Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2011

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 811 - 840 of 10325

Full-Text Articles in Physical Sciences and Mathematics

Enhanced Quantum Dot Emission For Luminescent Solar Concentrators Using Plasmonic Interaction, Subhash Chandra, Manus Kennedy, John Doran, Sarah Mccormack, A. J. Chatten Nov 2011

Enhanced Quantum Dot Emission For Luminescent Solar Concentrators Using Plasmonic Interaction, Subhash Chandra, Manus Kennedy, John Doran, Sarah Mccormack, A. J. Chatten

Articles

Plasmonic excitation enhanced fluorescence of CdSe/ZnS core-shell quantum dots (QDs) in the presence of Au nanoparticles (NPs) has been studied for application in quantum dot solar concentrator (QDSC) devices. We observe that there is an optimal concentration of Au NPs that gives a maximum 53% fluorescence emission enhancement for the particular QD/Au NP composite studied. The optimal concentration depends on the coupling and spacing between neighboring QDs and Au NPs. We show the continuous transition from fluorescence enhancement to quenching, depending on Au NP concentration. The locally enhanced electromagnetic field induced by the surface plasmon resonance in the Au NPs …


Geometric Structures On Matrix-Valued Subdivision Schemes, James J. Smith Nov 2011

Geometric Structures On Matrix-Valued Subdivision Schemes, James J. Smith

Dissertations

Surface subdivision schemes are used in computer graphics to generate visually smooth surfaces of arbitrary topology. Applications in computer graphics utilize surface normals and curvature. In this paper, formulas are obtained for the first and second partial derivatives of limit surfaces formed using 1-ring subdivision schemes that have 2 by 2 matrix-valued masks. Consequently, surface normals, and Gaussian and mean curvatures can be derived. Both quadrilateral and triangular schemes are considered and for each scheme both interpolatory and approximating schemes are examined. In each case, we look at both extraordinary and regular vertices. Every 3-D vertex of the refinement polyhedrons …


Generalized Exponential Models With Applications, Iman Mabrouk Nov 2011

Generalized Exponential Models With Applications, Iman Mabrouk

Electronic Thesis and Dissertation Repository

We introduce a generalized exponential model whose exact moments and normalizing constant are obtained in terms of Meijer’s generalized hypergeometric G-function. Actually, several widely utilized statistical distributions such as the gamma, Weibull and half-normal constitute particular cases thereof. The generalized inverse Gaussian distribution, which was popularized in the late seventies by Ole Barndor_Neilsen, is also extended by incorporating an additional parameter in its density function, the moments of the resulting distribution being expressed in terms of Bessel functions. A number of data sets were then fitted with diverse exponential-type models for comparison purposes. Additionally, it is shown that the …


Thermodynamic Limit To Photonic-Plasmonic Light-Trapping In Thin Films On Metals, Eric A. Schiff Nov 2011

Thermodynamic Limit To Photonic-Plasmonic Light-Trapping In Thin Films On Metals, Eric A. Schiff

Physics - All Scholarship

We calculate the maximum optical absorptance enhancements in thin semiconductor films on metals due to structures that diffuse light and couple it to surface plasmon polaritons. The calculations can be used to estimate plasmonic effects on light-trapping in solar cells. The calculations are based on the statistical distribution of energy in the electromagnetic modes of the structure, which include surface plasmon polariton modes at the metal interface as well as the trapped waveguide modes in the film. The enhancement has the form 4n2+/h (n – film refractive index, λ – optical wavelength, h …


The Fierce Green Fire: Vol. 2 Issue 11, Wofford College Environmental Studies Program Nov 2011

The Fierce Green Fire: Vol. 2 Issue 11, Wofford College Environmental Studies Program

The Fierce Green Fire

No abstract provided.


Longitudinal High-Dimensional Data Analysis, Vadim Zipunnikov, Sonja Greven, Brian Caffo, Daniel S. Reich, Ciprian Crainiceanu Nov 2011

Longitudinal High-Dimensional Data Analysis, Vadim Zipunnikov, Sonja Greven, Brian Caffo, Daniel S. Reich, Ciprian Crainiceanu

Johns Hopkins University, Dept. of Biostatistics Working Papers

We develop a flexible framework for modeling high-dimensional functional and imaging data observed longitudinally. The approach decomposes the observed variability of high-dimensional observations measured at multiple visits into three additive components: a subject-specific functional random intercept that quantifies the cross-sectional variability, a subject-specific functional slope that quantifies the dynamic irreversible deformation over multiple visits, and a subject-visit specific functional deviation that quantifies exchangeable or reversible visit-to-visit changes. The proposed method is very fast, scalable to studies including ultra-high dimensional data, and can easily be adapted to and executed on modest computing infrastructures. The method is applied to the longitudinal analysis …


Assessing Association For Bivariate Survival Data With Interval Sampling: A Copula Model Approach With Application To Aids Study, Hong Zhu, Mei-Cheng Wang Nov 2011

Assessing Association For Bivariate Survival Data With Interval Sampling: A Copula Model Approach With Application To Aids Study, Hong Zhu, Mei-Cheng Wang

Johns Hopkins University, Dept. of Biostatistics Working Papers

In disease surveillance systems or registries, bivariate survival data are typically collected under interval sampling. It refers to a situation when entry into a registry is at the time of the first failure event (e.g., HIV infection) within a calendar time interval, the time of the initiating event (e.g., birth) is retrospectively identified for all the cases in the registry, and subsequently the second failure event (e.g., death) is observed during the follow-up. Sampling bias is induced due to the selection process that the data are collected conditioning on the first failure event occurs within a time interval. Consequently, the …


Exploring The Universe… One Electron At A Time, Jr Dennison Nov 2011

Exploring The Universe… One Electron At A Time, Jr Dennison

Presentations

No abstract provided.


Electron Energy Dependent Charging Effects Of Multilayered Dielectric Materials, Gregory Wilson, Amberly Evans Jensen, Jr Dennison Nov 2011

Electron Energy Dependent Charging Effects Of Multilayered Dielectric Materials, Gregory Wilson, Amberly Evans Jensen, Jr Dennison

Presentations

No abstract provided.


Overlap Statistics Of Cumuliform Boundary-Layer Cloud Fields In Large-Eddy Simulations, Roel A.J. Neggers, Thijs Heus, A. Pier Siebesma Nov 2011

Overlap Statistics Of Cumuliform Boundary-Layer Cloud Fields In Large-Eddy Simulations, Roel A.J. Neggers, Thijs Heus, A. Pier Siebesma

Physics Faculty Publications

Overlap statistics of cumuliform boundary-layer clouds are studied using large-eddy simulations at high resolutions. The cloud overlap is found to be highly inefficient, due to the typical irregularity of cumuliform clouds over a wide range of scales. The detection of such inefficient overlap is enabled in this study by i) applying fine enough discretizations and ii) by limiting the analysis to exclusively cumuliform boundary-layer cloud fields. It is argued that these two factors explain the differences with some previous studies on cloud overlap. In contrast, good agreement exists with previously reported observations of cloud overlap as derived from lidar measurements …


Launching Return-Oriented Programming Attacks Against Randomized Relocatable Executables, Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha Nov 2011

Launching Return-Oriented Programming Attacks Against Randomized Relocatable Executables, Limin Liu, Jin Han, Debin Gao, Jiwu Jing, Daren Zha

Research Collection School Of Computing and Information Systems

Since the day it was proposed, return-oriented programming has shown to be an effective and powerful attack technique against the write or execute only (W ⊕ X) protection. However, a general belief in the previous research is, systems deployed with address space randomization where the executables are also randomized at run-time are able to defend against return-oriented programming, as the addresses of all instructions are randomized. In this paper, we show that due to the weakness of current address space randomization technique, there are still ways of launching return-oriented programming attacks against those well-protected systems efficiently. We demonstrate and evaluate …


Convection Due To Spatially Distributed Heating, Mohammad Zakir Hossain Nov 2011

Convection Due To Spatially Distributed Heating, Mohammad Zakir Hossain

Electronic Thesis and Dissertation Repository

Convection in an infinite horizontal slot subject to spatially distributed heating has been investigated for a wide range of Prandtl numbers. The primary flow response consists of convection in the form of rolls. When heating wave number alpha is sufficiently large the convection is found to be limited to a layer adjacent to lower wall and a uniform conductive layer emerges at upper section of the slot.

Conditions leading to the emergence of secondary convection have been identified using linear stability of the above primary convection. The secondary convection gives rise to longitudinal, or transverse, or oblique rolls; or to …


Public Accountability And Media : Its Success And Failure In Performing The Role As A Force For Public Accountability, Ratnesh Dwivedi Mr Nov 2011

Public Accountability And Media : Its Success And Failure In Performing The Role As A Force For Public Accountability, Ratnesh Dwivedi Mr

Ratnesh Dwivedi

Media accountability is a phrase that refers to the general (especially western) belief that mass media has to be accountable in the public’s interest - that is, they are expected to behave in certain ways that contribute to the public good. The concept is not clearly defined, and often collides with commercial interests of media owners; legal issues, such as the constitutional right to the freedom of the press in the U.S.; and governmental concerns about public security and order. Several international organizations, like International Freedom of Expression Exchange, Freedom House, International Press Institute, World Press Freedom Committee and the …


Introducing Functional Data Analysis To Neuroimaging, And Vice Versa, Philip T. Reiss Nov 2011

Introducing Functional Data Analysis To Neuroimaging, And Vice Versa, Philip T. Reiss

Philip T. Reiss

No abstract provided.


Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal Nov 2011

Data Warehouse And Business Intelligence: Comparative Analysis Of Olap Tools, Mahesh Kumar Bhetwal

Regis University Student Publications (comprehensive collection)

Data Warehouse applications are designed basically to provide the business communities with accurate and consolidated information. The objective of Data Warehousing applications are not just for collecting data and reporting, but rather for analyzing, it requires technical and business expertise tools. To achieve business intelligence it requires proper tools to be selected. The most commonly used Business intelligence (BI) technologies are Online Analytical Processing (OLAP) and Reporting tools for analyzing the data and to make tactical decision for the better performance of the organization, and more over to provide quick and fast access to end user request. This study will …


Sweep, Step, Pulse, And Frequency-Based Techniques Applied To Protein Monolayer Electrochemistry At Nanoparticle Interfaces, Debbie S. Campbell-Rance, Tran T. Doan, Michael C. Leopold Nov 2011

Sweep, Step, Pulse, And Frequency-Based Techniques Applied To Protein Monolayer Electrochemistry At Nanoparticle Interfaces, Debbie S. Campbell-Rance, Tran T. Doan, Michael C. Leopold

Chemistry Faculty Publications

Protein monolayer electrochemistry (PME), a strategy using synthetic platforms to study the electron transfer (ET) properties of adsorbed proteins, has been successfully applied to proteins adsorbed at monolayer-protected gold cluster (MPCs) assembled films, an adsorption interface shown to be an effective alternative, compared to traditional self-assembled monolayer (SAM) films, for the immobilization and study of ET proteins. Within PME studies, cyclic voltammetry (CV) remains the most commonly applied electrochemical technique in spite of several limitations that occur when the sweep technique is used at either platform. In particular, CV for PME at MPC films results in analysis complications stemming from …


Preparation, Properties, And Reactivity Of Carbonylrhodium(I) Complexes Of Di(2-Pyrazolylaryl)Amido-Pincer Ligands, Sarath Wanniarachchi, Brendan J. Liddle, Sergey V. Lindeman, James R. Gardinier Nov 2011

Preparation, Properties, And Reactivity Of Carbonylrhodium(I) Complexes Of Di(2-Pyrazolylaryl)Amido-Pincer Ligands, Sarath Wanniarachchi, Brendan J. Liddle, Sergey V. Lindeman, James R. Gardinier

Chemistry Faculty Research and Publications

A series of six carbonylrhodium(I) complexes of three new and three previously reported di(2-3R-pyrazolyl)-p-Z/X-aryl)amido pincer ligands, (RZX)Rh(CO), (R is the substituent at the 3-pyrazolyl position proximal to the metal; Z and X are the aryl substituents para- to the arylamido nitrogen) were prepared. The metal complexes were studied to assess how their properties and reactivities can be tuned by varying the groups along the ligand periphery and how they compared to other known carbonylrhodium(I) pincer derivatives. This study was facilitated by the discovery of a new CuI-catalyzed coupling reaction between 2-(pyrazolyl)-4-X-anilines (X = Me or …


Extreme Math Makeover: Mathematics Assessment And Reporting In The Era Of The Common Core Standards, Glenn W. "Max" Mcgee Nov 2011

Extreme Math Makeover: Mathematics Assessment And Reporting In The Era Of The Common Core Standards, Glenn W. "Max" Mcgee

Publications & Research

This presentation discusses the need to develop high quality performance based assessments of the Common Core Mathematical Standards and Mathematical Practices. Several examples of performance assessments from high achieving countries as well as from the 2009 PISA test are included.


Flow Dynamics Of An Accumulation Basin: A Case Study Of Upper Kahiltna Glacier, Mount Mckinley, Alaska, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone Nov 2011

Flow Dynamics Of An Accumulation Basin: A Case Study Of Upper Kahiltna Glacier, Mount Mckinley, Alaska, Seth Campbell, Karl Kreutz, Erich Osterberg, Steven Arcone

Dartmouth Scholarship

We interpreted flow dynamics of the Kahiltna Pass Basin accumulation zone on Mount McKinley, Alaska, USA, using 40, 100 and 900 MHz ground-penetrating radar profiles and GPS surface velocity measurements. We found dipping, englacial surface-conformable strata that experienced vertical thickening as the glacier flowed westward from a steep, higher-velocity (60 m a−1) region into flat terrain associated with a 90° bend in the glacier and lower velocities (15 m a−1) to the south. Stratigraphy near the western side of the basin was surface-conformable to ∼170 m depth and thinned as flow diverged southward, down-glacier. We found complex strata beneath the …


Modeling And Designing Fair Rate Control For Wireless Mesh Networks With Partial Interference, Lei Wang Nov 2011

Modeling And Designing Fair Rate Control For Wireless Mesh Networks With Partial Interference, Lei Wang

Theses and Dissertations

Internet rate control protocols, such as TCP, encounter severe performance problems in wireless mesh networks. Because wireless networks use shared communication channels, contention and interference can significantly degrade flow throughput and fairness. Existing research takes either an engineering-based or optimization-based approach to solve the performance problems. The engineering-based approach usually solves a specific observed problem, but does not necessarily optimize the overall performance. The optimization-based approach mathematically models the network to find the optimal resource allocation among competing flows. The model can lead to a distributed rate control algorithm with performance guarantees, but relatively little work has been done to …


Highly Connected Multicoloured Subgraphs Of Multicoloured Graphs, H. Liu, R. Morris, N. Prince Nov 2011

Highly Connected Multicoloured Subgraphs Of Multicoloured Graphs, H. Liu, R. Morris, N. Prince

Hua Kun Liu

Suppose the edges of the complete graph on n vertices, E(Kn), are coloured using r colours; how large a k-connected subgraph are we guaranteed to find, which uses only at most s of the colours? This question is due to Bollobás, and the case s=1 was considered in Liu et al. [Highly connected monochromatic subgraphs of multicoloured graphs, J. Graph Theory, to appear]. Here we shall consider the case s is greater than or equal to 2, proving in particular that when s=2 and r+1 is a power of 2 then the answer lies between 4n/(r+1)-17kr(r+2k+1) and 4n/(r+1)+4 and that …


A Model Checking Framework For Hierarchical Systems., Truong Khanh Nguyen, Jun Sun, Yang Liu, Jin Song Dong Nov 2011

A Model Checking Framework For Hierarchical Systems., Truong Khanh Nguyen, Jun Sun, Yang Liu, Jin Song Dong

Research Collection School Of Computing and Information Systems

BDD-based symbolic model checking is capable of verifying systems with a large number of states. In this work, we report an extensible framework to facilitate symbolic encoding and checking of hierarchical systems. Firstly, a novel library of symbolic encoding functions for compositional operators (e.g., parallel composition, sequential composition, choice operator, etc.) are developed so that users can apply symbolic model checking techniques to hierarchical systems with little knowledge of symbolic encoding techniques (like BDD or CUDD). Secondly, as the library is language-independent, we build an extensible framework with various symbolic model checking algorithms so that the library can be easily …


Synthesis Of Oligopeptide Fragments For An Skp1 Mimetic, Jarret Curtis Nov 2011

Synthesis Of Oligopeptide Fragments For An Skp1 Mimetic, Jarret Curtis

Honors Theses

No abstract provided.


Judy Reservoir Monitoring Project 2011 Final Report, Robin A. Matthews, Joan Vandersypen Nov 2011

Judy Reservoir Monitoring Project 2011 Final Report, Robin A. Matthews, Joan Vandersypen

Judy Reservoir

The purpose of this study was to identify and count the phytoplankton and measure chlorophyll, total nitrogen, and total phosphorus levels in water samples collected from Judy Reservoir. Water quality and algal data have been collected on a weekly basis since October 2006; annual reports have been sent to the Skagit Public Utility District No. 1 in 2007, 2008, and 2010 (January and December).


Equation Of State From The Potts-Percolation Model Of A Solid, Miron Kaufman Nov 2011

Equation Of State From The Potts-Percolation Model Of A Solid, Miron Kaufman

Physics Faculty Publications

We expand the Potts-percolation model of a solid to include stress and strain. Neighboring atoms are connected by bonds. We set the energy of a bond to be given by the Lennard-Jones potential. If the energy is larger than a threshold the bond is more likely to fail, whereas if the energy is lower than the threshold, the bond is more likely to be alive. In two dimensions we compute the equation of state: stress as a function of interatomic distance and temperature by using renormalization-group and Monte Carlo simulations. The phase diagram, the equation of state, and the isothermal …


Determining The Feasibility Of Implementing A Beekeeping Cooperative In The Bloomington-Normal, Illinois Area, Courtney Luensman '12 Nov 2011

Determining The Feasibility Of Implementing A Beekeeping Cooperative In The Bloomington-Normal, Illinois Area, Courtney Luensman '12

Outstanding Senior Seminar Papers

The purpose of this study was to determine the feasibility of implementing a beekeeping cooperative in the Bloomington-Normal, Illinois area. Through the literature review, it is exhibited that honeybees play a very important role in the pollination of certain crops, but there has been a decline in honeybee population, which could result in possible crop reduction. My research was determining benefits and feasibility in the formation of a beekeeping cooperative. Through conducting interviews with beekeepers, farmers, cooperatives, and agricultural organizations, I have determined that there are significant benefits to be gained from the presence of a cooperative, although there are …


Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong Nov 2011

Non-Redundant Sequential Rules,Theory And Algorithm, David Lo, Siau-Cheng Khoo, Limsoon Wong

David LO

A sequential rule expresses a relationship between two series of events happening one after another. Sequential rules are potentially useful for analyzing data in sequential format, ranging from purchase histories, network logs and program execution traces. In this work, we investigate and propose a syntactic characterization of a non-redundant set of sequential rules built upon past work on compact set of representative patterns. A rule is redundant if it can be inferred from another rule having the same support and confidence. When using the set of mined rules as a composite filter, replacing a full set of rules with a …


Mining Temporal Rules From Program Execution Traces, David Lo, Siau-Cheng Khoo, Chao Liu Nov 2011

Mining Temporal Rules From Program Execution Traces, David Lo, Siau-Cheng Khoo, Chao Liu

David LO

Specification mining is a process of extracting specifications, often from program execution traces. These specifications can in turn be used to aid program understanding, monitoring and verification. There are a number of dynamic-analysis-based specification mining tools in the literature, however none so far extract past time temporal expressions in the form of rules stating: "whenever a series of events occurs, previously another series of events has happened". Rules of this format are commonly found in practice and useful for various purposes. Most rule-based specification mining tools only mine future-time temporal expression. Many past-time temporal rules like "whenever a resource is …


Efficient Mining Of Iterative Patterns For Software Specification Discovery, David Lo, Siau-Cheng Khoo, Chao Liu Nov 2011

Efficient Mining Of Iterative Patterns For Software Specification Discovery, David Lo, Siau-Cheng Khoo, Chao Liu

David LO

Studies have shown that program comprehension takes up to 45% of software development costs. Such high costs are caused by the lack-of documented specification and further aggravated by the phenomenon of software evolution. There is a need for automated tools to extract specifications to aid program comprehension. In this paper, a novel technique to efficiently mine common software temporal patterns from traces is proposed. These patterns shed light on program behaviors, and are termed iterative patterns. They capture unique characteristic of software traces, typically not found in arbitrary sequences. Specifically, due to loops, interesting iterative patterns can occur multiple times …


Identifying Bug Signatures Using Discriminative Graph Mining, Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan Nov 2011

Identifying Bug Signatures Using Discriminative Graph Mining, Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xifeng Yan

David LO

Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Although such methods could be very accurate, it is usually very hard for developers to understand the context of the bug, given each bug location in isolation. In this study, we propose to model software executions with graphs at two levels of granularity: methods and basic blocks. An individual node represents a method or basic block and an edge represents a method call, method return or transition (at the method or basic …