Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- ?-globin Domain of Nuclear Chicken DNA (1)
- East Pond Watershed (Me.) (1)
- User interfaces (Computer systems) (1)
- Analysis Carcinogenesis (1)
- Aroclor 1254 (1)
-
- Carcinogens Cancer (1)
- Cognition (1)
- Computer networks (1)
- Cytochrome b Domain of Mitochondrial DNA (1)
- Database design (1)
- Development (1)
- Diepoxybutane Damage (1)
- Distributed processing (1)
- Electronic data processing (1)
- Environmental impact analysis -- United States -- Case studies (1)
- Environmental policy -- United States -- Evaluation (1)
- Frog (1)
- Gene expression (1)
- Geochemistry (1)
- Human-computer interaction (1)
- Immunocytochemistry (1)
- Machine learning (1)
- NGF (1)
- Polynomials (1)
- Psychology -- Research -- Methodology (1)
- Psychology -- Research -- Statistical methods (1)
- RT-PCR (1)
- Security measures (1)
- Sedimentology (1)
- Video Device Application (1)
Articles 1 - 13 of 13
Full-Text Articles in Physical Sciences and Mathematics
Identification Of A Putative Caspase Protein In S.Commune, Emma Ester Bendaña Flores
Identification Of A Putative Caspase Protein In S.Commune, Emma Ester Bendaña Flores
Honors Theses
Caspases are the proteins responsible for apoptosis in cells. Others have recently identified a caspase in Saccharomyces cerevisiae, a unicellular fungus.2, 3, 4 Isolation of a caspase protein from Schizophyllum commune will allow for the examination of a caspase in a simple multicellular organism.4 The S.cerevisiae caspase sequence was used to search the genomes of several fungi and identify similar sequences. Regions with high sequence identity in the aligned sequences were used to design degenerate PCR primers. The sequence of the resultant PCR product was then used to prepare primers for 3'RACE and determine the 3'end of the sequence. Through …
Binding Studies Of 2-Acetylnaphthalene With Native And Methylated Cyclodextrins Using Fluorescence Spectroscopy : The Use Of Gas Chromatography/Mass Spectrophotometry To Analyze Organic Contaminants In Local Waters, Amy L. Payeur
Honors Theses
The main goal of this work: was to explore complexes formed between 2-acetylnaphthalene (2-AN) and unsubstituted α, β, and y-cyclodextrins as well as 2-An and methylated α, β and y-cyclodextrins. The substituted cyclodextrins used were trimethyl-α-cyclodextrin (TM-α-CD), trimethyl-β-cyclodextrin (TM-β-CD), trimethyl-y-cyclodextrin (TM-y-CD), and dimethyl-β-cyclodextrin (DM-β-CD). For the trimethylated cyclodextrins, all three of the -OH groups on the cyclodextrin ring are replaced by -OCH3 groups. The dimethylated cycloextrin on the other hand only has 18 of the 21 -OH groups replaces by -OCH3 groups. Binding constants were determined for complexes using fluorescence quenching experiments at varying temperatures. Thermodynamic parameters of complex formation …
Factorization Of Polynomials And Real Analytic Function, Radoslaw L. Stefanski
Factorization Of Polynomials And Real Analytic Function, Radoslaw L. Stefanski
Honors Theses
In this project, we address the question: When can a polynomial p(x, y) of two variables be factored as p(x, y) = f(x)g(y), where f and g are polynomials of one variable. We answer this question, using linear algebra, and create a Mathematica program which carries out this factorization. For example,
3+3x-5x^3+y+xy-5/3x^3y+y^2+xy^2-5/3x^3y^2 = (1+x-5/3x^3)(3+y+y^2)
We then generalize this concept and ask: When can p(x,y) can be written as
p(x,y) = f1(x)g2(y)+f2(x)g2(y)+...+fr(x)gr(y)
where fj,gj are polynomials. This can certainly be done (for large enough r). Which is the minimum such r? Again, we have a Mathematica program which carries out this …
Discovering The Potential For Advancements In Intrusion Detection Systems, Kenneth J. Buonforte
Discovering The Potential For Advancements In Intrusion Detection Systems, Kenneth J. Buonforte
Honors Theses
An intrusion detection system (IDS) is a collection of monitors strategically placed on a network or individual host in order to detect anomalous behavior. Since James Anderson introduced one of the first frameworks for an intrusion detection system in [1]. researchers have extended the capabilities of these systems. IDSs take many forms, from systems as basic as command line audit logs to those that emulate the defense mechanisms of the human immune system. However, as intrusion detection has evolved, scientists and administrators alike are beginning to question the need for this technology due to its lack of quantifiable performance and …
The Effects Of Polychlorinated Biphenyls (Pcbs) On Nerve Growth Factor (Ngf) In The Developing Frog, Xenopus Laevis, Cari Delong
The Effects Of Polychlorinated Biphenyls (Pcbs) On Nerve Growth Factor (Ngf) In The Developing Frog, Xenopus Laevis, Cari Delong
Honors Theses
Polychlorinated biphenyls are ubiquitous, persistent environmental contaminants that cause a variety of adverse health effects wildlife and humans. PCBs are the major contaminant in the Kalamazoo River Superfund Site, in which the Environmental Institute is funded to study. Projects at the Environmental Institute are focused on developing molecular biotechnology tools that will improve environmental risk assessment. Previous acute studies involved the exposure of developing tadpoles, Xenopus laevis to PCBs through aquarium water in order to measure gene expression. Nerve growth factor (NGF) gene expression showed changes in these previous studies. NGF is a neurotrophic factor that regulates the growth and …
Securing Distributed Computations : In Search Of Reliable Large-Scale Compute Power And Refreshed Redundancy, Edward P. Kenney
Securing Distributed Computations : In Search Of Reliable Large-Scale Compute Power And Refreshed Redundancy, Edward P. Kenney
Honors Theses
The Internet may be the single largest technological advance or significant societal change in the last century. Not only does it allow access to more information than any human could ever hope to digest, but it produces the potential of having millions of computers combining their computational forces for the betterment of a single cause .. Tl is is the fundamental goal of distributed computing. A distributed system is defined to be a network of machines with some degree of centralized direction. In a distributed computational system each machine will accept computational tasks from a supervisor in a master-slave relationship. …
Mapping Of Diepoxybutane Damage In The Cytochrome B Domain Of Mitochondrial Dna And The Β-Globin Domain Of Nuclear Chicken Dna Using Quantitative Pcr, Justin Juskewitch
Mapping Of Diepoxybutane Damage In The Cytochrome B Domain Of Mitochondrial Dna And The Β-Globin Domain Of Nuclear Chicken Dna Using Quantitative Pcr, Justin Juskewitch
Honors Theses
Diepoxybutane (DEB), a known industrial carcinogen, reacts with DNA primarily at the N7 position of deoxyguanosine residues and creates interstrand cross-links at the sequence 5'-GNC. Since N7-N7 cross-links cause DNA to fragment upon heating, quantative polymerase chain reaction (QPCR) is being used in this experiment to measure the amount of DEB damage (lesion frequency) with three different targets-mitochondrial (unpackaged), open chromatin region, and closed chromatin region. Initial measurements of DEB damage within these three targets were not consistent because the template DNA was not the limiting reagent in the PCR. Follow-up PCR trials using a limiting amount of DNA are …
Magnetic Susceptibility For The Paleocene-Eocene Boundary: Correlation Among Three Egyptian Sections, Kelli Willson
Magnetic Susceptibility For The Paleocene-Eocene Boundary: Correlation Among Three Egyptian Sections, Kelli Willson
Honors Theses
No abstract provided.
Sedimentological And Geochemical Characterization Of East Pond, Belgrade Lakes Watershed, Central Maine, Robin H. Nesbeda
Sedimentological And Geochemical Characterization Of East Pond, Belgrade Lakes Watershed, Central Maine, Robin H. Nesbeda
Honors Theses
The present study focuses on East Pond, the head of the lake-chain system. East Pond is roughly oval in shape with several coves along the margins; it has an average 3 depth of 4.5 m, a maximum depth of 7.3 m, and a total volume of 26.35 x 10 6 m . The lake is surrounded by North temperate hardwood forest and a marshy outlet to the other lakes exists in the northwest comer. East Pond has suffered severe yearly algal blooms during the late summer and into the fall since 1993. This project aims to develop a baseline for …
Designing And Implementing A User-Focused Web-Based Database System, Rachel Noiseux
Designing And Implementing A User-Focused Web-Based Database System, Rachel Noiseux
Honors Theses
The goal of this project was to combine two different fields within computer science to produce a system that would be beneficial to a wide variety of people. The first area, user-centered design, studies how users interact with an interface and the motivation behind the decisions they make when interacting with the interface. The second area, databases, explores different techniques for storing and retrieving large amounts of data.
Estimating The Impact Of State Policy Incentives On Wind Power Development, Kellie K. Phelan
Estimating The Impact Of State Policy Incentives On Wind Power Development, Kellie K. Phelan
Honors Theses
Wind power has recently become a viable alternative to conventional fossil fuels for electricity generation because of decreasing costs and the presence of various supportive policy incentives. Pressing environmental issues and concerns about energy security have also prompted interest in wind power as an alternative fuel source. Though less than one percent of the United States electricity supply currently comes from wind power, state policy incentives have the potential to promote the development of the significant wind resources found throughout the United States (American Wind Energy Association 2003). Using a large data set that combines information on installed wind capacity …
Visual Expectations: Using Machine Learning To Identify Patterns In Psychological Data, Skyler Place
Visual Expectations: Using Machine Learning To Identify Patterns In Psychological Data, Skyler Place
Honors Theses
The goal of this project was to utilize the tools of machine learning to evaluate the data obtained through experiments in psychology. Advanced pattern finding algorithms are an effective approach to analyzing large sets of data, from any domain of science. Consequently, we have a psychological question and hypothesis, and a separate machine learning technique to assess these claims. The realm of psychology that I focused on is visual cognition, and how an individual's knowledge affects how they see the world. This alteration of visual data is a part of perception -when the brain enhances the data coming in from …
Creating A Video Device Application, Kevin Septor
Creating A Video Device Application, Kevin Septor
Honors Theses
A video device, such as a webcam, has the capability to be used in many ways, including recording video and behaving like a security camera. A TV tuner card can also record video, and in addition be used for watching television. However, the video hardware and device driver the operating system uses to access it are only capable of delivering raw frames of video. A user space application is necessary for exploiting the capabilities of such a device beyond reading sequential frames of video. This research explores the desiderata in a powerful video device application, and introduces a program that …