Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Department of Chemistry (10)
- Department of Earth and Environmental Sciences (9)
- Department of Computer Science and Engineering (7)
- Department of Computer Science (5)
- Cryptography (2)
-
- Ionic Liquids (2)
- Morphometrics (2)
- Oxidation (2)
- Software Engineering (2)
- Steganography (2)
- 2,2-Bithiophene (1)
- 3D Digital Model (1)
- 4-fluorophenyl (1)
- AWL (1)
- AWSOME (1)
- Acid Dissociations (1)
- Ascorbic Acid (1)
- Autonomous (1)
- B3 (1)
- Bioinformatics (1)
- Biometrics (1)
- Blind (1)
- Borden Site (1)
- Branched (1)
- Branched Polymer (1)
- Burst Scheduling (1)
- Burst grooming (1)
- Calymene (1)
- Catechol (1)
- Cation Exchange (1)
Articles 31 - 33 of 33
Full-Text Articles in Physical Sciences and Mathematics
Tailoring The Degree Of Branching In Hyperbranched Poly (Arylene Ether Sulfone)S And Poly(Arylene Ether Ketone)S Prepared Via An A2 + Bb'b" Approach, Shravanthi Raghavapuram
Tailoring The Degree Of Branching In Hyperbranched Poly (Arylene Ether Sulfone)S And Poly(Arylene Ether Ketone)S Prepared Via An A2 + Bb'b" Approach, Shravanthi Raghavapuram
Browse all Theses and Dissertations
The synthesis and characterization of hyperbranched poly(arylene ether)s with tailored degrees of branching has been explored via an A2+B3 approach. The reactivity of the individual electrophilic sites towards nucleophilic aromatic substitution, NAS, of the BB'B" monomers 4, 3', 5'-trifluorophenyl sulfone, 1 and 4, 3', 5'-trifluoro benzophenone, 2 were studied. The concentration, temperature and solvent conditions had an effect on the degree of branching, DB, in 1 and 2 and were probed via 13C and 19F NMR spectroscopy as well as a series of model reactions employing p-cresol 16, which acts as the nucleophile. Soluble, …
A Cryptanalysis Methodology For The Reverse Engineering Of Encrypted Information In Images, Allan Anthony Rwabutaza
A Cryptanalysis Methodology For The Reverse Engineering Of Encrypted Information In Images, Allan Anthony Rwabutaza
Browse all Theses and Dissertations
Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender's side and message unscrambling on the receiver's side so that only the intended receiver gets the secret message. On the other hand, there is steganography, which is the hiding of information in a medium in such a way that no one other than the sender or the intended receiver …
Circulant Weighing Matrices, Alex James Gutman
Circulant Weighing Matrices, Alex James Gutman
Browse all Theses and Dissertations
The existence status of previously open cases of circulant weighing matrices will be established using various techniques. The results fill in 52 missing entries in Strassler's Table of Circulant Weighing Matrices, which considers matrices of order 1 - 200 with weight k less than or equal to 100.