Matching Items (66)
Filtering by

Clear all filters

136179-Thumbnail Image.png
Description
CourseKarma is a web application that engages students in their own learning through peer-driven social networking. The influence of technology on students is advancing faster than the school system, and a major gap still lingers between traditional learning techniques and the fast-paced, online culture of today's generation. CourseKarma enriches the

CourseKarma is a web application that engages students in their own learning through peer-driven social networking. The influence of technology on students is advancing faster than the school system, and a major gap still lingers between traditional learning techniques and the fast-paced, online culture of today's generation. CourseKarma enriches the educational experience of today's student by creating a space for collaborative inquiry as well as illuminating the opportunities of self and group learning through online collaboration. The features of CourseKarma foster this student-driven environment. The main focus is on a news-feed and Question and Answer component that provides a space for students to share instant updates as well ask and answer questions of the community. The community can be as broad as the entire ASU student body, as specific as students in BIO155, or even more targeted via specific subjects and or skills. CourseKarma also provides reputation points, which are the sum of all of their votes received, identifying the individual's level and or ranking in each subject or class. This not only gamifies the usual day-to-day learning environment, but it also provides an in-depth analysis of the individual's skills, accomplishments, and knowledge. The community is also able to input and utilize course and professor descriptions/feedback. This will be in a review format providing the students an opportunity to share and give feedback on their experience as well as providing incoming students the opportunity to be prepared for their future classes. All of the student's contributions and collaborative activity within CourseKarma is displayed on their personal profile creating a timeline of their academic achievements. The application was created using modern web programming technologies such as AngualrJS, Javascript, jQuery, Bootstrap, HTML5, CSS3 for the styling and front-end development, Mustache.js for client side templating, and Firebase AngularFire as the back-end and NoSQL database. Other technologies such as Pivitol Tracker was used for project management and user story generation, as well as, Github for version control management and repository creation. Object-oreinted programming concepts were heavily present in the creation of the various data structures, as well as, a voting algorithm was used to manage voting of specific posts. Down the road, CourseKarma could even be a necessary add-on within LinkedIn or Facebook that provides a quick yet extremely in-depth look at an individuals' education, skills, and potential to learn \u2014 based all on their actual contribution to their academic community rather than just a text they wrote up.
ContributorsCho, Sungjae (Author) / Mayron, Liam (Thesis director) / Lobock, Alan (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Arts, Media and Engineering (Contributor)
Created2015-05
135837-Thumbnail Image.png
Description
Studies have shown that arts programs have a positive impact on students' abilities to achieve academic success, showcase creativity, and stay focused inside and outside of the classroom. However, as school funding drops, arts programs are often the first to be cut from school curricula. Rather than drop art completely,

Studies have shown that arts programs have a positive impact on students' abilities to achieve academic success, showcase creativity, and stay focused inside and outside of the classroom. However, as school funding drops, arts programs are often the first to be cut from school curricula. Rather than drop art completely, general education teachers have the opportunity to integrate arts instruction with other content areas in their classrooms. Traditional fraction lessons and Music-infused fraction lessons were administered to two classes of fourth-grade students. The two types of lessons were presented over two separate days in each classroom. Mathematics worksheets and attitudinal surveys were administered to each student in each classroom after each lesson to gauge their understanding of the mathematics content as well as their self-perceived understanding, enjoyment and learning related to the lessons. Students in both classes were found to achieve significantly higher mean scores on the traditional fraction lesson than the music-infused fraction lesson. Lower scores in the music-infused fraction lesson may have been due to the additional component of music for students unfamiliar with music principles. Students tended to express satisfaction for both lessons. In future studies, it would be recommended to spend additional lesson instruction time on the principles of music in order help students reach deeper understanding of the music-infused fraction lesson. Other recommendations include using colorful visuals and interactive activities to establish both fraction and music concepts.
ContributorsGerrish, Julie Kathryn (Author) / Zambo, Ronald (Thesis director) / Hutchins, Catherine (Committee member) / Division of Teacher Preparation (Contributor) / Department of Psychology (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135638-Thumbnail Image.png
Description
A growing number of jobs in the US require a college degree or technical education, and the wage difference between jobs requiring a high school diploma and a college education has increased to over $17,000 per year. Enrollment levels in postsecondary education have been rising for at least the past

A growing number of jobs in the US require a college degree or technical education, and the wage difference between jobs requiring a high school diploma and a college education has increased to over $17,000 per year. Enrollment levels in postsecondary education have been rising for at least the past decade, and this paper attempts to tease out how much of the increasing enrollment is due to changes in the demand by companies for workers. A Bartik Instrument, which is a measure of local area labor demand, for each county in the US was constructed from 2007 to 2014, and using multivariate linear regression the effect of changing labor demand on local postsecondary education enrollment rates was examined. A small positive effect was found, but the effect size in relation to the total change in enrollment levels was diminutive. From the start to the end of the recession (2007 to 2010), Bartik Instrument calculated unemployment increased from 5.3% nationally to 8.2%. This level of labor demand contraction would lead to a 0.42% increase in enrollment between 2008 and 2011. The true enrollment increase over this period was 7.6%, so the model calculated 5.5% of the enrollment increase was based on the changes in labor demand.
ContributorsHerder, Daniel Steven (Author) / Dillon, Eleanor (Thesis director) / Schoellman, Todd (Committee member) / Economics Program in CLAS (Contributor) / Department of Psychology (Contributor) / Sandra Day O'Connor College of Law (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135743-Thumbnail Image.png
Description
The two authors completed the entirety of their schooling within the United States, from preschool to university. Both authors experienced loss of interest towards their education each successive year and assumed the nature of learning and education was to blame. The two students took a class on the Kashiwagi Information

The two authors completed the entirety of their schooling within the United States, from preschool to university. Both authors experienced loss of interest towards their education each successive year and assumed the nature of learning and education was to blame. The two students took a class on the Kashiwagi Information Measurement Theory their second years at Arizona State University and applied the concepts taught in that class to past experiences in the United States education system to determine the cause behind their waning interest in their education. Using KSM principles the authors identified that the environment produced by and ineffectual and inefficient educational system is what resulted in their, and the majority of their peers, growing dissatisfaction in their education. A negative correlation was found between GPA and control. As the control in a students environment increased, their GPA decreased. The data collected in this thesis also supports the conclusions that as a student is exposed to a high stress environment, their GPA and average amount of sleep per night decrease.
ContributorsKulanathan, Shivaan (Co-author) / Westlake, Kyle (Co-author) / Kashiwagi, Dean (Thesis director) / Kashiwagi, Jacob (Committee member) / Gunnoe, Jake (Committee member) / Computer Science and Engineering Program (Contributor) / Chemical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135981-Thumbnail Image.png
Description
Education in computer science is a difficult endeavor, with learning a new programing language being a barrier to entry, especially for college freshman and high school students. Learning a first programming language requires understanding the syntax of the language, the algorithms to use, and any additional complexities the language carries.

Education in computer science is a difficult endeavor, with learning a new programing language being a barrier to entry, especially for college freshman and high school students. Learning a first programming language requires understanding the syntax of the language, the algorithms to use, and any additional complexities the language carries. Often times this becomes a deterrent from learning computer science at all. Especially in high school, students may not want to spend a year or more simply learning the syntax of a programming language. In order to overcome these issues, as well as to mitigate the issues caused by Microsoft discontinuing their Visual Programming Language (VPL), we have decided to implement a new VPL, ASU-VPL, based on Microsoft's VPL. ASU-VPL provides an environment where users can focus on algorithms and worry less about syntactic issues. ASU-VPL was built with the concepts of Robot as a Service and workflow based development in mind. As such, ASU-VPL is designed with the intention of allowing web services to be added to the toolbox (e.g. WSDL and REST services). ASU-VPL has strong support for multithreaded operations, including event driven development, and is built with Microsoft VPL users in mind. It provides support for many different robots, including Lego's third generation robots, i.e. EV3, and any open platform robots. To demonstrate the capabilities of ASU-VPL, this paper details the creation of an Intel Edison based robot and the use of ASU-VPL for programming both the Intel based robot and an EV3 robot. This paper will also discuss differences between ASU-VPL and Microsoft VPL as well as differences between developing for the EV3 and for an open platform robot.
ContributorsDe Luca, Gennaro (Author) / Chen, Yinong (Thesis director) / Cheng, Calvin (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2015-12
137152-Thumbnail Image.png
Description
Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is

Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is widely used for secure access control and applications where a contactless authentication element is desirable. Unfortunately, iCLASS has been shown to have security issues. Nevertheless customers continue to use it because of the great cost that would be required to completely replace it. This Honors Thesis will address attacks against iCLASS and means for countering them that do not require such an overhaul.
ContributorsMellott, Matthew John (Author) / Ahn, Gail-Joon (Thesis director) / Thorstenson, Tina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05
137309-Thumbnail Image.png
Description
Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.
Created2014-05
137392-Thumbnail Image.png
Description
Despite the advancement of online tools for activities related to the core experience of taking classes on a college campus, there has been a relatively small amount of research into implementing online tools for ancillary academic resources (e.g. tutoring centers, review sessions, etc.). Previous work and a study conducted for

Despite the advancement of online tools for activities related to the core experience of taking classes on a college campus, there has been a relatively small amount of research into implementing online tools for ancillary academic resources (e.g. tutoring centers, review sessions, etc.). Previous work and a study conducted for this paper indicates that there is value in creating these online tools but that there is value in maintaining an in-person component to these services. Based on this, a system which provides personalized, easily-accessible, simple access to these services is proposed. Designs for user-centered online-tools that provides access to and interaction with tutoring centers and review sessions are described and prototypes are developed to demonstrate the application of design principles for online tools for academic services.
ContributorsBerk, Nicholas Robert (Author) / Balasooriya, Janaka (Thesis director) / Eaton, John (Committee member) / Walker, Erin (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-12
137473-Thumbnail Image.png
Description
This project was undertaken for the purposes of exploring the feasibility of website development for arts education information. In partnership with the Arizona Commission on the Arts, ideas for website design were collected. The original plan was to build a website that would be a "one-stop-shop" for educators to find

This project was undertaken for the purposes of exploring the feasibility of website development for arts education information. In partnership with the Arizona Commission on the Arts, ideas for website design were collected. The original plan was to build a website that would be a "one-stop-shop" for educators to find arts education resources. Some resources deemed important to include on the website were: a search engine, calendar of events, curriculum ideas, discussion forum, feedback, ticketing, and financial support available. This website would make accessing arts education information easier, thus more appealing. It is understood that art is a fundamental part of education and it needs to be integrated into the public schools system, however, due to a lack of educational funding in Arizona it is important to bring outside organizations and resources into the education system. The following paper will examine how arts education is beneficial for children in grades K-12, what resources people want available on the website, what education administrators have to say about the website, and what aspects of the website would need to be included and addressed.
ContributorsJenner, Lindsay Ann (Author) / Phillips, Rhonda (Thesis director) / Ramella, Kelly (Committee member) / Nelson, Alex (Committee member) / Barrett, The Honors College (Contributor) / School of Dance (Contributor) / School of Community Resources and Development (Contributor) / Department of Psychology (Contributor)
Created2013-05
137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05