Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dartmouth College

Theses/Dissertations

2016

Articles 1 - 22 of 22

Full-Text Articles in Physical Sciences and Mathematics

Representations And Models For Large-Scale Video Understanding, Du Le Hong Tran Aug 2016

Representations And Models For Large-Scale Video Understanding, Du Le Hong Tran

Dartmouth College Ph.D Dissertations

In this thesis, we investigate different representations and models for large-scale video understanding. These methods include a mid-level representation for action recognition, a deep-learned representation for video analysis, a generic convolutional network architecture for video voxel prediction, and a new high-level task and benchmark of video comprehension. First, we present EXMOVES, a mid-level representation for scalable action recognition. The entries in EXMOVES representation are the calibrated outputs of a set of movement classifiers over spatial-temporal volumes of the input video. Each movement classifier is a simple exemplar-SVM trained on low-level features. Our EXMOVES requires a minimal amount of supervision while …


Devising A Framework For Efficient And Accurate Matchmaking And Real-Time Web Communication, Charles Li Jun 2016

Devising A Framework For Efficient And Accurate Matchmaking And Real-Time Web Communication, Charles Li

Dartmouth College Undergraduate Theses

Many modern applications have a great need for matchmaking and real-time web communication. This paper first explores and details the specifics of original algorithms for effective matchmaking, and then proceeds to dive into implementations of real-time communication between different clients across the web. Finally, it discusses how to apply the techniques discussed in the paper in practice, and provides samples based on the framework.


Security And Privacy Analysis Of Medical Wearables, Brian M. Chalif Jun 2016

Security And Privacy Analysis Of Medical Wearables, Brian M. Chalif

Dartmouth College Undergraduate Theses

The release of Google glass and the Apple and Samsung smart watches in the past two years pushed wearables to the forefront of technology. The realm of medical wearables will specifically see a huge growth as wearables become more common place. There are documented cases of security and privacy breaches in the five main potential breaching areas: wearable device itself, Bluetooth communication, smartphone or personal computer app, Wi-Fi data exchange, cloud storage. Privacy policies for individual wearables are not always in the best interest of the individual and government regulations on wearables security does not always fully vet wearables. Interviews …


Air Keyboard: Mid-Air Text Input Using Wearable Emg Sensors And A Predictive Text Model, Jacob A. Gaba Jun 2016

Air Keyboard: Mid-Air Text Input Using Wearable Emg Sensors And A Predictive Text Model, Jacob A. Gaba

Dartmouth College Undergraduate Theses

The human body is full of electrical signals. We propose to use the electric signals produced by the human body to input text without the use of a physical keyboard. We allow users to tap their fingers in the air as if typing on an imaginary keyboard. To detect the tapping, we created a wearable armband that uses electromyography (EMG) sensors to track individual finger muscle activation. Each finger is mapped to several characters, and based on the finger-sequence the user taps, a list of possible typed words is presented. Augmented reality and virtual reality headsets are becoming more prevalent …


Interactive Data Visualization Of Christian Demographics, Allison C. Wang Jun 2016

Interactive Data Visualization Of Christian Demographics, Allison C. Wang

Dartmouth College Undergraduate Theses

My thesis will attempt to use the affordances of interactive data visualization to showcase the global movement of Christianity from North to South since 1900 and projected and interpolated up until 2050. Through the usage of demographic data, honest and accurate visualization, and compelling graphics, I hope to create a tool that users can use to explore this monumental movement of Christianity in just the last century.


Bae: Before Anyone Else; The Answer To Mobile Dating For The African Diaspora, Jordan S. Kunzika Jun 2016

Bae: Before Anyone Else; The Answer To Mobile Dating For The African Diaspora, Jordan S. Kunzika

Dartmouth College Undergraduate Theses

As online dating becomes increasingly popular, millions of people across the country utilize various dating services that allow them to meet, chat, date, and develop meaningful relationships with people they would probably not have met otherwise. While mass market dating apps work well for the majority of online daters, and while many niche dating apps have been created to target a number of specific demographics such as the Jewish population, Southeast Asian population, farmers, homosexuals, etc., the African-American market has been largely underserved. African-Americans have the worst experience on mass market dating apps due to negative racial bias, and before …


Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, And Digital Avatars, Daniel J. Chen May 2016

Nutrition Buddy: Enabling Behavior Change Through Wearables, Recommendations, And Digital Avatars, Daniel J. Chen

Dartmouth College Undergraduate Theses

In recent years, significant progress has been made in health technology through advancements in mobile technology, wearable computing, and connected devices. These advancements have created lightweight or even automated experiences for users in vital aspects of health such as exercise and sleep tracking. Despite these advancements, one area of health, nutrition, remains stifled by cumbersome user interaction. We present Nutrition Buddy, a novel approach to nutrition tracking which utilizes a simplified data model that allows for lightweight interactions, effective wearable technology, and relevant recommendations provided by a digital nutritionist "buddy" to facilitate behavior change.


Reusing Ambient Light To Recognize Hand Gestures, Mahina-Diana A. Kaholokula May 2016

Reusing Ambient Light To Recognize Hand Gestures, Mahina-Diana A. Kaholokula

Dartmouth College Undergraduate Theses

In this paper, we explore the feasibility of reusing ambient light to recognize human gestures. We present GestureLite, a system that provides hand gesture detection and classification using the pre-existing light in a room. We observe that in an environment with a reasonably consistent lighting scheme, a given gesture will block some light rays and leave others unobstructed, resulting in the user casting a unique shadow pattern for that movement. GestureLite captures these unique shadow patterns using a small array of light sensors. Using standard machine learning techniques, GestureLite can learn these patterns and recognize new instances of specific gestures …


Monarch: A Reimagined Browser For The Modern Web, Daniel R. Whitcomb May 2016

Monarch: A Reimagined Browser For The Modern Web, Daniel R. Whitcomb

Dartmouth College Undergraduate Theses

Web browsers have become fast and flexible enough to allow web applications to be viable competition to native applications. Now that the web as a platform has become formidable, it has changed the types of web applications being produced, and the ways in which native applications are being built. This observation leads me to propose the concept of the App Web - a category of the world wide web which increases productivity - and its place in the current application experience. Monarch is a system designed to merge the advantages of native and web applications, improving experiences for both the …


Automating 3d Wireless Measurements With Drones, Ethan Yu May 2016

Automating 3d Wireless Measurements With Drones, Ethan Yu

Dartmouth College Undergraduate Theses

Wireless signals and networks are ubiquitous in today’s world. Though more reliable than ever, wireless networks still struggle with weak coverage, blind spots, and interference. Having a strong understanding of wireless signal propagation is essential for increasing coverage, optimizing performance, and minimizing interference for wireless networks. Extensive studies have been done on the propagation of wireless signals, and many theoretical models have been made to simulate wireless signal propagation. Unfortunately, models of signal propagation are often not accurate in reality, and real- world signal measurements are required for validation. Existing methods for collecting wireless measurements involve human researchers walking to …


All Your Base Are Belong To You: Improved Browser Anonymity And Security On Android, Peter Saisi May 2016

All Your Base Are Belong To You: Improved Browser Anonymity And Security On Android, Peter Saisi

Dartmouth College Undergraduate Theses

Android is the most popular mobile operating system in the world. Android holds a marketshare of 82% with iOS, its nearest rival, managing a distant 13.9%. Android’s unparalleled ubiquity makes it a popular target for malware and malvertising. Specifically, Android browsers have been targeted because many users spend great durations of time browsing the Internet. Unfortunately, as ways to track, fingerprint, and exploit unsuspecting users have increased, Browsing Anonymity and Security (BASE) has contrastingly stalled. Third party apps seeking to displace the oft-maligned stock browser tend to focus on user privacy and defer malware defense to default operating system protections. …


Stressaware: App For Continuously Measuring And Monitoring Stress Levels In Real Time On The Amulet Wearable Device, George G. Boateng May 2016

Stressaware: App For Continuously Measuring And Monitoring Stress Levels In Real Time On The Amulet Wearable Device, George G. Boateng

Dartmouth College Undergraduate Theses

Stress is the root cause of many diseases. Being able to monitor when and why a person is stressed could inform personal stress management as well as interventions when necessary. In this thesis, I present StressAware, an application on the Amulet wearable platform to measure the stress levels of individuals continuously and in real time. The app implements a stress detection model, continuously streams heart rate data from a commercial heart-rate monitor such as a Zephyr and Polar H7, classifies the stress level of an individual, logs the stress level and then displays it as a graph on the screen. …


Integrating Bluetooth Low Energy Peripherals With The Amulet, Anna J. Knowles May 2016

Integrating Bluetooth Low Energy Peripherals With The Amulet, Anna J. Knowles

Dartmouth College Undergraduate Theses

The Amulet is a health monitor, similar in size and shape to a smartwatch but specifically designed to have a longer battery life and handle data securely. It is equipped with a Bluetooth Low Energy (BLE) radio in order to receive data from BLE-enabled sensors and transmit data to smartphones, but the full implementation of BLE communication on the Amulet is still a work in progress. This thesis describes architectural changes that improve the Amulet's ability to receive data from a variety of BLE-enabled sensors and make it easier for developers to integrate new BLE-enabled sensors with the Amulet by …


Bloon: Software And Hardware For Data Collection And Real-Time Analysis, Jacob Z. Weiss May 2016

Bloon: Software And Hardware For Data Collection And Real-Time Analysis, Jacob Z. Weiss

Dartmouth College Undergraduate Theses

Bloon is a powerful, user-friendly parsing and plotting utility optimized for use in real-time applications that I wrote for the Mac. Its generalized parser is capable of handling a wide variety of data formats. If you can define it in Bloon’s parsing language, then Bloon can parse and plot it. Bloon’s grapher is also extremely powerful, allowing users to zoom and scroll about millions of data points smoothly in real time. Bloon makes the difficult task of real-time data collection and visualization a breeze.


Algorithmic Problems Arising In Posets And Permutations, Shahrzad Haddadan May 2016

Algorithmic Problems Arising In Posets And Permutations, Shahrzad Haddadan

Dartmouth College Ph.D Dissertations

Partially ordered sets and permutations are combinatorial structures having vast applications in theoretical computer science. In this thesis, we study various computational and algorithmic problems related to these structures. The first chapter of the thesis contains discussion about randomized fully polynomial approximation schemes obtained by employing Markov chain Monte Carlo. In this chapter we study various Markov chains that we call: the gladiator chain, the interval chain, and cube shuffling. Our objective is to identify some conditions that assure rapid mixing; and we obtain partial results. The gladiator chain is a biased random walk on the set of permutations. This …


Constraint-Based Robot Knot Tying, Weifu Wang May 2016

Constraint-Based Robot Knot Tying, Weifu Wang

Dartmouth College Ph.D Dissertations

In this thesis, we present different approaches to tying knots using robots by enforcing different types of constraints. We attack the problem from three different directions; mechanical design, motion planning with simple control strategies, and theoretical analysis. We present the first complete generalized fixture based knot tying approach that is able to arrange and tighten knots, building on Matthew Bell’s work on arranging simple knots using fixtures [Bel10]. Physical constraints are provided by these fixtures to reduce the possible string deformation during knot tying. Fixtures are designed automatically using proposed design principles, and constructed based on the designs using 3D …


Towards A Verified Complex Protocol Stack In A Production Kernel: Methodology And Demonstration, Peter C. Johnson May 2016

Towards A Verified Complex Protocol Stack In A Production Kernel: Methodology And Demonstration, Peter C. Johnson

Dartmouth College Ph.D Dissertations

Any useful computer system performs communication and any communication must be parsed before it is computed upon. Given their importance, one might expect parsers to receive a significant share of attention from the security community. This is, however, not the case: bugs in parsers continue to account for a surprising portion of reported and exploited vulnerabilities. In this thesis, I propose a methodology for supporting the development of software that depends on parsers---such as anything connected to the Internet---to safely support any reasonably designed protocol: data structures to describe protocol messages; validation routines that check that data received from the …


Privacy-Preserving Controls For Sharing Mhealth Data, Aarathi Prasad May 2016

Privacy-Preserving Controls For Sharing Mhealth Data, Aarathi Prasad

Dartmouth College Ph.D Dissertations

Mobile devices allow people to collect and share health and health-related information with recipients such as health providers, family and friends, employers and insurance companies, to obtain health, emotional or financial benefits. People may consider certain health information sensitive and prefer to disclose only what is necessary. In this dissertation, we present our findings about factors that affect people’s sharing behavior, describe scenarios in which people may wish to collect and share their personal health-related information with others, but may be hesitant to disclose the information if necessary controls are not available to protect their privacy, and propose frameworks to …


Seamless Authentication For Ubiquitous Devices, Shrirang Mare May 2016

Seamless Authentication For Ubiquitous Devices, Shrirang Mare

Dartmouth College Ph.D Dissertations

User authentication is an integral part of our lives; we authenticate ourselves to personal computers and a variety of other things several times a day. Authentication is burdensome. When we wish to access to a computer or a resource, it is an additional task that we need to perform~-- an interruption in our workflow. In this dissertation, we study people's authentication behavior and attempt to make authentication to desktops and smartphones less burdensome for users. First, we present the findings of a user study we conducted to understand people's authentication behavior: things they authenticate to, how and when they authenticate, …


Teddi: Tamper Event Detection On Distributed Cyber-Physical Systems, Jason O. Reeves May 2016

Teddi: Tamper Event Detection On Distributed Cyber-Physical Systems, Jason O. Reeves

Dartmouth College Ph.D Dissertations

Edge devices, or embedded devices installed along the periphery of a power grid SCADA network, pose a significant threat to the grid, as they give attackers a convenient entry point to access and cause damage to other essential equipment in substations and control centers. Grid defenders would like to protect these edge devices from being accessed and tampered with, but they are hindered by the grid defender's dilemma; more specifically, the range and nature of tamper events faced by the grid (particularly distributed events), the prioritization of grid availability, the high costs of improper responses, and the resource constraints of …


Learning Device Usage In Context: A Continuous And Hierarchical Smartphone Authentication Scheme, Bingyue Wang Mar 2016

Learning Device Usage In Context: A Continuous And Hierarchical Smartphone Authentication Scheme, Bingyue Wang

Dartmouth College Undergraduate Theses

Popular smartphone authentication schemes, such as PIN-based or biometrics- based authentication methods, require only an initial login at the start of a usage session to authorize the user to use all the apps on the phone during the entire session. Those schemes fail to provide continuous protection of the smartphone after the initial login. They also fail to meet the hierarchy of security requirements for different apps under different contexts. In this study, we propose a continuous and hierarchical authentication scheme. We believe that a user's app-usage patterns depend on his location context. As such, our scheme relies on app-usage …


Implications Of Motion Planning: Optimality And K-Survivability, Yu-Han Lyu Mar 2016

Implications Of Motion Planning: Optimality And K-Survivability, Yu-Han Lyu

Dartmouth College Ph.D Dissertations

We study motion planning problems, finding trajectories that connect two configurations of a system, from two different perspectives: optimality and survivability. For the problem of finding optimal trajectories, we provide a model in which the existence of optimal trajectories is guaranteed, and design an algorithm to find approximately optimal trajectories for a kinematic planar robot within this model. We also design an algorithm to build data structures to represent the configuration space, supporting optimal trajectory queries for any given pair of configurations in an obstructed environment. We are also interested in planning paths for expendable robots moving in a threat …