Scala Server Faces,
2010
San Jose State University
Scala Server Faces, Vikas Vittal Rao
Master's Projects
Progress in the Java language has been slow over the last few years. Scala is emerging as one of the probable successors for Java with features such as type inference, higher order functions, closure support and sequence comprehensions. This allows object-oriented yet concise code to be written using Scala. While Java based MVC frameworks are still prevalent, Scala based frameworks along with Ruby on Rails, Django and PHP are emerging as competitors. Scala has a web framework called Lift which has made an attempt to borrow the advantages of other frameworks while keeping code concise. Since Sun’s MVC framework, Java …
Analysis Of Fluvial Suspended Sediment Load Contribution Through Anthropocene History To The South Atlantic Bight Coastal Zone, U.S.A.,
2010
University of South Carolina - Columbia
Analysis Of Fluvial Suspended Sediment Load Contribution Through Anthropocene History To The South Atlantic Bight Coastal Zone, U.S.A., K Mccarney-Castle, George Voulgaris, A J. Kettner
Faculty Publications
Discerning the effects of anthropogenic activities (i.e., reservoir construction, land use change), as opposed to those of natural processes (i.e., climate variability), on suspended sediment flux has become an increasingly difficult challenge. This contribution presents water and suspended sediment flux from five major watersheds that discharge into the southeastern U.S. Atlantic, a region that is currently considered sediment starved. Three periods of Anthropocenetime were defined and evaluated: (1) “pre-European conditions” (1680–1700), (2) “pre-dam conditions" (1905-1925), and (3) "post-dam conditions" (1985-2005). Physical and hydrologic watershed data were used to run a climate-driven hydrological transport numerical model (HydroTrend) to estimate …
Alternative Technical Efficiency Measures: Skew, Bias, And Scale,
2010
Syracuse University. Center for Policy Research
Alternative Technical Efficiency Measures: Skew, Bias, And Scale, William Clinton Horrace, Qu Feng
Center for Policy Research
In the fixed-effects stochastic frontier model an efficiency measure relative to the best firm in the sample is universally employed. This paper considers a new measure relative to the worst firm in the sample. We find that estimates of this measure have smaller bias than those of the traditional measure when the sample consists of many firms near the efficient frontier. Moreover, a two-sided measure relative to both the best and the worst firms is proposed. Simulations suggest that the new measures may be preferred depending on the skewness of the inefficiency distribution and the scale of efficiency differences.
High School Teachers Use Of Dynamic Software To Generate Serendipitous Mathematical Relations,
2010
University of Montana
High School Teachers Use Of Dynamic Software To Generate Serendipitous Mathematical Relations, Manuel Santos-Trigo, Hugo Espinosa-Pérez
The Mathematics Enthusiast
In this study, we document and analyse problem-solving approaches that high school teachers exhibited as a result of using dynamic software (Cabri-Geometry) to construct and examine geometric configurations. What type of questions do teachers pose and pursue while representing and exploring mathematical tasks or objects dynamically? To what extent their initial problem solving strategies are enhanced with the use of the tools? Results indicate that the use of the tool offered the participants the opportunity of constructing geometric configuration (formed by simple mathematical objects) that led them to identify and explore key mathematical relations.
When Is .999... Less Than 1?,
2010
University of Montana
When Is .999... Less Than 1?, Karin Usadi Katz, Mikhail G. Katz
The Mathematics Enthusiast
We examine alternative interpretations of the symbol described as nought, point, nine recurring. Is "an infinite number of 9s" merely a figure of speech? How are such alternative interpretations related to infinite cardinalities? How are they expressed in Lightstone's "semicolon" notation? Is it possible to choose a canonical alternative interpretation? Should unital evaluation of the symbol .999... be inculcated in a pre-limit teaching environment? The problem of the unital evaluation is hereby examined from the pre-R, pre-lim viewpoint of the student.
Accounting For Undesirable Outputs In Productivity Measurements: Application To The California-Oregon Drift Gillnet Fishery,
2010
College of William and Mary - Virginia Institute of Marine Science
Accounting For Undesirable Outputs In Productivity Measurements: Application To The California-Oregon Drift Gillnet Fishery, Tara L. Scott
Dissertations, Theses, and Masters Projects
Many production activities typically produce undesirable outputs, e.g., the production of the pollutant sulfur dioxide in the generation of electricity. Traditional economic metrics may overstate the efficiency and productivity of these production activities by failing to account for the undesirable outputs. These omissions can lead to conclusions that are biased against resource conservation and protection. Many fisheries capture their target species concomitantly with undesirable outputs such as bycatch of juvenile fish, marine mammals, sea birds, and sea turtles. One such fishery is the California-Oregon (CA/OR) drift gillnet fishery (DGNF), which incidentally takes protected species, such as sea turtles and marine …
Spatial And Temporal Patterns In Erosional And Depositional Processes: Physical And Biological Controls In The York River, Chesapeake Bay, Virginia,
2010
College of William and Mary - Virginia Institute of Marine Science
Spatial And Temporal Patterns In Erosional And Depositional Processes: Physical And Biological Controls In The York River, Chesapeake Bay, Virginia, Cielomar Rodríguez-Calderon
Dissertations, Theses, and Masters Projects
No abstract provided.
Assessing The Functional Status Of Created Wetlands In Eastern Virginia Via A Soil And Vegetative Developmental Trajectory,
2010
College of William & Mary - Arts & Sciences
Assessing The Functional Status Of Created Wetlands In Eastern Virginia Via A Soil And Vegetative Developmental Trajectory, Sara Elizabeth Kreisel
Dissertations, Theses, and Masters Projects
No abstract provided.
Survival In An Urbanized Landscape: Radio-Tracking Fledgling Eastern Bluebirds (Sialia Sialis) On Golf Courses,
2010
College of William & Mary - Arts & Sciences
Survival In An Urbanized Landscape: Radio-Tracking Fledgling Eastern Bluebirds (Sialia Sialis) On Golf Courses, Allyson Kathleen Jackson
Dissertations, Theses, and Masters Projects
No abstract provided.
Processing And Conversion Of Algae To Bioethanol,
2010
College of William & Mary - Arts & Sciences
Processing And Conversion Of Algae To Bioethanol, Sara Katherine Kampfe
Dissertations, Theses, and Masters Projects
No abstract provided.
Multifunctional Polymer Synthesis And Incorporation Of Gadolinium Compounds And Modified Tungsten Nanoparticles For Improvement Of Radiation Shielding For Use In Outer Space,
2010
College of William & Mary - Arts & Sciences
Multifunctional Polymer Synthesis And Incorporation Of Gadolinium Compounds And Modified Tungsten Nanoparticles For Improvement Of Radiation Shielding For Use In Outer Space, Emily Grace Harbert
Dissertations, Theses, and Masters Projects
No abstract provided.
Multimodal Non-Rigid Registration For Image-Guided Head And Neck Surgery,
2010
College of William & Mary - Arts & Sciences
Multimodal Non-Rigid Registration For Image-Guided Head And Neck Surgery, Michael Lawrence Weissberger
Dissertations, Theses, and Masters Projects
No abstract provided.
Geometrical Structure And Analysis Of Association Rules,
2010
San Jose State University
Geometrical Structure And Analysis Of Association Rules, Sar Rajat
Master's Projects
Association rule mining helps us to identify the association between items from a large transactional data set. It has always been a time consuming process because of repeatedly scanning of the data set. Apriori Algorithm [1] and FP-Tree Algorithm [2] are the two methods to find out the association of items in a large transactional item set. Both the above algorithm works differently (Apriori follows Bottom-Up Approach & FP-Tree follows Top-Down Approach) in order to get the association. Associations of items generated from the above two algorithms can be represented in geometry. The geometrical form of associations is called Simplical …
Heat Stress Evaluation Of Protective Clothing Ensembles,
2010
University of South Florida
Heat Stress Evaluation Of Protective Clothing Ensembles, Amanda Lee Pease
USF Tampa Graduate Theses and Dissertations
Clothing directly affects the level of heat stress exposure. Useful measures to express the thermal characteristics are WBGT (wet bulb globe temperature) clothing adjustment factor (CAF) or apparent total evaporative resistance (Re,T,a). The CAF is assigned through laboratory wear trials following a heat stress protocol in which the air temperature and humidity are progressively increased until the participant clearly loses the ability to maintain thermal equilibrium. The critical condition is the point of thermal transition and from these conditions both the CAF and Re,T,a are computed. The first objective of this study is to compare the …
Rethinking Biodiversity Conservation Effectiveness And Evaluation In The National Protected Areas Systems Of Tropical Islands: The Case Of Jamaica And The Dominican Republic,
2010
Wilfrid Laurier University
Rethinking Biodiversity Conservation Effectiveness And Evaluation In The National Protected Areas Systems Of Tropical Islands: The Case Of Jamaica And The Dominican Republic, Suzanne Mae Camille Davis
Theses and Dissertations (Comprehensive)
Island conservation theory and practice with regard to conservation of tropical terrestrial biodiversity in protected areas systems has yet to be adequately addressed in conservation literature. This knowledge gap is identified as a key contributor to the adoption of scientific principles for in situ biodiversity conservation, and “universal” conservation and protected area management paradigms that are unsuitable for island contexts and geographical scale. The underlying assumption is that “universal” concepts of biodiversity conservation, protected areas management, and evaluation of their effectiveness are transferable to the ecological and socio-economic contexts of tropical islands. The expected outcome of this knowledge transfer is …
Littoral Cells, Longshore Transport And Wave Climate: An Examination Of Littoral Transport Along The Western Shore Of Prince Edward County, Ontario,
2010
Wilfrid Laurier University
Littoral Cells, Longshore Transport And Wave Climate: An Examination Of Littoral Transport Along The Western Shore Of Prince Edward County, Ontario, Jayson A. Childs
Theses and Dissertations (Comprehensive)
This study discusses the wave climate and potential littoral transport along the western shore of Prince Edward County approximately two hours east of Toronto along the northern shoreline of Lake Ontario. The limestone headlands and barrier bars of the western coast are exposed toward a southwesterly fetch of approximately 200 km that can produce large offshore wave heights of 2–5 m. The wave model STWAVE was used to transform a standard set of wave conditions developed from recent hindcast data to examine fair weather, storm and extreme conditions for five directions between south and west-northwest along the shore. The resulting …
Metamorphic Viruses With Built-In Buffer Overflow,
2010
San Jose State University
Metamorphic Viruses With Built-In Buffer Overflow, Ronak Shah
Master's Projects
Metamorphic computer viruses change their structure—and thereby their signature—each time they infect a system. Metamorphic viruses are potentially one of the most dangerous types of computer viruses because they are difficult to detect using signature-based methods. Most anti-virus software today is based on signature detection techniques. In this project, we create and analyze a metamorphic virus toolkit which creates viruses with a built-in buffer overflow. The buffer overflow serves to obfuscate the entry point of the actual virus, thereby making detection more challenging. We show that the resulting viruses successfully evade detection by commercial virus scanners. Several modern operating systems …
A Framework For Active Learning: Revisited,
2010
San Jose State University
A Framework For Active Learning: Revisited, Yue Chen
Master's Projects
Over the past decade, algorithm visualization tools have been researched and developed to be used by Computer Science instructors to ease students’ learning curve for new concepts. However, limitations such as rigid animation frameworks, lack of user interaction with the visualization created, and learning a new language and environment, have severely reduced instructors’ desire to use such a tool. The purpose of this project is to create a tool that overcomes these limitations. Instructors do not have to get familiar with a new framework and learn another language. The API used to create algorithm animation for this project is through …
Food Phone Application,
2010
San Jose State University
Food Phone Application, Shengyu Li
Master's Projects
This project is about implementing a food menu application for users to search and upload food information by using a mobile phone. People sometimes may just know what food they wish to eat instead of the restaurants' name. Without knowing any restaurants' names, our food application's search only requires the name of the dish (e.g., hamburger, spaghetti, etc) in order to get the list of restaurants that serve these items and their corresponding information (e.g., location, hours, phone number, item's price, etc.). An advantage of using my food application is the system not only includes Google Map, but any information …
Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis,
2010
San Jose State University
Email Data Mining: An Approach To Construct An Organization Position-Wise Structure While Performing Email Analysis, Bhargav Vadher
Master's Projects
In this age of social networking, it is necessary to define the relationships among the members of a social network. Various techniques are already available to define user- to-user relationships across the network. Over time, many algorithms and machine learning techniques were applied to find relationships over social networks, yet very few techniques and information are available to define a relation directly over raw email data. Few educational societies have developed a way to mine the email log files and have found the inter-relation between the users by means of clusters. Again, there is no solid technique available that can …