Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2009

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 5491 - 5520 of 7615

Full-Text Articles in Physical Sciences and Mathematics

Lee O. Case's "Elements Of The Phase Rule", Chapter 1, One Component Systems, Carl W. David Jan 2009

Lee O. Case's "Elements Of The Phase Rule", Chapter 1, One Component Systems, Carl W. David

Chemistry Education Materials

One component systems are treated from the point of view of the Gibbs' phase rule.


Lee O Case's "Elements Of The Phase Rule", Chapter 3, Carl W. David Jan 2009

Lee O Case's "Elements Of The Phase Rule", Chapter 3, Carl W. David

Chemistry Education Materials

This is the last (third) chapter of the phase rule text, again altered by the author, addressing 3 and 4 compnent systems.


Understanding The Physical Properties That Control Protein Crystallization By Analysis Of Largescale Experimental Data, W. Nicholson Price Ii, Yang Chen, Samuel K. Handelman, Helen Neely, Philip Manor, Richard Karlin, Rajesh Nair, Jinfeng Liu, Michael Baran, John Everett, Saichiu N. Tong, Farhad Forouhar, Swarup S. Swaminathan, Thomas Acton, Rong Xiao, Joseph R. Luft, Angela Lauricella, George T. Detitta, Burkhard Rost, Gaetano T. Montelione, John T. Hunt Jan 2009

Understanding The Physical Properties That Control Protein Crystallization By Analysis Of Largescale Experimental Data, W. Nicholson Price Ii, Yang Chen, Samuel K. Handelman, Helen Neely, Philip Manor, Richard Karlin, Rajesh Nair, Jinfeng Liu, Michael Baran, John Everett, Saichiu N. Tong, Farhad Forouhar, Swarup S. Swaminathan, Thomas Acton, Rong Xiao, Joseph R. Luft, Angela Lauricella, George T. Detitta, Burkhard Rost, Gaetano T. Montelione, John T. Hunt

Law Faculty Scholarship

Crystallization is the most serious bottleneck in high-throughput protein-structure determination by diffraction methods. We have used data mining of the large-scale experimental results of the Northeast Structural Genomics Consortium and experimental folding studies to characterize the biophysical properties that control protein crystallization. This analysis leads to the conclusion that crystallization propensity depends primarily on the prevalence of well-ordered surface epitopes capable of mediating interprotein interactions and is not strongly influenced by overall thermodynamic stability. We identify specific sequence features that correlate with crystallization propensity and that can be used to estimate the crystallization probability of a given construct. Analyses of …


Evaluation Of Silica Monoliths In Affinity Microcolumns For High-Throughput Analysis Of Drug–Protein Interactions, Michelle J. Yoo, David S. Hage Jan 2009

Evaluation Of Silica Monoliths In Affinity Microcolumns For High-Throughput Analysis Of Drug–Protein Interactions, Michelle J. Yoo, David S. Hage

David Hage Publications

Silica monoliths in affinity microcolumns were tested for the high-throughput analysis of drug–protein interactions. HSA was used as a model protein for this work, while carbamazepine and R-warfarin were used as model analytes. A comparison of HSA silica monoliths of various lengths indicated columns as short as 1 to 3 mm could be used to provide reproducible estimates of retention factors or plate heights. Benefits of using smaller columns for this work included the lower retention times and lower back pressures that could be obtained versus traditional HPLC affinity columns, as well as the smaller amount of protein that …


Microstructures And Magnetic Properties Of Rapidly Solidified Ni54Fe27−2xGa19+2x Ferromagnetic Heusler Alloys, S. Aich, S. Das, I. A. Al-Omari, P. Alagarsamy, S. G. Chowdhury, M. Chakraborty, Jeffrey E. Shield, David J. Sellmyer Jan 2009

Microstructures And Magnetic Properties Of Rapidly Solidified Ni54Fe27−2xGa19+2x Ferromagnetic Heusler Alloys, S. Aich, S. Das, I. A. Al-Omari, P. Alagarsamy, S. G. Chowdhury, M. Chakraborty, Jeffrey E. Shield, David J. Sellmyer

David Sellmyer Publications

Rapidly solidified Ni54Fe27−2xGa19+2x (x=0, 1, 2, 3, and 4) ferromagnetic shape memory alloys were made by melt-spinning with variation of Fe and Ga contents to report on the martensitic phase transformation, microstructures, and magnetic properties. Rapid solidification produced pure L21 phase by preventing the formation of γ-phase. To study the effect of heat treatment on the phase transitions, microstructures, and the magnetic properties, the melt-spun ribbons were partly heat treated at different temperatures of 800, 900, 1000, 1100, and 1200 K with holding times of 5, 10, and 15 min followed by either water …


Ha'shual Vehakerem: מּנּנּיִﬠתּ נּזּקּיִסּ שׁלּ יִוּנּקּיִסּ וּﬠוּפּוּתּ לּהּקּלּאּוּתּ הּשׁוּﬠלּ וּהּכּךּסּ, Simon C. Nemtzov Jan 2009

Ha'shual Vehakerem: מּנּנּיִﬠתּ נּזּקּיִסּ שׁלּ יִוּנּקּיִסּ וּﬠוּפּוּתּ לּהּקּלּאּוּתּ הּשׁוּﬠלּ וּהּכּךּסּ, Simon C. Nemtzov

Other Publications in Wildlife Management

"The Fox and the Vineyard: Preventing Damage to Agriculture from Birds and Mammals" The document is in Hebrew.

On preventing wildlife damage from the 9 major problematic groups in Israel, which are:
Indian crested porcupines
Brown hare
Canids (wolves, jackals and foxes)
Hyrax
Corvids (crows, jays, jackdaw)
Song birds (bulbul, larks, starlings, etc).
Syrian woodpecker
Rose-ringed parakeet

(The site administrator begs forgiveness for his goyische butchering of the Hebrew in the title.)


Waterfowl Habitat Management Handbook For The Lower Mississippi River Valley, Bronson K. Strickland, Richard M. Kaminski, Kevin Nelms, Adam Tullos, Andrew W. Ezell, Billy Hill, Kris Casscles Godwin, Joshua C. Chester, John D. Madsen Jan 2009

Waterfowl Habitat Management Handbook For The Lower Mississippi River Valley, Bronson K. Strickland, Richard M. Kaminski, Kevin Nelms, Adam Tullos, Andrew W. Ezell, Billy Hill, Kris Casscles Godwin, Joshua C. Chester, John D. Madsen

Other Publications in Wildlife Management

To sustain waterfowl populations at levels of the 1970s, as prescribed by the North American Waterfowl Management Plan (1986), private landowners must continue to provide habitat for wetland wildlife. Private landowners oversee the majority of wetlands remaining in the United States, so their cooperation is essential to any major conservation effort to restore and sustain waterfowl populations in the Mississippi Flyway. Many groups have worked together since the 1980s to develop waterfowl habitat on private lands.Much progress has been made, and this publication helps guide continuing efforts. This publication is for private landowners in the Lower Mississippi Flyway who want …


The Efficacy Of Ovocontrol® P (Nicarbazin) As A Contraceptive For Pigeons In Urban Ipm, Alexander Macdonald, Erick Wolfe Jan 2009

The Efficacy Of Ovocontrol® P (Nicarbazin) As A Contraceptive For Pigeons In Urban Ipm, Alexander Macdonald, Erick Wolfe

Other Publications in Wildlife Management

Pigeons are found in virtually all urban and developed areas of the United States. They are considered a pest species and provided no protection under federal or state laws that safeguard other birds. Pigeons cause extensive property damage and are a source of public health risk and disease.

Pigeons are commonly poisoned with non-selective toxicants. OvoControl (brand of nicarbazin) provides a non-toxic and humane alternative -- contraception or “birth control” for birds. Developed in collaboration with the USDA National Wildlife Research Center in Fort Collins, CO and Experiment Station in Gainesville, FL, OvoControl P for pigeons was registered by EPA …


Use Of Partial-Wave Decomposition To Identify Resonant Interference Effects In The Photoionization–Excitation Of Argon, Timothy J. Gay, Chris H. Greene, J. R. Machacek, K. W. Mclaughlin, H. W. Van Der Hart, Orhan Yenen, Duane H. Jaecks Jan 2009

Use Of Partial-Wave Decomposition To Identify Resonant Interference Effects In The Photoionization–Excitation Of Argon, Timothy J. Gay, Chris H. Greene, J. R. Machacek, K. W. Mclaughlin, H. W. Van Der Hart, Orhan Yenen, Duane H. Jaecks

Timothy J. Gay Publications

We have studied simultaneous photoionization and excitation of Ar in the range of incident photon energies between 36.00 and 36.36 eV, where the resonant production of doubly excited neutral Ar states imbedded in the ionization continuum is dominant. By measuring the relative Stokes parameters of the fluorescence from residual Ar+∗ (3p4 [3P] 4p) ions (2P1/2, 465.8 nm transition; 2P3/2, 476.5 nm; 2D3/2, 472.7 nm; 2D5/2, 488.0 nm; 4P5/2, 480.6 nm; 4D5/2, 514.5 nm) we demonstrate a technique …


A Mountain Of Evidence (Faith & Science Update), John T. Baldwin Jan 2009

A Mountain Of Evidence (Faith & Science Update), John T. Baldwin

Perspective Digest

No abstract provided.


Spin Quantum Dynamics In Molecular Magnets, John Henderson Jan 2009

Spin Quantum Dynamics In Molecular Magnets, John Henderson

Electronic Theses and Dissertations

Molecular magnets are ideal systems to probe the realm that borders quantum and classical physics, as well as to study decoherence phenomena in nanoscale systems. The control of the quantum behavior of these materials and their structural characteristics requires synthesis of new complexes with desirable properties which will allow probing of the fundamental aspects of nanoscale physics and quantum information processing. Of particular interest among the magnetic molecular materials are single-molecule magnets (SMMs) and antiferromagnetic (AFM) molecular wheels in which the spin state of the molecule is known to behave quantum mechanically at low temperatures. In previous experiments the dynamics …


The Validity Of Animal Experiments In Medical Research, Gill Langley Jan 2009

The Validity Of Animal Experiments In Medical Research, Gill Langley

Experimentation Collection

Other animals, such as mice, rats, rabbits, dogs and monkeys, are widely used as surrogates for humans in fundamental medical research. This involves creating disorders in animals by chemical, surgical or genetic means, with the aim of mimicking selected aspects of human illnesses.

It is a truism that any model or surrogate is not identical to the target being modelled. So, in medical research, experiments using animals or cell cultures or even healthy volunteers instead of patients (being the target population with the target illness) will inevitably have limitations, although these will be greater or lesser depending on the model.


The Minimization Of Research Animal Distress And Pain: Conclusions And Recommendations, Kathleen Conlee, Martin Stephens, Andrew N. Rowan Jan 2009

The Minimization Of Research Animal Distress And Pain: Conclusions And Recommendations, Kathleen Conlee, Martin Stephens, Andrew N. Rowan

Laboratory Experiments Collection

While the attention given to preventing, assessing, and alleviating pain in research animals has increased noticeably in recent decades, much remains to be done both in terms of implementing best practices and conducting studies to answer outstanding questions. In contrast, the attention to distress (particularly non-pain induced distress) has shown no comparable increase. There are many reasons for this discrepancy, including the conceptual untidiness of the distress concept, the paucity of pharmacological treatments for distress, and perceived lack of regulatory emphasis on distress. These are challenges that need to be addressed and overcome. This book is intended to help meet …


Green Chemistry Using Bismuth Compounds: Bismuth(Iii) Triflate Catalyzed Allylation Of Cyclic Acetals, Matthew J. Spafford, '09 Jan 2009

Green Chemistry Using Bismuth Compounds: Bismuth(Iii) Triflate Catalyzed Allylation Of Cyclic Acetals, Matthew J. Spafford, '09

Honors Projects

Cyclic acetals (dioxolanes, dioxanes, and dithianes) are common protecting groups in organic synthesis but they can also be converted to other useful functional groups. A bismuth(III) triflate-catalyzed multi component reaction involving the allylation of cyclic acetals followed by in situ derivatization with acid anhydrides to generate highly functionalized esters and thioesters has been developed under solvent-free conditions. Most reagents used to date for the allylation of cyclic acetals are highly corrosive or toxic and are often required in stoichiometric amounts. In contrast, the use of a relatively non-toxic and non-corrosive bismuth(III) based catalyst makes this methodology benign and attractive.


On The Application Of Locality To Network Intrusion Detection: Working-Set Analysis Of Real And Synthetic Network Server Traffic, Robert Lee Jan 2009

On The Application Of Locality To Network Intrusion Detection: Working-Set Analysis Of Real And Synthetic Network Server Traffic, Robert Lee

Electronic Theses and Dissertations

Keeping computer networks safe from attack requires ever-increasing vigilance. Our work on applying locality to network intrusion detection is presented in this dissertation. Network servers that allow connections from both the internal network and the Internet are vulnerable to attack from all sides. Analysis of the behavior of incoming connections for properties of locality can be used to create a normal profile for such network servers. Intrusions can then be detected due to their abnormal behavior. Data was collected from a typical network server both under normal conditions and under specific attacks. Experiments show that connections to the server do …


Book Review: Helping Students Learn In A Learner-Centered Environment By Terry Doyle (Stylus, 2008), Delena Bell Gatch Jan 2009

Book Review: Helping Students Learn In A Learner-Centered Environment By Terry Doyle (Stylus, 2008), Delena Bell Gatch

Department of Physics and Astronomy Faculty Publications

Excerpt: According to Terry Doyle in his book Helping Students Learn in a Learner-Centered Environment, “Most important, this book has been written to answer the single most asked question I hear when working with faculty groups: How do I help my students adjust to a learner-centered practice?” As desired, Doyle has offered some excellent answers for faculty struggling to transform their students into lifelong learners.


Synthesis Of 3,6-Bis(5’-Bromo-3’-Indolyl)-1,4-Dimethypiperazine-2,5-Dione, Stephen N. Crooke, C. Michele Davis Mcgibony, Christine R. Whitlock Jan 2009

Synthesis Of 3,6-Bis(5’-Bromo-3’-Indolyl)-1,4-Dimethypiperazine-2,5-Dione, Stephen N. Crooke, C. Michele Davis Mcgibony, Christine R. Whitlock

Department of Chemistry and Biochemistry Faculty Publications

The one-pot synthesis of 3,6-bis(5’-bromo-3’-indolyl)-1,4-dimethylpiperazine- 2,5-dione is reported. Sarcosine anhydride is brominated and immediately reacted with 5-bromoindole to produce the product, which is characterized by 1H NMR, MS and microanalysis.


Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre Jan 2009

Detection Of Steganography-Producing Software Artifacts On Crime-Related Seized Computers, Asawaree Kulkarni, James Goldman, Brad Nabholz, William Eyre

Journal of Digital Forensics, Security and Law

Steganography is the art and science of hiding information within information so that an observer does not know that communication is taking place. Bad actors passing information using steganography are of concern to the national security establishment and law enforcement. An attempt was made to determine if steganography was being used by criminals to communicate information. Web crawling technology was used and images were downloaded from Web sites that were considered as likely candidates for containing information hidden using steganographic techniques. A detection tool was used to analyze these images. The research failed to demonstrate that steganography was prevalent on …


Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler Jan 2009

Book Review: Cyber Security And Global Information Assurance: Threat Analysis And Response Solutions, Gary C. Kessler

Journal of Digital Forensics, Security and Law

I freely admit that this book was sent to me by the publisher for the expressed purpose of my writing a review and that I know several of the chapter authors. With that disclosure out of the way, let me say that the book is well worth the review (and I get to keep my review copy).
The preface to the book cites the 2003 publication of The National Strategy to Secure Cyberspace by the White House, and the acknowledgement by the U.S. government that our economy and national security were fully dependent upon computers, networks, and the telecommunications infrastructure. …


Prevention Is Better Than Prosecution: Deepening The Defence Against Cyber Crime, Jacqueline Fick Jan 2009

Prevention Is Better Than Prosecution: Deepening The Defence Against Cyber Crime, Jacqueline Fick

Journal of Digital Forensics, Security and Law

In the paper the author proposes that effectively and efficiently addressing cyber crime requires a shift in paradigm. For businesses and government departments alike the focus should be on prevention, rather than the prosecution of cyber criminals. The Defence in Depth strategy poses a practical solution for achieving Information Assurance in today’s highly networked environments. In a world where “absolute security” is an unachievable goal, the concept of Information Assurance poses significant benefits to securing one of an organization’s most valuable assets: Information. It will be argued that the approach of achieving Information Assurance within an organisation, coupled with the …


Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler Jan 2009

Bluetooth Hacking: A Case Study, Dennis Browning, Gary C. Kessler

Journal of Digital Forensics, Security and Law

This paper describes a student project examining mechanisms with which to attack Bluetooth-enabled devices. The paper briefly describes the protocol architecture of Bluetooth and the Java interface that programmers can use to connect to Bluetooth communication services. Several types of attacks are described, along with a detailed example of two attack tools, Bloover II and BT Info.


Table Of Contents Jan 2009

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Book Review: Humans In Outer Space-Interdisciplinary Odysseys, Studies In Space Policy, 1, T. D. Oswalt Jan 2009

Book Review: Humans In Outer Space-Interdisciplinary Odysseys, Studies In Space Policy, 1, T. D. Oswalt

Publications

This document is Dr. Oswalt’s review of Humans in Outer Space-Interdisciplinary Odysseys, Studies in Space Policy, 1. [ed.] by Luca Codignola and Kai-Uwe Schrogl with Agnieszka Lukaszczyk and Nicolas Peter SpringerWeinNewYork, 2009


Isolation And Analysis Of Cyanobacterial Dna, Tiffany Crosby Jan 2009

Isolation And Analysis Of Cyanobacterial Dna, Tiffany Crosby

Senior Honors Theses and Projects

Cyanobacteria are a phylum of bacteria that possess a diverse number of biological characteristics. One of the evolutionary innovations of the cyanobacteria are its ability to perform oxygenating photosynthesis, which all cyanobacteria are able to perform. It is believed that a form of metabolism became the dominant method for producting fixed carbon from carbon dioxide (CO2) at around 3.5 billion years ago. Instead of using hydrogen sulfide, whose generated waste products were difficult to eliminate, the photosynthetic cyanobacteria used water as their hydrogen source (1). Many cyanobacteria are also capable of fixing atmospheric nitrogen (2). Cyanobacteria are present …


Continuous Monitoring Of Spatial Queries, Kyriakos Mouratidis Jan 2009

Continuous Monitoring Of Spatial Queries, Kyriakos Mouratidis

Research Collection School Of Computing and Information Systems

No abstract provided.


Control-Theoretic, Mission-Driven, Optimization Techniques For Wireless Sensor Networks, Archan Misra, Sharanya Eswaran, Thomas La Porta Jan 2009

Control-Theoretic, Mission-Driven, Optimization Techniques For Wireless Sensor Networks, Archan Misra, Sharanya Eswaran, Thomas La Porta

Research Collection School Of Computing and Information Systems

Network Utility Maximization (NUM) techniques, which cast resource sharing problems as one of distributed utility maximization, have been investigated for a variety of optimization problems in wireless and wired networks. Our recent work has extended the NUM framework to consider the case of resource sharing by multiple competing missions in a military-centric wireless sensor network (WSN) environment. Our enhanced NUM-based protocols provide rapid and dynamic mission-based adaptation of tactical wireless networks to support the transport of sensor data streams with very small control overhead. In particular, we focus specifically on mechanisms that capture the joint nature of mission utilities and …


Integrated Resource Allocation And Scheduling In Bidirectional Flow Shop With Multi-Machine And Cos Constraints, Hoong Chuin Lau, Zhengyi Zhao, Shuzhi Sam Ge Jan 2009

Integrated Resource Allocation And Scheduling In Bidirectional Flow Shop With Multi-Machine And Cos Constraints, Hoong Chuin Lau, Zhengyi Zhao, Shuzhi Sam Ge

Research Collection School Of Computing and Information Systems

An integer programming (IP) model is proposed for integrated resource allocation and operation scheduling for a multiple job-agents system. Each agent handles a specific job-list in a bidirectional flowshop. For the individual agent scheduling problem, a formulation is proposed in continuous time domain and compared with an IP formulation in discrete time domain. Of particular interest is the formulation of the machine utilization function-- both in continuous time and discrete time. Fast heuristic methods are proposed with the relaxation of the machine capacity. For the integrated resource allocation and scheduling problem, a linear programming relaxation approach is applied to solve …


An Intelligent Face Features Generation System From Fingerprints, Şeref Sağiroğlu, Necla Özkaya Jan 2009

An Intelligent Face Features Generation System From Fingerprints, Şeref Sağiroğlu, Necla Özkaya

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel intelligent system based on artificial neural networks was designed and introduced for generating faces from fingerprints with high accuracy. The proposed system has a number of modules including two feature enrolment modules for acquiring the fingerprints and faces into the system, two feature extractors for extracting the feature sets of fingerprint and face biometrics, an artificial neural network module that was configured with the help of Taguchi experimental design method for establishing relationships among the biometric features, a face re-constructor for building up face features from the results of the system, and a test module …


Modeling And Calculation Of Electromagnetic Field In The Surroundings Of A Large Power Transformer, Leonardo Strac, Franjo Kelemen, Damir Zarko Jan 2009

Modeling And Calculation Of Electromagnetic Field In The Surroundings Of A Large Power Transformer, Leonardo Strac, Franjo Kelemen, Damir Zarko

Turkish Journal of Electrical Engineering and Computer Sciences

The presented study compares measured and calculated electromagnetic field quantities in the surroundings of a large power transformer with the aim to avoid the necessity of measuring the field on subsequent units and use a computer model instead. The influences of various objects located in the vicinity of the transformer during measurement are also analyzed and are taken into account in a computer model.


A Globally Convergent Numerical Method For Coefficient Inverse Problems, Natee Pantong Jan 2009

A Globally Convergent Numerical Method For Coefficient Inverse Problems, Natee Pantong

Mathematics Dissertations

In our terminology "globally convergent numerical method" means a numerical method, whose convergence to a good approximation for the correct solution is independent of the initial approximation. A new numerical imaging algorithm of reconstruction of optical absorption coefficients from near infrared light data with a continuous-wave has been purposed to solves a coefficient inverse problem for an elliptic equation with the data generated by the source running along a straight line. A regularization process, so-called "exterior forward problem", for preprocessing data with noise on the boundary has also been purpose for the problem related to matching fluid in experiment. A …