Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 2131 - 2160 of 12521

Full-Text Articles in Physical Sciences and Mathematics

Delving Into Salient Object Subitizing And Detection, Shengfeng He, Jianbo Jiao, Xiaodan Zhang, Guoqiang Han, Rynson W.H Lau Oct 2017

Delving Into Salient Object Subitizing And Detection, Shengfeng He, Jianbo Jiao, Xiaodan Zhang, Guoqiang Han, Rynson W.H Lau

Research Collection School Of Computing and Information Systems

Subitizing (i.e., instant judgement on the number) and detection of salient objects are human inborn abilities. These two tasks influence each other in the human visual system. In this paper, we delve into the complementarity of these two tasks. We propose a multi-task deep neural network with weight prediction for salient object detection, where the parameters of an adaptive weight layer are dynamically determined by an auxiliary subitizing network. The numerical representation of salient objects is therefore embedded into the spatial representation. The proposed joint network can be trained end-to-end using backpropagation. Experiments show the proposed multi-task network outperforms existing …


New Framework Of Password-Based Authenticated Key Exchange From Only-One Lossy Encryption, Haiyang Xue, Bao Li, Jingnan He Oct 2017

New Framework Of Password-Based Authenticated Key Exchange From Only-One Lossy Encryption, Haiyang Xue, Bao Li, Jingnan He

Research Collection School Of Computing and Information Systems

In this paper, we introduce a new framework of password-based key exchange (PAKE). Until now, most PAKEs are based on smooth projective hash function on secure encryption. Our PAKE does not rely on smooth projective hash function, and consists of a variate lossy encryption, called only-one lossy encryption, and indistinguishable plaintext checkable secure encryption. We also give construction of only-one lossy encryption based decisional Diffie Hellman (DDH) and learning with errors (LWE) assumptions. Although the instantiation based on DDH assumption does not improve efficiency of precious works, our framework provides more easier and elegant way to construct PAKE from LWE …


Quantifying Resilience Of Multiple Ecosystem Services And Biodiversity In A Temperate Forest Landscape, Elena Cantarello, Adrian C. Newton, Phillip A. Martin, Paul M. Evans, Arjan Gosal, Melissa S. Lucash Oct 2017

Quantifying Resilience Of Multiple Ecosystem Services And Biodiversity In A Temperate Forest Landscape, Elena Cantarello, Adrian C. Newton, Phillip A. Martin, Paul M. Evans, Arjan Gosal, Melissa S. Lucash

Geography Faculty Publications and Presentations

Resilience is increasingly being considered as a new paradigm of forest management among scientists, practitioners, and policymakers. However, metrics of resilience to environmental change are lacking. Faced with novel disturbances, forests may be able to sustain existing ecosystem services and biodiversity by exhibiting resilience, or alternatively these attributes may undergo either a linear or nonlinear decline. Here we provide a novel quantitative approach for assessing forest resilience that focuses on three components of resilience, namely resistance, recovery, and net change, using a spatially explicit model of forest dynamics. Under the pulse set scenarios, we explored the resilience of nine ecosystem …


Values Mapping And Counter-Mapping In Contested Landscapes: An Olympic Peninsula (Usa) Case Study, Rebecca J. Mclain, Lee Cerveny, Kelly Biedenweg, David Banis Oct 2017

Values Mapping And Counter-Mapping In Contested Landscapes: An Olympic Peninsula (Usa) Case Study, Rebecca J. Mclain, Lee Cerveny, Kelly Biedenweg, David Banis

Geography Faculty Publications and Presentations

Indigenous peoples, local communities, and other groups can use counter-mapping to make land claims, identify areas of desired access, or convey cultural values that diverge from the dominant paradigm. While sometimes created independently, counter-maps also can be formulated during public participation mapping events sponsored by natural resource planning agencies. Public participation mapping elicits values, uses, and meanings of landscapes from diverse stakeholders, yet individuals and advocacy groups can use the mapping process as an opportunity to make visible strongly held values and viewpoints. We present three cases from the Olympic Peninsula in Washington State to illustrate how stakeholders intentionally used …


Use Of A Novel Infrared Wavelength-Tunable Laser Mueller-Matrix Polarimetric Scatterometer To Measure Nanostructured Optical Materials, Jason C. Vap, Stephen E. Nauyoks, Michael R. Benson, Michael A. Marciniak Oct 2017

Use Of A Novel Infrared Wavelength-Tunable Laser Mueller-Matrix Polarimetric Scatterometer To Measure Nanostructured Optical Materials, Jason C. Vap, Stephen E. Nauyoks, Michael R. Benson, Michael A. Marciniak

Faculty Publications

Nanostructured optical materials, for example, metamaterials, have unique spectral, directional, and polarimetric properties. Samples designed and fabricated for infrared (IR) wavelengths have been characterized using broadband instruments to measure specular polarimetric transmittance or reflectance as in ellipsometry or integrated hemisphere transmittance or reflectance. We have developed a wavelength-tunable IR Mueller-matrix (Mm) polarimetric scatterometer which uses tunable external-cavity quantum-cascade lasers (EC-QCLs) to tune onto and off of the narrowband spectral resonances of nanostructured optical materials and performed full polarimeteric and directional evaluation to more fully characterize their behavior. Using a series of EC-QCLs, the instrument is tunable over 4.37-6.54 μm wavelengths …


Spin Crossover Behavior Of N-Confused C-Scorpionate Complexes Of Iron(Ii) Trifluoromethanesulfonate, Kristin Joy Meise Oct 2017

Spin Crossover Behavior Of N-Confused C-Scorpionate Complexes Of Iron(Ii) Trifluoromethanesulfonate, Kristin Joy Meise

Master's Theses (2009 -)

An understanding of the molecular properties that influence highly-cooperative SCO behavior is critical in the development of new electronic materials. The purpose of this thesis work is to more fully examine whether hydrogen bonding interactions can be used to assemble iron(II) scorpionate complexes and whether this leads to abruptness in the SCO behavior. In this contribution, new N-confused C-scorpionate ligands are prepared with two ‘normal’ pz* groups ( = 3,5-dimethylpyrazol-1yl) and a ‘confused’ pyrazolyl with either an N-H, HL*, or an N-Tosyl (Tosyl = p-toluenesulfonyl), TsL*, bound to a central methine. These bulky ligands complement those previously described, HL and …


A Picture Is Worth A Thousand Roads, Keith Pierce Oct 2017

A Picture Is Worth A Thousand Roads, Keith Pierce

News Items

No abstract provided.


Search For Cp Violation And Measurement Of The Branching Fraction In The Decay D0 → K0 Sk0 S, N. Dash Et Al., D. Joffe, Ratnappuli L. Kulasiri Oct 2017

Search For Cp Violation And Measurement Of The Branching Fraction In The Decay D0 → K0 Sk0 S, N. Dash Et Al., D. Joffe, Ratnappuli L. Kulasiri

Faculty Articles

We report a study of the decay D0→K0SK0S using 921  fb−1 of data collected at or near the Υ(4S) and Υ(5S) resonances with the Belle detector at the KEKB asymmetric energy e+e− collider. The measured time-integrated CP asymmetry is ACP(D0→K0SK0S)=(−0.02±1.53±0.02±0.17)%, and the branching fraction is B(D0→K0SK0S)=(1.321±0.023±0.036±0.044)×10−4, where the first uncertainty is statistical, the second is systematic, and the third is due to the normalization mode (D0→K0Sπ0). These results are significantly more precise than previous measurements available for this mode. The ACP measurement is consistent with the standard model expectation.


Origins And Transformations Of Dissolved Organic Matter In Large Arctic Rivers, Karl Kaiser, Maria Canedo-Oropeza, Rachel Mcmahon, Eainer M. W. Amon Oct 2017

Origins And Transformations Of Dissolved Organic Matter In Large Arctic Rivers, Karl Kaiser, Maria Canedo-Oropeza, Rachel Mcmahon, Eainer M. W. Amon

OES Faculty Publications

Arctic river watersheds are important components of the global climate system and show an amplified response to climate change. Here, we characterize origins and transformations of dissolved organic matter (DOM) in five major Arctic rivers (Kolyma, Lena, Yenisei, Ob, Mackenzie) over 3 years with seasonal sampling periods using measurements of carbohydrates, amino acids, bacterial biomarkers (D-amino acids), and plant protein biomarkers (hydroxyproline). A strong seasonal cycle of bioavailable DOM export was observed that correlated with discharge, vegetation, river morphology and water residence time. The chemical composition of bioavailable DOM was different among rivers reflecting unique characteristics of Arctic river watersheds. …


Linear And Nonlinear Effects Of Temperature And Precipitation On Ecosystem Properties In Tidal Saline Wetlands, Laura C. Feher, Michael J. Osland, Kereen T. Griffith, James B. Grace, Rebecca J. Howard, Camille L. Stagg, Nicholas M. Enwright, Ken W. Krauss, Christopher A. Gabler, Richard H. Day, Kerrylee Rogers Oct 2017

Linear And Nonlinear Effects Of Temperature And Precipitation On Ecosystem Properties In Tidal Saline Wetlands, Laura C. Feher, Michael J. Osland, Kereen T. Griffith, James B. Grace, Rebecca J. Howard, Camille L. Stagg, Nicholas M. Enwright, Ken W. Krauss, Christopher A. Gabler, Richard H. Day, Kerrylee Rogers

School of Earth, Environmental, and Marine Sciences Faculty Publications and Presentations

Climate greatly influences the structure and functioning of tidal saline wetland ecosystems. However, there is a need to better quantify the effects of climatic drivers on ecosystem properties, particularly near climate-sensitive ecological transition zones. Here, we used climate- and literature-derived ecological data from tidal saline wetlands to test hypotheses regarding the influence of climatic drivers (i.e., temperature and precipitation regimes) on the following six ecosystem properties: canopy height, biomass, productivity, decomposition, soil carbon density, and soil carbon accumulation. Our analyses quantify and elucidate linear and nonlinear effects of climatic drivers. We quantified positive linear relationships between temperature and above-ground productivity …


A Novel Diffuse Fraction-Based Two-Leaf Light Use Efficiency Model: An Application Quantifying Photosynthetic Seasonality Across 20 Ameriflux Flux Tower Sites, Hao Yan, Shao-Qiang Wang, Kai-Liang Yu, Bin Wang, Qin Yu, Gil Bohrer, Dave Billesbach, Rosvel Bracho, Abdullah F. Rahman, Herman H. Shugart Oct 2017

A Novel Diffuse Fraction-Based Two-Leaf Light Use Efficiency Model: An Application Quantifying Photosynthetic Seasonality Across 20 Ameriflux Flux Tower Sites, Hao Yan, Shao-Qiang Wang, Kai-Liang Yu, Bin Wang, Qin Yu, Gil Bohrer, Dave Billesbach, Rosvel Bracho, Abdullah F. Rahman, Herman H. Shugart

School of Earth, Environmental, and Marine Sciences Faculty Publications and Presentations

Diffuse radiation can increase canopy light use efficiency (LUE). This creates the need to differentiate the effects of direct and diffuse radiation when simulating terrestrial gross primary production (GPP). Here, we present a novel GPP model, the diffuse-fraction-based two-leaf model (DTEC), which includes the leaf response to direct and diffuse radiation, and treats maximum LUE for shaded leaves (ɛmsh defined as a power function of the diffuse fraction (Df)) and sunlit leaves (ɛmsu defined as a constant) separately. An Amazonian rainforest site (KM67) was used to calibrate the model by simulating the linear relationship …


Finding Water Scarcity Amid Abundance Using Human–Natural System Models, William K. Jaeger, Adell Amos, Daniel P. Bigelow, Heejun Chang, David R. Conklin, Roy Haggerty, Christian Langpap, Kathleen Moore, Philip Mote, Anne W. Nolin, Andrew J. Plantinga, Cynthia L. Schwartz, Desiree Tullos, David P. Turner Oct 2017

Finding Water Scarcity Amid Abundance Using Human–Natural System Models, William K. Jaeger, Adell Amos, Daniel P. Bigelow, Heejun Chang, David R. Conklin, Roy Haggerty, Christian Langpap, Kathleen Moore, Philip Mote, Anne W. Nolin, Andrew J. Plantinga, Cynthia L. Schwartz, Desiree Tullos, David P. Turner

Geography Faculty Publications and Presentations

Water scarcity afflicts societies worldwide. Anticipating water shortages is vital because of water’s indispensable role in social-ecological systems. But the challenge is daunting due to heterogeneity, feedbacks, and water’s spatial-temporal sequencing throughout such systems. Regional system models with sufficient detail can help address this challenge. In our study, a detailed coupled human–natural system model of one such region identifies how climate change and socioeconomic growth will alter the availability and use of water in coming decades. Results demonstrate how water scarcity varies greatly across small distances and brief time periods, even in basins where water may be relatively abundant overall. …


Racemic And Enantiopure Forms Of 3‐Ethyl‐3‐Phenylpyrrolidin‐2‐One Adopt Very Different Crystal Structures, Arcadius V. Krivoshein, Sergey V. Lindeman, Tatiana V. Timofeeva, Victor N. Khrustalev Oct 2017

Racemic And Enantiopure Forms Of 3‐Ethyl‐3‐Phenylpyrrolidin‐2‐One Adopt Very Different Crystal Structures, Arcadius V. Krivoshein, Sergey V. Lindeman, Tatiana V. Timofeeva, Victor N. Khrustalev

Chemistry Faculty Research and Publications

3‐Ethyl‐3‐phenylpyrrolidin‐2‐one (EPP) is an experimental anticonvulsant based on the newly proposed α‐substituted amide group pharmacophore. These compounds show robust activity in animal models of drug‐resistant epilepsy and are thus promising for clinical development. In order to understand pharmaceutically relevant properties of such compounds, we are conducting an extensive investigation of their structures in the solid state. In this article, we report chiral high‐performance liquid chromatography (HPLC) separation, determination of absolute configuration of enantiomers, and crystal structures of EPP. Preparative resolution of EPP enantiomers by chiral HPLC was accomplished on the Chiralcel OJ stationary phase in the polar‐organic mode. Using …


The Periodical Fall 2017, Southern Adventist University Oct 2017

The Periodical Fall 2017, Southern Adventist University

the Periodical – Chemistry Department Newsletter

Volume 5, issue 1 of the Periodical includes articles about new assistant professor Nuvia Saucedo, student missions in Peru, forensic chemistry summer camp, and a pictorial listing of December 2017 graduates.


Formalizing The Panarchy Adaptive Cycle With The Cusp Catastrophe [Presentation], Martin Zwick, Joshua Hughes Oct 2017

Formalizing The Panarchy Adaptive Cycle With The Cusp Catastrophe [Presentation], Martin Zwick, Joshua Hughes

Systems Science Faculty Publications and Presentations

The panarchy adaptive cycle, a general model for change in natural and human systems, can be formalized by the cusp catastrophe of René Thom's topological theory. Both the adaptive cycle and the cusp catastrophe have been used to model ecological, economic, and social systems in which slow and small continuous changes in two control variables produce fast and large discontinuous changes in system behavior. The panarchy adaptive cycle, the more recent of the two models, has been used so far only for qualitative descriptions of typical dynamics of such systems. The cusp catastrophe, while also often employed qualitatively, is a …


Fastshrinkage: Perceptually-Aware Retargeting Toward Mobile Platforms, Zhenguang Liu, Zepeng Wang, Luming Zhang, Rajiv Ratn Shah, Yingjie Xia, Yi Yang, Wei Liu Oct 2017

Fastshrinkage: Perceptually-Aware Retargeting Toward Mobile Platforms, Zhenguang Liu, Zepeng Wang, Luming Zhang, Rajiv Ratn Shah, Yingjie Xia, Yi Yang, Wei Liu

Research Collection School Of Computing and Information Systems

Retargeting aims at adapting an original high-resolution photo/video to a low-resolution screen with an arbitrary aspect ratio. Conventional approaches are generally based on desktop PCs, since the computation might be intolerable for mobile platforms (especially when retargeting videos). Besides, only low-level visual features are exploited typically, whereas human visual perception is not well encoded. In this paper, we propose a novel retargeting framework which fast shrinks photo/video by leveraging human gaze behavior. Specifically, we first derive a geometry-preserved graph ranking algorithm, which efficiently selects a few salient object patches to mimic human gaze shifting path (GSP) when viewing each scenery. …


Tagscan: Simultaneous Target Imaging And Material Identification With Commodity Rfid Devices, Ju Wang, Jie Xiong, Xiaojiang Chen, Hongbo Jiang, Rajesh Krishna Balan, Dingyi Fang Oct 2017

Tagscan: Simultaneous Target Imaging And Material Identification With Commodity Rfid Devices, Ju Wang, Jie Xiong, Xiaojiang Chen, Hongbo Jiang, Rajesh Krishna Balan, Dingyi Fang

Research Collection School Of Computing and Information Systems

Target imaging and material identification play an important role in many real-life applications. This paper introduces TagScan, a system that can identify the material type and image the horizontal cut of a target simultaneously with cheap commercial of-the-shelf (COTS) RFID devices. The key intuition is that different materials and target sizes cause different amounts of phase and RSS (Received Signal Strength) changes when radio frequency (RF) signal penetrates through the target. Multiple challenges need to be addressed before we can turn the idea into a functional system including (i) indoor environments exhibit rich multipath which breaks the linear relationship between …


Neutrosophic N -Structures And Their Applications In Semigroups, Florentin Smarandache, Madad Khan, Saima Anis, Young Bae Jun Oct 2017

Neutrosophic N -Structures And Their Applications In Semigroups, Florentin Smarandache, Madad Khan, Saima Anis, Young Bae Jun

Branch Mathematics and Statistics Faculty and Staff Publications

The notion of neutrosophic N -structure is introduced, and applied it to semigroup. The notions of neutrosophic N -subsemigroup, neutrosophic N -product and ε-neutrosophic N -subsemigroup are introduced, and several properties are investigated. Conditions for neutrosophic N -structure to be neutrosophic N -subsemigroup are provided. Using neutrosophic N -product, characterization of neutrosophic N -subsemigroup is discussed. Relations between neutrosophic N -subsemigroup and εneutrosophic N -subsemigroup are discussed. We show that the homomorphic preimage of neutrosophic N -subsemigroup is a neutrosophic N - subsemigroup, and the onto homomorphic image of neutrosophic N - subsemigroup is a neutrosophic N -subsemigroup.


Metamorphic Code Generation Using Llvm, Michael Crawford Oct 2017

Metamorphic Code Generation Using Llvm, Michael Crawford

Master's Projects

Each instance of metamorphic software changes its internal structure, but the function remains essentially the same. Such metamorphism has been used primarily by malware writers as a means of evading signature-based detection. However, metamorphism also has potential beneficial uses in fields related to software protection. In this research, we develop a practical framework within the LLVM compiler that automatically generates metamorphic code, where the user has well-defined control over the degree of morphing applied to the code. We analyze the effectiveness of this metamorphic generator based on Hidden Markov Model (HMM) analysis, and discover that HMMs are effective at detection …


Bootbandit: A Macos Bootloader Attack, Armen Boursalian Oct 2017

Bootbandit: A Macos Bootloader Attack, Armen Boursalian

Master's Projects

Full disk encryption (FDE) is used to protect a computer system against data theft by physical access. If a laptop or hard disk drive protected with FDE is stolen or lost, the data remains unreadable without the encryption key. To foil this defense, an intruder can gain physical access to a computer system in a so-called “evil maid” attack, install malware in the boot (pre-operating system) environment, and use the malware to intercept the victim’s password. Such an attack relies on the fact that the system is in a vulnerable state before booting into the operating system. In this paper, …


Implementation Of Faceted Values In Node.Js., Andrew Kalenda Oct 2017

Implementation Of Faceted Values In Node.Js., Andrew Kalenda

Master's Projects

Information flow analysis is the study of mechanisms by which developers may protect sensitive data within an ecosystem containing untrusted third-party code. Secure multi-execution is one such mechanism that reliably prevents undesirable information flows, but a programmer’s use of secure multi-execution is itself challenging and prone to error. Faceted values have been shown to provide an alternative to secure multi-execution which is, in theory, functionally equivalent. The purpose of this work is to show that the theory holds in practice by implementing usable faceted values in JavaScript via source code transformation. The primary contribution of this project is to provide …


Detecting Encrypted Malware Using Hidden Markov Models, Dhiviya Dhanasekar Oct 2017

Detecting Encrypted Malware Using Hidden Markov Models, Dhiviya Dhanasekar

Master's Projects

Encrypted code is often present in some types of advanced malware, while such code virtually never appears in legitimate applications. Hence, the presence of encrypted code within an executable file could serve as a strong heuristic for detecting malware. In this research, we consider the feasibility of detecting encrypted code using hidden Markov models.


Virtualized Baseband Units Consolidation In Advanced Lte Networks Using Mobility- And Power-Aware Algorithms, Uladzimir Karneyenka Oct 2017

Virtualized Baseband Units Consolidation In Advanced Lte Networks Using Mobility- And Power-Aware Algorithms, Uladzimir Karneyenka

Master's Projects

Virtualization of baseband units in Advanced Long-Term Evolution networks and a rapid performance growth of general purpose processors naturally raise the interest in resource multiplexing. The concept of resource sharing and management between virtualized instances is not new and extensively used in data centers. We adopt some of the resource management techniques to organize virtualized baseband units on a pool of hosts and investigate the behavior of the system in order to identify features which are particularly relevant to mobile environment. Subsequently, we introduce our own resource management algorithm specifically targeted to address some of the peculiarities identified by experimental …


A Scrabble Artificial Intelligence Game, Priyatha Joji Abraham Oct 2017

A Scrabble Artificial Intelligence Game, Priyatha Joji Abraham

Master's Projects

Computer AI players have already surpassed human opponents in competitive Scrabble, however, defeating a Computer AI opponent is complex and demands efficient heuristics. The primary objective of this project is to build two intelligent AI players from scr atch for the Scrabble cross - board puzzle game having different move generation heuristics and endgame strategies to evaluate their performance based on various benchmarks like winning criteria, quality of moves, and time consumption. The first AI selected is the most popular Scrabble AI, Maven. It generates a three - ply look - ahead simulation to evaluate the most promising candidate move …


Cache Management Schemes For User Equipment Contexts In 5th Generation Cloud Radio Access Networks, Gurpreet Kaur Oct 2017

Cache Management Schemes For User Equipment Contexts In 5th Generation Cloud Radio Access Networks, Gurpreet Kaur

Master's Projects

Advances in cellular network technology continue to develop to address increasing demands from the growing number of devices resulting from the Internet of Things, or IoT. IoT has brought forth countless new equipment competing for service on cellular networks. The latest in cellular technology is 5th Generation Cloud Radio Access Networks, or 5G C-RAN, which consists of an architectural design created specifically to meet novel and necessary requirements for better performance, reduced latency of service, and scalability. As part of this design is the inclusion of a virtual cache, there is a necessity for useful cache management schemes and protocols, …


Cache Management And Load Balancing For 5g Cloud Radio Access Networks, Chin Tsai Oct 2017

Cache Management And Load Balancing For 5g Cloud Radio Access Networks, Chin Tsai

Master's Projects

Cloud radio access network (CRAN) has been proposed for 5G mobile networks. The benefit of a CRAN includes better scalability, flexibility, and performance. The paper introduces a cache management algorithm for a baseband unit of CRAN and load balancing algorithms for virtual machines load within the CRAN. The proposed scheme, exponential decay (EXD) with analytical hierarchy process (AHP), increases hit rate and reduces network traffic. The scheme also provides preferential services for users with a higher service level agreement (SLA). Finally, the experiment shows the proposed load balancing algorithm can reduce the virtual machines’ (VM) queue size and wait time.


“Bluff” With Ai, Tina Philip Oct 2017

“Bluff” With Ai, Tina Philip

Master's Projects

The goal of this project is to build multiple agents for the game Bluff and to conduct experiments as to which performs better. Bluff is a multi-player, non-deterministic card game where players try to get rid of all the cards in their hand. The process of bluffing involves making a move such that it misleads the opponent and thus prove to be of advantage to the player. The strategic complexity in the game arises due to the imperfect or hidden information which means that certain relevant details about the game are unknown to the players. Multiple agents followed different strategies …


Multi Language Browser Support, Swapnil Mohan Patil Oct 2017

Multi Language Browser Support, Swapnil Mohan Patil

Master's Projects

Web browsers have become an increasingly appealing platform for application developers. Browsers make it relatively easy to deliver cross-platform applications. Web browsers have become a de facto universal operating system, and JavaScript its instruction set. Unfortunately, executing any other language than JavaScript in web browser is not usually possible. Previous approaches are either non-portable or demand extensive modifications for programs to work in the browser. Translation to JavaScript (JS) is one option but that can be challenging if the language is sufficiently different from JS. Also, debugging translated applications can be difficult. This paper presents how languages like Scheme and …


Man And Land: Competing Ontologies, Colonial Legacies, And The Quest For Food Sovereignty, Savannah Smith Oct 2017

Man And Land: Competing Ontologies, Colonial Legacies, And The Quest For Food Sovereignty, Savannah Smith

Independent Study Project (ISP) Collection

Land is an ontological reality, which is at the center of different relationships to land. These relationships are situated in and a product of historical and spatial process that have an under lying power geometry. These different understandings of land tenure can create conflict when they intersect with competing interests in the same space. In Cameroon, this is currently the case in the form of large-scale land acquisitions, which often conflict with local communities as multinational corporations and local elites acquire land concessions with facilitation by the government in the name of development. This paper aims to understand this issue …


A Study Of Reptile Community Diversity Related To Habitat Characteristics At Marojejy National Park, Julia Kowala Oct 2017

A Study Of Reptile Community Diversity Related To Habitat Characteristics At Marojejy National Park, Julia Kowala

Independent Study Project (ISP) Collection

Marojejy National Park is known for its diversity. Though it is home to the silky sifaka, it has extensive populations of herpetofauna. Seventy-seven species of reptiles have been documented in Marojejy National Park. This study aimed to evaluate the reptile community diversity and habitat characteristics in the park through systematic searches of ten-by-ten-meter plots, and inventory of species as they were found throughout the park. Systematic searches yielded the finding of 19 of the total 25 species identified. Some species that were found had not been previously seen at Marojejy before, most notably, Brookesia sp. “Nosy Hara”, Brookesia desperata, Furcifer …