Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 3631 - 3660 of 7616

Full-Text Articles in Physical Sciences and Mathematics

Crop Updates - 2009 Katanning, Murray Scholz, Peter Newman, Glenn Adam, Trevor Bell, Michael Whitehead, W. K. Anderson, C. Gazey, J. Andrew, R. Pearce, Bill Bowden, Wayne Pluske, Jeremy Lemon, D. C. Edmeades, J. J. Russell, B. H. Paynter, David Ferris, Abul Hashem, Catherine Borger, Stephen B. Powels, Qin Yu, Mechelle Owen, Roberto Busi, Sudheesh Manalil, Sally Peltzer, David Minkey, Raj Malik Mar 2009

Crop Updates - 2009 Katanning, Murray Scholz, Peter Newman, Glenn Adam, Trevor Bell, Michael Whitehead, W. K. Anderson, C. Gazey, J. Andrew, R. Pearce, Bill Bowden, Wayne Pluske, Jeremy Lemon, D. C. Edmeades, J. J. Russell, B. H. Paynter, David Ferris, Abul Hashem, Catherine Borger, Stephen B. Powels, Qin Yu, Mechelle Owen, Roberto Busi, Sudheesh Manalil, Sally Peltzer, David Minkey, Raj Malik

Crop Updates

This session covers seventeen papers from different authors

  1. GM canola – How will it affect the way I farm? Murray Scholz, 2008 Nuffield scholar, Southern NSW

  2. Eight years of IWM smashes tyegrass seed banks by 98% over 31 focus paddocks, Peter Newman, Glenn Adam & Trevor Bell, Department of Agriculture and Food

  3. The global economic climate and impacts on agriculture, profile on Michael Whitehead Rabobank New York

  4. Lessons from five years of cropping systems research, W.K. Anderson, Department of Agriculture and Food

  5. Case study of a 17year old agricultural lime trial, C. Gazey, Department of Agriculture …


Plateau Structure In Resonant Laser-Assisted Electron-Atom Scattering, A. V. Flegel, M. V. Frolov, N. L. Manakov, Anthony F. Starace Mar 2009

Plateau Structure In Resonant Laser-Assisted Electron-Atom Scattering, A. V. Flegel, M. V. Frolov, N. L. Manakov, Anthony F. Starace

Anthony F. Starace Publications

Orders of magnitude increases are predicted in the cross sections for electron-atom scattering accompanied by absorption or emission of n laser photons for incident electron energies at which the electron, by emitting μ laser photons, can be captured by the atom to form a negative ion. Enhancements are most significant in the plateau region (n >> μ) of the scattered electron spectrum, whose shape is predicted to replicate that of the ion’s (n + μ)-photon detachment spectrum.


Can't Find Your 404s?, Martin Klein, Frank Mccown, Joan Smith, Michael L. Nelson Mar 2009

Can't Find Your 404s?, Martin Klein, Frank Mccown, Joan Smith, Michael L. Nelson

Computer Science Presentations

PDF of a powerpoint presentation at the Santa Fe Complex, Santa Fe, New Mexico, March 13, 2009. Also available on Slideshare.


Dpi Considered Not Harmful, Matthias Bärwolff Mar 2009

Dpi Considered Not Harmful, Matthias Bärwolff

Matthias Bärwolff

There is a strong sentiment both in technology and in policy circles against deep packet inspection by ISPs as a means to augment their services or control and shape the uses of their network. We argue that the premise of full transparency of the network is no more viable, and should give way to a notion explicitly recognising the role of networks in assuming functions above the network layer on behalf of the end-systems, and the end-systems controlling, endorsing, and verifying the process of having functions delegated towards the network. Such a paradigm may be a step towards conceptualising an …


Search For The Photoexcitation Of Exotic Mesons In The Π+Π​+Π- System, M. Nozar, Gerard P. Gilfoyle, Et. Al. Mar 2009

Search For The Photoexcitation Of Exotic Mesons In The Π​+Π​+Π- System, M. Nozar, Gerard P. Gilfoyle, Et. Al.

Physics Faculty Publications

A search for exotic mesons in the π+π+π- system photoproduced by the charge exchange reaction γpπ+π+π- was carried out by the CLAS Collaboration at Jefferson Lab. A tagged-photon beam with energies in the 4.8 to 5.4 GeV range, produced through bremsstrahlung from a 5.744 GeV electron beam, was incident on a liquid-hydrogen target. A partial wave analysis was performed on a sample of 83 000 events, the highest such statistics to date in this reaction at these energies. The main objective of this study was to look …


Synthesis Of Magnetic Porous Hollow Silica Nanotubes For Drug Delivery, H. Ma, J. Tarr, M. A. Decoster, J. Mcnamara, D. Caruntu, J. F. Chen, Charles J. O'Connor, Weilie Zhou Mar 2009

Synthesis Of Magnetic Porous Hollow Silica Nanotubes For Drug Delivery, H. Ma, J. Tarr, M. A. Decoster, J. Mcnamara, D. Caruntu, J. F. Chen, Charles J. O'Connor, Weilie Zhou

Chemistry Faculty Publications

In this paper, we report a synthesis of magnetic porous hollow silica nanotubes (MPHSNTs) using sol-gel method. The MPHSNTs were fabricated by coating Fe(3)O(4) nanoparticles and silica on surfactant hexadecyltrimethylammonium bromide (CTAB) modified CaCO(3) nanoneedles surface under alkaline condition. CaCO(3) nanoneedles and surfactant CTAB are introduced as nanotemplates to form the hollow and porous structures, respectively. After removing CTAB by calcination and etching CaCO(3) nanoneedles away in diluted acetic acid, magnetic porous hollow silica nanotubes with Fe(3)O(4) nanoparticles embedded in the silica shell were achieved. The products were characterized by scanning electron microscopy, transmission electron microscopy, and N(2) adsorption-desorption isotherms. …


Project Update: Taunton River Watershed Management Plan (March 12, 2009 Meeting), Horsley Witten Group, Inc. Mar 2009

Project Update: Taunton River Watershed Management Plan (March 12, 2009 Meeting), Horsley Witten Group, Inc.

Public Meetings

No abstract provided.


Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk Mar 2009

Adsl Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

Australian Digital Forensics Conference

The demand for high-speed Internet access is escalating high sales of ADSL routers. In-turn this has prompted individuals to attack and exploit the vulnerabilities in these devices. To respond to these threats, methods of acquisition and analysis are needed. The configuration data provides a wealth of information into the current state of the device. Hence, this data may be used to identify and interpret unlawful ways in which the device was used. This paper is centres around an empirical learning approach identifying techniques to address the device’s acquirable limitations taking into consideration that the owner may not willingly present login …


Satellite Navigation Forensics Techniques, Peter Hannay Mar 2009

Satellite Navigation Forensics Techniques, Peter Hannay

Australian Digital Forensics Conference

Satellite navigation systems are becoming increasingly common for automotive use within the civilian population. This increase in use is of interest to forensic investigators as satellite navigation devices have the potential to provide historical location data to investigators. The research in progress investigates the data sources and encoding on a number of common satellite navigation devices. The aim of this research is to develop a framework for the acquisition and analysis of common satellite navigation systems in a way that valid for multiple device


The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli Mar 2009

The Not So Smart, Smart Grid: Potential Security Risks Associated With Thedeployment Of Smart Grid Technologies, Craig Valli

Australian Digital Forensics Conference

The electricity grid has been up until now a relatively stable artifice of modern industrialized nations. The power grids are the most widespread wired networks in the world. They are heavily regulated and standardized to protect the integrity, stability and reliability of supply. The grids have been essentially closed systems, this is now rapidly changing with the introduction of the network enabled smart meter. These meters are “web” accessible, connect and interact directly with electrical appliances in domiciles and businesses. This move now brings a range of extreme risks and complexities into these stable networks. This paper explores the security …


Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters Mar 2009

Cybercrime Attribution: An Eastern European Case Study, Stephen Mccombie, Josef Pieprzyk, Paul Watters

Australian Digital Forensics Conference

Phishing and related cybercrime is responsible for billions of dollars in losses annually. Gartner reported more than 5 million U.S. consumers lost money to phishing attacks in the 12 months ending in September 2008 (Gartner 2009). This paper asks whether the majority of organised phishing and related cybercrime originates in Eastern Europe rather than elsewhere such as China or the USA. The Russian “Mafiya” in particular has been popularised by the media and entertainment industries to the point where it can be hard to separate fact from fiction but we have endeavoured to look critically at the information available on …


Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma Mar 2009

Zubulake: The Catalyst For Change In Ediscovery, Penny Herickhoff, Vicki M. Luoma

Australian Digital Forensics Conference

Common law countries have been struggling with electronic data in regard to their discovery rules from the first digital document. All major common law countries, including Australia, New Zealand, Australia, United Kingdom, Canada, South Africa and the United States have recently changed their rules of discovery in an attempt to make sense of all this data and determine what, when and how data should be disclosed by parties in litigation. Case law in these countries has been defining the responsibilities of potential parties and attorneys to prepare for litigation that might happen. The case that was the catalyst of change …


Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma Mar 2009

Qualcomm V. Broadcom: Implications For Electronic Discovery, Milton H. Luoma, Vicki M. Luoma

Australian Digital Forensics Conference

Electronic discovery has been the source of difficult challenges for courts, lawyers, and litigants from the beginning. The methods, document formats, and scope of electronic discovery have all contributed to the difficulties encountered. The seminal case in the United States that underscores the nature of the difficulties and challenges facing lawyers and courts in electronic discovery is Qualcomm v. Broadcom. While the case has been cited as an example of the ethical issues facing lawyers who do not follow the rules of discovery, the lessons go well beyond ethical issues. All major common law countries, including Australia, New Zealand, United …


Automatic Detection Of Child Pornography, Glen Thompson Mar 2009

Automatic Detection Of Child Pornography, Glen Thompson

Australian Digital Forensics Conference

Before the introduction of the internet, the availability of child pornography was reported as on the decline (Jenkins 2001). Since its emergence, however, the internet has made child pornography a much more accessible and available means of trafficking across borders (Biegel 2001; Jenkins 2001; Wells, Finkelhor et al. 2007). The internet as it is at present is made up of a vast array of protocols and networks where traffickers can anonymously share large volumes of illegal material amongst each other from locations with relaxed or non-existent laws that prohibit the possession or trafficking of illegal material. Likewise the internet is …


Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward Mar 2009

Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward

Australian Digital Forensics Conference

This paper discusses an experimental method for creating a 1st generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating system. This is an experimental method as there are currently no known malicious smart-phone worms. Honeyd emulates devices by mimicking the devices operating system fingerprint which is created by the unique responses each operating system sends to a discrete series of TCP and …


Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward Mar 2009

Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward

Australian Digital Forensics Conference

The research aimed to determine the efficacy and integrity of several hard-drive disk deletion tools on solid state drives (SSDs). SSDs contain new technologies such as wear-levelling and device under provisioning to provide efficient functionality and speed for data management, but the same technologies may also provide obstacles to ensuring that all information is fully removed from the drive. Furthermore SSDs stores files in 4KB pages, yet data can only be deleted in 512KB blocks. This function uses the disk controller to remove all the pages from the block a file is being deleted from, storing the pages in a …


The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi Mar 2009

The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi

Australian Digital Forensics Conference

The use of the USB storage device, also known as the USB drive, a thumb drive, a keychain drive and a flash drive has, for the most part, replaced the floppy disk and to some extent the Compact Disk (CD), the DVD (Digital Video Disk or Digital Versatile Disk) and the external hard disk. Their robustness, size and weight make them easy to transport, but also to lose or misplace. They are inexpensive and are often given away as promotional items by organisations. Over the last few years there has been a dramatic increase in the storage capacity of these …


Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo Mar 2009

Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo

Australian Digital Forensics Conference

This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators. Then will be presented an advanced test in which some brand new flash memories have been used to hide data in man-made bad blocks: the aim is to verify if forensic software tools are able to acquire data from such blocks, and to evaluate the possibility …


A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah Mar 2009

A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah

Australian Digital Forensics Conference

Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perform data extraction on a logical level and do not consider the type of storage media during data analysis. This report suggests different low level approaches for the forensic examination of flash memories and describes three lowlevel data acquisition methods for making full memory copies of flash memory devices. Results of a file system study in which USB memory sticks from 45 different make and models were used are presented. For different mobile phones, this paper shows how full memory copies of their flash memories can …


Alternating Links And Subdivision Rules, Brian Craig Rushton Mar 2009

Alternating Links And Subdivision Rules, Brian Craig Rushton

Theses and Dissertations

The study of geometric group theory has suggested several theorems related to subdivision tilings that have a natural hyperbolic structure. However, few examples exist. We construct subdivision tilings for the complement of every nonsingular, prime alternating link and all torus links, and explore some of their properties and applications. Several examples are exhibited with color coding of tiles.


Kinematic Behavior Of Southern Alaska Constrained By Westward Decreasing Postglacial Slip Rates On The Denali Fault, Alaska, A.-S. Mériaux, K. Sieh, R. C. Finkel, Charles M. Rubin, M. H. Taylor, A. J. Meltzner, F. J. Ryerson Mar 2009

Kinematic Behavior Of Southern Alaska Constrained By Westward Decreasing Postglacial Slip Rates On The Denali Fault, Alaska, A.-S. Mériaux, K. Sieh, R. C. Finkel, Charles M. Rubin, M. H. Taylor, A. J. Meltzner, F. J. Ryerson

All Faculty Scholarship for the College of the Sciences

Long‐term slip rates for the Denali Fault in southern Alaska are derived using 10Be cosmogenic radionuclide (CRN) dating of offset glacial moraines at two sites. Correction of 10Be CRN model ages for the effect of snow shielding uses historical, regional snow cover data scaled to the site altitudes. To integrate the time variation of snow cover, we included the relative changes in effective wetness over the last 11 ka, derived from lake‐level records and δ 18O variations from Alaskan lakes. The moraine CRN model ages are normally distributed around an average of 12.1 ± 1.0 ka (n …


A Framework For Superimposed Applications : Techniques To Represent, Access, Transform, And Interchange Bi-Level Information, Sudarshan Srivivasa Murthy Mar 2009

A Framework For Superimposed Applications : Techniques To Represent, Access, Transform, And Interchange Bi-Level Information, Sudarshan Srivivasa Murthy

Dissertations and Theses

Superimposed applications (SAs) superimpose (that is, overlay) new information and structures (such as annotations) on parts (such as sub-documents) of existing base information (BI). In this setting, SA developers and users work with bi-level information, a combination of the superimposed information and the referenced BI parts.

We have designed a framework to assist SAs in the following bi-level-information-management activities: representation, access, transformation, and interchange. This framework defines the abstraction context agent to activate any BI part and to retrieve information from the context of the part. It includes means to represent and access bi-level information in a conceptual model (the …


Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy Mar 2009

Using Covert Means To Establish Cybercraft Command And Control, Bradley D. Sevy

Theses and Dissertations

With the increase in speed and availability of computers, our nation's computer and information systems are being attacked with increased sophistication. The Air Force Research Laboratory (AFRL) Information Directorate (RI) is researching a next generation network defense architecture, called Cybercraft, that provides automated and trusted cyber defense capabilities for AF network assets. This research we consider the issues to protect or obfuscate command and control aspects of Cybercraft. In particular, we present a methodology to hide aspects of Cybercraft platform initialization in context to formation of hierarchical, peer-to-peer groups that collectively form the Cybercraft network. Because malicious code networks (known …


The 20-Minute Genealogist: A Context-Preservation Metaphor For Assisted Family History Research, Charles D. Knutson, Jonathan Krein Mar 2009

The 20-Minute Genealogist: A Context-Preservation Metaphor For Assisted Family History Research, Charles D. Knutson, Jonathan Krein

Faculty Publications

What can you possibly do to be productive as a family history researcher in 20 minutes per week? Our studies suggest that currently the answer is, “Nothing.” In 20 minutes a would-be researcher can’t even remember what happened last week, let alone what they were planning to do next. The 20-Minute Genealogist is a powerful metaphor within which software solutions must consider context preservation as the fundamental domain of the system, thus freeing the researcher to do research while the software manages the tasks that computers do best. Two survey-based studies were conducted that indicate a significant disconnect between the …


A Regenerable Filter For Liquid Argon Purification, Mitchell Soderberg, A. Curioni Mar 2009

A Regenerable Filter For Liquid Argon Purification, Mitchell Soderberg, A. Curioni

Physics - All Scholarship

A filter system for removing electronegative impurities from liquid argon is described. The active components of the filter are adsorbing molecular sieve and activated-copper-coated alumina granules. The system is capable of purifying liquid argon to an oxygen-equivalent impurity concentration of better than 30 parts per trillion, corresponding to an electron drift lifetime of at least 10 ms. Reduction reactions that occur at about 250 degrees Celsius allow the filter material to be regenerated in-situ through a simple procedure. In the following work we describe the filter design, performance, and regeneration process.


E-Science @ The University Of Massachusetts, Maxine G. Schmidt, Rebecca Reznik-Zellen, Raquel Rivera, Cecilia P. Mullen Mar 2009

E-Science @ The University Of Massachusetts, Maxine G. Schmidt, Rebecca Reznik-Zellen, Raquel Rivera, Cecilia P. Mullen

Maxine G Schmidt

e-Science @ the University of Massachusetts Abstract: What is e-Science and how can libraries and librarians support it? The University of Massachusetts takes a proactive approach to support network-enabled research on its campuses and provides examples where e-Science is already at work. Statement: “e-Science” is a term commonly used to describe research in a networked environment, a growing trend not only in the sciences, but the arts and humanities as well. e-Science creates both opportunities and challenges for academic libraries. The opportunities lie in leveraging the basic skill set that libraries and librarians already possess: the knowledge of and practical …


Measurement Of Direct Ƒ0(980) Photoproduction On The Proton, M. Battaglieri, Gerard P. Gilfoyle, Et. Al. Mar 2009

Measurement Of Direct Ƒ0(980) Photoproduction On The Proton, M. Battaglieri, Gerard P. Gilfoyle, Et. Al.

Physics Faculty Publications

We report on the results of the first measurement of exclusive ƒ0(980) meson photoproduction on protons for Eγ = 3.0–3.8 GeV and -t = 0.4–1.0 GeV2. Data were collected with the CLAS detector at the Thomas Jefferson National Accelerator Facility. The resonance was detected via its decay in the π+ π- channel by performing a partial wave analysis of the reaction γ ppπ+π-. Clear evidence of the ƒ0(980) meson was found in the interference between P and S waves at Mπ+π …


Jet Fuel Hedging Strategies For The Department Of Defense Through Use Of Financial Derivatives, William T. Gibson Mar 2009

Jet Fuel Hedging Strategies For The Department Of Defense Through Use Of Financial Derivatives, William T. Gibson

Theses and Dissertations

The primary purpose of this research is to assess the practicality of utilizing some of the financial derivative products available on the market today in an effort to mitigate monetary losses due to the increasing price of jet fuel, thereby increasing stability in the DOD budget. The scope of this research will focus on the use of futures and call option contracts. Domestic jet fuel expenditure data was collected for Fiscal Years 1996 to 2007 and cross-referenced with the contract process of the previously mentioned financial hedging instruments during the same period of time. Results from the ex post facto …


Measuring Skill Importance In Women's Soccer And Volleyball, Michelle L. Allan Mar 2009

Measuring Skill Importance In Women's Soccer And Volleyball, Michelle L. Allan

Theses and Dissertations

The purpose of this study is to demonstrate how to measure skill importance for two sports: soccer and volleyball. A division I women's soccer team filmed each home game during a competitive season. Every defensive, dribbling, first touch, and passing skill was rated and recorded for each team. It was noted whether each sequence of plays led to a successful shot. A hierarchical Bayesian logistic regression model is implemented to determine how the performance of the skill affects the probability of a successful shot. A division I women's volleyball team rated each skill (serve, pass, set, etc.) and recorded rally …


Sodium And Potassiumvapor Faraday Filters Re-Visited: Theory And Applications, S. D. Harrell, C. Y. She, Tao Yuan, D. A. Krueger, H. Chen, S. Chen, Z. L. Hu Mar 2009

Sodium And Potassiumvapor Faraday Filters Re-Visited: Theory And Applications, S. D. Harrell, C. Y. She, Tao Yuan, D. A. Krueger, H. Chen, S. Chen, Z. L. Hu

All Physics Faculty Publications

A complete theory describing the transmission of atomic vapor Faraday filters is developed. The dependence of the filter transmission on atomic density and external magnetic field strength, as well as the frequency dependence of transmission, are explained in physical terms. As examples, applications of the computed results to ongoing research to suppress sky background, thus allowing Na lidar operation under sunlit conditions, and to enable measurement of the density of mesospheric oxygen atoms are briefly discussed.