Current Search: poster (x) » text (x) » FAU Undergraduate Student Research (x) » Document (PDF) (x) » Frazier, Evelyn (x) » College of Business (x)
View All Items
Pages
- Title
- Meaningful links: Using network analysis to articulate the structure of personality psychology.
- Creator
- Hesse, Jared, Lanning, Kevin
- Abstract/Description
-
The current study is presented as an exploratory network analysis of personality psychology using a network composed of 54 source papers and their references. The articles used were papers from the Annual Review of Psychology journal, which dealt with the subject of personality, from 1950 to 2012. References from the source papers were pulled and then mapped onto a network that graphically illustrated the links between different citations. From the network it was possible to deduce, both...
Show moreThe current study is presented as an exploratory network analysis of personality psychology using a network composed of 54 source papers and their references. The articles used were papers from the Annual Review of Psychology journal, which dealt with the subject of personality, from 1950 to 2012. References from the source papers were pulled and then mapped onto a network that graphically illustrated the links between different citations. From the network it was possible to deduce, both visually and statistically, distinctively clustered communities, the relative influence of certain psychologists, and the researchers that bridged disciplinary gaps within the field of personality research. By using digital humanities methods such as network analysis it is possible to better understand and articulate the history and growth of personality psychology.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005023
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Gender Stereotypes and Political Ambition.
- Creator
- Dooley, Connor, Holman, Mirya R.
- Abstract/Description
-
This study analyzes the effects of gender stereotypes on the perception of emotion in hypothetical political candidates. By presenting subjects with various combinations of emotional displays by both male and female candidates, we will be able to see if any gender stereotypes are primed or activated by these displays, and more importantly, the differences in perception of these displays based on the candidate’s gender. For example, if we present the subject with a male candidate who appears...
Show moreThis study analyzes the effects of gender stereotypes on the perception of emotion in hypothetical political candidates. By presenting subjects with various combinations of emotional displays by both male and female candidates, we will be able to see if any gender stereotypes are primed or activated by these displays, and more importantly, the differences in perception of these displays based on the candidate’s gender. For example, if we present the subject with a male candidate who appears aggressive and confrontational, will he be viewed the same way as a female candidate with the same characteristics? Will gender stereotypes cause the female candidate to be perceived more negatively than the male? Previous research has supported the idea that gender stereotypes will effect perception of candidates based on their gender, and this study will help to see if specific stereotypes are primed for application by the subject based on emotional displays.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005012
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Synthesis of Podophyllotoxin Derivatives.
- Creator
- Flint, Madison, Roche, Stéphane P.
- Abstract/Description
-
Podophyllotoxin is a natural aryltetralin lignan compound isolated from plants within the genus Podophyllum. Podophyllotoxin has been under extensive biochemical investigation since the discovery of its biological activity as a strong microtubule destabilizing mitotic agent. Although these antineoplastic compounds have shown significant activity as cancerous cell growth inhibitors, they lack selectivity and are thus extremely toxic to healthy cells. This has led to a recent interest in the...
Show morePodophyllotoxin is a natural aryltetralin lignan compound isolated from plants within the genus Podophyllum. Podophyllotoxin has been under extensive biochemical investigation since the discovery of its biological activity as a strong microtubule destabilizing mitotic agent. Although these antineoplastic compounds have shown significant activity as cancerous cell growth inhibitors, they lack selectivity and are thus extremely toxic to healthy cells. This has led to a recent interest in the synthesis of Podophyllotoxin analogues in hopes of optimizing the biological selectivity and potency of these semi-synthetic derivatives. The objective of my research in the Roche group is to generate a library of these derivatives for subsequent biological assays to determine their potential as chemotherapeutic agents. In total I have synthesized 22 Podophyllotoxin analogues. Of these 22 derivatives, 14 have been biologically evaluated and 4 were observed to possess promising anti-cancer activity and are currently undergoing further evaluation.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005014
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Synthesis of Complex Polycyclic Scaffolds Incorporating α-Amino Esters.
- Creator
- Zorc, Stephen A., Samanta, Shyam S., Roche, Stéphane P., Charles E. Schmidt College of Science
- Abstract/Description
-
In order to keep up with the high demand for biologically active molecules, chemists devised several synthetic strategies to access novel chemical spaces. The two main strategies to construct new scaffolds are to revisit underexploited or forgotten reactions or to devise new transformations. We are exploring a unique and underexploited reaction, the Himbert–Henn cycloaddition, to produce complex molecular scaffolds in a single step (strategy 1). In a second novel approach, we are modifying...
Show moreIn order to keep up with the high demand for biologically active molecules, chemists devised several synthetic strategies to access novel chemical spaces. The two main strategies to construct new scaffolds are to revisit underexploited or forgotten reactions or to devise new transformations. We are exploring a unique and underexploited reaction, the Himbert–Henn cycloaddition, to produce complex molecular scaffolds in a single step (strategy 1). In a second novel approach, we are modifying the Hantzsch 4-component reaction (4CR) by incorporating an α-amino ester residue to construct new molecules (strategy 2). Both of these reactions have great potential to synthesize novel and chiral molecules from proteinogenic α-amino esters. These unprecedented and complex polycyclic molecules have potential application in medicinal chemistry and natural product synthesis. 4-aza-podophyllotoxins obtained by the Hantzsch-4CR have been proven to be potent as anti-leukemia, anti-colon cancer, and vascular disrupting agents (with nanomolar activity).
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005218
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Women’s Representation in Contemporary Hollywood Film Culture.
- Creator
- Trujillo, Michelle, Sim, Gerald, Dorothy F. Schmidt College of Arts and Letters
- Abstract/Description
-
See Her is a found footage montage that identifies the issue of women’s representation in contemporary Hollywood film culture. It analyzes different ways that spectatorship develops through the division of the film into four sections of which three analyze film from the perspective of Laura Mulvey, Mary Ann Doane, and Linda Williams. These three sections also approach the representation of women as a sociological issue of oppression as discussed by sociologist Patricia Hill Collins. The last...
Show moreSee Her is a found footage montage that identifies the issue of women’s representation in contemporary Hollywood film culture. It analyzes different ways that spectatorship develops through the division of the film into four sections of which three analyze film from the perspective of Laura Mulvey, Mary Ann Doane, and Linda Williams. These three sections also approach the representation of women as a sociological issue of oppression as discussed by sociologist Patricia Hill Collins. The last section serves as a speculative vision of the future of female representation in Hollywood Film Culture. While this film is critical on the current state of representation, it presents hope for a more equal future.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005215
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Development and Calibration of a Low-Cost Visible Spectrometer.
- Creator
- Jinandra, Amisha, Smith, Eugene
- Abstract/Description
-
Visible spectrometers record the absorption of electromagnetic radiation as a function of wavelength, and the spectral data contains both qualitative and quantitative information. While these instruments are an essential tool for chemists, students often have limited access to quality instruments due to their high cost. The components used to construct visible spectrometers are moderately inexpensive due to recent technological advances, yet instruments remain expensive. The long term goal of...
Show moreVisible spectrometers record the absorption of electromagnetic radiation as a function of wavelength, and the spectral data contains both qualitative and quantitative information. While these instruments are an essential tool for chemists, students often have limited access to quality instruments due to their high cost. The components used to construct visible spectrometers are moderately inexpensive due to recent technological advances, yet instruments remain expensive. The long term goal of this study is to develop a visible spectrometer accessible to students using readily available and inexpensive components. To accomplish this goal, a prototype instrument was calibrated. Resolution was determined by recording data for samples that absorb visible light at specific wavelengths. To assess the utility of the spectrometer for quantitative analysis, signal intensities were obtained as a function of sample concentration.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005025
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Should the Navy be exempt from marine mammal protection regulations in times of peace?.
- Creator
- Bitton, Joanna, Holman, Mirya R., College of Engineering and Computer Science
- Abstract/Description
-
Whales, dolphins, and other marine mammals depend on their hearing to survive, but human technology is now invading their world. Military sonar used by the US Navy to detect submarines emit noises as loud as rocket blasts. These noises infiltrate the ocean and marine mammals get disoriented, have permanent hearing loss, get stranded, or die. With practical safety procedures in place, whales and other marine mammals can be protected from navy sonar. Striking a balance between the nation’s...
Show moreWhales, dolphins, and other marine mammals depend on their hearing to survive, but human technology is now invading their world. Military sonar used by the US Navy to detect submarines emit noises as loud as rocket blasts. These noises infiltrate the ocean and marine mammals get disoriented, have permanent hearing loss, get stranded, or die. With practical safety procedures in place, whales and other marine mammals can be protected from navy sonar. Striking a balance between the nation’s security and the safety of marine mammals can be achieved by passing legislation that takes into consideration both needs. With quality policies such as reducing sonar usage in times of peace in locations that have a high concentration of marine mammals and avoiding sonar use in areas in which they migrate to and feed from, marine mammals can be protected. These safety measures can be passed by using adjudicatory actions.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005176
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Saving the Earth From Becoming Like Venus.
- Creator
- Fahmy, Andrew, Holman, Mirya R., Charles E. Schmidt College of Science
- Abstract/Description
-
This research discusses how a cap and trade policy could be established in the US to reduce greenhouse emissions in order to avoid the expected disastrous consequences that these emissions might have on our planet. Cap and trade potentially embodies an effective political compromise that helps protect our planet as well as ensure economic prosperity. Cap and trade sets a limit on greenhouse emissions while allowing business to trade their emissions under free market rules. Cap and trade has...
Show moreThis research discusses how a cap and trade policy could be established in the US to reduce greenhouse emissions in order to avoid the expected disastrous consequences that these emissions might have on our planet. Cap and trade potentially embodies an effective political compromise that helps protect our planet as well as ensure economic prosperity. Cap and trade sets a limit on greenhouse emissions while allowing business to trade their emissions under free market rules. Cap and trade has been successfully implemented both internationally in Europe, as well as domestically in California. This project looks at implementing a similar model nationally which might lead to advantageous breakthroughs in reducing greenhouse emissions. Moreover, the project discusses the political feasibility and alternative policy pathways and measures that can be taken to pass this policy on a national level.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005184
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Urban Growth’s Effect on the Florida Everglades.
- Creator
- Sapienza, Valerie, Holman, Mirya R., Charles E. Schmidt College of Science
- Abstract/Description
-
Urban growth, also known as urbanization or urban sprawl, is the spreading of metropolitan growth that consumes natural areas, which has many harmful effects on the environment. This study provides information on how urban growth is affecting the Florida Everglades in destructive ways, with a focus on the water in the Everglades. A plethora of water pollutants, such as phosphorous, nitrogen and mercury come directly from human activities associated with urban sprawl. This pollution affects...
Show moreUrban growth, also known as urbanization or urban sprawl, is the spreading of metropolitan growth that consumes natural areas, which has many harmful effects on the environment. This study provides information on how urban growth is affecting the Florida Everglades in destructive ways, with a focus on the water in the Everglades. A plethora of water pollutants, such as phosphorous, nitrogen and mercury come directly from human activities associated with urban sprawl. This pollution affects many parts of the Everglades’ natural ecosystem including sawgrass marshes and mangrove swamps, as well as endangered species, such as, the crocodile and Florida panther. This study also addresses limits on chemical pollution that can be placed by the President through executive orders. Overall, the water pollution in the Everglades is destructive in many ways and can be reduced through executive orders from the President to limit the use of chemicals in urban fringe areas.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005208
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Urban Sprawl: The Invisible Destroyer of the Environment.
- Creator
- Gastineau, Megan, Holman, Mirya R., Dorothy F. Schmidt College of Arts and Letters
- Abstract/Description
-
The purpose of this research is to inform Americans of what sprawl is and the negative effects it has on the environment. Sprawl is the unnecessary expansion of urban areas onto valuable unused land. In 2013, only 26% of Americans saw sprawl as a problem at all. Yet sprawl is the culprit behind better known issues, such as air pollution and water contamination. The increased use of vehicles and runoff makes sprawled out areas more polluted than compact cities. Because condensing a city is not...
Show moreThe purpose of this research is to inform Americans of what sprawl is and the negative effects it has on the environment. Sprawl is the unnecessary expansion of urban areas onto valuable unused land. In 2013, only 26% of Americans saw sprawl as a problem at all. Yet sprawl is the culprit behind better known issues, such as air pollution and water contamination. The increased use of vehicles and runoff makes sprawled out areas more polluted than compact cities. Because condensing a city is not a workable solution, another way is to improve public transportation. Places that have more sprawl force people to use cars. Improving public transportation by making it more accessible and reliable would encourage people to not use their cars, which saves them money and, in turn, causes less pollution.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005190
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Technology and Design of a Fuel Cell - Photo-Voltaic Powered Vehicle with an Energy Storage System.
- Creator
- Augustin, Windy, Carvalho Dias, Thiago, Flit, Mike, Bennett, Thomas, Zilouchian, Ali
- Abstract/Description
-
FAU's Office of Undergraduate Research and Inquiry hosts an annual symposium where students engaged in undergraduate research may present their findings either through a poster presentation or an oral presentation.
- Date Issued
- 2011
- PURL
- http://purl.flvc.org/fau/fd/FA00005427
- Format
- Document (PDF)
- Title
- FAU Navigation System.
- Creator
- Cerezo, Maria, Barbosa, Edgard, Rezler, Evonne, Nguyen, Tony
- Abstract/Description
-
The navigational system at Florida Atlantic University Boca Raton campus does not provide efficient travel for visitors, students, and faculty. Results from a survey shows 8 out of 10 people are being misdirected around the Boca Raton campus causing delays, traffic, and frustration. The architectural design of the Boca Raton campus buildings makes navigating even more difficult because of their identical qualities. The directory maps on campus fail to inform current position, are visually...
Show moreThe navigational system at Florida Atlantic University Boca Raton campus does not provide efficient travel for visitors, students, and faculty. Results from a survey shows 8 out of 10 people are being misdirected around the Boca Raton campus causing delays, traffic, and frustration. The architectural design of the Boca Raton campus buildings makes navigating even more difficult because of their identical qualities. The directory maps on campus fail to inform current position, are visually overwhelming and are outdated. From the research collected, we will create a cohesive navigational system that makes travel easier for visitors, students, and faculty. The new navigational system will comprise of a redesigned directory, numeric building signage, route markers, and an instruction manual.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005008
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Effects of Sulindac and Taurine on Glutamate Induced Exocitoxicity and Hypoxia Induced Cell Death.
- Creator
- D'Errico, Anthony, Pan, Chunliu, Prentice, Howard
- Abstract/Description
-
FAU's Office of Undergraduate Research and Inquiry hosts an annual symposium where students engaged in undergraduate research may present their findings either through a poster presentation or an oral presentation.
- Date Issued
- 2011
- PURL
- http://purl.flvc.org/fau/fd/FA00005431
- Format
- Document (PDF)
- Title
- Stucco Removal Engineering.
- Creator
- Shaw, Brandon, Murphy, Jonathan, Trotsek, Dylan, Meeroff, Daniel E., Cowan, David, College of Engineering and Computer Science
- Abstract/Description
-
Construction workers are exposed to fine particulate inhalation hazards during stucco removal. The ultimate goal of this research is to test a new chemical-assisted method that will reduce workers’ exposures to safer levels. To that end, the minimum specimen size must be determined that will replicate this hazardous work environment. Samples of concrete stucco surfacing material (CSSM) of various sizes ranging from 1-in×1-in. to 8-in.×16-in. were applied to masonry blocks. These specimens...
Show moreConstruction workers are exposed to fine particulate inhalation hazards during stucco removal. The ultimate goal of this research is to test a new chemical-assisted method that will reduce workers’ exposures to safer levels. To that end, the minimum specimen size must be determined that will replicate this hazardous work environment. Samples of concrete stucco surfacing material (CSSM) of various sizes ranging from 1-in×1-in. to 8-in.×16-in. were applied to masonry blocks. These specimens were tested to determine the minimum size needed to produce 150-mg/m3 (one order of magnitude larger than the OSHA exposure limit of 15-mg/m3) of airborne particulate in a 1-m3 test chamber when removed with a chipping hammer. Testing results revealed that 5-in.× 5-in. specimen size yielded on average 180-mg/m3 of particulates.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005210
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Pentraxin 3 Reactivity to Acute Exercise in Obese Individuals.
- Creator
- Maharaj, Arun, Urtula, Alyssa M., Slusher, Aaron L., Mock, J. Thomas, Fisher, Craig B., Huang, Chun-Jung
- Abstract/Description
-
Pentraxin 3 (PTX3) has been demonstrated as a vital biomarker for chronic inflammatory diseases. Decreased plasma PTX3 has been observed in obese populations. However, no studies have examined the impact of obesity on PTX3 reactivity to exercise. Therefore, our study sought to investigate PTX3 plasma response to maximal exercise in obese and normal-weight subjects, and its relationship with insulin sensitivity. Twenty-one subjects (9 obese and 12 normal-weight) were recruited. Plasma PTX3,...
Show morePentraxin 3 (PTX3) has been demonstrated as a vital biomarker for chronic inflammatory diseases. Decreased plasma PTX3 has been observed in obese populations. However, no studies have examined the impact of obesity on PTX3 reactivity to exercise. Therefore, our study sought to investigate PTX3 plasma response to maximal exercise in obese and normal-weight subjects, and its relationship with insulin sensitivity. Twenty-one subjects (9 obese and 12 normal-weight) were recruited. Plasma PTX3, insulin, and glucose levels were measured before and following exercise. While our results showed lower resting PTX3 levels in obese subjects, exercise elicited similar elevations in PTX3 and insulin sensitivity in both groups. Furthermore, PTX3 area-under-curve (AUC) was correlated with glucose AUC, even when controlled for body mass index and fitness level. These findings suggest that glucose may potentially regulate PTX3 response to exercise. Further investigation is needed to verify the impact of substrate utilization on exercise-induced PTX3 elevation.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005028
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- A Misuse Pattern for Flame.
- Creator
- Lewis, Paul, Singh, Sanjay, Fernandez, Eduardo B.
- Abstract/Description
-
Flame is a computer worm that is being used for targeted cyber espionage in Middle Eastern countries. It is considered one of the most complex malware ever found. Flame can record audio, screenshots, keyboard activity and network traffic. It also has a kill switch to erase itself. Its program modules are encrypted. We are writing a misuse pattern to describe its architecture. A pattern is a solution to a recurrent problem in a given context. A pattern embodies the knowledge and experience of...
Show moreFlame is a computer worm that is being used for targeted cyber espionage in Middle Eastern countries. It is considered one of the most complex malware ever found. Flame can record audio, screenshots, keyboard activity and network traffic. It also has a kill switch to erase itself. Its program modules are encrypted. We are writing a misuse pattern to describe its architecture. A pattern is a solution to a recurrent problem in a given context. A pattern embodies the knowledge and experience of software developers and can be reused in new applications. A security pattern describes a mechanism or procedure to defend against an attack. A misuse pattern describes how a misuse is performed from the point of view of the attacker. It defines the environment where the attack is performed, countermeasures to stop it, and provides forensic information in order to trace the attack once it happens.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA0005027
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- A Misuse Pattern for Retrieving Data from a Database Using SQL Injection.
- Creator
- Alder, Ernst, Bagley, Richard, Fernandez, Eduardo B.
- Abstract/Description
-
FAU's Office of Undergraduate Research and Inquiry hosts an annual symposium where students engaged in undergraduate research may present their findings either through a poster presentation or an oral presentation.
- Date Issued
- 2011
- PURL
- http://purl.flvc.org/fau/fd/FA00005426
- Format
- Document (PDF)
- Title
- Multi-factor Authentication.
- Creator
- Callahan, Colin, Fernandez, Eduardo B., College of Engineering and Computer Science
- Abstract/Description
-
An important authentication method is multi-factor authentication (MFA). Products such as Enterprise Office 365 are already using it, available for any user in Office 365 Midsize Business, Enterprise, Academic, and Nonprofit plans as well as the standalone versions of Exchange Online and SharePoint Online. The log-in verification feature is aimed at reducing users' vulnerability to online identity theft, phishing, and other scams by adding a second level of authentication to an account log-in...
Show moreAn important authentication method is multi-factor authentication (MFA). Products such as Enterprise Office 365 are already using it, available for any user in Office 365 Midsize Business, Enterprise, Academic, and Nonprofit plans as well as the standalone versions of Exchange Online and SharePoint Online. The log-in verification feature is aimed at reducing users' vulnerability to online identity theft, phishing, and other scams by adding a second level of authentication to an account log-in. Twitter, Apple, PayPal, Google, Facebook, and other vendors already have implemented it. After correctly entering their username and password, users need to acknowledge a phone call, text message, or an app notification on their smartphone before they can gain access to their account. Two-factor authentication is the most common form of MFA and requires the use of two of the three authentication factors: Something only the user knows, something the user has, and something only the user is. In this work we will analyze some varieties, do UML models of their structure and dynamics, and compare MFA to other authentication approaches.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005179
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Misuse Pattern: Keyboard Injection Through The USB Human Interface Device Class.
- Creator
- To, Dyllan, Fernandez, Eduardo B., College of Engineering and Computer Science
- Abstract/Description
-
We are presenting a misuse pattern, Keyboard Injection through the USB Human Interface Device(HID) class. This paper describes how such a misuse is performed from the view from an attacker, describes the systems involved in the misuse, analyzes methods of stopping or preventing the attack through potential security patterns, and details techniques that can be used to detect or trace such an attack after it has occurred. Such a pattern can inform IT managers, device manufacturers, or even...
Show moreWe are presenting a misuse pattern, Keyboard Injection through the USB Human Interface Device(HID) class. This paper describes how such a misuse is performed from the view from an attacker, describes the systems involved in the misuse, analyzes methods of stopping or preventing the attack through potential security patterns, and details techniques that can be used to detect or trace such an attack after it has occurred. Such a pattern can inform IT managers, device manufacturers, or even device driver developers of the vulnerability, as well as detail methods or security patterns that can prevent an attack. A keyboard injection misuse attempts to infiltrate a system or network through a variety of techniques. Such a misuse impersonates a keyboard HID, which most systems inherently trust.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00005214
- Subject Headings
- College students --Research --United States.
- Format
- Document (PDF)
- Title
- Lanthanide Luminescence of GWMOF-6.
- Creator
- Kelley, Tanya, Reed, Mark A., Clark, Jessica M., De Lill, Daniel T.
- Abstract/Description
-
FAU's Office of Undergraduate Research and Inquiry hosts an annual symposium where students engaged in undergraduate research may present their findings either through a poster presentation or an oral presentation.
- Date Issued
- 2011
- PURL
- http://purl.flvc.org/fau/fd/FA00005438
- Format
- Document (PDF)