Magnetic nanoparticle-based hyperthermia for cancer treatment is a promising technology, particularly when applied as part of an adjuvant strategy with established cancer therapies (chemotherapy, radiation and surgery). In Europe, early clinical...
A new type of analytic expansion for use in stability calculations is presented and applied to the question of the stability of laminar solutions of the Navier-Stokes equation. This leads in a natural way to a model of the transition from laminar...
Annual screening mammograms are recommended for all women above 40 years of age for early detection of breast cancer, and are known to improve cancer mortality rates. However, mammography is hampered by low sensitivity and a high rate of false...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
Epilepsy is associated with cognitive impairments which often manifest as a higher prevalence of memory impairments. Memory impairments in patients with epilepsy may persist even with sufficient control of seizures, suggesting other factors may...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
Molecular imaging of cancer features is a critical part of advancing better tools for oncology management and drug discovery, yet it is still evolving as a useful tool. Diffuse Fluorescence Tomography (FT) is one approach to molecular imaging, used...
From deciding what to eat first or what stock to invest in, the order in which we prefer to experience events and the amount of risk we are willing to undertake are factors that influence our choices. However, the mechanisms underlying order and...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
Robots -- Control systems -- Design and construction. Mobile robots. Robots -- Dynamics.
This thesis examines the issues of vehicle and information dynamics in the control of a multi-robot system using a radial-basis potential function controller. Distributed control of multi-robot systems requires each robot to communicate state...
Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Medical imaging methods have become increasingly important in diagnosing diseases and assisting therapeutic treatment. In particular, early detection of breast cancer is considered as a critical factor in reducing the mortality rate of women....
Earlier work has suggested that various neurological or neuropsychiatric disorders may result in characteristic spatial patterns in brain activation, potentially allowing their detection from maps of brain activity under different conditions....
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...