Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Missouri University of Science and Technology

Masters Theses

Discipline
Keyword
Publication Year

Articles 211 - 240 of 839

Full-Text Articles in Physical Sciences and Mathematics

Evolving Decision Trees For The Categorization Of Software, Jasenko Hosic Jan 2014

Evolving Decision Trees For The Categorization Of Software, Jasenko Hosic

Masters Theses

"Current manual techniques of static reverse engineering are inefficient at providing semantic program understanding. An automated method to categorize applications was developed in order to quickly determine pertinent characteristics. Prior work in this area has had some success, but a major strength of the approach detailed in this thesis is that it produces heuristics that can be reused for quick analysis of new data. The method relies on a genetic programming algorithm to evolve decision trees which can be used to categorize software. The terminals, or leaf nodes, within the trees each contain values based on selected features from one …


Pn Anisotropy Tomography Of The Colorado Plateau And Adjacent Areas, Shengyao Cheng Jan 2014

Pn Anisotropy Tomography Of The Colorado Plateau And Adjacent Areas, Shengyao Cheng

Masters Theses

"The Pn tomography method utilizes seismic waves that refract along the Moho interface to perform inversion in order to investigate velocity anomalies and seismic anisotropy in the uppermost mantle. Results from Pn tomography can provide important information about the composition, temperature, and tectonic processes beneath the study area. Over the past decades, numerous seismic and geologic studies have been conducted in the Colorado Plateau and its adjacent areas to reveal crustal and mantle structures and processes responsible for the diverse surface geological features and tectonic events that have occurred in this area. To investigate lateral variations in the uppermost mantle …


Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee Jan 2014

Privacy Preservation Using Spherical Chord, Doyal Tapan Mukherjee

Masters Theses

"Structured overlay networks are primarily used in data storage and data lookup, but they are vulnerable against many kinds of attacks. Within the realm of security, overlay networks have demonstrated applicability in providing privacy, availability, integrity, along with scalability. The thesis first analyses the Chord and the SALSA protocols which are organized in structured overlays to provide data with a certain degree of privacy, and then defines a new protocol called Spherical Chord which provides data lookup with privacy, while also being scalable, and addresses critical existing weaknesses in Chord and SALSA protocols. Spherical Chord is a variant of the …


Energy Efficient Scheduling And Allocation Of Tasks In Sensor Cloud, Rashmi Dalvi Jan 2014

Energy Efficient Scheduling And Allocation Of Tasks In Sensor Cloud, Rashmi Dalvi

Masters Theses

"Wireless Sensor Network (WSN) is a class of ad hoc networks that has capability of self-organizing, in-network data processing, and unattended environment monitoring. Sensor-cloud is a cloud of heterogeneous WSNs. It is attractive as it can change the computation paradigm of wireless sensor networks. In Sensor-Cloud, to gain profit from underutilized WSNs, multiple WSN owners collaborate to provide a cloud service. Sensor Cloud users can simply rent the sensing services which eliminates the cost of ownership, enabling the usage of large scale sensor networks become affordable. The nature of Sensor-Cloud enables resource sharing and allows virtual sensors to be scaled …


Shear-Wave Splitting And Mantle Deformation Beneath The Western Tibetan Plateau, Melissa Ann Ray Jan 2014

Shear-Wave Splitting And Mantle Deformation Beneath The Western Tibetan Plateau, Melissa Ann Ray

Masters Theses

"The Tibetan Plateau has been an enigma to the scientific community since scientists first began to focus their attention on the area. Numerous studies over the decades were conducted to address how the plateau formed, mostly in the central and eastern portions of the Tibetan Plateau. Many questions still remain regarding the western Tibetan Plateau, and this study will add constraints to the mechanisms which regulated the formation of the plateau.

Data was acquired from over 13,000 measurements from 172 stations covering the western region of the plateau encompassing the Qiangtang Terrane, the Lhasa Terrane, and the Himalayan Orogenic Zone. …


An Iterative Algorithm For Variational Data Assimilation Problems, Xin Shen Jan 2014

An Iterative Algorithm For Variational Data Assimilation Problems, Xin Shen

Masters Theses

"Data assimilation is a very powerful and efficient tool to use collected raw data for improving model prediction in numerical weather forecasting, hydrology, and many other areas of geosciences. In this thesis, an iterative algorithm [23] of variational data assimilation with finite element method is utilized to study different models. One motivation for this fundamental mathematical study is to provide a potential tool for simulation of CO2 sequestration by extending it to more realistic and sophisticated models in the future. The basic idea of variational data assimilation is to utilize the framework of optimal control problems. We apply the …


On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu Jan 2014

On Temporal And Frequency Responses Of Smartphone Accelerometers For Explosives Detection, Srinivas Chakravarthi Thandu

Masters Theses

"The increasing frequency of explosive disasters throughout the world in recent years have created a clear need for the systems to monitor for them continuously for better detection and to improve the post disaster rescue operations. Dedicated sensors deployed in the public places and their associated networks to monitor such explosive events are still inadequate and must be complemented for making the detection more pervasive and effective. Modern smart phones are a rich source of sensing because of the fact that they are equipped with wide range of sensors making these devices an appealing platform for pervasive computing applications. The …


Ecology Of A Declining Great Plains Fish, Fundulus Sciadicus, In The Missouri Ozarks, Gregory Travis Thompson Jan 2014

Ecology Of A Declining Great Plains Fish, Fundulus Sciadicus, In The Missouri Ozarks, Gregory Travis Thompson

Masters Theses

"Anthropogenic habitat disturbances are of growing concern due to their impacts on native biota, especially in freshwater ecosystems. Damming, channelization, urbanization, wetland draining, and non-native fish introductions all play large roles in habitat homogeneity, fragmentation, and species competition. This has negative effects on native fish and invertebrate species. In the Midwestern United States, the plains topminnow (Fundulus sciadicus) has been declining across its range, to the point of becoming a species of special concern in Missouri. This is possibly due to a combination of the above anthropogenic habitat disturbances. To better understand the ecology of the plains topminnow …


Efficient Integrity Verification Of Replicated Data In Cloud, Raghul Mukundan Jan 2013

Efficient Integrity Verification Of Replicated Data In Cloud, Raghul Mukundan

Masters Theses

"The cloud computing is an emerging model in which computing infrastructure resources are provided as a service over the Internet. Data owners can outsource their data by remotely storing them in the cloud and enjoy on-demand high quality services from a shared pool of configurable computing resources. By using these data storage services, the data owners can relieve the burden of local data storage and maintenance. However, since data owners and the cloud servers are not in the same trusted domain, the outsourced data may be at risk as the cloud server may no longer be fully trusted. Therefore, data …


Secure Design Defects Detection And Correction, Wenquan Wang Jan 2013

Secure Design Defects Detection And Correction, Wenquan Wang

Masters Theses

"Bad design and software defects often make source codes hard to understand and lead to maintenance difficulties. In order to detect and fix such defects, researchers have systematically investigated these issues and designed different effective algorithms to tackle the problems. However, most of these methods need source codes/models for defect detection and correction. Commercial companies, like banks, may not be willing to provide their source models due to data security. Therefore, it is a huge challenge to detect software detects by a consulting company as well as to keep source models confidential. This thesis analyze security issues in existing approaches …


Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler Jan 2013

Women Authors Of Technical Writing Textbooks From 1923 To 1973, Melissa Nicole Wampler

Masters Theses

"The published histories of technical writing textbooks do not usually include many women-authored textbooks. To find out why women-authored textbooks have been marginalized in these pedagogical histories, I selected seven women-authored textbooks and four men-authored textbooks published from 1923 to 1973, investigated the backgrounds of the authors and key features of their textbooks, and used the collected data to compare the women-authored textbooks to the men-authored textbooks. I was not able to find any reason why the women-authored textbooks have been or should be marginalized in histories of technical writing textbooks; however, my study had several limitations. My thesis begins …


Broad-Spectrum Antibacterial Properties Of Metal-Ion Doped Borate Bioactive Glasses For Clinical Applications, Megan Ottomeyer Jan 2013

Broad-Spectrum Antibacterial Properties Of Metal-Ion Doped Borate Bioactive Glasses For Clinical Applications, Megan Ottomeyer

Masters Theses

"Bioactive glasses with antimicrobial properties can be implemented as coatings on medical devices and implants, as well as a treatment for tissue repair and prevention of common hospital-acquired infections such as MRSA A borate-containing glass, B3, is also undergoing clinical trials to assess wound-healing properties. The sensitivities of various bacteria to B3, B3-Ag, B3-Ga, and B3-I bioactive glasses were tested. In addition, the mechanism of action for the glasses was studied by spectroscopic enzyme kinetics experiments, Live-Dead staining fluorescence microscopy, and luminescence assays using two gene fusion strains of Escherichia coli.

It was found that gram-positive bacteria were more …


Sybil Detection In Vehicular Networks, Muhammad Ibrahim Almutaz Jan 2013

Sybil Detection In Vehicular Networks, Muhammad Ibrahim Almutaz

Masters Theses

"A Sybil attack is one where an adversary assumes multiple identities with the purpose of defeating an existing reputation system. When Sybil attacks are launched in vehicular networks, an added challenge in detecting malicious nodes is mobility that makes it increasingly difficult to tie a node to the location of attacks. In this thesis, we present an innovative protocol for Sybil detection in vehicular networks. Considering that vehicular networks are cyber-physical systems integrating cyber and physical components, our technique exploits well grounded results in the physical (i.e., transportation) domain to tackle the Sybil problem in the cyber domain. Compared to …


A Structural Analysis Of The El Kasr Structure In The Western Desert Of Egypt, Trevor Charles Ellis Jan 2013

A Structural Analysis Of The El Kasr Structure In The Western Desert Of Egypt, Trevor Charles Ellis

Masters Theses

"The El Kasr structure was studied in order to investigate the origins and evolution of the enigmatic Desert Eyes structures of the Western Desert due to its accessibility and uniqueness among the structures. The El Kasr structure, an elongate structural basin with low limb dips, is unique among the "Desert Eyes" structures in that it: 1) occurs in isolation in otherwise horizontal sedimentary rock, 2) the long dimension of the basin is oriented NNW, 3) it is closely spatially associated with the less common NNW fault zones, and 4) is composite in nature. The structure was investigated using remote sensing …


Security Analysis Of A Cyber Physical System : A Car Example, Jason Madden Jan 2013

Security Analysis Of A Cyber Physical System : A Car Example, Jason Madden

Masters Theses

"Deeply embedded Cyber Physical Systems (CPS) are infrastructures that have significant cyber and physical components that interact with each other in complex ways. These interactions can violate a system's security policy, leading to the leakage of rights and unintended information flow. This thesis will explore information flow as it uses a public channel. In order to exemplify the use of the public channel, a vehicle being composed of the computer system and its operators will show how information is disclosed to an observer. The example is made up of a vehicle traveling across some terrain with an observer watching the …


Comparative Evaluation Of N-Acetylcysteine And N-Acetylcysteine Amide In Acetaminophen-Induced Oxidative Stress, Ahdab Naeem Khayyat Jan 2013

Comparative Evaluation Of N-Acetylcysteine And N-Acetylcysteine Amide In Acetaminophen-Induced Oxidative Stress, Ahdab Naeem Khayyat

Masters Theses

"Acetaminophen (APAP) is the most widely used pharmaceutical analgesic-antipyretic agent in the world, but its toxicity is a common cause of drug-induced hepatotoxicity. With APAP toxicity, cellular glutathione (GSH) is depleted. This results in the availability of N-acetyl-p-benzoquinone imine (NAPQI), is a toxic metabolite of APAP that binds to cellular macromolecules, which leads to cell necrosis. N-acetyl cysteine (NAC), a GSH precursor, is the only approved antidote for an acetaminophen overdose. It is a negatively charged molecule that diminishes its penetration into the cells, thereby requiring fairly high doses that increase the severity of side effects. In addition, oral and …


Assessment Of An Enterprise Employee Portal Using Dashboard Monitoring System: A Case Study, Aditi Mishra Jan 2013

Assessment Of An Enterprise Employee Portal Using Dashboard Monitoring System: A Case Study, Aditi Mishra

Masters Theses

"A portal is a browser-based application that provides a web platform for users to improve inter-department collaboration and customer service. Portals are classified either as internal facing portals or external public facing portals. This study addresses the problems facing an internal portal related to its contents, functions and usability and provides a list of essential contents and functions that it should include through integrating theories and industry best practices. The theory framework is based on literature review and the industry best practices are based on the analysis of a number of internal portals of companies used as case studies. These …


Immersed Finite Element Method For Interface Problems With Algebraic Multigrid Solver, Wenqiang Feng Jan 2013

Immersed Finite Element Method For Interface Problems With Algebraic Multigrid Solver, Wenqiang Feng

Masters Theses

"This thesis is to discuss the bilinear and 2D linear immersed finite element (IFE) solutions generated from the algebraic multigrid solver for both stationary and moving interface problems. In contrast to the body-fitting mesh restriction of the traditional finite element methods or finite difference methods for interface problems, a number of numerical methods based on structured meshes independent of the interface have been developed. When these methods are applied to the real world applications, we often need to solve the corresponding large scale linear systems many times, which demands efficient solvers. The algebraic multigrid (AMG) method is a natural choice …


Shopping Alone Online Vs. Co-Browsing: A Physiological And Perceptual Comparison, Ceren Topaloglu Jan 2013

Shopping Alone Online Vs. Co-Browsing: A Physiological And Perceptual Comparison, Ceren Topaloglu

Masters Theses

"Although shopping is a social activity frequently performed with friends and family members, most online shopping is done alone. With the development of Web 2.0 technologies and the increasing popularity of social networking sites, online social shopping has emerged as a new phenomenon that allows more social interaction, participation, and satisfaction for customers while shopping online. Therefore, companies have started to use social shopping tools in their e-commerce websites to facilitate online social shopping. Co-browsing is one of the more recent online social shopping tools available, enabling users to shop or browse together by offering synchronized web views and chat …


Search-Based Model Summarization, Lokesh Krishna Ravichandran Jan 2013

Search-Based Model Summarization, Lokesh Krishna Ravichandran

Masters Theses

"Large systems are complex and consist of numerous components and interactions between the components. Hence managing such large systems is a cumbersome and time consuming task. Large systems are usually described at the model level. But the large number of components in such models makes it difficult to modify. As a consequence, developers need a solution to rapidly detect which model components to revise. Effective solution is to generate a model summary. Although existing techniques are powerful enough to provide good summaries based on lexical information (relevant terms), they do not make use of structural information (component structure) well. In …


Hybridizing And Applying Computational Intelligence Techniques, Jeffery Scott Shelburg Jan 2013

Hybridizing And Applying Computational Intelligence Techniques, Jeffery Scott Shelburg

Masters Theses

"As computers are increasingly relied upon to perform tasks of increasing complexity affecting many aspects of society, it is imperative that the underlying computational methods performing the tasks have high performance in terms of effectiveness and scalability. A common solution employed to perform such complex tasks are computational intelligence (CI) techniques. CI techniques use approaches influenced by nature to solve problems in which traditional modeling approaches fail due to impracticality, intractability, or mathematical ill-posedness. While CI techniques can perform considerably better than traditional modeling approaches when solving complex problems, the scalability performance of a given CI technique alone is not …


Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young Jan 2013

Lexis In Chemical Engineering Discourse: Analyzing Style In Chemical Engineering Research Articles Through A Rhetorical Lens, David Lamar Young

Masters Theses

"This study examines the style of chemical engineering research articles to discover stylistic trends that may be applicable to authors looking to publish their own research. Rhetorical stylistic analysis was used as a research method to allow for thorough analysis of all articles in the sample. Ten research articles from the two prominent chemical engineering journals were chosen using specific criteria to constitute a sample of articles that could most accurately represent the population of chemical engineering research articles. Each article was then analyzed line by line to identify markers of chemical engineering research article style, including the following: ▬Use …


Production Of 1,3-Propanediol From Glycerol Under Haloalkaline Conditions By Halanaerobium Hydrogeniformans, Daniel William Roush Jan 2013

Production Of 1,3-Propanediol From Glycerol Under Haloalkaline Conditions By Halanaerobium Hydrogeniformans, Daniel William Roush

Masters Theses

"With increased demands around the world to make modern lifestyles more environmentally friendly, the chemical commodity market has rapidly shifted. Through new technologies in chemical production, certain high value products have oversaturated the market and have become high-volume, low value waste products. The expansion of biodiesel production offers a prime example; high volumes of glycerol byproduct from this process have shifted glycerol from a high priced commodity to a common waste product. A number of microorganisms are known to synthesize the polymeric precursor 1,3-propanediol from glycerol; however, crude glycerol from biodiesel production creates a harsh environment for most microbes, and …


Wetting And Drying Cycles And The Fungal Communities On Leaf Litter In Streams, Kele Qwinn Thrailkill Jan 2013

Wetting And Drying Cycles And The Fungal Communities On Leaf Litter In Streams, Kele Qwinn Thrailkill

Masters Theses

"Leaf litter is a major source of energy for streams in deciduous forests. Fungi play a critical role by converting the leaves into nutritional material for the rest of the food web. The breakdown of leaf litter and associated biota, including invertebrates and fungi, have been proposed as measures of stream health in systems affected by anthropogenic activity. Rates of leaf breakdown can be depressed in streams affected by acidity, metals, organic contaminants, and other stressors. Climate change may lead to alterations in stream hydrology such that streams experience more frequent floods as well as drying episodes. Fungal communities can …


Role Of Nicotine In Oxidative Stress, Rakesh Kacham Jan 2013

Role Of Nicotine In Oxidative Stress, Rakesh Kacham

Masters Theses

"Nicotine, a major alkaloid, is present in tobacco products as well as in smaller amounts in potatoes, tomatoes, and eggplants. Although it is the addictive compound in cigarettes, nicotine is believed to play a protective role in neurodegenerative disorders such as Parkinson's disease. Researchers have found that the short-term administration of nicotine may help improve the memory process by reducing oxidative stress in the brain. Our studies have shown that, by blocking Fenton's reaction, nicotine is able to inhibit free radical generation, so this research has focused on the antioxidant properties of nicotine. The cell lines of the alveoli, blood …


Statistical Analysis Of Microarray Data In Sleep Deprivation, Stephanie Marie Berhorst Jan 2013

Statistical Analysis Of Microarray Data In Sleep Deprivation, Stephanie Marie Berhorst

Masters Theses

"Microarray technology is a useful tool for studying the expression levels of thousands of genes or exons within a single experiment. Data from microarray experiments present many challenges for researchers since costly resources often limit the experimenter to small sample sizes and large amounts of data are generated. The researcher must carefully consider the appropriate statistical analysis to use that aligns with the experimental design employed. In this work, statistical issues are investigated and addressed for a microarray experiment that examines how expression levels change over time as individuals are sleep deprived. Over the course of 48 hours of sleep …


Part I: Increased Leaching Of Arsenic, Selenium, Molybdenum, And Vanadium From High Calcium Coal Ash Containing Trona Reaction Products. Part Ii: Using Agricultural Byproduct Rice Hull As Biosorbent To Remove And Recover Metal Ions In Water, Yongbo Dan Jan 2013

Part I: Increased Leaching Of Arsenic, Selenium, Molybdenum, And Vanadium From High Calcium Coal Ash Containing Trona Reaction Products. Part Ii: Using Agricultural Byproduct Rice Hull As Biosorbent To Remove And Recover Metal Ions In Water, Yongbo Dan

Masters Theses

"Part I. The trona is being injected to control SOx emission from coal-fired power plants. The results showed that trona ash leached significantly more As, Se, Mo, and V than the control fly ash did, especially under the natural pH condition. In addition, trona ash had a significantly greater soluble fraction than the control ash. Further investigation indicated that greater amounts of the studied anionic elements in the trona ash were associated with the soluble, trona reaction products. Moreover, the insoluble fraction of the trona ash lost its capability to adsorb these elements under the natural pH condition. The …


Balanced Cross Section Of The Northeast Of Adiyaman, Turkey, Mustafa Tuncer Jan 2013

Balanced Cross Section Of The Northeast Of Adiyaman, Turkey, Mustafa Tuncer

Masters Theses

"Deformation during closure of an ocean basin and continent-continent collision in southeast Anatolia Turkey during the Late Cretaceous to Middle Miocene was investigated by construction of a geologic map, structural cross-section and retrodeformed palinspastically restored cross-section. The area of study is a N-S transect across the Bitlis Suture Zone of Northeast of Adiyaman. The study area is situated in the southeast Anatolian orogenic belt which includes, from south to north, the Arabian platform, the zone of Imbrication, and the zone of Nappes. A geologic map of this region was prepared in order to construct balanced and restored cross sections from …


3d Seismic Data Interpretation Of Boonsville Field, Texas, Aamer Ali Alhakeem Jan 2013

3d Seismic Data Interpretation Of Boonsville Field, Texas, Aamer Ali Alhakeem

Masters Theses

"The Boonsville field is one of the largest gas fields in the US located in the Fort Worth Basin, north central Texas. The highest potential reservoirs reside in the Bend Conglomerate deposited during the Pennsylvanian. The Boonsville data set is prepared by the Bureau of Economic Geology at the University of Texas, Austin, as part of the secondary gas recovery program. The Boonsville field seismic data set covers an area of 5.5 mi². It includes 38 wells data. The Bend Conglomerate is deposited in fluvio-deltaic transaction. It is subdivided into many genetic sequences which include depositions of sandy conglomerate representing …


Semantic Preserving Text Tepresentation And Its Applications In Text Clustering, Michael Howard Jan 2012

Semantic Preserving Text Tepresentation And Its Applications In Text Clustering, Michael Howard

Masters Theses

Text mining using the vector space representation has proven to be an valuable tool for classification, prediction, information retrieval and extraction. The nature of text data presents several issues to these tasks, including large dimension and the existence of special polysemous and synonymous words. A variety of techniques have been devised to overcome these shortcomings, including feature selection and word sense disambiguation. Privacy preserving data mining is also an area of emerging interest. Existing techniques for privacy preserving data mining require the use of secure computation protocols, which often incur a greatly increased computational cost. In this paper, a generalization-based …