Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (2284)
- Environmental Sciences (1765)
- Engineering (1608)
- Physics (1588)
- Life Sciences (1452)
-
- Chemistry (1434)
- Earth Sciences (1260)
- Social and Behavioral Sciences (1217)
- Mathematics (1119)
- Oceanography and Atmospheric Sciences and Meteorology (697)
- Statistics and Probability (682)
- Astrophysics and Astronomy (495)
- Electrical and Computer Engineering (437)
- Computer Engineering (434)
- Education (431)
- Geology (425)
- Medicine and Health Sciences (376)
- Applied Mathematics (348)
- Sustainability (329)
- Natural Resources and Conservation (324)
- Arts and Humanities (323)
- Water Resource Management (296)
- Business (290)
- Natural Resources Management and Policy (289)
- Databases and Information Systems (283)
- Environmental Monitoring (250)
- Hydrology (240)
- Software Engineering (225)
- Public Affairs, Public Policy and Public Administration (217)
- Institution
-
- Selected Works (1916)
- University of Nebraska - Lincoln (494)
- TÜBİTAK (448)
- Singapore Management University (362)
- Old Dominion University (212)
-
- SelectedWorks (208)
- Utah State University (208)
- Louisiana State University (203)
- University of South Florida (192)
- Portland State University (187)
- University of Wollongong (184)
- Western Kentucky University (172)
- Wright State University (171)
- University of Texas at El Paso (168)
- University of Nevada, Las Vegas (163)
- University of Kentucky (158)
- Western University (157)
- Wayne State University (155)
- California Polytechnic State University, San Luis Obispo (147)
- Purdue University (144)
- William & Mary (123)
- University of Tennessee, Knoxville (113)
- Embry-Riddle Aeronautical University (111)
- Missouri University of Science and Technology (107)
- University of South Carolina (102)
- Claremont Colleges (101)
- Clemson University (100)
- University of Arkansas, Fayetteville (100)
- University of Central Florida (92)
- Chinese Chemical Society | Xiamen University (91)
- Keyword
-
- Journal Articles (117)
- Applied sciences (83)
- GeoQUEST (82)
- Climate change (81)
- Pure sciences (77)
-
- CMMB (64)
- Watershed Studies (61)
- Chemistry (53)
- Energy (50)
- Sustainability (49)
- Automated Reasoning (44)
- Kentucky (44)
- Physics (44)
- Conservation (43)
- Mathematics (43)
- Brockport (42)
- Education (42)
- Nanoparticles (42)
- Properties (42)
- Storms (42)
- Australia (41)
- GIS (41)
- Lake Ontario (41)
- Water quality (41)
- Weather (40)
- Carbon (39)
- Water (39)
- Magnetic (38)
- For (37)
- Graphene (37)
- Publication
-
- Research Collection School Of Computing and Information Systems (343)
- Theses and Dissertations (341)
- Electronic Theses and Dissertations (170)
- Australian Institute for Innovative Materials - Papers (165)
- Turkish Journal of Electrical Engineering and Computer Sciences (163)
-
- Electronic Thesis and Dissertation Repository (133)
- USF Tampa Graduate Theses and Dissertations (123)
- Joseph C Makarewicz (120)
- Doctoral Dissertations (100)
- Turkish Journal of Mathematics (96)
- Faculty Publications (94)
- Journal of Electrochemistry (91)
- Publications (89)
- Open Access Theses & Dissertations (87)
- Turkish Journal of Chemistry (87)
- Open Access Dissertations (84)
- Departmental Technical Reports (CS) (81)
- Masters Theses (81)
- LSU Doctoral Dissertations (79)
- LSU Master's Theses (77)
- Graduate Theses and Dissertations (76)
- Chemistry Faculty Publications (74)
- Dissertations (74)
- Richard G Roberts (69)
- Gordon Wallace (68)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (68)
- Mammoth Cave Research Symposia (65)
- Physics Faculty Publications (65)
- Dissertations and Theses (64)
- International Conference on Gambling & Risk Taking (60)
- Publication Type
Articles 271 - 300 of 11462
Full-Text Articles in Physical Sciences and Mathematics
Security Of Internet Protocol Cameras – A Case Example, William Campbell
Security Of Internet Protocol Cameras – A Case Example, William Campbell
Australian Digital Forensics Conference
The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of security. This investigation undertakes an analysis of one such device – the DCS 930L internet protocol camera from D Link. This camera is analysed for vulnerabilities, with an emphasis on those relating to authentication mechanisms. Several vulnerabilities are identified, and potential attacks based on these are discussed. Solutions or mitigations to these vulnerabilities are presented.
Including Network Routers In Forensic Investigation, Brian Cusack, Raymond Lutui
Including Network Routers In Forensic Investigation, Brian Cusack, Raymond Lutui
Australian Digital Forensics Conference
Network forensics concerns the identification and preservation of evidence from an event that has occurred or is likely to occur. The scope of network forensics encompasses the networks, systems and devices associated with the physical and human networks. In this paper we are assessing the forensic potential of a router in investigations. A single router is taken as a case study and analysed to determine its forensic value from both static and live investigation perspectives. In the live investigation, tests using steps from two to seven routers were used to establish benchmark expectations for network variations. We find that the …
Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones, Andri P. Heriyanto
Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones, Andri P. Heriyanto
Australian Digital Forensics Conference
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share. Many researchers and works show the procedures and techniques for the acquisition andanalysisthe non volatile memory inmobile phones. On the other hand, the physical memory (RAM) on the smartphone might retain incriminating evidence that could be acquired and analysed by the examiner. This study reveals the proper procedure for acquiring the volatile memory inthe Android smartphone and discusses the use of Linux Memory Extraction (LiME) for dumping the volatile memory. The …
Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim
Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim
Australian Digital Forensics Conference
Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intruders. The reliability of these systems has improved over the past years but the technology has remained largely as it was 3 decades ago. With simple keypads and generally 4 digit PIN codes used for setting and unsetting the alarms, the main protection against a determined intruder is the necessity to choose robust PIN codes. However, with PIN codes chosen that are generally easy to remember and therefore relatively easy to guess, or numbers chosen to follow a pattern on the keypad, the main protection from …
Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, Kiyotsugu Sato
Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, Kiyotsugu Sato
Australian Digital Forensics Conference
Digital watermarks have long been considered as a security feature. A watermarking method that involves the diffusion of limited watermark information into a large part of an image’s data has high robustness. The diffused information is summed up to a single component before detecting the watermark. The summing up process eliminates small noises by an averaging effect, which improves the robustness of the embedded watermark against attack. In this field, thus far, only an asymmetrical Chirp transformation with a small block size has been attempted. In this study, a new verification experiment for a large block size of 256 × …
Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood
Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood
Australian Digital Forensics Conference
Bugs can be found in all code and the consequences are usually managed through upgrade releases, patches, and restarting operating systems and applications. However, in mission critical systems complete fall over systems are built to assure service continuity. In our research we asked the question, what are the professional risks of bugs in digital forensic tools? Our investigation reviewed three high use professional proprietary digital forensic tools, one in which we identified six bugs and evaluated these bug in terms of potential impacts on an investigator’s work. The findings show that yes major brand name digital forensic tools have software …
Exchanging Demands: Weaknesses In Ssl Implementations For Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone
Exchanging Demands: Weaknesses In Ssl Implementations For Mobile Platforms, Peter Hannay, Clinton Carpene, Craig Valli, Andrew Woodward, Mike Johnstone
Australian Information Security Management Conference
The ActiveSync protocol’s implementation on some embedded devices leaves clients vulnerable to unauthorised remote policy enforcement. This paper discusses a proof of concept attack against the implementation of ActiveSync in common Smart phones including Android devices and iOS devices. A two‐phase approach to exploiting the ActiveSync protocol is introduced. Phase 1 details the usage of a man‐in‐the‐middle attack to gain a vantage point over the client device, whilst Phase 2 involves spoofing the server‐side ActiveSync responses to initiate the unauthorised policy enforcement. These vulnerabilities are demonstrated by experiment, highlighting how the system can be exploited to perform a remote factory …
A Simulation-Based Study Of Server Location Selection Rules In Manets Utilising Threshold Cryptography, Alastair Nisbet
A Simulation-Based Study Of Server Location Selection Rules In Manets Utilising Threshold Cryptography, Alastair Nisbet
Australian Information Security Management Conference
Truly Ad Hoc wireless networks where a spontaneous formation of a network occurs and there is no prior knowledge of nodes to each other present significant security challenges, especially as entirely online configuration of nodes with encryption keys must be performed. Utilising threshold cryptography in this type of MANET can greatly increase the security by requiring servers to collaborate to form a single Certificate Authority (CA). In this type of CA responsibility for certificate services is shared between a threshold of servers, greatly increasing security and making attack against the CA considerably more difficult. Choosing which nodes to take on …
The Femur Of Orrorin Tugenensis Exhibits Morphometric Affinities With Both Miocene Apes And Later Hominins, Sergio Almecija, Melissa Tallman, David M. Alba, Marta Pina, Salvador Moya-Sola, William L. Jungers
The Femur Of Orrorin Tugenensis Exhibits Morphometric Affinities With Both Miocene Apes And Later Hominins, Sergio Almecija, Melissa Tallman, David M. Alba, Marta Pina, Salvador Moya-Sola, William L. Jungers
Peer Reviewed Articles
Orrorin tugenensis (Kenya, ca. 6 Ma) is one of the earliest putative hominins. Its proximal femur, BAR 1002′00, was originally described as being very human-like, although later multivariate analyses showed an australopith pattern. However, some of its traits (for example, laterally protruding greater trochanter, medially oriented lesser trochanter and presence of third trochanter) are also present in earlier Miocene apes. Here, we use geometric morphometrics to reassess the morphological affinities of BAR 1002′00 within a large sample of anthropoids (including fossil apes and hominins) and reconstruct hominoid proximal femur evolution using squared-change parsimony. Our results indicate that both hominin …
Lack Of Rnase L Attenuates Macrophage Functions, Xin Yi, Chun Zeng, Hongli Liu, Xiaoli Chen, Ping Zhang, Boo Seok Yun, Ge Jin, Aimin Zhou
Lack Of Rnase L Attenuates Macrophage Functions, Xin Yi, Chun Zeng, Hongli Liu, Xiaoli Chen, Ping Zhang, Boo Seok Yun, Ge Jin, Aimin Zhou
Chemistry Faculty Publications
Background: Macrophages are one of the major cell types in innate immunity against microbial infection. It is believed that the expression of proinflammatory genes such as tumor necrosis factor-α (TNF-α), interleukin (IL)-1β, IL–6, and cyclooxygenase-2 (Cox-2) by macrophages is also crucial for activation of both innate and adaptive immunities. RNase L is an interferon (IFN) inducible enzyme which is highly expressed in macrophages. It has been demonstrated that RNase L regulates the expression of certain inflammatory genes. However, its role in macrophage function is largely unknown. Methodology: Bone marrow-derived macrophages (BMMs) were generated from RNase L+/+and −/− mice. The migration …
Adjusted Tornado Probabilities, Holly M. Widen, James B. Elsner, Cameron Amrine, Rizalino B. Cruz, Erik Fraza, Laura Michaels, Loury Migliorelli, Brendan Mulholland, Michael Patterson, Sarah Strazzo, Guang Xing
Adjusted Tornado Probabilities, Holly M. Widen, James B. Elsner, Cameron Amrine, Rizalino B. Cruz, Erik Fraza, Laura Michaels, Loury Migliorelli, Brendan Mulholland, Michael Patterson, Sarah Strazzo, Guang Xing
Publications
Tornado occurrence rates computed from the available reports are biased low relative to the unknown true rates. To correct for this low bias, the authors demonstrate a method to estimate the annual probability of being struck by a tornado that uses the average report density estimated as a function of distance from nearest city/town center. The method is demonstrated on Kansas and then applied to 15 other tornado-prone states from Nebraska to Tennessee. States are ranked according to their adjusted tornado rate and comparisons are made with raw rates published elsewhere. The adjusted rates, expressed as return periods, arestates, including …
Keeney, Sean Carpenter (Sc 1259), Manuscripts & Folklife Archives
Keeney, Sean Carpenter (Sc 1259), Manuscripts & Folklife Archives
Manuscript Collection Finding Aids
Finding aid only for Manuscripts Small Collection 1259. “My Experience of ‘Andrew,’” by Sean Keeney, Dade County, Florida, relating the effect on him and his family of Hurricane Andrew, which struck the area on 24 August 1992. Includes biographical data on Keeney.
The Halo Occupation Distribution Of X-Ray-Bright Active Galactic Nuclei: A Comparison With Luminous Quasars, Jonathan Richardson, Suchetana Chatterjee, Zheng Zheng, Adam D. Myers, Ryan Hickox
The Halo Occupation Distribution Of X-Ray-Bright Active Galactic Nuclei: A Comparison With Luminous Quasars, Jonathan Richardson, Suchetana Chatterjee, Zheng Zheng, Adam D. Myers, Ryan Hickox
Dartmouth Scholarship
We perform halo occupation distribution (HOD) modeling of the projected two-point correlation function (2PCF) of high-redshift (z~1.2) X-ray-bright active galactic nuclei (AGN) in the XMM-COSMOS field measured by Allevato et al. The HOD parameterization is based on low-luminosity AGN in cosmological simulations. At the median redshift of z~1.2, we derive a median mass of (1.02+0.21/-0.23)x10^{13} Msun/h for halos hosting central AGN and an upper limit of ~10% on the AGN satellite fraction. Our modeling results indicate (at the 2.5-sigma level) that X-ray AGN reside in more massive halos compared to more bolometrically luminous, optically-selected quasars at similar redshift. The modeling …
Magnetic Inhibition Of Convection And The Fundamental Properties Of Low-Mass Stars. I. Stars With A Radiative Core, Gregory A. Feiden, Brian Chaboyer
Magnetic Inhibition Of Convection And The Fundamental Properties Of Low-Mass Stars. I. Stars With A Radiative Core, Gregory A. Feiden, Brian Chaboyer
Dartmouth Scholarship
Magnetic fields are hypothesized to inflate the radii of low-mass stars—defined as less massive than 0.8 M ☉—in detached eclipsing binaries (DEBs). We investigate this hypothesis using the recently introduced magnetic Dartmouth stellar evolution code. In particular, we focus on stars thought to have a radiative core and convective outer envelope by studying in detail three individual DEBs: UV Psc, YY Gem, and CU Cnc. Our results suggest that the stabilization of thermal convection by a magnetic field is a plausible explanation for the observed model-radius discrepancies. However, surface magnetic field strengths required by the models are significantly stronger …
Minimum Rank Problems For Cographs, Nicole Andrea Malloy
Minimum Rank Problems For Cographs, Nicole Andrea Malloy
Theses and Dissertations
Let G be a simple graph on n vertices, and let S(G) be the class of all real-valued symmetric nxn matrices whose nonzero off-diagonal entries occur in exactly the positions corresponding to the edges of G. The smallest rank achieved by a matrix in S(G) is called the minimum rank of G, denoted mr(G). The maximum nullity achieved by a matrix in S(G) is denoted M(G). For each graph G, there is an associated minimum rank class, MR(G) consisting of all matrices A in S(G) with rank A = mr(G). Although no restrictions are applied to the diagonal entries of …
Localized Bases For Kernel Spaces On The Unit Sphere, E. Fuselier, T. Hangelbroek, F. J. Narcowich, J. D. Ward, G. B. Wright
Localized Bases For Kernel Spaces On The Unit Sphere, E. Fuselier, T. Hangelbroek, F. J. Narcowich, J. D. Ward, G. B. Wright
Grady Wright
Approximation/interpolation from spaces of positive definite or conditionally positive definite kernels is an increasingly popular tool for the analysis and synthesis of scattered data and is central to many meshless methods. For a set of N scattered sites, the standard basis for such a space utilizes N globally supported kernels; computing with it is prohibitively expensive for large N. Easily computable, well-localized bases with “small-footprint” basis elements—i.e., elements using only a small number of kernels—have been unavailable. Working on S2, with focus on the restricted surface spline kernels (e.g., the thin-plate splines restricted to the sphere), we construct easily computable, …
U.S. Drought Monitor, December 3, 2013, Michael J. Brewer
U.S. Drought Monitor, December 3, 2013, Michael J. Brewer
United States Agricultural Commodities in Drought Archive
Drought map of U.S. for December 3, 2013 (12/3/13) plus: U.S. crop areas experiencing drought (map), Approximate percentage of crop located in drought, by state (bar graph), Percent of crop area located in drought, past 52 weeks (line graph) for: Corn, Soybeans, Hay, Cattle, Winter wheat.
Drainage Structure Datasets And Effects On Lidar-Derived Surface Flow Modeling, Ruopu Li, Zhenghong Tang, Xu Li, Jessie Winter
Drainage Structure Datasets And Effects On Lidar-Derived Surface Flow Modeling, Ruopu Li, Zhenghong Tang, Xu Li, Jessie Winter
School of Natural Resources: Faculty Publications
With extraordinary resolution and accuracy, Light Detection and Ranging (LiDAR)-derived digital elevation models (DEMs) have been increasingly used for watershed analyses and modeling by hydrologists, planners and engineers. Such high-accuracy DEMs have demonstrated their effectiveness in delineating watershed and drainage patterns at fine scales in low-relief terrains. However, these high-resolution datasets are usually only available as topographic DEMs rather than hydrologic DEMs, presenting greater land roughness that can affect natural flow accumulation. Specifically, locations of drainage structures such as road culverts and bridges were simulated as barriers to the passage of drainage. This paper proposed a geospatial method for producing …
Electron-Impact Vibrational Excitation Of Vibrationally Excited H2 Molecules Involving The Resonant 2(Sigma)G+ Rydberg-Excited Electronic State, R Celiberto, R. K. Janev, V Laporta, J Tennyson, J. M. Wadehra
Electron-Impact Vibrational Excitation Of Vibrationally Excited H2 Molecules Involving The Resonant 2(Sigma)G+ Rydberg-Excited Electronic State, R Celiberto, R. K. Janev, V Laporta, J Tennyson, J. M. Wadehra
Physics and Astronomy Faculty Research Publications
Electron-impact theoretical cross sections and rate coefficients for vibrational excitation of vibrationally excited H2 molecules, occurring through the H−2 resonant species in the 2Σ+g Rydberg-excited electronic state, are presented. The cross sections are calculated as functions of the incident electron energy by adopting the local-complex-potential model for resonant collisions and by using ab initio calculated molecular potentials and resonance widths. The calculations have been extended to all possible vibrational transitions linking all 15 vibrational levels of the electronic ground state of the H2 molecule. The corresponding rate coefficients are also obtained as a function of the electron temperature by assuming …
The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem
The Applicability Of Greulich And Pyle Atlas To Assess Skeletal Age For Four Ethnic Groups, Sameem Abdul Kareem
Sameem Abdul Kareem
Background: Recently, determination of skeletal age, defined as the assessment of bone age, has rapidly become an important task between forensic experts and radiologists. The GreulichePyle (GP) atlas is one of the most frequently used methods for the assessment of skeletal age around the world. After presentation of the GP approach for the estimation of the bone age, much research has been conducted to examine the usability of this method in various geographic or ethnic categories. This study investigates on a small-scale and compares the reliability of the GP atlas for assessment of the bone age for four ethnic groups …
Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith
Situational Awareness/Triage Tool For Use In A Chemical, Biological, Radiological Nuclear Explosive (Cbrne) Environment, John N. Scarlett, Heather L. Gallup, David A. Smith
AFIT Patents
A method of managing patient care and emergency response following a Chemical, Biological, Radiological, or Nuclear Explosive (CBRNE) attack and maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA). The method including identifying each patient with a unique patient identifier, the identifier based upon the geospatial location of the patient, the geospatial location including at least the latitude and longitude of the patient when first treated, the unique patient identifier being part of patient data. Providing a collection point of patient data to form a patient data database where in the patient location data may be used to …
A Comparison Of Evidence Fusion Rules For Situation Recognition In Sensor-Based Environments, Susan Mckeever, Juan Ye
A Comparison Of Evidence Fusion Rules For Situation Recognition In Sensor-Based Environments, Susan Mckeever, Juan Ye
Conference papers
Dempster-Shafer (DS) theory, and its associated Dempster rule of combination, has been widely used to determine belief based on uncertain evi-dence sources. Variations to the original Dempster rule of combination have appeared in the literature to support particular scenarios where unreliable results may result from the use of original DS theory. While theoretical explanations of the rule variations are explained, there is a lack of empirical comparisons of the DS theory and its variations against real data sets. In this work, we examine several variations to DS theory. Using two real-world sensor data sets, we com-pare the performance of DS …
Optimization And Spatial Queueing Models To Support Multi-Server Dispatching Policies With Multiple Servers Per Station, Sardar Ansari
Optimization And Spatial Queueing Models To Support Multi-Server Dispatching Policies With Multiple Servers Per Station, Sardar Ansari
Theses and Dissertations
In this thesis, we propose novel optimization and spatial queueing models that expand the currently existing methods by allowing multiple servers to be located at the same station and multiple servers to be dispatched to a single call. In particular, a mixed integer linear programming (MILP) model is introduced that determines how to locate and dispatch ambulances such that the coverage level is maximized. The model allows multiple servers to be located at the same station and balances the workload among them while maintaining contiguous first priority response districts. We also propose an extension to the approximate Hypercube queueing model …
National Physics Association Honors Spalding, Kim Hill
National Physics Association Honors Spalding, Kim Hill
News and Events
No abstract provided.
Veritas Observations Of The Microquasar Cygnus X-3, P. T. Reynolds, Et Al
Veritas Observations Of The Microquasar Cygnus X-3, P. T. Reynolds, Et Al
Physical Sciences Publications
We report results from TeV gamma-ray observations of the microquasar Cygnus X-3. The observations were made with the Very Energetic Radiation Imaging Telescope Array System (VERITAS) over a time period from 2007 June 11 to 2011 November 28. VERITAS is most sensitive to gamma rays at energies between 85 GeV and 30 TeV. The effective exposure time amounts to a total of about 44 hr, with the observations covering six distinct radio/X-ray states of the object. No significant TeV gamma-ray emission was detected in any of the states, nor with all observations combined. The lack of a positive signal, especially …
The Design And Synthesis Of Magnetic Nanocomposites, Daniel Hudgins
The Design And Synthesis Of Magnetic Nanocomposites, Daniel Hudgins
Theses and Dissertations
Magnetism lies at the core of modern technology and can be found in industries such as oil refining, automotive, telecommunications, personal electronics, and power generation that are integral to our day to day lives. This permeation into everyday life has been enhanced in the past several decades with improvements in material design based upon the principles of nanotechnology leading to smaller, faster, and more efficient devices. The presented research will discuss the synthesis and processing of multiple magnetic nanoparticle structures designed for the enhancement of various, application specific, properties. In the first experiments a tunable core/shell structure was developed with …
Peakon, Pseudo-Peakon, And Cuspon Solutions For Two Generalized Camassa- Holm Equations, Jibin Li, Zhijun Qiao
Peakon, Pseudo-Peakon, And Cuspon Solutions For Two Generalized Camassa- Holm Equations, Jibin Li, Zhijun Qiao
School of Mathematical and Statistical Sciences Faculty Publications and Presentations
In this paper, we study peakon, cuspon, and pseudo-peakon solutions for two generalized Camassa-Holm equations. Based on the method of dynamical systems, the two generalized Camassa-Holm equations are shown to have the parametric representations of the solitary wave solutions such as peakon, cuspon, pseudo-peakons, and periodic cusp solutions. In particular, the pseudo-peakon solution is for the first time proposed in our paper. Moreover, when a traveling system has a singular straight line and a heteroclinic loop, under some parameter conditions, there must be peaked solitary wave solutions appearing.
Estimating Norms Of Commutators [Dataset], Terry A. Loring, Freddy Vides
Estimating Norms Of Commutators [Dataset], Terry A. Loring, Freddy Vides
Math and Statistics Datasets
We find estimates on the norm of a commutator of the form [f(x),y] in terms of the norm of [x,y], assuming that x and y are bounded linear operators on Hilbert space, with x normal and with spectrum within the domain of f. In particular we discuss |[x^2,y]| and |[x^{1/2},y]| for 0leq x leq 1. For larger values of delta = |[x,y]| we can rigorous calculate the best possible upper bound |[f(x),y]| leq eta_f(delta) for many f. In other cases we have conducted numerical experiments that strongly suggest that we have in many cases found the correct formula for the …
Effects Of External Radiation Fields On Line Emission—Application To Star-Forming Regions, Marios Chatzikos, Gary J. Ferland, R. J. R. Williams, Ryan Porter, P. A. M. Vanhoof
Effects Of External Radiation Fields On Line Emission—Application To Star-Forming Regions, Marios Chatzikos, Gary J. Ferland, R. J. R. Williams, Ryan Porter, P. A. M. Vanhoof
Physics and Astronomy Faculty Publications
A variety of astronomical environments contain clouds irradiated by a combination of isotropic and beamed radiation fields. For example, molecular clouds may be irradiated by the isotropic cosmic microwave background, as well as by a nearby active galactic nucleus. These radiation fields excite atoms and molecules and produce emission in different ways. We revisit the escape probability theorem and derive a novel expression that accounts for the presence of external radiation fields. We show that when the field is isotropic the escape probability is reduced relative to that in the absence of external radiation. This is in agreement with previous …
Numerical Studies Of The Generalized L1 Greedy Algorithm For Sparse Signals, Fangjun Arroyo, Edward Arroyo, Xiezhang Li, Jiehua Zhu
Numerical Studies Of The Generalized L1 Greedy Algorithm For Sparse Signals, Fangjun Arroyo, Edward Arroyo, Xiezhang Li, Jiehua Zhu
Xiezhang Li
The generalized l1 greedy algorithm was recently introduced and used to reconstruct medical images in computerized tomography in the compressed sensing framework via total variation minimization. Experimental results showed that this algorithm is superior to the reweighted l1-minimization and l1 greedy algorithms in reconstructing these medical images. In this paper the effectiveness of the generalized l1 greedy algorithm in finding random sparse signals from underdetermined linear systems is investigated. A series of numerical experiments demonstrate that the generalized l1 greedy algorithm is superior to the reweighted l1-minimization and l1 greedy algorithms in the successful recovery of randomly generated Gaussian sparse …