Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (58714)
- Computer Sciences (57932)
- Environmental Sciences (52361)
- Engineering (40197)
- Life Sciences (39773)
-
- Physics (36526)
- Chemistry (34519)
- Geology (29715)
- Mathematics (27378)
- Social and Behavioral Sciences (24564)
- Oceanography and Atmospheric Sciences and Meteorology (16422)
- Statistics and Probability (13246)
- Education (12805)
- Computer Engineering (12790)
- Soil Science (11977)
- Medicine and Health Sciences (11785)
- Plant Sciences (11182)
- Natural Resources and Conservation (10266)
- Arts and Humanities (9726)
- Astrophysics and Astronomy (9206)
- Electrical and Computer Engineering (8897)
- Sustainability (8674)
- Natural Resources Management and Policy (8567)
- Artificial Intelligence and Robotics (8494)
- Water Resource Management (8291)
- Applied Mathematics (7991)
- Environmental Health and Protection (6879)
- Science and Mathematics Education (6757)
- Databases and Information Systems (6720)
- Institution
-
- University of Nebraska - Lincoln (24230)
- Western Michigan University (19508)
- Selected Works (16838)
- University of Kentucky (12002)
- TÜBİTAK (10317)
-
- Singapore Management University (7453)
- Utah State University (7340)
- Missouri University of Science and Technology (6056)
- Old Dominion University (5953)
- University of Wollongong (4868)
- William & Mary (4602)
- University of South Florida (3859)
- Wright State University (3840)
- Portland State University (3798)
- University of Nevada, Las Vegas (3640)
- Louisiana State University (3417)
- China Simulation Federation (3363)
- City University of New York (CUNY) (3219)
- Brigham Young University (2906)
- Purdue University (2813)
- Air Force Institute of Technology (2678)
- Claremont Colleges (2640)
- California Polytechnic State University, San Luis Obispo (2568)
- Western Washington University (2456)
- University of Arkansas, Fayetteville (2433)
- University of Texas Rio Grande Valley (2419)
- Department of Primary Industries and Regional Development, Western Australia (2354)
- University of Texas at El Paso (2316)
- Chinese Chemical Society | Xiamen University (2294)
- Chulalongkorn University (2268)
- Keyword
-
- Machine learning (1689)
- Climate change (1680)
- Western Australia (1581)
- Mathematics (1369)
- Chemistry (1157)
-
- Sustainability (1141)
- Physics (1068)
- Water quality (983)
- Deep learning (891)
- Geology (858)
- Groundwater (851)
- Machine Learning (828)
- Simulation (824)
- Research and Technical Reports (797)
- Water (780)
- United States (757)
- Education (756)
- Management (745)
- Nebraska (744)
- Agriculture (718)
- Artificial intelligence (707)
- Climate (702)
- GIS (698)
- Statistics (685)
- Security (681)
- Grains and field crops (674)
- Environment (672)
- Computer Science (667)
- Ecology (657)
- Optimization (656)
- Publication Year
-
- 2024 (7853)
- 2023 (12579)
- 2022 (18300)
- 2021 (27876)
- 2020 (15207)
-
- 2019 (15927)
- 2018 (13646)
- 2017 (12521)
- 2016 (12690)
- 2015 (12617)
- 2014 (12299)
- 2013 (11462)
- 2012 (12196)
- 2011 (10325)
- 2010 (8621)
- 2009 (7616)
- 2008 (7321)
- 2007 (6758)
- 2006 (5872)
- 2005 (5573)
- 2004 (4447)
- 2003 (3876)
- 2002 (3435)
- 2001 (3030)
- 2000 (2919)
- 1999 (2555)
- 1998 (2574)
- 1997 (2472)
- 1996 (2437)
- 1995 (2193)
- Publication
-
- Legacy Scout Tickets from Pure Oil Company (11044)
- Theses and Dissertations (8341)
- IGC Proceedings (1993-2023) (7001)
- Research Collection School Of Computing and Information Systems (6891)
- Thin Sections (5745)
-
- Electronic Theses and Dissertations (4194)
- Faculty Publications (3783)
- Journal of System Simulation (3363)
- Nebraska Tractor Tests (3348)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Masters Theses (2634)
- Turkish Journal of Chemistry (2628)
- Turkish Journal of Mathematics (2494)
- Journal of Electrochemistry (2294)
- Honors Theses (2158)
- Faculty of Informatics - Papers (Archive) (2013)
- Physics Faculty Publications (1942)
- Bulletin of the Mineral Research and Exploration (1893)
- Doctoral Dissertations (1882)
- Dissertations, Theses, and Masters Projects (1876)
- Reports (1835)
- Dissertations (1816)
- Physics Faculty Research & Creative Works (1762)
- Department of Computer Science Technical Reports (1721)
- USF Tampa Graduate Theses and Dissertations (1607)
- School of Natural Resources: Faculty Publications (1586)
- United States Department of Agriculture Wildlife Services: Staff Publications (1529)
- Australian Institute for Innovative Materials - Papers (1524)
- Electronic Thesis and Dissertation Repository (1476)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1427)
- Publication Type
Articles 145711 - 145740 of 302516
Full-Text Articles in Physical Sciences and Mathematics
03. Biology, Northeastern State University
03. Biology, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
08. Engineering, Northeastern State University
08. Engineering, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
10. Forensic Science, Northeastern State University
10. Forensic Science, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
11. Genetics, Northeastern State University
11. Genetics, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
14. Optometry, Northeastern State University
14. Optometry, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
16. Physics, Northeastern State University
16. Physics, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
17. Psychology, Northeastern State University
17. Psychology, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
13. Mathematics, Northeastern State University
13. Mathematics, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
18. Statistics, Northeastern State University
18. Statistics, Northeastern State University
Oklahoma Research Day Abstracts
No abstract provided.
Field Measurements For Remote Sensing Of The Cryosphere, Hans-Peter Marshall, Robert L. Hawley, Marco Tedesco
Field Measurements For Remote Sensing Of The Cryosphere, Hans-Peter Marshall, Robert L. Hawley, Marco Tedesco
CGISS Publications and Presentations
Remote sensing observations of the cryosphere, like any other target of interest, require ground-based measurements for both calibration and validation, as inversion algorithms are usually underdetermined and uncertainties in the retrieval are needed for application. Field-based observations are performed in selected representative locations, and typically involve both direct in situ measurements of the physical properties of interest, as well as ground-based remote sensing techniques.
New state-of-the-art modern techniques for measuring physical properties rapidly and at high spatial resolution have recently given us a new view of spatiotemporal variability. These are important, as large variability at scales below the typical footprint …
A Case Study Of Accelerator Performance, Esthela Gallardo
A Case Study Of Accelerator Performance, Esthela Gallardo
Open Access Theses & Dissertations
In recent years the designs of High Performance Computing (HPC) clusters have become more complex. This is due to the emergence of new processing elements, in particular Graphics Processing Units (GPUs) and other many-core processors that can be combined with multi-core processors to enhance application performance. The design of a cluster includes processing elements that meet the needs of the applications that will run on the system. Unfortunately, it has become increasingly difficult to compare the performance of novel many-core processing elements due to the differences in their architectures. This work describes an attempt to develop a methodology for comparing …
Dynamic Triggering In The Coso Geothermal Field, 2004-2013, Richard A. Alfaro-Diaz
Dynamic Triggering In The Coso Geothermal Field, 2004-2013, Richard A. Alfaro-Diaz
Open Access Theses & Dissertations
We take advantage of EarthScope’s USArray Transportable Array (TA), regional seismic networks to investigate 154 M ≥ 7 earthquakes over a ten-year period (2004- 2013), in search of remotely triggered seismicity within the continental United States. We conduct an automated search to detect high frequency signals (which may indicate triggering of small local earthquakes) using a time window of 5 hours before and after each mainshock. The automated detection applies a short-term average (STA) to long-term-average (LTA) algorithms, to create a catalogue of detections. Using the catalog we search for an increase in detection rates after each main-shock. Sharp increases …
Evaluating Methods Of Field-Based 3d Visualization And Their Application To Mapping Metamorphic Terranes: An Example From The Panamint Mountains, California, Jade Ashley Brush
Evaluating Methods Of Field-Based 3d Visualization And Their Application To Mapping Metamorphic Terranes: An Example From The Panamint Mountains, California, Jade Ashley Brush
Open Access Theses & Dissertations
Field geology has traditionally relied on 2D, paper-based workflows, but digital mapping techniques are rapidly replacing these outdated methods because they allow for more efficient and accurate mapping. This research applies digital mapping techniques and two terrestrially-based 3D visualization technologies, photogrammetry and Light Detection and Ranging (LiDAR), to the study of metamorphic terranes in the Panamint Mountains, California. This study reports on the spatial accuracy of TINs (triangulated irregular networks) generated from both photogrammetry and ground-based LiDAR using a terrestrial laser scanner (TLS) and discusses how spatial accuracy can be increased. Two levels of comparison were used to test spatial …
Physical Engagement As A Way To Increase Emotional Rapport In Interactions With Embodied Conversational Agents, Ivan Gris Sepulveda
Physical Engagement As A Way To Increase Emotional Rapport In Interactions With Embodied Conversational Agents, Ivan Gris Sepulveda
Open Access Theses & Dissertations
One of the major goals in research on embodied conversational agents (ECAs) is to increase the believability and perceived trustworthiness of agents. To improve the efficacy of the interaction between humans and ECAs, I focus on the development of rapport, which is a complex and extensive behavioral state of affinity, synchronicity, coordination and mutual understanding that is difficult to model, measure and interpret. I present our AGENT Framework and our ECA, Adriana, which is capable of speech recognition and gesture recognition over long periods of time. Our current system provides up to 60 minutes of human-ECA interaction in a jungle-survival …
Computational Search For Novel Magnetic Clusters With Large Magnetic Anisotropy Energy, Nabil Md Rakinul Hoque
Computational Search For Novel Magnetic Clusters With Large Magnetic Anisotropy Energy, Nabil Md Rakinul Hoque
Open Access Theses & Dissertations
The clusters of transition metal atoms often show high spin moments but generally are reactive with the environment. Passivation of the surface atoms can lead to more stable clusters. We have explored one such avenue for passivation in this work. We picked the As@Ni12@As20 cluster which in the neutral state has a magnetic moment of 3 μB. We doped this cluster with various numbers of Mn atoms by substituting Ni atoms. The substitutional doping leads to spin moments located on the Mn atoms. The doping leads to symmetry breaking and as a consequence the number of structural isomers and spin …
Synchronization Of Bistatic Radar Using Chaotic Amplitude And Frequency Modulated Signals, Chandra Sekhar Pappu
Synchronization Of Bistatic Radar Using Chaotic Amplitude And Frequency Modulated Signals, Chandra Sekhar Pappu
Open Access Theses & Dissertations
The purpose of this work is to develop a synchronization scheme for bistatic radar that uses a 3-D chaotic system to generate and process wideband AM and FM signals, which allows for the extraction of high range-resolution information from targets. For AM bistatic radar, the setup includes a drive oscillator at the transmitter and a response oscillator at the receiver. The challenge is synchronizing the response oscillator to the drive oscillator with a scaled version of the transmitted signal sr(t, x) = αs t(t, x), where x is a chaotic state variable and α is a scaling factor. Here, α …
Enterprise Systems, Information Security Management Systems And Their Impact On Enterprise Risk: A 3-Essay Dissertation, Fernando Parra Reyes
Enterprise Systems, Information Security Management Systems And Their Impact On Enterprise Risk: A 3-Essay Dissertation, Fernando Parra Reyes
Open Access Theses & Dissertations
This 3-essay study offers a comprehensive examination of hypothetical concepts related to the behaviors, attitudes, outcomes, processes, experiences, manifestations and indicators connected with an organizationâ??s design, implementation and management of a coherent set of policies, processes and systems to manage risks to its information assets. Network analysis tools are used to examine the relationships found in Information Security Management Systems (ISMS) literature published within the last decade. This study examines the effect of upgrades and implementations of enterprise systems on enterprise risk, as perceived by external investors. Finally, this study also assesses the impact of external IT governance certifications on …
Studying Cellular And Molecular Interaction With Two-Photon Fluorescence Microscopy, Arifur Rahaman
Studying Cellular And Molecular Interaction With Two-Photon Fluorescence Microscopy, Arifur Rahaman
Open Access Theses & Dissertations
Advances in microscopy and fluorescent probes provide new insight into studying cellular and molecular interactions. Two-photon fluorescence microscopy is one of the most important recent inventions in cellular and molecular study. This technology enables noninvasive study at cellular and molecular levels in three dimensions with submicrometer resolution. Two-photon excitation of fluorophores results from the simultaneous absorption of two photons. This excitation process has a number of unique advantages, such as reduced specimen photodamage and enhanced penetration depth. In this study, we used our two-photon microscope to observe predatorial behavior of fast moving bacterivorous marine organism Cafeteria roenbergensis and quantify Mycobacterium …
A Tectonic Analysis On The Central Region Of The Himalaya Collision Zone Using Double Difference Tomography, Chanel Perez
A Tectonic Analysis On The Central Region Of The Himalaya Collision Zone Using Double Difference Tomography, Chanel Perez
Open Access Theses & Dissertations
The Himalaya mountain range remains the only place on Earth undergoing continuous effects from the continental-continental collision between India and Asia. Because of this, the Himalayas have been subjected to extensive deformation and transpression, and contain five major shear zones. Extensive seismic analysis of the region, however, is lacking due to sparse seismograph coverage and complexity of the crustal structure. I examined seismic event data from two temporary seismic networks deployed in the central Himalaya, the HIMNT deployment from 2001-2003, and the Bhutan deployment from 2002-2003. Using this data I develop a 3-D earth model for the region using double-difference …
Evaluation Of Small Molecules On The Excitatory Amino Acid Transporter 3 (Eaat3) For The Treatment Of Ocd, Emmanuel Zubia
Evaluation Of Small Molecules On The Excitatory Amino Acid Transporter 3 (Eaat3) For The Treatment Of Ocd, Emmanuel Zubia
Open Access Theses & Dissertations
We seek to discover new drug candidates for the excitatory amino acid transporter 3 (EAAT3) for the treatment of Obsessive Compulsive Disorder (OCD). We hypothesize that decreasing the glutamatergic transmission via EAAT3 intervention will create an amelioration of the symptoms of OCD. For this we have prepared in-silico binding calculations to identify a better compound that can stimulate EAAT3 and decrease glutamatergic transmission. This research will help us further understand and elucidate the role of glutamate in the neural mechanisms of this illness, which to date remain inconclusive. Those areas of study are significant because, until now, there is no …
Role Of Small Molecules In Rescuing Protein Folding Under Oxidative Stress, Mahmoud Fawzi Megahed Helal Khalil
Role Of Small Molecules In Rescuing Protein Folding Under Oxidative Stress, Mahmoud Fawzi Megahed Helal Khalil
Open Access Theses & Dissertations
Increased levels of nitrosative stress intracellularly within the endoplasmic reticulum is a key factor involvled in the pathogenesis of both Parkinson's (PD) and Alzheimer's (AD) diseases. Previous in-vitro studies in our lab showed that increased levels of nitrosative stress lead to aggregation of misfolded proteins and formation of Lewy Bodies, the main biomarker of PD and AD diseases. Although this was mainly through nitrosylation of Protein Disulfide Isomerase (PDI), the chief endoplasmic reticulum (ER) resident oxidoreductase chaperone responsible for maturation of disulfide-bond-containing proteins, we demonstrate in this project that increased levels of nitrosative stress has an additional direct effect on …
Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast
Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast
Australian Security and Intelligence Conference
The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …
Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks
Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks
Australian Security and Intelligence Conference
Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a stratum of work where each level requires specific skills set. In accordance with this work stratum, the study’s methodology used semi-structured interviews with different levels of security personnel in a Casino complex to extract and undertake a thematic analysis. The study extracted 10 CCTV surveillance features across two themes, being its aims and functions. CCTV features included creating a safe environment, protection, legal compliance …
Attributes Of An Analyst: What We Can Learn From The Intelligence Analysts Job Description, Jeffrey D. Corkill, Teresa Kasprzyk Cunow, Elisabeth Ashton, Amanda East
Attributes Of An Analyst: What We Can Learn From The Intelligence Analysts Job Description, Jeffrey D. Corkill, Teresa Kasprzyk Cunow, Elisabeth Ashton, Amanda East
Australian Security and Intelligence Conference
No abstract provided.
Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey
Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey
Australian Security and Intelligence Conference
Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat …
Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson
Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson
Australian Security and Intelligence Conference
Burglary and stealing are crimes that have a significant impact and cost on its victims and society. To mitigate such crimes, property marking is a situational crime prevention strategy that attempts to prevent through dissuasion. There are many forms of property marking, yet there is limited research of its efficacy. Where there have been such studies, there has been some indications of success. Therefore, the study assessed the efficacy of property marking to reduce burglary and stealing crimes. The study undertook a quantitate approach using non-equivalent control groups to assess the geo-spatial impact of property marking when applied at a …
Does A Weak Security Discourse Provide Opportunity For Security Deviance To Flourish?, Michael P. Coole, Jeff Corkill
Does A Weak Security Discourse Provide Opportunity For Security Deviance To Flourish?, Michael P. Coole, Jeff Corkill
Australian Security and Intelligence Conference
In the years since the tragedy of 9/11 the term "security" has become a much used and abused term. As the war on terrorism has evolved, politicians of all persuasions played the security card to change law and legislation ostensibly to protect the community. Those whom provide the security assume that freedoms lost by the wider community in the name of security are in fact a fair price to pay for that security. In this environment the security discourse is diminished and this provides an opportunity for security deviance to emerge. This research used a selection of publically reported examples …
A Secure Sharing Design For Multi-Tag Rfid Authentication Protocol, Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel, Martin Tomlinson
A Secure Sharing Design For Multi-Tag Rfid Authentication Protocol, Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel, Martin Tomlinson
Australian Security and Intelligence Conference
No abstract provided.
Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh
Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh
Australian Information Security Management Conference
The business use of cloud computing services is motivated by the ease of use and the potential financial cost reductions. Service failure may occur when the service provider does not protect information or when the use of the services becomes overly complex and difficult. The benefits also bring optimisation challenges for the information owners who must assess the service security risk and the degree to which new human behaviours are required. In this research we look at the risk of identity theft when ease of service access is provided through a Single Sign On (SSO) authorisation and ask: What are …
Selection Of Penetration Testing Methodologies: A Comparison And Evaluation, Aleatha Shanley, Michael N. Johnstone
Selection Of Penetration Testing Methodologies: A Comparison And Evaluation, Aleatha Shanley, Michael N. Johnstone
Australian Information Security Management Conference
Cyber security is fast becoming a strategic priority across both governments and private organisations. With technology abundantly available, and the unbridled growth in the size and complexity of information systems, cyber criminals have a multitude of targets. Therefore, cyber security assessments are becoming common practice as concerns about information security grow. Penetration testing is one strategy used to mitigate the risk of cyber-attack. Penetration testers attempt to compromise systems using the same tools and techniques as malicious attackers thus attempting to identify vulnerabilities before an attack occurs. This research details a gap analysis of the theoretical vs. the practical classification …