Open Access. Powered by Scholars. Published by Universities.®

Other Applied Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Other Applied Mathematics

Developments In Multivariate Post Quantum Cryptography., Jeremy Robert Vates Aug 2018

Developments In Multivariate Post Quantum Cryptography., Jeremy Robert Vates

Electronic Theses and Dissertations

Ever since Shor's algorithm was introduced in 1994, cryptographers have been working to develop cryptosystems that can resist known quantum computer attacks. This push for quantum attack resistant schemes is known as post quantum cryptography. Specifically, my contributions to post quantum cryptography has been to the family of schemes known as Multivariate Public Key Cryptography (MPKC), which is a very attractive candidate for digital signature standardization in the post quantum collective for a wide variety of applications. In this document I will be providing all necessary background to fully understand MPKC and post quantum cryptography as a whole. Then, I …


Simulating The Electrical Properties Of Random Carbon Nanotube Networks Using A Simple Model Based On Percolation Theory, Roberto Abril Valenzuela Jun 2018

Simulating The Electrical Properties Of Random Carbon Nanotube Networks Using A Simple Model Based On Percolation Theory, Roberto Abril Valenzuela

Physics

Carbon nanotubes (CNTs) have been subject to extensive research towards their possible applications in the world of nanoelectronics. The interest in carbon nanotubes originates from their unique variety of properties useful in nanoelectronic devices. One key feature of carbon nanotubes is that the chiral angle at which they are rolled determines whether the tube is metallic or semiconducting. Of main interest to this project are devices containing a thin film of randomly arranged carbon nanotubes, known as carbon nanotube networks. The presence of semiconducting tubes in a CNT network can lead to a switching effect when the film is electro-statically …


Decoding Book Barcode Images, Yizhou Tao Jan 2018

Decoding Book Barcode Images, Yizhou Tao

CMC Senior Theses

This thesis investigated a method of barcode reconstruction to address the recovery of a blurred and convoluted one-dimensional barcode. There are a lot of types of barcodes used today, such as Code 39, Code 93, Code 128, etc. Our algorithm applies to the universal barcode, EAN 13. We extend the methodologies proposed by Iwen et al. (2013) in the journal article "A Symbol-Based Algorithm for Decoding barcodes." The algorithm proposed in the paper requires a signal measured by a laser scanner as an input. The observed signal is modeled as a true signal corrupted by a Gaussian convolution, additional noises, …


Sports Analytics With Computer Vision, Colby T. Jeffries Jan 2018

Sports Analytics With Computer Vision, Colby T. Jeffries

Senior Independent Study Theses

Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …


Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher Jan 2018

Optimal Supply Delivery Under Military Specific Constraints, Talena Fletcher

Electronic Theses and Dissertations

Through-out military history, the need to safely and effectively allocate resources to various military operations was a task of extreme importance. Satisfying the needs of multiple consumers by optimally pairing with appropriate suppliers falls into the category of vehicle routing problems (VRP), which has been intensively studied over the years. In general, finding the optimal solution to VRP is known to be NP-hard. The proposed solutions rely on mathematical programming and the size of the problems that can be optimally solved is typically limited. In military settings, balancing the needs of multiple consumers with the current operational environment has always …