Physical Sciences and Mathematics Commons™

Articles 1 - 30 of 9848

Full-Text Articles in Physical Sciences and Mathematics

Temporal Trends And Origins Of Lake Erie Cadmium Contamination In Relation To Sediment Substrate Type Using Multivariate Kriging Analyses, Danielle E. Mitchell, K. Wayne Forsythe, Chris H. Marvin, Debbie A. Burniston Feb 2019

Temporal Trends And Origins Of Lake Erie Cadmium Contamination In Relation To Sediment Substrate Type Using Multivariate Kriging Analyses, Danielle E. Mitchell, K. Wayne Forsythe, Chris H. Marvin, Debbie A. Burniston

International Journal of Geospatial and Environmental Research

Using the kriging spatial interpolation method, Cd sediment contamination in Lake Erie from 1971 (263 samples) and 1997/1998 (55 samples) were mapped as continuous data surfaces. Although the most recent data set is two decades old, the roughly 25 year period between the two comprehensive lake-wide surveys represents a period of intense binational management action to reduce sources of contamination. To improve interpolation accuracy between two different sampling densities, auxiliary variables including lake-wide sediment substrate types were integrated into spatial analysis of Cd contamination patterns. The potential for adverse biological impacts posed by Cd sediment contamination to humans and ...

Brauer's Theorem And Nonnegative Matrices With Prescribed Diagonal Entries, Ricardo L. Soto, Ana I. Julio, Macarena A. Collao Feb 2019

Brauer's Theorem And Nonnegative Matrices With Prescribed Diagonal Entries, Ricardo L. Soto, Ana I. Julio, Macarena A. Collao

Electronic Journal of Linear Algebra

The problem of the existence and construction of nonnegative matrices with prescribed eigenvalues and diagonal entries is an important inverse problem, interesting by itself, but also necessary to apply a perturbation result, which has played an important role in the study of certain nonnegative inverse spectral problems. A number of partial results about the problem have been published by several authors, mainly by H. \v{S}migoc. In this paper, the relevance of a Brauer's result, and its implication for the nonnegative inverse eigenvalue problem with prescribed diagonal entries is emphasized. As a consequence, given a list of complex ...

Diagonal Sums Of Doubly Substochastic Matrices, Lei Cao, Zhi Chen, Xuefeng Duan, Selcuk Koyuncu, Huilan Li Feb 2019

Diagonal Sums Of Doubly Substochastic Matrices, Lei Cao, Zhi Chen, Xuefeng Duan, Selcuk Koyuncu, Huilan Li

Let $\Omega_n$ denote the convex polytope of all $n\times n$ doubly stochastic matrices, and $\omega_{n}$ denote the convex polytope of all $n\times n$ doubly substochastic matrices. For a matrix $A\in\omega_n$, define the sub-defect of $A$ to be the smallest integer $k$ such that there exists an $(n+k)\times(n+k)$ doubly stochastic matrix containing $A$ as a submatrix. Let $\omega_{n,k}$ denote the subset of $\omega_n$ which contains all doubly substochastic matrices with sub-defect $k$. For $\pi$ a permutation of symmetric group of degree $n$, the sequence of elements $a_{1\pi(1 ... Single Image Super-Resolution, Yujing Song Feb 2019 Single Image Super-Resolution, Yujing Song Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal Super-Resolution (SR) of a single image is a classic problem in computer vision. The goal of image super-resolution is to produce a high-resolution image from a low-resolution image. This paper presents a popular model, super-resolution convolutional neural network (SRCNN), to solve this problem. This paper also examines an improvement to SRCNN using a methodology known as generative adversarial net- work (GAN) which is better at adding texture details to the high resolution output. Smart Parking Systems Design And Integration Into Iot, Charles M. Menne Feb 2019 Smart Parking Systems Design And Integration Into Iot, Charles M. Menne Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal This paper looks at two smart parking reservation algorithms, and examines the ongoing efforts to connect smart systems of different domains in a city's infrastructure. The reservation algorithms are designed to improve the performance of smart parking systems. The first algorithm considers the distance between parking areas and the number of free parking spaces in determining a parking space. The second algorithm uses distance between parking areas and driver destination, parking price, and the number of unoccupied spaces for each parking area. Neither of these smart parking systems cover how they could fit into a larger scale smart system ... Requirements Practices In Software Startups, John D. Hoff Feb 2019 Requirements Practices In Software Startups, John D. Hoff Scholarly Horizons: University of Minnesota, Morris Undergraduate Journal In a dynamic environment full of uncertainties in software startups, software development practices must be carefully approached. It is vital that startups determine the right time to make advancements and evolve their company to the next level. We will discuss the importance of requirements practices in startups and their impact on company culture, work environments, and product quality. In-Sphere Property And Reverse Inequalities For Matrix Means, Trung Hoa Dinh, Tin-Yau Tam, Bich Khue T Vo Feb 2019 In-Sphere Property And Reverse Inequalities For Matrix Means, Trung Hoa Dinh, Tin-Yau Tam, Bich Khue T Vo Electronic Journal of Linear Algebra The in-sphere property for matrix means is studied. It is proved that the matrix power mean satisfies in-sphere property with respect to the Hilbert-Schmidt norm. A new characterization of the matrix arithmetic mean is provided. Some reverse AGM inequalities involving unitarily invariant norms and operator monotone functions are also obtained. Surjective Additive Rank-1 Preservers On Hessenberg Matrices, Prathomjit Khachorncharoenkul, Sajee Pianskool Feb 2019 Surjective Additive Rank-1 Preservers On Hessenberg Matrices, Prathomjit Khachorncharoenkul, Sajee Pianskool Electronic Journal of Linear Algebra Let$H_{n}(\mathbb{F})$be the space of all$n\times n$upper Hessenberg matrices over a field~$\mathbb{F}$, where$n$is a positive integer greater than two. In this paper, surjective additive maps preserving rank-$1$on$H_{n}(\mathbb{F})$are characterized. Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter Feb 2019 Towards Secure Data Flow Oriented Multi-Vendor Ict Governance Model, Lars Magnusson, Patrik Elm, Anita Mirijamdotter International Journal of Business and Technology Today, still, ICT Governance is being regarded as a departmental concern, not an overall organizational concern. History has shown us that implementation strategies, which are based on departments, results in fractional implementations leading to ad hoc solutions with no central control and stagnation for the in-house ICT strategy. Further, this recently has created an opinion trend; many are talking about the ICT department as being redundant, a dying out breed, which should be replaced by on-demand specialized external services. Clearly, the evermore changing surroundings do force organizations to accelerate the pace of new adaptations within their ICT plans, more vivacious ... Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal Feb 2019 Implications Of Eu-Gdpr In Low-Grade Social, Activist And Ngo Settings, Lars Magnusson, Sarfraz Iqbal International Journal of Business and Technology Social support services are becoming popular among the citizens of every country and every age. Though, social support services easily accessible on mobile phones are used in different contexts, ranging from extending your presence and connectivity to friends, family and colleagues to using social media services for being a social activist seeking to help individuals confined in miserable situations such as homeless community, drug addicts or even revolutionists fighting against dictatorships etc. However, a very recent development in the European Parliament’s law (2016/679) on the processing and free movement of personal data in terms of EU-GDPR (General data ... Feb 2019 An Approach To Information Security For Smes Based On The Resource-Based View Theory, Blerton Abazi International Journal of Business and Technology The main focus of this proposal is to analyze implementation challenges, benefits and requirements in implementation of Information Systems and managing information security in small and medium size companies in Western Balkans countries. In relation to the study, the proposal will focus in the following questions to investigate: What are the benefits that companies mostly find after the implementation of Information Systems has been implemented, efficiency, how to they manage security of the information’s, competitive advantage, return of investments etc. The study should give a clear approach to Information Systems implementation, information security, maintenance, measurable benefits, challenges companies have ... Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu Feb 2019 Decision Making Based On Data Analyses Using Data Warehouses, Valdrin Haxhiu International Journal of Business and Technology Data warehouses are a collection of several databases, whose goal is to help different companies and corporations make important decisions about their activities. These decisions are taken from the analyses that are made to the data within the data warehouse. These data are taken from data that companies and corporations collect on daily basis from their branches that may be located in different cities, regions, states and continents. Data that are entered to data warehouses are historical data and they represent that part of data that is important for making decisions. These data go under a transformation process in order ... Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj Feb 2019 Characteristics And Temporal Behavior Of Internet Backbone Traffic, Artan Salihu, Muharrem Shefkiu, Arianit Maraj International Journal of Business and Technology With the rapid increase demand for data usage, Internet has become complex and harder to analyze. Characterizing the Internet traffic might reveal information that are important for Network Operators to formulate policy decisions, develop techniques to detect network anomalies, help better provision network resources (capacity, buffers) and use workload characteristics for simulations (typical packet sizes, flow durations, common protocols). In this paper, using passive monitoring and measurements, we show collected data traffic at Internet backbone routers. First, we reveal main observations on patterns and characteristics of this dataset including packet sizes, traffic volume for inter and intra domain and protocol ... Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa Feb 2019 Permission-Based Privacy Analysis For Android Applications, Erza Gashi, Zhilbert Tafa International Journal of Business and Technology While Information and Communication Technology (ICT) trends are moving towards the Internet of Things (IoT), mobile applications are becoming more and more popular. Mostly due to their pervasiveness and the level of interaction with the users, along with the great number of advantages, the mobile applications bring up a great number of privacy related issues as well. These platforms can gather our very sensitive private data by only granting them a list of permissions during the installation process. Additionally, most of the users can find it difficult, or even useless, to analyze system permissions. Thus, their guess of app’s ... A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani Feb 2019 A Need For An Integrative Security Model For Semantic Stream Reasoning Systems, Admirim Aliti, Edmond Jajaga, Kozeta Sevrani International Journal of Business and Technology State-of-the-art security frameworks have been extensively addressing security issues for web resources, agents and services in the Semantic Web. The provision of Stream Reasoning as a new area spanning Semantic Web and Data Stream Management Systems has eventually opened up new challenges. Namely, their decentralized nature, the metadata descriptions, the number of users, agents, and services, make securing Stream Reasoning systems difficult to handle. Thus, there is an inherent need of developing new security models which will handle security and automate security mechanisms to a more autonomous system that supports complex and dynamic relationships between data, clients and service providers ... Why Modeling Complex Dynamic Systems Using Fuzzy Cognitive Maps?, Peter P. Groumpos Feb 2019 Why Modeling Complex Dynamic Systems Using Fuzzy Cognitive Maps?, Peter P. Groumpos International Journal of Business and Technology The difficult problem of modeling Complex Dynamic Systems (CDS) is carefully reviewed. Main characteristics of CDS are considered and analyzed. Today’s mathematical models and approaches cannot provide satisfactory answers to the challenging problems of the society. The key problem of complex dynamic systems and control theory consists in the development of methods of qualitative analysis of the dynamics and behavior of such systems and in the construction of efficient control algorithms for their efficient operation. The purpose of control to bring the system to a point of its phase space which corresponds to maximal or minimal value of the ... Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani Feb 2019 Security Analysis Of Wireless Ban In E-Health, Romina Muka, Sule Yildrim-Yayilgan, Kozeta Sevrani International Journal of Business and Technology The Wireless Body Area Network (WBAN) has gained popularity as a new technology for e-Health, and is considered as one of the key research areas in computer science and healthcare applications. WBAN collects patients’ data, monitors constantly their physiological parameters, using small implantable or wearable sensors, and communicates these data using wireless communication techniques in short range. WBAN is playing a huge role in improving the quality of healthcare. Still, due to sensitive and concurrent nature of e-Heath systems, current research has showed that designers must take into considerations the security and privacy protection of the data collected by a ... Circuit Design For Green Communications – Methods, Tools And Examples, Galia Marinova, Zdravka Tchobanova Feb 2019 Circuit Design For Green Communications – Methods, Tools And Examples, Galia Marinova, Zdravka Tchobanova International Journal of Business and Technology The paper makes an overview of the existing methods applied for circuit design with low power consumption objective. It considers Computer-Aided Design (CAD) tools and modules for power consumption estimation at the design stage. For analog and mixed analog-digital circuit design, the power estimation options in ORCAD Design Suit with PSpice and Analog Filter Wizard are studied. For digital communication systems the study covers the power estimation, analysis and optimization in ISE and Vivado systems, Xilinx Power Estimator (XPE) tool and spreadsheet, the XPower Analyzer, as well as similar tools proposed by ALTERA - PowerPlay Early Power Estimator and QUARTUS II ... Improving Non-Native English Students' Communicative Competence And Collaboration Skills Through Virtual Simulations, Alisa Sadiku International Journal of Business and Technology Knowing how to communicate in the target language is the main goal of most language learners. Furthermore, it is very challenging for teachers to bring real world communication experiences in classroom settings where English is not the native language. Hence, in this paper I explore the role of virtual simulations in promoting communicational and collaboration opportunities to non-native speakers of English. In my research, I describe how virtual worlds improve communicative and collaborative skills of non-native speakers of English. Moreover, I investigate how virtual worlds can create a learner centered environment where students take control of their own language production ... Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith Feb 2019 Some Issues In The Testing Of Computer Simulation Models, David J. Murray-Smith International Journal of Business and Technology The testing of simulation models has much in common with testing processes in other types of application involving software development. However, there are also important differences associated with the fact that simulation model testing involves two distinct aspects, which are known as verification and validation. Model validation is concerned with investigation of modelling errors and model limitations while verification involves checking that the simulation program is an accurate representation of the mathematical and logical structure of the underlying model. Success in model validation depends upon the availability of detailed information about all aspects of the system being modelled. It also ... Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf Feb 2019 Trends In Women’S Participation In Computer Industry Subfields, Tristyn Maalouf The Kabod The participation of women in specific subfields of computer science (CS) and information technology (IT) will be investigated to determine the existence of any trends that may exist indicating special interest amongst women. Specifically, the subfield of database administration will be considered to determine if women tend to enter this subfield more frequently than other subfields. Research will also acknowledge statistics regarding male participation in database administration and other relevant subfields to determine if any trends in women’s participation are unique to women or if they exist across the board. Conclusions will be drawn based on the data and ... Role Of Combinatorial Complexity In Genetic Networks, Sharon Yang Feb 2019 Role Of Combinatorial Complexity In Genetic Networks, Sharon Yang SMU Journal of Undergraduate Research A common motif found in genetic networks is the formation of large complexes. One difficulty in modeling this motif is the large number of possible intermediate complexes that can form. For instance, if a complex could contain up to 10 different proteins, 210 possible intermediate complexes can form. Keeping track of all complexes is difficult and often ignored in mathematical models. Here we present an algorithm to code ordinary differential equations (ODEs) to model genetic networks with combinatorial complexity. In these routines, the general binding rules, which counts for the majority of the reactions, are implemented automatically, thus the users ... Singular Ramsey And Turán Numbers, Yair Caro, Zsolt Tuza Feb 2019 Singular Ramsey And Turán Numbers, Yair Caro, Zsolt Tuza Theory and Applications of Graphs We say that a subgraph F of a graph G is singular if the degrees d_G(v) are all equal or all distinct for the vertices v of F. The singular Ramsey number Rs(F) is the smallest positive integer n such that, for every m at least n, in every edge 2-coloring of K_m, at least one of the color classes contains F as a singular subgraph. In a similar flavor, the singular Turán number Ts(n,F) is defined as the maximum number of edges in a graph of order n, which does not contain F as a ... Feb 2019 Solving The Sylvester Equation Ax-Xb=C When$\Sigma(A)\Cap\Sigma(B)\Neq\Emptyset$, Nebojša Č. Dinčić Electronic Journal of Linear Algebra The method for solving the Sylvester equation$AX-XB=C$in complex matrix case, when$\sigma(A)\cap\sigma(B)\neq \emptyset\$, by using Jordan normal form is given. Also, the approach via Schur decomposition is presented.

Special Issue Call For Papers: Creativity In Mathematics, Milos Savic, Emily Cilli-Turner, Gail Tang, Gulden Karakok, Houssein El Turkey Jan 2019

Special Issue Call For Papers: Creativity In Mathematics, Milos Savic, Emily Cilli-Turner, Gail Tang, Gulden Karakok, Houssein El Turkey

Journal of Humanistic Mathematics

The Journal of Humanistic Mathematics is pleased to announce a call for papers for a special issue on Creativity in Mathematics. Please send your abstract submissions via email to the guest editors by March 1, 2019. Initial submission of complete manuscripts is due August 1, 2019. The issue is currently scheduled to appear in July 2020.

What The Wasp Said, Hugh C. Culik Jan 2019

What The Wasp Said, Hugh C. Culik

Journal of Humanistic Mathematics

On a bright spring day, the ancient building housing the English and Logic Departments begins to slowly collapse on itself, trapping McMann (an inept English professor) and Lucy Curt (a logician) in the office they share. As the Fibonacci repetitions of the building’s brickwork slowly peel away, McMann seizes the moment to tell Lucy stories about skunks, stories whose recurrent pattern finally leads to the unrecognized connection between a “message” burned into his ear by a wasp and the orderly universe for which he cannot find a language. At last, he looks up only to see Lucy descending a ...

An 1883 Faery Tale, Scott W. Williams Jan 2019

An 1883 Faery Tale, Scott W. Williams

Journal of Humanistic Mathematics

A poem about the construction of Georg Cantor's famous set.

Irrational Infinity, Ricky Chen Jan 2019

Irrational Infinity, Ricky Chen

Journal of Humanistic Mathematics

A short whimsical poem on the cardinality of irrational numbers.

Cosmology, Craig W. Steele Jan 2019

Cosmology, Craig W. Steele

Journal of Humanistic Mathematics

No abstract provided.

A Mathematician's Travel Memories, Michael Holcomb Jan 2019

A Mathematician's Travel Memories, Michael Holcomb

Journal of Humanistic Mathematics

No abstract provided.