From deciding what to eat first or what stock to invest in, the order in which we prefer to experience events and the amount of risk we are willing to undertake are factors that influence our choices. However, the mechanisms underlying order and...
Prostate cancer (PCa) recurrences are often predicted by assessing the status of surgical margins (SM) – positive surgical margins (PSM) increase the chances of biochemical recurrence by 2-4 times which may lead to PCa recurrence. At present,...
Three-dimensional imaging in medicine -- Mathematical models. ; Stereoencephalotomy.
In the past, clinicians skilled at image-guided neurosurgery have relied solely on pre-operative scans for their navigational information. Often in the course of surgery, tissue is purposely retracted/resected or inadvertently moved resulting in a...
Agent-based policy learning in complex and uncertain environments is challenged by escalating computational complexity with the size of the task space (action choices and environmental states) as well as the number of agents. Nonetheless, there is...
A new type of analytic expansion for use in stability calculations is presented and applied to the question of the stability of laminar solutions of the Navier-Stokes equation. This leads in a natural way to a model of the transition from laminar...
Annual screening mammograms are recommended for all women above 40 years of age for early detection of breast cancer, and are known to improve cancer mortality rates. However, mammography is hampered by low sensitivity and a high rate of false...
Quantitative Risk Analysis of Computer Networks (QSRA) addresses the problem of risk opacity of software in networks. It allows risk managers to get a detailed and comprehensive snapshot of the constitutive software on the network, assess its risk...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Automatic control -- Sensitivity. Structural control (Engineering). Strains and stresses -- Computer simulation. Structural analysis (Engineering). Engineering models.
Autonomous damage detection in engineering structures is critically important as the demands placed upon those structures are increased. It has been well established that damage detection can be done through monitoring the modal frequencies of the...
Nuclear magnetic resonance spectroscopy -- Data processing. ; Proteins -- Analysis -- Mathematical models. ; Computer algorithms.
Our aim is to enhance high-throughput applications of Nuclear Magnetic Resonance (NMR) through the development of efficient computational methods that operate on sparse (minimal) sets of experimental NMR data. We have developed a family of four...
Single cycle electromagnetic pulses have been difficult to experimentally generate and to theoretically analyze. With the recent development of terahertz systems based on near infrared femtosecond lasers it has become possible to perform single...
Eastern Enrollment Conference Washington DC Nov 1955 ET Chamberlain RK Hage S Jackson Admissions office Willis Fitch Pres Dart club of Wash Percy Russell, Chr of conf. Clarence V. Orger Councillor John McRae '32 Vice chr of Conf no.554 Photo by...
Magnetic nanoparticle-based hyperthermia for cancer treatment is a promising technology, particularly when applied as part of an adjuvant strategy with established cancer therapies (chemotherapy, radiation and surgery). In Europe, early clinical...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
Epilepsy is associated with cognitive impairments which often manifest as a higher prevalence of memory impairments. Memory impairments in patients with epilepsy may persist even with sufficient control of seizures, suggesting other factors may...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
Molecular imaging of cancer features is a critical part of advancing better tools for oncology management and drug discovery, yet it is still evolving as a useful tool. Diffuse Fluorescence Tomography (FT) is one approach to molecular imaging, used...