Search
Now showing items 71-80 of 393
Image Integrity Verification Using Content-Based Watermarking
(Oklahoma State University, 2005-05-01)
Digital watermarking is a technique to insert an information-carrying digital signature into a digital media so that the signature can be extracted for variety of purposes including ownership authentication and content ...
Lateral Steering of the Web in a Differentially Loaded Nip of Rubber Covered Rollers
(Oklahoma State University, 2005-12-01)
An unevenly loaded nip of rubber covered rollers can induce lateral deflection of the web. Closed form algorithms which relate the (i) applied nip force to rubber cover indentations and (ii) tangential strains on rubber ...
Identification of genes and pathways involved in alveolar epithelial cell differentiation using DNA microarray
(2005-12)
Scope and Method of Study:
Honor, Glory, and Individualism: Placing the American Literature of the First World War in a Cultural Context
(Oklahoma State University, 2005-07-01)
This study compares the thematic differences between the popular, pro-war literature written during the First World War with the less popular, anti-war literature written during the 1920s. This study focuses popular pro-war ...
How Close Are Oklahoma Hospitals to Being Baby - Friendly?
(Oklahoma State University, 2005-12-01)
The objectives were to determine breastfeeding knowledge and attitudes of maternity nurses in Oklahoma and to determine if nursing and hospital administrators in Oklahoma know about the Baby - Friendly Hospital Initiative. ...
Computer-assisted Mapping of "Cherokee" Sandstone Trends, by Reference to Spontaneous Potential Curves, in Parts of Creek, Lincoln, and Payne Counties, Oklahoma
(Oklahoma State University, 2005-05-01)
The purpose of this study was to see if trends of "Cherokee" sandstones within the study area could be mapped effectively, for petroleum exploration, if (a) sandstones are defined relative to the spontaneous potential curve ...
Hop-count Sensitive Packet Marking in Probabilistic Packet Marking
(Oklahoma State University, 2005-07-01)
Denial-of -Service attack has emerged as a great threat to the Internet. Trace back is the scheme that is used to get Denial of Service attacker. Various trace back schemes have been proposed by others. The draw back in ...
Qualitative study of community college faculty defined through the lens of sociological theories relating to professionalism and de-professionalism
(2005-07)
Scope and Method of Study: Qualitative Research of Community College Faculty
Effects of Compression on System Throughput in Wireless Application Protocol (Wap) 2.0 Architecture
(Oklahoma State University, 2005-05-01)
Wireless Application Protocol (WAP) protocol was developed to deploy Internet contents on hand held mobile devices. Initially WAP 1.0 was developed to deliver Internet contents over the wireless Internet. WAP 1.0 protocol ...