This Is AuburnElectronic Theses and Dissertations

Browsing Auburn Theses and Dissertations by Title

Now showing items 7538-7557 of 9100

Seat Belt Safety in Rollover Accidents: Investigating Buckle Release Force and its Impact on Occupant Protection 

Nageswaran, Shivaprasad (2023-05-02)
Seat belts have been a crucial safety feature in vehicles for over a century. They undoubtedly remain the most effective safety device in a vehicle for reducing both fatal and nonfatal injuries resulting from motor vehicle ...

Secdoop: A Confidentiality Service for Hadoop Clusters 

Majors, James (2011-04-07)
The MapReduce model has proven to be an effective way to demonstrate academic research while using distributed file-systems. The MapReduce programming model was introduced by Google in 2004. MapReduce has proven to be a ...

Second generation of catfish genetic linkage map and integration of catfish genetic linkage and physical maps using BAC-anchored microsatellites 

Ninwichian, Parichart (2012-07-17)
Integration of physical and linkage maps is a critical step in building necessary genome resources for fine mapping of QTL, comparative genomics, and accurate and efficient whole genome assembly. Previously, we have ...

The Second Reconstruction in Local Politics: Alabama Grassroots Activists Fulfilling the Promise of the Voting Rights Act, 1960-1990 

McLemore, Lawrence (2012-12-05)
In arguing that historians expand the timeline for what is considered the modern civil rights movement, this dissertation examines how grassroots Alabama activists affiliated with the Alabama Democratic Conference carried ...

Secondary Assistant Principals as Instructional Leaders: Characteristics and Experiences That Contribute to Their Perceptions of Readiness for the Role 

Enloe, Vohn (2016-06-29)
This quantitative research study examined the characteristics and experiences that are significant in contributing to secondary assistant principals’ perceptions of readiness to serve as instructional leaders. Secondary ...

Secondary Bus Performance in Reducing Cache Writeback Latency 

Venkatesh, Rakshith (2011-04-08)
For single as well as multi core designs, effective strategies to minimize cache access latencies have been proposed by a number of researchers over the last decade. Such designs include the Miss Status Holding Registers, ...

Secondary Educational Administrator Attitudes Toward Educating Students with Disabilities in Inclusion Settings 

Moates, Kimberly (2016-07-08)
Inclusion of students with disabilities in the general education setting has been a topic of debate for quite some time. Educational administrators are at the forefront of the debate because their position requires they ...

Secondary Physical Educators’ Grading Outcomes and the Influence of the Environment 

Morris, Michael (2020-07-21)  ETD File Embargoed
The aim of this investigation was to deploy an ecological examination (Ecological Systems Framework) to account for the role the total school environment influences physical educator’s grading outcomes. The framework ...

A Secondary School’s Approach to Implementing Response to Instruction 

Adams, Crystal (2020-05-08)
Purpose: This study examined how a single secondary school chose to interpret and implement the Response to Instruction (RtI) framework, and how teachers perceived the effectiveness of implementation. Research Method: ...

Secondary Students’ Reading Attitudes and Achievement in a Scaffolded Silent Reading Program versus Traditional Sustained Silent Reading 

West, Chandra (2010-08-03)
This study explored the reading attitudes and achievement, as well as genre knowledge, of tenth, eleventh, and twelfth-grade students who participated in Scaffolded Silent Reading, Sustained Silent Reading, or a control ...

Secure Base Script Stability and Early Childhood Competence 

Reedstrom, Lydia (2023-05-10)
Internal representations of attachment inform children about themselves and the world around them and shape the expectations they have for relationships. Secure representations of attachment – measured by the secure base ...

Secure Design Considerations for Embedded Systems 

Thorington, Hunter (2015-12-04)
A guide is presented for embedded system designers that details secure design considerations for modern embedded systems. The guide focuses on adapting traditional software design practices to include adapted methodologies ...

Secure File Assignment in Heterogeneous Distributed Systems 

Tian, Yun (2013-04-23)
There is a growing demand for large-scale distributed storage systems to support resource sharing and fault tolerance. Although heterogeneity issues of distributed systems have been widely investigated, little attention ...

Secure Localization and Node Placement Strategies for Wireless Networks 

Pandey, Santosh (2007-08-15)
Localization and placement problems in wireless networks have been widely studied. The adaptation of localization in real world environment can be observed by popular commercial and non-commercial GPS applications. ...

Securing Lethal Means for Suicide: A Focus Group Study Exploring Perceptions and Barriers Among Practicing Veterinarians 

Waitz-Kudla, Sydney (2022-04-20)
Veterinarians are at higher risk for suicide than the general population, and it has been hypothesized that this may be attributable to veterinarians’ access to and knowledge of lethal drugs, specifically pentobarbital. ...

Securing Web Applications: Web Application Flow Whitelisting to Improve Security 

Alabdulrazzaq, Haneen (2017-04-25)
The explosion in the availability of data fueled by mobile devices has pushed security to the forefront. As of 2016, Internet users worldwide are estimated at a staggering 3.47 billion. Such large numbers of users dictate ...

Security and secure-dominating sets in graphs 

Jones, Cadavious (2014-04-29)
All graphs in this paper are finite and simple. Let G = (V;E) be a graph, x an element of V and S a subset of V. Following convention, we let N(x) := {u : where ux is an element of E} and N[x] := {x}union N(x). For S, ...

Security, (F,I)-security, and Ultra-security in Graphs 

Petrie, Caleb (2012-08-02)
Let G=(V,E) be a graph and S a subset of V. The notion of security in graphs was first presented by Brigham et al [3]. A set S is secure if every attack on S is defendable. The cardinality of a smallest secure set of G ...

Sediment and Nutrient Transport Through a Reservoir Sequence Along a Large River System 

Webster, Benjamin (2019-07-23)
Reservoirs are depositional environments for suspended sediments in river systems. Due to sediments undergoing fallout in low-flow areas, reservoirs contain 26% of all sediment and 12% of global river phosphorus behind ...

Sediment Fingerprinting to Identify Sources of In-Stream Sediment in an Urbanized Watershed 

Malhotra, Kritika (2018-07-23)
Excessive delivery of fine-grained sediment and sediment-bound nutrients to surface waters results in water quality impairment. Information on the relative contribution of different sources contributing sediment to river ...