This Is AuburnElectronic Theses and Dissertations

Browsing by Title

Now showing items 7555-7574 of 9118

Secondary Assistant Principals as Instructional Leaders: Characteristics and Experiences That Contribute to Their Perceptions of Readiness for the Role 

Enloe, Vohn (2016-06-29)
This quantitative research study examined the characteristics and experiences that are significant in contributing to secondary assistant principals’ perceptions of readiness to serve as instructional leaders. Secondary ...

Secondary Bus Performance in Reducing Cache Writeback Latency 

Venkatesh, Rakshith (2011-04-08)
For single as well as multi core designs, effective strategies to minimize cache access latencies have been proposed by a number of researchers over the last decade. Such designs include the Miss Status Holding Registers, ...

Secondary Educational Administrator Attitudes Toward Educating Students with Disabilities in Inclusion Settings 

Moates, Kimberly (2016-07-08)
Inclusion of students with disabilities in the general education setting has been a topic of debate for quite some time. Educational administrators are at the forefront of the debate because their position requires they ...

Secondary Physical Educators’ Grading Outcomes and the Influence of the Environment 

Morris, Michael (2020-07-21)  ETD File Embargoed
The aim of this investigation was to deploy an ecological examination (Ecological Systems Framework) to account for the role the total school environment influences physical educator’s grading outcomes. The framework ...

A Secondary School’s Approach to Implementing Response to Instruction 

Adams, Crystal (2020-05-08)
Purpose: This study examined how a single secondary school chose to interpret and implement the Response to Instruction (RtI) framework, and how teachers perceived the effectiveness of implementation. Research Method: ...

Secondary Students’ Reading Attitudes and Achievement in a Scaffolded Silent Reading Program versus Traditional Sustained Silent Reading 

West, Chandra (2010-08-03)
This study explored the reading attitudes and achievement, as well as genre knowledge, of tenth, eleventh, and twelfth-grade students who participated in Scaffolded Silent Reading, Sustained Silent Reading, or a control ...

Secure Base Script Stability and Early Childhood Competence 

Reedstrom, Lydia (2023-05-10)
Internal representations of attachment inform children about themselves and the world around them and shape the expectations they have for relationships. Secure representations of attachment – measured by the secure base ...

Secure Design Considerations for Embedded Systems 

Thorington, Hunter (2015-12-04)
A guide is presented for embedded system designers that details secure design considerations for modern embedded systems. The guide focuses on adapting traditional software design practices to include adapted methodologies ...

Secure File Assignment in Heterogeneous Distributed Systems 

Tian, Yun (2013-04-23)
There is a growing demand for large-scale distributed storage systems to support resource sharing and fault tolerance. Although heterogeneity issues of distributed systems have been widely investigated, little attention ...

Secure Localization and Node Placement Strategies for Wireless Networks 

Pandey, Santosh (2007-08-15)
Localization and placement problems in wireless networks have been widely studied. The adaptation of localization in real world environment can be observed by popular commercial and non-commercial GPS applications. ...

Securing Lethal Means for Suicide: A Focus Group Study Exploring Perceptions and Barriers Among Practicing Veterinarians 

Waitz-Kudla, Sydney (2022-04-20)
Veterinarians are at higher risk for suicide than the general population, and it has been hypothesized that this may be attributable to veterinarians’ access to and knowledge of lethal drugs, specifically pentobarbital. ...

Securing Web Applications: Web Application Flow Whitelisting to Improve Security 

Alabdulrazzaq, Haneen (2017-04-25)
The explosion in the availability of data fueled by mobile devices has pushed security to the forefront. As of 2016, Internet users worldwide are estimated at a staggering 3.47 billion. Such large numbers of users dictate ...

Security and secure-dominating sets in graphs 

Jones, Cadavious (2014-04-29)
All graphs in this paper are finite and simple. Let G = (V;E) be a graph, x an element of V and S a subset of V. Following convention, we let N(x) := {u : where ux is an element of E} and N[x] := {x}union N(x). For S, ...

Security, (F,I)-security, and Ultra-security in Graphs 

Petrie, Caleb (2012-08-02)
Let G=(V,E) be a graph and S a subset of V. The notion of security in graphs was first presented by Brigham et al [3]. A set S is secure if every attack on S is defendable. The cardinality of a smallest secure set of G ...

Sediment and Nutrient Transport Through a Reservoir Sequence Along a Large River System 

Webster, Benjamin (2019-07-23)
Reservoirs are depositional environments for suspended sediments in river systems. Due to sediments undergoing fallout in low-flow areas, reservoirs contain 26% of all sediment and 12% of global river phosphorus behind ...

Sediment Fingerprinting to Identify Sources of In-Stream Sediment in an Urbanized Watershed 

Malhotra, Kritika (2018-07-23)
Excessive delivery of fine-grained sediment and sediment-bound nutrients to surface waters results in water quality impairment. Information on the relative contribution of different sources contributing sediment to river ...

Sediment Yield along an Actively Managed Streamside Management Zone 

Kara, Ferhat (2010-07-15)
In this study, we aim to regenerate a mature streamside management zone (SMZ) and create an uneven-aged forest with multiple canopy tiers and a dense understory using single tree selection (based on the Proportional-B ...

Sedimentation and Tectonic Evolution of Cenozoic Sequences from Bengal and Assam Foreland Basins, Eastern Himalayas 

Rahman, Mohammad (2008-08-15)
The Himalayan Mountains developed due to the collision of the Indian and Eurasian plates. There are two large foreland basins south of the eastern Himalayas: Assam Basin, located near the eastern syntaxis of the Himalayas, ...

Sedimentation and Tectonics of Lower Cenozoic Sequences from Southeast of Shillong Plateau, India: Provenance History of the Assam-Bengal System, Eastern Himalayas 

Mandal, Subhadip (2009-08-12)
The present study area is located along the southeastern part of the Shillong Plateau in the eastern and southeastern part of the Meghalaya State and in the lower (southern) part of Assam State, northeast India. A continuous ...

Sedimentology of the Toledo Formation, Belize Basin, Central America 

Fisher, Jason (2017-04-25)
The Toledo formation represents a profound shift from carbonate-dominated to clastic-dominated deposition within the Belize basin following the Late Cretaceous collision of the Maya and Chortis blocks (of the North American ...