Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The College of Wooster (11)
- Louisiana State University (6)
- California State University, San Bernardino (3)
- University of Tennessee, Knoxville (3)
- Central Washington University (2)
-
- Dakota State University (2)
- The University of Akron (2)
- Utah State University (2)
- Xavier University of Louisiana (2)
- Air Force Institute of Technology (1)
- Bowling Green State University (1)
- Claremont Colleges (1)
- Louisiana Tech University (1)
- Portland State University (1)
- Southeastern University (1)
- The University of Southern Mississippi (1)
- University of Mississippi (1)
- University of Nevada, Las Vegas (1)
- University of New Hampshire (1)
- University of Texas Rio Grande Valley (1)
- Ursinus College (1)
- Virginia Commonwealth University (1)
- Publication Year
- Publication
-
- Senior Independent Study Theses (11)
- LSU Historical Dissertations and Theses (4)
- Doctoral Dissertations (3)
- Electronic Theses, Projects, and Dissertations (3)
- All Master's Theses (2)
-
- Electronic Thesis and Dissertation (2)
- LSU Doctoral Dissertations (2)
- Masters Theses & Doctoral Dissertations (2)
- Theses and Dissertations (2)
- Williams Honors College, Honors Research Projects (2)
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- All Graduate Theses and Dissertations, Spring 1920 to Summer 2023 (1)
- Chancellor’s Honors Program Projects (1)
- Dissertations and Theses (1)
- Honors Projects (1)
- Honors Theses (1)
- Honors Theses and Capstones (1)
- Master's Theses (1)
- Mathematics Honors Papers (1)
- Scripps Senior Theses (1)
- Selected Honors Theses (1)
- Theses and Dissertations - UTB/UTPA (1)
- UNLV Theses, Dissertations, Professional Papers, and Capstones (1)
Articles 1 - 30 of 46
Full-Text Articles in Entire DC Network
Mathematics Behind Machine Learning, Rim Hammoud
Mathematics Behind Machine Learning, Rim Hammoud
Electronic Theses, Projects, and Dissertations
Artificial intelligence (AI) is a broad field of study that involves developing intelligent
machines that can perform tasks that typically require human intelligence. Machine
learning (ML) is often used as a tool to help create AI systems. The goal of ML is
to create models that can learn and improve to make predictions or decisions based on given data. The goal of this thesis is to build a clear and rigorous exposition of the mathematical underpinnings of support vector machines (SVM), a popular platform used in ML. As we will explore later on in the thesis, SVM can be implemented …
Imperfect Immunity And The Stability Of A Modified Kermack-Mckendrick Model, Kaylee Sims
Imperfect Immunity And The Stability Of A Modified Kermack-Mckendrick Model, Kaylee Sims
Honors Theses
The classic Kermack-McKendrick model of mathematical epidemiology suggests that a population is only in equilibrium when there is no disease present. In the modern era, we have several cyclic infectious diseases that show no signs of eradication, despite global health measures. In this thesis, we introduce a coefficient of waning immunity in order to produce a modified Kermack-McKendrick model and analyze whether the model yields system stability with a certain amount of infection present. Ultimately, the model is incongruent with real-world case data, with its most glaring failure being exponential dampening of the height of each disease case peak due …
Positive Solutions To Semilinear Elliptic Equations With Logistic-Type Nonlinearities And Harvesting In Exterior Domains, Eric Jameson
Positive Solutions To Semilinear Elliptic Equations With Logistic-Type Nonlinearities And Harvesting In Exterior Domains, Eric Jameson
UNLV Theses, Dissertations, Professional Papers, and Capstones
Existing results provide the existence of positive solutions to a class of semilinear elliptic PDEs with logistic-type nonlinearities and harvesting terms both in RN and in bounded domains U ⊂ RN with N ≥ 3, when the carrying capacity of the environment is not constant. We consider these same equations in the exterior domain Ω, defined as the complement of the closed unit ball in RN , N ≥ 3, now with a Dirichlet boundary condition. We first show that the existing techniques forsolving these equations in the whole space RN can be applied to the exterior domain with some …
Numerical Methods For Stochastic Stokes And Navier-Stokes Equations, Liet Vo
Numerical Methods For Stochastic Stokes And Navier-Stokes Equations, Liet Vo
Doctoral Dissertations
This dissertation consists of three main parts with each part focusing on numerical approximations of the stochastic Stokes and Navier-Stokes equations.
Part One concerns the mixed finite element methods and Chorin projection methods for solving the stochastic Stokes equations with general multiplicative noise. We propose a modified mixed finite element method for solving the Stokes equations and show that the numerical solutions converge optimally to the PDE solutions. The convergence is under energy norms (strong convergence) for the velocity and in a time-averaged norm (weak convergence) for the pressure. In addition, after establishing the error estimates in second moment, high …
Mathematical Modeling Suggests Cooperation Of Plant-Infecting Viruses, Joshua Miller, Vitaly V. Ganusov, Tessa Burch-Smith
Mathematical Modeling Suggests Cooperation Of Plant-Infecting Viruses, Joshua Miller, Vitaly V. Ganusov, Tessa Burch-Smith
Chancellor’s Honors Program Projects
No abstract provided.
Stroke Clustering And Fitting In Vector Art, Khandokar Shakib
Stroke Clustering And Fitting In Vector Art, Khandokar Shakib
Senior Independent Study Theses
Vectorization of art involves turning free-hand drawings into vector graphics that can be further scaled and manipulated. In this paper, we explore the concept of vectorization of line drawings and study multiple approaches that attempt to achieve this in the most accurate way possible. We utilize a software called StrokeStrip to discuss the different mathematics behind the parameterization and fitting involved in the drawings.
On Implementing And Testing The Rsa Algorithm, Kien Trung Le
On Implementing And Testing The Rsa Algorithm, Kien Trung Le
Senior Independent Study Theses
In this work, we give a comprehensive introduction to the RSA cryptosystem, implement it in Java, and compare it empirically to three other RSA implementations. We start by giving an overview of the field of cryptography, from its primitives to the composite constructs used in the field. Then, the paper presents a basic version of the RSA algorithm. With this information in mind, we discuss several problems with this basic conception of RSA, including its speed and some potential attacks that have been attempted. Then, we discuss possible improvements that can make RSA runs faster and more secure. On the …
Error Propagation And Algorithmic Design Of Contour Integral Eigensolvers With Applications To Fiber Optics, Benjamin Quanah Parker
Error Propagation And Algorithmic Design Of Contour Integral Eigensolvers With Applications To Fiber Optics, Benjamin Quanah Parker
Dissertations and Theses
In this work, the finite element method and the FEAST eigensolver are used to explore applications in fiber optics. The present interest is in computing eigenfunctions u and propagation constants β satisfing [sic] the Helmholtz equation Δu + k2n2u = β2u. Here, k is the freespace wavenumber and n is a spatially varying coefficient function representing the refractive index of the underlying medium. Such a problem arises when attempting to compute confinement losses in optical fibers that guide laser light. In practice, this requires the computation of functions u referred to as …
Cross-Model Parameter Estimation In Epidemiology, Julia R. Fitzgibbons
Cross-Model Parameter Estimation In Epidemiology, Julia R. Fitzgibbons
Honors Theses and Capstones
No abstract provided.
Sum Of Cubes Of The First N Integers, Obiamaka L. Agu
Sum Of Cubes Of The First N Integers, Obiamaka L. Agu
Electronic Theses, Projects, and Dissertations
In Calculus we learned that Sum^{n}_{k=1} k = [n(n+1)]/2 , that Sum^{n}_{k=1} k^2 = [n(n+1)(2n+1)]/6 , and that Sum^{n}_{k=1} k^{3} = (n(n+1)/2)^{2}. These formulas are useful when solving for the area below quadratic or cubic function over an interval [a, b]. This tedious process, solving for areas under a quadratic or a cubic, served as motivation for the introduction of Riemman integrals. For the overzealous math student, these steps were replaced by a simpler method of evaluating antiderivatives at the endpoints a and b. From my recollection, a former instructor informed us to do the value of memorizing these formulas. …
Modeling Community Resource Management: An Agent-Based Approach, Maya M. Lapp
Modeling Community Resource Management: An Agent-Based Approach, Maya M. Lapp
Senior Independent Study Theses
As the human population continues increasing rapidly and climate change accelerates, resource depletion is becoming an international problem. Community-based natural resource management (CBNRM) has been suggested as a method to conserve resources while simultaneously empowering traditionally marginalized communities. Because classical equation-based modeling methods fail to capture the complexity of CBNRM, Agent-Based Modeling (ABM) has emerged as a primary method of modeling these systems. In this investigation, we conduct a sensitivity analysis and thorough evaluation of an existing ABM of community forest management. We then modify the original model by providing a new enforcement mechanism that improves the validity of both …
Practical Chaos: Using Dynamical Systems To Encrypt Audio And Visual Data, Julia Ruiter
Practical Chaos: Using Dynamical Systems To Encrypt Audio And Visual Data, Julia Ruiter
Scripps Senior Theses
Although dynamical systems have a multitude of classical uses in physics and applied mathematics, new research in theoretical computer science shows that dynamical systems can also be used as a highly secure method of encrypting data. Properties of Lorenz and similar systems of equations yield chaotic outputs that are good at masking the underlying data both physically and mathematically. This paper aims to show how Lorenz systems may be used to encrypt text and image data, as well as provide a framework for how physical mechanisms may be built using these properties to transmit encrypted wave signals.
The Pope's Rhinoceros And Quantum Mechanics, Michael Gulas
The Pope's Rhinoceros And Quantum Mechanics, Michael Gulas
Honors Projects
In this project, I unravel various mathematical milestones and relate them to the human experience. I show and explain the solution to the Tautochrone, a popular variation on the Brachistochrone, which details a major battle between Leibniz and Newton for the title of inventor of Calculus. One way to solve the Tautochrone is using Laplace Transforms; in this project I expound on common functions that get transformed and how those can be used to solve the Tautochrone. I then connect the solution of the Tautochrone to clock making. From this understanding of clocks, I examine mankind’s understanding of time and …
Simulations And Queueing Theory: The Effects Of Randomly Bypassing Security, Emily Ortmann
Simulations And Queueing Theory: The Effects Of Randomly Bypassing Security, Emily Ortmann
Masters Theses & Doctoral Dissertations
We discuss queueing theory in the setting of airport security and customs. By developing queueing simulations based on mathematical models, we explore a variety of questions related to optimal queue design with respect to efficiency, feasibility, priority, and other prescribed/variable constraints.
Simulations And Queueing Theory: The Effects Of Priority And Vip Thresholds, Laura Schuck
Simulations And Queueing Theory: The Effects Of Priority And Vip Thresholds, Laura Schuck
Masters Theses & Doctoral Dissertations
Everyone has experienced waiting in lines, whether it is at the airport, the grocery store, or somewhere in-between. By developing queueing simulations based on mathematical models of airport security and customs, we explore a variety of questions related to optimal queue design with respect to efficiency, feasibility, priority, and other prescribed/variable constraints.
A Mathematical Analysis Of The Game Of Chess, John C. White
A Mathematical Analysis Of The Game Of Chess, John C. White
Selected Honors Theses
This paper analyzes chess through the lens of mathematics. Chess is a complex yet easy to understand game. Can mathematics be used to perfect a player’s skills? The work of Ernst Zermelo shows that one player should be able to force a win or force a draw. The work of Shannon and Hardy demonstrates the complexities of the game. Combinatorics, probability, and some chess puzzles are used to better understand the game. A computer program is used to test a hypothesis regarding chess strategy. Through the use of this program, we see that it is detrimental to be the first …
Modeling Multimodal Failure Effects Of Complex Systems Using Polyweibull Distribution, Daniel A. Timme
Modeling Multimodal Failure Effects Of Complex Systems Using Polyweibull Distribution, Daniel A. Timme
Theses and Dissertations
The Department of Defense (DoD) enlists multiple complex systems across each of their departments. Between the aging systems going through an overhaul and emerging new systems, quality assurance to complete the mission and secure the nation‘s objectives is an absolute necessity. The U.S. Air Force‘s increased interest in Remotely Piloted Aircraft (RPA) and the Space Warfighting domain are current examples of complex systems that must maintain high reliability and sustainability in order to complete missions moving forward. DoD systems continue to grow in complexity with an increasing number of components and parts in more complex arrangements. Bathtub-shaped hazard functions arise …
Sports Analytics With Computer Vision, Colby T. Jeffries
Sports Analytics With Computer Vision, Colby T. Jeffries
Senior Independent Study Theses
Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …
Inclusion Of Blocking Power For A Complete Voting Power Analysis In The Imf, Shiwani Varal
Inclusion Of Blocking Power For A Complete Voting Power Analysis In The Imf, Shiwani Varal
Senior Independent Study Theses
The International Monetary Fund (IMF) calculates the voting power of a country by dividing the total of one member's votes by the total of all members' votes. This method of calculating the power of a state judges power as voting weight. However, voting weights are the total number of votes a country has in an institution, while voting power is the influence a country has on a policy decision. A better approach to calculate this voting power within an institution is by using voting power indices. However, literature only calculates the winning power, while voting power is defined as the …
Cluster Algebras And Maximal Green Sequences For Closed Surfaces, Eric Bucher
Cluster Algebras And Maximal Green Sequences For Closed Surfaces, Eric Bucher
LSU Doctoral Dissertations
Given a marked surface (S,M) we can add arcs to the surface to create a triangulation, T, of that surface. For each triangulation, T, we can associate a cluster algebra. In this paper we will consider orientable surfaces of genus n with two interior marked points and no boundary component. We will construct a specific triangulation of this surface which yields a quiver. Then in the sense of work by Keller we will produce a maximal green sequence for this quiver. Since all finite mutation type cluster algebras can be associated to a surface, with some rare exceptions, this work …
Using Mathematical Research Methods To Solve A Problem In Music Theory Instruction, Specifically, The Teaching Of Secondary Dominant Chords, Angela Ulrich
Williams Honors College, Honors Research Projects
The mathematical method for research is used to find a solution to a problem in music theory: understanding and identifying secondary dominant chords. By reviewing and assessing the teaching methods of university professors and theory textbooks, and comparing those findings with student reviews, a new method for teaching the concept is developed. The proposed system incorporates aural, visual, and kinetic exercises to serve every learner. The literature review and sample unit plan are followed by a possible procedure for testing the effectiveness of the new method.
Subgroups Of Finite Wreath Product Groups For P=3, Jessica L. Gonda
Subgroups Of Finite Wreath Product Groups For P=3, Jessica L. Gonda
Williams Honors College, Honors Research Projects
Let M be the additive abelian group of 3-by-3 matrices whose entries are from the ring of integers modulo 9. The problem of determining all the normal subgroups of the regular wreath product group P=Z9≀(Z3 × Z3) that are contained in its base subgroup is equivalent to the problem of determining the subgroups of M that are invariant under two particular endomorphisms of M. In this thesis we give a partial solution to the latter problem by implementing a systematic approach using concepts from group theory and linear algebra.
Optimal Placement Of Family Planning Centers, Kiera Dobbs
Optimal Placement Of Family Planning Centers, Kiera Dobbs
Senior Independent Study Theses
This project investigates and begins to solve the problem of access to family planning services in the United States. We research and implement methods in Operations Research to optimize the location of publicly funded family planning centers in the United States by minimizing travel distance. The solution begins with a designated number of family planning centers for the country. An apportionment integer programming algorithm is then exercised to allocate centers to all the states based on population, percent of population in poverty, and state square mileage. At the state level, we use apportionment again to distribute centers to counties. At …
Mathematical Modeling And Optimal Control Of Alternative Pest Management For Alfalfa Agroecosystems, Cara Sulyok
Mathematical Modeling And Optimal Control Of Alternative Pest Management For Alfalfa Agroecosystems, Cara Sulyok
Mathematics Honors Papers
This project develops mathematical models and computer simulations for cost-effective and environmentally-safe strategies to minimize plant damage from pests with optimal biodiversity levels. The desired goals are to identify tradeoffs between costs, impacts, and outcomes using the enemies hypothesis and polyculture in farming. A mathematical model including twelve size- and time-dependent parameters was created using a system of non-linear differential equations. It was shown to accurately fit results from open-field experiments and thus predict outcomes for scenarios not covered by these experiments.
The focus is on the application to alfalfa agroecosystems where field experiments and data were conducted and provided …
An Applied Mathematics Approach To Modeling Inflammation: Hematopoietic Bone Marrow Stem Cells, Systemic Estrogen And Wound Healing And Gas Exchange In The Lungs And Body, Racheal L. Cooper
An Applied Mathematics Approach To Modeling Inflammation: Hematopoietic Bone Marrow Stem Cells, Systemic Estrogen And Wound Healing And Gas Exchange In The Lungs And Body, Racheal L. Cooper
Theses and Dissertations
Mathematical models apply to a multitude physiological processes and are used to make predictions and analyze outcomes of these processes. Specifically, in the medical field, a mathematical model uses a set of initial conditions that represents a physiological state as input and a set of parameter values are used to describe the interaction between variables being modeled. These models are used to analyze possible outcomes, and assist physicians in choosing the most appropriate treatment options for a particular situation. We aim to use mathematical modeling to analyze the dynamics of processes involved in the inflammatory process.
First, we create a …
On The Evolution Of Virulence, Thi Nguyen
On The Evolution Of Virulence, Thi Nguyen
Electronic Theses, Projects, and Dissertations
The goal of this thesis is to study the dynamics behind the evolution of virulence. We examine first the underlying mechanics of linear systems of ordinary differential equations by investigating the classification of fixed points in these systems, then applying these techniques to nonlinear systems. We then seek to establish the validity of a system that models the population dynamics of uninfected and infected hosts---first with one parasite strain, then n strains. We define the basic reproductive ratio of a parasite, and study its relationship to the evolution of virulence. Lastly, we investigate the mathematics behind superinfection.
Generalist And Specialist Pollination Syndromes: When Are They Favoured? A Theoretical Approach To Predict The Conditions Under Which A Generalist Or Specialist Pollination Syndrome Is Favoured., Tyler L. Poppenwimer
Generalist And Specialist Pollination Syndromes: When Are They Favoured? A Theoretical Approach To Predict The Conditions Under Which A Generalist Or Specialist Pollination Syndrome Is Favoured., Tyler L. Poppenwimer
Senior Independent Study Theses
No abstract provided.
On Closed Subsets Of Non-Commutative Association Schemes Of Rank 6, Jose Vera
On Closed Subsets Of Non-Commutative Association Schemes Of Rank 6, Jose Vera
Theses and Dissertations - UTB/UTPA
The notion of an association scheme is a generalization of the concept of a group. In fact, the so-called thin association schemes correspond in a well-understood way to groups. In this thesis, we look at the structure of non-commutative association schemes of rank 6. We will show that a non-normal closed subset of a noncommutative association scheme of rank 6, must have rank 2. The so-called Coxeter schemes of rank 6 which we present in Section 4 provide examples of association schemes of rank 6 with non-normal closed subsets of rank 2. It is shown that normal closed subsets of …
Fully Coupled Fluid And Electrodynamic Modeling Of Plasmas: A Two-Fluid Isomorphism And A Strong Conservative Flux-Coupled Finite Volume Framework, Richard Joel Thompson
Fully Coupled Fluid And Electrodynamic Modeling Of Plasmas: A Two-Fluid Isomorphism And A Strong Conservative Flux-Coupled Finite Volume Framework, Richard Joel Thompson
Doctoral Dissertations
Ideal and resistive magnetohydrodynamics (MHD) have long served as the incumbent framework for modeling plasmas of engineering interest. However, new applications, such as hypersonic flight and propulsion, plasma propulsion, plasma instability in engineering devices, charge separation effects and electromagnetic wave interaction effects may demand a higher-fidelity physical model. For these cases, the two-fluid plasma model or its limiting case of a single bulk fluid, which results in a single-fluid coupled system of the Navier-Stokes and Maxwell equations, is necessary and permits a deeper physical study than the MHD framework. At present, major challenges are imposed on solving these physical models …
The Machete Number, David Freund
The Machete Number, David Freund
Senior Independent Study Theses
Knot theory is a branch of topology that deals with the structure and properties of links. Employing a variety of tools, including surfaces, graph theory, and polynomials, we develop and explore classical link invariants. From this foundation, we de fine two novel link invariants, braid height and machete number, and investigate their properties and connection to classical invariants.