Matching Items (359)
Filtering by

Clear all filters

148034-Thumbnail Image.png
Description

In the past decade, the use of mobile applications, specifically mobile applications focused on improving the health and fitness of users, has increased exponentially. As more consumers look towards mobile health applications to improve their health through dieting, exercise, and weight management, it is important to analyze how the concept

In the past decade, the use of mobile applications, specifically mobile applications focused on improving the health and fitness of users, has increased exponentially. As more consumers look towards mobile health applications to improve their health through dieting, exercise, and weight management, it is important to analyze how the concept of gamification can encourage sustained interaction and approval of these health-focused applications. This thesis aims to understand the prevalence of gamification amongst a large sample of health and fitness applications, identify and code the gamification features used in these apps, and finally, understand how different gamification features relate to the popularity and willingness to advocate using eWOM on behalf of a mobile app.

ContributorsBaugh, Monica (Author) / Dong, Xiaodan (Thesis director) / Montoya, Detra (Committee member) / Department of Marketing (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147978-Thumbnail Image.png
Description

This research analyzes lesbian, gay, bisexual, transgender, and queer/ questioning (LGBTQ) students’ experiences with sex education in Arizona. This research is a grey literature review of Arizona’s previous state policies, current state sex education curricula law, and legislative proposals within the past few years. Analysis focuses on changes after the

This research analyzes lesbian, gay, bisexual, transgender, and queer/ questioning (LGBTQ) students’ experiences with sex education in Arizona. This research is a grey literature review of Arizona’s previous state policies, current state sex education curricula law, and legislative proposals within the past few years. Analysis focuses on changes after the repeal of the “no promo homo” law in 2019. Through defining the differences between abstinence only and comprehensive sex education (CSE), this will provide a framework to better understand approaches to sex education. As of now, Arizona stresses abstinence-based education. Delving into LGBTQ students’ general experiences in schools provides a foundation to better understand why these students especially benefit from CSE. Since LGBTQ students are disproportionately affected by bullying and are at increased sexual health risks, it is important to address misperceptions surrounding the LGBTQ community. The purpose of this research is to push for more LGBTQ inclusive sex education curricula in Arizona.

ContributorsHo, Jacklyn (Author) / Glegziabher, Meskerem (Thesis director) / Ruth, Alissa (Committee member) / School of Human Evolution & Social Change (Contributor) / School of Public Affairs (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147808-Thumbnail Image.png
Description

The Green Gamers is a start-up concept revolving around incentivizing healthy eating in Arizonan adolescents through the use of reward-based participation campaigns (popularized by conglomerates like Mondelez and Coca-Cola)

ContributorsDavis, Benjamin (Co-author) / Wong, Brendan (Co-author) / Hwan, Kim (Thesis director) / McKearney, John (Committee member) / Department of Finance (Contributor, Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

The Founders lab is a year-long program that gives its students an opportunity to participate in a unique team-based, experiential Barrett honors thesis project to design and apply marketing and sales strategies, as well as business and financial models to start up and launch a new business. This honors thesis

The Founders lab is a year-long program that gives its students an opportunity to participate in a unique team-based, experiential Barrett honors thesis project to design and apply marketing and sales strategies, as well as business and financial models to start up and launch a new business. This honors thesis project focuses on increasing the rate of vaccination outcomes in a country where people are increasingly busy (less time) and unwilling to get a needle through a new business venture that provides a service that brings vaccinations straight to businesses, making them available for their employees. Through our work with the Founders Lab, our team was able to create this pitch deck.

ContributorsZatonskiy, Albert (Co-author) / Hanzlick, Emily (Co-author) / Gomez, Isaias (Co-author) / Byrne, Jared (Thesis director) / Hall, Rick (Committee member) / Silverstein, Taylor (Committee member) / Department of Finance (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148212-Thumbnail Image.png
Description

Developed a business product with a team of CS students.

ContributorsPerri, Cole Thomas (Co-author) / Hernandez, Maximilliano (Co-author) / Schneider, Kaitlin (Co-author) / Call, Andy (Thesis director) / Hunt, Neil (Committee member) / School of Accountancy (Contributor) / Watts College of Public Service & Community Solut (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
149851-Thumbnail Image.png
Description
This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute,

This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute, and the code generates results which are sent to the external entity. These results provide the external entity an assurance as to whether the client application and the OS are in pristine condition. This work also presents a technique where it can be verified that the application which was attested, did not get replaced by a different application after completion of the attestation. The implementation of these three techniques was achieved entirely in software and is backward compatible with legacy machines on the Intel x86 architecture. This research also presents two approaches to incorporating software based "root of trust" using Virtual Machine Monitors (VMMs). The first approach determines the integrity of an executing Guest OS from the Host OS using Linux Kernel-based Virtual Machine (KVM) and qemu emulation software. The second approach implements a small VMM called MIvmm that can be utilized as a trusted codebase to build security applications such as those implemented in this research. MIvmm was conceptualized and implemented without using any existing codebase; its minimal size allows it to be trustworthy. Both the VMM approaches leverage processor support for virtualization in the Intel x86 architecture.
ContributorsSrinivasan, Raghunathan (Author) / Dasgupta, Partha (Thesis advisor) / Colbourn, Charles (Committee member) / Shrivastava, Aviral (Committee member) / Huang, Dijiang (Committee member) / Dewan, Prashant (Committee member) / Arizona State University (Publisher)
Created2011
137870-Thumbnail Image.png
Description
Plants are essential to human life. They release oxygen into the atmosphere for us to breathe. They also provide shelter, medicine, clothing, tools, and food. For many people, the food that is on their tables and in their supermarkets isn't given much thought. Where did it come from? What part

Plants are essential to human life. They release oxygen into the atmosphere for us to breathe. They also provide shelter, medicine, clothing, tools, and food. For many people, the food that is on their tables and in their supermarkets isn't given much thought. Where did it come from? What part of the plant is it? How does it relate to others in the plant kingdom? How do other cultures use this plant? The most many of us know about them is that they are at the supermarket when we need them for dinner (Nabhan, 2009) (Vileisis, 2008).
ContributorsBarron, Kara (Author) / Landrum, Leslie (Thesis director) / Swanson, Tod (Committee member) / Pigg, Kathleen (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2012-12
137871-Thumbnail Image.png
DescriptionBased on previous research and findings it is proven that a non-profit class to create awareness will be beneficial in the prevention of eating disorders. This analysis will provide significant research to defend the proposed class.
ContributorsAllen, Brittany (Author) / Chung, Deborah (Author) / Fey, Richard (Thesis director) / Peck, Sidnee (Committee member) / Mazurkiewicz, Milena (Committee member) / Barrett, The Honors College (Contributor) / W. P. Carey School of Business (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2012-12
151851-Thumbnail Image.png
Description
In this thesis we deal with the problem of temporal logic robustness estimation. We present a dynamic programming algorithm for the robust estimation problem of Metric Temporal Logic (MTL) formulas regarding a finite trace of time stated sequence. This algorithm not only tests if the MTL specification is satisfied by

In this thesis we deal with the problem of temporal logic robustness estimation. We present a dynamic programming algorithm for the robust estimation problem of Metric Temporal Logic (MTL) formulas regarding a finite trace of time stated sequence. This algorithm not only tests if the MTL specification is satisfied by the given input which is a finite system trajectory, but also quantifies to what extend does the sequence satisfies or violates the MTL specification. The implementation of the algorithm is the DP-TALIRO toolbox for MATLAB. Currently it is used as the temporal logic robust computing engine of S-TALIRO which is a tool for MATLAB searching for trajectories of minimal robustness in Simulink/ Stateflow. DP-TALIRO is expected to have near linear running time and constant memory requirement depending on the structure of the MTL formula. DP-TALIRO toolbox also integrates new features not supported in its ancestor FW-TALIRO such as parameter replacement, most related iteration and most related predicate. A derivative of DP-TALIRO which is DP-T-TALIRO is also addressed in this thesis which applies dynamic programming algorithm for time robustness computation. We test the running time of DP-TALIRO and compare it with FW-TALIRO. Finally, we present an application where DP-TALIRO is used as the robustness computation core of S-TALIRO for a parameter estimation problem.
ContributorsYang, Hengyi (Author) / Fainekos, Georgios (Thesis advisor) / Sarjoughian, Hessam S. (Committee member) / Shrivastava, Aviral (Committee member) / Arizona State University (Publisher)
Created2013
151527-Thumbnail Image.png
Description
Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation

Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation of effective, yet low-cost protection mechanism. The basic idea is that, there is a high probability that a soft-fault in program execution will eventually alter the control flow of the program. Therefore just by making sure that the control flow of the program is correct, significant protection can be achieved. More than a dozen techniques for CFC have been developed over the last several decades, ranging from hardware techniques, software techniques, and hardware-software hybrid techniques as well. Our analysis shows that existing CFC techniques are not only ineffective in protecting from soft errors, but cause additional power and performance overheads. For this analysis, we develop and validate a simulation based experimental setup to accurately and quantitatively estimate the architectural vulnerability of a program execution on a processor micro-architecture. We model the protection achieved by various state-of-the-art CFC techniques in this quantitative vulnerability estimation setup, and find out that software only CFC protection schemes (CFCSS, CFCSS+NA, CEDA) increase system vulnerability by 18% to 21% with 17% to 38% performance overhead. Hybrid CFC protection (CFEDC) increases vulnerability by 5%, while the vulnerability remains almost the same for hardware only CFC protection (CFCET); notwithstanding the hardware overheads of design cost, area, and power incurred in the hardware modifications required for their implementations.
ContributorsRhisheekesan, Abhishek (Author) / Shrivastava, Aviral (Thesis advisor) / Colbourn, Charles Joseph (Committee member) / Wu, Carole-Jean (Committee member) / Arizona State University (Publisher)
Created2013