Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1681 - 1710 of 12521

Full-Text Articles in Physical Sciences and Mathematics

Experiential Learning Opportunity (Elo) And Utilization Of Field-And-Data- Based Information Obtained Through The Infusion Of Technology: Highlights On Nasa Stem And Earth Science Curricula, Nazrul I. Khandaker, Matthew Khargie, Shuayb Siddiqu, Sol De Leon, Katina Singh, Newrence Wills, Krishna Mahibar Oct 2017

Experiential Learning Opportunity (Elo) And Utilization Of Field-And-Data- Based Information Obtained Through The Infusion Of Technology: Highlights On Nasa Stem And Earth Science Curricula, Nazrul I. Khandaker, Matthew Khargie, Shuayb Siddiqu, Sol De Leon, Katina Singh, Newrence Wills, Krishna Mahibar

Publications and Research

There is a greater emphasis on hands-on involvement and critical thinking skills in the geosciences and other STEM fields to inspire and engage K- 16 students to value scientific content and enable them to discover the well-documented nature of the fundamental scientific principles needed to explain various earth science and other STEM-related core phenomena. NASA MAA curricula are ideal for engaging K1-16 students in this context, since grade-specific lesson plans open-up a plethora of pedagogically sound and relevant earth science activities. These include earth’s materials and properties, meteorites, robotics, hot air balloon, flight simulation, star gazing, material science, crystal growth, …


Atomic Disorder Induced Modification Of Magnetization In Mncrval, Juliana Herran, Rishabh Dalal, Paul Gray, Parashu Kharel, Pavel Lukashev Oct 2017

Atomic Disorder Induced Modification Of Magnetization In Mncrval, Juliana Herran, Rishabh Dalal, Paul Gray, Parashu Kharel, Pavel Lukashev

Faculty Publications

We have investigated the physical mechanism behind magnetization reduction in a potential spingapless semiconducting compound MnCrVAl by analyzing various atomic disorder schemes. In particular, we show that depending on the degree of disorder, exchanging atomic positions between Mn/Cr and V/Al leads to reduced total magnetization due to either spin flip, or vanishing spin magnetic moments. The latter is attributed to the itinerant character of magnetism in Cr-, Mn-, and V-containing Heusler alloys, and to the frustration of antiferromagnetic exchange interactions, and is accompanied by a tetragonal distortion, but such distortion alone (i.e., in a fully ordered crystal, with no atomic …


Spectroscopic And Computational Studies Of Reversible O2 Binding By A Cobalt Complex Of Relevance To Cysteine Dioxygenase, Anne A. Fischer, Sergey V. Lindeman, Adam T. Fiedler Oct 2017

Spectroscopic And Computational Studies Of Reversible O2 Binding By A Cobalt Complex Of Relevance To Cysteine Dioxygenase, Anne A. Fischer, Sergey V. Lindeman, Adam T. Fiedler

Chemistry Faculty Research and Publications

The substitution of non-native metal ions into metalloenzyme active sites is a common strategy for gaining insights into enzymatic structure and function. For some nonheme iron dioxygenases, replacement of the Fe(II) center with a redox-active, divalent transition metal (e.g., Mn, Co, Ni, Cu) gives rise to an enzyme with equal or greater activity than the wild-type enzyme. In this manuscript, we apply this metal-substitution approach to synthetic models of the enzyme cysteine dioxygenase (CDO). CDO is a nonheme iron dioxygenase that initiates the catabolism of L-cysteine by converting this amino acid to the corresponding sulfinic acid. Two mononuclear …


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …


Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock Oct 2017

Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock

KSU Proceedings on Cybersecurity Education, Research and Practice

For several decades, researchers have stated that human error is a significant cause of information security breaches, yet it still remains to be a major issue today. Quantifying the effects of security incidents is often a difficult task because studies often understate or overstate the costs involved. Human error has always been a cause of failure in many industries and professions that is overlooked or ignored as an inevitability. The problem with human error is further exacerbated by the fact that the systems that are set up to keep networks secure are managed by humans. There are several causes of …


A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer Oct 2017

A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …


Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz Oct 2017

Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz

KSU Proceedings on Cybersecurity Education, Research and Practice

This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …


Security Device Roles, Vabrice Wilder Oct 2017

Security Device Roles, Vabrice Wilder

KSU Proceedings on Cybersecurity Education, Research and Practice

“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …


Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline Oct 2017

Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline

KSU Proceedings on Cybersecurity Education, Research and Practice

Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications. …


"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins Oct 2017

"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins

KSU Proceedings on Cybersecurity Education, Research and Practice

This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.


Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang Oct 2017

Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang

KSU Proceedings on Cybersecurity Education, Research and Practice

Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …


Metallogenic Setting Of High-Grade Gold Mineralization In The Neoarchean Hearne Craton, Kivalliq Region, Whale Cove, Nunavut, Canada, Mo Asmail Oct 2017

Metallogenic Setting Of High-Grade Gold Mineralization In The Neoarchean Hearne Craton, Kivalliq Region, Whale Cove, Nunavut, Canada, Mo Asmail

Electronic Thesis and Dissertation Repository

The Pistol Bay Gold Project is located on the northwestern shores of Hudson Bay, in the Tavani Segment of the Neoarchean Kaminak Greenstone Belt in the Hearne Craton of the Western Churchill Province. This project covers several gold prospects whose genesis is hotly debated. The primary objectives of this research are to answer critical questions regarding the nature and timing of gold mineralization. The investigation includes: (1) establish the absolute age of the felsic and mafic intrusions and the relative timing of gold mineralization; (2) document the nature of primary and hydrothermal mineral assemblages related to gold mineralization; and (3) …


Perfect Matchings Of Trimmed Aztec Rectangles, Tri Lai Oct 2017

Perfect Matchings Of Trimmed Aztec Rectangles, Tri Lai

Department of Mathematics: Faculty Publications

We consider several new families of subgraphs of the square grid whose matchings are enumerated by powers of several small prime numbers: 2, 3, 5, and 11. Our graphs are obtained by trimming two opposite corners of an Aztec rectangle. The result yields a proof of a conjecture posed by Ciucu. In addition, we reveal a hidden connection between our graphs and the hexagonal dungeons introduced by Blum.


Matching And Independence Complexes Related To Small Grids, Benjamin Braun, Wesley K. Hough Oct 2017

Matching And Independence Complexes Related To Small Grids, Benjamin Braun, Wesley K. Hough

Mathematics Faculty Publications

The topology of the matching complex for the 2 x n grid graph is mysterious. We describe a discrete Morse matching for a family of independence complexes Ind(Δmn) that include these matching complexes. Using this matching, we determine the dimensions of the chain spaces for the resulting Morse complexes and derive bounds on the location of non-trivial homology groups for certain Ind(Δmn). Furthermore, we determine the Euler characteristic of Ind(Δmn) and prove that several homology groups of Ind(Δmn) are non-zero.


The Firece Green Fire: Vol. 8 Issue 6, Wofford College Environmental Studies Program Oct 2017

The Firece Green Fire: Vol. 8 Issue 6, Wofford College Environmental Studies Program

The Fierce Green Fire

No abstract provided.


Gravitational Waves And Gamma-Rays From A Binary Neutron Star Merger: Gw170817 And Grb 170817a, B. P. Abbott, R. Abbott, T. D. Abbott, F. Acernese, K. Ackley, C. Adams, T. Adams, Marc Favata, Shaon Ghosh, Rodica Martin Oct 2017

Gravitational Waves And Gamma-Rays From A Binary Neutron Star Merger: Gw170817 And Grb 170817a, B. P. Abbott, R. Abbott, T. D. Abbott, F. Acernese, K. Ackley, C. Adams, T. Adams, Marc Favata, Shaon Ghosh, Rodica Martin

Department of Physics and Astronomy Faculty Scholarship and Creative Works

On 2017 August 17, the gravitational-wave event GW170817 was observed by the Advanced LIGO and Virgo detectors, and the gamma-ray burst (GRB) GRB 170817A was observed independently by the Fermi Gamma-ray Burst Monitor, and the Anti-Coincidence Shield for the Spectrometer for the International Gamma-Ray Astrophysics Laboratory. The probability of the near-simultaneous temporal and spatial observation of GRB 170817A and GW170817 occurring by chance is 5.0 × 10-8. We therefore confirm binary neutron star mergers as a progenitor of short GRBs. The association of GW170817 and GRB 170817A provides new insight into fundamental physics and the origin of short GRBs. We …


The Cosm Aggregate, Georgia Southern University Oct 2017

The Cosm Aggregate, Georgia Southern University

COSM Aggregate (2017)

No abstract provided.


Urban Foraging: A Ubiquitous Human Practice Overlooked By Urban Planners, Policy, And Research, Charlie M. Shackleton, Patrick T. Hurley, Annika C. Dahlberg, Marla R. Emery, Harini Nagendra Oct 2017

Urban Foraging: A Ubiquitous Human Practice Overlooked By Urban Planners, Policy, And Research, Charlie M. Shackleton, Patrick T. Hurley, Annika C. Dahlberg, Marla R. Emery, Harini Nagendra

Environment and Sustainability Faculty Publications

Although hardly noticed or formally recognized, urban foraging by humans probably occurs in all urban settings around the world. We draw from research in India, South Africa, Sweden, and the United States to demonstrate the ubiquity and varied nature of urban foraging in different contexts. Across these different contexts, we distill seven themes that characterize and thereby advance thinking about research and the understanding of urban foraging. We show that it is widespread and occurs across a variety of urban spaces and places. The species used and the local practices vary between contexts, and are in constant flux as urban …


Gravitational Waves And Gamma-Rays From A Binary Neutron Star Merger: Gw170817 And Grb 170817a, B. P. Abbott, K. Aultoneal, S. Gaudio, K. Gill, E. M. Gretarsson, B. Hughey, M. Muratore, J. W. W. Pratt, S. G. Schwalbe, K. Staats, M. J. Szczepańczyk, M. Zanolin, Et Al. Oct 2017

Gravitational Waves And Gamma-Rays From A Binary Neutron Star Merger: Gw170817 And Grb 170817a, B. P. Abbott, K. Aultoneal, S. Gaudio, K. Gill, E. M. Gretarsson, B. Hughey, M. Muratore, J. W. W. Pratt, S. G. Schwalbe, K. Staats, M. J. Szczepańczyk, M. Zanolin, Et Al.

Publications

On 2017 August 17, the gravitational-wave event GW170817 was observed by the Advanced LIGO and Virgo detectors, and the gamma-ray burst (GRB) GRB 170817A was observed independently by the Fermi Gamma-ray Burst Monitor, and the Anti-Coincidence Shield for the Spectrometer for the International Gamma-Ray Astrophysics Laboratory. The probability of the near-simultaneous temporal and spatial observation of GRB 170817A and GW170817 occurring by chance is $5.0\times {10}^{-8}$. We therefore confirm binary neutron star mergers as a progenitor of short GRBs. The association of GW170817 and GRB 170817A provides new insight into fundamental physics and the origin of short GRBs. We use …


Kinetic Characterization Of Listeria Monocytogenes 2-C- Methyl-D-Erythritol 4-Phosphate Cytidylyltransferase ( Cms ) Enzymes Using High Performance Liquid Chromatography ( Hplc ), Mark Oblazny Oct 2017

Kinetic Characterization Of Listeria Monocytogenes 2-C- Methyl-D-Erythritol 4-Phosphate Cytidylyltransferase ( Cms ) Enzymes Using High Performance Liquid Chromatography ( Hplc ), Mark Oblazny

Theses and Dissertations

Infectious diseases, with increasing prevalence of antibiotic resistant bacteria, coupled with the declining rate in discovery of antimicrobial agents, impose one of the most significant threats to human health. Here we identify 2-C-methyl-D-erythritol 4-phosphate cytidylyltransferase (CMS) as a valid target for antibiotic development which is an enzyme in pathogenic organisms that leads to the biosynthesis of isoprene precursor molecules. Isoprene molecules are one of nature’s most common building blocks that are vital to many biological metabolic processes and are synthesized via the mevalonic acid dependent (MVA), or methylerythritol phosphate (MEP) pathway. Vertebrates utilize the MVA pathway, while many pathogenic bacteria …


The Biochemical Assessment Of Two Secreted Acid Phosphatases From Leishmania Tarentolae, Their Response To Electric Fields, Glycosidase Incubation, And / Or Vanadium, Benjamin M. Dorsey Oct 2017

The Biochemical Assessment Of Two Secreted Acid Phosphatases From Leishmania Tarentolae, Their Response To Electric Fields, Glycosidase Incubation, And / Or Vanadium, Benjamin M. Dorsey

Theses and Dissertations

Leishmaniasis, as defined by the Center for Disease Control and Prevention, is a neglected tropical disease with 1.6 million new cases reported each year. However, there is yet to be safe, effective, and affordable treatments provided to those affected by this disease1. Still underappreciated as a potential pharmaceutical targets, especially for cutaneous leishmaniasis infections, are the two isozymes of secreted acid phosphatase (SAP); secreted acid phosphatase 1 (SAP1) and secreted acid phosphatase 2 (SAP2). These enzymes are involved in the survival of the parasite in the sand fly vector, and the prevention of host macrophages from forming parasitophorous vacuole and …


Critical Digital Literacies Across Scales And Beneath The Screen, Noah Asher Golden Oct 2017

Critical Digital Literacies Across Scales And Beneath The Screen, Noah Asher Golden

Education Faculty Articles and Research

Digital technologies and education scholarship tend to focus on either individual creative design or analysis of the political economy. To better understand how ideologies travel across networks, critical digital literacies must focus on enactments beneath the screen, as the linguistic constructs known as software can enact interests across scales of activity to “disembed” local actions and meaning. Investigations of these mobilities and disembedding effects challenge popular notions of digital technologies as neutral, rendering overt the ways that algorithms can naturalize manifestations of power and social arrangements. Such a framework allows for descriptive analyses of the ways hegemonic discourses are enacted …


All-Dielectric Metamaterials: Irrelevance Of Negative Refraction To Overlapped Mie Resonances, Navid Gandji, George Semouchkin, Elena Semouchkina Oct 2017

All-Dielectric Metamaterials: Irrelevance Of Negative Refraction To Overlapped Mie Resonances, Navid Gandji, George Semouchkin, Elena Semouchkina

Michigan Tech Publications

All-dielectric metamaterials comprised of identical resonators draw a lot of attention as low-loss media providing for negative refraction, which is commonly attributed to the double negativity of effective material parameters caused by overlapping of Mie resonances. We study dispersion diagrams of such metamaterials composed of dielectric rod arrays and show that bandwidths of positive and negative refraction and its type are irrelevant to the negativity of effective parameters; instead, they are unambiguously defined by the shape and the location of the second transmission branch in dispersion diagrams and thus can be controlled by the lattice constants.


Temperature Dependence Of Electrostatic Discharge In Highly Disordered Polymers, Tyler Kippen, Allen Andersen, Jr Dennison Oct 2017

Temperature Dependence Of Electrostatic Discharge In Highly Disordered Polymers, Tyler Kippen, Allen Andersen, Jr Dennison

Posters

No abstract provided.


Electron Yield Of A Carbon-Composite Nanodielectric, Matthew Robertson, Justin Christensen, Greg Wilson, Jr Dennison Oct 2017

Electron Yield Of A Carbon-Composite Nanodielectric, Matthew Robertson, Justin Christensen, Greg Wilson, Jr Dennison

Posters

No abstract provided.


Pulsed Electro-Acoustic Measurements Of Charging And Relaxation In Low Density Polyethylene, Zachary Gibson Oct 2017

Pulsed Electro-Acoustic Measurements Of Charging And Relaxation In Low Density Polyethylene, Zachary Gibson

Presentations

No abstract provided.


Observations Of The First Electromagnetic Counterpart To A Gravitational-Wave Source By The Toros Collaboration, M. C. Diaz, L. M. Macri, D. Garcia Lambas, C. Mendes De Oliveira, J. L.Nilo Castellón, T. Ribeiro, B. Sanchez, W. Schoenell, L. R. Abramo, S. Akras, J. S. Alcaniz, Rodolfo Artola, M. Beroiz, S. Bonoli, J. Cabral, R. Camuccio, M. Castillo, V. Chavushyan, P. Coelho, C. Colazo, M. V. Costa-Duarte, H. Cuevas Larenas, D. L. Depoy, M. Domínguez Romero, D. Dultzin, D. Fernández, J. García, C. Girardini Oct 2017

Observations Of The First Electromagnetic Counterpart To A Gravitational-Wave Source By The Toros Collaboration, M. C. Diaz, L. M. Macri, D. Garcia Lambas, C. Mendes De Oliveira, J. L.Nilo Castellón, T. Ribeiro, B. Sanchez, W. Schoenell, L. R. Abramo, S. Akras, J. S. Alcaniz, Rodolfo Artola, M. Beroiz, S. Bonoli, J. Cabral, R. Camuccio, M. Castillo, V. Chavushyan, P. Coelho, C. Colazo, M. V. Costa-Duarte, H. Cuevas Larenas, D. L. Depoy, M. Domínguez Romero, D. Dultzin, D. Fernández, J. García, C. Girardini

Physics and Astronomy Faculty Publications and Presentations

We present the results of prompt optical follow-up of the electromagnetic counterpart of the gravitational-wave event GW170817 by the Transient Optical Robotic Observatory of the South Collaboration. We detected highly significant dimming in the light curves of the counterpart (Δg = 0.17 ± 0.03 mag, Δr = 0.14 ± 0.02 mag, Δi = 0.10 ± 0.03 mag) over the course of only 80 minutes of observations obtained ∼35 hr after the trigger with the T80-South telescope. A second epoch of observations, obtained ∼59 hr after the event with the EABA 1.5 m telescope, confirms the fast fading nature of the …


Multi-Messenger Observations Of A Binary Neutron Star Merger, Karen Andeen Oct 2017

Multi-Messenger Observations Of A Binary Neutron Star Merger, Karen Andeen

Physics Faculty Research and Publications

On 2017 August 17 a binary neutron star coalescence candidate (later designated GW170817) with merger time 12:41:04 UTC was observed through gravitational waves by the Advanced LIGO and Advanced Virgo detectors. The Fermi Gamma-ray Burst Monitor independently detected a gamma-ray burst (GRB 170817A) with a time delay of ~1.7 s with respect to the merger time. From the gravitational-wave signal, the source was initially localized to a sky region of 31 deg2 at a luminosity distance of Mpc and with component masses consistent with neutron stars. The component masses were later measured to be in the range 0.86 to …