Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

2014

Discipline
Keyword
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Physical Sciences and Mathematics

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North Dec 2014

Drip - Data Rich, Information Poor: A Concise Synopsis Of Data Mining, Muhammad Obeidat, Max North, Lloyd Burgess, Sarah North

Faculty Articles

As production of data is exponentially growing with a drastically lower cost, the importance of data mining required to extract and discover valuable information is becoming more paramount. To be functional in any business or industry, data must be capable of supporting sound decision-making and plausible prediction. The purpose of this paper is concisely but broadly to provide a synopsis of the technology and theory of data mining, providing an enhanced comprehension of the methods by which massive data can be transferred into meaningful information.


Real-Time Kinetic Studies Of Bacillus Subtilis Oxalate Decarboxylase And Ceriporiopsis Subvermispora Oxalate Oxidase Using Luminescent Oxygen Sensor, Laura Molina, Thomas Goodall, Umar Twahir, Ellen W. Moomaw Dec 2014

Real-Time Kinetic Studies Of Bacillus Subtilis Oxalate Decarboxylase And Ceriporiopsis Subvermispora Oxalate Oxidase Using Luminescent Oxygen Sensor, Laura Molina, Thomas Goodall, Umar Twahir, Ellen W. Moomaw

Faculty Articles

Oxalate decarboxylase (OxDC), an enzyme of the bicupin superfamily, catalyzes the decomposition of oxalate into carbon dioxide and formate at an optimal pH of 4.3 in the presence of oxygen. However, about 0.2% of all reactions occur through an oxidase mechanism that consumes oxygen while producing two equivalents of carbon dioxide and one equivalent of hydrogen peroxide. The kinetics of oxidase activity were studied by measuring the consumption of dissolved oxygen over time using a luminescent oxygen sensor. We describe the implementation of and improvements to the oxygen consumption assay. The oxidase activity of wild type OxDC was compared to …


Model For Ultrashort Laser-Pulse Induced Ionization Dynamics In Transparent Solids, Jeremy R. Gulley, Thomas E. Lanier Oct 2014

Model For Ultrashort Laser-Pulse Induced Ionization Dynamics In Transparent Solids, Jeremy R. Gulley, Thomas E. Lanier

Faculty Articles

A comprehensive model of ultrafast laser-induced plasma generation intended for coupling with pulse propagation simulations in transparent solids is introduced. It simultaneously accounts for the changing spectrum of a propagating ultrashort laser pulse while coupling to the evolution of the energy-resolved nonequilibrium free-carrier distribution. The presented results indicate that strong pulse chirps lead to ionization dynamics that are not captured by the standard monochromatic treatment of laser-induced plasma formation. These results have strong implications for ultrafast laser-solid applications that depend on ionization in a strong nonlinear focus.


Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng Oct 2014

Promoting Information Systems Major To Undergraduate Students - A Comprehensive Investigation, Lei Li, Chi Zhang, Guangzhi Zheng

Faculty Articles

Weak enrollment growth has been a concern for many Information Systems (IS) programs in recent years although the IT/IS job market remains strong. Stimulating undergraduate students’ interest to IS programs have been a challenge. In this paper, the researchers took a comprehensive approach to study how to effectively promote a Management Information Systems (MIS) program to undergraduate students at a medium-size public university in the southeastern US. Using a survey-based method, the researchers first investigated the factors that impact students’ selection of majors and identified students’ perceptions on an MIS program. In this paper, an MIS program promotion strategy was …


Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang Oct 2014

Developing Health Information Technology (Hit) Programs And Hit Curriculum: The Southern Polytechnic State University Experience, Chi Zhang, Han Reichgelt, Rebecca H. Rutherfoord, Andy Ju An Wang

Faculty Articles

Health Information Technology (HIT) professionals are in increasing demand as healthcare providers need help in the adoption and meaningful use of Electronic Health Record (EHR) systems while the HIT industry needs workforce skilled in HIT and EHR development. To respond to this increasing demand, the School of Computing and Software Engineering at Southern Polytechnic State University designed and implemented a series of HIT educational programs. This paper summarizes our experience in the HIT curriculum development and provides an overview of HIT workforce development initiatives and major HIT and health information management (HIM) educational resources. It also provides instructional implications and …


Endothelial Nitric Oxide Synthase Is Regulated By Erk Phosphorylation At Ser602, John C. Salerno, Dipak K. Ghosh, Raj Razdan, Katy A. Helms, Jonathan L. Mcmurry, Emily A. Rye, Carol A. Chrestensen Oct 2014

Endothelial Nitric Oxide Synthase Is Regulated By Erk Phosphorylation At Ser602, John C. Salerno, Dipak K. Ghosh, Raj Razdan, Katy A. Helms, Jonathan L. Mcmurry, Emily A. Rye, Carol A. Chrestensen

Faculty Articles

eNOS (endothelial nitric oxide synthase) contains a MAPK (mitogen-activated protein kinase)-binding site associated with a major eNOS control element. Purified ERK (extracellular-signal-regulated kinase) phosphorylates eNOS with a stoichiometry of 2–3 phosphates per eNOS monomer. Phosphorylation decreases NO synthesis and cytochrome c reductase activity. Three sites of phosphorylation were detected by MS. All sites matched the SP and TP MAPK (mitogen-activated protein kinase) phosphorylation motif. Ser602 lies at the N-terminal edge of the 42-residue eNOS AI (autoinhibitory) element. The pentabasic MAPK-binding site lies at the opposite end of the AI, and other critical regulatory features are between them. Thr46 and Ser58 …


Book Review - Roadside Geology Of Georgia, Melissa E. Johnson Oct 2014

Book Review - Roadside Geology Of Georgia, Melissa E. Johnson

Georgia Library Quarterly

A review of the book, Roadside Geography of Georgia.


Fibonacci Number Of The Tadpole Graph, Joe Demaio, John Jacobson Sep 2014

Fibonacci Number Of The Tadpole Graph, Joe Demaio, John Jacobson

Faculty Articles

In 1982, Prodinger and Tichy defined the Fibonacci number of a graph G to be the number of independent sets of the graph G. They did so since the Fibonacci number of the path graph Pn is the Fibonacci number F(n+2) and the Fibonacci number of the cycle graph Cn is the Lucas number Ln. The tadpole graph Tn,k is the graph created by concatenating Cn and Pk with an edge from any vertex of Cn to a pendant of Pk for integers n=3 and k=0. This paper establishes formulae and identities for the Fibonacci number of the tadpole graph …


Soft-Gluon Corrections In Fcnc Top-Quark Production Via Anomalous Gluon Couplings, Nikolaos Kidonakis, Elwin Martin Sep 2014

Soft-Gluon Corrections In Fcnc Top-Quark Production Via Anomalous Gluon Couplings, Nikolaos Kidonakis, Elwin Martin

Faculty Articles

We present a calculation of soft-gluon corrections in FCNC top-quark production via anomalous t-q-g couplings. The soft anomalous dimension matrix is explicitly calculated at one-loop accuracy. This calculation allows threshold resummation at next-to-leadinglogarithm accuracy. We also derive expressions for the soft-gluon corrections at NLO and at NNLO.


Distributed And Asynchronous Data Collection In Cognitive Radio Networks With Fairness Consideration, Zhipeng Cai, Shouling Ji, Jing He, Lin Wei Aug 2014

Distributed And Asynchronous Data Collection In Cognitive Radio Networks With Fairness Consideration, Zhipeng Cai, Shouling Ji, Jing He, Lin Wei

Faculty Articles

As a promising communication paradigm, Cognitive Radio Networks (CRNs) have paved a road for Secondary Users (SUs) to opportunistically exploit unused licensed spectrum without causing unacceptable interference to Primary Users (PUs). In this paper, we study the distributed data collection problem for asynchronous CRNs, which has not been addressed before. We study the Proper Carrier-sensing Range (PCR) for SUs. By working with this PCR, an SU can successfully conduct data transmission without disturbing the activities of PUs and other SUs. Subsequently, based on the PCR, we propose an Asynchronous Distributed Data Collection (ADDC) algorithm with fairness consideration for CRNs. ADDC …


Northern Winter Climate Change: Assessment Of Uncertainty In Cmip5 Projections Related To Stratosphere-Troposhere Coupling, E. Manzini, A. Yu. Karpechko, J. Anstey, M. P. Baldwin, R. X. Black, C. Cagnazzo, N. Calvo, A. Charlton-Perez, B. Christiansen, Paolo Davini, E. Gerber, M. Giorgettta, L. Gray, S. C. Hardiman, Y. Y. Lee, D. R. Marsh, Brent A. Mcdaniel, A. Purich, A. A. Scaife, D. Shindell, S. W. Son, S. Watanabe, G. Zappa Jul 2014

Northern Winter Climate Change: Assessment Of Uncertainty In Cmip5 Projections Related To Stratosphere-Troposhere Coupling, E. Manzini, A. Yu. Karpechko, J. Anstey, M. P. Baldwin, R. X. Black, C. Cagnazzo, N. Calvo, A. Charlton-Perez, B. Christiansen, Paolo Davini, E. Gerber, M. Giorgettta, L. Gray, S. C. Hardiman, Y. Y. Lee, D. R. Marsh, Brent A. Mcdaniel, A. Purich, A. A. Scaife, D. Shindell, S. W. Son, S. Watanabe, G. Zappa

Faculty Articles

Future changes in the stratospheric circulation could have an important impact on northern winter tropospheric climate change, given that sea level pressure (SLP) responds not only to tropospheric circulation variations but also to vertically coherent variations in troposphere-stratosphere circulation. Here we assess northern winter stratospheric change and its potential to influence surface climate change in the Coupled Model Intercomparison Project-Phase 5 (CMIP5) multimodel ensemble. In the stratosphere at high latitudes, an easterly change in zonally averaged zonal wind is found for the majority of the CMIP5 models, under the Representative Concentration Pathway 8.5 scenario. Comparable results are also found in …


Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez Jul 2014

Unraveling The Digital Literacy Paradox: How Higher Education Fails At The Fourth Literacy., Meg Coffin Murray, Jorge Perez

Faculty Articles

Governments around the globe are recognizing the economic ramifications of a digitally literate citizenry and implementing systemic strategies to advance digital literacy. Awareness of the growing importance of digital literacy in today’s workplace coexists paradoxically with apparent foot-dragging on the part of many universities in assessment and amplification of these important competencies. This paper makes a case for digital literacy, presents models of the complex construct, and presents the results of a digital literacy assessment administered to students enrolled in a senior seminar course at a regional university in the United States. Reflection on the study results evoked our mantra …


Nnll Threshold Resummation For Top-Pair And Single-Top Production, Nikolaos Kidonakis Jul 2014

Nnll Threshold Resummation For Top-Pair And Single-Top Production, Nikolaos Kidonakis

Faculty Articles

I discuss threshold resummation at NNLL accuracy in the standard moment-space approach in perturbative QCD for top-pair and single-top production. For top quark pair production I present new approximate NNLO results for the total cross section and for the top quark transverse momentum and rapidity distributions at 8 TeV LHC energy. I discuss the accuracy of the soft-gluon approximation and show that the NLO and NNLO approximate results from resummation are practically indistinguishable from exact NLO and partial NNLO results. For single top production I present new approximate NNLO results for the total cross sections in all three channels at …


Constraints Of The Radio-Loud/Radio-Quiet Dichotomy From The Fundamental Plane, David Garofalo, Matthew I. Kim, Damian J. Christian Jun 2014

Constraints Of The Radio-Loud/Radio-Quiet Dichotomy From The Fundamental Plane, David Garofalo, Matthew I. Kim, Damian J. Christian

Faculty Articles

The Fundamental Plane for black hole activity constitutes a tight correlation between jet power, X-ray luminosity, and black hole mass. Under the assumption that a Blandford–Znajek-type mechanism, which relies on black hole spin, contributes non-negligibly to jet production, the sufficiently small scatter in the Fundamental Plane shows that black hole spin differences of |Δa| ∼ 1 are not typical among the active galactic nuclei population. If – as it seems – radio-loud and radio-quiet objects are both faithful to the Fundamental Plane, models of black hole accretion in which the radio-loud/radio-quiet dichotomy is based on a spin dichotomy of a∼1/a∼0, …


Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier Jun 2014

Effective Detection Of Vulnerable And Malicious Browser Extensions, Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier

Faculty Articles

Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and iii) the high privilege of browser extension scripts. Furthermore, mechanisms that specifically target to mitigate browser extension-related attacks have received less attention as opposed to solutions that have been deployed for common web security problems (such as SQL injection, XSS, logic flaws, client-side vulnerabilities, …


Nnnlo Soft-Gluon Corrections For The Top-Antitop Pair Production Cross Section, Nikolaos Kidonakis May 2014

Nnnlo Soft-Gluon Corrections For The Top-Antitop Pair Production Cross Section, Nikolaos Kidonakis

Faculty Articles

I present a calculation of next-to-next-to-next-to-leading-order (NNNLO) soft-gluon corrections for top-antitop pair production in hadronic collisions. Approximate NNNLO (aNNNLO) results are obtained by adding the NNNLO soft-gluon corrections to the complete next-to-next-to-leading-order (NNLO) cross section. Theoretical predictions are shown for the total aNNNLO tt¯cross section at LHC and Tevatron energies. The aNNNLO cross sections are larger but have smaller theoretical uncertainties than at NNLO.


Nnlo Soft-Gluon Corrections For The Z-Boson And W-Boson Transverse Momentum Distributions, Nikolaos Kidonakis, Richard J. Gonsalves May 2014

Nnlo Soft-Gluon Corrections For The Z-Boson And W-Boson Transverse Momentum Distributions, Nikolaos Kidonakis, Richard J. Gonsalves

Faculty Articles

We present results for the Z-boson and W-boson transverse momentum (pT ) distributions for large pT at LHC and Tevatron energies. We calculate complete next-to-leadingorder (NLO) QCD corrections as well as soft-gluon corrections at next-to-next-to-leadingorder (NNLO) to the differential cross section. The NNLO soft-gluon contributions are derived from next-to-next-to-leading-logarithm (NNLL) resummation at two loops. We find enhancements of the pT distributions and reductions of the scale dependence when the NNLO corrections are included.


Simultaneous Approximation Of A Multivariate Function And Its Derivatives By Multilinear Splines, Ryan Anderson, Yuliya Babenko, Tetiana Leskevych Apr 2014

Simultaneous Approximation Of A Multivariate Function And Its Derivatives By Multilinear Splines, Ryan Anderson, Yuliya Babenko, Tetiana Leskevych

Faculty Articles

Abstract: In this paper we consider the approximation of a function by its interpolating multilinear spline and the approximation of its derivatives by the derivatives of the corresponding spline. We obtain the exact uniform approximation error on classes of functions with moduli of continuity bounded above by certain majorants. [Copyright &y& Elsevier]


2014 - The Nineteenth Annual Symposium Of Student Scholars Apr 2014

2014 - The Nineteenth Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Nineteenth Annual Symposium of Student Scholars, held on April 17, 2014. Includes abstracts from the presentations and posters.


Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray Mar 2014

Analysis Of A Scholarly Social Networking Site: The Case Of The Dormant User, Meg Murray

Faculty Articles

Many scholarly social networking sites targeting an audience of academicians and researchers have appeared on the Internet in recent years. Their vision is to change the way researchers connect, share and collaborate to solve real world problems. Despite the hype, however, their impact on higher education is unclear. Studies exist that address the benefits of these sites, but studies that investigate the implications of how scholarly social networking systems vet information, including data related to user profiles and uploaded content, is nonexistent. This paper chronicles the system management of user information for an inactive user of a scholarly social networking …


Plasma Generation By Ultrashort Multi-Chromatic Pulses During Nonlinear Propagation, Jeremy R. Gulley, Jiexi Liao, Thomas E. Lanier Mar 2014

Plasma Generation By Ultrashort Multi-Chromatic Pulses During Nonlinear Propagation, Jeremy R. Gulley, Jiexi Liao, Thomas E. Lanier

Faculty Articles

The use of femtosecond lasers in industrial, biomedical, and defense related applications during the last 15 years has necessitated a detailed understanding of pulse propagation coupled with ultrafast laser-material interactions. Current models of ultrashort pulse propagation in solids describe the pulse evolution of fields with broad spectra and are typically coupled to models of ionization and laser-plasma interaction that assume monochromatic laser fields. In this work we address some of the errors introduced by combining these inconsistent descriptions. In particular, we show that recently published experiments and simulations demonstrate how this contradiction can produce order-of-magnitude errors in calculating the ionization …


Lysine Deacetylase (Kdac) Regulatory Pathways: An Alternative Approach To Selective Modulation, Michael W. Van Dyke Mar 2014

Lysine Deacetylase (Kdac) Regulatory Pathways: An Alternative Approach To Selective Modulation, Michael W. Van Dyke

Faculty Articles

Protein lysine deacetylases (KDACs), including the classic Zn2+-dependent histone deacetylases (HDACs) and the nicotinamide adenine dinucleotide (NAD+)-requiring sirtuins, are enzymes that play critical roles in numerous biological processes, particularly the epigenetic regulation of global gene expression programs in response to internal and external cues. Dysregulation of KDACs is characteristic of several human diseases, including chronic metabolic, neurodegenerative, and cardiovascular diseases and many cancers. This has led to the development of KDAC modulators, two of which (HDAC inhibitors vorinostat and romidepsin) have been approved for the treatment of cutaneous T cell lymphoma. By their nature, existing KDAC modulators are relatively nonspecific, …


The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash Feb 2014

The Adoption Of E-Learning Systems In Low Income Countries: The Case Of Ethiopia, Yonas Hagos, Solomon Negash

Faculty Articles

This paper presents the Technology Acceptance Model (TAM) to examine the adoption of e-learning system in low-income countries, the case of Ethiopia. The research uses a quantitative research approach to examine Ethiopian tertiary level distance students’ determinant factors for the acceptance of e-learning systems. A questionnaire-based survey was conducted to collect data from 255 undergraduate distance learners in a higher education institute in Ethiopia. The data were analyzed using the Structural Equation Modeling (SEM) (Hair et al, 2005) technique to examine the causal model. The results indicated that perceived usefulness and perceived ease of use significantly affected distance learners’ behavioral …


Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au Jan 2014

Rethinking Fs-Isac: An It Security Information Sharing Network Model For The Financial Services Sector, Charles Zhechao Liu, Humayun Zafar, Yoris A. Au

Faculty Articles

This study examines a critical incentive alignment issue facing FS-ISAC (the information sharing alliance in the financial services industry). Failure to encourage members to share their IT security-related information has seriously undermined the founding rationale of FS-ISAC. Our analysis shows that many information sharing alliances’ membership policies are plagued with the incentive misalignment issue and may result in a “free-riding” or “no information sharing” equilibrium. To address this issue, we propose a new information sharing membership policy that incorporates an insurance option and show that the proposed policy can align members’ incentives and lead to a socially optimal outcome. Moreover, …


Hardware Components In Cybersecurity Education, Dan Chia-Tien Lo, Max North, Sarah North Jan 2014

Hardware Components In Cybersecurity Education, Dan Chia-Tien Lo, Max North, Sarah North

Faculty Articles

Hardware components have been designated as required academic content for colleges to be recognized as a center of academic excellence in cyber operations by the National Security Agency (NSA). To meet the hardware requirement, computer science and information technology programs must cover hardware concepts and design skills, topics which are less emphasized in existing programs. This paper describes a new pedagogical model for hardware based on network intrusion detection taught at college and graduate levels in a National Center of Academic Excellence in Information Assurance Education Program (CAE/IAE). The curriculum focuses on the fundamental concepts of network intrusion detection mechanisms, …


A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North Jan 2014

A Comparative Review Of Information Technology Project Management In Private And Public Sector Organization, Muhammad Obeidat, Max North

Faculty Articles

Both private and public sector organizations tend to recognize the prominence of information technology within project management techniques and practices. The primary objective of this paper is to present a comparative review of information technology within project management in private and public sectors. Moreover, this research provides an extensive review of related topics such as the evolution of information technology, factors contributing to project abandonment, and the tools and techniques of management that effect project success. In conclusion, the authors present a variety of practical and effective guidelines and recommend approaches for the successful deployment of information technology within project …