Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1801 - 1830 of 8620

Full-Text Articles in Physical Sciences and Mathematics

Microct Study Of Critical-Sized Defects Restored With A New Rhbmp-2 Carrier, Joanne S. Kim Sep 2010

Microct Study Of Critical-Sized Defects Restored With A New Rhbmp-2 Carrier, Joanne S. Kim

Loma Linda University Electronic Theses, Dissertations & Projects

Introduction: Regenerating bone in critical-sized maxillofacial osseous defects remains a challenge. The utilization of recombinant human bone morphogenetic protein-2 (rhBMP-2) to form new bone has been shown to be a promising alternative to autogenous bone grafts, and the development of a carrier matrix to effectively deliver the rhBMP-2 has been identified as the critical factor necessary for the successful clinical application of rhBMP-2. The objective of this study was to perform a microCT analysis to examine the density of reconstructed bone using different rhBMP-2 carriers in critical-sized defects.

Material and Methods: Critical-sized defects (approximately 2.5 cm) were created in the …


The Use Of The Minnesota Multiphasic Personality Inventory-Ii (Mmpi-2) In Pre-Employment Evaluations, Ana M. Gamez Sep 2010

The Use Of The Minnesota Multiphasic Personality Inventory-Ii (Mmpi-2) In Pre-Employment Evaluations, Ana M. Gamez

Loma Linda University Electronic Theses, Dissertations & Projects

Psychological testing is an important facet in the selection and hiring processes of law enforcement and public safety personnel. Research in this area suggests that the MMPI-2 scales have been correlated with problematic behavior among police officers, poor job performance, and officer misconduct. This study examined the extent to which suitability for hire could be predicted by the MMPI-2 scale L (Lie), scale K (correction), Infrequency scale (F), scale 4 Psychopathic Deviate (Pd), scale 6 Paranoia (Pa), scale 7 Psychasthenia (Pt), and scale 9 Hypomania (Ma). It examined whether profile differences emerged as a function of suitability across gender, between …


Veterans Of The 1st Persian Gulf War: A Study Of Medically Unexplained Symptom Models, Alexis H. Collins Sep 2010

Veterans Of The 1st Persian Gulf War: A Study Of Medically Unexplained Symptom Models, Alexis H. Collins

Loma Linda University Electronic Theses, Dissertations & Projects

In 1990-1991, shortly after the Persian Gulf War, a number of veterans began complaining about a wide range of symptoms, the most common of which were; fatigue, headache, sleep disturbance, low mood, and memory loss. These symptoms were similar to those experienced by individuals with Medically Unexplained Illnesses such as Chronic Fatigue Syndrome, Fibromyalgia, Irritable Bowel Syndrome, Multiple Chemical Sensitivity, and Somatoform Disorders. Utilizing structural equation modeling and data gathered from the Gulf War Veterans Health Questionnaire, this study attempted to determine whether symptoms experienced by veterans were best explained as individual items, discrete illnesses, or as a conglomeration of …


Out Of The Depths: Image Statistics Of Space, Water, And The Minuscule World, Nimit S. Dhulekar Sep 2010

Out Of The Depths: Image Statistics Of Space, Water, And The Minuscule World, Nimit S. Dhulekar

Dartmouth College Master’s Theses

In images of natural scenes, a consistent relationship exists between spectral power and spatial frequency. The power spectrum falls off with a form 1/f^p as spatial frequency f increases, with values of p approximately equal to 2. To quantify the extent to which this statistical characteristic is exhibited by other classes of images, we examined astronomical, underwater, and microscale images. It was found that this property holds for all three categories of images, although the value of p varies in the range 1.76 to 2.37. The second statistical characteristic computed was the angular spread of the power spectrum. This metric …


The Effect Of Boron-Containing Layered Hydroxy Salt (Lhs) On The Thermal Stability And Degradation Kinetics Of Poly (Methyl Methacrylate), Stephen Majoni, Shengpei Su, Jeanne Hossenlopp Sep 2010

The Effect Of Boron-Containing Layered Hydroxy Salt (Lhs) On The Thermal Stability And Degradation Kinetics Of Poly (Methyl Methacrylate), Stephen Majoni, Shengpei Su, Jeanne Hossenlopp

Chemistry Faculty Research and Publications

A boron-containing layered hydroxy salt (LHS), ZHTMDBB, was prepared and compounded with a highly flammable synthetic polymer, poly (methyl methacrylate) {PMMA}, via melt blending: the composite structure was intercalated with poor dispersion. The effect of this LHS on the flammability, thermal stability and degradation kinetics of PMMA was investigated via cone calorimetry and thermogravimetric analysis. The addition of 3-10% by mass of ZHTMDBB to PMMA resulted in significant reduction of peak heat release rate (22-48%) of the polymer and improvements in thermal stability were observed in both air and nitrogen. Effective activation energies for the degradation process were evaluated using …


A New Framework For Rfid Privacy, Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao Sep 2010

A New Framework For Rfid Privacy, Robert H. Deng, Yingjiu Li, Moti Yung, Yunlei Zhao

Research Collection School Of Computing and Information Systems

Formal RFID security and privacy frameworks are fundamental to the design and analysis of robust RFID systems. In this paper, we develop a new definitional framework for RFID privacy in a rigorous and precise manner. Our framework is based on a zero-knowledge (ZK) formulation [8,6] and incorporates the notions of adaptive completeness and mutual authentication. We provide meticulous justification of the new framework and contrast it with existing ones in the literature. In particular, we prove that our framework is strictly stronger than the ind-privacy model of [18], which answers an open question posed in [18] for developing stronger RFID …


Shoreline Evolution: James City County, Virginia James, York, And Chickahominy River Shorelines, Donna A. Milligan, Christine Wilcox, Kevin O'Brien, C. Scott Hardaway Jr. Sep 2010

Shoreline Evolution: James City County, Virginia James, York, And Chickahominy River Shorelines, Donna A. Milligan, Christine Wilcox, Kevin O'Brien, C. Scott Hardaway Jr.

Reports

Shoreline evolution is the change in the shore zone through time. Along the shores of Chesapeake Bay, it is a process and response system. The processes at work include winds, waves, tides and currents which shape and modify coastlines by eroding, transporting and depositing sediments. The shore line is commonly plotted and measured to provide a rate of change, but it is as important to understand the geomorphic patterns of change. Shore analysis provides the basis to know how a particular coast has changed through time and how it might proceed in the future. The purpose of this data report …


Shoreline Evolution: Isle Of Wight, Virginia James River And Pagan River Shorelines, Donna A. Milligan, Kevin O'Brien, Christine Wilcox, C. Scott Hardaway Jr. Sep 2010

Shoreline Evolution: Isle Of Wight, Virginia James River And Pagan River Shorelines, Donna A. Milligan, Kevin O'Brien, Christine Wilcox, C. Scott Hardaway Jr.

Reports

Shoreline evolution is the change in the shore zone through time. Along Chesapeake Bay’s estuarine shores, it is a process and response system. The processes at work include winds, waves, tides and currents which shape and modify coastlines by eroding, transporting and depositing sediments. The shore line is commonly plotted and measured to provide a rate of change, but it also is important to understand the geomorphic patterns of change. Shore analysis provides the basis to know how a particular coast has changed through time and how it might proceed in the future.

The purpose of this data report is …


A Hoare Calculus For Graph Programs, Christopher M. Poskitt, Detlef Plump Sep 2010

A Hoare Calculus For Graph Programs, Christopher M. Poskitt, Detlef Plump

Research Collection School Of Computing and Information Systems

We present Hoare-style axiom schemata and inference rules for verifying the partial correctness of programs in the graph programming language GP. The pre- and postconditions of this calculus are the nested conditions of Habel, Pennemann and Rensink, extended with expressions for labels in order to deal with GP’s conditional rule schemata and infinite label alphabet. We show that the proof rules are sound with respect to GP’s operational semantics.


Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng Sep 2010

Event Study Method For Validating Agent-Based Trading Simulations, Shih-Fen Cheng

Research Collection School Of Computing and Information Systems

In this paper, we introduce how one can validate an event-centric trading simulation platform that is built with multi-agent technology. The issue of validation is extremely important for agent-based simulations, but unfortunately, so far there is no one universal method that would work in all domains. The primary contribution of this paper is a novel combination of event-centric simulation design and event study approach for market dynamics generation and validation. In our event-centric design, the simulation is progressed by announcing news events that affect market prices. Upon receiving these events, event-aware software agents would adjust their views on the market …


Embellishing Text Search Queries To Protect User Privacy, Hwee Hwa Pang, Xuhua Ding, Xiaokui Xiao Sep 2010

Embellishing Text Search Queries To Protect User Privacy, Hwee Hwa Pang, Xuhua Ding, Xiaokui Xiao

Research Collection School Of Computing and Information Systems

Users of text search engines are increasingly wary that their activities may disclose confidential information about their business or personal profiles. It would be desirable for a search engine to perform document retrieval for users while protecting their intent. In this paper, we identify the privacy risks arising from semantically related search terms within a query, and from recurring highspecificity query terms in a search session. To counter the risks, we propose a solution for a similarity text retrieval system to offer anonymity and plausible deniability for the query terms, and hence the user intent, without degrading the system’s precision-recall …


Living Shoreline Design Guidelines For Shore Protection In Virginia’S Estuarine Environments, C. Scott Hardaway Jr., Donna A. Milligan, Karen Duhring Sep 2010

Living Shoreline Design Guidelines For Shore Protection In Virginia’S Estuarine Environments, C. Scott Hardaway Jr., Donna A. Milligan, Karen Duhring

Reports

No abstract provided.


Psychological Profiles In A Female Bariatric Surgery Sample, Aimee L. Donato Sep 2010

Psychological Profiles In A Female Bariatric Surgery Sample, Aimee L. Donato

Loma Linda University Electronic Theses, Dissertations & Projects

Morbid obesity is an epidemic. Current literature suggests that people with morbid obesity tend to show increased levels of psychological dysfunction. This is especially pertinent to the clinicians who work with morbidly obese patients who seek bariatric surgery as the method for weight control. Surgery should be performed on patients who are psychologically ready to adjust to the stringent post-operative lifestyle.

The purpose of the present study was (1) to compare two groups of bariatric patients (a White group and a non-White group) on pre-surgery measures: specific scales on the Millon Behavioral Medicine Diagnostic (MBMD), the Beck Depression Inventory II …


Molecular Dynamics Simulations Suggest That Rna Three-Way Junctions Can Act As Flexible Rna Structural Elements In The Ribosome, Neocles B. Leontis, Ivana Beššová, Kamila Réblová, Jiří Šponer Sep 2010

Molecular Dynamics Simulations Suggest That Rna Three-Way Junctions Can Act As Flexible Rna Structural Elements In The Ribosome, Neocles B. Leontis, Ivana Beššová, Kamila Réblová, Jiří Šponer

Chemistry Faculty Publications

We present extensive explicit solvent molecular dynamics analysis of three RNA three-way junctions (3WJs) from the large ribosomal subunit: the 3WJ formed by Helices 90-92 (H90-H92) of 23S rRNA; the 3WJ formed by H42-H44 organizing the GTPase associated center (GAC) of 23S rRNA; and the 3WJ of 5S rRNA. H92 near the peptidyl transferase center binds the 3'-CCA end of amino-acylated tRNA. The GAC binds protein factors and stimulates GTP hydrolysis driving protein synthesis. The 5S rRNA binds the central protuberance and A-site finger (ASF) involved in bridges with the 30S subunit. The simulations reveal that all three 3WJs possess …


Spectroscopic And Computational Studies Of The Laser Photolysis Of Matrix Isolated 1,2-Dibromoethanes: Formation And Fate Of The Bromoethyl Radicals, A. Kalume, L. George, P. Z. El-Khoury, Alexander N. Tarnovsky, S. A. Reid Sep 2010

Spectroscopic And Computational Studies Of The Laser Photolysis Of Matrix Isolated 1,2-Dibromoethanes: Formation And Fate Of The Bromoethyl Radicals, A. Kalume, L. George, P. Z. El-Khoury, Alexander N. Tarnovsky, S. A. Reid

Chemistry Faculty Publications

We report experimental and computational studies of the photolysis of atmospherically important 1,2-dibromoethanes (1,2-C(2)X(4)Br(2); X = H, F) in Ar matrixes at 5 K. Using the pulsed deposition method, we find that significant conformational relaxation occurs for 1,2-C(2)H(4)Br(2) (EDB; observed anti/gauche ratio =30:1) but not for 1,2-C(2)F(4)Br(2) (TFEDB; anti/gauche = 3:1), which is traced to a larger barrier to rotation about the C-C bond in the latter. Laser photolysis of matrix-isolated EDB at 220 nm reveals the growth of infrared bands assigned to the gauche conformer and C(2)H(4)-Br(2) charge transfer complex (both as major products), and the C(2)H(4)Br radical and …


A Generalised Kummer's Conjecture, M. J.R. Myers Sep 2010

A Generalised Kummer's Conjecture, M. J.R. Myers

University Faculty Publications and Creative Works

Kummer's conjecture predicts the rate of growth of the relative class numbers of cyclotomic fields of prime conductor. We extend Kummer's conjecture to cyclotomic fields of conductor n, where n is any natural number. We show that the Elliott-Halberstam conjecture implies that this generalised Kummer's conjecture is true for almost all n but is false for infinitely many n. Copyright © 2010 Glasgow Mathematical Journal Trust.


Shoreline Evolution: City Of Portsmouth, Virginia Hampton Roads And Elizabeth River Shorelines, Donna A. Milligan, Kevin O'Brien, Christine Wilcox, C. Scott Hardaway Jr. Sep 2010

Shoreline Evolution: City Of Portsmouth, Virginia Hampton Roads And Elizabeth River Shorelines, Donna A. Milligan, Kevin O'Brien, Christine Wilcox, C. Scott Hardaway Jr.

Reports

Shoreline evolution is the change in the shore zone through time. Along the shores of Chesapeake Bay, it is a process and response system. The processes at work include winds, waves, tides and currents which shape and modify coastlines by eroding, transporting and depositing sediments. The shore line is commonly plotted and measured to provide a rate of change, but it is as important to understand the geomorphic patterns of change. Shore analysis provides the basis to know how a particular coast has changed through time and how it might proceed in the future.

The purpose of this data report …


Evaluating Recruitment Of American Eel, Anguilla Rostrata, In The Potomac River (Spring 2010), Troy D. Tuckey, Mary C. Fabrizio Sep 2010

Evaluating Recruitment Of American Eel, Anguilla Rostrata, In The Potomac River (Spring 2010), Troy D. Tuckey, Mary C. Fabrizio

Reports

The Atlantic States Marine Fisheries Commission (ASMFC) adopted the Interstate Fishery Management Plan (FMP) for the American eel in November 1999. The FMP focuses on increasing coastal states’ efforts to collect American eel data through both fishery-dependent and fishery-independent studies. Consequently, member jurisdictions agreed to implement an annual survey for young of year (YOY) American eels. The survey is intended to “…characterize trends in annual recruitment of the YOY eels over time [to produce a] qualitative appraisal of the annual recruitment of American eel to the U.S. Atlantic Coast” (ASMFC 2000). The development of these surveys began in 2000 with …


Pseudonym-Based Rfid Discovery Service To Mitigate Unauthorized Tracking In Supply Chain Management, Qiang Yan, Robert H. Deng, Zheng Yan, Yingjiu Li, Tieyan Li Sep 2010

Pseudonym-Based Rfid Discovery Service To Mitigate Unauthorized Tracking In Supply Chain Management, Qiang Yan, Robert H. Deng, Zheng Yan, Yingjiu Li, Tieyan Li

Research Collection School Of Computing and Information Systems

Unauthorized tracking of RFID tagged assets at the system level, where an adversary tracks movement of RFID tagged assets by eavesdropping network messages or compromising date center servers, has not been well recognized in prior research. Compared to the traditional unauthorized tracking by clandestine scanning at the physical level, unauthorized tracking at the system level could be even more harmful as the adversary is able to obtain tracking information on a global scale and without physical presence. This paper analyzes the threat of unauthorized tracking by a semi-trusted RFID Discovery Service which maintains a database of RFID tag location records …


An Automated Approach For Finding Variable-Constant Pairing Bugs, Julia Lawall, David Lo Sep 2010

An Automated Approach For Finding Variable-Constant Pairing Bugs, Julia Lawall, David Lo

Research Collection School Of Computing and Information Systems

Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically depends on the correct usage of these values. Nevertheless, compilers for the languages typically used in implementing operating systems provide little support for checking the usage of named constants. This affects correctness, when a constant is used in a context where its value is meaningless, and software maintenance, when a constant has the right value for its usage context but the wrong name. We propose a hybrid program-analysis and data-mining based approach to identify …


P2pdoctagger: Content Management Through Automated P2p Collaborative Tagging, Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi Sep 2010

P2pdoctagger: Content Management Through Automated P2p Collaborative Tagging, Hock Hee Ang, Vivekanand Gopalkrishnan, Wee Keong Ng, Steven C. H. Hoi

Research Collection School Of Computing and Information Systems

As the amount of user generated content grows, personal information management has become a challenging problem. Several information management approaches, such as desktop search, document organization and (collaborative) document tagging have been proposed to address this, however they are either inappropriate or inefficient. Automated collaborative document tagging approaches mitigate the problems of manual tagging, but they are usually based on centralized settings which are plagued by problems such as scalability, privacy, etc. To resolve these issues, we present P2PDocTagger, an automated and distributed document tagging system based on classification in P2P networks. P2P-DocTagger minimizes the efforts of individual peers and …


Nonperturbative Qcd Simulations With 2+1 Flavors Of Improved Staggered Quarks, James E. Hetrick, A. Bazavov Sep 2010

Nonperturbative Qcd Simulations With 2+1 Flavors Of Improved Staggered Quarks, James E. Hetrick, A. Bazavov

All Faculty Articles - School of Engineering and Computer Science

Dramatic progress has been made over the last decade in the numerical study of quantum chromodynamics (QCD) through the use of improved formulations of QCD on the lattice (improved actions), the development of new algorithms, and the rapid increase in computing power available to lattice gauge theorists. In this article simulations of full QCD are described using the improved staggered quark formalism, “asqtad” fermions. These simulations were carried out with two degenerate flavors of light quarks (up and down) and with one heavier flavor, the strange quark. Several light quark masses, down to about three times the physical light quark …


Patterns In Rotating Rayleigh–Bénard Convection At High Rotation Rates, Janet Scheel, P. Mutyaba, T. Kimmel Aug 2010

Patterns In Rotating Rayleigh–Bénard Convection At High Rotation Rates, Janet Scheel, P. Mutyaba, T. Kimmel

Janet D. Scheel

We present the results from numerical and theoretical investigations of rotating Rayleigh–Bénard convection for relatively large dimensionless rotation rates, 170 < Ω < 274, and a Prandtl number of 6.4. Unexpected square patterns were found experimentally by Bajaj et al. (Phys. Rev. Lett., vol. 81, 1998, p. 806) in this parameter regime and near threshold for instability in the bulk. These square patterns have not yet been understood theoretically. Sánchez-Álvarez et al. (Phys. Rev. E, vol. 72, 2005, p. 036307) have found square patterns in numerical simulations for similar parameters when only the Coriolis force is included. We performed detailed numerical studies …


Frequency Dependence In The Initiation Of Laser-Induced Damage, Jeremy Gulley Aug 2010

Frequency Dependence In The Initiation Of Laser-Induced Damage, Jeremy Gulley

Jeremy R. Gulley

Numerous studies have investigated the role of photoionization in ultrafast laser-induced damage of bulk dielectrics. This study examines the role of spectral width and instantaneous laser frequency in laser-induced damage using a frequency dependent multiphoton ionization model and numerical simulation of an 800 nm laser pulse propagating through fused silica. When the individual photon wavelengths are greater than 827 nm, an additional photon is required for photoionization, reducing the probability of the event by many orders of magnitude. Simulation results suggest that this frequency dependence may significantly affect the processes of laser-induced damage and filamentation.


Network Analysis Of Scientific Workflows: A Gateway To Reuse, Wei Tan, Jia Zhang, Ian Foster Aug 2010

Network Analysis Of Scientific Workflows: A Gateway To Reuse, Wei Tan, Jia Zhang, Ian Foster

Jia Zhang

No abstract provided.


Particulate Pictures And Kinetic-Molecular Theory Concepts: Seizing An Opportunity, Mark Waner Aug 2010

Particulate Pictures And Kinetic-Molecular Theory Concepts: Seizing An Opportunity, Mark Waner

Mark J. Waner

This work examines commonly used particulate-level pictures meant to illustrate gases. These pictures are found throughout textbooks in the middle grades through the college level, as well as in questions frequently used to assess conceptual learning in students. This work uses the kinetic-molecular theory of gases to demonstrate the inaccuracies often present in these figures, which offers the opportunity to address model limitations to students and to develop better pictures. A basis for using these pictures to discuss models and ideas for ways these pictures can be used for inquiry activities based on analysis of scales is also discussed.


Kinetic And Mechanistic Studies Of The Deuterium Exchange In Classical Keto−Enol Tautomeric Equilibrium Reactions, Michael Nichols, Mark Waner Aug 2010

Kinetic And Mechanistic Studies Of The Deuterium Exchange In Classical Keto−Enol Tautomeric Equilibrium Reactions, Michael Nichols, Mark Waner

Mark J. Waner

An extension of the classic keto−enol tautomerization of β-dicarbonyl compounds into a kinetic analysis of deuterium exchange is presented. It is shown that acetylacetone and ethyl acetoacetate undergo nearly complete deuterium exchange of the α-methylene carbon when dissolved in methanol-d4. The extent of deuteration may be monitored via NMR spectroscopy as a function of time. A mechanism for deuterium exchange is presented and shown to be consistent with a consecutive first-order process. The data for acetylacetone are consistent with steady-state kinetics, whereas those of ethyl acetoacetate illustrate nonsteady-state behavior, offering an accessible example where students might collect and analyze real …


Product Quality, Perceived Price And Product Features Analysis And Their Influences To Brand Image And Consumer Satisfaction Aug 2010

Product Quality, Perceived Price And Product Features Analysis And Their Influences To Brand Image And Consumer Satisfaction

Benjamin L. Harwood

Homa Posniroha Harahap, 2010; Product Quality, Perceived Price and Product Features Analysis and Their Influences to Brand Image and Consumer Satisfaction. Counsellor ; DR. Mohamad Rizan, SE., MM. Generally, the purpose of the research are: 1) Analyzing product quality, perceived price and product features and their influences to brand image and consumer satisfaction, 2) Testing hypothesis on relationship between product quality, perceived price and product features and their influences to brand image and consumer satisfaction,3) Testing hypothesis product quality, perceived price, product features and their direct influences or through brand image to consumer satisfaction. Unit of analysis are mobile phone …


Planetary-Scale Rfid Services In An Age Of Uberveillance, K. Michael, George Roussos, George Q. Huang, Rajit Gadh, Arunabh Chattopadhyay, S Prabhu, Peter Chu Aug 2010

Planetary-Scale Rfid Services In An Age Of Uberveillance, K. Michael, George Roussos, George Q. Huang, Rajit Gadh, Arunabh Chattopadhyay, S Prabhu, Peter Chu

Professor Katina Michael

Radio-frequency identification has a great number of unfulfilled prospects. Part of the problem until now has been the value proposition behind the technology- it has been marketed as a replacement technique for the barcode when the reality is that it has far greater capability than simply non-line-of-sight identification, towards decision-making in strategic management and reengineered business processes. The vision of the Internet of Things has not eventuated but a world in which every object you can see around you carries the possibility of being connected to the internet is still within the realm of possibility. However incremental innovations may see …


A Web 2.0-Based Collaborative Annotation System For Enhancing Knowledge Sharing In Collaborative Learning Environments, Addison Y.S. Su, Stephen J.H. Yang, Jia Zhang, W.Y. Hwang Aug 2010

A Web 2.0-Based Collaborative Annotation System For Enhancing Knowledge Sharing In Collaborative Learning Environments, Addison Y.S. Su, Stephen J.H. Yang, Jia Zhang, W.Y. Hwang

Jia Zhang

No abstract provided.