Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 25 of 25

Full-Text Articles in Physical Sciences and Mathematics

The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki Jun 2023

The Power Of (Virtual) Convergence: The Unrealized Potential Of Pair Programming And Remote Work, Mikayla Maki

University Honors Theses

Remote work is expensive. It can lead to isolation, miscommunications, and ossified organizations. These problems occur because of a synchronicity mismatch between how we need to communicate as humans, and what today's tools are capable of. This mismatch can be solved by the adoption of remote pair programming, as exemplified by the authors work at a startup (Zed). Pair programming provides the organic, synchronous, reciprocal interaction necessary to develop the sorts of relationships that remote firms currently lack.


Job Management Portal Software Review, Ruchir Elukurthy Jun 2023

Job Management Portal Software Review, Ruchir Elukurthy

University Honors Theses

This essay provides an overview of a computer science capstone project focused on developing a website for Abilities At Work, a non-profit organization. The website aims to assist employment specialists in managing clients' information and tracking their job application in finding meaningful employment. The essay highlights the various stages of the project, understanding requirements, selecting tools and technologies, creating an application architecture, and writing code. Also, this essay focuses on the challenges encountered during the project, along with the valuable lessons learned. This essay emphasizes how the project closely resembles real-world software development, offering insights for prospective students and professionals. …


How Photorealistic Images Are Generated, Nahom Ketema Jun 2023

How Photorealistic Images Are Generated, Nahom Ketema

University Honors Theses

The field of computer graphics looks into how computers can be used to generate images. From using some trigonometry to plot 3D objects to using rays to calculate the lighting of an object, there are a variety of ways that we can use to draw objects onto a screen. For this thesis, we will be looking at a few of those methods to determine how photorealistic images are generated.


Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost Jun 2023

Epl Card Reader Capstone: The Strengths Of Partner Programming From A Team Leader's Perspective, Zach Yost

University Honors Theses

This essay looks to reflect back upon the successes and failures of the EPL Card Reader capstone project, sponsored by Edward Ivory, head of Portland State University's Electronics Prototyping Lab. The EPL Card Reader's goal is to provide a means of tracking and updating student activity and training on the various machines in the lab. Using a local computer port to host this web app a lab administrator or manager is able to scan a student's access badge to review which machines they have been trained on as well as update that training status. The app also has a running …


National Climate Data Graphical Plotting Software Review, Melissa Barnes Jun 2022

National Climate Data Graphical Plotting Software Review, Melissa Barnes

University Honors Theses

This is a review of an undergraduate Computer Science Capstone project. The paper discusses the development process, what software tools were used, the challenges faced during the development process, and what the software does. The software described in this paper is a python program that utilizes United States county-scoped climate and drought data from the National Climate Data Center to create visualizations and mathematical calculations. The software has an interactive user interface that displays various graphs, heat maps and calculated values. Elevation and population data estimates for populated areas in most counties is also provided. Users may select any set …


Classifying Dead Code In Software Development, Arman Alavizadeh Mar 2022

Classifying Dead Code In Software Development, Arman Alavizadeh

University Honors Theses

Dead code pervades as an issue in the world of software development as a source of many famous software disasters such as the ARIANE 5 rocket failure and chemical bank withdrawal error. Defining dead code on narrow levels of granularity has not been fully explored, yet is crucial to better our understanding of dead code. Here we will be starting a discussion on how to approach classifying dead code via comparing dead code research specific to an industry segment. Research will be compared primarily by methodology and limitations. Dead code subtype classifications are gleaned from research comparisons and can serve …


Rapid Method For Consistency And Concentration Reporting Of Cannabidiol Using 1H-Nmr And Computer-Assisted Chemical Software, Michael A. Fernando Dec 2021

Rapid Method For Consistency And Concentration Reporting Of Cannabidiol Using 1H-Nmr And Computer-Assisted Chemical Software, Michael A. Fernando

University Honors Theses

An integrated computational method was demonstrated with hemp-derived Cannabidiol for an assessment of its purity and concentration. The sample was structurally verified, high purity, and 2.98 mmol/L in dissolved DMSO. The method presented is a general approach to assessing purity and concentration for any small organic molecule in CMC-Assist.


Expanding Temperature Sensing For The Orion Bms 2, Samuel J. Parker Oct 2021

Expanding Temperature Sensing For The Orion Bms 2, Samuel J. Parker

University Honors Theses

Formula SAE (FSAE) is an annual collegiate design competition that takes place across the globe. Portland State University’s team, Viking Motorsports, was committed to designing an Electric Vehicle (EV) for the 2021 FSAE competition. The team designed a completely custom lithium-ion cell battery that is managed by an Orion BMS 2 battery management system. The FSAE rulebook requires a robust temperature monitoring system for any EV power supply. The Orion BMS 2 can only directly collect data from eight temperature sensors, which is not enough to meet FSAE regulation. However, the BMS can be configured to monitor many more sensors …


Functional Role Of The N-Terminal Domain In Connexin 46/50 By In Silico Mutagenesis And Molecular Dynamics Simulation, Umair Khan Jun 2021

Functional Role Of The N-Terminal Domain In Connexin 46/50 By In Silico Mutagenesis And Molecular Dynamics Simulation, Umair Khan

University Honors Theses

Connexins form intercellular channels known as gap junctions that facilitate diverse physiological roles, from long-range electrical and chemical coupling to nutrient exchange. Recent structural studies on Cx46 and Cx50 have defined a novel and stable open state and implicated the amino-terminal (NT) domain as a major contributor to functional differences between connexin isoforms. This thesis presents two studies which use molecular dynamics simulations with these new structures to provide mechanistic insight into the function and behavior of the NTH in Cx46 and Cx50. In the first, residues in the NTH that differ between Cx46 and Cx50 are swapped between the …


Automated Decision Making And Machine Learning: Regulatory Alternatives For Autonomous Settings, Alyssa Heminger Jun 2021

Automated Decision Making And Machine Learning: Regulatory Alternatives For Autonomous Settings, Alyssa Heminger

University Honors Theses

Given growing investment capital in research and development, accompanied by extensive literature on the subject by researchers in nearly every domain from civil engineering to legal studies, automated decision-support systems (ADM) are likely to see a place in the foreseeable future. Artificial intelligence (AI), as an automated system, can be defined as a broad range of computerized tasks designed to replicate human neural networks, store and organize large quantities of information, detect patterns, and make predictions with increasing accuracy and reliability. By itself, artificial intelligence is not quite science-fiction tropes (i.e. an uncontrollable existential threat to humanity) yet not without …


Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton Jun 2021

Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton

University Honors Theses

Scrum is widely used in the software industry to manage all kinds of projects. This case study examines the way in which a capstone team used the methodology and models the specific project management processes they used over the course of their project. These models and the process modifications therein are then compared to the team’s velocity at different points in the project. The results of this analysis suggest a correlation between asynchronous daily meetings and sprint reviews and improved velocity.


Understanding Ransomware Trajectory To Create An Informed Prediction, J. D. Klusnick Jun 2021

Understanding Ransomware Trajectory To Create An Informed Prediction, J. D. Klusnick

University Honors Theses

Ransomware is a form of extortion in which digital files are rendered inaccessible until a ransom payment is made. Modern ransomware emerged in 2006 and its destructive influence has been expanding ever since. In recent years cybercriminals have evolved who they target, what computer systems they target, and how they infect those systems. Meanwhile, cybersecurity experts have modelled ransomware methods allowing them to innovate their defense techniques across three paradigms: recovery, detection, and prevention. Ultimately either ransomware attackers or ransomware defenders will dominate this ongoing conflict. A review of the literature indicates that the ransomware crime wave will likely be …


Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto Feb 2021

Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto

University Honors Theses

In my thesis, I describe the work done to implement several Group Theory concepts in the context of the Rubik’s cube. A simulation of the cube was constructed using Processing-Java and with help from a YouTube series done by TheCodingTrain. I reflect on the struggles and difficulties that came with creating this program along with the inspiration behind the project. The concepts that are currently implemented at this time are: Identity, Associativity, Order, and Inverses. The functionality of the cube is described as it moves like a regular cube but has extra keypresses that demonstrate the concepts listed. Each concept …


Numerical Model Of A Radio Frequency Ion Source For Fusion Plasma Using Particle-In-Cell And Finite Difference Time Domain, Augustin L. Griswold Aug 2020

Numerical Model Of A Radio Frequency Ion Source For Fusion Plasma Using Particle-In-Cell And Finite Difference Time Domain, Augustin L. Griswold

University Honors Theses

Radio frequency (RF) plasma sources are common tool for application and study, and of particular interest for inertial electrostatic (IEC) fusion. Computational analysis is often carried out using particle in cell (PIC) methods or finite difference time domain (FDTD). However, a more holistic analysis is necessary as the particle distribution is highly dependant on the fields created by the plasma source. Herein, an analysis of a particular planar RF electrode with deuterium gas is provided which covers the fields and the particle behaviour using first FDTD then PIC. Further applications are discussed as well as further directions for this study.


The Meaning Of Red And Green In User Interfaces For The Color Deficient, Bassel Hamieh Jul 2020

The Meaning Of Red And Green In User Interfaces For The Color Deficient, Bassel Hamieh

University Honors Theses

Around 108 million web users are color blind which is a problem when the way we communicate over the web or interfaces is through the use of color. Red and green are two colors that are especially heavily used in interface design because of their strong symbolic associations; red being a sign to warn or stop and green being the opposite. This has a large effect on red-green color blind people who are not able to perceive either of those colors correctly. Many solutions exist that aim to help through color differentiation but none take into account color symbolism. With …


Automatic Keyphrase Extraction From Russian-Language Scholarly Papers In Computational Linguistics, Yves Wienecke Jul 2020

Automatic Keyphrase Extraction From Russian-Language Scholarly Papers In Computational Linguistics, Yves Wienecke

University Honors Theses

The automatic extraction of keyphrases from scholarly papers is a necessary step for many Natural Language Processing (NLP) tasks, including text retrieval, machine translation, and text summarization. However, due to the different grammatical and semantic intricacies of languages, this is a highly language-dependent task. Many free and open source implementations of state-of-the-art keyphrase extraction techniques exist, but they are not adapted for processing Russian text. Furthermore, the multi-linguistic character of scholarly papers in the field of Russian computational linguistics and NLP introduces additional complexity to keyphrase extraction. This paper describes a free and open source program as a proof of …


Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison Jul 2020

Functional Programming For Systems Software: Implementing Baremetal Programs In Habit, Donovan Ellison

University Honors Theses

Programming in a baremetal environment, directly on top of hardware with very little to help manage memory or ensure safety, can be dangerous even for experienced programmers. Programming languages can ease the burden on developers and sometimes take care of entire sets of errors. This is not the case for a language like C that will do almost anything you want, for better or worse. To operate in a baremetal environment often requires direct control over memory, but it would be nice to have that capability without sacrificing safety guarantees. Rust is a new language that aims to fit this …


Empirical Analysis Of Cbow And Skip Gram Nlp Models, Tejas Menon Jul 2020

Empirical Analysis Of Cbow And Skip Gram Nlp Models, Tejas Menon

University Honors Theses

CBOW and Skip Gram are two NLP techniques to produce word embedding models that are accurate and performant. They were invented in the seminal paper by T. Mikolov et al. and have since observed optimizations such as negative sampling and subsampling. This paper implements a fully-optimized version of these models using Py-Torch and runs them through a toy sentiment/subject analysis. It is weakly observed that different corpus types affect the skew of word embeddings such that fictional corpus are better suited for sentiment analysis and non-fictional for subject analysis.


Facilitating Mixed Self-Timed Circuits, Alexandra R. Hanson May 2020

Facilitating Mixed Self-Timed Circuits, Alexandra R. Hanson

University Honors Theses

Designers constrain the ordering of computation events in self-timed circuits to ensure the correct behavior of the circuits. Different circuit families utilize different constraints that, when families are combined, may be more difficult to guarantee in combination without inserting delay to postpone necessary events. By analyzing established constraints of different circuit families like Click and GasP, we are able to identify the small changes necessary to either 1) avoid constraints entirely; or 2) decrease the likelihood of necessary delay insertion. Because delay insertion can be tricky for novice designers and because the likelihood of its requirement increases when mixing different …


Fallen Objects: Collaborating With Artificial Intelligence In The Field Of Graphic Design, Harrison S. Gerard May 2020

Fallen Objects: Collaborating With Artificial Intelligence In The Field Of Graphic Design, Harrison S. Gerard

University Honors Theses

In this paper, I discuss the creation, execution and reception of my digital art series Fallen Objects, in which I collaborate with a neural net to create pseudo-found objects. I explore how artists might collaborate with Artificial Intelligence obliquely, not by having the AI generate the images themselves, but instead generate input for the artists to make the images. While many artists are focused on training neural nets to replicate their own art inputs, I instead focus on working with an AI trained on external, easily-accessible data and creating images from the prompts it delivers. In this way, the AI …


Inhibition Of Cancer Causing Genes Through The Delivery Of Omomyc In Anti-Myc Therapy: A Systematic Review, Angie Mcgraw May 2020

Inhibition Of Cancer Causing Genes Through The Delivery Of Omomyc In Anti-Myc Therapy: A Systematic Review, Angie Mcgraw

University Honors Theses

A systematic review of the available studies on the interference of OmoMyc with Myc's function in cancerous cells is presented. Myc is a transcription factor that regulates cellular processes such as apoptosis, proliferation, and differentiation. However, Myc is often overexpressed in a variety of cancers, resulting in abnormal growth of cancer cells. Although the inhibition of Myc has been highly desired, it remained a challenge due to its undruggable characteristics. Attempts to inhibit Myc have involved the usage of small-molecules, but these attempts have failed, causing adverse effects and incomplete inhibition of Myc. Despite promising preclinical studies of OmoMyc, it …


The Rise And Infiltration Of Pac-Man And Street Fighter, Angelic Phan Feb 2020

The Rise And Infiltration Of Pac-Man And Street Fighter, Angelic Phan

University Honors Theses

With the social, cultural, and economic influence of video games, it is important to examine why they have become such popular forms of entertainment. Particularly, why certain franchises have continued to persist among the growing industry. Two notable franchises are Pac-Man and Street Fighter, which are also most frequently discussed in scholarly texts. I supplement a literature review with an analysis of marketing texts to illuminate a series of shared factors that help explain both games' popularity despite the apparent dissimilarities of their content. First, my work helps us look across multiple scholarly papers to create a bigger picture …


Experimenting With A Biologically Plausible Neural Network, Dmitri Murphy Jan 2020

Experimenting With A Biologically Plausible Neural Network, Dmitri Murphy

University Honors Theses

We present research on an implementation of a biologically inspired Bayesian Confidence Propagation Neural Network (BCPNN). Based on previous work by Christopher Johansson and Anders Lansner, our implementation seeks to test and understand the various properties of this model. The floating-point implementation we built uses discrete time and bit-vectors as input/output. We found that the column based BCPNN model is able to memorize a decent number of input vectors and is able to restore noisy versions of these vectors with relatively high accuracy. We examine the model’s capacity, noise recovery ability and cross-column connection influence, among other attributes. The clearest …


Efficient And Scalable Event Tracing, Rupika Dikkala Mar 2019

Efficient And Scalable Event Tracing, Rupika Dikkala

University Honors Theses

In this work, I demonstrate that a time series database can be utilized to store Open Trace Format 2 (OTF2) file metadata for common trace events efficiently and scalably. This paper examines the efficacy of storing event trace data in a time series database, and investigates associated performance overhead compared to the state of the art method using OTF2 trace files. The sample traces used in this project are generated from a parallel hydrodynamic modeling code, Lulesh, developed at Lawrence Livermore National Laboratory. In my approach, I first cache common event trace metadata in InfluxDB, a contemporary time series database. …


The Silencing Power Of Algorithms: How The Facebook News Feed Algorithm Manipulates Users' Perceptions Of Opinion Climates, Callie Jessica Morgan Jul 2018

The Silencing Power Of Algorithms: How The Facebook News Feed Algorithm Manipulates Users' Perceptions Of Opinion Climates, Callie Jessica Morgan

University Honors Theses

This extended literature review investigates how the architecture and features of the Facebook Newsfeed algorithm, EdgeRank, can inhibit and facilitate the expression of political opinions. This paper will investigate how Elisabeth Noelle-Neumann's theory on public opinion, Spiral of Silence, can be used to assess the Facebook news feed as a political opinion source that actively shapes users' perceptions of minority and majority opinion climates. The feedback loops created by the algorithm's criteria influences users' decisions to self-censor or express their political opinions with interpersonal connections and unfamiliar connections on the site.