Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Dartmouth College

Theses/Dissertations

2017

Articles 1 - 14 of 14

Full-Text Articles in Physical Sciences and Mathematics

A Digital Practice Tool For Chemical Resonance, Kimball Jaclyn Sep 2017

A Digital Practice Tool For Chemical Resonance, Kimball Jaclyn

Dartmouth College Master’s Theses

Digital practice tools support online learning in math, language, computer science, and other subjects, but practice with problems whose answers are not well represented by text or quantities is underrepresented in the digital learning ecosystem beyond multiple-choice questions. This thesis project explored an alternative to multiple choice practice problems in organic chemistry that does not rely on a molecule drawing interface. This project included development and evaluation of a proof-of-concept digital practice tool for chemical resonance problems. Results of a utility study strongly suggest that the practice tool could fill a learning niche within organic chemistry practice as part of …


Shareabel: Secure Sharing Of Mhealth Data Through Cryptographically-Enforced Access Control, Emily Greene Jul 2017

Shareabel: Secure Sharing Of Mhealth Data Through Cryptographically-Enforced Access Control, Emily Greene

Dartmouth College Undergraduate Theses

Owners of mobile-health apps and devices often want to share their mHealth data with others, such as physicians, therapists, coaches, and caregivers. For privacy reasons, however, they typically want to share a limited subset of their information with each recipient according to their preferences. In this paper, we introduce ShareABEL, a scalable, usable, and practical system that allows mHealth-data owners to specify access-control policies and to cryptographically enforce those policies so that only parties with the proper corresponding permissions are able to decrypt data. The design (and prototype implementation) of this system makes three contributions: (1) it applies cryptographically-enforced access-control …


Opencollab: A Blockchain Based Protocol To Incentivize Open Source Software Development, Yondon Fu Jun 2017

Opencollab: A Blockchain Based Protocol To Incentivize Open Source Software Development, Yondon Fu

Dartmouth College Undergraduate Theses

Open source software is one of the fundamental building blocks of today's technology dependent society and is relied upon by parties ranging from large technology corporations to individual hobbyist developers. The open question left for technologists is how to make open source software projects more sustainable. The rise of decentralized networks of self-organizing, self-coordinating users incentivized by valuable cryptographic tokens enabled by Ethereum smart contracts creates the possibility of a system with embedded economics for open source software development that aligns the incentives of all parties. We present two contributions that can serve as building blocks for a potentially better …


Novenanetwork: A Catholic Social Media Ios Application For Praying Novenas As A Community, Marissa Le Coz Jun 2017

Novenanetwork: A Catholic Social Media Ios Application For Praying Novenas As A Community, Marissa Le Coz

Dartmouth College Undergraduate Theses

Recent years have seen the rise of a Catholic presence on the Internet and on social media in particular. At the same time, there has been a movement among young Catholics to rediscover and revitalize the traditions of the Church. Novenas, an ancient form of spirituality involving praying for nine consecutive days for some special purpose, are one such tradition. NovenaNetwork, which debuted in the App Store on May 23, 2017 and acquired over 50 users in three countries within its first six days, is an iOS social media application for praying novenas with others. While multiple apps and websites …


Chinese Font Style Transfer With Neural Network, Xue Hanyu Jun 2017

Chinese Font Style Transfer With Neural Network, Xue Hanyu

Dartmouth College Master’s Theses

Font design is an important area in digital art. However, designers have to design character one by one manually. At the same time, Chinese contains more than 20,000 characters. Chinese offical dataset GB 18030-2000 has 27,533 characters. ZhongHuaZiHai, an official Chinese dictionary, contains 85,568 characters. And JinXiWenZiJing, an dataset published by AINet company, includes about 160,000 chinese characters. Thus Chinese font design is a hard task. In the paper, we introduce a method to help designers finish the process faster. With the method, designers only need to design a small set of Chinese characters. Other characters will be generated automatically. …


Accuracy And Racial Biases Of Recidivism Prediction Instruments, Julia J. Dressel May 2017

Accuracy And Racial Biases Of Recidivism Prediction Instruments, Julia J. Dressel

Dartmouth College Undergraduate Theses

Algorithms have recently become prevalent in the criminal justice system. Tools known as recidivism prediction instruments (RPIs) are being used all over the country to assess the likelihood that a criminal defendant will reoffend at some point in the future. In June of 2016, researchers at ProPublica published an analysis claiming an RPI called COMPAS was biased against black defendants. This claim sparked a nation-wide debate as to how fairness of an algorithm should be measured, and exposed the many ways that algorithms are not necessarily fair. Algorithms are used in the criminal justice system because they are regarded as …


Assemble.Live: Designing For Schisms In Large Groups In Audio/Video Calls, Benjamin P. Packer May 2017

Assemble.Live: Designing For Schisms In Large Groups In Audio/Video Calls, Benjamin P. Packer

Dartmouth College Undergraduate Theses

Although new communication technologies have compressed the space and latency between participants, leading to new forms of computer mediated interaction that scale with the number of participants [Klein, 1999], there still exist no audio/video calling solutions that can accommodate the type of group conversation that takes place in a group of four or more. Groups of this size frequently schism, forming two or more sub-conversations with their own independently operating turn taking systems [Egbert, 1997]. This paper proposes that traditional audio/video calling fails to accommodate schisms because a) there is no way to signal intended recipiency, b) there exists only …


Using Computational Models To Understand Asd Facial Expression Recognition Patterns, Irene L. Feng May 2017

Using Computational Models To Understand Asd Facial Expression Recognition Patterns, Irene L. Feng

Dartmouth College Undergraduate Theses

Recent advances in computer vision have led to interest in studying how computer vision can simulate our own perception to better understand the intricacies of human neurobiology. Researchers have made strides in computer vision to imitate many facets of human perception, such as object detection, character recognition, and face identification. However, there have been fewer studies that try to model atypical human perception. My thesis focuses specifically on individuals with Autism Spectrum Disorder (ASD) and their deficit in the facial expression recognition (FER) task. I built multiple computer vision models using hand-crafted features and also convolutional neural network architectures to …


Scene Classification From Degraded Images: Comparing Human And Computer Vision Performance, Tim M. Tadros May 2017

Scene Classification From Degraded Images: Comparing Human And Computer Vision Performance, Tim M. Tadros

Dartmouth College Undergraduate Theses

People can recognize the context of a scene with just a brief glance. Visual information such as color, objects and their properties, and texture are all important in correctly determining the type of scene (e.g. indoors versus outdoors). Although these properties are all useful, it is unclear which features of an image play a more important role in the task of scene recognition. To this aim, we compare and contrast a state-of-the-art neural network and GIST model with human performance on the task of classifying images as indoors or outdoors. We analyze the impact of image manipulations, such as blurring …


Improving Elementary Math Learning Through Ipad Games, Kaya M. Thomas May 2017

Improving Elementary Math Learning Through Ipad Games, Kaya M. Thomas

Dartmouth College Undergraduate Theses

Mathematics has proven to be challenging to many from a very young age. Young students are influenced by their teachers on how to feel about math and how well they can perform. Currently many methods of teaching mathematics do not encourage learning, but instead promote memorization which has been shown to increase students' anxiety about math. Math anxiety affects student performance as well as their ability to understand the material. Fractions are one of the most difficult concepts for young students to learn. Various techniques have been created in order to better instruct students on how to understand fractions. More …


Activityaware: Wearable System For Real-Time Physical Activity Monitoring Among The Elderly, George G. Boateng May 2017

Activityaware: Wearable System For Real-Time Physical Activity Monitoring Among The Elderly, George G. Boateng

Dartmouth College Master’s Theses

Physical activity helps reduce the risk of cardiovascular disease, hypertension and obesity. The ability to monitor a person’s daily activity level can inform self-management of physical activity and related interventions. For older adults with obesity, the importance of regular, physical activity is critical to reduce the risk of long-term disability. In this work, we present ActivityAware, an application on the Amulet wrist-worn device that monitors the daily activity levels (low, moderate and vigorous) of older adults in real-time. The app continuously collects acceleration data on the Amulet, classifies the current activity level, updates the day’s accumulated time spent at that …


Cryptographic Transfer Of Sensor Data From The Amulet To A Smartphone, David B. Harmon May 2017

Cryptographic Transfer Of Sensor Data From The Amulet To A Smartphone, David B. Harmon

Dartmouth College Undergraduate Theses

The authenticity, confidentiality, and integrity of data streams from wearable healthcare devices are critical to patients, researchers, physicians, and others who depend on this data to measure the effectiveness of treatment plans and clinical trials. Many forms of mHealth data are highly sensitive; in the hands of unintended parties such data may reveal indicators of a patient's disorder, disability, or identity. Furthermore, if a malicious party tampers with the data, it can affect the diagnosis or treatment of patients, or the results of a research study. Although existing network protocols leverage encryption for confidentiality and integrity, network-level encryption does not …


A Hololens Application To Aid People Who Are Visually Impaired In Navigation Tasks, Jonathan L. Huang May 2017

A Hololens Application To Aid People Who Are Visually Impaired In Navigation Tasks, Jonathan L. Huang

Dartmouth College Undergraduate Theses

Day-to-day activities such as navigation and reading can be particularly challenging for people with visual impairments. Reading text on signs may be especially difficult for people who are visually impaired because signs have variable color, contrast, and size. Indoors, signage may include office, classroom, restroom, and fire evacuation signs. Outdoors, they may include street signs, bus numbers, and store signs. Depending on the level of visual impairment, just identifying where signs exist can be a challenge. Using Microsoft's HoloLens, an augmented reality device, I designed and implemented the TextSpotting application that helps those with low vision identify and read indoor …


Dense Gray Codes In Mixed Radices, Jessica C. Fan Mar 2017

Dense Gray Codes In Mixed Radices, Jessica C. Fan

Dartmouth College Undergraduate Theses

The standard binary reflected Gray code describes a sequence of integers 0 to n-1, where n is a power of 2, such that the binary representation of each integer in the sequence differs from the binary representation of the preceding integer in exactly one bit. In September 2016, we presented two methods to compute binary dense Gray codes, which extend the possible values of n to the set of all positive integers while preserving both the Gray-code property such that only one bit changes between each pair of consecutive binary numbers, and the density property such that the sequence contains …