Network Science

By Myla James, Shania Johnson, Maya Mukerjee, and Savitha Saminathan.

 

Graph Theory

Here’s some definitions to help you understand our assignment:

Nodes – vertex/point.
Edges – lines connecting vertices.
Adjacent – two nodes (vertices) are adjacent if they share an edge (line).
Degree – number of edges adjacent to a particular node.

We started this problem set with learning about the difference between connected and disconnected graphs.

Connected Graph – able to travel from one node to any other through its edges.
Disconnected graph – more complex; it has components.
Components – parts of the graphs that are connected.

Continue reading

Quantum Mechanics

By Izzy Cox, Divya Iyer, Wgoud Mansour, Ashleigh Sico, and Elizabeth Whetzel.

Quantum Mechanics is the physics of molecular and microscopic particles. However, it has applications in everyday life as well. If someone asked you if a human was a particle or a wave, what would you think? What about a ball? What about light? Not so easy now, is it? It turns out that all of those things, and in fact, everything around us, can be expressed in physics as both a particle and a wave. This might seem a little unbelievable, but for now, let’s start with the basics.

 

Classical Physics

Although Classical Physics sounds like a complicated idea, it’s the most simple branch of physics. It’s what you think of when someone says “physics”. Classical Physics lays the basic foundation to Quantum Physics with a few basic laws.

Continue reading

Elliptic Curve Cryptography

By Noa Bearman, Kimberly Cruz Lopez, Tina Lin, Xintong Xiang, and Maria Neri Otero*

*Maria helped the group work through the problem set but was unfortunately unable to attend camp during the blog writing.

Screen Shot 2017-06-29 at 1.50.17 PM

Introduction

Have you ever tried to send a secret message to a friend? Did it work? Was it secure? Well, one way to do so in a more secure way is by using Elliptic Curve Cryptography (ECC). Most people have never heard of ECC before, and two weeks ago, neither did we. However, in the past two weeks, we have been learning how to use this exciting application of the techniques of algebraic geometry and abstract algebra applied to the ancient art of keeping messages secure. ECC was first introduced by Victor Miller and Neal Koblitz in 1985. It was proposed as an alternative to other forms of cryptography with public-key systems such as DSA and RSA. Public-key systems involve the use of two different kinds of keys: a public key that is available to the public and a private key in which only the owner knows. The applications of ECC has been growing and has recently gained a lot of attention in industry and academia. The following information below will go more in-depth on what ECC is, how it works, its advantages, its disadvantages, and our progression throughout this course.

Continue reading

Special Relativity

By Katie Clark, Tori Dunston, Kelly Fan, Abrianna Macklin, and McKenna Vernon

Picture a hummingbird. At any moment, it can go in any of the three dimensions it is a part of. So, it could go up and down, forwards and backwards, or left and right. But, one thing that is not taken into account is time. As it moves through space, it is also occupying time. However, we’re not used to thinking about our world in a four dimensional sense. But, as the movement of the pigeon progresses, so does time. This is known as the relationship between space and time, and it is the primary foundation that special relativity is built on. So, at any given moment, it actually can move in four dimensions at once. This can be simply modeled using a spacetime diagram.

lightcone3

Continue reading

Network Science

By Cameron Farrar, Elizabeth Gross, Shiropa Noor, and Rebecca Rozansky

Girls Talk Math was an eyeopening experience to a brand new world of mathematics. Over the past two weeks, we have been introduced to multiple topics and related professions. We learned about: quantum mechanics, surface classification, knot theory, computing & dynamics, elliptic curve cryptography, RSA encryption, special relativity and the most interesting of them all- NETWORK SCIENCE!

During our time at Girls Talk Math, we learned about the wonders of network science and graph theory. The difficult part of this otherwise enjoyable journey? Mathematica. Mathematica is a software created to make you suffer, especially if you already know computer science (AHEM BECKY). Basically, we created graphs, did calculations and got confused on Mathematica. Typing out all the commands took ages. We’ll show you some examples as we go through the different concepts we explored. Don’t worry- once you spend some time on Mathematica, you’ll get used to it.

Continue reading

Elliptic Curve Cryptography

By Mukta Dharmapurikar, Anagha Jandhyala, Savanna Jones, and Ciara Renaud.

Have you ever wondered how your credit card number stays secure after shopping online? Every day millions of people’s personal information is entered online or stored in databases, where it seems like anyone could access it. However, a process called cryptography keeps theft from occurring.

Cryptography is the ancient art of keeping secret messages secure. Elliptic curve cryptography is one type of encryption that we spent the last two weeks learning about. It has some advantages over the more common cryptography method, known as RSA.

RSA relies on the difficulty of factoring very large prime numbers. Despite the current security, it’s feasible that one day a method could be invented that makes factoring large prime numbers realistic. In this blog post, we will be explaining the essential math behind how elliptic curves work and how they are used to encrypt messages.

Continue reading

The Art of Cryptography

By: Nia Beverly, Makayla McDaniel, Yuanyuan Matherly, and Tyler Deegan

Introduction

Cryptography is defined as the art of writing and solving codes. Upon first thought, many people picture codes as an antiquated war time communication technique. However, the field of cryptography is alive and well,  and it has become pervasive in our everyday lives. The world is becoming more and more connected through technology, and with this, there is a greater need to protect information. Encryption is probably the most widely used application of cryptography, and it is used to protect information by making it so only one person with a key can understand what is transmitted. In the following paragraphs we will walk through the steps to mathematically understanding one widely used type of encryption.

Continue reading

Intro to Relativity

By: Miranda Copenhaver, Chloe Nash, Wanda Wilkins, Lauren Behringer, and Jazmin Santillan C.

 

Throughout this week, we have worked through multiple problems dealing with both classical mechanics and special relativity. We found the main difference between classical mechanics and special relativity to be the assumptions made about time as a constant. This is what we mean:

  • In classical mechanics it is assumed that time is a constant that is observed the same for all viewers.
  • In special relativity time cannot be taken as a constant. Because the speed of light is the same for all observers, time-dilation occurs.

So, if you are getting a little lost it’s completely normal. We have a couple of examples of both classical mechanics and special relativity below:

Continue reading

Mathematical Modeling (Fluid Dynamics)

By: Annie Huang, Heesue Kim, Sophie Gilliam, and Sylvia Towey

Hi guys!

Welcome to the Girls Talk Math blog today! This blog is to show you guys what we have learned and accomplished with fluid dynamics. At first, we (Annie, Heesue, Sophie, Sylvia) thought this was a very difficult topic but after some explanation and experiment, we learned how easy it is to work with the different topics thanks to the Girls Talk Math Camp held on the UNC Chapel Hill campus. Today we will be giving you a brief intro to mathematical modeling, Bernoulli’s principle, Dimensional Analysis, and Projectile motion.

Continue reading