This Is AuburnElectronic Theses and Dissertations

Browsing by Title

Now showing items 7559-7578 of 9115

Secure Design Considerations for Embedded Systems 

Thorington, Hunter (2015-12-04)
A guide is presented for embedded system designers that details secure design considerations for modern embedded systems. The guide focuses on adapting traditional software design practices to include adapted methodologies ...

Secure File Assignment in Heterogeneous Distributed Systems 

Tian, Yun (2013-04-23)
There is a growing demand for large-scale distributed storage systems to support resource sharing and fault tolerance. Although heterogeneity issues of distributed systems have been widely investigated, little attention ...

Secure Localization and Node Placement Strategies for Wireless Networks 

Pandey, Santosh (2007-08-15)
Localization and placement problems in wireless networks have been widely studied. The adaptation of localization in real world environment can be observed by popular commercial and non-commercial GPS applications. ...

Securing Lethal Means for Suicide: A Focus Group Study Exploring Perceptions and Barriers Among Practicing Veterinarians 

Waitz-Kudla, Sydney (2022-04-20)
Veterinarians are at higher risk for suicide than the general population, and it has been hypothesized that this may be attributable to veterinarians’ access to and knowledge of lethal drugs, specifically pentobarbital. ...

Securing Web Applications: Web Application Flow Whitelisting to Improve Security 

Alabdulrazzaq, Haneen (2017-04-25)
The explosion in the availability of data fueled by mobile devices has pushed security to the forefront. As of 2016, Internet users worldwide are estimated at a staggering 3.47 billion. Such large numbers of users dictate ...

Security and secure-dominating sets in graphs 

Jones, Cadavious (2014-04-29)
All graphs in this paper are finite and simple. Let G = (V;E) be a graph, x an element of V and S a subset of V. Following convention, we let N(x) := {u : where ux is an element of E} and N[x] := {x}union N(x). For S, ...

Security, (F,I)-security, and Ultra-security in Graphs 

Petrie, Caleb (2012-08-02)
Let G=(V,E) be a graph and S a subset of V. The notion of security in graphs was first presented by Brigham et al [3]. A set S is secure if every attack on S is defendable. The cardinality of a smallest secure set of G ...

Sediment and Nutrient Transport Through a Reservoir Sequence Along a Large River System 

Webster, Benjamin (2019-07-23)
Reservoirs are depositional environments for suspended sediments in river systems. Due to sediments undergoing fallout in low-flow areas, reservoirs contain 26% of all sediment and 12% of global river phosphorus behind ...

Sediment Fingerprinting to Identify Sources of In-Stream Sediment in an Urbanized Watershed 

Malhotra, Kritika (2018-07-23)
Excessive delivery of fine-grained sediment and sediment-bound nutrients to surface waters results in water quality impairment. Information on the relative contribution of different sources contributing sediment to river ...

Sediment Yield along an Actively Managed Streamside Management Zone 

Kara, Ferhat (2010-07-15)
In this study, we aim to regenerate a mature streamside management zone (SMZ) and create an uneven-aged forest with multiple canopy tiers and a dense understory using single tree selection (based on the Proportional-B ...

Sedimentation and Tectonic Evolution of Cenozoic Sequences from Bengal and Assam Foreland Basins, Eastern Himalayas 

Rahman, Mohammad (2008-08-15)
The Himalayan Mountains developed due to the collision of the Indian and Eurasian plates. There are two large foreland basins south of the eastern Himalayas: Assam Basin, located near the eastern syntaxis of the Himalayas, ...

Sedimentation and Tectonics of Lower Cenozoic Sequences from Southeast of Shillong Plateau, India: Provenance History of the Assam-Bengal System, Eastern Himalayas 

Mandal, Subhadip (2009-08-12)
The present study area is located along the southeastern part of the Shillong Plateau in the eastern and southeastern part of the Meghalaya State and in the lower (southern) part of Assam State, northeast India. A continuous ...

Sedimentology of the Toledo Formation, Belize Basin, Central America 

Fisher, Jason (2017-04-25)
The Toledo formation represents a profound shift from carbonate-dominated to clastic-dominated deposition within the Belize basin following the Late Cretaceous collision of the Maya and Chortis blocks (of the North American ...

Seed Germination and Growth Requirements of Selected Wildflower Species 

Bond, Laureanne M. (2010-01-08)
The effect of imbibition, funcigidal pre-treatments, and stratification time length on seed germination of Rudbeckia fulgida Aiton (orange coneflower), Penstemon laevigatus Aiton (eastern smooth beardtongue), and Lobelia ...

Seeding Rate Effect on Soybean Grain Yield 

Farley, James (2021-12-13)
Increasing costs of soybean seed as well as new varieties, seed treatments, and production practices required a reevaluation of seeding rate recommendations. Previously recommended seeding rates do not account for new ...

Seeing stars: a molecular and morphological investigation of the Odontasteridae (Asteroidea) 

Janosik, Alexis Michele (2012-05-16)
Odontasterids (Asteroidea: Echinodermata) comprise a clade described by A.E. Verrill in 1899 and are placed within Valvatida, a derived assemblage of sea stars. Boasting a worldwide distribution, Odontasterids are found ...

Seeking MRNA Methylation Inhibitors as Antiviral Agents 

Li, Weikuan (2008-08-15)
Aristeromycin and neplanocin A are two examples of potent S-adenosylhomocysteine hydrolase inhibitors. As a consequence, they show significant broad-spectrum antiviral activity, however, their clinical potential is limited ...

Segmentation and 3D reconstruction of root systems and Humulus lupulus for high-throughput phenotyping using deep neural networks and 3D imaging 

Cassity, Mary Elizabeth (2023-07-31)  ETD File Embargoed
The availability of artificial intelligence (AI) tools for computer vision applications has greatly increased in recent years, with many advanced tools available to researchers across various fields. Precision agriculture ...

Segregation Academies in Rural Alabama: White Resisters’ Final Stand Against School Integration in Wilcox County 

Sheffield, Amberly (2022-04-29)
This paper examines the series of events leading to the establishment of segregation academies in Wilcox Academy, Alabama, followed by a brief analysis of how white resisters founded and built these white private schools. ...

The Sehoy Legacy: Kinship, Gender, and Property in a Tensaw Creek Community, 1783-1851 

Colvin, Mary Alexandrea (2019-04-18)
In 1783, Alexander McGillivray and his sister, Sophia Durant, migrated to the Tensaw Delta with a herd of cattle and forty enslaved laborers to establish a plantation on the periphery of Creek territory adjoining Spanish ...