Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- SelectedWorks (61)
- University of New Mexico (9)
- Georgia Southern University (6)
- Selected Works (6)
- University of Nebraska - Lincoln (6)
-
- California Polytechnic State University, San Luis Obispo (5)
- California State University, San Bernardino (5)
- Claremont Colleges (5)
- Chapman University (4)
- The University of Akron (3)
- City University of New York (CUNY) (2)
- Illinois State University (2)
- James Madison University (2)
- Murray State University (2)
- University of Louisville (2)
- Brigham Young University (1)
- Clemson University (1)
- Colby College (1)
- East Tennessee State University (1)
- Embry-Riddle Aeronautical University (1)
- Liberty University (1)
- Louisiana Tech University (1)
- Missouri State University (1)
- Montclair State University (1)
- Prairie View A&M University (1)
- Syracuse University (1)
- Technological University Dublin (1)
- The College of Wooster (1)
- Universidad de Cundinamarca (1)
- University of Connecticut (1)
- Keyword
-
- Journal articles (25)
- Informacje dla studentów (in Polish) (18)
- Prace ze studentami (in Polish) (8)
- Local fractional calculus (7)
- Fractal (5)
-
- Local fractional derivative (5)
- Statistics (5)
- Conference articles (4)
- Fractal space (4)
- Machine Learning (4)
- Mathematics (4)
- Reprint articles (4)
- Applied Mathematics (2)
- Biogaz (2)
- Convolution (2)
- DSmT (2)
- Data Science (2)
- Deep Learning (2)
- Economy - Gospodarka (2)
- Energetyka (2)
- Energy (2)
- Finance (2)
- Fourier analysis (2)
- Graph Theory (2)
- Information fusion (2)
- Local fractional Fourier series (2)
- Local fractional differential equation (2)
- Local fractional functional analysis (2)
- Local fractional integral transforms (2)
- Modeling (2)
- Publication Year
- Publication
-
- Xiao-Jun Yang (38)
- Wojciech Budzianowski (29)
- Branch Mathematics and Statistics Faculty and Staff Publications (9)
- Electronic Theses and Dissertations (8)
- Electronic Theses, Projects, and Dissertations (5)
-
- Mathematics, Physics, and Computer Science Faculty Articles and Research (4)
- CMC Senior Theses (3)
- Department of Mathematics: Dissertations, Theses, and Student Research (3)
- Williams Honors College, Honors Research Projects (3)
- Annual Symposium on Biomathematics and Ecology Education and Research (2)
- Doctoral Dissertations (2)
- Honors Theses (2)
- Master's Theses (2)
- Murray State Theses and Dissertations (2)
- Publications and Research (2)
- Access*: Interdisciplinary Journal of Student Research and Scholarship (1)
- All Dissertations (1)
- All HMC Faculty Publications and Research (1)
- Applications and Applied Mathematics: An International Journal (AAM) (1)
- Articles (1)
- Department of Mathematics Facuty Scholarship and Creative Works (1)
- Department of Mathematics: Faculty Publications (1)
- Doctor of Business Administration Dissertations (1)
- Doctoral Dissertations and Master's Theses (1)
- Educación (1)
- Electronic Thesis and Dissertation Repository (1)
- HMC Senior Theses (1)
- Honors Capstone Projects - All (1)
- Honors College Theses (1)
- Honors Scholar Theses (1)
Articles 31 - 60 of 146
Full-Text Articles in Other Applied Mathematics
Realization Of Tensor Product And Of Tensor Factorization Of Rational Functions, Daniel Alpay, Izchak Lewkowicz
Realization Of Tensor Product And Of Tensor Factorization Of Rational Functions, Daniel Alpay, Izchak Lewkowicz
Mathematics, Physics, and Computer Science Faculty Articles and Research
We study the state space realization of a tensor product of a pair of rational functions. At the expense of “inflating” the dimensions, we recover the classical expressions for realization of a regular product of rational functions. Under an additional assumption that the limit at infinity of a given rational function exists and is equal to identity, we introduce an explicit formula for a tensor factorization of this function.
A More Powerful Unconditional Exact Test Of Homogeneity For 2 × C Contingency Table Analysis, Louis Ehwerhemuepha, Heng Sok, Cyril Rakovski
A More Powerful Unconditional Exact Test Of Homogeneity For 2 × C Contingency Table Analysis, Louis Ehwerhemuepha, Heng Sok, Cyril Rakovski
Mathematics, Physics, and Computer Science Faculty Articles and Research
The classical unconditional exact p-value test can be used to compare two multinomial distributions with small samples. This general hypothesis requires parameter estimation under the null which makes the test severely conservative. Similar property has been observed for Fisher's exact test with Barnard and Boschloo providing distinct adjustments that produce more powerful testing approaches. In this study, we develop a novel adjustment for the conservativeness of the unconditional multinomial exact p-value test that produces nominal type I error rate and increased power in comparison to all alternative approaches. We used a large simulation study to empirically estimate the …
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
Wojciech Budzianowski
No abstract provided.
Developments In Multivariate Post Quantum Cryptography., Jeremy Robert Vates
Developments In Multivariate Post Quantum Cryptography., Jeremy Robert Vates
Electronic Theses and Dissertations
Ever since Shor's algorithm was introduced in 1994, cryptographers have been working to develop cryptosystems that can resist known quantum computer attacks. This push for quantum attack resistant schemes is known as post quantum cryptography. Specifically, my contributions to post quantum cryptography has been to the family of schemes known as Multivariate Public Key Cryptography (MPKC), which is a very attractive candidate for digital signature standardization in the post quantum collective for a wide variety of applications. In this document I will be providing all necessary background to fully understand MPKC and post quantum cryptography as a whole. Then, I …
Simulating The Electrical Properties Of Random Carbon Nanotube Networks Using A Simple Model Based On Percolation Theory, Roberto Abril Valenzuela
Simulating The Electrical Properties Of Random Carbon Nanotube Networks Using A Simple Model Based On Percolation Theory, Roberto Abril Valenzuela
Physics
Carbon nanotubes (CNTs) have been subject to extensive research towards their possible applications in the world of nanoelectronics. The interest in carbon nanotubes originates from their unique variety of properties useful in nanoelectronic devices. One key feature of carbon nanotubes is that the chiral angle at which they are rolled determines whether the tube is metallic or semiconducting. Of main interest to this project are devices containing a thin film of randomly arranged carbon nanotubes, known as carbon nanotube networks. The presence of semiconducting tubes in a CNT network can lead to a switching effect when the film is electro-statically …
Herglotz Functions Of Several Quaternionic Variables, Khaled Abu-Ghanem, Daniel Alpay, Fabrizio Colombo, Izchak Lewkowicz, Irene Sabadini
Herglotz Functions Of Several Quaternionic Variables, Khaled Abu-Ghanem, Daniel Alpay, Fabrizio Colombo, Izchak Lewkowicz, Irene Sabadini
Mathematics, Physics, and Computer Science Faculty Articles and Research
We first review realizations of Herglotz functions in the unit ball of CN and provide new insights. Then, we define the corresponding class and prove the extend the results in the case of several quaternionic variables.
Examples Of Solving The Wave Equation In The Hyperbolic Plane, Cooper Ramsey
Examples Of Solving The Wave Equation In The Hyperbolic Plane, Cooper Ramsey
Senior Honors Theses
The complex numbers have proven themselves immensely useful in physics, mathematics, and engineering. One useful tool of the complex numbers is the method of conformal mapping which is used to solve various problems in physics and engineering that involved Laplace’s equation. Following the work done by Dr. James Cook, the complex numbers are replaced with associative real algebras. This paper focuses on another algebra, the hyperbolic numbers. A solution method like conformal mapping is developed with solutions to the one-dimensional wave equation. Applications of this solution method revolve around engineering and physics problems involving the propagation of waves. To conclude, …
Essentials Of Structural Equation Modeling, Mustafa Emre Civelek
Essentials Of Structural Equation Modeling, Mustafa Emre Civelek
Zea E-Books Collection
Structural Equation Modeling is a statistical method increasingly used in scientific studies in the fields of Social Sciences. It is currently a preferred analysis method, especially in doctoral dissertations and academic researches. However, since many universities do not include this method in the curriculum of undergraduate and graduate courses, students and scholars try to solve the problems they encounter by using various books and internet resources.
This book aims to guide the researcher who wants to use this method in a way that is free from math expressions. It teaches the steps of a research program using structured equality modeling …
Decoding Book Barcode Images, Yizhou Tao
Decoding Book Barcode Images, Yizhou Tao
CMC Senior Theses
This thesis investigated a method of barcode reconstruction to address the recovery of a blurred and convoluted one-dimensional barcode. There are a lot of types of barcodes used today, such as Code 39, Code 93, Code 128, etc. Our algorithm applies to the universal barcode, EAN 13. We extend the methodologies proposed by Iwen et al. (2013) in the journal article "A Symbol-Based Algorithm for Decoding barcodes." The algorithm proposed in the paper requires a signal measured by a laser scanner as an input. The observed signal is modeled as a true signal corrupted by a Gaussian convolution, additional noises, …
Sports Analytics With Computer Vision, Colby T. Jeffries
Sports Analytics With Computer Vision, Colby T. Jeffries
Senior Independent Study Theses
Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …
Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher
Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher
Electronic Theses and Dissertations
Through-out military history, the need to safely and effectively allocate resources to various military operations was a task of extreme importance. Satisfying the needs of multiple consumers by optimally pairing with appropriate suppliers falls into the category of vehicle routing problems (VRP), which has been intensively studied over the years. In general, finding the optimal solution to VRP is known to be NP-hard. The proposed solutions rely on mathematical programming and the size of the problems that can be optimally solved is typically limited. In military settings, balancing the needs of multiple consumers with the current operational environment has always …
Making Models With Bayes, Pilar Olid
Making Models With Bayes, Pilar Olid
Electronic Theses, Projects, and Dissertations
Bayesian statistics is an important approach to modern statistical analyses. It allows us to use our prior knowledge of the unknown parameters to construct a model for our data set. The foundation of Bayesian analysis is Bayes' Rule, which in its proportional form indicates that the posterior is proportional to the prior times the likelihood. We will demonstrate how we can apply Bayesian statistical techniques to fit a linear regression model and a hierarchical linear regression model to a data set. We will show how to apply different distributions to Bayesian analyses and how the use of a prior affects …
Evolution Of Superoscillations For Schrödinger Equation In A Uniform Magnetic Field, Fabrizio Colombo, Jonathan Gantner, Daniele C. Struppa
Evolution Of Superoscillations For Schrödinger Equation In A Uniform Magnetic Field, Fabrizio Colombo, Jonathan Gantner, Daniele C. Struppa
Mathematics, Physics, and Computer Science Faculty Articles and Research
Aharonov-Berry superoscillations are band-limited functions that oscillate faster than their fastest Fourier component. Superoscillations appear in several fields of science and technology, such as Aharonov’s weak measurement in quantum mechanics, in optics, and in signal processing. An important issue is the study of the evolution of superoscillations using the Schrödinger equation when the initial datum is a weak value. Some superoscillatory functions are not square integrable, but they are real analytic functions that can be extended to entire holomorphic functions. This fact leads to the study of the continuity of a class of convolution operators acting on suitable spaces of …
Extending Difference Of Votes Rules On Three Voting Models., Sarah Schulz King
Extending Difference Of Votes Rules On Three Voting Models., Sarah Schulz King
Electronic Theses and Dissertations
In a voting situation where there are only two competing alternatives, simple majority rule outputs the alternatives with the most votes or declares a tie if both alternatives receive the same number of votes. For any non-negative integer k, the difference of votes rule Mk outputs the alternative that beats the competing alternative by more than k votes. Llamazares (2006) gives a characterization of the difference of votes rules in terms of five axioms. In this thesis, we extend Llamazares' result by completely describing the class of voting rules that satisfy only two out of his five axioms. …
Cayley Graphs Of Groups And Their Applications, Anna Tripi
Cayley Graphs Of Groups And Their Applications, Anna Tripi
MSU Graduate Theses
Cayley graphs are graphs associated to a group and a set of generators for that group (there is also an associated directed graph). The purpose of this study was to examine multiple examples of Cayley graphs through group theory, graph theory, and applications. We gave background material on groups and graphs and gave numerous examples of Cayley graphs and digraphs. This helped investigate the conjecture that the Cayley graph of any group (except Z_2) is hamiltonian. We found the conjecture to still be open. We found Cayley graphs and hamiltonian cycles could be applied to campanology (in particular, to the …
C.V. - Wojciech Budzianowski, Wojciech M. Budzianowski
Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski
Renewable Energy And Sustainable Development (Resd) Group, Wojciech M. Budzianowski
Wojciech Budzianowski
No abstract provided.
Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson
Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson
Murray State Theses and Dissertations
We translate the RISK board into a graph which undergoes updates as the game advances. The dissection of the game into a network model in discrete time is a novel approach to examining RISK. A review of the existing statistical findings of skirmishes in RISK is provided. The graphical changes are accompanied by an examination of the statistical properties of RISK. The game is modeled as a discrete time dynamic network graph, with the various features of the game modeled as properties of the network at a given time. As the network is computationally intensive to implement, results are produced …
Triple Non-Negative Matrix Factorization Technique For Sentiment Analysis And Topic Modeling, Alexander A. Waggoner
Triple Non-Negative Matrix Factorization Technique For Sentiment Analysis And Topic Modeling, Alexander A. Waggoner
CMC Senior Theses
Topic modeling refers to the process of algorithmically sorting documents into categories based on some common relationship between the documents. This common relationship between the documents is considered the “topic” of the documents. Sentiment analysis refers to the process of algorithmically sorting a document into a positive or negative category depending whether this document expresses a positive or negative opinion on its respective topic. In this paper, I consider the open problem of document classification into a topic category, as well as a sentiment category. This has a direct application to the retail industry where companies may want to scour …
A Traders Guide To The Predictive Universe- A Model For Predicting Oil Price Targets And Trading On Them, Jimmie Harold Lenz
A Traders Guide To The Predictive Universe- A Model For Predicting Oil Price Targets And Trading On Them, Jimmie Harold Lenz
Doctor of Business Administration Dissertations
At heart every trader loves volatility; this is where return on investment comes from, this is what drives the proverbial “positive alpha.” As a trader, understanding the probabilities related to the volatility of prices is key, however if you could also predict future prices with reliability the world would be your oyster. To this end, I have achieved three goals with this dissertation, to develop a model to predict future short term prices (direction and magnitude), to effectively test this by generating consistent profits utilizing a trading model developed for this purpose, and to write a paper that anyone with …
General Equations For Natural Selection Under Complete Dominance, Kasthuri Kannan, Adriana Heguy
General Equations For Natural Selection Under Complete Dominance, Kasthuri Kannan, Adriana Heguy
Annual Symposium on Biomathematics and Ecology Education and Research
No abstract provided.
The Evolution Of Cryptology, Gwendolyn Rae Souza
The Evolution Of Cryptology, Gwendolyn Rae Souza
Electronic Theses, Projects, and Dissertations
We live in an age when our most private information is becoming exceedingly difficult to keep private. Cryptology allows for the creation of encryptive barriers that protect this information. Though the information is protected, it is not entirely inaccessible. A recipient may be able to access the information by decoding the message. This possible threat has encouraged cryptologists to evolve and complicate their encrypting methods so that future information can remain safe and become more difficult to decode. There are various methods of encryption that demonstrate how cryptology continues to evolve through time. These methods revolve around different areas of …
Population Projection And Habitat Preference Modeling Of The Endangered James Spinymussel (Pleurobema Collina), Marisa Draper
Population Projection And Habitat Preference Modeling Of The Endangered James Spinymussel (Pleurobema Collina), Marisa Draper
Senior Honors Projects, 2010-2019
The James Spinymussel (Pleurobema collina) is an endangered mussel species at the top of Virginia’s conservation list. The James Spinymussel plays a critical role in the environment by filtering and cleaning stream water while providing shelter and food for macroinvertebrates; however, conservation efforts are complicated by the mussels’ burrowing behavior, camouflage, and complex life cycle. The goals of the research conducted were to estimate detection probabilities that could be used to predict species presence and facilitate field work, and to track individually marked mussels to test for habitat preferences. Using existing literature and mark-recapture field data, these goals were accomplished …
Drawing Numbers And Listening To Patterns, Loren Zo Haynes
Drawing Numbers And Listening To Patterns, Loren Zo Haynes
Honors College Theses
The triangular numbers is a series of number that add the natural numbers. Parabolic shapes emerge when this series is placed on a lattice, or imposed with a limited number of columns that causes the sequence to continue on the next row when it has reached the kth column. We examine these patterns and construct proofs that explain their behavior. We build off of this to see what happens to the patterns when there is not a limited number of columns, and we formulate the graphs as musical patterns on a staff, using each column as a line or space …
Single Valued Neutrosophic Graphs, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea
Single Valued Neutrosophic Graphs, Florentin Smarandache, Said Broumi, Assia Bakali, Mohamed Talea
Branch Mathematics and Statistics Faculty and Staff Publications
The notion of single valued neutrosophic sets is a generalization of fuzzy sets, intuitionistic fuzzy sets. We apply the concept of single valued neutrosophic sets, an instance of neutrosophic sets, to graphs. We introduce certain types of single valued neutrosophic graphs (SVNG) and investigate some of their properties with proofs and examples.
Procesy Cieplne I Aparaty (Lab), Wojciech M. Budzianowski
Multiple Problem-Solving Strategies Provide Insight Into Students’ Understanding Of Open-Ended Linear Programming Problems, Marla A. Sole
Multiple Problem-Solving Strategies Provide Insight Into Students’ Understanding Of Open-Ended Linear Programming Problems, Marla A. Sole
Publications and Research
Open-ended questions that can be solved using different strategies help students learn and integrate content, and provide teachers with greater insights into students’ unique capabilities and levels of understanding. This article provides a problem that was modified to allow for multiple approaches. Students tended to employ high-powered, complex, familiar solution strategies rather than simpler, more intuitive strategies, which suggests that students might need more experience working with informal solution methods. During the semester, by incorporating open-ended questions, I gained valuable feedback, was able to better model real-world problems, challenge students with different abilities, and strengthen students’ problem solving skills.
Inżynieria Chemiczna Lab., Wojciech M. Budzianowski
Subgroups Of Finite Wreath Product Groups For P=3, Jessica L. Gonda
Subgroups Of Finite Wreath Product Groups For P=3, Jessica L. Gonda
Williams Honors College, Honors Research Projects
Let M be the additive abelian group of 3-by-3 matrices whose entries are from the ring of integers modulo 9. The problem of determining all the normal subgroups of the regular wreath product group P=Z9≀(Z3 × Z3) that are contained in its base subgroup is equivalent to the problem of determining the subgroups of M that are invariant under two particular endomorphisms of M. In this thesis we give a partial solution to the latter problem by implementing a systematic approach using concepts from group theory and linear algebra.
Bioinformatic Game Theory And Its Application To Cluster Multi-Domain Proteins, Brittney Keel
Bioinformatic Game Theory And Its Application To Cluster Multi-Domain Proteins, Brittney Keel
Department of Mathematics: Dissertations, Theses, and Student Research
The exact evolutionary history of any set of biological sequences is unknown, and all phylogenetic reconstructions are approximations. The problem becomes harder when one must consider a mix of vertical and lateral phylogenetic signals. In this dissertation we propose a game-theoretic approach to clustering biological sequences and analyzing their evolutionary histories. In this context we use the term evolution as a broad descriptor for the entire set of mechanisms driving the inherited characteristics of a population. The key assumption in our development is that evolution tries to accommodate the competing forces of selection, of which the conservation force seeks to …