Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Boundary Behavior Of Laplace Transforms, Timothy Ferguson May 2006

Boundary Behavior Of Laplace Transforms, Timothy Ferguson

Honors Theses

In this thesis, we examine the boundary behavior of Laplace transforms (as analytic functions on the right and left half planes) of certain bounded functions. The types of bounded functions we consider are Fourier transforms of measures and almost periodic functions.


Database Creation And Implementation Using Open Source Software, Shelby Patru Apr 2006

Database Creation And Implementation Using Open Source Software, Shelby Patru

Honors Theses

This project is designed to investigate the use of open source software and utilize this software to create a database for GNP Acoustical. This honors thesis will focus on the history of open source software, the pros and cons of using this software, a brief look at open source vs. proprietary software, the open source maturity model and the specifics of major software packages in the open source field that could be used to complete this project. Open source software was chosen as the subject for this project because of its increasing popularity among worldwide corporations.

This project was going …


On Conway's Generalization Of The 3x + 1 Problem, Robin M. Givens Apr 2006

On Conway's Generalization Of The 3x + 1 Problem, Robin M. Givens

Honors Theses

This thesis considers a variation of the 3x+1, or Collatz, Problem involving a function we call the Conway function. The Conway function is defined by letting C3(n)=2k for n=3k and C3(n)=4k±1 for n=3k±1, where n is an integer. The iterates of this function generate a few 'short' cycles, but the s' tructural dynamics are otherwise unknown. We investigate properties of the Conway function and other related functions. We also discuss the possibility of using the Conway function to generate keys for cryptographic use based on a fast, efficient binary implemenation of the function. Questions related to the conjectured tree-like structure …


Determining The Level Of Network Security Awareness Of Utc Students Living On Campus, Alma Cemerlic Mar 2006

Determining The Level Of Network Security Awareness Of Utc Students Living On Campus, Alma Cemerlic

Honors Theses

While information technology divisions in various schools often conduct surveys on general computer use, almost no studies have been done that directly targeted the level of Internet security awareness among college students. The National Cyber Security Alliance (NCSA), a not-for-profit, public-private partnership focused on increasing online security awareness, in collaboration with the Government and the Internet industry, organized a number of different projects designed to promote "safe online practices" among college students. However, since research has not been done to investigate the relationship between students' demographics and their Internet security awareness, it is not possible to tell how effective these …


Position Tracking And Motion Prediction Using Fuzzy Logic, Patrick Rodjito Jan 2006

Position Tracking And Motion Prediction Using Fuzzy Logic, Patrick Rodjito

Honors Theses

Unlike with traditional, computationally expensive algorithms, with Fuzzy Logic (FL) one does not have to own a fast computer or very precise measuring instruments to get good results. At lower costs, FL provides a simple way to arrive at a definite conclusion based upon vague, ambiguous, imprecise, noisy, or missing input information. This is a facet of AI that appears to resemble human intuition in an important way: the ability to make quick and urgent judgment calls, on the spot, without the need to be absolutely certain of the input. The benefit brought by a low-cost solution like FL to …