Current Search: info:fedora/islandora:personCModel (x) » Blind assasin. (x) » Department of Mathematical Sciences (x)
View All Items
Pages
 Title
 20092010 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20092010
 PURL
 http://purl.flvc.org/fau/fd/FA00007676
 Format
 Document (PDF)
 Title
 20102011 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20102011
 PURL
 http://purl.flvc.org/fau/fd/FA00007683
 Format
 Document (PDF)
 Title
 20122013 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20122013
 PURL
 http://purl.flvc.org/fau/fd/FA00007690
 Format
 Document (PDF)
 Title
 20132014 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20132014
 PURL
 http://purl.flvc.org/fau/fd/FA00007697
 Format
 Document (PDF)
 Title
 20142015 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20142015
 PURL
 http://purl.flvc.org/fau/fd/FA00007704
 Format
 Document (PDF)
 Title
 20152016 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20152016
 PURL
 http://purl.flvc.org/fau/fd/FA00007711
 Format
 Document (PDF)
 Title
 20162017 Program Review Mathematics.
 Creator
 Florida Atlantic University, Department of Mathematical Sciences, Charles E. Schmidt College of Science
 Abstract/Description

Florida Atlantic University Departmental Dashboard Indicators. Department program reviews for Charles E. Schmidt College of Science, Florida Atlantic University.
 Date Issued
 20162017
 PURL
 http://purl.flvc.org/fau/fd/FA00007718
 Format
 Document (PDF)
 Title
 A Constructive Theory of Ordered Sets and their Completions.
 Creator
 Joseph, Jean S., Richman, Fred, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

The context for the development of this work is constructive mathematics without the axiom of countable choice. By constructive mathematics, we mean mathematics done without the law of excluded middle. Our original goal was to give a list of axioms for the real numbers R by only considering the order on R. We instead develop a theory of ordered sets and their completions and a theory of ordered abelian groups.
 Date Issued
 2018
 PURL
 http://purl.flvc.org/fau/fd/FA00013007
 Subject Headings
 Constructive mathematics, Ordered sets, Abelian groups
 Format
 Document (PDF)
 Title
 A Study on Partially Homomorphic Encryption Schemes.
 Creator
 Mithila, Shifat P., Karabina, Koray, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

High processing time and implementation complexity of the fully homomorphic encryption schemes intrigued cryptographers to extend partially homomorphic encryption schemes to allow homomorphic computation for larger classes of polynomials. In this thesis, we study several public key and partially homomorphic schemes and discuss a recent technique for boosting linearly homomorphic encryption schemes. Further, we implement this boosting technique on CGS linearly homomorphic encryption scheme to...
Show moreHigh processing time and implementation complexity of the fully homomorphic encryption schemes intrigued cryptographers to extend partially homomorphic encryption schemes to allow homomorphic computation for larger classes of polynomials. In this thesis, we study several public key and partially homomorphic schemes and discuss a recent technique for boosting linearly homomorphic encryption schemes. Further, we implement this boosting technique on CGS linearly homomorphic encryption scheme to allow one single multiplication as well as arbitrary number of additions on encrypted plaintexts. We provide MAGMA source codes for the implementation of the CGS scheme along with the boosted CGS scheme.
Show less  Date Issued
 2017
 PURL
 http://purl.flvc.org/fau/fd/FA00004840, http://purl.flvc.org/fau/fd/FA00004840
 Subject Headings
 Computer networksSecurity measures., Computer security., ComputersAccess controlCode words., Cyberinfrastructure., Computer network architectures., Cryptography., Number theoryData processing.
 Format
 Document (PDF)
 Title
 Algebraic and combinatorial aspects of group factorizations.
 Creator
 Bozovic, Vladimir., Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

The aim of this work is to investigate some algebraic and combinatorial aspects of group factorizations. The main contribution of this dissertation is a set of new results regarding factorization of groups, with emphasis on the nonabelian case. We introduce a novel technique for factorization of groups, the socalled free mappings, a powerful tool for factorization of a wide class of abelian and nonabelian groups. By applying a certain group action on the blocks of a factorization, a number...
Show moreThe aim of this work is to investigate some algebraic and combinatorial aspects of group factorizations. The main contribution of this dissertation is a set of new results regarding factorization of groups, with emphasis on the nonabelian case. We introduce a novel technique for factorization of groups, the socalled free mappings, a powerful tool for factorization of a wide class of abelian and nonabelian groups. By applying a certain group action on the blocks of a factorization, a number of combinatorial and computational problems were noted and studied. In particular, we analyze the case of the group Aut(Zn) acting on blocks of factorization of Zn. We present new theoretical facts that reveal the numerical structure of the stabilizer of a set in Zn, under the action of Aut(Zn). New algorithms for finding the stabilizer of a set and checking whether two sets belong to the same orbit are proposed.
Show less  Date Issued
 2008
 PURL
 http://purl.flvc.org/FAU/107805
 Subject Headings
 Physical measurements, Mapping (Mathematics), Combinatorial enumeration problems, Algebra, Abstract
 Format
 Document (PDF)
 Title
 An algebraic attack on block ciphers.
 Creator
 Matheis, Kenneth., Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

The aim of this work is to investigate an algebraic attack on block ciphers called Multiple Right Hand Sides (MRHS). MRHS models a block cipher as a system of n matrix equations Si := Aix = [Li], where each Li can be expressed as a set of its columns bi1, . . . , bisi . The set of solutions Ti of Si is dened as the union of the solutions of Aix = bij , and the set of solutions of the system S1, . . . , Sn is dened as the intersection of T1, . . . , Tn. Our main contribution is a hardware...
Show moreThe aim of this work is to investigate an algebraic attack on block ciphers called Multiple Right Hand Sides (MRHS). MRHS models a block cipher as a system of n matrix equations Si := Aix = [Li], where each Li can be expressed as a set of its columns bi1, . . . , bisi . The set of solutions Ti of Si is dened as the union of the solutions of Aix = bij , and the set of solutions of the system S1, . . . , Sn is dened as the intersection of T1, . . . , Tn. Our main contribution is a hardware platform which implements a particular algorithm that solves MRHS systems (and hence block ciphers). The case is made that the platform performs several thousand orders of magnitude faster than software, it costs less than US$1,000,000, and that actual times of block cipher breakage can be calculated once it is known how the corresponding software behaves. Options in MRHS are also explored with a view to increase its efficiency.
Show less  Date Issued
 2010
 PURL
 http://purl.flvc.org/FAU/2976444
 Subject Headings
 Ciphers, Cryptography, Data encryption (Computer science), Computer security, Coding theory, Integrated circuits, Design and construction
 Format
 Document (PDF)
 Title
 Algorithms in Elliptic Curve Cryptography.
 Creator
 Hutchinson, Aaron, Karabina, Koray, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

Elliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Elliptic Curve Di eHellman (ECDH) key exchange algorithm are widely used in practice today for their e ciency and small key sizes. More recently, the Supersingular Isogenybased Di eHellman (SIDH) algorithm provides a method of exchanging keys which is conjectured to be secure in the postquantum setting. For ECDSA and ECDH, e cient and secure...
Show moreElliptic curves have played a large role in modern cryptography. Most notably, the Elliptic Curve Digital Signature Algorithm (ECDSA) and the Elliptic Curve Di eHellman (ECDH) key exchange algorithm are widely used in practice today for their e ciency and small key sizes. More recently, the Supersingular Isogenybased Di eHellman (SIDH) algorithm provides a method of exchanging keys which is conjectured to be secure in the postquantum setting. For ECDSA and ECDH, e cient and secure algorithms for scalar multiplication of points are necessary for modern use of these protocols. Likewise, in SIDH it is necessary to be able to compute an isogeny from a given nite subgroup of an elliptic curve in a fast and secure fashion. We therefore nd strong motivation to study and improve the algorithms used in elliptic curve cryptography, and to develop new algorithms to be deployed within these protocols. In this thesis we design and develop dMUL, a multidimensional scalar multiplication algorithm which is uniform in its operations and generalizes the well known 1dimensional Montgomery ladder addition chain and the 2dimensional addition chain due to Dan J. Bernstein. We analyze the construction and derive many optimizations, implement the algorithm in software, and prove many theoretical and practical results. In the nal chapter of the thesis we analyze the operations carried out in the construction of an isogeny from a given subgroup, as performed in SIDH. We detail how to e ciently make use of parallel processing when constructing this isogeny.
Show less  Date Issued
 2018
 PURL
 http://purl.flvc.org/fau/fd/FA00013113
 Subject Headings
 Curves, Elliptic, Cryptography, Algorithms
 Format
 Document (PDF)
 Title
 An Algorithmic Approach to The Lattice Structures of Attractors and Lyapunov functions.
 Creator
 Kasti, Dinesh, Kalies, William D., Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

Ban and Kalies [3] proposed an algorithmic approach to compute attractor repeller pairs and weak Lyapunov functions based on a combinatorial multivalued mapping derived from an underlying dynamical system generated by a continuous map. We propose a more e cient way of computing a Lyapunov function for a Morse decomposition. This combined work with other authors, including Shaun Harker, Arnoud Goulet, and Konstantin Mischaikow, implements a few techniques that makes the process of nding a...
Show moreBan and Kalies [3] proposed an algorithmic approach to compute attractor repeller pairs and weak Lyapunov functions based on a combinatorial multivalued mapping derived from an underlying dynamical system generated by a continuous map. We propose a more e cient way of computing a Lyapunov function for a Morse decomposition. This combined work with other authors, including Shaun Harker, Arnoud Goulet, and Konstantin Mischaikow, implements a few techniques that makes the process of nding a global Lyapunov function for Morse decomposition very e  cient. One of the them is to utilize highly memorye cient data structures: succinct grid data structure and pointer grid data structures. Another technique is to utilize Dijkstra algorithm and Manhattan distance to calculate a distance potential, which is an essential step to compute a Lyapunov function. Finally, another major technique in achieving a signi cant improvement in e ciency is the utilization of the lattice structures of the attractors and attracting neighborhoods, as explained in [32]. The lattice structures have made it possible to let us incorporate only the joinirreducible attractorrepeller pairs in computing a Lyapunov function, rather than having to use all possible attractorrepeller pairs as was originally done in [3]. The distributive lattice structures of attractors and repellers in a dynamical system allow for general algebraic treatment of global gradientlike dynamics. The separation of these algebraic structures from underlying topological structure is the basis for the development of algorithms to manipulate those structures, [32, 31]. There has been much recent work on developing and implementing general compu tational algorithms for global dynamics which are capable of computing attracting neighborhoods e ciently. We describe the lifting of sublattices of attractors, which are computationally less accessible, to lattices of forward invariant sets and attract ing neighborhoods, which are computationally accessible. We provide necessary and su cient conditions for such a lift to exist, in a general setting. We also provide the algorithms to check whether such conditions are met or not and to construct the lift when they met. We illustrate the algorithms with some examples. For this, we have checked and veri ed these algorithms by implementing on some noninvertible dynamical systems including a nonlinear Leslie model.
Show less  Date Issued
 2016
 PURL
 http://purl.flvc.org/fau/fd/FA00004668
 Subject Headings
 Differential equations  Numerical solutions., Differentiable dynamical systems., Algorithms.
 Format
 Document (PDF)
 Title
 An Algorithmic Approach to Tran Van Trung's Basic Recursive Construction of tDesigns.
 Creator
 Lopez, Oscar A., Magliveras, Spyros S., Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

It was not until the 20th century that combinatorial design theory was studied as a formal subject. This field has many applications, for example in statistical experimental design, coding theory, authentication codes, and cryptography. Major approaches to the problem of discovering new tdesigns rely on (i) the construction of large sets of t designs, (ii) using prescribed automorphism groups, (iii) recursive construction methods. In 2017 and 2018, Tran Van Trung introduced new recursive...
Show moreIt was not until the 20th century that combinatorial design theory was studied as a formal subject. This field has many applications, for example in statistical experimental design, coding theory, authentication codes, and cryptography. Major approaches to the problem of discovering new tdesigns rely on (i) the construction of large sets of t designs, (ii) using prescribed automorphism groups, (iii) recursive construction methods. In 2017 and 2018, Tran Van Trung introduced new recursive techniques to construct t – (v, k, λ) designs. These methods are of purely combinatorial nature and require using "ingredient" tdesigns or resolutions whose parameters satisfy a system of nonlinear equations. Even after restricting the range of parameters in this new method, the task is computationally intractable. In this work, we enhance Tran Van Trung's "Basic Construction" by a robust and efficient hybrid computational apparatus which enables us to construct hundreds of thousands of new t – (v, k, Λ) designs from previously known ingredient designs. Towards the end of the dissertation we also create a new family of 2resolutions, which will be infinite if there are infinitely many Sophie Germain primes.
Show less  Date Issued
 2019
 PURL
 http://purl.flvc.org/fau/fd/FA00013233
 Subject Headings
 Combinatorial designs and configurations, Algorithms, tdesigns
 Format
 Document (PDF)
 Title
 Asymmetric information in fads models in Lâevy markets.
 Creator
 Buckley, Winston S., Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

Fads models for stocks under asymmetric information in a purely continuous(GBM) market were first studied by P. Guasoni (2006), where optimal portfolios and maximum expected logarithmic utilities, including asymptotic utilities for the informed and uninformed investors, were presented. We generalized this theory to Lâevy markets, where stock prices and the process modeling the fads are allowed to include a jump component, in addition to the usual continuous component. We employ the methods of...
Show moreFads models for stocks under asymmetric information in a purely continuous(GBM) market were first studied by P. Guasoni (2006), where optimal portfolios and maximum expected logarithmic utilities, including asymptotic utilities for the informed and uninformed investors, were presented. We generalized this theory to Lâevy markets, where stock prices and the process modeling the fads are allowed to include a jump component, in addition to the usual continuous component. We employ the methods of stochastic calculus and optimization to obtain analogous results to those obtained in the purely continuous market. We approximate optimal portfolios and utilities using the instantaneous centralized and quasicentralized moments of the stocks percentage returns. We also link the random portfolios of the investors, under asymmetric information to the purely deterministic optimal portfolio, under symmetric information.
Show less  Date Issued
 2009
 PURL
 http://purl.flvc.org/FAU/3337187
 Subject Headings
 Investments, Mathematical models, Capital market, Mathematical models, Finance, Mathematical models, Information theory in economics, Capital asset pricing model, Lâevy processes
 Format
 Document (PDF)
 Title
 AUC estimation under various survival models.
 Creator
 Chang, Fazhe., Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

In the medical science, the receiving operationg characteristic (ROC) curve is a graphical representation to evaluate the accuracy of a medical diagnostic test for any cutoff point. The area under the ROC curve (AUC) is an overall performance measure for a diagnostic test. There are two parts in this dissertation. In the first part, we study the properties of biExponentiated Weibull models. FIrst, we derive a general moment formula for single Exponentiated Weibull models. Then we move on to...
Show moreIn the medical science, the receiving operationg characteristic (ROC) curve is a graphical representation to evaluate the accuracy of a medical diagnostic test for any cutoff point. The area under the ROC curve (AUC) is an overall performance measure for a diagnostic test. There are two parts in this dissertation. In the first part, we study the properties of biExponentiated Weibull models. FIrst, we derive a general moment formula for single Exponentiated Weibull models. Then we move on to derive the precise formula of AUC and study the maximus likelihood estimation (MLE) of the AUC. Finally, we obtain the asymptotoc distribution of the estimated AUC. Simulation studies are used to check the performance of MLE of AUC under the moderate sample sizes. The second part fo the dissertation is to study the estimation of AUC under the crossing model, which extends the AUC formula in Gonen and Heller (2007).
Show less  Date Issued
 2012
 PURL
 http://purl.flvc.org/FAU/3359287
 Subject Headings
 Receiver operating characteristic curves, Medical screening, Statistical methods, Diagnosis, Statistical methods, Smoothing (Statistics)
 Format
 Document (PDF)
 Title
 AuslanderReiten theory for systems of submodule embeddings.
 Creator
 Moore, Audrey., Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

In this dissertation, we will investigate aspects of AuslanderReiten theory adapted to the setting of systems of submodule embeddings. Using this theory, we can compute AuslanderReiten quivers of such categories, which among other information, yields valuable information about the indecomposable objects in such a category. A main result of the dissertation is an adaptation to this situation of the Auslander and RingelTachikawa Theorem which states that for an artinian ring R of finite...
Show moreIn this dissertation, we will investigate aspects of AuslanderReiten theory adapted to the setting of systems of submodule embeddings. Using this theory, we can compute AuslanderReiten quivers of such categories, which among other information, yields valuable information about the indecomposable objects in such a category. A main result of the dissertation is an adaptation to this situation of the Auslander and RingelTachikawa Theorem which states that for an artinian ring R of finite representation type, each Rmodule is a direct sum of finitelength indecomposable Rmodules. In cases where this applies, the indecomposable objects obtained in the AuslanderReiten quiver give the building blocks for the objects in the category. We also briefly discuss in which cases systems of submodule embeddings form a Frobenius category, and for a few examples explore pointwise CalabiYau dimension of such a category.
Show less  Date Issued
 2009
 PURL
 http://purl.flvc.org/fcla/dt/210496
 Subject Headings
 Artin algebras, Rings (Algebra), Representation of algebras, Embeddings (Mathematics), Linear algebraic groups
 Format
 Document (PDF)
 Title
 Bayesian approach to an exponential hazard regression model with a change point.
 Creator
 Abraha, Yonas Kidane, Qian, Lianfen, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

This thesis contains two parts. The first part derives the Bayesian estimator of the parameters in a piecewise exponential Cox proportional hazard regression model, with one unknown change point for a right censored survival data. The second part surveys the applications of change point problems to various types of data, such as longterm survival data, longitudinal data and time series data. Furthermore, the proposed method is then used to analyse a real survival data.
 Date Issued
 2014
 PURL
 http://purl.flvc.org/fau/fd/FA00004013
 Subject Headings
 Bayesian statistical decision theory, Mathematical statistics, Multivariate analysis  Data processing
 Format
 Document (PDF)
 Title
 Bijections for partition identities.
 Creator
 Lai, JinMei Jeng, Florida Atlantic University, Meyerowitz, Aaron, Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

This paper surveys work of the last few years on construction of bijections for partition identities. We use the more general setting of sieveequivalent families. Suppose A1' ... ,An are subsets of a finite set A and B1' ... ,Bn are subsets of a finite set B. Define AS=∩(i∈S) Ai and BS = ∩ (i∈S) Bi for all S⊆N={1,...,n}. Given explicit bijections fS: AS>BS for each S⊆N, A∪Ai has the same size as B∪Bi. Several authors have given algorithms for producing an explicit bijection between these...
Show moreThis paper surveys work of the last few years on construction of bijections for partition identities. We use the more general setting of sieveequivalent families. Suppose A1' ... ,An are subsets of a finite set A and B1' ... ,Bn are subsets of a finite set B. Define AS=∩(i∈S) Ai and BS = ∩ (i∈S) Bi for all S⊆N={1,...,n}. Given explicit bijections fS: AS>BS for each S⊆N, A∪Ai has the same size as B∪Bi. Several authors have given algorithms for producing an explicit bijection between these two sets. In certain important cases they give the same result. We discuss and compare algorithms, use Graph Theory to illustrate them, and provide PAS CAL programs for them.
Show less  Date Issued
 1992
 PURL
 http://purl.flvc.org/fau/fd/FADT14826
 Subject Headings
 Algorithms, Partitions (Mathematics), Sieves (Mathematics)
 Format
 Document (PDF)
 Title
 The CayleyDickson algebras.
 Creator
 Khalil, Saidah Hasan, Florida Atlantic University, Yiu, Paul Y., Charles E. Schmidt College of Science, Department of Mathematical Sciences
 Abstract/Description

This thesis studies the various effects of the nonassociativity of the CayleyDickson algebras At, t>3, especially on the structure of their automorphism groups. Beginning with the problem of composition algebra structures on euclidean spaces, we shall explain the origin of the CayleyDickson algebras, and give a selfcontained exposition on some important results on such algebras. These algebras being nonassociative, we focus on the study of the associators of the form (u,w,v) = (uw)v  u(wv...
Show moreThis thesis studies the various effects of the nonassociativity of the CayleyDickson algebras At, t>3, especially on the structure of their automorphism groups. Beginning with the problem of composition algebra structures on euclidean spaces, we shall explain the origin of the CayleyDickson algebras, and give a selfcontained exposition on some important results on such algebras. These algebras being nonassociative, we focus on the study of the associators of the form (u,w,v) = (uw)v  u(wv). The first main result, that if u and v are elements in a CayleyDickson algebra for which (u, w, v) = 0 for all w, then u and v generate a 2dimensional subalgebra isomorphic to C, was conjectured by P. Yiu, and proved by P. Eakin and A. Sathaye. We shall simplify the proof given by these latter authors. This is then used to give a simple proof of R. D. Schafer's theorem on derivations of CayleyDickson algebras, and following also Eakin and Sathaye, a proof of the conjecture by R. B. Brown on the structure of the automorphism groups of these algebras. Two simple proofs are presented for the beautiful characterization by H. Brandt that in the Cayley algebra A3 = K, conjugation by a unit element a is an automorphism if and only if a is a 6th root of unity. We shall present a geometric proof by M. A. Zorn and a purely algebraic one. The zero divisors of the CayleyDickson algebra A4 are also analyzed in detail.
Show less  Date Issued
 1993
 PURL
 http://purl.flvc.org/fcla/dt/14993
 Subject Headings
 Cayley algebras
 Format
 Document (PDF)