Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

158112 Full-Text Articles 186799 Authors 24453770 Downloads 339 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

158112 full-text articles. Page 1 of 3951.

In Operando Mechanism Analysis On Nanocrystalline Silicon Anode Material For Reversible And Ultrafast Sodium Storage, Lei Zhang, Xianluo Hu, Chaoji Chen, Haipeng Guo, Xiaoxiao Liu, Gengzhao Xu, Haijian Zhong, Shuang Cheng, Peng Wu, Jiashen Meng, Yunhui Huang, Shi Xue Dou, Hua-Kun Liu 2018 University of Wollongong

In Operando Mechanism Analysis On Nanocrystalline Silicon Anode Material For Reversible And Ultrafast Sodium Storage, Lei Zhang, Xianluo Hu, Chaoji Chen, Haipeng Guo, Xiaoxiao Liu, Gengzhao Xu, Haijian Zhong, Shuang Cheng, Peng Wu, Jiashen Meng, Yunhui Huang, Shi Xue Dou, Hua-Kun Liu

Australian Institute for Innovative Materials - Papers

Presently, lithium-ion batteries (LIBs) are the most promising commercialized electrochemical energy storage systems. Unfortunately, the limited resource of Li results in increasing cost for its scalable application and a general consciousness of the need to find new type of energy storage technologies. Very recently, substantial effort has been invested to sodium-ion batteries (SIBs) due to their effectively unlimited nature of sodium resources. Furthermore, the potential of Li/Li+ is 0.3 V lower than that of Na/Na+, which makes it more effective to limit the electrolyte degradation on the outer surface of the electrode.[1] Nevertheless, one major obstacle ...


Iterative Matrix Factorization Method For Social Media Data Location Prediction, Natchanon Suaysom 2018 Harvey Mudd College

Iterative Matrix Factorization Method For Social Media Data Location Prediction, Natchanon Suaysom

HMC Senior Theses

Since some of the location of where the users posted their tweets collected by social media company have varied accuracy, and some are missing. We want to use those tweets with highest accuracy to help fill in the data of those tweets with incomplete information. To test our algorithm, we used the sets of social media data from a city, we separated them into training sets, where we know all the information, and the testing sets, where we intentionally pretend to not know the location. One prediction method that was used in (Dukler, Han and Wang, 2016) requires appending one-hot ...


Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung HUI, Seung Hyun KIM, QIU-HONG WANG 2017 Singapore Management University

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by ...


Recursive Non-Local Means Filter For Video Denoising, Redha A. Ali, Russell C. Hardie 2017 University of Dayton

Recursive Non-Local Means Filter For Video Denoising, Redha A. Ali, Russell C. Hardie

Electrical and Computer Engineering Faculty Publications

In this paper, we propose a computationally efficient algorithm for video denoising that exploits temporal and spatial redundancy. The proposed method is based on non-local means (NLM). NLM methods have been applied successfully in various image denoising applications. In the single-frame NLM method, each output pixel is formed as a weighted sum of the center pixels of neighboring patches, within a given search window.

The weights are based on the patch intensity vector distances. The process requires computing vector distances for all of the patches in the search window. Direct extension of this method from 2D to 3D, for video ...


A Weighted Möbius Function, Derek Garton 2017 Portland State University

A Weighted Möbius Function, Derek Garton

Mathematics and Statistics Faculty Publications and Presentations

Fix an odd prime ℓ and let G be the poset of isomorphism classes of finite abelian ℓ-groups, ordered by inclusion. If ξ:G→R≥0 is a discrete probability distribution on G and A ∈ G, define the Ath moment of ξ to be . The question of determining conditions that ensure ξ is completely determined by its moments has been of recent interest in many problems of Cohen–Lenstra type. Furthermore, recovering ξ from its moments requires a new Möbius-type inversion formula on G. In this paper, we define this function, relate it to the classical Möbius function ...


Investigation Into The Formation Of Information Security Influence: Network Analysis Of An Emerging Organisation, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno 2017 RMIT University

Investigation Into The Formation Of Information Security Influence: Network Analysis Of An Emerging Organisation, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno

Siddhi Pittayachawan

While prior research has been examining information security behaviours in mature environments with formal policies and practices, there is less attention paid to new or transforming environments that lack security controls. It is crucial to understand what factors affect the formation of an emerging information security environment, so that security managers can make use of the forming mechanisms to improve the security environment without relying too much on enforcement. This research adopts exponential random graph modeling to predict the occurrence of information security influence among 114 employees in a recently established construction organisation. Our empirical findings show that physically co-locating ...


Rethinking Urban Green Infrastructure As A Means To Promote Avian Conservation, Allen Lau 2017 The University of San Francisco

Rethinking Urban Green Infrastructure As A Means To Promote Avian Conservation, Allen Lau

Master's Projects and Capstones

There is an under-recognized potential for cities to use urban green infrastructure to contribute to avian biodiversity conservation. At the global scale, climate change and growing urbanization are primary global drivers leading to decline and homogenization in world bird populations. Birds are fundamental and intricate species in ecosystems, and even in urban areas, act as indicator and regulator species contributing to healthy ecosystem function. While many cities have recognized the economic and social benefits associated with green spaces, such as the vast benefits ecosystem services provide to the urban dweller, the use of green spaces to concurrently contribute to avian ...


Vertex Weighted Spectral Clustering, Mohammad Masum 2017 East Tennessee State University

Vertex Weighted Spectral Clustering, Mohammad Masum

Electronic Theses and Dissertations

Spectral clustering is often used to partition a data set into a specified number of clusters. Both the unweighted and the vertex-weighted approaches use eigenvectors of the Laplacian matrix of a graph. Our focus is on using vertex-weighted methods to refine clustering of observations. An eigenvector corresponding with the second smallest eigenvalue of the Laplacian matrix of a graph is called a Fiedler vector. Coefficients of a Fiedler vector are used to partition vertices of a given graph into two clusters. A vertex of a graph is classified as unassociated if the Fiedler coefficient of the vertex is close to ...


Synthesis And Catalytic Evaluation Of Novel C-Alpha-Methyl-Beta-Proline Analogues, And Concise Synthetic Approach To Nh-Fmoc-S-Trityl-C-Alpha-Methyl Cysteine, Hari Kiran Kotapati 2017 University of Southern Mississippi

Synthesis And Catalytic Evaluation Of Novel C-Alpha-Methyl-Beta-Proline Analogues, And Concise Synthetic Approach To Nh-Fmoc-S-Trityl-C-Alpha-Methyl Cysteine, Hari Kiran Kotapati

Dissertations

In the field of chemistry there is a growing demand for small molecule organocatalysts such as amino acids, more specifically proline and its analogues, which could catalyze various key chemical reactions in the synthesis of several biologically important molecules. Even though natural proline is reported to catalyze various chemical reactions, its use as organocatalyst is limited mainly due to the solubility issues in the reaction media and high catalyst loadings, which is not very ideal for bulk scale manufacturing. To address these limitations we planned to develop unnatural analogues of proline that could catalyze the reactions with lower catalyst loadings ...


Primes, Divisibility, And Factoring, Dominic Klyve 2017 Central Washington University

Primes, Divisibility, And Factoring, Dominic Klyve

Number Theory

No abstract provided.


Babylonian Numeration, Dominic Klyve 2017 Central Washington University

Babylonian Numeration, Dominic Klyve

Number Theory

No abstract provided.


Gaussian Integers And Dedekind's Creation Of An Ideal: A Number Theory Project, Janet Heine Barnett 2017 Colorado State University-Pueblo

Gaussian Integers And Dedekind's Creation Of An Ideal: A Number Theory Project, Janet Heine Barnett

Number Theory

No abstract provided.


Rigorous Debates Over Debatable Rigor: Monster Functions In Introductory Analysis, Janet Heine Barnett 2017 Colorado State University-Pueblo

Rigorous Debates Over Debatable Rigor: Monster Functions In Introductory Analysis, Janet Heine Barnett

Analysis

No abstract provided.


The Definite Integrals Of Cauchy And Riemann, Dave Ruch 2017 Ursinus College

The Definite Integrals Of Cauchy And Riemann, Dave Ruch

Analysis

Rigorous attempts to define the definite integral began in earnest in the early 1800's. One of the pioneers in this development was A. L. Cauchy (1789-1857). In this project, students will read from his 1823 study of the definite integral for continuous functions . Then students will read from Bernard Riemann's 1854 paper, in which he developed a more general concept of the definite integral that could be applied to functions with infinite discontinuities.


Estimating Accuracy Of Personal Identifiable Information In Integrated Data Systems, Amani "Mohammad Jum'h" Amin Shatnawi 2017 Utah State University

Estimating Accuracy Of Personal Identifiable Information In Integrated Data Systems, Amani "Mohammad Jum'h" Amin Shatnawi

All Graduate Theses and Dissertations

Without a valid assessment of accuracy there is a risk of data users coming to incorrect conclusions or making bad decision based on inaccurate data. This dissertation proposes a theoretical method for developing data-accuracy metrics specific for any given person-centric integrated system and how a data analyst can use these metrics to estimate the overall accuracy of person-centric data.

Estimating the accuracy of Personal Identifiable Information (PII) creates a corresponding need to model and formalize PII for both the real-world and electronic data, in a way that supports rigorous reasoning relative to real-world facts, expert opinions, and aggregate knowledge. This ...


Applications Of Social Network Analysis In Behavioural Information Security Research: Concepts And Empirical Analysis, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno 2017 RMIT University

Applications Of Social Network Analysis In Behavioural Information Security Research: Concepts And Empirical Analysis, Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno

Siddhi Pittayachawan

The rapid digital transformation and technological disruption in modern organisations demand the development of people-centric security workplaces, whereby the employees can build up their security awareness and accountability for their actions via participation in the organisation's social networks. The social network analysis approach offers a wide array of analytical capabilities to examine in-depth the interactions and relations within an organisation, which assists the development of such security workplaces. This paper proposes the novel and practical adoption of social network analysis methods in behavioural information security field. To this end, we discuss the core features of the social network analysis ...


Urban Spatial Pattern As Self-Organizing System: An Empirical Evaluation Of Firm Location Decisions In Cleveland–Akron Pmsa, Ohio, Mukesh Kumar, William M. Bowen, Miron Kaufman 2017 Jackson State University

Urban Spatial Pattern As Self-Organizing System: An Empirical Evaluation Of Firm Location Decisions In Cleveland–Akron Pmsa, Ohio, Mukesh Kumar, William M. Bowen, Miron Kaufman

William M. Bowen

Economic models of urban spatial patterns have largely ignored complexity as an attribute of urban systems. Complexity theorists on the other hand have not made sufficiently serious and sustained attempts to verify empirically the relevance of complex systems models for urban spatial patterns. This research bridges this gap by simulating the evolution of an urban employment pattern as a self-organizing complex system and seeking its empirical validation. It estimates the model’s parameters by using firm data aggregated to the level of municipalities in Cleveland-Akron Consolidated Metropolitan Statistical Area in Ohio. The interaction among four parameters, forces of attraction and ...


How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore 2017 University of Michigan-Flint

How Much Should We Teach The Enigma Machine?, Jeffrey A. Livermore

Journal of Cybersecurity Education, Research and Practice

Developing courses and programs in Information Assurance can feel like trying to force ten pounds of flour into a five pound sack. We want to pack more into our courses than we have time to teach. As new technologies develop, we often find it necessary to drop old technologies out of the curriculum and our students miss out on the historical impacts the old technologies had. The discipline is so broad and deep that we have to carefully choose what concepts and technologies we study in depth, what we mention in passing, and what we leave out. Leaving out important ...


Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis 3525016 2017 University of Washington Bothell

Cyber Security For Everyone: An Introductory Course For Non-Technical Majors, Marc J. Dupuis 3525016

Journal of Cybersecurity Education, Research and Practice

In this paper, we describe the need for and development of an introductory cyber security course. The course was designed for non-technical majors with the goal of increasing cyber security hygiene for an important segment of the population—college undergraduates. While the need for degree programs that focus on educating and training individuals for occupations in the ever-growing cyber security field is critically important, the need for improved cyber security hygiene from the average everyday person is of equal importance. This paper discusses the approach used, curriculum developed, results from two runs of the course, and frames the overall structure ...


Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia III, Greg Randall, Jay Snellen 2017 Jacksonville State University

Pedagogical Resources For Industrial Control Systems Security: Design, Implementation, Conveyance, And Evaluation, Guillermo A. Francia Iii, Greg Randall, Jay Snellen

Journal of Cybersecurity Education, Research and Practice

Industrial Control Systems (ICS), which are pervasive in our nation’s critical infrastructures, are becoming increasingly at risk and vulnerable to internal and external threats. It is imperative that the future workforce be educated and trained on the security of such systems. However, it is equally important that careful and deliberate considerations must be exercised in designing and implementing the educational and training activities that pertain to ICS. To that end, we designed and implemented pedagogical materials and tools to facilitate the teaching and learning processes in the area of ICS security. In this paper, we describe those resources, the ...


Digital Commons powered by bepress