skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Attention:

The DOI auto-population feature in the Public Access Repository (PAR) will be unavailable from 4:00 PM ET on Tuesday, July 8 until 4:00 PM ET on Wednesday, July 9 due to scheduled maintenance. We apologize for the inconvenience caused.


Title: First-Principles Analysis of Ethylene Oligomerization on Single-Site Ga 3+ Catalysts Supported on Amorphous Silica
Award ID(s):
1647722
PAR ID:
10431116
Author(s) / Creator(s):
; ; ; ;
Date Published:
Journal Name:
ACS Catalysis
Volume:
12
Issue:
9
ISSN:
2155-5435
Page Range / eLocation ID:
5416 to 5424
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract We develop a Fredholm theory for the Hodge Laplacian in weighted spaces on ALG ∗ manifolds in dimension four.We then give several applications of this theory.First, we show the existence of harmonic functions with prescribed asymptotics at infinity.A corollary of this is a non-existence result for ALG ∗ manifolds with non-negative Ricci curvature having group Γ = { e } \Gamma=\{e\} at infinity.Next, we prove a Hodge decomposition for the first de Rham cohomology group of an ALG ∗ manifold.A corollary of this is vanishing of the first Betti number for any ALG ∗ manifold with non-negative Ricci curvature.Another application of our analysis is to determine the optimal order of ALG ∗ gravitational instantons. 
    more » « less
  2. null (Ed.)
  3. Vulnerability Management, which is a vital part of risk and resiliency management efforts, is a continuous process of identifying, classifying, prioritizing, and removing vulnerabilities on devices that are likely to be used by attackers to compromise a network component. For effective and efficient vulnerability management, which requires extensive resources– such as time and personnel, vulnerabilities should be prioritized based on their criticality. One of the most common methods to prioritize vulnerabilities is the Common Vulnerability Scoring System (CVSS). However, in its severity score, the National Institute of Standards and Technology (NIST) only provides the base metric values that include exploitability and impact information for the known vulnerabilities and acknowledges the importance of temporal and environmental characteristics to have a more accurate vulnerability assessment. There is no established method to conduct the integration of these metrics. In this study, we created a testbed to assess the vulnerabilities by considering the functional dependencies between vulnerable assets, other assets, and business processes. The experiment results revealed that a vulnerability's severity significantly changes from its CVSS base score when the vulnerable asset's characteristics and role inside the organization are considered. 
    more » « less