Browsing Mathematics (Faculty of) by Title
Now showing items 12781297 of 2758

An Investigation of Methods for Missing Data in Hierarchical Models for Discrete Data
(University of Waterloo, 20110309)Hierarchical models are applicable to modeling data from complex surveys or longitudinal data when a clustered or multistage sample design is employed. The focus of this thesis is to investigate inference for discrete ... 
An Investigation of Word Sense Disambiguation for Improving Lexical Chaining
(University of Waterloo, 2006)This thesis investigates how word sense disambiguation affects lexical chains, as well as proposing an improved model for lexical chaining in which word sense disambiguation is performed prior to lexical chaining. A ... 
Investigations into quantum lightmatter interactions, their approximations and applications
(University of Waterloo, 20210126)Devoting some thought to the interactions between light and matter quickly conjure a myriad of different possibilities; different models for light and matter, different possible interaction Hamiltonians, different simplifying ... 
An IsogenyBased Adaptor Signature Using SQISign
(University of Waterloo, 20220419)Transactions on blockchains can prove very costly, so as a solution to avoid these large costs, schemes involving payment channel networks have been developed. One approach to implementing these offchain forms of payment ... 
Iterated Function Systems with PlaceDependent Probabilities and the Inverse Problem of Measure Approximation Using Moments
(University of Waterloo, 20161025)The study of iterated function systems has close ties with the subject of fractalbased analysis. One important application is the approximation of a target object by the fixed point of a contractive iterated function ... 
Iterative Editbased Unsupervised Sentence Simplification
(University of Waterloo, 20200728)We present a new iterative approach towards unsupervised editbased sentence simplification. Our approach is guided by a scoring function to select simplified sentences generated after iteratively performing word and ... 
Iterative Rounding Approximation Algorithms in Network Design
(University of Waterloo, 20100521)Iterative rounding has been an increasingly popular approach to solving network design optimization problems ever since Jain introduced the concept in his revolutionary 2approximation for the Survivable Network Design ... 
Jaeger’s Strong 3Flow Conjecture for Graphs in Low Genus Surfaces
(University of Waterloo, 20200505)In 1972, Tutte posed the 3Flow Conjecture: that all 4edgeconnected graphs have a nowhere zero 3flow. This was extended by Jaeger et al. (1992) to allow vertices to have a prescribed, possibly nonzero difference (modulo ... 
A Java Toolkit for Distributed Evaluation of Hypergeometric Series
(University of Waterloo, 2004)Hypergoemetric Series are very important in mathematics and come up regularly when dealing with the precise definitions of constants such as <i>e</i>, π and Apery's constant ς(3). The evaluation of such series ... 
Jets, Vortices and Turbulence in QuasiGeostrophic Magnetohydrodynamics
(University of Waterloo, 20220728)In this thesis, we model the dynamics of the solar tachocline and the Earth's molten core using a shallow, rapidly rotating, and electrically conducting fluid on an fplane. We explore the effects of a strong uniform ... 
JITGNN: A Deep Graph Neural Network for JustInTime Bug Prediction
(University of Waterloo, 20220510)JustInTime (JIT) bug prediction is the problem of predicting software failure immediately after a change is submitted to the code base. JIT bug prediction is often preferred to other types of bug prediction (subsystem, ... 
Join Cardinality Estimation Graphs: Analyzing Pessimistic and Optimistic Estimators Through a Common Lens
(University of Waterloo, 20200807)Join cardinality estimation is a fundamental problem that is solved in the query optimizers of database management systems when generating efficient query plans. This problem arises both in systems that manage relational ... 
Juicy Haptic Design: Vibrotactile Embellishments Can Improve Player Experience in Games
(ACM, 202105)Game designers and researchers employ a sophisticated language for producing great player experiences with concepts such as juici ness, which refers to excessive positive feedback. However, much of their discourse excludes ... 
The kbest paths in Hidden Markov Models. Algorithms and Applications to Transmembrane Protein Topology Recognition.
(University of Waterloo, 20090826)Traditional algorithms for hidden Markov model decoding seek to maximize either the probability of a state path or the number of positions of a sequence assigned to the correct state. These algorithms provide only a ... 
A kConjugacy Class Problem
(University of Waterloo, 20070907)In any group G, we may extend the definition of the conjugacy class of an element to the conjugacy class of a ktuple, for a positive integer k. When k = 2, we are forming the conjugacy classes of ordered pairs, when k ... 
Ktheory for C*Algebras and for Topological Spaces
(University of Waterloo, 20150427)Ktheory is the study of a collection of abelian groups that are invariant to C*algebras or to locally compact Hausdorff spaces. These groups are useful for distinguishing C*algebras and topological spaces, and they are ... 
Kalman Filter Based Sensor Placement For Burgers Equation
(University of Waterloo, 20190603)The algorithm used for determining sensor placement in this thesis will be based on the Kalman filter. This filter is very famous and its application are numerous  some examples include aircraft navigation, finance and ... 
Kernel Methods in ComputerAided Constructive Drug Design
(University of Waterloo, 20090514)A drug is typically a small molecule that interacts with the binding site of some target protein. Drug design involves the optimization of this interaction so that the drug effectively binds with the target protein while ... 
Key Compression for IsogenyBased Cryptosystems
(University of Waterloo, 20160421)We present a method for key compression in quantumresistant isogenybased cryptosystems, which reduces storage and transmission costs of perparty public information by a factor of two, with no effect on the security level ... 
Key establishment  security models, protocols and usage
(University of Waterloo, 20080730)Key establishment is the process whereby two or more parties derive a shared secret, typically used for subsequent confidential communication. However, identifying the exact security requirements for key establishment ...