Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 11670

Full-Text Articles in Physical Sciences and Mathematics

Oceans Of Space, Stephanie Steinbrecher '16 Dec 2016

Oceans Of Space, Stephanie Steinbrecher '16

EnviroLab Asia

"Oceans of Space" relates my observations of the 2016 EnviroLab Asia Clinic Trip to Singapore and Sarawak, Malaysia. In this meditation, the concept of space serves as a lens to examine assumptions of geopolitical, historical, and philosophical positioning—regionally and globally. At the center of my inquiry is EnviroLab's connection to the Dayak communities in Baram, Sarawak. This region is experiencing dramatic social and ecological change as a result of industrial development. By triangulating my subjective impressions of this space, various knowledge systems, and the qualitative data EnviroLab gathered in Southeast Asia, I aim to untangle some paradoxes that ...


Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson Dec 2016

Investigating The Spatial Complexity Of Various Pke-Peks Schematics, Jacob Patterson

Rose-Hulman Undergraduate Research Publications

With the advent of cloud storage, people upload all sorts of information to third party servers. However, uploading plaintext does not seem like a good idea for users who wish to keep their data private. Current solutions to this problem in literature involves integrating Public Key Encryption and Public key encryption with keyword search techniques. The intent of this paper is to analyze the spatial complexities of various PKE-PEKS schemes at various levels of security and discuss potential avenues for improvement.


Fibonacci Or Quasi-Symmetric Phyllotaxis. Part Ii: Botanical Observations, Stéphane Douady, Christophe Golé Dec 2016

Fibonacci Or Quasi-Symmetric Phyllotaxis. Part Ii: Botanical Observations, Stéphane Douady, Christophe Golé

Mathematics and Statistics: Faculty Publications

Historically, the study of phyllotaxis was greatly helped by the simple description of botanical patterns by only two integer numbers, namely the number of helices (parastichies) in each direction tiling the plant stem. The use of parastichy num- bers reduced the complexity of the study and created a proliferation of generaliza- tions, among others the simple geometric model of lattices. Unfortunately, these simple descriptive method runs into difficulties when dealing with patterns pre- senting transitions or irregularities. Here, we propose several ways of addressing the imperfections of botanical reality. Using ontogenetic analysis, which follows the step-by-step genesis of the pattern ...


Fibonacci Or Quasi-Symmetric Phyllotaxis. Part I: Why?, Christophe Golé, Jacques Dumais, Stéphane Douady Dec 2016

Fibonacci Or Quasi-Symmetric Phyllotaxis. Part I: Why?, Christophe Golé, Jacques Dumais, Stéphane Douady

Mathematics and Statistics: Faculty Publications

The study of phyllotaxis has focused on seeking explanations for the occurrence of consecutive Fibonacci numbers in the number of helices paving the stems of plants in the two opposite directions. Using the disk-accretion model, first introduced by Schwendener and justified by modern biological studies, we observe two dis- tinct types of solutions: the classical Fibonacci-like ones, and also more irregular configurations exhibiting nearly equal number of helices in a quasi-square pack- ing, the quasi-symmetric ones, which are a generalization of the whorled patterns. Defining new geometric tools allowing to work with irregular patterns and local transitions, we provide simple ...


Investigation Of A Recharge Basin To Improve Drought Resiliency And Aquifer Sustainability Rock Valley Rural Water, J. Michael Gannon, Nathan L. Holt, Jason A. Vogelgesang Dec 2016

Investigation Of A Recharge Basin To Improve Drought Resiliency And Aquifer Sustainability Rock Valley Rural Water, J. Michael Gannon, Nathan L. Holt, Jason A. Vogelgesang

Water Resources Investigation Report

No abstract provided.


Boone River Watershed Stream Fish And Habitat Monitoring, Ia, Nicholas T. Simpson, Clay L. Pierce, Kevin J. Roe, Michael J. Weber Dec 2016

Boone River Watershed Stream Fish And Habitat Monitoring, Ia, Nicholas T. Simpson, Clay L. Pierce, Kevin J. Roe, Michael J. Weber

Natural Resources Ecology and Management Reports

Historically, Iowa’s landscape consisted of prairies, forests, and wetlands with meandering streams integrated throughout (Hewes 1950). The arrival and subsequent settlement of European immigrants began a long process of altering the landscape to help meet human needs. Cultivating row crops in Iowa became a popular and successful venture for many as the flat, fertile ground of the Midwestern United States provided a great opportunity for farmers (Easterlin 1976). Early Iowa farmers began to drain wetlands, cut down forests, remove prairies, and replace them with crop fields (Gallant et al. 2011). As the technology of farming practices improved and operations ...


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Evolution In The Deep Sea: Scales And Mechanisms Of Population Divergence, Amanda E. Glazier Dec 2016

Evolution In The Deep Sea: Scales And Mechanisms Of Population Divergence, Amanda E. Glazier

Graduate Doctoral Dissertations

The deep sea is the Earth’s largest ecosystem and harbors a unique and largely endemic fauna. Although most research has focused on the ecological mechanisms that allow coexistence, recent studies have begun to investigate how this remarkable fauna evolved.. My work quantifies geographic patterns of genetic variation and investigates potential mechanisms that shape evolution in the deep ocean.

Bathymetric genetic divergence is common in the deep sea with population structure typically decreasing with depth. The evolutionary mechanisms that underlie these patterns are poorly understood. Geographic patterns of genetic variation indicated that the protobranch bivalve Neilonella salicensis was composed of ...


A New Class Of Integrable Two-Mass Mixtures In One-Dimension, Zaijong Hwang Dec 2016

A New Class Of Integrable Two-Mass Mixtures In One-Dimension, Zaijong Hwang

Graduate Masters Theses

Among systems with many hard-core point particles that only interact by elastic collisions in one-dimension, it has long been thought that only those with equal mass particles were completely integrable, where the final state of the system through time evolution could be easily predicted from its initial state due to the existence of a maximal number of conserved quantities. In this thesis, we introduce a new class of integrable three-particle systems that contain two unequal masses. These integrable triplets can affect the rate of thermalization in a much larger system composed of particles with two unequal masses, the effect of ...


Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


Inkjet Printing Polymerized Pcda As A Means Of Serialization, Constantino Stavrou Dec 2016

Inkjet Printing Polymerized Pcda As A Means Of Serialization, Constantino Stavrou

Theses

Polymerized PCDA, otherwise known as pentacosadiynoic acid, due to its color changing response to high temperatures, has been used as a means of indicating whether the material has been exposed to high temperatures. Quick-Response codes or Q-R codes ha


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


Characterization Of Hiv Diversity, Phylodynamics And Drug Resistance In Washington, Dc., Marcos Pérez-Losada, Amanda D Castel, Brittany Lewis, Michael Kharfen, Charles P Cartwright, Bruce Huang, Taylor Maxwell, Alan E Greenberg, Keith A Crandall Dec 2016

Characterization Of Hiv Diversity, Phylodynamics And Drug Resistance In Washington, Dc., Marcos Pérez-Losada, Amanda D Castel, Brittany Lewis, Michael Kharfen, Charles P Cartwright, Bruce Huang, Taylor Maxwell, Alan E Greenberg, Keith A Crandall

Epidemiology and Biostatistics Faculty Publications

No abstract provided.


Sdss-Iv Manga: Spatially Resolved Star Formation Histories In Galaxies As A Function Of Galaxy Mass And Type, D. Goddard, D. Thomas, C. Maraston, K. Westfall, J. Etherington, R. Riffel, M. D. Mallmann, Z. Zheng, M. Argudo-Fernández, J. Lian, M. Bershady, K. Bundy, N. Drory, D. Law, Renbin Yan, D. Wake, A. Weijmans, D. Bizyaev, J. Brownstein, R. R. Lane, R. Maiolino, K. Masters, M. Merrifield, C. Nitschelm, K. Pan, A. Roman-Lopes, T. Storchi-Bergmann, D. P. Schneider Dec 2016

Sdss-Iv Manga: Spatially Resolved Star Formation Histories In Galaxies As A Function Of Galaxy Mass And Type, D. Goddard, D. Thomas, C. Maraston, K. Westfall, J. Etherington, R. Riffel, M. D. Mallmann, Z. Zheng, M. Argudo-Fernández, J. Lian, M. Bershady, K. Bundy, N. Drory, D. Law, Renbin Yan, D. Wake, A. Weijmans, D. Bizyaev, J. Brownstein, R. R. Lane, R. Maiolino, K. Masters, M. Merrifield, C. Nitschelm, K. Pan, A. Roman-Lopes, T. Storchi-Bergmann, D. P. Schneider

Physics and Astronomy Faculty Publications

We study the internal gradients of stellar population properties within 1.5 Re for a representative sample of 721 galaxies, with stellar masses ranging between 109 M and 1011.5 M from the SDSS-IV MaNGA Integral-Field-Unit survey. Through the use of our full spectral fitting code firefly, we derive light- and mass-weighted stellar population properties and their radial gradients, as well as full star formation and metal enrichment histories. We also quantify the impact that different stellar population models and full spectral fitting routines have on the derived stellar population properties and the radial gradient measurements. In ...


Tropical Algebra, Graph Theory, & Foreign Exchange Arbitrage, Bradley A. Mason Dec 2016

Tropical Algebra, Graph Theory, & Foreign Exchange Arbitrage, Bradley A. Mason

Senior Honors Projects, 2010-current

We answer the question, given n currencies and k trades, how can a maximal arbitrage opportunity be found and what is its value? To answer this question, we use techniques from graph theory and employ a max-plus algebra (commonly known as tropical algebra). Further, we show how the tropical eigenvalue of a foreign exchange rate matrix relates to arbitrage among the currencies and can be found algorithmically. We finish by employing time series techniques to study the stability of maximal, high-currency arbitrage opportunities.


An Ensemble Study Of The Sea Level Rise Impact On Storm Surge And Inundation In The Coastal Bangladesh, Mansur Ali Jisan Dec 2016

An Ensemble Study Of The Sea Level Rise Impact On Storm Surge And Inundation In The Coastal Bangladesh, Mansur Ali Jisan

Electronic Theses and Dissertations

The hydrodynamic model Delft3D is used to study the impact of Sea Level Rise (SLR) on storm surge and inundation in the coastal region of Bangladesh. To study the present-day inundation scenario, track of two known tropical cyclones (TC) were used: Aila (Category 1; 2009) and Sidr (Category 5; 2007). Model results were validated with the available observations. Future inundation scenarios were generated by using the strength of TC Sidr, TC Aila and an ensemble of historical TC tracks but incorporating the effect of SLR. Since future change in storm surge inundation under SLR impact is a probabilistic incident, that ...


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall Dec 2016

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust ...


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...