Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 4231 - 4260 of 302419

Full-Text Articles in Physical Sciences and Mathematics

Late 3d Transition Metal Complexes Of Bis(Diphenylphosphino)Methane Dichalcogenide Ligands, Connor J. Lehner Apr 2024

Late 3d Transition Metal Complexes Of Bis(Diphenylphosphino)Methane Dichalcogenide Ligands, Connor J. Lehner

Research & Creative Achievement Day

Complexes of bis(diphenylphosphino)methane dichalcogenides (dppmE2, E = O, S, Se) have been prepared for Co(II), Ni(II) and Cu(II) by combination with respective nitrate salts. These ligands are relatively unexplored for 1st row transition metals – with no existing reports of metal complexes for dppmSe2. All obtained complexes were paramagnetic precluding characterization by NMR spectroscopy. An array of methods have been employed to ascertain the structural and electronic forms of all obtained complexes as both tetrahedral and octahedral geometries, corresponding to systems with two or three ligands, respectively, are plausible. Additionally, Co(II) complexes, as d7 systems, could be found in either …


Genetic Association In Entylia Carinata Using Random Forest Classification, Caden J. Harper Apr 2024

Genetic Association In Entylia Carinata Using Random Forest Classification, Caden J. Harper

Research & Creative Achievement Day

The goal of this research was to identify locations in the genome of the Entylia carinata, known as the treehopper, that are associated with anomalous behavior exhibited by the species. Treehoppers are phytophagous insects and are shown to feed, reproduce, and rear their young on specific aster species. Observation has shown that the insects will disregard potential mates in close proximity in favor of those that originate from the same plant species as themselves. This behavior suggests genetic separation in the species based on plant nativity and warrants genetic analysis. Machine learning offers an effective genetic association technique due to …


Anomalies Within Winona Campus On Protected Wavelengths, Landyn L. Schroeder, Carly Fitzgerald, Sammy Schneider Apr 2024

Anomalies Within Winona Campus On Protected Wavelengths, Landyn L. Schroeder, Carly Fitzgerald, Sammy Schneider

Research & Creative Achievement Day

The present study is being conducted with the intention of identifying where, why, and what is transmitting a radio signal of 1419 MHz. This anomaly is intriguing because 1400-1427 MHz waves are protected. Because this is a protected wave, it was interesting that it was being transmitted on Winona State Campus which is where the team began research. To gain information, the research team cast the horn to the sky at an elevation of 37 degrees and in the directions of 344 , 213, 143, and 60 degrees bearing, respectively. Now that this baseline information has been collected, the team …


Spoton, Corey A. Naegle, Caleb Mcclure, Chase M. Tallon, Holden J. O'Neal Apr 2024

Spoton, Corey A. Naegle, Caleb Mcclure, Chase M. Tallon, Holden J. O'Neal

ATU Research Symposium

SpotOn is a project developed to solve problems with owners losing their pets. The project is in short a solar-powered dog harness with GPS capability with its own application for mobile devices.


Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan Apr 2024

Techniques To Detect Fake Profiles On Social Media Using The New Age Algorithms – A Survey, A K M Rubaiyat Reza Habib, Edidiong Elijah Akpan

ATU Research Symposium

This research explores the growing issue of fake accounts in Online Social Networks [OSNs]. While platforms like Twitter, Instagram, and Facebook foster connections, their lax authentication measures have attracted many scammers and cybercriminals. Fake profiles conduct malicious activities, such as phishing, spreading misinformation, and inciting social discord. The consequences range from cyberbullying to deceptive commercial practices. Detecting fake profiles manually is often challenging and causes considerable stress and trust issues for the users. Typically, a social media user scrutinizes various elements like the profile picture, bio, and shared posts to identify fake profiles. These evaluations sometimes lead users to conclude …


Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer Apr 2024

Enhancing R2l Intrusion Detection Using Decision Trees, Stephen Sommer

Research & Creative Achievement Day

In the age of advancing technology, artificial intelligence, and big data, Remote to Local (R2L) attacks are increasingly threatening cloud computing environments, heightening concerns about security and privacy. Intrusion detection systems (IDS) using Artificial Intelligence play a role in safeguarding data integrity within databases by swiftly identifying and isolating suspicious records. Furthermore, machine learning techniques enhance the effectiveness of these IDS by continuously adapting to new attack patterns and improving accuracy. This research investigates the use of Decision Tree, a Machine Learning Algorithm for enhancing Remote to Local (R2L) intrusion detection capabilities, utilizing the KDD Cup 1999 dataset and the …


Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni Apr 2024

Anomaly Detection With Spiking Neural Networks (Snn), Shruti Bhandari, Vyshnavi Gogineni

ATU Research Symposium

Abstract:

Anomaly detection, the identification of rare or unusual patterns that deviate from normal behavior, is a fundamental task with wide-ranging applications across various domains. Traditional machine learning techniques often struggle to effectively capture the complex temporal dynamics present in real-world data streams. Spiking Neural Networks (SNNs), inspired by the spiking nature of biological neurons, offer a promising approach by inherently modeling temporal information through precise spike timing. In this study, we investigate the use of Spiking Neural Networks (SNNs) for detecting anomalies or unusual patterns in data. We propose an SNN model that can learn what constitutes normal …


Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden Apr 2024

Innovating Inventory And Alert Systems With Object Tracking, Juan Harmse, Esther Peden

Campus Research Day

Security system users require safeguarding inventory from potential theft while reducing manual tracking of physical objects. Our contribution harnesses the power of artificial intelligence and computer vision with YOLO to automate the process of tracking inventory items. The system sends alerts to the inventory manager when it detects particular events. Our approach was evaluated with KernProf profiling, interference, and orientation tests. The results were overall positive in these testing areas.


2024 April 18 - Tennessee Weekly Drought Summary, Tennessee Climate Office, East Tennessee State University Apr 2024

2024 April 18 - Tennessee Weekly Drought Summary, Tennessee Climate Office, East Tennessee State University

Tennessee Climate Office Weekly Drought Summaries

No abstract provided.


Radiative Cooling For Energy-Efficient Power Generation, Rickia Hanna Apr 2024

Radiative Cooling For Energy-Efficient Power Generation, Rickia Hanna

Celebrating Scholarship and Creativity Day (2018-)

This thesis examined radiative cooling on a small scale using a hybrid photovoltaic/radiative cooling model system, to determine its efficiency for large-scale power generation. Radiative cooling is concerned with heat transfer and this thesis’s main goal is to harness that heat energy to produce electricity. The efficiency of the system was tested using various light sources at different angles and total power output. The testing was done several times and there proved to be a proportional relationship between light intensity and current output. However, due to the performance threshold of the PTEC module, the component of the system used to …


The Lowest Discriminant Ideal Of Cayley-Hamilton Hopf Algebras, Zhongkai Mi Apr 2024

The Lowest Discriminant Ideal Of Cayley-Hamilton Hopf Algebras, Zhongkai Mi

LSU Doctoral Dissertations

Discriminant ideals are defined for an algebra R with central subalgebra C and trace tr : R → C. They are indexed by positive integers and more general than discriminants. Usually R is required to be a finite module over C. Unlike the abundace of work on discriminants, there is hardly any literature on discriminant ideals. The levels of discriminant ideals relate to the sums of squares of dimensions of irreducible modules over maximal ideals of C containing these discriminant ideals. We study the lowest level when R is a Cayley-Hamilton Hopf algebra, i.e. C is also a Hopf subalgebra, …


Statistics For Iwasawa Invariants Of Elliptic Curves, Ii, Debanjana Kundu, Anwesh Ray Apr 2024

Statistics For Iwasawa Invariants Of Elliptic Curves, Ii, Debanjana Kundu, Anwesh Ray

School of Mathematical and Statistical Sciences Faculty Publications and Presentations

We study the average behavior of the Iwasawa invariants for Selmer groups of elliptic curves. These results lie at the intersection of arithmetic statistics and Iwasawa theory. We obtain lower bounds for the density of rational elliptic curves with prescribed Iwasawa invariants.


Critical Raw Material In Mineral Elements Found In Fly Ashes From The Czech Republic Power Plant, Agnieszka Klupa Apr 2024

Critical Raw Material In Mineral Elements Found In Fly Ashes From The Czech Republic Power Plant, Agnieszka Klupa

Journal of Sustainable Mining

The economic development of EU countries is limited due to limited access to a number of mineral raw materials, which necessitates actions aimed at securing the supply of CRM. For this reason, CRMs constitute elements of particular importance for the EU. The aim of the study was to assess the content of CRMs as a potential source of REY in fly ash resulting from the coal combustion in one of the power plants in the Czech Republic. In the tested ash the main phases are: glassy phase, mullite and quartz. The chemical composition of the tested fly ashes showed dominance …


Accessing Advanced National Supercomputing And Storage Resources For Computational Research, Ramazan Aygun Apr 2024

Accessing Advanced National Supercomputing And Storage Resources For Computational Research, Ramazan Aygun

All Things Open

This presentation will cover ACCESS (Advanced Cyberinfrastructure Coordination Ecosystem: Services & Support), and Kennesaw State University's involvement in Open Science Data Federation program as a data origin to help researchers and educators with or without supporting grants to utilize the nation’s advanced computing systems and services. ACCESS, a program established and funded by the National Science Foundation, is an ecosystem with capabilities for new modes of research and further democratizing participation. The presentation covers how to apply for allocations on ACCESS. The last part of the presentation will briefly explain Open Science Data Federation and Kennesaw State University's involvement as …


“Don’T Call On Me!”: Mediating Preservice Elementary Teachers’ Mathematics Anxiety In A Problem-Based Classroom, Christina Koehne, Wenyen Huang, Nataly Chesky Apr 2024

“Don’T Call On Me!”: Mediating Preservice Elementary Teachers’ Mathematics Anxiety In A Problem-Based Classroom, Christina Koehne, Wenyen Huang, Nataly Chesky

Excelsior: Leadership in Teaching and Learning

This study aims to understand the ways in which problem-based teaching in a mathematics content course can alleviate pre-service elementary school teachers' mathematics anxiety. The significance of this work is to help increase the content and pedagogical knowledge of mathematics education, as outlined in STEM policies. Using a mixed method approach, the teachers-researchers explore what methods, procedures, and other perhaps unknown variables, helped pre-service elementary teachers decrease their mathematics anxiety during two mathematics content courses. The findings illuminate five major themes the authors discuss, which are illustrated by rich descriptions of students’ narratives and interviews. Given the importance of mathematics …


Building A Strategic Framework With A Sustainability Lens At Wcu, Stefanie Schwalm Apr 2024

Building A Strategic Framework With A Sustainability Lens At Wcu, Stefanie Schwalm

Sustainability Research & Practice Seminar Presentations

Dr. Stefanie Schwalm, WCU Associate Provost for Accreditation, SRPS Spring '24 4/17: "Building a Strategic Framework with a Sustainability Lens at WCU."


Bioheat Equation Analysis, Johnathan Makar Apr 2024

Bioheat Equation Analysis, Johnathan Makar

Mathematics Student Work

In our research, we are investigating Pennes Bioheat equation, which is used for simulating the propagation of heat energy in human tissues. This equation was proposed by Pennes in 1948 based on his experiments of measuring the radial temperature distribution in the forearm of nine subjects. Pennes' equation provides the theoretical basis for studying heat transfer in perfused tissue and has been widely studied since then. However, Pennes' equation has been criticized for various reasons, including the fact that his experimental data did not seem to match the model. One of the objectives of our work is to find the …


An Augmented Matched Interface And Boundary (Amib) Method For Solving Problems On Irregular 2d Domains, Benjamin Pentecost Apr 2024

An Augmented Matched Interface And Boundary (Amib) Method For Solving Problems On Irregular 2d Domains, Benjamin Pentecost

Mathematics Student Work

A new method called Augmented Matched Interface and Boundary (AMIB) has been developed to solve partial differential equation models, such as the heat equation, over irregular two-dimensional domains. The original AMIB method features unique numerical treatments to solve problems with various boundary conditions and shapes, resulting in highly accurate and efficient numerical solutions. However, recent numerical experiments have revealed that the original AMIB method can fail when dealing with sharply curved boundaries. To address this issue, new numerical techniques have been introduced in our latest work to enhance the robustness of the AMIB method. These techniques have been numerically verified …


The Relationship Between Fatalities In Police Violence And Their Identifying Characteristics: Age, Gender, Race, And Region, Yuechu Hu Apr 2024

The Relationship Between Fatalities In Police Violence And Their Identifying Characteristics: Age, Gender, Race, And Region, Yuechu Hu

Undergraduate Research Symposium 2024

Police violence, highlighted by the George Floyd incident in 2020, has intensified concerns about police brutality and perceived racism in U.S. law enforcement (AP News, 2022). Therefore, we intend to analyze Fatal Encounters data, which documents non-police deaths that occur in the presence of the police in the United States. By creating statistical tables and graphs, as well as applying time-series methods, classification and regression trees, and a multinomial logistic regression model, we find that males and transgender people are more likely than females to encounter victimization during police brutality enforcement for any cause of death. Victims older than 19 …


Providing Beginners With Interactive Exploration Of Error Messages In Clojure, John Walbran, Elena Machkasova Apr 2024

Providing Beginners With Interactive Exploration Of Error Messages In Clojure, John Walbran, Elena Machkasova

Undergraduate Research Symposium 2024

Programmers are imperfect, and will often make mistakes when programming and create a program error, for example, attempting to divide by zero. When a computer tries to run a program with an error, the program will halt and present the details of the error to the user in the form of an error message. These error messages are often very jargon-heavy, and are not designed to be palatable to a novice programmer. This creates significant friction for new programmers trying to learn programming languages. This work is a part of an ongoing project (called Babel) led by Elena Machkasova in …


Enhancing Evolutionary Computation: Optimizing Phylogeny-Informed Fitness Estimation Through Strategic Modifications, Chenfei Peng, Nic Mcphee Apr 2024

Enhancing Evolutionary Computation: Optimizing Phylogeny-Informed Fitness Estimation Through Strategic Modifications, Chenfei Peng, Nic Mcphee

Undergraduate Research Symposium 2024

In evolutionary computation, programs are developed using evolution's basic principles, such as selection, mutation, and recombination, to iteratively improve problem solutions towards optimal outcomes in a reasonable amount of time. To save time and be more efficient, we are currently exploring a modified version of phylogeny-informed fitness estimation. The original version evaluates each individual program on a subset of the training cases and estimates the performance everywhere else according to its parent's performance. Our approach involves comprehensive evaluation of promising programs across all training cases, increasing computational investment where the sub-sampled results indicated potential gains. This method led to our …


Legal Process Durations In Domestic Violence Cases, Gabrielle Meyers, Jon Anderson Apr 2024

Legal Process Durations In Domestic Violence Cases, Gabrielle Meyers, Jon Anderson

Undergraduate Research Symposium 2024

Slow court case processing is a significant concern, particularly in regard to their adverse implications for survivors of serious crimes such as domestic abuse and sexual assault. This study investigates a number of factors that may influence the duration of court case proceedings using court records from three Minnesota counties. Focusing on cases of domestic violence, sexual assault, kidnapping, harassment, stalking, and various other sex crimes, we employ survival analysis methods to explore the effects of various factors on the duration of court case processing. Our analysis considers the effects of factors such as type of crime, form of legal …


Scanning Electrochemical Microscopy Reveals That Model Silicon Anodes Demonstrate Global Solid Electrolyte Interphase Passivation Degradation During Calendar Aging, Josefine D. Mcbrayer, Noah B. Schorr, Mila Nhu Lam, Melissa L. Meyerson, Katharine L. Harrison, Shelley D. Minteer Apr 2024

Scanning Electrochemical Microscopy Reveals That Model Silicon Anodes Demonstrate Global Solid Electrolyte Interphase Passivation Degradation During Calendar Aging, Josefine D. Mcbrayer, Noah B. Schorr, Mila Nhu Lam, Melissa L. Meyerson, Katharine L. Harrison, Shelley D. Minteer

Chemistry Faculty Research & Creative Works

Silicon is a promising next-generation anode to increase energy density over commercial graphite anodes, but calendar life remains problematic. In this work, scanning electrochemical microscopy was used to track the site-specific reactivity of a silicon thin film surface over time to determine if undesirable Faradaic reactions were occurring at the formed solid electrolyte interphase (SEI) during calendar aging in four case scenarios: formation between 1.5 V and 100 mV with subsequent rest starting at (1) 1.5 V and (2) 100 mV and formation between 0.75 V and 100 mV with subsequent rest starting at (3) 0.75 V and (4) 100 …


Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim Apr 2024

Algorithmic Approaches For Object Tracking And Facial Detection Using Drones, Kareem Shahatta, Peter Savarese, Gina Egitto, Jongwook Kim

Computer Science Student Work

Drones are unmanned aerial vehicles that have a variety of uses in many fields such as package delivery and search operations. Tello is a small, programmable drone designed for educational purposes. We developed algorithms using DJI Tello Py, an open-source Application Programming Interface, to command the movements of Tello for tracking a target object (i.e., human). Our algorithms utilize digital image processing techniques on Tello's live video stream to optimize the number of movements Tello needs to reach its target. Our poster presentation will explain our approaches to implement object-tracking and facial detection for Tello, discuss lessons we learned, and …


Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik Apr 2024

Rescape: Transforming Coral-Reefscape Images For Quantitative Analysis, Zachary Ferris, Eraldo Ribeiro, Tomofumi Nagata, Robert Van Woesik

Ocean Engineering and Marine Sciences Faculty Publications

Ever since the first image of a coral reef was captured in 1885, people worldwide have been accumulating images of coral reefscapes that document the historic conditions of reefs. However, these innumerable reefscape images suffer from perspective distortion, which reduces the apparent size of distant taxa, rendering the images unusable for quantitative analysis of reef conditions. Here we solve this century-long distortion problem by developing a novel computer-vision algorithm, ReScape, which removes the perspective distortion from reefscape images by transforming them into top-down views, making them usable for quantitative analysis of reef conditions. In doing so, we demonstrate the …


The State Of The Carbon Capture And Sequestration Industry In California In 2024: Challenges And Policy Solutions, Noah Jackson Apr 2024

The State Of The Carbon Capture And Sequestration Industry In California In 2024: Challenges And Policy Solutions, Noah Jackson

School of Public Policy Capstones

Carbon Capture and Sequestration (CCS) is the process of capturing CO2 from an above ground carbon source, transporting it to a sequestration well, and permanently sinking it deep underground. Despite the state of California depending on CCS to reach carbon neutrality, not one CCS project is operational yet in the state. Due to the recent creation and expansion of state low carbon fuel standard (LCFS) credits and the federal 45Q credits, CCS projects are beginning to be developed. Between 2021 and 2023 twelve Class VI applications were submitted to the US Environmental Protection Agency (EPA) in California.

This paper …


Environmental Factors Associated With Triploid Aspen Occurrence In Intermountain West Landscapes, Karen E. Mock, James A. Walton Apr 2024

Environmental Factors Associated With Triploid Aspen Occurrence In Intermountain West Landscapes, Karen E. Mock, James A. Walton

Browse all Datasets

Polyploidy is common among plants and can contribute to physiological and morphological differences, altering how plants respond to environmental changes, promoting genetic diversification, and even species radiation. Quaking aspen (Populus tremuloides), a keystone species associated with high plant and animal diversity is frequently found in mixed diploid/triploid populations in the Intermountain West. High mortality rates and widespread population declines in aspen are of increasing concern in the Intermountain West, often ascribed to changing climates and drought stress events. The goal of this study was to better understand environmental factors influencing the distribution of triploid aspen population in the Intermountain West. …


Extensions Of Algebraic Frames, Papiya Bhattacharjee Apr 2024

Extensions Of Algebraic Frames, Papiya Bhattacharjee

Mathematics Colloquium Series

A frame is a complete lattice that satisfies a strong distributive law, known as the frame law. Frames are also known as Pointfree Topology, as every topology is a frame. Even though the concept of frames originated from topology, the idea has expanded to many other areas of mathematics and frames are now studied in their own merit. Given two frame L and M, we say M is an extension of L if L is a subframe of M. In this talk we will discuss different types of frames extensions, such as Rigid extension, r-extension, and r*-extension between two frames. …


Extensions Of Algebraic Frames, Papiya Bhattacharjee Apr 2024

Extensions Of Algebraic Frames, Papiya Bhattacharjee

Algebra Seminar

A frame is a complete lattice that satisfies a strong distributive law, known as the frame law. Frames are also known as Pointfree Topology, as every topology is a frame. Even though the concept of frames originated from topology, the idea has expanded to many other areas of mathematics and frames are now studied in their own merit. Given two frame L and M, we say M is an extension of L if L is a subframe of M. In this talk we will discuss different types of frames extensions, such as Rigid extension, r-extension, and r*-extension between two frames. …


Black Tio2 Nts And Zno-Tio2 Nts Heterostructure: Synthesis, Characterization, And Synchrotron-Based Spectroscopy Studies, Lu Yao Apr 2024

Black Tio2 Nts And Zno-Tio2 Nts Heterostructure: Synthesis, Characterization, And Synchrotron-Based Spectroscopy Studies, Lu Yao

Electronic Thesis and Dissertation Repository

The one-dimensional (1D) TiO2 nanotubes (NTs), and their derivatives have been extensively studied due to their potential use in water-splitting, solar cells, and lithium-ion batteries. Since TiO2 has a large band gap (~3.2 eV for anatase), there has been a search for higher photocatalytic efficiency by shifting the band gap into the visible range. This thesis presents a study of black TiO2 NTs and ZnO-TiO2 heterostructures using synchrotron-based X-ray spectroscopy and X-ray diffraction techniques. It involves the transformation from as-prepared TiO2 NTs to black TiO2 NTs via an electrochemical reduction method. ZnO-TiO2 NT …