Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (16248)
- Geology (13576)
- Life Sciences (3500)
- Computer Sciences (3464)
- Environmental Sciences (2811)
-
- Engineering (2086)
- Chemistry (1794)
- Soil Science (1672)
- Plant Sciences (1632)
- Social and Behavioral Sciences (1459)
- Physics (1366)
- Mathematics (1340)
- Sustainability (1010)
- Artificial Intelligence and Robotics (827)
- Medicine and Health Sciences (812)
- Computer Engineering (780)
- Ecology and Evolutionary Biology (763)
- Oceanography and Atmospheric Sciences and Meteorology (696)
- Statistics and Probability (661)
- Environmental Education (519)
- Natural Resources and Conservation (493)
- Electrical and Computer Engineering (478)
- Urban Studies and Planning (470)
- Education (466)
- Environmental Monitoring (451)
- Numerical Analysis and Scientific Computing (442)
- Databases and Information Systems (438)
- Astrophysics and Astronomy (428)
- Natural Resources Management and Policy (416)
- Institution
-
- Western Michigan University (13205)
- University of Kentucky (1719)
- TÜBİTAK (651)
- University of Nebraska - Lincoln (649)
- Singapore Management University (573)
-
- Loyola Marymount University and Loyola Law School (445)
- Old Dominion University (373)
- China Simulation Federation (315)
- University of Texas Rio Grande Valley (251)
- City University of New York (CUNY) (219)
- Chulalongkorn University (215)
- University of South Carolina (213)
- China Coal Technology and Engineering Group (CCTEG) (204)
- Montana Tech Library (195)
- Western University (194)
- University of Texas at El Paso (187)
- Utah State University (183)
- Kennesaw State University (181)
- Missouri University of Science and Technology (181)
- University of South Florida (174)
- Louisiana State University (171)
- Portland State University (170)
- William & Mary (162)
- University of Arkansas, Fayetteville (153)
- Air Force Institute of Technology (149)
- Boise State University (143)
- Technological University Dublin (130)
- University of Nevada, Las Vegas (128)
- Claremont Colleges (111)
- The University of Maine (110)
- Keyword
-
- Machine learning (190)
- Deep learning (163)
- Climate change (135)
- COVID-19 (125)
- Machine Learning (120)
-
- Technical Reports (109)
- UTEP Computer Science Department (109)
- Deep Learning (76)
- Alfalfa (73)
- Sustainability (70)
- Priority Soils (65)
- Mathematics (61)
- Artificial intelligence (59)
- Computer Science (59)
- Chemistry (58)
- Simulation (54)
- Remote sensing (52)
- Water Quality (52)
- Cybersecurity (47)
- Lake (46)
- Nitrogen (46)
- Lakes Lay Monitoring Program (45)
- Optimization (43)
- Climate (42)
- Artificial Intelligence (41)
- Environment (41)
- Blockchain (40)
- Soil Sampling (40)
- Classification (39)
- Computer vision (39)
- Publication
-
- Legacy Scout Tickets from Pure Oil Company (11044)
- Thin Sections (2130)
- IGC Proceedings (1993-2023) (1502)
- Theses and Dissertations (537)
- Research Collection School Of Computing and Information Systems (513)
-
- Journal of System Simulation (315)
- Faculty Publications (283)
- Electronic Theses and Dissertations (262)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (215)
- Coal Geology & Exploration (204)
- Turkish Journal of Electrical Engineering and Computer Sciences (202)
- Silver Bow Creek/Butte Area Superfund Site (194)
- Turkish Journal of Mathematics (186)
- Turkish Journal of Chemistry (167)
- United States Department of Agriculture Wildlife Services: Staff Publications (136)
- Honors Theses (122)
- Dissertations (115)
- USF Tampa Graduate Theses and Dissertations (112)
- Departmental Technical Reports (CS) (109)
- Graduate Theses and Dissertations (108)
- School of Natural Resources: Faculty Publications (106)
- Publications and Research (99)
- Doctoral Dissertations (96)
- Research outputs 2014 to 2021 (93)
- C-Day Computing Showcase (87)
- Electronic Thesis and Dissertation Repository (86)
- All Works (83)
- Articles (82)
- Physics Faculty Publications (81)
- Module 10: Garden Ecology (78)
- Publication Type
Articles 1951 - 1980 of 27884
Full-Text Articles in Physical Sciences and Mathematics
A Scenario-Based Analysis Of The Domestic Law Of Argentina In The Context Of The Nairobi Wreck Removal Convention, Laura Noelia Sanchez
A Scenario-Based Analysis Of The Domestic Law Of Argentina In The Context Of The Nairobi Wreck Removal Convention, Laura Noelia Sanchez
World Maritime University Dissertations
No abstract provided.
Maritime Cybersecurity: Comparing Practices Between Developing Countries : The Case Study Of Kenya And Spain, Bibian Turyahumura
Maritime Cybersecurity: Comparing Practices Between Developing Countries : The Case Study Of Kenya And Spain, Bibian Turyahumura
World Maritime University Dissertations
No abstract provided.
Assessing The Effectiveness Of Community Action On Marine And Coastal Litter: Case Study Through The Prism Of Social Media Groups In A Maltese Locality (Mellieha), Tessy Umbuwa Anjide
Assessing The Effectiveness Of Community Action On Marine And Coastal Litter: Case Study Through The Prism Of Social Media Groups In A Maltese Locality (Mellieha), Tessy Umbuwa Anjide
World Maritime University Dissertations
No abstract provided.
Blue Carbon Marine Habitats In Nigeria: Ecosystem Services, Threats And Implication For Ecosystem Based Management, Oluremi Taiwo Filani
Blue Carbon Marine Habitats In Nigeria: Ecosystem Services, Threats And Implication For Ecosystem Based Management, Oluremi Taiwo Filani
World Maritime University Dissertations
No abstract provided.
Port Throughput Forecasting Using Arima And Ols Regression: Case Study : Gwangyang Port In Korea, Shin Park
Port Throughput Forecasting Using Arima And Ols Regression: Case Study : Gwangyang Port In Korea, Shin Park
World Maritime University Dissertations
No abstract provided.
An Assessment Of The Awaraness Level Of Coastal And Upland Communities In Nigeria On The Impacts Of Marine Litter On The Ocean And Its Ecosystem Services., Yakubu Abubakar
World Maritime University Dissertations
No abstract provided.
Analysis Of Marine Plastic Litter Policies In Ghana, Perfect Ashai
Analysis Of Marine Plastic Litter Policies In Ghana, Perfect Ashai
World Maritime University Dissertations
No abstract provided.
Natural Resource Damage Assessment For Oil Spills In Sri Lanka: The Application Of Habitat Equivalency Analysis, Sayakkara Mesthrilage Dinishiya Athukorala
Natural Resource Damage Assessment For Oil Spills In Sri Lanka: The Application Of Habitat Equivalency Analysis, Sayakkara Mesthrilage Dinishiya Athukorala
World Maritime University Dissertations
No abstract provided.
A Multiple Case Study Of Meti Cybersecurity Education And Training: A Basis For The Development Of A Guiding Framework For Educational Approaches, Jeric Bacasdoon
A Multiple Case Study Of Meti Cybersecurity Education And Training: A Basis For The Development Of A Guiding Framework For Educational Approaches, Jeric Bacasdoon
World Maritime University Dissertations
No abstract provided.
The Impact Of Waste-To-Energy Sustainability Projects In Port On Society: A Case Study In Copenhagen-Malmö Port (Cmp), Dumisa Kevin January
The Impact Of Waste-To-Energy Sustainability Projects In Port On Society: A Case Study In Copenhagen-Malmö Port (Cmp), Dumisa Kevin January
World Maritime University Dissertations
No abstract provided.
Policy Response For Marine Plastic Debris In Timor Leste, Maria Jeronimo Viana
Policy Response For Marine Plastic Debris In Timor Leste, Maria Jeronimo Viana
World Maritime University Dissertations
No abstract provided.
Challenges/Issues Of Implementing Marpol Annex Vi In Papua New Guinea: An Assessment From The Regulator's Point Of View With Recommendations For National Implementation., Sammy Kalepo
World Maritime University Dissertations
No abstract provided.
Ship Recycling In Ghana: An Analysis Of The Implementation Of The Hong Kong Convention, 2009, Nii Lantei Kumi-Bruce
Ship Recycling In Ghana: An Analysis Of The Implementation Of The Hong Kong Convention, 2009, Nii Lantei Kumi-Bruce
World Maritime University Dissertations
No abstract provided.
A Study Of Accession And Implementation Of The 2004 Bwm Convention In Vietnam: Challenges And Sollutions., Quy Thanh La
A Study Of Accession And Implementation Of The 2004 Bwm Convention In Vietnam: Challenges And Sollutions., Quy Thanh La
World Maritime University Dissertations
No abstract provided.
Challenges And Potential For Egyptian Oil Spill Contingency Plan: A Comparative Study For Improving Oil Spill Preparedness : Case Study Gulf Of Suez And North Sea, Ahmed Raafat Reiad Nasreldin
Challenges And Potential For Egyptian Oil Spill Contingency Plan: A Comparative Study For Improving Oil Spill Preparedness : Case Study Gulf Of Suez And North Sea, Ahmed Raafat Reiad Nasreldin
World Maritime University Dissertations
No abstract provided.
Retaining Competitive Advantage In Ship Recycling Under The New Regulatory Framework: A Case Study Of Bangladesh, Wahidul Sheikh
Retaining Competitive Advantage In Ship Recycling Under The New Regulatory Framework: A Case Study Of Bangladesh, Wahidul Sheikh
World Maritime University Dissertations
No abstract provided.
Fuel Oil Bunkering Mechanism And Ways Ahead In Strategic Enforcement, Sudhir Kumar Shrivastava
Fuel Oil Bunkering Mechanism And Ways Ahead In Strategic Enforcement, Sudhir Kumar Shrivastava
World Maritime University Dissertations
No abstract provided.
Digitalization In Ship Management And Operations: Use Of Digital Twin Technology To Monitor Marine Fouling, Walid Mohamed Ali Awadh Timimi
Digitalization In Ship Management And Operations: Use Of Digital Twin Technology To Monitor Marine Fouling, Walid Mohamed Ali Awadh Timimi
World Maritime University Dissertations
No abstract provided.
The Implementation Of The Ballast Water Management Convention In Timor-Leste, Domingos Ximenes Nunes
The Implementation Of The Ballast Water Management Convention In Timor-Leste, Domingos Ximenes Nunes
World Maritime University Dissertations
No abstract provided.
Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan
Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan
KSU Proceedings on Cybersecurity Education, Research and Practice
The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …
Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz
Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz
KSU Proceedings on Cybersecurity Education, Research and Practice
Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.
This paper will describe and explain the concept of cyber resiliency. It will then evaluate …
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
Incidence Matrix And Some Of Its Applications In Graph Theory, Hizer Leka, Faton Kabashi
Incidence Matrix And Some Of Its Applications In Graph Theory, Hizer Leka, Faton Kabashi
UBT International Conference
In this paper we will focus mainly on some basic concepts and definitions regarding incidence matrices and some examples of their application in graph theory. To give their clearest definition of the incidence matrix, we will first give the meaning of the incidence structure, then through it to define the incidence matrix. The structure of incidence is called the ordered triplet S=(P,B,I), where P∩B=ϕ, I⊆P×B and P,B while, are two non-empty sets and I a relation in between them, such that I⊂P×B. We call the elements of P community dots and we will mark them in lower case letters of, …
Internet Of Things In Healthcare: A Review, Faton Kabashi, Lamir Shkurti, Hizer Leka, Vehbi Sofiu, Nazmi Misini
Internet Of Things In Healthcare: A Review, Faton Kabashi, Lamir Shkurti, Hizer Leka, Vehbi Sofiu, Nazmi Misini
UBT International Conference
In the current era, there is a requirement of a system with connected devices, persons, time, places, and networks, which is completely incorporated in what is called as Internet of Things (IoT). IoT is developed toward making the objects smart and connectable using recent development in miniaturizing and communication technologies. IoT can change the way human being live their life by making it their more convenient and smart. IoT has wide application domains one of them is healthcare. Healthcare is one of the application domains in IoT that draws enormous interest from industry, the research community, and the public sector. …
Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli
Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli
UBT International Conference
This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies.
Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states.
Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined …
The Impact Of Geogebra On Learning The Concept Of Quadratic Function, Nazmi Misini, Faton Kabashi
The Impact Of Geogebra On Learning The Concept Of Quadratic Function, Nazmi Misini, Faton Kabashi
UBT International Conference
There are many software programs used in math, but we have noticed that the Geogebra program is more equipped for our groups of different ages, it is useful for elementary math teachers and even in bachelor's undergraduate teaching. It is useful for students to teach math at each school level, it's fun and fun using GeoGebra - thus encouraging students to deepen more and more in math. The purpose of this quasi-experimental research is to show how GeoGebra can be used to learn the concept of quadratic function within the subject of mathematics at the high school level. Research will …
Blockchain Invoicing For Government Services, Vehbi Neziri, Ramadan Dervishi, Blerim Rexha
Blockchain Invoicing For Government Services, Vehbi Neziri, Ramadan Dervishi, Blerim Rexha
UBT International Conference
Blockchain technology is known primarily through the cryptocurrency bitcoin, but has begun to find application in other areas for both public and private services, including, but not limited to, payments, electronic voting, health, government services etc. Blockchain technology potential relay on its capability to store all transactions records and makes them available to all parties with permission to view, but no one can make unauthorized changes to them. Many government service providers have to bill the government for the services they provide, but non-standardized and unverified manual or electronic invoicing often leads to double invoicing or payment. As a result …
Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar
Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …
Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim
Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim
KSU Proceedings on Cybersecurity Education, Research and Practice
Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].
However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …
Chatbot In Banks Of Kosovo And Albania, Festinë Retkoceri, Festim Halili
Chatbot In Banks Of Kosovo And Albania, Festinë Retkoceri, Festim Halili
UBT International Conference
Not so long ago Artificial Intelligence was only in the realm of scientific fiction. Today, it has become a reality and is growing every day more prominent in many different industries. Chatbots enable machines to mimic human conversation. This paper is an attempt to study the use of artificial intelligence and natural language processing in Albanian banks and Kosovo banks regarding the use of Albanian-speaking Chatbots and how to become a more intelligent chatbot. The data is collected from sources that are in the public domain, such as banking websites.