scispace - formally typeset
Search or ask a question
Institution

Wichita State University

EducationWichita, Kansas, United States
About: Wichita State University is a education organization based out in Wichita, Kansas, United States. It is known for research contribution in the topics: Population & Poison control. The organization has 4988 authors who have published 9563 publications receiving 253824 citations. The organization is also known as: WSU & Fairmount College.
Topics: Population, Poison control, Health care, Relay, Vortex


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a self-assembled supramolecular triad was formed by coordinating the pyridine group located on the diads to zinc tetraphenylporphyrin, ZnP, which was characterized by semi-empirical PM3, electrochemistry and steady-state and time-revolved spectroscopic techniques.
Abstract: Supramolecular triads of the type (donor-1)−acceptor:(donor-2) composed of free-base porphyrin, fullerene, and zinc porphyrin, have been formed by a “covalent-coordinate” approach. Toward this, two diads, namely, 5-(3‘-(2‘ ‘-(3‘ ‘‘ or 4‘ ‘‘-pyridyl)fulleropyrrolidinyl-N)ethoxyphenyl)-10,15,20-triphenylporphyrin, bearing C60 as acceptor and free-base porphyrin, H2P, as donor were first synthesized. The diads and self-assembled supramolecular triads, which were formed by coordinating the pyridine group located on the diads to zinc tetraphenylporphyrin, ZnP, have been characterized by semiempirical PM3, electrochemistry, and steady-state and time-revolved spectroscopic techniques. Subpicosecond and nanosecond transient absorption spectral studies of diads revealed the occurrence of the electron transfer from the H2P moiety to the C60 entity via the excited singlet state of H2P. Clear evidence for the formation of triads in o-dichlorobenzene was obtained from the steady-state and time-resolved fluorescence me...

93 citations

Proceedings ArticleDOI
30 Dec 2010
TL;DR: In this paper, security threats associated with cloud computing environment are evaluated and how such co-existent of VM's can be exploited to gain access over other user's data or deny service is explored and constructive security measures that can be deployed to avoid such attacks are proposed.
Abstract: Cloud computing creates exciting opportunities like reduced costs and flexibility to the users. It also comprises of some risks like data security within the cloud. Several common security threats like data leakage, insecure API's, and malicious inside users are applicable to cloud computing environment as well. In this paper, the authors consider a cloud computing service where multiple Virtual Machines (VM's) are co-located on the same physical server. In such systems, physical resources are transparently shared by the VMs belonging to multiple users. In systems like these, a malicious user having control of a VM can try to gain control over other VM's resources or utilize all system resources leading to denial of resource attack over other VM users. A malicious user can also try to steal the data of other users located on the same server by compromising hypervisor file system (logical volumes). In this paper, security threats associated with cloud computing environment are evaluated. Authors also explore how such co-existent of VM's can be exploited to gain access over other user's data or deny service and propose constructive security measures that can be deployed to avoid such attacks.

93 citations

Journal ArticleDOI
TL;DR: In this article, the validity of the 600-yard walk/run, 20m shuttle run, and a modified 16 m shuttle run was determined to measure aerobic capacity (VO2peak) in children with mild and moderate mental retardation.
Abstract: The validity of the 600-yard walk/run, the 20-m shuttle run, and a modified 16-m shuttle run was determined to measure aerobic capacity (VO2peak) in children with mild and moderate mental retardation. Practice sessions for all tests were conducted. All field tests were very reliable, and VO2peak was significantly related to them all. A stepwise multiple regression showed that field test performance, body mass index (BMI), and gender, but not age, were also significant predictors of VO2peak. All field tests were valid and reliable indicators of aerobic capacity, suggesting that these tests can be used to predict VO2max in children with mild and moderate mental retardation.

93 citations

Journal ArticleDOI
TL;DR: In this article, a nationally representative sample of college graduates (N =11,152) were surveyed regarding their job-seeking behaviors and outcomes and found significant race and sex differences in job search methods used.
Abstract: A nationally representative sample of college graduates (N =11,152) were surveyed regarding their job-seeking behaviors and outcomes. Race and sex differences among the job search strategies used, number of job interviews, number of job offers, annual salary, and job satisfaction were examined. Results indicated significant race and sex differences in job search methods used. There were significant differences in underemployment and job satisfaction as a function of race, and in underemployment and annual salary as a function of sex. There were no significant differences in number of job interviews or job offers regardless of race or sex.

93 citations

Journal ArticleDOI
TL;DR: This paper presents a toll pricing framework by which a traffic planner might find the most appropriate toll vector given certain restrictions and objectives on the network, and derives the toll sets and illustrates the toll Pricing framework for specific instances of the general variable demand models.
Abstract: In this paper, we present a toll pricing framework for a general variable demand traffic assignment problem with side constraints, where the demand between an origin destination pair is a function of the least total travel cost for making the trip. This general demand model unifies earlier toll pricing treatments of the variable demand models including elastic demand traffic assignment problems and combined distribution assignment problems. All of these models have the constant toll revenue property. Given that users experience the side constraints, we show that when they are charged by a toll vector in the first best toll set, the system optimal flows and demands are achieved. We then present a toll pricing framework by which a traffic planner might find the most appropriate toll vector given certain restrictions and objectives on the network. Finally, we derive the toll sets and illustrate the toll pricing framework for specific instances of the general variable demand models.

92 citations


Authors

Showing all 5021 results

NameH-indexPapersCitations
Herbert A. Simon157745194597
Rui Zhang1512625107917
Frederick Wolfe119417101272
Shunichi Fukuzumi111125652764
Robert Y. Moore9524535941
Maurizio Salaris7641720927
Annie K. Powell7348622020
Gunther Uhlmann7244419560
Danielle S. McNamara7053922142
Jonathan P. Hill6736719271
Francis D'Souza6647716662
Osamu Ito6554917035
Louis J. Guillette6433820263
Karl A. Gschneidner6467522712
Robert Reid5921512097
Network Information
Related Institutions (5)
Arizona State University
109.6K papers, 4.4M citations

92% related

Virginia Tech
95.2K papers, 2.9M citations

90% related

University of Illinois at Urbana–Champaign
225.1K papers, 10.1M citations

90% related

University of Texas at Austin
206.2K papers, 9M citations

90% related

Pennsylvania State University
196.8K papers, 8.3M citations

90% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202314
202259
2021331
2020351
2019325
2018327