Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 5 of 5
Full-Text Articles in Physical Sciences and Mathematics
Boundary Behavior Of Laplace Transforms, Timothy Ferguson
Boundary Behavior Of Laplace Transforms, Timothy Ferguson
Honors Theses
In this thesis, we examine the boundary behavior of Laplace transforms (as analytic functions on the right and left half planes) of certain bounded functions. The types of bounded functions we consider are Fourier transforms of measures and almost periodic functions.
Database Creation And Implementation Using Open Source Software, Shelby Patru
Database Creation And Implementation Using Open Source Software, Shelby Patru
Honors Theses
This project is designed to investigate the use of open source software and utilize this software to create a database for GNP Acoustical. This honors thesis will focus on the history of open source software, the pros and cons of using this software, a brief look at open source vs. proprietary software, the open source maturity model and the specifics of major software packages in the open source field that could be used to complete this project. Open source software was chosen as the subject for this project because of its increasing popularity among worldwide corporations.
This project was going …
On Conway's Generalization Of The 3x + 1 Problem, Robin M. Givens
On Conway's Generalization Of The 3x + 1 Problem, Robin M. Givens
Honors Theses
This thesis considers a variation of the 3x+1, or Collatz, Problem involving a function we call the Conway function. The Conway function is defined by letting C3(n)=2k for n=3k and C3(n)=4k±1 for n=3k±1, where n is an integer. The iterates of this function generate a few 'short' cycles, but the s' tructural dynamics are otherwise unknown. We investigate properties of the Conway function and other related functions. We also discuss the possibility of using the Conway function to generate keys for cryptographic use based on a fast, efficient binary implemenation of the function. Questions related to the conjectured tree-like structure …
Determining The Level Of Network Security Awareness Of Utc Students Living On Campus, Alma Cemerlic
Determining The Level Of Network Security Awareness Of Utc Students Living On Campus, Alma Cemerlic
Honors Theses
While information technology divisions in various schools often conduct surveys on general computer use, almost no studies have been done that directly targeted the level of Internet security awareness among college students. The National Cyber Security Alliance (NCSA), a not-for-profit, public-private partnership focused on increasing online security awareness, in collaboration with the Government and the Internet industry, organized a number of different projects designed to promote "safe online practices" among college students. However, since research has not been done to investigate the relationship between students' demographics and their Internet security awareness, it is not possible to tell how effective these …
Position Tracking And Motion Prediction Using Fuzzy Logic, Patrick Rodjito
Position Tracking And Motion Prediction Using Fuzzy Logic, Patrick Rodjito
Honors Theses
Unlike with traditional, computationally expensive algorithms, with Fuzzy Logic (FL) one does not have to own a fast computer or very precise measuring instruments to get good results. At lower costs, FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. This is a facet of AI that appears to resemble human intuition in an important way: the ability to make quick and urgent judgment calls, on the spot, without the need to be absolutely certain of the input. The benefit brought by a low-cost solution like FL to …