Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Electronic Theses and Dissertations

2005

Discipline
Institution
Keyword

Articles 1 - 30 of 85

Full-Text Articles in Physical Sciences and Mathematics

Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry Dec 2005

Monitoring Pc Hardware Sounds In Linux Systems Using The Daubechies D4 Wavelet., Robert Karns Henry

Electronic Theses and Dissertations

Users of high availability (HA) computing require systems that run continuously, with little or no downtime. Modern PCs address HA needs by monitoring operating system parameters such as voltage, temperature, and hard drive status in order to anticipate possible system failure. However, one modality for PC monitoring that has been underutilized is sound. The application described here uses wavelet theory to analyze sounds produced by PC hard drives during standard operation. When twenty-nine hard drives were tested with the application and the results compared with the drives' Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) data, the binomial distribution's low p-value of …


A Microreactor System For Measuring Size Selectivity In Porous Wo3 Sensor Materials, Meng Lu Dec 2005

A Microreactor System For Measuring Size Selectivity In Porous Wo3 Sensor Materials, Meng Lu

Electronic Theses and Dissertations

Our interest in studying reactions catalyzed by high surface area W03 powders is based on their potential application as the active material in sensors for low level (ppb) detection of flammable or toxic gases. A series of porous W03 powders with both meso- and micro-porosity have been synthesized by Waghe and Tripp. Preliminary results of the response of sensors fabricated from these materials indicated the possibility of size selectivity on the molecular scale. To provide support for the hypothesis of size selectivity and understand the reaction kinetics of alcohols over the new porous W03 powders for sensor …


Extensions Of The Cayley-Hamilton Theorem With Applications To Elliptic Operators And Frames., Alberto Mokak Teguia Aug 2005

Extensions Of The Cayley-Hamilton Theorem With Applications To Elliptic Operators And Frames., Alberto Mokak Teguia

Electronic Theses and Dissertations

The Cayley-Hamilton Theorem is an important result in the study of linear transformations over finite dimensional vector spaces. In this thesis, we show that the Cayley-Hamilton Theorem can be extended to self-adjoint trace-class operators and to closed self-adjoint operators with trace-class resolvent over a separable Hilbert space. Applications of these results include calculating operators resolvents and finding the inverse of a frame operator.


A Limit Theorem In Cryptography., Kevin Lynch Aug 2005

A Limit Theorem In Cryptography., Kevin Lynch

Electronic Theses and Dissertations

Cryptography is the study of encryptying and decrypting messages and deciphering encrypted messages when the code is unknown. We consider Λπx, Δy) which is a count of how many ways a permutation satisfies a certain property. According to Hawkes and O'Connor, the distribution of Λπx, Δy) tends to a Poisson distribution with parameter ½ as m → ∞ for all Δxy ∈ (Z/qZ)m - 0. We give a proof of this theorem using the Stein-Chen method: As qm …


Cell Toxicity And Uptake Of Rrr-Alpha-Tocopheryl Polyethylene Glycol 1000 Succinate (Tpgs) By Various Cell Ines In Vitro., Christelle Komguem Kamga Aug 2005

Cell Toxicity And Uptake Of Rrr-Alpha-Tocopheryl Polyethylene Glycol 1000 Succinate (Tpgs) By Various Cell Ines In Vitro., Christelle Komguem Kamga

Electronic Theses and Dissertations

This research focused on investigating and comparing the cytotoxicity and cellular uptake of RRR-alpha-tocopheryl polyethylene glycol succinate (TPGS, with that of alpha-tocopheryl succinate (α-TS). Both TPGS and α-TS are water-soluble forms of vitamin E with important clinical applications. Cytotoxicity assays with RAW 264.7 and LNCaP cells incubated overnight with TPGS or α-TS at concentrations ≥ 12.4 μM suggest that α-TS is more cytotoxic than TPGS. Macrophages were found to be more sensitive than LNCaP cells when treated with similar concentrations of α-TS. For both cell lines, most of the TPGS or α-TS taken up remained esterified after 24 hours. Our …


Bicyclic Mixed Triple Systems., Benkam Benedict Bobga Aug 2005

Bicyclic Mixed Triple Systems., Benkam Benedict Bobga

Electronic Theses and Dissertations

In the study of triple systems, one question faced is that of finding for what order a decomposition exists. We state and prove a necessary and sufficient condition for the existence of a bicyclic mixed triple system based on the three possible partial orientations of the 3-cycle with twice as many arcs as edges. We also explore the existence of rotational and reverse mixed triple systems. Our principal proof technique applied is the difference method. Finally, this work contains a result on packing of complete mixed graphs on v vertices, Mv, with isomorphic copies of two …


Rocket Powered Flight As A Perturbation To The Two-Body Problem., Clayton Jeremiah Clark Aug 2005

Rocket Powered Flight As A Perturbation To The Two-Body Problem., Clayton Jeremiah Clark

Electronic Theses and Dissertations

The two body problem and the rocket equation + ∊ α + k/r3r = 0 have been expressed in numerous ways. However, the combination of the rocket equation with the two-body problem has not been studied to any degree of depth due to the intractability of the resulting non-linear, non-homogeneous equations. The goal is to use perturbation techniques to approximate solutions to the combined two-body and rocket equations.


Electrochemical Remedy And Analysis For The Environment Based On The New Polymer-Dna Composite Material., Noor Feuza Hussain Aug 2005

Electrochemical Remedy And Analysis For The Environment Based On The New Polymer-Dna Composite Material., Noor Feuza Hussain

Electronic Theses and Dissertations

In this work a new material, the conducting polymer-DNA composite, has been reported for the first time due to its promise in micro extraction, transfer, and release of cations under controlled potential conditions by using electrochemically assisted solid phase micro extraction (SPME). The Polypyrrole/DNA composite can be formed easily by oxidation of pyrrole monomers in the presence of chromosomal DNA by electropolymerization. Environmental significant pollutants such as Cd, Pb, Hg, Co, Zn, Cu, and Bi metal ions can be extracted from the aqueous solution and are able to be transferred to another medium defined as the release solution where the …


Paired And Total Domination On The Queen's Graph., Paul Asa Burchett Aug 2005

Paired And Total Domination On The Queen's Graph., Paul Asa Burchett

Electronic Theses and Dissertations

The Queen’s domination problem has a long and rich history. The problem can be simply stated as: What is the minimum number of queens that can be placed on a chessboard so that all squares are attacked or occupied by a queen? The problem has been expanded to include not only the standard 8x8 board, but any rectangular m×n sized board. In this thesis, we consider both paired and total domination versions of this renowned problem.


Cell Toxicology Study Of Rrr-Alpha-Tocopheryl Polyethylene Glycol 1000 Succinate (Tpgs)., Clarisse Sornsay Muenyi Aug 2005

Cell Toxicology Study Of Rrr-Alpha-Tocopheryl Polyethylene Glycol 1000 Succinate (Tpgs)., Clarisse Sornsay Muenyi

Electronic Theses and Dissertations

This research focused on the cytotoxic properties of RRR-alpha-tocopheryl polyethylene glycol 1000 succinate (TPGS) in transformed and cancerous cell lines. We used RAW264.7 macrophage and prostate cancer (LNCaP) cell lines in this study. TPGS caused cell death and decreased cell viability in a dose and time dependent manner. Cell death was evaluated fluorimetrically by employing the nucleic acid-binding fluorophore; propidium iodide. A colorimetric 3-(4, 5-dimethylthiazol-2-yl)-2, 5-diphenyl tetrazolium bromide (MTT) assay was used to evaluate cell viability. Cell death can occur through necrosis or apoptosis. Our results suggested that TPGS triggered apoptotic cell death. Induction of apoptosis, as measured by caspase …


The Interquartile Range: Theory And Estimation., Dewey Lonzo Whaley Aug 2005

The Interquartile Range: Theory And Estimation., Dewey Lonzo Whaley

Electronic Theses and Dissertations

The interquartile range (IQR) is used to describe the spread of a distribution. In an introductory statistics course, the IQR might be introduced as simply the “range within which the middle half of the data points lie.” In other words, it is the distance between the two quartiles, IQR = Q3 - Q1. We will compute the population IQR, the expected value, and the variance of the sample IQR for various continuous distributions. In addition, a bootstrap confidence interval for the population IQR will be evaluated.


Evaluating The Effectiveness Of A Company's Online Health And Safety Training Program By Assessing Its Employees Perceptions And Knowledge., Jo Nell Maynard Mullins Aug 2005

Evaluating The Effectiveness Of A Company's Online Health And Safety Training Program By Assessing Its Employees Perceptions And Knowledge., Jo Nell Maynard Mullins

Electronic Theses and Dissertations

A cross-sectional study was conducted to evaluate a company’s online H & S training program. The ABC Company’s online 8-hr HAZWOPER refresher course is based on current OSHA standard topics required for certification and principles flexible to fit site- or task-specific situations and conditions.

An 18-question survey was used to evaluate employee perceptions of online training compared to traditional classroom training. Perceptions were compared by demographic variables (e.g. gender, position, race, age and longevity with the ABC Company), which suggested that only age had an influence on employee response. Fifty-five percent of the employees surveyed preferred online training as compared …


Potential Energy Surface Around The Tropylium Ion., Kenneth Wayne Bullins Aug 2005

Potential Energy Surface Around The Tropylium Ion., Kenneth Wayne Bullins

Electronic Theses and Dissertations

The formation of the tropylium ion, C7H7+, in the mass spectrum of toluene is a chemical process that has been studied extensively in the past. The advances in computational power of personal computers have made the investigation of the pathway to form this ion and its subsequent decomposition feasible at a fairly high level of theory. The calculations that we performed were at the HF/6-31G (d, p) and the B3LYP/6-311++G (2d) levels. This work will show areas of the potential energy surface around the highly symmetric tropylium ion to give a glance of possible mechanisms …


Implications Of Spatial Autocorrelation And Dispersal For The Modeling Of Species Distributions, Volker Bahn Aug 2005

Implications Of Spatial Autocorrelation And Dispersal For The Modeling Of Species Distributions, Volker Bahn

Electronic Theses and Dissertations

Modeling the geographical distributions of wildlife species is important for ecology and conservation biology. Spatial autocorrelation in species distributions poses a problem for distribution modeling because it invalidates the assumption of independence among sample locations. I explored the prevalence and causes of spatial autocorrelation in data from the Breeding Bird Survey, covering the conterminous United States, using Regression Trees, Conditional Autoregressive Regressions (CAR), and the partitioning of variance. I also constructed a simulation model to investigate dispersal as a process contributing to spatial autocorrelation, and attempted to verify the connection between dispersal and spatial autocorrelation in species' distributions in empirical …


The Challenges Of Network Security Remediation At A Regional University., William R. Simons May 2005

The Challenges Of Network Security Remediation At A Regional University., William R. Simons

Electronic Theses and Dissertations

This thesis describes challenges encountered during a year-long effort to improve the security of the 3,300 node administrative computer network at East Tennessee State University. The key remediation strategies used included employing the vulnerability scanner Nessus to profile the network, analyzing the scan results, and attempting to remove the most critical vulnerabilities found. The project succeeded in decreasing known “high” criticality vulnerabilities on campus by 26.1%, and confirmed four standard observations about the challenges of network administration:

  • Vulnerability scanning is a lengthy task best performed in parallel and supported by automated data analysis.
  • Securing a network is like trying to …


Survival Model And Estimation For Lung Cancer Patients., Xingchen Yuan May 2005

Survival Model And Estimation For Lung Cancer Patients., Xingchen Yuan

Electronic Theses and Dissertations

Lung cancer is the most frequent fatal cancer in the United States. Following the notion in actuarial math analysis, we assume an exponential form for the baseline hazard function and combine Cox proportional hazard regression for the survival study of a group of lung cancer patients. The covariates in the hazard function are estimated by maximum likelihood estimation following the proportional hazards regression analysis. Although the proportional hazards model does not give an explicit baseline hazard function, the baseline hazard function can be estimated by fitting the data with a non-linear least square technique. The survival model is then examined …


Extending The Abstract Data Model., Matthew Bryston Winegar May 2005

Extending The Abstract Data Model., Matthew Bryston Winegar

Electronic Theses and Dissertations

The Abstract Data Model (ADM) was developed by Sanderson [19] to model and predict semantic loss in data translation between computer languages. In this work, the ADM was applied to eight languages that were not considered as part of the original work. Some of the languages were found to support semantic features, such as the restriction semantics for inheritance found in languages like XML Schemas and Java, which could not be represented in the ADM. A proposal was made to extend the ADM to support these semantic features, and the requirements and implications of implementing that proposal were considered.


Graph Theory For The Secondary School Classroom., Dayna Brown Smithers May 2005

Graph Theory For The Secondary School Classroom., Dayna Brown Smithers

Electronic Theses and Dissertations

After recognizing the beauty and the utility of Graph Theory in solving a variety of problems, the author decided that it would be a good idea to make the subject available for students earlier in their educational experience. In this thesis, the author developed four units in Graph Theory, namely Vertex Coloring, Minimum Spanning Tree, Domination, and Hamiltonian Paths and Cycles, which are appropriate for high school level.


Using Domination To Analyze Rna Structures., Travis Reves Coake May 2005

Using Domination To Analyze Rna Structures., Travis Reves Coake

Electronic Theses and Dissertations

Understanding RNA molecules is important to genomics research. Recently researchers at the Courant Institute of Mathematical Sciences used graph theory to model RNA molecules and provided a database of trees representing possible secondary RNA structures. In this thesis we use domination parameters to predict which trees are more likely to exist in nature as RNA structures. This approach appears to have promise in graph theory applications in genomics research.


Climatic And Lithogenic Controls On Soil Organic Matter-Mineral Associations, Rota Wagai May 2005

Climatic And Lithogenic Controls On Soil Organic Matter-Mineral Associations, Rota Wagai

Electronic Theses and Dissertations

Interactions of organic matter (OM) with soil mineral phases strongly affect the storage and dynamics of soil OM as well as other ecosystem processes. This study examined aspects of organo-mineral associations in soils at different scales. First, I assessed the potential controls of climate and parent rock type on organo-mineral associations using two sets of undisturbed tropical forest soils developed on two contrasting rocks along an altitudinal gradient in Borneo, Southeast Asia. Density fractionations showed that OM stored in surface mineral soils partitioned towards plant detritus fraction under cooler climates on both rock types. Thus climate exerted stronger control on …


Hierarchies For Event-Based Modeling Of Geographic Phenomena, Rui Zhang May 2005

Hierarchies For Event-Based Modeling Of Geographic Phenomena, Rui Zhang

Electronic Theses and Dissertations

Modeling the dynamic aspect, or change, of geographic phenomena is essential to explain the evolution of geographic entities and predict their future. Event-based modelling, describing the occurrences rather than states of geographic phenomena, gives an explicit treatment of such change, but currently does not have the support of the mechanisms to enable the shifts among different granularities of events. To account for different tasks, a hierarchical representation of the event space at different granularities is needed.

This thesis presents an event-based model; a general framework for representing events based on precondition and postcondition using Allen's temporal interval logic. It captures …


Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare Jan 2005

Enhancing Message Privacy In Wired Equivalent Privacy., Darshan Purandare

Electronic Theses and Dissertations

The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some …


Compressed Pattern Matching For Text And Images, Tao Tao Jan 2005

Compressed Pattern Matching For Text And Images, Tao Tao

Electronic Theses and Dissertations

The amount of information that we are dealing with today is being generated at an ever-increasing rate. On one hand, data compression is needed to efficiently store, organize the data and transport the data over the limited-bandwidth network. On the other hand, efficient information retrieval is needed to speedily find the relevant information from this huge mass of data using available resources. The compressed pattern matching problem can be stated as: given the compressed format of a text or an image and a pattern string or a pattern image, report the occurrence(s) of the pattern in the text or image …


An Introduction To Hellmann-Feynman Theory, David Wallace Jan 2005

An Introduction To Hellmann-Feynman Theory, David Wallace

Electronic Theses and Dissertations

The Hellmann-Feynman theorem is presented together with certain allied theorems. The origin of the Hellmann-Feynman theorem in quantum physical chemistry is described. The theorem is stated with proof and with discussion of applicability and reliability. Some adaptations of the theorem to the study of the variation of zeros of special functions and orthogonal polynomials are surveyed. Possible extensions are discussed.


Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang Jan 2005

Transform Based And Search Aware Text Compression Schemes And Compressed Domain Text Retrieval, Nan Zhang

Electronic Theses and Dissertations

In recent times, we have witnessed an unprecedented growth of textual information via the Internet, digital libraries and archival text in many applications. While a good fraction of this information is of transient interest, useful information of archival value will continue to accumulate. We need ways to manage, organize and transport this data from one point to the other on data communications links with limited bandwidth. We must also have means to speedily find the information we need from this huge mass of data. Sometimes, a single site may also contain large collections of data such as a library database, …


In Situ Remediation Of Heavy Metal Contaminated Sediments Using Emulsified Zero-Valent Metal Particles, Kristen Marie Milum Jan 2005

In Situ Remediation Of Heavy Metal Contaminated Sediments Using Emulsified Zero-Valent Metal Particles, Kristen Marie Milum

Electronic Theses and Dissertations

Sediments can act as both a sink for pollutants and a source for aquatic contaminants. Natural and human disturbances of the sediments can release the contaminants to the overlying water where bottom dwelling, or benthic, organisms may be exposed through direct contact, ingestion of sediment particles, or uptake of dissolved contaminants present in the water. Dredging, the most common remediation technology for heavy metals, exacerbates this process. The in situ use of emulsified metal has been studied for its ability to pull heavy metals from aqueous solution and from saturated soils. It has proven successful in the laboratory with removal …


Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski Jan 2005

Graph-Theoretic Approach To Modeling Propagation And Control Of Network Worms, Zoran Nikoloski

Electronic Theses and Dissertations

In today's network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, …


Recovery Of Hydrogen And Helium From Their Mixtures Using Metal Hydrides, Muzaffer Tonguc Oztek Jan 2005

Recovery Of Hydrogen And Helium From Their Mixtures Using Metal Hydrides, Muzaffer Tonguc Oztek

Electronic Theses and Dissertations

Waste streams of hydrogen and helium mixtures are produced at the Kennedy Space Center during purging of the hydrogen systems and supply lines. This process is done prior to and after hydrogen servicing. The purged waste gases are lost to the atmosphere, resulting in an annual loss of 2 million and 0.1 million standard cubic meters of helium and hydrogen, respectively. Recovery of these gases will have an economic benefit. Metals, alloys, and intermetallics are known to react with hydrogen in favorable conditions; therefore, they have the possibility of serving as separating and recovery agents. In this study, Mg2Ni, VTiNi …


Access Games: A Game Theoretic Framework For Fair Bandwidth Sharing In Distributed Systems, Sudipta Rakshit Jan 2005

Access Games: A Game Theoretic Framework For Fair Bandwidth Sharing In Distributed Systems, Sudipta Rakshit

Electronic Theses and Dissertations

In this dissertation, the central objective is to achieve fairness in bandwidth sharing amongst selfish users in a distributed system. Because of the inherent contention-based nature of the distributed medium access and the selfishness of the users, the distributed medium access is modeled as a non-cooperative game; designated as the Access Game. A p-CSMA type medium access scenario is proposed for all the users. Therefore, in the Access Game, each user has two actions to choose from: "transmit" and "wait". The outcome of the Access Game and payoffs to each user depends on the actions taken by all the users. …


Affective Design In Technical Communication, Michael Alan Rosen Jan 2005

Affective Design In Technical Communication, Michael Alan Rosen

Electronic Theses and Dissertations

Traditional human-computer interaction (HCI) is based on 'cold' models of user cognition; that is, models of users as purely rational beings based on the information processing metaphor; however, an emerging perspective suggests that for the field of HCI to mature, its practitioners must adopt models of users that consider broader human needs and capabilities. Affective design is an umbrella term for research and practice being conducted in diverse domains, all with the common thread of integrating emotional aspects of use into the creation of information products. This thesis provides a review of the current state of the art in affective …