Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Valparaiso University

Theses/Dissertations

Discipline
Keyword
Publication Year
Publication

Articles 1 - 12 of 12

Full-Text Articles in Physical Sciences and Mathematics

Battery Application Of Silver Molybdate Materials, Brendan Michael Godsel Apr 2020

Battery Application Of Silver Molybdate Materials, Brendan Michael Godsel

Undergraduate Honors Papers

As the demand for renewable energy grows, the investigation of potential battery materials continues to progress hastily. Many devices and machines of present day are operated by battery technology, and their energy requirements warrant which kinds of batteries will power them. The battery in a phone requires hundreds, possibly thousands, of uses and needs to be able to recharge quickly. The battery in the implantable cardiac defibrillator (ICD), the battery by which this product was inspired, is only used once, but it must last years before it is replaced. The cathode of the ICD battery is comprised of a silver …


The Negotiator's Role In A Buyer-Seller Game, Joseph Gaudy Dec 2019

The Negotiator's Role In A Buyer-Seller Game, Joseph Gaudy

Graduate Theses and Capstone Projects (excluding DNP)

In game theory, buyer-seller games rarely utilize a negotiating third party. Any negotiations are typically conducted by the buyer and seller. This study, motivated by the real estate market, uses sequentially and simultaneously played game models to explore the influence a self-interested, negotiating, third party has on player payoffs. For the sequential model, a game tree is utilized to demonstrate player actions, preferences, and outcomes. The weak sequential equilibrium is calculated using Gambit[1] and shows optimality in player payoffs to exist when the seller’s and realtor’s strategies align according to the current market. For the simultaneous model, expected payoff functions …


Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki Jan 2018

Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki

Cyber Security Capstone Research Project Reports

According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise won’t improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.

A …


Measurement Of The Longitudinal Double-Spin Asymmetry For Neutral Pion Production In Polarized Proton Collisions At √S = 510 Gev, Taegyun Kim May 2017

Measurement Of The Longitudinal Double-Spin Asymmetry For Neutral Pion Production In Polarized Proton Collisions At √S = 510 Gev, Taegyun Kim

Physics & Astronomy Honors Papers

Beyond the valence quarks' spin contribution to the total spin of a proton, gluon and sea quark contributions are becoming clear as well. For proton+proton collisions at a center of mass energy of 510 GeV , neutral pion production is dominated by gluon-gluon and gluon-quark scattering. An avenue to constrain the gluon polarization is the asymmetry, ALL, in the production of neutral pions from collisions of longitudinally spin-polarized proton beams. Our experiment was performed with the STAR detector at the Relativistic Heavy Ion Collider (RHIC), unique for its ability to collide spin-polarized proton beams. The Endcap Electromagnetic Calorimeter …


Mutagenic And Spectroscopic Investigation Of Ph Dependent Cooa Dna Binding, Brian R. Weaver Apr 2017

Mutagenic And Spectroscopic Investigation Of Ph Dependent Cooa Dna Binding, Brian R. Weaver

Chemistry Honors Papers

The carbon monoxide (CO) sensing heme protein, CooA, is a transcription factor which exists in several bacteria that utilize CO as an energy source. CooA positively regulates the expression of coo genes in the presence of CO such that the corresponding proteins may metabolize CO. The present studies have yielded the unexpected result that Fe(III) CooA binds DNA tightly at pH < 7, deviating from all previously reported work which indicate that CooA DNA binding is initiated only when the exogenous CO effector reacts with the Fe(II) CooA heme. This observation suggests that the disruption of one or more salt bridges upon effector binding may be a critical feature of the normal CooA activation mechanism. To test this possibility, several protein variants that eliminated a selected salt bridge for the CooA homolog from Rhodospirillum rubrum were prepared via site-directed mutagenesis. Samples of these variant proteins, which were overexpressed in Escherichia coli, were then characterized by spectroscopic methods and functional assays to investigate the impact these mutations had on CooA heme coordination …


A Simulation Of Anthropogenic Mammoth Extinction, Matthew Klapman Apr 2017

A Simulation Of Anthropogenic Mammoth Extinction, Matthew Klapman

Undergraduate Honors Papers

There are multiple hypotheses as to why the Columbian Mammoth (Mammuthus columbi) and other megafauna in North America went extinct relatively recently and relatively quickly. The most popular of which are disease, climate change, meteorite strikes, and over hunting by humans [2, 9]. There is evidence to show that a combination of factors contributed to the megafaunal extinction, but ”overkill” explores the idea that early humans migrated onto the continent and then hunted the mammoths and other megafauna to extinction. The overkill hypothesis was first proposed by anthropologist Paul Martin in 1973 [8]. Evidence from radiocarbon dating shows that the …


Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan Dec 2016

Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan

Information Technology Capstone Research Project Reports

The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …


Ransomware In High-Risk Environments, Shallaw M. Aziz Dec 2016

Ransomware In High-Risk Environments, Shallaw M. Aziz

Information Technology Capstone Research Project Reports

In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms …


Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi May 2016

Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi

Information Technology Master Theses

The term electronic government (also called e-government, or eGov) refers to multidisciplinary projects that are complex in nature. Since the beginning of the Internet revolution many countries have adopted e-government as a step toward enhancing the delivery of public or governmental services to citizens by what are called e-services. A typical request for a service is initiated and passes through an electronic service (“e-service”) portal, or a front office. The term front office application usually system can be defined as designates software seen and used directly by an end user. This software provides the capabilities needed to collect the user …


Enterprise Network Design And Implementation For Airports, Ashraf H. Ali Apr 2016

Enterprise Network Design And Implementation For Airports, Ashraf H. Ali

Information Technology Master Theses

The aim of this project was airports network design and implementation and the introduction of a suitable network for most airports around the world. The following project focused on three main parts: security, quality, and safety. The project has been provided with different utilities to introduce a network with a high security level for the airport. These utilities are hardware firewalls, an IP access control list, Mac address port security, a domain server and s proxy server. All of these utilities have been configured to provide a secure environment for the entire network and to prevent hackers from entering sensitive …


Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali Apr 2016

Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali

Information Technology Master Theses

In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …


Solar Thermal Decoupled Electrolysis: Reaction Mechanism Of Electrochemical Oxidation Of Coo/Co(Oh)2, William Prusinski Apr 2016

Solar Thermal Decoupled Electrolysis: Reaction Mechanism Of Electrochemical Oxidation Of Coo/Co(Oh)2, William Prusinski

Chemistry Honors Papers

A modified water electrolysis process has been developed to produce H2. The electrolysis cell oxidizes CoO to CoOOH and Co3O4 at the anode to decrease the amount of electric work needed to reduce water to H2. The reaction mechanism through which CoO becomes oxidized was investigated, and it was observed that the electron transfer occurred through both a species present in solution and a species adsorbed to the electrode surface. A preliminary mathematical model was established based only on the electron transfer to species in solution, and several kinetic parameters of the reaction were calculated. The average value of each …