Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Kennesaw State University

2006

Discipline
Keyword
Publication
Publication Type

Articles 1 - 19 of 19

Full-Text Articles in Physical Sciences and Mathematics

Single Top Quark Production At The Fermilab Tevatron: Threshold Resummation And Finite-Order Soft Gluon Corrections, Nikolaos Kidonakis Dec 2006

Single Top Quark Production At The Fermilab Tevatron: Threshold Resummation And Finite-Order Soft Gluon Corrections, Nikolaos Kidonakis

Faculty and Research Publications

I present a calculation of threshold soft-gluon corrections to single top-quark production in p(p) collisions via all partonic processes in the t and s channels and via associated top quark and W boson production. The soft-gluon corrections are formally resummed to all orders, and finite-order expansions of the resummed cross section are calculated through next-to-next-to-next-to-leading-order (NNNLO) at next-to-leading logarithmic (NLL) accuracy. Numerical results for single top-quark production at the Tevatron are presented, including the dependence of the cross sections on the top-quark mass and on the factorization and renormalization scales. The threshold corrections in the t channel are small while …


Positive Solutions Of A Nonlinear N-Th Order Eigenvalue Problem, John R. Graef, Johnny Henderson, Bo Yang Oct 2006

Positive Solutions Of A Nonlinear N-Th Order Eigenvalue Problem, John R. Graef, Johnny Henderson, Bo Yang

Faculty and Research Publications

For 1/2 < p < 1 fixed, values of lambda > 0 are determined for which there exist positive solutions of the n-th order differential equation u((n)) = lambda g(t)f(u), 0 < t < 1, satisfying the three-point boundary conditions, u((i-1)) (0) = u((n-2)) (P) = u((n-1)) (1) = 0, 1

The problem is converted to a third order differential-integro boundary value problem and then a recent result of Graef and Yang for third order boundary value problems is adapted. An example is included to illustrate the results.


Random Flows And Diagnostics Of Turbulence In The High Latitude Cirrus, Steven N. Shore, Ted N. Larosa, Raymond J. Chastain, Loris Magnani Oct 2006

Random Flows And Diagnostics Of Turbulence In The High Latitude Cirrus, Steven N. Shore, Ted N. Larosa, Raymond J. Chastain, Loris Magnani

Faculty and Research Publications

Aims: We present an analysis of the exceptionally turbulent velocity field in the high Galactic latitude cirrus cloud MBM 3. As in the other translucent clouds in our study (MBM 16 and MBM 40), there is no evidence for internal star formation. However, the large scale velocity variation in this cloud is more pronounced. Methods: We have mapped the cloud in 12CO and 13CO (1-0) at high spatial (0.03 pc) and velocity (0.06 km s-1) resolution. We constructed several velocity probability density functions (PDFs), estimated the turbulent transfer rate, and analyzed the linewidths as a function of the size of …


The Future Leading Mobility Protocol: Mobile Ipv4 Or Mobile Ipv6?, Victor A. Clincy, Mudiraj Padmaja Oct 2006

The Future Leading Mobility Protocol: Mobile Ipv4 Or Mobile Ipv6?, Victor A. Clincy, Mudiraj Padmaja

Faculty and Research Publications

Mobile computing has become an important area of computer networking and is expected to play a fundamental role in the ubiquitous access of Internet resources in the future. In recent years, we have seen increasing demand from end-users to access network resources from anywhere and at anytime from all kinds of devices. A greater degree of connectivity is almost becoming mandatory in todays business world. In addition, mobility of end-users is placing further requirements on network systems and protocols to provide uninterrupted services. Mobile network protocol such as Mobile IPv4 has emerged as one of the promising solutions capable of …


Metadata Basics: A Literature Survey And Subject Analysis, Nicole Mitchell Oct 2006

Metadata Basics: A Literature Survey And Subject Analysis, Nicole Mitchell

The Southeastern Librarian

Librarians today are wrestling with an everchanging digital environment. In some way oranother, we must all adapt to new technologies, skills, and ways of thinking. What comes to mind when you hear the word “metadata?” Is itintimidating? Do metadatists and catalogers explain the term adequately? While this articleby no means captures all there is about metadata, it is intended to provide librarians with a basic understanding of what is involved in metadatawork.


A Framework For Developing Wireless Mobile Online Applications, Chong-Wei Xu Jul 2006

A Framework For Developing Wireless Mobile Online Applications, Chong-Wei Xu

Faculty and Research Publications

Online applications based on the HTTP protocol are shifting from wired networks, known as Web applications and Web services, to wireless networks, known as wireless mobile online applications, due to the rapid growth of mobile devices, such as Personal Digital Assistants and cell phones. Among the enabling technologies, J2ME is the dominant and the most potential one for building up these wireless mobile online applications. This paper presents a framework that makes the modeling, implementation, and maintenance of wireless mobile online applications intuitive and easy, especially for students and beginners.


Tissue Glycogen And Extracellular Buffering Limit The Survival Of Red-Eared Slider Turtles During Anoxic Submergence At 3°C, Daniel E. Warren, Scott A. Reese, Donald C. Jackson Jul 2006

Tissue Glycogen And Extracellular Buffering Limit The Survival Of Red-Eared Slider Turtles During Anoxic Submergence At 3°C, Daniel E. Warren, Scott A. Reese, Donald C. Jackson

Faculty and Research Publications

The goal of this study was to identify the factors that limit the survival of the red-eared slider turtle Trachemys scripta during long-term anoxic submergence at 3°C. We measured blood acid-base status and tissue lactate and glycogen contents after 13, 29, and 44 d of submergence from ventricle, liver, carapace (lactate only), and four skeletal muscles. We also measured plasma Ca2+, Mg2+, Na+, K+, Cl-, inorganic phosphate (Pi), lactate, and glucose. After 44 d, one of the six remaining turtles died, while the other turtles were in poor …


Engaging Physics Students Using Environmental Lab Modules, John M. Pratte May 2006

Engaging Physics Students Using Environmental Lab Modules, John M. Pratte

Faculty and Research Publications

Discusses multi-week activity modules that use civic engagement to increase student interest and learning in physics. Components of the modules; Activities included in the modules; Assessment of student learning and interest using the modules.


2006 - The Eleventh Annual Symposium Of Student Scholars Apr 2006

2006 - The Eleventh Annual Symposium Of Student Scholars

Symposium of Student Scholars Program Books

The full program book from the Eleventh Annual Symposium of Student Scholars, held on April 7, 2006. Includes abstracts from the presentations and posters.


Realizing The Open-Closed Principle, Chong-Wei Xu, Jose Hughes Apr 2006

Realizing The Open-Closed Principle, Chong-Wei Xu, Jose Hughes

Faculty and Research Publications

The first principle in developing large software systems is the open-closed principle (OCP). This principle seems asking for two conflict goals. How to realize the principle in the real software practice? What are the enabling technologies that can be used to implement the principle? This paper uses a case study to demonstrate the importance of the principle, the design methodology for realizing the principle, and its enabling technologies.


Next-To-Next-To-Next-To-Leading-Order Soft-Gluon Corrections In Hard-Scattering Processes Near Threshold, Nikolaos Kidonakis Feb 2006

Next-To-Next-To-Next-To-Leading-Order Soft-Gluon Corrections In Hard-Scattering Processes Near Threshold, Nikolaos Kidonakis

Faculty and Research Publications

I present a unified calculation of soft-gluon corrections to hard-scattering cross sections through next-to-next-to-next-to-leading order (NNNLO). Master formulas are derived, from a threshold resummation formalism, that can be applied to total and differential cross sections for hard-scattering processes in hadron colliders. I also present numerical results for charged Higgs production at the LHC where these corrections are large, and for top quark production at the Tevatron where these corrections greatly reduce the scale dependence of the cross section.


Free Tools For Teaching & Researching Wireless Networking Concepts, Victor A. Clincy, Krithi Sitaram Ajay Feb 2006

Free Tools For Teaching & Researching Wireless Networking Concepts, Victor A. Clincy, Krithi Sitaram Ajay

Faculty and Research Publications

As wireless networking and security become more prevalent in the market, more and more computer science programs are incorporating courses in wireless networks or at the least, devoting a significant percentage of the advanced networking courses to wireless topics. As a result, in addition to industry practitioners, there is a growing interest among university researchers and faculty regarding tools used for teaching and researching in wireless networking concepts.This tutorial will demonstrate two free tools, Network Stumbler and ITGuru's wireless module (academic version is free).


Evaluation And Illustration Of A Free Software (Fs) Tool For Wireless Network Monitoring And Security, Victor A. Clincy, Krithi Sitaram Ajay Feb 2006

Evaluation And Illustration Of A Free Software (Fs) Tool For Wireless Network Monitoring And Security, Victor A. Clincy, Krithi Sitaram Ajay

Faculty and Research Publications

Wireless communication provides users many benefits such as portability, flexibility, reduced hardware need and lower installation costs. Wireless local area networks (WLANs) for example allow users the ability to carry their laptops from place to place without any physical wires and without losing network connectivity.However, some amount of security risk is always associated with wireless networks. The most significant security risk for wireless technology is the potential outsiders have in gaining access to the communications medium, the communications medium being the air waves. Though WLANs provide the users with the option of roaming, this convenience is facilitated by broadcasting packets …


The Strength And Structure Of The Galactic Center Magnetic Field, Ted La Rosa, Steven N. Shore, T. Joseph W. Lazio, Namir E. Kassim Jan 2006

The Strength And Structure Of The Galactic Center Magnetic Field, Ted La Rosa, Steven N. Shore, T. Joseph W. Lazio, Namir E. Kassim

Faculty and Research Publications

This paper summarizes recently obtained, strong evidence for a weak global field in the Galactic center (GC): the existence of a large-scale region of diffuse, low-frequency, nonthermal emission coincident with the central molecular zone. The overall energetics of this emission, considered along with constraints on GC cosmic ray energy density and diffusion, indicate clearly that the magnetic field pervading this region is ∼ 10 μG. For completeness, additional points on the orientation of the GC nonthermal filaments, rotation measures of extragalactic sources seen through the GC, and comparison with other normal spiral galaxies are also reviewed.


W-Boson Production With Large Transverse Momentum At The Lhc, Nikolaos Kidonakis, Richard J. Gonsalves, Agustin Sabio Vera Jan 2006

W-Boson Production With Large Transverse Momentum At The Lhc, Nikolaos Kidonakis, Richard J. Gonsalves, Agustin Sabio Vera

Faculty and Research Publications

We study W-boson production with large transverse momentum, QT, in pp collisions at the LHC. We calculate the complete NLO corrections and the soft-gluon NNLO corrections to the differential cross section. The NLO corrections are large but they do not reduce the scale dependence relative to LO, while the NNLO soft-gluon corrections, although small, significantly reduce the scale dependence and thus provide a more stable result.


Eigenvalue Comparisons For Boundary Value Problems Of The Discrete Beam Equation, Jun Ji, Bo Yang Jan 2006

Eigenvalue Comparisons For Boundary Value Problems Of The Discrete Beam Equation, Jun Ji, Bo Yang

Faculty and Research Publications

We study the behavior of all eigenvalues for boundary value problems of fourth-order difference equations Delta(4)yi = lambda a(i+2)y(i+2), - 1= b(j), 1


Soft-Gluon Corrections In Hard-Scattering Processes Through Nnnlo, Nikolaos Kidonakis Jan 2006

Soft-Gluon Corrections In Hard-Scattering Processes Through Nnnlo, Nikolaos Kidonakis

Faculty and Research Publications

I discuss soft-gluon corrections in hard-scattering processes and their resummation. I present master formulas for the expansion of the resummed cross section through NNNLO and discuss the significance of these corrections in a number of processes.


Production Of Large Transverse Momentum W Bosons At The Tevatron, Nikolaos Kidonakis, Agustin Sabio Vera Jan 2006

Production Of Large Transverse Momentum W Bosons At The Tevatron, Nikolaos Kidonakis, Agustin Sabio Vera

Faculty and Research Publications

We discuss the production of W bosons at large transverse momentum in p pbar collisions at the Tevatron Run I and II. W boson hadroproduction is a process of relevance in testing the Standard Model and in estimates of backgrounds to new physics. The next-to-leading order cross section in the region of large transverse momentum is dominated by threshold soft-gluon corrections which arise from incomplete cancellations near partonic threshold between graphs with real emission and virtual graphs due to the limited phase space available for real gluon emission. In this contribution it is shown how, by including next-to-next-to-leading-order (NNLO) soft-gluon …


Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray Jan 2006

Journey To The Center Of The Core: Computers And The Internet In The Core Curriculum, Jorge Pérez, Meg C. Murray

Faculty and Research Publications

Computers, digitalization and the Internet have transformed modern society. Commerce, education, communication and socialization will never be the same. Surprisingly, many universities do not require a computing course in the core curriculum. Critical information technology (IT) competencies are often taken for granted, to the detriment of students who lack computing and Internet skills. This paper describes an initiative undertaken by a computer science and information systems department to assess and remediate IT skills needed by all university students, regardless of major. The project is evolving along several dimensions: identification of discipline-independent IT competencies, assessment of IT skills among current and …