Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

165435 Full-Text Articles 196209 Authors 36320661 Downloads 356 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

165435 full-text articles. Page 3628 of 4196.

Performance Evaluation Of A Novel Asymmetric Capacitor Using A Light-Weight, Carbon Foam Supported Nickel Electrode, Padmanaban Sasthan Kuttipillai 2011 Michigan Technological University

Performance Evaluation Of A Novel Asymmetric Capacitor Using A Light-Weight, Carbon Foam Supported Nickel Electrode, Padmanaban Sasthan Kuttipillai

Dissertations, Master's Theses and Master's Reports - Open

Electrochemical capacitors have been an important development in recent years in the field of energy storage. Capacitors can be developed by utilizing either double layer capacitance at the electrode/solution interfaces alone or in combination with a battery electrode associated with a faradic redox process in one electrode. An asymmetric capacitor consisting of electrochemically deposited nickel hydroxide, supported on carbon foam as a positive electrode and carbon sheet as a negative electrode has been successfully assembled and cycled. One objective of this study has been to demonstrate the viability of the nickel carbon foam positive electrode, especially in terms of ...


Applications Of Finite Geometries To Designs And Codes, David C. Clark 2011 Michigan Technological University

Applications Of Finite Geometries To Designs And Codes, David C. Clark

Dissertations, Master's Theses and Master's Reports - Open

This dissertation concerns the intersection of three areas of discrete mathematics: finite geometries, design theory, and coding theory. The central theme is the power of finite geometry designs, which are constructed from the points and t-dimensional subspaces of a projective or affine geometry. We use these designs to construct and analyze combinatorial objects which inherit their best properties from these geometric structures.

A central question in the study of finite geometry designs is Hamada’s conjecture, which proposes that finite geometry designs are the unique designs with minimum p-rank among all designs with the same parameters. In this dissertation, we ...


Fixed Block Configuration Gdds With Block Size 6 And (3, R)-Regular Graphs , Melanie R. Laffin 2011 Michigan Technological University

Fixed Block Configuration Gdds With Block Size 6 And (3, R)-Regular Graphs , Melanie R. Laffin

Dissertations, Master's Theses and Master's Reports - Open

Chapter 1 is used to introduce the basic tools and mechanics used within this thesis. Most of the definitions used in the thesis will be defined, and we provide a basic survey of topics in graph theory and design theory pertinent to the topics studied in this thesis.

In Chapter 2, we are concerned with the study of fixed block configuration group divisible designs, GDD(n; m; k; λ1; λ2). We study those GDDs in which each block has configuration (s; t), that is, GDDs in which each block has exactly s points from one of the two ...


Structural Characterization Of Water-Soluble Atmospheric Organic Matter By Ultrahigh-Resolution Mass Spectrometry, Jeffrey P. LeClair 2011 Michigan Technological University

Structural Characterization Of Water-Soluble Atmospheric Organic Matter By Ultrahigh-Resolution Mass Spectrometry, Jeffrey P. Leclair

Dissertations, Master's Theses and Master's Reports - Open

Isolated water-soluble analytes extracted from fog water collected during a radiation fog event near Fresno, CA were analyzed using collision induced dissociation and ultrahigh-resolution mass spectrometry. Tandem mass analysis was performed on scan ranges between 100-400 u to characterize the structures of nitrogen and/or sulfur containing species. CHNO, CHOS, and CHNOS compounds were targeted specifically because of the high number of oxygen atoms contained in their molecular formulas. The presence of 22 neutral losses corresponding to fragment ions was evaluated for each of the 1308 precursors. Priority neutral losses represent specific polar functional groups (H2O, CO2, CH3OH, HNO3, SO3 ...


Synthesis Of Chiral Ferrosalen Ligands And Their Applications In Asymmetric Catalysis, Xiang Zhang 2011 Michigan Technological University

Synthesis Of Chiral Ferrosalen Ligands And Their Applications In Asymmetric Catalysis, Xiang Zhang

Dissertations, Master's Theses and Master's Reports - Open

A new series of chiral ferrosalen ligands was designed and synthesized. The special feature of the ferrosalen ligands is that the chirality originated from the planar chiral ferrocenyl structure. For most known salen ligands, chirality comes from central and axial chiral centers. The key building block for the construction of these ferrosalen ligands was synthesized stereoselectively by a chiral auxiliary approach. This approach does not consume any chiral material, and does not require chiral HPLC resolution. Using this method, nine ligands were prepared using ferrocene as the starting material. In addition, the steric hindrance was modulated by changing the cyclopentadienyl ...


Structure Evolution Of Gold Cluster Anions Between The Planar And Cage Structures By Isoelectronic Substitution: AuN− (N = 13–15) And MauN− (N = 12–14; M = Ag, Cu), Rhitankar Pal, Lei-Ming Wang, Wei Huang, Lai-Sheng Wang, Xiao Cheng Zeng 2011 University of Nebraska - Lincoln

Structure Evolution Of Gold Cluster Anions Between The Planar And Cage Structures By Isoelectronic Substitution: AuN− (N = 13–15) And MauN− (N = 12–14; M = Ag, Cu), Rhitankar Pal, Lei-Ming Wang, Wei Huang, Lai-Sheng Wang, Xiao Cheng Zeng

Xiao Cheng Zeng Publications

The structural and electronic effects of isoelectronic substitution by Ag and Cu atoms on gold cluster anions in the size range between 13 and 15 atoms are studied using a combination of photoelectron spectroscopy and first-principles density functional calculations. The most stable structures of the doped clusters are compared with those of the undoped Au clusters in the same size range. The joint experimental and theoretical study reveals a new C3v symmetric isomer for Au13 , which is present in the experiment, but has hitherto not been recognized. The global minima of Au14 and Au15 are resolved ...


Residential Solar Energy In The Valley: A Feasibility Assessment And Carbon Mitigation, Deanna Leigh Zimmerman 2011 James Madison University

Residential Solar Energy In The Valley: A Feasibility Assessment And Carbon Mitigation, Deanna Leigh Zimmerman

Masters Theses

This project explores whether the Shenandoah Valley can achieve its 25x’25 goals in the residential sector using the two most feasible solar energy technologies, solar photovoltaic electric power production and solar thermal hot water generation. After a review of the barriers to the adoption of solar energy in households, the potential rates of adoption and energy output are estimated using U.S. Census data and Department of Energy data. Multiple scenarios are explored, including the “maximum theoretical” contribution of solar energy to the residential sector as well as scenarios of household behavior under different constraints. With respect to solar ...


Initiation Of A Framework For Closed-Loop, Integrated Design And Planning For The Simplest Of Building Types, Vernacular Stuctures, Vedad Hasanovic 2011 James Madison University

Initiation Of A Framework For Closed-Loop, Integrated Design And Planning For The Simplest Of Building Types, Vernacular Stuctures, Vedad Hasanovic

Masters Theses

The purpose of this review is to promote a framework for the diversification of the built environment, where adequate human shelter can be more readily available. Shelter will be required as the effects of climate change impact more people around the world. The commonalities that are shared among these structures worldwide give reason, as to their importance, and as humans begin to familiarize themselves with descent culture; models for sustainable living that are found in nature. (Holmgren, 2002) Vernacular structures prove that it is possible to build safe, dependable and cost-effective shelter without negatively impacting the surrounding environment. These structures ...


Technology Assessment Of Hydrokinetic Energy: Run-Of-River And In-Stream Tidal Systems, Andréa René Badger 2011 James Madison University

Technology Assessment Of Hydrokinetic Energy: Run-Of-River And In-Stream Tidal Systems, Andréa René Badger

Masters Theses

This is an assessment of the emerging technology of hydrokinetic energy, specifically for current-based systems in rivers, streams or canals. The over reliance on fossil fuels for our power and energy needs is not only environmentally detrimental, but also unsustainable. By exploring means of electric power that emerge from existing technology, society can become less dependent upon non-renewable resources and move towards self-sustaining practices. I will begin with a US electricity overview, and then transition into a discussion about hydropower and its shift to hydrokinetic energy technology. After comparing both turbine and non-turbine hydrokinetic energy systems, the thesis then delves ...


Impediment Sensitive - Role Based Access Control, Joseph Frederick Blumberg 2011 James Madison University

Impediment Sensitive - Role Based Access Control, Joseph Frederick Blumberg

Masters Theses

This paper introduces a variation to the Role Based Access Control (RBAC) model called Impediment Sensitive RBAC (IS-RBAC) to be used for implantable and closely-worn medical devices. The IS-RBAC represents impediments including instrument failures, user failures, and environmental situations. IS-RBAC accommodates the impacts that the three types of impediments convey on two foundation set definitions, namely, the data set and the set of user role assignments. With these new definitions, IS-RBAC model strengthens the weaknesses caused to the protection of data from user and instrument failures and environmental situations, mitigates threats from users with elevated user role privileges, and ultimately ...


Small Wind Industry, Stakeholder, And Site Analysis In Support Of The Small Wind Training And Testing Facility At James Madison University, Curt Louis Dvonch 2011 James Madison University

Small Wind Industry, Stakeholder, And Site Analysis In Support Of The Small Wind Training And Testing Facility At James Madison University, Curt Louis Dvonch

Masters Theses

This work is in support of the development of the Small Wind Training and Testing Facility at James Madison University. The facility is intended to provide small wind training and testing capabilities that are tailored to the needs of small wind energy stakeholders in the Commonwealth of Virginia and across the greater mid-Atlantic Region of the United States. This work focuses on the development of testing capabilities by analyzing the state of the small wind industry in the region, by surveying a sample of small wind stakeholders in the region, and by tailoring the development of the facility to meet ...


Clinical And Immunomodulating Effects Of Ketamine In Horses With Experimental Endotoxemia, Cody J. Alcott, Brett A. Sponseller, David M. Wong, J. L. Davis, A. M. Soliman, Chong Wang, Walter H. Hsu 2011 Iowa State University

Clinical And Immunomodulating Effects Of Ketamine In Horses With Experimental Endotoxemia, Cody J. Alcott, Brett A. Sponseller, David M. Wong, J. L. Davis, A. M. Soliman, Chong Wang, Walter H. Hsu

Veterinary Diagnostic and Production Animal Medicine Publications

Background:  Ketamine has immunomodulating effects both in vitro and in vivo during experimental endotoxemia in humans, rodents, and dogs.

Hypothesis:  Subanesthetic doses of ketamine will attenuate the clinical and immunologic responses to experimental endotoxemia in horses.

Animals:  Nineteen healthy mares of various breeds.

Methods:  Experimental study. Horses were randomized into 2 groups: ketamine-treated horses (KET; n = 9) and saline-treated horses (SAL; n = 10). Both groups received 30 ng/kg of lipopolysaccharide (LPS, Escherichia coli, O55:B5) 1 hour after the start of a continuous rate infusion (CRI) of racemic ketamine (KET) or physiologic saline (SAL). Clinical and hematological responses were ...


Effects Of Industrial Polystyrene Foam Insulation Pads On The Center Of Pressure And Load Distribution In The Forefeet Of Clinically Normal Horses, Jennifer A. Schleining, Scott R. McClure, Timothy R. Derrick, Chong Wang 2011 Iowa State University

Effects Of Industrial Polystyrene Foam Insulation Pads On The Center Of Pressure And Load Distribution In The Forefeet Of Clinically Normal Horses, Jennifer A. Schleining, Scott R. Mcclure, Timothy R. Derrick, Chong Wang

Veterinary Diagnostic and Production Animal Medicine Publications

Objective—To evaluate the ability of industrial polystyrene foam insulation pads to redistribute loads placed on clinically normal weight-bearing structures of the foot and shift the location of the center of pressure palmarly in horses.

Animals—25 nonlame mature horses.

Procedures—Both forefeet from each horse were evaluated. Center of pressure data and solar load distribution patterns were recorded during a 5-second trial by use of a commercial pressure measurement system prior to placement of foam sole support and at 0, 6, 12, 24, and 48 hours after placement. Total contact surface area, contact pressure, peak contact pressure, and center ...


Column: Putting The Science In Digital Forensics, Fred Cohen 2011 California Sciences Institute, Fred Cohen & Associates

Column: Putting The Science In Digital Forensics, Fred Cohen

Journal of Digital Forensics, Security and Law

In a recent study, digital forensics was found to lack a consensus around even the most basis notions and terminology of the field. To quote: “These two preliminary studies individually suggest that (1) scientific consensus in the area of digital forensic evidence examination is lacking in the broad sense, but that different groups within that overall community may have limited consensus around areas in which they have special expertise, and (2) that the current peerreviewed publication process is not acting to bring about the sorts of elements typically found in the advancement of a science toward such a consensus. ... perhaps ...


Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore 2011 University of South Australia, Australia

Extraction Of Electronic Evidence From Voip: Forensic Analysis Of A Virtual Hard Disk Vs Ram, David Irwin, Jill Slay, Arek Dadej, Malcolm Shore

Journal of Digital Forensics, Security and Law

The popularity of Voice over the Internet Protocol (VoIP) is increasing as the cost savings and ease of use is realised by a wide range of home and corporate users. However, the technology is also attractive to criminals. This is because VoIP is a global telephony service, in which it is difficult to verify the user’s identification. The security of placing such calls may also be appealing to criminals, as many implementations use strong encryption to secure both the voice payload as well as to control messages making monitoring such VoIP calls difficult since conventional methods such as wire-tapping ...


A Case Study In Forensic Analysis Of Control, Fred Cohen 2011 California Sciences Institute, Fred Cohen & Associates

A Case Study In Forensic Analysis Of Control, Fred Cohen

Journal of Digital Forensics, Security and Law

This paper describes a case study in which a method for forensic analysis of control was applied to resolve probative technical issues in a legal action. It describes one instance in which the analysis was successfully applied without challenge, addresses the details of most of the different facets of the analysis method, and demonstrates how such analysis provides a systematic approach to using technical methods to address legal issues as a case study.


Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler 2011 Gary Kessler Associates

Judges’ Awareness, Understanding, And Application Of Digital Evidence, Gary C. Kessler

Journal of Digital Forensics, Security and Law

As digital evidence grows in both volume and importance in criminal and civil courts, judges need to fairly and justly evaluate the merits of the offered evidence. To do so, judges need a general understanding of the underlying technologies and applications from which digital evidence is derived. Due to the relative newness of the computer forensics field, there have been few studies on the use of digital forensic evidence and none about judges’ relationship with digital evidence. This paper describes a recent study, using grounded theory methods, into judges’ awareness, knowledge, and perceptions of digital evidence. This study is the ...


Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte 2011 LuciData Inc, Minneapolis

Book Review: Ios Forensic Analysis: For Iphone, Ipad And Ipod Touch, Christopher Schulte

Journal of Digital Forensics, Security and Law

As Digital Forensics practitioners, we know that our discipline is constantly evolving. Keeping abreast means we need to continually refine and broaden our knowledge pools through experience, education, research, peer exchange, and more. Mobile device forensics can be especially dynamic and challenging. With multiple standards in place at the hardware, operating system, and user interface levels, it can be daunting to preserve, analyze, search and report on these tiny yet ubiquitous hand-held computers. Apple Computer’s line of mobile products (iOS devices - iPhone, iPad, iPod Touch) is no exception to this rule.


Technology Corner: Internet Packet Sniffers, Nick V. Flor, Kenneth Guillory 2011 University of New Mexico

Technology Corner: Internet Packet Sniffers, Nick V. Flor, Kenneth Guillory

Journal of Digital Forensics, Security and Law

The best way to understand an internet packet sniffer, hereafter “packet sniffer”, is by analogy with a wiretap. A wiretap is a piece of hardware that allows a person to eavesdrop on phone conversations over a telephone network. Similarly, a packet sniffer is a piece of software that allows a person to eavesdrop on computer communications over the internet. A packet sniffer can be used as a diagnostic tool by network administrators or as a spying tool by hackers who can use it to steal passwords and other private information from computer users. Whether you are a network administrator or ...


Kindle Forensics: Acquisition & Analysis, Peter Hannay 2011 School of Computer and Security Science

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Journal of Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.


Digital Commons powered by bepress