Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 145711 - 145740 of 302516

Full-Text Articles in Physical Sciences and Mathematics

03. Biology, Northeastern State University Jan 2015

03. Biology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


08. Engineering, Northeastern State University Jan 2015

08. Engineering, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


10. Forensic Science, Northeastern State University Jan 2015

10. Forensic Science, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


11. Genetics, Northeastern State University Jan 2015

11. Genetics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


14. Optometry, Northeastern State University Jan 2015

14. Optometry, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


16. Physics, Northeastern State University Jan 2015

16. Physics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


17. Psychology, Northeastern State University Jan 2015

17. Psychology, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


13. Mathematics, Northeastern State University Jan 2015

13. Mathematics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


18. Statistics, Northeastern State University Jan 2015

18. Statistics, Northeastern State University

Oklahoma Research Day Abstracts

No abstract provided.


Field Measurements For Remote Sensing Of The Cryosphere, Hans-Peter Marshall, Robert L. Hawley, Marco Tedesco Jan 2015

Field Measurements For Remote Sensing Of The Cryosphere, Hans-Peter Marshall, Robert L. Hawley, Marco Tedesco

CGISS Publications and Presentations

Remote sensing observations of the cryosphere, like any other target of interest, require ground-based measurements for both calibration and validation, as inversion algorithms are usually underdetermined and uncertainties in the retrieval are needed for application. Field-based observations are performed in selected representative locations, and typically involve both direct in situ measurements of the physical properties of interest, as well as ground-based remote sensing techniques.

New state-of-the-art modern techniques for measuring physical properties rapidly and at high spatial resolution have recently given us a new view of spatiotemporal variability. These are important, as large variability at scales below the typical footprint …


A Case Study Of Accelerator Performance, Esthela Gallardo Jan 2015

A Case Study Of Accelerator Performance, Esthela Gallardo

Open Access Theses & Dissertations

In recent years the designs of High Performance Computing (HPC) clusters have become more complex. This is due to the emergence of new processing elements, in particular Graphics Processing Units (GPUs) and other many-core processors that can be combined with multi-core processors to enhance application performance. The design of a cluster includes processing elements that meet the needs of the applications that will run on the system. Unfortunately, it has become increasingly difficult to compare the performance of novel many-core processing elements due to the differences in their architectures. This work describes an attempt to develop a methodology for comparing …


Dynamic Triggering In The Coso Geothermal Field, 2004-2013, Richard A. Alfaro-Diaz Jan 2015

Dynamic Triggering In The Coso Geothermal Field, 2004-2013, Richard A. Alfaro-Diaz

Open Access Theses & Dissertations

We take advantage of EarthScope’s USArray Transportable Array (TA), regional seismic networks to investigate 154 M ≥ 7 earthquakes over a ten-year period (2004- 2013), in search of remotely triggered seismicity within the continental United States. We conduct an automated search to detect high frequency signals (which may indicate triggering of small local earthquakes) using a time window of 5 hours before and after each mainshock. The automated detection applies a short-term average (STA) to long-term-average (LTA) algorithms, to create a catalogue of detections. Using the catalog we search for an increase in detection rates after each main-shock. Sharp increases …


Evaluating Methods Of Field-Based 3d Visualization And Their Application To Mapping Metamorphic Terranes: An Example From The Panamint Mountains, California, Jade Ashley Brush Jan 2015

Evaluating Methods Of Field-Based 3d Visualization And Their Application To Mapping Metamorphic Terranes: An Example From The Panamint Mountains, California, Jade Ashley Brush

Open Access Theses & Dissertations

Field geology has traditionally relied on 2D, paper-based workflows, but digital mapping techniques are rapidly replacing these outdated methods because they allow for more efficient and accurate mapping. This research applies digital mapping techniques and two terrestrially-based 3D visualization technologies, photogrammetry and Light Detection and Ranging (LiDAR), to the study of metamorphic terranes in the Panamint Mountains, California. This study reports on the spatial accuracy of TINs (triangulated irregular networks) generated from both photogrammetry and ground-based LiDAR using a terrestrial laser scanner (TLS) and discusses how spatial accuracy can be increased. Two levels of comparison were used to test spatial …


Physical Engagement As A Way To Increase Emotional Rapport In Interactions With Embodied Conversational Agents, Ivan Gris Sepulveda Jan 2015

Physical Engagement As A Way To Increase Emotional Rapport In Interactions With Embodied Conversational Agents, Ivan Gris Sepulveda

Open Access Theses & Dissertations

One of the major goals in research on embodied conversational agents (ECAs) is to increase the believability and perceived trustworthiness of agents. To improve the efficacy of the interaction between humans and ECAs, I focus on the development of rapport, which is a complex and extensive behavioral state of affinity, synchronicity, coordination and mutual understanding that is difficult to model, measure and interpret. I present our AGENT Framework and our ECA, Adriana, which is capable of speech recognition and gesture recognition over long periods of time. Our current system provides up to 60 minutes of human-ECA interaction in a jungle-survival …


Computational Search For Novel Magnetic Clusters With Large Magnetic Anisotropy Energy, Nabil Md Rakinul Hoque Jan 2015

Computational Search For Novel Magnetic Clusters With Large Magnetic Anisotropy Energy, Nabil Md Rakinul Hoque

Open Access Theses & Dissertations

The clusters of transition metal atoms often show high spin moments but generally are reactive with the environment. Passivation of the surface atoms can lead to more stable clusters. We have explored one such avenue for passivation in this work. We picked the As@Ni12@As20 cluster which in the neutral state has a magnetic moment of 3 μB. We doped this cluster with various numbers of Mn atoms by substituting Ni atoms. The substitutional doping leads to spin moments located on the Mn atoms. The doping leads to symmetry breaking and as a consequence the number of structural isomers and spin …


Synchronization Of Bistatic Radar Using Chaotic Amplitude And Frequency Modulated Signals, Chandra Sekhar Pappu Jan 2015

Synchronization Of Bistatic Radar Using Chaotic Amplitude And Frequency Modulated Signals, Chandra Sekhar Pappu

Open Access Theses & Dissertations

The purpose of this work is to develop a synchronization scheme for bistatic radar that uses a 3-D chaotic system to generate and process wideband AM and FM signals, which allows for the extraction of high range-resolution information from targets. For AM bistatic radar, the setup includes a drive oscillator at the transmitter and a response oscillator at the receiver. The challenge is synchronizing the response oscillator to the drive oscillator with a scaled version of the transmitted signal sr(t, x) = αs t(t, x), where x is a chaotic state variable and α is a scaling factor. Here, α …


Enterprise Systems, Information Security Management Systems And Their Impact On Enterprise Risk: A 3-Essay Dissertation, Fernando Parra Reyes Jan 2015

Enterprise Systems, Information Security Management Systems And Their Impact On Enterprise Risk: A 3-Essay Dissertation, Fernando Parra Reyes

Open Access Theses & Dissertations

This 3-essay study offers a comprehensive examination of hypothetical concepts related to the behaviors, attitudes, outcomes, processes, experiences, manifestations and indicators connected with an organizationâ??s design, implementation and management of a coherent set of policies, processes and systems to manage risks to its information assets. Network analysis tools are used to examine the relationships found in Information Security Management Systems (ISMS) literature published within the last decade. This study examines the effect of upgrades and implementations of enterprise systems on enterprise risk, as perceived by external investors. Finally, this study also assesses the impact of external IT governance certifications on …


Studying Cellular And Molecular Interaction With Two-Photon Fluorescence Microscopy, Arifur Rahaman Jan 2015

Studying Cellular And Molecular Interaction With Two-Photon Fluorescence Microscopy, Arifur Rahaman

Open Access Theses & Dissertations

Advances in microscopy and fluorescent probes provide new insight into studying cellular and molecular interactions. Two-photon fluorescence microscopy is one of the most important recent inventions in cellular and molecular study. This technology enables noninvasive study at cellular and molecular levels in three dimensions with submicrometer resolution. Two-photon excitation of fluorophores results from the simultaneous absorption of two photons. This excitation process has a number of unique advantages, such as reduced specimen photodamage and enhanced penetration depth. In this study, we used our two-photon microscope to observe predatorial behavior of fast moving bacterivorous marine organism Cafeteria roenbergensis and quantify Mycobacterium …


A Tectonic Analysis On The Central Region Of The Himalaya Collision Zone Using Double Difference Tomography, Chanel Perez Jan 2015

A Tectonic Analysis On The Central Region Of The Himalaya Collision Zone Using Double Difference Tomography, Chanel Perez

Open Access Theses & Dissertations

The Himalaya mountain range remains the only place on Earth undergoing continuous effects from the continental-continental collision between India and Asia. Because of this, the Himalayas have been subjected to extensive deformation and transpression, and contain five major shear zones. Extensive seismic analysis of the region, however, is lacking due to sparse seismograph coverage and complexity of the crustal structure. I examined seismic event data from two temporary seismic networks deployed in the central Himalaya, the HIMNT deployment from 2001-2003, and the Bhutan deployment from 2002-2003. Using this data I develop a 3-D earth model for the region using double-difference …


Evaluation Of Small Molecules On The Excitatory Amino Acid Transporter 3 (Eaat3) For The Treatment Of Ocd, Emmanuel Zubia Jan 2015

Evaluation Of Small Molecules On The Excitatory Amino Acid Transporter 3 (Eaat3) For The Treatment Of Ocd, Emmanuel Zubia

Open Access Theses & Dissertations

We seek to discover new drug candidates for the excitatory amino acid transporter 3 (EAAT3) for the treatment of Obsessive Compulsive Disorder (OCD). We hypothesize that decreasing the glutamatergic transmission via EAAT3 intervention will create an amelioration of the symptoms of OCD. For this we have prepared in-silico binding calculations to identify a better compound that can stimulate EAAT3 and decrease glutamatergic transmission. This research will help us further understand and elucidate the role of glutamate in the neural mechanisms of this illness, which to date remain inconclusive. Those areas of study are significant because, until now, there is no …


Role Of Small Molecules In Rescuing Protein Folding Under Oxidative Stress, Mahmoud Fawzi Megahed Helal Khalil Jan 2015

Role Of Small Molecules In Rescuing Protein Folding Under Oxidative Stress, Mahmoud Fawzi Megahed Helal Khalil

Open Access Theses & Dissertations

Increased levels of nitrosative stress intracellularly within the endoplasmic reticulum is a key factor involvled in the pathogenesis of both Parkinson's (PD) and Alzheimer's (AD) diseases. Previous in-vitro studies in our lab showed that increased levels of nitrosative stress lead to aggregation of misfolded proteins and formation of Lewy Bodies, the main biomarker of PD and AD diseases. Although this was mainly through nitrosylation of Protein Disulfide Isomerase (PDI), the chief endoplasmic reticulum (ER) resident oxidoreductase chaperone responsible for maturation of disulfide-bond-containing proteins, we demonstrate in this project that increased levels of nitrosative stress has an additional direct effect on …


Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast Jan 2015

Evaluating Small Drone Surveillance Capabilities To Enhance Traffic Conformance Intelligence, Brian Cusack, Reza Khaleghparast

Australian Security and Intelligence Conference

The availability of cheap small physical drones that fly around and have a variety of visual and sensor networks attached invites investigation for work applications. In this research we assess the capability of a set of commercially available drones (VTOL) that cost less than $1000 (Cheap is a relative term and we consider anything less than $5000 relatively cheap). The assessment reviews the capability to provide secure and safe motor vehicle surveillance for conformance intelligence. The evaluation was conducted by initially estimating a set of requirements that would satisfy an ideal surveillance situation and then by comparing a sample of …


Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks Jan 2015

Cctv Surveillance: The Differing Aims And Functions Of Cctv Within The Corporate Stratum, Johan Malmenbratt, David J. Brooks

Australian Security and Intelligence Conference

Closed Circuit Television (CCTV) systems are found in a variety of environments and used for a multitude of purposes, leading to differing views of CCTV within an organisation. In accordance to management theory, organisations contain a stratum of work where each level requires specific skills set. In accordance with this work stratum, the study’s methodology used semi-structured interviews with different levels of security personnel in a Casino complex to extract and undertake a thematic analysis. The study extracted 10 CCTV surveillance features across two themes, being its aims and functions. CCTV features included creating a safe environment, protection, legal compliance …


Attributes Of An Analyst: What We Can Learn From The Intelligence Analysts Job Description, Jeffrey D. Corkill, Teresa Kasprzyk Cunow, Elisabeth Ashton, Amanda East Jan 2015

Attributes Of An Analyst: What We Can Learn From The Intelligence Analysts Job Description, Jeffrey D. Corkill, Teresa Kasprzyk Cunow, Elisabeth Ashton, Amanda East

Australian Security and Intelligence Conference

No abstract provided.


Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey Jan 2015

Creating An Operational Security Management Structure For Inimical Environments: Papua New Guinea As A Case Study, William J. Bailey

Australian Security and Intelligence Conference

Security is a necessary cost for businesses wishing to operate in the developing economy of Papua New Guinea. The country continues to face levels of crime and violence out of proportion to other East Asian countries; which deters many would be investors. However, the potential in PNG is vast and eagerly sought after despite the high costs required to operate without harm, therefore, it is necessary manage the security situation. Experience from similar countries has shown by using optimal security management systems and structures it is possible to work safely, securely and effectively, but this requires a comprehensive security, threat …


Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson Jan 2015

Efficacy Of Property Marking As A Situational Crime Prevention Strategy, David J. Brooks, Michael Coole, Chauncey Johnson, Jeff Corkill, Malcolm Jenkinson

Australian Security and Intelligence Conference

Burglary and stealing are crimes that have a significant impact and cost on its victims and society. To mitigate such crimes, property marking is a situational crime prevention strategy that attempts to prevent through dissuasion. There are many forms of property marking, yet there is limited research of its efficacy. Where there have been such studies, there has been some indications of success. Therefore, the study assessed the efficacy of property marking to reduce burglary and stealing crimes. The study undertook a quantitate approach using non-equivalent control groups to assess the geo-spatial impact of property marking when applied at a …


Does A Weak Security Discourse Provide Opportunity For Security Deviance To Flourish?, Michael P. Coole, Jeff Corkill Jan 2015

Does A Weak Security Discourse Provide Opportunity For Security Deviance To Flourish?, Michael P. Coole, Jeff Corkill

Australian Security and Intelligence Conference

In the years since the tragedy of 9/11 the term "security" has become a much used and abused term. As the war on terrorism has evolved, politicians of all persuasions played the security card to change law and legislation ostensibly to protect the community. Those whom provide the security assume that freedoms lost by the wider community in the name of security are in fact a fair price to pay for that security. In this environment the security discourse is diminished and this provides an opportunity for security deviance to emerge. This research used a selection of publically reported examples …


A Secure Sharing Design For Multi-Tag Rfid Authentication Protocol, Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel, Martin Tomlinson Jan 2015

A Secure Sharing Design For Multi-Tag Rfid Authentication Protocol, Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel, Martin Tomlinson

Australian Security and Intelligence Conference

No abstract provided.


Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh Jan 2015

Evaluating Single Sign On Security Failure In Cloud Services, Brian Cusack, Eghbal Zadeh

Australian Information Security Management Conference

The business use of cloud computing services is motivated by the ease of use and the potential financial cost reductions. Service failure may occur when the service provider does not protect information or when the use of the services becomes overly complex and difficult. The benefits also bring optimisation challenges for the information owners who must assess the service security risk and the degree to which new human behaviours are required. In this research we look at the risk of identity theft when ease of service access is provided through a Single Sign On (SSO) authorisation and ask: What are …


Selection Of Penetration Testing Methodologies: A Comparison And Evaluation, Aleatha Shanley, Michael N. Johnstone Jan 2015

Selection Of Penetration Testing Methodologies: A Comparison And Evaluation, Aleatha Shanley, Michael N. Johnstone

Australian Information Security Management Conference

Cyber security is fast becoming a strategic priority across both governments and private organisations. With technology abundantly available, and the unbridled growth in the size and complexity of information systems, cyber criminals have a multitude of targets. Therefore, cyber security assessments are becoming common practice as concerns about information security grow. Penetration testing is one strategy used to mitigate the risk of cyber-attack. Penetration testers attempt to compromise systems using the same tools and techniques as malicious attackers thus attempting to identify vulnerabilities before an attack occurs. This research details a gap analysis of the theoretical vs. the practical classification …