Matching Items (310)
Filtering by

Clear all filters

152593-Thumbnail Image.png
Description
Mobile apps have improved human lifestyle in various aspects ranging from instant messaging to tele-health. In the current app development paradigm, apps are being developed individually and agnostic of each other. The goal of this thesis is to allow a new world where multiple apps communicate with each other to

Mobile apps have improved human lifestyle in various aspects ranging from instant messaging to tele-health. In the current app development paradigm, apps are being developed individually and agnostic of each other. The goal of this thesis is to allow a new world where multiple apps communicate with each other to achieve synergistic benefits. To enable integration between apps, manual communication between developers is needed, which can be problematic on many levels. In order to promote app integration, a systematic approach towards data sharing between multiple apps is essential. However, current approaches to app integration require large code modifications to reap the benefits of shared data such as requiring developers to provide APIs or use large, invasive middlewares. In this thesis, a data sharing framework was developed providing a non-invasive interface between mobile apps for data sharing and integration. A separate app acts as a registry to allow apps to register database tables to be shared and query this information. Two health monitoring apps were developed to evaluate the sharing framework and different methods of data integration between apps to promote synergistic feedback. The health monitoring apps have shown non-invasive solutions can provide data sharing functionality without large code modifications and manual communication between developers.
ContributorsMilazzo, Joseph (Author) / Gupta, Sandeep K.S. (Thesis advisor) / Varsamopoulos, Georgios (Committee member) / Nelson, Brian (Committee member) / Arizona State University (Publisher)
Created2014
153127-Thumbnail Image.png
Description
Many web search improvements have been developed since the advent of the modern search engine, but one underrepresented area is the application of specific customizations to search results for educational web sites. In order to address this issue and improve the relevance of search results in automated learning environments, this

Many web search improvements have been developed since the advent of the modern search engine, but one underrepresented area is the application of specific customizations to search results for educational web sites. In order to address this issue and improve the relevance of search results in automated learning environments, this work has integrated context-aware search principles with applications of preference based re-ranking and query modifications. This research investigates several aspects of context-aware search principles, specifically context-sensitive and preference based re-ranking of results which take user inputs as to their preferred content, and combines this with search query modifications which automatically search for a variety of modified terms based on the given search query, integrating these results into the overall re-ranking for the context. The result of this work is a novel web search algorithm which could be applied to any online learning environment attempting to collect relevant resources for learning about a given topic. The algorithm has been evaluated through user studies comparing traditional search results to the context-aware results returned through the algorithm for a given topic. These studies explore how this integration of methods could provide improved relevance in the search results returned when compared against other modern search engines.
ContributorsVan Egmond, Eric (Author) / Burleson, Winslow (Thesis advisor) / Syrotiuk, Violet (Thesis advisor) / Nelson, Brian (Committee member) / Arizona State University (Publisher)
Created2014
131525-Thumbnail Image.png
Description
The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark

The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark fantasy theme. We will first be exploring the challenges that came
with programming my own game - not quite from scratch, but also without a prebuilt
engine - then transition into game design and how Helix has evolved from its original form
to what we see today.
ContributorsDiscipulo, Isaiah K (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131529-Thumbnail Image.png
Description
RecyclePlus is an iOS mobile application that allows users to be knowledgeable in the realms of sustainability. It gives encourages users to be environmental responsible by providing them access to recycling information. In particular, it allows users to search up certain materials and learn about its recyclability and how to

RecyclePlus is an iOS mobile application that allows users to be knowledgeable in the realms of sustainability. It gives encourages users to be environmental responsible by providing them access to recycling information. In particular, it allows users to search up certain materials and learn about its recyclability and how to properly dispose of the material. Some searches will show locations of facilities near users that collect certain materials and dispose of the materials properly. This is a full stack software project that explores open source software and APIs, UI/UX design, and iOS development.
ContributorsTran, Nikki (Author) / Ganesh, Tirupalavanam (Thesis director) / Meuth, Ryan (Committee member) / Watts College of Public Service & Community Solut (Contributor) / Department of Information Systems (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
133896-Thumbnail Image.png
Description
After freelancing on my own for the past year and a half, I have realized that one of the biggest obstacles to college entrepreneurs is a fear or apprehension to sales. As a computer science major trying to sell my services, I discovered very quickly that I had not been

After freelancing on my own for the past year and a half, I have realized that one of the biggest obstacles to college entrepreneurs is a fear or apprehension to sales. As a computer science major trying to sell my services, I discovered very quickly that I had not been prepared for the difficulty of learning sales. Sales get a bad rap and very often is the last thing that young entrepreneurs want to try, but the reality is that sales is oxygen to a company and a required skill for an entrepreneur. Due to this, I compiled all of my knowledge into an e-book for young entrepreneurs starting out to learn how to open up a conversation with a prospect all the way to closing them on the phone. Instead of starting from scratch like I did, college entrepreneurs can learn the bare basics of selling their own services, even if they are terrified of sales and what it entails. In this e-book, there are tips that I have learned to deal with my anxiety about sales such as taking the pressure off of yourself and prioritizing listening more than pitching. Instead of trying to teach sales expecting people to be natural sales people, this e-book takes the approach of helping entrepreneurs that are terrified of sales and show them how they can cope with this fear and still close a client. In the future, I hope young entrepreneurs will have access to more resources that handle this fear and make it much easier for them to learn it by themselves. This e-book is the first step.
ContributorsMead, Kevin Tyler (Author) / Sebold, Brent (Thesis director) / Kruse, Gabriel (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
134157-Thumbnail Image.png
Description
This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of

This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of blockchain before stating potential use cases for blockchain simulation software. The paper then gives a brief literature review of blockchain's role, both as a disruptive technology and a foundational technology. The literature review also addresses the potential and difficulties regarding the use of blockchain in Internet of Things (IoT) networks, and also describes the limitations of blockchain in general regarding computational intensity, storage capacity, and network architecture. Next, the paper gives the specification for a generic blockchain structure, with summaries on the behaviors and purposes of transactions, blocks, nodes, miners, public & private key cryptography, signature validation, and hashing. Finally, the author gives an overview of their specific implementation of the blockchain using C/C++ and OpenSSL. The overview includes a brief description of all the classes and data structures involved in the implementation, including their function and behavior. While the implementation meets the requirements set forward in the specification, the results are more qualitative and intuitive, as time constraints did not allow for quantitative measurements of the network simulation. The paper concludes by discussing potential applications for the simulator, and the possibility for future hardware implementations of blockchain.
ContributorsRauschenbach, Timothy Rex (Author) / Vrudhula, Sarma (Thesis director) / Nakamura, Mutsumi (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
134191-Thumbnail Image.png
Description
This study explores the best known practices of small businesses from different entrepreneurs' perspectives and attempts to address the question: are there consistencies between different entrepreneurs' approaches to establishing and growing a business? Ten entrepreneurs from a variety of business types (product and service) were interviewed using a consistent question

This study explores the best known practices of small businesses from different entrepreneurs' perspectives and attempts to address the question: are there consistencies between different entrepreneurs' approaches to establishing and growing a business? Ten entrepreneurs from a variety of business types (product and service) were interviewed using a consistent question template that asked questions regarding financing, business strategy (and scalability), interpersonal forces, innate qualities, partnerships, and resources. The primary overlaps between these businesses are with regard to the confluence between personal risk and business strategy, the risk of working with friends and family, the capacity to scale relative to special content knowledge or process knowledge, and partnerships
etworking.
ContributorsCole, Chandler William (Author) / Kellso, James (Thesis director) / Gilmore, Bruce (Committee member) / Department of Supply Chain Management (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
135217-Thumbnail Image.png
Description
Women dominate in terms of purchasing power and spending. They hold 60 percent of all US personal income, and those aged 50 years or older have a combined net worth of approximately $19 trillion. Of this group, women between 50 and 70 years old, in particular, are the biggest spenders

Women dominate in terms of purchasing power and spending. They hold 60 percent of all US personal income, and those aged 50 years or older have a combined net worth of approximately $19 trillion. Of this group, women between 50 and 70 years old, in particular, are the biggest spenders (Barmann, 2014). More important than their spending power, however, is how satisfied (or dissatisfied) they are with their current purchases. Though women make 85 percent of all consumer purchases, 91 percent of women say, "...advertisers don't understand them," (Barmann, 2014). This makes sense, considering that 50 percent of the products marketed to men are actually purchased by women (Barmann, 2014). Successfully targeting women, especially Baby Boomers (women between 52 and 70 years old), would be a lucrative endeavor, and to better understand the unmet needs of that demographic, exploratory research was needed. In-depth interviews of Baby Boomer women reveals a problem that \u2014 even on a macro level \u2014 has gone unresolved, and has perhaps worsened, throughout written history: the Generation Gap (Bengtson, 1970). To illustrate the depth of the problem, there exist starkly different impressions of younger generations, namely Millennials (born between 1980 and 1995). According to The New Generation Gap by Neil Howe and William Strauss (1992), Baby Boomers view Millennials as unintelligent, entitled "pleasure beasts." In Millennials Rising, also by Howe and Strauss (2000), Millennials are characterized as a generation that is, "...beginning to manifest a wide array of positive social habits that older Americans no longer associate with youth, including a new focus on teamwork, achievement, modesty, and good conduct." These contradictory opinions further support the substantial misunderstanding between generations that surfaced during in-depth interviews. Using the results of in-depth interviews and follow-up questions for idea validation, this thesis presents a potential method for "closing the gap." The goal of this business offering is not to homogenize older and younger generations of women; the goal is to cultivate empathy and connection \u2014 Intergenerational Cohesion \u2014 between them.
ContributorsSeefus, Cole Hawk Gillette (Author) / Gray, Nancy (Thesis director) / Giard, Jacques (Committee member) / Department of Management (Contributor) / Department of Marketing (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
134286-Thumbnail Image.png
Description
Many researchers aspire to create robotics systems that assist humans in common office tasks, especially by taking over delivery and messaging tasks. For meaningful interactions to take place, a mobile robot must be able to identify the humans it interacts with and communicate successfully with them. It must also be

Many researchers aspire to create robotics systems that assist humans in common office tasks, especially by taking over delivery and messaging tasks. For meaningful interactions to take place, a mobile robot must be able to identify the humans it interacts with and communicate successfully with them. It must also be able to successfully navigate the office environment. While mobile robots are well suited for navigating and interacting with elements inside a deterministic office environment, attempting to interact with human beings in an office environment remains a challenge due to the limits on the amount of cost-efficient compute power onboard the robot. In this work, I propose the use of remote cloud services to offload intensive interaction tasks. I detail the interactions required in an office environment and discuss the challenges faced when implementing a human-robot interaction platform in a stochastic office environment. I also experiment with cloud services for facial recognition, speech recognition, and environment navigation and discuss my results. As part of my thesis, I have implemented a human-robot interaction system utilizing cloud APIs into a mobile robot, enabling it to navigate the office environment, identify humans within the environment, and communicate with these humans.
Created2017-05
134293-Thumbnail Image.png
Description
Lie detection is used prominently in contemporary society for many purposes such as for pre-employment screenings, granting security clearances, and determining if criminals or potential subjects may or may not be lying, but by no means is not limited to that scope. However, lie detection has been criticized for being

Lie detection is used prominently in contemporary society for many purposes such as for pre-employment screenings, granting security clearances, and determining if criminals or potential subjects may or may not be lying, but by no means is not limited to that scope. However, lie detection has been criticized for being subjective, unreliable, inaccurate, and susceptible to deliberate manipulation. Furthermore, critics also believe that the administrator of the test also influences the outcome as well. As a result, the polygraph machine, the contemporary device used for lie detection, has come under scrutiny when used as evidence in the courts. The purpose of this study is to use three entirely different tools and concepts to determine whether eye tracking systems, electroencephalogram (EEG), and Facial Expression Emotion Analysis (FACET) are reliable tools for lie detection. This study found that certain constructs such as where the left eye is looking at in regard to its usual position and engagement levels in eye tracking and EEG respectively could distinguish between truths and lies. However, the FACET proved the most reliable tool out of the three by providing not just one distinguishing variable but seven, all related to emotions derived from movements in the facial muscles during the present study. The emotions associated with the FACET that were documented to possess the ability to distinguish between truthful and lying responses were joy, anger, fear, confusion, and frustration. In addition, an overall measure of the subject's neutral and positive emotional expression were found to be distinctive factors. The implications of this study and future directions are discussed.
ContributorsSeto, Raymond Hua (Author) / Atkinson, Robert (Thesis director) / Runger, George (Committee member) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05