Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Environmental Sciences (62)
- Sustainability (58)
- Environmental Education (56)
- Environmental Health and Protection (56)
- Environmental Monitoring (55)
-
- Computer Sciences (24)
- Physics (22)
- Business (19)
- Information Security (18)
- Management Information Systems (18)
- Technology and Innovation (17)
- Chemistry (5)
- Education (4)
- Engineering (4)
- Statistics and Probability (4)
- Life Sciences (3)
- Social and Behavioral Sciences (3)
- Mathematics (2)
- Medicine and Health Sciences (2)
- Applied Mathematics (1)
- Applied Statistics (1)
- Architecture (1)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Astrophysics and Astronomy (1)
- Biochemistry (1)
- Biochemistry, Biophysics, and Structural Biology (1)
- Biodiversity (1)
- Biostatistics (1)
- Keyword
-
- Environmental science (49)
- Branching fraction (5)
- Energy (5)
- Assessment (4)
- Basic skills (4)
-
- Cp violation (4)
- Hadronic decays (4)
- Lepton colliders (4)
- Leptonic (4)
- Logistic regression (4)
- Rare decays (4)
- Demographics (3)
- Fossil fuels (3)
- Population statistics (3)
- Semileptonic & radiative decays (3)
- Air quality (2)
- Binary classification (2)
- Bottom mesons (2)
- Charmed mesons (2)
- Continental shift (2)
- Creation (2)
- Decision tree (2)
- Editorial (2)
- Ground-level ozone (2)
- Heavy mesons (2)
- Hotspots (2)
- Light mesons (2)
- Minerals (2)
- Natural gas (2)
- Particle decays (2)
- Publication
-
- Activities (55)
- Faculty and Research Publications (27)
- KSU Proceedings on Cybersecurity Education, Research and Practice (10)
- Journal of Cybersecurity Education, Research and Practice (9)
- Master of Science in Chemical Sciences Theses (5)
-
- Assessment and Feedback (4)
- Published and Grey Literature from PhD Candidates (4)
- The African Journal of Information Systems (2)
- The Kennesaw Journal of Undergraduate Research (2)
- Georgia Library Quarterly (1)
- Journal of Global Initiatives: Policy, Pedagogy, Perspective (1)
- KSU Journey Honors College Capstones and Theses (1)
- Master of Science in Software Engineering Theses (1)
- Symposium of Student Scholars Program Books (1)
- Publication Type
Articles 1 - 30 of 123
Full-Text Articles in Physical Sciences and Mathematics
Stable Solution To L 2,1-Based Robust Inductive Matrix Completion And Its Application In Linking Long Noncoding Rnas To Human Diseases, Ashis Kumer Biswas, Dongchul Kim, Mingon Kang, Chris Ding
Stable Solution To L 2,1-Based Robust Inductive Matrix Completion And Its Application In Linking Long Noncoding Rnas To Human Diseases, Ashis Kumer Biswas, Dongchul Kim, Mingon Kang, Chris Ding
Faculty and Research Publications
Backgrounds A large number of long intergenic non-coding RNAs (lincRNAs) are linked to a broad spectrum of human diseases. The disease association with many other lincRNAs still remain as puzzle. Validation of such links between the two entities through biological experiments are expensive. However, a plethora lincRNA-data are available now, thanks to the High Throughput Sequencing (HTS) platforms, Genome Wide Association Studies (GWAS), etc, which opens the opportunity for cutting-edge machine learning and data mining approaches to extract meaningful relationships among lincRNAs and diseases. However, there are only a few in silico lincRNA-disease association inference tools available to date, and …
Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd.
Visual Odometry Using Convolutional Neural Networks, Alec Graves, Steffen Lim, Thomas Fagan, Kevin Mcfall Phd.
The Kennesaw Journal of Undergraduate Research
Visual odometry is the process of tracking an agent's motion over time using a visual sensor. The visual odometry problem has only been recently solved using traditional, non-machine learning techniques. Despite the success of neural networks at many related problems such as object recognition, feature detection, and optical flow, visual odometry still has not been solved with a deep learning technique. This paper attempts to implement several Convolutional Neural Networks to solve the visual odometry problem and compare slight variations in data preprocessing. The work presented is a step toward reaching a legitimate neural network solution.
Use Of An Alternative Natural Weed Suppressant: Effects Of Parboiled Rice Hull Mulch On The Growth Of Container Weeds, Amy R. Fields-Taylor, Vanessa Slinger-Friedman
Use Of An Alternative Natural Weed Suppressant: Effects Of Parboiled Rice Hull Mulch On The Growth Of Container Weeds, Amy R. Fields-Taylor, Vanessa Slinger-Friedman
The Kennesaw Journal of Undergraduate Research
The Chattahoochee Nature Center (CNC) is one of the leading educational centers in Georgia about the ecology of the Chattahoochee River. Due to lack of man power, keeping down the weeds in the CNC plant nursery is one of those tasks that often gets left undone. The nursery becomes overgrown with invasive weed species. Understandably, they must sometimes resort to the use of herbicides, such as Roundup®, to keep the hundreds of native and endangered species of plants housed at CNC from being choked out by invasive weeds. This study tests the ability to suppress weed growth by use of …
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
From The Editors, Herbert J. Mattord, Michael E. Whitman, Carole L. Hollingsworth
Journal of Cybersecurity Education, Research and Practice
No abstract provided.
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard K. Nilsen, Yair Levy, Steven R. Terrell Ph.D., Dawn Beyer
Journal of Cybersecurity Education, Research and Practice
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Social Media Risk Perceptions Of Human Resource Professionals: Issues Undergraduate Students Should Consider, Julio C. Rivera, Jack Howard, Samuel Goh, James L. Worrell, Paul Di Gangi
Journal of Cybersecurity Education, Research and Practice
This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Synergistic Security: A Work System Case Study Of The Target Breach, Martha Nanette Harrell
Journal of Cybersecurity Education, Research and Practice
Recent publicized security breaches can be used to evaluate information security programs. The processes and procedures that allowed the event to occur can be examined in a case study and then be used to find methods for future mitigation of risk. The Target security breach is used in this study to examine the organization’s information security program using a macro-ergonomic model. This research posits that an information security program should consider the work system design, based in macro-ergonomics, to help mitigate information security risk to the organization and ensure an efficient and effective information security program. Based on a seminal …
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
A Toolkit Approach To Information Security Awareness And Education, Peter Korovessis, Steven Furnell, Maria Papadaki, Paul Haskell-Dowland
Journal of Cybersecurity Education, Research and Practice
In today’s business environment where all operations are enabled by technology, information security has become an established discipline as more and more businesses realize its value. The human component has been recognized to have an important role in information security since the only way to reduce security risks is through making employees more information security aware. Towards this goal the research will appreciate the importance of information security awareness by illustrating the need for more effective user training. Further to that it proposes and develops an information security toolkit as a prototype awareness raising initiative. Apart from the elements of …
Search For Light Tetraquark States In Υ ( 1 S ) And Υ ( 2 S ) Decays, S. Jia Et Al., David Joffe, Ratnappuli L. Kulasiri
Search For Light Tetraquark States In Υ ( 1 S ) And Υ ( 2 S ) Decays, S. Jia Et Al., David Joffe, Ratnappuli L. Kulasiri
Faculty and Research Publications
We search for the JPC=0−− and 1+− light tetraquark states with masses up to 2.46 GeV/c2 in Υ(1S) and Υ(2S) decays with data samples of (102±2) million and (158±4) million events, respectively, collected with the Belle detector. No significant signals are observed in any of the studied production modes, and 90% credibility level (C.L.) upper limits on their branching fractions in Υ(1S)and Υ(2S) decays are obtained. The inclusive branching fractions of the Υ(1S) and Υ(2S) decays into final states with f1(1285) are measured to be B(Υ(1S)→f1(1285)+anything)=(46±28(stat)±13(syst))×10−4 and B(Υ(2S)→f1(1285)+anything)=(22±15(stat)±6.3(syst))×10−4. The measured χb2→J/ψ+anything branching fraction is measured to be (1.50±0.34(stat)±0.22(syst))×10−3, and 90% …
Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani
Feasibility Of Using Virtual Reality In Requirements Elicitation Process, Aman Bhimani
Master of Science in Software Engineering Theses
Contemporary Virtual Reality (VR) technologies offer an increasing number of functionalities including head-mounted displays (HMD), haptic and sound feedback, as well as motion tracking. This gives us the opportunity to leverage the immersive power offered by these technologies in the context of requirements elicitation, especially to surface those requirements that cannot be expressed via traditional techniques such as interviews and focus groups. The goal of this thesis is to survey uses of VR in requirements engineering, and to describe a method of elicitation using VR as a tool.
To validate the methodology, a research plan is developed with a strong …
Evidence For Isospin Violation And Measurement Of C P Asymmetries In B → K ∗ ( 892 ) Γ, T. Horiguchi Et Al., D. Joffe, Ratnappuli L. Kulasiri
Evidence For Isospin Violation And Measurement Of C P Asymmetries In B → K ∗ ( 892 ) Γ, T. Horiguchi Et Al., D. Joffe, Ratnappuli L. Kulasiri
Faculty and Research Publications
We report the first evidence for isospin violation in B→K∗γ and the first measurement of the difference of CP asymmetries between B+→K*+γ and B0→K*0γ. This analysis is based on the data sample containing 772×106B¯B pairs that was collected with the Belle detector at the KEKB energy-asymmetric e+e− collider. We find evidence for the isospin violation with a significance of 3.1σ, Δ0+=[+6.2±1.5(stat)±0.6(syst)±1.2(f+−/f00)]%, where the third uncertainty is due to the uncertainty on the fraction of B+B− to B0¯B0 production in Υ(4S) decays. The measured value is consistent with predictions of the standard model. The result for the difference of CP asymmetries …
Measurement Of The Decays B → Η ℓ Ν ℓ And B → Η ′ ℓ Ν ℓ In Fully Reconstructed Events At Belle, C. Beleño Et Al., D. Joffe, Ratnappuli L. Kulasiri
Measurement Of The Decays B → Η ℓ Ν ℓ And B → Η ′ ℓ Ν ℓ In Fully Reconstructed Events At Belle, C. Beleño Et Al., D. Joffe, Ratnappuli L. Kulasiri
Faculty and Research Publications
We report branching fraction measurements of the decays B+→ηℓ+νℓ and B+→η′ℓ+νℓ based on 711 fb−1 of data collected near the Υ(4S) resonance with the Belle experiment at the KEKB asymmetric-energy e+e− collider. This data sample contains 772 million B¯B events. One of the two Bmesons is fully reconstructed in a hadronic decay mode. Among the remaining (“signal-B”) daughters, we search for the η meson in two decay channels, η→γγ and η→π+π−π0, and reconstruct the η′meson in η′→ηπ+π− with subsequent decay of the η into γγ. Combining the two η modes and using an extended maximum likelihood, the B+→ηℓ+νℓ branching fraction …
Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder
Towards A Development Of A Social Engineering Exposure Index (Sexi) Using Publicly Available Personal Information, W. Shawn Wilkerson, Yair Levy, James Richard Kiper, Martha Snyder
KSU Proceedings on Cybersecurity Education, Research and Practice
Millions of people willingly expose their lives via Internet technologies every day, and even those who stay off the Internet find themselves exposed through data breaches. Trillions of private information records flow through the Internet. Marketers gather personal preferences to coerce shopping behavior, while providers gather personal information to provide enhanced services. Few users have considered where their information is going or who has access to it. Even fewer are aware of how decisions made in their own lives expose significant pieces of information, which can be used to harm the very organizations they are affiliated with by cyber attackers. …
A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi
A Comparison Of Personal Social Media Risk Perceptions Between Undergraduate Students And Human Resource Professionals, Julio C. Rivera, Jack Howard, Samuel Goh, James Worrell, Paul Di Gangi
KSU Proceedings on Cybersecurity Education, Research and Practice
This study contrasts the social media risk perceptions of undergraduate students, versus those of certified Human Resource professionals. Social media is widely used by most segments of the population, and particularly among the age group that includes most undergraduate students. Organizations hiring employees are increasingly examining job applicant's social media postings as part of the applicant screening process. In this study we examine how these groups differ in their perceptions of the risks inherent in using social media, and what these differences may mean for students seeking employment. Recommendations are made for raising undergraduate student awareness of these risks.
Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper
Experiments With Applying Artificial Immune System In Network Attack Detection, Alexis Cooper
KSU Proceedings on Cybersecurity Education, Research and Practice
The assurance of security within a network is difficult due to the variations of attacks. This research conducts various experiments to implement an Artificial Immune System based Intrusion Detection System to identify intrusions using the Negative Selection Algorithm. This research explores the implementation of an Artificial Immune System opposed to the industry standard of machine learning. Various experiments were conducted to identify a method to separate data to avoid false-positive results. The use of an Artificial Immune System requires a self and nonself classification to determine if an intrusion is present within the network. The results of an Artificial Immune …
Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock
Reducing Human Error In Cyber Security Using The Human Factors Analysis Classification System (Hfacs)., Tommy Pollock
KSU Proceedings on Cybersecurity Education, Research and Practice
For several decades, researchers have stated that human error is a significant cause of information security breaches, yet it still remains to be a major issue today. Quantifying the effects of security incidents is often a difficult task because studies often understate or overstate the costs involved. Human error has always been a cause of failure in many industries and professions that is overlooked or ignored as an inevitability. The problem with human error is further exacerbated by the fact that the systems that are set up to keep networks secure are managed by humans. There are several causes of …
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer
A Developmental Study On Assessing The Cybersecurity Competency Of Organizational Information System Users, Richard Nilsen, Yair Levy, Steven Terrell, Dawn Beyer
KSU Proceedings on Cybersecurity Education, Research and Practice
Organizational information system users (OISUs) that are open to cyber threats vectors are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, technical cybersecurity controls may be rendered useless due to a lack of cybersecurity competency of OISUs. The main goal of this research study was to propose and validate, using subject matter experts (SMEs), a reliable hands-on assessment prototype tool for measuring the knowledge, skills, and abilities (KSAs) that comprise the cybersecurity competency of an OISU. Primarily using the Delphi methodology, this study implemented four phases of data collection using cybersecurity SMEs for proposing and …
Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz
Voice Hacking Proof Of Concept: Using Smartphones To Spread Ransomware To Traditional Pcs, Leonardo I. Mazuran, Bryson R. Payne, Tamirat T. Abegaz
KSU Proceedings on Cybersecurity Education, Research and Practice
This paper presents a working proof of concept that demonstrates the ability to deploy a sequence of hacks, triggered by speaking a smartphone command, to launch ransomware and other destructive attacks against vulnerable Windows computers on any wireless network the phone connects to after the voice command is issued. Specifically, a spoken, broadcast, or pre-recorded voice command directs vulnerable Android smartphones or tablets to a malicious download page that compromises the Android device and uses it as a proxy to run software designed to scan the Android device’s local area network for Windows computers vulnerable to the EternalBlue exploit, spreading …
Security Device Roles, Vabrice Wilder
Security Device Roles, Vabrice Wilder
KSU Proceedings on Cybersecurity Education, Research and Practice
“An abstract of this article was published in the proceedings of the Conference on Cybersecurity Education, Research & Practice, 2017”. Communication has evolved since the beginning of mankind from smoke signals to drones to now the internet. In a world filled with technology the security of one’s device is not to be taken for granted. A series of research was done in order to gather details about network devices that can aid in the protection of one’s information while being transferred through the internet. The findings included but not limited to, switches, the seven layers of OSI, routers, firewalls, load …
Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline
Analyzing Http Requests For Web Intrusion Detection, Sara Althubiti, Xiaohong Yuan, Albert Esterline
KSU Proceedings on Cybersecurity Education, Research and Practice
Many web application security problems related to intrusion have resulted from the rapid development of web applications. To reduce the risk of web application problems, web application developers need to take measures to write secure applications to prevent known attacks. When such measures fail, it is important to detect such attacks and find the source of the attacks to reduce the estimated risks. Intrusion detection is one of the powerful techniques designed to identify and prevent harm to the system. Most defensive techniques in Web Intrusion Systems are not able to deal with the complexity of cyber-attacks in web applications. …
"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins
"Think Before You Click. Post. Type." Lessons Learned From Our University Cyber Secuity Awareness Campaign, Rachael Innocenzi, Kaylee Brown, Peggy Liggit, Samir Tout, Andrea Tanner, Theodore Coutilish, Rocky Jenkins
KSU Proceedings on Cybersecurity Education, Research and Practice
This article discusses the lessons learned after implementing a successful university-wide cyber security campaign. The Cyber Security Awareness Committee (CyberSAC), a group comprised of diverse units across campus, collaborated together on resources, talent, people, equipment, technology, and assessment practices to meet strategic goals for cyber safety and education. The project involves assessing student learning and behavior changes after participating in a Cyber Security Password Awareness event that was run as a year-long campaign targeting undergraduate students. The results have implications for planning and implementing university-wide initiatives in the field of cyber security, and more broadly, higher education at large.
Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang
Ssetgami: Secure Software Education Through Gamification, Hector Suarez, Hooper Kincannon, Li Yang
KSU Proceedings on Cybersecurity Education, Research and Practice
Since web browsers have become essential to accomplishing everyday tasks, developing secure web applications has become a priority in order to protect user data, corporate databases and critical infrastructure against cyber-crimes . This research presents a game-like (gamification) approach to teach key concepts and skills on how to develop secure web applications. Gamification draws on motivational models, one of psychological theories. Gamification design has great potential over traditional education where we often find students demotivated and lecturers failing to engage them in learning activities. This research created game-like learning modules to teach top vulnerabilities and countermeasures for these top vulnerabilities …
Search For Cp Violation And Measurement Of The Branching Fraction In The Decay D0 → K0 Sk0 S, N. Dash Et Al., D. Joffe, Ratnappuli L. Kulasiri
Search For Cp Violation And Measurement Of The Branching Fraction In The Decay D0 → K0 Sk0 S, N. Dash Et Al., D. Joffe, Ratnappuli L. Kulasiri
Faculty and Research Publications
We report a study of the decay D0→K0SK0S using 921 fb−1 of data collected at or near the Υ(4S) and Υ(5S) resonances with the Belle detector at the KEKB asymmetric energy e+e− collider. The measured time-integrated CP asymmetry is ACP(D0→K0SK0S)=(−0.02±1.53±0.02±0.17)%, and the branching fraction is B(D0→K0SK0S)=(1.321±0.023±0.036±0.044)×10−4, where the first uncertainty is statistical, the second is systematic, and the third is due to the normalization mode (D0→K0Sπ0). These results are significantly more precise than previous measurements available for this mode. The ACP measurement is consistent with the standard model expectation.
Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro
Accessibility And Usability Of Government Websites In Tanzania, Joel S. Mtebe, Aron W. Kondoro
The African Journal of Information Systems
The government of Tanzania has been embracing information systems specifically websites in order to widen access to government services, lower administrative costs, and to increase public participation in decision making. As a result, almost every ministry, department, and agency (MDA) has developed a website of different kind. However, the majority of existing websites were developed without sufficiently considering user needs which indicates that they do have some usability and accessibility problems. This study used SortSite tool to evaluate accessibility and usability of government websites taking a sample of 22 websites. The report from the SortSite tool was then checked against …
Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi
Systematic Analysis Of Enterprise Perception Towards Cloud Adoption In The African States: The Nigerian Perspective, George A. Oguntala, Prof. Raed A. Abd-Alhameed, Dr. Janet O. Odeyemi
The African Journal of Information Systems
The desirous benefits of cloud computing such as high return on investment through efficient resource management, high application throughput and on-demand capabilities have resulted in the unprecedented global acceptance of the computing paradigm. However, research on cloud adoption indicates that fewer organisations in the African states are adopting cloud services. Thus, the purview of the paper is to examine the factors responsible for the poor adoption of cloud computing in most African enterprises using Nigeria as a case study. The study focus on the perception of IT and non-IT employees towards cloud computing. Moreover, the paper reviews the literature on …
Human Energy Capstone
Activities
Movement is very important for humans. From our earliest days, we seem eager to get up and move around. The most celebrated moments of a child’s life seem to be geared around the ability to move: the first crawl, the first walk, the first bike ride, and (every parent’s nightmare) the first driver’s license. The ability to get around is one of the most cherished abilities and freedoms. For many Americans, our ability to get around when and how we want is almost considered a sacred right. Physics textbooks, which have many chapters devoted to motion, build a great many …
Efficiency
Activities
The previous two activities in this module have shown us the importance of conservation laws. These laws provide extra “tools” that allow us to analyze certain aspects of physical systems and to be able to predict the motion of objects in the systems without using more complicated analysis. Even in situations wherein we cannot exactly solve the motion, these laws are incredibly useful. For instance, if someone shows us an incredibly complicated device that can seemingly produce electricity with no energy input whatsoever, we know not to invest money in this device, as it must be a sham since it …
First Law Of Thermodynamics
Activities
In last week’s activity, we calculated the motion of objects by studying the forces on them. Using Newton’s Second Law of Motion, we were able to relate the forces on an object to the acceleration it experienced. The presence of constant forces led to constant accelerations, which corresponded to linearly-increasing velocities with respect to time. Comparisons made between the velocities we measured and those calculated from a study of the forces on the objects allowed us to validate Newton’s equation F = ma. In this week’s activity, we are going to investigate almost the same experimental setup as last week, …
Newton's Second Law
Activities
There are two ways to study the dynamics of a system in which there is motion. One of these is to study the kinematics of the system to see if there is any acceleration. If there is an acceleration, then this implies that there is a net force on some part of the system. If there is no acceleration, then this means that either there are no forces on the system, or that the forces within the system are all balanced. The other way to study the system is from an energy standpoint. Energy can flow from potential to kinetic, …
Population Growth
Activities
When George Washington started the first Presidency of the United States of America, he was governing less than 4 million people who occupied an area of 2,300,000 square kilometers. It was an agrarian society, with 95% of the population living on farms and only 5% in cities or towns of more than 2,500. There was plenty of land, and a vast array of natural resources, just waiting to be tapped. Today, we live in a country of over 294 million people. While we are one of the major food producers in the world, it is no longer due to us …