Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 33 of 33

Full-Text Articles in Physical Sciences and Mathematics

Tailoring The Degree Of Branching In Hyperbranched Poly (Arylene Ether Sulfone)S And Poly(Arylene Ether Ketone)S Prepared Via An A2 + Bb'b" Approach, Shravanthi Raghavapuram Jan 2009

Tailoring The Degree Of Branching In Hyperbranched Poly (Arylene Ether Sulfone)S And Poly(Arylene Ether Ketone)S Prepared Via An A2 + Bb'b" Approach, Shravanthi Raghavapuram

Browse all Theses and Dissertations

The synthesis and characterization of hyperbranched poly(arylene ether)s with tailored degrees of branching has been explored via an A2+B3 approach. The reactivity of the individual electrophilic sites towards nucleophilic aromatic substitution, NAS, of the BB'B" monomers 4, 3', 5'-trifluorophenyl sulfone, 1 and 4, 3', 5'-trifluoro benzophenone, 2 were studied. The concentration, temperature and solvent conditions had an effect on the degree of branching, DB, in 1 and 2 and were probed via 13C and 19F NMR spectroscopy as well as a series of model reactions employing p-cresol 16, which acts as the nucleophile. Soluble, …


A Cryptanalysis Methodology For The Reverse Engineering Of Encrypted Information In Images, Allan Anthony Rwabutaza Jan 2009

A Cryptanalysis Methodology For The Reverse Engineering Of Encrypted Information In Images, Allan Anthony Rwabutaza

Browse all Theses and Dissertations

Security is an important issue related to the storage and communication of data and information. In data and information security, cryptography and steganography are two of the most common security techniques. On one hand, there is cryptography, which is the secret communication between two parties by message scrambling on the sender's side and message unscrambling on the receiver's side so that only the intended receiver gets the secret message. On the other hand, there is steganography, which is the hiding of information in a medium in such a way that no one other than the sender or the intended receiver …


Circulant Weighing Matrices, Alex James Gutman Jan 2009

Circulant Weighing Matrices, Alex James Gutman

Browse all Theses and Dissertations

The existence status of previously open cases of circulant weighing matrices will be established using various techniques. The results fill in 52 missing entries in Strassler's Table of Circulant Weighing Matrices, which considers matrices of order 1 - 200 with weight k less than or equal to 100.