Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Delineation Of Mass Movement Prone Areas By Landsat 7 And Digitial Image Processing, Shiloh Marie Howland Dec 2003

Delineation Of Mass Movement Prone Areas By Landsat 7 And Digitial Image Processing, Shiloh Marie Howland

Theses and Dissertations

The problem of whether Landsat 7 data could be used to delineate areas prone to mass movement, particularly debris flows and landslides, was examined using three techniques: change detection in NDVI (Normalized Difference Vegetation Index), change detection in band 5, and the tasseled cap transformation. These techniques were applied to areas that had recently experienced mass movement: Layton, Davis County and Alpine, Spanish Fork Canyon and Santaquin, Utah County. No distinctive spectral characteristics were found with any of these techniques with two possible explanations: 1. That despite improved spatial resolution in Landat 7 over its predecessors and improved digital image …


Schema Matching And Data Extraction Over Html Tables, Cui Tao Sep 2003

Schema Matching And Data Extraction Over Html Tables, Cui Tao

Theses and Dissertations

Data on the Web in HTML tables is mostly structured, but we usually do not know the structure in advance. Thus, we cannot directly query for data of interest. We propose a solution to this problem for the case of mostly structured data in the form of HTML tables, based on document-independent extraction ontologies. The solution entails elements of table location and table understanding, data integration, and wrapper creation. Table location and understanding allows us to locate the table of interest, recognize attributes and values, pair attributes with values, and form records. Data-integration techniques allow us to match source records …


Multienergetic External-Beam Pixe As A Means Of Stydying The Surface Enrichment Effect In Coins, Scott Evans Perry Jul 2003

Multienergetic External-Beam Pixe As A Means Of Stydying The Surface Enrichment Effect In Coins, Scott Evans Perry

Theses and Dissertations

This thesis paper examines the feasibility of using external-beam PIXE to study the surface enrichment effect in metal artifacts. By varying the energy of the incident proton beam, we penetrated the artifact's surface to different levels and were able to produce a depth profile of the elemental composition of the sample. In this study, the sample set we chose to examine consisted of ancient and modern coins. This paper first describes the surface enrichment effect and theoretically how PIXE can be used to study it. It then details the construction of the components of the external-beam setup. Many of the …


Iteration Methods For Approximating The Lowest Order Energy Eigenstate Of A Given Symmetry For One- And Two-Dimensional Systems, Chad Everett Junkermeier Jun 2003

Iteration Methods For Approximating The Lowest Order Energy Eigenstate Of A Given Symmetry For One- And Two-Dimensional Systems, Chad Everett Junkermeier

Theses and Dissertations

Using the idea that a quantum mechanical system drops to its ground state as its temperature goes to absolute zero several operators are devised to enable the approximation of the lowest order energy eigenstate of a given symmetry; as well as an approximation to the energy eigenvalue of the same order.


Protecting Sensitive Credential Content During Trust Negotiation, Ryan D. Jarvis Apr 2003

Protecting Sensitive Credential Content During Trust Negotiation, Ryan D. Jarvis

Theses and Dissertations

Keeping sensitive information private in a public world is a common concern to users of digital credentials. A digital credential may contain sensitive attributes certifying characteristics about its owner. X.509v3, the most widely used certificate standard, includes support for certificate extensions that make it possible to bind multiple attributes to a public key contained in the certificate. This feature, although convenient, potentially exploits the certificate holder's private information contained in the certificate. There are currently no privacy considerations in place to protect the disclosure of attributes in a certificate. This thesis focuses on protecting sensitive credential content during trust negotiation …


Sandwich Theorem And Calculation Of The Theta Function For Several Graphs, Marcia Ling Riddle Mar 2003

Sandwich Theorem And Calculation Of The Theta Function For Several Graphs, Marcia Ling Riddle

Theses and Dissertations

This paper includes some basic ideas about the computation of a function theta(G), the theta number of a graph G, which is known as the Lovasz number of G. theta(G^c) lies between two hard-to-compute graph numbers omega(G), the size of the largest lique in a graph G, and chi(G), the minimum number of colors need to properly color the vertices of G. Lovasz and Grotschel called this the "Sandwich Theorem". Donald E. Knuth gives four additional definitions of theta, theta_1, theta_2, theta_3, theta_4 and proves that they are all equal.

First I am going to describe the proof of the …


Ontology-Based Extraction Of Rdf Data From The World Wide Web, Timothy Adam Chartrand Mar 2003

Ontology-Based Extraction Of Rdf Data From The World Wide Web, Timothy Adam Chartrand

Theses and Dissertations

The simplicity and proliferation of the World Wide Web (WWW) has taken the availability of information to an unprecedented level. The next generation of the Web, the Semantic Web, seeks to make information more usable by machines by introducing a more rigorous structure based on ontologies. One hinderance to the Semantic Web is the lack of existing semantically marked-up data. Until there is a critical mass of Semantic Web data, few people will develop and use Semantic Web applications. This project helps promote the Semantic Web by providing content. We apply existing information-extraction techniques, in particular, the BYU ontologybased data-extraction …


Bounding The Number Of Graphs Containing Very Long Induced Paths, Steven Kay Butler Feb 2003

Bounding The Number Of Graphs Containing Very Long Induced Paths, Steven Kay Butler

Theses and Dissertations

Induced graphs are used to describe the structure of a graph, one such type of induced graph that has been studied are long paths.

In this thesis we show a way to represent such graphs in terms of an array with two colors and a labeled graph. Using this representation and the techniques of Polya counting we will then be able to get upper and lower bounds for graphs containing a long path as an induced subgraph.

In particular, if we let P(n,k) be the number of graphs on n+k vertices which contains P_n, a path on n vertices, as …


Determination Of Home Techniques For Storing And Conserving Food In The Homes Of Cuambo And La Rinconada In Imbabura Province, 2001-2002, Marisol Caicedo Barrios Jan 2003

Determination Of Home Techniques For Storing And Conserving Food In The Homes Of Cuambo And La Rinconada In Imbabura Province, 2001-2002, Marisol Caicedo Barrios

Theses and Dissertations

In Ecuador, there is a grave socioeconomic nutritional problem, and it is seen clearest in Imbabura province in the communities of Cuambo and La Rinconada. One of the biggest problems is inadequate food, due principally to the poor food storage and conservation habits. Considering this problem, it is necessary to deepen the knowledge of improved traditional techniques for storing and conserving food, through which families can store and manage their product better, controlling and avoiding losses due to insects, rodents, and climate, and guaranteeing conservation of the same. The investigation was oriented to implement alternative, improved storage and conservation technologies …