Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

202,703 Full-Text Articles 246,078 Authors 47,230,550 Downloads 400 Institutions

All Articles in Physical Sciences and Mathematics

Faceted Search

202,703 full-text articles. Page 2 of 5525.

Complex Oscillatory Decrease With Size In Diffusivity Of {100}-Epitaxially Supported 3d Fcc Metal Nanoclusters, King C. Lai, James W. Evans 2019 Iowa State University and Ames Laboratory

Complex Oscillatory Decrease With Size In Diffusivity Of {100}-Epitaxially Supported 3d Fcc Metal Nanoclusters, King C. Lai, James W. Evans

James W. Evans

Diffusion and coalescence of supported 3D metal nanoclusters (NCs) leads to Smoluchowski Ripening (SR), a key pathway for catalyst degradation. Variation of the NC diffusion coefficient, DN, with size N (in atoms) controls SR kinetics. Traditionally, a form DN ∼ N−β was assumed consistent with mean-field analysis. However, KMC simulation of a stochastic model for diffusion of {100}-epitaxially supported fcc NCs mediated by surface diffusion reveals instead a complex oscillatory decrease of DN with N. Barriers for surface diffusion of metal atoms across and between facets, along step edges, etc., in this model are selected to accurately capture behavior ...


Panel 9. Paper 9.3: Connecting Social And Physical Boundaries Of The Commons : Study Of Kuhl Irrigation Systems Of Kangra, Amit Tandon 2019 University of Massachusetts Amherst

Panel 9. Paper 9.3: Connecting Social And Physical Boundaries Of The Commons : Study Of Kuhl Irrigation Systems Of Kangra, Amit Tandon

Rural Heritage - Landscapes and Beyond / PATRIMOINE RURAL: Paysages et au-delà

Water has been a lifeline of Indian agrarian society. The thriving agrarian economy requires water for irrigation and the need for resources to the evolution of indigenous technology through generations of communities. Kuhl irrigation system of Kangra is a community managed traditional irrigation systems found in western Himalayan. These are a centuries-old network of interconnected drainage channels that drain water from nearby khads (rivers) into the fields. The irrigation systems have codified customary laws, systems of collective action for maintenance and preservation and various traditional livelihoods.

Kuhls of Kangra is a unique case where the community is owned and managed ...


Effect Of Synthesized 3-Hydroxyflavone Solutions On The Performance Of Dye-Sensitized Solar Cells, Aarya Kapani, Hasitha Mahabaduge 2019 Georgia College and State University

Effect Of Synthesized 3-Hydroxyflavone Solutions On The Performance Of Dye-Sensitized Solar Cells, Aarya Kapani, Hasitha Mahabaduge

Georgia Journal of Science

We investigated the influence of synthesized dye combination 3-hydroxyflavone with potassium hydroxide and sodium hydroxide as photosynthesizers for dye-sensitized solar cells (DSSCs). DSSCs are classified as hybrid inorganic/organic photovoltaic cells that have been reported to have lower production costs and efficiency as high as 12%. Annealed titanium dioxide pastes on fluorine doped tin oxide was used as the front layer of the completed devices and the performance of 3-hydroxyflavone with potassium hydroxide and sodium hydroxide was compared with the performance of dyes extracted from berries. UV-vis spectroscopy was used to characterize the absorbance of the respective absorber dyes. 3-Hydroxyflavone ...


Environmental Inequality Dataset, Aran Clauson, Debra J. Salazar, Troy D. Abel 2019 Western Washington University

Environmental Inequality Dataset, Aran Clauson, Debra J. Salazar, Troy D. Abel

Troy D. Abel

The Disaggreated RSEI model data (also known as RSEI-GM, or Geographic Microdata) version 2.3.4 was downloaded from the Amazon Web Service created by EPA. The RSEI-GM provides detailed air model results from EPA’s Risk-Screening Environmental Indicators (RSEI) model. The results include chemical concentration, toxicity-weighted concentration and score, calculated for each 810 meter square grid cell in a 49-km circle around the emitting facility, for every year from 1988 through 2014. The data can be used to examine trends in air pollution from industrial facilities over time and across geographies. In order to allow for evaluation of toxic-weighted ...


Obat Sipilis De Nature Di Bandung Resmi Bpom, Obat Kutil Kelamin Di Jakarta 2019 University of California, San Francisco

Obat Sipilis De Nature Di Bandung Resmi Bpom, Obat Kutil Kelamin Di Jakarta

Obat Kutil Kelamin Di Jakarta

Jual Obat Sipilis Ampuh Asli DE NATURE di Bandung Jawa Barat
Gonore atau kencing nanah adalah penyakit kelamin yang bisa ditularkan melalui seks oral, anal atau vaginal. Penyakit ini tidak memunculkan gejala setelah beberapa minggu terinfeksi. Bila tidak diobati akan menyebabkan komplikasi. Pengobatan antibiotik merupakan obat kencing nanah yang harus dilakukan agar bakteri tidak menyebar sehingga pasien bisa sembuh.
Pengobatan untuk pasien gonore (kencing nanah)
Gonore tidak menyebabkan masalah jangka panjang jika diobati pada awal infeksi. Namun, bila penyakit ini tidak diobati tentu dapat menyebabkan banyak komplikasi. Pasalnya, infeksi gonore dapat menyebar ke bagian tubuh lain selain alat kelamin, yaitu ...


Laplacian Spectral Characterization Of Signed Sun Graphs, Fatemeh Motialah, Mohammad Hassan Shirdareh Haghighi 2019 Shiraz University

Laplacian Spectral Characterization Of Signed Sun Graphs, Fatemeh Motialah, Mohammad Hassan Shirdareh Haghighi

Theory and Applications of Graphs

A sun $SG_{n}$ is a graph of order $2n$ consisting of a cycle $C_{n}$, $n\geq 3$, to each vertex of it a pendant edge is attached. In this paper, we prove that unbalanced signed sun graphs are determined by their Laplacian spectra. Also we show that a balanced signed sun graph is determined by its Laplacian spectrum if and only if $n$ is odd.


Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li 2019 Kennesaw State University

Automatic Security Bug Detection With Findsecuritybugs Plugin, Hossain Shahriar, Kmarul Riad, Arabin Talukder, Hao Zhang, Zhuolin Li

KSU Proceedings on Cybersecurity Education, Research and Practice

The security threats to mobile application are growing explosively. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Secure software development must be addressed earlier in the development lifecycle rather than fixing the security holes after attacking. Early eliminating against possible security vulnerability will help us increase the security of software and mitigate the consequence of damages of data loss caused by potential malicious attacking. In this paper, we present a static security analysis approach with open source FindSecurityBugs plugin for Android StThe security threats to mobile application are growing explosively. Mobile app ...


Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan VanSickle, Tamirat Abegaz, Bryson Payne 2019 University of North Georgia

Effectiveness Of Tools In Identifying Rogue Access Points On A Wireless Network, Ryan Vansickle, Tamirat Abegaz, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

Wireless access points have greatly improved users' ability to connect to the Internet. However, they often lack the security mechanisms needed to protect users. Malicious actors could create a rogue access point (RAP), using a device such as the WiFi Pineapple Nano, that could trick users into connecting to an illegitimate access point (AP). To make them look legitimate, adversaries tend to setup RAPs to include a captive portal. This is very effective, since most public networks use captive portals as a means to provide genuine access. The objective of this study is to examine the effectiveness of RAP identification ...


Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne 2019 University of North Georgia

Automated Reverse Engineering Of Automotive Can Bus Controls, Charles Barron Kirby, Bryson Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This research provides a means of automating the process to reverse engineer an automobile’s CAN Bus to quickly recover CAN IDs and message values to control the various systems in a modern automobile. This approach involved the development of a Python script that uses several open-source tools to interact with the CAN Bus, and it takes advantage of several vulnerabilities associated with the CAN protocol. These vulnerabilities allow the script to conduct replay attacks against the CAN Bus and affect various systems in an automobile without the operator’s knowledge or interaction.

These replay attacks can be accomplished by ...


A World Of Cyber Attacks (A Survey), mubarak Banisakher, Marwan Omar 2019 Saintleo University

A World Of Cyber Attacks (A Survey), Mubarak Banisakher, Marwan Omar

KSU Proceedings on Cybersecurity Education, Research and Practice

The massive global network that connects billions of humans and millions of devices and allow them to communicate with each other is known as the internet. Over the last couple of decades, the internet has grown expeditiously and became easier to use and became a great educational tool. Now it can used as a weapon that can steal someone’s identity, expose someone’s financial information, or can destroy your networking devices. Even in the last decade, there have been more cyber attacks and threats destroying major companies by breaching the databases that have millions of personal information that can ...


An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam 2019 Kennesaw State University

An Exploratory Analysis Of Mobile Security Tools, Hossain Shahriar, Md Arabin Talukder, Md Saiful Islam

KSU Proceedings on Cybersecurity Education, Research and Practice

The growing market of the mobile application is overtaking the web application. Mobile application development environment is open source, which attracts new inexperienced developers to gain hands on experience with applicationn development. However, the security of data and vulnerable coding practice is an issue. Among all mobile Operating systems such as, iOS (by Apple), Android (by Google) and Blackberry (RIM), Android dominates the market. The majority of malicious mobile attacks take advantage of vulnerabilities in mobile applications, such as sensitive data leakage via the inadvertent or side channel, unsecured sensitive data storage, data transition and many others. Most of these ...


Towards An Assessment Of Audio And Visual Alerts And Warnings To Mitigate Risk Of Phishing Emails Susceptibility, Molly Cooper, Yair Levy, Ling Wang, Laurie Dringus 2019 Nova Southeastern University

Towards An Assessment Of Audio And Visual Alerts And Warnings To Mitigate Risk Of Phishing Emails Susceptibility, Molly Cooper, Yair Levy, Ling Wang, Laurie Dringus

KSU Proceedings on Cybersecurity Education, Research and Practice

Phishing attacks target significant volume of Americans per year, and costs American organizations in the millions of dollars annually. Phishing is a cyber-attack using social engineering. Social engineering is the psychological manipulation of individuals in order to gain access to computer system(s) that the attacker is not authorized to use. Phishing can be presented in many ways: an email, link, website, text message, and other means. Phishing emails present a threat to both personal and organizational data loss. About 94% of cybersecurity incidents are due to phishing and/or social engineering. Significant volume of prior literature documented that end ...


Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward 2019 The University of Auckland

Iot: Challenges In Information Security Training, Lech J. Janczewski, Gerard Ward

KSU Proceedings on Cybersecurity Education, Research and Practice

Both consumers and businesses are rapidly adopting IoT premised on convenience and control. Industry and academic literature talk about billions of embedded IoT devices being implemented with use-cases ranging from smart speakers in the home, to autonomous trucks, and trains operating in remote industrial sites. Historically information systems supporting these disparate use-cases have been categorised as Information Technology (IT) or Operational Technology (OT), but IoT represents a fusion between these traditionally distinct information security models.

This paper presents a review of IEEE and Elsevier peer reviewed papers that identifies the direction in IoT education and training around information security. It ...


Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez 2019 National University

Proposal For A Joint Cybersecurity And Information Technology Management Program, Christopher Simpson, Debra Bowen, William Reid, James Juarez

KSU Proceedings on Cybersecurity Education, Research and Practice

Cybersecurity and Information Technology Management programs have many similarities and many similar knowledge, skills, and abilities are taught across both programs. The skill mappings for the NICE Framework and the knowledge units required to become a National Security Agency and Department of Homeland Security Center of Academic Excellence in Cyber Defense Education contain many information technology management functions. This paper explores one university’s perception on how a joint Cybersecurity and Information Technology Management program could be developed to upskill students to be work force ready.


Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz 2019 Georgia Southern University

Adversarial Thinking: Teaching Students To Think Like A Hacker, Frank Katz

KSU Proceedings on Cybersecurity Education, Research and Practice

Today’s college and university cybersecurity programs often contain multiple laboratory activities on various different hardware and software-based cybersecurity tools. These include preventive tools such as firewalls, virtual private networks, and intrusion detection systems. Some of these are tools used in attacking a network, such as packet sniffers and learning how to craft cross-site scripting attacks or man-in-the-middle attacks. All of these are important in learning cybersecurity. However, there is another important component of cybersecurity education – teaching students how to protect a system or network from attackers by learning their motivations, and how they think, developing the students’ “abilities to ...


Get Rid Of Viga Plus Problems Once And For All, Viga Plus France 2019 University of California, San Francisco

Get Rid Of Viga Plus Problems Once And For All, Viga Plus France

Viga Plus France


Viga Plus France :- The order will be sent and delivered to you within three days. Read carefully all the recommendation.Natural male enhancement supplements could be essential in this case because of the essential nutrients they provide that will help in boosting energy levels. This will allow for an improved sexual and physical performance.

Viga Plus France :- This is the reason for Viga Plus supplement.Viga Plus supplement helps to increase the levels of testosterone in the body, therefore, improving both physical and sexual performance. This will help in improving your relationship with your ...


Vacuum-Assisted Sorbent Extraction: An Analytical Methodology For The Determination Of Ultraviolet Filters In Environmental Samples, María Trujillo-Rodríguez, Jared L. Anderson, Sage J. B. Dunham, Victoria L. Noad, Daniel B. Cardin 2019 Iowa State University

Vacuum-Assisted Sorbent Extraction: An Analytical Methodology For The Determination Of Ultraviolet Filters In Environmental Samples, María Trujillo-Rodríguez, Jared L. Anderson, Sage J. B. Dunham, Victoria L. Noad, Daniel B. Cardin

Jared L. Anderson

Vacuum-assisted sorbent extraction (VASE) has been applied for the first time in the determination of UV filters in water samples in combination with gas chromatography-mass spectrometry. VASE is a variant of headspace extraction which was developed in conjunction with the sorbent pen (SP) technology. This technique combines the advantages of both stir-bar assisted extraction and headspace solid-phase microextraction. The SP traps allowed both reduced pressure in-vial extraction and direct thermal desorption via a unique gas chromatographic injection port. The main parameters that affect the performance of VASE, including both extraction and desorption conditions, were extensively optimized. Under optimum conditions, extraction ...


Internet Core Functions: Security Today And Future State, Jeffrey Jones 2019 Kennesaw State University

Internet Core Functions: Security Today And Future State, Jeffrey Jones

KSU Proceedings on Cybersecurity Education, Research and Practice

Never in the history of the world has so much trust been given to something that so few understand. Jeff reviews three core functions of the Internet along with recent and upcoming changes that will impact security and the world.


On The Perron-Frobenius Theory Of $M_V-$Matrices And Eventually Exponentially Nonnegative Matrices, Thaniporn Chaysri, Dimitrios Noutsos 2019 University of Ioannina

On The Perron-Frobenius Theory Of $M_V-$Matrices And Eventually Exponentially Nonnegative Matrices, Thaniporn Chaysri, Dimitrios Noutsos

Electronic Journal of Linear Algebra

${M_v}-$matrix is a matrix of the form $A = sI-B$, where $ 0 \le \rho (B) \le s$ and $B$ is an eventually nonnegative matrix. In this paper, $M_v-$matrices concerning the Perron-Frobenius theory are studied. Specifically, sufficient and necessary conditions for an $M_v-$matrix to have positive left and right eigenvectors corresponding to its eigenvalue with smallest real part without considering or not if $index_{0} B \leq 1$ are stated and proven. Moreover, analogous conditions for eventually nonnegative matrices or $M_v-$matrices to have all the non Perron eigenvectors or generalized eigenvectors not being nonnegative are studied. Then, equivalent ...


Inequalities For Sector Matrices And Positive Linear Maps, Fuping Tan, Huimin Chen 2019 Shanghai University

Inequalities For Sector Matrices And Positive Linear Maps, Fuping Tan, Huimin Chen

Electronic Journal of Linear Algebra

Ando proved that if $A, B$ are positive definite, then for any positive linear map $\Phi$, it holds \begin{eqnarray*} \Phi(A\sharp_\lambda B)\le \Phi(A)\sharp_\lambda \Phi(B), \end{eqnarray*} where $A\sharp_\lambda B$, $0\le\lambda\le 1$, means the weighted geometric mean of $A, B$. Using the recently defined geometric mean for accretive matrices, Ando's result is extended to sector matrices. Some norm inequalities are considered as well.


Digital Commons powered by bepress