Marion Scheepers - Academia.edu (original) (raw)

Uploads

Papers by Marion Scheepers

Research paper thumbnail of The Brahmagupta Triples and Record Numbers

In the spring 2020 semester, one group assignment in the course Communication in the Mathematical... more In the spring 2020 semester, one group assignment in the course Communication in the Mathematical Sciences at Boise State University, taught by Dr. Marion Scheepers, instructed students to write a paper which explores Brahmagupta N-triples. A triple (x,y,k) of integers is a Brahmagupta N-triple if the equation x2-Ny2=k holds for them. Two groups found a previously unknown sequence of Brahmagupta N-triples involving record primes. This finding led to new research questions and the current project. This project investigates whether there are for each k patterns related to the N, x, or y for new record values of x or y coefficients at corresponding N, relations among these record coefficients, possible growth patterns, and modular patterns for record N\u27s, and whether for these record values the number N is required to be a prime number

Research paper thumbnail of Decrypting the Link Between Elliptic Primes and Twin Primes

Research paper thumbnail of Combinatorial Search and Computational Complexity

Many practical problems have the goal of identifying, with limited resources, a small number of o... more Many practical problems have the goal of identifying, with limited resources, a small number of objects from a large collection - be it a faulty circuit in a complex device, an infected individual in a population, a cryptographic key in a cyber attack, or a person of interest in a series of crimes. Although some such search problems are believed to require exhaustive search in general, many practical instances have yielded to carefully designed efficient search strategies. Our research focuses on the design and analysis of such efficient search techniques using combinatorial structures called splitting systems. The smaller a splitting system is, the more efficiently large-scale searches based on it can be executed. We hope to identify techniques for creating very small splitting systems in an attempt to speed up these processes. The methods used in this investigation stem from the fields of discrete mathematics and combinatorics

Research paper thumbnail of A Study of Games Over Finite Groups

Finite groups are mathematical platforms for modern cryptography. Security protocols are often vu... more Finite groups are mathematical platforms for modern cryptography. Security protocols are often vulnerable to subtle exploits. A well-chosen group can be used to foil these exploits. To identify suitable groups, attack scenarios are modeled by two-player games. This research focuses on two classes of such games. For one class of games we give a complete analysis over finite Abelian groups. We report partial results for non-Abelian groups and for the other class of games. Game Theory

Research paper thumbnail of Vulnerabilities of the Artificial Pancreas System and Proposed Cryptographic Solutions

Research paper thumbnail of Winning Strategies for Matrix Games

Consider a square matrix M in Z2, equal to its transpose, with a northwest-southeast diagonal of ... more Consider a square matrix M in Z2, equal to its transpose, with a northwest-southeast diagonal of zeros. The mcds operation, when applied repeatedly to such a matrix M, terminates either in the zero matrix or else in several matrices, each with at most six ones located in specific positions within the matrix. The variability in outcomes for the results of this operation suggests a basis for a finite combinatorial game. In this project we explore winning strategies for the game in question and examine the possible ending configurations of the process upon which it is based

Research paper thumbnail of Rothberger bounded groups and Ramsey theory

arXiv (Cornell University), Nov 8, 2010

Research paper thumbnail of Selective Games on Binary Relations

arXiv (Cornell University), May 19, 2014

Research paper thumbnail of Context Directed Reversals and the Ciliate Decryptome

arXiv (Cornell University), Mar 19, 2016

Research paper thumbnail of Covering games and the Banach-Mazur game: k-tactics

arXiv (Cornell University), Jul 24, 1992

Research paper thumbnail of Quantifying CDS Sortability of Permutations by Strategic Pile Size

arXiv (Cornell University), Nov 28, 2018

Research paper thumbnail of On a hypothesis for ℵ0-bounded groups

Topology and its Applications, May 1, 2019

Research paper thumbnail of A sequential property of <span class="katex"><span class="katex-mathml"><math xmlns="http://www.w3.org/1998/Math/MathML"><semantics><mrow><msub><mi mathvariant="sans-serif">C</mi><mi>p</mi></msub><mo stretchy="false">(</mo><mi>X</mi><mo stretchy="false">)</mo></mrow><annotation encoding="application/x-tex">\mathsf {C}_p(X)</annotation></semantics></math></span><span class="katex-html" aria-hidden="true"><span class="base"><span class="strut" style="height:1.0361em;vertical-align:-0.2861em;"></span><span class="mord"><span class="mord mathsf">C</span><span class="msupsub"><span class="vlist-t vlist-t2"><span class="vlist-r"><span class="vlist" style="height:0.1514em;"><span style="top:-2.55em;margin-left:0em;margin-right:0.05em;"><span class="pstrut" style="height:2.7em;"></span><span class="sizing reset-size6 size3 mtight"><span class="mord mathnormal mtight">p</span></span></span></span><span class="vlist-s">​</span></span><span class="vlist-r"><span class="vlist" style="height:0.2861em;"><span></span></span></span></span></span></span><span class="mopen">(</span><span class="mord mathnormal" style="margin-right:0.07847em;">X</span><span class="mclose">)</span></span></span></span> and a covering property of Hurewicz

Proceedings of the American Mathematical Society, 1997

Research paper thumbnail of A Direct Proof of a Theorem of Telgarsky

Proceedings of the American Mathematical Society, Nov 1, 1995

Research paper thumbnail of The Sortability of Graphs and Matrices under Context Directed Swaps

arXiv (Cornell University), Apr 5, 2019

Research paper thumbnail of The Sortability of Graphs and Matrices under Context Directed Swaps

arXiv: Combinatorics, 2019

The study of sorting permutations by block interchanges has recently been stimulated by a phenome... more The study of sorting permutations by block interchanges has recently been stimulated by a phenomenon observed in the genome maintenance of certain ciliate species. The result was the identification of a block interchange operation that applies only under certain constraints. Interestingly, this constrained block interchange operation can be generalized naturally to simple graphs and to an operation on square matrices. This more general context provides numerous techniques applicable to the original context. In this paper we consider the more general context, and obtain an enumeration, in closed form, of all simple graphs on n vertices that are ``sortable" by the graph analogue of the constrained version of block interchanges. We also obtain asymptotic results on the proportion of graphs on n vertices that are so sortable.

Research paper thumbnail of Meager Sets, Games and Singular Cardinals

arXiv (Cornell University), Aug 21, 2018

Research paper thumbnail of On a conjecture for <span class="katex"><span class="katex-mathml"><math xmlns="http://www.w3.org/1998/Math/MathML"><semantics><mrow><msub><mi mathvariant="normal">ℵ</mi><mn>0</mn></msub></mrow><annotation encoding="application/x-tex">\aleph_0</annotation></semantics></math></span><span class="katex-html" aria-hidden="true"><span class="base"><span class="strut" style="height:0.8444em;vertical-align:-0.15em;"></span><span class="mord"><span class="mord">ℵ</span><span class="msupsub"><span class="vlist-t vlist-t2"><span class="vlist-r"><span class="vlist" style="height:0.3011em;"><span style="top:-2.55em;margin-left:0em;margin-right:0.05em;"><span class="pstrut" style="height:2.7em;"></span><span class="sizing reset-size6 size3 mtight"><span class="mord mtight">0</span></span></span></span><span class="vlist-s">​</span></span><span class="vlist-r"><span class="vlist" style="height:0.15em;"><span></span></span></span></span></span></span></span></span></span>-bounded groups

arXiv (Cornell University), Aug 22, 2018

Research paper thumbnail of Creating and Implementing Cloud-Based Simulations

2011 ASEE Annual Conference & Exposition Proceedings, Sep 4, 2020

Research paper thumbnail of Combinatorics of open covers (IX): Basis properties

Note di Matematica, Oct 29, 2003

Research paper thumbnail of The Brahmagupta Triples and Record Numbers

In the spring 2020 semester, one group assignment in the course Communication in the Mathematical... more In the spring 2020 semester, one group assignment in the course Communication in the Mathematical Sciences at Boise State University, taught by Dr. Marion Scheepers, instructed students to write a paper which explores Brahmagupta N-triples. A triple (x,y,k) of integers is a Brahmagupta N-triple if the equation x2-Ny2=k holds for them. Two groups found a previously unknown sequence of Brahmagupta N-triples involving record primes. This finding led to new research questions and the current project. This project investigates whether there are for each k patterns related to the N, x, or y for new record values of x or y coefficients at corresponding N, relations among these record coefficients, possible growth patterns, and modular patterns for record N\u27s, and whether for these record values the number N is required to be a prime number

Research paper thumbnail of Decrypting the Link Between Elliptic Primes and Twin Primes

Research paper thumbnail of Combinatorial Search and Computational Complexity

Many practical problems have the goal of identifying, with limited resources, a small number of o... more Many practical problems have the goal of identifying, with limited resources, a small number of objects from a large collection - be it a faulty circuit in a complex device, an infected individual in a population, a cryptographic key in a cyber attack, or a person of interest in a series of crimes. Although some such search problems are believed to require exhaustive search in general, many practical instances have yielded to carefully designed efficient search strategies. Our research focuses on the design and analysis of such efficient search techniques using combinatorial structures called splitting systems. The smaller a splitting system is, the more efficiently large-scale searches based on it can be executed. We hope to identify techniques for creating very small splitting systems in an attempt to speed up these processes. The methods used in this investigation stem from the fields of discrete mathematics and combinatorics

Research paper thumbnail of A Study of Games Over Finite Groups

Finite groups are mathematical platforms for modern cryptography. Security protocols are often vu... more Finite groups are mathematical platforms for modern cryptography. Security protocols are often vulnerable to subtle exploits. A well-chosen group can be used to foil these exploits. To identify suitable groups, attack scenarios are modeled by two-player games. This research focuses on two classes of such games. For one class of games we give a complete analysis over finite Abelian groups. We report partial results for non-Abelian groups and for the other class of games. Game Theory

Research paper thumbnail of Vulnerabilities of the Artificial Pancreas System and Proposed Cryptographic Solutions

Research paper thumbnail of Winning Strategies for Matrix Games

Consider a square matrix M in Z2, equal to its transpose, with a northwest-southeast diagonal of ... more Consider a square matrix M in Z2, equal to its transpose, with a northwest-southeast diagonal of zeros. The mcds operation, when applied repeatedly to such a matrix M, terminates either in the zero matrix or else in several matrices, each with at most six ones located in specific positions within the matrix. The variability in outcomes for the results of this operation suggests a basis for a finite combinatorial game. In this project we explore winning strategies for the game in question and examine the possible ending configurations of the process upon which it is based

Research paper thumbnail of Rothberger bounded groups and Ramsey theory

arXiv (Cornell University), Nov 8, 2010

Research paper thumbnail of Selective Games on Binary Relations

arXiv (Cornell University), May 19, 2014

Research paper thumbnail of Context Directed Reversals and the Ciliate Decryptome

arXiv (Cornell University), Mar 19, 2016

Research paper thumbnail of Covering games and the Banach-Mazur game: k-tactics

arXiv (Cornell University), Jul 24, 1992

Research paper thumbnail of Quantifying CDS Sortability of Permutations by Strategic Pile Size

arXiv (Cornell University), Nov 28, 2018

Research paper thumbnail of On a hypothesis for ℵ0-bounded groups

Topology and its Applications, May 1, 2019

Research paper thumbnail of A sequential property of <span class="katex"><span class="katex-mathml"><math xmlns="http://www.w3.org/1998/Math/MathML"><semantics><mrow><msub><mi mathvariant="sans-serif">C</mi><mi>p</mi></msub><mo stretchy="false">(</mo><mi>X</mi><mo stretchy="false">)</mo></mrow><annotation encoding="application/x-tex">\mathsf {C}_p(X)</annotation></semantics></math></span><span class="katex-html" aria-hidden="true"><span class="base"><span class="strut" style="height:1.0361em;vertical-align:-0.2861em;"></span><span class="mord"><span class="mord mathsf">C</span><span class="msupsub"><span class="vlist-t vlist-t2"><span class="vlist-r"><span class="vlist" style="height:0.1514em;"><span style="top:-2.55em;margin-left:0em;margin-right:0.05em;"><span class="pstrut" style="height:2.7em;"></span><span class="sizing reset-size6 size3 mtight"><span class="mord mathnormal mtight">p</span></span></span></span><span class="vlist-s">​</span></span><span class="vlist-r"><span class="vlist" style="height:0.2861em;"><span></span></span></span></span></span></span><span class="mopen">(</span><span class="mord mathnormal" style="margin-right:0.07847em;">X</span><span class="mclose">)</span></span></span></span> and a covering property of Hurewicz

Proceedings of the American Mathematical Society, 1997

Research paper thumbnail of A Direct Proof of a Theorem of Telgarsky

Proceedings of the American Mathematical Society, Nov 1, 1995

Research paper thumbnail of The Sortability of Graphs and Matrices under Context Directed Swaps

arXiv (Cornell University), Apr 5, 2019

Research paper thumbnail of The Sortability of Graphs and Matrices under Context Directed Swaps

arXiv: Combinatorics, 2019

The study of sorting permutations by block interchanges has recently been stimulated by a phenome... more The study of sorting permutations by block interchanges has recently been stimulated by a phenomenon observed in the genome maintenance of certain ciliate species. The result was the identification of a block interchange operation that applies only under certain constraints. Interestingly, this constrained block interchange operation can be generalized naturally to simple graphs and to an operation on square matrices. This more general context provides numerous techniques applicable to the original context. In this paper we consider the more general context, and obtain an enumeration, in closed form, of all simple graphs on n vertices that are ``sortable" by the graph analogue of the constrained version of block interchanges. We also obtain asymptotic results on the proportion of graphs on n vertices that are so sortable.

Research paper thumbnail of Meager Sets, Games and Singular Cardinals

arXiv (Cornell University), Aug 21, 2018

Research paper thumbnail of On a conjecture for <span class="katex"><span class="katex-mathml"><math xmlns="http://www.w3.org/1998/Math/MathML"><semantics><mrow><msub><mi mathvariant="normal">ℵ</mi><mn>0</mn></msub></mrow><annotation encoding="application/x-tex">\aleph_0</annotation></semantics></math></span><span class="katex-html" aria-hidden="true"><span class="base"><span class="strut" style="height:0.8444em;vertical-align:-0.15em;"></span><span class="mord"><span class="mord">ℵ</span><span class="msupsub"><span class="vlist-t vlist-t2"><span class="vlist-r"><span class="vlist" style="height:0.3011em;"><span style="top:-2.55em;margin-left:0em;margin-right:0.05em;"><span class="pstrut" style="height:2.7em;"></span><span class="sizing reset-size6 size3 mtight"><span class="mord mtight">0</span></span></span></span><span class="vlist-s">​</span></span><span class="vlist-r"><span class="vlist" style="height:0.15em;"><span></span></span></span></span></span></span></span></span></span>-bounded groups

arXiv (Cornell University), Aug 22, 2018

Research paper thumbnail of Creating and Implementing Cloud-Based Simulations

2011 ASEE Annual Conference & Exposition Proceedings, Sep 4, 2020

Research paper thumbnail of Combinatorics of open covers (IX): Basis properties

Note di Matematica, Oct 29, 2003