Overweight persons -- Attitudes. ; People with disabilities -- Attitudes. ; Obesity -- Public opinion. ; Stigma (Social psychology). ; Self-presentation.
In the last few years, a new perspective on the management of obesity has emerged. Instead of focusing on dieting and weight loss efforts, the new approach focuses on size acceptance. The concept of positively accepting one's deviant features has...
Cataclysmic variable stars (CVs) are close, interacting binary systems comprised of a white dwarf and a companion star, which is typically a late-type dwarf star. Their progenitor systems are post common envelope binaries (PCEBs) with a white dwarf...
Hypervelocity stars are stars ejected from the center of the Milky Way, never to return. Since first discovered in 2005, hypervelocity stars have greatly increased our understanding of the kinematics and dynamics at the Galactic Center. In this...
Radio relics are extended regions of synchrotron radio emission that have been found in the outskirts of a few dozen galaxy clusters. Relics are often associated with clusters undergoing merger activity. They are not associated optically with a...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
Information retrieval -- Mathematical models. ; Electronic information resource searching. ; Computer algorithms. ; Decision making -- Data processing. ; Mathematical optimization.
This thesis presents a unified method for simultaneous solution of three problems in Information Retrieval--metasearch (the fusion of ranked lists returned by retrieval systems to elicit improved performance), efficient system evaluation (the...
Medical imaging methods have become increasingly important in diagnosing diseases and assisting therapeutic treatment. In particular, early detection of breast cancer is considered as a critical factor in reducing the mortality rate of women....
This thesis centers around a generalization of the classical discrete Fourier transform. We first present a general diagrammatic approach to the construction of efficient algorithms for computing the Fourier transform of a function on a finite...
Multimodality imaging is becoming the standard of care for research and clinical studies. Such an approach is able to provide complementary information which can detect and characterize tumors. Advancing instrumentation for diffuse near-infrared...
In this thesis we develop a theory of Fourier analysis and fast Fourier transforms (FFTs) for finite inverse semigroups. Our results generalize results in the theory of Fourier analysis for finite groups. There is a general method for generating...
Magnetic fields at all scales are prevalent in our universe. However, current cosmological models predict that initially the universe was bereft of large-scale fields. Standard magnetohydrodynamics (MHD) does not permit magnetogenesis; in the MHD...
The Border Gateway Protocol (BGP) that manages inter-domain routing on the Internet lacks security. Protective measures using public key cryptography introduce complexities and costs. To support authentication and other security functionality in...
Sensor networks are used in many realtime applications for collecting information from monitored environments and objects, such as moving vehicle tracking, battlefield reconnaissance, and habitat monitoring. Sensor networks are often deployed in...
The Dartmouth Stellar Evolution Program, a state of the art stellar evolution code, has been modified and expanded to increase its versatility. The modifications include: the ability to self-consistently model stars with arbitrary chemical...
Nurses -- Health and hygiene. Employee health promotion.
Background. Worksite health promotion programs (HPP) support employees' health behaviors to prevent downstream diseases. Maximizing participation can optimize program impact. Objectives. To assess staff nurses' participation in three HPP - flu...
Evolutionary Computation (EC) is one of the most advanced computational techniques. It has been frequently and successfully used to find good solutions to many complicated optimization problems with limited computational resources. EC is the...
Electronic mail systems -- Security measures. Electronic mail systems -- Social aspects. Trust.
A secure system that cannot be used by real users to secure real-world processes is not really secure at all. While many believe that usability and security are diametrically opposed, a growing body of research from the field of Human-Computer...
Endothelial cell migration is an important element of a number of biological processes, including angiogenesis. The fibroblast growth factors (FGFs) are a family of angiogenic heparan-binding proteins that potently induce endothelial migration....
The theory community has worked on Secure Multiparty Computation (SMC) for more than two decades, and has produced many protocols for many settings. One common thread in these works is that the protocols cannot use a Trusted Third Party (TTP), even...
Large scale systems -- Mathematical models. Digital computer simulation. Parallel processing (Electronic computers). Computer algorithms.
Modeling real-world large-scale systems is inherently challenging due to their size and complexity. Detailed simulation of large-scale models requires tremendous amounts of computing power and memory space. Parallel discrete-event simulation...