Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1891 - 1920 of 8620

Full-Text Articles in Physical Sciences and Mathematics

I. Development Of The In Situ Reductive Ozonolysis Of Alkenes With Tertiary Amine N-Oxides. Ii. Progress Toward The Asymmetric Synthesis Of Peroxyplakoric Acid A3., Christopher P. Schwartz Aug 2010

I. Development Of The In Situ Reductive Ozonolysis Of Alkenes With Tertiary Amine N-Oxides. Ii. Progress Toward The Asymmetric Synthesis Of Peroxyplakoric Acid A3., Christopher P. Schwartz

Department of Chemistry: Dissertations, Theses, and Student Research

Ozone, first discovered in the mid 1800’s, is a triatomic allotrope of oxygen that is a powerful oxidant. For over a century, research has been conducted into the synthetic application and mechanism of reactions of ozone with organic compounds. One of the major areas of interest has been the ozonolysis of alkenes. The production of carbonyl compounds is the most common synthetic application of ozonolysis. The generally accepted mechanism developed by Rudolf Criegee for this reaction involves the 1,3-electrocyclic addition of ozone to the π bond of the alkene to form a 1,2,3-trioxolane or primary ozonide. The primary ozonide is …


Essential Elements Of Sustainable Fire Management In The Wildland-Urban Interface, Christopher Dicus Aug 2010

Essential Elements Of Sustainable Fire Management In The Wildland-Urban Interface, Christopher Dicus

Christopher Dicus

Fire and fuels management in the wildland-urban interface is a multifaceted aggregation of biophysical and sociopolitical components. To best insure sustainable communities in the wildland-urban interface, stakeholders from a diversity of disciplines and worldviews must collaborate to develop a management plan for a given area that minimizes fire risk while simultaneously maximizing the benefits that distinct vegetation types and structures provide. This paper discusses critical elements that must be considered in order to maintain sustainable communities in the wildland-urban interface. These factors include fuels treatments, suppression forces, enforceable infrastructure and construction standards, and community education, each of which will vary …


On The Transit Potential Of The Planet Orbiting Iota Draconis, Stephen R. Kane, Sabine Reffert, Gregory W. Henry, Debra A. Fischer, Christian Schwab, Kelsey I. Clubb, Christoph Bergmann Aug 2010

On The Transit Potential Of The Planet Orbiting Iota Draconis, Stephen R. Kane, Sabine Reffert, Gregory W. Henry, Debra A. Fischer, Christian Schwab, Kelsey I. Clubb, Christoph Bergmann

Information Systems and Engineering Management Research Publications

Most of the known transiting exoplanets are in short-period orbits, largely due to the bias inherent in detecting planets through the transit technique. However, the eccentricity distribution of the known radial velocity planets results in many of those planets having a non-negligible transit probability. One such case is the massive planet orbiting the giant star iota Draconis, a situation where both the orientation of the planet's eccentric orbit and the size of the host star inflate the transit probability to a much higher value than for a typical hot Jupiter. Here we present a revised fit of the radial velocity …


Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt Aug 2010

Layered Security Solutions Over Dependency Within Any Layer, Olga H. Brandt

Regis University Student Publications (comprehensive collection)

Considering the advancement of computer systems and security solutions available in today's constantly changing world, there are various philosophies as to what is required (or adequate) in order to protect a system. This investigative study proposed to explore a possible problem with employing a layered security solution\ over dependence or reliance on any layer. A risk analysis was performed to determine where over dependence or reliance could happen and what could be done to prevent this. Various reviews and other findings online were researched and the data compiled using a qualitative methodology. Lastly, a recommendation is made on what is …


Construction Cost Models, Barry Dikeman Aug 2010

Construction Cost Models, Barry Dikeman

Economics and Finance

The following are a series of cost estimate models similar in format to a typical engineer’s estimate that were developed in support of our financial impact assessment report for LD 1725. The models us current material costs, labor costs, and equipment costs for the region to provide a comparative cost analysis of seven culvert replacement scenarios. The models provide information about what the cost impact of LD 1725 would be for typical culvert replacements in Maine. However, due to the inherent restrictions of the cost modeling framework we were not able to include the abundance of variables that would be …


Stop Social Network Pitfalls, K. Michael Aug 2010

Stop Social Network Pitfalls, K. Michael

Professor Katina Michael

Ask a group of teenagers how they spend their spare time and most will mention Facebook, YouTube, World of Warcraft, or Second Life – ‘virtual’ social networks that bring millions of people together online. The benefits of social networks have been touted but what about the pitfalls? Some teens will share everything about themselves to hundreds of online friends, most of whom they have never met. Twitter style prompts like where you are, what you are doing, and who you are doing it with reveal a lot about one’s behaviours, one’s inner thoughts, and even one’s vulnerabilities. Some teens upload …


Forensics Report, Jeffrey Parr, Kathryn Taffs Aug 2010

Forensics Report, Jeffrey Parr, Kathryn Taffs

Jeffrey Parr

No abstract provided.


Novel Polymer Coupling Chemistry Based Upon Latent Cysteine-Like Residues And Thiazolidine Chemistry, Jospeh S. Carlson, Megan R. Hill, Taiga Young, Philip Costanzo Aug 2010

Novel Polymer Coupling Chemistry Based Upon Latent Cysteine-Like Residues And Thiazolidine Chemistry, Jospeh S. Carlson, Megan R. Hill, Taiga Young, Philip Costanzo

Chemistry and Biochemistry

Chain end functional polymers were prepared via reversible addition–fragmentation transfer (RAFT) polymerization techniques that were further chain extended with acrylonitrile. Under reducing conditions, latent cysteine-like residues were exposed at the chain ends. A variety of reduction conditions were explored and base polymers were then tethered together via thiazolidine chemistry.


Measurement Of The Mass Of The Top Quark In ℯμ + Jets Final States At Dø With 5.3 Fb⁻¹, The Dø Collaboration, Peter Renkel, Yuriy Ilchenko, Robert Kehoe, Jason South, Huanzhao Liu Aug 2010

Measurement Of The Mass Of The Top Quark In ℯμ + Jets Final States At Dø With 5.3 Fb⁻¹, The Dø Collaboration, Peter Renkel, Yuriy Ilchenko, Robert Kehoe, Jason South, Huanzhao Liu

Journal of Undergraduate Research

No abstract provided.


A New Method For Deriving Aerosol Solar Radiative Forcing And Its First Application Within Milagro/Intex-B, K. S. Schmidt, P. Pilewskie, R. Bergstrom, O. Coddington, J. Redemann, J. Livingston, P. Russell, E. Bierwirth, M. Wendisch, W. Gore, M. K. Dubey, C. Mazzoleni Aug 2010

A New Method For Deriving Aerosol Solar Radiative Forcing And Its First Application Within Milagro/Intex-B, K. S. Schmidt, P. Pilewskie, R. Bergstrom, O. Coddington, J. Redemann, J. Livingston, P. Russell, E. Bierwirth, M. Wendisch, W. Gore, M. K. Dubey, C. Mazzoleni

Michigan Tech Publications

We introduce a method for deriving aerosol spectral radiative forcing along with single scattering albedo, asymmetry parameter, and surface albedo from airborne vertical profile measurements of shortwave spectral irradiance and spectral aerosol optical thickness. The new method complements the traditional, direct measurement of aerosol radiative forcing efficiency from horizontal flight legs below gradients of aerosol optical thickness, and is particularly useful over heterogeneous land surfaces and for homogeneous aerosol layers where the horizontal gradient method is impractical. Using data collected by the Solar Spectral Flux Radiometer (SSFR) and the Ames Airborne Tracking Sunphotometer (AATS-14) during the MILAGRO (Megacity Initiative: Local …


3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin Aug 2010

3dq: Threat Dome Visibility Querying On Mobile Devices, James Carswell, Keith Gardiner, Junjun Yin

Articles

3DQ (Three Dimensional Query) is our mobile spatial interaction (MSI) prototype for location and orientation aware mobile devices (i.e. today's sensor enabled smartphones). The prototype tailors a military style threat dome query calculation using MSI with hidden query removal functionality for reducing “information overload” on these off-the-shelf devices. The effect gives a more accurate and expected query result for Location-Based Services (LBS) applications by returning information on only those objects visible within a user’s 3D field-of-view. Our standardised XML based request/response design enables any mobile device, regardless of operating system and/or programming language, to access the 3DQ web-service interfaces.


Virus Silicification Under Simulated Hot Spring Conditions, James R. Laidler, Kenneth M. Stedman Aug 2010

Virus Silicification Under Simulated Hot Spring Conditions, James R. Laidler, Kenneth M. Stedman

Biology Faculty Publications and Presentations

Silicification of organisms in silica-depositing environments can impact both their ecology and their presence in the fossil record. Although microbes have been silicified under laboratory and environmental conditions, viruses have not. Bacteriophage T4 was successfully silicified under laboratory conditions that closely simulated those found in silica-depositing hot springs. Virus morphology was maintained, and a clear elemental signature of phosphorus was detected by energy-dispersive X-ray spectrophotometry (EDS).


Virtualisation: A Case Study In Database Administration Laboratory Work, Greg Cranitch, Michael J. Rees Aug 2010

Virtualisation: A Case Study In Database Administration Laboratory Work, Greg Cranitch, Michael J. Rees

Greg Cranitch

This paper discusses the issues involved in using virtual machines to teach database administration concepts and the associated issues in a university student environment. Previous work on using virtual machines in system/network administration university labs is reviewed as well as the use of virtual machines in a database development environment. A virtual machine project for a Virtual Information Technology Teaching Laboratory (VITTL) using central servers offering a potential solution is described. This solution provides a secure environment with each student isolated from others with their own virtual machines.


Holocene Vegetation Dynamics In West New Britain, Png, William Boyd, Carol Lentfer, Jeffrey Parr, C Jago Aug 2010

Holocene Vegetation Dynamics In West New Britain, Png, William Boyd, Carol Lentfer, Jeffrey Parr, C Jago

Jeffrey Parr

No abstract provided.


Malware Detection Based On Structural And Behavioural Features Of Api Calls, Manoun Alazab, Robert Layton, Sitalakshmi Venkataraman, Paul Watters Aug 2010

Malware Detection Based On Structural And Behavioural Features Of Api Calls, Manoun Alazab, Robert Layton, Sitalakshmi Venkataraman, Paul Watters

International Cyber Resilience conference

In this paper, we propose a five-step approach to detect obfuscated malware by investigating the structural and behavioural features of API calls. We have developed a fully automated system to disassemble and extract API call features effectively from executables. Using n-gram statistical analysis of binary content, we are able to classify if an executable file is malicious or benign. Our experimental results with a dataset of 242 malwares and 72 benign files have shown a promising accuracy of 96.5% for the unigram model. We also provide a preliminary analysis by our approach using support vector machine (SVM) and by varying …


Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns , David M. Cook Aug 2010

Mitigating Cyber-Threats Through Public-Private Partnerships: Low Cost Governance With High-Impact Returns , David M. Cook

International Cyber Resilience conference

The realization that cyber threats can cause the same devastation to a country as physical security risks has taken the long route towards acceptance. Governments and businesses have thrown the glove of responsibility back and forth on numerous occasions, with government agencies citing the need for private enterprise to take up the mantle, and Business returning the gesture by proposing a ‘national’ perspective on cyber security. Ambit claims such as these drain a range of security resources when both sides should work in concert by directing all available energy towards resolving cyber-threats. This paper compares the public-private arrangements through Australasia …


Security Analysis Of Session Initiation Protocol - A Methodology Based On Coloured Petri Nets, Lin Liu Aug 2010

Security Analysis Of Session Initiation Protocol - A Methodology Based On Coloured Petri Nets, Lin Liu

International Cyber Resilience conference

In recent years Voice over Internet Protocol (VoIP) has become a popular multimedia application over the Internet. At the same time critical security issues in VoIP have started to emerge. The Session Initiation Protocol (SIP) is a predominant signalling protocol for VoIP. It is used to establish, maintain and terminate VoIP calls, playing a crucial role in VoIP. This paper is aimed at developing a Coloured Petri Net (CPN)-based approach to analysing security vulnerabilities in SIP, with the ultimate goal of achieving a formal and comprehensive security assessment of SIP specification, and creating a platform for evaluating countermeasures for securing …


Developing Robust Voip Router Honeypots Using Device Fingerprints , Craig Valli, Mohammed Al-Lawati Aug 2010

Developing Robust Voip Router Honeypots Using Device Fingerprints , Craig Valli, Mohammed Al-Lawati

International Cyber Resilience conference

As the telegram was replaced by telephony, so to Voice over IP (VoIP) systems are replacing conventional switched wire telephone devices, these systems rely on Internet connectivity for the transmission of voice conversations. This paper is an outline of ongoing preliminary research into malfeasant VoIP activity on the Internet. 30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over …


Is Cyber Resilience In Medical Practice Security Achievable? , Patricia A H Williams Aug 2010

Is Cyber Resilience In Medical Practice Security Achievable? , Patricia A H Williams

International Cyber Resilience conference

Australia is moving to a national e-health system with a high level of interconnectedness. The scenario for recovery of such a system, particularly once it is heavily relied upon, may be complex. Primary care medical practices are a fundamental part of the new e-health environment yet function as separate business entities within Australia’s healthcare system. Individually this means that recovery would be reliant on the self-sufficiency of each medical practice. However, the ability of these practices to individually and collectively recover is questionable. The current status of information security in primary care medical practices is compared to the needs of …


Small Business - A Cyber Resilience Vulnerability , Patricia A H Williams, Rachel J. Manheke Aug 2010

Small Business - A Cyber Resilience Vulnerability , Patricia A H Williams, Rachel J. Manheke

International Cyber Resilience conference

Small business in Australia comprise 95% of businesses. As a group this means that they contain increasing volumes of personal and business data. This creates escalating vulnerabilities as information is aggregated by various agencies. These vulnerabilities include identity theft and fraud. The threat environment of small business is extensive with both technical and human vulnerabilities. The problem is that the small business environment is being encouraged to adopt e-commerce by the government yet lacks resources in securing its cyber activity. This paper analysed the threats to this situation and found that questions of responsibility by individual businesses and the government …


Which Organisational Model Meets Best Practice Criterion For Critical Infrastructure Providers: An Examination Of The Australian Perspective Based On Case Studies, Andrew Woodward, Craig Valli Aug 2010

Which Organisational Model Meets Best Practice Criterion For Critical Infrastructure Providers: An Examination Of The Australian Perspective Based On Case Studies, Andrew Woodward, Craig Valli

International Cyber Resilience conference

While it is recognised that there must be segregation between corporate and process control networks in order to achieve a higher level of security, there is evidence that this is not occurring. Computer and network vulnerability assessments were carried out on three Australian critical infrastructure providers to determine their level of security. The security measures implemented by each organisation have been mapped against best practice recommendations for achieving segregation between process control and corporate networks. One of the organisations used a model which provided a dedicated information security team for provision of security for the process control networks. One of …


Penetration Testing And Vulnerability Assessments: A Professional Approach, Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt, Andrew J C Blyth Aug 2010

Penetration Testing And Vulnerability Assessments: A Professional Approach, Konstantinos Xynos, Iain Sutherland, Huw Read, Emlyn Everitt, Andrew J C Blyth

International Cyber Resilience conference

Attacks against computer systems and the data contained within these systems are becoming increasingly frequent and evermore sophisticated. So-called “zero-day” exploits can be purchased on black markets and Advanced Persistent Threats (APTs) can lead to exfiltration of data over extended periods. Organisations wishing to ensure security of their systems may look towards adopting appropriate measures to protect themselves against potential security breaches. One such measure is to hire the services of penetration testers (or “pen-tester”) to find vulnerabilities present in the organisation’s network, and provide recommendations as to how best to mitigate such risks. This paper discusses the definition and …


Tracing Vnc And Rdp Protocol Artefacts On Windows Mobile And Windows Smartphone For Forensic Purpose, Paresh Kerai Aug 2010

Tracing Vnc And Rdp Protocol Artefacts On Windows Mobile And Windows Smartphone For Forensic Purpose, Paresh Kerai

International Cyber Resilience conference

Remote access is the means of acquiring access to a computer or network remotely or from distance. It is typically achieved through the internet which connects people, corporate offices and telecommuters to the internal network of organizations or individuals. In recent years there has been a greater adoption of remote desktop applications that help administrators to configure and repair computers remotely over the network. However, this technology has also benefited cyber criminals. For example they can connect to computers remotely and perform illegal activity over the network. This research will focus on Windows mobile phones and the Paraben forensics software …


Making Information Security Acceptable To The User , Andrew Jones, Thomas Martin Aug 2010

Making Information Security Acceptable To The User , Andrew Jones, Thomas Martin

International Cyber Resilience conference

The security of information that is processed and stored in Information and Communications Technology systems is an ongoing problem that, as yet, has not been satisfactorily resolved. Software developers, system architects and managers all aspire to use technology to provide improvements in the protection of information that is processed and stored on these systems. However, they are working in an environment where the threats to the information, the technologies in use and the uses to which the technologies are being employed are changing at a pace which is faster than can be effectively addressed. This paper looks at the underlying …


What Are You Looking For: Identification Of Remnant Communication Artefacts In Physical Memory, Matthew Simon, Jill Slay Aug 2010

What Are You Looking For: Identification Of Remnant Communication Artefacts In Physical Memory, Matthew Simon, Jill Slay

International Cyber Resilience conference

Law enforcement has sound methods for investigating and obtaining data about targets that are using traditional communication services such as the Public Switched Telephone Network. The Internet as a data transfer medium is a vastly different paradigm to that of traditional telephony networks. Information about targets using Internet communication technologies cannot be obtained using the same methods used for traditional communication. There has been an identified need for methods to obtain information on targets that have been using Internet communication methods. The acquisition and analysis of physical memory has been proposed as a vector for the recovery of such information. …


Optical Properties Of In1-Xgaxn Epilayers Grown By Hpcvd, Jielei Wang Ms Aug 2010

Optical Properties Of In1-Xgaxn Epilayers Grown By Hpcvd, Jielei Wang Ms

Physics and Astronomy Theses

Optical absorption spectroscopy has been applied to study properties such as the fundamental absorption edge and defect absorption centers of group III-nitride compound semiconductor epilayers. The investigation in this thesis focused on analyzing the band gap of indium-rich In1-xGaxN epilayers, which where grown by the high-pressure chemical vapor deposition (HPCVD) technique. Our results - together with literature data for gallium-rich In1-xGaxN alloys indicate that the shift of the fundamental band gap of In1-xGaxN with composition x can be described with a bowing parameter of b = 2.2eV. Temperature dependent transmission measurements show that the band gap variation with temperature follows …


Requirement Specification Stage Of The Project Lifecycle Of Computerized Systems & The Standards That Can Be Implemented, Nicola Grace Aug 2010

Requirement Specification Stage Of The Project Lifecycle Of Computerized Systems & The Standards That Can Be Implemented, Nicola Grace

Regis University Student Publications (comprehensive collection)

Understanding requirement specifications was an integral part of information systems design and was critical to the success of interactive systems. However, specifying these requirements was not simple to achieve. This research, including a literature review, describes general methods to support requirement specification analysis that can be adapted into a range of situations in accordance with relevant standards. The main techniques discussed were risk management, stage-based lifecycle models and frameworks. Additionally, as part of the methodology and project history, the methods for implementation, process improvements and schedule of the research was examined. A case study with statistical analysis was described to …


Mechanistic Studies Of In Vitro Cytotoxicity Of Poly(Amidoamine) Dendrimers In Mammalian Cells, Sourav Prasanna Mukherjee, Fiona Lyng, Amaya Garcia, Maria Davoren, Hugh Byrne Aug 2010

Mechanistic Studies Of In Vitro Cytotoxicity Of Poly(Amidoamine) Dendrimers In Mammalian Cells, Sourav Prasanna Mukherjee, Fiona Lyng, Amaya Garcia, Maria Davoren, Hugh Byrne

Articles

Poly(amidoamine) (PAMAM) dendrimer nanoparticles have been demonstrated to elicit a well defined cytotoxicological response from mammalian cell lines, the response increasing systematically with dendrimer generation and number of surface amino groups. In this work, using generation G4, G5, and G6 dendrimers, this systematic response is furthermore demonstrated for the generation of reactive oxygen species, lysosomal activity, and the onset of apoptosis and levels of DNA damage. The results are consistent with a pathway of localisation of PAMAM dendrimers in the mitochondria leading to ROS production causing oxidative stress, apoptosis and DNA damage. ROS production is co-located in the mitochondria, and …


Cultivation Of Algal Biofuel Feedstock In Desert Area Of Southern Nevada Using Municipal Wastewater (Nvrec Project 1.3), Jian Ma, Chulsung Bae, Peter Faught Aug 2010

Cultivation Of Algal Biofuel Feedstock In Desert Area Of Southern Nevada Using Municipal Wastewater (Nvrec Project 1.3), Jian Ma, Chulsung Bae, Peter Faught

Nevada Renewable Energy Consortium Meeting

The second annual Nevada Renewable Energy Consortium meeting took place at UNLV on August 20. The meeting focused on the current three NVREC program areas: Solar, Biomass and Geothermal. Presentations were made by participating entities and a poster session followed.


Nvrec Subtask 1.1: Pre-Treatment Of Lignocellulosic Biomass, Amber Broch, Kent Hoekman, Larry Felix, Rick Purcell, Curt Robbins, Wei Yan Aug 2010

Nvrec Subtask 1.1: Pre-Treatment Of Lignocellulosic Biomass, Amber Broch, Kent Hoekman, Larry Felix, Rick Purcell, Curt Robbins, Wei Yan

Nevada Renewable Energy Consortium Meeting

The second annual Nevada Renewable Energy Consortium meeting took place at UNLV on August 20. The meeting focused on the current three NVREC program areas: Solar, Biomass and Geothermal. Presentations were made by participating entities and a poster session followed.