Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

219,210 Full-Text Articles 278,923 Authors 47,230,550 Downloads 417 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

219,210 full-text articles. Page 1 of 6237.

Merk Obat Kencing Nanah Pada Pria Di Apotik Resep Dokter Kelamin, Riza Rihanna 2021 University of California, San Francisco

Merk Obat Kencing Nanah Pada Pria Di Apotik Resep Dokter Kelamin, Riza Rihanna

Riza Rihanna

Merk obat kencing nanah pada pria di apotik resep dokter kelamin,bagi Anda yang memiliki penyakit kencing nanah , kami menyediakan obat yang ampuh untuk membantu mengobati penyakit anda dan harganya pun sangat terjangkau . Nama produk kami adalah Gangjie dan Ghosiah, obat ini sudah terdaftar di BPOM MUI dan sudah berstandar ISO Internasional. Untuk pemesanan hub call center:087736710838.


Taxthemis: Interactive Mining And Exploration Of Suspicious Tax Evasion Group, Yating LIN, Kamkwai WONG, Yong WANG, Rong ZHANG, Bo DONG, Huamin QU, Qinghua ZHENG 2021 Singapore Management University

Taxthemis: Interactive Mining And Exploration Of Suspicious Tax Evasion Group, Yating Lin, Kamkwai Wong, Yong Wang, Rong Zhang, Bo Dong, Huamin Qu, Qinghua Zheng

Research Collection School Of Information Systems

Tax evasion is a serious economic problem for many countries, as it can undermine the government’s tax system and lead to an unfair business competition environment. Recent research has applied data analytics techniques to analyze and detect tax evasion behaviors of individual taxpayers. However, they have failed to support the analysis and exploration of the related party transaction tax evasion (RPTTE) behaviors (e.g., transfer pricing), where a group of taxpayers is involved. In this paper, we present TaxThemis, an interactive visual analytics system to help tax officers mine and explore suspicious tax evasion groups through analyzing heterogeneous tax-related ...


Tradao: A Visual Analytics System For Trading Algorithm Optimization, Ka Wing TSANG, Haotian LI, Fuk Ming LAM, Yifan MU, Yong WANG, Huamin QU 2021 Singapore Management University

Tradao: A Visual Analytics System For Trading Algorithm Optimization, Ka Wing Tsang, Haotian Li, Fuk Ming Lam, Yifan Mu, Yong Wang, Huamin Qu

Research Collection School Of Information Systems

With the wide applications of algorithmic trading, it has become critical for traders to build a winning trading algorithm to beat the market. However, due to the lack of efficient tools, traders mainly rely on their memory to manually compare the algorithm instances of a trading algorithm and further select the best trading algorithm instance for the real trading deployment. We work closely with industry practitioners to discover and consolidate user requirements and develop an interactive visual analytics system for trading algorithm optimization. Structured expert interviews are conducted to evaluateTradAOand a representative case study is documented for illustrating the system ...


Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng XIA, Reshika P. VELUMANI, Yong WANG, Huamin QU, Xiaojuan MA 2021 Singapore Management University

Qlens: Visual Analytics Of Multi-Step Problem-Solving Behaviors For Improving Question Design, Meng Xia, Reshika P. Velumani, Yong Wang, Huamin Qu, Xiaojuan Ma

Research Collection School Of Information Systems

With the rapid development of online education in recent years, there has been an increasing number of learning platforms that provide students with multi-step questions to cultivate their problem-solving skills. To guarantee the high quality of such learning materials, question designers need to inspect how students’ problem-solving processes unfold step by step to infer whether students’ problem-solving logic matches their design intent. They also need to compare the behaviors of different groups (e.g., students from different grades) to distribute questions to students with the right level of knowledge. The availability of fine-grained interaction data, such as mouse movement trajectories ...


Visual Analysis Of Discrimination In Machine Learning, Qianwen WANG, Zhenghua XU, Zhutian CHEN, Yong WANG, Yong WANG, Huamin Qu 2021 Singapore Management University

Visual Analysis Of Discrimination In Machine Learning, Qianwen Wang, Zhenghua Xu, Zhutian Chen, Yong Wang, Yong Wang, Huamin Qu

Research Collection School Of Information Systems

The growing use of automated decision-making in critical applications, such as crime prediction and college admission, has raised questions about fairness in machine learning. How can we decide whether different treatments are reasonable or discriminatory? In this paper, we investigate discrimination in machine learning from a visual analytics perspective and propose an interactive visualization tool, DiscriLens, to support a more comprehensive analysis. To reveal detailed information on algorithmic discrimination, DiscriLens identifies a collection of potentially discriminatory itemsets based on causal modeling and classification rules mining. By combining an extended Euler diagram with a matrix-based visualization, we develop a novel set ...


2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio 2021 University of Oulu

2vt: Visions, Technologies, And Visions Of Technologies For Understanding Human Scale Spaces, Ville Paanen, Piia Markkanen, Jonas Oppenlaender, Haider Akmal, Lik Hang Lee, Ava Fatah Gen Schieck, John Dunham, Konstantinos Papangelis, Nicolas Lalone, Niels Van Berkel, Jorge Goncalves, Simo Hosio

Presentations and other scholarship

Spatial experience is an important subject in various fields, and in HCI it has been mostly investigated in the urban scale. Research on human scale spaces has focused mostly on the personal meaning or aesthetic and embodied experiences in the space. Further, spatial experience is increasingly topical in envisioning how to build and interact with technologies in our everyday lived environments, particularly in so-called smart cities. This workshop brings researchers and practitioners from diverse fields to collaboratively discover new ways to understand and capture human scale spatial experience and envision its implications to future technological and creative developments in our ...


A Comparison Of Word Embedding Techniques For Similarity Analysis, Tyler Gerth 2021 University of Arkansas, Fayetteville

A Comparison Of Word Embedding Techniques For Similarity Analysis, Tyler Gerth

Computer Science and Computer Engineering Undergraduate Honors Theses

There have been a multitude of word embedding techniques developed that allow a computer to process natural language and compare the relationships between different words programmatically. In this paper, similarity analysis, or the testing of words for synonymic relations, is used to compare several of these techniques to see which performs the best. The techniques being compared all utilize the method of creating word vectors, reducing words down into a single vector of numerical values that denote how the word relates to other words that appear around it. In order to get a holistic comparison, multiple analyses were made, with ...


Security Fatigue And Its Effects On Perceived Password Strength Among University Students, Chase Carroll 2021 University of Tennessee at Chattanooga

Security Fatigue And Its Effects On Perceived Password Strength Among University Students, Chase Carroll

Honors Theses

This study was performed with the goal of observing the effect, if any, that security fatigue has on students’ perceived strength of passwords. In doing so, it was hoped to find some correlation between the two that would help in establishing a measurable effect of the phenomenon in students. This could potentially aid organizational decision-makers, such as security policy writers and system admins, to make more informed decisions about implementing security measures. To achieve the goal of observing this fatigue and attempting to measure it, a survey was distributed to numerous students on the University of Tennessee at Chattanooga campus ...


Migmatite-Like Textures In Anthracite: Further Evidence For Low-Grade Metamorphic Melting And Resolidification In High-Rank Coals, James C. Hower, Susan M. Rimmer, Maria Mastalerz, Nicola J. Wagner 2021 University of Kentucky

Migmatite-Like Textures In Anthracite: Further Evidence For Low-Grade Metamorphic Melting And Resolidification In High-Rank Coals, James C. Hower, Susan M. Rimmer, Maria Mastalerz, Nicola J. Wagner

Center for Applied Energy Research Faculty Publications

Previous studies demonstrated that melting, initiated by supercritical fluids in the 375–400 °C range, occurred as part of anthracite metamorphism in the Appalachian Basin. Based on the known behavior of vitrinite at high temperatures and, to a lesser extent, at high pressures, it was determined that the duration of the heating, melting, and resolidification event was about 1 h. In the current study, featureless vitrinite within banded maceral assemblages demonstrates the intimate association of melted and resolidified vitrinite with anthracite-rank macerals. By analogy with metamorphosed inorganic rocks, such associations represent diadysites and embrechites, i.e., cross-cutting and layered migmatites ...


A Novel Dynamic Analysis Infrastructure To Instrument Untrusted Execution Flow Across User-Kernel Spaces, Jiaqi HONG, Xuhua DING 2021 Singapore Management University

A Novel Dynamic Analysis Infrastructure To Instrument Untrusted Execution Flow Across User-Kernel Spaces, Jiaqi Hong, Xuhua Ding

Research Collection School Of Information Systems

Code instrumentation and hardware based event trapping are two primary approaches used in dynamic malware analysis systems. In this paper, we propose a new approach called Execution Flow Instrumentation (EFI) where the analyzer execution flow is interleaved with the target flow in user- and kernel-mode, at junctures flexibly chosen by the analyzer at runtime. We also propose OASIS as the system infrastructure to realize EFI with virtues of the current two approaches, however without their drawbacks. Despite being securely and transparently isolated from the target, the analyzer introspects and controls it in the same native way as instrumentation code. We ...


Fundamental Aspects Of Black Holes, Jacob Fisher Ciafre 2021 Utah State University

Fundamental Aspects Of Black Holes, Jacob Fisher Ciafre

All Graduate Plan B and other Reports

The literature study here seeks to present the foundations of black hole physics in General Relativity. The report includes a discussion of the Kerr black hole metric, black hole entropy, particle creation, the laws of black hole mechanics, and a bilinear mass formula for the Kerr-Newman black hole solution.


An In-Depth Look At Learning Computer Language Syntax In A High-Repetition Practice Environment, Stephanie Gonzales 2021 Utah State University

An In-Depth Look At Learning Computer Language Syntax In A High-Repetition Practice Environment, Stephanie Gonzales

All Graduate Theses and Dissertations

Students in an introductory computer science course generally have difficulty producing code that follows the arrangement rules known as syntax. Phanon was created to help students practice writing correct code that follows the rules of syntax. Previous research suggests this tool has helped students improve their exam scores and strengthen effectiveness in the course. A study was conducted to observe students while they complete the syntax exercises to find meaningful patterns in the steps the students take to complete an exercise.

Evidence to support high intrinsic load was found throughout the study, which is a measure of difficulty learning a ...


Power Of Near-Peers: Conceptualizing And Testing A Near-Peer Mentoring Model In Raising Youths' Self-Efficacy In Computer Programming, Chongning Sun 2021 Utah State University

Power Of Near-Peers: Conceptualizing And Testing A Near-Peer Mentoring Model In Raising Youths' Self-Efficacy In Computer Programming, Chongning Sun

All Graduate Theses and Dissertations

Self-efficacy is seen as a barrier for youth, females in particular, to enter computer science (CS). In this study, I presented a near-peer mentoring model that focused on changing the mentee’s self-efficacy in CS. The present study had three objectives: (a) to design a near-peer mentoring model (i.e., a conceptual model) around the sources of information that influence self-efficacy, (b) to develop a mentor training model based on the conceptual model, and (c) to test the effectiveness of the training model in increasing mentees’ self-efficacy in the context of a summer App programming camp. The present study adopted ...


Renewable Energy Conversion: Organic Redox Flow Batteries And Electrocatalytic Carbon Dioxide Reduction, Camden R. DeBruler 2021 Utah State University

Renewable Energy Conversion: Organic Redox Flow Batteries And Electrocatalytic Carbon Dioxide Reduction, Camden R. Debruler

All Graduate Theses and Dissertations

Steadily increasing global energy demands have pushed the industry to investigate renewable energy sources like solar and wind to help alleviate the strain on fossil fuel based non-renewable energy sources while also reducing carbon emissions. However, the energy producing power of these renewable technologies is limited by factors such as weather and the day-night cycle. Additional energy storage technologies are needed which are capable of storing excess energy during periods of high productivity, and delivering it when production rates fluctuate.

Batteries represent one possible energy storage device to meet this need. Specifically, redox flow batteries (RFBs) offer advantages in terms ...


Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes 2021 Regis University

Trust Models And Risk In The Internet Of Things, Jeffrey Hemmes

Regis University Faculty Publications

The Internet of Things (IoT) is envisaged to be a large-scale, massively heterogeneous ecosystem of devices with varying purposes and capabilities. While architectures and frameworks have focused on functionality and performance, security is a critical aspect that must be integrated into system design. This work proposes a method of risk assessment of devices using both trust models and static capability profiles to determine the level of risk each device poses. By combining the concepts of trust and secure device fingerprinting, security mechanisms can be more efficiently allocated across networked IoT devices. Simultaneously, devices can be allowed a greater degree of ...


Towards A Framework For Certification Of Reliable Autonomous Systems, Michael Fisher, Viviana Mascardi, Kristin Yvonne Rozier, Bernd-Holger Schlingloff, Michael Winikoff, Neil Yorke-Smith 2021 University of Manchester

Towards A Framework For Certification Of Reliable Autonomous Systems, Michael Fisher, Viviana Mascardi, Kristin Yvonne Rozier, Bernd-Holger Schlingloff, Michael Winikoff, Neil Yorke-Smith

Aerospace Engineering Publications

A computational system is called autonomous if it is able to make its own decisions, or take its own actions, without human supervision or control. The capability and spread of such systems have reached the point where they are beginning to touch much of everyday life. However, regulators grapple with how to deal with autonomous systems, for example how could we certify an Unmanned Aerial System for autonomous use in civilian airspace? We here analyse what is needed in order to provide verified reliable behaviour of an autonomous system, analyse what can be done as the state-of-the-art in automated verification ...


Kennesaw State University Hpc Facilities And Resources, Tom Boyle, Ramazan Aygun 2021 Kennesaw State University

Kennesaw State University Hpc Facilities And Resources, Tom Boyle, Ramazan Aygun

Digital Commons Training Materials

The Kennesaw State University High Performance Computing (HPC) resources represent the University’s commitment to research computing. This resource contains verbiage for users of Kennesaw State University's HPC resources to include in their grants and publications.


Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin LIANG, Zheng YAN, Robert H. DENG, Qinghu ZHENG 2021 Xidian University

Investigating The Adoption Of Hybrid Encrypted Cloud Data Deduplication With Game Theory, Xueqin Liang, Zheng Yan, Robert H. Deng, Qinghu Zheng

Research Collection School Of Information Systems

Encrypted data deduplication, along with different preferences in data access control, brings the birth of hybrid encrypted cloud data deduplication (H-DEDU for short). However, whether H-DEDU can be successfully deployed in practice has not been seriously investigated. Obviously, the adoption of H-DEDU depends on whether it can bring economic benefits to all stakeholders. But existing economic models of cloud storage fail to support H-DEDU due to complicated interactions among stakeholders. In this article, we establish a formal economic model of H-DEDU by formulating the utilities of all involved stakeholders, i.e., data holders, data owners, and Cloud Storage Providers (CSPs ...


Volcanic Emissions And Atmospheric Pollution: A Study Of Nanoparticles, Erika M. Trejos, Luis F. O. Silva, James C. Hower, Eriko M. M. Flores, Carlos Mario González, Jorge E. Pachón, Beatriz H. Aristizábal 2021 Universidad Nacional de Colombia Sede Manizales, Colombia

Volcanic Emissions And Atmospheric Pollution: A Study Of Nanoparticles, Erika M. Trejos, Luis F. O. Silva, James C. Hower, Eriko M. M. Flores, Carlos Mario González, Jorge E. Pachón, Beatriz H. Aristizábal

Center for Applied Energy Research Faculty Publications

The influence of emissions of an active volcano on the composition of nanoparticles and ultrafine road dust was identified in an urban area of the Andes. Although many cities are close to active volcanoes, few studies have evaluated their influence in road dust composition. Air quality in urban areas is significantly affected by non-exhaust emissions (e.g. road dust, brake wear, tire wear), however, natural sources such as volcanoes also impact the chemical composition of the particles. In this study, elements from volcanic emissions such as Si > Al > Fe > Ca > K > Mg, and Si—Al with K were identified as ...


Modeling The Release And Spreading Of Permanganate From Aerated Slow-Release Oxidants In A Laboratory Flow Tank, Ann Kambhu, Yusong Li, Troy E. Gilmore, Steve D. Comfort 2021 University of Nebraska-Lincoln

Modeling The Release And Spreading Of Permanganate From Aerated Slow-Release Oxidants In A Laboratory Flow Tank, Ann Kambhu, Yusong Li, Troy E. Gilmore, Steve D. Comfort

Papers in Natural Resources

Aerated, slow-release oxidants are a relatively new technology for treating contaminated aquifers. A critical need for advancing this technology is developing a reliable method for predicting the radius of influence (ROI) around each drive point. In this work, we report a series of laboratory flow tank experiments and numerical modeling efforts designed to predict the release and spreading of permanganate from aerated oxidant candles (oxidant-wax composites). To mimic the design of the oxidant delivery system used in the field, a double screen was used in a series of flow tank experiments where the oxidant was placed inside the inner screen ...


Digital Commons powered by bepress