The main research objective of this thesis is to address distributed target tracking for mobile sensor networks. Based on real-life limitations, we are particularly interested in mobile sensors with Limited Sensing Range (LSR). There are three...
Breast cancer is the most common cancer in women. The discovery of breast tumor subtypes and the subsequent development of treatments aimed at them has allowed a reduction in the mortality of breast cancer. However, tumors with similar...
Epilepsy is associated with cognitive impairments which often manifest as a higher prevalence of memory impairments. Memory impairments in patients with epilepsy may persist even with sufficient control of seizures, suggesting other factors may...
Wireless communication systems. Computer networks. Routers (Computer networks).
A mesh network is a network of wireless routers that employ multi-hop routing and can be used to provide network access for mobile clients. Mobile mesh networks can be deployed rapidly to provide an alternate communication infrastructure for...
Sea ice appears to form an impenetrable boundary at the ocean-atmosphere interface in polar regions, yet in fact its porous structure provides critical pathways for the exchange of heat, gases, salts, and other chemical species impacting the global...
Systemic sclerosis (SSc) is a rare and often-fatal systemic autoimmune disease characterized by vasculature dysfunction, immune activation, and extracellular matrix deposition in skin and internal organs. The etiology of SSc is unknown, but it is...
Multimedia systems -- Mathematical models. ; Information storage and retrieval systems. ; Machinery -- Alignment.
This thesis introduces multiple media correlation, a new technology for the automatic alignment of multiple media objects such as text, audio, and video. This research began with the question: what can be learned when multiple multimedia components...
Membrane docking and fusion are essential steps in intracellular vesicular trafficking. The underlying molecular mechanisms are highly conserved between organisms. Yeast homotypic vacuole fusion has become a paradigm in studying this fundamental...
Topological graph theory. Aperiodicity. Paths and cycles (Graph theory)
The condition ""every cycle has an entry"" first appeared in the literature in Kumjian, Pask, and Raeburn's paper on Cuntz-Krieger algebras of directed graphs, where it was called Condition (L). It provides a necessary condition for simplicity of...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
At the heart of computer games and computer generated films lies 3D content creation. A student wanting to learn how to create and edit 3D meshes can quickly find thousands of videos explaining the workflow process. These videos are a popular...
Wireless communication systems. Computer network protocols.
We evaluate mobility predictors in wireless networks. Handoff prediction in wireless networks has long been considered as a mechanism to improve the quality of service provided to mobile wireless users. Most prior studies, however, were based on...
Digital integrated circuits -- Testing. Digital integrated circuits -- Testing -- Mathematical models. Digital integrated circuits -- Design and construction.
Computer input-output equipment. ; Computational grids (Computer systems). ; High performance computing. ; Electronic data processing -- Distributed processing.
High-performance computing increasingly occurs on computational grids composed of heterogeneous and geographically distributed systems of computers, networks, and storage devices that collectively act as a single virtual computer. A key challenge...
A double-acceleration stage linear time of flight mass spectrometer (TOF MS) with Nd/YAG laser ablation cluster source was designed and constructed for cluster production, study and deposition. Cumulenic polycarbons SC n S ( n = 2-27) were...
The ability to resist highly tempting reward impulses is a struggle that all humans face on a daily basis, one that gives rise to many societal problems such as obesity and drug addiction. This form of self-regulation involves a critical balance...
The performance of machine learning algorithms largely depends on data representation. As a critical step in machine learning, representation learning (feature learning) learns a transformation of training data to give a new representation that can...
One of the most distinctive aspects of humans as a species is our propensity to form complex social networks made up of intense, non-reproductive bonds with non-kin. Navigating these networks presents a considerable cognitive challenge that is...
Partially ordered sets and permutations are combinatorial structures having vast applications in theoretical computer science. In this thesis, we study various computational and algorithmic problems related to these structures. The first chapter of...
We start by introducing avoidance coupling of Markov chains, with an overview of existing results. We then introduce and motivate a new notion, uniform coupling. We show that the only Markovian avoidance coupling on a cycle is of this type, and...
In the Firefighter Problem, a fire starts at a vertex of a graph, and in discrete time units, it spreads from burned vertices to their neighbors, unless they are protected by one of the f firefighters that are deployed every turn. Once burned or...
Safety in transportation systems is a global concern with millions of road accidents happening worldwide every year. Despite sophisticated advancement in automotive design and accident serverity reduction technologies, traffic fatalities continue...
We consider a problem of information overload: the conflict between vast amounts of data available in electronic form and inadequate tools for finding relevant information. To alleviate this problem we look at the information organization:...
We associate, to each positive integer n , a Cayley graph to the group PSL(2.Ζ[subscript n]). We then consider the isoperimetric numbers of these graphs. In chapter three we determine upper bounds for the isoperimetric number by a detailed...
In the late 1960s, Ihara began work that led to the Ihara zeta function, a zeta function which is defined on a finite graph. This function is an interesting graph invariant which gives information on expansion properties of the graph. It also...
For a local field K, we study the affine buildings Ξ n and Δ n naturally associated to SL n ( K ) and Sp n ( K ), respectively. Since Sp n ( K ) is a subgroup of SL 2 n ( K ), we investigate properties of a natural embedding of Δ n in Ξ 2 n ....
Evolutionary Computation (EC) is one of the most advanced computational techniques. It has been frequently and successfully used to find good solutions to many complicated optimization problems with limited computational resources. EC is the...
Riemannian manifolds. Singularities (Mathematics). Laplacian operator. Spectral theory (Mathematics). Riemann surfaces. Curves on surfaces. Geometry
Historically, inverse spectral theory has been concerned with the relationship between the geometry and the spectrum of compact Riemannian manifolds, where spectrum means the eigenvalue spectrum of the Laplace operator as it acts on smooth...
Automated trust negotiation is a new approach to access control and authentication for the open systems such as the Internet, where sensitive interactions sometimes occur among entities with no prior knowledge of each other. Trust negotiation...
Lungs -- Cancer -- New Hampshire. Bladder -- Cancer -- New Hampshire. Cancer -- Epidemiology. Cancer -- Environmental aspects -- New Hampshire. Cancer -- Genetic aspects
Complex diseases such as lung cancer are most commonly the result of environmental variables acting on an individual's genetic background. Those environmental variables may be found in the external environment, such as exposures to carcinogenic...
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
As the ubiquitous complexity of common disease has become apparent, so has the need for novel tools and strategies that can accommodate complex patterns of association. In particular, the analytic challenges posed by the phenomena known as...
We examine variations of cops and robbers games on graphs. Our goals are to introduce some randomness into their study, and to estimate (expected) capture time. We show that a cop chasing a random walker can capture him in expected time n + o(n)....