Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 511 - 540 of 8621

Full-Text Articles in Physical Sciences and Mathematics

Monetary And Fiscal Policy Interactions In Nigeria: An Application Of A State-Space Model With Markov-Switching, Chuku V. Chuku Dec 2010

Monetary And Fiscal Policy Interactions In Nigeria: An Application Of A State-Space Model With Markov-Switching, Chuku V. Chuku

CBN Journal of Applied Statistics (JAS)

This paper uses quarterly data to explore the monetary and fiscal policy interactions in Nigeria between 1970 and 2008. As a preliminary exercise, the paper examines the nature of fiscal policies in Nigeria using a vector autoregression (VAR) model. The simulated generalized impulse response graphs generated from the VAR estimation provides evidence of a non-Ricardian fiscal policy in Nigeria. Further, the paper analyzes the interactions between monetary and fiscal policies by applying a State-space model with Markov-switching to estimate the time-varying parameters of the relationship. The evidence indicates that monetary and fiscal policies in Nigeria have interacted in a counteractive …


Addressing The Problem Of Non-Response And Response Bias, Fabian C. Okafor Dec 2010

Addressing The Problem Of Non-Response And Response Bias, Fabian C. Okafor

CBN Journal of Applied Statistics (JAS)

Survey planners and analysts in Nigeria have devoted much more attention to sampling errors at the expense of nonsampling errors (non-response and response errors). Sampling error is the degree to which the sample estimate differs from the average value of the characteristic due to chance. The present discussion will be centered on non-sampling error, which may present serious deficiencies in the statistics and render the survey useless. According to Platek and Gray (1986), “Non-response has been generally recognized as important measure of the quality of data since it affects the estimates by introducing a possible bias in the estimates and …


Statistics For National Development, Sani I. Doguwa Dec 2010

Statistics For National Development, Sani I. Doguwa

CBN Journal of Applied Statistics (JAS)

Good statistics that has been collected according to agreed good practices are crucial as a tool for development. Gross domestic product (GDP) and other measures of economic activity such as Gross National Income (GNI) together with their individual components, show how the economy is responding to government policy and other influences. The balance of payments can demonstrate the requirement for policy adjustments and is also one of the indicators scrutinised by potential foreign investors in the country. Agricultural statistics clearly have implications for longer-term planning, particularly if they show a move away from the land into urban areas or a …


A System For Measuring Radiation Induced Chemical Products In Atmospheric Gases Using Optical Detection Methods, Tyler Webster Reese Dec 2010

A System For Measuring Radiation Induced Chemical Products In Atmospheric Gases Using Optical Detection Methods, Tyler Webster Reese

Master's Theses

This research is a part of an effort to characterize the chemical products generated by radiation interacting with atmosphere. One method of detecting ionizing radiation is to monitor the radiation induced products in the atmosphere around the source. This project explored the potential for using Cavity Ringdown Spectroscopy to evaluate the presence of chemical products generated by the air-radiation interaction near an alpha radiation source. In particular, measurements of ozone concentration within a controlled atmosphere chamber as affected by radiation exposure were obtained.

The first portion of this thesis provides brief reviews of ionizing radiation and ozone formation as well …


A Type Analysis Of Rewrite Strategies, Azamat Mametjanov Dec 2010

A Type Analysis Of Rewrite Strategies, Azamat Mametjanov

Student Work

Rewrite strategies provide an algorithmic rewriting of terms using strategic compositions of rewrite rules. Due to the programmability of rewrites, errors are often made due to incorrect compositions of rewrites or incorrect application of rewrites to a term within a strategic rewriting program. In practical applications of strategic rewriting, testing and debugging becomes substantially time-intensive for large programs applied to large inputs derived from large term grammars. In essence, determining which rewrite in what position in a term did or did not re comes down to logging, tracing and/or di -like comparison of inputs to outputs. In this thesis, we …


Debugging Techniques For Locating Defects In Software Architectures, Kyungsoo Im Dec 2010

Debugging Techniques For Locating Defects In Software Architectures, Kyungsoo Im

All Dissertations

The explicit design of the architecture for a software product is a well established part of development projects. As the software architecture descriptions are becoming larger and more complex, there is more likelihood of defects being present in the software architecture. Studies have shown that a defect in the software architecture that has propagated to the development phase is very expensive to fix. To prevent such propagation of defects, this research proposes to provide debugging support for software architecture design.
Debugging is commonly used in programming languages to effectively find the cause of a failure and locate the error to …


Characterization Of Watersheds On Fort Benning Military Reservation: Comparison Of Field Data To Watershed Parameters, Melinda Rosetta Stahl Dec 2010

Characterization Of Watersheds On Fort Benning Military Reservation: Comparison Of Field Data To Watershed Parameters, Melinda Rosetta Stahl

Theses and Dissertations

Sixteen watersheds located on Fort Benning Military Installation in Georgia were analyzed using both physically collected data and computer modeling data. Physical data collected included total suspended solids (TSS) and grain size analysis using the Wolman Pebble Count method. Computer modeling analyzed the watersheds using ArcGIS 9.3 for comparison to physical data. Land use, slope, and soil data were used in a modified revised universal soil loss equation (RUSLE) to create a soil erodibility index map. Wolman Pebble Count data showed that in half of the watersheds, 84% of the sampled grains were less than half a millimeter in size. …


New Tools For Monitoring Gamma Camera Uniformity, Brad K. Lofton Dec 2010

New Tools For Monitoring Gamma Camera Uniformity, Brad K. Lofton

Dissertations & Theses (Open Access)

Detector uniformity is a fundamental performance characteristic of all modern gamma camera systems, and ensuring a stable, uniform detector response is critical for maintaining clinical images that are free of artifact. For these reasons, the assessment of detector uniformity is one of the most common activities associated with a successful clinical quality assurance program in gamma camera imaging. The evaluation of this parameter, however, is often unclear because it is highly dependent upon acquisition conditions, reviewer expertise, and the application of somewhat arbitrary limits that do not characterize the spatial location of the non-uniformities. Furthermore, as the goal of any …


Improving Ensemble Streamflow Prediction Using Interdecadal/Interannual Climate Variability, Kenneth W. Lamb Dec 2010

Improving Ensemble Streamflow Prediction Using Interdecadal/Interannual Climate Variability, Kenneth W. Lamb

UNLV Theses, Dissertations, Professional Papers, and Capstones

The National Weather Service’s (NWS) river forecast centers provide long-term water resource forecasts for the main river basins in the U.S. The NWS creates seasonal streamflow forecasts using an ensemble prediction model called the Extended Streamflow Prediction (ESP) software. ESP creates runoff volume forecasts by taking the current observed soil moisture and snowpack conditions in the basin and applying them to historical temperature and precipitation scenarios. The ESP treats every historic input year as a likely scenario of future basin conditions. Therefore improving the knowledge about how long-term climate cycles impact streamflow can extend the forecast lead time and improve …


Synthesis And Catalytic Activity Of Nanostructured Cerium Oxide, Neil J. Lawrence Dec 2010

Synthesis And Catalytic Activity Of Nanostructured Cerium Oxide, Neil J. Lawrence

Department of Chemistry: Dissertations, Theses, and Student Research

Cerium oxide (ceria, CeO2-x where x is 0 to 0.5) has been one of the most widely used heterogeneous catalysts particularly in three way catalytic converters. Most of the catalytic traits can be attributed to two properties of ceria: first, the high mobility and storage capacity of oxygen within the lattice; second, the ease with which cerium changes between Ce3+ and Ce4+ states. These properties, combined with the abundance of cerium on earth, make ceria a low-cost highly effective alternative to noble metal catalysts. Recent research has been focused on the nanoscale properties of ceria.

The effect …


Ultrasonic Activation Of Triacetone Triperoxide, Latravia R. Dobson Dec 2010

Ultrasonic Activation Of Triacetone Triperoxide, Latravia R. Dobson

Department of Chemistry: Dissertations, Theses, and Student Research

Triacetone triperoxide (TATP) is an organic peroxide that has received widespread attention in recent years. TATP is a ketone peroxide with a high active oxygen content. It is relatively shock sensitive, with explosive decomposition easily initiated, and is therefore considered a primary explosive. However, TATP is also a powerful explosive possessing about 83 % of the power of TNT. TATP can be prepared quickly and easily from inexpensive household chemicals in the absence of any specialized facilities, making it the explosive of choice for modern day terrorists.

TATP poses a major challenge for security and law enforcement services around the …


Characteristics And Stability Of Oxide Films On Plutonium Surfaces, Harry Guillermo García Flores Dec 2010

Characteristics And Stability Of Oxide Films On Plutonium Surfaces, Harry Guillermo García Flores

Department of Chemistry: Dissertations, Theses, and Student Research

The oxidation of plutonium (Pu) metal continues to be an area of considerable activity. The reaction characteristics have significant implications for production use, storage, and disposition of this radiological material. Developing an accurate physical model of the structures, oxidation states, and oxygen concentration gradients present during oxidation are essential to understanding this process. Traditionally, the stable oxides of Pu have been thought to be plutonium sesquioxide (Pu2O3, O/Pu = 1.5, Pu3+) and plutonium dioxide (PuO2, O/Pu = 2.0, Pu4+), existing in a layered structure on Pu metal. Many of the …


I. A New Synthetic Approach To The Synthesis Of N-(Phosphonoacetyl)-L-Ornithine, Ii. The Influence Of Pyridine On The Ozonolysis Of Alkenes, Bradley M. Johnson Dec 2010

I. A New Synthetic Approach To The Synthesis Of N-(Phosphonoacetyl)-L-Ornithine, Ii. The Influence Of Pyridine On The Ozonolysis Of Alkenes, Bradley M. Johnson

Department of Chemistry: Dissertations, Theses, and Student Research

Part I. The use of chemical inhibitors to manipulate the level of amino acids in cells has proven to be invaluable in the mechanistic study of gene expression in bacteria and fungi. Here we present a new approach to the synthesis of δ‐N‐ (phosphonoacetyl)‐L‐ornithine (PALO), a potent ornithine transcarbamylase inhibitor, using a new amino acid protecting group, 9‐borabicyclononane (9‐BBN). Starting from commercially available reagents and utilizing mild reaction conditions, we were able to form PALO in fewer synthetic steps and in greater yields than previous attempts.

Part II. Ozonolysis is widely used to transform alkenes into oxygen‐rich functional groups (e.g.– …


A Mathematical Approach For Optimizing The Casino Slot Floor: A Linear Programming Application, Kasra Christopher Ghaharian Dec 2010

A Mathematical Approach For Optimizing The Casino Slot Floor: A Linear Programming Application, Kasra Christopher Ghaharian

UNLV Theses, Dissertations, Professional Papers, and Capstones

Linear programming is a tool that has been successfully applied to various problems across many different industries and businesses. However, it appears that casino operators may have overlooked this useful and proven method. At most casino properties the bulk of gaming revenues are derived from slot machines. It is therefore imperative for casino operators to effectively manage and cultivate the performance of this department. A primary task for the casino operator is planning and deciding the mix of slot machines in order to maximize performance.


This paper presents the task of optimizing the casino slot floor as a linear programming …


Dynamic Indexing, Viswada Sripathi Dec 2010

Dynamic Indexing, Viswada Sripathi

UNLV Theses, Dissertations, Professional Papers, and Capstones

In this thesis, we report on index constructions for large document collections to facilitate the task of search and retrieval. We first report on classical static index construction methods and their shortcomings. We then report on dynamic index construction techniques and their effectiveness.


Tracking Floral Visitation Using Dna Barcodes, Ivan Ray Shoemaker Dec 2010

Tracking Floral Visitation Using Dna Barcodes, Ivan Ray Shoemaker

Theses and Dissertations

Floral visitation resulting in interspecific pollen transfer (IPT) from non-native or invasive plant species can affect the reproductive fitness of native plant species through pollen allelopathy, stigma clogging, stylar clogging, and ovule (seed) discounting. The prevalence of IPT and the importance of pollinators in mediating its impacts, however, remain poorly understood. Although most traditional methods for examining visitor movement are insufficient for determining rates of potential IPT, one promising alternative is the use of DNA barcoding. Because floral visitors eat, collect or unknowingly obtain pollen, nectar and other floral tissues, plant DNA should be recoverable from their bodies, permitting molecular …


Structures On A K3 Surface, Nathan P. Rowe Dec 2010

Structures On A K3 Surface, Nathan P. Rowe

UNLV Theses, Dissertations, Professional Papers, and Capstones

In the first part of this paper, we examine properties of K3 surfaces of the form:

(x2 + 1)(y2 + 1)(z2 + 1) + Axyz − 2 = 0


We show the surface has Picard number q " 12 by finding 12 curves whose equivalence classes are linearly independent. These curves have self intersection −2. We find the lattice representations of the single-coordinate swapping automorphisms in x, y, and z. We show that we have enough of the Lattice to make accurate predictions of polynomial degree growth under the automorphisms. We describe these automorphisms in terms of operations on elliptic …


Poisson Process Monitoring, Test And Comparison, Qing Chen Dec 2010

Poisson Process Monitoring, Test And Comparison, Qing Chen

UNLV Theses, Dissertations, Professional Papers, and Capstones

The task of determining whether a sudden change occurred in the generative parameters of a time series generates application in many areas. In this thesis, we aim at monitoring the change-point of a Poisson process by method, which is characterized by a forward-backward testing algorithm and several overall error control mechanisms. With the application of this proposed method, we declare that Mount Etna is not a simple Poissonian volcano, because two different regimes divided by the change point, January 30th 1974, are identified. The validation procedures, used in a complementary fashion, by the formal hypothesis tests and graphical method will …


A Study On Eco-Friendly Merchandise In A Resort Retail Environment, Lindsey C. Patrick Dec 2010

A Study On Eco-Friendly Merchandise In A Resort Retail Environment, Lindsey C. Patrick

UNLV Theses, Dissertations, Professional Papers, and Capstones

The purpose of this study is to determine consumer purchasing habits of ecofriendly apparel in a retail resort environment. In order to find the rationale behind purchasing decisions, this study measured sales and survey responses based on the choice of two tee shirt options, eco-friendly tee shirts and regular cotton tee shirts. The survey was given to all customers purchasing these tee shirts in order to determine specific demographic information as well as their personal opinions on eco-friendliness, and willingness to pay a premium for eco-friendly products. Due to a lack of previous research in this field, this study is …


Dynamic Group Key Exchange Revisited, Guomin Yang, Chik How Tan Dec 2010

Dynamic Group Key Exchange Revisited, Guomin Yang, Chik How Tan

Research Collection School Of Computing and Information Systems

In a dynamic group key exchange protocol, besides the basic group setup protocol, there are also a join protocol and a leave protocol, which allow the membership of an existing group to be changed more efficiently than rerunning the group setup protocol. The join and leave protocols should ensure that the session key is updated upon every membership change so that the subsequent sessions are protected from leaving members (backward security) and the previous sessions are protected from joining members (forward security). In this paper, we present a new security model for dynamic group key exchange. Comparing to existing models, …


Opportunistic Routing In Wireless Sensor Networks Powered By Ambient Energy Harvesting, Zhi Ang Eu, Hwee-Pink Tan, Winston K. G. Seah Dec 2010

Opportunistic Routing In Wireless Sensor Networks Powered By Ambient Energy Harvesting, Zhi Ang Eu, Hwee-Pink Tan, Winston K. G. Seah

Research Collection School Of Computing and Information Systems

Energy consumption is an important issue in the design of wireless sensor networks (WSNs) which typically rely on portable energy sources like batteries for power. Recent advances in ambient energy harvesting technologies have made it possible for sensor nodes to be powered by ambient energy entirely without the use of batteries. However, since the energy harvesting process is stochastic, exact sleep-and-wakeup schedules cannot be determined in WSNs Powered solely using Ambient Energy Harvesters (WSN–HEAP). Therefore, many existing WSN routing protocols cannot be used in WSN–HEAP. In this paper, we design an opportunistic routing protocol (EHOR) for multi-hop WSN–HEAP. Unlike traditional …


Toward Effective Concept Representation In Decision Support To Improve Patient Safety, Tze-Yun Leong Dec 2010

Toward Effective Concept Representation In Decision Support To Improve Patient Safety, Tze-Yun Leong

Research Collection School Of Computing and Information Systems

Patient safety is an emerging, major health care discipline with significance accentuated in the influential Institute of Medicine (IOM) reports in the United States “To Err is Human” and “Crossing the Quality Chasm”. These reports highlighted the danger and prevalence of medical errors and preventable adverse events, explained the three main sources of system-related, human factors-related and cognitive-related errors, and recommended the use of information and decision support technologies to help alleviate the problem. A number of studies and reports from all over the world with similar findings have since followed, culminating in the 55th World Health Assembly Resolution on …


Topical Summarization Of Web Videos By Visual-Text Time-Dependent Alignment, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo Dec 2010

Topical Summarization Of Web Videos By Visual-Text Time-Dependent Alignment, Song Tan, Hung-Khoon Tan, Chong-Wah Ngo

Research Collection School Of Computing and Information Systems

Search engines are used to return a long list of hundreds or even thousands of videos in response to a query topic. Efficient navigation of videos becomes difficult and users often need to painstakingly explore the search list for a gist of the search result. This paper addresses the challenge of topical summarization by providing a timeline-based visualization of videos through matching of heterogeneous sources. To overcome the so called sparse-text problem of web videos, auxiliary information from Google context is exploited. Google Trends is used to predict the milestone events of a topic. Meanwhile, the typical scenes of web …


A Structure First Image Inpainting Approach Based On Self-Organizing Map (Som), Bo Chen, Zhaoxia Wang, Ming Bai, Quan Wang, Zhen Sun Dec 2010

A Structure First Image Inpainting Approach Based On Self-Organizing Map (Som), Bo Chen, Zhaoxia Wang, Ming Bai, Quan Wang, Zhen Sun

Research Collection School Of Computing and Information Systems

This paper presents a structure first image inpainting method based on self-organizing map (SOM). SOM is employed to find the useful structure information of the damaged image. The useful structure information which includes relevant edges of the image is used to simulate the structure information of the lost or damaged area in the image. The structure information is described by distinct or indistinct curves in an image in this paper. The obtained target curves separate the damaged area of the image into several parts. As soon as each part of the damaged image is restored respectively, the damaged image is …


Automobile Exhaust Gas Detection Based On Fuzzy Temperature Compensation System, Zhiyong Wang, Hao Ding, Fufei Hao, Zhaoxia Wang, Zhen Sun, Shujin Li Dec 2010

Automobile Exhaust Gas Detection Based On Fuzzy Temperature Compensation System, Zhiyong Wang, Hao Ding, Fufei Hao, Zhaoxia Wang, Zhen Sun, Shujin Li

Research Collection School Of Computing and Information Systems

A temperature compensation scheme of detecting automobile exhaust gas based on fuzzy logic inference is presented in this paper. The principles of the infrared automobile exhaust gas analyzer and the influence of the environmental temperature on analyzer are discussed. A fuzzy inference system is designed to improve the measurement accuracy of the measurement equipment by reducing the measurement errors caused by environmental temperature. The case studies demonstrate the effectiveness of the proposed method. The fuzzy compensation scheme is promising as demonstrated by the simulation results in this paper.


Map Estimation For Graphical Models By Likelihood Maximization, Akshat Kumar, Shlomo Zilberstein Dec 2010

Map Estimation For Graphical Models By Likelihood Maximization, Akshat Kumar, Shlomo Zilberstein

Research Collection School Of Computing and Information Systems

Computing a maximum a posteriori (MAP) assignment in graphical models is a crucial inference problem for many practical applications. Several provably convergent approaches have been successfully developed using linear programming (LP) relaxation of the MAP problem. We present an alternative approach, which transforms the MAP problem into that of inference in a finite mixture of simple Bayes nets. We then derive the Expectation Maximization (EM) algorithm for this mixture that also monotonically increases a lower bound on the MAP assignment until convergence. The update equations for the EM algorithm are remarkably simple, both conceptually and computationally, and can be implemented …


Chosen-Ciphertext Secure Bidirectional Proxy Re-Encryption Schemes Without Pairings, Jian Weng, Huijie, Robert Deng, Shengli Liu, Kefei Chen Dec 2010

Chosen-Ciphertext Secure Bidirectional Proxy Re-Encryption Schemes Without Pairings, Jian Weng, Huijie, Robert Deng, Shengli Liu, Kefei Chen

Research Collection School Of Computing and Information Systems

Proxy re-encryption realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob. Proxy re-encryption is a very useful primitive, having many applications in distributed file systems, outsourced filtering of encrypted spam, access control over network storage, and so on. Lately, Weng et al. proposed the first unidirectional proxy re-encryption scheme without using bilinear pairs. However, Weng et al.'s construction does not possess collusion resilience, in the sense that a coalition of the proxy and the delegatee can recover the delegator's private …


A Multi-User Steganographic File System On Untrusted Shared Storage, Jin Han, Meng Pan, Debin Gao, Hwee Hwa Pang Dec 2010

A Multi-User Steganographic File System On Untrusted Shared Storage, Jin Han, Meng Pan, Debin Gao, Hwee Hwa Pang

Research Collection School Of Computing and Information Systems

Existing steganographic file systems enable a user to hide the existence of his secret data by claiming that they are (static) dummy data created during disk initialization. Such a claim is plausible if the adversary only sees the disk content at the point of attack. In a multi-user computing environment that employs untrusted shared storage, however, the adversary could have taken multiple snapshots of the disk content over time. Since the dummy data are static, the differences across snapshots thus disclose the locations of user data, and could even reveal the user passwords. In this paper, we introduce a Dummy-Relocatable …


Revisiting Address Space Randomization, Zhi Wang, Renquan Cheng, Debin Gao Dec 2010

Revisiting Address Space Randomization, Zhi Wang, Renquan Cheng, Debin Gao

Research Collection School Of Computing and Information Systems

Address space randomization is believed to be a strong defense against memory error exploits. Many code and data objects in a potentially vulnerable program and the system could be randomized, including those on the stack and heap, base address of code, order of functions, PLT, GOT, etc. Randomizing these code and data objects is believed to be effective in obfuscating the addresses in memory to obscure locations of code and data objects. However, attacking techniques have advanced since the introduction of address space randomization. In particular, return-oriented programming has made attacks without injected code much more powerful than what they …


Protecting And Restraining The Third Party In Rfid-Enabled 3pl Supply Chains, Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng Dec 2010

Protecting And Restraining The Third Party In Rfid-Enabled 3pl Supply Chains, Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng

Research Collection School Of Computing and Information Systems

“Symmetric secret”-based RFID systems are widely adopted in supply chains. In such RFID systems, a reader’s ability to identify a RFID tag relies on the possession of the tag’s secret which is usually only known by its owner. If a “symmetric secret”-based RFID system is deployed in third party logistics (3PL) supply chains, all the three parties (the sender of the goods, the receiver of the goods and the 3PL provider) should have a copy of those tags’ secrets to access the tags. In case the three parties in 3PL supply chain are not all honest, sharing the secrets among …