Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 136231 - 136260 of 304311

Full-Text Articles in Physical Sciences and Mathematics

Variation In Summer Nitrogen And Phosphorus Uptake Among Siberian Headwater Streams, John D. Schade, Erin C. Seybold, Travis Drake, Seth Spawn, William V. Sobczak, Karen E. Frey, Robert M. Holmes, Nikita Zimov Jan 2016

Variation In Summer Nitrogen And Phosphorus Uptake Among Siberian Headwater Streams, John D. Schade, Erin C. Seybold, Travis Drake, Seth Spawn, William V. Sobczak, Karen E. Frey, Robert M. Holmes, Nikita Zimov

Geography

Arctic streams are likely to receive increased inputs of dissolved nutrients and organic matter from thawing permafrost as climate warms. Documenting how Arctic streams process inorganic nutrients is necessary to understand mechanisms that regulate watershed fluxes of permafrost-derived materials to downstream ecosystems. We report on summer nitrogen (N) and phosphorus (P) uptake in streams draining upland soils from the Pleistocene, and lowland floodplain soils from the Holocene, in Siberia's Kolyma River watershed. Uptake of N and P differed between upland and floodplain streams, suggesting topographic variation in nutrient limitation. In floodplain streams, P uptake rate and uptake velocity were higher …


Black Hole Shadows In Fourth-Order Conformal Weyl Gravity, Gabriele U. Varieschi, Jonas Mureika Jan 2016

Black Hole Shadows In Fourth-Order Conformal Weyl Gravity, Gabriele U. Varieschi, Jonas Mureika

Physics Faculty Works

We calculate the characteristics of the “black hole shadow” for a rotating, neutral black hole in fourth-order conformal Weyl gravity. It is shown that the morphology is not significantly affected by the underlying framework, except for very large masses. Conformal gravity black hole shadows would also significantly differ from their general relativistic counterparts if the values of the main conformal gravity parameters, γ and κ, were increased by several orders of magnitude. Such increased values for γ and κ are currently ruled out by gravitational phenomenology. Therefore, it is unlikely that these differences in black hole shadows will be detected …


Juvenile Survival And Adult Return As A Function Of Freshwater Rearing Life History For Coho Salmon In The Klamath River Basin, Molly Gorman Jan 2016

Juvenile Survival And Adult Return As A Function Of Freshwater Rearing Life History For Coho Salmon In The Klamath River Basin, Molly Gorman

Cal Poly Humboldt theses and projects

The Scott and Shasta rivers, Klamath River tributaries, experience spatial disparity in habitat quality in spring and summer as a result of historical and current land-use. Juvenile Coho Salmon (Oncorhynchus kisutch) born in the upper tributary reaches often rear in natal streams before migrating to sea. However, those born in the lower reaches often encounter unsuitable habitat and emigrate during their first spring to seek non-natal rearing habitats. It is assumed that these early outmigrants are population losses. This study evaluated first-summer survival, and contribution to the adult population, of non-natal rearing juveniles in the Klamath River Basin. …


Seasonal Habitat Selection Of The North American Porcupine (Erethizon Dorsatum) In A Coastal Dune Forest, Cara L. Appel Jan 2016

Seasonal Habitat Selection Of The North American Porcupine (Erethizon Dorsatum) In A Coastal Dune Forest, Cara L. Appel

Cal Poly Humboldt theses and projects

Wildlife-habitat relationship studies are important for understanding the factors that determine where species occur in space and time. Habitat selection by generalist species should be studied on fine spatial and temporal scales to avoid masking important differences between seasons, localities, or orders of selection. I conducted the first study of habitat use and general ecology of North American porcupines (Erethizon dorsatum) in a coastal dune environment. Specifically, I assessed changes in body mass, home range size, and habitat selection in relation to the potential for seasonal nutritional and survival bottlenecks as reported elsewhere. Although they are considered generalists, …


Soil Organic Matter Distribution In A Douglas-Fir-Tanoak Forest, Humboldt County, California, Hollie A. Ernest Jan 2016

Soil Organic Matter Distribution In A Douglas-Fir-Tanoak Forest, Humboldt County, California, Hollie A. Ernest

Cal Poly Humboldt theses and projects

Soil carbon (C) affects the active gases in the atmosphere, nutrient cycling, and diversity of flora and fauna. Soil organic matter (SOM) is partially comprised of C, and a widely-accepted ratio of 0.58 organic carbon (OC) to organic matter (OM) is used to measure soil C on a landscape scale. However, this ratio varies according to vegetation, depth, hydrology, and may lead to miscalculations of soil C and SOM estimates. Soil C and SOM are inherently complex and it is not completely understood which environmental factors have the most influence in their formation, which occurs on a time scale of …


An Empirical Investigation Of Privacy And Security Concerns On Doctors’ And Nurses’ Behavioral Intentions To Use Rfid In Hospitals, Thomas George Winston Jan 2016

An Empirical Investigation Of Privacy And Security Concerns On Doctors’ And Nurses’ Behavioral Intentions To Use Rfid In Hospitals, Thomas George Winston

CCE Theses and Dissertations

Radio frequency identification (RFID) technology is a useful technology that has myriad applications in technology, retail, manufacturing, and healthcare settings. Not dependent upon line-of-sight, RFID can scan devices in their proximity and report the information to connected (wired or other wireless) information systems. Once touted as the panacea for home healthcare, RFID devices can add benefit to patients in remote settings. RFID devices have been used to optimize systems in areas such as manufacturing and healthcare to expose inefficiencies in a system or process. Unlike manufacturing, however, RFID in healthcare settings presents security and privacy concerns to the people being …


Algorithmic Foundations Of Heuristic Search Using Higher-Order Polygon Inequalities, Newton Henry Campbell Jr. Jan 2016

Algorithmic Foundations Of Heuristic Search Using Higher-Order Polygon Inequalities, Newton Henry Campbell Jr.

CCE Theses and Dissertations

The shortest path problem in graphs is both a classic combinatorial optimization problem and a practical problem that admits many applications. Techniques for preprocessing a graph are useful for reducing shortest path query times. This dissertation studies the foundations of a class of algorithms that use preprocessed landmark information and the triangle inequality to guide A* search in graphs. A new heuristic is presented for solving shortest path queries that enables the use of higher order polygon inequalities. We demonstrate this capability by leveraging distance information from two landmarks when visiting a vertex as opposed to the common single landmark …


Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson Jan 2016

Empirical Analysis Of Socio-Cognitive Factors Affecting Security Behaviors And Practices Of Smartphone Users, Joseph P. Simpson

CCE Theses and Dissertations

The overall security posture of information systems (IS) depends on the behaviors of the IS users. Several studies have shown that users are the greatest vulnerability to IS security. The proliferation of smartphones is introducing an entirely new set of risks, threats, and vulnerabilities. Smartphone devices amplify this data exposure problem by enabling instantaneous transmission and storage of personally identifiable information (PII) by smartphone users, which is becoming a major security risk. Moreover, companies are also capitalizing on the availability and powerful computing capabilities of these smartphone devices and developing a bring-your-own-device (BYOD) program, which makes companies susceptible to divulgence …


Aspect Mining Using Multiobjective Genetic Clustering Algorithms, David G. Bethelmy Jan 2016

Aspect Mining Using Multiobjective Genetic Clustering Algorithms, David G. Bethelmy

CCE Theses and Dissertations

In legacy software, non-functional concerns tend to cut across the system and manifest themselves as tangled or scattered code. If these crosscutting concerns could be modularized and the system refactored, then the system would become easier to understand, modify, and maintain. Modularized crosscutting concerns are known as aspects and the process of identifying aspect candidates in legacy software is called aspect mining.

One of the techniques used in aspect mining is clustering and there are many clustering algorithms. Current aspect mining clustering algorithms attempt to form clusters by optimizing one objective function. However, the objective function to be optimized tends …


Automatically Defined Templates For Improved Prediction Of Non-Stationary, Nonlinear Time Series In Genetic Programming, David Moskowitz Jan 2016

Automatically Defined Templates For Improved Prediction Of Non-Stationary, Nonlinear Time Series In Genetic Programming, David Moskowitz

CCE Theses and Dissertations

Soft methods of artificial intelligence are often used in the prediction of non-deterministic time series that cannot be modeled using standard econometric methods. These series, such as occur in finance, often undergo changes to their underlying data generation process resulting in inaccurate approximations or requiring additional human judgment and input in the process, hindering the potential for automated solutions.

Genetic programming (GP) is a class of nature-inspired algorithms that aims to evolve a population of computer programs to solve a target problem. GP has been applied to time series prediction in finance and other domains. However, most GP-based approaches to …


A Big Idea: The Rollout Of Open Suny, Karen E. Case Jan 2016

A Big Idea: The Rollout Of Open Suny, Karen E. Case

CCE Theses and Dissertations

Leveraging technology may be a viable solution in the higher education industry as enrollments decline and institutions have a hard time meeting their projected budgets. One innovative approach to mitigating this problem was approved in March of 2013 by the Board of Trustees of the State University of New York (SUNY). It is called Open SUNY. Open SUNY consists of nine components: the creation and expansion of online programs to meet workforce development needs, the development of online credit-bearing experiential learning experiences, support for training of faculty who opt to use emerging technologies, support for student access to online courses, …


Blended Learning For Faculty Professional Development Incorporating Knowledge Management Principles, Julie E. Hewitt Jan 2016

Blended Learning For Faculty Professional Development Incorporating Knowledge Management Principles, Julie E. Hewitt

CCE Theses and Dissertations

Adjunct faculty comprise a large percentage of part-time faculty for many colleges and universities today. Adjunct faculty are hired because they are experts in their content areas; however, this does not guarantee that they are skilled in effective classroom management. These instructors can become bewildered and frustrated because they lack the knowledge and skills that are needed to run an effective classroom.

While educational organizations have adopted blended learning environments as an effective delivery method for their students, this method has not gained much traction as a way to deliver instruction to their own employees. Thus, there are opportunities to …


Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi Jan 2016

Evaluating The Enterprise Resource Planning (Erp) Systems’ Success At The Individual Level Of Analysis In The Middle East, Mohammad Alzoubi

CCE Theses and Dissertations

Although ERP systems have been depicted as a solution in many organizations, there are many negative reports on ERP success, benefits, and effect on user’s performance. Previous research noted that there is a lack of knowledge and awareness of ERP systems and their overall value to ERP organizations. ERP systems have been widely studied during the past decade, yet they often fail to deliver the intended benefits originally expected. One notable reason for their failures is the lack of understanding in users’ requirements. This dissertation study was designed to understand the relative importance of system quality (SQ), IQ (IQ), service …


An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin Jan 2016

An Empirical Study Of Authentication Methods To Secure E-Learning System Activities Against Impersonation Fraud, Shauna Beaudin

CCE Theses and Dissertations

Studies have revealed that securing Information Systems (IS) from intentional misuse is a concern among organizations today. The use of Web-based systems has grown dramatically across industries including e-commerce, e-banking, e-government, and e learning to name a few. Web-based systems provide e-services through a number of diverse activities. The demand for e-learning systems in both academic and non-academic organizations has increased the need to improve security against impersonation fraud. Although there are a number of studies focused on securing Web-based systems from Information Systems (IS) misuse, research has recognized the importance of identifying suitable levels of authenticating strength for various …


Mutable Class Design Pattern, Nikolay Malitsky Jan 2016

Mutable Class Design Pattern, Nikolay Malitsky

CCE Theses and Dissertations

The dissertation proposes, presents and analyzes a new design pattern, the Mutable Class pattern, to support the processing of large-scale heterogeneous data models with multiple families of algorithms. Handling data-algorithm associations represents an important topic across a variety of application domains. As a result, it has been addressed by multiple approaches, including the Visitor pattern and the aspect-oriented programming (AOP) paradigm. Existing solutions, however, bring additional constraints and issues. For example, the Visitor pattern freezes the class hierarchies of application models and the AOP-based projects, such as Spring AOP, introduce significant overhead for processing large-scale models with fine-grain objects. The …


An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye Jan 2016

An Experimental Study On The Role Of Password Strength And Cognitive Load On Employee Productivity, Stephen Mujeye

CCE Theses and Dissertations

The proliferation of information systems (IS) over the past decades has increased the demand for system authentication. While the majority of system authentications are password-based, it is well documented that passwords have significant limitations. To address this issue, companies have been placing increased requirements on the user to ensure their passwords are more complex and consequently stronger. In addition to meeting a certain complexity threshold, the password must also be changed on a regular basis. As the cognitive load increases on the employees using complex passwords and changing them often, they may have difficulty recalling their passwords. As such, the …


The Effects Of Time-Compression And Learner-Control In Multimedia Instruction, Jason Alan Pittman Jan 2016

The Effects Of Time-Compression And Learner-Control In Multimedia Instruction, Jason Alan Pittman

CCE Theses and Dissertations

There is a significant gap in the body of knowledge concerning time-compressed multimedia instruction. Although research indicates that there is no loss in learning through well-designed multimedia instruction compressed at 25%, research is lacking that analyzes the effects of time-compression with learner-control included in the multimedia instruction. The aim of the study was to address this gap in the research by integrating learner-control into the interface of a time-compressed multimedia instructional lesson using similar methodologies from previous research.

Effects were analyzed of time-compressed learner-controlled multimedia instruction on learning and perceived cognitive load. Additionally, the researcher employed a participant population from …


Evaluation Of Supervised Machine Learning For Classifying Video Traffic, Farrell R. Taylor Jan 2016

Evaluation Of Supervised Machine Learning For Classifying Video Traffic, Farrell R. Taylor

CCE Theses and Dissertations

Operational deployment of machine learning based classifiers in real-world networks has become an important area of research to support automated real-time quality of service decisions by Internet service providers (ISPs) and more generally, network administrators. As the Internet has evolved, multimedia applications, such as voice over Internet protocol (VoIP), gaming, and video streaming, have become commonplace. These traffic types are sensitive to network perturbations, e.g. jitter and delay. Automated quality of service (QoS) capabilities offer a degree of relief by prioritizing network traffic without human intervention; however, they rely on the integration of real-time traffic classification to identify applications. Accordingly, …


Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti Jan 2016

Capturing, Eliciting, And Prioritizing (Cep) Non-Functional Requirements Metadata During The Early Stages Of Agile Software Development, Richard Rabin Maiti

CCE Theses and Dissertations

Agile software engineering has been a popular methodology to develop software rapidly and efficiently. However, the Agile methodology often favors Functional Requirements (FRs) due to the nature of agile software development, and strongly neglects Non-Functional Requirements (NFRs). Neglecting NFRs has negative impacts on software products that have resulted in poor quality and higher cost to fix problems in later stages of software development.

This research developed the CEP “Capture Elicit Prioritize” methodology to effectively gather NFRs metadata from software requirement artifacts such as documents and images. Artifact included the Optical Character Recognition (OCR) artifact which gathered metadata from images. The …


Development Of A Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure Of Non-It Professionals' Cybersecurity Skills, Melissa Carlton Jan 2016

Development Of A Cybersecurity Skills Index: A Scenarios-Based, Hands-On Measure Of Non-It Professionals' Cybersecurity Skills, Melissa Carlton

CCE Theses and Dissertations

Completing activities online are a part of everyday life, both professionally and personally. But, conducting daily operations, interacting, and sharing information on the Internet does not come without its risks as well as a potential for harm. Substantial financial and information losses for individuals, organizations, and governments are reported regularly due to vulnerabilities as well as breaches caused by insiders. Although advances in Information Technology (IT) have been significant over the past several decades when it comes to protection of corporate information systems (IS), human errors and social engineering appear to prevail in circumventing such IT protections. While most employees …


Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig Jan 2016

Understanding The Impact Of Hacker Innovation Upon Is Security Countermeasures, Sean M. Zadig

CCE Theses and Dissertations

Hackers external to the organization continue to wreak havoc upon the information systems infrastructure of firms through breaches of security defenses, despite constant development of and continual investment in new IS security countermeasures by security professionals and vendors. These breaches are exceedingly costly and damaging to the affected organizations. The continued success of hackers in the face of massive amounts of security investments suggests that the defenders are losing and that the hackers can innovate at a much faster pace.

Underground hacker communities have been shown to be an environment where attackers can learn new techniques and share tools pertaining …


An Investigation Of Factors That Influence Registered Nurses’ Intentions To Use E-Learning Systems In Completing Higher Degrees In Nursing, Pauline G. Little Jan 2016

An Investigation Of Factors That Influence Registered Nurses’ Intentions To Use E-Learning Systems In Completing Higher Degrees In Nursing, Pauline G. Little

CCE Theses and Dissertations

There is an increasing demand for more baccalaureate- and graduate-prepared registered nurses in the United States, to face the healthcare challenges of the 21st century. As a strategy to meet this need, educational institutions are expanding electronic learning in nursing education; however, technology acceptance in education continues to be a concern for educational institutions. In this context, the goal of the study was to investigate factors that potentially influence registered nurses’ intentions to adopt e-learning systems. A theoretical model was used to determine whether perceived value, attitude toward e-learning systems, and resistance to change influence registered nurses’ intentions to use …


Assessing Knowledge Management Values By Using Intellectual Capital To Measure Organizational Performance, Thuan L. Nguyen Jan 2016

Assessing Knowledge Management Values By Using Intellectual Capital To Measure Organizational Performance, Thuan L. Nguyen

CCE Theses and Dissertations

Measuring knowledge management performance was one of, if not the most challenging knowledge management activities. This study suggested using intellectual capital as a proxy for knowledge management performance in evaluating its impact on organizational performance. The Value Added Intellectual Coefficient model was employed to measure intellectual capital. Although being used widely in research, the model had its limitations. Also, for intellectual capital measurement, there was a lack of guidelines supported by empirical evidence or best practices. The present study aimed to test the classic and a modified version of this model, and based on the results, shed light on whether …


Using Diversity Ensembles With Time Limits To Handle Concept Drift, Robert M. Van Camp Jan 2016

Using Diversity Ensembles With Time Limits To Handle Concept Drift, Robert M. Van Camp

CCE Theses and Dissertations

While traditional supervised learning focuses on static datasets, an increasing amount of data comes in the form of streams, where data is continuous and typically processed only once. A common problem with data streams is that the underlying concept we are trying to learn can be constantly evolving. This concept drift has been of interest to researchers the last few years and there is a need for improved machine learning algorithms that are capable of dealing with concept drifts. A promising approach involves using an ensemble of a diverse set of classifiers. The constituent classifiers are re-trained when a concept …


An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly Jan 2016

An Empirical Investigation Of The Willingness Of Us Intelligence Community Analysts To Contribute Knowledge To A Knowledge Management System (Kms) In A Highly Classified And Sensitive Environment, Robert Hambly

CCE Theses and Dissertations

Since September 11, 2001, the United States Government (USG) has possessed unparalleled capability in terms of dedicated intelligence and information collection assets supporting the analysts of the Intelligence Community (IC). The USG IC has sponsored, developed, and borne witness to extraordinary advances in technology, techniques, and procedures focused on knowledge harvesting, knowledge sharing, and collaboration. Knowledge, within successful (effective & productive) organizations, exists as a commodity; a commodity that can be created, captured, imparted, shared, and leveraged. The research problem that this study addressed is the challenge of maintaining strong organizational effectiveness and productivity through the use of an information …


Five-Factor Model As A Predictor For Spoken Dialog Systems, Teresa G. Carter Jan 2016

Five-Factor Model As A Predictor For Spoken Dialog Systems, Teresa G. Carter

CCE Theses and Dissertations

Human behavior varies widely as does the design of spoken dialog systems (SDS). The search for predictors to match a user’s preference and efficiency for a specific dialog interface type in an SDS was the focus of this research. By using personality as described by the Five-Factor Method (FFM) and the Wizard of Oz technique for delivering three system initiatives of the SDS, participants interacted with each of the SDS initiatives in scheduling an airline flight. The three system initiatives were constructed as strict system, which did not allow the user control of the interaction; mixed system, which allowed the …


Studies Of The Effectiveness Of Bisphosphonate And Vanadium-Bisphosphonate Compounds In Vitro Against Axenic Leishmania Tarentolae, Amy Christensen, Craig C. Mclauchlan, Anne Dolbecq, Pierre Mialane, Marjorie A. Jones Jan 2016

Studies Of The Effectiveness Of Bisphosphonate And Vanadium-Bisphosphonate Compounds In Vitro Against Axenic Leishmania Tarentolae, Amy Christensen, Craig C. Mclauchlan, Anne Dolbecq, Pierre Mialane, Marjorie A. Jones

Faculty Publications – Chemistry

Leishmaniasis is a disease that is a significant problem for people, especially in tropical regions of the world. Current drug therapies to treat the disease are expensive, not very effective, and/or of significant side effects. A series of alkyl bisphosphonate compounds and one amino bisphosphonate compound, as well as alendronate and zoledronate, were tested as potential agents against Leishmania tarentolae. Also, two polyoxometalates (POMs) with nitrogen-containing bisphosphonate ligands, vanadium/alendronate (V5(Ale)2) and vanadium/zoledronate (V3(Zol)3), were tested against L. tarentolae and compared to the results of the alendronate and zoledronate ligands alone. Of the compounds evaluated in this study, the V5(Ale)2 …


The Update, January-March 2016, University Of Northern Iowa. College Of Humanities, Arts And Sciences. Jan 2016

The Update, January-March 2016, University Of Northern Iowa. College Of Humanities, Arts And Sciences.

Update

Inside This Issue:

--CHAS Briefs
--Spotlight – Faculty Kyle Gray
--CHAS News Diversity Training
--Biology Celeste Underriner
--Featured Story: IEEE Demonstration Awards
--Spotlight – Alumni Meghan Reynolds
--Spotlight – Student Alyssa Adamac
--Theater – Rent
--Spotlight – Student Kyle Spurgeon
--ABC Competition
--UNI Construction
--Management Club


The Wright Message, 2016-2017, University Of Northern Iowa. Department Of Mathematics. Jan 2016

The Wright Message, 2016-2017, University Of Northern Iowa. Department Of Mathematics.

The Wright Message

Inside this issue:

-- Dear Alumni and Friends
-- A Tribute for Karen Sabey
-- The 2016 Hari Shankar Lecture
-- Faculty Spotlight
-- Around Wright Hall
-- Alumni Spotlight
-- CTLM News
-- Interview with Allysen Lovstuen
-- Students Spotlight
-- Donor Spotlight
-- Contributions to an Account - Recognition
-- Department Funds


Compliance Calendar/Logbook For Bulk Gasoline Plants: Less That 19,999 Gallons/Day Throughput, Iowa Waste Reduction Center Jan 2016

Compliance Calendar/Logbook For Bulk Gasoline Plants: Less That 19,999 Gallons/Day Throughput, Iowa Waste Reduction Center

Iowa Waste Reduction Center Book Gallery

EPA has requirements for Gasoline Distribution Bulk Terminals, Bulk Gasoline Plants and Pipeline Facilities under 40 CFR Part 63 Subpart BBBBBB (NESHAP 6B) to reduce air pollution. This calendar has been developed to assist Bulk Gasoline Plants in complying with NESHAP 6B. Additional Iowa specific NESHAP 6B rules are discussed later.