Using Twitter Hash Tags To Demonstrate Basic Concepts From Network Analysis, 2009 Western Kentucky University
Using Twitter Hash Tags To Demonstrate Basic Concepts From Network Analysis, Matt Bogard
Social Network Analysis focuses on finding patterns in interactions between people or entities. These patterns may be described in the form of a network. Network analysis in general has many applications including models of student integration and persistence, business to business supply chains, terrorist cells, or analysis of social media such as Facebook and Twitter. This presentation provides a reference for basic concepts from social network analysis with examples using tweets from Twitter.
The Journey To Safety: Conflict-Driven Migration Flows In Colombia, 2009 Regional Research Institute, West Virginia University
The Journey To Safety: Conflict-Driven Migration Flows In Colombia, Gianfranco Piras, Nancy Lozano-Gracia, Geoffrey Hewings, Ana Maria Ibanez
No abstract provided.
Bent-Core Liquid Crystal Elastomers, 2009 Kent State University - Kent Campus
Bent-Core Liquid Crystal Elastomers, Rafael Verduzco, Paul Luchette, Seung Ho Hong, John Harden, Elaine Dimasi, Peter Palffy-Muhoray, S. Michael Kilbey Ii, Jim T. Gleeson, Antal Jákli
Liquid crystal (LC) elastomers with bent-core side-groups incorporate the properties of bent-core liquid crystals in a flexible and self-supporting polymer network. Bent-core liquid crystal elastomers (BCEs) with uniform alignment were prepared by attaching a reactive bent-core LC to poly(hydrogenmethylsiloxane) and crosslinking with a divinyl crosslinker. Phase behavior studies indicate a nematic phase over a wide temperature range that approaches room temperature, and thermoelastic measurements show that these BCEs can reversibly change their length by more than a factor of two upon heating and cooling. Small-angle X-ray scattering studies reveal multiple, broad low-angle peaks consistent with short-range smectic C order ...
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), 2009 Oklahoma State University - Main Campus
Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster
This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.
Degradation Of Organic Pollutants In Domestic Wastewaters By Concrete Plates Containing Of Photocatalyst Nanoparticles, Masoud Rastegar
No abstract provided.
The Zeeman Effect In The Sobolev Approximation Ii. Radial Split Monopole Fields And The ‘Heartbeat’ Stokes V Profile., 2009 East Tennessee State University
The Zeeman Effect In The Sobolev Approximation Ii. Radial Split Monopole Fields And The ‘Heartbeat’ Stokes V Profile., K. G. Gayley, R. Ignace
We calculate the circularly polarized Stokes V(λ) profile for emission lines, formed in hot-star winds threaded with a weak radial magnetic field. For simplicity, the field is treated as a split monopole under the assumptions that it has been radially combed by the wind, and rotation is not playing a central role. Invoking the weak-field approximation, we find that the V(λ) profile has a characteristic “heartbeat” shape exhibiting multiple sign inversions, which might be mistaken for noise in the absence of theoretical guidance. We also conclude that there is a tendency for the V(λ) profile to integrate ...
Reverse Engineering For Mobile Systems Forensics With Ares, 2009 University of Massachusetts - Amherst
Reverse Engineering For Mobile Systems Forensics With Ares, John Tuttle, Robert J. Walls, Erik G. Learned-Miller, Brian Neil Levine
Erik G Learned-Miller
We present Ares ,areverseengineeringtechniqueforassist- ing in the analysis of data recovered for the investigation of mobile and embedded systems. The focus of investigations into insider activity is most often on the data stored on the insider’s computers and digital devices — call logs, email messaging, calendar entries, text messages, and browser his- tory — rather than on the status of the system’s security. Ares is novel in that it uses a data-driven approach that in- corporates natural language processing techniques to infer the layout of input data that has been created according to some unknown specification. While some other reverse ...
Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, 2009 Philadelphia University
Reallocation Of Mesh Points In Fluid Problems Using Back-Propagation Algorithm, Philadelphia University
Philadelphia University, Jordan
No abstract provided.
Development And Evaluation Of A Chemistry Educational Software For Learning Organic Reactions Using Qualitative Reasoning, Rukaini Abdullah
In science education, it is believed that students should understand the qualitative principles that govern the subject including the cause-effect relationships in processes before they are immersed in complex problem solving. Traditional educational programs for teaching organic chemistry do not usually explain or justify an observed chemical phenomenon. These programs do not “explain” simply because the results are obtained through chaining the rules or by searching the reaction routes that have been pre-coded in software. This paper discusses the development techniques, simulation results, and student evaluation of a software tool that aimed to help chemistry students learn organic processes through ...
Canonical Representation For Approximating Solution Of Fuzzy Polynomial Equations, 2009 Imam Khomeini International University
Canonical Representation For Approximating Solution Of Fuzzy Polynomial Equations, M. Salehnegad, Saeid Abbasbandy, M. Mosleh, M. Otadi
No abstract provided.
Semiparametric Analysis Of Recurrent Events: Artificial Censoring, Truncation, Pairwise Estimation And Inference, 2009 Penn State University
Semiparametric Analysis Of Recurrent Events: Artificial Censoring, Truncation, Pairwise Estimation And Inference, Debashis Ghosh
The analysis of recurrent failure time data from longitudinal studies can be complicated by the presence of dependent censoring. There has been a substantive literature that has developed based on an artificial censoring device. We explore in this article the connection between this class of methods with truncated data structures. In addition, a new procedure is developed for estimation and inference in a joint model for recurrent events and dependent censoring. Estimation proceeds using a mixed U-statistic based estimating function approach. New resampling-based methods for variance estimation and model checking are also described. The methods are illustrated by application to ...
Ru(Iii), Pd(Ii), Pt(Iii) And Pt(Iv) Complexes Of A Novel 32-Membered Unsymmetrical Macrocyclic Ligand, 2009 Universiti Brunei Darussalaam
Ru(Iii), Pd(Ii), Pt(Iii) And Pt(Iv) Complexes Of A Novel 32-Membered Unsymmetrical Macrocyclic Ligand, Mohammad Mansoob Khan Dr
Dr. Mohammad Mansoob Khan
Reactions of [N12] macrocyclic ligand, L·2HClO4, with RuCl3, PdCl2, K2[PtCl6], [K2PtCl4] as well as [M(Ph3P)2Cl2] (M = Pd or Pt), and [Ru(Ph3P)3Cl2] produces bimetallic complexes whose analytical data are consistent with the molecular formulae as Ru2LCl4(ClO4)2 (I), Pd2LCl2(ClO4)2 (II), Pt2LCl6(ClO4)2 (III), Pt2LCl2(ClO4)2 (IV) and Ru2LCl2(ClO4)2 (V). Reactions of the ligand with the precursors [M(Ph3P)2Cl2] (M = Pd or Pt), and [Ru(Ph3P)3Cl2], has released all the Ph3P ancillary ligand in solution. Magnetic moment, IR and UV-visible spectroscopic data confirms the encapsulation of metal ...
Diagnosing Intermittent And Persistent Faults Using Static Bayesian Networks, 2009 Carnegie Mellon University
Diagnosing Intermittent And Persistent Faults Using Static Bayesian Networks, Ole J. Mengshoel, Brian Ricks
Ole J Mengshoel
Both intermittent and persistent faults may occur in a wide range of systems. We present in this paper the introduction of intermittent fault handling techniques into ProDiagnose, an algorithm that previously only handled persistent faults. We discuss novel algorithmic techniques as well as how our static Bayesian networks help diagnose, in an integrated manner, a range of intermittent and persistent faults. Through experiments with data from the ADAPT electrical power system test bed, generated as part of the Second International Diagnostic Competition (DXC-10), we show that this novel variant of ProDiagnose diagnoses intermittent faults accurately and quickly, while maintaining strong ...
Learning Class-Specific Image Transformations With Higher-Order Boltzmann Machines, 2009 University of Massachusetts - Amherst
Learning Class-Specific Image Transformations With Higher-Order Boltzmann Machines, Erik G. Learned-Miller, Gary Huang
Erik G Learned-Miller
In this paper, we examine the problem of learning a rep- resentation of image transformations specific to a complex object class, such as faces. Learning such a representation for a specific object class would allow us to perform im- proved, pose-invariant visual verification, such as uncon- strained face verification. We build off of the method of using factored higher-order Boltzmann machines to model such image transformations. Using this approach will po- tentially enable us to use the model as one component of a larger deep architecture. This will allow us to use the fea- ture information in an ordinary deep ...
Revelations Of Adaptive Technology Hiding In Your Operating System, 2009 University of South Florida
Revelations Of Adaptive Technology Hiding In Your Operating System, Kathleen P. King
Kathleen P King
Pre-publication version of a chapter about the assistive technology tools and resources available for free in Windows OS and Mac OS. Introducing higher education faculty to free resources, features and programs which they can recommend to their students or perhaps use for themselves (for instance for fading eyesight or hearing). In addition, the chapter briefly shares strategies and examples of how they might be used. The book will have an entire chapter dedicated to assistive technology as well. This is a popularized assistive technology chapter for generalist, NON special education, faculty to become acquainted with readily available and free resources ...
Fast Function-On-Scalar Regression With Penalized Basis Expansions, 2009 New York University
Fast Function-On-Scalar Regression With Penalized Basis Expansions, Philip T. Reiss, Lei Huang, Maarten Mennes
Philip T. Reiss
Regression models for functional responses and scalar predictors are often fitted by means of basis functions, with quadratic roughness penalties applied to avoid overfitting. The fitting approach described by Ramsay and Silverman in the 1990s amounts to a penalized ordinary least squares (P-OLS) estimator of the coefficient functions. We recast this estimator as a generalized ridge regression estimator, and present a penalized generalized least squares (P-GLS) alternative. We describe algorithms by which both estimators can be implemented, with automatic selection of optimal smoothing parameters, in a more computationally efficient manner than has heretofore been available. We discuss pointwise confidence intervals ...
A Neurosemantic Theory Of Concrete Noun Representation Based On The Underlying Brain Codes, 2009 Carnegie Mellon University
A Neurosemantic Theory Of Concrete Noun Representation Based On The Underlying Brain Codes, Marcel Adam Just, Vladimir L. Cherkassky, Sandesh Aryal, Tom M. Mitchell
Marcel Adam Just
No abstract provided.
A Sketch-Based Language For Representing Uncertainty In The Locations Of Origin Of Herbarium Specimens, 2009 Eastern Illinois University
A Sketch-Based Language For Representing Uncertainty In The Locations Of Origin Of Herbarium Specimens, Barry J. Kronenfeld, Andrew Weeks
Barry J. Kronenfeld
Uncertainty fields have been suggested as an appropriate model for retrospective georeferencing of herbarium specimens. Previous work has focused only on automated data capture methods, but techniques for manual data specification may be able to harness human spatial cognition skills to quickly interpret complex spatial propositions. This paper develops a formal modeling language by which location uncertainty fields can be derived from manually sketched features. The language consists of low-level specification of critical probability isolines from which a surface can be uniquely derived, and high-level specification of features and predicates from which low-level isolines can be derived. In a case ...
Lattice Thermal Conductivity Of Freestanding Gallium Nitride Nanowires, 2009 Eastern Illinois University
Lattice Thermal Conductivity Of Freestanding Gallium Nitride Nanowires, Jie Zou
Mining And Civilization, An Illustrated History, 2009 Laval University, Quebec City, Canada