Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- The College of Wooster (5)
- Claremont Colleges (4)
- East Tennessee State University (4)
- University of Tennessee, Knoxville (3)
- Air Force Institute of Technology (2)
-
- California Polytechnic State University, San Luis Obispo (2)
- Georgia Southern University (2)
- City University of New York (CUNY) (1)
- Colby College (1)
- Kennesaw State University (1)
- Mississippi State University (1)
- Murray State University (1)
- Portland State University (1)
- Rollins College (1)
- The University of Akron (1)
- University of Denver (1)
- University of Kentucky (1)
- University of Montana (1)
- University of New Hampshire (1)
- University of North Florida (1)
- University of Wisconsin Milwaukee (1)
- Utah State University (1)
- Western University (1)
- Keyword
-
- Mathematics (6)
- Computer Science (4)
- Machine Learning (4)
- Combinatorics (3)
- Graph Theory (3)
-
- Algorithms (2)
- Game (2)
- Graph (2)
- Graph theory (2)
- Optimization (2)
- Statistics (2)
- 49 Calculus of variations and optimal control; optimization (1)
- 53 Differential geometry (1)
- 62-07 (1)
- 62-09 (1)
- 68 Computer science (1)
- 68-04 (1)
- AI (1)
- Academic -- UNF -- Master of Science in Mathematical Science; Dissertations (1)
- Academic -- UNF -- Mathematics; Finite State Automata; Regular Languages; Subword Closure; Involution Mappings; Strictly Locally Testable Languages; DNA Code Words (1)
- Adaptively Weighted Discriminator Generative Adversarial Network (1)
- Applied Mathematics (1)
- Approximation (Mathematics) (1)
- Art (1)
- Art vectorization (1)
- Artificial Intelligence (1)
- Assorted-Time Normalization (1)
- BCH Codes (1)
- Bakry Emery curvature (1)
- Balance (1)
- Publication Year
- Publication
-
- Electronic Theses and Dissertations (7)
- Senior Independent Study Theses (5)
- Theses and Dissertations (4)
- HMC Senior Theses (3)
- Master's Theses (2)
-
- All Graduate Plan B and other Reports, Spring 1920 to Spring 2023 (1)
- CMC Senior Theses (1)
- Chancellor’s Honors Program Projects (1)
- Dissertations, Theses, and Capstone Projects (1)
- Doctoral Dissertations (1)
- Electronic Thesis and Dissertation Repository (1)
- Graduate Student Theses, Dissertations, & Professional Papers (1)
- Honors Program Theses (1)
- Honors Theses (1)
- Honors Theses and Capstones (1)
- Master of Science in Computer Science Theses (1)
- Masters Theses (1)
- Murray State Theses and Dissertations (1)
- Theses and Dissertations--Mathematics (1)
- UNF Graduate Theses and Dissertations (1)
- University Honors Theses (1)
- Williams Honors College, Honors Research Projects (1)
Articles 1 - 30 of 38
Full-Text Articles in Other Mathematics
Signings Of Graphs And Sign-Symmetric Signed Graphs, Ahmad Asiri
Signings Of Graphs And Sign-Symmetric Signed Graphs, Ahmad Asiri
Theses and Dissertations
In this dissertation, we investigate various aspects of signed graphs, with a particular focus on signings and sign-symmetric signed graphs. We begin by examining the complete graph on six vertices with one edge deleted ($K_6$\textbackslash e) and explore the different ways of signing this graph up to switching isomorphism. We determine the frustration index (number) of these signings and investigate the existence of sign-symmetric signed graphs. We then extend our study to the $K_6$\textbackslash 2e graph and the McGee graph with exactly two negative edges. We investigate the distinct ways of signing these graphs up to switching isomorphism and demonstrate …
Novel Architectures And Optimization Algorithms For Training Neural Networks And Applications, Vasily I. Zadorozhnyy
Novel Architectures And Optimization Algorithms For Training Neural Networks And Applications, Vasily I. Zadorozhnyy
Theses and Dissertations--Mathematics
The two main areas of Deep Learning are Unsupervised and Supervised Learning. Unsupervised Learning studies a class of data processing problems in which only descriptions of objects are known, without label information. Generative Adversarial Networks (GANs) have become among the most widely used unsupervised neural net models. GAN combines two neural nets, generative and discriminative, that work simultaneously. We introduce a new family of discriminator loss functions that adopts a weighted sum of real and fake parts, which we call adaptive weighted loss functions. Using the gradient information, we can adaptively choose weights to train a discriminator in the direction …
Finding Optimal Cayley Map Embeddings Using Genetic Algorithms, Jacob Buckelew
Finding Optimal Cayley Map Embeddings Using Genetic Algorithms, Jacob Buckelew
Honors Program Theses
Genetic algorithms are a commonly used metaheuristic search method aimed at solving complex optimization problems in a variety of fields. These types of algorithms lend themselves to problems that can incorporate stochastic elements, which allows for a wider search across a search space. However, the nature of the genetic algorithm can often cause challenges regarding time-consumption. Although the genetic algorithm may be widely applicable to various domains, it is not guaranteed that the algorithm will outperform other traditional search methods in solving problems specific to particular domains. In this paper, we test the feasibility of genetic algorithms in solving a …
Local-Global Results On Discrete Structures, Alexander Lewis Stevens
Local-Global Results On Discrete Structures, Alexander Lewis Stevens
Electronic Theses and Dissertations
Local-global arguments, or those which glean global insights from local information, are central ideas in many areas of mathematics and computer science. For instance, in computer science a greedy algorithm makes locally optimal choices that are guaranteed to be consistent with a globally optimal solution. On the mathematical end, global information on Riemannian manifolds is often implied by (local) curvature lower bounds. Discrete notions of graph curvature have recently emerged, allowing ideas pioneered in Riemannian geometry to be extended to the discrete setting. Bakry- Émery curvature has been one such successful notion of curvature. In this thesis we use combinatorial …
Highlights Generation For Tennis Matches Using Computer Vision, Natural Language Processing And Audio Analysis, Alon Liberman
Highlights Generation For Tennis Matches Using Computer Vision, Natural Language Processing And Audio Analysis, Alon Liberman
Senior Independent Study Theses
This project uses computer vision, natural language processing and audio analysis to automatize the highlights generation task for tennis matches. Computer vision techniques such as camera shot detection, hough transform and neural networks are used to extract the time intervals of the points. To detect the best points, three approaches are used. Point length suggests which points correspond to rallies and aces. The audio waves are analyzed to search for the highest audio peaks, which indicate the moments where the crowd cheers the most. Sentiment analysis, a natural language processing technique, is used to look for points where the commentators …
Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa
Decoding Cyclic Codes Via Gröbner Bases, Eduardo Sosa
Honors Theses
In this paper, we analyze the decoding of cyclic codes. First, we introduce linear and cyclic codes, standard decoding processes, and some standard theorems in coding theory. Then, we will introduce Gr¨obner Bases, and describe their connection to the decoding of cyclic codes. Finally, we go in-depth into how we decode cyclic codes using the key equation, and how a breakthrough by A. Brinton Cooper on decoding BCH codes using Gr¨obner Bases gave rise to the search for a polynomial-time algorithm that could someday decode any cyclic code. We discuss the different approaches taken toward developing such an algorithm and …
Stroke Clustering And Fitting In Vector Art, Khandokar Shakib
Stroke Clustering And Fitting In Vector Art, Khandokar Shakib
Senior Independent Study Theses
Vectorization of art involves turning free-hand drawings into vector graphics that can be further scaled and manipulated. In this paper, we explore the concept of vectorization of line drawings and study multiple approaches that attempt to achieve this in the most accurate way possible. We utilize a software called StrokeStrip to discuss the different mathematics behind the parameterization and fitting involved in the drawings.
Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman
Realtime Event Detection In Sports Sensor Data With Machine Learning, Mallory Cashman
Honors Theses and Capstones
Machine learning models can be trained to classify time series based sports motion data, without reliance on assumptions about the capabilities of the users or sensors. This can be applied to predict the count of occurrences of an event in a time period. The experiment for this research uses lacrosse data, collected in partnership with SPAITR - a UNH undergraduate startup developing motion tracking devices for lacrosse. Decision Tree and Support Vector Machine (SVM) models are trained and perform with high success rates. These models improve upon previous work in human motion event detection and can be used a reference …
Reinforcement Learning: Low Discrepancy Action Selection For Continuous States And Actions, Jedidiah Lindborg
Reinforcement Learning: Low Discrepancy Action Selection For Continuous States And Actions, Jedidiah Lindborg
Electronic Theses and Dissertations
In reinforcement learning the process of selecting an action during the exploration or exploitation stage is difficult to optimize. The purpose of this thesis is to create an action selection process for an agent by employing a low discrepancy action selection (LDAS) method. This should allow the agent to quickly determine the utility of its actions by prioritizing actions that are dissimilar to ones that it has already picked. In this way the learning process should be faster for the agent and result in more optimal policies.
Modeling The Spread Of Covid-19 Over Varied Contact Networks, Ryan L. Solorzano
Modeling The Spread Of Covid-19 Over Varied Contact Networks, Ryan L. Solorzano
Master's Theses
When attempting to mitigate the spread of an epidemic without the use of a vaccine, many measures may be made to dampen the spread of the disease such as physically distancing and wearing masks. The implementation of an effective test and quarantine strategy on a population has the potential to make a large impact on the spread of the disease as well. Testing and quarantining strategies become difficult when a portion of the population are asymptomatic spreaders of the disease. Additionally, a study has shown that randomly testing a portion of a population for asymptomatic individuals makes a small impact …
Development Of Novel Compound Controllers To Reduce Chattering Of Sliding Mode Control, Mehran Rahmani
Development Of Novel Compound Controllers To Reduce Chattering Of Sliding Mode Control, Mehran Rahmani
Theses and Dissertations
The robotics and dynamic systems constantly encountered with disturbances such as micro electro mechanical systems (MEMS) gyroscope under disturbances result in mechanical coupling terms between two axes, friction forces in exoskeleton robot joints, and unmodelled dynamics of robot manipulator. Sliding mode control (SMC) is a robust controller. The main drawback of the sliding mode controller is that it produces high-frequency control signals, which leads to chattering. The research objective is to reduce chattering, improve robustness, and increase trajectory tracking of SMC. In this research, we developed controllers for three different dynamic systems: (i) MEMS, (ii) an Exoskeleton type robot, and …
Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto
Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto
University Honors Theses
In my thesis, I describe the work done to implement several Group Theory concepts in the context of the Rubik’s cube. A simulation of the cube was constructed using Processing-Java and with help from a YouTube series done by TheCodingTrain. I reflect on the struggles and difficulties that came with creating this program along with the inspiration behind the project. The concepts that are currently implemented at this time are: Identity, Associativity, Order, and Inverses. The functionality of the cube is described as it moves like a regular cube but has extra keypresses that demonstrate the concepts listed. Each concept …
Role Of Influence In Complex Networks, Nur Dean
Role Of Influence In Complex Networks, Nur Dean
Dissertations, Theses, and Capstone Projects
Game theory is a wide ranging research area; that has attracted researchers from various fields. Scientists have been using game theory to understand the evolution of cooperation in complex networks. However, there is limited research that considers the structure and connectivity patterns in networks, which create heterogeneity among nodes. For example, due to the complex ways most networks are formed, it is common to have some highly “social” nodes, while others are highly isolated. This heterogeneity is measured through metrics referred to as “centrality” of nodes. Thus, the more “social” nodes tend to also have higher centrality.
In this thesis, …
A Mathematical Analysis Of The Game Of Santorini, Carson Clyde Geissler
A Mathematical Analysis Of The Game Of Santorini, Carson Clyde Geissler
Senior Independent Study Theses
Santorini is a two player combinatorial board game. Santorini bears resemblance to the graph theory game of Geography, a game of moving and deleting vertices on a graph. We explore Santorini with game theory, complexity theory, and artificial intelligence. We present David Lichtenstein’s proof that Geography is PSPACE-hard and adapt the proof for generalized forms of Santorini. Last, we discuss the development of an AI built for a software implementation of Santorini and present a number of improvements to that AI.
Maximality And Applications Of Subword-Closed Languages, Rhys Davis Jones
Maximality And Applications Of Subword-Closed Languages, Rhys Davis Jones
UNF Graduate Theses and Dissertations
Characterizing languages D that are maximal with the property that D* ⊆ S⊗ is an important problem in formal language theory with applications to coding theory and DNA codewords. Given a finite set of words of a fixed length S, the constraint, we consider its subword closure, S⊗, the set of words whose subwords of that fixed length are all in the constraint. We investigate these maximal languages and present characterizations for them. These characterizations use strongly connected components of deterministic finite automata and lead to polynomial time algorithms for generating such languages. We prove that …
Hybrid Recommender Systems Via Spectral Learning And A Random Forest, Alyssa Williams
Hybrid Recommender Systems Via Spectral Learning And A Random Forest, Alyssa Williams
Electronic Theses and Dissertations
We demonstrate spectral learning can be combined with a random forest classifier to produce a hybrid recommender system capable of incorporating meta information. Spectral learning is supervised learning in which data is in the form of one or more networks. Responses are predicted from features obtained from the eigenvector decomposition of matrix representations of the networks. Spectral learning is based on the highest weight eigenvectors of natural Markov chain representations. A random forest is an ensemble technique for supervised learning whose internal predictive model can be interpreted as a nearest neighbor network. A hybrid recommender can be constructed by first …
A Dual State Hierarchical Ensemble Kalman Filter Algorithm, William J. Cook, Jesse Johnson, Marko Maneta, Doug Brinkerhoff
A Dual State Hierarchical Ensemble Kalman Filter Algorithm, William J. Cook, Jesse Johnson, Marko Maneta, Doug Brinkerhoff
Graduate Student Theses, Dissertations, & Professional Papers
Dynamic models that simulate processes across large geographic locations, such as hydrologic models, are often informed by empirical parameters that are distributed across a geographical area and segmented by geological features such as watersheds. These parameters may be referred to as spatially distributed parameters. Spatially distributed parameters are frequently spatially correlated and any techniques utilized in their calibration ideally incorporate existing spatial hierarchical relationships into their structure. In this paper, a parameter estimation method based on the Dual State Ensemble Kalman Filter called the Dual State Hierarchical Ensemble Kalman Filter (DSHEnKF) is presented. This modified filter is innovative in that …
Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier
Text Classification Of Installation Support Contract Topic Models For Category Management, William C. Sevier
Theses and Dissertations
Air Force Installation Contracting Agency manages nearly 18 percent of total Air Force spend, equating to approximately 57 billion dollars. To improve strategic sourcing, the organization is beginning to categorize installation-support spend and assign accountable portfolio managers to respective spend categories. A critical task in this new strategic environment includes the appropriate categorization of Air Force contracts into newly created, manageable spend categories. It has been recognized that current composite categories have the opportunity to be further distinguished into sub-categories leveraging text analytics on the contract descriptions. Furthermore, upon establishing newly constructed categories, future contracts must be classified into these …
Sports Analytics With Computer Vision, Colby T. Jeffries
Sports Analytics With Computer Vision, Colby T. Jeffries
Senior Independent Study Theses
Computer vision in sports analytics is a relatively new development. With multi-million dollar systems like STATS’s SportVu, professional basketball teams are able to collect extremely fine-detailed data better than ever before. This concept can be scaled down to provide similar statistics collection to college and high school basketball teams. Here we investigate the creation of such a system using open-source technologies and less expensive hardware. In addition, using a similar technology, we examine basketball free throws to see whether a shooter’s form has a specific relationship to a shot’s outcome. A system that learns this relationship could be used to …
Logic -> Proof -> Rest, Maxwell Taylor
Logic -> Proof -> Rest, Maxwell Taylor
Senior Independent Study Theses
REST is a common architecture for networked applications. Applications that adhere to the REST constraints enjoy significant scaling advantages over other architectures. But REST is not a panacea for the task of building correct software. Algebraic models of computation, particularly CSP, prove useful to describe the composition of applications using REST. CSP enables us to describe and verify the behavior of RESTful systems. The descriptions of each component can be used independently to verify that a system behaves as expected. This thesis demonstrates and develops CSP methodology to verify the behavior of RESTful applications.
Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore
Efficiently Representing The Integer Factorization Problem Using Binary Decision Diagrams, David Skidmore
All Graduate Plan B and other Reports, Spring 1920 to Spring 2023
Let p be a prime positive integer and let α be a positive integer greater than 1. A method is given to reduce the problem of finding a nontrivial factorization of α to the problem of finding a solution to a system of modulo p polynomial congruences where each variable in the system is constrained to the set {0,...,p − 1}. In the case that p = 2 it is shown that each polynomial in the system can be represented by an ordered binary decision diagram with size less than 20.25log2(α)3 + 16.5log2(α)2 + …
Vertex Weighted Spectral Clustering, Mohammad Masum
Vertex Weighted Spectral Clustering, Mohammad Masum
Electronic Theses and Dissertations
Spectral clustering is often used to partition a data set into a specified number of clusters. Both the unweighted and the vertex-weighted approaches use eigenvectors of the Laplacian matrix of a graph. Our focus is on using vertex-weighted methods to refine clustering of observations. An eigenvector corresponding with the second smallest eigenvalue of the Laplacian matrix of a graph is called a Fiedler vector. Coefficients of a Fiedler vector are used to partition vertices of a given graph into two clusters. A vertex of a graph is classified as unassociated if the Fiedler coefficient of the vertex is close to …
Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson
Neural Network Predictions Of A Simulation-Based Statistical And Graph Theoretic Study Of The Board Game Risk, Jacob Munson
Murray State Theses and Dissertations
We translate the RISK board into a graph which undergoes updates as the game advances. The dissection of the game into a network model in discrete time is a novel approach to examining RISK. A review of the existing statistical findings of skirmishes in RISK is provided. The graphical changes are accompanied by an examination of the statistical properties of RISK. The game is modeled as a discrete time dynamic network graph, with the various features of the game modeled as properties of the network at a given time. As the network is computationally intensive to implement, results are produced …
The Document Similarity Network: A Novel Technique For Visualizing Relationships In Text Corpora, Dylan Baker
The Document Similarity Network: A Novel Technique For Visualizing Relationships In Text Corpora, Dylan Baker
HMC Senior Theses
With the abundance of written information available online, it is useful to be able to automatically synthesize and extract meaningful information from text corpora. We present a unique method for visualizing relationships between documents in a text corpus. By using Latent Dirichlet Allocation to extract topics from the corpus, we create a graph whose nodes represent individual documents and whose edge weights indicate the distance between topic distributions in documents. These edge lengths are then scaled using multidimensional scaling techniques, such that more similar documents are clustered together. Applying this method to several datasets, we demonstrate that these graphs are …
Combinatorial Polynomial Hirsch Conjecture, Sam Miller
Combinatorial Polynomial Hirsch Conjecture, Sam Miller
HMC Senior Theses
The Hirsch Conjecture states that for a d-dimensional polytope with n facets, the diameter of the graph of the polytope is at most n-d. This conjecture was disproven in 2010 by Francisco Santos Leal. However, a polynomial bound in n and d on the diameter of a polytope may still exist. Finding a polynomial bound would provide a worst-case scenario runtime for the Simplex Method of Linear Programming. However working only with polytopes in higher dimensions can prove challenging, so other approaches are welcome. There are many equivalent formulations of the Hirsch Conjecture, one of which is the …
Triple Non-Negative Matrix Factorization Technique For Sentiment Analysis And Topic Modeling, Alexander A. Waggoner
Triple Non-Negative Matrix Factorization Technique For Sentiment Analysis And Topic Modeling, Alexander A. Waggoner
CMC Senior Theses
Topic modeling refers to the process of algorithmically sorting documents into categories based on some common relationship between the documents. This common relationship between the documents is considered the “topic” of the documents. Sentiment analysis refers to the process of algorithmically sorting a document into a positive or negative category depending whether this document expresses a positive or negative opinion on its respective topic. In this paper, I consider the open problem of document classification into a topic category, as well as a sentiment category. This has a direct application to the retail industry where companies may want to scour …
Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri
Definition Of A Method For The Formulation Of Problems To Be Solved With High Performance Computing, Ramya Peruri
Master of Science in Computer Science Theses
Computational power made available by current technology has been continuously increasing, however today’s problems are larger and more complex and demand even more computational power. Interest in computational problems has also been increasing and is an important research area in computer science. These complex problems are solved with computational models that use an underlying mathematical model and are solved using computer resources, simulation, and are run with High Performance Computing. For such computations, parallel computing has been employed to achieve high performance. This thesis identifies families of problems that can best be solved using modelling and implementation techniques of parallel …
An Algorithm For The Machine Calculation Of Minimal Paths, Robert Whitinger
An Algorithm For The Machine Calculation Of Minimal Paths, Robert Whitinger
Electronic Theses and Dissertations
Problems involving the minimization of functionals date back to antiquity. The mathematics of the calculus of variations has provided a framework for the analytical solution of a limited class of such problems. This paper describes a numerical approximation technique for obtaining machine solutions to minimal path problems. It is shown that this technique is applicable not only to the common case of finding geodesics on parameterized surfaces in R3, but also to the general case of finding minimal functionals on hypersurfaces in Rn associated with an arbitrary metric.
A Survey On Hadamard Matrices, Adam J. Laclair
A Survey On Hadamard Matrices, Adam J. Laclair
Chancellor’s Honors Program Projects
No abstract provided.
The Apprentices' Tower Of Hanoi, Cory Bh Ball
The Apprentices' Tower Of Hanoi, Cory Bh Ball
Electronic Theses and Dissertations
The Apprentices' Tower of Hanoi is introduced in this thesis. Several bounds are found in regards to optimal algorithms which solve the puzzle. Graph theoretic properties of the associated state graphs are explored. A brief summary of other Tower of Hanoi variants is also presented.