Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Rapid Method For Consistency And Concentration Reporting Of Cannabidiol Using 1H-Nmr And Computer-Assisted Chemical Software, Michael A. Fernando Dec 2021

Rapid Method For Consistency And Concentration Reporting Of Cannabidiol Using 1H-Nmr And Computer-Assisted Chemical Software, Michael A. Fernando

University Honors Theses

An integrated computational method was demonstrated with hemp-derived Cannabidiol for an assessment of its purity and concentration. The sample was structurally verified, high purity, and 2.98 mmol/L in dissolved DMSO. The method presented is a general approach to assessing purity and concentration for any small organic molecule in CMC-Assist.


Situate: An Agent-Based System For Situation Recognition, Max Henry Quinn Nov 2021

Situate: An Agent-Based System For Situation Recognition, Max Henry Quinn

Dissertations and Theses

Computer vision and machine learning systems have improved significantly in recent years, largely based on the development of deep learning systems, leading to impressive performance on object detection tasks. Understanding the content of images is considerably more difficult. Even simple situations, such as "a handshake", "walking the dog", "a game of ping-pong", or "people waiting for a bus", present significant challenges. Each consists of common objects, but are not reliably detectable as a single entity nor through the simple co-occurrence of their parts.

In this dissertation, toward the goal of developing machine learning systems that demonstrate properties associated with understanding, …


From Mdp To Alphazero, David Robert Sewell Nov 2021

From Mdp To Alphazero, David Robert Sewell

Dissertations and Theses

In this paper I will explain the AlphaGo family of algorithms starting from first principles and requiring little previous knowledge from the reader. The focus will be upon one of the more recent versions AlphaZero but I hope to explain the core principles that allowed these algorithms to be so successful. I will generally refer to AlphaZero as theses [sic] core set of principles and will make it clear when I am referring to a specific algorithm of the AlphaGo family. AlphaZero in short combines Monte Carlo Tree Search (MCTS) with Deep learning and self-play. We will see how these …


Expanding Temperature Sensing For The Orion Bms 2, Samuel J. Parker Oct 2021

Expanding Temperature Sensing For The Orion Bms 2, Samuel J. Parker

University Honors Theses

Formula SAE (FSAE) is an annual collegiate design competition that takes place across the globe. Portland State University’s team, Viking Motorsports, was committed to designing an Electric Vehicle (EV) for the 2021 FSAE competition. The team designed a completely custom lithium-ion cell battery that is managed by an Orion BMS 2 battery management system. The FSAE rulebook requires a robust temperature monitoring system for any EV power supply. The Orion BMS 2 can only directly collect data from eight temperature sensors, which is not enough to meet FSAE regulation. However, the BMS can be configured to monitor many more sensors …


Efficient Neuromorphic Algorithms For Gamma-Ray Spectrum Denoising And Radionuclide Identification, Merlin Phillip Carson Sep 2021

Efficient Neuromorphic Algorithms For Gamma-Ray Spectrum Denoising And Radionuclide Identification, Merlin Phillip Carson

Dissertations and Theses

Radionuclide detection and identification are important tasks for deterring a potentially catastrophic nuclear event. Due to high levels of background radiation from both terrestrial and extraterrestrial sources, some form of noise reduction pre-processing is required for a gamma-ray spectrum prior to being analyzed by an identification algorithm so as to determine the identity of anomalous sources. This research focuses on the use of neuromorphic algorithms for the purpose of developing low power, accurate radionuclide identification devices that can filter out non-anomalous background radiation and other artifacts created by gamma-ray detector measurement equipment, along with identifying clandestine, radioactive material.

A sparse …


Automated Statistical Structural Testing Techniques And Applications, Yang Shi Aug 2021

Automated Statistical Structural Testing Techniques And Applications, Yang Shi

Dissertations and Theses

Statistical structural testing(SST) is an effective testing technique that produces random test inputs from probability distributions. SST shows superiority in fault-revealing power over random testing and deterministic approaches since it heritages the merits from both of them. SST ensures testing thoroughness by setting up a probability lower-bound criterion for each structural cover element and test inputs that exercise a structural cover element sampled from the probability distribution, ensuring testing randomness. Despite the advantages, SST is not a widely used approach in practice. There are two major limitations. First, to construct probability distributions, a tester must understand the underlying software's structure, …


Quantum Grover's Oracles With Symmetry Boolean Functions, Peng Gao Aug 2021

Quantum Grover's Oracles With Symmetry Boolean Functions, Peng Gao

Dissertations and Theses

Quantum computing has become an important research field of computer science and engineering. Among many quantum algorithms, Grover's algorithm is one of the most famous ones. Designing an effective quantum oracle poses a challenging conundrum in circuit and system-level design for practical application realization of Grover's algorithm.

In this dissertation, we present a new method to build quantum oracles for Grover's algorithm to solve graph theory problems. We explore generalized Boolean symmetric functions with lattice diagrams to develop a low quantum cost and area efficient quantum oracle. We study two graph theory problems: cycle detection of undirected graphs and generalized …


Proximal Policy Optimization For Radiation Source Search, Philippe Erol Proctor Aug 2021

Proximal Policy Optimization For Radiation Source Search, Philippe Erol Proctor

Dissertations and Theses

Rapid localization and search for lost nuclear sources in a given area of interest is an important task for the safety of society and the reduction of human harm. Detection, localization and identification are based upon the measured gamma radiation spectrum from a radiation detector. The nonlinear relationship of electromagnetic wave propagation paired with the probabilistic nature of gamma ray emission and background radiation from the environment leads to ambiguity in the estimation of a source's location. In the case of a single mobile detector, there are numerous challenges to overcome such as weak source activity, multiple sources, or the …


Information Security Maturity Model For Healthcare Organizations In The United States, Bridget Joan Barnes Page Aug 2021

Information Security Maturity Model For Healthcare Organizations In The United States, Bridget Joan Barnes Page

Dissertations and Theses

This research provides a maturity model for information security for healthcare organizations in the United States. Healthcare organizations are faced with increasing threats to the security of their information systems. The maturity model identifies specific performance metrics, with relative importance measures, that can be used to enhance information security at healthcare organizations allowing them to focus scarce resources on mitigating the most important information security threat vectors. This generalizable, hierarchical decision model uses both qualitative and quantitative metrics based on objective goals. This model may be used as a baseline by which to measure individual organizational performance, to measure performance …


Functional Role Of The N-Terminal Domain In Connexin 46/50 By In Silico Mutagenesis And Molecular Dynamics Simulation, Umair Khan Jun 2021

Functional Role Of The N-Terminal Domain In Connexin 46/50 By In Silico Mutagenesis And Molecular Dynamics Simulation, Umair Khan

University Honors Theses

Connexins form intercellular channels known as gap junctions that facilitate diverse physiological roles, from long-range electrical and chemical coupling to nutrient exchange. Recent structural studies on Cx46 and Cx50 have defined a novel and stable open state and implicated the amino-terminal (NT) domain as a major contributor to functional differences between connexin isoforms. This thesis presents two studies which use molecular dynamics simulations with these new structures to provide mechanistic insight into the function and behavior of the NTH in Cx46 and Cx50. In the first, residues in the NTH that differ between Cx46 and Cx50 are swapped between the …


Automated Decision Making And Machine Learning: Regulatory Alternatives For Autonomous Settings, Alyssa Heminger Jun 2021

Automated Decision Making And Machine Learning: Regulatory Alternatives For Autonomous Settings, Alyssa Heminger

University Honors Theses

Given growing investment capital in research and development, accompanied by extensive literature on the subject by researchers in nearly every domain from civil engineering to legal studies, automated decision-support systems (ADM) are likely to see a place in the foreseeable future. Artificial intelligence (AI), as an automated system, can be defined as a broad range of computerized tasks designed to replicate human neural networks, store and organize large quantities of information, detect patterns, and make predictions with increasing accuracy and reliability. By itself, artificial intelligence is not quite science-fiction tropes (i.e. an uncontrollable existential threat to humanity) yet not without …


Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton Jun 2021

Case Study Of Scrum Methodology As Used By A Capstone Team, Lilly I. Yeaton

University Honors Theses

Scrum is widely used in the software industry to manage all kinds of projects. This case study examines the way in which a capstone team used the methodology and models the specific project management processes they used over the course of their project. These models and the process modifications therein are then compared to the team’s velocity at different points in the project. The results of this analysis suggest a correlation between asynchronous daily meetings and sprint reviews and improved velocity.


Understanding Ransomware Trajectory To Create An Informed Prediction, J. D. Klusnick Jun 2021

Understanding Ransomware Trajectory To Create An Informed Prediction, J. D. Klusnick

University Honors Theses

Ransomware is a form of extortion in which digital files are rendered inaccessible until a ransom payment is made. Modern ransomware emerged in 2006 and its destructive influence has been expanding ever since. In recent years cybercriminals have evolved who they target, what computer systems they target, and how they infect those systems. Meanwhile, cybersecurity experts have modelled ransomware methods allowing them to innovate their defense techniques across three paradigms: recovery, detection, and prevention. Ultimately either ransomware attackers or ransomware defenders will dominate this ongoing conflict. A review of the literature indicates that the ransomware crime wave will likely be …


A Method For Comparative Analysis Of Trusted Execution Environments, Stephano Cetola Jun 2021

A Method For Comparative Analysis Of Trusted Execution Environments, Stephano Cetola

Dissertations and Theses

The problem of secure remote computation has become a serious concern of hardware manufacturers and software developers alike. Trusted Execution Environments (TEEs) are a solution to the problem of secure remote computation in applications ranging from "chip and pin" financial transactions to intellectual property protection in modern gaming systems. While extensive literature has been published about many of these technologies, there exists no current model for comparing TEEs. This thesis provides hardware architects and designers with a set of tools for comparing TEEs. I do so by examining several properties of a TEE and comparing their implementations in several technologies. …


Storing Intermediate Results In Space And Time: Sql Graphs And Block Referencing, Basem Ibrahim Elazzabi May 2021

Storing Intermediate Results In Space And Time: Sql Graphs And Block Referencing, Basem Ibrahim Elazzabi

Dissertations and Theses

With the advancement of data-collection technology and with more data being available for data analysts for data-intensive decision making, many data analysts use client-based data-analysis environments to analyze that data. Client-based environments where only a personal computer or a laptop is used to perform data analysis tasks are common. In such client-based environments, multiple tools and systems are typically needed to accomplish data-analysis tasks. Stand-alone systems such as spreadsheets, R, Matlab, and Tableau are usually easy to use, and they are designed for the typical, non-technical data analyst. However, these systems are limited in their data-analysis capabilities. More complex data …


Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto Feb 2021

Group Theory Visualized Through The Rubik's Cube, Ashlyn Okamoto

University Honors Theses

In my thesis, I describe the work done to implement several Group Theory concepts in the context of the Rubik’s cube. A simulation of the cube was constructed using Processing-Java and with help from a YouTube series done by TheCodingTrain. I reflect on the struggles and difficulties that came with creating this program along with the inspiration behind the project. The concepts that are currently implemented at this time are: Identity, Associativity, Order, and Inverses. The functionality of the cube is described as it moves like a regular cube but has extra keypresses that demonstrate the concepts listed. Each concept …


Forecasting Optimal Parameters Of The Broken Wing Butterfly Option Strategy Using Differential Evolution, David Munoz Constantine Jan 2021

Forecasting Optimal Parameters Of The Broken Wing Butterfly Option Strategy Using Differential Evolution, David Munoz Constantine

Dissertations and Theses

Obtaining an edge in financial markets has been the objective of many hedge funds, investors, and market participants. Even with today's abundance of data and computing power, few individuals achieve a consistent edge over an extended time. To obtain this edge, investors usually use options strategies. The Broken Wing Butterfly (BWB) is an options strategy that has increased in popularity among traders. Profit is generated primarily by exploiting option value time decay. In this thesis, the selection of entry and exit BWB parameters, such as profit and loss targets, are optimized for an in-sample period. Afterward, they are used to …


Automated Test Generation For Validating Systemc Designs, Bin Lin Jan 2021

Automated Test Generation For Validating Systemc Designs, Bin Lin

Dissertations and Theses

Modern system design involves integration of all components of a system on a single chip, namely System-on-a-Chip (SoC). The ever-increasing complexity of SoCs and rapidly decreasing time-to-market have pushed the design abstraction to the electronic system level (ESL), in order to increase design productivity. SystemC is a widely used ESL modeling language that plays a central role in modern SoCs design process. ESL SystemC designs usually serve as executable specifications for the subsequent SoCs design flow. Therefore, undetected bugs in ESL SystemC designs may propagate to low-level implementations or even final silicon products. In addition, modern SoCs design often involves …