Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Predicting The Author Of Twitter Posts With Markov Chain Analysis, Daniel Freeman Dec 2017

Predicting The Author Of Twitter Posts With Markov Chain Analysis, Daniel Freeman

Honors Theses

Given a set of text with known authors, is it possible to take new text, not knowing who wrote it, and correctly identify the author? One way to do this is to analyze the text using Markov chains. This research project will first attempt to answer this question using books available in the public domain. Using what is learned from trying to identify authors of books, the primary goal of this project is to identify the best way to guess the author of a post on the social media network Twitter using Markov chains.


Accurately Simulating The Battle Of Thermopylae To Analyze "What If" Scenarios, Josh Wasserman Jun 2017

Accurately Simulating The Battle Of Thermopylae To Analyze "What If" Scenarios, Josh Wasserman

Honors Theses

The Battle of Thermopylae (480 BCE) was a last ditch effort to stall the Persian army as it marched south toward Athens. Led by Leonidas and his personal guard of 300 Spartans, a citizen army of Greeks was able to delay a Persian army of over 100,000 soldiers at the town of Thermopylae for several days. Although the Greeks were ultimately defeated at Thermopylae, the battle provided enough time for the Greek states to regroup and plan a counter attack, eventually defeating the invading Persians. This battle was crucial not only for the preservation of Greek independence, but also the …


Attracting Human Attention Using Robotic Facial Expressions And Gestures, Venus Yu Jun 2017

Attracting Human Attention Using Robotic Facial Expressions And Gestures, Venus Yu

Honors Theses

Robots will soon interact with humans in settings outside of a lab. Since it will be likely that their bodies will not be as developed as their programming, they will not have the complex limbs needed to perform simple tasks. Thus they will need to seek human assistance by asking them for help appropriately. But how will these robots know how to act? This research will focus on the specific nonverbal behaviors a robot could use to attract someone’s attention and convince them to interact with the robot. In particular, it will need the correct facial expressions and gestures to …


Effective Ann Topologies For Use As Genotypes For Evaluating Design And Fabrication, John R. Peterson Jun 2017

Effective Ann Topologies For Use As Genotypes For Evaluating Design And Fabrication, John R. Peterson

Honors Theses

There is promise in the field of Evolutionary Design for systems that evolve not only what to manufacture but also how to manufacture it. EvoFab is a system that uses Genetic Algorithms to evolve Artificial Neural Networks (ANNs) which control a modified 3d-printer with the goal of automating some level of invention. ANNs are an obvious choice for use with a system like this as they are canonically evolvable encodings, and have been successfully used as evolved control systems in Evolutionary Robotics. However, there is little known about how the structural characteristics of an ANN affect the shapes that can …


Elliptic Curve Cryptology, Francis Rocco Jun 2017

Elliptic Curve Cryptology, Francis Rocco

Honors Theses

In today's digital age of conducting large portions of daily life over the Internet, privacy in communication is challenged extremely frequently and confidential information has become a valuable commodity. Even with the use of commonly employed encryption practices, private information is often revealed to attackers. This issue motivates the discussion of cryptology, the study of confidential transmissions over insecure channels, which is divided into two branches of cryptography and cryptanalysis. In this paper, we will first develop a foundation to understand cryptography and send confidential transmissions among mutual parties. Next, we will provide an expository analysis of elliptic curves and …


Multi-Agent Simulation Of The Battle Of Ankara, 1402, Ruili Tang Jun 2017

Multi-Agent Simulation Of The Battle Of Ankara, 1402, Ruili Tang

Honors Theses

In 1402, at the north of city Ankara, Turkey, a battle between Ottoman Empire and Tamerlane Empire decided the fate of Europe and Asia. Although historians largely agree on the general battle procedure, the details are still open to dispute. Several factors may have contributed to the Ottoman defeat, such as the overwhelming size of Tamerlanes army, poisoned water, the tactical formations of the military units, and betrayal by the Tartar cavalry in the Ottoman left wing. The approach is divided into two stages: the simulation stage, which provides data to analyze the complex interactions of autonomous agents, and the …


Computer Scientists In The Swamp: A Case Study And Examination Of The State Of Computer Science Education In Louisiana, Kristen Barrett May 2017

Computer Scientists In The Swamp: A Case Study And Examination Of The State Of Computer Science Education In Louisiana, Kristen Barrett

Honors Theses

No abstract provided.


Capturing Omni-Stereo Panoramas Within Unreal Engine 4, Evan Preslar Apr 2017

Capturing Omni-Stereo Panoramas Within Unreal Engine 4, Evan Preslar

Honors Theses

No abstract provided.


An Alternative Approach To Training Sequence-To-Sequence Model For Machine Translation, Vivek Sah Jan 2017

An Alternative Approach To Training Sequence-To-Sequence Model For Machine Translation, Vivek Sah

Honors Theses

Machine translation is a widely researched topic in the field of Natural Language Processing and most recently, neural network models have been shown to be very effective at this task. The model, called sequence-to-sequence model, learns to map an input sequence in one language to a vector of fixed dimensionality and then map that vector to an output sequence in another language without any human intervention provided that there is enough training data. Focusing on English-French translation, in this paper, I present a way to simplify the learning process by replacing English input sentences by word-by-word translation of those sentences. …


Differential Equations Models Of Pathogen-Induced Single- And Multi-Organ Tissue Damage, Fiona Lynch Jan 2017

Differential Equations Models Of Pathogen-Induced Single- And Multi-Organ Tissue Damage, Fiona Lynch

Honors Theses

The rise of antibiotic resistance has created a significant burden on healthcare systems around the world. Antibiotic resistance arises from the increased use of antibiotic drugs and antimicrobial agents, which kill susceptible bacterial strains, but have little effect on strains that have a mutation allowing them to survive antibiotic treatment, defined as “resistant” strains. With no non-resistant bacteria to compete for resources, the resistant bacteria thrives in this environment, continuing to reproduce and infect the host with an infection that does not respond to traditional antibiotic treatment.

A number of strategies have been proposed to tackle the problem of antibiotic …


Toward A Scientific Investigation Of Convolutional Neural Networks, Anh Tran Jan 2017

Toward A Scientific Investigation Of Convolutional Neural Networks, Anh Tran

Honors Theses

This thesis does not assume the reader is familiar with artificial neural networks. However, to keep the thesis concise, it assumes the reader is familiar with the standard Machine Learning concepts of training set, validation set, and test set [1]. Their usage is intended to help ensure that the Machine Learning system can generalize its training from input examples used during its training to “similar” kinds of examples never used during its training.

The concept of a Convolutional Neural Network (CNN) is one of the most successful computational concepts today for solving image classification problems. However, CNNs are difficult and …


Utilizing Natural Language Processing And Other Technical Tools To Automate The Financial Modeling Process While Maintaining Robustness In The Model, Robert Forrest Short Jan 2017

Utilizing Natural Language Processing And Other Technical Tools To Automate The Financial Modeling Process While Maintaining Robustness In The Model, Robert Forrest Short

Honors Theses

The objective of this thesis is to improve upon the most commonly utilized, entirely manual financial modeling process. This thesis gives guidance for implementing a set of technical tools that can be utilized in an individual's financial modeling process to automate repetitive and predictable tasks. The goal is not to provide a robust set of tools that can be implemented across all financial models; in fact, this may not be possible. The goal is to provide a basis for anyone who utilizes financial modeling to study their own modeling processes and adapt the given tools to fit into and improve …


Correcting Pedestrian Dead Reckoning With Monte Carlo Localization Boxed For Indoor Navigation, Akira T. Murphy Jan 2017

Correcting Pedestrian Dead Reckoning With Monte Carlo Localization Boxed For Indoor Navigation, Akira T. Murphy

Honors Theses

Localization of phones is a ubiquitous part of the modern mobile electronics landscape. However, there are many situations where the current method of networked localization fails. A Pedestrian Dead Reckoning System where the location of the user is calculated by counting the steps and direction of the user was implemented as an iOS app with python for data analysis. A novel algorithm for wireless sensor localization using Ad-Hoc Bluetooth networks was proposed. A small experiment was performed proving that the system is nearly equal to state of the art algorithms.


Normal Surfaces And 3-Manifold Algorithms, Josh D. Hews Jan 2017

Normal Surfaces And 3-Manifold Algorithms, Josh D. Hews

Honors Theses

This survey will develop the theory of normal surfaces as they apply to the S3 recognition algorithm. Sections 2 and 3 provide necessary background on manifold theory. Section 4 presents the theory of normal surfaces in triangulations of 3-manifolds. Section 6 discusses issues related to implementing algorithms based on normal surfaces, as well as an overview of the Regina, a program that implements many 3-manifold algorithms. Finally section 7 presents the proof of the 3-sphere recognition algorithm and discusses how Regina implements the algorithm.


Procedural Generation: An Algorithmic Analysis Of Video Game Design And Level Creation, Logan Bond Jan 2017

Procedural Generation: An Algorithmic Analysis Of Video Game Design And Level Creation, Logan Bond

Honors Theses

Procedural generation is a method for generating mass quantities of data algorithmically rather than manually. One perfect example of this is the recently famous No Man’s Sky, a video game where the entire marketing scheme was structured around its procedurally generated universe. The game’s trailer and advertisements promised its players 18,446,744,073,709,551,616 unique planets[1], all of which were procedurally generated. In other words, the developers did not create exclusive profiles for every single planet, but instead programmed the game in such a way that the planets were built from the code. This method of content creation is the …


Differential Privacy For Growing Databases, Gi Heung (Robin) Kim Jan 2017

Differential Privacy For Growing Databases, Gi Heung (Robin) Kim

Honors Theses

Differential privacy [DMNS06] is a strong definition of database privacy that provides indi- viduals in a database with the guarantee that any particular person’s information has very little effect on the output of any analysis of the overall database. In order for this type of analysis to be practical, it must simultaneously preserve privacy and utility, where utility refers to how well the analysis describes the contents of the database.

An analyst may additionally wish to evaluate how a database’s composition changes over time. Consider a company, for example, that accumulates data from a growing base of customers. This company …


Identity Theft: A Look Into Preventing Decades Of Damages, Mallory Monaco Jan 2017

Identity Theft: A Look Into Preventing Decades Of Damages, Mallory Monaco

Honors Theses

Each year identity theft victimizes more people, taking their time, money, and feeling of financial and physical security. Despite its ongoing presence in the news and media, this fraud is too often treated in a reactive manner. Due to the lack of prevention of identity theft, its negative consequences range from damaging one’s credit score for decades to cases of medical identity theft incorrectly altering a patient’s medical records and causing potentially life threatening complications. This thesis examines four major types of identity theft, including medical identity theft, credit card fraud, consumer data breaches, and the identity theft associated with …


The Ping-Pong Project, Adhithya Ravishankar Jan 2017

The Ping-Pong Project, Adhithya Ravishankar

Honors Theses

Table Tennis, more commonly referred to as ping pong, has been a sport of the elite for over two centuries since its inception in the late 1800s. However, coaching for this sport is not usually taught in most places, and many do not know how to play this sport. To democratize the sport, and make it more accessible to everyone, this program was designed to analyze a player's game and to give suggestions and recommendations to improve it. Using hard coded rules and tests, this program is designed to coach someone by detecting and measuring the speed and the spin …