Unpublished Writings From Audio Magazine: Proposed Series Chapter 3, 2013 Columbia College Chicago

#### Unpublished Writings From Audio Magazine: Proposed Series Chapter 3, Richard C. Heyser, Douglas R. Jones Ed.

*Douglas R Jones*

This is the third in a series of seven articles written by Richard C. Heyser in 1983. Heyser originally intended to publish this work in AUDIO magazine. This updated version has been edited and annotated by Douglas R. Jones.

Unpublished Writings From Audio Magazine: Proposed Series Chapter 1 And 2, 2013 Columbia College Chicago

#### Unpublished Writings From Audio Magazine: Proposed Series Chapter 1 And 2, Richard C. Heyser, Douglas R. Jones Ed.

*Douglas R Jones*

These are the first two in a series of seven articles written by Richard C. Heyser in 1983. Heyser originally intended to publish this work in AUDIO magazine. This updated version has been edited and annotated by Douglas R. Jones.

Unpublished Writings From Audio Magazine: Proposed Series Chapter 4, 2013 Columbia College Chicago

#### Unpublished Writings From Audio Magazine: Proposed Series Chapter 4, Richard C. Heyser, Douglas R. Jones Ed.

*Douglas R Jones*

This is the fourth in a series of seven articles written by Richard C. Heyser in 1983. Heyser originally intended to publish this work in AUDIO magazine. This updated version has been edited and annotated by Douglas R. Jones.

Unpublished Writings From Audio Magazine: Proposed Series Chapter 5, 2013 Columbia College Chicago

#### Unpublished Writings From Audio Magazine: Proposed Series Chapter 5, Richard C. Heyser, Douglas R. Jones Ed.

*Douglas R Jones*

This is the fifth in a series of seven articles written by Richard C. Heyser in 1983. Heyser originally intended to publish this work in AUDIO magazine. This updated version has been edited and annotated by Douglas R. Jones.

Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, 2013 Indian Institute of Technology

#### Grayscale-Image Encryption Using Random Hill Cipher Over Sln(F) Associated With Discrete Wavelet Transformation, D. C. Mishra, R. K. R. K. Sharma

*Applications and Applied Mathematics: An International Journal (AAM)*

Image data are highly sensitive and prone to incidental decoding by intruders. The security of image data in an insecure network is therefore a major issue. In this paper, we have presented a novel approach for grayscale-image encryption and decryption using Random Hill cipher over SLn(F) associated with discrete wavelet transformation. Earlier techniques for encryption and decryption of image data discussed missing the keys, but in this approach, both the keys and the arrangement of RHC are emphasized. Additionally, keys multiplication side (pre or post) over a grayscale-image data matrix also inevitable to know, to correctly decrypt the encrypted ...

The Two-Phase Arterial Blood Flow With Or Without A Catheter And In The Presence Of A Single Or Multi Stenosis, 2013 University of Texas-Pan American

#### The Two-Phase Arterial Blood Flow With Or Without A Catheter And In The Presence Of A Single Or Multi Stenosis, Ani E. Garcia, Daniel N. Riahi

*Applications and Applied Mathematics: An International Journal (AAM)*

We consider the problem of blood flow in an artery with or without a catheter and in the presence of single or multi stenosis whose shape is based on the available experimental data for the stenosis in a human’s artery. The presence of stenosis in the artery, which locally narrows portion of the artery, can be a result of fatty materials such as cholesterol in the blood. The use of catheter is important as a standard tool for diagnosis and treatment in patience whose blood flow passage in the artery is affected adversely by the presence of the stenosis ...

Numerical Solution Of Fuzzy Arbitrary Order Predator-Prey Equations, 2013 National Institute of Technology Rourkela

#### Numerical Solution Of Fuzzy Arbitrary Order Predator-Prey Equations, Smita Tapaswini, S. Chakraverty

*Applications and Applied Mathematics: An International Journal (AAM)*

This paper seeks to investigate the numerical solution of fuzzy arbitrary order predator-prey equations using the Homotopy Perturbation Method (HPM). Fuzziness in the initial conditions is taken to mean convex normalised fuzzy sets viz. triangular fuzzy number. Comparisons are made between crisp solution given by others and fuzzy solution in special cases. The results obtained are depicted in plots and tables to demonstrate the efficacy and powerfulness of the methodology.

Spread Of Malicious Objects In Computer Network: A Fuzzy Approach, 2013 Birla Institute of Technology

#### Spread Of Malicious Objects In Computer Network: A Fuzzy Approach, Bimal K. Mishra, Apeksha Prajapati

*Applications and Applied Mathematics: An International Journal (AAM)*

We propose an e-epidemic fuzzy SEIQRS (Susceptible-Exposed-Infectious-Quarantine- Recovered-Susceptible) model for the transmission of malicious codes in a computer network. We have simulated the result for various parameters and analyzed the stability of the model. The efficiency of antivirus software and crashing of the nodes due to attack of malicious code is analyzed. Furthermore, initial simulation results illustrate the behavior of different classes for minimizing the infection in a computer network. It also reflects the positive impact of anti-virus software on malicious code propagation in a computer network. The basic reproduction number R0 f and its formulation is also discussed.

Thinking Aloud In The Science Classroom: Can A Literacy Strategy Increase Student Learning In Science?, 2013 Portland State University

#### Thinking Aloud In The Science Classroom: Can A Literacy Strategy Increase Student Learning In Science?, Lindsey Joan Mockel

*Dissertations and Theses*

This research study investigated the effect of using the think aloud protocol while reading informational text on students' ability to learn from text in a secondary science classroom. The participants in this study were high school students (n=47) in three classes of a mixed-grade Integrated Biology, Chemistry, and Physics course. The study tracked student achievement during a four-week curriculum unit on the theory of evolution and evidence for biological evolution. All students received instruction on using the think aloud protocol, and all students practiced the think aloud protocol when reading short articles related to scientific evidence for evolution. The ...

On Fuzzy Soft Matrix Based On Reference Function, 2013 University of New Mexico

#### On Fuzzy Soft Matrix Based On Reference Function, Florentin Smarandache, Said Broumi, Mamoni Dhar

*Mathematics and Statistics Faculty and Staff Publications*

In this paper we study fuzzy soft matrix based on reference function. Firstly, we define some new operations such as fuzzy soft complement matrix and trace of fuzzy soft matrix based on reference function. Then, we introduced some related properties, and some examples are given. Lastly, we define a new fuzzy soft matrix decision method based on reference function.

Accuracy Analysis Of Parallel Method Based On Non-Overlapping Domain Decomposition Method, 2013 Hanyang University

#### Accuracy Analysis Of Parallel Method Based On Non-Overlapping Domain Decomposition Method, Moonho Tak, Yooseob Song, Hye-Kwan Jeon, Taehyo Park

*Civil Engineering Faculty Publications and Presentations*

In this paper, an accuracy analysis of parallel method based on non-overlapping domain decomposition method is carried out. In this approach, proposed by Tak et al.(2013), the decomposed subdomains do not overlap each other and the connection between adjacent subdomains is determined via simple connective finite element named interfacial element. This approach has two main advantages. The first is that a direct method such as gauss elimination is available even in a singular problem because the singular stiffness matrix from floating domain can be converted to invertible matrix by assembling the interfacial element. The second is that computational time ...

Relations Between Distorted And Original Angles In Str, 2013 University of New Mexico

#### Relations Between Distorted And Original Angles In Str, Florentin Smarandache

*Mathematics and Statistics Faculty and Staff Publications*

Using the Oblique-Length Contraction Factor, which is a generalization of Lorentz Contraction Factor, one shows several trigonometric relations between distorted and original angles of a moving object lengths in the Special Theory of Relativity.

Air-Quality And Climatic Consequences Of Bioenergy Crop Cultivation, 2013 Portland State University

#### Air-Quality And Climatic Consequences Of Bioenergy Crop Cultivation, William Christian Porter

*Dissertations and Theses*

Bioenergy is expected to play an increasingly significant role in the global energy budget. In addition to the use of liquid energy forms such as ethanol and biodiesel, electricity generation using processed energy crops as a partial or full coal alternative is expected to increase, requiring large-scale conversions of land for the cultivation of bioenergy feedstocks such as cane, grasses, or short rotation coppice. With land-use change identified as a major contributor to changes in the emission of biogenic volatile organic compounds (BVOCs), many of which are known contributors to the pollutants ozone (O_{3}) and fine particulate matter (PM ...

Uranian Moon Investigation With “Hitchhiker” Small Spacecraft, 2013 SelectedWorks

#### Uranian Moon Investigation With “Hitchhiker” Small Spacecraft, Jeremy Straub, Tyler Hill, Josh Berk, Nick Long

*Jeremy Straub*

This poster presents a mission concept for exploring the Uranian moon system utilizing two 6-U (30 cm x 20 cm x 10 cm, 8 kg) CubeSat spacecraft which will be deployed from and relay their communications to Earth through a primary spacecraft. This primary spacecraft, part of the Gap- Based Expanding Outer Region Geophysical Explorer (GEORGE) Mission, will initially work in concert with the 6-U CubeSats to create a gravity map of Uranus. Once this is completed, the spacecraft will re-dock so that the primary craft can move the two 6-U CubeSats to their orbit around Miranda to perform imaging ...

Investigating Uranus With George: The Gap-Based Expanding Outer Region Geophysical Explorer Mission, 2013 SelectedWorks

#### Investigating Uranus With George: The Gap-Based Expanding Outer Region Geophysical Explorer Mission, Jeremy Straub, Josh Berk, Tyler Hill, Nick Long

*Jeremy Straub*

This paper presents an overview of a two-part mission to Uranus and its moons. Key questions about the Uranian system remain unanswered which can and should be resolved by this mission. These include gaining an understanding about the offset of Uranus’s magnetic field and its axial tilt. Additional details about the composition and formation of Uranus’s moons are also desired. The mission will be comprised of a primary craft and three 6-U CubeSats. The CubeSats will initially be deployed in Uranian orbit to perform a characterization of the gravity field of the planet. They will then be moved ...

Acceptance Of The Autonomy Required For Interplanetary Small Spacecraft Missions By The Scientists Who Will Use The Data, 2013 SelectedWorks

#### Acceptance Of The Autonomy Required For Interplanetary Small Spacecraft Missions By The Scientists Who Will Use The Data, Jeremy Straub

*Jeremy Straub*

Small spacecraft operating at a distance from Earth are constrained by communications in several ways. The delay between message trans- mission, receipt at Earth, and eventual receipt of a reply can be significant. Further, gain and transmission power limitations (introduced by spacecraft form factor constraints and the resulting limitation on antenna size and power generation capabilities) constrain the amount of data that can be sent and received. This drives a need for mission autonomy: a requirement that the spacecraft be able to manage its own operations and choose the data that it should collect and transmit, based on high-level instructions ...

Hilbert Space Theory And Applications In Basic Quantum Mechanics, 2013 California Polytechnic State University, San Luis Obispo

#### Hilbert Space Theory And Applications In Basic Quantum Mechanics, Matthew Gagne

*Mathematics*

We explore the basic mathematical physics of quantum mechanics. Our primary focus will be on Hilbert space theory and applications as well as the theory of linear operators on Hilbert space. We show how Hermitian operators are used to represent quantum observables and investigate the spectrum of various linear operators. We discuss deviation and uncertainty and briefly suggest how symmetry and representations are involved in quantum theory.

Global Dynamics Of A Water-Borne Disease Model With Multiple Transmission Pathways, 2013 Shibpur Sri Ramkrishna Vidyalaya

#### Global Dynamics Of A Water-Borne Disease Model With Multiple Transmission Pathways, Prasanta K. Mondal, T. K. Kar

*Applications and Applied Mathematics: An International Journal (AAM)*

We propose and analyze a water born disease model introducing water-to-person and person-toperson transmission and saturated incidence. The disease-free equilibrium and the existence criterion of endemic equilibrium are investigated. Trans critical bifurcation at the disease-free equilibrium is obtained when the basic reproductive number is one. The local stability of both the equilibria is shown and a Lyapunov functional approach is also applied to explore the global stability of the system around the equilibria. We display the effects of pathogen contaminated water and infection through contact on the system dynamics in the absence of person-to-person contact as well as in the ...

Scalars And Generating Bases For The Module Of Splines With Boundary Conditions C(R;0)(I, 2013 Syracuse University

#### Scalars And Generating Bases For The Module Of Splines With Boundary Conditions C(R;0)(I, Gordon Michael Jones

*Syracuse University Honors Program Capstone Projects*

See Full Document for Abstract

Level Crossing Times In Mathematical Finance, 2013 East Tennessee State University

#### Level Crossing Times In Mathematical Finance, Ofosuhene Osei

*Electronic Theses and Dissertations*

Level crossing times and their applications in finance are of importance, given certain threshold levels that represent the "desirable" or "sell" values of a stock. In this thesis, we make use of Wald's lemmas and various deep results from renewal theory, in the context of finance, in modelling the growth of a portfolio of stocks. Several models are employed .