Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 162984

Full-Text Articles in Physical Sciences and Mathematics

Analyzing Data In A Repeated Measures Design: A Procedure To Determine If The Aggregate Data Should Be Analyzed Dec 9998

Analyzing Data In A Repeated Measures Design: A Procedure To Determine If The Aggregate Data Should Be Analyzed

John W. Fraas

No abstract provided.


Generating Pythagorean Triples: The Methods Of Pythagoras And Of Plato Via Gnomons, Janet Heine Barnett Jun 2107

Generating Pythagorean Triples: The Methods Of Pythagoras And Of Plato Via Gnomons, Janet Heine Barnett

Number Theory

No abstract provided.


Real Analysis I, Ismail Nikoufar Dec 2105

Real Analysis I, Ismail Nikoufar

Ismail Nikoufar

Real Analysis slides for my graduate students.


Effect Of Head Group Size On The Photoswitching Applications Of Azobenzene Disperse Red 1 Analogues, Chris Corkery, Alexis Goulet-Hanssens, Arri Priimagi, Christopher Barrett Dec 2103

Effect Of Head Group Size On The Photoswitching Applications Of Azobenzene Disperse Red 1 Analogues, Chris Corkery, Alexis Goulet-Hanssens, Arri Priimagi, Christopher Barrett

Chris Corkery

No abstract provided.


The Contribution Of Local And Transport Processes To Phytoplankton Biomass Variability Over Different Timescales In The Upper James River, Virginia, Qubin Qin, Jian Shen Sep 2018

The Contribution Of Local And Transport Processes To Phytoplankton Biomass Variability Over Different Timescales In The Upper James River, Virginia, Qubin Qin, Jian Shen

Articles

Although both local processes (photosynthesis, respiration, grazing, and settling), and transport processes (advective transport and diffusive transport) significantly affect local phytoplankton dynamics, it is difficult to separate their contributions and to investigate the relative importance of each process to the local variability of phytoplankton biomass over different timescales. A method of using the transport rate is introduced to quantify the contribution of transport processes. By combining the time-varying transport rate and high-frequency observed chlorophyll a data, we can explicitly examine the impact of local and transport processes on phytoplankton biomass over a range of timescales from hourly to annually. For ...


In Operando Mechanism Analysis On Nanocrystalline Silicon Anode Material For Reversible And Ultrafast Sodium Storage, Lei Zhang, Xianluo Hu, Chaoji Chen, Haipeng Guo, Xiaoxiao Liu, Gengzhao Xu, Haijian Zhong, Shuang Cheng, Peng Wu, Jiashen Meng, Yunhui Huang, Shi Xue Dou, Hua-Kun Liu Mar 2018

In Operando Mechanism Analysis On Nanocrystalline Silicon Anode Material For Reversible And Ultrafast Sodium Storage, Lei Zhang, Xianluo Hu, Chaoji Chen, Haipeng Guo, Xiaoxiao Liu, Gengzhao Xu, Haijian Zhong, Shuang Cheng, Peng Wu, Jiashen Meng, Yunhui Huang, Shi Xue Dou, Hua-Kun Liu

Australian Institute for Innovative Materials - Papers

Presently, lithium-ion batteries (LIBs) are the most promising commercialized electrochemical energy storage systems. Unfortunately, the limited resource of Li results in increasing cost for its scalable application and a general consciousness of the need to find new type of energy storage technologies. Very recently, substantial effort has been invested to sodium-ion batteries (SIBs) due to their effectively unlimited nature of sodium resources. Furthermore, the potential of Li/Li+ is 0.3 V lower than that of Na/Na+, which makes it more effective to limit the electrolyte degradation on the outer surface of the electrode.[1] Nevertheless, one major obstacle ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma Mar 2018

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma Mar 2018

A Model Of Competition Between Perpetual Software And Software As A Service, Zhiling Guo, Dan Ma

Research Collection School Of Information Systems

Software as a service (SaaS) has grown to be a significant segment of many software product markets. SaaS vendors, which charge customers based on use and continuously improve the quality of their products, have put competitive pressure on traditional perpetual software vendors, which charge a licensing fee and periodically upgrade the quality of their software. We develop an analytical model to study the competitive pricing strategies of an incumbent perpetual software vendor in the presence of a SaaS competitor. We find that, depending on both the SaaS quality improvement rate and the network effect, the perpetual software vendor adopts one ...


Iterative Matrix Factorization Method For Social Media Data Location Prediction, Natchanon Suaysom Jan 2018

Iterative Matrix Factorization Method For Social Media Data Location Prediction, Natchanon Suaysom

HMC Senior Theses

Since some of the location of where the users posted their tweets collected by social media company have varied accuracy, and some are missing. We want to use those tweets with highest accuracy to help fill in the data of those tweets with incomplete information. To test our algorithm, we used the sets of social media data from a city, we separated them into training sets, where we know all the information, and the testing sets, where we intentionally pretend to not know the location. One prediction method that was used in (Dukler, Han and Wang, 2016) requires appending one-hot ...


Strong Stability Of A Class Of Difference Equations Of Continuous Time And Structured Singular Value Problem, Qian Ma, Keqin Gu, Narges Choubedar Jan 2018

Strong Stability Of A Class Of Difference Equations Of Continuous Time And Structured Singular Value Problem, Qian Ma, Keqin Gu, Narges Choubedar

SIUE Faculty Research, Scholarship, and Creative Activity

This article studies the strong stability of scalar difference equations of continuous time in which the delays are sums of a number of independent parameters tau_i, i = 1, 2, . . . ,K. The characteristic quasipolynomial of such an equation is a multilinear function of exp(-tau_i s). It is known that the characteristic quasipolynomial of any difference equation set in the form of one-delayper- scalar-channel (ODPSC) model is also in such a multilinear form. However, it is shown in this article that some multilinear forms of quasipolynomials are not characteristic quasipolynomials of any ODPSC difference equation set. The equivalence between local strong ...


Recursive Non-Local Means Filter For Video Denoising, Redha A. Ali, Russell C. Hardie Dec 2017

Recursive Non-Local Means Filter For Video Denoising, Redha A. Ali, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

In this paper, we propose a computationally efficient algorithm for video denoising that exploits temporal and spatial redundancy. The proposed method is based on non-local means (NLM). NLM methods have been applied successfully in various image denoising applications. In the single-frame NLM method, each output pixel is formed as a weighted sum of the center pixels of neighboring patches, within a given search window.

The weights are based on the patch intensity vector distances. The process requires computing vector distances for all of the patches in the search window. Direct extension of this method from 2D to 3D, for video ...


Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu Dec 2017

Vkse-Mo: Verifiable Keyword Search Over Encrypted Data In Multi-Owner Settings, Yinbin Miao, Jianfeng Ma, Ximeng Liu, Junwei Zhang, Zhiquan Liu

Research Collection School Of Information Systems

Searchable encryption (SE) techniques allow cloud clients to easily store data and search encrypted data in a privacy-preserving manner, where most of SE schemes treat the cloud server as honest-but-curious. However, in practice, the cloud server is a semi-honest-but-curious third-party, which only executes a fraction of search operations and returns a fraction of false search results to save its computational and bandwidth resources. Thus, it is important to provide a results verification method to guarantee the correctness of the search results. Existing SE schemes allow multiple data owners to upload different records to the cloud server, but these schemes have ...


Graph Analytics Methods In Feature Engineering, Theophilus Siameh Dec 2017

Graph Analytics Methods In Feature Engineering, Theophilus Siameh

Electronic Theses and Dissertations

High-dimensional data sets can be difficult to visualize and analyze, while data in low-dimensional space tend to be more accessible. In order to aid visualization of the underlying structure of a dataset, the dimension of the dataset is reduced. The simplest approach to accomplish this task of dimensionality reduction is by a random projection of the data. Even though this approach allows some degree of visualization of the underlying structure, it is possible to lose more interesting underlying structure within the data. In order to address this concern, various supervised and unsupervised linear dimensionality reduction algorithms have been designed, such ...


Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding Dec 2017

Secure Server-Aided Top-K Monitoring, Yujue Wang, Hwee Hwa Pang, Yanjiang Yang, Xuhua Ding

Research Collection School Of Information Systems

In a data streaming model, a data owner releases records or documents to a set of users with matching interests, in such a way that the match in interest can be calculated from the correlation between each pair of document and user query. For scalability and availability reasons, this calculation is delegated to third-party servers, which gives rise to the need to protect the integrity and privacy of the documents and user queries. In this paper, we propose a server-aided data stream monitoring scheme (DSM) to address the aforementioned integrity and privacy challenges, so that the users are able to ...


Development, Energy, And Climate Change Policy: Enabling Sustainable Development Through Access To Energy, Robert J. Brecha Nov 2017

Development, Energy, And Climate Change Policy: Enabling Sustainable Development Through Access To Energy, Robert J. Brecha

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

Human rights, human development, and climate change clearly overlap in many ways. Development, as quantified by the Human Development Index (HDI), for example, has historically been strongly correlated with energy consumption. This fact is recognized in Sustainable Development Goal (SDG) 7, to “ensure access to affordable, reliable, sustainable and modern energy for all.” Currently the world is in the midst of a large wave of human migration, much of it involuntary and due to stymied development opportunities as well as political upheaval. Climate change will become, or already is, an exacerbating factor in migration dynamics.

A pertinent question is how ...


Democratic Civic Engagement: Transformative Local, Inclusive Decision-Making To Achieve Global Peace And Climate Solutions, Leah Ceperley Nov 2017

Democratic Civic Engagement: Transformative Local, Inclusive Decision-Making To Achieve Global Peace And Climate Solutions, Leah Ceperley

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

The UN Sustainable Development Goals call for action on Climate (No. 13) and Strengthening Governance (No. 16) as imperative to transform our world toward one that is resilient, just, and peaceful. Climate change is a global problem, marked frequently in the U.S. by indifference, with far-reaching impacts disproportionately burdening the poor and vulnerable worldwide. Global in scope, its sources, impacts, and fields of action are local. Combating indifference at the local level can strengthen local governance structures, build trust across ideological divides, and shift the conversation from indifference to action.

Using an example from a University of Dayton-sponsored National ...


Climate Change, Development, And The Global Commons, Robert J. Brecha Nov 2017

Climate Change, Development, And The Global Commons, Robert J. Brecha

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

An important link between energy, climate change, human development, and human rights comes in the form of a question that has yet to be answered satisfactorily: The earth’s atmosphere and other physical systems are the ultimate example of the global commons. Do future generations have a human right to an unchanged earth system? Sustainable Development Goals 13, 14, and 15 imply an affirmative answer. Given that climate scientists have a good estimate of the amount of carbon dioxide that can be emitted before the safe uptake capacity of the atmosphere is breached, how do we allocate that remaining atmospheric ...


Encounters With Climate Change: How Sdg 13 Can Move From Awareness To Action, Rebecca C. Potter Nov 2017

Encounters With Climate Change: How Sdg 13 Can Move From Awareness To Action, Rebecca C. Potter

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

In a well-known passage from his book I and Thou, Martin Buber relates his encounter with a tree: “I contemplate a tree,” he writes, and then lists the various ways he could perceive the tree, as an artist or biologist, as someone interested in the trees parts and construction or interested in its function as a living system. But in all cases, Buber observes, “the tree remains my object and has its place and its time span, its kind and condition.”

Yet sometimes, “if will and grace are conjoined,” Buber describes being drawn into a relation with the tree wherein ...


Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris Nov 2017

Building Academic/Practitioner Teams For Human Rights Projects: Examples, Lessons Learned, And Pitfalls To Avoid, Theresa Harris

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

Academics are increasingly interested in getting out of their classrooms and labs to contribute their knowledge, expertise, and resources to help communities develop evidence-based policies. In addition to post-election initiatives such as the March for Science and 314 Action, many academics are joining “without borders”-type programs and organizations that connect academics with opportunities to volunteer their time and talents for “social good.”

One of the longest-running of these is On-call Scientists, an initiative of the American Association for the Advancement of Science (AAAS) that connects human rights organizations with pro bono scientists across all fields — life, physical, behavioral, and ...


Book Review: Chandra's Cosmos: Dark Matter, Black Holes, And Other Wonders Revealed By Nasa's Premier X-Ray Observatory, T. D. Oswalt Nov 2017

Book Review: Chandra's Cosmos: Dark Matter, Black Holes, And Other Wonders Revealed By Nasa's Premier X-Ray Observatory, T. D. Oswalt

Publications

This document is Dr. Oswalt’s review of Chandra's cosmos: dark matter, black holes, and other wonders revealed by NASA's premier X-ray observatory by Wallace H. Tucker. Smithsonian Books, 2017. 266p bibl index ISBN 9781588345875, $29.95; ISBN 9781588345882 ebook, contact publiser for price.


Understanding Inactive Yet Available Assignees In Github, Jing Jiang, David Lo, Xinyu Ma, Fuli Feng, Li Zhang Nov 2017

Understanding Inactive Yet Available Assignees In Github, Jing Jiang, David Lo, Xinyu Ma, Fuli Feng, Li Zhang

Research Collection School Of Information Systems

Context In GitHub, an issue or a pull request can be assigned to a specific assignee who is responsible for working on this issue or pull request. Due to the principle of voluntary participation, available assignees may remain inactive in projects. If assignees ever participate in projects, they are active assignees; otherwise, they are inactive yet available assignees (inactive assignees for short). Objective Our objective in this paper is to provide a comprehensive analysis of inactive yet available assignees in GitHub. Method We collect 2,374,474 records of activities in 37 popular projects, and 797,756 records of activities ...


An Integrated Analysis Of The Oppliger And Harkness Oil Fields Using Well Log Data And 3d Seismic Data, Casey B. Langdon Nov 2017

An Integrated Analysis Of The Oppliger And Harkness Oil Fields Using Well Log Data And 3d Seismic Data, Casey B. Langdon

Masters Theses

Subsurface mapping from well points and 3D seismic interpretation are essential techniques used to study and locate structures in petroleum exploration. In this study, subsurface structure maps, detailed well log facies analysis, 3D seismic interpretation, and attribute analysis were used to map a Mississippian interval and middle Pennsylvanian age interval from two oil fields in Ness County, Kansas. The objective of this study is to analyze formation properties and facies distribution, map middle Pennsylvanian Cherokee channel deposits using seismic data, and to construct a structural model highlighting important features effecting oil production. Results show that the stratigraphic succession of this ...


Defaultification Refactoring: A Tool For Automatically Converting Java Methods To Default, Raffi T. Khatchadourian, Hidehiko Masuhara Oct 2017

Defaultification Refactoring: A Tool For Automatically Converting Java Methods To Default, Raffi T. Khatchadourian, Hidehiko Masuhara

Publications and Research

Enabling interfaces to declare (instance) method implementations, Java 8 default methods can be used as a substitute for the ubiquitous skeletal implementation software design pattern. Performing this transformation on legacy software manually, though, may be non-trivial. The refactoring requires analyzing complex type hierarchies, resolving multiple implementation inheritance issues, reconciling differences between class and interface methods, and analyzing tie-breakers (dispatch precedence) with overriding class methods. All of this is necessary to preserve type-correctness and confirm semantics preservation. We demonstrate an automated refactoring tool called Migrate Skeletal Implementation to Interface for transforming legacy Java code to use the new default construct. The ...


Discrete Space-Time Model For Heat Conduction: Application To Sizedependent Thermal Conductivity In Nano-Films, Sergey Sobolev Oct 2017

Discrete Space-Time Model For Heat Conduction: Application To Sizedependent Thermal Conductivity In Nano-Films, Sergey Sobolev

Sergey Sobolev

No abstract provided.


Characterizing The Effects Of Radiation On Muscle Cells, Lori Caldwell, Elizabeth Vargis, Charles Harding, Jr Dennison Oct 2017

Characterizing The Effects Of Radiation On Muscle Cells, Lori Caldwell, Elizabeth Vargis, Charles Harding, Jr Dennison

Posters

One of the primary concerns for those spending time in low gravity and high radiation environments is muscle atrophy. A major cause of muscular atrophy is oxidative stress which is amplified by increased levels of ionizing radiation during spaceflight. Additionally, high levels of radiation can damage DNA, increasing the risk of cancer. Utah State University’s Space Environment Test Facility was used to irradiate C2C12 myoblasts and human vascular endothelial cells with a beta-radiation dosage mimicking that on the International Space Station and a 3-year deep space mission.


Cohen Factorizations: Weak Functoriality And Applications, Saeed Nasseh, Sean Sather-Wagstaff Oct 2017

Cohen Factorizations: Weak Functoriality And Applications, Saeed Nasseh, Sean Sather-Wagstaff

Saeed Nasseh

We investigate Cohen factorizations of local ring homomorphisms from three perspectives. First, we prove a “weak functoriality” result for Cohen factorizations: certain morphisms of local ring homomorphisms induce morphisms of Cohen factorizations. Second, we use Cohen factorizations to study the properties of local ring homomorphisms (Gorenstein, Cohen–Macaulay, etc.) in certain commutative diagrams. Third, we use Cohen factorizations to investigate the structure of quasi-deformations of local rings, with an eye on the question of the behavior of CI-dimension in short exact sequences.


Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder Oct 2017

Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder

KSU Proceedings on Cybersecurity Education, Research and Practice

Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers ...


A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi Oct 2017

A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi

KSU Proceedings on Cybersecurity Education, Research and Practice

This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.


Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper Oct 2017

Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper

KSU Proceedings on Cybersecurity Education, Research and Practice

The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune ...


Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock Oct 2017

Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock

KSU Proceedings on Cybersecurity Education, Research and Practice

For several decades, researchers have stated that human error is a significant cause of information security breaches, yet it still remains to be a major issue today. Quantifying the effects of security incidents is often a difficult task because studies often understate or overstate the costs involved. Human error has always been a cause of failure in many industries and professions that is overlooked or ignored as an inevitability. The problem with human error is further exacerbated by the fact that the systems that are set up to keep networks secure are managed by humans. There are several causes of ...