Now showing items 4-23 of 597

    • Acceleration of low-energy ions at parallel shocks with a focused transport model 

      Zuo, Pingbing; Zhang, Ming; Rassoul, Hamid K. (2013-04-10)
      We present a test particle simulation on the injection and acceleration of low-energy suprathermal particles by parallel shocks with a focused transport model. The focused transport equation contains all necessary physics ...
    • Acceleration of suprathermal particles by compressional plasma wave trains in the solar wind 

      Zhang, Ming (2010-12-04)
      This paper presents a calculation of particle acceleration by an idealized compressional plasma wave train. In this model, suprathermal particles, such as pickup ions, are continuously injected into a wave train consisting ...
    • Adaptive weighing of context models for lossless data compression 

      Mahoney, Matthew V. (2005-12-21)
      Until recently the state of the art in lossless data compression was prediction by partial match (PPM). A PPM model estimates the next-symbol probability distribution by combining statistics from the longest matching ...
    • The AGILE monitoring of Cygnus X-3: transient gamma-ray emission and spectral constraints 

      Piano, Giovanni; Tavani, Marco; Trois, Alessio; Giuliani, Andrea; Bulgarelli, Andrea; Evangelista, Yuri; Coppi, Paolo S.; Del Monte, Ettore D.; Sabatini, Sabina; Hannikainen, Diana Carina (2012-09-14)
      We present the AGILE-GRID (Astro-rivelatore Gamma a Immagini LEggero – Gamma-Ray Imaging Detector) monitoring of Cygnus X-3, during the period between November 2007 and July 2009. We report here the whole AGILE-GRID ...
    • Airline Consumer's Perception of Transport Security Administration’s Prohibited Items 

      D'souza, Clayton Ernest (2014-07)
      There has been limited research conducted and significantly limited scholarly articles on consumer attitudes towards the current TSA prohibited items list. If the research were to be conducted a year after the September ...
    • An algorithm for clearing combinatorial markets 

      Nzouonta, Josiane Domgang (2003-12-15)
      It was recently shown possible to solve single item auctions without revealing any secret except for the solution. Namely, with vMB-share [4], the seller and the buyer only learn each other's identity and the selling price ...
    • Algorithms for string searching on a Beowulf cluster 

      Kattamuri, Kishore Ramakrishna (2003-12-18)
      String matching is a subject of both theoretical and practical interest in computer science. Theoretically, time and space complexity of the algorithms and on the practical side searching for keywords, names, phrases etc., ...
    • Ammonia Feedstock Production by Chemical Looping Reactors 

      Charbonneau, Nate; DeLellis, Daniel; Naqi, Ahmad
      A preliminary design for production of an ammonia feedstock plant using a chemical looping reactor system is presented. This novel fluidized bed configuration produces discrete streams of hydrogen, nitrogen, and carbon ...
    • Analysis of Agular Momentum in Planetary Systems and Host Stars 

      Irwin, Stacy Ann (2015-07)
      The spin angular momentum of single Main Sequence stars has long been shown to follow a primary power law of stellar mass, J ∝ Mα, excluding stars of <2 solar masses. Lower mass stars rotate more slowly with and have ...
    • Analysis of fundamental interactions capable of producing neutrons in thunderstorms 

      Babich, Leonid P.; Bochkov, Evgeniǐ I.; Kutsyk, Igor M.; Rassoul, Hamid K. (2014-05-13)
      Elementary processes capable of producing neutrons in thunderstorms are analyzed. Efficiency is evaluated of nuclear fusion, photonuclear reaction, electrodisintegration, and reaction inverse to the β-decay. An extraordinary ...
    • Analysis of hostile network reconnaissance to anticipate and mitigate network attacks 

      Rivera, Luis Angel (2005-04-19)
      Network security systems today such as current intrusion detection systems, intrusion prevention systems and firewalls are good at reacting to attacks as they occur or shortly after they occur. Current security systems ...
    • An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection 

      Mahoney, Matthew V.; Chan, Philip K. (2003-01-27)
      We investigate potential simulation artifacts and their effects on the evaluation of network anomaly detection systems in the 1999 DARPA/MIT Lincoln Laboratory off-line intrusion detection evaluation data set. A statistical ...
    • Analysis of the experiment on registration of X-rays from the stepped leader of a cloud-to-ground lightning discharge 

      Babich, Leonid P.; Kutsyk, Igor M.; Donsko, Evgeni N.; Dwyer, Joseph R. (2013-05)
      Using a Monte Carlo technique to simulate the transport of runaway electrons (REs) and X-rays in the atmosphere and through attenuators covering detectors, we have modeled the results of experiments to detect X-rays from ...
    • Analysis of the Gal-Chen-Zhang single-Doppler velocity retrieval 

      Lazarus, Steven M.; Shapiro, Alan; Droegemeier, Kelvin (American Meteorological Society, 1999-01)
      The authors present herein an analysis of a single-Doppler velocity retrieval (SDVR) technique whereby the unobserved wind components are determined from single-Doppler radar data. The analysis is designed to provide ...
    • An analytical approach for calculating energy spectra of relativistic runaway electron avalanches in air 

      Cramer, Eric S.; Dwyer, Joseph R.; Arabshahi, Shahab; Liu, Ningyu; Rassoul, Hamid K.; Vodopiyanov, Igor (2014-09-15)
      Simplified equations describing the transport and energy spectrum of runaway electrons are derived from the basic kinematics of the continuity equations. These equations are useful in modeling the energy distribution of ...
    • Analyzing Thermal and Mechanical Effects of Pulsed Laser Irradiation on Tissues 

      Ganguly, Mohit (2014-05)
      Pulsed lasers are known for their spatial and temporal specificity in delivering heat energy to the tissues. This is useful in laser ablation treatment mechanism where damage to the healthy tissues is highly undesired. ...
    • An ancient extrasolar system with five sub-earth-size planets 

      Ragozzine, Darin A.; Campante, Tiago L.; Barclay, Thomas S.; Swift, Jonathan J.; Huber, Daniel; Adibekyan, V. Zh; Cochran, William D.; Burke, Christopher J.; Isaacson, Howard T.; Quintana, Elisa V. (2015-01-27)
      The chemical composition of stars hosting small exoplanets (with radii less than four Earth radii) appears to be more diverse than that of gas-giant hosts, which tend to be metal-rich. This implies that small, including ...
    • Android Home Automation 

      Almazrouei, Ahmed; Almansoori, Sayah; Al Neyadi, Abdulla
      Dimensions: 10 x 10 x 5 (cm) • Controlled using an Android Application • Controlling up to 3 appliances. • 2 : On/Off • 1 : Speed/Brightness control • Application interface: • Two sets of radio buttons: On/Off for ...
    • Appointment Cancellation Re-Scheduling Application 

      Aldurayhim, Yasir; Zhao, Boxiong; Maris, Andrew; Alharbi, Mishal
      The main idea of this project is to create commercial android applications to solve the issue of late cancellations and rescheduling in private practices. These applications will ease the difficulties of both client and ...
    • AppVeil: Controlling Android App Permissions 

      Berringer, Joseph; Fostiropoulos, Iordanis
      Our project lets you take any Android app and change the way it can access sensitive information and features on your device. You can block these features, making the target app obtain false information like “your contacts ...