Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Adaptive wavelet denoising (1)
- Binning (1)
- Binuclear (1)
- Bootstrap (1)
- Carbohydrates (1)
-
- Catalase (1)
- Clustering (1)
- Copper(II) complexes (1)
- Copper-base adduct (CuB2) (1)
- Dependent proportions (1)
- Differential (1)
- Differentiating total dominating set (1)
- Domination (1)
- EM algorithm (1)
- HPLC (1)
- Hydrogen peroxide (1)
- Infant formula (1)
- Lactose (1)
- Locating-total dominating set (1)
- MALDI-TOF (1)
- Mass spectrum. (1)
- Missing data (1)
- Mononuclear (1)
- Nessus (1)
- Network security (1)
- Nmap (1)
- Peak processing (1)
- Profit margin of a graph (1)
- Reducing-sugars (1)
- Risk communication (1)
Articles 1 - 9 of 9
Full-Text Articles in Entire DC Network
Kinetics And Mechanism Of The Catalysis Of The Decomposition Of Hydrogen Peroxide By Schiff Base Complexes Of Copper(Ii)., Timothy Kum Beng
Kinetics And Mechanism Of The Catalysis Of The Decomposition Of Hydrogen Peroxide By Schiff Base Complexes Of Copper(Ii)., Timothy Kum Beng
Electronic Theses and Dissertations
Spectroscopic studies have been used to describe the mechanism of the decomposition of hydrogen peroxide by solutions of a dimeric Cu(II) complex of a dissymetric Schiff base, [CuSALAD]2.H2O, and imidazole or methyl substituted imidazoles, B, which form monomeric CuSALAD.B2 complexes, in aqueous ethanol solvent. Freezing point depression and vapor pressure lowering studies were carried out to confirm the dimeric nature of the [CuSALAD]2.H2O complex that had been previously reported. The stoichiometry of the [CuSALAD]2.H2O-imidazole equilibrium was extensively studied pointing to a 1:4 stoichiometry. The CuSALAD.B2 adducts …
Maldi-Tof Ms Data Processing Using Wavelets, Splines And Clustering Techniques., Shuo Chen
Maldi-Tof Ms Data Processing Using Wavelets, Splines And Clustering Techniques., Shuo Chen
Electronic Theses and Dissertations
Mass Spectrometry, especially matrix assisted laser desorption/ionization (MALDI) time of flight (TOF), is emerging as a leading technique in the proteomics revolution. It can be used to find disease-related protein patterns in mixtures of proteins derived from easily obtained samples. In this paper, a novel algorithm for MALDI-TOF MS data processing is developed. The software design includes the application of splines for data smoothing and baseline correction, wavelets for adaptive denoising, multivariable statistics techniques such as clustering analysis, and signal processing techniques to evaluate the complicated biological signals. A MatLab implementation shows the processing steps consecutively including step-interval unification, adaptive …
Requirement Elicitation Of Large Web Projects., David E. Frazier
Requirement Elicitation Of Large Web Projects., David E. Frazier
Electronic Theses and Dissertations
One of the most important aspects of developing a large Web-based project is getting the correct requirements from the client. Time and money can be lost if the requirements are incomplete or inaccurate. Traditional Web design sources tend to gloss over this important activity.
Software engineering is a mature field that can help in the quest for more complete and accurate requirement gathering. This paper explores the ways that traditional software engineering techniques can be applied to Web projects. A methodology is presented based on both existing and new techniques. Several experiments are conducted to determine the usefulness of each …
Risk Perceptions Of Adults In The Town Of Unicoi, Tennessee, Regarding The Possible Building Of A Uranium Enrichment Plant., Shannon Kathleen Sellards
Risk Perceptions Of Adults In The Town Of Unicoi, Tennessee, Regarding The Possible Building Of A Uranium Enrichment Plant., Shannon Kathleen Sellards
Electronic Theses and Dissertations
A prolonged siting controversy for a uranium enrichment facility has occurred in the Town of Unicoi, Tennessee. One hundred-seventy residents of Unicoi were interviewed using a questionnaire regarding the building of a proposed uranium enrichment facility for Unicoi. The questionnaire sought to determine relationships between residents’ risk perceptions and 18 variables. When the Fisher’s exact procedure was applied at α< 0.05, the results indicated several associations. Odds ratio measured the strength of association. Results are reported as crude measures of association. Risk perceptions were influenced by the choice of possible locations for the facility [p=0.0003; OR=32.6]. Residents' risk perceptions were associated with a history of working with nuclear materials [p=0.0476; OR=3.2]. Finally, risk perceptions were associated with residents' beliefs that the nuclear facility would affect their health [p=0.0001; OR=18.8]. These results are discussed in light of risk perception and communication theories.
Using The Em Algorithm To Estimate The Difference In Dependent Proportions In A 2 X 2 Table With Missing Data., Alain Duclaux Talla Souop
Using The Em Algorithm To Estimate The Difference In Dependent Proportions In A 2 X 2 Table With Missing Data., Alain Duclaux Talla Souop
Electronic Theses and Dissertations
In this thesis, I am interested in estimating the difference between dependent proportions from a 2 × 2 contingency table when there are missing data. The Expectation-Maximization (EM) algorithm is used to obtain an estimate for the difference between correlated proportions. To obtain the standard error of this difference I employ a resampling technique known as bootstrapping. The performance of the bootstrap standard error is evaluated for different sample sizes and different fractions of missing information. Finally, a 100(1-α)% bootstrap confidence interval is proposed and its coverage is evaluated through simulation.
Differentials Of Graphs., Jason Robert Lewis
Differentials Of Graphs., Jason Robert Lewis
Electronic Theses and Dissertations
Let G=(V,E) be an arbitrary graph, and consider the following game. You are allowed to buy as many tokens from a bank as you like, at a cost of $1 each. For example, suppose you buy k tokens. You then place the tokens on some subset of k vertices of V. For each vertex of G which has no token on it, but is adjacent to a vertex with a token on it, you receive $1 from the bank. Your objective is to maximize your profit, that is, the total value received from the …
A Vulnerability Assessment Of The East Tennessee State University Administrative Computer Network., James Patrick Ashe
A Vulnerability Assessment Of The East Tennessee State University Administrative Computer Network., James Patrick Ashe
Electronic Theses and Dissertations
A three phase audit of East Tennessee State University's administrative computer network was conducted during Fall 2001, Spring 2002, and January 2004. Nmap and Nessus were used to collect the vulnerability data. Analysis discovered an average of 3.065 critical vulnerabilities per host with a low of 2.377 in Spring 2001 to a high of 3.694 in Fall 2001. The number of unpatched Windows operating system vulnerabilities, which accounted for over 75% of these critical vulnerabilities, strongly argues for the need of an automated patch deployment system for the approximately 3,000 Windows-based systems at ETSU.
Determination Of Lactose By Reversed-Phase High Performance Liquid Chromatography., Danessa Leann Sexton
Determination Of Lactose By Reversed-Phase High Performance Liquid Chromatography., Danessa Leann Sexton
Electronic Theses and Dissertations
Lactose is the common disaccharide found in dairy products. It can, however, be a source of discomfort for those whom are lactose intolerant. Therefore, it is necessary to accurately, reliably, and efficiently determine the lactose content of foods. The goal of this research was to develop a reversed-phase HPLC method with UV detection for the determination of lactose. Aminobenzoic acid was used to prepare a derivative, making detection possible in the 300-360 nm region. The stationary phase is a C8 column, with 85% methanol 15% water mixture at pH 5 as the mobile phase. A linear response of peak area …
Locating And Total Dominating Sets In Trees., Jamie Marie Howard
Locating And Total Dominating Sets In Trees., Jamie Marie Howard
Electronic Theses and Dissertations
A set S of vertices in a graph G=(V,E) is a total dominating set of G if every vertex of V is adjacent to some vertex in S. In this thesis, we consider total dominating sets of minimum cardinality which have the additional property that distinct vertices of V are totally dominated by distinct subsets of the total dominating set.