Topics in Fractal Geometry (open access)

Topics in Fractal Geometry

In this dissertation, we study fractal sets and their properties, especially the open set condition, Hausdorff dimensions and Hausdorff measures for certain fractal constructions.
Date: August 1994
Creator: Wang, JingLing
System: The UNT Digital Library
Electronic Analog Computer Study of Effects of Motor Velocity and Driving Voltage Limits upon Servomechanism Performance (open access)

Electronic Analog Computer Study of Effects of Motor Velocity and Driving Voltage Limits upon Servomechanism Performance

The object of this thesis is (1) to demonstrate the value of an electronic analog computer for the solution of non-linear ordinary differential equations particularly when a large family of solutions is required; and (2) to obtain as a by-product results of practical applicability to servomechanism selection and analysis.
Date: 1956
Creator: Haynes, Joe Preston
System: The UNT Digital Library
Semi-supervised and Self-evolving Learning Algorithms with Application to Anomaly Detection in Cloud Computing (open access)

Semi-supervised and Self-evolving Learning Algorithms with Application to Anomaly Detection in Cloud Computing

Semi-supervised learning (SSL) is the most practical approach for classification among machine learning algorithms. It is similar to the humans way of learning and thus has great applications in text/image classification, bioinformatics, artificial intelligence, robotics etc. Labeled data is hard to obtain in real life experiments and may need human experts with experimental equipments to mark the labels, which can be slow and expensive. But unlabeled data is easily available in terms of web pages, data logs, images, audio, video les and DNA/RNA sequences. SSL uses large unlabeled and few labeled data to build better classifying functions which acquires higher accuracy and needs lesser human efforts. Thus it is of great empirical and theoretical interest. We contribute two SSL algorithms (i) adaptive anomaly detection (AAD) (ii) hybrid anomaly detection (HAD), which are self evolving and very efficient to detect anomalies in a large scale and complex data distributions. Our algorithms are capable of modifying an existing classier by both retiring old data and adding new data. This characteristic enables the proposed algorithms to handle massive and streaming datasets where other existing algorithms fail and run out of memory. As an application to semi-supervised anomaly detection and for experimental illustration, we …
Date: December 2012
Creator: Pannu, Husanbir Singh
System: The UNT Digital Library
Continuous Combinatorics of a Lattice Graph in the Cantor Space (open access)

Continuous Combinatorics of a Lattice Graph in the Cantor Space

We present a novel theorem of Borel Combinatorics that sheds light on the types of continuous functions that can be defined on the Cantor space. We specifically consider the part X=F(2ᴳ) from the Cantor space, where the group G is the additive group of integer pairs ℤ². That is, X is the set of aperiodic {0,1} labelings of the two-dimensional infinite lattice graph. We give X the Bernoulli shift action, and this action induces a graph on X in which each connected component is again a two-dimensional lattice graph. It is folklore that no continuous (indeed, Borel) function provides a two-coloring of the graph on X, despite the fact that any finite subgraph of X is bipartite. Our main result offers a much more complete analysis of continuous functions on this space. We construct a countable collection of finite graphs, each consisting of twelve "tiles", such that for any property P (such as "two-coloring") that is locally recognizable in the proper sense, a continuous function with property P exists on X if and only if a function with a corresponding property P' exists on one of the graphs in the collection. We present the theorem, and give several applications.
Date: May 2016
Creator: Krohne, Edward
System: The UNT Digital Library
Mathematical Modeling of Charged Liquid Droplets: Numerical Simulation and Stability Analysis (open access)

Mathematical Modeling of Charged Liquid Droplets: Numerical Simulation and Stability Analysis

The goal of this thesis is to study of the evolution of 3D electrically charged liquid droplets of fluid evolving under the influence of surface tension and electrostatic forces. In the first part of the thesis, an appropriate mathematical model of the problem is introduced and the linear stability analysis is developed by perturbing a sphere with spherical harmonics. In the second part, the numerical solution of the problem is described with the use of the boundary elements method (BEM) on an adaptive mesh of triangular elements. The numerical method is validated by comparison with exact solutions. Finally, various numerical results are presented. These include neck formation in droplets, the evolution of surfaces with holes, singularity formation on droplets with various symmetries and numerical evidence that oblate spheroids are unstable.
Date: May 2006
Creator: Vantzos, Orestis
System: The UNT Digital Library
A General Approach to Buhlmann Credibility Theory (open access)

A General Approach to Buhlmann Credibility Theory

Credibility theory is widely used in insurance. It is included in the examination of the Society of Actuaries and in the construction and evaluation of actuarial models. In particular, the Buhlmann credibility model has played a fundamental role in both actuarial theory and practice. It provides a mathematical rigorous procedure for deciding how much credibility should be given to the actual experience rating of an individual risk relative to the manual rating common to a particular class of risks. However, for any selected risk, the Buhlmann model assumes that the outcome random variables in both experience periods and future periods are independent and identically distributed. In addition, the Buhlmann method uses sample mean-based estimators to insure the selected risk, which may be a poor estimator of future costs if only a few observations of past events (costs) are available. We present an extension of the Buhlmann model and propose a general method based on a linear combination of both robust and efficient estimators in a dependence framework. The performance of the proposed procedure is demonstrated by Monte Carlo simulations.
Date: August 2017
Creator: Yan, Yujie yy
System: The UNT Digital Library