Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Entire DC Network

An Introduction To Hellmann-Feynman Theory, David Wallace Jan 2005

An Introduction To Hellmann-Feynman Theory, David Wallace

Electronic Theses and Dissertations

The Hellmann-Feynman theorem is presented together with certain allied theorems. The origin of the Hellmann-Feynman theorem in quantum physical chemistry is described. The theorem is stated with proof and with discussion of applicability and reliability. Some adaptations of the theorem to the study of the variation of zeros of special functions and orthogonal polynomials are surveyed. Possible extensions are discussed.


The Scintillation Index In Moderate To Strong Turbulence For The Gaussian Beam Wave Along A Slant Path, Fredrick Eugene Thomas Jan 2005

The Scintillation Index In Moderate To Strong Turbulence For The Gaussian Beam Wave Along A Slant Path, Fredrick Eugene Thomas

Electronic Theses and Dissertations

Scintillation is one of the most common statistics in the literature of mathematical modeling of laser propagation through random media. One approach to estimating scintillation is through the Rytov approximation, which is limited to weak atmospheric turbulence. Recently, an improvement of the Rytov approximation was developed employing a linear filter function technique. This modifies the Rytov approximation and extends the validity into the moderate to strong regime. In this work, an expression governing scintillation of a Gaussian beam along an uplink slant path valid in all regimes of turbulence is presented, as well as results for the limiting cases of …


Decision Theory Classification Of High-Dimensional Vectors Based On Small Samples, David Bradshaw Jan 2005

Decision Theory Classification Of High-Dimensional Vectors Based On Small Samples, David Bradshaw

Electronic Theses and Dissertations

In this paper, we review existing classification techniques and suggest an entirely new procedure for the classification of high-dimensional vectors on the basis of a few training samples. The proposed method is based on the Bayesian paradigm and provides posterior probabilities that a new vector belongs to each of the classes, therefore it adapts naturally to any number of classes. Our classification technique is based on a small vector which is related to the projection of the observation onto the space spanned by the training samples. This is achieved by employing matrix-variate distributions in classification, which is an entirely new …


Application Of Statistical Methods In Risk And Reliability, Astrid Heard Jan 2005

Application Of Statistical Methods In Risk And Reliability, Astrid Heard

Electronic Theses and Dissertations

The dissertation considers construction of confidence intervals for a cumulative distribution function F(z) and its inverse at some fixed points z and u on the basis of an i.i.d. sample where the sample size is relatively small. The sample is modeled as having the flexible Generalized Gamma distribution with all three parameters being unknown. This approach can be viewed as an alternative to nonparametric techniques which do not specify distribution of X and lead to less efficient procedures. The confidence intervals are constructed by objective Bayesian methods and use the Jeffreys noninformative prior. Performance of the resulting confidence intervals is …


Voice Authenticationa Study Of Polynomial Representation Of Speech Signals, John Strange Jan 2005

Voice Authenticationa Study Of Polynomial Representation Of Speech Signals, John Strange

Electronic Theses and Dissertations

A subset of speech recognition is the use of speech recognition techniques for voice authentication. Voice authentication is an alternative security application to the other biometric security measures such as the use of fingerprints or iris scans. Voice authentication has advantages over the other biometric measures in that it can be utilized remotely, via a device like a telephone. However, voice authentication has disadvantages in that the authentication system typically requires a large memory and processing time than do fingerprint or iris scanning systems. Also, voice authentication research has yet to provide an authentication system as reliable as the other …


Utilization Of Total Mass As A Control In Diffusion Processes, Mohamed Salman Jan 2005

Utilization Of Total Mass As A Control In Diffusion Processes, Mohamed Salman

Electronic Theses and Dissertations

As motivation for the mathematical problems considered in this work, consider a chamber in the form of a long linear transparent tube. We allow for the introduction or removal of material in a gaseous state at the ends of the tube. The material diffuses throughout the tube with or without reaction with other materials. By illuminating the tube on one side with a light source with a frequency range spanning the absorption range for the material and collecting the residual light that passes through the tube with photo-reception equipment, we can obtain a measurement of the total mass of material …


Phase Synchronization In Three-Dimensional Lattices And Globally Coupled Populations Of Nonidentical Rossler Oscillators, Limin Qi Jan 2005

Phase Synchronization In Three-Dimensional Lattices And Globally Coupled Populations Of Nonidentical Rossler Oscillators, Limin Qi

Electronic Theses and Dissertations

A study on phase synchronization in large populations of nonlinear dynamical systems is presented in this thesis. Using the well-known Rossler system as a prototypical model, phase synchronization in one oscillator with periodic external forcing and in two-coupled nonidentical oscillators was explored at first. The study was further extended to consider three-dimensional lattices and globally coupled populations of nonidentical oscillators, in which the mathematical formulation that represents phase synchronization in the generalized N-coupled Rossler system was derived and several computer programs that perform numerical simulations were developed. The results show the effects of coupling dimension, coupling strength, population size, and …