Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Mathematics

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 18451 - 18480 of 27488

Full-Text Articles in Physical Sciences and Mathematics

Browder-Krasnoselskii-Type Fixed Point Theorems In Banach Spaces, Ravi P. Agarwal, Donal O'Regan Apr 2010

Browder-Krasnoselskii-Type Fixed Point Theorems In Banach Spaces, Ravi P. Agarwal, Donal O'Regan

Mathematics and System Engineering Faculty Publications

We present some fixed point theorems for the sum A+B of a weakly-strongly continuous map and a nonexpansive map on a Banach space X. Our results cover several earlier works by Edmunds, Reinermann, Singh, and others.


Representing Propositional Logic Connectives With Modular Polynomials, Shawn Davis Apr 2010

Representing Propositional Logic Connectives With Modular Polynomials, Shawn Davis

McNair Scholars Research Journal

This paper explores the relationship between n-valued propositional logic connectives and modular polynomials. Namely the representing of logic connectives using modular polynomials. The case for n = 2 is explored and a method is developed for finding the coefficients of the unique polynomial that represents any given binary logic connective. Examples are then given for using the modular polynomial representations of connectives to determine the validity of propositional arguments. A similar procedure is shown for when n = 3 and an evaluation of the axioms of Łukasiewicz’s 3-valued logic is given using modular polynomials. The general case is explored to …


Applying Metric Regularity To Compute Condition Measure Of Smoothing Algorithm For Matrix Games, Boris S. Mordukhovich, Javier Peña, Vera Roshchina Apr 2010

Applying Metric Regularity To Compute Condition Measure Of Smoothing Algorithm For Matrix Games, Boris S. Mordukhovich, Javier Peña, Vera Roshchina

Mathematics Research Reports

Abstract. We develop an approach of variational analysis and generalized differentiation to conditioning issues for two-person zero-sum matrix games. Our major results establish precise relationships between a certain condition measure of the smoothing first-order algorithm proposed in (4] and the exact bound of metric regularity for an associated set-valued mapping. In this way we compute the aforementioned condition measure in terms of the initial matrix game data.


Regressive Functions On Pairs, Andrés Eduardo Caicedo Apr 2010

Regressive Functions On Pairs, Andrés Eduardo Caicedo

Mathematics Faculty Publications and Presentations

We compute an explicit upper bound for the regressive Ramsey numbers by a combinatorial argument, the corresponding function being of Ackermannian growth. For this, we look at the more general problem of bounding g(n, m), the least l such that any regressive function ƒ: [m, l][2]→ℕ admits a min-homogeneous set of size n. Analysis of this function also leads to the simplest known proof that the regressive Ramsey numbers have rate of growth at least Ackermannian. Together, these results give a purely combinatorial proof that, for each m, g …


Least Squares Problems With Inequality Constraints As Quadratic Constraints, Jodi Mead, Rosemary A. Renaut Apr 2010

Least Squares Problems With Inequality Constraints As Quadratic Constraints, Jodi Mead, Rosemary A. Renaut

Mathematics Faculty Publications and Presentations

Linear least squares problems with box constraints are commonly solved to find model parameters within bounds based on physical considerations. Common algorithms include Bounded Variable Least Squares (BVLS) and the Matlab function lsqlin. Here, the goal is to find solutions to ill-posed inverse problems that lie within box constraints. To do this, we formulate the box constraints as quadratic constraints, and solve the corresponding unconstrained regularized least squares problem. Using box constraints as quadratic constraints is an efficient approach because the optimization problem has a closed form solution.

The effectiveness of the proposed algorithm is investigated through solving three …


Determining The Success Of Ncaa Basketball Teams Through Team Characteristics, Raymond Witkos Apr 2010

Determining The Success Of Ncaa Basketball Teams Through Team Characteristics, Raymond Witkos

Honors Projects in Mathematics

Every year much of the nation becomes engulfed in the NCAA basketball postseason tournament more affectionately known as “March Madness.” The tournament has received the name because of the ability for any team to win a single game and advance to the next round. The purpose of this study is to determine whether concrete statistical measures can be used to predict the final outcome of the tournament. The data collected in the study include 13 independent variables ranging from the 2003-2004 season up until the current 2009-2010 season. Different tests were run in an attempt to achieve the most accurate …


Detection Of Outliers In Time Series Data, Samson Sifael Kiware Apr 2010

Detection Of Outliers In Time Series Data, Samson Sifael Kiware

Master's Theses (2009 -)

This thesis presents the detection of time series outliers. The data set used in this work is provided by the GasDay Project at Marquette University, which produces mathematical models to predict the consumption of natural gas for Local Distribution Companies (LDCs). Flow with no outliers is required to develop and train accurate models. GasDay is using statistical approaches motivated by normally distributed samples such as the 3 -sigma rule and the 5 -sigma rule to aid the experts in detecting outliers in residuals from the models. However, the Jarque-Bera statistical test shows that the residuals from the GasDay models are …


Maximal Class Numbers Of Cm Number Fields, Ryan C. Daileda, Raju Krishnamoorthy, Anton Malyshev Apr 2010

Maximal Class Numbers Of Cm Number Fields, Ryan C. Daileda, Raju Krishnamoorthy, Anton Malyshev

Mathematics Faculty Research

Fix a totally real number field F of degree at least 2. Under the assumptions of the generalized Riemann hypothesis and Artin's conjecture on the entirety of Artin L-functions, we derive an upper bound (in terms of the discriminant) on the class number of any CM number field with maximal real subfield F. This bound is a refinement of a bound established by Duke in 2001. Under the same hypotheses, we go on to prove that there exist infinitely many CM-extensions of F whose class numbers essentially meet this improved bound and whose Galois groups are as large …


2010 (Spring), University Of Dayton. Department Of Mathematics Apr 2010

2010 (Spring), University Of Dayton. Department Of Mathematics

Colloquia

Abstracts of the talks given at the 2010 Spring Colloquium.


Bytes Of Π, Spring 2010, Department Of Mathematics And Computer Science, Bridgewater State College Apr 2010

Bytes Of Π, Spring 2010, Department Of Mathematics And Computer Science, Bridgewater State College

Department of Mathematics Newsletter

No abstract provided.


On Construction Of The Smallest One-Sided Confidence Interval For The Difference Of Two Proportions, Weizhen Wang Apr 2010

On Construction Of The Smallest One-Sided Confidence Interval For The Difference Of Two Proportions, Weizhen Wang

Mathematics and Statistics Faculty Publications

For my class of one-sided 1 - α confidence intervals with a certain monotonicity ordering on the random confidence limit, the smallest interval, in the sense of the set inclusion for the difference of two proportions of two independent binomial random variables, is constructed based on a direct analysis of coverage probability function. A special ordering on the confidence limit is developed and the corresponding smallest confidence interval is derived. This interval is then applied to identify the minimum effective dose (MED) for binary data in dose-response studies, and a multiple test procedure that controls the familywise error rate at …


On Calculating Residuated Approximations And The Structure Of Finite Lattices Of Small Width, Wu Feng Apr 2010

On Calculating Residuated Approximations And The Structure Of Finite Lattices Of Small Width, Wu Feng

Doctoral Dissertations

The concept of a residuated mapping relates to the concept of Galois connections; both arise in the theory of partially ordered sets. They have been applied in mathematical theories (e.g., category theory and formal concept analysis) and in theoretical computer science. The computation of residuated approximations between two lattices is influenced by lattice properties, e.g. distributivity.

In previous work, it has been proven that, for any mapping f : L → [special characters omitted] between two complete lattices L and [special characters omitted], there exists a largest residuated mapping ρf dominated by f, and the notion of "the shadow …


Non Bayesian Conditioning And Deconditioning, Jean Dezert, Florentin Smarandache Apr 2010

Non Bayesian Conditioning And Deconditioning, Jean Dezert, Florentin Smarandache

Branch Mathematics and Statistics Faculty and Staff Publications

In this paper, we present a Non-Bayesian conditioning rule for belief revision. This rule is truly Non-Bayesian in the sense that it doesn’t satisfy the common adopted principle that when a prior belief is Bayesian, after conditioning by X, Bel(X|X) must be equal to one. Our new conditioning rule for belief revision is based on the proportional conflict redistribution rule of combination developed in DSmT (Dezert-Smarandache Theory) which abandons Bayes’ conditioning principle. Such Non-Bayesian conditioning allows to take into account judiciously the level of conflict between the prior belief available and the conditional evidence. We also introduce the deconditioning problem …


Signal Recovery From Inaccurate And Incomplete Measurements Via Regularized Orthogonal Matching Pursuit, Deanna Needell, Roman Vershynin Apr 2010

Signal Recovery From Inaccurate And Incomplete Measurements Via Regularized Orthogonal Matching Pursuit, Deanna Needell, Roman Vershynin

CMC Faculty Publications and Research

We demonstrate a simple greedy algorithm that can reliably recover a vector v ?? ??d from incomplete and inaccurate measurements x = ??v + e. Here, ?? is a N x d measurement matrix with Nv with O(n) nonzeros from its inaccurate measurements x in at most n iterations, where each iteration amounts to solving a least squares problem. The noise level of the recovery is proportional to ??{logn} ||e||2. In particular, if the error term e vanishes the reconstruction is exact.


Analysis Of Boolean Functions With High Second Order Nonlinearity, Corneliu A. Bodea Apr 2010

Analysis Of Boolean Functions With High Second Order Nonlinearity, Corneliu A. Bodea

Honors Theses

Highly nonlinear Boolean functions play a central role in the design and security analysis of high speed stream cyphers and block cyphers. We focus on analyzing the structure of Boolean functions that exhibit high second order nonlinearity. We commence with a theoretical overview of Boolean functions and Reed- Muller codes. We then introduce a new equivalence relation, 2-equivalence, for which we prove a number of important properties. Finally, we analyze the second order nonlinearity of concatenations of two Boolean functions.


A Discrete Nonlinear Model Of Resonant Scattering, Katherine Hollister Smith Apr 2010

A Discrete Nonlinear Model Of Resonant Scattering, Katherine Hollister Smith

Honors Theses

No abstract provided.


On The Non-Existence Of A Projective (75, 4,12, 5) Set In Pg(3, 7), Aaron C.S. Chan, James A. Davis, Jonathan Jedwab Apr 2010

On The Non-Existence Of A Projective (75, 4,12, 5) Set In Pg(3, 7), Aaron C.S. Chan, James A. Davis, Jonathan Jedwab

Department of Math & Statistics Faculty Publications

We show by a combination of theoretical argument and computer search that if a projective (75, 4, 12, 5) set in PG(3, 7) exists then its automorphism group must be trivial. This corresponds to the smallest open case of a coding problem posed by H. Ward in 1998, concerning the possible existence of an infinite family of projective two-weight codes meeting the Griesmer bound.


Drawing A Triangle On The Thurston Model Of Hyperbolic Space, Curtis D. Bennett, Blake Mellor, Patrick D. Shanahan Apr 2010

Drawing A Triangle On The Thurston Model Of Hyperbolic Space, Curtis D. Bennett, Blake Mellor, Patrick D. Shanahan

Mathematics, Statistics and Data Science Faculty Works

In looking at a common physical model of the hyperbolic plane, the authors encountered surprising difficulties in drawing a large triangle. Understanding these difficulties leads to an intriguing exploration of the geometry of the Thurston model of the hyperbolic plane. In this exploration we encounter topics ranging from combinatorics and Pick’s Theorem to differential geometry and the Gauss-Bonnet Theorem.


Rao's Quadratic Entropy And Some New Applications, Yueqin Zhao Apr 2010

Rao's Quadratic Entropy And Some New Applications, Yueqin Zhao

Mathematics & Statistics Theses & Dissertations

Many problems in statistical inference are formulated as testing the diversity of populations. The entropy functions measure the similarity of a distribution function to the uniform distribution and hence can be used as a measure of diversity. Rao (1982a) proposed the concept of quadratic entropy. Its concavity property makes the decomposition similar to ANOVA for categorical data feasible. In this thesis, after reviewing the properties and providing a modification to quadratic entropy, various applications of quadratic entropy are explored. First, analysis of quadratic entropy with the suggested modification to analyze the contingency table data is explored. Then its application to …


Section Abstracts: Astronomy, Mathematics, And Physics & Materials Science Apr 2010

Section Abstracts: Astronomy, Mathematics, And Physics & Materials Science

Virginia Journal of Science

Abstracts of papers of the Astronomy, Mathematics, and Physics (Including Materials Science) Section for the 88th Annual Meeting of the Virginia Academy of Science, May 20-21, 2010, James Madison University, Harrisonburg, VA.


Detecting Malicious Javascript, Matthew F. Der Apr 2010

Detecting Malicious Javascript, Matthew F. Der

Honors Theses

The increased use of the World Wide Web and JavaScript as a scripting language for Web pages have made JavaScript a popular attack vector for infecting users' machines with malware. Additionally, attackers often obfuscate their code to avoid detection, which heightens the challenge and complexity of automated defense systems. We present two analyses of malicious scripts and suggest how they could be extended into intrusion detection systems. For our analyses we use a sample of deobfuscated malicious and benign scripts collected from actual Web sites. First, using our malicious sample, we perform a manual analysis of attack signatures, identifying four …


Towards A Formal Theory Of Interoperability, Saikou Y. Diallo Apr 2010

Towards A Formal Theory Of Interoperability, Saikou Y. Diallo

Computational Modeling & Simulation Engineering Theses & Dissertations

This dissertation proposes a formal theory of interoperability that explains 1) what interoperability is as opposed to how it works, 2) how to tell whether two or more systems can interoperate and 3) how to identify whether systems are interoperating or merely exchanging bits and bytes. The research provides a formal model of data in M&S that captures all possible representations of a real or imagined thing and distinguishes between existential dependencies and transformational dependencies. Existential dependencies capture the relationships within a model while transformational dependencies capture the relationships between interactions with a model. These definitions are used to formally …


Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker Apr 2010

Volume 03, Cheryl Peck, Charles Hoever, Longwood Theater Department, Brittany Anderson, J. Ervin Sheldon, Richard Hayden, Yuri Calustro, Candice Fleming, Rebecca Franklin, Ashley Yocum, Danielle M. Jagoda, Cristina M. Valdivieso, Jameka Jones, Amy Ellis, Ashley Maser, Erikk Shupp, Jamie Yurasits, Joshua Davis, Alexander Leonhart, Kenny Wolfe, Sally Meadows, J. Haley, Amy Jackson, Morgan Howard, Adrienne Heinbaugh, Melissa Dorton, Ciarra Stalker

Incite: The Journal of Undergraduate Scholarship

Introduction from Dean Dr. Charles Ross

Little Shop of Horrors by Longwood Theater Department

Who Has the Hottest Hotsauce in Farmville: A Quantitative Comparison of Sauces from Local Restaurants by Cheryl Peck and Charles Hoever

Precipitation Effects on the Growth of White Oaks and Virginia Pines on the Mt. Vernon Plantation by Brittany Anderson

Design and Synthesis of Novel Ion Binding Molecules for Self-Assembly and Sensing Applications by J. Ervin Sheldon

A Statistical Analysis of Algorithms for Playing SameGame by Richard Hayden

Intersecting Cylinders at Arbitrary Angles by Yuri Calustro

Putting a Foot in the Revolving Door: Strategies for Reducing …


Importance Sampling For Dispersion-Managed Solitons, Elaine T. Spiller, Gino Biondini Apr 2010

Importance Sampling For Dispersion-Managed Solitons, Elaine T. Spiller, Gino Biondini

Mathematics, Statistics and Computer Science Faculty Research and Publications

The dispersion-managed nonlinear Schrödinger (DMNLS) equation governs the long-term dynamics of systems which are subject to large and rapid dispersion variations. We present a method to study large, noise-induced amplitude and phase perturbations of dispersion-managed solitons. The method is based on the use of importance sampling to bias Monte Carlo simulations toward regions of state space where rare events of interest—large phase or amplitude variations—are most likely to occur. Implementing the method thus involves solving two separate problems: finding the most likely noise realizations that produce a small change in the soliton parameters, and finding the most likely way that …


Statistical Learning And Behrens-Fisher Distribution Methods For Heteroscedastic Data In Microarray Analysis, Nabin K. Manandhr-Shrestha Mar 2010

Statistical Learning And Behrens-Fisher Distribution Methods For Heteroscedastic Data In Microarray Analysis, Nabin K. Manandhr-Shrestha

USF Tampa Graduate Theses and Dissertations

The aim of the present study is to identify the di®erentially expressed genes be- tween two di®erent conditions and apply it in predicting the class of new samples using the microarray data. Microarray data analysis poses many challenges to the statis- ticians because of its high dimensionality and small sample size, dubbed as "small n large p problem". Microarray data has been extensively studied by many statisticians and geneticists. Generally, it is said to follow a normal distribution with equal vari- ances in two conditions, but it is not true in general. Since the number of replications is very small, …


From Euler To Witten: A Short Survey Of The Volume Conjecture In Knot Theory, Uwe Kaiser Mar 2010

From Euler To Witten: A Short Survey Of The Volume Conjecture In Knot Theory, Uwe Kaiser

Uwe Kaiser

No abstract provided.


Four Kissing Circles, John Hawkins, David Stone Mar 2010

Four Kissing Circles, John Hawkins, David Stone

John B. Hawkins

No abstract provided.


Randomized Kaczmarz Solver For Noisy Linear Systems, Deanna Needell Mar 2010

Randomized Kaczmarz Solver For Noisy Linear Systems, Deanna Needell

CMC Faculty Publications and Research

The Kaczmarz method is an iterative algorithm for solving systems of linear equations Ax=b. Theoretical convergence rates for this algorithm were largely unknown until recently when work was done on a randomized version of the algorithm. It was proved that for overdetermined systems, the randomized Kaczmarz method converges with expected exponential rate, independent of the number of equations in the system. Here we analyze the case where the system Ax=b is corrupted by noise, so we consider the system where Ax is approximately b + r where r is an arbitrary error vector. We prove that in this noisy version, …


Generalized Complex Hamiltonian Torus Actions: Examples And Constraints, Thomas Baird, Yi Lin Mar 2010

Generalized Complex Hamiltonian Torus Actions: Examples And Constraints, Thomas Baird, Yi Lin

Yi Lin

Consider an effective Hamiltonian torus action T×MM on a topologically twisted,generalized complex manifold M of dimension 2n. We prove that the rank(T)≤n−2 and that the topological twisting survives Hamiltonian reduction. We then construct a large new class of such actions satisfying rank(T)=n−2, using a surgery procedure on toric manifolds.


Applications Of Descriptive Set Theory In Homotopy Theory, Samuel M. Corson Mar 2010

Applications Of Descriptive Set Theory In Homotopy Theory, Samuel M. Corson

Theses and Dissertations

This thesis presents new theorems in homotopy theory, in particular it generalizes a theorem of Saharon Shelah. We employ a technique used by Janusz Pawlikowski to show that certain Peano continua have a least nontrivial homotopy group that is finitely presented or of cardinality continuum. We also use this technique to give some relative consistency results.