We have a limited understanding of how an opinion is originated, how an opinion and information supporting and explaining it gets conveyed, and how the communicated opinion is perceived and processed by others. One direction of current research...
Electric generators -- Windings. Electric inductors -- Design and construction -- Mathematical models. Electric current converters -- Design and construction -- Mathematical models. Energy dissipation -- Mathematical models.
Magnetic components for high-frequency power conversion applications can have significant losses that compromise the performance of the converter. In particular, winding losses can be large due to high-frequency effects that are difficult to model...
We examine variations of cops and robbers games on graphs. Our goals are to introduce some randomness into their study, and to estimate (expected) capture time. We show that a cop chasing a random walker can capture him in expected time n + o(n)....
This project focuses on the development of research tools and methods that are used to study the relationship between neural activity and subsequent hemodynamic responses in the human brain. This relationship, referred to as neurovascular coupling,...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Van Allen radiation belts -- Mathematical models. Electrons -- Diffusion -- Mathematical models. Magnetohydrodynamic waves -- Mathematical models.
It is becoming increasingly important to understand the dynamics of radiation belt energetic particles given their potentially hazardous effects on satellites and our ever-increasing dependence on those satellites. There is a need to determine...
Human behavior -- Mathematical models. ; Web usage mining. ; Internet users.
Whom we e-mail, where we browse, what we purchase, and the things we search for on the World Wide Web all leave identifiable traces of who we are as individuals. In today's technology focused landscape, cyberspace represents the new environment in...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
Ecological and evolutionary implications of polymorphism and polyphenism in the asexual diapause of the rotifer Synchaeta pectinata from Star Lake, VT, were explored via field, laboratory, and theoretical investigations. S. pectinata is a...
Free electron lasers -- Experiments. Wave guides -- Design and construction. Diffraction gratings -- Experiments. Electron beams. Infrared sources.
The far infrared region of the electromagnetic spectrum, 15-3000 Å’Âºm in wavelength, has a paucity of narrow band laser sources. To address the issue of whether a grating based free electron laser could operate well as such a source, a grating...
The confluence of patient, provider, and system level factors contributes to excess mortality due to preventable medical conditions among people with serious mental illness (SMI) compared to the general population. Study one explored how...
During our fieldwork with real-world organizations---including those in Public Key Infrastructure (PKI), network configuration management, and the electrical power grid---we repeatedly noticed that security policies and related security artifacts...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In Chapter 2 we look at the distribution of permutation statistics in the context of pattern-avoiding permutations. The first part of this chapter deals with a recursively defined bijection of Robertson [37] between 123- and 132-avoiding...
Cataclysmic variable stars (CVs) are close, interacting binary systems comprised of a white dwarf and a companion star, which is typically a late-type dwarf star. Their progenitor systems are post common envelope binaries (PCEBs) with a white dwarf...
Quantum wires and dots can be created by patterning inhomogeneous strain on semiconductor quantum wells. I have used laser spectroscopic methods to study the carrier transfer from the host quantum well to quantum wires and dots. For quantum dot...
Digital integrated circuits -- Testing. Digital integrated circuits -- Testing -- Mathematical models. Digital integrated circuits -- Design and construction.
Regulatory linkage between epibiotic organisms and their host zooplankton populations is one of the least understood topics in zooplankton biology, despite the likely importance of epibionts to pelagic communities. These laboratory studies with...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...