Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

2018

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 13606

Full-Text Articles in Physical Sciences and Mathematics

Gerrymandering And The Impossibility Of Fair Districting Systems, Danielle Degutz Dec 2018

Gerrymandering And The Impossibility Of Fair Districting Systems, Danielle Degutz

Senior Projects Spring 2019

Voting district boundaries are often manipulated, or gerrymandered, by politicians in order to give one group of voters an unfair advantage over another during elections. To make sure a system of voting districts is not gerrymandered, the population size, the shape, and the voting efficiency of each party in each district should be taken into consideration. Following recent work of Boris Alexeev and Dustin G. Mixon, we discuss mathematical criteria for each of these three aspects, and we prove how problems arise when attempting to apply all three at once to a districting system--first to a simplified districting system and …


Undergraduate Bulletin, 2019-2020, Minnesota State University Moorhead Dec 2018

Undergraduate Bulletin, 2019-2020, Minnesota State University Moorhead

Undergraduate Bulletins (Catalogs)

No abstract provided.


Mechanism For Copper(Ii)-Mediated Disaggregation Of A Porphyrin J-Aggregate, M. Trapani, I. G. Occhiuto, R. Zagami, G. De Luca, M. A. Castriciano, A. Romeo, L. M. Scolaro, Robert F. Pasternack Dec 2018

Mechanism For Copper(Ii)-Mediated Disaggregation Of A Porphyrin J-Aggregate, M. Trapani, I. G. Occhiuto, R. Zagami, G. De Luca, M. A. Castriciano, A. Romeo, L. M. Scolaro, Robert F. Pasternack

Chemistry & Biochemistry Faculty Works

J-aggregates of anionic meso-tetrakis(4-sulfonatophenyl)porphyrin form at intermediate pH (2.3–3.1) in the presence of NiSO₄ or ZnSO₄ (ionic strength, I.S. = 3.2 M). These aggregates convert to monomeric porphyrin units via metallation with copper(II) ions. The kinetics for the disassembly process, as monitored by UV/vis spectroscopy, exhibits zeroth-order behavior. The observed zeroth-order rate constants show a two-term dependence on copper(II) ion concentrations: linear and second order. Also observed is an inverse dependence on hydrogen ion concentration. Activation parameters have been determined for the disassembly process leading to ΔH^≠ = (+163 ± 15) kJ·mol⁻¹ and ΔS^≠ = (+136 ± 11) J·K⁻¹. A …


Cover Dec 2018

Cover

Journal of Digital Forensics, Security and Law

No abstract provided.


Domain Decomposition Methods For The Solution Of Multiple Scattering Problems, Michael Pedneault Dec 2018

Domain Decomposition Methods For The Solution Of Multiple Scattering Problems, Michael Pedneault

Dissertations

This presents a Schur complement Domain Decomposition (DD) algorithm for the solution of frequency domain multiple scattering problems. Just as in the classical DD methods,(1) the ensemble of scatterers is enclosed in a domain bounded by an artificial boundary, (2) this domain is subdivided into a collection of nonoverlapping subdomains so that the boundaries of the subdomains do not intersect any of the scatterers, and (3) the solutions of the subproblems are connected via Robin boundary conditions matching on the common interfaces between subdomains. Subdomain Robin-to-Robin maps are used to recast the DD problem as a sparse linear system whose …


Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker Dec 2018

Storage Systems For Mobile-Cloud Applications, Nafize R. Paiker

Dissertations

Mobile devices have become the major computing platform in todays world. However, some apps on mobile devices still suffer from insufficient computing and energy resources. A key solution is to offload resource-demanding computing tasks from mobile devices to the cloud. This leads to a scenario where computing tasks in the same application run concurrently on both the mobile device and the cloud.

This dissertation aims to ensure that the tasks in a mobile app that employs offloading can access and share files concurrently on the mobile and the cloud in a manner that is efficient, consistent, and transparent to locations. …


Methods To Improve The Remediation Of Polycyclic Aromatic Hydrocarbons (Pahs) In Aerobic And Anaerobic Environments, Brian Wartell Dec 2018

Methods To Improve The Remediation Of Polycyclic Aromatic Hydrocarbons (Pahs) In Aerobic And Anaerobic Environments, Brian Wartell

Dissertations

Oil spills occur regularly in terrestrial environments and crude oil can contain many compounds that are highly resistant to degradation. Among these compounds are high levels of polycyclic aromatic hydrocarbons (PAHs) which are not only toxic but can also be carcinogenic and/or mutagenic. The first chapter of this dissertation includes an extensive review chapter on the variables affecting the anaerobic degradation of hydrocarbons, with a particular focus on PAHs. Electron acceptors, electron donors, temperature, salinity, pH all play key roles in determining the possibility effective of effective degradation occurring. Thus, by addressing solutions, such as biostimulation, improving environmental variables for …


High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak Dec 2018

High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak

Dissertations

The demand for high-speed Internet access for vehicles, such as high-speed trains (HSTs) and cars, is on the rise. Several Internet access technologies that use radio frequency are being considered for vehicular networking. Radio-frequency communications technologies cannot provide high data rates due to interference, bandwidth limitations, and the inherent limited data rates of radio technology. Free-space optical communications (FSOC) is an alternative approach and a line-of-sight (LOS) technology that uses modulated light to transfer data between two free-space optical (FSO) transceivers. FSOC systems for vehicular networks are expected to provide data rates in the range of Gbps for stationary and …


Fwer Controlling Procedures In Simultaneous And Selective Inference, Li Yu Dec 2018

Fwer Controlling Procedures In Simultaneous And Selective Inference, Li Yu

Dissertations

With increasing complexity of research objectives in clinical trials, a variety of relatively complex and less intuitive multiple testing procedures (MTPs) have been developed and applied in clinical data analysis. In order to make testing strategies more explicit and intuitive to communicate with non-statisticians, several flexible and powerful graphical approaches have recently been introduced in the literature for developing and visualizing newer MTPs. Nevertheless, some theoretical as well as methodological issues still remain to be fully addressed. This dissertation addresses several important issues arising in graphical approaches and related selective inference problems. It consists of three parts.

In the first …


Functionalized Carbon Nanotubes In Hydrophobic Drug Delivery, Kun Chen Dec 2018

Functionalized Carbon Nanotubes In Hydrophobic Drug Delivery, Kun Chen

Dissertations

The direct incorporation of carboxylated carbon nanotubes (f-CNTs) into hydrophobic drug particles during their formation via anti-solvent precipitation is presented. The approach is tested using two drugs namely antifungal agent Griseofulvin (GF) and antibiotic Sulfamethoxazole (SMZ) that have very different aqueous solubility. It is observed that the f-CNTs dispersed in the water serve as nucleating sites for crystallization and are readily incorporated into the drug particles without altering crystal structure or other properties. The results show that the hydrophilic f-CNTs dramatically enhance dissolution rate for both drugs. The increased degree of functionalization leads to higher hydrophilicity and therefore faster dissolution …


Analysis Of Design Peculiarities Of Preventive Shoes For Diabetics, A.J Djuraevich, A.A Khaydarov, M.O Muhammedova Dec 2018

Analysis Of Design Peculiarities Of Preventive Shoes For Diabetics, A.J Djuraevich, A.A Khaydarov, M.O Muhammedova

Central Asian Problems of Modern Science and Education

Quality shoes are fundamental to affecting the health of the feet, in particular, when the foot can be subjected to many serious problems, as is the case with diabetes patients. This article identifies, identifies and analyzes the problems of correct design of shoes for people suffering from diabetes, and design features that distinguish orthopedic shoes from other types of shoes.


Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao Dec 2018

Deep Learning Methods For Mining Genomic Sequence Patterns, Xin Gao

Dissertations

Nowadays, with the growing availability of large-scale genomic datasets and advanced computational techniques, more and more data-driven computational methods have been developed to analyze genomic data and help to solve incompletely understood biological problems. Among them, deep learning methods, have been proposed to automatically learn and recognize the functional activity of DNA sequences from genomics data. Techniques for efficient mining genomic sequence pattern will help to improve our understanding of gene regulation, and thus accelerate our progress toward using personal genomes in medicine.

This dissertation focuses on the development of deep learning methods for mining genomic sequences. First, we compare …


Accounting For The Environmental Impacts Associated With Residual Products In A Comparative Life Cycle Assessment Of Systems With Multiple Products, Yasuhiro Fukushima, Satoshi Ohara Dec 2018

Accounting For The Environmental Impacts Associated With Residual Products In A Comparative Life Cycle Assessment Of Systems With Multiple Products, Yasuhiro Fukushima, Satoshi Ohara

Journal of Environmental Science and Sustainable Development

In many production systems, multiple products are interactively produced. Therefore, an innovative technology that leads to changes in parts of such systems may influence both the unit environmental impacts associated with the products, and the productivity of multiple products. To compare alternative technologies on a common basis, we often account for the avoided or supplemented emissions associated with the residual (i.e. surplus and supplemented) products produced from within the considered system boundary. In this study, using an example of an innovative technology envisioned for use in sugar mills, we first demonstrate how comparisons can be made when the systems vary …


The Impact Of The Implementation Of Temporary Import Procedure On Electronic Products: Input--Output Analysis, Dedi Abdul Hadi, Toru Matsumoto Dec 2018

The Impact Of The Implementation Of Temporary Import Procedure On Electronic Products: Input--Output Analysis, Dedi Abdul Hadi, Toru Matsumoto

Journal of Environmental Science and Sustainable Development

Currently, imported electronic products enter the Indonesian market using general import procedures, where the importer has to pay the import duty and taxes in full rate. In the absence of proper recycling systems, the electronic products that have reached their end of life and those are no longer used, end up in the landfills. Some researchers found hazardous materials inside the electronic products that could contaminate water, soil and air. Therefore, another strategy is needed to avoid negative effects on the environment. The Temporary import policy is one of the import procedures under Customs administration control, which states that goods …


Waste Reduction Through Integrated Waste Management Modeling At Mustika Residence (Tangerang), Hendro Putra Johannes Dec 2018

Waste Reduction Through Integrated Waste Management Modeling At Mustika Residence (Tangerang), Hendro Putra Johannes

Journal of Environmental Science and Sustainable Development

In Indonesia, there are classic issues about waste that are highlighted due to the country’s critical conditions. Uncontrolled population growth and regional development have led to massive waste production. One popular practice in waste management is located at integrated waste management site (TPST). This practice has been implemented successfully by TPST Mustika Iklhas, a small community operation in Tangerang. Though different from previous operations, its success is achieved by active community participation, far away from government intervention. This study looks at management practices in TPST Mustika Ikhlas. The method used to address real and complex problems is called system dynamics. …


The Welfare Of Elderly People In Rural West Java: Economy, Health And Vernacular Care, Kosuke Mizuno, Ekawati Sri Wahyuni, Taizo Wada, Kozo Matsubayashi Dec 2018

The Welfare Of Elderly People In Rural West Java: Economy, Health And Vernacular Care, Kosuke Mizuno, Ekawati Sri Wahyuni, Taizo Wada, Kozo Matsubayashi

Journal of Environmental Science and Sustainable Development

The universal health social security program in Indonesia began in 2014, and as of the present day, many people are now covered by it. However, many weaknesses in the system have been pointed out. Significantly, many people do not possess the necessary health cards to take advantage of the program due to the complicated process one must go through in order to obtain them. Even now, 60 million people have not joined the program. Many people do not rely solely on the universal social security program but may be supported primarily or additionally by the vernacular care system, whereby support …


Table Of Contents Dec 2018

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …


Characterization Of A Protozoan Phosducin-Like Protein-3 (Phlp-3) Reveals Conserved Redox Activity, Rachel L. Kooistra, Robin David, Ana C. Ruiz, Sean W. Powers, Kyle J. Haselton, Kaitlyn Kiernan, Andrew M. Blagborough, Ken W. Olsen, Catherine Putonti, Stefan M. Kanzok Dec 2018

Characterization Of A Protozoan Phosducin-Like Protein-3 (Phlp-3) Reveals Conserved Redox Activity, Rachel L. Kooistra, Robin David, Ana C. Ruiz, Sean W. Powers, Kyle J. Haselton, Kaitlyn Kiernan, Andrew M. Blagborough, Ken W. Olsen, Catherine Putonti, Stefan M. Kanzok

Chemistry: Faculty Publications and Other Works

We recently identified three novel thioredoxin-like genes in the genome of the protozoan parasite Plasmodium that belong to the Phosducin-like family of proteins (PhLP). PhLPs are small cytosolic proteins hypothesized to function in G-protein signaling and protein folding. Although PhLPs are highly conserved in eukaryotes from yeast to mammals, only a few representatives have been experimentally characterized to date. In addition, while PhLPs contain a thioredoxin domain, they lack a CXXC motif, a strong indicator for redox activity, and it is unclear whether members of the PhLP family are enzymatically active. Here, we describe PbPhLP-3 as the first phosducin-like protein …


Development Of Flexible Nickel-Zinc And Nickel-Iron Batteries, Xianyang Meng Dec 2018

Development Of Flexible Nickel-Zinc And Nickel-Iron Batteries, Xianyang Meng

Dissertations

The fabrication of flexible nickel-zinc batteries using a facile mixing of electroactive components for electrode preparation is presented. Polytetrafluoroethylene (PTFE) is found to be an effective binder by reducing concentration polarization, providing chemical/physical stability and enhancing flexibility. The zinc electrode containing PTFE maintains its original porous morphology even after hundreds of cycles while polymers such as PEO show morphology change. Each component, as well as the assembled flexible cells show desired flexibility and stability even under bending conditions.

The fabrication of flexible nickel-iron batteries using printable composite electrodes embedded with multiwalled carbon nanotubes (CNT) is also presented. All the metal …


Table Of Contents Dec 2018

Table Of Contents

Journal of the South Carolina Academy of Science

No abstract provided.


From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord Dec 2018

From The Editors, Carole L. Hollingsworth, Michael E. Whitman, Herbert J. Mattord

Journal of Cybersecurity Education, Research and Practice

Welcome to the Fall 2018 issue of the Journal of Cybersecurity Education, Research, and Practice (JCERP). On behalf of the editorial team, we thank you for taking the time to read this issue and strongly encourage you to submit an article for consideration in an upcoming edition.


Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang Dec 2018

Using A Game To Improve Phishing Awareness, Patrickson Weanquoi, Jaris Johnson, Jinghua Zhang

Journal of Cybersecurity Education, Research and Practice

Cybersecurity education has become increasingly critical as we spend more of our everyday lives online. Research shows that college students are mostly unaware of the many online dangers. To teach students about cybersecurity using their preferred medium, gaming, we developed an educational 2D game called “Bird’s Life” that aims to teach college students, as well as general interest individuals, about phishing. Players will come to understand phishing attacks and how to avoid them in real-world scenarios through a fun gaming context. The game can be deployed to multiple platforms such as PC, web, and mobile devices. To measure the effect …


Using Case Studies To Teach Cybersecurity Courses, Yu Cai Dec 2018

Using Case Studies To Teach Cybersecurity Courses, Yu Cai

Journal of Cybersecurity Education, Research and Practice

This paper introduces a holistic and case-analysis teaching model by integrating case studies into cybersecurity courses. The proposed model starts by analyzing real-world cyber breaches. Students look into the details of these attacks and learn how these attacks took place from the beginning to the end. During the process of case analysis, a list of security topics reflecting different aspects of these breaches is introduced. Through guided in-class discussion and hands-on lab assignments, student learning in lecture will be reinforced. Overall, the entire cybersecurity course is driven by case studies. The proposed model is great for teaching cybersecurity. First, the …


An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf Dec 2018

An Examination Of Cybersecurity Knowledge Transfer: Teaching, Research, And Website Security At U.S. Colleges And Universities, Aditya Gupta, James R. Wolf

Journal of Cybersecurity Education, Research and Practice

This work seeks to answer the question: Does faculty cybersecurity knowledge gained from teaching and research transfer to other IT units in the university? Specifically, do colleges and universities that excel in cybersecurity teaching and research have more secure websites? This work explores a unique setting where the knowledge of the source and recipient are both directly related and observable without outside intervention. Our study employed data from 591 U.S. colleges and universities, the National Centers of Academic Excellence (CAE) program, accepted paper data from the ACM Conference on Computer and Communications Security (CCS) and the IEEE Symposium on Security …


Front Matter Dec 2018

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2018

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig Dec 2018

Forensic Analysis Of A Crash-Damaged Cheerson Cx-20 Auto Pathfinder Drone, Ian N. Mcateer, Peter Hannay, Muhammad I. Malik, Zubair Baig

Journal of Digital Forensics, Security and Law

Long gone are the days when Unmanned Aerial Vehicles (UAVs) and drones (multirotor UAVs) were the exclusive domain of the military for surveillance or tactical strike purposes. For relatively little money mainly due to high-tech progression in microprocessor design, anyone can now purchase a drone with GNSS-tracking capabilities and can support a live high-resolution video feed to its flight controller. The global population of drones has sky- rocketed in recent years as this new technology has been embraced for both its recreational and commercial applications. However, the more nefarious members of society have also recognized the potential for using drones …


Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot Dec 2018

Russia Today, Cyberterrorists Tomorrow: U.S. Failure To Prepare Democracy For Cyberspace, Jonathan F. Lancelot

Journal of Digital Forensics, Security and Law

This paper is designed to expose vulnerabilities within the US electoral system, the use of cyberspace to exploit weaknesses within the information assurance strategies of the democratic and republican party organizations, and deficiencies within the social media communications and voting machine exploits. A brief history of discriminatory practices in voting rights and voting access will be set as the foundation for the argument that the system is vulnerable in the cyber age, and the need for reform at the local, state and national levels will be emphasized. The possibility of a foreign nation-state influencing the outcome of an election by …


Back Matter Dec 2018

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.