Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 37681 - 37710 of 302569

Full-Text Articles in Physical Sciences and Mathematics

Information Systems Security Countermeasures: An Assessment Of Older Workers In Indonesian Small And Medium-Sized Businesses, Hari Samudra Roosman Jan 2022

Information Systems Security Countermeasures: An Assessment Of Older Workers In Indonesian Small And Medium-Sized Businesses, Hari Samudra Roosman

CCE Theses and Dissertations

Information Systems (IS) misuse can result in cyberattacks such as denial-of-service, phishing, malware, and business email compromise. The study of factors that contribute to the misuse of IS resources is well-documented and empirical research has supported the value of approaches that can be used to deter IS misuse among employees; however, age and cultural nuances exist. Research focusing on older workers and how they can help to deter IS misuse among employees and support cybersecurity countermeasures within developing countries is in its nascent stages. The goal of this study was two-fold. The first goal was to assess what older workers …


An Empirical Investigation Of The Evidence Recovery Process In Digital Forensics, Kevin Parviz Jan 2022

An Empirical Investigation Of The Evidence Recovery Process In Digital Forensics, Kevin Parviz

CCE Theses and Dissertations

The widespread use of the digital media in committing crimes, and the steady increase of their storage capacity has created backlogs at digital forensic labs. The problem is exacerbated especially in high profile crimes. In many such cases the judicial proceedings mandate full analysis of the digital media, when doing so is rarely accomplished or practical. Prior studies have proposed different phases for forensic analysis, to lessen the backlog issues. However, these phases are not distinctly differentiated, and some proposed solutions may not be practical. This study utilized several past police forensic analyses. Each case was chosen for having five …


Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy Jan 2022

Exploring The Existing And Unknown Side Effects Of Privacy Preserving Data Mining Algorithms, Hima Bindu Sadashiva Reddy

CCE Theses and Dissertations

The data mining sanitization process involves converting the data by masking the sensitive data and then releasing it to public domain. During the sanitization process, side effects such as hiding failure, missing cost and artificial cost of the data were observed. Privacy Preserving Data Mining (PPDM) algorithms were developed for the sanitization process to overcome information loss and yet maintain data integrity. While these PPDM algorithms did provide benefits for privacy preservation, they also made sure to solve the side effects that occurred during the sanitization process. Many PPDM algorithms were developed to reduce these side effects. There are several …


A One-Dimensional Field Dislocation Mechanics Model Using Discontinuous Galerkin Method, Ja'nya Breeden, Dow Drake, Jay Gopalakrishnan, Saurabh Puri Jan 2022

A One-Dimensional Field Dislocation Mechanics Model Using Discontinuous Galerkin Method, Ja'nya Breeden, Dow Drake, Jay Gopalakrishnan, Saurabh Puri

Mathematics and Statistics Faculty Publications and Presentations

A numerical solution strategy for a one-dimensional field dislocation mechanics (FDM) model using the Discontinuous Galerkin (DG) method is developed. The FDM model is capable of simulating the dynamics of discrete, nonsingular dislocations using a partial differential equation involving a conservation law for the Burgers vector content with constitutive input for nucleation and velocity. Modeling of individual dislocation lines with an equilibrium compact core structure in the context of this continuum elastoplastic framework requires a non-convex stored energy density. Permanent deformation and stress redistribution caused by the dissipative transport of dislocations is modeled using thermodynamics-based constitutive laws. A DG method …


Bodipy–Pyrene Donor–Acceptor Sensitizers For Triplet–Triplet Annihilation Upconversion: The Impact Of The Bodipy-Core On Upconversion Efficiency, Natalia Kiseleva, Mikhail Filatov, Jan C. Fischer, Milian Kaiser, Marius Jakoby, Dimitry Busko, Ian A. Howard, Bryce Richards, Andrey Turshatov Jan 2022

Bodipy–Pyrene Donor–Acceptor Sensitizers For Triplet–Triplet Annihilation Upconversion: The Impact Of The Bodipy-Core On Upconversion Efficiency, Natalia Kiseleva, Mikhail Filatov, Jan C. Fischer, Milian Kaiser, Marius Jakoby, Dimitry Busko, Ian A. Howard, Bryce Richards, Andrey Turshatov

Articles

Triplet–triplet annihilation upconversion (TTA-UC) is an important type of optical process with applications in biophotonics, solar energy harvesting and photochemistry. In most of the TTA-UC systems, the formation of triplet excited states takes place via spin–orbital interactions promoted by heavy atoms. Given the crucial role of heavy atoms (especially noble metals, such as Pd and Pt) in promoting intersystem crossing (ISC) and, therefore, in production of UC luminescence, the feasibility of using more readily available and inexpensive sensitizers without heavy atoms remains a challenge. Here, we investigated sensitization of TTA-UC using BODIPY–pyrene heavy-atom-free donor–acceptor dyads with different numbers of alkyl …


Analysis Of Copper(Ii) Using The Ascorbate/Oxygen System – A Valuable Undergraduate Resource, Sean Tobin, John Cassidy, Kevin Kurian, Tony Betts Jan 2022

Analysis Of Copper(Ii) Using The Ascorbate/Oxygen System – A Valuable Undergraduate Resource, Sean Tobin, John Cassidy, Kevin Kurian, Tony Betts

Articles

In deionised water, ascorbic acid (AH−), through oxidation by oxygen in the presence of copper(II), was found to degrade with zero-order kinetics. The magnitude of the reaction rate varied directly with the copper(II) concentration. At a higher pH (7.4), the same reaction was found to be pseudo-first order. Once again, the magnitude of the rate increased linearly with copper(II) concentration at a micromolar level. Dissolved oxygen levels, in excess AH− and trace copper(II), displayed similar kinetics under both conditions. Monitoring of either AH− levels or dissolved oxygen concentration was found to be a useful novel undergraduate practical laboratory for trace …


All-Optical Modulator Based On A Microfibre Coil Resonator Functionalized With Mxene, Pengfei Wang, Shi Li, Fengzi Ling, Gerald Farrell, Elfed Lewis, Yu Yin Jan 2022

All-Optical Modulator Based On A Microfibre Coil Resonator Functionalized With Mxene, Pengfei Wang, Shi Li, Fengzi Ling, Gerald Farrell, Elfed Lewis, Yu Yin

Articles

A novel all-optical modulator based on a microfibre coil resonator (MCR) functionalized using MXene is reported. The MCR was manufactured by winding a tapered fibre on a polycarbonate (PC) resin cylinder with low refractive index to support the microfibre, which also forms a fluidic channel coil. The MXene dispersion was injected into the channel to allow the deposition of an MXene layer using a photodeposition process. The transmission spectra were tuned using a tunable laser with a centre wavelength of 1550 nm and the light-matter interaction resulting from the photo-thermal effect and MXene absorption provide the all-optical modulation in this …


On The Polytopal Generalization Of Sperner’S Lemma, Amit Harlev Jan 2022

On The Polytopal Generalization Of Sperner’S Lemma, Amit Harlev

HMC Senior Theses

We introduce and prove Sperner’s lemma, the well known combinatorial analogue of the Brouwer fixed point theorem, and then attempt to gain a better understanding of the polytopal generalization of Sperner’s lemma conjectured in Atanassov (1996) and proven in De Loera et al. (2002). After explaining the polytopal generalization and providing examples, we present a new, simpler proof of a slightly weaker result that helps us better understand the result and why it is correct. Some ideas for how to generalize this proof to the complete result are discussed. In the last two chapters we provide a brief introduction to …


Games For One, Games For Two: Computationally Complex Fun For Polynomial-Hierarchical Families, Kye Shi Jan 2022

Games For One, Games For Two: Computationally Complex Fun For Polynomial-Hierarchical Families, Kye Shi

HMC Senior Theses

In the first half of this thesis, we explore the polynomial-time hierarchy, emphasizing an intuitive perspective that associates decision problems in the polynomial hierarchy to combinatorial games with fixed numbers of turns. Specifically, problems in �� are thought of as 0-turn games, ���� as 1-turn “puzzle” games, and in general ��ₖ�� as ��-turn games, in which decision problems answer the binary question, “can the starting player guarantee a win?” We introduce the formalisms of the polynomial hierarchy through this perspective, alongside definitions of ��-turn CIRCUIT SATISFIABILITY games, whose ��ₖ��-completeness is assumed from prior work (we briefly justify this assumption …


Algebraic Invariants Of Knot Diagrams On Surfaces, Ryan Martinez Jan 2022

Algebraic Invariants Of Knot Diagrams On Surfaces, Ryan Martinez

HMC Senior Theses

In this thesis we first give an introduction to knots, knot diagrams, and algebraic structures defined on them accessible to anyone with knowledge of very basic abstract algebra and topology. Of particular interest in this thesis is the quandle which "colors" knot diagrams. Usually, quandles are only used to color knot diagrams in the plane or on a sphere, so this thesis extends quandles to knot diagrams on any surface and begins to classify the fundamental quandles of knot diagrams on the torus.

This thesis also breifly looks into Niebrzydowski Tribrackets which are a different algebraic structure which, in future …


Smoothed Bounded-Confidence Opinion Dynamics On The Complete Graph, Solomon Valore-Caplan Jan 2022

Smoothed Bounded-Confidence Opinion Dynamics On The Complete Graph, Solomon Valore-Caplan

HMC Senior Theses

We present and analyze a model for how opinions might spread throughout a network of people sharing information. Our model is called the smoothed bounded-confidence model and is inspired by the bounded-confidence model of opinion dynamics proposed by Hegselmann and Krause. In the Hegselmann–Krause model, agents move towards the average opinion of their neighbors. However, an agent only factors a neighbor into the average if their opinions are sufficiently similar. In our model, we replace this binary threshold with a logarithmic weighting function that rewards neighbors with similar opinions and minimizes the effect of dissimilar ones. This weighting function can …


Check Yourself Before You Wrek Yourself: Unpacking And Generalizing Randomized Extended Kaczmarz, William Gilroy Jan 2022

Check Yourself Before You Wrek Yourself: Unpacking And Generalizing Randomized Extended Kaczmarz, William Gilroy

HMC Senior Theses

Linear systems are fundamental in many areas of science and engineering. With the advent of computers there now exist extremely large linear systems that we are interested in. Such linear systems lend themselves to iterative methods. One such method is the family of algorithms called Randomized Kaczmarz methods.
Among this family, there exists a Randomized Kaczmarz variant called Randomized
Extended Kaczmarz which solves for least squares solutions in inconsistent linear systems.
Among Kaczmarz variants, Randomized Extended Kaczmarz is unique in that it modifies input system in a special way to solve for the least squares solution. In this work we …


An Adaptive Hegselmann–Krause Model Of Opinion Dynamics, Phousawanh Peaungvongpakdy Jan 2022

An Adaptive Hegselmann–Krause Model Of Opinion Dynamics, Phousawanh Peaungvongpakdy

HMC Senior Theses

Models of opinion dynamics have been used to understand how the spread
of information in a population evolves, such as the classical Hegselmann–
Krause model (Hegselmann and Krause, 2002). One extension of the model
has been used to study the impact of media ideology on social media
networks (Brooks and Porter, 2020). In this thesis, we explore various
models of opinions and propose our own model, which is an adaptive
version of the Hegselmann–Krause model. The adaptive version implements
the social phenomenon of homophily—the tendency for like-minded agents to
associate together. This is done by having agents dissolve connections …


Results On The Generalized Covering Radius Of Error Correcting Codes, Benjamin Langton Jan 2022

Results On The Generalized Covering Radius Of Error Correcting Codes, Benjamin Langton

HMC Senior Theses

The recently proposed generalized covering radius is a fundamental property of error correcting codes. This quantity characterizes the trade off between time and space complexity of certain algorithms when a code is used in them. However, for the most part very little is known about the generalized covering radius. My thesis seeks to expand on this field in several ways. First, a new upper bound on this quantity is established and compared to previous bounds. Second, this bound is used to derive a new algorithm for finding codewords within the generalized covering radius of a given vector, and also to …


An Exploration Of Voting With Partial Orders, Mason Acevedo Jan 2022

An Exploration Of Voting With Partial Orders, Mason Acevedo

HMC Senior Theses

In this thesis, we discuss existing ideas and voting systems in social choice theory. Specifically, we focus on the Kemeny rule and the Borda count. Then, we begin trying to understand generalizations of these voting systems in a setting where voters can submit partial rankings on their ballot, instead of complete rankings.


Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal Jan 2022

Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal

All Works

This paper provides an overview of crowdsensing and some of its applications. Crowdsensing is a part of the collecting data situations also; it’s built on a data system on multiple customer interactions. Moreover, writing the general information of the smart cities can be used to boost to received number frequency to send messages. This work mentioned the Crowdsensing layers that describe Mobile crowdsensing. The article focuses on crowdsensing layers, developed an application in Coalition Game using crowdsensing in terms of GPS. In addition, this paper discussed the Mobile crowdsensing system and how important the cloud is in serving the wireless …


On Modelling And Analyzing Composite Resources’ Consumption Cycles Using Time Petri-Nets, Amel Benna, Fatma Masmoudi, Mohamed Sellami, Zakaria Maamar, Rachid Hadjidj Jan 2022

On Modelling And Analyzing Composite Resources’ Consumption Cycles Using Time Petri-Nets, Amel Benna, Fatma Masmoudi, Mohamed Sellami, Zakaria Maamar, Rachid Hadjidj

All Works

ICT community cornerstones (IoT in particular) gain competitive advantage from using physical resources. This paper adopts Time Petri-Nets (TPNs) to model and analyze the consumption cycles of composite resources. These resources consist of primitive, and even other composite, resources that are associated with consumption properties and could be subject to disruptions. These properties are specialized into unlimited, shareable, limited, limited-but-renewable, and non-shareable, and could impact the availability of resources. This impact becomes a concern when disruptions suspend ongoing consumption cycles to make room for the unplanned consumptions. Resuming the suspended consumption cycles depends on the resources’ consumption properties. To ensure …


Multicolor Ramsey And List Ramsey Numbers For Double Stars, Jake Ruotolo Jan 2022

Multicolor Ramsey And List Ramsey Numbers For Double Stars, Jake Ruotolo

Honors Undergraduate Theses

The core idea of Ramsey theory is that complete disorder is impossible. Given a large structure, no matter how complex it is, we can always find a smaller substructure that has some sort of order. For a graph H, the k-color Ramsey number r(H; k) of H is the smallest integer n such that every k-edge-coloring of Kn contains a monochromatic copy of H. Despite active research for decades, very little is known about Ramsey numbers of graphs. This is especially true for r(H; k) when k is at least 3, also known as the multicolor Ramsey number of …


The Global Impact Of Covid-19 And Tourism On Conservation Rangers' Guardianship Capabilities, Zachary Bockler Jan 2022

The Global Impact Of Covid-19 And Tourism On Conservation Rangers' Guardianship Capabilities, Zachary Bockler

Honors Undergraduate Theses

This thesis explores how the COVID-19 pandemic has impacted wildlife rangers with an emphasis on the influences of tourism rates. Two sets of data are used: one is a survey of rangers around the world and the other looks at global governmental tourism data. While coming from a routine activities perspective, the problem of decreased capable guardianship becomes apparent in the form of massively decreased tourism arrivals and troubling ranger perceptions. This data allows for the establishment of tourism trends and changes during COVID. The findings of this thesis link the downturn in tourism with impacts on formal and informal …


All Things Merge Into One, And A River Runs Through It: Exploring The Dimensions Of Blended Learning By Developing A Case Study Template For Blended Activities, Damian Gordon, Paul Doyle, Anna Becevel, Tina Baloh Jan 2022

All Things Merge Into One, And A River Runs Through It: Exploring The Dimensions Of Blended Learning By Developing A Case Study Template For Blended Activities, Damian Gordon, Paul Doyle, Anna Becevel, Tina Baloh

Articles

The BLITT (Blended Learning International Train the Trainer) Project is focused on developing a training programme to equip teachers to become proficient in championing the use of Blended Learning in the classroom. The training programme will be developed in two phases, in the first phase involves the development of a series of case studies relevant to Blended Learning, followed by a second phase where the BLITT training programme will be designed and developed, using input from these cases. In developing the blended learning case studies, two key documents were identified as being essential, first, a case study tracking template to …


Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang Jan 2022

Mitigation Of Algorithmic Bias To Improve Ai Fairness, Kathy Wang

Cybersecurity Undergraduate Research Showcase

As artificial intelligence continues to evolve rapidly with emerging innovations, mass-scale digitization could be disrupted due to unfair algorithms with historically biased data. With the rising concerns of algorithmic bias, detecting biases is essential in mitigating and implementing an algorithm that promotes inclusive representation. The spread of ubiquitous artificial intelligence means that improving modeling robustness is at its most crucial point. This paper examines the omnipotence of artificial intelligence and its resulting bias, examples of AI bias in different groups, and a potential framework and mitigation strategies to improve AI fairness and remove AI bias from modeling techniques.


A Review Of Distributed Identity Technology In Iot Devices, Myles Perry Jan 2022

A Review Of Distributed Identity Technology In Iot Devices, Myles Perry

Cybersecurity Undergraduate Research Showcase

Distributed identity technology provides solutions to many of the faults currently found in federated identity systems. Applying this technology to internet of things devices has many possible benefits in the realm of device authentication. However, this also provides new challenges not present in existing distributed identity systems. The large number of devices that would enter and leave the system means balancing sybil attack vulnerability and linkage attack vulnerability becomes challenging. Internet of things devices also have less memory and computing power than a standard personal computer or phone. This means any protocol to execute distributed identity in these devices must …


Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck Jan 2022

Corporate Cybersecurity In The Context Of M&A Transactions, Cameron Beck

Cybersecurity Undergraduate Research Showcase

The rapid rise of digital devices has unlocked a new dimension of innovation and prosperity in the 21st century. Computers are now an integrated and ubiquitous part of our global culture. You would be hard-pressed to walk into any given room without several computer chips humming inaudibly inside the machines that facilitate our modern world. Even lightbulbs and doorbells are connected to the Internet, capturing information from the world around them and sending that information to the Cloud. The Internet expands access to communication, international marketplaces, entertainment, professional resources, and nearly every book in the world.


Random Password Generation, Kirk Smith Jan 2022

Random Password Generation, Kirk Smith

Cybersecurity Undergraduate Research Showcase

This paper will discuss the topic of random generation, first by explaining the topic, followed by how the literature review was performed. Then, a literature review will be performed, followed by a discussion of human biases and the strength of random password generation.


Cybersecurity & Correctional Institutions, Kelly Himelwright Jan 2022

Cybersecurity & Correctional Institutions, Kelly Himelwright

Cybersecurity Undergraduate Research Showcase

Cybersecurity is becoming an increasingly important aspect of correctional operations. To properly maintain security, more jails and prisons are using comprehensive cyber protection techniques. Correctional facilities face risks that were perhaps unimaginable only a few decades ago. Many organizations have used information technology to help them run their businesses, but few have the resources or vision to foresee and adequately manage the cyber dangers that come with it. Institutions need to be more aware of these hazards, as well as have more information security experts on staff.


Digital Forensic Investigation, Dejuan Green Jan 2022

Digital Forensic Investigation, Dejuan Green

Cybersecurity Undergraduate Research Showcase

Finding, acquiring, processing, analyzing, and reporting data on electronically stored data is the main goal of the forensic science discipline known as "digital forensics." Nearly all illegal acts include the use of electronic evidence, making digital forensics support essential for law enforcement investigations. Furthermore, digital forensics is very important to cases aiding in many cases and can lead to saving lives/ victims and locking up criminals. A wide range of devices, including laptops, cellphones, remote storage, unmanned aerial systems, shipborne equipment, and more, can be used to gather electronic evidence. [2] Digital forensics' major objective is to take data from …


Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah Jan 2022

Understanding The Effectivity And Increased Reliance Of Credit Risk Machine Learning Models In Banking, Grishma Baruah

Cybersecurity Undergraduate Research Showcase

Credit risk analysis and making accurate investment and lending decisions has been a challenge for the financial industry for many years, as can be seen with the 2008 financial crisis. However, with the rise of machine learning models and predictive analytics, there has been a shift to increased reliance on technology for determining credit risk. This transition to machine learning comes with both advantages, such as potentially eliminating human error and assumptions from lending decisions, and disadvantages, such as time constraints, data usage inabilities, and lack of understanding nuances in machine learning models. In this paper, I look at four …


Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins Jan 2022

Cyber Threat On The High Seas. A Growing Threat To Infrastructure, James Cummins

Cybersecurity Undergraduate Research Showcase

In a growing digital and cloud-connected world, all aspects of our lives are becoming interconnected. All these interconnections breed a possibility for ever-increasing cybersecurity threats. The oceans are not impervious to these attacks. In this research paper, we address the following questions.

What threats do commercial ships face today?

What actions are necessary to mitigate these threats?


Examining Trends And Experiences Of The Last Four Years Of Socially Engineered Ransomware Attacks, William Seymour Jan 2022

Examining Trends And Experiences Of The Last Four Years Of Socially Engineered Ransomware Attacks, William Seymour

Cybersecurity Undergraduate Research Showcase

This study examines and reports the trends of social engineering-based ransomware attacks over the past four years from three major technology corporations. The focus of the reports was on major threat actors and their attacks against the corporations and their clients. The data were organized chronologically by year, and prevalent or abnormal findings were shared in this report. It was found that social engineering attacks were tremendously effective. Many ransomware attacks stemmed from Phishing. Social engineering approaches allowed attackers to conduct breaches using ransomware applications like GandCrab and Ryuk. Humans are incredibly susceptible and fall for social engineering tactics- primarily …


Security Issues With Network Connected Scada Systems, Chad Holm Jan 2022

Security Issues With Network Connected Scada Systems, Chad Holm

Cybersecurity Undergraduate Research Showcase

The use of Supervisory Control and Data Acquisition (SCADA) systems has become common place and are being used in several different industries. These have evolved as the technology has progressed. The use of Internet of Things (IOT) devices makes for less human intervention to run daily operations in these industries. This can also allow hackers to gain access to these devices due to security holes that are overlooked. There have several different ways that have been exploited on SCADA networks and the goal is to recognize and secure them so hackers cannot gain access to them.