Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2014

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 11881 - 11910 of 12299

Full-Text Articles in Physical Sciences and Mathematics

Mercury In Fish In North Mississippi Reservoirs: Statistical Analysis And Risk Assessment, Stacy Wolff Jan 2014

Mercury In Fish In North Mississippi Reservoirs: Statistical Analysis And Risk Assessment, Stacy Wolff

Honors Theses

Mercury (Hg) is a pollutant of particular concern because it is wide-spread, persistent, and poses a serious risk to human health. Once released into the atmosphere, it cycles through the environment by a series of complex biogeochemical processes. Upon deposition to aquatic ecosystems, inorganic mercury can be transformed to methylmercury by microorganisms. Methylmercury is a known human neurotoxin that can bioacculmulate in fish tissue and biomagnify up aquatic food chains. Consumption of contaminated fish is the primary route of human exposure to methylmercury. The Mississippi Department of Health has issued fish consumption advisories for Grenada and Enid Lakes in the …


P2p Email Encryption By An Identity-Based One-Way Group Key Agreement Protocol, Jyh-Haw Yeh, Fiona Zeng, Thomas Long Jan 2014

P2p Email Encryption By An Identity-Based One-Way Group Key Agreement Protocol, Jyh-Haw Yeh, Fiona Zeng, Thomas Long

Computer Science Faculty Publications and Presentations

As a result of high-tech companies such as Google, Yahoo, and Microsoft offering free email services, email has become a primary channel of communication. However, email service providers have traditionally offered little in the way of message privacy protection. This has made emails, of which billions are sent around the world on any day, an attractive data source for personal identity information thieves. Google was one of the first companies to provide substantial email privacy protection when they began using the HTTPS always-on option to encrypt messages sent through their email service, Gmail. Unfortunately, Gmail's encryption option does not offer …


The Use Of Trigonometry In Blood Spatter, Isela Guerra Jan 2014

The Use Of Trigonometry In Blood Spatter, Isela Guerra

A with Honors Projects

A common phrase to be heard in a class room setting is “When am I ever going to use trig?” Many do not value or appreciate the importance of trigonometry. However, Trigonometry holds a special place in the hearts of the blood spatter analyst. The blood spatter analyst works very hard using the known identities and trigonometric functions to find the angle of impact, that is, at what angle was the person struck, and at what angle the blood fell. Trigonometry is also used in determining the height of a person, using the angle of impact.


Calculating P-Values, Isela Guerra Jan 2014

Calculating P-Values, Isela Guerra

A with Honors Projects

For a Parkland College A with Honors project, the student tests a variety of methods to determine p-values.


X-Ray Diffraction, Reuben James Jan 2014

X-Ray Diffraction, Reuben James

A with Honors Projects

A Parkland College A with Honors project, this paper reviews X-ray diffraction, identifying the process, its developers, and its uses.


Evaluation Of Swat Model Applicability In A First-Order Agricultural Watershed In Southern Ontario, Ibrahim O. Rashid Jan 2014

Evaluation Of Swat Model Applicability In A First-Order Agricultural Watershed In Southern Ontario, Ibrahim O. Rashid

Geography and Environmental Studies Theses and Dissertations

The primary objective of most agricultural operations including those at the Strawberry Creek Watershed is to maximize crop yield. This often requires the input of additional nutrients to enhance soil fertility, and installation of artificial subsurface drainage to curtail water-logging of soils with very low hydraulic conductivity. However, the combination of additional nutrients and subsurface drainage often leads to a disruption of the existing hydrochemical regime. Excess nitrate and phosphorus export to surface water bodies may yield negative environmental impacts, including the eutrophication of downstream areas. To address this issue, a modeling technique was deployed to quantify and assess these …


Summary Tables: City Of Norfolk, Virginia Shoreline Inventory Report, Marcia Berman, Karinna Nunez, Sharon Killeen, Tamia Rudnicky, Julie Bradshaw, Karen Duhring, Kory Angstadt, Alexandra Procopi, David Weiss, Carl Hershner Jan 2014

Summary Tables: City Of Norfolk, Virginia Shoreline Inventory Report, Marcia Berman, Karinna Nunez, Sharon Killeen, Tamia Rudnicky, Julie Bradshaw, Karen Duhring, Kory Angstadt, Alexandra Procopi, David Weiss, Carl Hershner

Reports

The data inventory developed for the Shoreline Inventory is based on a three tiered shoreline assessment approach. This assessment characterizes conditions that can be observed from a small boat navigating along the shoreline or by using observations made remotely at the desktop using high resolution imagery. The three tiered shoreline assessment approach divides the shorezone into three regions:

1) the immediate riparian zone, evaluated for land use; 2) the bank, evaluated for height, stability, cover and natural protection; and 3) the shoreline, describing the presence of shoreline structures for shore protection and recreational purposes.

The 2014 Inventory for the City …


Williamsburg Summary Tables: James City County And City Of Williamsburg, Virginia Shoreline Inventory Report, Marcia Berman, Karinna Nunez, Sharon Killeen, Tamia Rudnicky, Julie Bradshaw, Karen Duhring, Kory Angstadt, Alexandra Procopi, David Weiss, Carl Hershner Jan 2014

Williamsburg Summary Tables: James City County And City Of Williamsburg, Virginia Shoreline Inventory Report, Marcia Berman, Karinna Nunez, Sharon Killeen, Tamia Rudnicky, Julie Bradshaw, Karen Duhring, Kory Angstadt, Alexandra Procopi, David Weiss, Carl Hershner

Reports

The Shoreline Inventory Summary Tables quantify observed conditions based on river systems, such as the combined length of linear features (e.g. shoreline miles surveyed, miles of bulkhead and revetment), the total number of point features (e.g. docks, boathouses, boat ramps) & total acres of polygon features (tidal marshes).


A Learning Method To Evaluate A Generation Company's Bidding Strategy In The Electricity Market, Shengjie Yang, Jiangang Yao Jan 2014

A Learning Method To Evaluate A Generation Company's Bidding Strategy In The Electricity Market, Shengjie Yang, Jiangang Yao

Turkish Journal of Electrical Engineering and Computer Sciences

In the electricity market, generation companies (GenCos) are usually faced with the problem of choosing a better bidding strategy. They often have to evaluate each possible strategy according to its potential reward. In a competitive market environment, the electricity price is stochastic and volatile, and the GenCo's mixed strategies also make the problem more complicated. In this paper, we model the market price with a Markov regime-switching model and propose the temporal difference learning method in the Markov decision process to approximate the expected reward over an infinite horizon. The simulations based on this method have achieved the evaluation of …


Inverse Covariance Principal Component Analysis For Power System Stability Studies, Abdullah Alodienat, Tauseef Gulrez Jan 2014

Inverse Covariance Principal Component Analysis For Power System Stability Studies, Abdullah Alodienat, Tauseef Gulrez

Turkish Journal of Electrical Engineering and Computer Sciences

The dominant poles (eigenvalues) of system matrices are used extensively in determining the power system stability analysis. The challenge is to find an accurate and efficient way of computing these dominant poles, especially for large power systems. Here we present a novel way for finding the system stability based on inverse covariance principal component analysis (ICPCA) to compute the eigenvalues of large system matrices. The efficacy of the proposed method is shown by numerical calculations over realistic power system data and we also prove the possibility of using ICPCA to determine the eigenvalues closest to any damping ratio and repeated …


A Novel Sms Application With Gsm Control On Numerator Systems, Ali̇ Sarikaş, Zi̇ya Ekşi̇, Cüneyt Yücelbaş, Ali̇ Buldu Jan 2014

A Novel Sms Application With Gsm Control On Numerator Systems, Ali̇ Sarikaş, Zi̇ya Ekşi̇, Cüneyt Yücelbaş, Ali̇ Buldu

Turkish Journal of Electrical Engineering and Computer Sciences

Numerator systems are widely used in various fields, sorting, and structures to ensure regular functioning. They are used today in places such as banks and hospitals to minimize the time spent waiting in a queue, and various studies have been undertaken to achieve efficiency in the workplace. At the beginning of these studies, numerator systems, which have been integrated into the short message service (SMS) application, have been used efficiently. With this application, to supply the required information to the user in the fastest way, a numerator system is developed by utilizing radio frequency communications and the SMS message structure. …


Rfid And Communication Technologies For An Intelligent Bus Monitoring And Management System, Mahammad Abdul Hannan, Aishah Mustapha, Abdulla Al Mamun, Aini Hussain, Hassan Basri Jan 2014

Rfid And Communication Technologies For An Intelligent Bus Monitoring And Management System, Mahammad Abdul Hannan, Aishah Mustapha, Abdulla Al Mamun, Aini Hussain, Hassan Basri

Turkish Journal of Electrical Engineering and Computer Sciences

This paper highlights the implementation of an intelligent bus monitoring system based on current challenges and problems. In this system, radio frequency identification and integrated sensing technologies, such as a global positioning system, general packet radio service, and geographic information system, are used to monitor the movement of a bus. A new theoretical framework and ruled-based decision algorithms are developed for the system. An experimental setup is developed for the prototype implementation. The results show that the choice of integrated technologies used in the system is suitable to monitor and manage a vehicle transportation system.


A Methodology For Memristance Calculation, Reşat Mutlu, Ertuğrul Karakulak Jan 2014

A Methodology For Memristance Calculation, Reşat Mutlu, Ertuğrul Karakulak

Turkish Journal of Electrical Engineering and Computer Sciences

A memristor is a newly found fundamental circuit element whose behavior can be predicted using either the charge-dependent function called memristance or the flux-dependent function called memductance. Therefore, it is important to find the memristance or memductance function of a memristor. To the best of our knowledge, there is no methodology describing how to obtain the memristance function or memristor characteristic in the literature for this purpose as of yet. In this work, a methodology is suggested to find the memristance or memductance functions. The methodology suggests first doing several experiments with a memristor using a square-wave signal to acquire …


Analysis Of A Rule-Based Curriculum Plan Optimization System With Spearman Rank Correlation, Di̇dem Abi̇di̇n, Hafi̇ze Şen Çakir Jan 2014

Analysis Of A Rule-Based Curriculum Plan Optimization System With Spearman Rank Correlation, Di̇dem Abi̇di̇n, Hafi̇ze Şen Çakir

Turkish Journal of Electrical Engineering and Computer Sciences

In corporations, accurate planning should be applied to manage the in-service training task within an optimum time period and without hindering the working tempo of the employees. For this reason, it is better to consider the curriculum planning task as a timetabling problem. However, when the timetables are prepared manually, it may turn out to be a complicated and time-consuming problem. In this study, it is aimed to evaluate the results of software introduced previously, which seeks to find a solution to the curriculum planning problem of in-service training programs in corporations using a rule-based genetic algorithm (GA). The input …


Concurrently Attuned Design Of A Wadc-Based Upfc Psdc And Multiinput Pss For Improving Power System Dynamic Performance, Yashar Hashemi, Rasool Kazemzadeh, Mohammad Reza Azizian, Ahmad Sadeghi Yazdankhah Jan 2014

Concurrently Attuned Design Of A Wadc-Based Upfc Psdc And Multiinput Pss For Improving Power System Dynamic Performance, Yashar Hashemi, Rasool Kazemzadeh, Mohammad Reza Azizian, Ahmad Sadeghi Yazdankhah

Turkish Journal of Electrical Engineering and Computer Sciences

A new controller design for a unified power flow controller (UPFC) for damping of power system swings, focusing on interarea modes, is described in this paper. The proposed controller is a dual-layer controller, where the first layer is derived from local signals and the second layer is supplied by global signals, as additional measuring information from suitable remote network locations, where swings are well observable. For damping of low-frequency swing in wide-area operation, since there is little system information in the active power as input of the conventional power system stabilizer (CPSS), the effectiveness of the CPSS is low. For …


Design And Implementation Of A Programmable High-Voltage Impulse Measurement System, Serkan Dedeoğlu, Serhat Yilmaz Jan 2014

Design And Implementation Of A Programmable High-Voltage Impulse Measurement System, Serkan Dedeoğlu, Serhat Yilmaz

Turkish Journal of Electrical Engineering and Computer Sciences

High-voltage impulses (HVIs) are produced under laboratory conditions in order to emulate actual internal (switching) and external (lightning, thunderbolt) voltages. HVI resistance tests are essential to meet national and international standards on the production of electromechanical devices and materials, such as switchgears, and transformers that operate under these actual conditions. Accurate measurement of HVI is excessively difficult since the voltage level is so high, while the time parameters are relatively constricted. In this study, a reliable automatic HVI measuring and recording system, which accommodates a series of hardware and software designs in order to satisfy the constraints of the standards, …


Design Of A Double-Stator Linear Switched Reluctance Motor For Shunting Railway Channels, El Manaa Barhoumi, Mansour Hajji, Boujemaa Ben Salah Jan 2014

Design Of A Double-Stator Linear Switched Reluctance Motor For Shunting Railway Channels, El Manaa Barhoumi, Mansour Hajji, Boujemaa Ben Salah

Turkish Journal of Electrical Engineering and Computer Sciences

This paper presents the design and modeling of a double-stator linear switched reluctance motor for motorizing a railway channels' shunting system. The magnetic behavior of this actuator is nonlinear due to the saturation and nonlinear magnetization curves of the materials used in this actuator. For this reason, the electromagnetic quantities such as force, flux linkage, and inductance are calculated with the finite element method using the Maxwell tool. The obtained results are presented and discussed. In order to elaborate some control strategies, a new model for the proposed actuator, based on the flux and force characteristics, is validated by the …


Observer-Based Controller For Current Mode Control Of An Interleaved Boost Converter, Shenbaga Lakshmi, Sree Renga Raja Jan 2014

Observer-Based Controller For Current Mode Control Of An Interleaved Boost Converter, Shenbaga Lakshmi, Sree Renga Raja

Turkish Journal of Electrical Engineering and Computer Sciences

A state feedback control method for an interleaved boost power converter is designed, which, in turn, can achieve interleaved current sharing among parallel-connected converters. The state feedback control in the continuous time domain is derived using the pole placement technique and linear quadratic optimal method. The load estimator is designed by deriving a full-order state observer to ensure the robustness and optimality of the state feedback control and an observer-based controller (control law plus full-order state observer) is designed using the separation principle. The adopted control strategies achieve effective output voltage regulation, good dynamic stability, and reject disturbances. Extensive simulation …


Luenberger Observer-Based Sensor Fault Detection: Online Application To Dc Motor, Alkan Alkaya, İlyas Eker Jan 2014

Luenberger Observer-Based Sensor Fault Detection: Online Application To Dc Motor, Alkan Alkaya, İlyas Eker

Turkish Journal of Electrical Engineering and Computer Sciences

Fault detection and diagnosis (FDD) are very important for engineering systems in industrial applications. One of the most popular approaches is model-based fault detection. Recently, many techniques have been proposed in the FDD area. However, there are still very few reported applications or real-time implementations of the schemes. This paper presents online sensor FDD based on the model-based approach using a Luenberger observer and experimental application on a permanent magnet DC motor. Different kinds of faults are simulated on the motor and experiments are performed to detect the faults. The experimental results demonstrate that this approach could significantly detect the …


A Convergent Algorithm For A Cascade Network Of Multiplexed Dual Output Discrete Perceptrons For Linearly Nonseparable Classification, İbrahi̇m Genç, Cüneyt Güzeli̇ş Jan 2014

A Convergent Algorithm For A Cascade Network Of Multiplexed Dual Output Discrete Perceptrons For Linearly Nonseparable Classification, İbrahi̇m Genç, Cüneyt Güzeli̇ş

Turkish Journal of Electrical Engineering and Computer Sciences

In this paper a new discrete perceptron model is introduced. The model forms a cascade structure and it is capable of realizing an arbitrary classification task designed by a constructive learning algorithm. The main idea is to copy a discrete perceptron neuron's output to have a complementary dual output for the neuron, and then to select, by using a multiplexer, the true output, which might be 0 or 1 depending on the given input. Hence, the problem of realization of the desired output is transformed into the realization of the selector signal of the multiplexer. In the next step, the …


Early Wakeup: Improving The Drowsy Cache Performance, Sunghoon Shim, Sungwoo Chung, Hongjun Choi, Cheol Hong Kim Jan 2014

Early Wakeup: Improving The Drowsy Cache Performance, Sunghoon Shim, Sungwoo Chung, Hongjun Choi, Cheol Hong Kim

Turkish Journal of Electrical Engineering and Computer Sciences

As process technology scales down, leakage power consumption becomes comparable to dynamic power consumption. The drowsy cache technique is known as one of the most popular techniques for reducing the leakage power consumption in the data cache. However, the drowsy cache is reported to degrade the processor performance significantly. In this paper, to maintain the performance of the processor with the drowsy cache technique, we propose an early wakeup technique, which predicts the next cache line to be requested by utilizing the way-prediction information. The proposed technique efficiently reduces the number of accesses to the cache lines in drowsy mode. …


Privacy Preserving In Association Rules Using A Genetic Algorithm, Rahat Ali Shah, Sohail Asghar Jan 2014

Privacy Preserving In Association Rules Using A Genetic Algorithm, Rahat Ali Shah, Sohail Asghar

Turkish Journal of Electrical Engineering and Computer Sciences

Association rule mining is one of the data mining techniques used to extract hidden knowledge from large datasets. This hidden knowledge contains useful and confidential information that users want to keep private from the public. Similarly, privacy preserving data mining techniques are used to preserve such confidential information or restrictive patterns from unauthorized access. The pattern can be represented in the form of a frequent itemset or association rule. Furthermore, a rule or pattern is marked as sensitive if its disclosure risk is above a given threshold. Numerous techniques have been used to hide sensitive association rules by performing some …


A New Method For Extraction Of Speech Features Using Spectral Delta Characteristics And Invariant Integration, Hassan Farsi, Samana Kuhimoghadam Jan 2014

A New Method For Extraction Of Speech Features Using Spectral Delta Characteristics And Invariant Integration, Hassan Farsi, Samana Kuhimoghadam

Turkish Journal of Electrical Engineering and Computer Sciences

We propose a new feature extraction algorithm that is robust against noise. Nonlinear filtering and temporal masking are used for the proposed algorithm. Since the current automatic speech recognition systems use invariant-integration and delta-delta techniques for speech feature extraction, the proposed algorithm improves speech recognition accuracy appropriately using a delta-spectral feature instead of invariant integration. One of the nonenvironmental factors that reduce recognition accuracy is the vocal tract length (VTL), leading to a mismatch between the training and testing data. We can use the invariant-integration feature idea for decreasing the VTL effects. The aim of this paper is to provide …


Feature Selection On Single-Lead Ecg For Obstructive Sleep Apnea Diagnosis, Hüseyi̇n Gürüler, Mesut Şahi̇n, Abdullah Feri̇koğlu Jan 2014

Feature Selection On Single-Lead Ecg For Obstructive Sleep Apnea Diagnosis, Hüseyi̇n Gürüler, Mesut Şahi̇n, Abdullah Feri̇koğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Many articles that appeared in the literature agreed upon the feasibility of diagnosing obstructive sleep apnea (OSA) with a single-lead electrocardiogram. Although high accuracies have been achieved in detection of apneic episodes and classification into apnea/hypopnea, there has not been a consensus on the best method of selecting the feature parameters. This study presents a classification scheme for OSA using common features belonging to the time domain, frequency domain, and nonlinear calculations of heart rate variability analysis, and then proposes a method of feature selection based on correlation matrices (CMs). The results show that the CMs can be utilized in …


A Robust Smart Card-Based Anonymous User Authentication Protocol For Wireless Communications, Fengton Wen, Willy Susilo, Guomin Yang Jan 2014

A Robust Smart Card-Based Anonymous User Authentication Protocol For Wireless Communications, Fengton Wen, Willy Susilo, Guomin Yang

Research Collection School Of Computing and Information Systems

Anonymous user authentication is an important but challenging task for wireless communications. In a recent paper, Das proposed a smart cardï based anonymous user authentication protocol for wireless communications. The scheme can protect user privacy and is believed to be secure against a range of network attacks even if the secret information stored in the smart card is compromised. In this paper, we reanalyze the security of Das' scheme, and show that the scheme is in fact insecure against impersonation attacks. We then propose a new smart cardï based anonymous user authentication protocol for wireless communications. Compared with the existing …


Online Multiple Kernel Similarity Learning For Visual Search, Hao Xia, Chu Hong Hoi, Rong Jin, Peilin Zhao Jan 2014

Online Multiple Kernel Similarity Learning For Visual Search, Hao Xia, Chu Hong Hoi, Rong Jin, Peilin Zhao

Research Collection School Of Computing and Information Systems

Recent years have witnessed a number of studies on distance metric learning to improve visual similarity search in content-based image retrieval (CBIR). Despite their successes, most existing methods on distance metric learning are limited in two aspects. First, they usually assume the target proximity function follows the family of Mahalanobis distances, which limits their capacity of measuring similarity of complex patterns in real applications. Second, they often cannot effectively handle the similarity measure of multimodal data that may originate from multiple resources. To overcome these limitations, this paper investigates an online kernel similarity learning framework for learning kernel-based proximity functions …


Mini-Track Introduction: Information Economics, Competition, Regulation, Law And Society, Eric K. Clemons, Robert John Kauffman, Thomas A. Weber Jan 2014

Mini-Track Introduction: Information Economics, Competition, Regulation, Law And Society, Eric K. Clemons, Robert John Kauffman, Thomas A. Weber

Research Collection School Of Computing and Information Systems

This mini-track is informed by the most modern thinking in information economics and competitive strategy, and includes many interdisciplinary applications of IS and technology.


Free Market Of Crowdsourcing: Incentive Mechanism Design For Mobile Sensing, Xinglin Zhang, Zheng Yang, Zimu Zhou, Haibin Cai, Lei Chen, Xiang-Yang Li Jan 2014

Free Market Of Crowdsourcing: Incentive Mechanism Design For Mobile Sensing, Xinglin Zhang, Zheng Yang, Zimu Zhou, Haibin Cai, Lei Chen, Xiang-Yang Li

Research Collection School Of Computing and Information Systems

Off-the-shelf smartphones have boosted large scale participatory sensing applications as they are equipped with various functional sensors, possess powerful computation and communication capabilities, and proliferate at a breathtaking pace. Yet the low participation level of smartphone users due to various resource consumptions, such as time and power, remains a hurdle that prevents the enjoyment brought by sensing applications. Recently, some researchers have done pioneer works in motivating users to contribute their resources by designing incentive mechanisms, which are able to provide certain rewards for participation. However, none of these works considered smartphone users’ nature of opportunistically occurring in the area …


Mate Choice And The Evolutionary Stability Of A Fixed Threshold In A Sequential Search Strategy, Raymond Cheng, Steven M. Seubert, Daniel D. Wiegmann Jan 2014

Mate Choice And The Evolutionary Stability Of A Fixed Threshold In A Sequential Search Strategy, Raymond Cheng, Steven M. Seubert, Daniel D. Wiegmann

Mathematics & Statistics Faculty Publications

The sequential search strategy is a prominent model of searcher behavior, derived as a rule by which females might sample and choose a mate from a distribution of prospective partners. The strategy involves a threshold criterion against which prospective mates are evaluated. The optimal threshold depends on the attributes of prospective mates, which are likely to vary across generations or within the lifetime of searchers due to stochastic environmental events. The extent of this variability and the cost to acquire information on the distribution of the quality of prospective mates determine whether a learned or environmentally canalized threshold is likely …


Reproductive Phase Determination In Male Meagre (Argyrosomus Regius, Sciaenidae): Testis Development And Histologic Corroboration Of A Gross Anatomical Scale, Nuno Prista, Leonel Gordo, Jose L. Costa, Maria J. Costa, Cynthia M. Jones Jan 2014

Reproductive Phase Determination In Male Meagre (Argyrosomus Regius, Sciaenidae): Testis Development And Histologic Corroboration Of A Gross Anatomical Scale, Nuno Prista, Leonel Gordo, Jose L. Costa, Maria J. Costa, Cynthia M. Jones

OES Faculty Publications

Reproductive stage determination of male gonads has received sparse attention in fish biology literature with few studies detailing the building of gross anatomical-and histologic scales. The meagre (Argyrosomus regius) is one of the world's largest sciaenids and supports a significant regional fishery in European and North African waters whose reproductive patterns are yet to be fully investigated. In the present study, we derive a macroscopic grading system for meagre testis using semi-quantitative graphs that feature the testis variability along the species size range and time of the year. We then describe the histological stages and reproductive phases of …