Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 5881 - 5910 of 302419

Full-Text Articles in Physical Sciences and Mathematics

Silver Bow Creek Butte Area Npl Site Fall Semi-Annual 2023 Butte Priority Soils Operable Unit Interim Site-Wide Groundwater Monitoring Data Report. Consent Decree- Civil Action No. Cv 89-039-Bu-She, Josh Bryson Feb 2024

Silver Bow Creek Butte Area Npl Site Fall Semi-Annual 2023 Butte Priority Soils Operable Unit Interim Site-Wide Groundwater Monitoring Data Report. Consent Decree- Civil Action No. Cv 89-039-Bu-She, Josh Bryson

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Milp Modeling Of Matrix Multiplication: Cryptanalysis Of Klein And Prince, Murat Burhan İlter, Ali Aydın Selçuk Feb 2024

Milp Modeling Of Matrix Multiplication: Cryptanalysis Of Klein And Prince, Murat Burhan İlter, Ali Aydın Selçuk

Turkish Journal of Electrical Engineering and Computer Sciences

Mixed-integer linear programming (MILP) techniques are widely used in cryptanalysis, aiding in the discovery of optimal linear and differential characteristics. This paper delves into the analysis of block ciphers KLEIN and PRINCE using MILP, specifically calculating the best linear and differential characteristics for reduced-round versions. Both ciphers employ matrix multiplication in their diffusion layers, which we model using multiple XOR operations. To this end, we propose two novel MILP models for multiple XOR operations, which use fewer variables and constraints, proving to be more efficient than standard methods for XOR modeling. For differential cryptanalysis, we identify characteristics with a probability …


Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello Feb 2024

Privacy Principles And Harms: Balancing Protection And Innovation, Samuel Aiello

Journal of Cybersecurity Education, Research and Practice

In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to reshape how personal information is collected, stored, and utilized. This paper delves into the fundamental principles of privacy and explores the potential harm that can arise from the mishandling of personal data. It emphasizes the delicate balance between safeguarding individuals' privacy rights and fostering innovation in a data-driven society. By …


Axion-Polaritons In Quark Stars: A Possible Solution To The Missing Pulsar Problem, Efrain J. Ferrer, Vivian De La Incera Feb 2024

Axion-Polaritons In Quark Stars: A Possible Solution To The Missing Pulsar Problem, Efrain J. Ferrer, Vivian De La Incera

Physics and Astronomy Faculty Publications and Presentations

This paper proposes an alternative mechanism to solve the so-called missing pulsar problem, a standing paradox between the theoretical expectations about the number of pulsars that should exist in the galaxy center of the Milky Way and their absence in the observations. The mechanism is based on the transformation of incident γ rays into hybridized modes, known as axion-polaritons, which can exist inside highly magnetized quark stars with a quark matter phase known as the magnetic dual chiral density wave phase. This phase, which is favored over several other dense matter phases candidates at densities a few times nuclear saturation …


Error Performance Enhancement And Complexity Reduction In Ofdm Systems Via Coordinate Interleaving Under Practical Impairments, Mustafa Anıl Reşat, Armed Tusha, Seda Doğan Tusha, Serdar Özyurt, Hüseyin Arslan Feb 2024

Error Performance Enhancement And Complexity Reduction In Ofdm Systems Via Coordinate Interleaving Under Practical Impairments, Mustafa Anıl Reşat, Armed Tusha, Seda Doğan Tusha, Serdar Özyurt, Hüseyin Arslan

Turkish Journal of Electrical Engineering and Computer Sciences

In this work, subcarrier coordinate interleaving (CI) is implemented to orthogonal frequency division multiplexing (OFDM) systems with the aim of both enhancing the error performance and reducing the implementation complexity. To this end, the modulated symbols are independently chosen from a modified M-ary amplitude-shift keying signal constellation under a specific CI strategy. In addition to doubling the diversity level of the original OFDM scheme, the adopted CI approach also drastically reduces the inverse fast Fourier transform (IFFT) size at the transmit side by guaranteeing the first half of the input vector to be identical with the second half at the …


Machine Learning Approaches In Comparative Studies For Alzheimer’S Diagnosis Using 2d Mri Slices, Zhen Zhao, Joon Huang Chuah, Chee-Onn Chow, Kaijian Xia, Yee Kai Tee, Yan Chai Hum, Khin Wee Lai Feb 2024

Machine Learning Approaches In Comparative Studies For Alzheimer’S Diagnosis Using 2d Mri Slices, Zhen Zhao, Joon Huang Chuah, Chee-Onn Chow, Kaijian Xia, Yee Kai Tee, Yan Chai Hum, Khin Wee Lai

Turkish Journal of Electrical Engineering and Computer Sciences

Alzheimer’s disease (AD) is an illness that involves a gradual and irreversible degeneration of the brain. It is crucial to establish a precise diagnosis of AD early on in order to enable prompt therapies and prevent further deterioration. Researchers are currently focusing increasing attention on investigating the potential of machine learning techniques to simplify the automated diagnosis of AD using neuroimaging. The present study involved a comparison of models for the detection of AD through the utilization of 2D image slices obtained from magnetic resonance imaging brain scans. Five models, namely ResNet, ConvNeXt, CaiT, Swin Transformer, and CVT, were implemented …


Fractional Delay-Dependent Load Frequency Controller Design For A Single-Area Power System With Communication Delay, Erhan Yumuk Feb 2024

Fractional Delay-Dependent Load Frequency Controller Design For A Single-Area Power System With Communication Delay, Erhan Yumuk

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a fractional delay-dependent load frequency control design approach for a single-area power system with communication delay based on gain and phase margin specifications. In this approach, the closed-loop reference transfer function relies on the delayed Bode’s transfer function. The gain and phase margin specifications are established in order to optimize the reference model based on three time-domain performance indices. Here, a category of fractional-order model is employed to describe the single-area power system incorporating communication delay. The controller parameters are determined using the fractional-order system model and optimal closed-loop reference model. Then, a delay-dependent control mechanism is …


Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu Feb 2024

Motion Magnification-Inspired Feature Manipulation For Deepfake Detection, Aydamir Mirzayev, Hamdi Di̇bekli̇oğlu

Turkish Journal of Electrical Engineering and Computer Sciences

Recent advances in deep learning, increased availability of large-scale datasets, and improvement of accelerated graphics processing units facilitated creation of an unprecedented amount of synthetically generated media content with impressive visual quality. Although such technology is used predominantly for entertainment, there is widespread practice of using deepfake technology for malevolent ends. This potential for malicious use necessitates the creation of detection methods capable of reliably distinguishing manipulated video content. In this work we aim to create a learning-based detection method for synthetically generated videos. To this end, we attempt to detect spatiotemporal inconsistencies by leveraging a learning-based magnification-inspired feature manipulation …


Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu Feb 2024

Automated Identification Of Vehicles In Very High-Resolution Uav Orthomosaics Using Yolov7 Deep Learning Model, Esra Yildirim, Umut Güneş Seferci̇k, Taşkın Kavzoğlu

Turkish Journal of Electrical Engineering and Computer Sciences

The utilization of remote sensing products for vehicle detection through deep learning has gained immense popularity, especially due to the advancement of unmanned aerial vehicles (UAVs). UAVs offer millimeter-level spatial resolution at low flight altitudes, which surpasses traditional airborne platforms. Detecting vehicles from very high-resolution UAV data is crucial in numerous applications, including parking lot and highway management, traffic monitoring, search and rescue missions, and military operations. Obtaining UAV data at desired periods allows the detection and tracking of target objects even several times during a day. Despite challenges such as diverse vehicle characteristics, traffic congestion, and hardware limitations, the …


Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy Feb 2024

Longitudinal Attacks Against Iterative Data Collection With Local Differential Privacy, Mehmet Emre Gürsoy

Turkish Journal of Electrical Engineering and Computer Sciences

Local differential privacy (LDP) has recently emerged as an accepted standard for privacy-preserving collection of users’ data from smartphones and IoT devices. In many practical scenarios, users’ data needs to be collected repeatedly across multiple iterations. In such cases, although each collection satisfies LDP individually by itself, a longitudinal collection of multiple responses from the same user degrades that user’s privacy. To demonstrate this claim, in this paper, we propose longitudinal attacks against iterative data collection with LDP. We formulate a general Bayesian adversary model, and then individually show the application of this adversary model on six popular LDP protocols: …


A Novel Extended Reaction Force/Torque Observer With Impedance Control, İlkay Turaç Özçeli̇k, Abdurrahman Eray Baran Feb 2024

A Novel Extended Reaction Force/Torque Observer With Impedance Control, İlkay Turaç Özçeli̇k, Abdurrahman Eray Baran

Turkish Journal of Electrical Engineering and Computer Sciences

This paper proposes a new extended version of the reaction force observer (RFOB) for high-precision motion control systems. The RFOB has been proven to be useful for many applications in the literature. However, because of the low-pass filter present inside of the RFOB, it has certain limitations. In this study, a new algorithm is proposed to compensate for filtering-based errors in the classical RFOB structure. The algorithm includes the differentiation of the observed force and scaling with a proper value. However, since the force has a noisy nature, differentiation also affects the signal’s stability and performance. To resolve this issue, …


Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee Feb 2024

Board Of Directors Role In Data Privacy Governance: Making The Transition From Compliance Driven To Good Business Stewardship, David Warner, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity and revenue losses, settlements, fines, and penalties which can amount to over $15 million, with many penalties now being ascribed to the organization’s leadership, to include the Board of Directors (BoD), the CEO and members of the senior leadership team (SLT). Thus, boards of directors can no longer ignore and in …


Deep Neural Network-Oriented Indicator Method For Inverse Scattering Problems Using Partial Data, Yule Lin, Xiaoyi Yan, Jiguang Sun, Juan Liu Feb 2024

Deep Neural Network-Oriented Indicator Method For Inverse Scattering Problems Using Partial Data, Yule Lin, Xiaoyi Yan, Jiguang Sun, Juan Liu

Michigan Tech Publications, Part 2

We consider the inverse scattering problem to reconstruct an obstacle using partial far-field data due to one incident wave. A simple indicator function, which is negative inside the obstacle and positive outside of it, is constructed and then learned using a deep neural network (DNN). The method is easy to implement and effective as demonstrated by numerical examples. Rather than developing sophisticated network structures for the classical inverse operators, we reformulate the inverse problem as a suitable operator such that standard DNNs can learn it well. The idea of the DNN-oriented indicator method can be generalized to treat other partial …


Session 8: Machine Learning Based Behavior Of Non-Opec Global Supply In Crude Oil Price Determinism, Mofe Jeje Feb 2024

Session 8: Machine Learning Based Behavior Of Non-Opec Global Supply In Crude Oil Price Determinism, Mofe Jeje

SDSU Data Science Symposium

Abstract

While studies on global oil price variability, occasioned by OPEC crude oil supply, is well documented in energy literature; the impact assessment of non-OPEC global oil supply on price variability, on the other hand, has not received commensurate attention. Given this gap, the primary objective of this study, therefore, is to estimate the magnitude of oil price determinism that is explained by the share of non-OPEC’s global crude oil supply. Using secondary sources of data collection method, data for target variable will be collected from the US Federal Reserve, as it relates to annual crude oil price variability, while …


Predicting Crop Yield Using Remote Sensing Data, Mary Row, Jung-Han Kimn, Hossein Moradi Feb 2024

Predicting Crop Yield Using Remote Sensing Data, Mary Row, Jung-Han Kimn, Hossein Moradi

SDSU Data Science Symposium

Accurate crop yield predictions can help farmers make adjustments or changes in their farming practices to optimize their harvest. Remote sensing data is an inexpensive approach to collecting massive amounts of data that could be utilized for predicting crop yield. This study employed linear regression and spatial linear models were used to predict soybean yield with data from Landsat 8 OLI. Each model was built using only spectral bands of the satellite, only vegetation indices, and both spectral bands and vegetation indices. All analysis was based on data collected from two fields in South Dakota from the 2019 and 2021 …


Principal Component Analysis With Application To Credit Card Data, Eleanor Cain, Semhar Michael, Gary Hatfield Feb 2024

Principal Component Analysis With Application To Credit Card Data, Eleanor Cain, Semhar Michael, Gary Hatfield

SDSU Data Science Symposium

Principal Component Analysis (PCA) is a type of dimension reduction technique used in data analysis to process the data before making a model. In general, dimension reduction allows analysts to make conclusions about large data sets by reducing the number of variables while retaining as much information as possible. Using the numerical variables from a data set, PCA aims to compute a smaller set of uncorrelated variables, called principal components, that account for a majority of the variability from the data. The purpose of this poster is to understand PCA as well as perform PCA on a large sample credit …


Session 6: Model-Based Clustering Analysis On The Spatial-Temporal And Intensity Patterns Of Tornadoes, Yana Melnykov, Yingying Zhang, Rong Zheng Feb 2024

Session 6: Model-Based Clustering Analysis On The Spatial-Temporal And Intensity Patterns Of Tornadoes, Yana Melnykov, Yingying Zhang, Rong Zheng

SDSU Data Science Symposium

Tornadoes are one of the nature’s most violent windstorms that can occur all over the world except Antarctica. Previous scientific efforts were spent on studying this nature hazard from facets such as: genesis, dynamics, detection, forecasting, warning, measuring, and assessing. While we want to model the tornado datasets by using modern sophisticated statistical and computational techniques. The goal of the paper is developing novel finite mixture models and performing clustering analysis on the spatial-temporal and intensity patterns of the tornadoes. To analyze the tornado dataset, we firstly try a Gaussian distribution with the mean vector and variance-covariance matrix represented as …


Session 6: The Size-Biased Lognormal Mixture With The Entropy Regularized Algorithm, Tatjana Miljkovic, Taehan Bae Feb 2024

Session 6: The Size-Biased Lognormal Mixture With The Entropy Regularized Algorithm, Tatjana Miljkovic, Taehan Bae

SDSU Data Science Symposium

A size-biased left-truncated Lognormal (SB-ltLN) mixture is proposed as a robust alternative to the Erlang mixture for modeling left-truncated insurance losses with a heavy tail. The weak denseness property of the weighted Lognormal mixture is studied along with the tail behavior. Explicit analytical solutions are derived for moments and Tail Value at Risk based on the proposed model. An extension of the regularized expectation–maximization (REM) algorithm with Shannon's entropy weights (ewREM) is introduced for parameter estimation and variability assessment. The left-truncated internal fraud data set from the Operational Riskdata eXchange is used to illustrate applications of the proposed model. Finally, …


A Reliable Diabetic Retinopathy Grading Via Transfer Learning And Ensemble Learning With Quadratic Weighted Kappa Metric, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Anthony S. Maida, Xiali Hei Feb 2024

A Reliable Diabetic Retinopathy Grading Via Transfer Learning And Ensemble Learning With Quadratic Weighted Kappa Metric, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Anthony S. Maida, Xiali Hei

Computer Science Faculty Publications

The most common eye infection in people with diabetes is diabetic retinopathy (DR). It might cause blurred vision or even total blindness. Therefore, it is essential to promote early detection to prevent or alleviate the impact of DR. However, due to the possibility that symptoms may not be noticeable in the early stages of DR, it is difficult for doctors to identify them. Therefore, numerous predictive models based on machine learning (ML) and deep learning (DL) have been developed to determine all stages of DR. However, existing DR classification models cannot classify every DR stage or use a computationally heavy …


A Comparative Study Of Responses To Retina Questions From Either Experts, Expert-Edited Large Language Models, Or Expert-Edited Large Language Models Alone, Prashant D. Tailor, Lauren A. Dalvin, John J. Chen, Raymond Iezzi, Timothy W. Olsen, Brittni A. Scruggs, Andrew J. Barkmeier, Sophie J. Bakri, Edwin H. Ryan, Peter H. Tang, D. Wilkin Parke, Peter Belin, Jayanth Sridhar, David Xu, Ajay E. Kuriyan, Yoshihiro Yonekawa, Matthew R. Starr Feb 2024

A Comparative Study Of Responses To Retina Questions From Either Experts, Expert-Edited Large Language Models, Or Expert-Edited Large Language Models Alone, Prashant D. Tailor, Lauren A. Dalvin, John J. Chen, Raymond Iezzi, Timothy W. Olsen, Brittni A. Scruggs, Andrew J. Barkmeier, Sophie J. Bakri, Edwin H. Ryan, Peter H. Tang, D. Wilkin Parke, Peter Belin, Jayanth Sridhar, David Xu, Ajay E. Kuriyan, Yoshihiro Yonekawa, Matthew R. Starr

Wills Eye Hospital Papers

OBJECTIVE: To assess the quality, empathy, and safety of expert edited large language model (LLM), human expert created, and LLM responses to common retina patient questions.

DESIGN: Randomized, masked multicenter study.

PARTICIPANTS: Twenty-one common retina patient questions were randomly assigned among 13 retina specialists.

METHODS: Each expert created a response (Expert) and then edited a LLM (ChatGPT-4)-generated response to that question (Expert + artificial intelligence [AI]), timing themselves for both tasks. Five LLMs (ChatGPT-3.5, ChatGPT-4, Claude 2, Bing, and Bard) also generated responses to each question. The original question along with anonymized and randomized Expert + AI, Expert, and LLM …


Residential Metals Abatement Program Investigation Summary Report (Non- Residential Parcels – Indoor Dust) Small World Daycare, Environmental Resource Management (Erm) Feb 2024

Residential Metals Abatement Program Investigation Summary Report (Non- Residential Parcels – Indoor Dust) Small World Daycare, Environmental Resource Management (Erm)

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Residential Metals Abatement Program Investigation Summary Report (Non-Residential Parcels – Indoor Dust) - Small World Daycare, Environmental Resource Management (Erm) Feb 2024

Residential Metals Abatement Program Investigation Summary Report (Non-Residential Parcels – Indoor Dust) - Small World Daycare, Environmental Resource Management (Erm)

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Residential Metals Abatement Program Investigation Summary Report (Non-Residential Parcels – Indoor Dust) - Small World Daycare, Environmental Resource Management (Erm) Feb 2024

Residential Metals Abatement Program Investigation Summary Report (Non-Residential Parcels – Indoor Dust) - Small World Daycare, Environmental Resource Management (Erm)

Silver Bow Creek/Butte Area Superfund Site

No abstract provided.


Beyond Standard Model: Axial Electric Potentials Of Quarks And Neutrinos, Polievkt Perov Feb 2024

Beyond Standard Model: Axial Electric Potentials Of Quarks And Neutrinos, Polievkt Perov

College of Arts & Sciences Faculty Works

The equations of axial electric potentials are presented for our models of quarks and neutrinos as spinning composite structures where up to 3 basic elementary charges are on the axis or rotation and the other N charges are revolving about the axis. The axial potential functions at given point on the axis of rotation were calculated as the sum of electric potentials at that point from all the charges in the structure. We applied these general equations specifically to the models of two types of neutral particles (neutrinos), one with 2 like charges on the axis and the other with …


New Mathematics Teachers' Goals, Orientations, And Resources That Influence Implementation Of Principles Learned In Brigham Young University's Teacher Preparation Program, Caroline S. Gneiting Feb 2024

New Mathematics Teachers' Goals, Orientations, And Resources That Influence Implementation Of Principles Learned In Brigham Young University's Teacher Preparation Program, Caroline S. Gneiting

Theses and Dissertations

Research in mathematics education shows that new mathematics teachers struggle to implement reform teaching practices that they learned in their teacher preparation programs. In this study, the researcher observed and interviewed three new mathematics teachers (within five years of graduation) to further explore the question of why new teachers use or do not use what they learned in their teacher preparation program. The study uses an expanded version of Schoenfeld's decision-making theory of Orientations, Goals, and Resources. This theory proved useful in the analysis of the research data, providing a framework to incorporate and organize the numerous reasons suggested by …


Unveiling The Connection Between Malware And Pirated Software In Southeast Asian Countries: A Case Study, Asif Iqbal, Muhammad Naveed Aman, Ramkumar Rejendran, Biplab Sikdar Feb 2024

Unveiling The Connection Between Malware And Pirated Software In Southeast Asian Countries: A Case Study, Asif Iqbal, Muhammad Naveed Aman, Ramkumar Rejendran, Biplab Sikdar

School of Computing: Faculty Publications

Pirated software is an attractive choice for cybercriminals seeking to spread malicious software, known as malware. This paper attempts to quantify the occurrence of malware concealed within pirated software.We collected samples of pirated software from various sources from Southeast Asian countries, including hard disk drives, optical discs purchased in eight different countries, and online platforms using peerto- peer services. Our dataset comprises a total of 750 pirated software samples. To analyze these samples, we employed seven distinct antivirus (AV) engines. The malware identified by the AV engines was classified into four categories: adware, Trojans, viruses, and a miscellaneous category termed …


Deep Structure Of Siletzia In The Puget Lowland: Imaging An Obducted Plateau And Accretionary Thrust Belt With Potential Fields, Megan L. Anderson, Richard J. Blakely, Ray E. Wells, Joe D. Dragovich Feb 2024

Deep Structure Of Siletzia In The Puget Lowland: Imaging An Obducted Plateau And Accretionary Thrust Belt With Potential Fields, Megan L. Anderson, Richard J. Blakely, Ray E. Wells, Joe D. Dragovich

Geology Faculty Publications and Presentations

Detailed understanding of crustal components and tectonic history of forearcs is important due to their geological complexity and high seismic hazard. The principal component of the Cascadia forearc is Siletzia, a composite basaltic terrane of oceanic origin. Much is known about the lithology and age of the province. However, glacial sediments blanketing the Puget Lowland obscure its lateral extent and internal structure, hindering our ability to fully understand its tectonic history and its influence on modern deformation. In this study, we apply map-view interpretation and two-dimensional modeling of aeromagnetic and gravity data to the magnetically stratified Siletzia terrane revealing its …


Sulfate Enhances The Adsorption And Retention Of Cu(Ii) And Zn(Ii) To Dispersed And Aggregated Iron Oxyhydroxide Nanoparticles, Emma M. Kocik, Abigail Kim, Miranda L. Aiken, Lauren Smith, Christopher S. Kim Feb 2024

Sulfate Enhances The Adsorption And Retention Of Cu(Ii) And Zn(Ii) To Dispersed And Aggregated Iron Oxyhydroxide Nanoparticles, Emma M. Kocik, Abigail Kim, Miranda L. Aiken, Lauren Smith, Christopher S. Kim

Biology, Chemistry, and Environmental Sciences Faculty Articles and Research

The adsorption and retention of metal ions to nanoscale iron (hydr)oxides in aqueous systems is significantly influenced by prevailing environmental conditions. We examined the influence of sulfate, the second most common anion in seawater that is present in many other natural aquatic systems, on the adsorption and retention of Cu(II) and Zn(II) to synthetic iron oxyhydroxide nanoparticles (NPs) and their aggregates. Batch uptake experiments with monodisperse NPs and NPs aggregated by changes in pH, ionic strength, and temperature were conducted over sulfate concentrations ranging from 0 to 0.30 M. The introduction of 0.03 M sulfate significantly increased the initial adsorption …


The Usage Of Band Ratios To Predict Lake Water Quality Parameters Using Sentinel-2 L1c Imagery, Austin Spoor, Ho-Seop Cha Feb 2024

The Usage Of Band Ratios To Predict Lake Water Quality Parameters Using Sentinel-2 L1c Imagery, Austin Spoor, Ho-Seop Cha

International Journal of Geospatial and Environmental Research

Band ratios using remote imagery can be useful for monitoring large bodies of water when high quality imagery is available. Sentinel-2 satellite imagery provides frequent, high-resolution coverage of the globe. This study set out to test the usefulness of existing band ratios for estimating chlorophyll a (CHL-a), dissolved organic carbon (DOC), and turbidity with Sentinel-2 imagery. USGS in-situ data was matched to Sentinel-2 imagery of Beaver Lake, Arkansas taken August 2015 to July 2019 and the dark spectrum fitting (DSF) atmospheric correction method in ACOLITE was applied to generate surface reflectance values. CHL-a was estimated using two …


Computational Study Of Binding Of Oseltamivir To Neuraminidase Mutants Of Influenza A Virus, Muhammad Arba, Sri Wahyuli, Setyanto Tri Wahyudi, Amir Karton, Chun Wu Feb 2024

Computational Study Of Binding Of Oseltamivir To Neuraminidase Mutants Of Influenza A Virus, Muhammad Arba, Sri Wahyuli, Setyanto Tri Wahyudi, Amir Karton, Chun Wu

College of Science & Mathematics Departmental Research

Oseltamivir (OTV), which targets the neuraminidase (NA) of Influenza A virus (IAV), has been reported to develop resistance. Here, we performed a computational study on the binding modes of OTV in the wild-type and popular mutants of IAV NA (E119A, E119D, E119G, H274Y, I117T, I117V, I117V-E119A, K150N, N294S, R292K, V116A, and Y252H). The Arg118, Glu119, Asp151, Arg152, Glu276, Arg292, and Arg371 were identified as crucial interacting residues with the drug. The energy decomposition analysis showed that with few exceptions, the dispersion interaction is the dominant interaction, followed by the charge-transfer and polarization interactions. The affinities for OTV were greatly reduced …