Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- <p>Difference equations -- Oscillation theory<br />Differential equations<br />Time-series analysis</p> (1)
- <p>Geochemistry -- Oklahoma<br />Geology -- Oklahoma -- Pittsburg County<br />Sandstone -- Arkoma Basin (Ark. and Okla.)</p> (1)
- <p>Hydroxy acids<br />Trace analysis -- Methodology<br />Mass spectrometry<br />Chromatographic analysis<br />Gas chromatography<br />Liquid chromatography</p> (1)
- Actomyosin<br />Cytokinesis<br />Microtubules (1)
- Aerogels<br />Polyimides<br />Polymethylmethacrylate<br />Crosslinking (Polymerization) (1)
-
- Apatite -- Brazil<br />Carbonatites -- Brazil<br />Geology -- Brazil<br />Ore-dressing (1)
- Biogenic oils (1)
- Bub2 (1)
- Cervical vertebrae -- Abnormalities -- Diagnosis<br />Image processing -- Digital techniques<br />Spine -- Radiography<br />Vertebrae -- Abnormalities -- Diagnosis (1)
- Coevolution -- Mathematical models<br />Evolutionary computation<br />Evolutionary programming (Computer science)<br />Mathematical optimization (1)
- Computer security<br />Mobile communication systems -- Security measures<br />Peer-to-peer architecture (Computer networks) -- Security measures (1)
- Crystal size distribution (1)
- Crystallization<br />Geology, Structural -- Oklahoma<br />Rhyolite -- Oklahoma (1)
- Customer services -- Communication systems<br />Game theory -- Computer programs<br />Peer-to-peer architecture (Computer networks) -- Economic aspects<br />Routing protocols (Computer network protocols) (1)
- Data mining<br />Internet -- Security measures<br />Internet addresses<br />Internet domain names (1)
- Enzymes<br />Phylogeny<br />Soybean -- Genetics (1)
- Evolutionary computation<br />Evolutionary programming (Computer science) (1)
- Evolutionary computation<br />Investment analysis<br />Machine learning -- Mathematical models<br />Time-series analysis (1)
- Glomerocryst (1)
- Maximum total throughput (1)
- Methyl soyate (1)
- Phenylalanine ammonia-lyase (1)
- Smoke screens<br />Soy oil -- Environmental aspects -- Research<br />Biodiesel fuels -- Environmental aspects -- Research (1)
- Statistical defense (1)
- Time slots assignment (1)
- Wireless communication systems -- Design<br />Sensor networks -- Design (1)
Articles 1 - 17 of 17
Full-Text Articles in Physical Sciences and Mathematics
Polymer Reinforced Aerogels And Composites A. Polyimide Crosslinked Aerogels B. Silica-Polymethylmethacrylate Composites, Vishal U. Patil
Polymer Reinforced Aerogels And Composites A. Polyimide Crosslinked Aerogels B. Silica-Polymethylmethacrylate Composites, Vishal U. Patil
Masters Theses
"Crosslinking of aerogels is a promising approach to combine the advantages of inorganic and polymeric materials. In the present study, two types of polyimide-silica hybrid aerogels, APTES-BTDA-MDA (mol ratio: 2:2:1) and APTES-BTDA-MDA (mol ratio: 2:3:2), were synthesized using a sol-gel process followed by heating in order to imidize the polyamic acid that is formed quickly and is covalently bonded to silica. The hybrid aerogels were made using 3-aminopropyltriethoxysilane (APTES) endcapped polyamic acids and tetramethoxysilane (TMOS) as precursors. Polyimide crosslinked aerogels were characterized by TGA, SEM, FT-IR, BET, solid state NMR and gas pycnometry. These hybrid aerogels exhibit high thermal stability …
Dynamic Equations With Piecewise Continuous Argument, Christian Keller
Dynamic Equations With Piecewise Continuous Argument, Christian Keller
Masters Theses
"We extend the theory of differential equations with piecewise continuous argument to general time scales. Linear and quasi-linear systems of functional dynamic equations with alternating retarding and advanced argument will be investigated and conditions for globally asymptotic stability of those systems will be stated and proven. Furthermore, oscillation criteria for linear first-order equations with piecewise continuous argument will be established"--Abstract, page iii.
Textural Analysis Of A Rhyolite Dike Of The Southern Oklahoma Aulacogen At Medicine Park, Oklahoma, Sean Patrick O'Donnell
Textural Analysis Of A Rhyolite Dike Of The Southern Oklahoma Aulacogen At Medicine Park, Oklahoma, Sean Patrick O'Donnell
Masters Theses
"Detailed analysis of the modal abundance and crystal size distribution (CSD) of glomerocrystic quartz and alkali feldspar phenocrysts in a porphyritic "rhyolite" dike at Medicine Park, Oklahoma were integrated with known phase relationships in the system SiO₂-NaAlSi₃O₈-KAlSi₃-O₈-H₂O to constrain the history of this intrusion"--Abstract, page iv.
A Rapid Method For Determination Of Alpha Hydroxy Acids In Seawater And Biological Fluids At Trace Levels, Ryan Lee Schwiderski
A Rapid Method For Determination Of Alpha Hydroxy Acids In Seawater And Biological Fluids At Trace Levels, Ryan Lee Schwiderski
Masters Theses
"Alpha hydroxy acids (AHAs) - carboxylic acids with a hydroxyl substitution on the alpha carbon are an important class of molecules. Hydroxy Methyl Thiobutanoic Acid (HMTBA) is an α-hydroxy analog of essential amino acid methionine; it finds extensive use as a feed supplement for avian and bovine species. Efficacy of alpha hydroxy acid uptake is important for nutritional studies and such studies rely on accurate and precise methods for determination of these chemicals in biological samples. Several methods for AHAs determination have been reported, however, the methods are tedious, requiring multiple sample preparation steps. Experiments reported in this thesis were …
Lateral Reservoir Compartmentalization Of The Woodford Shale In The Arkoma Basin, Southeastern Oklahoma, Adedapo Omotunde Ajibade
Lateral Reservoir Compartmentalization Of The Woodford Shale In The Arkoma Basin, Southeastern Oklahoma, Adedapo Omotunde Ajibade
Masters Theses
"Analysis of geochemistry, mineralogy, total organic content (TOC) and rock evaluation pyrolysis on Woodford Shale well cuttings taken from a horizontal well (Quaid 13-30H) drilled in the Arkoma Basin (Pittsburg County), Oklahoma shows no significant variation in the thermal maturity, type, and/or quantity of organic matter. This is interpreted to mean that the organic matter of the Woodford Shale is relatively homogeneous and has all undergone similar thermal history. In addition, the analysis shows that there are lateral variations in the gas geochemistry in which the shale appears to be broken up into sections, some of which are more enhanced …
The Carbonatite-Hosted Apatite Deposit Of Jacupiranga, Se Brazil: Styles Of Mineralization, Ore Characterization And Association With Mineral Processing, Paula Regina Alves
The Carbonatite-Hosted Apatite Deposit Of Jacupiranga, Se Brazil: Styles Of Mineralization, Ore Characterization And Association With Mineral Processing, Paula Regina Alves
Masters Theses
"The carbonatite-hosted apatite deposit of Jacupiranga is located in southeastern Brazil. The major styles of apatite mineralization are veins or veinlets, small pods or patches, disseminated apatite, and massive aggregates (locally). The concentration of apatite involves grinding of the carbonatite, removal of magnetite with a magnet drum, size classification with cyclones, and flotation to suppress carbonates and collect apatite. Samples of carbonatite were collected from more recent exposures of the mine and drill holes. This study utilized a variety of microscopy methods, namely transmitted and reflected light, cathodoluminescence (CL), and scanning electron microscopy (with wavelength-dispersive spectrometers for mineral compositions)"--Abstract, page …
Image Analysis Techniques For Vertebra Anomaly Detection In X-Ray Images, Mohammed Das
Image Analysis Techniques For Vertebra Anomaly Detection In X-Ray Images, Mohammed Das
Masters Theses
"In this research, imaging techniques are investigated for the analysis and detection of abnormalities in cervical and lumbar vertebrae. Detecting vertebra anomalies pertaining to osteoarthritis such as claw, traction and anterior osteophytes can aide in treatment plans for the patient. New size invariant features were developed for the detection of claw, traction and anterior osteophytes in cervical spine vertebrae. Using a K-means clustering and nearest centroid classification approach, the results were generated that were capable of discriminating cervical vertebrae for presence of anomalies related to osteophytes. The techniques developed can be integrated into systems based on querying spine images to …
An Economic Incentive Based Routing Protocol Incorporating Quality Of Service For Mobile Peer-To-Peer Networks, Anil Jade
Masters Theses
"Economic incentive models are becoming increasingly popular in Mobile Peer to Peer Networks (M-P2P). These models entice node participation to combat free riding and to effectively manage constraint resources in the network. Due to the dynamic topology of the M-P2P network, the connections between the peers become unpredictable and therefore, reliable routing becomes important. Many routing protocols proposed earlier (such as DSR, AODV) are based on best effort data traffic policy, such as the shortest route selection (hop minimization). Using economic models to find a cost effective optimal route from the source to the destination, while considering Quality of Service …
Co-Evolutionary Automated Software Correction: A Proof Of Concept, Joshua Lee Wilkerson
Co-Evolutionary Automated Software Correction: A Proof Of Concept, Joshua Lee Wilkerson
Masters Theses
"The task of ensuring that a software artifact is correct can be a very time consuming process. To be able to say that an algorithm is correct is to say that it will produce results in accordance with its specifications for all valid input. One possible way to identify an incorrect implementation is through the use of automated testing (currently an open problem in the field of software engineering); however, actually correcting the implementation is typically a manual task for the software developer. In this thesis a system is presented which automates not only the testing but also the correction …
The Identification And Characterization Of Phenylalanine Ammonia-Lyase Gene Family Members In Glycine Max, Erin Kathleen Pringle
The Identification And Characterization Of Phenylalanine Ammonia-Lyase Gene Family Members In Glycine Max, Erin Kathleen Pringle
Masters Theses
"Gene families are collections of genes with similar functions. Studying gene families is important for understanding the evolution of genes and manipulating genes. Phenylalanine ammonia-lyase (PAL) is an enzyme found in plants. It catalyzes the deamination of phenylalanine to produce cinnamic acid. Genes for PAL have been identified in many different plant species. This project used the known sequence for the PAL1 gene in Glycine max to find other PAL genes in Glycine max"--Abstract, page iii.
Obscurant Oil Characterization Produced Through Vaporization By Exhaust Gas Of Mini-Jet Turbine Engine, Hossein Daniel Bahaghighat
Obscurant Oil Characterization Produced Through Vaporization By Exhaust Gas Of Mini-Jet Turbine Engine, Hossein Daniel Bahaghighat
Masters Theses
"Obscurants have been used for centuries to conceal and protect military assets from direct enemy attack, or as a signal between units. Obscurants still play a significant role in protecting soldiers on the battlefield. This research was geared towards development of highly efficient man portable obscurant generation system to demonstrate its use with biogenic oils as the obscurants. The research reported in the thesis was directed evaluating the performance of a mini-jet based generator in the laboratory and field with two different obscurant oils, Fog Oil (FO) the oil used by the US Army at present and potential replacement oil …
Cross-Layer Design Through Joint Routing And Link Allocation In Wireless Sensor Networks, Xuan Gong
Cross-Layer Design Through Joint Routing And Link Allocation In Wireless Sensor Networks, Xuan Gong
Masters Theses
"Both energy and bandwidth are scarce resources in sensor networks. In the past, the energy efficient routing problem has been extensively studied in efforts to maximize sensor network lifetimes, but the link bandwidth has been optimistically assumed to be abundant. Because energy constraint affects how data should be routed, link bandwidth affects not only the routing topology, but also the allowed data rate on each link, which in turn affects the lifetime. Previous research that focus on energy efficient operations in sensor networks with the sole objective of maximizing network lifetime only consider the energy constraint ignoring the bandwidth constraint. …
A Time Series Classifier, Christopher Mark Gore
A Time Series Classifier, Christopher Mark Gore
Masters Theses
"A time series is a sequence of data measured at successive time intervals. Time series analysis refers to all of the methods employed to understand such data, either with the purpose of explaining the underlying system producing the data or to try to predict future data points in the time series...An evolutionary algorithm is a non-deterministic method of searching a solution space, and modeled after biological evolutionary processes. A learning classifier system (LCS) is a form of evolutionary algorithm that operates on a population of mapping rules. We introduce the time series classifier TSC, a new type of LCS that …
Co-Optimization: A Generalization Of Coevolution, Travis Service
Co-Optimization: A Generalization Of Coevolution, Travis Service
Masters Theses
"Many problems encountered in computer science are best stated in terms of interactions amongst individuals. For example, many problems are most naturally phrased in terms of finding a candidate solution which performs best against a set of test cases. In such situations, methods are needed to find candidate solutions which are expected to perform best over all test cases. Coevolution holds the promise of addressing such problems by employing principles from biological evolution, where populations of candidate solutions and test cases are evolved over time to produce higher quality solutions...This thesis presents a generalization of coevolution to co-optimization, where optimization …
Critical Infrastructure Protection And The Domain Name Service (Dns) System, Mark Edward Snyder
Critical Infrastructure Protection And The Domain Name Service (Dns) System, Mark Edward Snyder
Masters Theses
"Components of the critical infrastructure of any system are natural targets for attack. Any inherent weakness of such components can potentially expose the entire system to vulnerability. The Domain Name System (DNS) is one component of the proper functioning of the Internet. Although DNS is a relatively simple, isolated component, it serves as a straightforward example for the study of distributed systems in general, and as such, we have explored properties of DNS to examine how enterprise-scale, critical infrastructure components are vulnerable to attack, what protections are afforded to defenders of such components, the inherent weaknesses of such systems, and …
Role Of Microtubules In Budding Yeast Cytokinesis, Su Young Park
Role Of Microtubules In Budding Yeast Cytokinesis, Su Young Park
Masters Theses
"Cytokinesis is an important step to finish cell cycle events and separate into two daughter cells. This event is driven by actomyosin ring contraction. In budding yeast, the mitotic exit network (MEN) controls completion of ana/telophase by signaling events. Bub2 is a mitotic exit network regulator and binds to Tem1p which is an important component in MEN. Mad2 is a component of a separate spindle checkpoint. Mad2 dependent pathway prevents the metaphase to anaphase transition under spindle damage. Because yeast cells have cell walls, septum formation follows actin ring contraction. Here it was investigated how microtubule defects affect cytokinesis in …
Preserd - Privacy Ensured Service Discovery In Mobile Peer-To-Peer Environment, Santhosh Muthyapu
Preserd - Privacy Ensured Service Discovery In Mobile Peer-To-Peer Environment, Santhosh Muthyapu
Masters Theses
"In mobile peer-to-peer networks many service discovery protocols have been proposed. Most of these protocols disregard the exposure of the participating peers' privacy details, although they consider the security issues. In these methods, the participating peers must provide their identities, during the service discovery process, to be authorized to utilize the service. However, a peer might not be willing to reveal its identity until it identifies the service providing peer. So these peers face a problem; should the requesting peer or the service providing peer reveal the identity first, and hence, this is similar to the chicken-and-egg problem. The protocol …