Search
Now showing items 1-10 of 238
Buffering the pH of the Culture Medium does not Extend Yeast Replicative Lifespan
(F1000 Research, 2013)
During chronological aging of the budding yeast cells, the culture medium can become acidified and this acidification limits cell survival. As a consequence, buffering the culture medium to pH 6 significantly extends ...
Risk-adjustment of Quality Measures for Skilled Nursing Facilities: A Case Study
(2016-05-21)
Abstract not available.
Hydrogen Storage Technologies in Nanostructured Materials for NextGeneration Energy Storage and Conversion
(2017-01)
Hydrogen is considered as one of the promising alternative fuels to replace oil, but its storage remains to be a significant challenge. The main hydrogen storage technologies can be broadly classified as physical, chemical, ...
A New Composite CPU/Memory Model for Predicting Efficiency of Multi-core Processing
(IEEE Computer Society, 2014-02)
Techniques for predicting the efficiency of multi-core processing associated with a set of tasks with varied CPU and main memory requirements are introduced. Given a set of tasks each with different CPU and main memory ...
Convergence Studies on Monte Carlo Methods for Pricing Mortgage-Backed Securities
(International Journal of Financial Studies, 2015)
Monte Carlo methods are widely-used simulation tools for market practitioners
from trading to risk management. When pricing complex instruments, like mortgage-backed securities (MBS), strong path-dependency and high ...
A case study of metrics for assessing STEM scholarship programs
(Journal of Computer Sciences in Colleges, 2011)
As the challenges in Science, Technology, Engineering and Mathematics (STEM) education become more prominent, resources for promoting STEM education are more available. STEM scholarship programs, such as the S-STEM program ...
Security in Internet of Things: Opportunities and Challenges
(Proceeding of the International Conference on Identification, Information & Knowledge in the Internet of Things, 2016)
Internet of Things (IoT) have become the most pervasive and largest computing platform nowadays. Security plays a more and more important role because of the nature of IoT systems that deal with people's daily life. IoT ...
Establishing a BLE Mesh Network using Fabricated CSRmesh Devices
(The 2nd ACM/IEEE Symposium on Edge Computing, 2017-10)
In this demo we fabricate 4 development boards using the APlix CSR1010 modules and then establish a Bluetooth Low Energy (BLE) mesh network, which is suitable for power-limited and low-complexity IoT applications with ...
Numerical Relativity as a tool for studying the Early Universe
(Journal of Gravity, 2014)
Numerical simulations are becoming a more effective tool for conducting detailed investigations into the evolution of our universe. In this article, we show how the framework of numerical relativity can be used for studying ...
Partial Orders on C=D + Di and H=D +Di +Dj + Dk
(International Journal of Advanced Mathematical Sciences, 2015)
Let \(D\) be a totally ordered integral domain. We study partial orders on the rings \(C = D + Di\) and \(H = D + Di + Dj + Dk\), where \(i^{2} = j^{2} = k^{2} = -1\).