Matching Items (1,553)
Filtering by

Clear all filters

132493-Thumbnail Image.png
Description
The nonprofit organization, I Am Zambia, works to give supplemental education to young women in Lusaka. I Am Zambia is creating sustainable change by educating these females, who can then lift their families and communities out of poverty. The ultimate goal of this thesis was to explore and implement high

The nonprofit organization, I Am Zambia, works to give supplemental education to young women in Lusaka. I Am Zambia is creating sustainable change by educating these females, who can then lift their families and communities out of poverty. The ultimate goal of this thesis was to explore and implement high level systematic problem solving through basic and specialized computational thinking curriculum at I Am Zambia in order to give these women an even larger stepping stool into a successful future.

To do this, a 4-week long pilot curriculum was created, implemented, and tested through an optional class at I Am Zambia, available to women who had already graduated from the year-long I Am Zambia Academy program. A total of 18 women ages 18-24 chose to enroll in the course. There were a total of 10 lessons, taught over 20 class period. These lessons covered four main computational thinking frameworks: introduction to computational thinking, algorithmic thinking, pseudocode, and debugging. Knowledge retention was tested through the use of a CS educational tool, QuizIt, created by the CSI Lab of School of Computing, Informatics and Decision Systems Engineering at Arizona State University. Furthermore, pre and post tests were given to assess the successfulness of the curriculum in teaching students the aforementioned concepts. 14 of the 18 students successfully completed the pre and post test.

Limitations of this study and suggestions for how to improve this curriculum in order to extend it into a year long course are also presented at the conclusion of this paper.
ContributorsGriffin, Hadley Meryl (Author) / Hsiao, Sharon (Thesis director) / Mutsumi, Nakamura (Committee member) / Arts, Media and Engineering Sch T (Contributor) / Computer Science and Engineering Program (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
132566-Thumbnail Image.png
Description
ASU’s Software Engineering (SER) program adequately prepares students for what happens after they become a developer, but there is no standard for preparing students to secure a job post-graduation in the first place. This project creates and executes a supplemental curriculum to prepare students for the technical interview process. The

ASU’s Software Engineering (SER) program adequately prepares students for what happens after they become a developer, but there is no standard for preparing students to secure a job post-graduation in the first place. This project creates and executes a supplemental curriculum to prepare students for the technical interview process. The trial run of the curriculum was received positively by study participants, who experienced an increase in confidence over the duration of the workshop.
ContributorsSchmidt, Julia J (Author) / Roscoe, Rod (Thesis director) / Bansal, Srividya (Committee member) / Software Engineering (Contributor) / Human Systems Engineering (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
132570-Thumbnail Image.png
DescriptionThe goal of this study is to equip administrators and instructors with a deeper understanding of the apparent cheating problem in Computer Science courses, with proposed solutions to lower academic dishonesty from the students’ perspective.
ContributorsAl Yasari, Farah (Co-author) / Alyasari, Farah (Co-author) / Tadayon-Navabi, Farideh (Thesis director) / Bazzi, Rida (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
ContributorsHernandez, Reynold Torres (Performer) / Morales, Astrid (Performer) / ASU Library. Music Library (Publisher)
Created2018-11-20
ContributorsPabst, Joshua (Performer) / ASU Library. Music Library (Publisher)
Created2022-02-22
165590-Thumbnail Image.png
Description

In the United States, the word "earthquake" is extensively used. This natural disaster has a year-round impact on numerous states across the country. Earthquakes are simply more than a natural calamity; they also have a negative psychological impact. Earthquake safety measures are essential for ensuring citizens' safety. This paper proposes,

In the United States, the word "earthquake" is extensively used. This natural disaster has a year-round impact on numerous states across the country. Earthquakes are simply more than a natural calamity; they also have a negative psychological impact. Earthquake safety measures are essential for ensuring citizens' safety. This paper proposes, a technique for evaluating earthquake safety activities and instructing individuals in selecting appropriate precautions. Earthquake protection using Reach.love plus Amazon Alexa is special in that it uses cutting-edge virtual reality technology. The platform developed by Reach.love takes earthquake prevention to a new and innovative direction. The feeling of presence in a VR headset linked within Reach.love, allows the user to feel that an earthquake is occurring right now. Additionally, each location includes audio instructions that explain what to do in specific scenarios. The user can practice and mentally train to respond appropriately when a real earthquake happens, comparable to a 3D drill. Finally, the user will be able to utilize Amazon Alexa for help within the rooms in Reach.love to improve the experience of earthquake safety training. For example, if the user speaks to Alexa during the simulation and says, "Alexa, turn off the audio instructions," Alexa will do so, and the user will no longer hear them. Alexa would be the user's personal assistant during the training of earthquake protection.

ContributorsKaur, Simran (Author) / Johnson, Mina (Thesis director) / de la Pena, Nonny (Committee member) / Barrett, The Honors College (Contributor) / Computer Science - BS (Contributor)
Created2022-05
ContributorsWhite, Bill (Performer) / Plouffe, Siobhan, 1997- (Performer) / ASU Library. Music Library (Publisher)
Created2022-04-08
168506-Thumbnail Image.png
Description
With the advent of new mobility services and technologies, the complexity of understanding the mobility patterns has been gradually intensified. The availability of large datasets, in conjunction with the transportation revolution, has been increased and incurs high computing costs. These two critical challenges require us to methodologically handle complex

With the advent of new mobility services and technologies, the complexity of understanding the mobility patterns has been gradually intensified. The availability of large datasets, in conjunction with the transportation revolution, has been increased and incurs high computing costs. These two critical challenges require us to methodologically handle complex transportation problems with numerical performance: fast, high-precision solutions, and reliable structure under different impact factors. That is, it is imperative to introduce a new type of modeling strategy, advancing the conventional transportation planning models. In order to do this, we leverage the backbone of the underlying algorithm behind machine learning (ML): computational graph (CG) and automatic differentiation (AD). CG is a directed acyclic graph (DAG) where each vertex represents a mathematical operation, and each edge represents data transfer. AD is an efficient algorithm to analytically compute gradients of necessary functionality. Embedding the two key algorithms into the planning models, specifically parametric-based econometric models and network optimization models, we theoretically and practically develop different types of modeling structures and reformulate mathematical formulations on basis of the graph-oriented representation. Three closely related analytical and computational frameworks are presented in this dissertation, based on a common modeling methodology of CG abstraction. First, a two-stage interpretable machine learning framework developed by a linear regression model, coupled with a neural network layered by long short-term memory (LSTM) shows the capability of capturing statistical characteristics with enhanced predictability in the context of day-to-day streaming datasets. Second, AD-based computation in estimating for discrete choice models proves more efficiency of handling complex modeling structure than the standard optimization solver relying on numerical gradients, outperforming the standard methods, Biogeme and Apollo. Lastly, CG allows modelers to take advantage of a special problem structure for the feedback loops, a new class of problem reformulation developed through Lagrangian relaxation (LR), which makes CG based model well suited for reaching a high degree of the integrated demand-supply consistency. Overall, the deep integration of the practically important planning models with the underlying computationally efficient ML algorithms can enhance behavioral understanding of interactions in real-world urban systems, and the proposed differentiable mathematical structures will enable transportation decision-makers to accurately evaluate different demand-side and supply-side scenarios with a higher degree of convergency and optimality in more complex transportation systems.
ContributorsKim, Taehooie (Author) / Pendyala, Ram RP (Thesis advisor) / Zhou, Xuesong XZ (Thesis advisor) / Pan, Rong RP (Committee member) / Lou, Yingyan YL (Committee member) / Arizona State University (Publisher)
Created2021
168589-Thumbnail Image.png
Description
Mobile Augmented Reality (MAR) is a portable, powerful, and suitable technology that integrates 3D virtual content into the physical world in real-time. It has been implemented for multiple intents as it enhances people’s interaction, e.g., shopping, entertainment, gaming, etc. Thus, MAR is expected to grow at a tremendous rate in

Mobile Augmented Reality (MAR) is a portable, powerful, and suitable technology that integrates 3D virtual content into the physical world in real-time. It has been implemented for multiple intents as it enhances people’s interaction, e.g., shopping, entertainment, gaming, etc. Thus, MAR is expected to grow at a tremendous rate in the upcoming years, as its popularity via mobile devices has increased. But, unfortunately, the applications that implement MAR, hereby referred to as MAR-Apps, bear security issues. Such are imaged in worldwide recorded incidents caused by MAR-Apps, e.g., robberies, authorities requesting banning MAR at specific locations, etc. To further explore these concerns, a case study analyzed several MAR-Apps available in the market to identify the security problems in MAR. As a result of this study, the threats found were classified into three categories. First, Space Invasion implies the intrusive modification through MAR of sensitive spaces, e.g., hospitals, memorials, etc. Then, Space Affectation means the degradation of users’ experience via interaction with undesirable MAR or malicious entities. Finally, MAR-Apps mishandling sensitive data leads to Privacy Leaks. SpaceMediator, a proof-of-concept MAR-App that imitates the well-known and successful MAR-App Pokémon GO, implements the solution approach of a Policy-Governed MAR-App, which assists in preventing the aforementioned mentioned security issues. Furthermore, its feasibility is evaluated through a user study with 40 participants. As a result, uncovering understandability over the security issues as participants recognized and prevented them with success rates as high as 92.50%. Furthermore, there is an enriched interest in Policy-Governed MAR-Apps as 87.50% of participants agreed with restricted MAR-Apps within sensitive spaces, and 82.50% would implement constraints in MAR-Apps. These promising results encourage adopting the Policy-Governed solution approach in future MAR-Apps.
ContributorsClaramunt, Luis Manuel (Author) / Ahn, Gail-Joon (Thesis advisor) / Rubio-Medrano, Carlos E (Committee member) / Baek, Jaejong (Committee member) / Arizona State University (Publisher)
Created2022
168600-Thumbnail Image.png
Description
Studies on underground forums can significantly advance the understanding of cybercrime workflow and underground economies. However, research on underground forums has concentrated on public information with little attention paid to users’ private interactions. Since detailed information will be discussed privately, the failure to investigate private interactions may miss critical intelligence

Studies on underground forums can significantly advance the understanding of cybercrime workflow and underground economies. However, research on underground forums has concentrated on public information with little attention paid to users’ private interactions. Since detailed information will be discussed privately, the failure to investigate private interactions may miss critical intelligence and even misunderstand the entire underground economy. Furthermore, underground forums have evolved into criminal freelance markets where criminals trade illicit products and cybercrime services, allowing unsophisticated people to launch sophisticated cyber attacks. However, current research rarely examines and explores how criminals interact with each other, which makes researchers miss the opportunities to detect new cybercrime patterns proactively. Moreover, in clearnet, criminals are active in exploiting human vulnerabilities to conduct various attacks, and the phishing attack is one of the most prevalent types of cybercrime. Phishing awareness training has been proven to decrease the rate of clicking phishing emails. However, the rate of reporting phishing attacks is unexpectedly low based on recent studies, leaving phishing websites with hours of additional active time before being detected. In this dissertation, I first present an analysis of private interactions in underground forums and introduce machine learning-based approaches to detect hidden connections between users. Secondly, I analyze how criminals collaborate with each other in an emerging scam service in underground forums that exploits the return policies of merchants to get a refund or a replacement without returning the purchased products. Finally, I conduct a comprehensive evaluation of the phishing reporting ecosystem to identify the critical challenges while reporting phishing attacks to enable people to fight against phishers proactively.
ContributorsSun, Zhibo (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Thesis advisor) / Bao, Tiffany (Committee member) / Benjamin, Victor (Committee member) / Arizona State University (Publisher)
Created2022