Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

2007

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 9571 - 9600 of 11880

Full-Text Articles in Social and Behavioral Sciences

Influence Of Dog-Bone Apex On Shape During Slab Horizontal Rolling Process, Hai-Liang Yu, Xiang-Hua Liu, Chang-Sheng Li, Guo-Dong Wang Jan 2007

Influence Of Dog-Bone Apex On Shape During Slab Horizontal Rolling Process, Hai-Liang Yu, Xiang-Hua Liu, Chang-Sheng Li, Guo-Dong Wang

Faculty of Engineering and Information Sciences - Papers: Part A

The deformation of slab with dog-bone shape during the horizontal rolling process was simulated using FEM, and the influences of apical dislocation of dog-bone on the slab spread as well as the minimum crop end loss and the lost width at slab head and tail were analyzed. The results show that with the increase in the apical dislocation of dog-bone (LA), the slab spread and the minimum crop end loss at slab head and tail decrease, while the lost width at slab head and tail increases. Meanwhile, the relationships of S/LA-LA, LH/LA-LA, WH/LA-LA, LT/LA-LA, and WT/LA-LA were obtained. © 2007 …


Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao Jan 2007

Security Remarks On A Convertible Nominative Signature Scheme, Guilin Wang, Feng Bao

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (i.e. the signer) and a nominee (i.e. a designated verifier) to jointly generate and publish a signature so that only the nominee can check the validity of a nominative signature and further convince a third party to accept this fact. Recently, Huang and Wang proposed such a new scheme at ACISP 2004, and claimed that their scheme is secure under some standard computational assumptions. In this paper, we remark that their scheme is not a nominative signature in fact, since it fails to meet the crucial security requirement: verification untransferability. Specifically, we identify …


Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang Jan 2007

Security Analysis Of Two Ultra-Lightweight Rfid Authentication Protocols, Tieyan Li, Guilin Wang

Faculty of Engineering and Information Sciences - Papers: Part A

In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2AP, which are recently proposed by Peris-Lopez et al.We identify two e®ective attacks, namely De-synchronization attack and Full-disclosure attack, against their protocols. The former attack can break the synchro- nization between the RFID reader and the tag in a single protocol run so that they can not authenticate each other in any following protocol runs. The latter attack can disclose all the secret information stored on a tag by interrogating the tag multiple times. Thus it compromises the tag completely. Moreover, we point …


Doing It Tough: Factors Impacting On Local E-Government Mmaturity, Peter Shackleton, Linda Dawson Jan 2007

Doing It Tough: Factors Impacting On Local E-Government Mmaturity, Peter Shackleton, Linda Dawson

Faculty of Engineering and Information Sciences - Papers: Part A

As growing numbers of citizens seek to use the Internet to do business, governments across the world have moved into the area of electronic service delivery. For the last decade significant advancements have been made in the area of e-Government. Today, e-Government is often assumed to be wellestablished. However, ongoing support is often missing, particularly at the local government level. The multi-level nature of government often means that citizens are frustrated when accessing services that span many levels of bureaucracy. This paper describes an empirical study which explores the factors influencing local egovernment maturity and identifies the barriers, enablers, priorities …


Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie Jan 2007

Kk-Theory And Spectral Flow In Von Neumann Algebras, J Kaad, R Nest, Adam C. Rennie

Faculty of Engineering and Information Sciences - Papers: Part A

We present a definition of spectral flow for any norm closed ideal J in any von Neumann algebra N. Given a path of selfadjoint operators in N which are invertible in N/J, the spectral flow produces a class in Ko(J).Given a semifinite spectral triple (A, H, D) relative to (N, t) with A separable, we construct a class [D] ? KK1(A, K(N)). For a unitary u ? A, the von Neumann spectral flow between D and u*Du is equal to the Kasparov product [u]A[D], and is simply related to the numerical spectral flow, and a refined C*-spectral flow.


Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang Jan 2007

Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang

Faculty of Engineering and Information Sciences - Papers: Part A

Multi-class image classification can benefit much from feature subset selection. This paper extends an error bound of binary SVMs to a feature subset selection criterion for the multi-class SVMs. By minimizing this criterion, the scale factors assigned to each feature in a kernel function are optimized to identify the important features. This minimization problem can be efficiently solved by gradient-based search techniques, even if hundreds of features are involved. Also, considering that image classification is often a small sample problem, the regularization issue is investigated for this criterion, showing its robustness in this situation. Experimental study on multiple benchmark image …


Triples In Table Tennis: A Promising New Team Competition Sport - “Introduction And First Findings”, Guenter Arndt Jan 2007

Triples In Table Tennis: A Promising New Team Competition Sport - “Introduction And First Findings”, Guenter Arndt

Faculty of Engineering and Information Sciences - Papers: Part B

A new form of table tennis is presented, with teams of three players playing each other. Apart from recreational applications it is seen as the ultimate test of combined team strength in team competitions, where presently teams never face each other as a team. With 3-player teams now competing in the 2008 Olympics, the new game presents a timely and relevant new table tennis possibility.

Some salient points from a comprehensive textbook on “Table Tennis Triples”, covering the rationale for the new game, its equipment, rules, game plans, umpiring, and possible integration into existing table tennis events [1] are presented. …


Table Tennis Triples, A New Team Sport - Theory, Equipment, Rules, Strategies And Future Possibilities Of A New Form Of Table Tennis, Guenter Arndt Jan 2007

Table Tennis Triples, A New Team Sport - Theory, Equipment, Rules, Strategies And Future Possibilities Of A New Form Of Table Tennis, Guenter Arndt

Faculty of Engineering and Information Sciences - Papers: Part B

Most existing table tennis teams never play each other as a team. "Triples" for the first time allows three-person teams to play "serious" table tennis. The book explains its rationale, equipment and its manufacture, its rules, and its integration into existing table tennis events. It strives to enhance the already popular image of table tennis by adding a "true team sport" to its repertoire, thereby increasing its player, spectator and media appeal. Part 1 establishes the theoretical basis of Triples and provides detailed information on the design and manufacture of its hardware. In analysing its geometrical and physical aspects, it …


Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye Jan 2007

Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye

Faculty of Engineering and Information Sciences - Papers: Part A

The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark …


Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang Jan 2007

Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang

Faculty of Engineering and Information Sciences - Papers: Part A

Characteristics of turbulent flows in rivers can be significantly modified because of the presence of sediment particles and secondary currents/nonuniformity. This paper investigates why the measured vertical distributions of velocity deviate from the log law. In contrast to previous research that attributed the deviation to Richardson number only, this study demonstrates that like Reynolds shear stress (−equation image), momentum flux (uv) caused by the nonzero wall-normal velocity v is also responsible for these deviations. Starting from Reynolds equations, this paper shows that the classical log law can be obtained only when v = 0; otherwise the velocity v results in …


Discussion, Raymond Chambers Jan 2007

Discussion, Raymond Chambers

Faculty of Engineering and Information Sciences - Papers: Part A

Discussion on Bjornstad, J.F. 2007, "Non-Bayesian Multiple Imputation", Journal of Official Statistics, vol. 23, no. 4, pp. 433.


Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre Jan 2007

Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre

Faculty of Engineering and Information Sciences - Papers: Part A

This article introduces RFID technology and the EPC Network and investigates their potential for B-to-B eCommerce supply chain management. Based on empirical data gathered from four tightly interrelated firms from three layers of a supply chain, several scenarios integrating RFID and the EPC Network have been tested and evaluated. In the context of warehousing activities in one specific retail supply chain, the results indicate that i) the business process approach seems quite appropriate to capture the real potential of RFID and the EPC Network; ii) RFID technology and the EPC Network can improve the "shipping" and the "receiving" processes; iii) …


Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies Jan 2007

Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies

Faculty of Engineering and Information Sciences - Papers: Part A

The effect of sample orientation on the mechanical properties of commercially pure (CP) titanium plate with a transverse split basal texture was investigated at room temperature (RT) using plane strain compression (PSC). A large variation in flow stress of up to (EBSD) and calculating Schmid factors for all important slip and twinning modes. Importantly, the Schmid factors were calculated for all orientations in Euler space because there are significant variations over all orientations for the PSC stress state, unlike uniaxial compression or tension. The Schmid factor analysis and twin data for the wide variety of orientations tested enabled the conclusion …


Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams Jan 2007

Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams

Faculty of Engineering and Information Sciences - Papers: Part A

We show that important structural properties of C*-algebras and the muliplicity numbers of representations are preserved under Morita equivalence.


Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis Jan 2007

Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis

Faculty of Engineering and Information Sciences - Papers: Part A

Large diameter steel line pipes are generally produced by cold deforming hot rolled or thermomechanically controlled rolled (TMCR) plate by the three-stage 'UOE' process. Pipe strength has been found to increase or decrease relative to the plate, depending on the steel grade and plate processing history. The strength increase is due to work hardening whereas any decrease in strength arises from the Bauschinger effect due to the reverse cold deformation of the UOE process. The steel chemistry, through the presence of strengthening microalloy precipitates, and prior processing, through the size and distribution of microalloy precipitates and the presence of retained …


Geant4 Physics Processes For Microdosimetry Simulation: Design Foundation And Implementation Of The First Set Of Models, S. Chauvie, Z. Francis, S. Guatelli, S. Incerti, B. Mascialino, P. Moretto, P. Nieminen, Maria G. Pia Jan 2007

Geant4 Physics Processes For Microdosimetry Simulation: Design Foundation And Implementation Of The First Set Of Models, S. Chauvie, Z. Francis, S. Guatelli, S. Incerti, B. Mascialino, P. Moretto, P. Nieminen, Maria G. Pia

Faculty of Health and Behavioural Sciences - Papers (Archive)

New physical processes specific for microdosimetry simulation are under development in the Geant4 Low Energy Electromagnetic package. The first set of models implemented for this purpose cover the interactions of electrons, protons and light ions in liquid water; they address a physics domain relevant to the simulation of radiation effects in biological systems, where water represents an important component. The design developed for effectively handling particle interactions down to a low energy scale and the physics models implemented in the first public release of the software are described.


Interference Control In Children With Ad/Hd: An Erp And Behavioural Analysis, Sarah Opychane, Stuart J. Johnstone Jan 2007

Interference Control In Children With Ad/Hd: An Erp And Behavioural Analysis, Sarah Opychane, Stuart J. Johnstone

Faculty of Health and Behavioural Sciences - Papers (Archive)

No abstract provided.


Impact Of Foods Enriched With Omega-3 Long Chain Polyunsaturated Fatty Acids On Erythrocyte Omega-3 Levels And Cardiovascular Risk Factors, Karen J. Murphy, Barbara J. Meyer, Trevor A. Mori, Valerie Burke, Jackie Mansour, Craig S. Patch, L. C. Tapsell, Manny Noakes, Peter A. Clifton, Anne Barden, Ian B. Puddey, Lawrence J. Beilin, Peter R. C. Howe Jan 2007

Impact Of Foods Enriched With Omega-3 Long Chain Polyunsaturated Fatty Acids On Erythrocyte Omega-3 Levels And Cardiovascular Risk Factors, Karen J. Murphy, Barbara J. Meyer, Trevor A. Mori, Valerie Burke, Jackie Mansour, Craig S. Patch, L. C. Tapsell, Manny Noakes, Peter A. Clifton, Anne Barden, Ian B. Puddey, Lawrence J. Beilin, Peter R. C. Howe

Faculty of Health and Behavioural Sciences - Papers (Archive)

Consumption of fish or fish oils rich in the n-3 long chain PUFA EPA and DHA may improve multiple risk factors for CVD. The objective of this study was to determine whether regular consumption of foods enriched with n-3 long-chain PUFA can improve n-3 long-chain PUFA status (erythrocytes) and cardiovascular health. Overweight volunteers with high levels of triacylglycerols (TG; >1·6 mmol/l) were enrolled in a 6-month dietary intervention trial conducted in Adelaide (n 47) and Perth (n 39), and randomised to consume control foods or n-3-enriched foods to achieve an EPA + DHA intake …


Evidence For Differentiation Of Arousal And Activation In Normal Adults, Mohammad Vaezmousavi, R. J. Barry, Jacqueline Rushby, Adam Clarke Jan 2007

Evidence For Differentiation Of Arousal And Activation In Normal Adults, Mohammad Vaezmousavi, R. J. Barry, Jacqueline Rushby, Adam Clarke

Faculty of Health and Behavioural Sciences - Papers (Archive)

"Arousal" at a particular time has been defined as the energetic stateat that moment, reflected in electrodermal activity and measured by skin conductance level. In contrast, task related "activation" has been defined as the change in arousal from a resting baseline to the task situation. The present study, replicating some aspects of a previous investigation of these ideas in children, aimed to further explore whether the separation of "arousal" and "activation" was useful in describing state effects on the phasic Orienting Response (OR) and behavioral performance. A continuous performance task (CPT) was used with normal adults. It was found that …


Justifying Knowledge, Justifying Method, Taking Action: Epistemologies, Methodologies, And Methods In Qualitative Research, Stacy M. Carter, Miles Little Jan 2007

Justifying Knowledge, Justifying Method, Taking Action: Epistemologies, Methodologies, And Methods In Qualitative Research, Stacy M. Carter, Miles Little

Faculty of Social Sciences - Papers (Archive)

In this article, the authors clarify a framework for qualitative research, in particular for evaluating its quality, founded on epistemology, methodology, and method. They define these elements and discuss their respective contributions and interrelationships. Epistemology determines and is made visible through method, particularly in the participant- researcher relationship, measures of research quality, and form, voice, and representation in analysis and writing. Epistemology guides methodological choices and is axiological. Methodology shapes and is shaped by research objectives, questions, and study design. Methodologies can prescribe choices of method, resonate with particular academic disciplines, and encourage or discourage the use and/or development of …


Editorial Board & Iowa Academy Of Science Officers And Directors Jan 2007

Editorial Board & Iowa Academy Of Science Officers And Directors

Journal of the Iowa Academy of Science: JIAS

No abstract provided.


Back Cover Jan 2007

Back Cover

Journal of the Iowa Academy of Science: JIAS

No abstract provided.


Producing Storytime: A Collectivist Analysis Of Work In A Complex Communicative Space, Pamela J. Mckenzie, Rosamund Stooke Jan 2007

Producing Storytime: A Collectivist Analysis Of Work In A Complex Communicative Space, Pamela J. Mckenzie, Rosamund Stooke

FIMS Publications

Storytime programs for young children are ritual events in the everyday life of the public library. This article analyzes data from two such programs to identify and analyze the work carried out by program leaders, their adult and child participants, and other social actors in other settings (e.g., library CEOs) in order to enable the program to happen. The study builds on research on the public library as a physical space and on the library in the life of the user by describing the often invisible literacy, information, and caring work that goes into accomplishing social settings within the physical …


Why Are Websites Co-Linked? The Case Of Canadian Universities, L. Vaughan, M.E.I. Kipp, Y. Gao Jan 2007

Why Are Websites Co-Linked? The Case Of Canadian Universities, L. Vaughan, M.E.I. Kipp, Y. Gao

FIMS Publications

This study examined why Websites were co-linked using Canadian university Websites as the test set. Pages that co-linked to these university Websites were located using Yahool. A random sample of 859 co-linking pages (the page that initiated the co-link) was retrieved and the contents of the page, as well as the context of the link, were manually examined to record the following variables: language, country, type of Website, and the reasons for co-linking. The study found that in over 94% of cases, the two co-linked universities were related academically; many of these cases (38%) showed a relationship specifically in teaching …


Libraries As Repositories Of Popular Culture: Is Popular Culture Still Forgotten?, Robert P. Holley, John H. Heinrichs Jan 2007

Libraries As Repositories Of Popular Culture: Is Popular Culture Still Forgotten?, Robert P. Holley, John H. Heinrichs

School of Information Sciences Faculty Research Publications

Purpose – To replicate a study done in 1992 on the bibliographic availability of 55 popular culture periodicals sold by a Kroger supermarket in Royal Oak, Michigan. The earlier study asked the question whether time might be a relevant variable for the number of holding libraries.

Design/methodology/approach – The authors searched WorldCat for the number of reported library holdings for the same 55 popular culture periodicals and analyzed the results. Findings – 34 periodicals with holdings during both periods had a median increase of 58.4%; but, when the 83.5% increase in OCLC full membership during the same period was taken …


Publishing In Wartime: The Modern Library Series During The Second World War, Gordon B. Neavill Jan 2007

Publishing In Wartime: The Modern Library Series During The Second World War, Gordon B. Neavill

School of Information Sciences Faculty Research Publications

American book publishing during the Second World War had to cope with a huge increase in demand for books coupled with scarcity of resources, especially paper rationing imposed by the War Produc- tion Board. Based on research in the Random House archives and focusing on the Modern Library series, this article examines how publishers coped with wartime challenges and opportunities. Ran- dom House grew rapidly during the war. Sales reached the million dollar mark in 1941 and exceeded three million dollars by 1946. Many new titles were published in smaller printings than demand would have justified and were out of …


Cover - Table Of Contents Jan 2007

Cover - Table Of Contents

Journal of the Iowa Academy of Science: JIAS

No abstract provided.


An Inventory Of The Vascular Flora Of Hamilton County, Iowa (2001-2004), Jimmie D. Thompson Jan 2007

An Inventory Of The Vascular Flora Of Hamilton County, Iowa (2001-2004), Jimmie D. Thompson

Journal of the Iowa Academy of Science: JIAS

A botanical survey of the vascular flora of Hamilton County, Iowa was conducted from 2001 to 2004. During this survey 973 taxa (761 native) were encountered. A search of the literature and a survey of Iowa State University's Ada Hayden Herbarium for additional documented specimens added 28 taxa to the flora. This total of 1001 taxa places Hamilton County fourth in vascular plant richness among inventories conducted in Iowa since 1950. A checklist including common names of most taxa, habitat and abundance data for all taxa encountered during the current survey is presented. Information on earlier collections includes source and …


Geneva International Centre For Humanitarian Demining 2006 Annual Report, Gichd Jan 2007

Geneva International Centre For Humanitarian Demining 2006 Annual Report, Gichd

Global CWD Repository

Annual narrative report on the work of the GICHD during 2006.


Itf Enhancing Human Security Annual Report 2007, Itf-Enhancy Human Security Jan 2007

Itf Enhancing Human Security Annual Report 2007, Itf-Enhancy Human Security

Global CWD Repository

Since 1998, ITF has grown into an internationally recognized organization, supported by donations from extensive number of governments, public and private organizations, companies and individuals that has already surpassed the figure of 240 million USD. Invaluable experience that has been accumulated in the last 10 years of work of ITF in Mine Action related areas as well as the experience gathered in the operations in the crisis-hit areas in which the Republic of Slovenia has been successfully involved proves that the decision to expand humanitarian and peace keeping operations in and beyond our region is proving to be the right …