Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Physical Sciences and Mathematics

Exploring The Effect Of Different Numbers Of Convolutional Filters And Training Loops On The Performance Of Alphazero, Jared Prince Oct 2018

Exploring The Effect Of Different Numbers Of Convolutional Filters And Training Loops On The Performance Of Alphazero, Jared Prince

Masters Theses & Specialist Projects

In this work, the algorithm used by AlphaZero is adapted for dots and boxes, a two-player game. This algorithm is explored using different numbers of convolutional filters and training loops, in order to better understand the effect these parameters have on the learning of the player. Different board sizes are also tested to compare these parameters in relation to game complexity. AlphaZero originated as a Go player using an algorithm which combines Monte Carlo tree search and convolutional neural networks. This novel approach, integrating a reinforcement learning method previously applied to Go (MCTS) with a supervised learning method (neural networks) …


Monitoring And Evaluating The Influences Of Class V Injection Wells On Urban Karst Hydrology, James Adam Shelley Oct 2018

Monitoring And Evaluating The Influences Of Class V Injection Wells On Urban Karst Hydrology, James Adam Shelley

Masters Theses & Specialist Projects

The response of a karst aquifer to storm events is often faster and more severe than that of a non-karst aquifer. This distinction is often problematic for planners and municipalities, because karst flooding does not typically occur along perennial water courses; thus, traditional flood management strategies are usually ineffective. The City of Bowling Green (CoBG), Kentucky is a representative example of an area plagued by karst flooding. The CoBG, is an urban karst area (UKA), that uses Class V Injection Wells to lessen the severity of flooding. The overall effectiveness, siting, and flooding impact of Injection Wells in UKA’s is …


Molecular Assembly Of Monolayer-Protected Gold Nanoparticles And Their Chemical, Thermal, And Ultrasonic Stabilities, Steven Ray Isaacs Jul 2018

Molecular Assembly Of Monolayer-Protected Gold Nanoparticles And Their Chemical, Thermal, And Ultrasonic Stabilities, Steven Ray Isaacs

Masters Theses & Specialist Projects

Gold monolayer-protected nanoclusters (MPCs) with average diameters of 1-5 nm protected by alkane- and arenethiolates were synthesized. Mixed-monolayer protected nanoparticles (MMPCs) were prepared by functionalizing hexanethiolate-protected MPCs with either 11-mercaptoundecanoic acid (MUA-MMPC), 11-mercaptoundecanol (MUO-MMPC), or 4-aminothiophenol (ATP-MMPC) using ligand place exchange. Presentation of various chemical reagents such as nucleophile, acid, or base and change in physical environment through ultrasonic and thermal irradiation resulted in changes to particles and their physical properties. Thermogravimetric analysis (TGA) was used to measure maximum temperature of the derivated thermogravimetric peaks (Tmax,DTG) as a means of comparing temperature dependence of mass loss. The absorption spectrum within …


Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata, Apr 2018

Application Of Huffman Data Compression Algorithm In Hashing Computation, Lakshmi Narasimha Devulapalli Venkata,

Masters Theses & Specialist Projects

Cryptography is the art of protecting information by encrypting the original message into an unreadable format. A cryptographic hash function is a hash function which takes an arbitrary length of the text message as input and converts that text into a fixed length of encrypted characters which is infeasible to invert. The values returned by the hash function are called as the message digest or simply hash values. Because of its versatility, hash functions are used in many applications such as message authentication, digital signatures, and password hashing [Thomsen and Knudsen, 2005].

The purpose of this study is to apply …


Controllability And Observability Of The Discrete Fractional Linear State-Space Model, Duc M. Nguyen Apr 2018

Controllability And Observability Of The Discrete Fractional Linear State-Space Model, Duc M. Nguyen

Masters Theses & Specialist Projects

This thesis aims to investigate the controllability and observability of the discrete fractional linear time-invariant state-space model. First, we will establish key concepts and properties which are the tools necessary for our task. In the third chapter, we will discuss the discrete state-space model and set up the criteria for these two properties. Then, in the fourth chapter, we will attempt to apply these criteria to the discrete fractional model. The general flow of our objectives is as follows: we start with the first-order linear difference equation, move on to the discrete system, then the fractional difference equation, and finally …