Current filters:

Search Results

Item hits:
  • Thesis

  • Authors: Callaghan, Amy V. (2006)

  • Alkanes comprise a large component of petroleum. Biotransformation is the most important process governing their environmental fate and transport. A denitrifying, hexadecane-degrading consortium was established with Onondaga Lake, NY sediment. Phylogenetic analyses, based on DGGE and construction of clone libraries, revealed a diverse community of denitrifiers. Both methods identified an Azoarcus sp.. Protonated, d17- and [1-13C]-pentadecanoic acids and protonated, d24- and d25-tridecanoic acids were identified via GC-MS analysis. These data support a mechanism that involves carboxylation at the C-3 carbon, with subsequent C2-elimination. Hexadecane was mineralized as demonstrated by recovery of 14CO2 from cultures incubated with [1-14C]-hexadecane. This is the first report of carbo...

  • Thesis

  • Authors: Favaretto, Paola (2006)

  • In viewing a 3D scene, object features are seen on 3D surfaces infused with lightness and color at correct depths. By only focusing on how left and right features are correctly matched, most 3D vision models have not explained how this happens. A 3D LAMINART model (Grossberg and Howe, 2003; Cao and Grossberg, 2005) proposed that laminar cortical mechanisms interact to create 3D surface percepts using interactions between boundary and surface representations. Previous work using this model explained perception of relatively simple objects, like bars and blocks, in relatively simple spatial configurations that did not contain any mutual occlusions. This thesis extends the 3D LAMINART model to predict how textured images with multiple potential false binocular matches, e.g. dense stere...

  • Thesis

  • Authors: He, Changhua (2005)

  • Security is a serious concern in wireless networks. In order to eliminate the vulnerabilities in previous Standards, the IEEE 802.11i Standard is designed to provide security enhancements in MAC layer. The authentication process consists of several components, including an 802.1X authentication phase using TLS over EAP, a 4-Way Handshake to establish a fresh session key, and an optional Group Key Handshake for group communications. The objective of this work is to analyze IEEE 802.11i with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model, 802.111 appears to provide effective data confidentiality and integrity when CCMP is used. 802.111 may also provide satisfactory mutual authentication and key management, although there ar...

  • Thesis

  • Authors: Yuncken, Robert (2006)

  • If G is a connected Lie group, the Kasparov representation ring KKG(C, C) contains a singularly important element—the 'y-element—which is an idempotent relating the Kasparov representation ring of G with the representation ring of its maximal compact subgroup K. In the proofs of the Baum-Connes conjecture with coefficients for the groups G = SO0(n, 1) ([Kas84]) and G = SU(n, 1) ([JK95]), a key component is an explicit construction of the 'y-element as an element of G-equivariant K-homology for the space G/B, where B is the Borel subgroup of G. In this thesis, we describe some analytical constructions which may be useful for such a construction of -y in the case of the rank-two Lie group G = SL(3, C). The inspiration is the Bernstein-Gel’fand-Gel’fand complex—a natural differential ...

  • Thesis

  • Authors: Bebek, Gurkan (2006)

  • Large scale two-hybrid screens have generated a wealth of information describing potential protein-protein intereactions (PPIs). When interacting proteins are asso¬ciated with each other to generate networks, a map of the cell, picturing potential signaling pathways and interactive complexes is formed. PPI networks satisfy the small-world property and their degree distribution follow the power-law degree distribution. Recently, duplication based random graph models have been proposed to emulate the evolution of PPI networks and to satisfy these two graph theoretical properties. In this work, we show that the previously proposed model of Pastor-Satorras et al. (2003) does not generate a power-law degree distribution with exponential cutoff as claimed and the more restrictive model ...

  • Thesis

  • Authors: Temel, Burcin (2006)

  • This original research dissertation is composed of a new numerical technique based on Chebyshev polynomials that is applied on scattering problems, a phenomenological kinetics study for CO oxidation on RuO2 surface, and an experimental study on methanol coupling with doped metal oxide catalysts. Minimum Error Method (MEM), a least-squares minimization method, provides an efficient and accurate alternative to solve systems of ordinary differential equations. Existing methods usually utilize matrix methods which are computationally costful. MEM, which is based on the Chebyshev polynomials as a basis set, uses the recursion relationships and fast Chebyshev transforms which scale as O(N). For large basis set calculations this provides an enormous computational efficiency in the calcula...

  • Thesis

  • Authors: Ohnmacht, Corey M. (2006)

  • This dissertation involves the detailed examination of phenytoin and its binding properties to human serum albumin (HSA). This was accomplished by implementing various affinity chromatographic techniques including zonal elution and frontal analysis along with columns containing immobilized HSA to provide estimates of equilibrium binding constants. Affinity chromatography with plate height measurements was also used with theory-derived equations to measure the rate constants for the multisite binding of phenytoin to the chromatographic column. Part one discusses the complexity of phenytoin’s multisite binding and work that has been done previously to unravel the binding properties of phenytoin. In addition an expansion of current chromatographic theory describing multisite binding a...

  • Thesis

  • Authors: Tang, Xin (2006)

  • In this dissertation, we recall some basic notions and results in non-commutative algebraic geometry, especially in spectral theory of abelian categories as developed in [49], [50], [55], [56] and [57]. We apply them to study D-modules on the flag variety X = G/B and its quantized analogue. Via a locality theorem, we reduce the study of D-modules on the flag variety X to the study of modules over Weyl algebras. Then we present three explicit constructions of different classes of irreducible modules over Weyl algebras. For the quantized enveloping algebra Uq(g), we recover the construction of highest weight irreducible modules, via the Harish-Chandra homomorphism, in the framework of spectral theory. The rest of this work is based on a quantum analogue Xq of the flag variety X and th...