Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

178,117 Full-Text Articles 217,067 Authors 37,243,081 Downloads 382 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

178,117 full-text articles. Page 3 of 4575.

Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan 2018 North Carolina A&T State University

Teaching Cybersecurity In An Undergraduate Engineering Course, Xiuli Qu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

Organizations create a huge amount of sensitive and confidential data, which must be protected from unauthorized access or disclosure. Nowadays, most organizations store their business data in digital formats. With the increasing use of digital data, data breaches are more often and serious in recent years. Therefore, it is very important for next-generation engineers to be aware of the importance of information security, and be able to recognize vulnerabilities and threats to an information system and design user-friendly and effective security measures. To achieve it, two modules of information systems security, including lectures and in-class labs, were developed and taught ...


Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh 2018 Babson College

Design Of Cybersecurity Risk Assessment Tool For Small And Medium Sized Businesses Using The Nist Cybersecurity Framework, Vishnu Venkatesh

KSU Proceedings on Cybersecurity Education, Research and Practice

Using cybersecurity risk assessment techniques, organizations can gain a holistic and prioritized view of information security objectives. However, with current methods, cybersecurity risk assessments are cost-prohibitive for small and medium sized businesses (SMB). These organizations experience increased vulnerability to adverse cyber events, are stuck in a reactive cycle and scramble to meet compliance goals.

The ongoing research seeks to create a risk assessment tool using the NIST Cybersecurity Framework in conjunction with complementary innovations to reduce the cost of a cyber risk assessment exercise for SMBs and enable the effective communication of security controls to various stakeholders in small and ...


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne 2018 NC A&T State Unversity

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two ...


Car Hacking: Can It Be That Simple?, Bryson Payne 2018 University of North Georgia

Car Hacking: Can It Be That Simple?, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

The Internet of Things (IoT) has expanded the reach of technology at work, at home, and even on the road. As Internet-connected and self-driving cars become more commonplace on our highways, the cybersecurity of these “data centers on wheels” is of greater concern than ever. Highly publicized hacks against production cars, and a relatively small number of crashes involving autonomous vehicles, have brought the issue of securing smart cars to the forefront as a matter of public and individual safety. This article describes the integration of a module on car hacking into a semester-long ethical hacking cybersecurity course, including full ...


Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy 2018 Nova Southeastern University

Towards An Empirical Assessment Of Cybersecurity Readiness And Resilience In Small Businesses, Darrell Eilts, Yair Levy

KSU Proceedings on Cybersecurity Education, Research and Practice

Many small businesses struggle to improve their cybersecurity posture despite the risk to their business. Small businesses lacking adequate protection from cyber threats, or a business continuity strategy to recover from disruptions, have a very high risk of loss due to a cyberattack. These cyberattacks, either deliberate or unintentional, can become costly when a small business is not prepared. This developmental research is focused on the relationship between two constructs that are associated with readiness and resilience of small businesses based on their cybersecurity planning, implementation, as well as response activities. A Cybersecurity Preparedness-Risk Taxonomy (CyPRisT) is proposed using the ...


Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr. 2018 Oklahoma State University - Main Campus

Work Overload And Insiders’ Risk Taking Behaviors As Threats To Cybersecurity, Forough Nasirpouri Shadbad, David Biros Dr.

KSU Proceedings on Cybersecurity Education, Research and Practice

Increasing the number of security breaches caused by humans, scholars are interested in exploring contributed factors of information security threats. There are several studies regarding security violations by malicious insiders and intentional behaviors; however, studies which focus on important factors and antecedents of human’s unintentional misbehaviors are rare. To this end, we aim to investigate human traits which lead to unintentional information security misbehaviors. Particularly, we study individual’s risk-taking behavior by applying Dual System Theory (DST). We have developed a theoretical model to find how individuals’ risk-taking behavior relates to online information security misbehaviors. Our hypothesized model consists ...


Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan 2018 North Carolina A&T State University

Evaluating Two Hands-On Tools For Teaching Local Area Network Vulnerabilities, Ariana Brown, Jinsheng Xu, Xiaohong Yuan

KSU Proceedings on Cybersecurity Education, Research and Practice

According to the Verizon’s Data Breach Investigations Report, Local Area Network (LAN) access is the top vector for insider threats and misuses. It is critical for students to learn these vulnerabilities, understand the mechanisms of exploits, and know the countermeasures. The department of Computer Science at North Carolina A&T State University designed two different educational tools that help students learn ARP Spoofing Attacks, which is the most popular attack on LAN. The first tool, called Hacker’s Graphical User Interface (HGUI), is a visualization tool that demonstrates ARP Spoofing Attack with real time animation. The second tool is ...


Analysis Of Covariance (Ancova) In Randomized Trials: More Precision, Less Conditional Bias, And Valid Confidence Intervals, Without Model Assumptions, Bingkai Wang, Elizabeth Ogburn, Michael Rosenblum 2018 Department of Biostatistics, Johns Hopkins University

Analysis Of Covariance (Ancova) In Randomized Trials: More Precision, Less Conditional Bias, And Valid Confidence Intervals, Without Model Assumptions, Bingkai Wang, Elizabeth Ogburn, Michael Rosenblum

Johns Hopkins University, Dept. of Biostatistics Working Papers

Covariate adjustment" in the randomized trial context refers to an estimator of the average treatment effect that adjusts for chance imbalances between study arms in baseline variables (called “covariates"). The baseline variables could include, e.g., age, sex, disease severity, and biomarkers. According to two surveys of clinical trial reports, there is confusion about the statistical properties of covariate adjustment. We focus on the ANCOVA estimator, which involves fitting a linear model for the outcome given the treatment arm and baseline variables, and trials with equal probability of assignment to treatment and control. We prove the following new (to the ...


Big Oil And Climate Change Denial, David Schelhaas 2018 Dordt College

Big Oil And Climate Change Denial, David Schelhaas

Faculty Work Comprehensive List

"One of the Alliance’s most basic commitments is to free market economic development fueled by coal and oil that will, as they see it, lift the poor out of poverty."

Posting about the philosophy of the Cornwall Alliance for the Stewardship of Creation from In All Things - an online journal for critical reflection on faith, culture, art, and every ordinary-yet-graced square inch of God’s creation.

https://inallthings.org/big-oil-and-climate-change-denial/


A Near-Infrared Fluorescent Probe Based On A Fret Rhodamine Donor Linked To A Cyanine Acceptor For Sensitive Detection Of Intracellular Ph Alternations, Yibin Zhang, Jianheng Bi, Shuai Xia, Wafa Mazi, Shulin Wan, Logan Mikesell, Rudy Luck, Haiying Liu 2018 Michigan Technological University

A Near-Infrared Fluorescent Probe Based On A Fret Rhodamine Donor Linked To A Cyanine Acceptor For Sensitive Detection Of Intracellular Ph Alternations, Yibin Zhang, Jianheng Bi, Shuai Xia, Wafa Mazi, Shulin Wan, Logan Mikesell, Rudy Luck, Haiying Liu

Department of Chemistry Publications

A fluorescence resonance energy transfer (FRET)-based near-infrared fluorescent probe (B+) for double-checked sensitive detection of intracellular pH changes has been synthesized by binding a near-infrared rhodamine donor to a near-infrared cyanine acceptor through robust C-N bonds via a nucleophilic substitution reaction. To demonstrate the double-checked advantages of probe B+, a near-infrared probe (A) was also prepared by modification of a near-infrared rhodamine dye with ethylenediamine to produce a closed spirolactam residue. Under basic conditions, probe B+ shows only weak fluorescence from the cyanine acceptor while probe A displays nonfluorescence due to retention of the closed spirolactam form of the ...


Group-Lasso Estimation In High-Dimensional Factor Models With Structural Breaks, Yujie Song 2018 University of Windsor

Group-Lasso Estimation In High-Dimensional Factor Models With Structural Breaks, Yujie Song

Major Papers

In this major paper, we study the influence of structural breaks in the financial market model with high-dimensional data. We present a model which is capable of detecting changes in factor loadings, determining the number of factors and detecting the break date. We consider the case where the break date is both known and unknown and identify the type of instability. For the unknown break date case, we propose a group-LASSO estimator to determine the number of pre- and post-break factors, the break date and the existence of instability of factor loadings when the number of factor is constant. We ...


Estimation In High-Dimensional Factor Models With Structural Instabilities, Wen Gao 2018 University of Windsor

Estimation In High-Dimensional Factor Models With Structural Instabilities, Wen Gao

Major Papers

In this major paper, we use high-dimensional models to analyze macroeconomic data which is in influenced by the break point. In particular, we consider to detect the break point and study the changes of the number of factors and the factor loadings with the structural instability.

Concretely, we propose two factor models which explain the processes of pre- and post- break periods. Then, we consider the break point as known or unknown. In both situations, we derive the shrinkage estimators by minimizing the penalized least square function and calculate the estimators of the numbers of pre- and post- break factors ...


Not Masters But Stewards Of The Earth, David Schelhaas 2018 Dordt College

Not Masters But Stewards Of The Earth, David Schelhaas

Faculty Work Comprehensive List

"We are not servants of the earth but of the creator and Master of the earth, God."

Posting about the beliefs of the ­­­­­­­­Cornwall Alliance for the Stewardship of Creation from In All Things - an online journal for critical reflection on faith, culture, art, and every ordinary-yet-graced square inch of God’s creation.

https://inallthings.org/not-masters-but-stewards-of-the-earth/


Seared And Bleared, Smudged And Smelly, David Schelhaas 2018 Dordt College

Seared And Bleared, Smudged And Smelly, David Schelhaas

Faculty Work Comprehensive List

"Most evangelicals oppose the very idea of climate change and are trying to inoculate their children so that they do not catch the 'climate concern' disease."

Posting about ­­­­­­­­why some Christians are climate change deniers from In All Things - an online journal for critical reflection on faith, culture, art, and every ordinary-yet-graced square inch of God’s creation.

https://inallthings.org/seared-and-bleared-smudged-and-smelly/


A Sub-Millennial Sediment Record Of Ice-Stream Retreat And Meltwater Storage In The Baltic Ice Lake During The Bølling-Allerød Interstadial, April Lynn Kelly, Sandra Passchier 2018 Montclair State University

A Sub-Millennial Sediment Record Of Ice-Stream Retreat And Meltwater Storage In The Baltic Ice Lake During The Bølling-Allerød Interstadial, April Lynn Kelly, Sandra Passchier

Department of Earth and Environmental Studies Faculty Scholarship and Creative Works

The rapid retreat of the Baltic Ice Stream and the development of the Baltic Ice Lake is assessed using data from sediment cores retrieved from three sub-basins in the southern Baltic Sea. Hydraulic piston coring by the International Ocean Discovery Program (IODP) recovered for the first time intact glacial lake sequences overlying diamictons and other ice-contact deposits at Sites M0063, M0064 and M0065. Based on the particle size and bulk sediment chemical composition the glacial lake sediments were subdivided into a proximal and a distal varve sequence. The origin of a dark, lithologically distinct horizon between the proximal and distal ...


Photocatalytic Activity: Experimental Features To Report In Heterogeneous Photocatalysis, Md. Ariful Hoque, Marcelo I. Guzman 2018 University of Kentucky

Photocatalytic Activity: Experimental Features To Report In Heterogeneous Photocatalysis, Md. Ariful Hoque, Marcelo I. Guzman

Chemistry Faculty Publications

Heterogeneous photocatalysis is a prominent area of research with major applications in solar energy conversion, air pollution mitigation, and removal of contaminants from water. A large number of scientific papers related to the photocatalysis field and its environmental applications are published in different journals specializing in materials and nanomaterials. However, many problems exist in the conception of papers by authors unfamiliar with standard characterization methods of photocatalysts as well as with the procedures needed to determine photocatalytic activities based on the determination of “apparent quantum efficiencies” within a wavelength interval or “apparent quantum yields” in the case of using monochromatic ...


Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das 2018 Louisiana State University and Agricultural and Mechanical College

Bipartite Quantum Interactions: Entangling And Information Processing Abilities, Siddhartha Das

LSU Doctoral Dissertations

The aim of this thesis is to advance the theory behind quantum information processing tasks, by deriving fundamental limits on bipartite quantum interactions and dynamics. A bipartite quantum interaction corresponds to an underlying Hamiltonian that governs the physical transformation of a two-body open quantum system. Under such an interaction, the physical transformation of a bipartite quantum system is considered in the presence of a bath, which may be inaccessible to an observer. The goal is to determine entangling abilities of such arbitrary bipartite quantum interactions. Doing so provides fundamental limitations on information processing tasks, including entanglement distillation and secret key ...


Dhital_Pnas.Pdf, Chetan Dhital 2018 Selected Works

Dhital_Pnas.Pdf, Chetan Dhital

Chetan Dhital

No abstract provided.


Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin 2018 Syracuse University

Liboblivious: A C++ Library For Oblivious Data Structures And Algorithms, Scott D. Constable, Steve Chapin

Electrical Engineering and Computer Science Technical Reports

Infrastructure as a service (IaaS) is an enormously beneficial model for centralized data computation and storage. Yet, existing network-layer and hardware-layer security protections do not address a broad category of vulnerabilities known as side-channel attacks. Over the past several years, numerous techniques have been proposed at all layers of the software/hardware stack to prevent the inadvertent leakage of sensitive data. This report discusses a new technique which integrates seamlessly with C++ programs. We introduce a library, libOblivious, which provides thin wrappers around existing C++ standard template library classes, endowing them with the property of memory-trace obliviousness.


On Projection Of A Positive Definite Matrix On A Cone Of Nonnegative Definite Toeplitz Matrices, Katarzyna Filipiak, Augustyn Markiewicz, Adam Mieldzioc, Aneta Sawikowska 2018 Poznań University Of Technology

On Projection Of A Positive Definite Matrix On A Cone Of Nonnegative Definite Toeplitz Matrices, Katarzyna Filipiak, Augustyn Markiewicz, Adam Mieldzioc, Aneta Sawikowska

Electronic Journal of Linear Algebra

We consider approximation of a given positive definite matrix by nonnegative definite banded Toeplitz matrices. We show that the projection on linear space of Toeplitz matrices does not always preserve nonnegative definiteness. Therefore we characterize a convex cone of nonnegative definite banded Toeplitz matrices which depends on the matrix dimensions, and we show that the condition of positive definiteness given by Parter [{\em Numer. Math. 4}, 293--295, 1962] characterizes the asymptotic cone. In this paper we give methodology and numerical algorithm of the projection basing on the properties of a cone of nonnegative definite Toeplitz matrices. This problem can be ...


Digital Commons powered by bepress