Open Access. Powered by Scholars. Published by Universities.®

Other Applied Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Other Mathematics

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 31 - 60 of 146

Full-Text Articles in Other Applied Mathematics

Realization Of Tensor Product And Of Tensor Factorization Of Rational Functions, Daniel Alpay, Izchak Lewkowicz Apr 2019

Realization Of Tensor Product And Of Tensor Factorization Of Rational Functions, Daniel Alpay, Izchak Lewkowicz

Mathematics, Physics, and Computer Science Faculty Articles and Research

We study the state space realization of a tensor product of a pair of rational functions. At the expense of “inflating” the dimensions, we recover the classical expressions for realization of a regular product of rational functions. Under an additional assumption that the limit at infinity of a given rational function exists and is equal to identity, we introduce an explicit formula for a tensor factorization of this function.


A More Powerful Unconditional Exact Test Of Homogeneity For 2 × C Contingency Table Analysis, Louis Ehwerhemuepha, Heng Sok, Cyril Rakovski Apr 2019

A More Powerful Unconditional Exact Test Of Homogeneity For 2 × C Contingency Table Analysis, Louis Ehwerhemuepha, Heng Sok, Cyril Rakovski

Mathematics, Physics, and Computer Science Faculty Articles and Research

The classical unconditional exact p-value test can be used to compare two multinomial distributions with small samples. This general hypothesis requires parameter estimation under the null which makes the test severely conservative. Similar property has been observed for Fisher's exact test with Barnard and Boschloo providing distinct adjustments that produce more powerful testing approaches. In this study, we develop a novel adjustment for the conservativeness of the unconditional multinomial exact p-value test that produces nominal type I error rate and increased power in comparison to all alternative approaches. We used a large simulation study to empirically estimate the …


Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski Dec 2018

Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Developments In Multivariate Post Quantum Cryptography., Jeremy Robert Vates Aug 2018

Developments In Multivariate Post Quantum Cryptography., Jeremy Robert Vates

Electronic Theses and Dissertations

Ever since Shor's algorithm was introduced in 1994, cryptographers have been working to develop cryptosystems that can resist known quantum computer attacks. This push for quantum attack resistant schemes is known as post quantum cryptography. Specifically, my contributions to post quantum cryptography has been to the family of schemes known as Multivariate Public Key Cryptography (MPKC), which is a very attractive candidate for digital signature standardization in the post quantum collective for a wide variety of applications. In this document I will be providing all necessary background to fully understand MPKC and post quantum cryptography as a whole. Then, I …


Simulating The Electrical Properties Of Random Carbon Nanotube Networks Using A Simple Model Based On Percolation Theory, Roberto Abril Valenzuela Jun 2018

Simulating The Electrical Properties Of Random Carbon Nanotube Networks Using A Simple Model Based On Percolation Theory, Roberto Abril Valenzuela

Physics

Carbon nanotubes (CNTs) have been subject to extensive research towards their possible applications in the world of nanoelectronics. The interest in carbon nanotubes originates from their unique variety of properties useful in nanoelectronic devices. One key feature of carbon nanotubes is that the chiral angle at which they are rolled determines whether the tube is metallic or semiconducting. Of main interest to this project are devices containing a thin film of randomly arranged carbon nanotubes, known as carbon nanotube networks. The presence of semiconducting tubes in a CNT network can lead to a switching effect when the film is electro-statically …


Herglotz Functions Of Several Quaternionic Variables, Khaled Abu-Ghanem, Daniel Alpay, Fabrizio Colombo, Izchak Lewkowicz, Irene Sabadini May 2018

Herglotz Functions Of Several Quaternionic Variables, Khaled Abu-Ghanem, Daniel Alpay, Fabrizio Colombo, Izchak Lewkowicz, Irene Sabadini

Mathematics, Physics, and Computer Science Faculty Articles and Research

We first review realizations of Herglotz functions in the unit ball of CN and provide new insights. Then, we define the corresponding class and prove the extend the results in the case of several quaternionic variables.


Examples Of Solving The Wave Equation In The Hyperbolic Plane, Cooper Ramsey May 2018

Examples Of Solving The Wave Equation In The Hyperbolic Plane, Cooper Ramsey

Senior Honors Theses

The complex numbers have proven themselves immensely useful in physics, mathematics, and engineering. One useful tool of the complex numbers is the method of conformal mapping which is used to solve various problems in physics and engineering that involved Laplace’s equation. Following the work done by Dr. James Cook, the complex numbers are replaced with associative real algebras. This paper focuses on another algebra, the hyperbolic numbers. A solution method like conformal mapping is developed with solutions to the one-dimensional wave equation. Applications of this solution method revolve around engineering and physics problems involving the propagation of waves. To conclude, …


Essentials Of Structural Equation Modeling, Mustafa Emre Civelek Mar 2018

Essentials Of Structural Equation Modeling, Mustafa Emre Civelek

Zea E-Books Collection

Structural Equation Modeling is a statistical method increasingly used in scientific studies in the fields of Social Sciences. It is currently a preferred analysis method, especially in doctoral dissertations and academic researches. However, since many universities do not include this method in the curriculum of undergraduate and graduate courses, students and scholars try to solve the problems they encounter by using various books and internet resources.

This book aims to guide the researcher who wants to use this method in a way that is free from math expressions. It teaches the steps of a research program using structured equality modeling …


Decoding Book Barcode Images, Yizhou Tao Jan 2018

Decoding Book Barcode Images, Yizhou Tao

CMC Senior Theses

This thesis investigated a method of barcode reconstruction to address the recovery of a blurred and convoluted one-dimensional barcode. There are a lot of types of barcodes used today, such as Code 39, Code 93, Code 128, etc. Our algorithm applies to the universal barcode, EAN 13. We extend the methodologies proposed by Iwen et al. (2013) in the journal article "A Symbol-Based Algorithm for Decoding barcodes." The algorithm proposed in the paper requires a signal measured by a laser scanner as an input. The observed signal is modeled as a true signal corrupted by a Gaussian convolution, additional noises, …


Sports Analytics With Computer Vision, Colby T. Jeffries Jan 2018

Sports Analytics With Computer Vision, Colby T. Jeffries

Senior Independent Study Theses

Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …


Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher Jan 2018

Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher

Electronic Theses and Dissertations

Through-out military history, the need to safely and effectively allocate resources to various military operations was a task of extreme importance. Satisfying the needs of multiple consumers by optimally pairing with appropriate suppliers falls into the category of vehicle routing problems (VRP), which has been intensively studied over the years. In general, finding the optimal solution to VRP is known to be NP-hard. The proposed solutions rely on mathematical programming and the size of the problems that can be optimally solved is typically limited. In military settings, balancing the needs of multiple consumers with the current operational environment has always …


Making Models With Bayes, Pilar Olid Dec 2017

Making Models With Bayes, Pilar Olid

Electronic Theses, Projects, and Dissertations

Bayesian statistics is an important approach to modern statistical analyses. It allows us to use our prior knowledge of the unknown parameters to construct a model for our data set. The foundation of Bayesian analysis is Bayes' Rule, which in its proportional form indicates that the posterior is proportional to the prior times the likelihood. We will demonstrate how we can apply Bayesian statistical techniques to fit a linear regression model and a hierarchical linear regression model to a data set. We will show how to apply different distributions to Bayesian analyses and how the use of a prior affects …


Evolution Of Superoscillations For Schrödinger Equation In A Uniform Magnetic Field, Fabrizio Colombo, Jonathan Gantner, Daniele C. Struppa Sep 2017

Evolution Of Superoscillations For Schrödinger Equation In A Uniform Magnetic Field, Fabrizio Colombo, Jonathan Gantner, Daniele C. Struppa

Mathematics, Physics, and Computer Science Faculty Articles and Research

Aharonov-Berry superoscillations are band-limited functions that oscillate faster than their fastest Fourier component. Superoscillations appear in several fields of science and technology, such as Aharonov’s weak measurement in quantum mechanics, in optics, and in signal processing. An important issue is the study of the evolution of superoscillations using the Schrödinger equation when the initial datum is a weak value. Some superoscillatory functions are not square integrable, but they are real analytic functions that can be extended to entire holomorphic functions. This fact leads to the study of the continuity of a class of convolution operators acting on suitable spaces of …


Extending Difference Of Votes Rules On Three Voting Models., Sarah Schulz King Aug 2017

Extending Difference Of Votes Rules On Three Voting Models., Sarah Schulz King

Electronic Theses and Dissertations

In a voting situation where there are only two competing alternatives, simple majority rule outputs the alternatives with the most votes or declares a tie if both alternatives receive the same number of votes. For any non-negative integer k, the difference of votes rule Mk outputs the alternative that beats the competing alternative by more than k votes. Llamazares (2006) gives a characterization of the difference of votes rules in terms of five axioms. In this thesis, we extend Llamazares' result by completely describing the class of voting rules that satisfy only two out of his five axioms. …


Cayley Graphs Of Groups And Their Applications, Anna Tripi Aug 2017

Cayley Graphs Of Groups And Their Applications, Anna Tripi

MSU Graduate Theses

Cayley graphs are graphs associated to a group and a set of generators for that group (there is also an associated directed graph). The purpose of this study was to examine multiple examples of Cayley graphs through group theory, graph theory, and applications. We gave background material on groups and graphs and gave numerous examples of Cayley graphs and digraphs. This helped investigate the conjecture that the Cayley graph of any group (except Z_2) is hamiltonian. We found the conjecture to still be open. We found Cayley graphs and hamiltonian cycles could be applied to campanology (in particular, to the …


C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski Jan 2017

C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski

Wojciech Budzianowski

-


Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski Jan 2017

Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski

Wojciech Budzianowski

No abstract provided.


Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson Jan 2017

Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson

Murray State Theses and Dissertations

We translate the RISK board into a graph which undergoes updates as the game advances. The dissection of the game into a network model in discrete time is a novel approach to examining RISK. A review of the existing statistical findings of skirmishes in RISK is provided. The graphical changes are accompanied by an examination of the statistical properties of RISK. The game is modeled as a discrete time dynamic network graph, with the various features of the game modeled as properties of the network at a given time. As the network is computationally intensive to implement, results are produced …


Triple Non-Negative Matrix Factorization Technique For Sentiment Analysis And Topic Modeling, Alexander A. Waggoner Jan 2017

Triple Non-Negative Matrix Factorization Technique For Sentiment Analysis And Topic Modeling, Alexander A. Waggoner

CMC Senior Theses

Topic modeling refers to the process of algorithmically sorting documents into categories based on some common relationship between the documents. This common relationship between the documents is considered the “topic” of the documents. Sentiment analysis refers to the process of algorithmically sorting a document into a positive or negative category depending whether this document expresses a positive or negative opinion on its respective topic. In this paper, I consider the open problem of document classification into a topic category, as well as a sentiment category. This has a direct application to the retail industry where companies may want to scour …


A Traders Guide To The Predictive Universe- A Model For Predicting Oil Price Targets And Trading On Them, Jimmie Harold Lenz Dec 2016

A Traders Guide To The Predictive Universe- A Model For Predicting Oil Price Targets And Trading On Them, Jimmie Harold Lenz

Doctor of Business Administration Dissertations

At heart every trader loves volatility; this is where return on investment comes from, this is what drives the proverbial “positive alpha.” As a trader, understanding the probabilities related to the volatility of prices is key, however if you could also predict future prices with reliability the world would be your oyster. To this end, I have achieved three goals with this dissertation, to develop a model to predict future short term prices (direction and magnitude), to effectively test this by generating consistent profits utilizing a trading model developed for this purpose, and to write a paper that anyone with …


General Equations For Natural Selection Under Complete Dominance, Kasthuri Kannan, Adriana Heguy Oct 2016

General Equations For Natural Selection Under Complete Dominance, Kasthuri Kannan, Adriana Heguy

Annual Symposium on Biomathematics and Ecology Education and Research

No abstract provided.


The Evolution Of Cryptology, Gwendolyn Rae Souza Jun 2016

The Evolution Of Cryptology, Gwendolyn Rae Souza

Electronic Theses, Projects, and Dissertations

We live in an age when our most private information is becoming exceedingly difficult to keep private. Cryptology allows for the creation of encryptive barriers that protect this information. Though the information is protected, it is not entirely inaccessible. A recipient may be able to access the information by decoding the message. This possible threat has encouraged cryptologists to evolve and complicate their encrypting methods so that future information can remain safe and become more difficult to decode. There are various methods of encryption that demonstrate how cryptology continues to evolve through time. These methods revolve around different areas of …


Population Projection And Habitat Preference Modeling Of The Endangered James Spinymussel (Pleurobema Collina), Marisa Draper May 2016

Population Projection And Habitat Preference Modeling Of The Endangered James Spinymussel (Pleurobema Collina), Marisa Draper

Senior Honors Projects, 2010-2019

The James Spinymussel (Pleurobema collina) is an endangered mussel species at the top of Virginia’s conservation list. The James Spinymussel plays a critical role in the environment by filtering and cleaning stream water while providing shelter and food for macroinvertebrates; however, conservation efforts are complicated by the mussels’ burrowing behavior, camouflage, and complex life cycle. The goals of the research conducted were to estimate detection probabilities that could be used to predict species presence and facilitate field work, and to track individually marked mussels to test for habitat preferences. Using existing literature and mark-recapture field data, these goals were accomplished …


Drawing Numbers And Listening To Patterns, Loren Zo Haynes Apr 2016

Drawing Numbers And Listening To Patterns, Loren Zo Haynes

Honors College Theses

The triangular numbers is a series of number that add the natural numbers. Parabolic shapes emerge when this series is placed on a lattice, or imposed with a limited number of columns that causes the sequence to continue on the next row when it has reached the kth column. We examine these patterns and construct proofs that explain their behavior. We build off of this to see what happens to the patterns when there is not a limited number of columns, and we formulate the graphs as musical patterns on a staff, using each column as a line or space …


Single Valued Neutrosophic Graphs, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea Feb 2016

Single Valued Neutrosophic Graphs, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea

Branch Mathematics and Statistics Faculty and Staff Publications

The notion of single valued neutrosophic sets is a generalization of fuzzy sets, intuitionistic fuzzy sets. We apply the concept of single valued neutrosophic sets, an instance of neutrosophic sets, to graphs. We introduce certain types of single valued neutrosophic graphs (SVNG) and investigate some of their properties with proofs and examples.


Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski Jan 2016

Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski

Wojciech Budzianowski

-


Multiple Problem-Solving Strategies Provide Insight Into Students’ Understanding Of Open-Ended Linear Programming Problems, Marla A. Sole Jan 2016

Multiple Problem-Solving Strategies Provide Insight Into Students’ Understanding Of Open-Ended Linear Programming Problems, Marla A. Sole

Publications and Research

Open-ended questions that can be solved using different strategies help students learn and integrate content, and provide teachers with greater insights into students’ unique capabilities and levels of understanding. This article provides a problem that was modified to allow for multiple approaches. Students tended to employ high-powered, complex, familiar solution strategies rather than simpler, more intuitive strategies, which suggests that students might need more experience working with informal solution methods. During the semester, by incorporating open-ended questions, I gained valuable feedback, was able to better model real-world problems, challenge students with different abilities, and strengthen students’ problem solving skills.


Inżynieria Chemiczna Lab., Wojciech M. Budzianowski Jan 2016

Inżynieria Chemiczna Lab., Wojciech M. Budzianowski

Wojciech Budzianowski

-


Subgroups Of Finite Wreath Product Groups For P=3, Jessica L. Gonda Jan 2016

Subgroups Of Finite Wreath Product Groups For P=3, Jessica L. Gonda

Williams Honors College, Honors Research Projects

Let M be the additive abelian group of 3-by-3 matrices whose entries are from the ring of integers modulo 9. The problem of determining all the normal subgroups of the regular wreath product group P=Z9≀(Z3 × Z3) that are contained in its base subgroup is equivalent to the problem of determining the subgroups of M that are invariant under two particular endomorphisms of M. In this thesis we give a partial solution to the latter problem by implementing a systematic approach using concepts from group theory and linear algebra.


Bioinformatic Game Theory And Its Application To Cluster Multi-Domain Proteins, Brittney Keel May 2015

Bioinformatic Game Theory And Its Application To Cluster Multi-Domain Proteins, Brittney Keel

Department of Mathematics: Dissertations, Theses, and Student Research

The exact evolutionary history of any set of biological sequences is unknown, and all phylogenetic reconstructions are approximations. The problem becomes harder when one must consider a mix of vertical and lateral phylogenetic signals. In this dissertation we propose a game-theoretic approach to clustering biological sequences and analyzing their evolutionary histories. In this context we use the term evolution as a broad descriptor for the entire set of mechanisms driving the inherited characteristics of a population. The key assumption in our development is that evolution tries to accommodate the competing forces of selection, of which the conservation force seeks to …