Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (1861)
- Environmental Sciences (1638)
- Physics (1101)
- Life Sciences (1066)
- Chemistry (1064)
-
- Engineering (985)
- Social and Behavioral Sciences (923)
- Mathematics (806)
- Earth Sciences (758)
- Statistics and Probability (522)
- Oceanography and Atmospheric Sciences and Meteorology (463)
- Computer Engineering (394)
- Astrophysics and Astronomy (341)
- Natural Resources and Conservation (330)
- Electrical and Computer Engineering (306)
- Applied Mathematics (279)
- Sustainability (278)
- Databases and Information Systems (276)
- Natural Resources Management and Policy (276)
- Education (249)
- Medicine and Health Sciences (228)
- Geology (219)
- Water Resource Management (196)
- Business (190)
- Arts and Humanities (180)
- Ecology and Evolutionary Biology (174)
- Environmental Monitoring (173)
- Oil, Gas, and Energy (157)
- Law (156)
- Institution
-
- Selected Works (664)
- University of Nebraska - Lincoln (624)
- University of Wollongong (450)
- TÜBİTAK (273)
- University of Nevada, Las Vegas (272)
-
- Wright State University (259)
- Singapore Management University (230)
- Clemson University (210)
- SelectedWorks (200)
- Missouri University of Science and Technology (184)
- Louisiana State University (176)
- Utah State University (163)
- California Polytechnic State University, San Luis Obispo (154)
- Portland State University (139)
- Wayne State University (126)
- Old Dominion University (123)
- University of South Florida (120)
- Technological University Dublin (116)
- University of Kentucky (101)
- Edith Cowan University (100)
- Brigham Young University (93)
- University of Tennessee, Knoxville (93)
- Air Force Institute of Technology (92)
- William & Mary (92)
- Virginia Commonwealth University (88)
- Embry-Riddle Aeronautical University (81)
- Thomas Jefferson University (81)
- Syracuse University (80)
- Chinese Chemical Society | Xiamen University (79)
- Marquette University (78)
- Keyword
-
- CMMB (67)
- College for Professional Studies (58)
- School of Computer & Information Science (57)
- Humans (53)
- Female (47)
-
- Climate change (46)
- Male (44)
- Aged (43)
- Middle Aged (40)
- Sustainability (39)
- Myocardial Infarction (38)
- Water quality (36)
- GeoQUEST (31)
- Security (31)
- Chemistry (29)
- Mathematics (28)
- GIS (27)
- Research (27)
- Privacy (26)
- Simulation (26)
- Statistics (26)
- Massachusetts (25)
- Water (25)
- RFID (24)
- Colorado (23)
- Conservation (23)
- Energy (23)
- Environmental studies (23)
- Management (23)
- Australia (22)
- Publication
-
- Research Collection School Of Computing and Information Systems (220)
- Theses and Dissertations (216)
- Faculty of Informatics - Papers (Archive) (204)
- Faculty of Science - Papers (Archive) (191)
- Computer Science & Engineering Syllabi (139)
-
- Faculty Publications (119)
- Electronic Theses and Dissertations (103)
- S.C. Water Resources Conference (93)
- Turkish Journal of Chemistry (92)
- Sci-Tech News (80)
- Dissertations (79)
- Journal of Electrochemistry (79)
- Turkish Journal of Electrical Engineering and Computer Sciences (75)
- LSU Master's Theses (72)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (72)
- Articles (71)
- Masters Theses (67)
- United States Department of Agriculture Wildlife Services: Staff Publications (66)
- Open Access Theses & Dissertations (65)
- Doctoral Dissertations (64)
- Associate Professor Edward D Burton (63)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (60)
- Applications and Applied Mathematics: An International Journal (AAM) (59)
- LSU Doctoral Dissertations (59)
- Journal of Modern Applied Statistical Methods (58)
- Physics - All Scholarship (58)
- Regis University Student Publications (comprehensive collection) (58)
- Physics (57)
- Physics Faculty Publications (55)
- Physics Faculty Research & Creative Works (55)
- Publication Type
Articles 7261 - 7290 of 8621
Full-Text Articles in Physical Sciences and Mathematics
The Derivation And Testing Of Three-Dimensional Line Equations That Predict The Location Of Brachytherapy Sources, Rhett Ellis Lindsey
The Derivation And Testing Of Three-Dimensional Line Equations That Predict The Location Of Brachytherapy Sources, Rhett Ellis Lindsey
Browse all Theses and Dissertations
In High Dose Rate brachytherapy, a catheter is placed inside the body and a radioactive source is allowed to dwell at specific positions to treat a tumor. In normal usage, anatomical images acquired before the treatment are used to plan dwell positions, and then the plan is executed without further verifying source locations during treatment. However, slight errors in catheter positioning and shifts in internal anatomy cause variations in source position. In this study, a general method for determining dwell positions during treatment is evaluated. For this method, the treatment source exposes the tumor to radiation and creates an image …
Dosimetric Effects Near Implanted Vascular Access Ports Under External Electron Beam Radiation, David Coll Segarra
Dosimetric Effects Near Implanted Vascular Access Ports Under External Electron Beam Radiation, David Coll Segarra
Browse all Theses and Dissertations
Previous studies on dosimetry show important effects for metal vascular access ports for x-rays and electron beams and moderate to no effects for plastic ports for x-ray beams when ports are in the path of the beam. No previous studies exist regarding the effects of electron beams on vascular access ports other than for those made of metal although it has been suggested that electron beam attenuation through non-metal ports may be possible.
Measurements of relative ionization through the device and adjacent to the device anteriorly and laterally were taken. A clinical particle accelerator delivered typical clinical electron beams of …
Routes To Sydno[3,4-A]Quinoxalines, Erik Dihrkop
Routes To Sydno[3,4-A]Quinoxalines, Erik Dihrkop
Browse all Theses and Dissertations
In the present work, the reactivity of alkyl and aryl sydnoquinoxalines was studied. Using a previously developed method, triphenylphosphine-2-(3-sydnonyl)phenylimide was prepared in a two-step process via a diazotization / azidation process of 3-(2-aminophenyl)sydnone, followed by treatment with triphenylphosphine. Due to the inability to achieve previously reported yields, a new, one-step method using Mitsunobu conditions was employed to synthesize the iminophosphorane in a good yield. A similar, brominated iminophosphorane was synthesized using the same conditions in a good yield. Treatment of both the brominated and non-brominated iminophosphoranes with alkyl and aryl isocyanates or isothiocyanates in an aza-Wittig process, gave the corresponding …
Conversion Of Carbon Dioxide And Hydrogen Into Methane In Bench-Scale Microcosms And Packed Column Reactors, Brian Alexander Congiu
Conversion Of Carbon Dioxide And Hydrogen Into Methane In Bench-Scale Microcosms And Packed Column Reactors, Brian Alexander Congiu
Browse all Theses and Dissertations
Escalating energy demands, rising costs, and increasing awareness of the environmental impacts of current energy sources have created an immediate need for sustainable, alternative energy resources and innovative fuel technologies. It is believed that a potential carbon-neutral fuel source can be generated through the microbial production of methane gas by methanogenic archaea. Carbon dioxide captured from the atmosphere and renewable production of hydrogen can be used to support these microorganisms for the large-scale production of methane. Bench-scale investigations involving 160 mL serum bottle batch experiments and two 11L packed-column reactors were conducted to evaluate the feasibility and efficiency of microbial …
Evolution And Analysis Of Neuromorphic Flapping-Wing Flight Controllers, Sanjay Kumar Boddhu
Evolution And Analysis Of Neuromorphic Flapping-Wing Flight Controllers, Sanjay Kumar Boddhu
Browse all Theses and Dissertations
The control of insect-sized flapping-wing micro air vehicles is attracting increasing interest. Solution of the problem requires construction of a controller that is physically small, extremely power efficient, and capable. In addition, process variation in the creation of very small wings and armatures as well as the potential for accumulating damage and wear over the course of a vehicle's lifetime suggest that controllers be able to self-adapt to the specific and possibly changing nature of the vehicles in which they are embedded. Previous work with Evolvable Hardware Continuous Time Recurrent Neural Networks (CTRNNs) as applied to adaptive control of walking …
Electrochemical Oxidation Of Ethanol In Ionic Liquids And Its Possible Use In Fuel Cells, Ashley M. Mason
Electrochemical Oxidation Of Ethanol In Ionic Liquids And Its Possible Use In Fuel Cells, Ashley M. Mason
Browse all Theses and Dissertations
Electrochemical properties of EtOH in EMImBF4 ionic liquid were investigated and compared to the electrochemical properties of EtOH in 0.1M HClO4/H2O. As was shown earlier, oxidation of EtOH in HClO4/H2O involves formation of PtO on the electrode surface, which makes the electrode poisoned. We have found that the best procedure for removal of PtO from the Pt electrode is heating the electrode in concentrated H2SO4. Cyclic voltammograms obtained after cleaning several Pt electrodes conforms that this treatment gives clean Pt electrodes without any PtO. Electrochemical oxidation of EtOH in EMImBF4 ionic liquid show that is poisoning of Pt electrode by …
A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris
A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris
Browse all Theses and Dissertations
Wireless Capsule Endoscopy (WCE) is a new technology that allows medical personnel to view the gastrointestinal (GI) mucosa. It is a swallowable miniature capsule device the size of a pill that transmits thousands of screenshots of the digestive tract to a wearable receiver. When the procedure finishes the video is uploaded to a workstation for viewing. Capsule Endoscopy has been established as a tool to identify various gastrointestinal (GI) conditions, such as blood-based abnormalities, polyps, ulcers, Crohn's disease in the small intestine, where the classical endoscopy is not regularly used.
As of 2009 the market is dominated by Given Imaging …
Skeletal Pathology Of Tibiotarsi In Chick Embryos Exposed To Platinum Group Metals By Micro-Raman Spectroscopy, Jennifer L. Monahan
Skeletal Pathology Of Tibiotarsi In Chick Embryos Exposed To Platinum Group Metals By Micro-Raman Spectroscopy, Jennifer L. Monahan
Browse all Theses and Dissertations
Platinum group metals (PGMs) have been shown to accumulate in various tissues of organisms but their toxicity is not well-known. Raman spectroscopy is a powerful analytical technique that enables direct and non-destructive chemical characterization of bone tissues. PGMs were injected into chick embryos in the following concentrations: 0.1, 1.0, 5.0, or 10.0 ppm solutions of Pt(IV), Rh(III), Pd(II) or PGMs mixtures (0.1 ppm or 1.0 ppm of each metal). The micro-Raman maps recorded on the paraffin embedded tibiotarsus cross-sections showed significant changes in the chemical composition and structure of the bone tissue as a result …
Semantic Provenance: Modeling, Querying, And Application In Scientific Discovery, Satya Sanket Sahoo
Semantic Provenance: Modeling, Querying, And Application In Scientific Discovery, Satya Sanket Sahoo
Browse all Theses and Dissertations
Provenance metadata, describing the history or lineage of an entity, is essential for ensuring data quality, correctness of process execution, and computing trust values. Traditionally, provenance management issues have been dealt with in the context of workflow or relational database systems. However, existing provenance systems are inadequate to address the requirements of an emerging set of applications in the new eScience or Cyberinfrastructure paradigm and the Semantic Web. Provenance in these applications incorporates complex domain semantics on a large scale with a variety of uses, including accurate interpretation by software agents, trustworthy data integration, reproducibility, attribution for commercial or legal …
Understanding User-Generated Content On Social Media, Bala Meenakshi Nagarajan
Understanding User-Generated Content On Social Media, Bala Meenakshi Nagarajan
Browse all Theses and Dissertations
Over the last few years, there has been a growing public and enterprise fascination with 'social media' and its role in modern society. At the heart of this fascination is the ability for users to participate, collaborate, consume, create and share content via a variety of platforms such as blogs, micro-blogs, email, instant messaging services, social network services, collaborative wikis, social bookmarking sites, and multimedia sharing sites.
This dissertation is devoted to understanding informal user-generated textual content on social media platforms and using the results of the analysis to build Social Intelligence Applications.
The body of research presented in this …
Temperature And Ph Responsive Polyethylenimine Systems As Potential Nonviral Gene Vectors, S. Chad Skidmore
Temperature And Ph Responsive Polyethylenimine Systems As Potential Nonviral Gene Vectors, S. Chad Skidmore
Browse all Theses and Dissertations
Modified HPEI was used to determine if the LCST could be controlled by varying multiple variables, including: percent modification, pH, salt solution concentration, and weight percent. Two modifications were done with butylene oxide (Butox) and isobutyryl amide (IBAm). Specifically, 100% (HPEI-Butox1.00)butoxylated and 10% (HPEI-IBAm0.10), 54% (HPEI-IBAm0.54), and 70% (HPEI-IBAm0.70) amidated samples were synthesized. Additionally, HPEI-IBAm0.54 was further modified with hydroxyl ethyl groups (HPEI-IBAm0.54 Eox0.46) and ethyl groups (HPEI-IBAm0.54-Et0.44). The LCSTs of all amidated systems were below body temperature, 37 °C, at pH = 7.4. This indicates an ability of these systems to be used as a vector for gene delivery. …
Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley
Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley
Journal of Digital Forensics, Security and Law
The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …
Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz
Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz
Journal of Digital Forensics, Security and Law
Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay
Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay
Journal of Digital Forensics, Security and Law
The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki
Journal of Digital Forensics, Security and Law
These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli
Journal of Digital Forensics, Security and Law
30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky
Journal of Digital Forensics, Security and Law
This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns
Journal of Digital Forensics, Security and Law
Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler
Journal of Digital Forensics, Security and Law
On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum
Journal of Digital Forensics, Security and Law
Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Trust Account Fraud And Effective Information Security Management, Sameera Mubarak
Journal of Digital Forensics, Security and Law
The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin
Journal of Digital Forensics, Security and Law
The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward
Journal of Digital Forensics, Security and Law
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies
Journal of Digital Forensics, Security and Law
The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma
Journal of Digital Forensics, Security and Law
The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Review In Studies In Medieval And Renaissance Teaching Of "Ents, Elves And Eriador: The Environmental Vision Of J.R.R. Tolkien", Paul Siewers
Other Faculty Research and Publications
A review of a book-length ecocritical study of J.R.R. Tolkien's fantasy writing.
Vibrational Spectroscopic Monitoring Of Co2-O Energy Transfer: Cooling Processes In Atmospheres Of Venus & Mars, Jakob Aaron Schaeffer
Vibrational Spectroscopic Monitoring Of Co2-O Energy Transfer: Cooling Processes In Atmospheres Of Venus & Mars, Jakob Aaron Schaeffer
Honors Theses
The vibrational excitation of CO2 by a fast-moving O atom followed by infrared emission from the vibrationally excited CO2 has been shown to be an important cooling mechanism in the upper atmospheresof Venus, Earth and Mars. We are trying to determine more precisely the efficiency (rate coefficient) of the CO2-O vibrational energy transfer. For experimental ease the reverse reaction is used, i.e. collision of a vibrationally excited CO2 with atomic O, where we are able to convert to the atmospherically relevant reaction via a known equilibrium constant. The goal of this experiment was to measure the magnitudes of rate coefficients …