Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

198,453 Full-Text Articles 240,713 Authors 47,230,550 Downloads 394 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

198,453 full-text articles. Page 5326 of 5348.

Structural And Magnetic Characteristics Of Gd5gaxsi4−X, Hui Wang, Sumohan Misra, Fei Wang, Gordon J. Miller 2010 Iowa State University

Structural And Magnetic Characteristics Of Gd5gaxsi4−X, Hui Wang, Sumohan Misra, Fei Wang, Gordon J. Miller

Chemistry Publications

A crystallographic study and theoretical analysis of the Si/Ga site preferences in the Gd5GaxSi4−x series is presented. Gd5GaxSi4−x adopt the orthorhombic Gd5Si4-type structure (space group Pnma, Z = 4) with a maximum Ga content near x = 1.00, as determined by single crystal and powder X-ray diffraction. Refinements from single crystal X-ray diffraction studies of the three independent sites for Si/Ga atoms in the asymmetric unit (interslab T1, intraslab T2 and T3) reveal partial mixing of these elements, with a clear preference for ...


Controlling Magnetism Of A Complex Metallic System Using Atomic Individualism, Yaroslav Mudryk, Durga Paudyal, Vitalij K. Pecharsky, Karl A. Gschneidner Jr., Sumohan Misra, Gordon J. Miller 2010 Iowa State University

Controlling Magnetism Of A Complex Metallic System Using Atomic Individualism, Yaroslav Mudryk, Durga Paudyal, Vitalij K. Pecharsky, Karl A. Gschneidner Jr., Sumohan Misra, Gordon J. Miller

Chemistry Publications

When the complexity of a metallic compound reaches a certain level, a specific location in the structure may be critically responsible for a given fundamental property of a material while other locations may not play as much of a role in determining such a property. The first-principles theory has pinpointed a critical location in the framework of a complex intermetallic compound—Gd5Ge4—that resulted in a controlled alteration of the magnetism of this compound using precise chemical tools.


Rhombohedrally Distorted Γ-Brasses Cr1−Xfexga, Hyujin Ko, Olivier Gourdon, Delphine Gout, Eun-Deok Mun, Srinivasa Thimmaiah, Gordon J. Miller 2010 Iowa State University

Rhombohedrally Distorted Γ-Brasses Cr1−Xfexga, Hyujin Ko, Olivier Gourdon, Delphine Gout, Eun-Deok Mun, Srinivasa Thimmaiah, Gordon J. Miller

Chemistry Publications

A series of rhombohedrally distorted γ-brass structures containing a mixture of magnetically active 3d elements, Cr and Fe, Cr1−xFexGa, is investigated crystallographically. These structures consist of chains of trans-face-sharing Ga-centered transition metal icosahedra. Neutron powder diffraction specifically on Cr0.5Fe0.5Ga, which could be prepared as a single phase material, gave lattice constants (11 K) a = 12.5172(2) Å and c = 7.8325(2) Å and a refined composition of Cr0.502(6)Fe0.498Ga = Cr6.523Fe6.477Ga13 and revealed partial ordering ...


10,12-Dimethylpteridino[6,7-F][1,10]- Phenanthroline-11,13(10h,12h)-Dione– Chloroform (1/1), Waynie Olaprath, Jennifer Rodin, Kraig A. Wheeler, Mark E. McGuire 2010 Eastern Illinois University

10,12-Dimethylpteridino[6,7-F][1,10]- Phenanthroline-11,13(10h,12h)-Dione– Chloroform (1/1), Waynie Olaprath, Jennifer Rodin, Kraig A. Wheeler, Mark E. Mcguire

Kraig A. Wheeler

In the title co-crystal, C18H12N6O2_CHCl3, intramolecular Cl3C—H_ _ _N hydrogen-bonding interactions occur between a single CHCl3 and both N atoms at the 1,10-positions on the phenanthroline portion of the molecule. The interplanar distance between inversion-related molecules is 3.241 (2) A ° .


M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk 2010 Old Dominion University

M&S Body Of Knowledge: Progress Report And Look Ahead, Andreas Tolk

Computational Modeling and Simulation Engineering Faculty Publications

No abstract provided.


A New Technique For Firn Grain-Size Measurement Using Sem Image Analysis, N.E. Spaulding, D.A. Meese, I. Baker, P.A. Mayewski 2010 University of Maine

A New Technique For Firn Grain-Size Measurement Using Sem Image Analysis, N.E. Spaulding, D.A. Meese, I. Baker, P.A. Mayewski

Open Dartmouth: Faculty Open Access Scholarship

Firn microstructure is accurately characterized using images obtained from scanning electron microscopy (SEM). Visibly etched grain boundaries within images are used to create a skeleton outline of the microstructure. A pixel-counting utility is applied to the outline to determine grain area. Firn grain sizes calculated using the technique described here are compared to those calculated using the techniques of Gow (1969) and Gay and Weiss (1999) on samples of the same material, and are found to be substantially smaller. The differences in grain size between the techniques are attributed to sampling deficiencies (e.g. the inclusion of pore filler in ...


The Analysis Of Cyanide And Its Breakdown Products In Biological Samples, Brian A. Logue, Diane M. Hinkens, Steven I. Baskin, Gary A. Rockwood 2010 South Dakota State University

The Analysis Of Cyanide And Its Breakdown Products In Biological Samples, Brian A. Logue, Diane M. Hinkens, Steven I. Baskin, Gary A. Rockwood

Chemistry and Biochemistry Faculty Publications

Cyanide is a toxic chemical that may be introduced into living organisms as a result of natural processes and/or anthropogenic uses (legal or illicit). Exposure to cyanide can be verified by analysis of cyanide or one of its breakdown products from biological samples. This verification may be important for medical, law-enforcement, military, forensic, research, or veterinary purposes. This review will discuss current bioanalytical techniques used for the verification of cyanide exposure, identify common problems associated with the analysis of cyanide and its biological breakdown products, and briefly address the metabolism and toxicokinetics of cyanide and its breakdown products in ...


Protected Areas And Climate Change In Canada: Challenges And Opportunities For Adaptation, Christopher J. Lemieux, Thomas J. Beechey, Daniel J. Scott, Paul A. Gray 2010 Wilfrid Laurier University

Protected Areas And Climate Change In Canada: Challenges And Opportunities For Adaptation, Christopher J. Lemieux, Thomas J. Beechey, Daniel J. Scott, Paul A. Gray

Geography and Environmental Studies Faculty Publications

No abstract provided.


Arabic For Designers By Mourad Boutros, Saad D. Abulhab 2010 CUNY Office of Library Services

Arabic For Designers By Mourad Boutros, Saad D. Abulhab

Publications and Research

No abstract provided.


Dynamic Path Bifurcation For The Beckmann Reaction: Observation And Implication, H. Yamataka, M. Sato, H. Hasegawa, Salai Cheettu Ammal 2010 University of South Carolina - Columbia

Dynamic Path Bifurcation For The Beckmann Reaction: Observation And Implication, H. Yamataka, M. Sato, H. Hasegawa, Salai Cheettu Ammal

Faculty Publications

The reaction of oximes to amides, known as the Beckmann rearrangement, may undergo fragmentation to form carbocations + nitriles instead of amides when the cations have reasonable stability. The reactions of oxime derivatives of 1-substituted-phenyl-2-propanones and 3-substituted-phenyl-2-butanones in aqueous solvents gave both rearrangement and fragmentation products, the ratio of which was dependent on substituents. Transition state (TS) optimizations and intrinsic reaction coordinate (IRC) calculations for the reaction of 1-phenyl-2-propanone oximes showed that there is a single TS for each substituted compound. The IRC path from the TS either led to a rearrangement product or a fragmentation product depending on the substituent ...


Modeling The Noble Metal/Tio2 (110) Interface With Hybrid Dft Functionals: A Periodic Electrostatic Embedded Cluster Model Study, Salai Cheettu Ammal, Andreas Heyden 2010 University of South Carolina - Columbia

Modeling The Noble Metal/Tio2 (110) Interface With Hybrid Dft Functionals: A Periodic Electrostatic Embedded Cluster Model Study, Salai Cheettu Ammal, Andreas Heyden

Faculty Publications

The interaction of Aun and Ptn (n=2,3) clusters with the stoichiometric and partially reduced rutile TiO2 (110) surfaces has been investigated using periodic slab and periodic electrostatic embedded cluster models. Compared to Au clusters, Pt clusters interact strongly with both stoichiometric and reduced TiO2 (110) surfaces and are able to enhance the reducibility of the TiO2 (110) surface, i.e., reduce the oxygen vacancy formation energy. The focus of this study is the effect of Hartree–Fock exchange on the description of the strength of chemical bonds at the interface of Au/Pt clusters and the TiO2 (110 ...


Quantum Trajectory Dynamics In Imaginary Time With The Momentum-Dependent Quantum Potential, Sophya V. Garashchuk 2010 University of South Carolina - Columbia

Quantum Trajectory Dynamics In Imaginary Time With The Momentum-Dependent Quantum Potential, Sophya V. Garashchuk

Faculty Publications

The quantum trajectory dynamics is extended to the wave function evolution in imaginary time. For a nodelesswave function a simple exponential form leads to the classical-like equations of motion of trajectories, representing the wave function, in the presence of the momentum-dependent quantum potential in addition to the external potential. For a Gaussian wave function this quantum potential is a time-dependent constant, generating zero quantum force yet contributing to the total energy. For anharmonic potentials the momentum-dependent quantum potential is cheaply estimated from the global Least-squares Fit to the trajectory momenta in the Taylor basis. Wave functions with nodes are described ...


Multiresolution Inverse Wavelet Reconstruction From A Fourier Partial Sum, Nataniel Greene 2010 CUNY Kingsborough Community College

Multiresolution Inverse Wavelet Reconstruction From A Fourier Partial Sum, Nataniel Greene

Publications and Research

The Gibbs phenomenon refers to the lack of uniform convergence which occurs in many orthogonal basis approximations to piecewise smooth functions. This lack of uniform convergence manifests itself in spurious oscillations near the points of discontinuity and a low order of convergence away from the discontinuities.In previous work [11,12] we described a numerical procedure for overcoming the Gibbs phenomenon called the Inverse Wavelet Reconstruction method (IWR). The method takes the Fourier coefficients of an oscillatory partial sum and uses them to construct the wavelet coefficients of a non-oscillatory wavelet series. However, we only described the method standard wavelet ...


The Maximum Rectilinear Crossing Number Of The Petersen Graph, Elie Feder, Heiko Harborth, Steven Herzberg, Sheldon Klein 2010 CUNY Kingsborough Community College

The Maximum Rectilinear Crossing Number Of The Petersen Graph, Elie Feder, Heiko Harborth, Steven Herzberg, Sheldon Klein

Publications and Research

We prove that the maximum rectilinear crossing number of the Petersen graph is 49. First, we illustrate a picture of the Petersen graph with 49 crossings to prove the lower bound. We then prove that this bound is sharp by carefully analyzing the ten Cs's which occur in the Petersen graph and their properties.


Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley 2010 California State Polytechnic University

Identifying A Computer Forensics Expert: A Study To Measure The Characteristics Of Forensic Computer Examiners, Gregory H. Carlton, Reginald Worthley

Journal of Digital Forensics, Security and Law

The usage of digital evidence from electronic devices has been rapidly expanding within litigation, and along with this increased usage, the reliance upon forensic computer examiners to acquire, analyze, and report upon this evidence is also rapidly growing. This growing demand for forensic computer examiners raises questions concerning the selection of individuals qualified to perform this work. While courts have mechanisms for qualifying witnesses that provide testimony based on scientific data, such as digital data, the qualifying criteria covers a wide variety of characteristics including, education, experience, training, professional certifications, or other special skills. In this study, we compare task ...


Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum 2010 University of Alabama, Birmingham

Clustering Spam Domains And Destination Websites: Digital Forensics With Data Mining, Chun Wei, Alan Sprague, Gary Warner, Anthony Skjellum

Journal of Digital Forensics, Security and Law

Spam related cyber crimes have become a serious threat to society. Current spam research mainly aims to detect spam more effectively. We believe the identification and disruption of the supporting infrastructure used by spammers is a more effective way of stopping spam than filtering. The termination of spam hosts will greatly reduce the profit a spammer can generate and thwart his ability to send more spam. This research proposes an algorithm for clustering spam domains extracted from spam emails based on the hosting IP addresses and tracing the IP addresses over a period of time. The results show that many ...


Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay 2010 University of South Australia

Computer Forensic Functions Testing: Media Preparation, Write Protection And Verification, Yinghua Guo, Jill Slay

Journal of Digital Forensics, Security and Law

The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we review our previous work---a function oriented testing framework for validation and verification of computer forensic tools. This framework consists of three parts: function mapping, requirements specification and reference set development. Through function mapping, we give a scientific and systemized description of the fundamentals of computer forensic discipline, i.e. what functions are needed ...


Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky 2010 The University of British Columbia

Digital Records Forensics: A New Science And Academic Program For Forensic Readiness, Luciana Duranti, Barbara Endicott-Popovsky

Journal of Digital Forensics, Security and Law

This paper introduces the Digital Records Forensics project, a research endeavour located at the University of British Columbia in Canada and aimed at the development of a new science resulting from the integration of digital forensics with diplomatics, archival science, information science and the law of evidence, and of an interdisciplinary graduate degree program, called Digital Records Forensics Studies, directed to professionals working for law enforcement agencies, legal firms, courts, and all kind of institutions and business that require their services. The program anticipates the need for organizations to become “forensically ready,” defined by John Tan as “maximizing the ability ...


Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns 2010 University of South Florida, St. Petersburg

Computer Forensics For Graduate Accountants: A Motivational Curriculum Design Approach, Grover S. Kearns

Journal of Digital Forensics, Security and Law

Computer forensics involves the investigation of digital sources to acquire evidence that can be used in a court of law. It can also be used to identify and respond to threats to hosts and systems. Accountants use computer forensics to investigate computer crime or misuse, theft of trade secrets, theft of or destruction of intellectual property, and fraud. Education of accountants to use forensic tools is a goal of the AICPA (American Institute of Certified Public Accountants). Accounting students, however, may not view information technology as vital to their career paths and need motivation to acquire forensic knowledge and skills ...


Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler 2010 Gary Kessler Associates

Book Review: Digital Forensic Evidence Examination (2nd Ed.), Gary C. Kessler

Journal of Digital Forensics, Security and Law

On the day that I sat down to start to write this review, the following e-mail came across on one of my lists: Person A and Person B write back and forth and create an email thread. Person A then forwards the email to Person C, but changes some wording in the email exchange between A & B. What is the easiest way (and is it even possible) to find out when that earlier email message was altered before sent to Person C? Before you try to answer these questions, read Fred Cohen's Digital Forensic Evidence Examination. His book won ...


Digital Commons powered by bepress