Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Series

2009

Discipline
Institution
Keyword
Publication
File Type

Articles 91 - 120 of 4389

Full-Text Articles in Physical Sciences and Mathematics

Thermochromic Absorption And Photoluminescence In [Pt(Ppy)(Mu-Ph(2)Pz)](2), Aaron A. Rachford, Felix N. Castellano Dec 2009

Thermochromic Absorption And Photoluminescence In [Pt(Ppy)(Mu-Ph(2)Pz)](2), Aaron A. Rachford, Felix N. Castellano

Chemistry Faculty Publications

The temperature effects on the spectral properties and photophysics of a new d(8)-d(8) dinuclear Pt-II chromophore, [Pt(ppy)(mu-Ph(2)pz)](2) (ppy is 2-phenylpyridine and Ph(2)pz is 3,5-diphenylpyrazolate), have been investigated. The thermochromic shifts are tentatively ascribed to intramolecular sigma interactions between the two pseudocofacial d(Z2) orbitals. Substantial emission profile changes occur in the solid state, solution, and doped polymer films.


Wku Campus Wide Holiday Energy Conservation Plan, Wku Sustainability Committee, Christian Ryan-Downing Dec 2009

Wku Campus Wide Holiday Energy Conservation Plan, Wku Sustainability Committee, Christian Ryan-Downing

Sustainability Publications and Resources

No abstract provided.


Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya Dec 2009

Mining Data From Multiple Software Development Projects, Huanjing Wang, Taghi M. Khoshgoftaar, Kehan Gao, Naeem Seliya

Computer Science Faculty Publications

A large system often goes through multiple software project development cycles, in part due to changes in operation and development environments. For example, rapid turnover of the development team between releases can influence software quality, making it important to mine software project data over multiple system releases when building defect predictors. Data collection of software attributes are often conducted independent of the quality improvement goals, leading to the availability of a large number of attributes for analysis. Given the problems associated with variations in development process, data collection, and quality goals from one release to another emphasizes the importance of …


Forced Oscillations Of The Korteweg-De Vries Equation On A Bounded Domain And Their Stability, Muhammad Usman, Bingyu Zhang Dec 2009

Forced Oscillations Of The Korteweg-De Vries Equation On A Bounded Domain And Their Stability, Muhammad Usman, Bingyu Zhang

Mathematics Faculty Publications

It has been observed in laboratory experiments that when nonlinear dispersive waves are forced periodically from one end of undisturbed stretch of the medium of propagation, the signal eventually becomes temporally periodic at each spatial point. The observation has been confirmed mathematically in the context of the damped Kortewg-de Vries (KdV) equation and the damped Benjamin-Bona-Mahony (BBM) equation. In this paper we intend to show the same results hold for the pure KdV equation (without the damping terms) posed on a bounded domain. Consideration is given to the initial-boundary-value problem

uuxuxxx 0 < x < 1, t > 0, (*)

It is shown …


Stimuli-Responsive Hydrogel Microdomes Integrated With Genetically Engineered Proteins For High-Throughput Screening Of Pharmaceuticals, Sylvia Daunert, Sapna K. Deo, Jason Douglas Ehrick, Tyler William Browning, Leonidas G. Bachas Dec 2009

Stimuli-Responsive Hydrogel Microdomes Integrated With Genetically Engineered Proteins For High-Throughput Screening Of Pharmaceuticals, Sylvia Daunert, Sapna K. Deo, Jason Douglas Ehrick, Tyler William Browning, Leonidas G. Bachas

Chemistry Faculty Patents

A hydrogel microdome that can swell in response to a stimuli or target molecule is formed by polymerizing a mixture comprising a monomer capable of forming a hydrogel with a biopolymer. An array of hydrogel microdomes can be formed on a substrate by microspotting the mixture and polymerizing. The array can be used for high-throughput screening of analytes as well as for use as an actuator and biosensor using the swelling property of the hydrogel.


General Theory Of Oscillon Dynamics, Marcelo Gleiser, David Sicilia Dec 2009

General Theory Of Oscillon Dynamics, Marcelo Gleiser, David Sicilia

Dartmouth Scholarship

We present a comprehensive, nonperturbative analytical method to investigate the dynamics of time-dependent oscillating scalar field configurations. The method is applied to oscillons in a φ4 Klein-Gordon model in two and three spatial dimensions, yielding high accuracy results in the characterization of all aspects of the complex oscillon dynamics. In particular, we show how oscillons can be interpreted as long-lived perturbations about an attractor in field configuration space. By investigating their radiation rate as they approach the attractor, we obtain an accurate estimate of their lifetimes in d = 3 and explain why they seem to be perturbatively stable …


Towards Reasoning Pragmatics, Pascal Hitzler Dec 2009

Towards Reasoning Pragmatics, Pascal Hitzler

Computer Science and Engineering Faculty Publications

The realization of Semantic Web reasoning is central to substantiating the Semantic Web vision. However, current mainstream research on this topic faces serious challenges, which force us to question established lines of research and to rethink the underlying approaches.


Water Resources Year In Review - Winter 2009 Vol 21. No 2, Annis Water Resources Institute Dec 2009

Water Resources Year In Review - Winter 2009 Vol 21. No 2, Annis Water Resources Institute

AWRI Reviews

No abstract provided.


Are Periodic Solar Wind Number Density Structures Formed In The Solar Corona?, N. M. Viall, Harlan E. Spence, J. Kasper Dec 2009

Are Periodic Solar Wind Number Density Structures Formed In The Solar Corona?, N. M. Viall, Harlan E. Spence, J. Kasper

Physics & Astronomy

[1] We present an analysis of the alpha to proton solar wind abundance ratio (AHe) during a period characterized by significant large size scale density fluctuations, focusing on an event in which the proton and alpha enhancements are anti-correlated. In a recent study using 11 years (1995–2005) of solar wind observations from the Wind spacecraft, N. M. Viall et al. [2008] showed that periodic proton density structures occurred at particular radial length-scales more often than others. The source of these periodic density structures is a significant and outstanding question. Are they generated in the interplanetary medium, or are they a …


Mathematics Teacher Educators As Cultural Workers: A Dare To Those Who Dare To Teach (Urban?) Teachers, David W. Stinson Dec 2009

Mathematics Teacher Educators As Cultural Workers: A Dare To Those Who Dare To Teach (Urban?) Teachers, David W. Stinson

Middle-Secondary Education and Instructional Technology Faculty Publications

In his editorial, the author challenges urban mathematics educators to institute as the primary goal for the community of mathematics educators the cultural transformation of the discipline of mathematics from the psychologically brutalizing discipline of stratification into the psychologically humanizing discipline of freedom.


Geometry Of Control-Affine Systems, Jeanne N. Clelland, Christopher G. Moseley, George R. Wilkens Dec 2009

Geometry Of Control-Affine Systems, Jeanne N. Clelland, Christopher G. Moseley, George R. Wilkens

University Faculty Publications and Creative Works

Motivated by control-affine systems in optimal control theory, we introduce the notion of a point-affine distribution on a manifold X - i.e., an affine distribution F together with a distinguished vector field contained in F. We compute local invariants for point-affine distributions of constant type when dim(X) = n, rank(F) = n - 1, and when dim(X) = 3, rank(F) = 1. Unlike linear distributions, which are characterized by integer- valued invariants - namely, the rank and growth vector - when dim(X) ≤ 4, we find local invariants depending on arbitrary functions even for rank 1 point-affine distributions on manifolds …


Systematic Analysis Of Double-Ionization Dynamics Based On Four-Body Dalitz Plots, Daniel Fischer, Michael Schulz, Katharina R. Schneider, Marcelo F. Ciappina, Tom Kirchner, Aditya H. Kelkar, S. Hagman, Manfred Grieser, Kai Uwe Kuhnel, Robert Moshammer, Joachim Hermann Ullrich Dec 2009

Systematic Analysis Of Double-Ionization Dynamics Based On Four-Body Dalitz Plots, Daniel Fischer, Michael Schulz, Katharina R. Schneider, Marcelo F. Ciappina, Tom Kirchner, Aditya H. Kelkar, S. Hagman, Manfred Grieser, Kai Uwe Kuhnel, Robert Moshammer, Joachim Hermann Ullrich

Physics Faculty Research & Creative Works

We report on an experimental and theoretical systematic study of double ionization of helium by ion impact in terms of four-particle Dalitz plots. Several collision systems covering abroad range of perturbation parameters η (projectile charge to speed ratio) were investigated. With increasing η we observe a systematic trend from features, characteristic to correlated double-ionization mechanisms, to signatures of higher-order processes not requiring electron-electron correlations [the mechanism called "two-step-two projectile-electron interaction" (TS-2)]. The data for the largest η can qualitatively be amazingly well described by a simple model only including the TS-2 mechanism.


Morphology Of The Dayside Ionosphere Of Mars: Implications For Ion Outflows, Jane L. Fox Dec 2009

Morphology Of The Dayside Ionosphere Of Mars: Implications For Ion Outflows, Jane L. Fox

Physics Faculty Publications

Significant fluxes of tailward streaming ions have been detected in the Martian wake by instruments on spacecraft. Imposing outward fluxes at the top of a model will produce dayside ion density profiles that are characterized by smaller scale heights than those of diffusive equilibrium. We determine the maximum outward fluxes of ions, and those implied by radio occultation data, by constructing ∼180 models, with upward velocity boundary conditions in the range from 0 to (7–8) × 105 cm s−1 in small increments. As the upward velocity is increased, the topside ion or electron densities decrease until eventually the …


Review Of The Evidence Used In The Description Of Currently Recognized Cetacean Subspecies, William F. Perrin, James G. Mead, Robert L. Brownell Jr. Dec 2009

Review Of The Evidence Used In The Description Of Currently Recognized Cetacean Subspecies, William F. Perrin, James G. Mead, Robert L. Brownell Jr.

United States Department of Commerce: Staff Publications

We reviewed the subspecies listed by Rice (1998) and those described since (a total of 49, in 19 species), assessing them against the criteria recommended by the recent Workshop on Shortcomings of Cetacean Taxonomy in Relation to Needs of Conservation and Management (Reeves et al., 2004). The workshop suggested that the subspecies concept can be construed to cover two types of entities: a) lineages diverging but not quite far along the continuum of divergence (still having significant gene flow with another lineage or lineages) to be judged as species, and b) lineages that may well be species but for which …


Security Requirements Engineering-The Reluctant Oxymoron, Michael N. Johnstone Dec 2009

Security Requirements Engineering-The Reluctant Oxymoron, Michael N. Johnstone

Australian Information Security Management Conference

Security is a focus in many systems that are developed today, yet this aspect of systems development is often relegated when the shipping date for a software product looms. This leads to problems post-implementation in terms of patches required to fix security defects or vulnerabilities. A simplistic answer is that if the code was correct in the first instance, then vulnerabilities would not exist. The reality of a complex software artefact is however, driven by other concerns. Rather than probing programs for coding errors that lead to vulnerabilities, it is perhaps more beneficial to look at the root causes of …


Security Issues Challenging Facebook, S Leitch, M Warren Dec 2009

Security Issues Challenging Facebook, S Leitch, M Warren

Australian Information Security Management Conference

The advancement in Internet and bandwidth capability has resulted in a number of new applications to be developed; many of these newer applications are described as being Web 2. A Web 2 application such as Facebook has allowed people around the world to interact together. One of the interesting aspects of Facebook is the use of third parties applications and the interactions that this allows.Not surprisingly, the problems that exist in the real world such as theft, fraud, vandalism also exist in online Web 2 environments. This paper explores and categorises several security issues within the Facebook environment. It contributes …


When You Can't See The Forest For The Domains: Why A Two Forest Model Should Be Used To Achieve Logical Segregation Between Scada And Corporate Networks, Andrew Woodward, Brett Turner Dec 2009

When You Can't See The Forest For The Domains: Why A Two Forest Model Should Be Used To Achieve Logical Segregation Between Scada And Corporate Networks, Andrew Woodward, Brett Turner

Australian Information Warfare and Security Conference

The increasing convergence of corporate and control systems networks creates new challenges for the security of critical infrastructure. There is no argument that whilst this connection of what was traditionally an isolated network, to a usually internet enabled corporate network, is unavoidable, segregation must be maintained. One such challenge presented is how to properly and appropriately configure an active directory environment to allow for exchange of required data, but still maintain the security goal of separation of the two networks. This paper argues that while separate domains may seem to achieve this goal, the reality is that a domain is …


Tactical Analysis Of Attack In Physical And Digital Security Incidents:Towards A Model Of Asymmetry, Atif Ahmad Dec 2009

Tactical Analysis Of Attack In Physical And Digital Security Incidents:Towards A Model Of Asymmetry, Atif Ahmad

Australian Information Warfare and Security Conference

Asymmetric warfare is frequently described as a conflict where ‘weaker’ parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This research-in-progress paper develops a concept model of asymmetric warfare that represents the leverage available to the ‘weaker’ party over the ‘stronger’ party simply because the former is attacking rather than defending. Points of leverage include choice of timing, location, method of attack, best use of limited resources and time to prepare. The resulting concept model is used to discuss generic defensive strategies that can be applied by ‘stronger’ parties in the physical …


Culture Jamming: From Activism To Hactivism, Kay Hearn, Rachel J. Mahncke, Patricia A. Williams Dec 2009

Culture Jamming: From Activism To Hactivism, Kay Hearn, Rachel J. Mahncke, Patricia A. Williams

Australian Information Warfare and Security Conference

A new kind of Internet threat has emerged. Hacking is increasingly being used as a weapon by individuals to promote their political ideologies by engaging in distributed citizen-based warfare. Their aim is to disrupt communications using internet enabled networks and organisations. Examples of these online assaults during 2009 were evident during the Iranian protests and the Melbourne International Film Festival. Such attacks use denial of service techniques and utilised social networking websites such as Facebook, Twitter and You Tube to post links to access hacking instructions. Posts on social networking websites and news stories from a variety of sources online, …


Ascent Of Asymmetric Risk In Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, Atif Ahmad Dec 2009

Ascent Of Asymmetric Risk In Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, Atif Ahmad

Australian Information Warfare and Security Conference

Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security, which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes …


A Graph Theoretic Summation Of The Cubes Of The First N Integers, Joseph Demaio, Andy Lightcap Dec 2009

A Graph Theoretic Summation Of The Cubes Of The First N Integers, Joseph Demaio, Andy Lightcap

Faculty and Research Publications

In this Math Bite we provide a combinatorial proof of the sum of the cubes of the first n integers by counting edges in complete bipartite graphs.


Can Pastoral Linkages To Livestock Markets Be Sustained In Southern Ethiopia?, D. Layne Coppock, Getachew Gebru, Solomon Desta, Seyoum Tezera, Zewdu Edea Dec 2009

Can Pastoral Linkages To Livestock Markets Be Sustained In Southern Ethiopia?, D. Layne Coppock, Getachew Gebru, Solomon Desta, Seyoum Tezera, Zewdu Edea

Environment and Society Faculty Publications

The PARIMA project has facilitated collective action, empowerment of women, and increased involvement in livestock marketing among pastoralists on the Borana Plateau since 2001. Fifty-nine collective-action groups formed by PARIMA and her partners have been recently merged into market-oriented cooperatives, consistent with government policy. We used focus groups and participatory appraisals to assess the extent that market linkages have been sustained since previously reported in 2006. The markets have been growing, but are volatile. Members report they need access to early warning and livestock market-information systems, as well as more capital, to promote trade. Export firms have imposed added conditions …


Block Modeling With Multiple Fault Network Geometries And A Linear Elastic Coupling Estimator In Spherical Coordinates, Brendan J. Meade, John P. Loveless Dec 2009

Block Modeling With Multiple Fault Network Geometries And A Linear Elastic Coupling Estimator In Spherical Coordinates, Brendan J. Meade, John P. Loveless

Geosciences: Faculty Publications

Geodetic observations of interseismic deformation provide constraints on the partitioning of fault slip across plate boundary zones, the spatial distribution of both elastic and inelastic strain accumulation, and the nature of the fault system evolution. Here we describe linear block theory, which decomposes surface velocity fields into four components: (1) plate rotations, (2) elastic deformation from faults with kinematically consistent slip rates, (3) elastic deformation from faults with spatially variable coupling, and (4) homogeneous intrablock strain. Elastic deformation rates are computed for each fault segment in a homogeneous elastic half-space using multiple optimal planar Cartesian coordinate systems to minimize areal …


Proposed Framework For Understanding Information Security Culture And Practices In The Saudi Context, Mohammed Alnatheer, Karen Nelson Dec 2009

Proposed Framework For Understanding Information Security Culture And Practices In The Saudi Context, Mohammed Alnatheer, Karen Nelson

Australian Information Security Management Conference

An examination of Information Security (IS) and Information Security Management (ISM) research in Saudi Arabia has shown the need for more rigorous studies focusing on the implementation and adoption processes involved with IS culture and practices. Overall, there is a lack of academic and professional literature about ISM and more specifically IS culture in Saudi Arabia. Therefore, the overall aim of this paper is to identify issues and factors that assist the implementation and the adoption of IS culture and practices within the Saudi environment. The goal of this paper is to identify the important conditions for creating an information …


Playing Safe: A Prototype Game For Raising Awareness Of Social Engineering, Michael Newbould, Stephen Furnell Dec 2009

Playing Safe: A Prototype Game For Raising Awareness Of Social Engineering, Michael Newbould, Stephen Furnell

Australian Information Security Management Conference

Social engineering is now a major threat to users and systems in the online context, and it is therefore vital to educate potential victims in order to reduce their susceptibility to the related attacks. However, as with other aspects of security education, this firstly requires a means of getting the user’s attention. This paper presents details of an awarenessraising game that was developed in order to educate users in a more interactive way. A board game approach, combining reference material with themed multiple-choice questions, was implemented as an initial prototype, and evaluated with 21 users. The results suggested that the …


Electronic-Supply Chain Information Security: A Framework For Information, Alizera Bolhari Dec 2009

Electronic-Supply Chain Information Security: A Framework For Information, Alizera Bolhari

Australian Information Security Management Conference

Over the last few years, the materials and distribution management has developed into a broader strategic approach known as electronic supply chain management by means of information technology. This paper attempts to visibly describe supply chain management information security concepts which are necessary for managers to know about. So, the depth of information presented in this paper is calibrated for managers, not technical security employees or agents. Global supply chains are exposed to diverse types of risks that rise along with increasing globalization. Electronic supply chains will be more vulnerable from information security (IS) aspect among other types of supply …


Assessment Of Internationalised Domain Name Homograph Attack Mitigation, Peter Hannay, Christopher Bolan Dec 2009

Assessment Of Internationalised Domain Name Homograph Attack Mitigation, Peter Hannay, Christopher Bolan

Australian Information Security Management Conference

With the advent of internationalised domains the threat posed by non-english character sets has eventuated. Whilst this phenomenon remains well known in the development and internet industry the actual implementations of popular applications have been tested to determine their resilience to homograph based attack. The research found that most provided features that overcome such attacks, but there remain a few notable exceptions. Should an attacker take advantage of such oversights a victim would likely not be able to spot a fraudulent site or email and thus provide a perfect platform for subsequent attack.


Cyber Attacks: Does Physical Boundary Matter?, Qiu-Hong Wang, Seung-Hyun Kim Dec 2009

Cyber Attacks: Does Physical Boundary Matter?, Qiu-Hong Wang, Seung-Hyun Kim

Research Collection School Of Computing and Information Systems

Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. …


A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li Dec 2009

A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li

Research Collection School Of Computing and Information Systems

An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency …


Denial-Of-Service Attacks On Host-Based Generic Unpackers, Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia Dec 2009

Denial-Of-Service Attacks On Host-Based Generic Unpackers, Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia

Research Collection School Of Computing and Information Systems

With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, we present an automatic packer with which packed malware forges spurious unpacking behaviors that lead to a denial-of-service attack on host-based generic unpackers. We present the design, implementation, and evaluation of the proposed packer and malware produced using the proposed packer, and show the success of denial-of-service attacks on host-based generic unpackers.