Mathematics, Engineering and Computer Science Undergraduate Theses
Browse by
Recent Submissions
-
Understanding the Mathematics Behind Cryptography
(2021)Today the internet is being used more than ever in order to store, transfer and access information. As a result, our private information is vulnerable to malicious parties who wish to use it for their own personal benefit. ... -
Un Gran Viaje A Data Visualization of Latin American Immigration
(2021)The story of the Latin American immigrant making their "gran viaje" or great journey to the United States transcends conversations presented in news articles and political rhetoric. Immigration trends, both past and present, ... -
Comparing retirement investing with fixed and life-cycle funds using a variety of asset classes
(2021)There are many different studies that both reinforce and discourage the use of life-cycle funds for retirement investing, but a majority of these studies only look at life-cycle funds that include the three main asset ... -
The Effect of Programming on Students' Understanding of Mathematics
(2020)Many schools are aware that technology and coding needs to be implemented more within their curriculum in order to have students become more literate in the heavily technology oriented society. Previously, researchers have ... -
A Prime Look into the Field of Cryptography
(2020)Data encryption is vital in protecting the information that we send over the internet on a daily basis. This paper will explore two of the most commonly used public key encryption algorithms today: RSA and elliptic curve. ... -
A Mathematical Analysis of Scheduling for AWARE
(2020)AWARE is a non-pro t organization that provides care and services for people with challenging mental health, emotional, and in some instances, physical disabilities [1]. Many of the clients in AWARE residential programs ... -
Leaking Underground Storage Tank Impact Model
(2019-04-01)Leaking underground storage tanks (UST) pose a threat to the surrounding environment and population. The Montana Department of Environmental Quality (MT DEQ) has completed two phases of a risk analysis with the purpose of ... -
A Numerical Model of the Subaerial Landslide Generated Waves of the Berkeley Pit
(2019-04-01)Southwestern Montana has a very rich history because of its mining activities. Butte, home to the richest hill on earth, is no exception. Underground operations resulted in 10,000 miles of horizontal underground workings ... -
Predicting Chaotic Behavior in Electrical Circuits
(2019-04-01)Chaotic behavior is a natural phenomenon that can be found all around us in our daily lives. This project is focused on analyzing the behavior in forced RL-Diode (resistor, inductor, and diode) electrical circuits. We ... -
Optimizing Investment Portfolio Allocation
(2019-04-01)This analysis presents a model that could be used to inform a portfolio manager in which sectors of the stock market to invest in for the equity portion of an investment portfolio. The model incorporates a linear program ... -
Utilizing Role Based Modeling Language to Determine a System’s Safety From an Advanced Persistent Threat
(2019-04-01)With Advanced Persistent Threats (APTs) becoming a larger threat among the cyber world, it is important that software is designed with security in mind. In order to aide this process, software developers can use security ... -
Data-Driven Discovery of Ordinary Differential Equations
(2019-04-01)We suggest that using data-driven methods on collected sensor data, we can recreate the ordinary differential equation. In this case we are applying data to find the ODE as opposed to deriving an ODE from basic principles. ... -
Classifications of Electrical Resistance Distance in Simple Graphs
(2018-04-01)In graph theory, there are multiple distance metrics which can describe the concept of “distance” between nodes on a simple graph and are of particular interest to researchers studying link prediction and network evolution. ... -
Applications of Network Flows
(2018-04-01)Have you ever played a board game or a video game where you figured out the shortest path between two locations before moving? Or have you ever been following directions from Google Maps and noticed a red patch of slow ... -
More than one way to skin a cat: Interpolation techniques in one-dimension
(2018-04-01)In this paper, we discuss and develop several one-dimensional interpolation techniques. Interpolation is a process for generating functions that pass through specified points in space. In general, given a set of points P ... -
The Shape of Disease: Applying geometric data analysis and other methods to time series survey data
(2018-04-01)In this thesis we examine household survey responses to Owner Questions collected in the vaccination zone of the Serengeti Health Initiative and the surrounding region through statistical methods from epidemiology, such ... -
Creating the Tools to Study Galaxy Evolution Through Examination of Properties of Dark Matter Halos
(2017-05-13)We study dark matter galaxy halos found by Jared W. Coughlin while running the Amiga Halo Finder on the output of a modified GADGET 2 large scale simulation [5], [7], [6]. The neighborhood of the halos is defined at different ... -
Modeling Contaminant Flow in the Puget Sound
(2017-05-13)In this paper, we mathematically model contaminant flow in a two-dimensional domain of the Puget Sound using a finite element numerical solution to the advection-diffusion equation coupled with a finite difference numerical ... -
Mirror symmetry in black holes, elementary particles, and mathematics
(2017-05-13)Mirror symmetry is the study of two seemingly different objects that are conjectured to be the same. That is, we could think of them as mirror images of each other. For example, string theorists conjecture that there exists ... -
Topological Data Analysis: Giving Data Shape
(2017-05-13)Topological Data Analysis (TDA) combines topology and data analytics which offers a new perspective when analyzing data. More so, TDA is capable of providing shape to data that otherwise may be difficult to visualize. In ...