Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (3932)
- Engineering (3117)
- Social and Behavioral Sciences (2452)
- Environmental Sciences (2432)
- Medicine and Health Sciences (2317)
-
- Chemistry (1928)
- Life Sciences (1784)
- Earth Sciences (1777)
- Mathematics (1495)
- Computer Engineering (1472)
- Physics (1438)
- Artificial Intelligence and Robotics (1278)
- Numerical Analysis and Scientific Computing (997)
- Operations Research, Systems Engineering and Industrial Engineering (917)
- Systems Science (862)
- Sustainability (843)
- Oceanography and Atmospheric Sciences and Meteorology (825)
- Statistics and Probability (666)
- Electrical and Computer Engineering (575)
- Oil, Gas, and Energy (552)
- Business (536)
- Environmental Monitoring (508)
- Environmental Indicators and Impact Assessment (491)
- Astrophysics and Astronomy (484)
- Education (484)
- Applied Mathematics (480)
- Geology (452)
- Mining Engineering (434)
- Natural Resources and Conservation (427)
- Institution
-
- Selected Works (2236)
- China Simulation Federation (862)
- TÜBİTAK (800)
- University of Kentucky (635)
- University of Nebraska - Lincoln (631)
-
- Singapore Management University (453)
- Old Dominion University (300)
- Utah State University (270)
- Chulalongkorn University (263)
- City University of New York (CUNY) (249)
- China Coal Technology and Engineering Group (CCTEG) (203)
- University of South Florida (193)
- Missouri University of Science and Technology (191)
- Portland State University (185)
- University of Texas at El Paso (184)
- University of Wollongong (184)
- University of Nevada, Las Vegas (183)
- Louisiana State University (181)
- Western University (174)
- Technological University Dublin (165)
- University of Texas Rio Grande Valley (158)
- University of South Carolina (155)
- San Jose State University (133)
- University of New Mexico (129)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (126)
- University of Arkansas, Fayetteville (123)
- University of Central Florida (119)
- Air Force Institute of Technology (117)
- University of Vermont (114)
- Brigham Young University (113)
- Keyword
-
- Machine learning (177)
- Climate change (101)
- Chemistry (94)
- Deep learning (93)
- Sustainability (89)
-
- Machine Learning (85)
- Simulation (71)
- Environment (70)
- Computer Science (68)
- Obat kista ampuh (63)
- Merek obat kista (61)
- Nama obat kista (61)
- Obat kista diapotik (61)
- Obat kista manjur (61)
- Obat kista tanpa operasi (61)
- Climate (60)
- Mathematics (57)
- Physics (55)
- Classification (51)
- Obat tradisional ambeien parah (49)
- Remote sensing (47)
- Deep Learning (46)
- Groundwater (46)
- Agriculture (45)
- Obat sipilis (45)
- Climate Solutions (44)
- Statistics (44)
- Water quality (44)
- Cybersecurity (43)
- Optimization (42)
- Publication
-
- Journal of System Simulation (862)
- Theses and Dissertations (574)
- Research Collection School Of Computing and Information Systems (407)
- Electronic Theses and Dissertations (352)
- Turkish Journal of Electrical Engineering and Computer Sciences (335)
-
- Faculty Publications (257)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (230)
- World of Coal Ash Proceedings (224)
- Turkish Journal of Mathematics (223)
- IGC Proceedings (1993-2023) (212)
- Coal Geology & Exploration (203)
- Australian Institute for Innovative Materials - Papers (174)
- Alif Nur (135)
- Turkish Journal of Chemistry (134)
- kutil kelamin Ampuh (131)
- USF Tampa Graduate Theses and Dissertations (129)
- Honors Theses (113)
- Electronic Thesis and Dissertation Repository (110)
- Applications and Applied Mathematics: An International Journal (AAM) (108)
- Departmental Technical Reports (CS) (105)
- Dissertations (94)
- Walden Dissertations and Doctoral Studies (94)
- Graduate Theses and Dissertations (91)
- Physics Faculty Publications (89)
- Articles (88)
- Open Educational Resources (87)
- Publications and Research (87)
- Master's Projects (86)
- Rudi Gunawan (86)
- Ted von Hippel (80)
- Publication Type
Articles 2131 - 2160 of 15928
Full-Text Articles in Physical Sciences and Mathematics
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li
KSU Proceedings on Cybersecurity Education, Research and Practice
The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app …
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.
These replay attacks can be accomplished by capturing recorded …
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar
KSU Proceedings on Cybersecurity Education, Research and Practice
The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can be sold …
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam
KSU Proceedings on Cybersecurity Education, Research and Practice
The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these …
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward
KSU Proceedings on Cybersecurity Education, Research and Practice
Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.
This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It …
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.
Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz
Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz
KSU Proceedings on Cybersecurity Education, Research and Practice
Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to …
Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull
Collaborating On Machine Reading: Training Algorithms To Read Complex Collections, Carrie M. Pirmann, Brian R. King, Bhagawat Acharya, Katherine M. Faull
Bucknell University Digital Scholarship Conference
Interdisciplinary collaboration between two faculty members in the humanities and computer science, a research librarian, and an undergraduate student has led to remarkable results in an ongoing international DH research project that has at its core 18th century manuscripts. The corpus stems from a vast collection of archival materials held by the Moravian Church in the UK, Germany, and the US. The number of pages to be transcribed, differences in handwriting styles, paper quality, and original language pose enormous problems for the feasibility of human transcription. This presentation will review the hypothesis, process, and findings of a summer research project …
Evaluation Of Approaches For Mapping Tidal Wetlands Of The Chesapeake And Delaware Bays, Brian T. Lamb, Maria A. Tzortziou, Kyle C. Mcdonald
Evaluation Of Approaches For Mapping Tidal Wetlands Of The Chesapeake And Delaware Bays, Brian T. Lamb, Maria A. Tzortziou, Kyle C. Mcdonald
Publications and Research
The spatial extent and vegetation characteristics of tidal wetlands and their change are among the biggest unknowns and largest sources of uncertainty in modeling ecosystem processes and services at the land-ocean interface. Using a combination of moderate-high spatial resolution (
Get Rid Of Viga Plus Problems Once And For All, Viga Plus France
Get Rid Of Viga Plus Problems Once And For All, Viga Plus France
Viga Plus France
Internet Core Functions: Security Today And Future State, Jeffrey Jones
Internet Core Functions: Security Today And Future State, Jeffrey Jones
KSU Proceedings on Cybersecurity Education, Research and Practice
Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.
Preparing For Tomorrow By Looking At Yesterday, Peter Dooley
Preparing For Tomorrow By Looking At Yesterday, Peter Dooley
KSU Proceedings on Cybersecurity Education, Research and Practice
Why do we learn? Why do we study history? Why do we research the work of others? The answer is that there is value today in what was already learned and experienced, successes and failures. Mr. Dooley, a 25-year security professional and 20-year hospitality executive, will share his experiences and how our history in security will help us in thinking about our future.
A Computational Model For Recovery From Brain Injury, Wayne Wakeland
A Computational Model For Recovery From Brain Injury, Wayne Wakeland
Systems Science Friday Noon Seminar Series
A computational simulation model calculates recovery trajectories following traumatic brain injury (TBI). Prior publications include a multi-scale framework for studying concussion and a systems-level causal loop diagram (CLD) and discussion of feedback processes. The scope of the computational model goes beyond concussion to include all severities of TBI. A set of first order ordinary differential equations and their associated parameters determines recovery trajectories. While highly speculative, the model serves to demonstrate the potential utility of computational models in this context. Much more research will be needed to create a properly supported research model that could be used for clinical trial …
Three Terms Of E-Class Data For An Introductory E&M Lab, Ronald J. Tackett, Helen Mae Cothrel, Gregory N. Hassold
Three Terms Of E-Class Data For An Introductory E&M Lab, Ronald J. Tackett, Helen Mae Cothrel, Gregory N. Hassold
Natural Sciences Presentations & Conference Materials
No abstract provided.
Snow Depth Variability In The Northern Hemisphere Mountains Observed From Space, Hans-Peter Marshall
Snow Depth Variability In The Northern Hemisphere Mountains Observed From Space, Hans-Peter Marshall
Geosciences Faculty Publications and Presentations
Accurate snow depth observations are critical to assess water resources. More than a billion people rely on water from snow, most of which originates in the Northern Hemisphere mountain ranges. Yet, remote sensing observations of mountain snow depth are still lacking at the large scale. Here, we show the ability of Sentinel-1 to map snow depth in the Northern Hemisphere mountains at 1 km² resolution using an empirical change detection approach. An evaluation with measurements from ~4000 sites and reanalysis data demonstrates that the Sentinel-1 retrievals capture the spatial variability between and within mountain ranges, as well as their inter-annual …
Update Frequency And Background Corpus Selection In Dynamic Tf-Idf Models For First Story Detection, Fei Wang, Robert J. Ross, John D. Kelleher
Update Frequency And Background Corpus Selection In Dynamic Tf-Idf Models For First Story Detection, Fei Wang, Robert J. Ross, John D. Kelleher
Conference papers
First Story Detection (FSD) requires a system to detect the very first story that mentions an event from a stream of stories. Nearest neighbour-based models, using the traditional term vector document representations like TF-IDF, currently achieve the state of the art in FSD. Because of its online nature, a dynamic term vector model that is incrementally updated during the detection process is usually adopted for FSD instead of a static model. However, very little research has investigated the selection of hyper-parameters and the background corpora for a dynamic model. In this paper, we analyse how a dynamic term vector model …
Resilient Hampton, David Imburgia, Lucy Stoll
Resilient Hampton, David Imburgia, Lucy Stoll
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
The Frb 121102 Host Is Atypical Among Nearby Fast Radio Bursts, Ye Li, Bing Zhang, Kentaro Nagamine, Jingjing Shi
The Frb 121102 Host Is Atypical Among Nearby Fast Radio Bursts, Ye Li, Bing Zhang, Kentaro Nagamine, Jingjing Shi
Physics & Astronomy Faculty Research
We search for host galaxy candidates of nearby fast radio bursts (FRBs), FRB 180729.J1316+55, FRB 171020, FRB 171213, FRB 180810.J1159+83, and FRB 180814.J0422+73 (the second repeating FRB). We compare the absolute magnitudes and the expected host dispersion measure DMhost of these candidates with that of the first repeating FRB, FRB 121102, as well as those of long gamma-ray bursts (LGRBs) and superluminous supernovae (SLSNe), the proposed progenitor systems of FRB 121102. We find that while the FRB 121102 host is consistent with those of LGRBs and SLSNe, the nearby FRB host candidates, at least for FRB 180729.J1316+55, FRB 171020, and …
A Unified Description Of The Electrical Properties Of Low-Density Polyethylene Via The Dispersion Parameter, Zack Gibson, Megan Loveland, Jr Dennison
A Unified Description Of The Electrical Properties Of Low-Density Polyethylene Via The Dispersion Parameter, Zack Gibson, Megan Loveland, Jr Dennison
Physics Student Research
Low-density polyethylene is a prototypical highly disordered insulating material. This ubiquitous polymer has a variety of applications from spacecraft charging to high voltage DC power cable insulation. Therefore, the electrical properties are of great interest. The dispersion parameter, which originally appeared in a semi-empirical model to describe anomalies in permittivity data, is central to an understanding of these electrical properties. This parameter depends linearly on either temperature (low field regime) or on electric field (high field regime) and is scaled by the reciprocal of a characteristic energy. When the dispersion parameter reaches one, a transition from dispersive to non-dispersive transport …
First Measurement Of Neutrino Oscillation Parameters Using Neutrinos And Antineutrinos By Nova, M. A. Acero, P. Adamson, L. Aliaga, T. Alion, V. Allakhverdian, S. Altakarli, N. Anfimov, A. Antoshkin, A. Aurisano, A. Back, C. Backhouse, M. Baird, N. Balashov, P. Baldi, B. A. Bambah, S. Bashar, K. Bays, S. Bending, R. Bernstein, V. Bhatnagar, Roberto Petti, Et. Al.
First Measurement Of Neutrino Oscillation Parameters Using Neutrinos And Antineutrinos By Nova, M. A. Acero, P. Adamson, L. Aliaga, T. Alion, V. Allakhverdian, S. Altakarli, N. Anfimov, A. Antoshkin, A. Aurisano, A. Back, C. Backhouse, M. Baird, N. Balashov, P. Baldi, B. A. Bambah, S. Bashar, K. Bays, S. Bending, R. Bernstein, V. Bhatnagar, Roberto Petti, Et. Al.
Faculty Publications
The NOvA experiment has seen a 4.4σ signal of ⊽ e appearance in a 2 GeV⊽μ beam at a distance of 810 km. Using 12.33×1020 protons on target delivered to the Fermilab NuMI neutrino beamline, the experiment recorded 27 ⊽μ→⊽e candidates with a background of 10.3 and 102⊽μ→⊽μ candidates. This new antineutrino data are combined with neutrino data to measure the parameters |Δm 2 32 | = 2.48 +0.11 -0.06 x 10 -3 eV2 / c4 and sin2 θ23 in the ranges …
Incorporating Resiliency Into Jlus: The Monmouth County- Nws Earle Partnership Experience, Linda J. Brennen
Incorporating Resiliency Into Jlus: The Monmouth County- Nws Earle Partnership Experience, Linda J. Brennen
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
The Raft: Resilience Adaptation Feasibility Tool, Rhiannon Bezore
The Raft: Resilience Adaptation Feasibility Tool, Rhiannon Bezore
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
Evaluating Resilience: Insights From Florida, Hannah Torres
Evaluating Resilience: Insights From Florida, Hannah Torres
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
Measuring Resiliency: It's More Than Just Math, Lynette Cardoch
Measuring Resiliency: It's More Than Just Math, Lynette Cardoch
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
Promoting Resilience Through Military-Locality Coordination, Benjamin J. Mcfarlane
Promoting Resilience Through Military-Locality Coordination, Benjamin J. Mcfarlane
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
Living With Water: Creating Opportunities To Advance Resilience In New Orleans, Bernadette Callahan
Living With Water: Creating Opportunities To Advance Resilience In New Orleans, Bernadette Callahan
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
2018/2019 Rise Coastal Community Resilience Challenges, Paul A. Robinson
2018/2019 Rise Coastal Community Resilience Challenges, Paul A. Robinson
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
Disaster Resilience = Recreational Opportunities, Kimley- Horn
Disaster Resilience = Recreational Opportunities, Kimley- Horn
October 11, 2019: Measuring and Evaluating Resilience
No abstract provided.
Concolic Testing Heap-Manipulating Programs, Long H. Pham, Quang Loc Le, Quoc-Sang Phan, Jun Sun
Concolic Testing Heap-Manipulating Programs, Long H. Pham, Quang Loc Le, Quoc-Sang Phan, Jun Sun
Research Collection School Of Computing and Information Systems
Concolic testing is a test generation technique which works effectively by integrating random testing generation and symbolic execution. Existing concolic testing engines focus on numeric programs. Heap-manipulating programs make extensive use of complex heap objects like trees and lists. Testing such programs is challenging due to multiple reasons. Firstly, test inputs for such program are required to satisfy non-trivial constraints which must be specified precisely. Secondly, precisely encoding and solving path conditions in such programs are challenging and often expensive. In this work, we propose the first concolic testing engine called CSF for heap-manipulating programs based on separation logic. CSF …
A Survey Of Distributed Data Stream Processing Frameworks, Haruna Isah, Tariq Abughofa, Sazia Mahfuz, Dharmitha Ajerla, Farhana Zulkernine, Shahzad Khan
A Survey Of Distributed Data Stream Processing Frameworks, Haruna Isah, Tariq Abughofa, Sazia Mahfuz, Dharmitha Ajerla, Farhana Zulkernine, Shahzad Khan
Publications and Scholarship
Big data processing systems are evolving to be more stream oriented where each data record is processed as it arrives by distributed and low-latency computational frameworks on a continuous basis. As the stream processing technology matures and more organizations invest in digital transformations, new applications of stream analytics will be identified and implemented across a wide spectrum of industries. One of the challenges in developing a streaming analytics infrastructure is the difficulty in selecting the right stream processing framework for the different use cases. With a view to addressing this issue, in this paper we present a taxonomy, a comparative …