Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Earth Sciences (58712)
- Computer Sciences (57910)
- Environmental Sciences (52359)
- Engineering (40194)
- Life Sciences (39771)
-
- Physics (36517)
- Chemistry (34514)
- Geology (29714)
- Mathematics (27374)
- Social and Behavioral Sciences (24563)
- Oceanography and Atmospheric Sciences and Meteorology (16422)
- Statistics and Probability (13246)
- Education (12802)
- Computer Engineering (12790)
- Soil Science (11974)
- Medicine and Health Sciences (11782)
- Plant Sciences (11182)
- Natural Resources and Conservation (10267)
- Arts and Humanities (9725)
- Astrophysics and Astronomy (9201)
- Electrical and Computer Engineering (8897)
- Sustainability (8675)
- Natural Resources Management and Policy (8567)
- Artificial Intelligence and Robotics (8483)
- Water Resource Management (8291)
- Applied Mathematics (7988)
- Environmental Health and Protection (6879)
- Science and Mathematics Education (6756)
- Databases and Information Systems (6718)
- Institution
-
- University of Nebraska - Lincoln (24230)
- Western Michigan University (19508)
- Selected Works (16838)
- University of Kentucky (12002)
- TÜBİTAK (10317)
-
- Singapore Management University (7446)
- Utah State University (7340)
- Missouri University of Science and Technology (6056)
- Old Dominion University (5950)
- University of Wollongong (4868)
- William & Mary (4602)
- University of South Florida (3859)
- Wright State University (3840)
- Portland State University (3797)
- University of Nevada, Las Vegas (3640)
- Louisiana State University (3417)
- China Simulation Federation (3363)
- City University of New York (CUNY) (3219)
- Brigham Young University (2906)
- Purdue University (2813)
- Air Force Institute of Technology (2678)
- Claremont Colleges (2640)
- California Polytechnic State University, San Luis Obispo (2562)
- Western Washington University (2456)
- University of Arkansas, Fayetteville (2433)
- University of Texas Rio Grande Valley (2419)
- Department of Primary Industries and Regional Development, Western Australia (2355)
- University of Texas at El Paso (2316)
- Chinese Chemical Society | Xiamen University (2294)
- Chulalongkorn University (2268)
- Keyword
-
- Machine learning (1687)
- Climate change (1680)
- Western Australia (1581)
- Mathematics (1369)
- Chemistry (1157)
-
- Sustainability (1141)
- Physics (1068)
- Water quality (983)
- Deep learning (890)
- Geology (858)
- Groundwater (851)
- Machine Learning (827)
- Simulation (824)
- Research and Technical Reports (797)
- Water (780)
- United States (757)
- Education (755)
- Management (745)
- Nebraska (744)
- Agriculture (718)
- Artificial intelligence (706)
- Climate (702)
- GIS (698)
- Statistics (685)
- Security (681)
- Grains and field crops (674)
- Environment (672)
- Computer Science (667)
- Ecology (657)
- Optimization (656)
- Publication Year
-
- 2024 (7828)
- 2023 (12570)
- 2022 (18298)
- 2021 (27876)
- 2020 (15205)
-
- 2019 (15926)
- 2018 (13644)
- 2017 (12521)
- 2016 (12690)
- 2015 (12617)
- 2014 (12299)
- 2013 (11462)
- 2012 (12196)
- 2011 (10326)
- 2010 (8621)
- 2009 (7616)
- 2008 (7321)
- 2007 (6758)
- 2006 (5872)
- 2005 (5573)
- 2004 (4447)
- 2003 (3876)
- 2002 (3435)
- 2001 (3030)
- 2000 (2919)
- 1999 (2555)
- 1998 (2574)
- 1997 (2472)
- 1996 (2437)
- 1995 (2193)
- Publication
-
- Legacy Scout Tickets from Pure Oil Company (11044)
- Theses and Dissertations (8341)
- IGC Proceedings (1993-2023) (7001)
- Research Collection School Of Computing and Information Systems (6884)
- Thin Sections (5745)
-
- Electronic Theses and Dissertations (4194)
- Faculty Publications (3783)
- Journal of System Simulation (3363)
- Nebraska Tractor Tests (3348)
- Turkish Journal of Electrical Engineering and Computer Sciences (3020)
- Masters Theses (2634)
- Turkish Journal of Chemistry (2628)
- Turkish Journal of Mathematics (2494)
- Journal of Electrochemistry (2294)
- Honors Theses (2158)
- Faculty of Informatics - Papers (Archive) (2013)
- Physics Faculty Publications (1942)
- Bulletin of the Mineral Research and Exploration (1893)
- Doctoral Dissertations (1882)
- Dissertations, Theses, and Masters Projects (1876)
- Reports (1835)
- Dissertations (1816)
- Physics Faculty Research & Creative Works (1762)
- Department of Computer Science Technical Reports (1721)
- USF Tampa Graduate Theses and Dissertations (1607)
- School of Natural Resources: Faculty Publications (1586)
- United States Department of Agriculture Wildlife Services: Staff Publications (1529)
- Australian Institute for Innovative Materials - Papers (1524)
- Electronic Thesis and Dissertation Repository (1476)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1427)
- Publication Type
Articles 40681 - 40710 of 302474
Full-Text Articles in Physical Sciences and Mathematics
Retaining Competitive Advantage In Ship Recycling Under The New Regulatory Framework: A Case Study Of Bangladesh, Wahidul Sheikh
Retaining Competitive Advantage In Ship Recycling Under The New Regulatory Framework: A Case Study Of Bangladesh, Wahidul Sheikh
World Maritime University Dissertations
No abstract provided.
Fuel Oil Bunkering Mechanism And Ways Ahead In Strategic Enforcement, Sudhir Kumar Shrivastava
Fuel Oil Bunkering Mechanism And Ways Ahead In Strategic Enforcement, Sudhir Kumar Shrivastava
World Maritime University Dissertations
No abstract provided.
The Implementation Of The Ballast Water Management Convention In Timor-Leste, Domingos Ximenes Nunes
The Implementation Of The Ballast Water Management Convention In Timor-Leste, Domingos Ximenes Nunes
World Maritime University Dissertations
No abstract provided.
Examining The Island States Process Of Planning, Preparedness, And Response To The Oil Spills Using A Case Study Of The Mv Wakashio Oil Spill, Ishara Gihan Dharmasiri
Examining The Island States Process Of Planning, Preparedness, And Response To The Oil Spills Using A Case Study Of The Mv Wakashio Oil Spill, Ishara Gihan Dharmasiri
World Maritime University Dissertations
No abstract provided.
The Impact Of Waste-To-Energy Sustainability Projects In Port On Society: A Case Study In Copenhagen-Malmö Port (Cmp), Dumisa Kevin January
The Impact Of Waste-To-Energy Sustainability Projects In Port On Society: A Case Study In Copenhagen-Malmö Port (Cmp), Dumisa Kevin January
World Maritime University Dissertations
No abstract provided.
A Scenario-Based Analysis Of The Domestic Law Of Argentina In The Context Of The Nairobi Wreck Removal Convention, Laura Noelia Sanchez
A Scenario-Based Analysis Of The Domestic Law Of Argentina In The Context Of The Nairobi Wreck Removal Convention, Laura Noelia Sanchez
World Maritime University Dissertations
No abstract provided.
Maritime Cybersecurity: Comparing Practices Between Developing Countries : The Case Study Of Kenya And Spain, Bibian Turyahumura
Maritime Cybersecurity: Comparing Practices Between Developing Countries : The Case Study Of Kenya And Spain, Bibian Turyahumura
World Maritime University Dissertations
No abstract provided.
An Assessment Of The Awaraness Level Of Coastal And Upland Communities In Nigeria On The Impacts Of Marine Litter On The Ocean And Its Ecosystem Services., Yakubu Abubakar
World Maritime University Dissertations
No abstract provided.
Assessing The Effectiveness Of Community Action On Marine And Coastal Litter: Case Study Through The Prism Of Social Media Groups In A Maltese Locality (Mellieha), Tessy Umbuwa Anjide
Assessing The Effectiveness Of Community Action On Marine And Coastal Litter: Case Study Through The Prism Of Social Media Groups In A Maltese Locality (Mellieha), Tessy Umbuwa Anjide
World Maritime University Dissertations
No abstract provided.
Analysis Of Marine Plastic Litter Policies In Ghana, Perfect Ashai
Analysis Of Marine Plastic Litter Policies In Ghana, Perfect Ashai
World Maritime University Dissertations
No abstract provided.
Natural Resource Damage Assessment For Oil Spills In Sri Lanka: The Application Of Habitat Equivalency Analysis, Sayakkara Mesthrilage Dinishiya Athukorala
Natural Resource Damage Assessment For Oil Spills In Sri Lanka: The Application Of Habitat Equivalency Analysis, Sayakkara Mesthrilage Dinishiya Athukorala
World Maritime University Dissertations
No abstract provided.
A Multiple Case Study Of Meti Cybersecurity Education And Training: A Basis For The Development Of A Guiding Framework For Educational Approaches, Jeric Bacasdoon
A Multiple Case Study Of Meti Cybersecurity Education And Training: A Basis For The Development Of A Guiding Framework For Educational Approaches, Jeric Bacasdoon
World Maritime University Dissertations
No abstract provided.
Blue Carbon Marine Habitats In Nigeria: Ecosystem Services, Threats And Implication For Ecosystem Based Management, Oluremi Taiwo Filani
Blue Carbon Marine Habitats In Nigeria: Ecosystem Services, Threats And Implication For Ecosystem Based Management, Oluremi Taiwo Filani
World Maritime University Dissertations
No abstract provided.
Challenges/Issues Of Implementing Marpol Annex Vi In Papua New Guinea: An Assessment From The Regulator's Point Of View With Recommendations For National Implementation., Sammy Kalepo
World Maritime University Dissertations
No abstract provided.
A Study Of Accession And Implementation Of The 2004 Bwm Convention In Vietnam: Challenges And Sollutions., Quy Thanh La
A Study Of Accession And Implementation Of The 2004 Bwm Convention In Vietnam: Challenges And Sollutions., Quy Thanh La
World Maritime University Dissertations
No abstract provided.
Challenges And Potential For Egyptian Oil Spill Contingency Plan: A Comparative Study For Improving Oil Spill Preparedness : Case Study Gulf Of Suez And North Sea, Ahmed Raafat Reiad Nasreldin
Challenges And Potential For Egyptian Oil Spill Contingency Plan: A Comparative Study For Improving Oil Spill Preparedness : Case Study Gulf Of Suez And North Sea, Ahmed Raafat Reiad Nasreldin
World Maritime University Dissertations
No abstract provided.
Port Throughput Forecasting Using Arima And Ols Regression: Case Study : Gwangyang Port In Korea, Shin Park
Port Throughput Forecasting Using Arima And Ols Regression: Case Study : Gwangyang Port In Korea, Shin Park
World Maritime University Dissertations
No abstract provided.
Digitalization In Ship Management And Operations: Use Of Digital Twin Technology To Monitor Marine Fouling, Walid Mohamed Ali Awadh Timimi
Digitalization In Ship Management And Operations: Use Of Digital Twin Technology To Monitor Marine Fouling, Walid Mohamed Ali Awadh Timimi
World Maritime University Dissertations
No abstract provided.
Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan
Emotional Analysis Of Learning Cybersecurity With Games Using Iot, Maria Valero, Md Jobair Hossain, Shahriar Sobhan
KSU Proceedings on Cybersecurity Education, Research and Practice
The constant rise of cyber-attacks poses an increasing demand for more qualified people with cybersecurity knowledge. Games have emerged as a well-fitted technology to engage users in learning processes. In this paper, we analyze the emotional parameters of people while learning cybersecurity through computer games. The data are gathered using a non-invasive Brain-Computer Interface (BCI) to study the signals directly from the users’ brains. We analyze six performance metrics (engagement, focus, excitement, stress, relaxation, and interest) of 12 users while playing computer games to measure the effectiveness of the games to attract the attention of the participants. Results show participants …
Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz
Resilience Vs. Prevention. Which Is The Better Cybersecurity Practice?, Frank Katz
KSU Proceedings on Cybersecurity Education, Research and Practice
Students in multiple cohorts of our 3000 level Fundamentals of Information Systems Security course were given a discussion question where they had to either agree or disagree with the premise that given all the constant threats to our systems, we should dedicate more of our efforts to quickly repairing the damage of an attack rather than dedicate more of our time and energies to preventing such attacks. They were required to give their reasoning and provide sources to back up their analysis of his comment.
This paper will describe and explain the concept of cyber resiliency. It will then evaluate …
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
Warshipping: Hacking The Mailroom, Jackson Szwast, Bryson Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
Everyone knows what package shipping is, but not everyone knows what warshipping is. Corporate mailrooms are rarely considered as part of the cybersecurity attack surface of most organizations, but they offer physical access to millions of uninspected packages daily. UPS shipped 5.5 billion items last year, with their daily average being 21.9 million items and operating through 1,800 locations in 2020. FedEx shipped 6.5 million packages daily and operates 2,150 locations. The United States Postal Service delivered 143 billion pieces of mail in 2019. Increasingly the world’s consumers are relying on e-commerce, and during the recent COVID-19 pandemic, package deliveries …
Incidence Matrix And Some Of Its Applications In Graph Theory, Hizer Leka, Faton Kabashi
Incidence Matrix And Some Of Its Applications In Graph Theory, Hizer Leka, Faton Kabashi
UBT International Conference
In this paper we will focus mainly on some basic concepts and definitions regarding incidence matrices and some examples of their application in graph theory. To give their clearest definition of the incidence matrix, we will first give the meaning of the incidence structure, then through it to define the incidence matrix. The structure of incidence is called the ordered triplet S=(P,B,I), where P∩B=ϕ, I⊆P×B and P,B while, are two non-empty sets and I a relation in between them, such that I⊂P×B. We call the elements of P community dots and we will mark them in lower case letters of, …
Internet Of Things In Healthcare: A Review, Faton Kabashi, Lamir Shkurti, Hizer Leka, Vehbi Sofiu, Nazmi Misini
Internet Of Things In Healthcare: A Review, Faton Kabashi, Lamir Shkurti, Hizer Leka, Vehbi Sofiu, Nazmi Misini
UBT International Conference
In the current era, there is a requirement of a system with connected devices, persons, time, places, and networks, which is completely incorporated in what is called as Internet of Things (IoT). IoT is developed toward making the objects smart and connectable using recent development in miniaturizing and communication technologies. IoT can change the way human being live their life by making it their more convenient and smart. IoT has wide application domains one of them is healthcare. Healthcare is one of the application domains in IoT that draws enormous interest from industry, the research community, and the public sector. …
Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli
Importance Of Cryptography In The Government, Gazmend Krasniqi, Agnesa Pefqeli
UBT International Conference
This paper first of all reflects the need for encryption and then the importance it has managed to accumulate over thousands of years of use. Various factors, mainly of a purpose; being powerful, have influenced the rapid development and stressed the importance of encryption in governing bodies.
Depending on in which part of the world it is used and for what reasons it is developed, the importance of cryptography in different governments has shifted to the more powerful states.
Governments have encountered conflicts due to the popularization of encryption, where users of encryption belonging to the non-governmental communities have declined …
The Impact Of Geogebra On Learning The Concept Of Quadratic Function, Nazmi Misini, Faton Kabashi
The Impact Of Geogebra On Learning The Concept Of Quadratic Function, Nazmi Misini, Faton Kabashi
UBT International Conference
There are many software programs used in math, but we have noticed that the Geogebra program is more equipped for our groups of different ages, it is useful for elementary math teachers and even in bachelor's undergraduate teaching. It is useful for students to teach math at each school level, it's fun and fun using GeoGebra - thus encouraging students to deepen more and more in math. The purpose of this quasi-experimental research is to show how GeoGebra can be used to learn the concept of quadratic function within the subject of mathematics at the high school level. Research will …
Blockchain Invoicing For Government Services, Vehbi Neziri, Ramadan Dervishi, Blerim Rexha
Blockchain Invoicing For Government Services, Vehbi Neziri, Ramadan Dervishi, Blerim Rexha
UBT International Conference
Blockchain technology is known primarily through the cryptocurrency bitcoin, but has begun to find application in other areas for both public and private services, including, but not limited to, payments, electronic voting, health, government services etc. Blockchain technology potential relay on its capability to store all transactions records and makes them available to all parties with permission to view, but no one can make unauthorized changes to them. Many government service providers have to bill the government for the services they provide, but non-standardized and unverified manual or electronic invoicing often leads to double invoicing or payment. As a result …
Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar
Towards Assessing Password Workarounds And Perceived Risk To Data Breaches For Organizational Cybersecurity Risk Management Taxonomy, Michael J. Rooney, Yair Levy, Wei Li, Ajoy Kumar
KSU Proceedings on Cybersecurity Education, Research and Practice
Cybersecurity involves a broad range of techniques, including cyber-physical, managerial, and technical, while authentication provides a layer of protection for Information Systems (IS) against data breaches. The recent COVID-19 pandemic brought a tsunami of data breach incidents worldwide. Authentication serves as a mechanism for IS against unauthorized access utilizing various defense techniques, with the most popular and frequently used technique being passwords. However, the dramatic increase of user accounts over the past few decades has exposed the realization that technological measures alone cannot ensure high level of IS security; this leaves the end-users holding a critical role in protecting their …
Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim
Analyzing Robotics Software Vulnerabilities, Hossain Shahriar, Md Jobair Hossain Faruk, Shahriar Sobhan, Mohammad Nazim
KSU Proceedings on Cybersecurity Education, Research and Practice
Robots are widely used in our day-to-day life in various domains. For example, eldercare robots, such as CareO-Bots [1]are used to perform household tasks and provide mobility assistance [2]. Amazon uses manufacturing robots to accomplish manufacturing labor activities, such as welding and assembling equipment [2]. According to the International Data Corporation, spending on robotics is expected to reach USD 241.4 billion by the end of 2023 [4].
However, malicious users can exploit security vulnerabilities in hardware and software components of robotics systems to conduct security attacks and cause malfunction, i.e., deviate robots from their expected behaviors. Security attacks on robots …
Chatbot In Banks Of Kosovo And Albania, Festinë Retkoceri, Festim Halili
Chatbot In Banks Of Kosovo And Albania, Festinë Retkoceri, Festim Halili
UBT International Conference
Not so long ago Artificial Intelligence was only in the realm of scientific fiction. Today, it has become a reality and is growing every day more prominent in many different industries. Chatbots enable machines to mimic human conversation. This paper is an attempt to study the use of artificial intelligence and natural language processing in Albanian banks and Kosovo banks regarding the use of Albanian-speaking Chatbots and how to become a more intelligent chatbot. The data is collected from sources that are in the public domain, such as banking websites.
One-Time Pad Cipher (Otp) Use Cases And Simulation Examples For Electronic Financial Transactions, Ana Savic, Goran Bjelobaba, Nikola Popović, Hana Stefanovic
One-Time Pad Cipher (Otp) Use Cases And Simulation Examples For Electronic Financial Transactions, Ana Savic, Goran Bjelobaba, Nikola Popović, Hana Stefanovic
UBT International Conference
Network This paper presents some applications of One-Time pad (OTP) cipher in business communications and processing the electronic financial transactions. Several simulation models created in the CrypTool, making a mention of the misuse and weaknesses if the same OTP key is used several times, are also given. Some examples of processing an electronic financial transaction through the application of the OTP are proposed.