Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Global stability (2)
- 18th century New England (1)
- Arbitrary order (1)
- Arterial flow (1)
- Basic reproductive number (1)
-
- Blood flow (1)
- Cryptography (1)
- Decryption (1)
- Discrete wavelet transformation (1)
- Encryption (1)
- Epidemic Model (1)
- Epidemic model (1)
- Fuzzy (1)
- Fuzzy Basic Reproduction number (1)
- Fuzzy Mathematics (1)
- Fuzzy number (1)
- HPM (1)
- Impedance (1)
- Malicious code (1)
- Multi stenosis (1)
- Predator-prey equations (1)
- Random hill cipher (1)
- SLn(F) (1)
- Stress force (1)
- Transcritical bifurcation (1)
- Triangular fuzzy number (1)
- Undergraduate art dialogue (1)
- Water-borne disease (1)
Articles 1 - 12 of 12
Full-Text Articles in Biology
Table Of Contents, Michele Harmon
Table Of Contents, Michele Harmon
Journal of the South Carolina Academy of Science
No abstract provided.
Dose Dependent Effects Of Caffeine On Cognitive Performance And Neuronal Activation, Stephan Albrecht, Helen Morris, Michelle Vieyra
Dose Dependent Effects Of Caffeine On Cognitive Performance And Neuronal Activation, Stephan Albrecht, Helen Morris, Michelle Vieyra
Journal of the South Carolina Academy of Science
Many students assume that the more caffeine you drink, the better your cognitive performance. Over-consumption of caffeine has many negative effects, so if there are no dose related cognitive benefits to large amounts of caffeine, then college students should limit their intake. This study looked at whether ingesting a medium dose (200 mg) versus a lower dose (100 mg) of caffeine improved short term memory as measured by Flanker and n-back tests, compared to a control group. In addition, we looked at whether larger doses of caffeine produced a difference in neuronal activation during these tests as measured by functional …
Fourier Analysis Of Phase Resetting Curves Of Neural Oscillators, Robert A. Raidt, Sorinel A. Oprisan
Fourier Analysis Of Phase Resetting Curves Of Neural Oscillators, Robert A. Raidt, Sorinel A. Oprisan
Journal of the South Carolina Academy of Science
We investigated the impact of changes in biologically relevant control parameters, such as the shape of an external perturbation or the conductance values of an individual model neuron, on the shape of the phase resetting curve (PRC) of that neuron. For that purpose, PRCs were generated for groups of Morris-Lecar (ML) model neurons with different conductance values but similar firing periods (within 0.005ms) using external rectangular, triangular, or trapezoidal perturbations of varying areas. These PRCs were numerically described and analyzed as a series of coefficient values using a Fourier Discrete Sine Transform (DST). We found that changes in the shape …
The Two-Phase Arterial Blood Flow With Or Without A Catheter And In The Presence Of A Single Or Multi Stenosis, Ani E. Garcia, Daniel N. Riahi
The Two-Phase Arterial Blood Flow With Or Without A Catheter And In The Presence Of A Single Or Multi Stenosis, Ani E. Garcia, Daniel N. Riahi
Applications and Applied Mathematics: An International Journal (AAM)
We consider the problem of blood flow in an artery with or without a catheter and in the presence of single or multi stenosis whose shape is based on the available experimental data for the stenosis in a human’s artery. The presence of stenosis in the artery, which locally narrows portion of the artery, can be a result of fatty materials such as cholesterol in the blood. The use of catheter is important as a standard tool for diagnosis and treatment in patience whose blood flow passage in the artery is affected adversely by the presence of the stenosis within …
Numerical Solution Of Fuzzy Arbitrary Order Predator-Prey Equations, Smita Tapaswini, S. Chakraverty
Numerical Solution Of Fuzzy Arbitrary Order Predator-Prey Equations, Smita Tapaswini, S. Chakraverty
Applications and Applied Mathematics: An International Journal (AAM)
This paper seeks to investigate the numerical solution of fuzzy arbitrary order predator-prey equations using the Homotopy Perturbation Method (HPM). Fuzziness in the initial conditions is taken to mean convex normalised fuzzy sets viz. triangular fuzzy number. Comparisons are made between crisp solution given by others and fuzzy solution in special cases. The results obtained are depicted in plots and tables to demonstrate the efficacy and powerfulness of the methodology.
Spread Of Malicious Objects In Computer Network: A Fuzzy Approach, Bimal K. Mishra, Apeksha Prajapati
Spread Of Malicious Objects In Computer Network: A Fuzzy Approach, Bimal K. Mishra, Apeksha Prajapati
Applications and Applied Mathematics: An International Journal (AAM)
We propose an e-epidemic fuzzy SEIQRS (Susceptible-Exposed-Infectious-Quarantine- Recovered-Susceptible) model for the transmission of malicious codes in a computer network. We have simulated the result for various parameters and analyzed the stability of the model. The efficiency of antivirus software and crashing of the nodes due to attack of malicious code is analyzed. Furthermore, initial simulation results illustrate the behavior of different classes for minimizing the infection in a computer network. It also reflects the positive impact of anti-virus software on malicious code propagation in a computer network. The basic reproduction number R0 f and its formulation is also discussed.
Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma
Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma
Applications and Applied Mathematics: An International Journal (AAM)
Image data are highly sensitive and prone to incidental decoding by intruders. The security of image data in an insecure network is therefore a major issue. In this paper, we have presented a novel approach for grayscale-image encryption and decryption using Random Hill cipher over SLn(F) associated with discrete wavelet transformation. Earlier techniques for encryption and decryption of image data discussed missing the keys, but in this approach, both the keys and the arrangement of RHC are emphasized. Additionally, keys multiplication side (pre or post) over a grayscale-image data matrix also inevitable to know, to correctly decrypt the encrypted image …
2013 Annual Meeting Program
Journal of the South Carolina Academy of Science
No abstract provided.
Global Dynamics Of A Water-Borne Disease Model With Multiple Transmission Pathways, Prasanta K. Mondal, T. K. Kar
Global Dynamics Of A Water-Borne Disease Model With Multiple Transmission Pathways, Prasanta K. Mondal, T. K. Kar
Applications and Applied Mathematics: An International Journal (AAM)
We propose and analyze a water born disease model introducing water-to-person and person-toperson transmission and saturated incidence. The disease-free equilibrium and the existence criterion of endemic equilibrium are investigated. Trans critical bifurcation at the disease-free equilibrium is obtained when the basic reproductive number is one. The local stability of both the equilibria is shown and a Lyapunov functional approach is also applied to explore the global stability of the system around the equilibria. We display the effects of pathogen contaminated water and infection through contact on the system dynamics in the absence of person-to-person contact as well as in the …
Concrete Shroud, Jake Reller, Mariah Tate Klemens
Concrete Shroud, Jake Reller, Mariah Tate Klemens
Occam's Razor
Concrete shroud is an exhibition originating from a dialogue between the two artists, culminating in a series of lectures written by Mariah Tate Klemens and Jake Reller.
Community, Culture And Identity In An Age Of Globalization, Katie Wiggins
Community, Culture And Identity In An Age Of Globalization, Katie Wiggins
Occam's Razor
As we move further into the age of globalization, we are seeing changes not only at a global level but at individual and communal levels; changes that we cannot wholly identify but that we recognize in ourselves. We are adapting to a global world, one that is affecting our identity and culture and, as we attempt to hold on to this identity and still converse with a larger world, we ultimately are forced to reshape our identities. Some may wonder what this will mean for the future and to what extent it affects us as individuals and communities. To answer …