Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack May 2022

Data And Algorithmic Modeling Approaches To Count Data, Andraya Hack

Honors College Theses

Various techniques are used to create predictions based on count data. This type of data takes the form of a non-negative integers such as the number of claims an insurance policy holder may make. These predictions can allow people to prepare for likely outcomes. Thus, it is important to know how accurate the predictions are. Traditional statistical approaches for predicting count data include Poisson regression as well as negative binomial regression. Both methods also have a zero-inflated version that can be used when the data has an overabundance of zeros. Another procedure is to use computer algorithms, also known as …


Computational Algorithms For Improved Representation Of The Model Error Covariance In Weak-Constraint 4d-Var, Jeremy A. Shaw Mar 2017

Computational Algorithms For Improved Representation Of The Model Error Covariance In Weak-Constraint 4d-Var, Jeremy A. Shaw

Dissertations and Theses

Four-dimensional variational data assimilation (4D-Var) provides an estimate to the state of a dynamical system through the minimization of a cost functional that measures the distance to a prior state (background) estimate and observations over a time window. The analysis fit to each information input component is determined by the specification of the error covariance matrices in the data assimilation system (DAS). Weak-constraint 4D-Var (w4D-Var) provides a theoretical framework to account for modeling errors in the analysis scheme. In addition to the specification of the background error covariance matrix, the w4D-Var formulation requires information on the model error statistics and …


The Pc-Tree Algorithm, Kuratowski Subdivisions, And The Torus., Charles J. Suer Aug 2015

The Pc-Tree Algorithm, Kuratowski Subdivisions, And The Torus., Charles J. Suer

Electronic Theses and Dissertations

The PC-Tree algorithm of Shih and Hsu (1999) is a practical linear-time planarity algorithm that provides a plane embedding of the given graph if it is planar and a Kuratowski subdivision otherwise. Remarkably, there is no known linear-time algorithm for embedding graphs on the torus. We extend the PC-Tree algorithm to a practical, linear-time toroidality test for K3;3-free graphs called the PCK-Tree algorithm. We also prove that it is NP-complete to decide whether the edges of a graph can be covered with two Kuratowski subdivisions. This greatly reduces the possibility of a polynomial-time toroidality testing algorithm based solely on edge-coverings …


Sensitivity Of Mixed Models To Computational Algorithms Of Time Series Data, Gunaime Nevine Apr 2015

Sensitivity Of Mixed Models To Computational Algorithms Of Time Series Data, Gunaime Nevine

Doctoral Dissertations

Statistical analysis is influenced by implementation of the algorithms used to execute the computations associated with various statistical techniques. Over many years; very important criteria for model comparison has been studied and examined, and two algorithms on a single dataset have been performed numerous times. The goal of this research is not comparing two or more models on one dataset, but comparing models with numerical algorithms that have been used to solve them on the same dataset.

In this research, different models have been broadly applied in modeling and their contrasting which are affected by the numerical algorithms in different …


Fast Monte Carlo Algorithms For Computing A Low-Rank Approximation To A Matrix, Vlad S. Burca Apr 2014

Fast Monte Carlo Algorithms For Computing A Low-Rank Approximation To A Matrix, Vlad S. Burca

Senior Theses and Projects

Many of today's applications deal with big quantities of data; from DNA analysis algorithms, to image processing and movie recommendation algorithms. Most of these systems store the data in very large matrices. In order to perform analysis on the collected data, these big matrices have to be stored in the RAM (random-access memory) of the computing system. But this is a very expensive process since RAM is a scarce computational resource. Ideally, one would like to be able to store most of the data matrices on the memory disk (hard disk drive) while loading only the necessary parts of the …


Stability Aware Delaunay Refinement, Bishal Acharya Aug 2013

Stability Aware Delaunay Refinement, Bishal Acharya

UNLV Theses, Dissertations, Professional Papers, and Capstones

Good quality meshes are extensively used for finding approximate solutions for partial differential equations for fluid flow in two dimensional surfaces. We present an overview of existing algorithms for refinement and generation of triangular meshes. We introduce the concept of node stability in the refinement of Delaunay triangulation. We present two algorithms for generating stable refinement of Delaunay triangulation. We also present an experimental investigation of a triangulation refinement algorithm based on the location of the center of gravity and the location of the center of circumcircle. The results show that the center of gravity based refinement is more effective …


Validation Of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation, Elton Lewis Freeman Dec 2012

Validation Of Weak Form Thermal Analysis Algorithms Supporting Thermal Signature Generation, Elton Lewis Freeman

Masters Theses

Extremization of a weak form for the continuum energy conservation principle differential equation naturally implements fluid convection and radiation as flux Robin boundary conditions associated with unsteady heat transfer. Combining a spatial semi-discretization via finite element trial space basis functions with time-accurate integration generates a totally node-based algebraic statement for computing. Closure for gray body radiation is a newly derived node-based radiosity formulation generating piecewise discontinuous solutions, while that for natural-forced-mixed convection heat transfer is extracted from the literature. Algorithm performance, mathematically predicted by asymptotic convergence theory, is subsequently validated with data obtained in 24 hour diurnal field experiments for …


Determining Angular Frequency From A Video With A Generalized Fast Fourier Transform, Lindsay N. Smith Mar 2012

Determining Angular Frequency From A Video With A Generalized Fast Fourier Transform, Lindsay N. Smith

Theses and Dissertations

Suppose we are given a video of a rotating object and suppose we want to determine the rate of rotation solely from the video itself and its known frame rate. In this thesis, we present a new mathematical operator called the Geometric Sum Transform (GST) that can help one determine the angular frequency of the object in question. The GST is a generalization of the discrete Fourier transform (DFT) and as such, the two transforms have much in common. However, whereas the DFT is applied to a sequence of scalars, the GST can be applied to a sequence of vectors. …


Comparative Analysis Of Expected Utility Theory Versus Prospect Theory And Critique Of Their Recent Developments, Sassan Sadeghi Jan 2011

Comparative Analysis Of Expected Utility Theory Versus Prospect Theory And Critique Of Their Recent Developments, Sassan Sadeghi

Theses Digitization Project

This study is an investigation of the decision making theories, their developments, and especially, their applications. After locating the two rivals, the Expected Utility Theory (EUT) and the Prospect Theory (PT), within the general context of decision making situations, it compares their main features and examines the PT extensions.


A Multi-Objective Approach To A Bipartite Assignment Matching Problem Using Weighted Values From Multiple Contraints, Greg S. Jeong Mar 2010

A Multi-Objective Approach To A Bipartite Assignment Matching Problem Using Weighted Values From Multiple Contraints, Greg S. Jeong

Theses and Dissertations

US Air Force recruiters routinely assign new recruits to available jobs every month. The goal is to find the best assignments in an efficient manner. Although this problem is modeled as a bipartite assignment matching problem, it is not new to the field of Operations Research. This research presents a new approach to solve assignment matching problems given multiple side constraints. Using two multi-criteria optimization techniques, lexicographic optimization and the elastic constraint method, the assignment matching algorithm efficiently produces an optimal solution in a fraction of the time currently spent. This approach is demonstrated in assigning new USAF recruits to …


On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri Aug 2008

On Graph Isomorphism And The Pagerank Algorithm, Christopher J. Augeri

Theses and Dissertations

A graph is a key construct for expressing relationships among objects, such as the radio connectivity between nodes contained in an unmanned vehicle swarm. The study of such networks may include ranking nodes based on importance, for example, by applying the PageRank algorithm used in some search engines to order their query responses. The PageRank values correspond to a unique eigenvector typically computed by applying the power method, an iterative technique based on matrix multiplication. The first new result described herein is a lower bound on the execution time of the PageRank algorithm that is derived by applying standard assumptions …


Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley Mar 2008

Hardware Algorithm Implementation For Mission Specific Processing, Jason W. Shirley

Theses and Dissertations

There is a need to expedite the process of designing military hardware to stay ahead of the adversary. The core of this project was to build reusable, synthesizeable libraries to make this a possibility. In order to build these libraries, Matlab® commands and functions, such as Conv2, Round, Floor, Pinv, etc., had to be converted into reusable VHDL modules. These modules make up reusable libraries for the Mission Specific Process (MSP) which will support AFRL/RY. The MSP allows the VLSI design process to be completed in a mere matter of days or months using an FPGA or ASIC design, as …


Statistical Removal Of Shadow For Applications To Gait Recognition, Brian D. Hockersmith Mar 2008

Statistical Removal Of Shadow For Applications To Gait Recognition, Brian D. Hockersmith

Theses and Dissertations

The purpose of this thesis is to mathematically remove the shadow of an individual on video. The removal of the shadow will aid in the rendering of higher quality binary silhouettes than previously allowed. These silhouettes will allow researchers studying gait recognition to work with silhouettes unhindered by unrelated data. The thesis begins with the analysis of videos of solid colored backgrounds. A formulation of the effect of shadow on specified colors will aid in the derivation of a hypothesis test to remove an individual’s shadow. Video of an individual walking normally, perpendicular to the camera will be utilized to …


A New Application Of The Channel Packet Method For Low Energy 1-D Elastic Scattering, Clint M. Zeringue Sep 2006

A New Application Of The Channel Packet Method For Low Energy 1-D Elastic Scattering, Clint M. Zeringue

Theses and Dissertations

An algorithm is presented which uses the channel packet method (CPM) to simulate low-energy, wave-packet propagation and compute S-matrix elements. A four-by-four matrix containing the momentum, expansion coefficients of the reactants and products is introduced to account for initial and final states having both positive and negative momentum. The approach does not consider scattering from one side or the other, rather it considers both incoming and outgoing wave packets from the left and right simultaneously. Therefore, during one simulation all four S-matrix elements, and elements, S+k,-K, S-k, +k, S+k, +k and S-k,-k are computed. …


Shortest Path Problems In A Stochastic And Dynamic Environment, Jae Il Cho Mar 2003

Shortest Path Problems In A Stochastic And Dynamic Environment, Jae Il Cho

Theses and Dissertations

In this research, we consider stochastic and dynamic transportation network problems. Particularly, we develop a variety of algorithms to solve the expected shortest path problem in addition to techniques for computing the total travel time distribution along a path in the network. First, we develop an algorithm for solving an independent expected shortest path problem. Next, we incorporate the inherent dependencies along successive links in two distinct ways to find the expected shortest path. Since the dependent expected shortest path problem cannot be solved with traditional deterministic approaches, we develop a heuristic based on the K-shortest path algorithm for this …


Improved Mathematical Modeling For Gps Based Navigation, Salvatore Nardi Mar 1998

Improved Mathematical Modeling For Gps Based Navigation, Salvatore Nardi

Theses and Dissertations

This thesis is concerned with the development of new closed form GPS position determination algorithms that work in the presence of pseudorange measurement noise. The mathematical derivation of two closed form algorithms, based on stochastic modeling and estimation techniques, is presented. The algorithms provide an estimate of the GPS solution parameters (viz., the user position and the user clock bias) as well as the estimation error covariance. The experimental results are analyzed by comparison to the baseline results from the conventional Iterative Least Squares (ILS) algorithm. In typical GPS scenarios, the closed form algorithms are extremely sensitive to noise, making …