Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2018

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 13287

Full-Text Articles in Physical Sciences and Mathematics

Undergraduate Bulletin, 2019-2020, Minnesota State University Moorhead Dec 2018

Undergraduate Bulletin, 2019-2020, Minnesota State University Moorhead

Undergraduate Bulletins (Catalogs)

No abstract provided.


Gerrymandering And The Impossibility Of Fair Districting Systems, Danielle Degutz Dec 2018

Gerrymandering And The Impossibility Of Fair Districting Systems, Danielle Degutz

Senior Projects Spring 2019

Voting district boundaries are often manipulated, or gerrymandered, by politicians in order to give one group of voters an unfair advantage over another during elections. To make sure a system of voting districts is not gerrymandered, the population size, the shape, and the voting efficiency of each party in each district should be taken into consideration. Following recent work of Boris Alexeev and Dustin G. Mixon, we discuss mathematical criteria for each of these three aspects, and we prove how problems arise when attempting to apply all three at once to a districting system--first to a simplified districting system and …


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Mechanism For Copper(Ii)-Mediated Disaggregation Of A Porphyrin J-Aggregate, M. Trapani, I. G. Occhiuto, R. Zagami, G. De Luca, M. A. Castriciano, A. Romeo, L. M. Scolaro, Robert F. Pasternack Dec 2018

Mechanism For Copper(Ii)-Mediated Disaggregation Of A Porphyrin J-Aggregate, M. Trapani, I. G. Occhiuto, R. Zagami, G. De Luca, M. A. Castriciano, A. Romeo, L. M. Scolaro, Robert F. Pasternack

Chemistry & Biochemistry Faculty Works

J-aggregates of anionic meso-tetrakis(4-sulfonatophenyl)porphyrin form at intermediate pH (2.3–3.1) in the presence of NiSO₄ or ZnSO₄ (ionic strength, I.S. = 3.2 M). These aggregates convert to monomeric porphyrin units via metallation with copper(II) ions. The kinetics for the disassembly process, as monitored by UV/vis spectroscopy, exhibits zeroth-order behavior. The observed zeroth-order rate constants show a two-term dependence on copper(II) ion concentrations: linear and second order. Also observed is an inverse dependence on hydrogen ion concentration. Activation parameters have been determined for the disassembly process leading to ΔH^≠ = (+163 ± 15) kJ·mol⁻¹ and ΔS^≠ = (+136 ± 11) J·K⁻¹. A …


Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Masthead Dec 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Dec 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Domain Decomposition Methods For The Solution Of Multiple Scattering Problems, Michael Pedneault Dec 2018

Domain Decomposition Methods For The Solution Of Multiple Scattering Problems, Michael Pedneault

Dissertations

This presents a Schur complement Domain Decomposition (DD) algorithm for the solution of frequency domain multiple scattering problems. Just as in the classical DD methods,(1) the ensemble of scatterers is enclosed in a domain bounded by an artificial boundary, (2) this domain is subdivided into a collection of nonoverlapping subdomains so that the boundaries of the subdomains do not intersect any of the scatterers, and (3) the solutions of the subproblems are connected via Robin boundary conditions matching on the common interfaces between subdomains. Subdomain Robin-to-Robin maps are used to recast the DD problem as a sparse linear system whose …


Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Methods To Improve The Remediation Of Polycyclic Aromatic Hydrocarbons (Pahs) In Aerobic And Anaerobic Environments, Brian Wartell Dec 2018

Methods To Improve The Remediation Of Polycyclic Aromatic Hydrocarbons (Pahs) In Aerobic And Anaerobic Environments, Brian Wartell

Dissertations

Oil spills occur regularly in terrestrial environments and crude oil can contain many compounds that are highly resistant to degradation. Among these compounds are high levels of polycyclic aromatic hydrocarbons (PAHs) which are not only toxic but can also be carcinogenic and/or mutagenic. The first chapter of this dissertation includes an extensive review chapter on the variables affecting the anaerobic degradation of hydrocarbons, with a particular focus on PAHs. Electron acceptors, electron donors, temperature, salinity, pH all play key roles in determining the possibility effective of effective degradation occurring. Thus, by addressing solutions, such as biostimulation, improving environmental variables for …


High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak Dec 2018

High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak

Dissertations

The demand for high-speed Internet access for vehicles, such as high-speed trains (HSTs) and cars, is on the rise. Several Internet access technologies that use radio frequency are being considered for vehicular networking. Radio-frequency communications technologies cannot provide high data rates due to interference, bandwidth limitations, and the inherent limited data rates of radio technology. Free-space optical communications (FSOC) is an alternative approach and a line-of-sight (LOS) technology that uses modulated light to transfer data between two free-space optical (FSO) transceivers. FSOC systems for vehicular networks are expected to provide data rates in the range of Gbps for stationary and …


Fwer Controlling Procedures In Simultaneous And Selective Inference, Li Yu Dec 2018

Fwer Controlling Procedures In Simultaneous And Selective Inference, Li Yu

Dissertations

With increasing complexity of research objectives in clinical trials, a variety of relatively complex and less intuitive multiple testing procedures (MTPs) have been developed and applied in clinical data analysis. In order to make testing strategies more explicit and intuitive to communicate with non-statisticians, several flexible and powerful graphical approaches have recently been introduced in the literature for developing and visualizing newer MTPs. Nevertheless, some theoretical as well as methodological issues still remain to be fully addressed. This dissertation addresses several important issues arising in graphical approaches and related selective inference problems. It consists of three parts.

In the first …


Functionalized Carbon Nanotubes In Hydrophobic Drug Delivery, Kun Chen Dec 2018

Functionalized Carbon Nanotubes In Hydrophobic Drug Delivery, Kun Chen

Dissertations

The direct incorporation of carboxylated carbon nanotubes (f-CNTs) into hydrophobic drug particles during their formation via anti-solvent precipitation is presented. The approach is tested using two drugs namely antifungal agent Griseofulvin (GF) and antibiotic Sulfamethoxazole (SMZ) that have very different aqueous solubility. It is observed that the f-CNTs dispersed in the water serve as nucleating sites for crystallization and are readily incorporated into the drug particles without altering crystal structure or other properties. The results show that the hydrophilic f-CNTs dramatically enhance dissolution rate for both drugs. The increased degree of functionalization leads to higher hydrophilicity and therefore faster dissolution …


Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao Dec 2018

Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao

Dissertations

Nowadays, with the growing availability of large-scale genomic datasets and advanced computational techniques, more and more data-driven computational methods have been developed to analyze genomic data and help to solve incompletely understood biological problems. Among them, deep learning methods, have been proposed to automatically learn and recognize the functional activity of DNA sequences from genomics data. Techniques for efficient mining genomic sequence pattern will help to improve our understanding of gene regulation, and thus accelerate our progress toward using personal genomes in medicine.

This dissertation focuses on the development of deep learning methods for mining genomic sequences. First, we compare …


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Table Of Contents Dec 2018

Table Of Contents

Journal of the South Carolina Academy of Science

No abstract provided.


Polya Db3: A Database Cataloging Polyadenation Sites(Pas) Across Different Species And Their Conservation, Ram Mohan Nambiar Dec 2018

Polya Db3: A Database Cataloging Polyadenation Sites(Pas) Across Different Species And Their Conservation, Ram Mohan Nambiar

Theses

Polyadenation is an important process occurring in the messenger RNA that involves cleavage of 3 end nascent mRNAs and addition of poly(A) tails. For this thesis,I present PolyA DB3 ,a database cataloging cleavage and polyadenylation sites (PASs) in several genomes specifically for human,mouse,rat and chicken. This database is based on deep sequencing data. PASs are mapped by the 3’ region extraction and deep sequencing (3’READS) method, ensuring unequivocal PAS identification. Large volume of data based on diverse biological samples is used to increase PAS coverage and provide PAS usage information. Strand-specific RNA-seq data were used to extend annotated 3’ ends …


Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno Dec 2018

Alat Ukur Berat Badan, Tinggi Badan Dan Suhu Badan Di Posyandu Berbasis Android, Tri Hamdani Agung Cahyono, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Perkembangan ilmu pengetahuan dan teknologi semakin meningkat terutama di bidang elektronika. Hal tersebut menginspirasi peneliti untuk membuat alat yang bersifat ekonomis dan efisien, sehingga mempunyai fungsi utama yaitu untuk mempermudah suatu pekerjaan kader posyandu. Sistem Alat ukur berat badan, tinggi badan dan suhu badan di posyandu berbasis android merupakan pengembangan dari peneliti sebelumnya yang didukung dengan tampilan data angka yang muncul di android untuk mempermudah kader posyandu dalam melihat atau mengamati data angka pada bayi di posyandu. Perancangan alat terdiri dari arduino uno sebagai pengolah data, sensor load cell (berat), sensor ultrasonik (tinggi) dan sensor ds18b20 (suhu) kemudian data angka …


Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail Dec 2018

Video Moving Surveillance Yang Terintegrasi Youtube Menggunakan Raspberry Pi 3, Pipit Utami, Abdul Aziz Sidiq Tri Putra, Djoko Santoso, Nuryake Fajaryati, Bonita Destiana, Mohd Erfy Ismail

Elinvo (Electronics, Informatics, and Vocational Education)

Static CCTV facilities in class need to be optimized in classroom learning, especially in recording learning activities as implementation of learning in the 21st century and strategic steps to face the Industrial Revolution 4.0. Educators need to play a role in utilizing CCTV in learning. This article presents the development of YouTube Integrated Video Moving Surveillance devices using Raspberry Pi 3. The development stages consist of analysis, design, development and evaluation. The analysis shows that: (1) the limitations of CCTV motion are followed up with the addition of motorcycles; (2) limited access to video recording data is followed up by …


Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko Dec 2018

Perancangan Strategis Sistem Informasi Di Smk Diponegoro 1 Jakarta, Iwan Supriyantoko

Elinvo (Electronics, Informatics, and Vocational Education)

SMK Diponegoro 1 Jakarta merupakan lembaga pendidikan pada Yayasan Al-Hidayah Jakarta yang berada di Jakarta Timur. Sebagai lembaga pendidikan yang tergolong lama, SMK Diponegoro 1 Jakarta berkembang dengan pesat, namum belum menerapkan Sistem Informasi dan Teknologi Informasi secara optimal dalam proses bisnisnya dan belum memiliki sebuah portofolio perencanaan strategis Sistem Informasi. Sehingga dipandang perlu dalam membuat sebuah sistem informasi strategis, guna memberikan unggulan dalam persaingan bisnisnya. Perencanaan strategis sistem informasi menjadi salah satu kunci dalam menerapkan sistem informasi dan teknologi informasi pada kegiatan bisnis. Perencanaan strategis yang tepat dapat mendukung rencana dan pengembangan bisnis organisasi. Bentuk perencanaan strategis yang akan …


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …


Characterization Of A Protozoan Phosducin-Like Protein-3 (Phlp-3) Reveals Conserved Redox Activity, Rachel L. Kooistra, Robin David, Ana C. Ruiz, Sean W. Powers, Kyle J. Haselton, Kaitlyn Kiernan, Andrew M. Blagborough, Ken W. Olsen, Catherine Putonti, Stefan M. Kanzok Dec 2018

Characterization Of A Protozoan Phosducin-Like Protein-3 (Phlp-3) Reveals Conserved Redox Activity, Rachel L. Kooistra, Robin David, Ana C. Ruiz, Sean W. Powers, Kyle J. Haselton, Kaitlyn Kiernan, Andrew M. Blagborough, Ken W. Olsen, Catherine Putonti, Stefan M. Kanzok

Chemistry: Faculty Publications and Other Works

We recently identified three novel thioredoxin-like genes in the genome of the protozoan parasite Plasmodium that belong to the Phosducin-like family of proteins (PhLP). PhLPs are small cytosolic proteins hypothesized to function in G-protein signaling and protein folding. Although PhLPs are highly conserved in eukaryotes from yeast to mammals, only a few representatives have been experimentally characterized to date. In addition, while PhLPs contain a thioredoxin domain, they lack a CXXC motif, a strong indicator for redox activity, and it is unclear whether members of the PhLP family are enzymatically active. Here, we describe PbPhLP-3 as the first phosducin-like protein …


Development Of Flexible Nickel-Zinc And Nickel-Iron Batteries, Xianyang Meng Dec 2018

Development Of Flexible Nickel-Zinc And Nickel-Iron Batteries, Xianyang Meng

Dissertations

The fabrication of flexible nickel-zinc batteries using a facile mixing of electroactive components for electrode preparation is presented. Polytetrafluoroethylene (PTFE) is found to be an effective binder by reducing concentration polarization, providing chemical/physical stability and enhancing flexibility. The zinc electrode containing PTFE maintains its original porous morphology even after hundreds of cycles while polymers such as PEO show morphology change. Each component, as well as the assembled flexible cells show desired flexibility and stability even under bending conditions.

The fabrication of flexible nickel-iron batteries using printable composite electrodes embedded with multiwalled carbon nanotubes (CNT) is also presented. All the metal …


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno Dec 2018

Rancang Bangun Lampu Penerangan Jalan Umum (Pju) Menggunakan Solar Panel Berbasis Android (Aplikasi Di Jalan Parkiran Kampus 2 Umsida), Sugik Rizky Hikmawan, Eko Agus Suprayitno

Elinvo (Electronics, Informatics, and Vocational Education)

Data from the Directorate General of Electricity and Energy Development in 1997, the installed capacity of solar electricity in Indonesia reaches 0.88 MW from the available potential of 1.2 x 109 MW. Therefore, this research is made of solar street based lighting design (PJU) as alternative energy that cheap and economical. The work system on the street lighting lighting (PJU) is controlled by an Arduino microcontroller. And use solar panel as source of voltage and light sensor. The light sensor will work and read the intensity of sunlight. During the day the sensor provides input to the arduino so that …


Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia Dec 2018

Swot Analysis And Tows Matrix E-Government On Tana Tidung City Of Kalimantan Utara, Rudy Rudy, Abdul Muis Prasetia

Elinvo (Electronics, Informatics, and Vocational Education)

ABSTRAct

Information and Communication Technology (ICT) can improve the speed of information delivery, efficiency, global reach and transparency. One of the efforts to realize good corporate governance (GCG) governance in the era of regional autonomy is to use information and communication technology or popularly called e-Government. The implementation of e-Government the need for master plan information technology as a guide in the integration of information technology in Local Government, e-Government implementation is expected to help improve interaction between government, community and business, so as to encourage political and economic development. In this paper presents the determination of e-Government policy strategy …