waterfowl Management, Michael L. Szymanski

The Prairie Naturalist

Islands can provide secure nesting habitat for ducks and other waterbirds, especially in agriculturally dominated landscapes. I inventoried natural and man-made islands in the portion of North Dakota covered by the Prairie Pothole Joint Venture (PPJV). I mapped 1,305 islands in this area; up to 46% of which could provide enhanced nest success with management (e.g., predator removal or establishment of brushy cover). Management of islands for breeding ducks may be an important method for achieving desired reproductive rates in the PP JV as substantial areas of perennial grass cover are lost from federal conservation programs, primarily the Conservation Reserve …


Wide-Range Characterization Of Current Conduction In Superconductors-Tuning Their Properties By Nanoscale Modification Of Materials, Özgür Polat Dec 2009

Wide-Range Characterization Of Current Conduction In Superconductors-Tuning Their Properties By Nanoscale Modification Of Materials, Özgür Polat

Doctoral Dissertations

Significant progress has been made in the development of YBa2Cu3O7-x (YBCO)-based coated conductors (CCs) since the discovery of YBCO in 1987. Nowadays, high temperature superconductor (HTS) materials are advancing toward wide application areas in medical physics, industry, and science. The successful applications of these materials require clear understanding of the mechanisms controlling the current carrying capacity. It has been demonstrated the maximum current that a HTS can support is strongly affected by the vortex dynamics within the HTS materials. In this dissertation, we employed a combination of methods: conventional transport, magnetometry in a swept magnetic …


Modeling Of Metal-Ferroelectric-Insulator-Semiconductor Structures Based On Langmuir–Blodgett Copolymer Films, Timothy J. Reece, Stephen Ducharme Dec 2009

Modeling Of Metal-Ferroelectric-Insulator-Semiconductor Structures Based On Langmuir–Blodgett Copolymer Films, Timothy J. Reece, Stephen Ducharme

Stephen Ducharme Publications

Among the ferroelectric thin films used in field-effect transistor devices; the ferroelectric copolymer of polyvinylidene fluoride PVDF –CH2–CF2–, with trifluoroethylene TrFE –CHF–CF2–, has distinct advantages, including low dielectric constant, low processing temperature, low cost, and compatibility with organic semiconductors. The operation of a metal-ferroelectric insulatorsemiconductor structure with PVDF-TrFE as the ferroelectric layer was analyzed and optimized by numerical solution of the Miller and McWhorter model. A model device consisting of 20 nm PVDF/TrFE on a 10-nm-thick high-k dielectric buffer exhibits a memory window of 5 V with an operating voltage of 15 V. The operating voltage can be reduced to …


Duol: A Double Updating Approach For Online Learning, Peilin Zhao, Steven C. H. Hoi, Rong Jin Dec 2009

Duol: A Double Updating Approach For Online Learning, Peilin Zhao, Steven C. H. Hoi, Rong Jin

Research Collection School Of Computing and Information Systems

In most online learning algorithms, the weights assigned to the misclassified examples (or support vectors) remain unchanged during the entire learning process. This is clearly insufficient since when a new misclassified example is added to the pool of support vectors, we generally expect it to affect the weights for the existing support vectors. In this paper, we propose a new online learning method, termed Double Updating Online Learning, or DUOL for short. Instead of only assigning a fixed weight to the misclassified example received in current trial, the proposed online learning algorithm also tries to update the weight for one …


Self-Organized Criticality In Sheared Suspensions, L. Corté, Sharon J. Gerbode, W. Man, D. J. Pine Dec 2009

Self-Organized Criticality In Sheared Suspensions, L. Corté, Sharon J. Gerbode, W. Man, D. J. Pine

All HMC Faculty Publications and Research

Recent studies reveal that suspensions of neutrally buoyant non-Brownian particles driven by slow periodic shear can undergo a dynamical phase transition between a fluctuating irreversible steady state and an absorbing reversible state. Using a computer model, we show that such systems exhibit self-organized criticality when a finite particle sedimentation velocity vs is introduced. Under periodic shear, these systems evolve, without external intervention, towards the shear-dependent critical concentration ϕc as vs is reduced. This state is characterized by power-law distributions in the lifetime and size of fluctuating clusters. Experiments exhibit similar behavior and, as vs is reduced, …


Regularity Of Non-Characteristic Minimal Graphs In The Heisenberg Group ℍ1, Luca Capogna, Giovanna Citti, Maria Manfredini Dec 2009

Regularity Of Non-Characteristic Minimal Graphs In The Heisenberg Group ℍ1, Luca Capogna, Giovanna Citti, Maria Manfredini

Mathematics Sciences: Faculty Publications

Minimal surfaces in the sub-Riemannian Heisenberg group can be constructed by means of a Riemannian approximation scheme, as limit of Riemannian minimal surfaces. We study the regularity of Lipschitz, non-characteristic minimal surfaces which arise as such limits. Our main results are apriori estimates on the solutions of the approximating Riemannian PDE and the ensuing C∞ regularity of the sub-Riemannian minimal surface along its Legendrian foliation.


Challenges In Improving Information Security Practice In Australian General Practice, Donald C. Mcdermid, Rachel J. Mahncke, Patricia A. Williams Dec 2009

Challenges In Improving Information Security Practice In Australian General Practice, Donald C. Mcdermid, Rachel J. Mahncke, Patricia A. Williams

Australian Information Security Management Conference

The status of information security in Australian medical general practice is discussed together with a review of the challenges facing small practices that often lack the technical knowledge and skill to secure patient information by themselves. It is proposed that an information security governance framework is required to assist practices in identifying weaknesses and gaps and then to plan and implement how to overcome their shortcomings through policies, training and changes to processes and management structure.


Measuring Information Security Governance Within General Medical Practice, Rachel J. Mahncke, Donald C. Mcdermid, Patricia A. Williams Dec 2009

Measuring Information Security Governance Within General Medical Practice, Rachel J. Mahncke, Donald C. Mcdermid, Patricia A. Williams

Australian Information Security Management Conference

Information security is becoming increasingly important within the Australian general medical practice environment as legal and accreditation compliance is being enforced. Using a literature review, approaches to measuring information security governance were analysed for their potential suitability and use within General Practice for the effective protection of confidential information. The models, frameworks and guidelines selected were analysed to evaluate if they were Key Performance Indicator (KPI), or process driven; whether the approach taken was strategic, tactical or operational; and if governance or management assessment tools were presented. To measure information security governance, and be both effective and practical, the approach …


The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, Patryk Szewczyk Dec 2009

The 2009 Personal Firewall Robustness Evaluation, Ken Pydayya, Peter Hannay, Patryk Szewczyk

Australian Information Security Management Conference

The evolution of the internet as a platform for commerce, banking, general information and personal communications has resulted in a situation where many individuals who may not have previously required internet access now require this connectivity as part of their everyday lives. In addition to this the widespread adoption of mobile broadband has lead to an increasing number of individuals having public facing IP addresses with no firewall appliances present. This situation has dramatically increased reliance on personal firewalls as the first and often last defence against intruders (human and malware alike). The evaluation performed demonstrates the capabilities of current …


Case Study On An Investigation Of Information Security Management Among Law Firms, Sameera Mubarak, Elena Sitnikova Dec 2009

Case Study On An Investigation Of Information Security Management Among Law Firms, Sameera Mubarak, Elena Sitnikova

Australian Information Security Management Conference

The integrity of lawyers trust accounts as come under scrutiny in the last few years. There have been many incidents of trust account fraud reported internationally, including a case in Australia, where an employee of a law firm stole $4,500,000 from the trust funds of forty-two clients. Our study involved interviewing principles of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account …


Improving An Organisations Existing Information Technology Policy To Increase Security, Shane Talbot, Andrew Woodward Dec 2009

Improving An Organisations Existing Information Technology Policy To Increase Security, Shane Talbot, Andrew Woodward

Australian Information Security Management Conference

A security policy which includes the appropriate phases of implementation, enforcement, auditing and review is vital to protecting an organisations information security. This paper examined the information security policy of a government organisation in response to a number of perceived shortcomings. The specific issues identified relating to the organisations security policy as a result of this investigation were as follows: a culture of ignoring policies, minimal awareness of policies, minimal policy enforcement, policy updating and review ad hoc at best, policy framework, lengthy policy development and approval process, no compliance program, no formal non-compliance reporting and an apparent inconsistent enforcement …


A Spoofing Attack Against An Epc Class One Rfid System, Christopher Bolan Dec 2009

A Spoofing Attack Against An Epc Class One Rfid System, Christopher Bolan

Australian Information Security Management Conference

In computing the term spoofing historically referred to the creation of TCP/IP packets using another device’s valid IP address to gain an advantage. The Electronic Product Code (EPC) RFID system was investigated to test the efficacy of spoofing a valid tag response to basic requests. A radio frequency transmission device was constructed to determine whether a valid reader could distinguish between the response of an actual tag and a spoofed response. The results show that the device was able to successfully deceive the EPC reader and further, to replace actual tag responses with a spoofed response. The potential for such …


Information Security Disclosure: A Case Study, I Rosewall, M J. Warren Dec 2009

Information Security Disclosure: A Case Study, I Rosewall, M J. Warren

Australian Information Security Management Conference

New social networking systems such as Facebook are an ever evolving and developing means of social interaction, which is not only being used to disseminate information to family, friends and colleagues but as a way of meeting and interacting with "strangers" through the advent of a large number of social applications. This paper will focus upon the impact of Generation F - the Facebook Generation and their attitudes to security. The paper will be based around discussing the findings of a major UK case study and the implications that this has. The case study identifies 51 recommendations to improve the …


What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams Dec 2009

What Does Security Culture Look Like For Small Organizations?, Patricia A. Williams

Australian Information Security Management Conference

The human component is a significant factor in information security, with a large numbers of breaches occurring due to unintentional user error. Technical solutions can only protect information so far and thus the human aspect of security has become a major focus for discussion. Therefore, it is important for organisations to create a security conscious culture. However, currently there is no established representation of security culture from which to assess how it can be manoeuvred to improve the overall information security of an organization. This is of particular importance for small organizations who lack the resources in information security and …


Strong Authentication For Web Services Using Smartcards, D S. Stienne, Nathan Clarke, Paul Reynolds Dec 2009

Strong Authentication For Web Services Using Smartcards, D S. Stienne, Nathan Clarke, Paul Reynolds

Australian Information Security Management Conference

The popularity of the Internet and the variety of services it provides has been immense. Unfortunately, many of these services require the user to register and subsequently login to the system in order to access them. This has resulted in the user having to remember a multitude of username and password combinations in order to use the service securely. However, literature has clearly demonstrated this is not an effective approach, as users will frequently choose simple passwords, write them down, share them or use the same password for multiple systems. This paper proposes a novel concept where Internet users authenticate …


Exploring The Relationship Between Organizational Culture And Information Security Culture, Joo S. Lim, Shanton Chang, Sean Maynard, Atif Ahmad Dec 2009

Exploring The Relationship Between Organizational Culture And Information Security Culture, Joo S. Lim, Shanton Chang, Sean Maynard, Atif Ahmad

Australian Information Security Management Conference

Managing Information Security is becoming more challenging in today’s business because people are both a cause of information security incidents as well as a key part of the protection from them. As the impact of organizational culture (OC) on employees is significant, many researchers have called for the creation of information security culture (ISC) in organizations to influence the actions and behaviour of employees towards better organizational information security. Although researchers have called for the creation of ISC to be embedded in organizations, nonetheless, literature suggests that little past research examining the relationship between the nature of OC and ISC. …


Development Of A Critical Factors Model For The Knowledge Economy In Saudi Arabia, Fahad A. Alothman, Peter Busch Dec 2009

Development Of A Critical Factors Model For The Knowledge Economy In Saudi Arabia, Fahad A. Alothman, Peter Busch

Australian Information Security Management Conference

If knowledge-based economic systems are to be adopted, succeed and be disseminated, many significant barriers must be overcome regardless of how advanced a country is in terms of its infrastructure and domestic production. This paper describes an investigation of the critical factors associated with the adoption and dissemination of a knowledge economy initiative. The focus of the research is on knowledge management, national culture and other country-specific factors and how they are influencing Saudi Arabia’s efforts to develop a knowledge economy.


Method For Securing Online Community Service: A Study Of Selected Western Australian Councils, Sunsern Limwiriyakul Dec 2009

Method For Securing Online Community Service: A Study Of Selected Western Australian Councils, Sunsern Limwiriyakul

Australian Information Security Management Conference

Since the Internet was publicly made available, it has become popular and widely used in a range of services such as Email, News, IRC, World Wide Web around the globe. Progressively other services such as telephony, video conferencing, video on demand, interactive TV, Geospatial Information System (GIS), have emerged and become available on the Internet. Nowadays, Internet broadband communication infrastructure, both wired and wireless, make the concept of a Digital Community possible. The Digital Community has been growing and expanding rapidly around the world. This changes the way we live, work and play. Creating a Digital Community can empower local …


Review Of Browser Extensions, A Man-In-The-Browser Phishing Techniques Targeting Bank Customers, Nattakant Utakrit Dec 2009

Review Of Browser Extensions, A Man-In-The-Browser Phishing Techniques Targeting Bank Customers, Nattakant Utakrit

Australian Information Security Management Conference

Initially, online scammers (phishers) used social engineering techniques to send emails to solicit personal information from customer in order to steal money from their Internet banking account. Data, such as passwords or bank account details, could be further used for other criminal activities. For instance, the scammers may intend to leave the victim’s information behind after they have successfully committed the crime so that the police can suspect the visible evidence as a suspicious criminal. Many customers are now aware of the need to protect their banking details from the phishers by not providing any sensitive information. Recently, phishing attacks …


Sparql Query Re-Writing For Spatial Datasets Using Partonomy Based Transformation Rules, Prateek Jain, Cory Andrew Henson, Amit P. Sheth, Peter Z. Yeh, Kunal Verma Dec 2009

Sparql Query Re-Writing For Spatial Datasets Using Partonomy Based Transformation Rules, Prateek Jain, Cory Andrew Henson, Amit P. Sheth, Peter Z. Yeh, Kunal Verma

Kno.e.sis Publications

Often the information present in a spatial knowledge base is represented at a different level of granularity and abstraction than the query constraints. For querying ontology’s containing spatial information, the precise relationships between spatial entities has to be specified in the basic graph pattern of SPARQL query which can result in long and complex queries. We present a novel approach to help users intuitively write SPARQL queries to query spatial data, rather than relying on knowledge of the ontology structure. Our framework re-writes queries, using transformation rules to exploit part-whole relations between geographical entities to address the mismatches between query …


Angular Mobility Assisted Coverage In Directional Sensor Networks, Cyriac Kandoth, Sriram Chellappan Dec 2009

Angular Mobility Assisted Coverage In Directional Sensor Networks, Cyriac Kandoth, Sriram Chellappan

Computer Science Faculty Research & Creative Works

In this paper, we consider the issue of angular mobility assisted coverage enhancement in directional camera sensor networks. in our model, each sensor can visually capture (i.e. sense) events within a sector in its field of view and can also rotate about a fixed axis to enhance its coverage. the problem we particularly address is how to enhance blanket coverage leveraging angular mobility of the sensors in the network starting from an arbitrary initial deployment. the core idea of our algorithm, called the Face Away algorithm, is to use the known directions of neighboring sensors to find the direction with …


Privacy Preserving Portable Health Record (P³Hr), Pavan Roy Marupally, Vamsi Paruchuri, Sriram Chellappan Dec 2009

Privacy Preserving Portable Health Record (P³Hr), Pavan Roy Marupally, Vamsi Paruchuri, Sriram Chellappan

Computer Science Faculty Research & Creative Works

Personal health records (PHRs) offer significant potential to stimulate transformational changes in health care delivery and self-care by patients. There is a gap between today's personal health records (PHRs) and what patients say they want and need from this electronic tool for managing their health information. Current barriers to PHR adoption among patients include cost, concerns that information is not protected or private, inconvenience, design shortcomings, and the inability to share information across organizations. We propose a novel architecture to bridge the gap based on Privacy Preserving Portable Health Record(P3HR), a device that incorporates a smart card into …