Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2013

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 9961 - 9990 of 11462

Full-Text Articles in Physical Sciences and Mathematics

Reducing Communication Delay Variability For A Group Of Robots, Goncalo Martins Jan 2013

Reducing Communication Delay Variability For A Group Of Robots, Goncalo Martins

Electronic Theses and Dissertations

A novel architecture is presented for reducing communication delay variability for a group of robots. This architecture relies on using three components: a microprocessor architecture that allows deterministic real-time tasks; an event-based communication protocol in which nodes transmit in a TDMA fashion, without the need of global clock synchronization techniques; and a novel communication scheme that enables deterministic communications by allowing senders to transmit without regard for the state of the medium or coordination with other senders, and receivers can tease apart messages sent simultaneously with a high probability of success. This approach compared to others, allows simultaneous communications without …


Geochemical And Isotopic Characterization Of Lead In Fugitive Dust From Unsurfaced Roads In Missouri, Emitt C. Witt Jan 2013

Geochemical And Isotopic Characterization Of Lead In Fugitive Dust From Unsurfaced Roads In Missouri, Emitt C. Witt

Doctoral Dissertations

"Eighteen unsurfaced roadways in Missouri's rural Ozark region were sampled to characterize the differences in trace element and isotopic chemistry to determine if there is a human health concern with inhaling and/or ingestion of fugitive dust generated by a moving vehicle. Road reaches were selected to represent those in similar rural areas with and without the presence of mining activity--13 roads were selected in the Viburnum Trend (VT) resource mining area and five were located to the southwest of the mining areas. Samples were collected using a novel cyclonic fugitive dust sampler (patent pending) that collects a composite sample from …


Fourteenth Kenneth C. Schraut Memorial Lecture (Poster), University Of Dayton. Department Of Mathematics Jan 2013

Fourteenth Kenneth C. Schraut Memorial Lecture (Poster), University Of Dayton. Department Of Mathematics

Kenneth C. Schraut Memorial Lectures

No abstract provided.


In Silico Investigation Of Ph-Dependence Of Prolactin And Human Growth Hormone Binding To Human Prolactin Receptor, Lin Wang, Shawn Witham, Zhe Zhang, Michael E. Hodsdon, Emil Alexov Jan 2013

In Silico Investigation Of Ph-Dependence Of Prolactin And Human Growth Hormone Binding To Human Prolactin Receptor, Lin Wang, Shawn Witham, Zhe Zhang, Michael E. Hodsdon, Emil Alexov

Publications

Experimental data shows that the binding of human prolactin (hPRL) to human prolactin receptor (hPRLr-ECD) is strongly pH-dependent, while the binding of the same receptor to human growth hormone (hGH) is pH-independent. Here we carry in silico analysis of the molecular effects causing such a difference and reveal the role of individual amino acids. It is shown that the computational modeling correctly predicts experimentally determined pKa’s of histidine residues in an unbound state in the majority of the cases and the pH-dependence of the binding free energy. Structural analysis carried in conjunction with calculated pH-dependence of the binding revealed that …


Accelerated Fuzzy Clustering, Jonathon Karl Parker Jan 2013

Accelerated Fuzzy Clustering, Jonathon Karl Parker

USF Tampa Graduate Theses and Dissertations

Clustering algorithms are a primary tool in data analysis, facilitating the discovery of groups and structure in unlabeled data. They are used in a wide variety of industries and applications. Despite their ubiquity, clustering algorithms have a flaw: they take an unacceptable amount of time to run as the number of data objects increases. The need to compensate for this flaw has led to the development of a large number of techniques intended to accelerate their performance. This need grows greater every day, as collections of unlabeled data grow larger and larger. How does one increase the speed of a …


Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun Jan 2013

Prevention And Detection Of Intrusions In Wireless Sensor Networks, Ismail Butun

USF Tampa Graduate Theses and Dissertations

Wireless Sensor Networks (WSNs) continue to grow as one of the most exciting and challenging research areas of engineering. They are characterized by severely constrained computational and energy

resources and also restricted by the ad-hoc network operational

environment. They pose unique challenges, due to limited power

supplies, low transmission bandwidth, small memory sizes and limited energy. Therefore, security techniques used in traditional networks cannot be directly adopted. So, new ideas and approaches are needed, in order to increase the overall security of the network. Security applications in such resource constrained WSNs with minimum overhead provides significant challenges, and is the …


Refinement, Application, And Evaluation Of Cognitive And Affective Chemistry Measures For College Students, Keily Heredia Jan 2013

Refinement, Application, And Evaluation Of Cognitive And Affective Chemistry Measures For College Students, Keily Heredia

USF Tampa Graduate Theses and Dissertations

This work describes three case studies conducted to address two major problems in the area of chemistry education research, the lack of reported psychometrics regarding instrument scores, and the need for well-characterized assessments to evaluate college chemistry curricula.

The first case study describes a psychometric evaluation of the Colorado Learning Attitudes about Science Survey (CLASS), an instrument designed to assess student beliefs about the learning of chemistry. Results from this work suggest that the CLASS instrument provides fertile ground for short instruments with reasonable psychometric properties. Responses to a single scale instrument, created from CLASS, showed that students in an …


Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh Jan 2013

Consumer Acceptance Of Mobile Payments In Restaurants, Anna Shatskikh

USF Tampa Graduate Theses and Dissertations

Regardless all the advantages of MPs, it has not reach the sizable customer base. In this paper, we examined the core drivers of using mobile payments (MPs) in restaurant industry from the consumers' perspective. Based on the Technology Acceptance Model (TAM), we developed a six factor model to reveal the determinants of consumers' intention to use MPs in restaurant. Security, subjective norm, compatibility with lifestyle, and previous experience with MPs were added to the traditional two factor TAM model (usefulness and ease of use). 300 respondents were recruited from an online survey agency and 258 valid responses were included in …


Non-Equilibrium Melting And Sublimation Of Graphene Simulated With Two Interatomic Potentials, Brad Steele Jan 2013

Non-Equilibrium Melting And Sublimation Of Graphene Simulated With Two Interatomic Potentials, Brad Steele

USF Tampa Graduate Theses and Dissertations

The mechanisms of the sublimation of graphene at zero pressure and the condensation of carbon vapor is investigated by molecular dynamics (MD) simulations. The interatomic interactions are described by the Reactive Empirical Bond Order potential (REBO). It is found that graphene sublimates at a temperature of 5,200 K. At the onset of sublimation, defects that contain several pentagons and heptagons are formed, that are shown to evolve from double vacancies and stone wales defects. These defects consisting of pentagons and heptagons act as nucleation sites for the gaseous phase. The influence of the interatomic interactions on the sublimation process are …


Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi Jan 2013

Packet Coalescing And Server Substitution For Energy-Proportional Operation Of Network Links And Data Servers, Mehrgan Mostowfi

USF Tampa Graduate Theses and Dissertations

Electricity generation for Information and Communications Technology (ICT) contributes over 2% of the human-generated CO2 to the atmosphere. Energy costs are rapidly becoming the major operational expense for ICT and may soon dwarf capital expenses as software and hardware continue to drop in price. In this dissertation, three new approaches to achieving energy-proportional operation of network links and data servers are explored.

Ethernet is the dominant wireline communications technology for Internet connectivity. IEEE 802.3az Energy Efficient Ethernet (EEE) describes a Low Power Idle (LPI) mechanism for allowing Ethernet links to sleep. A method of coalescing packets to consolidate link idle …


Online Deception Detection Using Bdi Agents, Richard Alan Merritts Jan 2013

Online Deception Detection Using Bdi Agents, Richard Alan Merritts

CCE Theses and Dissertations

This research has two facets within separate research areas. The research area of Belief, Desire and Intention (BDI) agent capability development was extended. Deception detection research has been advanced with the development of automation using BDI agents. BDI agents performed tasks automatically and autonomously. This study used these characteristics to automate deception detection with limited intervention of human users. This was a useful research area resulting in a capability general enough to have practical application by private individuals, investigators, organizations and others. The need for this research is grounded in the fact that humans are not very effective at detecting …


Promoting The Affective Domain Within Online Education, Stephen Roche Jan 2013

Promoting The Affective Domain Within Online Education, Stephen Roche

CCE Theses and Dissertations

In the past decade Higher Education Institutions have experienced tremendous growth in enrollments. To meet this demand, many higher education institutions have embraced online education and its requisite technologies. Online education has matured, and studies focusing on the cognitive domain indicate that distance education is as effective as the traditional face-to-face instructional modality. However, there is a scarcity of affective domain studies due to: a) the need for the institutions of higher education to perform quantitative studies to establish the quality of online education b) the affective domain's inherent subjective nature, and c) the educational research environment has slow recognition …


A Comprehensive Approach To Alluvial Fan Management: A Case Study Of Travertine Point, Coachella Valley, Jason Joseph Thomas Jan 2013

A Comprehensive Approach To Alluvial Fan Management: A Case Study Of Travertine Point, Coachella Valley, Jason Joseph Thomas

Theses Digitization Project

The purpose of this project is to make a contribution towards improving the sustainability of developments (master plan communities) on alluvial fans. To do this, the authors intent is to further the goals of the Integrated Approach for Sustainable Development on Alluvial Fans Task Force.


A New Phantom And Gradient Isocenter Estimation For Magnetic Resonance Imaging Distortion Correction, Zongqi Cai Jan 2013

A New Phantom And Gradient Isocenter Estimation For Magnetic Resonance Imaging Distortion Correction, Zongqi Cai

Theses Digitization Project

The purpose of this study was to develop and implement a numerical software based method that can accurately correct the distortion of MR images generated by 3T MRI scanner. To accomplish this, a new phantom has been designed from scratch to capture the distortions inside 3T MRI scanner. An algorithm has been developed, based on the unique geometric feature of the new phantom, to estimate the location of gradient isocenter of the magnetic field inside 3T MRI scanner for the first time.


The Fibonacci Sequence And Hosoya's Triangle, Jeffrey Lee Smith Jan 2013

The Fibonacci Sequence And Hosoya's Triangle, Jeffrey Lee Smith

Theses Digitization Project

The purpose of this thesis is to study the Fibonacci sequence in a context many are unfamiliar with. A triangular array of numbers, similar looking to Pascal's triangle, was constructed a few decades ago and is called Hosoya's triangle. Each element within the triangle is created using Fibonacci numbers.


Online Examination System, Yuvesh Kumar Singh Jan 2013

Online Examination System, Yuvesh Kumar Singh

Theses Digitization Project

The purpose of this project focused on how to implement a secure environment for online-examination in an academic and business environment without the need of any special network topologies and hardware devices. It will not only reduce the instructor's load, but will also enhance the system flexibility to fit every instructor's needs and from the examinees point of view. Contains source code.


Comparing The Algebraic And Analytical Properties Of P-Adic Numbers With Real Numbers, Joseph Colton Wilson Jan 2013

Comparing The Algebraic And Analytical Properties Of P-Adic Numbers With Real Numbers, Joseph Colton Wilson

Theses Digitization Project

This study will provide a glimpse into the world of p-adic numbers, which encompasses a different way to measure the distance between rational numbers. Simple calculations and surprising results are examined to help familiarize the reader to the new space.


Stereotactic Localization And Targeting Accuracy For Experimental Proton Radiosurgery, Yin Chen Jan 2013

Stereotactic Localization And Targeting Accuracy For Experimental Proton Radiosurgery, Yin Chen

Theses Digitization Project

The purpose of this study was to improve an existing experimental proton radiosurgery system at Loma Linda University Medical Center to reach sub-millimeter accuracy before proton radiosurgery with narrow beams can be used in a clinical trial. Protons, different from photons (i.e., x-rays or gamma rays), are charged with particles that slow down in matter and release a burst of energy near the end of their range (maximum depth of penetration), which is called the Bragg peak, named after the physicist William Henry Bragg who discovered it in 1903. Photon beams deliver most doses over a large area near the …


The Banach-Tarski Paradox, Matthew Jacob Norman Jan 2013

The Banach-Tarski Paradox, Matthew Jacob Norman

Theses Digitization Project

The purpose of this thesis is to establish the history and motivation leading up to the Banach-Tarski Paradox, as well as its proof. This study discusses the early history of set theory as it is documented as well as the necessary basics of set theory in order to further understand the contents within. Set theory not only proved to be for the mathematical at heart but also struck interest into the mind of philosophers, theologians, and logicians.


Plasma Confinement: Mathematical Modeling Of A Fusion Reactor, James Scott Jones Jan 2013

Plasma Confinement: Mathematical Modeling Of A Fusion Reactor, James Scott Jones

Theses Digitization Project

This study will discuss currently used power sources and their drawbacks, leading to covering fusion as an energy source and its potential. Fusion has three significant important advantages: Fuel reserves, safety, and environment. A significant amount of fuel reserves comes from the natural occurrence in ocean water of deuterium at a 1 to 6700 ratio, accounting for the energy supply being on the order of 2 billion years. Fusion does not produce any greenhouse gases and its only 'exhaust' is that of harmless inert helium.


Ticketing And Event Management Web Service, Nikolay Figurin Jan 2013

Ticketing And Event Management Web Service, Nikolay Figurin

Theses Digitization Project

The purpose of this project was creating a web based application that included: user account creation, event creation per user, tiered ticket sales per event, search capabilities, a focus on scalability and data redundancy, a focus on verification of event creator identities and administration features, a focus on account expandability, an ability to easily expand functionality, ease of migration and stability, low and inexpensive maintenance, as well as an optimal framework relying on a platform as a service content delivery network with the option of database abstraction.


Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman Jan 2013

Use Of General Purpose Graphical Processing Units In Blowfish Encryption Algorithm, Cankat Duman

Theses Digitization Project

The purpose of this project is to present the findings of the work that has been completed on exploring the possibilities of speedup gained when using General Purpose Graphical Processing Units for the Blowfish encryption algorithm with the use of the CUDA (Computer Unified Device Architecture) programming language and architecture.


Online Graduate Application System, You Li Jan 2013

Online Graduate Application System, You Li

Theses Digitization Project

The purpose of Online Graduate Application System (OGAS) is to allow potential Computer Science and Engineering graduate students to submit and track their online applications. In addition, applicants can change and modify their references via OGAS. As part of the application requirements, the system will allow recommenders to submit and /or upload their recommendations online.


Reducing Cognitive Load Using Adaptive Uncertainty Visualization, Gregory Block Jan 2013

Reducing Cognitive Load Using Adaptive Uncertainty Visualization, Gregory Block

CCE Theses and Dissertations

Uncertainty is inherent in many real-world settings; for example, in a combat situation, darkness may prevent a soldier from classifying approaching troops as friendly or hostile. In an environment plagued with uncertainty, decision-support systems, such as sensor-based networks, may make faulty assumptions about field conditions, especially when information is incomplete, or sensor operations are disrupted. Displaying the factors that contribute to uncertainty informs the decision-making process for a human operator, but at the expense of limited cognitive resources, such as attention, memory, and workload.

This research applied principles of perceptual cognition to human-computer interface design to introduce uncertainty visualizations in …


Assessing The Role Of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, And Cybersecurity Skills Toward Computer Misuse Intention At Government Agencies, Min Suk Choi Jan 2013

Assessing The Role Of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, And Cybersecurity Skills Toward Computer Misuse Intention At Government Agencies, Min Suk Choi

CCE Theses and Dissertations

Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common welfare of citizens since more and more terrorists are using cyberterrorism to target critical infrastructures (e.g., transportation, telecommunications, power, nuclear plants, water supply, banking) to coerce the targeted government and its people to accomplish their political objectives. Cyberwar is another major concern that nations around the world are struggling to get ready to fight. It …


Effectiveness Of Evidence-Based Computerized Physician Order Entry Medication Order Sets Measured By Health Outcomes, Jacob Krive Jan 2013

Effectiveness Of Evidence-Based Computerized Physician Order Entry Medication Order Sets Measured By Health Outcomes, Jacob Krive

CCE Theses and Dissertations

In the past three years, evidence based medicine emerged as a powerful force in an effort to improve quality and health outcomes, and to reduce cost of care. Computerized physician order entry (CPOE) applications brought safety and efficiency features to clinical settings, including ease of ordering medications via pre-defined sets. Order sets offer promise of standardized care beyond convenience features through evidence-based practices built upon a growing and powerful knowledge of clinical professionals to achieve potentially more consistent health outcomes with patients and to reduce frequency of medical errors, adverse drug effects, and unintended side effects during treatment. While order …


{2,2'-[N,N'-Bis(Pyridin-2-Ylmeth­Yl)Propane-1,3-Diyldi(Nitrilo)]Di­Acetato}­Cobalt(Iii) Hexa­Fluoridophosphate Aceto­Nitrile 0.064-Solvate, Craig C. Mclauchlan, Daniel S. Kissel, William R. Arnold, Albert W. Herlinger Jan 2013

{2,2'-[N,N'-Bis(Pyridin-2-Ylmeth­Yl)Propane-1,3-Diyldi(Nitrilo)]Di­Acetato}­Cobalt(Iii) Hexa­Fluoridophosphate Aceto­Nitrile 0.064-Solvate, Craig C. Mclauchlan, Daniel S. Kissel, William R. Arnold, Albert W. Herlinger

Faculty Publications – Chemistry

In the title compound, [Co(C19H22N4O4)]PF6·0.064CH3CN, commonly known as [Co(bppd)]PF6·0.064CH3CN, where bppd represents the historical ligand name N,N'-bis(2-pyridylmethyl)-1,3-diaminopropane-N,N'-diacetate, the CoIII atom is coordinated in a distorted octa­hedral geometry with an N4O2 donor atom set. The acetate O atoms, which exhibit monodentate coordination, are oriented in a trans configuration with respect to each other, whereas the pyridyl N atoms are coordinated in a cis configuration. The compound crystallizes with two crystallographically unique cations and two anions per asymmetric unit along with a disordered, partially occupied (occupancy = 0.128) aceto­nitrile solvent mol­ecule. Crystals of the title …


Ixodid Ticks Associated With Feral Swine In Texas, David M. Sanders, Anthony L. Schuster, P Wesley Mccardle, Otto F. Strey, Terry L. Blankenship, Pete D. Teel Jan 2013

Ixodid Ticks Associated With Feral Swine In Texas, David M. Sanders, Anthony L. Schuster, P Wesley Mccardle, Otto F. Strey, Terry L. Blankenship, Pete D. Teel

United States Army: Publications

Ixodid ticks were collected from feral swine in eight Texas ecoregions from 2008-2011. Sixty-two percent of 806 feral swine were infested with one or more of the following species: Amblyomma americanum, A. cajennense, A. maculatum, Dermacentor albipictus, D. halli, D. variabilis, and Ixodes scapularis. Juvenile and adult feral swine of both sexes were found to serve as host to ixodid ticks. Longitudinal surveys of feral swine at four geographic locations show persistent year-round tick infestations of all gender-age classes for tick species common to their respective geographic locations and ecoregions. Amblyomma americanum, A. cajennense, A. maculatum and D. variabilis were …


The Update, January/February 2013, University Of Northern Iowa. College Of Humanities, Arts And Sciences. Jan 2013

The Update, January/February 2013, University Of Northern Iowa. College Of Humanities, Arts And Sciences.

Update

Inside this issue:

-- UNI Debate and Speech Finish the Year
-- Department News
-- Allison Arp, Senior PR Major, Wins PRSSA Ron Culp Scholarship
-- School of Music Events
-- Diversity Inclusion Lecturer for 2013: James Loewen
-- Mary Frisbee Johnson: FERROUS: International Metals Exhibition
-- Student Spotlight: Department of Art: Brittany Deal
-- Student Spotlight: School of Music: Rhys Talbot


The Wright Message, 2013-2014, University Of Northern Iowa. Department Of Mathematics. Jan 2013

The Wright Message, 2013-2014, University Of Northern Iowa. Department Of Mathematics.

The Wright Message

Inside this issue:

-- Dear Department Alumni and Friends
-- Around Wright Hall
-- New Faculty: C. Adam Feldhaus
-- 2013 - 2014 Tenure-Stream Faculty
-- Faculty Spotlight: Syed Kirmani
-- UNI on the March
-- The Litwiller Bequest: A Gift that Keeps on Giving
-- Retiring Faculty Member: Glenn Nelson
-- The Center for Teaching and Learning Mathematics
-- David & Lois Kail: Donor Spotlight
-- Addresses by Mathematics Faculty
-- Department of Mathematics Goes Digital
-- Alumni Spotlight: Slade Hovick & Sarah Miesner
-- Student Spotlight: Jesse Moeller, Katherine Pearce, & Adam Feller
-- The 2013 Math Shindig …