Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Applied Mathematics

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 811 - 840 of 7988

Full-Text Articles in Physical Sciences and Mathematics

Lorentzian Polynomials, Higher Hessians, And The Hodge-Riemann Property For Codimension Two Graded Artinian Gorenstein Algebras, Pedro Macias-Marques, Chris Mcdaniel, Alexandra Seceleanu, Junzo Watanabe Aug 2022

Lorentzian Polynomials, Higher Hessians, And The Hodge-Riemann Property For Codimension Two Graded Artinian Gorenstein Algebras, Pedro Macias-Marques, Chris Mcdaniel, Alexandra Seceleanu, Junzo Watanabe

Department of Mathematics: Faculty Publications

We study the Hodge-Riemann property (HRP) for graded Artinian Gorenstein (AG) algebras. We classify AG algebras in codimension two that have HRP in terms of higher Hessian matrices and positivity of Schur functions associated to certain rectangular partitions.

In this paper we introduce the Hodge Riemann property (HRP) on an arbitrary graded oriented Artinian Gorenstein (AG) algebra defined over R, and we give a criterion on the higher Hessian matrix of its Macaulay dual generator (Theorem 3.1). AG algebras can be regarded as algebraic analogues of cohomology rings (in even degrees) of complex manifolds, and the HRP is analogous to …


Polynomial Growth Of Betti Sequences Over Local Rings, Luchezar L. Avramov, Alexandra Seceleanu, Zheng Yang Aug 2022

Polynomial Growth Of Betti Sequences Over Local Rings, Luchezar L. Avramov, Alexandra Seceleanu, Zheng Yang

Department of Mathematics: Faculty Publications

We study sequences of Betti numbers (βRi (M)) of finite modules M over a complete intersection local ring, R. It is known that for every M the subsequence with even, respectively, odd indices i is eventually given by some polynomial in i. We prove that these polynomials agree for all R-modules if the ideal I generated by the quadratic relations of the associated graded ring of R satisfies height I ≥ codim R − 1, and that the converse holds when R is homogeneous and when codim R ≤ 4. Avramov, …


Low-Gain Integral Control For A Class Of Discrete-Time Lur’E Systems With Applications To Sampled-Data Control, Chris Guiver, Richard Rebarber, Stuart Townley Aug 2022

Low-Gain Integral Control For A Class Of Discrete-Time Lur’E Systems With Applications To Sampled-Data Control, Chris Guiver, Richard Rebarber, Stuart Townley

Department of Mathematics: Faculty Publications

We study low-gain (P)roportional (I)ntegral control of multivariate discrete-time, forced Lur’e systems to solve the output-tracking problem for constant reference signals. We formulate an incremental sector condition which is sufficient for a usual linear low-gain PI controller to achieve exponential disturbance-to-state and disturbance-to-tracking-error stability in closed-loop, for all sufficiently small integrator gains. Output tracking is achieved in the absence of exogenous disturbance (noise) terms. Our line of argument invokes a recent circle criterion for exponential incremental input-to-state stability. The discrete-time theory facilitates a similar result for a continuous-time forced Lur’e system in feedback with sampled-data low-gain integral control. The theory …


Debiasing Cyber Incidents – Correcting For Reporting Delays And Under-Reporting, Seema Sangari Aug 2022

Debiasing Cyber Incidents – Correcting For Reporting Delays And Under-Reporting, Seema Sangari

Doctor of Data Science and Analytics Dissertations

This research addresses two key problems in the cyber insurance industry – reporting delays and under-reporting of cyber incidents. Both problems are important to understand the true picture of cyber incident rates. While reporting delays addresses the problem of delays in reporting due to delays in timely detection, under-reporting addresses the problem of cyber incidents frequently under-reported due to brand damage, reputation risk and eventual financial impacts.

The problem of reporting delays in cyber incidents is resolved by generating the distribution of reporting delays and fitting modeled parametric distributions on the given domain. The reporting delay distribution was found to …


Machine Learning Model Comparison And Arma Simulation Of Exhaled Breath Signals Classifying Covid-19 Patients, Aaron Christopher Segura Aug 2022

Machine Learning Model Comparison And Arma Simulation Of Exhaled Breath Signals Classifying Covid-19 Patients, Aaron Christopher Segura

Mathematics & Statistics ETDs

This study compared the performance of machine learning models in classifying COVID-19 patients using exhaled breath signals and simulated datasets. Ground truth classification was determined by the gold standard Polymerase Chain Reaction (PCR) test results. A residual bootstrapped method generated the simulated datasets by fitting signal data to Autoregressive Moving Average (ARMA) models. Classification models included neural networks, k-nearest neighbors, naïve Bayes, random forest, and support vector machines. A Recursive Feature Elimination (RFE) study was performed to determine if reducing signal features would improve the classification models performance using Gini Importance scoring for the two classes. The top 25% of …


Robust Uncertainty Quantification With Analysis Of Error In Standard And Non-Standard Quantities Of Interest, Zachary Stevens Aug 2022

Robust Uncertainty Quantification With Analysis Of Error In Standard And Non-Standard Quantities Of Interest, Zachary Stevens

Mathematics & Statistics ETDs

This thesis derives two Uncertainty Quantification (UQ) methods for differential equations that depend on random parameters: (\textbf{i}) error bounds for a computed cumulative distribution function (\textbf{ii}) a multi-level Monte Carlo (MLMC) algorithm with adaptively refined meshes and accurately computed stopping-criteria. Both UQ approaches utilize adjoint-based \textit{a posteriori} error analysis in order to accurately estimate the error in samples of numerically approximated quantities of interest. The adaptive MLMC algorithm developed in this thesis relies on the adjoint-based error analysis to adaptively create meshes and accurately monitor a stopping criteria. This is in contrast to classical MLMC algorithms which employ either a …


Human Perception Of Exponentially Increasing Data Displayed On A Log Scale Evaluated Through Experimental Graphics Tasks, Emily Robinson Aug 2022

Human Perception Of Exponentially Increasing Data Displayed On A Log Scale Evaluated Through Experimental Graphics Tasks, Emily Robinson

Department of Statistics: Dissertations, Theses, and Student Work

Log scales are often used to display data over several orders of magnitude within one graph. We conducted a series of three graphical studies to evaluate the impact displaying data on the log scale has on human perception of exponentially increasing trends compared to displaying data on the linear scale. Each study was related to a different graphical task, each requiring a different level of interaction and cognitive use of the data being presented. The first experiment evaluated whether our ability to perceptually notice differences in exponentially increasing trends is impacted by the choice of scale. Participants were shown a …


Automating Defeasible Reasoning In Law With Answer Set Programming, How Khang Lim, Avishkar Mahajar, Martin Strecker, Meng Weng Wong Aug 2022

Automating Defeasible Reasoning In Law With Answer Set Programming, How Khang Lim, Avishkar Mahajar, Martin Strecker, Meng Weng Wong

Centre for Computational Law

The paper studies defeasible reasoning in rule-based systems, in particular about legal norms and contracts. We identify rule modifiers that specify how rules interact and how they can be overridden. We then define rule transformations that eliminate these modifiers, leading in the end to a translation of rules to formulas. For reasoning with and about rules, we contrast two approaches, one in a classical logic with SMT solvers, which is only briefly sketched, and one using non-monotonic logic with Answer Set Programming solvers, described in more detail.


Bridge Trisections And Classical Knotted Surface Theory, Jason Joseph, Jeffrey Meier, Maggie Miller, Miller Zupan Aug 2022

Bridge Trisections And Classical Knotted Surface Theory, Jason Joseph, Jeffrey Meier, Maggie Miller, Miller Zupan

Department of Mathematics: Faculty Publications

We seek to connect ideas in the theory of bridge trisections with other wellstudied facets of classical knotted surface theory. First, we show how the normal Euler number can be computed from a tri-plane diagram, and we use this to give a trisection-theoretic proof of the Whitney–Massey theorem, which bounds the possible values of this number in terms of the Euler characteristic. Second, we describe in detail how to compute the fundamental group and related invariants from a tri-plane diagram, and we use this, together with an analysis of bridge trisections of ribbon surfaces, to produce an infinite family of …


Symbolic Power Containments In Singular Rings In Positive Characteristic, Eloísa Grifo, Linquan Ma, Karl Schwede Aug 2022

Symbolic Power Containments In Singular Rings In Positive Characteristic, Eloísa Grifo, Linquan Ma, Karl Schwede

Department of Mathematics: Faculty Publications

The containment problem for symbolic and ordinary powers of ideals asks for what values of a and b we have I(a)⊆Ib. Over a regular ring, a result by Ein-Lazarsfeld-Smith, Hochster-Huneke, and Ma-Schwede partially answers this question, but the containments it provides are not always best possible. In particular, a tighter containment conjectured by Harbourne has been shown to hold for interesting classes of ideals - although it does not hold in general. In this paper, we develop a Fedder (respectively, Glassbrenner) type criterion for F-purity (respectively, strong F-regularity) for ideals of finite projective dimension over F-finite Gorenstein rings and use …


Stability And Differential Privacy Of Stochastic Gradient Methods, Zhenhuan Yang Aug 2022

Stability And Differential Privacy Of Stochastic Gradient Methods, Zhenhuan Yang

Legacy Theses & Dissertations (2009 - 2024)

Recently there are a considerable amount of work devoted to the study of the algorithmic stability as well as differential privacy (DP) for stochastic gradient methods (SGM). However, most of the existing work focus on the empirical risk minimization (ERM) and the population risk minimization problems. In this paper, we study two types of optimization problems that enjoy wide applications in modern machine learning, namely the minimax problem and the pairwise learning problem.


Dimension And Ramsey Results In Partially Ordered Sets., Sida Wan Aug 2022

Dimension And Ramsey Results In Partially Ordered Sets., Sida Wan

Electronic Theses and Dissertations

In this dissertation, there are two major parts. One is the dimension results on different classes of partially ordered sets. We developed new tools and theorems to solve the bounds on interval orders using different number of lengths. We also discussed the dimension of interval orders that have a representation with interval lengths in a certain range. We further discussed the interval dimension and semi dimension for posets. In the second part, we discussed several related results on the Ramsey theory of grids, the results involve the application of Product Ramsey Theorem and Partition Ramsey Theorem


Cross-Validation For Autoregressive Models., Christina Han Aug 2022

Cross-Validation For Autoregressive Models., Christina Han

Electronic Theses and Dissertations

There are no set rules for choosing the lag order for autoregressive (AR) time series models. Currently, the most common methods employ AIC or BIC. However, AIC has been proven to be inconsistent and BIC is inefficient. Racine proposed an estimator based on Shao's work which he hypothesized would also be consistent, but left the proof as an open problem. We will show his claim does not follow immediately from Shao. However, Shao offered another consistent method for cross validation of linear models called APCV, and we will show that AR models satisfy Shao's conditions. Thus, APCV is a consistent …


A New Sir Model With Mobility., Ciana Applegate Aug 2022

A New Sir Model With Mobility., Ciana Applegate

Electronic Theses and Dissertations

In this paper, a mobility-based SIR model is built to understand the spread of the pandemic. A traditional SIR model used in epidemiology describes the transition of particles among states, such as susceptible, infected, and recovered states. However, the traditional model has no movement of particles. There are many variations of SIR models when it comes to the factor of mobility, the majority of studies use mobility intensity or population density as a measure of mobility. In this paper, a new dynamical SIR model, including the spatial motion of three-type particles, is constructed and the long-time behavior of the first …


Ocean Wave Prediction And Characterization For Intelligent Maritime Transportation, Pujan Pokhrel Aug 2022

Ocean Wave Prediction And Characterization For Intelligent Maritime Transportation, Pujan Pokhrel

University of New Orleans Theses and Dissertations

The national Earth System Prediction (ESPC) initiative aims to develop the predictions
for the next generation predictions of atmosphere, ocean, and sea-ice interactions in the scale of days to decades. This dissertation seeks to demonstrate the methods we can use to improve the ESPC models, especially the ocean prediction model. In the application side of the weather forecasts, this dissertation explores imitation learning with constraints to solve combinatorial optimization problems, focusing on the weather routing of surface vessels. Prediction of ocean waves is essential for various purposes, including vessel routing, ocean energy harvesting, agriculture, etc. Since the machine learning approaches …


Could Cultures Determine The Course Of Epidemics And Explain Waves Of Covid-19?, Md Salman Rahman Aug 2022

Could Cultures Determine The Course Of Epidemics And Explain Waves Of Covid-19?, Md Salman Rahman

Theses and Dissertations

Coronavirus Disease (COVID-19), caused by the SARS-CoV-2 virus, is an infectious disease that quickly became a pandemic spreading with different patterns in each country. Travel bans, lockdowns, social distancing, and non-essential business closures caused significant economic disruptions and stalled growth worldwide in the pandemic’s first year. In almost every country, public health officials forced and/or encouraged Nonpharmaceutical Interventions (NPIs) such as contact tracing, social distancing, masks, and quarantine. Human behavioral decision-making regarding social isolation significantly impedes global success in containing the pandemic. This thesis focuses on human behaviors and cultures related to the decision-making of social isolation during the pandemic. …


Cohomology Of The Symmetric Group With Twisted Coefficients And Quotients Of The Braid Group, Trevor Nakamura Aug 2022

Cohomology Of The Symmetric Group With Twisted Coefficients And Quotients Of The Braid Group, Trevor Nakamura

Graduate Theses and Dissertations

In 2014 Brendle and Margalit proved the level $4$ congruence subgroup of the braid group, $B_{n}[4]$, is the subgroup of the pure braid group generated by squares of all elements, $PB_{n}^{2}$. We define the mod $4$ braid group, $\Z_{n}$, to be the quotient of the braid group by the level 4 congruence subgroup, $B_{n}/B_{n}[4]$. In this dissertation we construct a group presentation for $\Z_{n}$ and determine a normal generating set for $B_{n}[4]$ as a subgroup of the braid group. Further work by Kordek and Margalit in 2019 proved $\Z_{n}$ is an extension of the symmetric group, $S_{n}$, by $\mathbb{Z}_{2}^{\binom{n}{2}}$. A …


Efficiency Of Homomorphic Encryption Schemes, Kyle Yates Aug 2022

Efficiency Of Homomorphic Encryption Schemes, Kyle Yates

All Theses

In 2009, Craig Gentry introduced the first fully homomorphic encryption scheme using bootstrapping. In the 13 years since, a large amount of research has gone into improving efficiency of homomorphic encryption schemes. This includes implementing leveled homomorphic encryption schemes for practical use, which are schemes that allow for some predetermined amount of additions and multiplications that can be performed on ciphertexts. These leveled schemes have been found to be very efficient in practice. In this thesis, we will discuss the efficiency of various homomorphic encryption schemes. In particular, we will see how to improve sizes of parameter choices in homomorphic …


From Points To Potlucks: An Exploration Of Fixed Point Theorems With Applications To Game Theory Models Of Successful Integration Practices, Llewellyn Searing Aug 2022

From Points To Potlucks: An Exploration Of Fixed Point Theorems With Applications To Game Theory Models Of Successful Integration Practices, Llewellyn Searing

Honors College

Potlucks have many names: shared community dinners, faith suppers, “bring-a-dish” dinners, etc. They represent the desire to share food with other people and make new friends, sometimes learning about other cultures in the process. Not only does one have to decide what dish to bring, but one must also decide how large of a dish, if there will be a theme, and what course it will fit. For instance, if everyone brings side dishes, there will not be enough food for everyone, and if someone brings food that most of the group cannot eat, then feelings will be hurt on …


Relationships Between Covid-19 Infection Rates, Healthcare Access, Socioeconomic Status, And Cultural Diversity, Marghece P. J. Barnes Aug 2022

Relationships Between Covid-19 Infection Rates, Healthcare Access, Socioeconomic Status, And Cultural Diversity, Marghece P. J. Barnes

Boise State University Theses and Dissertations

The COVID-19 pandemic has had a disproportionate impact on racial and ethnic minority groups, with high infection rates throughout those communities. There are a complex set of factors that account for COVID-19 disparities. Focusing on infection and death rates alone without also examining health equity, underestimates the true impact of the pandemic. To gain a more clear understanding of COVID-19’s impact in these communities, we analyzed the relationship between state COVID-19 infection rates with social determinants of health: cultural diversity, health care access, and socioeconomic status. Our approach to identifying this relationship was to estimate infection rates by fitting John …


Optimal First Order Methods For Reducing Gradient Norm In Unconstrained Convex Smooth Optimization, Yunheng Jiang Aug 2022

Optimal First Order Methods For Reducing Gradient Norm In Unconstrained Convex Smooth Optimization, Yunheng Jiang

All Theses

In this thesis, we focus on convergence performance of first-order methods to compute an $\epsilon$-approximate solution of minimizing convex smooth function $f$ at the $N$-th iteration.

In our introduction of the above research question, we first introduce the gradient descent method with constant step size $h=1/L$. The gradient descent method has a $\mathcal{O}(L^2\|x_0-x^*\|^2/\epsilon)$ convergence with respect to $\|\nabla f(x_N)\|^2$. Next we introduce Nesterov’s accelerated gradient method, which has an $\mathcal{O}(L\|x_0-x^*\|\sqrt{1/\epsilon})$ complexity in terms of $\|\nabla f(x_N)\|^2$. The convergence performance of Nesterov’s accelerated gradient method is much better than that of the gradient descent method but still not optimal. We also …


Utilization Of Finite Element Analysis Techniques For Adolescent Idiopathic Scoliosis Surgical Planning, Michael A. Polanco Aug 2022

Utilization Of Finite Element Analysis Techniques For Adolescent Idiopathic Scoliosis Surgical Planning, Michael A. Polanco

Mechanical & Aerospace Engineering Theses & Dissertations

Adolescent Idiopathic Scoliosis, a three-dimensional deformity of the thoracolumbar spine, affects approximately 1-3% of patients ages 10-18. Surgical correction and treatment of the spinal column is a costly and high-risk task that is consistently complicated by factors such as patient-specific spinal deformities, curve flexibility, and surgeon experience. The following dissertation utilizes finite element analysis to develop a cost-effective, building-block approach by which surgical procedures and kinematic evaluations may be investigated. All studies conducted are based off a volumetric, thoracolumbar finite element (FE) model developed from computer-aided design (CAD) anatomy whose components are kinematically validated with in-vitro data. Spinal ligament stiffness …


Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan Aug 2022

Evaluation Of Generative Models For Predicting Microstructure Geometries In Laser Powder Bed Fusion Additive Manufacturing, Andy Ramlatchan

Computer Science Theses & Dissertations

In-situ process monitoring for metals additive manufacturing is paramount to the successful build of an object for application in extreme or high stress environments. In selective laser melting additive manufacturing, the process by which a laser melts metal powder during the build will dictate the internal microstructure of that object once the metal cools and solidifies. The difficulty lies in that obtaining enough variety of data to quantify the internal microstructures for the evaluation of its physical properties is problematic, as the laser passes at high speeds over powder grains at a micrometer scale. Imaging the process in-situ is complex …


Inexact Fixed-Point Proximity Algorithms For Nonsmooth Convex Optimization, Jin Ren Aug 2022

Inexact Fixed-Point Proximity Algorithms For Nonsmooth Convex Optimization, Jin Ren

Mathematics & Statistics Theses & Dissertations

The aim of this dissertation is to develop efficient inexact fixed-point proximity algorithms with convergence guaranteed for nonsmooth convex optimization problems encountered in data science. Nonsmooth convex optimization is one of the core methodologies in data science to acquire knowledge from real-world data and has wide applications in various fields, including signal/image processing, machine learning and distributed computing. In particular, in the context of image reconstruction, compressed sensing and sparse machine learning, either the objective functions or the constraints of the modeling optimization problems are nondifferentiable. Hence, traditional methods such as the gradient descent method and the Newton method are …


Academic Hats And Ice Cream: Two Optimization Problems, Valery F. Ochkov, Yulia V. Chudova Jul 2022

Academic Hats And Ice Cream: Two Optimization Problems, Valery F. Ochkov, Yulia V. Chudova

Journal of Humanistic Mathematics

This article describes the use of computer software to optimize the design of an academic hat and an ice cream cone!


Maintaining Ecosystem And Economic Structure In A Three-Species Dynamical System In Chesapeake Bay, Maila Hallare, Iordanka Panayotova Jul 2022

Maintaining Ecosystem And Economic Structure In A Three-Species Dynamical System In Chesapeake Bay, Maila Hallare, Iordanka Panayotova

CODEE Journal

We consider a three-species fish dynamical system in Chesapeake Bay consisting of the Atlantic menhaden as the prey and its two competing predators, the striped bass and the catfish. Building on our previous work in this system, we consider the issue of balancing economic harvesting goals (financial gain for fishermen) with ecological harvesting goals (non-extinction of species). In particular, we investigate the bionomic equilibria, maximum sustainable yield, and the maximum economic yield. Analytical computations and numerical simulations are employed to provide some mathematical guidance on fisheries management policies.


Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa Jul 2022

Computational Models To Detect Radiation In Urban Environments: An Application Of Signal Processing Techniques And Neural Networks To Radiation Data Analysis, Jose Nicolas Gachancipa

Beyond: Undergraduate Research Journal

Radioactive sources, such as uranium-235, are nuclides that emit ionizing radiation, and which can be used to build nuclear weapons. In public areas, the presence of a radioactive nuclide can present a risk to the population, and therefore, it is imperative that threats are identified by radiological search and response teams in a timely and effective manner. In urban environments, such as densely populated cities, radioactive sources may be more difficult to detect, since background radiation produced by surrounding objects and structures (e.g., buildings, cars) can hinder the effective detection of unnatural radioactive material. This article presents a computational model …


Bbt Acoustic Alternative Top Bracing Cadd Data Set-Norev-2022jun28, Bill Hemphill Jul 2022

Bbt Acoustic Alternative Top Bracing Cadd Data Set-Norev-2022jun28, Bill Hemphill

STEM Guitar Project’s BBT Acoustic Kit

This electronic document file set consists of an overview presentation (PDF-formatted) file and companion video (MP4) and CADD files (DWG & DXF) for laser cutting the ETSU-developed alternate top bracing designs and marking templates for the STEM Guitar Project’s BBT (OM-sized) standard acoustic guitar kit. The three (3) alternative BBT top bracing designs in this release are
(a) a one-piece base for the standard kit's (Martin-style) bracing,
(b) 277 Ladder-style bracing, and
(c) an X-braced fan-style bracing similar to traditional European or so-called 'classical' acoustic guitars.

The CADD data set for each of the three (3) top bracing designs includes …


Mathematics Textbook: Motivation, Experiences, And Didactical Aspect From Authors’ Perspectives, Deepak Basyal, Bhesh Raj Mainali Jul 2022

Mathematics Textbook: Motivation, Experiences, And Didactical Aspect From Authors’ Perspectives, Deepak Basyal, Bhesh Raj Mainali

Mathematics and Statistics

Textbooks play a vital role in the Nepali education system since they are one of the main resources for teaching and learning mathematics. Because of poor physical infrastructure and inadequate educational resources, both teachers and students heavily rely on textbooks. In this regard, this study investigated the mathematics textbook authors' experiences and motivation, and what types of didactical knowledge were utilised while writing textbooks. A convenient yet purposeful sampling method was utilised to select four participants. The data analysis unveiled that each textbook author had different types of motivation and experiences, and only one participant was aware of the ideas …


A Progress Report On Numerical Methods For Bgk-Type Kinetic Equations, Evan Habbershaw, Steven M. Wise Jul 2022

A Progress Report On Numerical Methods For Bgk-Type Kinetic Equations, Evan Habbershaw, Steven M. Wise

Faculty Publications and Other Works -- Mathematics

In this report we review some preliminary work on the numerical solution of BGK-type kinetic equations of particle transport. Such equations model the motion of fluid particles via a density field when the kinetic theory of rarefied gases must be used in place of the continuum limit Navier-Stokes and Euler equations. The BGK-type equations describe the fluid in terms of phase space variables, and, in three space dimensions, require 6 independent phase-space variables (3 for space and 3 for velocity) for accurate simulation. This requires sophisticated numerical algorithms and efficient code to realize predictions over desired space and time scales. …