As the visual effect and movie industries are striving for realism and high fidelity images, physically based lighting, global illumination, realistic materials, and highly tessellated geometry are gradually accepted and used in movie and game...
Radio relics are extended regions of synchrotron radio emission that have been found in the outskirts of a few dozen galaxy clusters. Relics are often associated with clusters undergoing merger activity. They are not associated optically with a...
We have a limited understanding of how an opinion is originated, how an opinion and information supporting and explaining it gets conveyed, and how the communicated opinion is perceived and processed by others. One direction of current research...
We present new forensic tools that are capable of detecting traces of tampering in digital images without the use of watermarks or specialized hardware. These tools operate under the assumption that images contain natural properties from a variety...
Breast cancer is the most common cancer in women. The discovery of breast tumor subtypes and the subsequent development of treatments aimed at them has allowed a reduction in the mortality of breast cancer. However, tumors with similar...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
We study the bijective combinatorics of reduced words. These are fundamental objects in the study of Coxeter groups. We restrict our focus to reduced words of permutations and signed permutations. Our results can all be situated within the context...
Temperature has powerful effects on all scales of biological organization from biochemical reactions to ecosystem processes. Despite the well-appreciated influence and thorough understanding of the physiological and population consequences of...
We present aligned hierarchies, a novel solution to the dimension reduction problem, representing high-dimensional and noisy sequential data as a low-dimensional object that encodes relevant information. In this thesis, we motivate our presentation...
A fundamental question in decision neuroscience is how cognitive processes underlying decision-making give rise to efficient decisions, especially in complex situations with multiple choice options, and each option consisting of multiple attributes...
Cataclysmic variable stars (CVs) are close, interacting binary systems comprised of a white dwarf and a companion star, which is typically a late-type dwarf star. Their progenitor systems are post common envelope binaries (PCEBs) with a white dwarf...
Digital integrated circuits -- Testing. Digital integrated circuits -- Testing -- Mathematical models. Digital integrated circuits -- Design and construction.
Face perception -- Physiological aspects. Face perception -- Social aspects. Sex differences (Psychology). Neuropsychology.
The general objective of the current thesis was to investigate the neural substrates underlying the perception of opposite-sex faces. Building on what is already known about the distributed network of brain areas supporting various dimensions of...
A double-acceleration stage linear time of flight mass spectrometer (TOF MS) with Nd/YAG laser ablation cluster source was designed and constructed for cluster production, study and deposition. Cumulenic polycarbons SC n S ( n = 2-27) were...
Overweight persons -- Attitudes. ; People with disabilities -- Attitudes. ; Obesity -- Public opinion. ; Stigma (Social psychology). ; Self-presentation.
In the last few years, a new perspective on the management of obesity has emerged. Instead of focusing on dieting and weight loss efforts, the new approach focuses on size acceptance. The concept of positively accepting one's deviant features has...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
Magnetic nanoparticles are promising candidates for use in biomedical applications as remote sensors of biophysical properties, thermal therapy agents, and detectors of specific biomolecules. Many approaches have been used to model magnetic...
In this thesis we look at several problems that lie in the intersection between combinatorial and multiplicative number theory. A common theme of many of these problems are estimates for and properties of the smooth numbers, those integers not...
This thesis centers around a generalization of the classical discrete Fourier transform. We first present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite...
The great strength of the C-F bond has enabled fluorocarbons to find many industrial and domestic applications, and makes C-F activation a chemical and technical challenge akin to that of C-H bond activation in hydrocarbons. In our mission to...
The accelerated expansion of space in the Universe has been known for two decades. However, finding a plausible theory that describes this expansion is more difficult: Taking general relativity for granted requires us to stipulate the existence of...
For ordinary knots in R 3 , there are no degree one Vassiliev invariants. For virtual knots, however, the space of degree one Vassiliev invariants is infinite dimensional. We introduce a sequence of three degree one Vassiliev invariants of virtual...
Identifying the determinants of reproductive success in small-scale societies is critical for understanding how natural selection has shaped human evolution and behavior. The available evidence suggests that status-accruing behaviors such as...
T cells. T cells -- Receptors. CD antigens. CD4 antigen. Immunologic memory. Herpesvirus diseases -- Immunological aspects. Vaccinia. CD8-Positive T-Lymphocytes -- immunology. CD4-Positive T-Lymphocytes -- immunology. Herpesviridae Infections --...
The phenomenon of immunological memory has been known for thousands of years. This knowledge has been applied to vaccination, which has resulted in a dramatic reduction in the number of deaths due to infectious diseases. Immunological memory is...
Elevated sympathetic discharge from the CNS is an underlying pathogenic mechanism in neurogenic hypertension and an exacerbating factor in chronic heart failure (CHF). Current treatment of these diseases focuses on attenuation of the downstream...
Motivated by quantum mechanics and geometric optics, it is a long-standing problem whether the length spectrum of a compact Riemannian manifold can be recovered from its Laplace spectrum. One route to proving that the length spectrum depends on the...
Developmental prosopagnosia (DP) is a neurodevelopmental disorder defined by impaired face recognition in the absence of brain damage, low-level visual deficits, or broad cognitive problems. Behavioral and neural findings suggest different types of...
Networks that model relationships in the real world have attracted much attention in the past few years. The "link prediction problem" plays a central role in the network area. In this thesis, we explore the link prediction problem in a...
In this thesis we develop a theory of Fourier analysis and fast Fourier transforms (FFTs) for finite inverse semigroups. Our results generalize results in the theory of Fourier analysis for finite groups. There is a general method for generating...
Partially ordered sets and permutations are combinatorial structures having vast applications in theoretical computer science. In this thesis, we study various computational and algorithmic problems related to these structures. The first chapter of...
Acyl coenzyme A: cholesterol acyltransferase (ACAT) catalyzes the formation of intracellular cholesteryl esters in various tissues. Recently, human ACAT cDNA has been cloned and expressed in this laboratory (Chang, C.C., et al, 1993, Cheng, D.;...
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...