Building network security dissertation

Cover letter sign off paragraph. Winston churchill essay on moses. Essay revision practice worksheet. Soal essay vlan bmw supply chain management case study pdf. Essay peran dan fungsi mahasiswa. Hire writer for essay. Essay on women's day in english. Spc capstone project. Pro death penalty argumentative essay pdf. Holiday homework for class 7th hindi. Essay on health service in nepal. Cover letter digital communications. Sample of a good wedding speech. Essay on chess in hindi. Case study on judgement.

Literature review critique checklist. Sample cover letter for assistant editor position. Term paper on founding fathers. Career change job application cover letter. Title in personal statement. A poison tree essay questions. How to write a research paper for elementary students. Something i enjoy doing essay. Fieldwork essay kinesics. Thesis verb definition Thesis verb definition. Working holiday cover letter sample.

Graduate program admission essay. Dissertation sur la religion en philosophie. Linkage literature review. Application letter nursing attendant. Simple essay on my best friend for class 1. What is a research paper pdf. Spinal cord injury hesi case study quizlet essay on serve and deserve in hindi. How to write an application letter for employment as a waitress. The other sister case study. Cs capstone project ideas. Skrive en god essay. Dissertation philo sur le desir.

Business plan template with financial projections. Cover letter no contact name given. Questions asked during a business plan presentation. Besides multi camera matching algorithms the system also supports custom field of view setups. The ten cameras arranged as five stereo pairs in a pentagon shape create a sensing unit with omnidirectional stereo view. Lenses with a horizontal field of view of 80 degrees are used to create a full horizontal field of view with a decent overlap between neighbouring cameras. Omnidirectional obstacle detection based on stereo vision allows for maneuvers in any direction.

Mobile robots like micro aerial vehicles can fully exploit this sensing setup and fly in cluttered environments in any direction while avoiding obstacles. The pentagon camera setup with full horizontal field of view is applicable as data source for visual slam algorithms. The individual cameras with small field of view lenses provide steady resolution image data.

In contrast image data of a single camera with a fisheye lens, that also provides a full horizontal field of view, is heavily affected by distortion and non-uniform resolution. The multi camera system adds complexity in the general hardware system setup but enables the usage of simpler lens models. Many problems in science and engineering are driven by time-periodic forces. In fluid dynamics, this occurs for example in turbines, rotors or in human blood flow. These problems are described by the Navier—Stokes equations. The traditional way to solve them is to use a time-stepping method and compute the whole transitional phase until the time-periodic steady state is reached.

We are using a different approach. We model directly the steady state by using periodic boundary conditions in time. This results into time-periodic Navier—Stokes equations. We use two different ways to discretize these equations in time. One way is to use a truncated Fourier series to represent the solution. The equations are then discretized by a spectral Galerkin method. The other way is to use the finite difference method in time. Both temporal discretization are accompanied by spatial finite differences in space. We solve the resulting nonlinear space-time problem with a Picard iteration method.

A linear system of equation has to be solved in each Picard iteration. This linear system is solved by preconditioned Krylov methods. We provide problem specific preconditioners. For the spectral in time method, we use a block-tridiagonal preconditioner. The 1, 1 block is a diagonal approximation of the multi-harmonic convection-diffusion matrix. The 2, 2 block is an approximation of the Schur complement based on a commutator. For the finite differences in time, we use a geometric multigrid method with a space-time box smoother.

This library is very flexible and uses the message passing interface MPI to parallelize the space-time problems. The parallelization is done in space and time. We applied the spectral in time method to various problems. A Rayleigh streaming has been computed to test the preconditioner of the linear solvers. A Taylor—Green vortex has been computed to compare the spectral in time method with a traditional time-stepping method. A channel flow with an oscillating obstacle has been computed to evaluate the parallel performance in time.

A time-periodically disturbed swept Hiemenz flow has been computed to test the solver for turbulent flows. Such turbulent flows are not purely time-periodic. Only its statistics are time-periodic. Web applications have become one of the most common ways of providing access to online information and services. People use their desktop or mobile browsers to surf the web and perform a wide range of functions, as well as store and access their ever growing personal digital data. The popularity, importance and versatility of web applications comes at a cost though, as they naturally attract the interest of malicious actors.

Web application breaches expose sensitive data and incur significant financial and reputation losses to the affected parties. It is, therefore, necessary to adequately secure web applications, and shield them from malicious intent. In this thesis we consider authentication on the web which constitutes a vital aspect of web application security.

We consider three main pillars of authentication, namely client authentication, server authentication, and data authenticity and integrity protection. In the first part, we propose Sound-Proof, a two-factor authentication scheme for web logins. Sound-Proof leverages short audio recordings to verify the proximity of the user's phone to the computer on which the login is taking place.

Sound-Proof is transparent to the user, as it does not require any user-phone interaction, resembling the behavior of password-only authentication. It is, moreover, readily deployable, requiring no additional software or browser plugins on the user's computer. In the second part, we consider TLS MITM attacks where the attacker impersonates the legitimate web server to the user, with the goal of impersonating the user to the server and compromise the user's account.

We show why the recently proposed client authentication based on TLS Channel IDs, as well as client web authentication in general, cannot fully prevent such attacks. We then show how combining strong client authentication with the concept of server invariance can protect against such attacks. In the third part, we propose Verena, a web application platform that provides end-to-end integrity guarantees, under full server compromise. In Verena web clients can verify the integrity of a webpage by verifying the results of queries on data stored at the server.

Verena provides correctness, completeness and freshness for a common set of database queries by relying on a small trusted computing base. Verena enables a developer to specify an integrity policy for query results based on our notion of trust contexts and enforces this policy efficiently. The amount of video data captured is steadily increasing not only in terms of quantity but also in quality due to higher spatial and temporal resolutions of cameras. This poses new challenges in processing visual data efficiently. In this thesis we focus on applications for frame interpolation and modification propagation in videos.

Traditional approaches usually require some accurate pixel correspondences between the images, which is an ill-posed problem. In this thesis, we present efficient and novel methods which reduce and even remove the need for computing explicit correspondences. To achieve this, we build upon recent advances in phase-based methods as well as neural networks which estimate the motion between images implicitly. First, we present a purely phase-based method for edit propagation in videos.

We propose a novel algorithm to combine and adapt the phase information of the pixels in order to propagate image edits. We evaluate the flexibility by applying it to various edit applications. Second, we develop a data driven approach for the application of color propagation in grayscale videos.

By combining appearance and semantics we are able to extend the temporal range to which colors can be propagated. The extended comparisons with recent methods show the superiority of our method. Finally, we propose a method for frame interpolation combining the advantages of a phase-based approach with a data driven strategy. We implement a convolutional neural network which reasons on the phase-based representation of the images. As a consequence, we are able to produce visually preferable results over optical flow for challenging scenarios containing motion blur and brightness changes.

To conclude, we believe that, methods using implicit motion estimation provide an interesting and efficient alternative to traditional approaches and bear potential for many more interesting research and applications. We hope that our work provides an important step in such a direction. Advances in manufacturing and processing techniques allow us to create objects with ever increasing complexity. This complexity can be used to create not only aesthetic forms, but also structured materials, whose geometries determine their deformation behavior.

Systematic control over the elastic properties is possible with the right structures, but the relationship between structure and elastic properties is nontrivial. This highlights the need for new computational design approaches that can leverage the geometric complexity provided by advanced fabrication techniques, either by providing feedback about the deformation behavior throughout the design process, or by directly translating high-level functional targets into the appropriate material structure. This thesis introduces a novel set of techniques to characterize and create structured materials with various functional targets.

We first introduce a data-driven microstructure synthesis approach. After creating a database of small-scale structures that show a clearly defined macroscopic deformation behavior when tiled, we use an interpolation method to create new structures from this database and design objects with spatially varying elastic properties. We then propose a design method to create surfaces with decorative cutouts that integrates aesthetics and stability into a single design process.

We combine a discrete element texture approach with a topology optimization method to automatically optimizes the distribution of cutouts, creating a synergy of structure and function. Finally, we develop an approach to characterize the mechanical properties of tessellation-based networks of rods. We create a compact representation of the elastic behavior of such networks and explore the space of a specific type of tessellation, isohedral tilings, to show that we can create a broad range of mechanical behaviors from combinations of simple shapes.

We present the resulting mechanical characterization using an intuitive visual representation that lends itself to an efficient exploration of the underlying space of structures. We are witnessing a new revolution in the area of fabrication and manufacturing. The most recent generation of digital fabrication devices like 3D printers, laser cutters and 4-axis desktop milling machines, make it considerably easier for non-professionals to fabricate their own custom designed tools and objects at a reasonable price. This evolution will eventually liberate many from having to buy pre-built products and already allows a high level of individualized object design and customization.

Over the past few years, an active community of makers has evolved, that constantly pushes the development of digital fabrication devices in the direction of smaller, more affordable tabletop and lab-sized machines. With this, there comes the need for user-friendly software and methods to create and work with their input data, since many of the devices' users do not have any special technical knowledge.

Depending on the fabrication method, a designed shape needs to satisfy certain constraints and be physically feasible, especially if one wishes to replicate or approximate highly complex digital models. In this thesis, we explore and develop novel computational design methods that extend the capabilities of traditional crafting and manufacturing techniques to create 3D shapes.

Theses and Dissertations Available from ProQuest | Theses and Dissertations | Purdue University

Specifically, we are interested in identifying instances of design processes that can be simplified and improved algorithmically and made readily accessible to the maker community through the use of digital fabrication techniques. We show how these approaches allow the creation of objects with a new level of quality and complexity, and think that this work will enable novel applications not just for the maker community but also potentially for industrial manufacturing.

As Internet of Things IoT systems further emerge, we face unprecedented security and privacy challenges, especially with regards to the collected data. This data typically consists of sensor readings, tagged with metadata. For scalability, ubiquitous access, and sharing possibilities, the data is most often stored in the cloud. Securing date while in transit and in particular when being stored in the cloud is of utmost importance, as the data can be used to infer privacy-sensitive information. Moreover, transparent and secure data sharing e. The increased number of security and privacy incidents, such as system compromises or unauthorized trade with users data, show that this trust is not always justified.

Despite varying levels of privacy-awareness among users of different age and geopolitical groups, and even societal shifts towards privacy pragmatism and indifference, the security and privacy threats do usually have far-reaching implications, demanding adequate mechanisms and measures to address them. In this dissertation, we investigate building secure IoT systems that protect data confidentiality and retain data ownership.

We build secure systems that allow reducing the trust end-users are required to put into third parties within the IoT ecosystem, specifically towards the cloud storage and service providers. More importantly, we take a new approach on empowering the user with ownership and fine-grained access control for IoT data without sacrificing performance or security. In particular, we present three approaches to enabling a secure IoT ecosystem: i Talos: Talos is a system that stores IoT data securely in a cloud database while still allowing query processing over the encrypted data.

Talos protects data even if the server is compromised. We enable this by encrypting IoT data with a set of cryptographic schemes such as order- preserving and partially homomorphic encryption. We tailor Talos to accommodate for the resource asymmetry of the IoT, particularly towards constrained IoT devices. We assess the feasibility of Talos on low-power devices with and without cryptographic hardware accelerators and quantify its overhead concerning energy consumption, computation time, and latency.

With a thorough evaluation of our prototype implementation, we show that Talos is a practical system that can provide a high level of security with reasonable overhead. We present Pilatus, a data protection platform that extends Talos where the cloud stores only encrypted data, yet is still able to process a defined set of database queries e. Pilatus features a novel encrypted data sharing scheme based on re-encryption, with revocation capabilities and in situ key-update.

Our solution includes a suite of novel techniques that enable efficient partially homomorphic encryption, decryption, and sharing. We present performance optimizations that render these cryptographic tools practical for mobile platforms. We implement a prototype of Pilatus and evaluate it thoroughly.

Our optimizations achieve a performance gain within one order of magnitude compared to state-of-the-art realizations. The consequent myriad of isolated data silos of classical vertical architectures is hard to manage and prevent heterogeneous applications from interacting with our IoT data. To address this challenge, we leverage the blockchain technology to bootstrap trust for a distributed, secure, and resilient access control and data management scheme. Droplet handles time series data, enables reliable sharing among heterogeneous applications without intermediate trust entities, and features a cryptographically-protected fine-grained and scalable access control mechanism to data streams.

We leverage a hash-chain-based key management mechanism to enable interval sharing and compact key distribution. The built-in cryptocurrency feature of blockchains allows the integration of economic incentives into our system. These properties enable a variety of applications that are presently not easily realizable using existing systems. The systems proposed and discussed in this dissertation demonstrate that end-to-end encryption with secure sharing can be achieved in IoT ecosystems with a modest overhead, while maintaining a consistent user- experience.

This thesis targets challenges of large-scale teaching at the level of higher education, especially individualization of learning and feedback at large-scale. The challenges addressed are to scale and develop tool enhanced teaching methodologies that work in large cohorts of students more than To meet these challenges tools were developed which help lecturers to scale the teaching by either providing automated feedback to developers of learning materials E.

Tutorial or by taking care of the micromanaged certain teaching methodologies require at large-scale PELE. The foundation of all approaches in this thesis is the collection and analysis of educational data learning analytics. Based on the collected data a system was developed which helps lecturers to develop and improve distance learning materials, by providing lecturers with automatic data analysis about the detailed usage of the learning materials.

In this way helping lecturers to understand how the students use the provided distance learning materials without disturbing the process or having access to the students. To further improve the learning of students in large-scale blended learning courses a teaching methodology was implemented based on regular face-to-face feedback discussions over the period of a semester. The aim was to focus on individual students and provide them with high-quality feedback.

To implement such a process at large-scale a tool was developed which took care of the required micromanagement to organize the face-to-face feedback discussions and help lecturers to have an overview and stay in control of the whole process. Allowing to scale this process to more than students and 50 teaching assistants, without a drop in quality. The tool enhanced teaching at large-scale and helped to improve the learning process by increasing the efficacy and enabling lecturers to make data-driven decisions. Thereby enabling lecturers to focus on important aspects of teaching instead of spending time on micromanagement or data collection and analysis.

The tool enhanced teaching elaborated in this thesis may be deployed to a wide range of courses, where large cohorts of students are taught in a blended learning setting. Encryption is a tool that has traditionally been used to allow confidential communication between two parties. Over the years, several types of encryption have been proposed, including public-key encryption, identity-based encryption, deniable encryption, and functional encryption.

These variants provide different features and security guarantees. Their security is typically defined by a game between an adversary and a challenger. Even for ordinary public-key encryption, several different security definitions have been proposed and identifying the right one is a nontrivial task. For more complex primitives such as functional encryption, security definitions are far more involved and it is way more difficult to evaluate whether a given definition is appropriate. The goal of this thesis is to better understand these definitions for several types of encryption by analyzing them in the constructive cryptography framework.

In this framework, a cryptographic primitive can be seen as providing a construction of a so-called ideal resource from a so-called real resource, for a well-defined notion of construction. The real resource formalizes what is available to the involved parties, e. This paradigm makes the requirements and the achieved guarantees explicit and helps to decide whether a given scheme is suitable for a certain application. The first and simplest encryption scheme we consider in this thesis is the one-time pad. We show that it provides a guarantee that deniable encryption targets, namely it remains secure if the receiver reveals the secret key to the adversary after receiving the message.

We model this in constructive cryptography by allowing the receiver to become dishonest after receiving the message.

1. Introduction

We next consider identity-based encryption IBE. In contrast to deniable encryption, it does not provide stronger security guarantees, but rather simplifies the key distribution. We formalize the standard application of IBE, namely non-interactive secure communication, as constructing an ideal resource that allows parties to be registered for an identity, and to securely sent messages to other parties only known by their identity.

Quite surprisingly, we show that it is impossible to construct this resource in the standard model. We show, however, how to adjust any IBE scheme that satisfies the standard security definition to achieve this goal in the random oracle model. We also show that the impossibility result can be avoided in the standard model by considering a weaker ideal resource. Functional encryption is a very general concept, which encompasses public-key encryption and identity-based encryption as special cases. It allows the generation of restricted secret keys that enable to learn only a specific function of the encrypted data.

We formalize the security of functional encryption as constructing an ideal resource that corresponds to a repository with fine-grained access control, and compare this to existing security notions. Again, we show that constructing the most desirable ideal resource is impossible without random oracles, possible in the random oracle model, and that constructing weaker ideal resources is possible in the standard model. Finally, we consider access control encryption ACE.

While the encryption schemes discussed above allow to control which users can read the encrypted data, ACE additionally allows to restrict write access. As we argue, however, existing security notions are insufficient to provide meaningful security guarantees in realistic settings. We therefore propose new, substantially stronger security definitions and an ACE scheme that provably satisfies them under standard assumptions. Aiming for sustainable development means reconsidering the access to energy sources in industrialized countries, which are not faced with contingency scenarios that are implemented in emergent and newly-developed countries, to allow equal access to energy sources for all and thwart environmental degradation.

The global penetration of renewable energy sources to replace fossil fuel and nuclear power plants means adjusting to stochastic energy production. The expected yield will be dependent on very different weather and landscape conditions and will represent a challenge for countries with continuous access to energy sources and where energy is often considered a public utility. Tracking wastage, improving the scheduling, and the processes that consume energy, would allow us to match the demand and the supply of energy.

This will be particularly crucial during peak time, where meeting the high demand incurs the ramping up of mostly unclean additional power plants or introducing power system instability. However, less focus has been set on assessing the potential of using sub-metered data for improving the energy efficiency in households.

This was primarily linked to the fact that the necessary datasets were not widely available, due to the difficulty and the costs in instrumenting households for acquiring the consumption data from appliances. The objective of this thesis is to investigate how to leverage and improve existing disaggregated datasets to develop data-driven techniques to improve the energy efficiency within residential homes. Starting from smart meter data, we segmented households into groups with similar electricity consumption pattern based on their peak consumption, to identify hurtful consumption patterns in the perspective of utility companies, for which they could launch targeted mitigation campaigns.

These behaviors are closely re- lated to the activities that are carried out throughout the day and can be supported by the usage of consumer electronics, such as appliances. Therefore, we turned to analyzing the behaviors inside house- i holds that triggered the usage of electricity by studying a large disaggregated dataset and developed learning techniques to extract activity patterns.

Due to the lack of event-based and activity labels in existing datasets to allow us to validate our learning technique, we leveraged crowdsourcing concepts to provide an expert-annotated dataset to enrich the existing datasets through our Collaborative Annotation Framework for Energy Datasets CAFED.

We conducted two in-depth studies to quantify the performance of regular users against expert users in labeling energy data on CAFED. Using the expert-annotated labels, we validated GMMthresh with expert manually labeled data. Then, we developed a method for learning temporal association rules for identifying activities involving the usage of appliances within households. Our pipeline includes our thresholding algorithm and a novel search algorithm for determining time windows for the association rules efficiently and in a data-driven manner.

The contributions of this thesis rely on exploiting energy data and developing novel techniques towards identifying activity patterns and their scheduling, which could then become part of an ambient intelligence system that would smarten existing homes. The methods we developed are not restricted to the energy research, as they can be applied to sensor data, where for example inertial sensors also require machine learning algorithms to filter out background noise from actual movement. Similarly, our work on the crowdsourcing of time series opens new perspectives for extending the range of data that can be annotated by the crowd and provides design insights and mitigation techniques for improving the quality of the labeling on collaborative platforms.

Finally, our temporal association rules mining framework is not limited to energy time series but can be applied to search for temporal windows and understanding the scheduling of any time series dataset. Null pointer dereferencing is a well-known issue in object-oriented programming, and can be avoided by adding special validity rules to the programming language.

However, just introducing a single rule is not enough: the whole language infrastructure has to be considered instead. The resulting guarantees are called void safety. The thesis reviews, in detail, engineering solutions and migration efforts that enabled the transition from classic to void safe code of multiple libraries and projects with lines of code ranging in the millions.

Experience with the tiny details of the implementation can be an invaluable source of insight for researcher looking into making a language void safe. The void safety rules can be divided into three major categories. The first one is the extension of a regular type system with attached non-null and detachable possibly-null types. Generic programming opens a door to different interpretations. The thesis defines some base void safety properties for formal generic types and specifies void-safety-aware conformance rules.

The second category of rules ensures that newly created objects reach a stable state maintaining the type system guarantees. The thesis proposes two solutions for this object initialization issue and compares them to previous work. To ensure safety at the end of object life cycle it also specifies validity rules for finalizers. A number of examples are used to demonstrate that the proposed solutions are of practical use and do not suffer from limited expressiveness caused by the lack of additional annotations describing intermediate object states.

The third category of void safety rules covers a practical need to bridge the gap between attached and detachable types. The thesis proposes formal void safety rules for local variables in the context of an object-oriented language that do not require any marks to distinguish between attached and detachable types. It demonstrates advantages of the annotation-free approach with benchmarks based on open source code, discusses implementation decisions and how they are reflected in the formal model.

We design new and improved approximation algorithms for classical problems in machine scheduling and resource allocation. The goal is to find an assignment of jobs to machines to minimize the time by which all jobs can be processed. The input for the resource allocation problem we consider is identical after treating the jobs as resources and machines as players respectively.

This corresponds to maximizing a natural notion of fairness. Our techniques for improving the state of the art for both problems are versatile. We demonstrate their applicability in developing an efficient hypergraph generalization of the Hungarian algorithm for finding perfect matchings in bipartite graphs.

As the number of consumer computing devices at our disposal has grown, we find ourselves in situations where we have access to more than a single device. Even though people have started using multiple devices both sequentially and in parallel, applications and operating systems offer limited support for these scenarios. Support is often limited to data synchronisation via the cloud or restricted to devices from the same manufacturer. The research community has been exploring how applications could adapt to the set of devices at hand and has devised new cross-device interaction techniques.

Frameworks and tools have been developed for designing and prototyping such cross-device applications. However, less attention has been paid to what is needed to go beyond research prototypes and to engineer products. Reactions to Confrontations of Positive Stereotype Use. Chin, Darren W. M Pavement Ant Tetramorium sp. The Role of Identity Denial. Cox, T. Daninger, Nathan Depreciation in the U. Davis, James E. Effects of the Reference Amount on Food. Dominick, S. Easo, Liza A Liquid dispersion in sheared particulate material.

Fan, Jiacheng Strategies of Fantasy in E. Hoffmann and Pu Songling. Industry: Developing a Unified, Streamlined Framework. Garcia Galicia, Jorge A 3D printing speed optimization by minimizing void paths. Goodman, Juliana Evercotton. Franchise Systems. PCC Ho, Kacie K. Hunter, Brian C Essays on Microfinance. Israelsen, Andrew Kant and the Unity of Nature.

Jashnsaz, Hossein Hydrodynamic Hunters. Jensen, Bjoern J. Karim, Shahriar MD. Knowles, J. Kormanik, Nicholas J. Agribusiness Managers. Corn Belt. Li, Xiaoxiao Essays on Economics of Education. Mancuhan, Koray Data Classification for l-diversity. Mendis, Gamini P.

Mendonca, Flavio A. Novakowski, Theodore J. Parge, Rohan How effective are non-monetary incentives in motivating dormitory residents to save energy? Pratt, Evan Cav1. Robey, Sarah F. Rudari, Lukas A Model of U. Airline Corporate Social Responsibility Practices. Sutton, Anthony Zombie Apocrypha. Tang, Jianping Visualization of the Dissolution Process. Umbaugh, C. Wang, Xiao High Performance Tomography.

Zhang, Xue Characterization of the interaction between the bacterium TR3 and Magnaporthe oryzae. Abbas, Kausar Effects of concussive and repetitive subconcussive injury in high school football athletes using resting state FMRI. Abbott, Chelsi Patricia The effect of adjuvants on apple disease management. Abdelhameed, Ameer Ahmed Evaluation of negative energy and mineral balance in periparturient Holstein-Friesian cattle.

Abdel-moneim Mohamed, Ahmed M. E Gonadal intersex in teleosts: Mechanisms, molecular biomarkers and diagnostic assays. Abotalib, Mohammed Sustainability assessment of large-scale carbon capture and sequestration deployment outside the system boundaries - Opportunities and challenges. AboualizadehBehbahani, Maziar Proposing a new system architecture for next generation learning environments.

Accorsi, Felipe Airoldi Experimental characterization of scroll expander for small-scale power generation in an Organic Rankine Cycle. Ackerman, Jeffrey K Coupled dynamics of legged locomotion with suspended loads. Adams, Katherine E Regulating belongingness needs: Regulatory focus and responses to social exclusion. Adams, Rebecca N Measures of cancer-related loneliness and negative social expectations: Development and preliminary validation. Adams, Zachary Howard Development of advanced blade pitching kinematics for cycloturbines and cyclorotors.

Adigun, Oluwamayowa O Mechanisms of metal mineralization on virus templates for nanorod synthesis. Aghazadeh, Mahdieh Enhancing bioethanol fermentation through removal of acetic acid using liquid-liquid extraction. Ahmad, Imad Next generation bandwidth-efficient network codes for distributed data storage. Ahmad, Ziad Throughput enhancements in multiuser downlink systems using imperfect feedback. Ahn, Sung Won Oscillation of quenched slowdown asymptotics of random walks in random environment in Z.

Akiyama, Reiko Language, culture, and identity negotiation: perspectives of adolescent Japanese sojourner students in the Midwest, USA. Akkala, Arun Goud Asymmetric underlap optimization of subnm finfets for realizing energy-efficient logic and robust memories. AlJaberi, Hana Designing prenatal m-Health interventions through transmigrants reflection on their pregnancy ecology.

Allen, Benjamin The impact of the foot and mouth disease control pathway on milk production in India. Allen, Jennifer L Macronutrient-flavonoid interactions, effects in model food matrices. Allen, Wai K Miocene-Pliocene strike-slip basin development along the Denali fault system in the eastern Alaska range: Chronostratigraphy and provenance of the Mccallum formation and implications for displacement. Almeida, Leah Zoe Effects of Lake Erie hypoxia on fish habitat quality and yellow perch behavior and physiology. Al Noman, Abdullah Optical characterization of on-chip silicon nitride microresonators.

Alotaibi, Ahmed Mohammed Development of a mechatronics instrument assisted soft tissue mobilization IASTM device to quantify force and orientation angles. Altarabsheh, Ahmad Ghazi Managing urban wastewater system using complex adaptive system approach. Amankwah, Akuffo Subsidies, aquaculture technology adoption, and welfare impacts in Ghana and Kenya.

Anderson, Nickolas H Controlling electronics for the formation of high valent uranium imido complexes. Arora, Nigam Bir Utilization of ferrioxamine microarrays for the rapid detection of pathogenic bacteria. Aslam, Kiran Deciphering the role of Hsp31 as a multitasking chaperone. Assisi, Clara Genomic and transcriptomic analysis of biofilm formation in persistent and transient L. Ayres, Drew C A collaborative integrated stem teaching: Examination of a science and math teacher collaboration on an integrated stem unit.

Azarmi, Mehdi End-to-end security in service-oriented architecture. Azzato, Ariana Experimental evaluation of an iPad-based augmentative and alternative communication program for early elementary children with severe, non-verbal autism. Backing, Thomas H Regularity of solutions and the free boundary for a class of Bernoulli-type parabolic free boundary problems with variable coefficients.

Bae, Yeon Jin Integrated design tool of building system optimization for building life cycle cost. Balasubramanian, Shambhavi Fuel type estimation using fuel system parameters. Banks, Devin E Examining differential relationships of substance use and risky sexual behavior among African American and White adolescents.

Baradwaj, Aditya G Solid state charge transport in radical polymers. Barrett, Daniel P Learning in vision and robotics. Barthur, Ashrith Computational environment for modeling and analysing network traffic behaviour using the divide and recombine framework. Baskaran, Savitha Visualization of spatio-temporal data in two dimensional space. Batra, Jennifer C Innovation as everyday action: A case study of organizational discourse and the local meaning of innovation. Batty, Leslie Danel Of angels and animals: Sexuality, spirituality, and social contexts in Rebecca West's modernist novels. Batz, Cassondra L A meta-analytic examination of the role of gender inequality in explaining gender differences in subjective well-being.

Beaty, Melissa S Functional characterization of the Rvc protein of Mycobacterium tuberculosis. Belal, Hatem Mohamed Modifying burning rate and agglomeration size in aluminized composite solid propellants using mechanically activated metals. Bell, Colin D Influence of stormwater control measures on watershed hydrology and biogeochemical cycling.

Bell, Darren Thomas Size scaling of strength and toughness for 3D printed polymer specimens. Bemis, Kyle A framework for the statistical analysis of mass spectrometry imaging experiments. Benham, Sara J Deficits in sound pattern sequencing in children with specific language impairment: A networks approach.

Benskin, Joanna Perceval's sister and Juliet Capulet as disruptive guides in spiritual quests. Bercich, Rebecca A Improving the mechanistic study of neuromuscular diseases through the development of a fully wireless and implantable recording device. Berdanier, Catherine G. P Learning the language of academic engineering: Sociocognitive writing in graduate students. Bergman, Megan N Using academic and learning analytics to explore student success in an online graduate program in communication.

Berman, Alycia G Influence of mechanical stimulation on the quantity and quality of bone during modeling. Besser, Erin D Exploring the role of feedback and its impact within a Digital Badge system from multiple perspectives: A case study of preservice teachers.

Bhamra, Hansraj Singh Micro-power circuits and systems for wireless sensor nodes and implantable medical devices. Bhargav, Amruth Development of novel cathodes for high energy density lithium batteries. Bhuiyan, Mansurul MD. Biggs, Bruce A Examining law enforcement officer job satisfaction and burnout through the lens of empowerment theory. Binarandi, Ghazi Artificial neural networks for wireless structural control. Bland, James R Three essays in economics. Blood, Bridget Lorraine Behavioral responses of Pityophthorus juglandis to volatiles of walnut and Geosmithia morbida, the causal agent of thousand cankers disease.

Bodicherla, Dhiraj Zephyr: A social psychology-based mobile application for long-distance romantic partners. Boo, Jeongjoon Enhancing a flight dispatcher display for safer flight operations. Book, Todd A Structural integrity of additive materials: Microstructure, fatigue behavior, and surface processing. Booth, Joran W How pre-ideation methods and skills affect and remove barriers to ideation. Bosanac, Natasha Leveraging natural dynamical structures to explore multi-body systems. Boussios, David A Modeling of a cereal-livestock production system in Karak, Jordan: A dynamic stochastic programming approach.

African Peacebuilding Network

Bowen, Gregory A Sounding sacred: The adoption of biblical archaisms in the Book of Mormon and other 19th century texts. Boylan, Daniel H The innovative use of Twitter technology by bank leadership to enhance shareholder value. Bragg, John Campbell Silk fibroin-reinforced hydrogels for growth factor delivery and in vitro cell culture. Brar, Jagpinder S Modeling for thermal resistance of non-O shiga toxin producing Escherichia coli in ground beef.

Brayfield, Russell Scott Optical emission spectroscopy of high voltage cold atmospheric plasma generated using dielectric barrier discharges. Brice, William Disability visibility and stigma threat: Effects on the performance, stress, and self-control of disabled workers. Brindley, Jacob A Essays in experimental economics on contract design.

Brock, Amanda M Evaluating the impact of a wood-chip bioreactor on phosphorus concentrations. Bronikowski, Scott Alan Grounding robot motion in natural language and visual perception. Brown, Anne V Understanding the molecular regulation of senescence in Glycine max. Browning, Tyler A Direct photon anisotropy and the time evolution of the quark-gluon plasma. Builta, Stephen Assessing fuel burn inefficiencies in oceanic airspace. Bunka, Christopher A Globalization and state: Factors contributing to the contemporary food security crisis.

Bunnell, Wayne A Multimedia techniques for construction education and training. Busquets, Enrique Advanced control algorithms for compact and highly efficient displacement-controlled multi-actuator and hydraulic hybrid systems. Busse, Margaret M Characterization of a continuous-flow reactor for solar UV water disinfection. Byrd, Elizabeth S A unique perspective on the demand for livestock product attributes. Cabral do Nascimento, Vinicius Magnetic equivalent circuit based permanent magnet characterization. Cahill, Katie Anne Democracy is not enough: Accountability, international organizations, and the politics social good distribution.

Calic, Goran Creativity in organizations: Antecedents and outcomes of individual creativity. Campbell, Emily Does mentoring buffer women in science from the effects of perceived discrimination on career outcomes? Cao, Lei Dislocations in the nanoscale: A phase-field view. Cao, Muning A study of how Chinese ink painting features can be applied to 3D scenes and models in real-time rendering.

Cao, Yudong Combinatorial algorithms for perturbation theory and application on quantum computing. Carichino, Lucia Multiscale mathematical modeling of ocular blood flow and oxygenation and their relevance to glaucoma. Carnes, Mark T Conceptual understanding of threshold concepts of electrical phenomena: Mental models of senior undergraduates in electrical engineering. Carriere, Danielle E Resilience, suicide, and enrollment in higher education: Three essays on impacts of recession.

Carter, Carlos D Antibacterial activity of essential oil encapsulated sodium iota-carrageenan fibers.

Cassani, Simone Blood circulation and aqueous humor flow in the eye: Multi-scale modeling and clinical applications. Casteloes, Karen S Techniques and technologies for decontaminating chemically contaminated premise plumbing infrastructure. Castillo, Marcelo J Essays in international migration. Cavett, Lee A Using security risk analysis: Is the bring your own device policy becoming a liability risk within healthcare? Cedeno Agamez, Miguel Aging effects in automated face recognition.

Cen, Lei A study of security issues of mobile apps in the android platform using machine learning approaches. Cervantes Botero, Victor Hernando An application of contextuality-by-default in a psychophysical double detection experiment. Chae, Junghoon Visual analytics of location-based social networks for decision support.

Chakrabarty, Ankush Supervised learning-based explicit nonlinear model predictive control and unknown input estimation in biomedical systems. Chamberlain, Kyle Purification and preparation of intrinsically disordered proteins for NMR spectroscopy. Chandler, Myles G Identifying predictors of university sales competition performace: A social-cognitive account.

Sample thesis statements for othello

Chandrasegaran, Ramaswamy Senthil Kumaran Tools and methods to analyze multimodal data in collaborative design ideation. Chandrasekar, Rohith Development of coherent light sources at the nanoscale using optical metamaterials. Chan, Kai-Chi On the 3D point cloud for human-pose estimation. Chan, Kevin J The effects of scarring on face recognition. Chatzidakis, Stylianos Cosmic ray muons for spent nuclear fuel monitoring. Chen, Binghe Least-squares finite element method for singularly perturbed problems and the Oseen problem. Chen, Chun-Liang Functional and structural characterization of the mevalonate diphosphate decarboxylase and the isopentenyl diphosphate isomerase from Enterococcus faecalis.

Chen, Ji Investigating and expanding the functionality of RNA catalysts: Studies of the hepatitis delta virus, the hammerhead, and the aminoacyl-tRNA synthetase-like ribozymes. Chen, Keru Physiological aspects of relative changes in nitrogen and plant density stress tolerances over a year period of US maize hybrid introductions. Chen, Long Improvement of treatment for prostate cancer and involvement of Plk1.

Chen, Peng-Chu Systemic risk in financial networks. Chen, Xi Impact of dietary modification on aflatoxicosis in poultry. Chen, Yafang Structural and functional studies of the papain-like protease 2 from mouse hepatitis virus. Chen, Yi Local polynomial chaos expansion method for high dimensional stochastic differential equations. Chen, Yi-hui Effects of age of learning, family, and social environment on attitude and proficiency in EFL among Taiwanese adults. Chernouski, Libby C Rethinking reference: Towards a holistic approach to linguistic reference.

Chisama, Benjamin Franklin Farmers' use of mobile phone technology for agricultural information services in Lilongwe District, Malawi. Chiu, Charles Yicheng The effects of chloride-based deicing chemicals on degradation of portland cement mortars with alkali reactive aggregate. Choi, Meena A flexible and versatile framework for statistical design and analysis of quantitative mass spectrometry-based proteomic experiments.

Choi, Mun S Pilot study of the effect of high-protein, renal-appropriate meals during hemodialysis on intradialytic hypotension in maintenance hemodialysis patients. Chojnacki, John T Dynamic triaxial compression experiments on borosilicate and soda-lime glass. Cho, Younghyun Development and evaluation of a watershed-scale hybrid hydrologic model. Chu, Jou-Mei Mechanical properties of transgenic silkworm silk at high rate impact.

Chulis, Kimberly Data mining Twitter for cancer, diabetes, and asthma insights. Clark, Christopher Lewis The investigation of carbon-fluorine bond activation by uranium and evaluation of a tris-oxazoline based tripodal ligand to support low-valent uranium centers. Clinkenbeard, Paige E Teen suicide and other destructive behaviors in contemporary young adult literature: The subjects, the literature, and what it means for educators.

Coley, Scott M On the consequences of skeptical theism. Collins, Scott J The impact of global environmental changes on an exotic invasive species, Slliaria petiolata garlic mustard. Conrad, Alicia E Effects of exposure to agricultural drainage ditch water on survivorship, distribution and abundance of riffle beetles Coleoptera: Elmidae in headwater streams of the Cedar Creek Watershed, Indiana. Cook, Amanda C Essays on health insurance. Cook, Timothy Daniel Expanding M cyclam chemistry; cobalt acetylide complexes for charge delocalization, and functionalized nickel complexes for CO2 reduction.

Corkran, Sydney Cooper Comparison of processing parameters in large and small scale beef processing plants and their impact on Escherichia coli prevalence. Corsten, Anthony Nicholas Evaluation of several pre-clinical tools for identifying characteristics associated with limb bone fracture in thoroughbred racehorses. Coskun, Esra Language and attribution: Women and identity.

Coulthard, Glen J A descriptive case study: Investigating the implementation of web based, automated grading and tutorial software in a freshman computer literacy course. Cox, Perry L Lightcraft Previzion in distance education. Crespo, Jonah Greenfield Asset allocation in frequency and in 3 spatial dimensions for electronic warfare application. Croft, Marcia M The role of African leafy vegetables in food security. Cruz, Lauren M The effects of light intensity and wavelength on in-water orientation of olive ridley sea turtle hatchlings Lepidochelys olivacea.

Cui, Hongming A case study of barriers to Lean Six Sigma adoption in China's manufacturing industry, from entrepreneurial view point. Cui, Wei Design and application of peptide-based fluorescent biosensors for protein tyrosine kinases. Cui, Yan Interval analysis techniques for field mapping and geolocation. Cui, Yi Studies of rechargeable lithium-sulfur batteries. Daly, Christine Ann Seeking certainty: Are people who are experiencing relational doubt more sensitive to relationship cues? Dangeti, Sanmathi Tangible interaction as an aid for object navigation in 3D modeling. Dang, Zhuoran Experimental study of two phase upward flow in vertical one-inch pipe.

D'Aquila, Theresa M Intestinal cytoplasmic lipid droplets, associated proteins, and the regulation of dietary fat absorption. Darko, Francis Addeah Essays on Malawian agriculture: Micro-level welfare impacts of agricultural productivity; profitability of fertilizer use; and targeting of fertilizer subsidy programs. Datta, Dhrubajyoti Micromechanical fracture model for ductile-brittle bimaterial interfaces. Davis, Beshaun Jamaal Making meaning in the presence of sub-threshold psychotic symptoms: An investigation of metacognitive capacity in psychometric schizotypy. Davis, John Michael The development and evaluation of a lean six sigma advanced manufacturing methodologies course for aeronautical engineering technology curriculum.

Davis, Nathan J Mechanical dispersion of semi-solid binders in high-shear granulation. Davis, Zachary G Essays on university competition. Deatherage, Scott S Facebook engagement on college students' interpersonal and intrapersonal functioning. Degenstein, John C Fast-pyrolysis of biomass related model compounds: A novel approach to experimental study and modeling.

DeKorver, Brittland K Undergraduate students' goals for chemistry laboratory coursework. Deldar, Majid Decentralized multivariable modeling and control of wind turbine with hydrostatic drive-train. DeNardo, Nicholas M Additive manufacturing of carbon fiber-reinforced thermoplastic composites.

Deng, Yexin Two-dimensional electronics and optoelectronics: From materials syntheses to device applications. Dennis, Tana Shea Influence of dietary component manipulation and feed management strategies on growth and rumen development of weaned dairy heifers. Deuser, August Robert Technology, nostalgia, and coming-of-age in Salinger's short fiction. DeVilbiss, Frank T Is metabolism goal-directed? Investigating the validity of modeling biological systems with cybernetic control via omic data. Dey, Sayan Role of river bathymetry in hydraulic modeling of river channels. Dhamankar, Nitin S An immersed boundary method for efficient computational studies of nozzles designed to reduce jet noise.

Dhillon, Jaapna The effects of including almonds in an energy-restricted diet on weight, body composition, visceral adipose tissue, blood pressure and cognitive function. Diao, Kelu Hardware accelerated redundancy elimination in network system. Ding, Zi'ang Lagrangian analysis of vector and tensor fields: Algorithmic foundations and applications in medical imaging and computational fluid dynamics. Doh, Iyll-Joon Development of bacterial colony phenotyping instrument using reflected scatter light. Douilly, Roby 3D dynamic rupture simulation and local tomography studies following the Haiti earthquake.

Dow, Ximeng You Nonlinear optical methods for the analysis of protein nanocrystals and biological tissues. Duarte Gomez, Eileen Enid The use of lux enzymes to investigate the association between irreversible protein denaturation and pressure-mediated inactivation of Escherichia coli. Dubikovsky, Sergey I The association between tolerance for ambiguity and fear of negative evaluation: A study of engineering technology capstone courses. Duffy, Alexandra G Billbug Sphenophorus spp. Du, Juan Complex formation by alpha-lactalbumin and polysaccharide copolymers. Du, Mike Realtime dynamic binary instrumentation.

Dundar, Aysegul Learning from minimally labeled data with accelerated convolutional neural networks. Dunn, Jonathan M Nanoscale phonon thermal conductivity via molecular dynamics. Durkes, Abigail Cox The effects of acidified pepsin on porcine vocal fold tissue: Developing a porcine model of laryngopharyngeal reflux disease. Eadara, Archana Modeling, analysis, and simulation of Muzima fingerprint module based on ordinary and time Petri nets.

Easton, Mckay Whetton Density functional theory calculations complement mass spectrometry experiments in the investigation of biomass fast pyrolysis and ion-molecule reaction mechanisms. Eberline, Andrew Dale Perceptions of and experiences with the Indiana teacher evaluation system in physical education. Edalatnoor, Arash Energy optimization of air handling unit using CO2 data and coil performance.

Edelman, Joshua B Secondary instabilities of hypersonic stationary crossflow waves. Edelman, Peter J Interplanetary mission design with applications to guidance and optimal control of aero-assisted trajectories. Ehlers, Shawn Gregory Rearward visibility issues related to agricultural machinery: Contributing factors, potential solutions. Engerer, Jeffrey D Rapid transient cooling utilizing flash boiling and desorption on graphitic foams.

Erdei, Ronald An examination of the employment of the pair programming methodology as a collaborative instructional scaffold on college student procedural learning and programming self-beliefs. Escalante, Lucio Navarro Discovery and functional analyses of Hessian fly effector-encoding genes. Eun, Joonyup Models and optimization for elective surgery scheduling under uncertainty considering patient health condition. Ewetz, Rickard F Synthesis of clock trees with useful skew based on sparse-graph algorithms. Faheem Ibeacon based proximity and indoor localization system.

Fahmi, Tazin Stress and immunological evaluations of sea urchin treated with four different nutraceuticals. Falk, Courtney Knowledge modeling of phishing emails. Fang, Maureen M Integrating precision machining process capability data into product feature design process.

Fan, Jingxian Taming tail latency for erasure-coded, distributed storage systems. Fan, Xiaozhe An LED-based image sensor with energy harvesting and projection capabilities college of technology. Feng, Chao Biophysical studies of the allosteric regulatory mechanism of Syk tandem SH2 domains interacting with immunoreceptor tyrosine-based activation motifs. Feng, Qingyu Hydrologic and water quality impacts from perennial crop production on marginal lands.

Ferialdy, Arfinandi Graph theoretical analysis of the Dynamic Lines of Collaboration model for disruption response. Fezi, Kyle S Modeling transport phenomena and uncertainty quantification in solidification processes. Frappier, Ann M An investigation of composite failure analyses and damage evolution in finite element models.

Fu, Jiahong Uncertainty quantification on industrial high pressure die casting process. Fu, Rong Early parental loss, socioeconomic stressors, and health in later life: Evidence for gender disparity. Gabet, Ryan M A comparative forensic analysis of privacy enhanced web browsers. Gaeta, Christopher M Quit playing with your watch: Perceptions of smartwatch use.

Gaffar, Md Explicit and unconditionally stable finite difference time domain methods for general electromagnetic analysis. Gaitonde, Aalok Jaisheela Uday Thermal transport in lithium ion batteries: An experimental investigation of interfaces and granular materials. Gall, Aaron R Magnesium regulates transcription of the mgtA magnesium transporter gene in Salmonella enterica serovar typhimurium via prolyl-bond formation during translation of the mgtL leader ORF. Ganatra, Yash Yogesh Passive thermal management using phase change materials. Gangaraju, SricharanLochan Machine-to-machine communication for automatic retrieval of scientific data.

Ganguly, Samiran Spintronic device modeling and evaluation using modular approach to spintronics. Gao, Jiejun Nanoparticle toxicity and molecular mechanisms in fish: A case study with silver nanoparticles. Gao, Mengqi Toner usage prediction. Gardner, Nathan W Investigation of an energetic coupling between ligand binding and protein folding. Garrity, Jordan M Design and analysis of a high performance valve.

Geesey, Bryce A Utilizing tunable signal interference control topologies with electromechanical resonators. Ge, Jiaqi Sequential pattern mining with uncertain data. Gentry, Patrick L A new reality: Funding formula changes and property tax caps and their effects on the role of the school superintendent in the state of Indiana. Gettings, Patricia E Understanding the communicative processes of baby boomer women adjusting to retirement: Connecting micro and macro discourses.

Ge, Yifan Investigating spatial distribution and dynamics of membrane proteins in polymer-tethered lipid bilayer systems using single molecule-sensitive imaging techniques. Ghahari, Seyedali The effect of ZnO nanoparticles on thermoelectric behavior and fresh properties of cement paste.

Ghosh, Arnab Jyoti Analytical investigation of fretting wear with special emphasis on stress based models. Gilland, Kaitlyn Elizabeth Short-term effects of a Western diet on the number of brainderived neurotrophic factor immunoreactive neurons in the hypothalamic arcuate, ventromedial and paraventricular nuclei. Glas, Zoe Elizabeth Mitigating conflict: A human dimensions analysis of mesopredators and their management. Glavin, Nicholas Robert Ultra-thin boron nitride films by pulsed laser deposition: Plasma diagnostics, synthesis, and device transport.

Goblet, Valentine Pascale Phase of flight identification in general aviation operations. Lucian Soca. Gokhale, Vaibhav V Design of a helmet with an advanced layered composite for energy dissipation using a multi-material compliant mechanism synthesis. Gomes, Joan Implementation of i-vector algorithm in speech emotion recognition by using two different classifiers: Gaussian mixture model and support vector machine.

Goodcase, Eric T The role of attachment insecurity in preferred communication modality and relationship satisfaction of romantic relationships initiated online. Gradzewicz, Audrey D How small the apocalypse. Green, Colleen Warwick Bad girls in corsets: Women and the transgressive body in the nineteenth century.

Greene, Frederick V The path towards clear and convincing digital privacy rights. Griffin-Oliver, Courtney Janai Set and element-level compatibility of spatial and location-word stimuli paired to eye-movement, vocal, and keypress response modalities. Groen, Jessica A We'll find the time: Performing traumatic hope through fictions of child maltreatment.

Guidry, Brett W Finding the ghost with the machine: Breaking through the assessment center validity ceiling by exploring decisional processes using new sources of behavioral data within virtual assessments. Guo, Tian Effect of bioenergy crops and fast growing trees on hydrology and water quality in the Little Vermilion River Watershed. Guo, Tianqi The effect of confinement on the development of an axisymmetric wall jet in confined jet impingement. Guo, Xingye Thermomechanical properties of novel lanthanum zirconate based thermal barrier coatings - an integrated experimental and modeling study.

Gupta, Ravi Digital signal processors as HPC accelerator and performance tuning via static analysis and machine learning. Gupta, Rohinish Modelling and control of a parallel through-the-road plug-in hybrid vehicle. Gurule, Kaitlyn An analysis of digital forensic units. Guzzetti, Davide Coupled orbit-attitude mission design in the circular restricted three-body problem.

Question: What Would Be a Good Topic for a Masters Thesis in IT?

Haderlie, Jacob C Modeling methods for merging computational and experimental aerodynamic pressure data. Halimi, Ghulam Hazrat Can Afghanistan achieve self-sufficiency in wheat? Limitations due to market integration. Halimi, Ghulam Hazrat Trade and agriculture policy options to improve the wheat subsector in Afghanistan. Hall, Derrick R. Hammond, Max A The influence of collagen crosslinking and treadmill exercise on the mechanics, composition, and morphology of bone at multiple length scales. Han, Arum How training set and prior knowledge affect preschoolers' perception of quantity and early number learning.

Han, Chang Wan Characterization of heterogeneous catalysts using advanced transmission electron microscopy techniques. Haney, Alison M A matter of faith: The role of religion, doubt, and personality in emerging adult mental health. Han, Jaemin Multi-session Network Coding characterization using new linear coding frameworks. Haria, Hiral Jayantilal A novel mode-switching hydraulic hybrid for an on-highway vehicle: A study of architecture and control.

Harris, Mary Beth Women writers and the genealogy of the gentleman: masculinity, authority, and male characters in eighteenth-century English novels by women. Hassan, Khaled MD. Hawkins, Elizabeth Marie Organizing historical agricultural data and identifying data integrity zones to assess agricultural data quality.

Hay, Martha E Design of nitroxide-based radical polymer materials for electronic applications. Hayrapetian, Allenoush Analyzing and evaluating security features in software requirements. Hazlitt, Robert A Synthesis of a malvidinglucoside derivative with a difluoromethylene linkage. Heijnen, Michel J. H Failures in adaptive locomotion in healthy young adults. Heneghan, Joseph M The biology and management of waterhemp in Indiana. Hengge, Neal N Enzymatic liquefaction of untreated corn stover.

Herrera Perez, Ruth Marisol Influence of the 3D microenvironment on glioblastoma migration and drug response. He, Zijian Service-level based response by assignment and order processing for warehouse automation. Hickle, Mark D Synthesis, design, and fabrication techniques for reconfigurable microwave and millimeter-wave filters. Hinh, Robert Tool comparison of semantic parsers. Hinkel, Irina A What is contemporary art? Hjortland, Nicole M Defining the regulatory determinants in substrate catalysis by biochemical, biophysical, and kinetic studies for the development of specific small-molecule inhibitors of ubiquitin specific proteases 7 and Hodde, Whitney The effect of climate change on the economics of conservation tillage: A study based on field experiments in Indiana.

Hodson, Stephen L Carbon nanotube thermal interfaces and related applications. Hoggatt, Will Development of a fluidic mixing nozzle for 3D bioprinting. Holgate, Horane A Development and initial validation of a culturally responsive classroom climate scale. Hollandbeck, Gaelle Florence Effect of volunteer corn density on deoxynivalenol production by Fusarium graminearum in hybrid corn. Hollingshead, Nicole A Examining the influence of Hispanic ethnicity and ethnic bias on medical students' pain decisions.

Holzer, Corey T The application of natural language processing to open source intelligence for ontology development in the advanced persistent threat domain. Hoogewind, Kimberly A Climate change and hazardous convective weather in the United States: Insights from high-resolution dynamical downscaling. Houston, Saori M A longitudinal study of the development of fluency of novice Japanese learners: Analysis using objective measures.