Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2010

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 7261 - 7290 of 8621

Full-Text Articles in Physical Sciences and Mathematics

The Derivation And Testing Of Three-Dimensional Line Equations That Predict The Location Of Brachytherapy Sources, Rhett Ellis Lindsey Jan 2010

The Derivation And Testing Of Three-Dimensional Line Equations That Predict The Location Of Brachytherapy Sources, Rhett Ellis Lindsey

Browse all Theses and Dissertations

In High Dose Rate brachytherapy, a catheter is placed inside the body and a radioactive source is allowed to dwell at specific positions to treat a tumor. In normal usage, anatomical images acquired before the treatment are used to plan dwell positions, and then the plan is executed without further verifying source locations during treatment. However, slight errors in catheter positioning and shifts in internal anatomy cause variations in source position. In this study, a general method for determining dwell positions during treatment is evaluated. For this method, the treatment source exposes the tumor to radiation and creates an image …


Dosimetric Effects Near Implanted Vascular Access Ports Under External Electron Beam Radiation, David Coll Segarra Jan 2010

Dosimetric Effects Near Implanted Vascular Access Ports Under External Electron Beam Radiation, David Coll Segarra

Browse all Theses and Dissertations

Previous studies on dosimetry show important effects for metal vascular access ports for x-rays and electron beams and moderate to no effects for plastic ports for x-ray beams when ports are in the path of the beam. No previous studies exist regarding the effects of electron beams on vascular access ports other than for those made of metal although it has been suggested that electron beam attenuation through non-metal ports may be possible.

Measurements of relative ionization through the device and adjacent to the device anteriorly and laterally were taken. A clinical particle accelerator delivered typical clinical electron beams of …


Routes To Sydno[3,4-A]Quinoxalines, Erik Dihrkop Jan 2010

Routes To Sydno[3,4-A]Quinoxalines, Erik Dihrkop

Browse all Theses and Dissertations

In the present work, the reactivity of alkyl and aryl sydnoquinoxalines was studied. Using a previously developed method, triphenylphosphine-2-(3-sydnonyl)phenylimide was prepared in a two-step process via a diazotization / azidation process of 3-(2-aminophenyl)sydnone, followed by treatment with triphenylphosphine. Due to the inability to achieve previously reported yields, a new, one-step method using Mitsunobu conditions was employed to synthesize the iminophosphorane in a good yield. A similar, brominated iminophosphorane was synthesized using the same conditions in a good yield. Treatment of both the brominated and non-brominated iminophosphoranes with alkyl and aryl isocyanates or isothiocyanates in an aza-Wittig process, gave the corresponding …


Conversion Of Carbon Dioxide And Hydrogen Into Methane In Bench-Scale Microcosms And Packed Column Reactors, Brian Alexander Congiu Jan 2010

Conversion Of Carbon Dioxide And Hydrogen Into Methane In Bench-Scale Microcosms And Packed Column Reactors, Brian Alexander Congiu

Browse all Theses and Dissertations

Escalating energy demands, rising costs, and increasing awareness of the environmental impacts of current energy sources have created an immediate need for sustainable, alternative energy resources and innovative fuel technologies. It is believed that a potential carbon-neutral fuel source can be generated through the microbial production of methane gas by methanogenic archaea. Carbon dioxide captured from the atmosphere and renewable production of hydrogen can be used to support these microorganisms for the large-scale production of methane. Bench-scale investigations involving 160 mL serum bottle batch experiments and two 11L packed-column reactors were conducted to evaluate the feasibility and efficiency of microbial …


Evolution And Analysis Of Neuromorphic Flapping-Wing Flight Controllers, Sanjay Kumar Boddhu Jan 2010

Evolution And Analysis Of Neuromorphic Flapping-Wing Flight Controllers, Sanjay Kumar Boddhu

Browse all Theses and Dissertations

The control of insect-sized flapping-wing micro air vehicles is attracting increasing interest. Solution of the problem requires construction of a controller that is physically small, extremely power efficient, and capable. In addition, process variation in the creation of very small wings and armatures as well as the potential for accumulating damage and wear over the course of a vehicle's lifetime suggest that controllers be able to self-adapt to the specific and possibly changing nature of the vehicles in which they are embedded. Previous work with Evolvable Hardware Continuous Time Recurrent Neural Networks (CTRNNs) as applied to adaptive control of walking …


Electrochemical Oxidation Of Ethanol In Ionic Liquids And Its Possible Use In Fuel Cells, Ashley M. Mason Jan 2010

Electrochemical Oxidation Of Ethanol In Ionic Liquids And Its Possible Use In Fuel Cells, Ashley M. Mason

Browse all Theses and Dissertations

Electrochemical properties of EtOH in EMImBF4 ionic liquid were investigated and compared to the electrochemical properties of EtOH in 0.1M HClO4/H2O. As was shown earlier, oxidation of EtOH in HClO4/H2O involves formation of PtO on the electrode surface, which makes the electrode poisoned. We have found that the best procedure for removal of PtO from the Pt electrode is heating the electrode in concentrated H2SO4. Cyclic voltammograms obtained after cleaning several Pt electrodes conforms that this treatment gives clean Pt electrodes without any PtO. Electrochemical oxidation of EtOH in EMImBF4 ionic liquid show that is poisoning of Pt electrode by …


A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris Jan 2010

A Novel Synergistic Diagnosis Methodology For Identifying Abnormalities In Wireless Capsule Endoscopy Videos, Alexandros Karargyris

Browse all Theses and Dissertations

Wireless Capsule Endoscopy (WCE) is a new technology that allows medical personnel to view the gastrointestinal (GI) mucosa. It is a swallowable miniature capsule device the size of a pill that transmits thousands of screenshots of the digestive tract to a wearable receiver. When the procedure finishes the video is uploaded to a workstation for viewing. Capsule Endoscopy has been established as a tool to identify various gastrointestinal (GI) conditions, such as blood-based abnormalities, polyps, ulcers, Crohn's disease in the small intestine, where the classical endoscopy is not regularly used.

As of 2009 the market is dominated by Given Imaging …


Skeletal Pathology Of Tibiotarsi In Chick Embryos Exposed To Platinum Group Metals By Micro-Raman Spectroscopy, Jennifer L. Monahan Jan 2010

Skeletal Pathology Of Tibiotarsi In Chick Embryos Exposed To Platinum Group Metals By Micro-Raman Spectroscopy, Jennifer L. Monahan

Browse all Theses and Dissertations

Platinum group metals (PGMs) have been shown to accumulate in various tissues of organisms but their toxicity is not well-known. Raman spectroscopy is a powerful analytical technique that enables direct and non-destructive chemical characterization of bone tissues. PGMs were injected into chick embryos in the following concentrations: 0.1, 1.0, 5.0, or 10.0 ppm solutions of Pt(IV), Rh(III), Pd(II) or PGMs mixtures (0.1 ppm or 1.0 ppm of each metal). The micro-Raman maps recorded on the paraffin embedded tibiotarsus cross-sections showed significant changes in the chemical composition and structure of the bone tissue as a result …


Semantic Provenance: Modeling, Querying, And Application In Scientific Discovery, Satya Sanket Sahoo Jan 2010

Semantic Provenance: Modeling, Querying, And Application In Scientific Discovery, Satya Sanket Sahoo

Browse all Theses and Dissertations

Provenance metadata, describing the history or lineage of an entity, is essential for ensuring data quality, correctness of process execution, and computing trust values. Traditionally, provenance management issues have been dealt with in the context of workflow or relational database systems. However, existing provenance systems are inadequate to address the requirements of an emerging set of applications in the new eScience or Cyberinfrastructure paradigm and the Semantic Web. Provenance in these applications incorporates complex domain semantics on a large scale with a variety of uses, including accurate interpretation by software agents, trustworthy data integration, reproducibility, attribution for commercial or legal …


Understanding User-Generated Content On Social Media, Bala Meenakshi Nagarajan Jan 2010

Understanding User-Generated Content On Social Media, Bala Meenakshi Nagarajan

Browse all Theses and Dissertations

Over the last few years, there has been a growing public and enterprise fascination with 'social media' and its role in modern society. At the heart of this fascination is the ability for users to participate, collaborate, consume, create and share content via a variety of platforms such as blogs, micro-blogs, email, instant messaging services, social network services, collaborative wikis, social bookmarking sites, and multimedia sharing sites.

This dissertation is devoted to understanding informal user-generated textual content on social media platforms and using the results of the analysis to build Social Intelligence Applications.

The body of research presented in this …


Temperature And Ph Responsive Polyethylenimine Systems As Potential Nonviral Gene Vectors, S. Chad Skidmore Jan 2010

Temperature And Ph Responsive Polyethylenimine Systems As Potential Nonviral Gene Vectors, S. Chad Skidmore

Browse all Theses and Dissertations

Modified HPEI was used to determine if the LCST could be controlled by varying multiple variables, including: percent modification, pH, salt solution concentration, and weight percent. Two modifications were done with butylene oxide (Butox) and isobutyryl amide (IBAm). Specifically, 100% (HPEI-Butox1.00)butoxylated and 10% (HPEI-IBAm0.10), 54% (HPEI-IBAm0.54), and 70% (HPEI-IBAm0.70) amidated samples were synthesized. Additionally, HPEI-IBAm0.54 was further modified with hydroxyl ethyl groups (HPEI-IBAm0.54 Eox0.46) and ethyl groups (HPEI-IBAm0.54-Et0.44). The LCSTs of all amidated systems were below body temperature, 37 °C, at pH = 7.4. This indicates an ability of these systems to be used as a vector for gene delivery. …


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley Jan 2010

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task …


Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz Jan 2010

Adaptation Of Pyflag To Efficient Analysis Of Seized Computer Data Storage, Aleksander Byrski, Wojciech Stryjewski, Bartłomiej Czechowicz

Journal of Digital Forensics, Security and Law

Based on existing software aimed at investigation support in the analysis of computer data storage seized during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay Jan 2010

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed in the …


Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki Jan 2010

Higate (High Grade Anti-Tamper Equipment) Prototype And Application To E-Discovery, Yui Sakurai, Yuki Ashino, Tetsutaro Uehara, Hiroshi Yoshiura, Ryoichi Sasaki

Journal of Digital Forensics, Security and Law

These days, most data is digitized and processed in various ways by computers. In the past, computer owners were free to process data as desired and to observe the inputted data as well as the interim results. However, the unrestricted processing of data and accessing of interim results even by computer users is associated with an increasing number of adverse events. These adverse events often occur when sensitive data such as personal or confidential business information must be handled by two or more parties, such as in the case of e-Discovery, used in legal proceedings, or epidemiologic studies. To solve …


Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli Jan 2010

Developing Voip Honeypots: A Preliminary Investigation Into Malfeasant Activity, Craig Valli

Journal of Digital Forensics, Security and Law

30 years ago PABX systems were compromised by hackers wanting to make long distance calls at some other entities expense. This activity faded as telephony became cheaper and PABX systems had countermeasures installed to overcome attacks. Now the world has moved onto the provision of telephony via broadband enabled Voice over Internet Protocol (VoIP) with this service now being provided as a replacement for conventional fixed wire telephony by major telecommunication providers worldwide. Due to increasing bandwidth it is possible for systems to support multiple voice connections simultaneously. The networked nature of the Internet allows for attackers of these VoIP …


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky Jan 2010

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability …


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns Jan 2010

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills. …


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler Jan 2010

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won't …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum Jan 2010

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this …


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak Jan 2010

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. …


Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin Jan 2010

Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin

Journal of Digital Forensics, Security and Law

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic …


Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward Jan 2010

Malware Forensics: Discovery Of The Intent Of Deception, Murray Brand, Craig Valli, Andrew Woodward

Journal of Digital Forensics, Security and Law

Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis …


The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies Jan 2010

The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies

Journal of Digital Forensics, Security and Law

The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the …


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma Jan 2010

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers involved. …


Table Of Contents Jan 2010

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Review In Studies In Medieval And Renaissance Teaching Of "Ents, Elves And Eriador: The Environmental Vision Of J.R.R. Tolkien", Paul Siewers Jan 2010

Review In Studies In Medieval And Renaissance Teaching Of "Ents, Elves And Eriador: The Environmental Vision Of J.R.R. Tolkien", Paul Siewers

Other Faculty Research and Publications

A review of a book-length ecocritical study of J.R.R. Tolkien's fantasy writing.


Vibrational Spectroscopic Monitoring Of Co2-O Energy Transfer: Cooling Processes In Atmospheres Of Venus & Mars, Jakob Aaron Schaeffer Jan 2010

Vibrational Spectroscopic Monitoring Of Co2-O Energy Transfer: Cooling Processes In Atmospheres Of Venus & Mars, Jakob Aaron Schaeffer

Honors Theses

The vibrational excitation of CO2 by a fast-moving O atom followed by infrared emission from the vibrationally excited CO2 has been shown to be an important cooling mechanism in the upper atmospheresof Venus, Earth and Mars. We are trying to determine more precisely the efficiency (rate coefficient) of the CO2-O vibrational energy transfer. For experimental ease the reverse reaction is used, i.e. collision of a vibrationally excited CO2 with atomic O, where we are able to convert to the atmospherically relevant reaction via a known equilibrium constant. The goal of this experiment was to measure the magnitudes of rate coefficients …