Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (6)
- Social and Behavioral Sciences (3)
- Chemistry (2)
- Computer Engineering (2)
- Engineering (2)
-
- Life Sciences (2)
- Public Affairs, Public Policy and Public Administration (2)
- Statistics and Probability (2)
- Aviation (1)
- Biochemistry (1)
- Biochemistry, Biophysics, and Structural Biology (1)
- Biology (1)
- Business (1)
- Criminology (1)
- Curriculum and Instruction (1)
- E-Commerce (1)
- Ecology and Evolutionary Biology (1)
- Education (1)
- Elementary Education (1)
- Information Security (1)
- Inorganic Chemistry (1)
- Materials Chemistry (1)
- Mathematics (1)
- Microbiology (1)
- Physics (1)
- Public Administration (1)
- Secondary Education (1)
- Sociology (1)
- Keyword
-
- Cybersecurity (2)
- Information technology (2)
- Mathematical model (2)
- Security (2)
- Air traffic (1)
-
- Airport (1)
- Anthropogenic (1)
- Asymmetry (1)
- Bacteria (1)
- Batteries (1)
- Battery (1)
- Binding (1)
- Carbon monoxide (1)
- Carboxydothermus hydrogenoformans (1)
- Cathode (1)
- Classroom (1)
- College (1)
- Columbian (1)
- Communication system (1)
- Computation time (1)
- Computer network (1)
- Computer security (1)
- Computer simulation (1)
- CooA (1)
- Curriculum (1)
- Cyberinfrastructure (1)
- DNA (1)
- Data mining (1)
- Data protection (1)
- Discrete stochastic model (1)
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
Battery Application Of Silver Molybdate Materials, Brendan Michael Godsel
Battery Application Of Silver Molybdate Materials, Brendan Michael Godsel
Undergraduate Honors Papers
As the demand for renewable energy grows, the investigation of potential battery materials continues to progress hastily. Many devices and machines of present day are operated by battery technology, and their energy requirements warrant which kinds of batteries will power them. The battery in a phone requires hundreds, possibly thousands, of uses and needs to be able to recharge quickly. The battery in the implantable cardiac defibrillator (ICD), the battery by which this product was inspired, is only used once, but it must last years before it is replaced. The cathode of the ICD battery is comprised of a silver …
The Negotiator's Role In A Buyer-Seller Game, Joseph Gaudy
The Negotiator's Role In A Buyer-Seller Game, Joseph Gaudy
Graduate Theses and Capstone Projects (excluding DNP)
In game theory, buyer-seller games rarely utilize a negotiating third party. Any negotiations are typically conducted by the buyer and seller. This study, motivated by the real estate market, uses sequentially and simultaneously played game models to explore the influence a self-interested, negotiating, third party has on player payoffs. For the sequential model, a game tree is utilized to demonstrate player actions, preferences, and outcomes. The weak sequential equilibrium is calculated using Gambit[1] and shows optimality in player payoffs to exist when the seller’s and realtor’s strategies align according to the current market. For the simultaneous model, expected payoff functions …
Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki
Cybersecurity In The Classroom: Bridging The Gap Between Computer Access And Online Safety, Andrew Malecki
Cyber Security Capstone Research Project Reports
According to ISACA, there will be a global shortage of 2 million cybersecurity professionals worldwide by 2019. Additionally, according to Experian Data Breach Resolution, as much as 80% of all network breaches can be traced to employee negligence. These problems will not solve themselves, and they likewise won’t improve without drastic action. An effort needs to be made to help direct interested and qualified individuals to the field of cybersecurity to move toward closing this gap. Moreover, steps need to be made to better inform the public of general safety measures while online, including the safeguarding of sensitive information.
A …
Measurement Of The Longitudinal Double-Spin Asymmetry For Neutral Pion Production In Polarized Proton Collisions At √S = 510 Gev, Taegyun Kim
Physics & Astronomy Honors Papers
Beyond the valence quarks' spin contribution to the total spin of a proton, gluon and sea quark contributions are becoming clear as well. For proton+proton collisions at a center of mass energy of 510 GeV , neutral pion production is dominated by gluon-gluon and gluon-quark scattering. An avenue to constrain the gluon polarization is the asymmetry, ALL, in the production of neutral pions from collisions of longitudinally spin-polarized proton beams. Our experiment was performed with the STAR detector at the Relativistic Heavy Ion Collider (RHIC), unique for its ability to collide spin-polarized proton beams. The Endcap Electromagnetic Calorimeter …
Mutagenic And Spectroscopic Investigation Of Ph Dependent Cooa Dna Binding, Brian R. Weaver
Mutagenic And Spectroscopic Investigation Of Ph Dependent Cooa Dna Binding, Brian R. Weaver
Chemistry Honors Papers
The carbon monoxide (CO) sensing heme protein, CooA, is a transcription factor which exists in several bacteria that utilize CO as an energy source. CooA positively regulates the expression of coo genes in the presence of CO such that the corresponding proteins may metabolize CO. The present studies have yielded the unexpected result that Fe(III) CooA binds DNA tightly at pH < 7, deviating from all previously reported work which indicate that CooA DNA binding is initiated only when the exogenous CO effector reacts with the Fe(II) CooA heme. This observation suggests that the disruption of one or more salt bridges upon effector binding may be a critical feature of the normal CooA activation mechanism. To test this possibility, several protein variants that eliminated a selected salt bridge for the CooA homolog from Rhodospirillum rubrum were prepared via site-directed mutagenesis. Samples of these variant proteins, which were overexpressed in Escherichia coli, were then characterized by spectroscopic methods and functional assays to investigate the impact these mutations had on CooA heme coordination …
A Simulation Of Anthropogenic Mammoth Extinction, Matthew Klapman
A Simulation Of Anthropogenic Mammoth Extinction, Matthew Klapman
Undergraduate Honors Papers
There are multiple hypotheses as to why the Columbian Mammoth (Mammuthus columbi) and other megafauna in North America went extinct relatively recently and relatively quickly. The most popular of which are disease, climate change, meteorite strikes, and over hunting by humans [2, 9]. There is evidence to show that a combination of factors contributed to the megafaunal extinction, but ”overkill” explores the idea that early humans migrated onto the continent and then hunted the mammoths and other megafauna to extinction. The overkill hypothesis was first proposed by anthropologist Paul Martin in 1973 [8]. Evidence from radiocarbon dating shows that the …
Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan
Computer Network Design For Universities In Developing Countries, Rafid Salih Sarhan Alsarhan
Information Technology Capstone Research Project Reports
The purpose of this project is to design a suitable network system for universities in developing countries. The aim was to design a network with high-quality security and low cost, in such a way that network devices of universities in developing countries, will meet standards associated with the universities in developed countries. This project will help to enhance education in developing countries. There are many devices that were used in designing the network, such as routers, switches, backup, firewall, and servers. All devices were connected to each other to make integration network system and configured by putting IP addresses to …
Ransomware In High-Risk Environments, Shallaw M. Aziz
Ransomware In High-Risk Environments, Shallaw M. Aziz
Information Technology Capstone Research Project Reports
In today’s modern world, cybercrime is skyrocketing globally, which impacts a variety of organizations and endpoint users. Hackers are using a multitude of approaches and tools, including ransomware threats, to take over targeted systems. These acts of cybercrime lead to huge damages in areas of business, healthcare systems, industry sectors, and other fields. Ransomware is considered as a high risk threat, which is designed to hijack the data. This paper is demonstrating the ransomware types, and how they are evolved from the malware and trojan codes, which is used to attack previous incidents, and explains the most common encryption algorithms …
Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi
Backend Challenges And Issues For Electronic Government, Salim Y. Alkindi
Information Technology Master Theses
The term electronic government (also called e-government, or eGov) refers to multidisciplinary projects that are complex in nature. Since the beginning of the Internet revolution many countries have adopted e-government as a step toward enhancing the delivery of public or governmental services to citizens by what are called e-services. A typical request for a service is initiated and passes through an electronic service (“e-service”) portal, or a front office. The term front office application usually system can be defined as designates software seen and used directly by an end user. This software provides the capabilities needed to collect the user …
Enterprise Network Design And Implementation For Airports, Ashraf H. Ali
Enterprise Network Design And Implementation For Airports, Ashraf H. Ali
Information Technology Master Theses
The aim of this project was airports network design and implementation and the introduction of a suitable network for most airports around the world. The following project focused on three main parts: security, quality, and safety. The project has been provided with different utilities to introduce a network with a high security level for the airport. These utilities are hardware firewalls, an IP access control list, Mac address port security, a domain server and s proxy server. All of these utilities have been configured to provide a secure environment for the entire network and to prevent hackers from entering sensitive …
Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali
Identifying Terrorist Affiliations Through Social Network Analysis Using Data Mining Techniques, Govand A. Ali
Information Technology Master Theses
In a technologically enabled world, local ideologically inspired warfare becomes global all too quickly, specifically terrorist groups like Al Quaeda and ISIS (Daesh) have successfully used modern computing technology and social networking environments to broadcast their message, recruit new members, and plot attacks. This is especially true for such platforms as Twitter and encrypted mobile apps like Telegram or the clandestine Alrawi. As early detection of such activity is crucial to attack prevention data mining techniques have become increasingly important in the fight against the spread of global terrorist activity. This study employs data mining tools to mine Twitter for …
Solar Thermal Decoupled Electrolysis: Reaction Mechanism Of Electrochemical Oxidation Of Coo/Co(Oh)2, William Prusinski
Solar Thermal Decoupled Electrolysis: Reaction Mechanism Of Electrochemical Oxidation Of Coo/Co(Oh)2, William Prusinski
Chemistry Honors Papers
A modified water electrolysis process has been developed to produce H2. The electrolysis cell oxidizes CoO to CoOOH and Co3O4 at the anode to decrease the amount of electric work needed to reduce water to H2. The reaction mechanism through which CoO becomes oxidized was investigated, and it was observed that the electron transfer occurred through both a species present in solution and a species adsorbed to the electrode surface. A preliminary mathematical model was established based only on the electron transfer to species in solution, and several kinetic parameters of the reaction were calculated. The average value of each …