Skip to main content

Events

Steve Campbell, NC State, “Who’s in control here?”

Control theory is an important topic in applied mathematics that is used in a number of disciplines. Its theoretical foundations involve several areas of mathematics. It is also a topic that is less well known at the undergraduate level. In this talk we will explain what control theory is and give several elementary examples of specific kinds of…

Dan Scofield, NC State

Solid, liquid, gas – we see these phases of matter all around us. But physicists have discovered exotic phases with strange properties, such as superfluids and superconductors. What kinds of phase transitions happen in an extremely cold, thin sheet of matter? What does this have to do with the field of math known as topology? In this talk we’ll…

Mette Olufsen, NC State, “Why don’t we (usually) faint when we stand up?”

Basic physics suggests that when we stand up, the blood pressure in our brain should drop dramatically. Such a pressure drop should cause us to faint. But most of us don’t faint when we stand up. In this talk I’ll discuss a mathematical model that explains why most of us don’t, and why some people…

Ephraim Bililign, Taylor Garnowski, William Reese and Brandon Summers, NC State Undergraduate Student Honors Presentations

1. Ephraim Bililign Title: Measuring the temperature of granular systems Abstract: Granular systems, or collections of athermal mesoscale particles, are immune to temperature in the conventional sense. Thus, to describe the behavior of an jammed assortment of grains, we turn to a modified thermodynamics built on forces and volumes. I will discuss the experimental measurements…

Beverly Setzer, Samuel Weber and Christopher Cardullo, NC State Undergraduate Student Honors Presentations

1. Beverly Setzer Title: Detecting Hidden Nodes in Neuronal Networks using Adaptive Filtering Abstract: The identification of network connectivity from noisy time series is of great interest in the study of network dynamics. This connectivity estimation problem becomes more complicated when we consider the possibility of hidden nodes within the network. These hidden nodes act…