Matching Items (47)
Filtering by

Clear all filters

Description

Optimal foraging theory provides a suite of tools that model the best way that an animal will <br/>structure its searching and processing decisions in uncertain environments. It has been <br/>successful characterizing real patterns of animal decision making, thereby providing insights<br/>into why animals behave the way they do. However, it does

Optimal foraging theory provides a suite of tools that model the best way that an animal will <br/>structure its searching and processing decisions in uncertain environments. It has been <br/>successful characterizing real patterns of animal decision making, thereby providing insights<br/>into why animals behave the way they do. However, it does not speak to how animals make<br/>decisions that tend to be adaptive. Using simulation studies, prior work has shown empirically<br/>that a simple decision-making heuristic tends to produce prey-choice behaviors that, on <br/>average, match the predicted behaviors of optimal foraging theory. That heuristic chooses<br/>to spend time processing an encountered prey item if that prey item's marginal rate of<br/>caloric gain (in calories per unit of processing time) is greater than the forager's<br/>current long-term rate of accumulated caloric gain (in calories per unit of total searching<br/>and processing time). Although this heuristic may seem intuitive, a rigorous mathematical<br/>argument for why it tends to produce the theorized optimal foraging theory behavior has<br/>not been developed. In this thesis, an analytical argument is given for why this<br/>simple decision-making heuristic is expected to realize the optimal performance<br/>predicted by optimal foraging theory. This theoretical guarantee not only provides support<br/>for why such a heuristic might be favored by natural selection, but it also provides<br/>support for why such a heuristic might a reliable tool for decision-making in autonomous<br/>engineered agents moving through theatres of uncertain rewards. Ultimately, this simple<br/>decision-making heuristic may provide a recipe for reinforcement learning in small robots<br/>with little computational capabilities.

ContributorsCothren, Liliaokeawawa Kiyoko (Author) / Pavlic, Theodore (Thesis director) / Brewer, Naala (Committee member) / School of Mathematical and Statistical Sciences (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description
We studied binomial edge ideals, which are at the intersection of graph theory and abstract algebra. Our focus was the multidegrees of these ideals, which contain valuable geometric information. We proved algebraic results that allowed us to write a closed formula for the multidegree of the binomial edge ideal of

We studied binomial edge ideals, which are at the intersection of graph theory and abstract algebra. Our focus was the multidegrees of these ideals, which contain valuable geometric information. We proved algebraic results that allowed us to write a closed formula for the multidegree of the binomial edge ideal of a graph based on combinatorial properties of the graph. Then we discovered methods to make the process more efficient. We concluded our research by using our results to find the multidegrees of the binomial edge ideals of many families of graphs.
ContributorsLeventhal, Ethan (Author) / Montaño, Jonathan (Thesis director) / Jiang, Zilin (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2024-05
Description

In this project we focus on COVID-19 in a university setting. Arizona State University has a very large population on the Tempe Campus. With the emergence of diseases such as COVID-19, it is very important to track how such a disease spreads within that type of community. This is vital

In this project we focus on COVID-19 in a university setting. Arizona State University has a very large population on the Tempe Campus. With the emergence of diseases such as COVID-19, it is very important to track how such a disease spreads within that type of community. This is vital for containment measures and the safety of everyone involved. We found in the literature several epidemiology models that utilize differential equations for tracking a spread of a disease. However, our goal is to provide a granular look at how disease may spread through contact in a classroom. This thesis models a single ASU classroom and tracks the spread of a disease. It is important to note that our variables and declarations are not aligned with COVID-19 or any other specific disease but are chosen to exemplify the impact of some key parameters on the epidemic size. We found that a smaller transmissibility alongside a more spread-out classroom of agents resulted in fewer infections overall. There are many extensions to this model that are needed in order to take what we have demonstrated and align those ideas with COVID-19 and it’s spread at ASU. However, this model successfully demonstrates a spread of disease through single-classroom interaction, which is the key component for any university campus disease transmission model.

ContributorsJoseph, Mariam (Author) / Bartko, Ezri (Co-author) / Sabuwala, Sana (Co-author) / Milner, Fabio (Thesis director) / O'Keefe, Kelly (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Division of Teacher Preparation (Contributor)
Created2022-12
Description

This thesis is a supplement textbook designed with ASU’s MAT 370, or more generally, a course in introductory real analysis (IRA). With research in the realms of mathematics textbook creation and IRA pedagogy, this supplement aims to provide students or interested readers an additional presentation of the materials. Topics discussed

This thesis is a supplement textbook designed with ASU’s MAT 370, or more generally, a course in introductory real analysis (IRA). With research in the realms of mathematics textbook creation and IRA pedagogy, this supplement aims to provide students or interested readers an additional presentation of the materials. Topics discussed include the real number system, some topology of the real line, sequences of real numbers, continuity, differentiation, integration, and the Fundamental Theorem of Calculus. Special emphasis was placed on worked examples of proven results and exercises with hints at the end of every chapter. In this respect, this supplement aims to be both versatile and self-contained for the different mathematics skill levels of readers.

ContributorsCarpenter, Jackson Robinett (Author) / Jones, Don (Thesis director) / Quigg, John (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both

Many current cryptographic algorithms will eventually become easily broken by Shor's Algorithm once quantum computers become more powerful. A number of new algorithms have been proposed which are not compromised by quantum computers, one of which is the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol (SIDH). SIDH works by having both parties perform random walks between supersingular elliptic curves on isogeny graphs of prime degree and eventually end at the same location, a shared secret.<br/><br/>This thesis seeks to explore some of the theory and concepts underlying the security of SIDH, especially as it relates to finding supersingular elliptic curves, generating isogeny graphs, and implementing SIDH. As elliptic curves and SIDH may be an unfamiliar topic to many readers, the paper begins by providing a brief introduction to elliptic curves, isogenies, and the SIDH Protocol. Next, the paper investigates more efficient methods of generating supersingular elliptic curves, which are important for visualizing the isogeny graphs in the algorithm and the setup of the protocol. Afterwards, the paper focuses on isogeny maps of various degrees, attempting to visualize isogeny maps similar to those used in SIDH. Finally, the paper looks at an implementation of SIDH in PARI/GP and work is done to see the effects of using isogenies of degree greater than 2 and 3 on the security, runtime, and practicality of the algorithm.

ContributorsSteele, Aaron J (Author) / Jones, John (Thesis director) / Childress, Nancy (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description
One common problem that occurs to students during breaks is the retrogression of knowledge due to lack of practice. This problem occurs for students at all levels of education but is especially harmful to students who are taking sequential classes such as Calculus for Engineers I and Calculus for Engineers

One common problem that occurs to students during breaks is the retrogression of knowledge due to lack of practice. This problem occurs for students at all levels of education but is especially harmful to students who are taking sequential classes such as Calculus for Engineers I and Calculus for Engineers II where the retention of topics taught in Calculus for Engineers I are required for students to succeed. One solution to this problem is the Keep in School Shape (KiSS) program. The KiSS program is a very efficient and easily accessible program that allows students to stay warmed up and ready to go when they start a sequential course by having daily review material during academic breaks. During an academic break, students who are signed up for the KiSS program are sent a link through text message or email every day that allows them to access a multiple choice review problem. The review problem that they are given is a problem that presents material from the previous course that will be needed in the upcoming course. At the beginning of the review, students have the option to choose between a Level 1 or a Level 2 problem, where a Level 2 problem is related to its Level 1 counterpart but slightly more difficult. Before the students are permitted to solve the problem, they must first use a five point scale that indicates their confidence in their ability to solve the problem. After they complete either the Level 1 or Level 2 daily problem, those that got it wrong have the option to view a hint and try again or view a solution. The students that got the Level 1 daily problem right are also allowed to view the solution but will be permitted to go onto the next level right away whereas the students that got the Level 1 problem incorrect will need to try a similar problem before being able to move onto Level 2. For students who chose to do the Level 2 problem and were not very confident, they were given the option to solve a level 1 problem instead. Students who chose level 2 and got it wrong are given the options to view a hint and try again or simply view the solution before moving on to flashcard versions of the daily problems. Students who get the Level 2 problem correct are also given the option to continue practicing using the flashcards if they choose to. Once a week, there is also a trivia day where students have the choice to complete solely a mathematical trivia question or complete both the trivia question along with a daily review problem. This feature allows students to take a day off from doing mathematics if they choose, but still stay engaged by doing a related activity. Through this program, there is a lot to learn about whether doing Level 1 problems can help students improve their understanding of a concept enough to correctly solve a Level 2 problem. There are many factors to consider such as which question the student chose to answer first, student confidence, and student perseverance. Through the Summer Break 2023 KiSS program, there was data collected for every student answer for each day they accessed the daily KiSS activity. This thesis presents an analysis of the data showing how having two levels of problems is beneficial for students and the correlation between students’ results in Level 1 problems and Level 2 problems for students who chose to attempt both problems.
ContributorsWang, Ryan (Author) / Van de Sande, Carla (Thesis director) / Reiser, Mark (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2023-12
Description
This paper explores the Stone-Čech compactification as a versatile tool in topology, known for its ability to extend locally compact Hausdorff spaces to a maximal compact framework. Through a detailed analysis of its universal properties, this compactification is presented as essential for understanding the boundary behavior of continuous functions and

This paper explores the Stone-Čech compactification as a versatile tool in topology, known for its ability to extend locally compact Hausdorff spaces to a maximal compact framework. Through a detailed analysis of its universal properties, this compactification is presented as essential for understanding the boundary behavior of continuous functions and the broader structure of topological spaces. Key topics include the compactification’s role in mapping spaces through ultrafilters, its applications in functional analysis, algebra, and topological dynamics, and its connections to set theory and combinatorics. By examining the implications of the Stone-Čech boundary and its interaction with logical and algebraic structures, this work underscores the compactification’s profound influence in both theoretical and applied mathematical contexts, offering a foundation for future explorations in topology and related fields.
ContributorsAza, Carl (Author) / Hines, Taylor (Thesis director) / Paupert, Julien (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Historical, Philosophical & Religious Studies, Sch (Contributor)
Created2024-12
Description
Many forms of programmable matter have been proposed for various tasks. We use an abstract model of self-organizing particle systems for programmable matter which could be used for a variety of applications, including smart paint and coating materials for engineering or programmable cells for medical uses. Previous research using this

Many forms of programmable matter have been proposed for various tasks. We use an abstract model of self-organizing particle systems for programmable matter which could be used for a variety of applications, including smart paint and coating materials for engineering or programmable cells for medical uses. Previous research using this model has focused on shape formation and other spatial configuration problems, including line formation, compression, and coating. In this work we study foundational computational tasks that exceed the capabilities of the individual constant memory particles described by the model. These tasks represent new ways to use these self-organizing systems, which, in conjunction with previous shape and configuration work, make the systems useful for a wider variety of tasks. We present an implementation of a counter using a line of particles, which makes it possible for the line of particles to count to and store values much larger than their individual capacities. We then present an algorithm that takes a matrix and a vector as input and then sets up and uses a rectangular block of particles to compute the matrix-vector multiplication. This setup also utilizes the counter implementation to store the resulting vector from the matrix-vector multiplication. Operations such as counting and matrix multiplication can leverage the distributed and dynamic nature of the self-organizing system to be more efficient and adaptable than on traditional linear computing hardware. Such computational tools also give the systems more power to make complex decisions when adapting to new situations or to analyze the data they collect, reducing reliance on a central controller for setup and output processing. Finally, we demonstrate an application of similar types of computations with self-organizing systems to image processing, with an implementation of an image edge detection algorithm.
ContributorsPorter, Alexandra Marie (Author) / Richa, Andrea (Thesis director) / Xue, Guoliang (Committee member) / School of Music (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
DescriptionIn this project, we aim to examine the methods used to obtain U.S. mortality rates, as well as the changes in the mortality rate between subgroups of interest within our population due to various diseases.
ContributorsClermont, Nicholas Charles (Author) / Boggess, May (Thesis director) / Kamarianakis, Ioannis (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2014-05
Description
Covering subsequences with sets of permutations arises in many applications, including event-sequence testing. Given a set of subsequences to cover, one is often interested in knowing the fewest number of permutations required to cover each subsequence, and in finding an explicit construction of such a set of permutations that has

Covering subsequences with sets of permutations arises in many applications, including event-sequence testing. Given a set of subsequences to cover, one is often interested in knowing the fewest number of permutations required to cover each subsequence, and in finding an explicit construction of such a set of permutations that has size close to or equal to the minimum possible. The construction of such permutation coverings has proven to be computationally difficult. While many examples for permutations of small length have been found, and strong asymptotic behavior is known, there are few explicit constructions for permutations of intermediate lengths. Most of these are generated from scratch using greedy algorithms. We explore a different approach here. Starting with a set of permutations with the desired coverage properties, we compute local changes to individual permutations that retain the total coverage of the set. By choosing these local changes so as to make one permutation less "essential" in maintaining the coverage of the set, our method attempts to make a permutation completely non-essential, so it can be removed without sacrificing total coverage. We develop a post-optimization method to do this and present results on sequence covering arrays and other types of permutation covering problems demonstrating that it is surprisingly effective.
ContributorsMurray, Patrick Charles (Author) / Colbourn, Charles (Thesis director) / Czygrinow, Andrzej (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Department of Physics (Contributor)
Created2014-12