Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 146251 - 146280 of 302613

Full-Text Articles in Physical Sciences and Mathematics

Graphs Obtained From Collections Of Blocks, Colton Magnant, Pouria Salehi Nowbandegani, Hua Wang Jan 2015

Graphs Obtained From Collections Of Blocks, Colton Magnant, Pouria Salehi Nowbandegani, Hua Wang

Department of Mathematical Sciences Faculty Publications

Given a collection of d-dimensional rectangular solids called blocks, no two of which sharing interior points, construct a block graph by adding a vertex for each block and an edge if the faces of the two corresponding blocks intersect nontrivially. It is known that if d ≥ 3, such block graphs can have arbitrarily large chromatic number. We prove that the chromatic number can be bounded with only a mild restriction on the sizes of the blocks. We also show that block graphs of block configurations arising from partitions of d-dimensional hypercubes into sub-hypercubes are at least d-connected. Bounds on …


Respiratory Particle Deposition Probability Due To Sedimentation With Variable Gravity And Electrostatic Forces, Ioannis Haranas, Ioannis Gkigkitzis, George D. Zouganelis, Maria K. Haranas, Samantha Kirk Jan 2015

Respiratory Particle Deposition Probability Due To Sedimentation With Variable Gravity And Electrostatic Forces, Ioannis Haranas, Ioannis Gkigkitzis, George D. Zouganelis, Maria K. Haranas, Samantha Kirk

Physics and Computer Science Faculty Publications

In this paper, we study the effects of the acceleration gravity on the sedimentation deposition probability, as well as the aerosol deposition rate on the surface of the Earth and Mars, but also aboard a spacecraft in orbit around Earth and Mars as well for particles with density ρp = 1300 kg/m3, diameters dp = 1, 3, 5 µm and residence times t = 0.0272, 0.2 s respectively. For particles of diameter 1 µm we find that, on the surface of Earth and Mars the deposition probabilities are higher at the poles when compared to the …


Exploring The Use Of Faded Worked Examples As A Problem Solving Approach For Underprepared Students, Tiffany Hesser, Jess L. Gregory Jan 2015

Exploring The Use Of Faded Worked Examples As A Problem Solving Approach For Underprepared Students, Tiffany Hesser, Jess L. Gregory

Chemistry and Chemical Engineering Faculty Publications

It is not uncommon for students to find themselves underprepared when entering a post secondary institution. In additional to lower levels of academic achievement, underprepared students may not be aware that they lack the skills needed to be successful and effectively acquire and process information. Because of this, students that enter post-secondary institutions underprepared often require more support in and out of the college classroom.

In computational based classes, such as math, engineering, chemistry or physics, this support often includes an introduction to effective problem solving strategies. This study introduced faded worked examples as a problem solving approach to students …


Grazing Incidence X-Ray Fluorescence Measurements Of Genesis Sample 30580 For Determination Of Manganese And Nickel Fluences, Martina Schmeling, J. Davidson, P.J. Eng, J.E. Stubbs, A.J.G. Jurewicz, D.S. Burnett Jan 2015

Grazing Incidence X-Ray Fluorescence Measurements Of Genesis Sample 30580 For Determination Of Manganese And Nickel Fluences, Martina Schmeling, J. Davidson, P.J. Eng, J.E. Stubbs, A.J.G. Jurewicz, D.S. Burnett

Chemistry: Faculty Publications and Other Works

Genesis flight sample 30580 was analyzed by grazing incidence X-ray fluorescence spectrometry for subsequent calculation of Mn and Ni fluences.


A Survey And Method For Analysing Soho Router Firmware Currency, Nikolai Hampton, Patryk Szewczyk Jan 2015

A Survey And Method For Analysing Soho Router Firmware Currency, Nikolai Hampton, Patryk Szewczyk

Australian Information Security Management Conference

Network routers are a core component of contemporary SoHo networks. The firmware within these devices provides routing, control and monitoring functionality coupled with mechanisms to ensure a secure and reliable network. End-users are typically reliant on manufacturers to provide timely firmware updates to mitigate known vulnerabilities. An investigation was undertaken to identify the underlying software components used in the firmware of currently available, SoHo network devices used in Australia. Firmware from 37 devices was deconstructed to identify potential security issues; in each instance, the firmware images were found to include vulnerabilities, obsolete software and out-of-date operating system components. 95% of …


Loyalty Cards And The Problem Of Captcha: 2nd Tier Security And Usability Issues For Senior Citizens, David M. Cook, Apoorv Kumar, Charwina Unmar-Satiah Jan 2015

Loyalty Cards And The Problem Of Captcha: 2nd Tier Security And Usability Issues For Senior Citizens, David M. Cook, Apoorv Kumar, Charwina Unmar-Satiah

Australian Information Security Management Conference

Information Security often works in antipathy to access and useability in communities of older citizens. Whilst security features are required to prevent the disclosure of information, some security tools have a deleterious effect upon users, resulting in insecure practices. Security becomes unfit for purpose where users prefer to abandon applications and online benefits in favour of non-digital authentication and verification requirements. For some, the ability to read letters and symbols from a distorted image is a decidedly more difficult task than for others, and the resulting level of security from CAPTCHA tests is not consistent from person to person. This …


Analysis Into Developing Accurate And Efficient Intrusion Detection Approaches, Priya Rabadia, Craig Valli Jan 2015

Analysis Into Developing Accurate And Efficient Intrusion Detection Approaches, Priya Rabadia, Craig Valli

Australian Digital Forensics Conference

Cyber-security has become more prevalent as more organisations are relying on cyber-enabled infrastructures to conduct their daily actives. Subsequently cybercrime and cyber-attacks are increasing. An Intrusion Detection System (IDS) is a cyber-security tool that is used to mitigate cyber-attacks. An IDS is a system deployed to monitor network traffic and trigger an alert when unauthorised activity has been detected. It is important for IDSs to accurately identify cyber-attacks against assets on cyber-enabled infrastructures, while also being efficient at processing current and predicted network traffic flows. The purpose of the paper is to outline the importance of developing an accurate and …


Security Of Eprescription: Security Of Data At Rest In Prescription Exchange Services Vs On Mobile Devices, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley Jan 2015

Security Of Eprescription: Security Of Data At Rest In Prescription Exchange Services Vs On Mobile Devices, Kyaw Kyaw Htat, Patricia A. H. Williams, Vincent Mccauley

Australian eHealth Informatics and Security Conference

One area of healthcare that has moved more quickly than others in adopting electronic transfer of information is prescribing in the primary care environment. Several Acts and Regulations have been repealed and amended at Commonwealth and State levels to enable this progress over the past decade, as medication provision is a strictly controlled area of healthcare. Further, numerous standards and specifications have been developed and adopted to support and safeguard the regulatory changes and facilitate the electronic transfer of prescriptions. However, the current model of electronic prescription transfer comes with a substantial price tag for ongoing use. With the Nation’s …


Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog Jan 2015

Timing Attack Detection On Bacnet Via A Machine Learning Approach, Michael N. Johnstone, Matthew Peacock, J I. Den Hartog

Australian Information Security Management Conference

Building Automation Systems (BAS), alternatively known as Building Management Systems (BMS), which centralise the management of building services, are often connected to corporate networks and are routinely accessed remotely for operational management and emergency purposes. The protocols used in BAS, in particular BACnet, were not designed with security as a primary requirement, thus the majority of systems operate with sub-standard or non-existent security implementations. As intrusion is thus likely easy to achieve, intrusion detection systems should be put in place to ensure they can be detected and mitigated. Existing intrusion detection systems typically deal only with known threats (signature-based approaches) …


Decline Of Yangtze River Water And Sediment Discharge: Impact From Natural And Anthropogenic Changes, S. L. Yang, K. H. Xu, J. D. Milliman, H.F. Yang, C.S. Wu Jan 2015

Decline Of Yangtze River Water And Sediment Discharge: Impact From Natural And Anthropogenic Changes, S. L. Yang, K. H. Xu, J. D. Milliman, H.F. Yang, C.S. Wu

VIMS Articles

The increasing impact of both climatic change and human activities on global river systems necessitates an increasing need to identify and quantify the various drivers and their impacts on fluvial water and sediment discharge. Here we show that mean Yangtze River water discharge of the first decade after the closing of the Three Gorges Dam (TGD) (2003-2012) was 67 km(3)/yr (7%) lower than that of the previous 50 years (1950-2002), and 126 km(3)/yr less compared to the relatively wet period of pre-TGD decade (1993-2002). Most (60-70%) of the decline can be attributed to decreased precipitation, the remainder resulting from construction …


Overview Of Student Projects And Articles, Padideh Ghadiri, Madeline Brenner Jan 2015

Overview Of Student Projects And Articles, Padideh Ghadiri, Madeline Brenner

OUR Journal: ODU Undergraduate Research Journal

All over the globe, the negative impacts of climate change and sea level rise have garnered the attention of prominent researchers and the press alike. Previous research on sea level rise and climate change in Hampton Roads has concluded that this region is one of the most vulnerable areas of land in the United States ("Initiative for Coastal Climate Change Research"). The geographical proximity of the numerous bodies of water found in and around Hampton Roads and the low elevation leads scientists to believe that this area will experience the repercussions of climate change and sea level rise first ("Initiative …


Climate Change And Infrastructural Damage, Macey Vansavage Jan 2015

Climate Change And Infrastructural Damage, Macey Vansavage

OUR Journal: ODU Undergraduate Research Journal

With the assistance of ENGL 231C students at Old Dominion University, Dr. Daniel Richards and Mrs. Megan McKittrick led this study testing the usability of Climate Central’s Risk Finder tool. The study was conducted as a client-based, service learning project for a Technical and Scientific writing course, serving client Dan Rizza at Climate Central, a nonprofit research organization. The study serves as a way for local collegiate students to be able to gain knowledge about the execution of faculty-level research. The Risk Finder tool allows users to view the potential effects of sea level rise on their area. The tool …


Mapping The Laws Which Apply To Intercepting Wireless Communications In A Western Australian Legal Context, Tim Thomas, Craig Valli Jan 2015

Mapping The Laws Which Apply To Intercepting Wireless Communications In A Western Australian Legal Context, Tim Thomas, Craig Valli

Australian Digital Forensics Conference

The rapid evolution and deployment of WiFi technology creates a new environment where offenders can intercept and obtain sensitive information for use in the commissioning of further criminal activity. This paper explores how the law applies to an protects the wireless communications environment, with specific focus on the interception of WiFi data communications.


Steganography As A Threat – Fairytale Or Fact?, Tom Cleary Jan 2015

Steganography As A Threat – Fairytale Or Fact?, Tom Cleary

Australian Digital Forensics Conference

Almost since the birth of the Internet, there has been a fear that steganographically-encoded threats would be used to bring harm. Serious consideration has been given to the idea that merely downloading an image could introduce malware. Yet, for decades, evidence of this malware channel has been missing in action. There is still an unwritten assumption that images are harmless. Many vendors have implicitly avoided producing defences against steganographic threats. Is it truly impossible to make a widely harmful exploit this way or have malicious actors accepted general wisdom? Three recent papers suggest that there may be a new chapter …


Towards A Standardised Strategy To Collect And Distribute Application Software Artifacts, Thomas Laurenson, Stephen Macdonell, Hank Wolfe Jan 2015

Towards A Standardised Strategy To Collect And Distribute Application Software Artifacts, Thomas Laurenson, Stephen Macdonell, Hank Wolfe

Australian Digital Forensics Conference

Reference sets contain known content that are used to identify relevant or filter irrelevant content. Application profiles are a type of reference set that contain digital artifacts associated with application software. An application profile can be compared against a target data set to identify relevant evidence of application usage in a variety of investigation scenarios. The research objective is to design and implement a standardised strategy to collect and distribute application software artifacts using application profiles. An advanced technique for creating application profiles was designed using a formalised differential analysis strategy. The design was implemented in a live differential forensic …


Improving The Detection And Validation Of Inland Revenue Numbers, Henry Gee, Thomas Laurenson, Hank Wolfe Jan 2015

Improving The Detection And Validation Of Inland Revenue Numbers, Henry Gee, Thomas Laurenson, Hank Wolfe

Australian Digital Forensics Conference

Forensic analysis commonly involves searching an investigation target for personal identifiable information. An Inland Revenue Department (IRD) number is used for taxation purposes in New Zealand and can provide evidence of perpetrator identity, transaction information or electronic fraud. This research has designed and implemented a bulk_extractor feature scanner to detect and validate IRD numbers (features). The IRD scanner has been tested on a known data set to ensure tool functionality. A large real world data set was then used to determine scanner effectiveness in a realistic investigation scenario. Real world data set testing highlighted a high number of unrelated features …


Mobile Device Damage And The Challenges To The Modern Investigator, Dan Blackman Jan 2015

Mobile Device Damage And The Challenges To The Modern Investigator, Dan Blackman

Australian Digital Forensics Conference

Mobile Forensics has developed into an area of significant concern to law enforcement agencies and their counterparts, specifically as a result of individuals moving away from using traditional computers and focusing attention on their mobile device. Due to the smart phone being almost permanently attached to the person or in near proximity, it has become a significant source of information for investigators and can mean the difference between proving guilt or innocence. Tools have long been established, which provide agencies the ability to encapsulate expertise, which allows the easy download and production of reports for the mobile device and how …


File System Modelling For Digital Triage: An Inductive Profiling Approach, Benjamin Rice, Benjamin Turnbull Jan 2015

File System Modelling For Digital Triage: An Inductive Profiling Approach, Benjamin Rice, Benjamin Turnbull

Australian Digital Forensics Conference

Digital Triage is the initial, rapid screening of electronic devices as a precursor to full forensic analysis. Triage has numerous benefits including resource prioritisation, greater involvement of criminal investigators and the rapid provision of initial outcomes. In traditional scientific forensics and criminology, certain behavioural attributes and character traits can be identified and used to construct a case profile to focus an investigation and narrow down a list of suspects. This research introduces the Triage Modelling Tool (TMT), that uses a profiling approach to identify how offenders utilise and structure files through the creation of file system models. Results from the …


Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee Jan 2015

Cyber Blackbox For Collecting Network Evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, Youngseok Lee

Australian Digital Forensics Conference

In recent years, the hottest topics in the security field are related to the advanced and persistent attacks. As an approach to solve this problem, we propose a cyber blackbox which collects and preserves network traffic on a virtual volume based WORM device, called EvidenceLock to ensure data integrity for security and forensic analysis. As a strategy to retain traffic for long enough periods, we introduce a deduplication method. Also this paper includes a study on the network evidence which is collected and preserved for analyzing the cause of cyber incident. Then, a method is proposed to suggest a starting …


Cyber Black Box: Network Intrusion Forensics System For Collecting And Preserving Evidence Of Attack, Jong-Hyun Kim, Joo-Young Lee, Yangseo Choi, Sunoh Choi, Ik-Kyun Kim Jan 2015

Cyber Black Box: Network Intrusion Forensics System For Collecting And Preserving Evidence Of Attack, Jong-Hyun Kim, Joo-Young Lee, Yangseo Choi, Sunoh Choi, Ik-Kyun Kim

Australian Digital Forensics Conference

Once the system is compromised, the forensics and investigation are always executed after the attacks and the loss of some useful instant evidence. Since there is no log information necessary for analyzing an attack cause after the cyber incident occurs, it is difficult to analyze the cause of an intrusion even after an intrusion event is recognized. Moreover, in an advanced cyber incident such as advanced persistent threats, several months or more are expended in only analyzing a cause, and it is difficult to find the cause with conventional security equipment. In this paper, we introduce a network intrusion forensics …


Security Risks Of Medical Devices In Wireless Environments, Krishnun Sansurooah Jan 2015

Security Risks Of Medical Devices In Wireless Environments, Krishnun Sansurooah

Australian eHealth Informatics and Security Conference

The advancement of wireless medical devices technology, that has developed in hospitals and migrated into the home environment, has created unsustainability in in terms of the management of security for such devices. Through this paper, we shall attempt to explain how medical devices have completely changed the way security needs to be approached in the medical field. We shall also explore the history of medical devices and the organizational problems faced for the development of these devices, the different stakeholders strengths and weaknesses, especially if the device is implanted inside the body of a patient. Once the risk is understood …


Electronic Structures And Electronic Spectra Of All-Boron Fullerene B40, Rongxing He, Xiao Cheng Zeng Jan 2015

Electronic Structures And Electronic Spectra Of All-Boron Fullerene B40, Rongxing He, Xiao Cheng Zeng

Xiao Cheng Zeng Publications

This study is motivated by the recent discovery of the first all-boron fullerene analogue, a B40 cluster with D2d point-group symmetry, dubbed borospherene (Nat. Chem., 2014, 6, 727). Insight into the electronic structures and spectral properties of B40 is timely and important to understand the borospherene and the transition from open-ended plate or ribbon-like structures to a hollow-cage structure at B40. Optimized geometries of borospherene B40 for both the ground state and the first excited state allow us to compute spectral properties including UV-vis absorption, infrared (IR) and Raman spectra. Highly resolved absorption and …


Medium-Sized Au40(Sr)24 And Au52(Sr)32 Nanoclusters With Distinct Gold-Kernel Structures And Spectroscopic Features, Wen Wu Xu, Yadong Li, Yi Gao, Xiao Cheng Zeng Jan 2015

Medium-Sized Au40(Sr)24 And Au52(Sr)32 Nanoclusters With Distinct Gold-Kernel Structures And Spectroscopic Features, Wen Wu Xu, Yadong Li, Yi Gao, Xiao Cheng Zeng

Xiao Cheng Zeng Publications

We have analyzed the structures of two medium-sized thiolateprotected gold nanoparticles (RS-AuNPs) Au40(SR)24 and Au52(SR)32 and identified the distinct structural features in their Au kernels [Sci. Adv., 2015, 1, e1500425]. We find that both Au kernels of the Au40(SR)24 and Au52(SR)32 nanoclusters can be classified as interpenetrating cuboctahedra. Simulated X-ray diffraction patterns of the RS-AuNPs with the cuboctahedral kernel are collected and then compared with the X-ray diffraction patterns of the RS-AuNPs of two other prevailing Au-kernels identified from previous experiments, namely the Ino-decahedral kernel and icosahedral kernel. …


Extremely Strong Tubular Stacking Of Aromatic Oligoamide Macrocycles, Mark A. Kline, Xiaoxi Wei, Ian J. Horner, Rui Liu, Shuang Chen, Si Chen, Ka Yi Yung, Kazuhiro Yamato, Zhonghou Cai, Frank V. Bright, Xiao Cheng Zeng, Bing Gong Jan 2015

Extremely Strong Tubular Stacking Of Aromatic Oligoamide Macrocycles, Mark A. Kline, Xiaoxi Wei, Ian J. Horner, Rui Liu, Shuang Chen, Si Chen, Ka Yi Yung, Kazuhiro Yamato, Zhonghou Cai, Frank V. Bright, Xiao Cheng Zeng, Bing Gong

Xiao Cheng Zeng Publications

As the third-generation rigid macrocycles evolved from progenitor 1, cyclic aromatic oligoamides 3, with a backbone of reduced constraint, exhibit extremely strong stacking with an astoundingly high affinity (estimated lower limit of Kdimer > 1013 M–1 in CHCl3), which leads to dispersed tubular stacks that undergo further assembly in solution. Computational study reveals a very large binding energy (–49.77 kcal mol–1) and indicates highly cooperative local dipole interactions that account for the observed strength and directionality for the stacking of 3. In the solid-state, X-ray diffraction (XRD) confirms that the aggregation of 3 results …


Positivity Of Equivariant Gromov–Witten Invariants, D. Anderson, Linda Chen Jan 2015

Positivity Of Equivariant Gromov–Witten Invariants, D. Anderson, Linda Chen

Mathematics & Statistics Faculty Works

We show that the equivariant Gromov–Witten invariants of a projective homogeneous space G/P exhibit Graham-positivity: when expressed as polynomials in the positive roots, they have nonnegative coefficients.


Numerical Solutions Of American Options With Dividends Using Finite Difference Methods, Nsoki Mavinga, Chi Zhang , '15 Jan 2015

Numerical Solutions Of American Options With Dividends Using Finite Difference Methods, Nsoki Mavinga, Chi Zhang , '15

Mathematics & Statistics Faculty Works

We study the Black-Scholes model for American options with dividends. We cast the problem as a free-boundary problem for heat equations and use transformations to rewrite the problem in linear complementarity form. We use explicit and implicit finite difference methods to obtain numerical solutions. We implement and test the methods on a particular example in MATLAB. The effects of dividend payments on option pricing are also considered.


Magnetic Chiral Spin Textures By Imprinting, Robert Streubel, F. Kronast, U. Rössler, O. G. Schmidt, P. Fischer, D. Makarov Jan 2015

Magnetic Chiral Spin Textures By Imprinting, Robert Streubel, F. Kronast, U. Rössler, O. G. Schmidt, P. Fischer, D. Makarov

Robert Streubel Papers

The unique properties of non-trivial topological states, e.g. magnetic skyrmions [1] may path the way towards novel spintronic devices [2]. However, these spin textures have only been observed in special classes of materials possessing non-centrosymmetric crystal structure [1,3-6] and at low temperatures, which limits their application potential. We offer an alternate route to design synthetic magnetic heterostructures that resemble swirls, vortices or skyrmions with distinct topological charge densities at room temperature. By vertically stacking two magnetic nanopatterns with in-and out-of-plane magnetization and tailoring the interlayer exchange coupling, non-collinear spin textures with tunable topological charge can be imprinted (Fig. 1a).


Towards Dynamic Adaption Of User's Organisational Information Security Behaviour, Mutlaq Alotaibi, Steven Furnell, Nathan Clarke Jan 2015

Towards Dynamic Adaption Of User's Organisational Information Security Behaviour, Mutlaq Alotaibi, Steven Furnell, Nathan Clarke

Australian Information Security Management Conference

The weakest link in the field of information security that has been identified in the literature is the organisation’s employees. Information security policy compliance is one of the main challenges facing organisations today. Although implementing technical and procedural measures clearly helps to improve an organisation's information security, the human factor or the employees' compliance with these measures is the key to success. However, organisations are now having some issues regarding the extent of employee adherence to policy. The problem of employees being unaware or ignorant of their responsibilities in relation to information security is still an open issue. The proposed …


Urdu Text Steganography: Utilizing Isolated Letters, Aliya Tabassum Abbasi, Nuzhat Naqvi, Aihab Khan, Basheer Ahmad Jan 2015

Urdu Text Steganography: Utilizing Isolated Letters, Aliya Tabassum Abbasi, Nuzhat Naqvi, Aihab Khan, Basheer Ahmad

Australian Information Security Management Conference

This paper presents an imperceptible and high capacity feature based approach which hides a secret message into Urdu text cover media by utilising all isolated letters. Existing techniques are less imperceptible and also not robust against steganalysis attacks and some of these schemes are failed to provide the better capacity rates. Previous lexical based and syntax based schemes are ineffective to provide the better capacity rate and image based approaches are not robust against format attacks. Moreover, Feature based approaches are more perceptible and thus, cannot resist against visual attacks. This paper proposes an improved algorithm that encompasses all isolated …


Evaluating Policy Layer Security Controls For Value Realisation In Secure Systems, Brian Cusack, Maher Al-Khazrajy Jan 2015

Evaluating Policy Layer Security Controls For Value Realisation In Secure Systems, Brian Cusack, Maher Al-Khazrajy

Australian Information Security Management Conference

A strategic question for any business is: What value do control frameworks give? The question concerns the costs associated with implementing and maintaining control frameworks compared with the benefits gained. Each control framework contains many controls that may or may not benefit a situation and this research is aimed at testing different selections and combinations of controls to forecast probable impacts on business outcomes. The scope of the research is limited to a representative set of security controls and the lesser question: What are the criteria for selecting the most effective and efficient security control configurations for best business value? …