Open Access. Powered by Scholars. Published by Universities.®

Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theory and Algorithms

PDF

2020

Institution
Keyword
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Mathematics

An Update On The Computational Theory Of Hamiltonian Period Functions, Bradley Joseph Klee Dec 2020

An Update On The Computational Theory Of Hamiltonian Period Functions, Bradley Joseph Klee

Graduate Theses and Dissertations

Lately, state-of-the-art calculation in both physics and mathematics has expanded to include the field of symbolic computing. The technical content of this dissertation centers on a few Creative Telescoping algorithms of our own design (Mathematica implementations are given as a supplement). These algorithms automate analysis of integral period functions at a level of difficulty and detail far beyond what is possible using only pencil and paper (unless, perhaps, you happen to have savant-level mental acuity). We can then optimize analysis in classical physics by using the algorithms to calculate Hamiltonian period functions as solutions to ordinary differential equations. The simple …


Controlling Aircraft Yaw Movement By Interval Type-2 Fuzzy Logic, Yamama Shafeek, Laith Majeed, Rasha Naji Oct 2020

Controlling Aircraft Yaw Movement By Interval Type-2 Fuzzy Logic, Yamama Shafeek, Laith Majeed, Rasha Naji

Emirates Journal for Engineering Research

Aircraft yaw movement is essential in maneuvering; it has been controlled by some methods which achieved tracking but not fast enough. This paper performs the dynamic modeling of aircraft yaw movement and develops PI and PI-like interval type-2 fuzzy logic controller for the model. The mathematical model is derived by inserting the parameters values of single-engine Navion aircraft into standard equations. Using Matlab/ Simulink platform, the controllers' effectivity is tested and verified in two different cases; system without disturbance and when system is disturbed by some wind gust to investigate the system robustness. Simulation results show that PI controller response …


Espade: An Efficient And Semantically Secure Shortest Path Discovery For Outsourced Location-Based Services, Bharath K. Samanthula, Divyadharshini Karthikeyan, Boxiang Dong, K. Anitha Kumari Oct 2020

Espade: An Efficient And Semantically Secure Shortest Path Discovery For Outsourced Location-Based Services, Bharath K. Samanthula, Divyadharshini Karthikeyan, Boxiang Dong, K. Anitha Kumari

Department of Computer Science Faculty Scholarship and Creative Works

With the rapid growth of smart devices and technological advancements in tracking geospatial data, the demand for Location-Based Services (LBS) is facing a constant rise in several domains, including military, healthcare and transportation. It is a natural step to migrate LBS to a cloud environment to achieve on-demand scalability and increased resiliency. Nonetheless, outsourcing sensitive location data to a third-party cloud provider raises a host of privacy concerns as the data owners have reduced visibility and control over the outsourced data. In this paper, we consider outsourced LBS where users want to retrieve map directions without disclosing their location information. …


A 3d Image-Guided System To Improve Myocardial Revascularization Decision-Making For Patients With Coronary Artery Disease, Haipeng Tang Aug 2020

A 3d Image-Guided System To Improve Myocardial Revascularization Decision-Making For Patients With Coronary Artery Disease, Haipeng Tang

Dissertations

OBJECTIVES. Coronary artery disease (CAD) is the most common type of heart disease and kills over 360,000 people a year in the United States. Myocardial revascularization (MR) is a standard interventional treatment for patients with stable CAD. Fluoroscopy angiography is real-time anatomical imaging and routinely used to guide MR by visually estimating the percent stenosis of coronary arteries. However, a lot of patients do not benefit from the anatomical information-guided MR without functional testing. Single-photon emission computed tomography (SPECT) myocardial perfusion imaging (MPI) is a widely used functional testing for CAD evaluation but limits to the absence of anatomical information. …


Bayesian Topological Machine Learning, Christopher A. Oballe Aug 2020

Bayesian Topological Machine Learning, Christopher A. Oballe

Doctoral Dissertations

Topological data analysis encompasses a broad set of ideas and techniques that address 1) how to rigorously define and summarize the shape of data, and 2) use these constructs for inference. This dissertation addresses the second problem by developing new inferential tools for topological data analysis and applying them to solve real-world data problems. First, a Bayesian framework to approximate probability distributions of persistence diagrams is established. The key insight underpinning this framework is that persistence diagrams may be viewed as Poisson point processes with prior intensities. With this assumption in hand, one may compute posterior intensities by adopting techniques …


The Theory Of Cryptography In Bitcoin, Can Hong May 2020

The Theory Of Cryptography In Bitcoin, Can Hong

Mathematics Senior Capstone Papers

Bitcoin is a well known virtual currency, or cryptocurrency. It was created by a group of people using the name Satoshi Nakamoto in 2008. Currently, many people are utilizing Bitcoin for personal gains and transactions. To keep transactions secure requires techniques from modern cryptography. In this paper, we explain certain aspects of the cryptography of Bitcoin. We are going to discuss two components of the cryptography of Bitcoin—hash functions and signatures. We will describe what the hash function and signature are, give some examples of hash functions, and discuss certain criteria that good hash functions should satisfy.


Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann Apr 2020

Nonlinear Least Squares 3-D Geolocation Solutions Using Time Differences Of Arrival, Michael V. Bredemann

Mathematics & Statistics ETDs

This thesis uses a geometric approach to derive and solve nonlinear least squares minimization problems to geolocate a signal source in three dimensions using time differences of arrival at multiple sensor locations. There is no restriction on the maximum number of sensors used. Residual errors reach the numerical limits of machine precision. Symmetric sensor orientations are found that prevent closed form solutions of source locations lying within the null space. Maximum uncertainties in relative sensor positions and time difference of arrivals, required to locate a source within a maximum specified error, are found from these results. Examples illustrate potential requirements …


Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng Apr 2020

Storage Management Strategy In Mobile Phones For Photo Crowdsensing, En Wang, Zhengdao Qu, Xinyao Liang, Xiangyu Meng, Yongjian Yang, Dawei Li, Weibin Meng

Department of Computer Science Faculty Scholarship and Creative Works

In mobile crowdsensing, some users jointly finish a sensing task through the sensors equipped in their intelligent terminals. In particular, the photo crowdsensing based on Mobile Edge Computing (MEC) collects pictures for some specific targets or events and uploads them to nearby edge servers, which leads to richer data content and more efficient data storage compared with the common mobile crowdsensing; hence, it has attracted an important amount of attention recently. However, the mobile users prefer uploading the photos through Wifi APs (PoIs) rather than cellular networks. Therefore, photos stored in mobile phones are exchanged among users, in order to …


Randomized Algorithms And How Society Uses Them Everyday, Rosaley Milano Apr 2020

Randomized Algorithms And How Society Uses Them Everyday, Rosaley Milano

Undergraduate Honors Thesis Projects

Randomness is an interesting and very beneficial phenomenon. In computer science randomness facilitates great advances in efficiency but topics like randomized algorithms aren’t taught until someone enters graduate school. This paper provides undergraduates as well as people unacquainted with computer science an opportunity to explore the topic of randomness by guiding them from essential topics all the way through the graduate level topic of randomized algorithms. Topics like what an algorithm is, how they are represented and the history that brought them into existence bring the reader up to speed before diving deeper into randomized algorithms. A discussion of complexity …


Designing Fractal Line Pied-De-Poules: A Case Study In Algorithmic Design Mediating Between Culture And Fractal Mathematics, Loe M.G. Feijs Jan 2020

Designing Fractal Line Pied-De-Poules: A Case Study In Algorithmic Design Mediating Between Culture And Fractal Mathematics, Loe M.G. Feijs

Journal of Humanistic Mathematics

Millions of people own and wear pied-de-poule (houndstooth) garments. The pattern has an intriguing basic figure and a typical set of symmetries. The origin of the pattern lies in a specific type of weaving. In this article I apply computational techniques to modernize this ancient decorative pattern. In particular I describe a way to enrich pied-de-poule with a fractal structure.

Although a first fractal line pied-de-poule was shown at Bridges 2015, a number of fundamental questions still remained. The following questions are addressed in this article: Does the original pied-de-poule appear as a limit case when the fractal structure is …


Connectedness In Cayley Graphs And P/Np Dichotomy For Quay Algebras, Thuy Trang Nguyen Jan 2020

Connectedness In Cayley Graphs And P/Np Dichotomy For Quay Algebras, Thuy Trang Nguyen

Senior Projects Spring 2020

This senior thesis attempts to determine the extent to which the P/NP dichotomy of finite algebras (as proven by Bulatov, et.al in 2017) can be cast in terms of connectedness in Cayley graphs. This research is motivated by Prof. Robert McGrail's work ``CSPs and Connectedness: P/NP-Complete Dichotomy for Idempotent, Right Quasigroups" published in 2014 in which he demonstrates the strong correspondence between tractability and total path-connectivity in Cayley graphs for right, idempotent quasigroups. In particular, we will introduce the notion of total V-connectedness and show how it could be potentially used to phrase the dichotomy in terms of connectivity for …


Invariance And Invertibility In Deep Neural Networks, Han Zhang Jan 2020

Invariance And Invertibility In Deep Neural Networks, Han Zhang

Theses and Dissertations

Machine learning is concerned with computer systems that learn from data instead of being explicitly programmed to solve a particular task. One of the main approaches behind recent advances in machine learning involves neural networks with a large number of layers, often referred to as deep learning. In this dissertation, we study how to equip deep neural networks with two useful properties: invariance and invertibility. The first part of our work is focused on constructing neural networks that are invariant to certain transformations in the input, that is, some outputs of the network stay the same even if the input …


Gröbner Bases And Systems Of Polynomial Equations, Rachel Holmes Jan 2020

Gröbner Bases And Systems Of Polynomial Equations, Rachel Holmes

All Graduate Theses, Dissertations, and Other Capstone Projects

This paper will explore the use and construction of Gröbner bases through Buchberger's algorithm. Specifically, applications of such bases for solving systems of polynomial equations will be discussed. Furthermore, we relate many concepts in commutative algebra to ideas in computational algebraic geometry.


Maximality And Applications Of Subword-Closed Languages, Rhys Davis Jones Jan 2020

Maximality And Applications Of Subword-Closed Languages, Rhys Davis Jones

UNF Graduate Theses and Dissertations

Characterizing languages D that are maximal with the property that D* ⊆ S is an important problem in formal language theory with applications to coding theory and DNA codewords. Given a finite set of words of a fixed length S, the constraint, we consider its subword closure, S, the set of words whose subwords of that fixed length are all in the constraint. We investigate these maximal languages and present characterizations for them. These characterizations use strongly connected components of deterministic finite automata and lead to polynomial time algorithms for generating such languages. We prove that …


A Mathematical Analysis Of The Game Of Santorini, Carson Clyde Geissler Jan 2020

A Mathematical Analysis Of The Game Of Santorini, Carson Clyde Geissler

Senior Independent Study Theses

Santorini is a two player combinatorial board game. Santorini bears resemblance to the graph theory game of Geography, a game of moving and deleting vertices on a graph. We explore Santorini with game theory, complexity theory, and artificial intelligence. We present David Lichtenstein’s proof that Geography is PSPACE-hard and adapt the proof for generalized forms of Santorini. Last, we discuss the development of an AI built for a software implementation of Santorini and present a number of improvements to that AI.