Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Theses/Dissertations

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1531 - 1560 of 69103

Full-Text Articles in Physical Sciences and Mathematics

Deep Learning One-Class Classification With Support Vector Methods, Hayden D. Hampton Jan 2024

Deep Learning One-Class Classification With Support Vector Methods, Hayden D. Hampton

Graduate Thesis and Dissertation 2023-2024

Through the specialized lens of one-class classification, anomalies–irregular observations that uncharacteristically diverge from normative data patterns–are comprehensively studied. This dissertation focuses on advancing boundary-based methods in one-class classification, a critical approach to anomaly detection. These methodologies delineate optimal decision boundaries, thereby facilitating a distinct separation between normal and anomalous observations. Encompassing traditional approaches such as One-Class Support Vector Machine and Support Vector Data Description, recent adaptations in deep learning offer a rich ground for innovation in anomaly detection. This dissertation proposes three novel deep learning methods for one-class classification, aiming to enhance the efficacy and accuracy of anomaly detection in …


Heed The Warning Signs: The Effectiveness Of Message Popup Warnings For Deterring The Spread Of Misinformation, Hollis Greenberg Jan 2024

Heed The Warning Signs: The Effectiveness Of Message Popup Warnings For Deterring The Spread Of Misinformation, Hollis Greenberg

CCE Theses and Dissertations

As false news can propagate to others rapidly, social media platforms employ multiple methods to combat misinformation. Debunking techniques are warning features embedded into a platform’s interface that alert readers of misinformation. These warnings have two goals: to “debunk” false information and to prevent the further spread of misinformation. Researchers have evaluated the effectiveness of debunking techniques to understand how users increase their awareness of misinformation, and what users do with the information given in warning messages. Message popup warnings are a newer and understudied type of debunking technique.

The overarching research question of this study was: Are message popup …


Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh Jan 2024

Assessing Organizational Investments In Cybersecurity And Financial Performance Before And After Data Breach Incidents Of Cloud Saas Platforms, Munther B. Ghazawneh

CCE Theses and Dissertations

Prior research indicated that providing inappropriate investment in organizations for Information Technology (IT) security makes these organizations suffer from IT security issues that may cause data breach incidents. Data breaches in cloud Software as a Service (SaaS) platforms lead to the disclosure of sensitive information, which causes disruption of services, damage to the organizational image, or financial losses. Massive data breaches still exist in cloud SaaS platforms which result in data leaks and data theft of customers in organizations.

IT security risks and vulnerabilities cost organizations millions of dollars a year as organizations may face an increase in cybersecurity challenges. …


Validating Machine And Human Decision-Making In Forensic Fire Debris Analysis, Frances A. Whitehead Jan 2024

Validating Machine And Human Decision-Making In Forensic Fire Debris Analysis, Frances A. Whitehead

Graduate Thesis and Dissertation 2023-2024

This work presents a background on the chemical complexity of fire debris analysis, including an ever-present matrix of pyrolysis products as the catalyst that led to the creation of the National Center for Forensic Science's Fire Debris Database. A selection of these 1,000+ casework-relevant ground truth samples was used to create two newly proposed analyst workflows to connect the current method of categorical reporting with evaluative reporting practices reflective of the strength of the evidence. Both workflows use linear sequential unmasking to help mitigate bias, a discrete scoring system for quantification of the analysis, and receiver operating characteristic (ROC) curves …


Optical Seed Development For Yb-Fiber Laser, James G. Brutus Jan 2024

Optical Seed Development For Yb-Fiber Laser, James G. Brutus

Graduate Thesis and Dissertation 2023-2024

Master Oscillator Power Amplifiers (MOPA) are laser systems that utilize a seed and pump amplification system to boost the output power of high-quality lower power seeding signals. MOPAs can generate high gain while avoiding many of the nonlinearities that negatively affect resonance-based lasers that are known to feature higher internal intensities. Additionally, MOPAs provide an easy alternative to the construction of novel laser technologies for higher output power as they can be easily combined with existing laser sources to amplify their output power.

This thesis outlines the design of an ytterbium-doped fiber laser (YDFL), featuring a MOPA architecture. The YDFL …


Identifying The Origins Of Business’ Data Breaches Utilizing Covert Timing Channels, Gayle L. Frisbie Jan 2024

Identifying The Origins Of Business’ Data Breaches Utilizing Covert Timing Channels, Gayle L. Frisbie

Master's Theses and Doctoral Dissertations

Cybersecurity events and data breaches are on the rise and are very costly to businesses. Businesses rely on connectivity and information systems to conduct business, yet those same information systems can be breached and the organization's data exposed. Today, there is a heavy reliance of organizations upon network connections to connect the entire organization in order to conduct business efficiently and from multiple locations. Covert timing channels are a cybersecurity attack method in which malicious actors embed privileged information into normal network traffic without authorization. Malicious actors, by carefully manipulating timing patterns in covert timing channels, can create a hidden …


Towards A Transparency-Based, Value-Sensitive Design Solution For Bias In Self-Driving Cars: An Ethical Violation Assessment And Risk Analysis Framework On Consumer-Held Values, Nada Ahmad Madkour Jan 2024

Towards A Transparency-Based, Value-Sensitive Design Solution For Bias In Self-Driving Cars: An Ethical Violation Assessment And Risk Analysis Framework On Consumer-Held Values, Nada Ahmad Madkour

Master's Theses and Doctoral Dissertations

Background: The rapid growth of automated systems and artificial intelligence (AI), particularly, self-driving cars (SDCs), has attracted significant investments and can potentially contribute to humanity’s flourishing. However, before widespread adoption, it is important to address ethical violations such as bias in AI, highlighted by many real-world cases of bias in AI leading to unfair outcomes in tools like facial recognition, hiring software, and pedestrian detection. Bias in AI can lead to potentially fatal outcomes in SDCs, emphasizing the need for a thorough examination of bias in SDCs.

Purpose: To enhance AI ethics by providing tools to support transparency and value- …


Automatic Modeling Of Cyber Intrusions Using The Diamond Model Utilizing Security Logs And Events, Mahmoud Al-Maani Jan 2024

Automatic Modeling Of Cyber Intrusions Using The Diamond Model Utilizing Security Logs And Events, Mahmoud Al-Maani

Master's Theses and Doctoral Dissertations

Current intrusion analysis models suffer from unreliability and inaccuracy due to their reliance on outdated and inadequate data sources. Numerous models focus on a particular type of data, leading to potential modeling faults in intrusion analysis models' recommendations. The objective of this thesis is to build a modernized model by integrating the diamond model with security information and event management systems. This thesis presents a detailed cyber intrusion analysis model; in which Elasticsearch is being used to collect and analyze logs about cyber attacks and extract major indicators of compromise then finally map them to the diamond model. The results …


Probing The Ising Model’S Thermodynamics Through Restricted Boltzmann Machines, Xiaobei (Emma) Zhang Jan 2024

Probing The Ising Model’S Thermodynamics Through Restricted Boltzmann Machines, Xiaobei (Emma) Zhang

HMC Senior Theses

This thesis explores the connection between physics and machine learning by using Restricted Boltzmann Machines (RBMs) to study the thermodynamic properties of the Ising model. The Ising model is a simple but realistic model that captures the magnetic behavior of a system, where spins occupy a lattice of sites and different spin configurations correspond to different energies. The model exhibits phase transitions between ferromagnetic and paramagnetic phases as a function of temperature. RBMs are two-layered neural networks that can learn probability distributions over binary spins. The study generates 2D Ising model data at different temperatures using Monte Carlo simulations, including …


Solving Robert Wilson’S 𝑡 ≠ 2 Conjecture On Graham Sequences, Krishna Rajesh Jan 2024

Solving Robert Wilson’S 𝑡 ≠ 2 Conjecture On Graham Sequences, Krishna Rajesh

HMC Senior Theses

Ron Graham's sequence is a surprising bijection from the natural numbers to the non-prime integers, which is constructed by looking at sequences whose product is square. In this thesis we will resolve a 22-year-old conjecture about this bijection, by construction of explicit sequences in a modified number theoretic context. Additionally, we will discuss the history of this problem, and give computational techniques for computing this bijection, levering ideas from linear algebra over the finite field of two elements.


The Dual Boundary Complex Of The Moduli Space Of Cyclic Compactifications, Toby Anderson Jan 2024

The Dual Boundary Complex Of The Moduli Space Of Cyclic Compactifications, Toby Anderson

HMC Senior Theses

Moduli spaces provide a useful method for studying families of mathematical objects. We study certain moduli spaces of algebraic curves, which are generalizations of familiar lines and conics. This thesis focuses on, Δ(r,n), the dual boundary complex of the moduli space of genus-zero cyclic curves. This complex is itself a moduli space of graphs and can be investigated with combinatorial methods. Remarkably, the combinatorics of this complex provides insight into the geometry and topology of the original moduli space. In this thesis, we investigate two topologically invariant properties of Δ(r,n). We compute its Euler characteristic and …


Exploring Sigmoidal Bounded Confidence Models With Mean Field Methods, Tian Dong Jan 2024

Exploring Sigmoidal Bounded Confidence Models With Mean Field Methods, Tian Dong

HMC Senior Theses

Mathematicians use models of opinion dynamics to describe how opinions in a group of people change over time, which can yield insight into mechanisms behind phenomena like polarization and consensus. In these models, mathematicians represent the community as a graph, where nodes represent agents and edges represent possible interactions. Opinion updates are modeled with a system of differential equations (ODEs). Our work focuses on the sigmoidal bounded confidence model (SBCM), where agents update their opinion toward a weighted average of their neighbors' opinions by weighting similar opinions more heavily. Using tools developed in physics (mean-field theory), we derive a continuity …


A Combinatorial Model For Affine Demazure Crystals Of Levels Zero And One, Samuel Spellman Jan 2024

A Combinatorial Model For Affine Demazure Crystals Of Levels Zero And One, Samuel Spellman

Electronic Theses & Dissertations (2024 - present)

The symmetric and non-symmetric Macdonald polynomials are special families of orthogonal polynomials with parameters q and t. They are indexed by dominant, (resp. arbitrary) weights associated to a root system and generalize several well-known polynomials such as the Schur polynomials, Jack polynomials, Hall-Littlewood polynomials, etc. There are two well-known combinatorial models for computing these polynomials: a tableau model in type A, due to Haglund, Haiman and Loehr, and a type-independent model due to Ram and Yip, based on alcove walks.

Crystals bases are an important construction encoding information about Lie algebra representations. It turns out that there is an interesting …


Examining Downshear Reformation In Tropical Cyclones, Nathalie Rivera Torres Jan 2024

Examining Downshear Reformation In Tropical Cyclones, Nathalie Rivera Torres

Electronic Theses & Dissertations (2024 - present)

The development of a new low-level circulation center in tropical cyclones, known as downshear reformation, can lead to sudden changes in storm structure and intensity, representing a challenge in forecasting tropical cyclones. This phenomenon is commonly observed in weak tropical cyclones (e.g., tropical depressions, tropical storms) experiencing moderate to strong vertical wind shear (> 5 m s-1), when the vertical wind shear organizes convection in the downshear region of the tropical cyclone, and lower-tropospheric vorticity is generated within the intense convection. Downshear reformation has been proposed as a mechanism for intensification, sometimes rapidly, in tropical cyclones under unfavorable environmental wind …


Les-C Turbulence Models And Fluid Flow Modeling: Analysis And Application To Incompressible Turbulence And Fluid-Fluid Interaction, Kyle J. Schwiebert Jan 2024

Les-C Turbulence Models And Fluid Flow Modeling: Analysis And Application To Incompressible Turbulence And Fluid-Fluid Interaction, Kyle J. Schwiebert

Dissertations, Master's Theses and Master's Reports

In the first chapter of this dissertation, we give some background on the Navier-Stokes equations and turbulence modeling. The next two chapters in this dissertation focus on two important numerical difficulties arising in fluid flow modeling: poor mass-conservation and nonphysical oscillations. We investigate two different formulations of the Crank-Nicolson method for the Navier-Stokes equations. The most attractive implementation, second order accurate for both velocity and pressure, is shown to introduce non-physical oscillations. We then propose two options which are shown to avoid the poor behavior. Next, we show that grad-div stabilization, previously assumed to have no effect on the target …


Chemical Synthesis Of Sensitive Dna, Komal Chillar Jan 2024

Chemical Synthesis Of Sensitive Dna, Komal Chillar

Dissertations, Master's Theses and Master's Reports

Over the past decades, researchers have tried various chemical methods to synthesize modified oligodeoxynucleotides (ODNs, i.e. short segments of DNAs). Traditional ODN synthesis methods require strong basic, and nucleophilic conditions for the deprotection and cleavage of the ODN from the solid support. However, the sensitive ODNs containing labile functionalities are vulnerable to such harsh conditions. Sensitive ODNs have a wide range of applications in research and pharmaceuticals. To synthesize sensitive ODNs, researchers devised different strategies but no practical methods have been developed. To overcome these challenges, we developed alkyl Dim alkyl Dmoc technology. This innovative technology uses weakly basic and …


Study Of Particle Accelerators In The Universe With The Hawc Observatory, Rishi Babu Jan 2024

Study Of Particle Accelerators In The Universe With The Hawc Observatory, Rishi Babu

Dissertations, Master's Theses and Master's Reports

HESS J1809-193 is an unidentified TeV source discovered in 2007 by the High Energy Stereoscopic System(H.E.S.S.) Collaboration. The emission originates in a region that is rich in cosmic-ray accelerators, including several supernova remnants and pulsars, including SNR G11.1+0.1, SNR G11.0-0.0, and the young radio pulsar PSR J1809-1917. Originally classified as a pulsar wind nebula candidate, recent studies show the peak of the TeV region overlapping with a system of molecular clouds and revising the original classification for other scenarios, including a pure hadronic scenario. This dissertation presents the morphological and spectral study of HESS J1809-193 using 2139 days of data …


Sea Level Rise Driven Groundwater Inundation: Effects Of Island Hydrogeology On Freshwater Lens Dynamics, Lauren K. Mancewicz Jan 2024

Sea Level Rise Driven Groundwater Inundation: Effects Of Island Hydrogeology On Freshwater Lens Dynamics, Lauren K. Mancewicz

Dissertations, Master's Theses and Master's Reports

Groundwater inundation due to sea level rise poses a threat to fresh groundwater availability in coastal areas, and small islands are particularly vulnerable. On an island, when sea level rises, the freshwater lens also rises due to the difference in density between the salt and fresh groundwater. As the water table rises above the land surface it forms a lake and the water is exposed to additional evaporative losses, reducing the amount of fresh water available. This work aims to improve our understanding of groundwater inundation due to sea level rise and the impact of different hydrogeologic settings and phenomena …


Data Driven And Machine Learning Based Modeling And Predictive Control Of Combustion At Reactivity Controlled Compression Ignition Engines, Behrouz Khoshbakht Irdmousa Jan 2024

Data Driven And Machine Learning Based Modeling And Predictive Control Of Combustion At Reactivity Controlled Compression Ignition Engines, Behrouz Khoshbakht Irdmousa

Dissertations, Master's Theses and Master's Reports

Reactivity Controlled Compression Ignition (RCCI) engines operates has capacity to provide higher thermal efficiency, lower particular matter (PM), and lower oxides of nitrogen (NOx) emissions compared to conventional diesel combustion (CDC) operation. Achieving these benefits is difficult since real-time optimal control of RCCI engines is challenging during transient operation. To overcome these challenges, data-driven machine learning based control-oriented models are developed in this study. These models are developed based on Linear Parameter-Varying (LPV) modeling approach and input-output based Kernelized Canonical Correlation Analysis (KCCA) approach. The developed dynamic models are used to predict combustion timing (CA50), indicated mean effective pressure (IMEP), …


P.U.S.H. For Life Among The Stars: A Scientific And Philosophical Quest For Conceptualizing Uncertainty, Jacinta Creel Vallejo Jan 2024

P.U.S.H. For Life Among The Stars: A Scientific And Philosophical Quest For Conceptualizing Uncertainty, Jacinta Creel Vallejo

Senior Projects Spring 2024

This senior project tackles how to deal with uncertainty in the search for life. Defining this uncertainty is tricky, and scientific efforts to do so are crucial. Such efforts include analyzing the data and biases of past, present, and future missions searching for exoplanets: planets outside our solar system. From there, the next step would be to infer what exoplanets have an atmosphere. This is a crucial, but not sufficient step, as having an atmosphere is a good sign of encountering life. However, finding an atmosphere is not an easy task, and this step will undeniably come with some amount …


A Party Of Particles: Constructing A Cyclotron To Accelerate Protons, Luke Christopher Ingraham Jan 2024

A Party Of Particles: Constructing A Cyclotron To Accelerate Protons, Luke Christopher Ingraham

Senior Projects Spring 2024

The first particle accelerators were developed by Ernest Lawrence at University of California, Berkeley nearly one hundred years ago. Lawrence’s creation of the cyclotron has had an everlasting impact on physics and his experiments can be recreated today. A cyclotron is a charged particle accelerator that uses a magnetic field to confine particles to a spiral flight path in a vacuum chamber and an applied electrical field accelerates these particles to high energies. In this senior thesis, I embarked on a journey to build a fully functional cyclotron that is capable of accelerating protons to beyond 60keV. The complexity of …


An Unsupervised Machine Learning Algorithm For Clustering Low Dimensional Data Points In Euclidean Grid Space, Josef Lazar Jan 2024

An Unsupervised Machine Learning Algorithm For Clustering Low Dimensional Data Points In Euclidean Grid Space, Josef Lazar

Senior Projects Spring 2024

Clustering algorithms provide a useful method for classifying data. The majority of well known clustering algorithms are designed to find globular clusters, however this is not always desirable. In this senior project I present a new clustering algorithm, GBCN (Grid Box Clustering with Noise), which applies a box grid to points in Euclidean space to identify areas of high point density. Points within the grid space that are in adjacent boxes are classified into the same cluster. Conversely, if a path from one point to another can only be completed by traversing an empty grid box, then they are classified …


Solid Angle Measure Approximation Methods For Polyhedral Cones, Allison Fitisone Jan 2024

Solid Angle Measure Approximation Methods For Polyhedral Cones, Allison Fitisone

Theses and Dissertations--Mathematics

Polyhedral cones are of interest in many fields, like geometry and optimization. A simple, yet fundamental question we may ask about a cone is how large it is. As cones are unbounded, we consider their solid angle measure: the proportion of space that they occupy. Beyond dimension three, definitive formulas for this measure are unknown. Consequently, devising methods to estimate this quantity is imperative. In this dissertation, we endeavor to enhance our understanding of solid angle measures and provide valuable insights into the efficacy of various approximation techniques.

Ribando and Aomoto independently discovered a Taylor series formula for solid angle …


Pairs Of Quadratic Forms Over P-Adic Fields, John Hall Jan 2024

Pairs Of Quadratic Forms Over P-Adic Fields, John Hall

Theses and Dissertations--Mathematics

Given two quadratic forms $Q_1, Q_2$ over a $p$-adic field $K$ in $n$ variables, we consider the pencil $\mathcal{P}_K(Q_1, Q_2)$, which contains all nontrivial $K$-linear combinations of $Q_1$ and $Q_2$. We define $D$ to be the maximal dimension of a subspace in $K^n$ on which $Q_1$ and $Q_2$ both vanish. We define $H$ to be the maximal number of hyperbolic planes that a form in $\mathcal{P}_K(Q_1, Q_2)$ splits off over $K$. We will determine which values for $(D, H)$ are possible for a nonsingular pair of quadratic forms over a $p$-adic field $K$.


Portable X-Ray Fluorescence Spectrometry For Sensing Salinity And Sodicity In Glacial Northern Great Plains Soils With Machine Learning Models, Adam Devlin Jan 2024

Portable X-Ray Fluorescence Spectrometry For Sensing Salinity And Sodicity In Glacial Northern Great Plains Soils With Machine Learning Models, Adam Devlin

Electronic Theses and Dissertations

Saline and sodic soils are an increasing concern across the Northern Great Plains (NGP) due to factors of climate change and land management that are drawing geologically derived salts to the land surface. Traditional laboratory assessments, such as electrical conductivity (EC) and sodium adsorption ratio (SAR), are time and resource consumptive. Portable X-ray fluorescence (PXRF) may be a viable proximal sensing alternative, as it is able to provide elemental data in minutes, in situ or ex situ, and can directly quantify salinity-associated elements like Ca, Mg, and S. PXRF paired with predictive models has proven useful for a range of …


Rado Numbers For Two Systems Of Linear Equations, Anthony Glackin Jan 2024

Rado Numbers For Two Systems Of Linear Equations, Anthony Glackin

Electronic Theses and Dissertations

For any positive integer n and any equation E of either the form x1+x2+· · ·+xn = x0 or x1 + x2 + n = x0, the two-color Rado number R2(E) is the least integer such that any 2-coloring of the natural numbers 1 through R2(E) will contain a monochromatic solution to E. Let Ek be a system of k equations of the aforementioned form, where Ei represents the ith equation in Ek and the set I = {1, 2, . . . , k} is the set of indices of these equations. This thesis shows that the two-color Rado …


Investigation Of Deoxyfluorination Of Alkyl Alcohols Using Pentafluoropyridines Through A Covalent Intermediate, Christopher Allen Bias Jan 2024

Investigation Of Deoxyfluorination Of Alkyl Alcohols Using Pentafluoropyridines Through A Covalent Intermediate, Christopher Allen Bias

Graduate Theses, Dissertations, and Problem Reports

Organofluorines are an omnipresent class of organic molecules, especially in pharmaceuticals. Selective fluorination of drug molecules allows for the influence of properties including metabolic activity, solubility, and intrinsic potency. Deoxyfluorinations are typically performed via generation of nucleophilic fluoride from a deoxyfluorination agent. Traditionally, diethylaminosulfur trifluoride (DAST) is the reagent of choice for these reactions, and it remains a popular reagent today. However, it has a propensity to form elimination side products and explode. Several research groups have recently developed new classes of deoxyfluorination agents including imidazole-based reagents (PhenoFluor) and sulfonyl fluorides (PyFluor) that exhibit better functional group tolerance and much …


Modern Colonialism: The Case Of Costa Rica And The United Fruit Company, Micah X. Perez Jan 2024

Modern Colonialism: The Case Of Costa Rica And The United Fruit Company, Micah X. Perez

Regis University Student Publications (comprehensive collection)

This academic paper systematically investigates the intricate historical relationship between the United Fruit Company (UFC) and the socio-economic landscape of Costa Rica during the Liberal period from 1870 to 1940. By examining the direct relationship between the UFC's presence and the simultaneous growth of the tourism industry, coastal land development, and the consequential rise of the sex trade, this research elucidates the adverse impacts of foreign monopolies on the privatization of land. The study underscores the enduring repercussions of this phenomenon in contemporary Costa Rican society. Through historical analysis, this thesis argues that the UFC's actions in Costa Rica during …


Economic Entanglement: The Quantum Race Between The United States And China, Isabella Willhite Jan 2024

Economic Entanglement: The Quantum Race Between The United States And China, Isabella Willhite

Regis University Student Publications (comprehensive collection)

The United States and China are both currently home to the strongest economies and militaries in the world. Despite their interdependence, trade wars have escalated between the two countries in the past few years. While past trade wars have been focused on purely economic protectionism or ideological stances, the trade wars of today signify a shift towards protecting critical emerging technologies. The important emerging technology of today is quantum computing, which will forever change the way that computers encrypt, process, and decode information. The United States and China are on the eve of the “quantum race,” in which they will …


Household Water Conservation For The Upper Colorado River Basin, Lauren Ott Jan 2024

Household Water Conservation For The Upper Colorado River Basin, Lauren Ott

Regis University Student Publications (comprehensive collection)

Fresh, clean, potable water is the most important natural resource to sustain human life. Concern over the continued, equitable and affordable access to such water is therefore top of mind. Calls for climate change mitigation practices, improved natural resource management, and enhanced attention to water conservation have therefore become increasingly prevalent. These water conservation practices require population-wide political, attitudinal and behavioral shifts and it will be especially impactful for wealthy nations and wealthy people to be mindful of instituting these changes in their own spaces.

In this project, I conduct a literature review to investigate current challenges surrounding water from …