We begin with a presentation of the current state of Poljak and Turzik's conjecture that a matroid is sticky if and only if it is modular as described in [5] and [1]. We show that all graphic, cographic, and regular matroids must satisfy the...
Constructibility (Set theory). Trees (Graph theory).
This thesis investigates possible initial segments of the degrees of constructibility. Specifically, we completely characterize the structure of degrees in generic extensions of the constructible universe L via forcing with Souslin trees. Then we...
This thesis contains material relating to two separate subjects. The first section determines when the C*-algebra affiliated to a directed graph has continuous trace. We use groupoid methods and the focus is on producing conditions on a graph that...
Objectives: This dissertation comprises three essays on geographic variations in healthcare, and the association between utilization and health outcomes. I first explore associations between outpatient visits and Medicare beneficiaries'...
We present new forensic tools that are capable of detecting traces of tampering in digital images without the use of watermarks or specialized hardware. These tools operate under the assumption that images contain natural properties from a variety...
Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...
Estrogen -- Receptors -- Regulation. Selective estrogen receptor modulators. Receptor-ligand complexes. Breast -- Cancer -- Chemoprevention. Colon (Anatomy) -- Cancer -- Chemoprevention.
We have previously shown that the selective estrogen receptor modulator, Arzoxifene (Arz), and the rexinoid, LG100268 (268) synergistically prevent breast cancer in an ER+ breast cancer model. This study was designed to determine the mechanism of...
Casimir effect. Zero-point field. Electric conductivity. Quantum electrodynamics.
The Casimir force arises from an alteration of boundary condition in vacuum and is often regarded as a manifestation of quantum zero point energy. Considerable progress has been made in the last decade with an impressive achievement of experimental...
Internet -- Security measures. Public key infrastructure (Computer security). Digital signatures. Peer-to-peer architecture (Computer networks) -- Security measures.
The Internet has become a virtual place where people not only operate in isolation but also interact with other Internet users. Collaborative systems are becoming more popular. Applications now being introduced could provide better remote education...
In this thesis, we consider several problems relating to cyclic subgroups of the group [mathematical equation]. Each element of [mathematical equation] has a unique representative in one of the two intervals [mathematical equation] and...
In this thesis, we characterize and enumerate the permutations which are realized by the orbits of signed shifts, a family of discrete dynamical systems on words. The permutations, which are called patterns of the signed shifts, are given by the...
The objective of this thesis was to examine the neural and physiological substrates underlying the processing of aversive information, and how individual differences in anxiety influence these responses. In a series of experiments, we utilized skin...
Public key infrastructure (Computer security). ; Computer networks -- Security measures. ; Operating systems (Computers). ; Microcomputers.
In 1976, Whitfield Diffie and Martin Hellman demonstrated how public key cryptography could enable secure information exchange between parties that do not share secrets. In order for public key cryptography to work in modern distributed...
Clinical medicine -- Decision making. ; Medical informatics. ; Patient participation. ; Osteoarthritis -- Treatment. ; Knee -- Diseases -- Treatment. ; Decision Making. ; Decision Support Techniques.
Problem Statement. Effective patients' decision aids (PtDAs) help patients understand clinical information and reduce decisional conflict. PtDAs that also explicitly provide guidance through four """"Deliberative Steps"""" may achieve additional...
Overweight persons -- Attitudes. ; People with disabilities -- Attitudes. ; Obesity -- Public opinion. ; Stigma (Social psychology). ; Self-presentation.
In the last few years, a new perspective on the management of obesity has emerged. Instead of focusing on dieting and weight loss efforts, the new approach focuses on size acceptance. The concept of positively accepting one's deviant features has...
Stigma (Social psychology). Aging -- Psychological aspects. Cognition -- Age factors. Older people -- Attitudes.
Extensive research on aging has demonstrated that normal aging debilitates executive function, a system that is critical for regulating stereotypes. However, there is a paucity of research on whether age-related declines to executive function...
Polynomials. Finite fields (Algebra). Algebraic functions. Number theory.
The ring of univariate polynomials over a finite field shares many foundational arithmetic properties with the ring of rational integers. This similarity makes it possible for many problems in elementary number theory to be translated 'through the...
The great strength of the C-F bond has enabled fluorocarbons to find many industrial and domestic applications, and makes C-F activation a chemical and technical challenge akin to that of C-H bond activation in hydrocarbons. In our mission to...
The accelerated expansion of space in the Universe has been known for two decades. However, finding a plausible theory that describes this expansion is more difficult: Taking general relativity for granted requires us to stipulate the existence of...
We provide a theoretical model for a design involving a dc voltage biased Josephson junction (JJ) that strongly drives a high quality factor microwave cavity via the ac Josephson effect. We explore the rich classical dynamics of the resultant...
The advent of hypervisors revolutionized the computing industry in terms of malware prevention and detection, secure virtual machine managers, and cloud resilience. However, this has resulted in a disjointed response to handling known threats...
Violent video games are immensely popular among children and adults, making it crucial to understand how these games affect the thoughts, feelings, and behaviors of those who play them. The present research proposed an account by which video game...
'The control of waves using periodic structures is crucial for modern optical, electromagnetic and acoustic devices such as diffraction gratings, filters, photonic crystals, solar cells, sensors, and absorbers. We present a high-order accurate...
This thesis investigates a notion of Turing reducibility introduced by Winkler [8] that is total on all computably enumerable oracles. Groszek and Weber show in [7] that this is a new notion of reducibility and it is not transitive. They give su...
Modern distributed systems scatter sensors, storage, and computation throughout the environment. Ideally these devices communicate and share resources, but there is seldom motivation for a device''s owner to yield control to another user. We...
Clinical medicine -- Practice. ; Medicine -- Practice. ; Group medical practice.
Health care micro-systems are small, organized groups of clinicians and staff working together with a shared clinical purpose to provide care for a defined set of patients. The size of individual micro-systems vary--a micro-system must be large...