Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 18 of 18
Full-Text Articles in Physical Sciences and Mathematics
Pymol Plugin To Build Protein Structures Based On Natural Term Overlaps, Noah T. Paravicini
Pymol Plugin To Build Protein Structures Based On Natural Term Overlaps, Noah T. Paravicini
Dartmouth College Undergraduate Theses
This project is a continuation of the Grigoryan Lab's exploration of TERMs. A TERM is a tertiary structural motif, which is a fragment of a protein that includes the secondary, tertiary, and quaternary environments around a certain residue. As displayed in past publications discussing TERMs, they are a useful way of decomposing proteins into smaller components that help in understanding design and prediction of protein structures. The Grigoryan Lab developed a database that keeps track of naturally occurring overlaps between TERMs, which gives a user the information they would need to put these TERMs together into complex structures. These events …
The Next Generation Of Empress: A Metadata Management System For Accelerated Scientific Discovery At Exascale, Margaret R. Lawson
The Next Generation Of Empress: A Metadata Management System For Accelerated Scientific Discovery At Exascale, Margaret R. Lawson
Dartmouth College Undergraduate Theses
Scientific data sets have grown rapidly in recent years, outpacing the growth in memory and network bandwidths. This I/O bottleneck has made it increasingly difficult for scientists to read and search outputted datasets in an attempt to find features of interest. In this paper, we will present the next generation of EMPRESS, a scalable metadata management service that offers the following solution: users can "tag" features of interest and search these tags without having to read in the associated datasets. EMPRESS provides, in essence, a digital scientific notebook where scientists can write down observations and highlight interesting results, and an …
Robotic Laundry Folding, Evan Honnold
Robotic Laundry Folding, Evan Honnold
Dartmouth College Undergraduate Theses
We designed and implemented laundry-folding strategies for a six-jointed robotic arm. Our two main contributions are a "bar-folding" method for folding shirts that have already been unwrinkled and positioned on a table, and a planner for generating new sequences of folds that this method can use. Our "bar-folding" method is quick, accurate, and simple compared to other folding methods, and our fold planner provides an automated alternative to the pre-programmed fold sequences used in other research.
Navigating Virtual Reality Using Only Your Gazes And Mind, Christopher J. Kymn
Navigating Virtual Reality Using Only Your Gazes And Mind, Christopher J. Kymn
Dartmouth College Undergraduate Theses
We present a novel brain-computer interface that allows users to control virtual reality using only their brain waves and eye gazes. The interface allows users to control multiple objects with two dimensions of control. The system is portable, non-invasive, and runs on commercial-grade hardware. It thus provides a high-transmission and user-adaptive interface for users to engage in virtual reality. In addition, we present a training procedure that allows the user to increase control over the brain-computer interface by engaging with the program in an intuitive manner. We explain this procedure and demonstrate its effectiveness in formulating more readily interpreted commands.
Securing, Standardizing, And Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson
Securing, Standardizing, And Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson
Dartmouth College Undergraduate Theses
Audit logs perform critical functions in electronic health record (EHR) systems. They provide a chronological record of all operations performed in an EHR, allowing health care organizations to track EHR usage, hold system users accountable for their interactions with patient records, detect anomalous and potentially malicious behavior in the system, protect patient privacy, and develop insight into workflows and interactions among system users. However, several problems exist with the way that current state-of-the-art EHR technology handles audit data. Specifically, current systems complicate the collection and analysis of audit logs because they lack an interoperable audit log structure, spread audit log …
Thinking Inside The Box: Converting Encapsulated Postscript To Scalable Vector Graphics, Trevor L. Davis
Thinking Inside The Box: Converting Encapsulated Postscript To Scalable Vector Graphics, Trevor L. Davis
Dartmouth College Undergraduate Theses
Following the deprecation of the MacDraw graphics application, no extant application arose as a suitable substitute. A team of of Dartmouth undergraduates that included myself set out to rectify this by creating DartDraw, a graphics app that mimics MacDraw along with a few improvements. This was our combined effort over the past year. My role was to convert the Scalable Vector Graphics (SVG) used within the application to an exportable Encapsulated PostScript File. This process relied on an in-depth understanding of both the PostScript language and the React-Redux framework. Computing the bounding boxes of figures proved to be the largest …
Balancing Patient Control And Practical Access Policy For Electronic Health Records Via Blockchain Technology, Elena Horton
Balancing Patient Control And Practical Access Policy For Electronic Health Records Via Blockchain Technology, Elena Horton
Dartmouth College Undergraduate Theses
Electronic health records (EHRs) have revolutionized the health information technology domain, as patient data can be easily stored and accessed within and among medical institutions. However, in working towards nationwide patient engagement and interoperability goals, recent literature adopts a very patient-centric model---patients own their universal, holistic medical records and control exactly who can access their health data. I contend that this approach is largely impractical for healthcare workflows, where many separate providers require access to health records for care delivery. My work investigates the potential of a blockchain network to balance patient control and provider accessibility with a two-fold approach. …
Ipv6 Security Issues In Linux And Freebsd Kernels: A 20-Year Retrospective, Jack R. Cardwell
Ipv6 Security Issues In Linux And Freebsd Kernels: A 20-Year Retrospective, Jack R. Cardwell
Dartmouth College Undergraduate Theses
Although IPv6 was introduced in 1998, its adoption didn't begin to take off until 2012. Furthermore, its vulnerabilities haven't received as much attention as those of IPv4. As such, there is potential to exploit these vulnerabilities. With the amount of IPv6 traffic rapidly increasing, these exploits present real-world consequences. This paper aims to re-evaluate the security of IPv6 stack implementations in FreeBSD and Linux kernels, specifically FreeBSD 11.1 and Ubuntu Linux 4.13. It contributes to the literature in three ways. We first reproduce ten vulnerabilities from existing research to determine whether known bugs have been patched. Then, we examine two, …
Reflections On Building Dartdraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury
Reflections On Building Dartdraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury
Dartmouth College Undergraduate Theses
In this paper, I discuss some of the design challenges I encountered while contributing to DartDraw, a React-Redux drawing application modeled after MacDraw. The features I worked on include: zoom, pan, grid, ruler, and arrowheads.
Overlaying Virtual Scale Models On Real Environments Without The Use Of Peripherals, George Hito
Overlaying Virtual Scale Models On Real Environments Without The Use Of Peripherals, George Hito
Dartmouth College Undergraduate Theses
The Architecture, Engineering, and Construction (AEC) industries have become increasingly reliant on detailed 3D modeling software and visualization tools. In the past few years, the arrival of effective and relatively cheap virtual reality has transformed the workflows of people in these professions. Augmented reality (AR) is poised to have a similar if not greater effect. For that to occur, the transition into using this technology must be seamless and straightforward. In particular, a clear bridge should be made between Computer Aided Design (CAD) models and their corresponding real-world environments. Using Unity and Microsoft's Hololens, I developed a method of automatically …
Co-Training Of Audio And Video Representations From Self-Supervised Temporal Synchronization, Bruno Korbar
Co-Training Of Audio And Video Representations From Self-Supervised Temporal Synchronization, Bruno Korbar
Dartmouth College Undergraduate Theses
There is a natural correlation between the visual and auditive elements of a video. In this work, we use this correlation in order to learn strong and general features via cross-modal self-supervision with carefully chosen neural network architectures and calibrated curriculum learning. We suggest that this type of training is an effective way of pretraining models for further pursuits in video understanding, as they achieve on average 14.8% improvement over models trained from scratch. Furthermore, we demonstrate that these general features can be used for audio classification and perform on par with state-of-the-art results. Lastly, our work shows that using …
Afterimage: Collecting And Replaying Geospatial Memory, Hyun Ji Seong
Afterimage: Collecting And Replaying Geospatial Memory, Hyun Ji Seong
Dartmouth College Master’s Theses
AfterImage is an interactive wall consisted of light detecting units controlled by microprocessors. Each light-sensing unit determines user proximity through the intensity of the shadow being cast, turning these shadows into bright snapshots portrayed through built-in LED lights. AfterImage extends the concept of memory to a space and location by imitating two unique characteristics of human memory: a lingering afterimage effect for intense stimuli, and a flashback of events that happened in the past. To create a more organic representation of flashbacks, a native data structure was explored. Through the collection and reproduction of geospatial memory, AfterImage attempts to change …
Dartdraw: The Design And Implementation Of Global State Management, User Interaction Management, And Text In A React-Redux Drawing Application, Collin M. Mckinney
Dartdraw: The Design And Implementation Of Global State Management, User Interaction Management, And Text In A React-Redux Drawing Application, Collin M. Mckinney
Dartmouth College Undergraduate Theses
This paper outlines the design and implementation of DartDraw, a drawing application which closely emulates the user interface of the original MacDraw application and supports the importing of MacDraw files.
Full And Dense Cyclic Gray Codes In Mixed Radices, Devina Kumar
Full And Dense Cyclic Gray Codes In Mixed Radices, Devina Kumar
Dartmouth College Undergraduate Theses
The Gray code is a sequence of n consecutive binary numbers arranged so that adjacent numbers in the sequence differ in a single digit and that each number appears in the sequence exactly once. A Gray code is considered cyclic if the first and last numbers in the sequence differ in only one digit position, and those digits have a difference of exactly 1. In this thesis, numbers in a Gray-code sequence may be modular cyclic, meaning that in radix r, two consecutive numbers may vary in a digit with values 0 and r-1. This thesis focuses on methods to …
Secure Short-Range Communications, Timothy J. Pierson
Secure Short-Range Communications, Timothy J. Pierson
Dartmouth College Ph.D Dissertations
Analysts predict billions of everyday objects will soon become ``smart’' after designers add wireless communication capabilities. Collectively known as the Internet of Things (IoT), these newly communication-enabled devices are envisioned to collect and share data among themselves, with new devices entering and exiting a particular environment frequently. People and the devices they wear or carry may soon encounter dozens, possibly hundreds, of devices each day. Many of these devices will be encountered for the first time. Additionally, some of the information the devices share may have privacy or security implications. Furthermore, many of these devices will have limited or non-existent …
Complex Neural Networks For Audio, Andy M. Sarroff
Complex Neural Networks For Audio, Andy M. Sarroff
Dartmouth College Ph.D Dissertations
Audio is represented in two mathematically equivalent ways: the real-valued time domain (i.e., waveform) and the complex-valued frequency domain (i.e., spectrum). There are advantages to the frequency-domain representation, e.g., the human auditory system is known to process sound in the frequency-domain. Furthermore, linear time-invariant systems are convolved with sources in the time-domain, whereas they may be factorized in the frequency-domain. Neural networks have become rather useful when applied to audio tasks such as machine listening and audio synthesis, which are related by their dependencies on high quality acoustic models. They ideally encapsulate fine-scale temporal structure, such as that encoded in …
Customizing Indoor Wireless Coverage Via 3d-Fabricated Reflectors, Xi Xiong
Customizing Indoor Wireless Coverage Via 3d-Fabricated Reflectors, Xi Xiong
Dartmouth College Master’s Theses
Judicious control of indoor wireless coverage is crucial in built environments. It enhances signal reception, reduces harmful interference, and raises the barrier for malicious attackers. Existing methods are either costly, vulnerable to attacks, or hard to configure. We present a low-cost, secure, and easy-to-configure approach that uses an easily-accessible, 3D-fabricated reflector to customize wireless coverage. With input on coarse-grained environment setting and preferred coverage (e.g., areas with signals to be strengthened or weakened), the system computes an optimized reflector shape tailored to the given environment. The user simply 3D prints the reflector and places it around a Wi-Fi access point …
Types For The Chain Of Trust: No (Loader) Write Left Behind, Rebecca Shapiro
Types For The Chain Of Trust: No (Loader) Write Left Behind, Rebecca Shapiro
Dartmouth College Ph.D Dissertations
The software chain of trust starts with a chain of loaders. Software is just as reliant on the sequence of loaders that ultimately setup its runtime environment as it is on the libraries with which it shares its address space and offloads tasks onto. Loaders, and especially bootloaders, act as the keystone of trust, and yet their formal security properties -- which should be a part of any solid bootloader design -- are both underappreciated and not well understood. This is especially problematic given the increasing adoption of loader-based code signing and execution enforcement mechanisms. My thesis digs deeply into …