Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1513)
- Environmental Sciences (1353)
- Physics (1038)
- Chemistry (951)
- Life Sciences (894)
-
- Engineering (866)
- Mathematics (789)
- Social and Behavioral Sciences (704)
- Earth Sciences (686)
- Statistics and Probability (427)
- Oceanography and Atmospheric Sciences and Meteorology (425)
- Education (306)
- Astrophysics and Astronomy (298)
- Applied Mathematics (285)
- Natural Resources and Conservation (282)
- Computer Engineering (275)
- Natural Resources Management and Policy (244)
- Electrical and Computer Engineering (221)
- Business (214)
- Databases and Information Systems (207)
- Arts and Humanities (202)
- Science and Mathematics Education (197)
- Sustainability (191)
- Environmental Health and Protection (180)
- Geology (168)
- Physical Chemistry (160)
- Water Resource Management (156)
- Law (154)
- Medicine and Health Sciences (152)
- Institution
-
- University of Nebraska - Lincoln (765)
- Selected Works (403)
- University of Wollongong (349)
- TÜBİTAK (214)
- Utah State University (208)
-
- Wright State University (201)
- Singapore Management University (198)
- University of Nevada, Las Vegas (194)
- SelectedWorks (185)
- Missouri University of Science and Technology (161)
- Louisiana State University (158)
- Old Dominion University (139)
- Technological University Dublin (124)
- Brigham Young University (115)
- Portland State University (115)
- Clemson University (102)
- Wayne State University (95)
- William & Mary (95)
- University of South Florida (94)
- Chinese Chemical Society | Xiamen University (87)
- University of Kentucky (87)
- Western Kentucky University (86)
- University of Massachusetts Amherst (85)
- Air Force Institute of Technology (81)
- California Polytechnic State University, San Luis Obispo (80)
- Embry-Riddle Aeronautical University (75)
- Virginia Commonwealth University (72)
- Dartmouth College (67)
- Syracuse University (67)
- COBRA (66)
- Keyword
-
- Climate change (43)
- Sustainability (38)
- Mathematics (34)
- Education (31)
- Research and Technical Reports (30)
-
- CMMB (29)
- Chemistry (29)
- Western Australia (29)
- GeoQUEST (28)
- West (28)
- 2009 (26)
- Management (25)
- Nanoparticles (25)
- Human–wildlife conflicts (24)
- Australia (23)
- Water (23)
- Water policy (23)
- Water quality (23)
- Western water law (23)
- College for Professional Studies (22)
- School of Computer & Information Science (22)
- Simulation (22)
- Water law (22)
- GIS (21)
- Security (21)
- Data (20)
- Galaxies: evolution (20)
- Groundwater (20)
- Algorithms (19)
- Colorado (19)
- Publication
-
- Research Collection School Of Computing and Information Systems (194)
- Theses and Dissertations (194)
- Faculty of Informatics - Papers (Archive) (158)
- Faculty of Science - Papers (Archive) (156)
- Faculty Publications (143)
-
- Computer Science & Engineering Syllabi (100)
- United States Department of Agriculture Wildlife Services: Staff Publications (95)
- Electronic Theses and Dissertations (94)
- Journal of Electrochemistry (87)
- Turkish Journal of Chemistry (82)
- Physics Faculty Publications (79)
- Nebraska Tractor Tests (75)
- LSU Doctoral Dissertations (67)
- Physics Faculty Research & Creative Works (66)
- Journal of Modern Applied Statistical Methods (64)
- Open Access Theses & Dissertations (63)
- Sci-Tech News (62)
- Dissertations (59)
- School of Natural Resources: Faculty Publications (54)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (54)
- All Dissertations (52)
- LSU Master's Theses (52)
- Doctoral Dissertations (50)
- Publications (49)
- Dartmouth Scholarship (47)
- Articles (45)
- Chemistry Faculty Publications (45)
- Master's Projects (45)
- Chemistry Faculty Research and Publications (43)
- The Mathematics Enthusiast (43)
- Publication Type
Articles 3631 - 3660 of 7616
Full-Text Articles in Physical Sciences and Mathematics
Crop Updates - 2009 Katanning, Murray Scholz, Peter Newman, Glenn Adam, Trevor Bell, Michael Whitehead, W. K. Anderson, C. Gazey, J. Andrew, R. Pearce, Bill Bowden, Wayne Pluske, Jeremy Lemon, D. C. Edmeades, J. J. Russell, B. H. Paynter, David Ferris, Abul Hashem, Catherine Borger, Stephen B. Powels, Qin Yu, Mechelle Owen, Roberto Busi, Sudheesh Manalil, Sally Peltzer, David Minkey, Raj Malik
Crop Updates - 2009 Katanning, Murray Scholz, Peter Newman, Glenn Adam, Trevor Bell, Michael Whitehead, W. K. Anderson, C. Gazey, J. Andrew, R. Pearce, Bill Bowden, Wayne Pluske, Jeremy Lemon, D. C. Edmeades, J. J. Russell, B. H. Paynter, David Ferris, Abul Hashem, Catherine Borger, Stephen B. Powels, Qin Yu, Mechelle Owen, Roberto Busi, Sudheesh Manalil, Sally Peltzer, David Minkey, Raj Malik
Crop Updates
This session covers seventeen papers from different authors
-
GM canola – How will it affect the way I farm? Murray Scholz, 2008 Nuffield scholar, Southern NSW
-
Eight years of IWM smashes tyegrass seed banks by 98% over 31 focus paddocks, Peter Newman, Glenn Adam & Trevor Bell, Department of Agriculture and Food
-
The global economic climate and impacts on agriculture, profile on Michael Whitehead Rabobank New York
-
Lessons from five years of cropping systems research, W.K. Anderson, Department of Agriculture and Food
-
Case study of a 17year old agricultural lime trial, C. Gazey, Department of Agriculture …
Plateau Structure In Resonant Laser-Assisted Electron-Atom Scattering, A. V. Flegel, M. V. Frolov, N. L. Manakov, Anthony F. Starace
Plateau Structure In Resonant Laser-Assisted Electron-Atom Scattering, A. V. Flegel, M. V. Frolov, N. L. Manakov, Anthony F. Starace
Anthony F. Starace Publications
Orders of magnitude increases are predicted in the cross sections for electron-atom scattering accompanied by absorption or emission of n laser photons for incident electron energies at which the electron, by emitting μ laser photons, can be captured by the atom to form a negative ion. Enhancements are most significant in the plateau region (n >> μ) of the scattered electron spectrum, whose shape is predicted to replicate that of the ion’s (n + μ)-photon detachment spectrum.
Can't Find Your 404s?, Martin Klein, Frank Mccown, Joan Smith, Michael L. Nelson
Can't Find Your 404s?, Martin Klein, Frank Mccown, Joan Smith, Michael L. Nelson
Computer Science Presentations
PDF of a powerpoint presentation at the Santa Fe Complex, Santa Fe, New Mexico, March 13, 2009. Also available on Slideshare.
Dpi Considered Not Harmful, Matthias Bärwolff
Dpi Considered Not Harmful, Matthias Bärwolff
Matthias Bärwolff
There is a strong sentiment both in technology and in policy circles against deep packet inspection by ISPs as a means to augment their services or control and shape the uses of their network. We argue that the premise of full transparency of the network is no more viable, and should give way to a notion explicitly recognising the role of networks in assuming functions above the network layer on behalf of the end-systems, and the end-systems controlling, endorsing, and verifying the process of having functions delegated towards the network. Such a paradigm may be a step towards conceptualising an …
Search For The Photoexcitation Of Exotic Mesons In The Π+Π+Π- System, M. Nozar, Gerard P. Gilfoyle, Et. Al.
Search For The Photoexcitation Of Exotic Mesons In The Π+Π+Π- System, M. Nozar, Gerard P. Gilfoyle, Et. Al.
Physics Faculty Publications
A search for exotic mesons in the π+π+π- system photoproduced by the charge exchange reaction γp → π+π+π- was carried out by the CLAS Collaboration at Jefferson Lab. A tagged-photon beam with energies in the 4.8 to 5.4 GeV range, produced through bremsstrahlung from a 5.744 GeV electron beam, was incident on a liquid-hydrogen target. A partial wave analysis was performed on a sample of 83 000 events, the highest such statistics to date in this reaction at these energies. The main objective of this study was to look …
Synthesis Of Magnetic Porous Hollow Silica Nanotubes For Drug Delivery, H. Ma, J. Tarr, M. A. Decoster, J. Mcnamara, D. Caruntu, J. F. Chen, Charles J. O'Connor, Weilie Zhou
Synthesis Of Magnetic Porous Hollow Silica Nanotubes For Drug Delivery, H. Ma, J. Tarr, M. A. Decoster, J. Mcnamara, D. Caruntu, J. F. Chen, Charles J. O'Connor, Weilie Zhou
Chemistry Faculty Publications
In this paper, we report a synthesis of magnetic porous hollow silica nanotubes (MPHSNTs) using sol-gel method. The MPHSNTs were fabricated by coating Fe(3)O(4) nanoparticles and silica on surfactant hexadecyltrimethylammonium bromide (CTAB) modified CaCO(3) nanoneedles surface under alkaline condition. CaCO(3) nanoneedles and surfactant CTAB are introduced as nanotemplates to form the hollow and porous structures, respectively. After removing CTAB by calcination and etching CaCO(3) nanoneedles away in diluted acetic acid, magnetic porous hollow silica nanotubes with Fe(3)O(4) nanoparticles embedded in the silica shell were achieved. The products were characterized by scanning electron microscopy, transmission electron microscopy, and N(2) adsorption-desorption isotherms. …
Project Update: Taunton River Watershed Management Plan (March 12, 2009 Meeting), Horsley Witten Group, Inc.
Project Update: Taunton River Watershed Management Plan (March 12, 2009 Meeting), Horsley Witten Group, Inc.
Public Meetings
No abstract provided.
Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk
Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk
Australian Digital Forensics Conference
The demand for high-speed Internet access is escalating high sales of ADSL routers. In-turn this has prompted individuals to attack and exploit the vulnerabilities in these devices. To respond to these threats, methods of acquisition and analysis are needed. The configuration data provides a wealth of information into the current state of the device. Hence, this data may be used to identify and interpret unlawful ways in which the device was used. This paper is centres around an empirical learning approach identifying techniques to address the device’s acquirable limitations taking into consideration that the owner may not willingly present login …
Satellite Navigation Forensics Techniques, Peter Hannay
Satellite Navigation Forensics Techniques, Peter Hannay
Australian Digital Forensics Conference
Satellite navigation systems are becoming increasingly common for automotive use within the civilian population. This increase in use is of interest to forensic investigators as satellite navigation devices have the potential to provide historical location data to investigators. The research in progress investigates the data sources and encoding on a number of common satellite navigation devices. The aim of this research is to develop a framework for the acquisition and analysis of common satellite navigation systems in a way that valid for multiple device
The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli
The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli
Australian Digital Forensics Conference
The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security …
Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters
Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters
Australian Digital Forensics Conference
Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on …
Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma
Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma
Australian Digital Forensics Conference
Common law countries have been struggling with electronic data in regard to their discovery rules from the first digital document. All major common law countries, including Australia, New Zealand, Australia, United Kingdom, Canada, South Africa and the United States have recently changed their rules of discovery in an attempt to make sense of all this data and determine what, when and how data should be disclosed by parties in litigation. Case law in these countries has been defining the responsibilities of potential parties and attorneys to prepare for litigation that might happen. The case that was the catalyst of change …
Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma
Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma
Australian Digital Forensics Conference
Electronic discovery has been the source of difficult challenges for courts, lawyers, and litigants from the beginning. The methods, document formats, and scope of electronic discovery have all contributed to the difficulties encountered. The seminal case in the United States that underscores the nature of the difficulties and challenges facing lawyers and courts in electronic discovery is Qualcomm v. Broadcom. While the case has been cited as an example of the ethical issues facing lawyers who do not follow the rules of discovery, the lessons go well beyond ethical issues. All major common law countries, including Australia, New Zealand, United …
Automatic Detection Of Child Pornography, Glen Thompson
Automatic Detection Of Child Pornography, Glen Thompson
Australian Digital Forensics Conference
Before the introduction of the internet, the availability of child pornography was reported as on the decline (Jenkins 2001). Since its emergence, however, the internet has made child pornography a much more accessible and available means of trafficking across borders (Biegel 2001; Jenkins 2001; Wells, Finkelhor et al. 2007). The internet as it is at present is made up of a vast array of protocols and networks where traffickers can anonymously share large volumes of illegal material amongst each other from locations with relaxed or non-existent laws that prohibit the possession or trafficking of illegal material. Likewise the internet is …
Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward
Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward
Australian Digital Forensics Conference
This paper discusses an experimental method for creating a 1st generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating system. This is an experimental method as there are currently no known malicious smart-phone worms. Honeyd emulates devices by mimicking the devices operating system fingerprint which is created by the unique responses each operating system sends to a discrete series of TCP and …
Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward
Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward
Australian Digital Forensics Conference
The research aimed to determine the efficacy and integrity of several hard-drive disk deletion tools on solid state drives (SSDs). SSDs contain new technologies such as wear-levelling and device under provisioning to provide efficient functionality and speed for data management, but the same technologies may also provide obstacles to ensuring that all information is fully removed from the drive. Furthermore SSDs stores files in 4KB pages, yet data can only be deleted in 512KB blocks. This function uses the disk controller to remove all the pages from the block a file is being deleted from, storing the pages in a …
The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi
The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi
Australian Digital Forensics Conference
The use of the USB storage device, also known as the USB drive, a thumb drive, a keychain drive and a flash drive has, for the most part, replaced the floppy disk and to some extent the Compact Disk (CD), the DVD (Digital Video Disk or Digital Versatile Disk) and the external hard disk. Their robustness, size and weight make them easy to transport, but also to lose or misplace. They are inexpensive and are often given away as promotional items by organisations. Over the last few years there has been a dramatic increase in the storage capacity of these …
Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo
Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo
Australian Digital Forensics Conference
This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators. Then will be presented an advanced test in which some brand new flash memories have been used to hide data in man-made bad blocks: the aim is to verify if forensic software tools are able to acquire data from such blocks, and to evaluate the possibility …
A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah
A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah
Australian Digital Forensics Conference
Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perform data extraction on a logical level and do not consider the type of storage media during data analysis. This report suggests different low level approaches for the forensic examination of flash memories and describes three lowlevel data acquisition methods for making full memory copies of flash memory devices. Results of a file system study in which USB memory sticks from 45 different make and models were used are presented. For different mobile phones, this paper shows how full memory copies of their flash memories can …
Alternating Links And Subdivision Rules, Brian Craig Rushton
Alternating Links And Subdivision Rules, Brian Craig Rushton
Theses and Dissertations
The study of geometric group theory has suggested several theorems related to subdivision tilings that have a natural hyperbolic structure. However, few examples exist. We construct subdivision tilings for the complement of every nonsingular, prime alternating link and all torus links, and explore some of their properties and applications. Several examples are exhibited with color coding of tiles.
Kinematic Behavior Of Southern Alaska Constrained By Westward Decreasing Postglacial Slip Rates On The Denali Fault, Alaska, A.-S. Mériaux, K. Sieh, R. C. Finkel, Charles M. Rubin, M. H. Taylor, A. J. Meltzner, F. J. Ryerson
Kinematic Behavior Of Southern Alaska Constrained By Westward Decreasing Postglacial Slip Rates On The Denali Fault, Alaska, A.-S. Mériaux, K. Sieh, R. C. Finkel, Charles M. Rubin, M. H. Taylor, A. J. Meltzner, F. J. Ryerson
All Faculty Scholarship for the College of the Sciences
Long‐term slip rates for the Denali Fault in southern Alaska are derived using 10Be cosmogenic radionuclide (CRN) dating of offset glacial moraines at two sites. Correction of 10Be CRN model ages for the effect of snow shielding uses historical, regional snow cover data scaled to the site altitudes. To integrate the time variation of snow cover, we included the relative changes in effective wetness over the last 11 ka, derived from lake‐level records and δ 18O variations from Alaskan lakes. The moraine CRN model ages are normally distributed around an average of 12.1 ± 1.0 ka (n …
A Framework For Superimposed Applications : Techniques To Represent, Access, Transform, And Interchange Bi-Level Information, Sudarshan Srivivasa Murthy
A Framework For Superimposed Applications : Techniques To Represent, Access, Transform, And Interchange Bi-Level Information, Sudarshan Srivivasa Murthy
Dissertations and Theses
Superimposed applications (SAs) superimpose (that is, overlay) new information and structures (such as annotations) on parts (such as sub-documents) of existing base information (BI). In this setting, SA developers and users work with bi-level information, a combination of the superimposed information and the referenced BI parts.
We have designed a framework to assist SAs in the following bi-level-information-management activities: representation, access, transformation, and interchange. This framework defines the abstraction context agent to activate any BI part and to retrieve information from the context of the part. It includes means to represent and access bi-level information in a conceptual model (the …
Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy
Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy
Theses and Dissertations
With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …
The 20-Minute Genealogist: A Context-Preservation Metaphor For Assisted Family History Research, Charles D. Knutson, Jonathan Krein
The 20-Minute Genealogist: A Context-Preservation Metaphor For Assisted Family History Research, Charles D. Knutson, Jonathan Krein
Faculty Publications
What can you possibly do to be productive as a family history researcher in 20 minutes per week? Our studies suggest that currently the answer is, “Nothing.” In 20 minutes a would-be researcher can’t even remember what happened last week, let alone what they were planning to do next. The 20-Minute Genealogist is a powerful metaphor within which software solutions must consider context preservation as the fundamental domain of the system, thus freeing the researcher to do research while the software manages the tasks that computers do best. Two survey-based studies were conducted that indicate a significant disconnect between the …
A Regenerable Filter For Liquid Argon Purification, Mitchell Soderberg, A. Curioni
A Regenerable Filter For Liquid Argon Purification, Mitchell Soderberg, A. Curioni
Physics - All Scholarship
A filter system for removing electronegative impurities from liquid argon is described. The active components of the filter are adsorbing molecular sieve and activated-copper-coated alumina granules. The system is capable of purifying liquid argon to an oxygen-equivalent impurity concentration of better than 30 parts per trillion, corresponding to an electron drift lifetime of at least 10 ms. Reduction reactions that occur at about 250 degrees Celsius allow the filter material to be regenerated in-situ through a simple procedure. In the following work we describe the filter design, performance, and regeneration process.
E-Science @ The University Of Massachusetts, Maxine G. Schmidt, Rebecca Reznik-Zellen, Raquel Rivera, Cecilia P. Mullen
E-Science @ The University Of Massachusetts, Maxine G. Schmidt, Rebecca Reznik-Zellen, Raquel Rivera, Cecilia P. Mullen
Maxine G Schmidt
e-Science @ the University of Massachusetts Abstract: What is e-Science and how can libraries and librarians support it? The University of Massachusetts takes a proactive approach to support network-enabled research on its campuses and provides examples where e-Science is already at work. Statement: “e-Science” is a term commonly used to describe research in a networked environment, a growing trend not only in the sciences, but the arts and humanities as well. e-Science creates both opportunities and challenges for academic libraries. The opportunities lie in leveraging the basic skill set that libraries and librarians already possess: the knowledge of and practical …
Measurement Of Direct Ƒ0(980) Photoproduction On The Proton, M. Battaglieri, Gerard P. Gilfoyle, Et. Al.
Measurement Of Direct Ƒ0(980) Photoproduction On The Proton, M. Battaglieri, Gerard P. Gilfoyle, Et. Al.
Physics Faculty Publications
We report on the results of the first measurement of exclusive ƒ0(980) meson photoproduction on protons for Eγ = 3.0–3.8 GeV and -t = 0.4–1.0 GeV2. Data were collected with the CLAS detector at the Thomas Jefferson National Accelerator Facility. The resonance was detected via its decay in the π+ π- channel by performing a partial wave analysis of the reaction γ p → pπ+π-. Clear evidence of the ƒ0(980) meson was found in the interference between P and S waves at Mπ+π …
Jet Fuel Hedging Strategies For The Department Of Defense Through Use Of Financial Derivatives, William T. Gibson
Jet Fuel Hedging Strategies For The Department Of Defense Through Use Of Financial Derivatives, William T. Gibson
Theses and Dissertations
The primary purpose of this research is to assess the practicality of utilizing some of the financial derivative products available on the market today in an effort to mitigate monetary losses due to the increasing price of jet fuel, thereby increasing stability in the DOD budget. The scope of this research will focus on the use of futures and call option contracts. Domestic jet fuel expenditure data was collected for Fiscal Years 1996 to 2007 and cross-referenced with the contract process of the previously mentioned financial hedging instruments during the same period of time. Results from the ex post facto …
Measuring Skill Importance In Women's Soccer And Volleyball, Michelle L. Allan
Measuring Skill Importance In Women's Soccer And Volleyball, Michelle L. Allan
Theses and Dissertations
The purpose of this study is to demonstrate how to measure skill importance for two sports: soccer and volleyball. A division I women's soccer team filmed each home game during a competitive season. Every defensive, dribbling, first touch, and passing skill was rated and recorded for each team. It was noted whether each sequence of plays led to a successful shot. A hierarchical Bayesian logistic regression model is implemented to determine how the performance of the skill affects the probability of a successful shot. A division I women's volleyball team rated each skill (serve, pass, set, etc.) and recorded rally …
Sodium And Potassiumvapor Faraday Filters Re-Visited: Theory And Applications, S. D. Harrell, C. Y. She, Tao Yuan, D. A. Krueger, H. Chen, S. Chen, Z. L. Hu
Sodium And Potassiumvapor Faraday Filters Re-Visited: Theory And Applications, S. D. Harrell, C. Y. She, Tao Yuan, D. A. Krueger, H. Chen, S. Chen, Z. L. Hu
All Physics Faculty Publications
A complete theory describing the transmission of atomic vapor Faraday filters is developed. The dependence of the filter transmission on atomic density and external magnetic field strength, as well as the frequency dependence of transmission, are explained in physical terms. As examples, applications of the computed results to ongoing research to suppress sky background, thus allowing Na lidar operation under sunlit conditions, and to enable measurement of the density of mesospheric oxygen atoms are briefly discussed.