Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Mathematics

2005

Discipline
Institution
Publication
Publication Type

Articles 1 - 15 of 15

Full-Text Articles in Physical Sciences and Mathematics

When A Mechanical Model Goes Nonlinear, Lisa D. Humphreys, P. J. Mckenna Dec 2005

When A Mechanical Model Goes Nonlinear, Lisa D. Humphreys, P. J. Mckenna

Faculty Publications

This paper had its origin in a curious discovery by the first author in research performed with an undergraduate student. The following odd fact was noticed: when a mechanical model of a suspension bridge (linear near equilibrium but allowed to slacken at large distance in one direction) is shaken with a low-frequency periodic force, several different periodic responses can result, many with high-frequency components.


Looking Beyond The Curriculum In Jamaica, Jon T. Jacobsen, Michael E. Orrison Jr. Dec 2005

Looking Beyond The Curriculum In Jamaica, Jon T. Jacobsen, Michael E. Orrison Jr.

All HMC Faculty Publications and Research

In August 2004, we had the opportunity to travel to Jamaica to lead a pilot workshop for Jamaican high school math teachers. The workshop focused on the importance of mathematical context in the teaching of mathematics. It was sponsored by the Gibraltar Institute, a Jamaica-based nongovernmental organization led by Trevor Campbell (Pomona College) and Reginald Nugent (Cal State Pomona), Jamaica’s College of Agriculture, Science and Education, and Harvey Mudd College.


Mathematical Functions: An Interactive Emodule, Sarah Jean Moody Dec 2005

Mathematical Functions: An Interactive Emodule, Sarah Jean Moody

Undergraduate Honors Capstone Projects

The National Library of Virtual Manipulatives (NLVM, http://nlvm.usu.edu/) is a widely used and highly praised teaching/learning resource for school mathematics. The NLVM is the result of a four-year USU project, funded primarily by the National Science Foundation, Award #9819107, to create a web-based, freely accessible, library of interactive virtual manipulatives to help students learn basic mathematics concepts. During a typical school day, the NLVM server receives more than 3 million hits.


Work In Progress: The Wsu Model For Engineering Mathematics Education, Nathan W. Klingbeil, Richard Mercer, Kuldip S. Rattan, Michael L. Raymer, David B. Reynolds Oct 2005

Work In Progress: The Wsu Model For Engineering Mathematics Education, Nathan W. Klingbeil, Richard Mercer, Kuldip S. Rattan, Michael L. Raymer, David B. Reynolds

Kno.e.sis Publications

This paper summarizes progress to date on the WSU model for engineering mathematics education, an NSF funded curriculum reform initiative at Wright State University. The WSU model seeks to increase student retention, motivation and success in engineering through application-driven, just-in-time engineering math instruction. The WSU approach involves the development of a novel freshman-level engineering mathematics course EGR 101, as well as a large-scale restructuring of the engineering curriculum. By removing traditional math prerequisites and moving core engineering courses earlier in the program, the WSU model shifts the traditional emphasis on math prerequisite requirements to an emphasis on engineering motivation for …


A Survey On Intrusion Detection Approaches, A Murali M. Rao Aug 2005

A Survey On Intrusion Detection Approaches, A Murali M. Rao

International Conference on Information and Communication Technologies

Intrusion detection plays one of the key roles in computer security techniques and is one of the prime areas of research. Usages of computer network services are tremendously increasing day by day and at the same time intruders are also playing a major role to deny network services, compromising the crucial services for Email, FTP and Web. Realizing the importance of the problem due to intrusions, many researchers have taken up research in this area and have proposed several solutions. It has come to a stage to take a stock of the research results and project a comprehensive view so …


G-Value Decoding Of Greedy Codes, Khalil Ahmad Aug 2005

G-Value Decoding Of Greedy Codes, Khalil Ahmad

International Conference on Information and Communication Technologies

Error-correcting codes are widely used to increase the reliability of transmission of information over various forms of communication channels. Codes with a given minimum distance d can be constructed by a greedy algorithm [2]. In this paper, I proposed a new algorithm for the allocation of g-values to the binary vectors. Hamming (7, 4, 3) code can be generated by the application of greedy algorithm on the binary vectors of length 7 arranged in B-ordering. This code is used to demonstrate a new decoding technique for linear codes in addition to the schemes already known for decoding such as Syndrome …


Statistical Properties Of Thompson's Group And Random Pseudo Manifolds, Benjamin M. Woodruff Jun 2005

Statistical Properties Of Thompson's Group And Random Pseudo Manifolds, Benjamin M. Woodruff

Theses and Dissertations

The first part of our work is a statistical and geometric study of properties of Thompson's Group F. We enumerate the number of elements of F which are represented by a reduced pair of n-caret trees, and give asymptotic estimates. We also discuss the effects on word length and number of carets of right multiplication by a standard generator x0 or x1. We enumerate the average number of carets along the left edge of an n-caret tree, and use an Euler transformation to make some conjectures relating to right multiplication by a generator. We describe a computer algorithm which produces …


Σary, Minnesota State University Moorhead, Mathematics Department May 2005

Σary, Minnesota State University Moorhead, Mathematics Department

Math Department Newsletters

No abstract provided.


Hand-Held Calculators And Mathematics Achievement: What The 1996 National Assessment Of Educational Progress Eighth-Grade Mathematics Exam Scores Tell Us, Kenneth L. Wareham May 2005

Hand-Held Calculators And Mathematics Achievement: What The 1996 National Assessment Of Educational Progress Eighth-Grade Mathematics Exam Scores Tell Us, Kenneth L. Wareham

All Graduate Theses and Dissertations, Spring 1920 to Summer 2023

The purpose of this study was to analyze the 1996 National Assessment of Educational Progress data to identify the relationship between calculator use and student performance on the National Assessment of Educational Progress Mathematics Assessment. This general purpose includes several sub issues. In addition to being interested in the overall relationship between use and National Assessment of Educational Progress achievement (including the effort to control for spurious factors), this study examined the contextual factors that moderate the impact of calculator use. Similarly, it analyzed the relationship between calculator use and student performance on calculator-allowed and calculator-restricted items, as well as …


Some Nonparametric And Semiparametric Methods For Discriminant Analysis., Anil Kumar Ghosh Dr. Apr 2005

Some Nonparametric And Semiparametric Methods For Discriminant Analysis., Anil Kumar Ghosh Dr.

Doctoral Theses

Discriminant analysis (see e.g., Devijver and Kittler, 1982; Duda, Hart and Stork, 2000; Hastle, Tibahirani and Friedman, 2001) deals with the separation of different groups of obaervationa and allocation of a new oboervation to one of the previously delined grouga. In a J-class discriminant analysis problem, we usually hae a training sample of the form {(xk, ck) : k = 1,2,...,N}, where xk = (Ik1,Ik2,...J) is a d-dimensional measarement vector, and ca € {1,2,...,J} is its class label. On the basis of thia training sample, one aims to form a decision rule d(x) : Rd + (1,2,...,J} for clasifying the …


Developing A B -Tagging Algorithm Using Soft Muons At Level-3 For The Dø Detector At Fermilab, Mayukh Das Apr 2005

Developing A B -Tagging Algorithm Using Soft Muons At Level-3 For The Dø Detector At Fermilab, Mayukh Das

Doctoral Dissertations

The current data-taking phase of the DØ detector at Fermilab, called Run II, is designed to aid the search for the Higgs Boson. The neutral Higgs is postulated to have a mass of 117 GeV. One of the channels promising the presence of this hypothetical particle is through the decay of b-quark into a muon. The process of identifying a b-quark in a jet using muon as a reference is b-tagging with a muon tag.

At the current data taking and analysis rate, it will take long to reach the process of identifying valid events. The triggering mechanism of the …


Cryptographic And Combinatorial Properties Of Boolean Functions And S-Boxes., Kishan Chand Gupta Dr. Feb 2005

Cryptographic And Combinatorial Properties Of Boolean Functions And S-Boxes., Kishan Chand Gupta Dr.

Doctoral Theses

In this thesis we study combinatorial aspects of Boolean functions and S-boxes with impor- tant cryptographic properties and construct new functions possesing such properties. These have possible applications in the design of private key (symmetric key) cryptosystems.Symmetric key cryptosystems are broadly divided into two classes.1. Stream Ciphers,2. Block Ciphers.Some recent proposals of stream ciphers are SNOW [37], SCREAM [52], TURING (98], MUGI (117), HBB (102], RABBIT (9), HELIX (38] and some proposals of block ciphers are DES, AES, RC6 [97), MARS (12], SERPENT (6], TWOFISH (104].In stream cipher cryptography a pseudorandom sequence of bits of length cqual to the message …


On Some Generalized Transforms For Signal Decomposition And Reconstruction., Yumnam Singh Dr. Jan 2005

On Some Generalized Transforms For Signal Decomposition And Reconstruction., Yumnam Singh Dr.

Doctoral Theses

In this thesis, we propose two new subband transforms entitled ISITRA and YKSK transforms and their possible applications in image compression and encryption. Both these transforms are developed based on a common model of multiplication known as Bino’s model of multiplication. ISITRA is a convolution based transforms i.e., that both forward and inverse transform of ISITRA is based on convolution as in DWT or 2-channel filter bank. However, it is much more general than the existing DWT or 2-channel filter bank scheme in the sense that it we can get different kinds of filters in addition to the filters specified …


Flowers Of Ice- Beauty, Symmetry, And Complexity: A Review Of The Snowflake: Winter's Secret Beauty, John A. Adam Jan 2005

Flowers Of Ice- Beauty, Symmetry, And Complexity: A Review Of The Snowflake: Winter's Secret Beauty, John A. Adam

Mathematics & Statistics Faculty Publications

(First paragraph) Growing up as a child in southern England, my early memories of snow include trudging home from school with my father, gazing at the seemingly enormous snowdrifts that smoothed the hedgerows, fields and bushes, while listening to the soft “scrunch” of the snow under my Wellington boots. In the country, snow stretching as far as I could see was not a particularly uncommon sight. The quietness of the land under a foot of snow seemed eerie. I cannot remember the first time I looked at snowflakes per se; my interests as a small child were primarily in their …


Continued Radicals, Jamie Johnson Jan 2005

Continued Radicals, Jamie Johnson

Masters Theses & Specialist Projects

If a1, a2, . . . , an are nonnegative real numbers and fj(x) = paj + x, then f1o f2o· · · fn(0) is a nested radical with terms a1, . . . , an. If it exists, the limit as n ! 1 of such an expression is a continued radical. We consider the set of real numbers S(M) representable as an infinite nested radical whose terms a1, a2, . . . are all from a finite set M. We give conditions on the set M for S(M) to be (a) an interval, and (b) homeomorphic to the …