Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

A Computational Investigation Of Wood Selection For Acoustic Guitar, Jonah Osterhus May 2024

A Computational Investigation Of Wood Selection For Acoustic Guitar, Jonah Osterhus

Senior Honors Theses

The acoustic guitar is a stringed instrument, often made of wood, that transduces vibrational energy of steel strings into coupled vibrations of the wood and acoustic pressure waves in the air. Variations in wood selection and instrument geometry have been shown to affect the timbre of the acoustic guitar. Computational methods were utilized to investigate the impact of material properties on acoustic performance. Sitka spruce was deemed the most suitable wood for guitar soundboards due to its acoustic characteristics, strength, and uniform aesthetic. Mahogany was deemed to be the best wood for the back and sides of the guitar body …


Effect On Focusing Fields By Ferromagnetic Cell Cores In Linear Induction Accelerators, Cooper Guillaume May 2023

Effect On Focusing Fields By Ferromagnetic Cell Cores In Linear Induction Accelerators, Cooper Guillaume

Senior Honors Theses

In the Los Alamos National Laboratories DARHT facility, there are two perpendicular linear induction accelerators, LIAs. The LIAs’ solenoids produce magnetic fields which focus the electron beam. Simultaneously, the accelerating pulse creates a magnetic field. These two field intensities act upon a ferromagnetic material in the cells to enhance magnetic flux density. Due to the nonlinearity of the material, this flux density will reach a saturation point. In turn, the magnetic field intensity of the axial solenoidal magnetic field will be affected and slightly altered. The width of the electron beam will increase, causing a decrease in effectiveness. Through simulation, …


An Exploration Of The Application Of Desalination In Disaster Relief, Emma Sager May 2023

An Exploration Of The Application Of Desalination In Disaster Relief, Emma Sager

Senior Honors Theses

This paper aims to explore the application of small-scale desalination systems to provide clean water in the wake of marine natural disasters. A lack of clean water is a devastating impact of many natural disasters. Desalination technologies, both thermal and membrane, show potential for being scaled down and self-powered by renewable energy. Desalination can transform ocean water and contaminated drinking water with a high salt content into drinkable, usable water. While these techniques are not perfected, and the solution to a need for clean water is multifaceted, desalination shows potential. Through further research and ever-advancing technology, small-scale desalination could develop …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


The Traveling Salesman Problem: An Analysis And Comparison Of Metaheuristics And Algorithms, Mason Helmick Apr 2022

The Traveling Salesman Problem: An Analysis And Comparison Of Metaheuristics And Algorithms, Mason Helmick

Senior Honors Theses

One of the most investigated topics in operations research is the Traveling Salesman Problem (TSP) and the algorithms that can be used to solve it. Despite its relatively simple formulation, its computational difficulty keeps it and potential solution methods at the forefront of current research. This paper defines and analyzes numerous proposed solutions to the TSP in order to facilitate understanding of the problem. Additionally, the efficiencies of different heuristics are studied and compared to the aforementioned algorithms’ accuracy, as a quick algorithm is often formulated at the expense of an exact solution.


Biomedical Applications And Syntheses Of Selected Anthraquinone Dyes, Richard Sirard Apr 2021

Biomedical Applications And Syntheses Of Selected Anthraquinone Dyes, Richard Sirard

Senior Honors Theses

Anthraquinones are aromatic organic compounds that have multiple applications in the biomedical field. Some anthraquinone-based compounds are used as fluorophores to contrast cell nuclei while others act as chemotherapeutic agents. However, there are not many fluorescent anthraquinone cell stains currently available. In this study, commercially available anthraquinone dyes, in addition to other dye families and compounds, were reviewed for their unique properties, advantages, and drawbacks. The development and characterization of three novel anthraquinone fluorophores revealed promising photophysical characteristics, like large Stokes shifts. One of the compounds, RBS3, was chosen for fixed and live cell staining and exhibited desirable biomedical properties. …


Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell Apr 2015

Simple Secrecy: Analog Stream Cipher For Secure Voice Communication, John M. Campbell

Senior Honors Theses

Voice signals are inherently analog, and some voice communication systems still utilize analog signals. Existing analog cryptographic methods do not satisfactorily provide cryptosecurity for communication systems due to several limitations. This paper proposes a novel means of provided cryptosecurity for analog signals without digitization; thereby avoiding the latency which results from ADC/DAC conversions. This method utilizes the principles of the digital stream cipher, generating instead a continuous pseudorandom analog key stream signal which is transformed with the original analog signal to create an encrypted ciphertext signal which is statistically independent of the original signal and the key stream signal. The …