Now showing items 135-145 of 145

    • Un Gran Viaje A Data Visualization of Latin American Immigration 

      Carlson, Emma (2021)
      The story of the Latin American immigrant making their "gran viaje" or great journey to the United States transcends conversations presented in news articles and political rhetoric. Immigration trends, both past and present, ...
    • Uncertainties in Performance Estimates Of Reinforced Concrete Columns 

      Berry, Michael (2000-04-01)
      I assembled a reinforced concrete column test database and describe its layout. This database can be used by researchers and practicing engineers to establish the magnitudes of uncertainties involved in performance estimates ...
    • Uncertainty Calculation for Complex Measurements 

      Vanwoerkom, Pablo (2005-04-01)
      Propagations of errors, or uncertainties, can be computed in different ways. The ISO Guide to the Expression of Uncertainty in Measurement (GUM) recommends an estimate based on a first-order Taylor series expansion of the ...
    • Using Circuitry and Computer Analysis for Modern Cryptology 

      Lavallee, Peter (2008-04-01)
      Modem cryptology has allowed business to expand at an incredible rate by allowing people to transact business securely online. A common encryption process for encoding and decoding information utilizes a linear feedback ...
    • Using Temperature Measurements To Find the Flow Rate of Ground Water into a Stream 

      Perryman, Holly (2007-04-01)
      This study explored how the groundwater inflow rate for a stream may be approximated by applying the heat transport equation to stream temperature measurements and weather data. The two primary parameters we worked with ...
    • Utilizing Role Based Modeling Language to Determine a System’s Safety From an Advanced Persistent Threat 

      Johnson, Andrew (2019-04-01)
      With Advanced Persistent Threats (APTs) becoming a larger threat among the cyber world, it is important that software is designed with security in mind. In order to aide this process, software developers can use security ...
    • Verification of a Support Vector Machine Model for Predicting Proteotypic Peptides 

      Forbes, Jessica (2010-04-01)
      The current method to match mass spectra from tandem mass spectrometry (MS) to a peptide sequence requires searching a large database of all possible peptides encoded by an organism. However, only a subset of these possible ...
    • Wavelet Decomposition of a Function 

      Schauf, Michael (1996-04-01)
      Computers today play a major role in practically every aspect oflife, especially in the area of communications and signal processing. From e-mail and faxes to grocery market scanners and televisions, computers are relied ...
    • Web Analytics with N8stats 

      Woods, Nathan (2013-04-01)
      The Web provides businesses the opportunity to present and market themselves as never before. Given the ability to present almost unlimited information, a key question is how should that information be organized. N8stats ...
    • Weyl's Theory Of Non-Riemannian Geometry And Relativity 

      Dyba, William (1968-04-01)
      The non-Riemannian geometry of Weyl is an outgrowth of Levi- Civita’s concept of parallelism. It is based on the concept of linear displacement. In Weyl’s geometry length is non-transferable and, in light of this ...
    • Zombie Fever: Forecasting an Undead Epidemic 

      Reehl, Sarah (2013-04-01)
      The SIR model uses population the \susceptible," \infected," and \recovering" compartments to describe the spread of infectious disease throughout an entire population. In this paper we apply the SIR model to the 2012 ...