Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

183,885 Full-Text Articles 224,200 Authors 37,243,081 Downloads 387 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

183,885 full-text articles. Page 4687 of 4771.

Fy 2010 Umass Amherst Electricity Data By Building, Ezra Small 2010 University of Massachusetts - Amherst

Fy 2010 Umass Amherst Electricity Data By Building, Ezra Small

Campus Data

Each year, UMass Amherst Utilities publishes this spreadsheet which has the monthly and annual building energy consumption of each metered building on campus. Cost data and production vs. purchased electricity data are also provided.


2010 Cheaspeake Bay Bridge Tunnel Station Tide Prediction Calendars, Virginia Institute of Marine Science, David A. Evans 2010 Virginia Institute of Marine Science

2010 Cheaspeake Bay Bridge Tunnel Station Tide Prediction Calendars, Virginia Institute Of Marine Science, David A. Evans

Miscellaneous

These calendars are produced monthly using David Evans' Tidecal.


Accounting For Undesirable Outputs In Productivity Measurements: Application To The California-Oregon Drift Gillnet Fishery, Tara L. Scott 2010 College of William and Mary - Virginia Institute of Marine Science

Accounting For Undesirable Outputs In Productivity Measurements: Application To The California-Oregon Drift Gillnet Fishery, Tara L. Scott

Dissertations, Theses, and Masters Projects

Many production activities typically produce undesirable outputs, e.g., the production of the pollutant sulfur dioxide in the generation of electricity. Traditional economic metrics may overstate the efficiency and productivity of these production activities by failing to account for the undesirable outputs. These omissions can lead to conclusions that are biased against resource conservation and protection. Many fisheries capture their target species concomitantly with undesirable outputs such as bycatch of juvenile fish, marine mammals, sea birds, and sea turtles. One such fishery is the California-Oregon (CA/OR) drift gillnet fishery (DGNF), which incidentally takes protected species, such as sea turtles ...


Assessment Of Acid Sulfate Soil Materials In The Mildura Region Of The Murray-Darling Basin, Nicholas J. Ward, Richard T. Bush, Leigh A. Sullivan, Paul Cheeseman, R McGrath, Diane M. Fyfe, J Coughran, Vanessa NL Wong 2010 Southern Cross University

Assessment Of Acid Sulfate Soil Materials In The Mildura Region Of The Murray-Darling Basin, Nicholas J. Ward, Richard T. Bush, Leigh A. Sullivan, Paul Cheeseman, R Mcgrath, Diane M. Fyfe, J Coughran, Vanessa Nl Wong

Southern Cross GeoScience

No abstract provided.


Social Network Gaming Trends, Michael Gathwright 2010 University of South Florida

Social Network Gaming Trends, Michael Gathwright

Undergraduate Journal of Mathematical Modeling: One + Two

The purpose of this project was to determine how long the social network game Scratch-Offs, created by game development company Spice Rack Media, will remain financially viable. The game Scratch-Offs is a freeware game (users pay nothing for the actual software) and is funded through micro transactions (users must pay small amounts of money to play actual games). This implies a relationship between total games played and revenue earned. Using data provided by Spice Rack, we were able to develop an exponential equation that accurately depicts usage trends over time. This equation was used to determine the date Scratch-Offs will ...


Climate In The Southern Sawatch Range And Elk Mountains, Colorado, U.S.A., During The Last Glacial Maximum: Inferences Using A Simple Degree-Day Model, Keith A. Brugger 2010 University of Minnesota, Morris

Climate In The Southern Sawatch Range And Elk Mountains, Colorado, U.S.A., During The Last Glacial Maximum: Inferences Using A Simple Degree-Day Model, Keith A. Brugger

Geology Publications

Equilibrium-line altitudes (ELAs) were determined from reconstructions of 22 paleoglaciers at their extent during the local last glacial maximum (LGM) using the accumulation-area method. LGM ELAs thus derived ranged from 2980 to 3560 m and follow a statistically significant regional trend of rising ~4.5 m km-1 to the east. Two approaches using a degree-day model were used to infer LGM climate by finding plausible combinations of temperature and precipitation change that (1) would be required to lower ELAs to their mean LGM values in both the Taylor Park/eastern Elk Mountains region and western Elk Mountains, and (2 ...


Optical Control Of Ultrafast Spin -Wave Relaxation By Magnetic Anisotropy In A Ferromagnet, Kevin James Smith 2010 College of William & Mary - Arts & Sciences

Optical Control Of Ultrafast Spin -Wave Relaxation By Magnetic Anisotropy In A Ferromagnet, Kevin James Smith

Dissertations, Theses, and Masters Projects

This thesis presents an investigation of the damping of spin waves in ferromagnetic Au(3 nm)/Ni(10 nm)/MgO(001) thin films using the time-resolved Magneto-optical Kerr Effect (TR-MOKE) and ferromagnetic resonance (FMR) techniques. In the optical measurements, a 150 fs, 800 nm laser beam pulse is split into pump and probe components. The pump pulse, containing most of the beam energy, thermally excites coherent spin precession. The weaker probe pulse, time-delayed by a variable beam path, captures the magnetization dynamics via the polar MOKE effect, and oscillations are observed as a function of external field amplitude and direction ...


Comparison Of Full-Wave And Ray-Tracing Analysis Of Mode Conversion In Plasmas, Yanli Xiao 2010 College of William & Mary - Arts & Sciences

Comparison Of Full-Wave And Ray-Tracing Analysis Of Mode Conversion In Plasmas, Yanli Xiao

Dissertations, Theses, and Masters Projects

This dissertation reports on the first direct comparison between the results of ray-based and full-wave calculations for mode conversion in plasma. This study was motivated by the modular method originally developed by Ye and Kaufman to treat a magnetosonic wave crossing a cold minority-ion gyroresonance layer. We start with the cold plasma fluid model and introduce a system of evolution equations for electrons and two ion species: deuterium and hydrogen. We first study this system of equations for uniform plasma by Fourier methods, which gives the dispersion relations. We discuss how the traditional approach---which eliminates all other dynamical variables in ...


What The 2007 Tac Market Design Game Tells Us About Effective Auction Mechanisms, Jinzhong Niu, Kai Cai, Simon Parsons, Peter McBurney, Enrico Gerding 2010 CUNY Guttman Community College

What The 2007 Tac Market Design Game Tells Us About Effective Auction Mechanisms, Jinzhong Niu, Kai Cai, Simon Parsons, Peter Mcburney, Enrico Gerding

Publications and Research

This paper analyzes the entrants to the 2007 TAC Market Design Game. We present a classification of the entries to the competition, and use this classification to compare these entries. The paper also attempts to relate market dynamics to the auction rules adopted by these entries and their adaptive strategies via a set of post-tournament experiments. Based on this analysis, the paper speculates about the design of effective auction mechanisms, both in the setting of this competition and in the more general case.


Cs 771-01: Natural Language Processing Techniques, Shaojun Wang 2010 Wright State University - Main Campus

Cs 771-01: Natural Language Processing Techniques, Shaojun Wang

Computer Science & Engineering Syllabi

No abstract provided.


Trust Account Fraud And Effective Information Security Management, Sameera Mubarak 2010 University of South Australia

Trust Account Fraud And Effective Information Security Management, Sameera Mubarak

Journal of Digital Forensics, Security and Law

The integrity of lawyers’ trust accounts has come under scrutiny in the last few years. There are strong possibilities of information technology security breaches happening within the firms, either accidental or deliberate. The damage caused by these security breaches could be extreme. For example, a trust account fund in an Australian law firm was misused in a security breach in which Telstra charged A$50,000 for phone usage, mainly for ISD calls to Hong Kong. Our study involved interviewing principals of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their ...


Table Of Contents, 2010 Embry-Riddle Aeronautical University

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin 2010 Khalifa University of Science, Technology and Research (KUSTAR)

Forensic Analysis Of The Windows 7 Registry, Khawla A. Alghafli, Andrew Jones, Thomas A. Martin

Journal of Digital Forensics, Security and Law

The recovery of digital evidence of crimes from storage media is an increasingly time consuming process as the capacity of the storage media is in a state of constant growth. It is also a difficult and complex task for the forensic investigator to analyse all of the locations in the storage media. These two factors, when combined, may result in a delay in bringing a case to court. The concept of this paper is to start the initial forensic analysis of the storage media in locations that are most likely to contain digital evidence, the Windows Registry. Consequently, the forensic ...


The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies 2010 Security Research Centre, Edith Cowan University, Khalifa University of Science, Technology and Research

The 2009 Analysis Of Information Remaining On Disks Offered For Sale On The Second Hand Market, Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, Gareth Davies

Journal of Digital Forensics, Security and Law

The ever increasing use and reliance upon computers in both the public and private sector has led to enormous numbers of computers being disposed of at the end of their useful life within an organisation. As the cost of computers has dropped, their use in the home has also continued to increase. In most organisations, computers have a relatively short life and are replaced on a regular basis with the result that, if not properly cleansed of data, they are released into the public domain containing data that can be relatively up to date. This problem is exacerbated by the ...


Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma 2010 Metropolitan State University

Avoiding Sanctions At The E-Discovery Meet-And-Confer In Common Law Countries, Milton Luoma, Vicki Luoma

Journal of Digital Forensics, Security and Law

The rules of civil procedure in common law countries have been amended to better deal with the requirements of electronic discovery. One of the key changes in case management is the scheduling of a meet-and-confer session where the parties to litigation must meet early in the case before any discovery procedures have begun to exchange information regarding the nature, location, formats, and pertinent facts regarding custody and control of a party’s electronically stored information (ESI). Failure to abide by the rules and participate in good faith at the meet-and-confer session can have dire consequences for the parties and lawyers ...


Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington 2010 Murdoch University, Perth

Solid State Drives: The Beginning Of The End For Current Practice In Digital Forensic Recovery?, Graeme B. Bell, Richard Boddington

Journal of Digital Forensics, Security and Law

Digital evidence is increasingly relied upon in computer forensic examinations and legal proceedings in the modern courtroom. The primary storage technology used for digital information has remained constant over the last two decades, in the form of the magnetic disc. Consequently, investigative, forensic, and judicial procedures are well-established for magnetic disc storage devices (Carrier, 2005). However, a paradigm shift has taken place in technology storage and complex, transistor-based devices for primary storage are now increasingly common. Most people are aware of the transition from portable magnetic floppy discs to portable USB transistor flash devices, yet the transition from magnetic hard ...


Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather McCalley, Sarah Turner, Anthony Skjellum 2010 University of Alabama, Birmingham

Reeling In Big Phish With A Deep Md5 Net, Brad Wardman, Gary Warner, Heather Mccalley, Sarah Turner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Phishing continues to grow as phishers discover new exploits and attack vectors for hosting malicious content; the traditional response using takedowns and blacklists does not appear to impede phishers significantly. A handful of law enforcement projects — for example the FBI's Digital PhishNet and the Internet Crime and Complaint Center (ic3.gov) — have demonstrated that they can collect phishing data in substantial volumes, but these collections have not yet resulted in a significant decline in criminal phishing activity. In this paper, a new system is demonstrated for prioritizing investigative resources to help reduce the time and effort expended examining this ...


Assessment Of Acid Sulfate Soil Materials (Phase 2): Fivebough And Tuckerbil Swamps, Nicholas J. Ward, Richard T. Bush, Leigh A. Sullivan, J Coughran, Diane M. Fyfe 2010 Southern Cross University

Assessment Of Acid Sulfate Soil Materials (Phase 2): Fivebough And Tuckerbil Swamps, Nicholas J. Ward, Richard T. Bush, Leigh A. Sullivan, J Coughran, Diane M. Fyfe

Southern Cross GeoScience

No abstract provided.


Assessment Of Acid Sulfate Soil Materials In The Edward And Wakool Rivers Region Of The Murray-Darling Basin, Nicholas J. Ward, Richard T. Bush, Leigh A. Sullivan, Diane M. Fyfe, J Coughran, M Tulau, Belinda Allman, David Morand, Vanessa NL Wong 2010 Southern Cross University

Assessment Of Acid Sulfate Soil Materials In The Edward And Wakool Rivers Region Of The Murray-Darling Basin, Nicholas J. Ward, Richard T. Bush, Leigh A. Sullivan, Diane M. Fyfe, J Coughran, M Tulau, Belinda Allman, David Morand, Vanessa Nl Wong

Southern Cross GeoScience

No abstract provided.


Cs 242-01: Computer Programming Iii, Mateen M. Rizki 2010 Wright State University - Main Campus

Cs 242-01: Computer Programming Iii, Mateen M. Rizki

Computer Science & Engineering Syllabi

No abstract provided.


Digital Commons powered by bepress