Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 142081 - 142110 of 302968

Full-Text Articles in Physical Sciences and Mathematics

An Analysis Of The Los Angeles Metropolitan Transportation Authority’S Ability To Achieve Sustainability As Defined By The Transportation Index For Sustainable Places, Vanessa Trafas May 2015

An Analysis Of The Los Angeles Metropolitan Transportation Authority’S Ability To Achieve Sustainability As Defined By The Transportation Index For Sustainable Places, Vanessa Trafas

Master's Projects and Capstones

This paper analysis the ability of the Los Angeles Metropolitan Transportation Authority to adhere to sustainability under the Transportation Index for Sustainable Places (TISP). Analysis focuses solely on the environmental domain of the TISP and the criteria included within that domain. Three pieces are analyzed: the Los Angeles Sustainable Implementation Plan, the Sustainable Rail Plan, and the Regional Connector Transit Project. These pieces are found to adhere to the sustainability criteria under the environmental domain of the TISP.


Investigation Into The Effects Of Project Delivery Methods On Leed Targets, Nicole Marie Hanks May 2015

Investigation Into The Effects Of Project Delivery Methods On Leed Targets, Nicole Marie Hanks

Master's Projects and Capstones

Due to the environmental impacts of buildings and the increased demand for sustainable construction, it is essential that the construction industry can effectively deliver green buildings. The U.S. Green Building Council (USGBC) created the Leadership in Energy and Environmental Design (LEED) rating system to aid in the construction and evaluation of green buildings. The project delivery method, chosen by the owner, can affect the achievement of project targets (e.g., budget, schedule, LEED certification). The most utilized project delivery method is the traditional Design-Bid-Build (DBB). Integrated Project Delivery (IPD) is an emerging project delivery method that has gained attention for the …


Surface And Subsurface Application Of Chemical Dispersants And Associated Ecosystem Impacts, Adam V. Radpour May 2015

Surface And Subsurface Application Of Chemical Dispersants And Associated Ecosystem Impacts, Adam V. Radpour

Master's Projects and Capstones

Chemical dispersants are applied to spilled oil in marine environments when other, less controversial, methods are not adequate for the incident. They are considered to be a response method as opposed to a direct cleanup method, with the intended goals of reducing risk of exposure to sensitive shorelines, reducing environmental injury to surface-dwelling sea birds and marine mammals, and facilitating the biodegradation of spilled oil into the water column.

For this research, both surface and subsurface application of dispersants were evaluated in terms of oil characteristics and volume, and oceanic and atmospheric conditions. More data exists to support the effectiveness …


Assessment Of Risks And Benefits For Pennsylvania Water Sources When Utilizing Acid Mine Drainage For Hydraulic Fracturing, Frederick R. Davis May 2015

Assessment Of Risks And Benefits For Pennsylvania Water Sources When Utilizing Acid Mine Drainage For Hydraulic Fracturing, Frederick R. Davis

Master's Projects and Capstones

The use of Acid Mine Drainage (AMD) in the hydraulic fracturing process increases the complexity of a polarizing topic. Many stakeholders see a potential to provide relief to multiple environmental problems while others see it as another threat to the Pennsylvania water supply so many parties depend on. This research will evaluate data from Pennsylvania state agencies and additional academic research regarding AMD and fracking to assess potential benefits, risks, and complications for Pennsylvania watersheds when using AMD in the fracking process.

Chapter 1 presents background information on energy demand and hydraulic fracturing, as well as energy sources and industrial …


Evaluation Of The Feasibility Of Struvite Precipitation From Domestic Wastewater As An Alternative Phosphorus Fertilizer Resource, Amanda R. Bird May 2015

Evaluation Of The Feasibility Of Struvite Precipitation From Domestic Wastewater As An Alternative Phosphorus Fertilizer Resource, Amanda R. Bird

Master's Projects and Capstones

Finite phosphate rock ore reserves are estimated to be exhausted in 100 to 150 years. Phosphate rock ore is the single global source material for phosphorus fertilizer production. Once these reserves are gone, agricultural production will be negatively impacted. There are currently no alternative phosphorus resources. However, phosphorus concentrations present in human excrement traveling through domestic wastewater treatment facilities is being disposed of directly to the environment, often resulting in pollution problems. Recovering phosphorus from wastewater with struvite precipitation systems at wastewater treatment plants can alleviate future phosphorus scarcities. Evaluation of phosphorus recovery through struvite precipitation at wastewater treatment plants …


Groundwater Banking In Imperial Irrigation District: Planning For Future Water Scarcity On The Colorado River, Sara Morton May 2015

Groundwater Banking In Imperial Irrigation District: Planning For Future Water Scarcity On The Colorado River, Sara Morton

Master's Projects and Capstones

Urban and rural economies throughout the southwestern United States and Mexico rely on surface water imported from the Colorado River. The Imperial Irrigation District (herein IID or District) has rights to use 3.1 million acre-feet (MAF) per year of Colorado River Water (Regional Water Management Group 2013 and Imperial Irrigation District 2009). Of this water entitlement, IID uses 97 percent for agricultural production. In addition, IID supplies water to San Diego and Los Angeles urban areas.

The population reliant on Colorado River water is expected to rise from approximately 40 million people today, up to 76 million people over the …


Life Cycle Assessment Of Reclaimed Water For Potable And Nonpotable Reuse In California, Antonia Estevez-Olea May 2015

Life Cycle Assessment Of Reclaimed Water For Potable And Nonpotable Reuse In California, Antonia Estevez-Olea

Master's Projects and Capstones

Extreme drought, water scarcity and population growth is forcing California to seek out new water sources. Reclaimed water is considered one of the best alternatives to alleviate water shortages and help meet the water demand sustainably. However, the environmental impacts of reclaimed water have not been fully studied to ensure that the overall benefits of reclaimed water do indeed outweigh the environmental, social, and economic costs. In this study a life cycle assessment (LCA) for potable (direct and indirect) and nonpotable reuse will be conducted to identify and quantify major environmental, social, and economic problems that are attributed to reclaimed …


Post-Fire Sedimentation And The Risk To Sierra Nevada Water Supply, Kaitlyn Hacker May 2015

Post-Fire Sedimentation And The Risk To Sierra Nevada Water Supply, Kaitlyn Hacker

Master's Projects and Capstones

In California, the Sierra Nevada region is crucial for the state’s water supply. Unfortunately, forested areas in important Sierra Nevada watersheds are being increasingly threatened by the growing risk of large, severe wildfires and in turn so are the water supplies that they support. This paper addresses how these large fires facilitate sediment transport by removing soil’s vegetative and organic matter layers, changing soil properties, and inducing soil water repellency. Erosion and sedimentation are inevitable post-fire processes, and the predicted increase in large, severe fires and subsequent sedimentation are putting California’s water supply at risk. The risks these fires pose …


Ecodistricts In San Francisco: The Implementation Of Neighborhood Regional Planning And Its Potential Effects On Environmental Resilience, Elizabeth M. Juvera May 2015

Ecodistricts In San Francisco: The Implementation Of Neighborhood Regional Planning And Its Potential Effects On Environmental Resilience, Elizabeth M. Juvera

Master's Projects and Capstones

Ecodistricts, or neighborhood-scale, community-driven areas of sustainable development, have emerged internationally and within the U.S. to create models of adaptive environmental design and advanced urban infrastructure. Central SoMa is the first ecodistrict to be planned and implemented in San Francisco, with the intention of revitalizing and greening this urbanized region of the city. At this time, the Central SoMa area has very low biodiversity levels, inefficient infrastructure, and poor water management capabilities. Through the implementation of ecodistricts in San Francisco, the city can integrate physical and behavioral sustainability measures from existing ecodistricts such as permeable surfaces, green roofs, stormwater management, …


Social Identity-Based Threats To Human Security: Gender Practice In Sustainable Development And Conflict Transformation, Emma W. Buck May 2015

Social Identity-Based Threats To Human Security: Gender Practice In Sustainable Development And Conflict Transformation, Emma W. Buck

Capstone Collection

I seek to advocate for practitioners in conflict transformation and/or sustainable development to build awareness around the peoples who, according to the status afforded them by their identities within a social context, experience threats to their own sense of human security within situations of violent conflict and/or underdevelopment. This capstone does so by examining gender -- that is, the context-specific distinctions between men and women-- as a social context that influences an individual’s feelings of human security. The capstone then expands a practitioner’s means of addressing gender-based threats to human security in situ. I will first define and situate …


Firefox Add-On For Metamorphic Javascript Malware Detection, Sravan Kumar Reddy Javaji May 2015

Firefox Add-On For Metamorphic Javascript Malware Detection, Sravan Kumar Reddy Javaji

Master's Projects

With the increasing use of the Internet, malicious software has more frequently been designed to take control of users computers for illicit purposes. Cybercriminals are putting a lot of efforts to make malware difficult to detect. In this study, we demonstrate how the metamorphic JavaScript malware can effect a victim’s machine using a malicious or compromised Firefox add-on. Following the same methodology, we develop another add-on with malware static detection technique to detect metamorphic JavaScript malware.


Furanic Molecules: Multiplexed Synchrotron Photoionization Investigations And Aerosol Studies, Audrey R. Smith May 2015

Furanic Molecules: Multiplexed Synchrotron Photoionization Investigations And Aerosol Studies, Audrey R. Smith

Master's Theses

The oxidation reactions of 2-methylfuran (2MF) and 2-ethylfuran (2EF) initiated by Cl radicals is studied at the low temperatures, in addition to the determination of the absolute photoionization cross-sections of 2EF, 2-acetylfuran, and furfural. These experiments are carried out using synchrotron photoionization mass spectrometry (SPIMS) with an orthogonal time-of-flight spectrometer used for mass analysis at the Advanced Light Source of Lawrence Berkeley National Laboratory. CBS-QB3 calculated adiabatic ionization energies (AIE) agree well with the experimental results and published literature values. Furfural is found to be the dominant product of 2MF oxidation, with 2-acetylfuran and 2-vinylfuran being the dominant products of …


Who Are You? ...Honestly!, Zeinab Mahdavifar May 2015

Who Are You? ...Honestly!, Zeinab Mahdavifar

TAC Talks

Online social media has made life easier in many ways. Stay in touch with old classmates (Facebook), find a way to connect to like-minded professionals all over the globe (LinkedIn), and even seek help from fellow humans we could never imagine otherwise to help us (Mechanical Turk)! Social network profiles are never complete. Ascertaining personality traits and accurate determination of age and gender can make such social networks safer and stronger instruments of true collaboration and human connection.

In my talk, I will discuss the predictive models we built with the Social Media group within the Center for Data Science …


Private Predictive Modeling Power, Stacey C. Newman May 2015

Private Predictive Modeling Power, Stacey C. Newman

TAC Talks

The predictive potential of the many large datasets being held in healthcare, financial markets, social media, etc. by separate entities is locked behind privacy constraints. These separate entities either cannot share their data with one another or it is against their interests to do so. The ability to produce powerful predictive models that leverage knowledge from these different data sources is restrained by an inability to do so without revealing the data.

In my talk, I will outline our proposed protocol in which two different entities can build one of the most popular machine learning modules, a linear regression model …


Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner May 2015

Tracking Criminals On Facebook: A Case Study From A Digital Forensics Reu Program, Daniel Weiss, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

The 2014 Digital Forensics Research Experience for Undergraduates (REU) Program at the University of Alabama at Birmingham (UAB) focused its summer efforts on tracking criminal forums and Facebook groups. The UAB-REU Facebook team was provided with a list of about 60 known criminal groups on Facebook, with a goal to track illegal information posted in these groups and ultimately store the information in a searchable database for use by digital forensic analysts. Over the course of about eight weeks, the UAB-REU Facebook team created a database with over 400 Facebook groups conducting criminal activity along with over 100,000 unique users …


Eastern Washington Wildfires: Tracking Land Recovery In The Colockum Tarps Wildfire Area, Michael Balda, Allison Shinn May 2015

Eastern Washington Wildfires: Tracking Land Recovery In The Colockum Tarps Wildfire Area, Michael Balda, Allison Shinn

Symposium Of University Research and Creative Expression (SOURCE)

Eastern Washington State has seen an increase in wildfire activity because of policies of fire suppression and changing climate. The Colockum Tarps wildfire started on July 27, 2013, in Malaga, Washington, due to a water pump malfunction. After ignition, the fire quickly moved south-southwest and burned a total area of 80,408 acres of grasslands and forest. We combined fieldwork and geospatial analysis of aerial photography and satellite imagery to examine vegetative recovery within the fire area. Using ArcGIS and PCI Geomatica, we analyzed 2013 National Agricultural Imaging Program (NAIP) images and a wildfire perimeter shapefile from the Bureau of Land …


Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba May 2015

Towards A Digital Forensics Competency-Based Program: Making Assessment Count, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper describes an approach that UMUC has initiated to revise its graduate programs to a Competency-Based Education (CBE) curriculum. The approach, which is Learning Demonstration (LD) centric, includes the identification of learning goals and competences, identification and description of the LDs, mapping of the LDs to the competences, scripting the LDs, placing the LDs into the respective courses, validating the developed materials, and the development of the open learning resources. Programs in the Cybersecurity and Information Assurance Department, including the Digital Forensics and Cyber Investigations program, are being revised. An LD centric approach to curriculum development helps align programs …


Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner May 2015

Phishing Intelligence Using The Simple Set Comparison Tool, Jason Britt, Alan Sprague, Gary Warner

Annual ADFSL Conference on Digital Forensics, Security and Law

Phishing websites, phish, attempt to deceive users into exposing their passwords, user IDs, and other sensitive information by imitating legitimate websites, such as banks, product vendors, and service providers. Phishing investigators need fast automated tools to analyze the volume of phishing attacks seen today. In this paper, we present the Simple Set Comparison tool. The Simple Set Comparison tool is a fast automated tool that groups phish by imitated brand allowing phishing investigators to quickly identify and focus on phish targeting a particular brand. The Simple Set Comparison tool is evaluated against a traditional clustering algorithm over a month's worth …


Measured Laser Frequencies From The Optically Pumped Methanol Isotopologue 13cd3od, Benjamin Freeman May 2015

Measured Laser Frequencies From The Optically Pumped Methanol Isotopologue 13cd3od, Benjamin Freeman

Symposium Of University Research and Creative Expression (SOURCE)

The far-infrared region of the electromagnetic spectrum, informally defined as the wavelength region between 0.025 mm and 2.00 mm, is an area that has been investigated using laser radiation for more than 50 years. Research with far infrared lasers has a range of applications including terahertz imaging, a form of noninvasive imaging. Creating a catalog of far-infrared laser emissions is also beneficial for their use in high-resolution spectroscopic investigations of stable molecules and short-lived free radicals. The purpose of this research was to measure the frequencies of known far-infrared laser emissions generated by 13CD3OD, an isotopic form of methanol. This …


Investigating The Correlation Between Inclination Of Coronal Loops And Solar Flare Activity, John-Paul Mann May 2015

Investigating The Correlation Between Inclination Of Coronal Loops And Solar Flare Activity, John-Paul Mann

Symposium Of University Research and Creative Expression (SOURCE)

The purpose of this research is to investigate changes in the coronal loop structures during the life cycle of a solar flare. Coronal loops are intricate and complicated magnetic features on the solar surface that are the source of large solar flares. Understanding the dynamics of these coronal loops provides better models for predicting solar flare activity. By obtaining the magnetogram, or magnetic field strength, along with the inclination of these coronal loops, the full structure of the coronal loop can be obtained. Therefore, we studied how the coronal loops inclination angle, as it emerges from the photosphere, changes in …


Predicting Solar Sigmoid Lifetimes Based On Shearing In The Photosphere, Austen Stone May 2015

Predicting Solar Sigmoid Lifetimes Based On Shearing In The Photosphere, Austen Stone

Symposium Of University Research and Creative Expression (SOURCE)

This project’s purpose was to study how the speed at which the plasma in the photosphere of the sun affects the lifetime and shape of a solar sigmoid. Solar sigmoids are S-shaped, twisted magnetic structures that are due to the shifting magnetic field lines emerging from the surface of the sun. The photosphere is the visible layer of the sun’s surface and is made up of cells of plasma that are highly conductive and influenced by the magnetic field of the sun. Sigmoids form when shearing (a lateral shift between two objects in directions opposite each other) occurs in the …


Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros May 2015

Identifying Common Characteristics Of Malicious Insiders, Nan Liang, David Biros

Annual ADFSL Conference on Digital Forensics, Security and Law

Malicious insiders account for large proportion of security breaches or other kinds of loss for organizations and have drawn attention of both academics and practitioners. Although methods and mechanism have been developed to monitor potential insider via electronic data monitoring, few studies focus on predicting potential malicious insiders. Based on the theory of planned behavior, certain cues should be observed or expressed when an individual performs as a malicious insider. Using text mining to analyze various media content of existing insider cases, we strive to develop a method to identify crucial and common indicators that an individual might be a …


Insect Communities: Ellensburg Upstream Versus Downstream Sites, Michael Balda May 2015

Insect Communities: Ellensburg Upstream Versus Downstream Sites, Michael Balda

Symposium Of University Research and Creative Expression (SOURCE)

Urban stream syndrome occurs when an urban area affects a stream system. Stream burial is common in urban systems, and burial blocks incoming light, potentially affecting available food resources and, in turn, affecting the insect communities. I tested for changes to the stream ecosystem as a result of urbanization by measuring insect community parameters upstream and downstream of buried sites in the three creeks in Ellensburg, Washington, that are affected by urban stream syndrome. I measured chlorophyll on rocks, total suspended sediments (TSS), fine benthic organic matter (FBOM), ammonium, and phosphorus to relate to insect communities characteristics. I hypothesized that …


Dna Analysis Of Surfactant Associated Bacteria In The Sea Surface Microlayer In Application To Satellite Remote Sensing Techniques: Case Studies In The Straits Of Florida And The Gulf Of Mexico, Bryan Hamilton May 2015

Dna Analysis Of Surfactant Associated Bacteria In The Sea Surface Microlayer In Application To Satellite Remote Sensing Techniques: Case Studies In The Straits Of Florida And The Gulf Of Mexico, Bryan Hamilton

HCNSO Student Theses and Dissertations

Several genera of bacteria residing in the sea surface microlayer and in the near-surface layer of the ocean have been found to be involved in the production and decay of surfactants. Under low wind speed conditions, surfactants can suppress short gravity capillary waves at the sea surface and form natural sea slicks. These features can be observed with both airborne and satellite-based synthetic aperture radar (SAR). Using a new microlayer sampling method, a series of experiments have been conducted in the Straits of Florida and the Gulf of Mexico in 2013 to establish a connection between the presence of surfactant-associated …


Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du May 2015

Pinpoint: Efficient And Effective Resource Isolation For Mobile Security And Privacy, Paul Ratazzi, Ashok Bommisetti, Nian Ji, Wenliang Du

Electrical Engineering and Computer Science - All Scholarship

Virtualization is frequently used to isolate untrusted processes and control their access to sensitive resources. However, isolation usually carries a price in terms of less resource sharing and reduced inter-process communication. In an open architecture such as Android, this price and its impact on performance, usability, and transparency must be carefully considered. Although previous efforts in developing general-purpose isolation solutions have shown that some of these negative sideeffects can be mitigated, doing so involves overcoming significant design challenges by incorporating numerous additional platform complexities not directly related to improved security. Thus, the general purpose solutions become inefficient and burdensome if …


An Open Source Advertisement Server, Pushkar Umaranikar May 2015

An Open Source Advertisement Server, Pushkar Umaranikar

Master's Projects

This report describes a new online advertisement system and its implementation for the Yioop open source search engine. This system was implemented for my CS298 project. It supports both selling advertisements and displaying them within search results. The selling of advertisement is done using a novel auction system, which we describe in this paper. With this auction system, it is possible to create an advertisement, attach keywords to it, and add it to the advertisement inventory. An advertisement is displayed on a search results page if the search keyword matches the keywords attached to the advertisement. Display of advertisements is …


Index Strategies For Efficient And Effective Entity Search, Huy T. Vu May 2015

Index Strategies For Efficient And Effective Entity Search, Huy T. Vu

Master's Projects

The volume of structured data has rapidly grown in recent years, when data-entity emerged as an abstraction that captures almost every data pieces. As a result, searching for a desired piece of information on the web could be a challenge in term of time and relevancy because the number of matching entities could be very large for a given query. This project concerns with the efficiency and effectiveness of such entity queries. The work contains two major parts: implement inverted indexing strategies so that queries can be searched in minimal time, and rank results based on features that are independent …


Context-Based Autosuggest On Graph Data, Hai Nguyen May 2015

Context-Based Autosuggest On Graph Data, Hai Nguyen

Master's Projects

Autosuggest is an important feature in any search applications. Currently, most applications only suggest a single term based on how frequent that term appears in the indexed documents or how often it is searched upon. These approaches might not provide the most relevant suggestions because users often enter a series of related query terms to answer a question they have in mind. In this project, we implemented the Smart Solr Suggester plugin using a context-based approach that takes into account the relationships among search keywords. In particular, we used the keywords that the user has chosen so far in the …


A Scalable Search Engine Aggregator, Pooja Mishra May 2015

A Scalable Search Engine Aggregator, Pooja Mishra

Master's Projects

The ability to display different media sources in an appropriate way is an integral part of search engines such as Google, Yahoo, and Bing, as well as social networking sites like Facebook, etc. This project explores and implements various media-updating features of the open source search engine Yioop [1]. These include news aggregation, video conversion and email distribution. An older, preexisting news update feature of Yioop was modified and scaled so that it can work on many machines. We redesigned and modified the user interface associated with a distributed news updater feature in Yioop. This project also introduced a video …


Cheating Detection In Online Examinations, Gaurav Kasliwal May 2015

Cheating Detection In Online Examinations, Gaurav Kasliwal

Master's Projects

In this research, we develop and analyze a tool that monitor student browsing activity during online examination. Our goal is to detect cheating in real time. In our design, a server capture packets using KISMET and detects cheating based on either a whitelist or blacklist of URLs. We provide implementation details and give experimental results, and we analyze various attack strategies. Finally, we show that the system is practical and lightweight in comparison to other available tools.