Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Pymol Plugin To Build Protein Structures Based On Natural Term Overlaps, Noah T. Paravicini Nov 2018

Pymol Plugin To Build Protein Structures Based On Natural Term Overlaps, Noah T. Paravicini

Dartmouth College Undergraduate Theses

This project is a continuation of the Grigoryan Lab's exploration of TERMs. A TERM is a tertiary structural motif, which is a fragment of a protein that includes the secondary, tertiary, and quaternary environments around a certain residue. As displayed in past publications discussing TERMs, they are a useful way of decomposing proteins into smaller components that help in understanding design and prediction of protein structures. The Grigoryan Lab developed a database that keeps track of naturally occurring overlaps between TERMs, which gives a user the information they would need to put these TERMs together into complex structures. These events …


The Next Generation Of Empress: A Metadata Management System For Accelerated Scientific Discovery At Exascale, Margaret R. Lawson Jun 2018

The Next Generation Of Empress: A Metadata Management System For Accelerated Scientific Discovery At Exascale, Margaret R. Lawson

Dartmouth College Undergraduate Theses

Scientific data sets have grown rapidly in recent years, outpacing the growth in memory and network bandwidths. This I/O bottleneck has made it increasingly difficult for scientists to read and search outputted datasets in an attempt to find features of interest. In this paper, we will present the next generation of EMPRESS, a scalable metadata management service that offers the following solution: users can "tag" features of interest and search these tags without having to read in the associated datasets. EMPRESS provides, in essence, a digital scientific notebook where scientists can write down observations and highlight interesting results, and an …


Robotic Laundry Folding, Evan Honnold Jun 2018

Robotic Laundry Folding, Evan Honnold

Dartmouth College Undergraduate Theses

We designed and implemented laundry-folding strategies for a six-jointed robotic arm. Our two main contributions are a "bar-folding" method for folding shirts that have already been unwrinkled and positioned on a table, and a planner for generating new sequences of folds that this method can use. Our "bar-folding" method is quick, accurate, and simple compared to other folding methods, and our fold planner provides an automated alternative to the pre-programmed fold sequences used in other research.


Navigating Virtual Reality Using Only Your Gazes And Mind, Christopher J. Kymn Jun 2018

Navigating Virtual Reality Using Only Your Gazes And Mind, Christopher J. Kymn

Dartmouth College Undergraduate Theses

We present a novel brain-computer interface that allows users to control virtual reality using only their brain waves and eye gazes. The interface allows users to control multiple objects with two dimensions of control. The system is portable, non-invasive, and runs on commercial-grade hardware. It thus provides a high-transmission and user-adaptive interface for users to engage in virtual reality. In addition, we present a training procedure that allows the user to increase control over the brain-computer interface by engaging with the program in an intuitive manner. We explain this procedure and demonstrate its effectiveness in formulating more readily interpreted commands.


Securing, Standardizing, And Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson Jun 2018

Securing, Standardizing, And Simplifying Electronic Health Record Audit Logs Through Permissioned Blockchain Technology, Jessie Anderson

Dartmouth College Undergraduate Theses

Audit logs perform critical functions in electronic health record (EHR) systems. They provide a chronological record of all operations performed in an EHR, allowing health care organizations to track EHR usage, hold system users accountable for their interactions with patient records, detect anomalous and potentially malicious behavior in the system, protect patient privacy, and develop insight into workflows and interactions among system users. However, several problems exist with the way that current state-of-the-art EHR technology handles audit data. Specifically, current systems complicate the collection and analysis of audit logs because they lack an interoperable audit log structure, spread audit log …


Thinking Inside The Box: Converting Encapsulated Postscript To Scalable Vector Graphics, Trevor L. Davis Jun 2018

Thinking Inside The Box: Converting Encapsulated Postscript To Scalable Vector Graphics, Trevor L. Davis

Dartmouth College Undergraduate Theses

Following the deprecation of the MacDraw graphics application, no extant application arose as a suitable substitute. A team of of Dartmouth undergraduates that included myself set out to rectify this by creating DartDraw, a graphics app that mimics MacDraw along with a few improvements. This was our combined effort over the past year. My role was to convert the Scalable Vector Graphics (SVG) used within the application to an exportable Encapsulated PostScript File. This process relied on an in-depth understanding of both the PostScript language and the React-Redux framework. Computing the bounding boxes of figures proved to be the largest …


Balancing Patient Control And Practical Access Policy For Electronic Health Records Via Blockchain Technology, Elena Horton Jun 2018

Balancing Patient Control And Practical Access Policy For Electronic Health Records Via Blockchain Technology, Elena Horton

Dartmouth College Undergraduate Theses

Electronic health records (EHRs) have revolutionized the health information technology domain, as patient data can be easily stored and accessed within and among medical institutions. However, in working towards nationwide patient engagement and interoperability goals, recent literature adopts a very patient-centric model---patients own their universal, holistic medical records and control exactly who can access their health data. I contend that this approach is largely impractical for healthcare workflows, where many separate providers require access to health records for care delivery. My work investigates the potential of a blockchain network to balance patient control and provider accessibility with a two-fold approach. …


Ipv6 Security Issues In Linux And Freebsd Kernels: A 20-Year Retrospective, Jack R. Cardwell May 2018

Ipv6 Security Issues In Linux And Freebsd Kernels: A 20-Year Retrospective, Jack R. Cardwell

Dartmouth College Undergraduate Theses

Although IPv6 was introduced in 1998, its adoption didn't begin to take off until 2012. Furthermore, its vulnerabilities haven't received as much attention as those of IPv4. As such, there is potential to exploit these vulnerabilities. With the amount of IPv6 traffic rapidly increasing, these exploits present real-world consequences. This paper aims to re-evaluate the security of IPv6 stack implementations in FreeBSD and Linux kernels, specifically FreeBSD 11.1 and Ubuntu Linux 4.13. It contributes to the literature in three ways. We first reproduce ten vulnerabilities from existing research to determine whether known bugs have been patched. Then, we examine two, …


Reflections On Building Dartdraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury May 2018

Reflections On Building Dartdraw: A React + Redux Vector-Based Graphics Editor, Elisabeth G. Pillsbury

Dartmouth College Undergraduate Theses

In this paper, I discuss some of the design challenges I encountered while contributing to DartDraw, a React-Redux drawing application modeled after MacDraw. The features I worked on include: zoom, pan, grid, ruler, and arrowheads.


Overlaying Virtual Scale Models On Real Environments Without The Use Of Peripherals, George Hito May 2018

Overlaying Virtual Scale Models On Real Environments Without The Use Of Peripherals, George Hito

Dartmouth College Undergraduate Theses

The Architecture, Engineering, and Construction (AEC) industries have become increasingly reliant on detailed 3D modeling software and visualization tools. In the past few years, the arrival of effective and relatively cheap virtual reality has transformed the workflows of people in these professions. Augmented reality (AR) is poised to have a similar if not greater effect. For that to occur, the transition into using this technology must be seamless and straightforward. In particular, a clear bridge should be made between Computer Aided Design (CAD) models and their corresponding real-world environments. Using Unity and Microsoft's Hololens, I developed a method of automatically …


Co-Training Of Audio And Video Representations From Self-Supervised Temporal Synchronization, Bruno Korbar May 2018

Co-Training Of Audio And Video Representations From Self-Supervised Temporal Synchronization, Bruno Korbar

Dartmouth College Undergraduate Theses

There is a natural correlation between the visual and auditive elements of a video. In this work, we use this correlation in order to learn strong and general features via cross-modal self-supervision with carefully chosen neural network architectures and calibrated curriculum learning. We suggest that this type of training is an effective way of pretraining models for further pursuits in video understanding, as they achieve on average 14.8% improvement over models trained from scratch. Furthermore, we demonstrate that these general features can be used for audio classification and perform on par with state-of-the-art results. Lastly, our work shows that using …


Afterimage: Collecting And Replaying Geospatial Memory, Hyun Ji Seong May 2018

Afterimage: Collecting And Replaying Geospatial Memory, Hyun Ji Seong

Dartmouth College Master’s Theses

AfterImage is an interactive wall consisted of light detecting units controlled by microprocessors. Each light-sensing unit determines user proximity through the intensity of the shadow being cast, turning these shadows into bright snapshots portrayed through built-in LED lights. AfterImage extends the concept of memory to a space and location by imitating two unique characteristics of human memory: a lingering afterimage effect for intense stimuli, and a flashback of events that happened in the past. To create a more organic representation of flashbacks, a native data structure was explored. Through the collection and reproduction of geospatial memory, AfterImage attempts to change …


Dartdraw: The Design And Implementation Of Global State Management, User Interaction Management, And Text In A React-Redux Drawing Application, Collin M. Mckinney May 2018

Dartdraw: The Design And Implementation Of Global State Management, User Interaction Management, And Text In A React-Redux Drawing Application, Collin M. Mckinney

Dartmouth College Undergraduate Theses

This paper outlines the design and implementation of DartDraw, a drawing application which closely emulates the user interface of the original MacDraw application and supports the importing of MacDraw files.


Full And Dense Cyclic Gray Codes In Mixed Radices, Devina Kumar May 2018

Full And Dense Cyclic Gray Codes In Mixed Radices, Devina Kumar

Dartmouth College Undergraduate Theses

The Gray code is a sequence of n consecutive binary numbers arranged so that adjacent numbers in the sequence differ in a single digit and that each number appears in the sequence exactly once. A Gray code is considered cyclic if the first and last numbers in the sequence differ in only one digit position, and those digits have a difference of exactly 1. In this thesis, numbers in a Gray-code sequence may be modular cyclic, meaning that in radix r, two consecutive numbers may vary in a digit with values 0 and r-1. This thesis focuses on methods to …


Secure Short-Range Communications, Timothy J. Pierson May 2018

Secure Short-Range Communications, Timothy J. Pierson

Dartmouth College Ph.D Dissertations

Analysts predict billions of everyday objects will soon become ``smart’' after designers add wireless communication capabilities. Collectively known as the Internet of Things (IoT), these newly communication-enabled devices are envisioned to collect and share data among themselves, with new devices entering and exiting a particular environment frequently. People and the devices they wear or carry may soon encounter dozens, possibly hundreds, of devices each day. Many of these devices will be encountered for the first time. Additionally, some of the information the devices share may have privacy or security implications. Furthermore, many of these devices will have limited or non-existent …


Complex Neural Networks For Audio, Andy M. Sarroff May 2018

Complex Neural Networks For Audio, Andy M. Sarroff

Dartmouth College Ph.D Dissertations

Audio is represented in two mathematically equivalent ways: the real-valued time domain (i.e., waveform) and the complex-valued frequency domain (i.e., spectrum). There are advantages to the frequency-domain representation, e.g., the human auditory system is known to process sound in the frequency-domain. Furthermore, linear time-invariant systems are convolved with sources in the time-domain, whereas they may be factorized in the frequency-domain. Neural networks have become rather useful when applied to audio tasks such as machine listening and audio synthesis, which are related by their dependencies on high quality acoustic models. They ideally encapsulate fine-scale temporal structure, such as that encoded in …


Customizing Indoor Wireless Coverage Via 3d-Fabricated Reflectors, Xi Xiong May 2018

Customizing Indoor Wireless Coverage Via 3d-Fabricated Reflectors, Xi Xiong

Dartmouth College Master’s Theses

Judicious control of indoor wireless coverage is crucial in built environments. It enhances signal reception, reduces harmful interference, and raises the barrier for malicious attackers. Existing methods are either costly, vulnerable to attacks, or hard to configure. We present a low-cost, secure, and easy-to-configure approach that uses an easily-accessible, 3D-fabricated reflector to customize wireless coverage. With input on coarse-grained environment setting and preferred coverage (e.g., areas with signals to be strengthened or weakened), the system computes an optimized reflector shape tailored to the given environment. The user simply 3D prints the reflector and places it around a Wi-Fi access point …


Types For The Chain Of Trust: No (Loader) Write Left Behind, Rebecca Shapiro Apr 2018

Types For The Chain Of Trust: No (Loader) Write Left Behind, Rebecca Shapiro

Dartmouth College Ph.D Dissertations

The software chain of trust starts with a chain of loaders. Software is just as reliant on the sequence of loaders that ultimately setup its runtime environment as it is on the libraries with which it shares its address space and offloads tasks onto. Loaders, and especially bootloaders, act as the keystone of trust, and yet their formal security properties -- which should be a part of any solid bootloader design -- are both underappreciated and not well understood. This is especially problematic given the increasing adoption of loader-based code signing and execution enforcement mechanisms. My thesis digs deeply into …