Shallow Water Dredging, 2010 William & Mary
Shallow Water Dredging, Center For Coastal Resources Management, Virginia Institute Of Marine Science
Rivers & Coast is a periodic publication of the Center for Coastal Resources Management, Virginia Institute of Marine Science. The goal of Rivers & Coast is to keep readers well informed of current scientific understanding behind key environmental issues related to watershed rivers and coastal ecosystems of the Chesapeake Bay
A New Technique For Firn Grain-Size Measurement Using Sem Image Analysis, 2010 University of Maine
A New Technique For Firn Grain-Size Measurement Using Sem Image Analysis, N.E. Spaulding, D.A. Meese, I. Baker, P.A. Mayewski
Open Dartmouth: Peer-reviewed articles by Dartmouth faculty
Firn microstructure is accurately characterized using images obtained from scanning electron microscopy (SEM). Visibly etched grain boundaries within images are used to create a skeleton outline of the microstructure. A pixel-counting utility is applied to the outline to determine grain area. Firn grain sizes calculated using the technique described here are compared to those calculated using the techniques of Gow (1969) and Gay and Weiss (1999) on samples of the same material, and are found to be substantially smaller. The differences in grain size between the techniques are attributed to sampling deficiencies (e.g. the inclusion of pore filler in ...
Enrichment Of Echinacea Angustifolia With Bauer Alkylamide 11 And Bauer Ketone 23 Increased Anti-Inflammatory Potential Through Interference With Cox-2 Enzyme Activity, Carlie A. Lalone, Nan Huang, Ludmila Rizshsky, Man-Yu Yum, Navrozedeep Singh, Cathy Hauck, Basil J. Nikolau, Eve S. Wurtele, Marian L. Kohut, Patricia A. Murphy, Diane F. Birt
Food Science and Human Nutrition Publications
Bauer alkylamide 11 and Bauer ketone 23 were previously found to be partially responsible forEchinacea angustifolia anti-inflammatory properties. This study further tested their importance using the inhibition of prostaglandin E2 (PGE2) and nitric oxide (NO) production by RAW264.7 mouse macrophages in the absence and presence of lipopolysaccharide (LPS) and E. angustifolia extracts, phytochemical enriched fractions, or pure synthesized standards. Molecular targets were probed using microarray, qRT-PCR, Western blot, and enzyme assays. Fractions with these phytochemicals were more potent inhibitors of LPS-induced PGE2 production than E. angustifolia extracts. Microarray did not detect changes in transcripts with ...
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, 2010 Technological University Dublin
On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn
Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher ...
How Does The University Of Northern Iowa's Recycling Program Compare To The Recycling Programs Of Its Peer Institutions?, 2010 University of Northern Iowa
How Does The University Of Northern Iowa's Recycling Program Compare To The Recycling Programs Of Its Peer Institutions?, Anna J. Schrad
Honors Program Theses
In recent years, the concept of sustainability has become mainstream and has begun to be incorporated into the decisions that businesses, organizations, and institutions make. With over 12,000 students, the University of Northern Iowa (UNI) has great potential to generate large quantities of recyclables (Kaplan & von Kolnitz, 2004). By expanding its recycling program, UNI can increase its appeal to prospective students while gaining economic benefits in addition to protecting the environment. Waste managers at 8 of UNI’s peer institutions (Appendix B) were interviewed to determine how UNI’s recycling and waste diversion efforts compared to similar schools for ...
Nanoparticle Shape Selection By Repulsive Interactions: Metal Islands On Few-Layer Graphene, 2010 University of Pennsylvania
Nanoparticle Shape Selection By Repulsive Interactions: Metal Islands On Few-Layer Graphene, Luke A. Somers, Natalya A. Zimbovskaya, Charlie Johnson, Eugene J. Mele
Department of Physics Papers
Metal atoms adsorbed on few-layer graphenes condense to form nanometer-size droplets whose growth is size limited by a competition between the surface tension and repulsive electrostatic interactions from charge transfer between the metal droplet and the graphene. For situations where the work-function mismatch is large and the droplet surface tension is small, a growing droplet can be unstable to a family of shape instabilities. We observe this phenomenon for Yb deposited and annealed on few-layer graphenes and develop a theoretical model to describe it by studying the renormalization of the line tension of a two-dimensional droplet by repulsive interparticle interactions ...
Energy And Width Of The Excited 0+ Stat In 12O, 2010 University of Pennsylvania
Energy And Width Of The Excited 0+ Stat In 12O, H Terry Fortune, Rubby Sherr
Department of Physics Papers
We review predictions for the energy of the excited 0+state of 12O and present new calculations of its width. Results are compared with those of a recent experiment.
Matrix Singular Value Decomposition, 2010 University of North Florida
Matrix Singular Value Decomposition, Petero Kwizera
UNF Graduate Theses and Dissertations
This thesis starts with the fundamentals of matrix theory and ends with applications of the matrix singular value decomposition (SVD). The background matrix theory coverage includes unitary and Hermitian matrices, and matrix norms and how they relate to matrix SVD. The matrix condition number is discussed in relationship to the solution of linear equations. Some inequalities based on the trace of a matrix, polar matrix decomposition, unitaries and partial isometies are discussed. Among the SVD applications discussed are the method of least squares and image compression. Expansion of a matrix as a linear combination of rank one partial isometries is ...
Metamorphic Viruses With Built-In Buffer Overflow, 2010 San Jose State University
Metamorphic Viruses With Built-In Buffer Overflow, Ronak Shah
Metamorphic computer viruses change their structure—and thereby their signature—each time they infect a system. Metamorphic viruses are potentially one of the most dangerous types of computer viruses because they are difficult to detect using signature-based methods. Most anti-virus software today is based on signature detection techniques. In this project, we create and analyze a metamorphic virus toolkit which creates viruses with a built-in buffer overflow. The buffer overflow serves to obfuscate the entry point of the actual virus, thereby making detection more challenging. We show that the resulting viruses successfully evade detection by commercial virus scanners. Several modern ...
Wisenetor: A Scalable Wireless Sensor Network Simulator, 2010 San Jose State University
Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale
WiSeNetor is a teaching and a research tool that simulates a scalable wireless sensor network on a single computer, based on the “Spamulator” (Aycock, J., Crawford, H., & deGraaf, R., 2008) which simulates the Internet on a single computer. Routing protocols and network discovery algorithms used in mesh networks and cluster tree networks can be demonstrated using this tool. WiSeNetor contains a network creation module, simulated network devices and it simulates routing algorithms. The network creation module spawns a network according to user specified network type, where the type can be a cluster tree or mesh. In this process, neighbor tables ...
A Framework For Active Learning: Revisited, 2010 San Jose State University
A Framework For Active Learning: Revisited, Yue Chen
Over the past decade, algorithm visualization tools have been researched and developed to be used by Computer Science instructors to ease students’ learning curve for new concepts. However, limitations such as rigid animation frameworks, lack of user interaction with the visualization created, and learning a new language and environment, have severely reduced instructors’ desire to use such a tool. The purpose of this project is to create a tool that overcomes these limitations. Instructors do not have to get familiar with a new framework and learn another language. The API used to create algorithm animation for this project is through ...
Automatic Grading Of Programming Assignments, 2010 San Jose State University
Automatic Grading Of Programming Assignments, Ashlesha Patil
Solving practical problems is one of the important aspects of learning programming languages. But the assessment of programming problems is not straightforward. It involves time consuming and tedious steps required to compile and test the solution. In this project, I have developed a online tool, Javabrat that allows the students and language learners to practice Java and Scala problems. Javabrat automatically assesses the user's program and provides the instant feedback to the user. The users can also contribute their own programming problems to the existing problem set. I have also developed a plugin for a learning management system, Moodle ...
Food Phone Application, 2010 San Jose State University
Food Phone Application, Shengyu Li
This project is about implementing a food menu application for users to search and upload food information by using a mobile phone. People sometimes may just know what food they wish to eat instead of the restaurants' name. Without knowing any restaurants' names, our food application's search only requires the name of the dish (e.g., hamburger, spaghetti, etc) in order to get the list of restaurants that serve these items and their corresponding information (e.g., location, hours, phone number, item's price, etc.). An advantage of using my food application is the system not only includes Google ...
Clustering And Validation Of Microarray Data Using Consensus Clustering, 2010 San Jose State University
Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar
Clustering is a popular method to glean useful information from microarray data. Unfortunately the results obtained from the common clustering algorithms are not consistent and even with multiple runs of different algorithms a further validation step is required. Due to absence of well defined class labels, and unknown number of clusters, the unsupervised learning problem of finding optimal clustering is hard. Obtaining a consensus of judiciously obtained clusterings not only provides stable results but also lends a high level of confidence in the quality of results. Several base algorithm runs are used to generate clusterings and a co-association matrix of ...
Open Source Analysis Of Biomedical Figures, 2010 San Jose State University
Open Source Analysis Of Biomedical Figures, David Shao
With a selection of biomedical literature available for open access, a natural pairing seems to be the use of open source software to automatically analyze content, in particular, the content of gures. Considering the large number of possible tools and approaches, we choose to focus on the recognition of printed characters. As the problem of optical character recognition (OCR) under rea- sonable conditions is considered to be solved, and as open source software is fully capable of isolating the location of characters and identifying most of them accurately, we instead use OCR as an application area for the relatively recent ...
Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, 2010 San Jose State University
Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, Bhargav Vadher
In this age of social networking, it is necessary to define the relationships among the members of a social network. Various techniques are already available to define user- to-user relationships across the network. Over time, many algorithms and machine learning techniques were applied to find relationships over social networks, yet very few techniques and information are available to define a relation directly over raw email data. Few educational societies have developed a way to mine the email log files and have found the inter-relation between the users by means of clusters. Again, there is no solid technique available that can ...
Mobile Search Engine Using Clustering And Query Expansion, 2010 San Jose State University
Mobile Search Engine Using Clustering And Query Expansion, Huy Nguyen
Internet content is growing exponentially and searching for useful content is a tedious task that we all deal with today. Mobile phones lack of screen space and limited interaction methods makes traditional search engine interface very inefficient. As the use of mobile internet continues to grow there is a need for an effective search tool. I have created a mobile search engine that uses clustering and query expansion to find relevant web pages efficiently. Clustering organizes web pages into groups that reflect different components of a query topic. Users can ignore clusters that they find irrelevant so they are not ...
How Smart Is Your Android Smartphone?, 2010 San Jose State University
How Smart Is Your Android Smartphone?, Deepika Mulani
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt ...
Improved Software Activation Using Multithreading, 2010 San Jose State University
Improved Software Activation Using Multithreading, Jian Rui Zhang
Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed . It is supposed to be quick and simple while simultaneously protecting customer privacy. The most common form of software activation is through the entering of legitimate product serial numbers by users, which sometimes are also known as product keys. This technique is employed by various software, from small shareware programs to large commercial programs such as Microsoft Office. However, software activation based on a serial number appears to be weak, as various cracks for a majority of programs are available and can be ...
The Structural And Tectonic History Of The Mt. Formidable Region, North Cascades, Washington, 2010 Western Washington University
The Structural And Tectonic History Of The Mt. Formidable Region, North Cascades, Washington, Julia E. (Julia Eileen) Labadie
WWU Graduate School Collection
Deformation events associated with crustal thickening are preserved in the Mt. Formidable region of the North Cascades, a Cretaceous orogen and continental arc at the southern end of the Coast Plutonic Complex. The kinematics and timing of deformation in this area during burial, magmatism and metamorphism are the focus of this study. Rocks in the Mt. Formidable region span from at least the Late Triassic to the Early Cretaceous and include supracrustal units and associated metaplutonic rocks that have been interpreted as an island arc sequence. Rocks within the study region include the sub-arc Marblemount Meta-Quartz Diorite, the supra-arc metaclastic ...