Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

209,743 Full-Text Articles 261,605 Authors 47,230,550 Downloads 412 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

209,743 full-text articles. Page 5806 of 5828.

Shallow Water Dredging, Center for Coastal Resources Management, Virginia Institute of Marine Science 2010 William & Mary

Shallow Water Dredging, Center For Coastal Resources Management, Virginia Institute Of Marine Science

Reports

Rivers & Coast is a periodic publication of the Center for Coastal Resources Management, Virginia Institute of Marine Science. The goal of Rivers & Coast is to keep readers well informed of current scientific understanding behind key environmental issues related to watershed rivers and coastal ecosystems of the Chesapeake Bay


A New Technique For Firn Grain-Size Measurement Using Sem Image Analysis, N.E. Spaulding, D.A. Meese, I. Baker, P.A. Mayewski 2010 University of Maine

A New Technique For Firn Grain-Size Measurement Using Sem Image Analysis, N.E. Spaulding, D.A. Meese, I. Baker, P.A. Mayewski

Open Dartmouth: Peer-reviewed articles by Dartmouth faculty

Firn microstructure is accurately characterized using images obtained from scanning electron microscopy (SEM). Visibly etched grain boundaries within images are used to create a skeleton outline of the microstructure. A pixel-counting utility is applied to the outline to determine grain area. Firn grain sizes calculated using the technique described here are compared to those calculated using the techniques of Gow (1969) and Gay and Weiss (1999) on samples of the same material, and are found to be substantially smaller. The differences in grain size between the techniques are attributed to sampling deficiencies (e.g. the inclusion of pore filler in ...


Enrichment Of Echinacea Angustifolia With Bauer Alkylamide 11 And Bauer Ketone 23 Increased Anti-Inflammatory Potential Through Interference With Cox-2 Enzyme Activity, Carlie A. LaLone, Nan Huang, Ludmila Rizshsky, Man-Yu Yum, Navrozedeep Singh, Cathy Hauck, Basil J. Nikolau, Eve S. Wurtele, Marian L. Kohut, Patricia A. Murphy, Diane F. Birt 2010 Iowa State University

Enrichment Of Echinacea Angustifolia With Bauer Alkylamide 11 And Bauer Ketone 23 Increased Anti-Inflammatory Potential Through Interference With Cox-2 Enzyme Activity, Carlie A. Lalone, Nan Huang, Ludmila Rizshsky, Man-Yu Yum, Navrozedeep Singh, Cathy Hauck, Basil J. Nikolau, Eve S. Wurtele, Marian L. Kohut, Patricia A. Murphy, Diane F. Birt

Food Science and Human Nutrition Publications

Bauer alkylamide 11 and Bauer ketone 23 were previously found to be partially responsible forEchinacea angustifolia anti-inflammatory properties. This study further tested their importance using the inhibition of prostaglandin E2 (PGE2) and nitric oxide (NO) production by RAW264.7 mouse macrophages in the absence and presence of lipopolysaccharide (LPS) and E. angustifolia extracts, phytochemical enriched fractions, or pure synthesized standards. Molecular targets were probed using microarray, qRT-PCR, Western blot, and enzyme assays. Fractions with these phytochemicals were more potent inhibitors of LPS-induced PGE2 production than E. angustifolia extracts. Microarray did not detect changes in transcripts with ...


On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn 2010 Technological University Dublin

On The Applications Of Deterministic Chaos For Encrypting Data On The Cloud, Jonathan Blackledge, Nikolai Ptitsyn

Conference papers

Cloud computing is expected to grow considerably in the future because it has so many advantages with regard to sale and cost, change management, next generation architectures, choice and agility. However, one of the principal concerns for users of the Cloud is lack of control and above all, data security. This paper considers an approach to encrypting information before it is ‘place’ on the Cloud where each user has access to their own encryption algorithm, an algorithm that is based on a set of Iterative Function Systems that outputs a chaotic number stream, designed to produce a cryptographically secure cipher ...


How Does The University Of Northern Iowa's Recycling Program Compare To The Recycling Programs Of Its Peer Institutions?, Anna J. Schrad 2010 University of Northern Iowa

How Does The University Of Northern Iowa's Recycling Program Compare To The Recycling Programs Of Its Peer Institutions?, Anna J. Schrad

Honors Program Theses

In recent years, the concept of sustainability has become mainstream and has begun to be incorporated into the decisions that businesses, organizations, and institutions make. With over 12,000 students, the University of Northern Iowa (UNI) has great potential to generate large quantities of recyclables (Kaplan & von Kolnitz, 2004). By expanding its recycling program, UNI can increase its appeal to prospective students while gaining economic benefits in addition to protecting the environment. Waste managers at 8 of UNI’s peer institutions (Appendix B) were interviewed to determine how UNI’s recycling and waste diversion efforts compared to similar schools for ...


Nanoparticle Shape Selection By Repulsive Interactions: Metal Islands On Few-Layer Graphene, Luke A. Somers, Natalya A. Zimbovskaya, Charlie Johnson, Eugene J. Mele 2010 University of Pennsylvania

Nanoparticle Shape Selection By Repulsive Interactions: Metal Islands On Few-Layer Graphene, Luke A. Somers, Natalya A. Zimbovskaya, Charlie Johnson, Eugene J. Mele

Department of Physics Papers

Metal atoms adsorbed on few-layer graphenes condense to form nanometer-size droplets whose growth is size limited by a competition between the surface tension and repulsive electrostatic interactions from charge transfer between the metal droplet and the graphene. For situations where the work-function mismatch is large and the droplet surface tension is small, a growing droplet can be unstable to a family of shape instabilities. We observe this phenomenon for Yb deposited and annealed on few-layer graphenes and develop a theoretical model to describe it by studying the renormalization of the line tension of a two-dimensional droplet by repulsive interparticle interactions ...


Energy And Width Of The Excited 0+ Stat In 12O, H Terry Fortune, Rubby Sherr 2010 University of Pennsylvania

Energy And Width Of The Excited 0+ Stat In 12O, H Terry Fortune, Rubby Sherr

Department of Physics Papers

We review predictions for the energy of the excited 0+state of 12O and present new calculations of its width. Results are compared with those of a recent experiment.


Matrix Singular Value Decomposition, Petero Kwizera 2010 University of North Florida

Matrix Singular Value Decomposition, Petero Kwizera

UNF Graduate Theses and Dissertations

This thesis starts with the fundamentals of matrix theory and ends with applications of the matrix singular value decomposition (SVD). The background matrix theory coverage includes unitary and Hermitian matrices, and matrix norms and how they relate to matrix SVD. The matrix condition number is discussed in relationship to the solution of linear equations. Some inequalities based on the trace of a matrix, polar matrix decomposition, unitaries and partial isometies are discussed. Among the SVD applications discussed are the method of least squares and image compression. Expansion of a matrix as a linear combination of rank one partial isometries is ...


Metamorphic Viruses With Built-In Buffer Overflow, Ronak Shah 2010 San Jose State University

Metamorphic Viruses With Built-In Buffer Overflow, Ronak Shah

Master's Projects

Metamorphic computer viruses change their structure—and thereby their signature—each time they infect a system. Metamorphic viruses are potentially one of the most dangerous types of computer viruses because they are difficult to detect using signature-based methods. Most anti-virus software today is based on signature detection techniques. In this project, we create and analyze a metamorphic virus toolkit which creates viruses with a built-in buffer overflow. The buffer overflow serves to obfuscate the entry point of the actual virus, thereby making detection more challenging. We show that the resulting viruses successfully evade detection by commercial virus scanners. Several modern ...


Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale 2010 San Jose State University

Wisenetor: A Scalable Wireless Sensor Network Simulator, Gauri Krishna Gokhale

Master's Projects

WiSeNetor is a teaching and a research tool that simulates a scalable wireless sensor network on a single computer, based on the “Spamulator” (Aycock, J., Crawford, H., & deGraaf, R., 2008) which simulates the Internet on a single computer. Routing protocols and network discovery algorithms used in mesh networks and cluster tree networks can be demonstrated using this tool. WiSeNetor contains a network creation module, simulated network devices and it simulates routing algorithms. The network creation module spawns a network according to user specified network type, where the type can be a cluster tree or mesh. In this process, neighbor tables ...


A Framework For Active Learning: Revisited, Yue Chen 2010 San Jose State University

A Framework For Active Learning: Revisited, Yue Chen

Master's Projects

Over the past decade, algorithm visualization tools have been researched and developed to be used by Computer Science instructors to ease students’ learning curve for new concepts. However, limitations such as rigid animation frameworks, lack of user interaction with the visualization created, and learning a new language and environment, have severely reduced instructors’ desire to use such a tool. The purpose of this project is to create a tool that overcomes these limitations. Instructors do not have to get familiar with a new framework and learn another language. The API used to create algorithm animation for this project is through ...


Automatic Grading Of Programming Assignments, Ashlesha Patil 2010 San Jose State University

Automatic Grading Of Programming Assignments, Ashlesha Patil

Master's Projects

Solving practical problems is one of the important aspects of learning programming languages. But the assessment of programming problems is not straightforward. It involves time consuming and tedious steps required to compile and test the solution. In this project, I have developed a online tool, Javabrat that allows the students and language learners to practice Java and Scala problems. Javabrat automatically assesses the user's program and provides the instant feedback to the user. The users can also contribute their own programming problems to the existing problem set. I have also developed a plugin for a learning management system, Moodle ...


Food Phone Application, Shengyu Li 2010 San Jose State University

Food Phone Application, Shengyu Li

Master's Projects

This project is about implementing a food menu application for users to search and upload food information by using a mobile phone. People sometimes may just know what food they wish to eat instead of the restaurants' name. Without knowing any restaurants' names, our food application's search only requires the name of the dish (e.g., hamburger, spaghetti, etc) in order to get the list of restaurants that serve these items and their corresponding information (e.g., location, hours, phone number, item's price, etc.). An advantage of using my food application is the system not only includes Google ...


Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar 2010 San Jose State University

Clustering And Validation Of Microarray Data Using Consensus Clustering, Sarbinder Kallar

Master's Projects

Clustering is a popular method to glean useful information from microarray data. Unfortunately the results obtained from the common clustering algorithms are not consistent and even with multiple runs of different algorithms a further validation step is required. Due to absence of well defined class labels, and unknown number of clusters, the unsupervised learning problem of finding optimal clustering is hard. Obtaining a consensus of judiciously obtained clusterings not only provides stable results but also lends a high level of confidence in the quality of results. Several base algorithm runs are used to generate clusterings and a co-association matrix of ...


Open Source Analysis Of Biomedical Figures, David Shao 2010 San Jose State University

Open Source Analysis Of Biomedical Figures, David Shao

Master's Projects

With a selection of biomedical literature available for open access, a natural pairing seems to be the use of open source software to automatically analyze content, in particular, the content of gures. Considering the large number of possible tools and approaches, we choose to focus on the recognition of printed characters. As the problem of optical character recognition (OCR) under rea- sonable conditions is considered to be solved, and as open source software is fully capable of isolating the location of characters and identifying most of them accurately, we instead use OCR as an application area for the relatively recent ...


Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, Bhargav Vadher 2010 San Jose State University

Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, Bhargav Vadher

Master's Projects

In this age of social networking, it is necessary to define the relationships among the members of a social network. Various techniques are already available to define user- to-user relationships across the network. Over time, many algorithms and machine learning techniques were applied to find relationships over social networks, yet very few techniques and information are available to define a relation directly over raw email data. Few educational societies have developed a way to mine the email log files and have found the inter-relation between the users by means of clusters. Again, there is no solid technique available that can ...


Mobile Search Engine Using Clustering And Query Expansion, Huy Nguyen 2010 San Jose State University

Mobile Search Engine Using Clustering And Query Expansion, Huy Nguyen

Master's Projects

Internet content is growing exponentially and searching for useful content is a tedious task that we all deal with today. Mobile phones lack of screen space and limited interaction methods makes traditional search engine interface very inefficient. As the use of mobile internet continues to grow there is a need for an effective search tool. I have created a mobile search engine that uses clustering and query expansion to find relevant web pages efficiently. Clustering organizes web pages into groups that reflect different components of a query topic. Users can ignore clusters that they find irrelevant so they are not ...


How Smart Is Your Android Smartphone?, Deepika Mulani 2010 San Jose State University

How Smart Is Your Android Smartphone?, Deepika Mulani

Master's Projects

Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers. A virus or worm that spreads over the network to cell phone users could be particularly damaging. Due to a rising demand for secure mobile phones, manufacturers have increased their emphasis on mobile security. In this project, we address some security issues relevant to the current Android smartphone framework. Specifically, we demonstrate an exploit that targets the Android telephony service. In addition, as a defense against the loss of personal information, we provide a means to encrypt ...


Improved Software Activation Using Multithreading, Jian Rui Zhang 2010 San Jose State University

Improved Software Activation Using Multithreading, Jian Rui Zhang

Master's Projects

Software activation is an anti-piracy technology designed to verify that software products have been legitimately licensed [1]. It is supposed to be quick and simple while simultaneously protecting customer privacy. The most common form of software activation is through the entering of legitimate product serial numbers by users, which sometimes are also known as product keys. This technique is employed by various software, from small shareware programs to large commercial programs such as Microsoft Office. However, software activation based on a serial number appears to be weak, as various cracks for a majority of programs are available and can be ...


The Structural And Tectonic History Of The Mt. Formidable Region, North Cascades, Washington, Julia E. (Julia Eileen) Labadie 2010 Western Washington University

The Structural And Tectonic History Of The Mt. Formidable Region, North Cascades, Washington, Julia E. (Julia Eileen) Labadie

WWU Graduate School Collection

Deformation events associated with crustal thickening are preserved in the Mt. Formidable region of the North Cascades, a Cretaceous orogen and continental arc at the southern end of the Coast Plutonic Complex. The kinematics and timing of deformation in this area during burial, magmatism and metamorphism are the focus of this study. Rocks in the Mt. Formidable region span from at least the Late Triassic to the Early Cretaceous and include supracrustal units and associated metaplutonic rocks that have been interpreted as an island arc sequence. Rocks within the study region include the sub-arc Marblemount Meta-Quartz Diorite, the supra-arc metaclastic ...


Digital Commons powered by bepress