Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Physical Sciences and Mathematics

Malware Detection And Analysis, Namratha Suraneni Dec 2022

Malware Detection And Analysis, Namratha Suraneni

Culminating Experience Projects

Malicious software poses a serious threat to the cybersecurity of network infrastructures and is a global pandemic in the form of computer viruses, Trojan horses, and Internet worms. Studies imply that the effects of malware are deteriorating. The main defense against malware is malware detectors. The methods that such a detector employ define its level of quality. Therefore, it is crucial that we research malware detection methods and comprehend their advantages and disadvantages. Attackers are creating malware that is polymorphic and metamorphic and has the capacity to modify their source code as they spread. Furthermore, existing defenses, which often utilize …


Soil From Footwear Is A Newly Rediscovered Type Of Forensic Evidence Due To The Application Of Modern Analytical Techniques : A Review, Rhilynn Haley Ogilvie Dec 2022

Soil From Footwear Is A Newly Rediscovered Type Of Forensic Evidence Due To The Application Of Modern Analytical Techniques : A Review, Rhilynn Haley Ogilvie

Legacy Theses & Dissertations (2009 - 2024)

Traces of soil discovered on a footwear were historically among the first types of evidence used by crime scene investigators. This type of evidence has been rediscovered recently due to the application of powerful analytical techniques providing quantitative characteristics of the soil (bio)chemical composition. Advanced statistical analysis of the quantitative data further improves the probative value of the soil evidence. The article overview main aspects of the emerging techniques for the forensic soil analysis and the factors that challenge data interpretation including mixing, contamination, and composition complexity. Overcoming these issues is crucial for utilizing soil analysis for forensic purposes.


Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht Dec 2022

Obstacles In Learning Algorithm Run-Time Complexity Analysis, Bailey Licht

Theses/Capstones/Creative Projects

Algorithm run-time complexity analysis is an important topic in data structures and algorithms courses, but it is also a topic that many students struggle with. Commonly cited difficulties include the necessary mathematical background knowledge, the abstract nature of the topic, and the presentation style of the material. Analyzing the subject of algorithm analysis using multiple learning theories shows that course materials often leave out key steps in the learning process and neglect certain learning styles. Students can be more successful at learning algorithm run-time complexity analysis if these missing stages and learning styles are addressed.


Statistical Analyses Of Hemp Cannabinoid Test Results, Rachel J. Stegmeier May 2022

Statistical Analyses Of Hemp Cannabinoid Test Results, Rachel J. Stegmeier

Senior Honors Projects, 2020-current

Cannabis sativa L. is a flowering plant used for recreational and industrial purposes that produces a class of compounds called cannabinoids. Industrial hemp is a strain of Cannabis sativa L. that has been propagated to have a low Δ 9 tetrahydrocannabinol (Δ9THC) and a high cannabidiol (CBD) content. With recent advancements in legislation, farms are now growing hemp for fiber, CBD production and other hemp derived product purposes but crops risk being destroyed if THC content levels exceed the current maximum legal limit of 0.3%. For the present study hemp samples were dried, ground, extracted with various alcohols, …


Positive Solutions To Semilinear Elliptic Equations With Logistic-Type Nonlinearities And Harvesting In Exterior Domains, Eric Jameson May 2022

Positive Solutions To Semilinear Elliptic Equations With Logistic-Type Nonlinearities And Harvesting In Exterior Domains, Eric Jameson

UNLV Theses, Dissertations, Professional Papers, and Capstones

Existing results provide the existence of positive solutions to a class of semilinear elliptic PDEs with logistic-type nonlinearities and harvesting terms both in RN and in bounded domains U ⊂ RN with N ≥ 3, when the carrying capacity of the environment is not constant. We consider these same equations in the exterior domain Ω, defined as the complement of the closed unit ball in RN , N ≥ 3, now with a Dirichlet boundary condition. We first show that the existing techniques forsolving these equations in the whole space RN can be applied to the exterior domain with some …


Multi Elemental Analysis Of Cannabis Oil Based Products Using Icpms And Microwave Assisted Digestion., Kevin Trevon Marchbanks-Owens May 2022

Multi Elemental Analysis Of Cannabis Oil Based Products Using Icpms And Microwave Assisted Digestion., Kevin Trevon Marchbanks-Owens

Theses (2016-Present)

Due to the presence of CBD-(cannabidiol), bioavailable elements as well as industry versatility and relatively low levels of toxicity to the environment. CBD oils have driven the overall demand for Cannabis based plant products in the commercial and medical sector. However, dependent upon the environmental circumstances upon which these plants are grown can leave them susceptible to toxic heavy metal exposure. In fact, the natural metabolism of Cannabis plants makes them a hyperaccumulator of trace metals. This creates a severe health risk for CBD product consumers especially for more vulnerable populations with pre-existing conditions. Furthermore, the risk of heavy metal …


Error Terms For The Trapezoid, Midpoint, And Simpson's Rules, Jessica E. Coen May 2022

Error Terms For The Trapezoid, Midpoint, And Simpson's Rules, Jessica E. Coen

Electronic Theses, Projects, and Dissertations

When it is not possible to integrate a function we resort to Numerical Integration. For example the ubiquitous Normal curve tables are obtained using Numerical Integration. The antiderivative of the defining function for the normal curve involves the formula for antiderivative of e-x^2 which can't be expressed in the terms of basic functions.

Simpson's rule is studied in most Calculus books, and in all undergraduate Numerical Analysis books, but proofs are not provided. Hence if one is interested in a proof of Simpson's rule, either it can be found in advanced Numerical Analysis books as a special case …


Data Acquisition, Analysis And Simulations For The Fermilab Muon G−2 Experiment, Fang Han Jan 2022

Data Acquisition, Analysis And Simulations For The Fermilab Muon G−2 Experiment, Fang Han

Theses and Dissertations--Physics and Astronomy

The goal of the new Muon g-2 E989 experiment at Fermi National Accelerator Laboratory (FNAL) is a precise measurement of the muon anomalous magnetic moment, aμ ≡ (g-2)/2. The previous BNL experiment measured the anomaly aμ(BNL) with an uncertainty of 0.54 parts per million (ppm). The discrepancy between the current standard model calculation of the aμ(SM) and the previous measurement aμ(BNL) is over 3σ. The FNAL Muon g-2 experiment aims at increasing the precision to 140 parts per billion (ppb) to resolve the discrepancy between the theoretical …


Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer Jan 2022

Evaluating Similarity Of Cross-Architecture Basic Blocks, Elijah L. Meyer

Browse all Theses and Dissertations

Vulnerabilities in source code can be compiled for multiple processor architectures and make their way into several different devices. Security researchers frequently have no way to obtain this source code to analyze for vulnerabilities. Therefore, the ability to effectively analyze binary code is essential. Similarity detection is one facet of binary code analysis. Because source code can be compiled for different architectures, the need can arise for detecting code similarity across architectures. This need is especially apparent when analyzing firmware from embedded computing environments such as Internet of Things devices, where the processor architecture is dependent on the product and …


Inverse Boundary Value Problems For Polyharmonic Operators With Non-Smooth Coefficients, Landon Gauthier Jan 2022

Inverse Boundary Value Problems For Polyharmonic Operators With Non-Smooth Coefficients, Landon Gauthier

Theses and Dissertations--Mathematics

We consider inverse boundary problems for polyharmonic operators and in particular, the problem of recovering the coefficients of terms up to order one. The main interest of our result is that it further relaxes the regularity required to establish uniqueness. The proof relies on an averaging technique introduced by Haberman and Tataru for the study of an inverse boundary value problem for a second order operator.