Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Publications

2016

Discipline
Institution
Keyword

Articles 91 - 93 of 93

Full-Text Articles in Physical Sciences and Mathematics

Until We Meet Again, Richard Snow, Mary Snow Jan 2016

Until We Meet Again, Richard Snow, Mary Snow

Publications

As long ago as 1896, Svanti Arrenius conducted a scientific analysis of the relationship between carbon dioxide (CO2) and atmospheric temperatures. Several decades later, GS Callender collected and compiled temperature data from around the world and found there had been an increase in global temperatures. He hypothesized that the rising temperatures were resulting from increasing levels of CO2. These early studies piqued the interest of Gilbert Plass in the mid-20th century who endeavored to determine how CO2 affects temperature. In his effort to determine the possible effects that higher levels of CO2 in the atmosphere were having on the energy …


Remling's Theorem On Canonical Systems, Keshav R. Acharya Jan 2016

Remling's Theorem On Canonical Systems, Keshav R. Acharya

Publications

In this paper, we extend the Remling’s Theorem on canonical systems that the ω limit points of the Hamiltonian under the shift map are reflectionless on the support of the absolutely continuous part of the spectral measure of a canonical system.


From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman Jan 2016

From Enrollment To Employment: A Dacum Approach To Information Systems And Information Security And Assurance Curriculum Design, Leila Halawi, Wendi M. Kappers, Aaron Glassman

Publications

Issues associated with information security are numerous and diverse. Since the majority of organizational actions rely greatly on information and communication technologies, Information Systems (IS) security is now a main concern for firms, governments, institutes, and society as a whole. As a result, a plethora of graduate programs have been created, covering nearly every aspect of IS security. The authors review the current state of the IS industry presented in the literature, and identify a panel of IS experts in which to explore current job skill needs using a “Developing a Curriculum,” DACUM, process to support curriculum design for two …