Matching Items (151)
Filtering by

Clear all filters

152485-Thumbnail Image.png
Description
ABSTRACT This qualitative study examines how high school art teachers conceive of being a good art teacher. Motivated by my own experiences as an art teacher, I designed this study to add teachers' voices to the conversation surrounding quality in education. My research design included a narrative strand and an

ABSTRACT This qualitative study examines how high school art teachers conceive of being a good art teacher. Motivated by my own experiences as an art teacher, I designed this study to add teachers' voices to the conversation surrounding quality in education. My research design included a narrative strand and an arts-based strand. In the narrative strand, I interviewed and observed 12 high school art educators from a major city in the southwest. I conducted an autoethnographic reflection exploring my connection to the research topic and research process. In the arts-based strand I used fiber-arts to further understand my topic. I wrote this dissertation using a narrative approach, blending the traditional research format, voices of participants, and my autoethnographic reflection. I included the results of my arts-based approach in the final chapter. Findings suggest that the teachers in this study conceptualize being a good art teacher as a process of identity construction. Each of the teachers understood what it meant to be a good art teacher in unique ways, connected to their personal experiences and backgrounds. As the teachers engaged in identity work to become the kind of art teacher they wanted to be, they engaged in a process of identity construction that consisted of four steps. I propose a model of identity construction in which the teachers chose teaching practices, evaluated those practices, identified challenges to their identities, and selected strategies to confirm, assert, or defend their desired identities. The findings have implications for teachers to become reflective practitioners; for teacher educators to prepare teachers to engage in reflective practices; and for administrators and policy makers to take into account the cyclical and personal nature of identity construction. This study also has implications for further research including the need to examine the dispositions of art teachers, teachers' evolving conceptions of what it means to be a good art teacher, and the effect labeling teachers' quality has on their identity construction.
ContributorsAndrelchik, Hillary (Author) / Erickson, Mary (Thesis advisor) / Young, Bernard (Committee member) / Margolis, Eric (Committee member) / Arizona State University (Publisher)
Created2014
150602-Thumbnail Image.png
Description
This study explores experiences of women as they pursue post-secondary computing education in various contexts. Using in-depth interviews, the current study employs qualitative methods and draws from an intersectional approach to focus on how the various barriers emerge for women in different types of computing cultures. In-depth interviews with ten

This study explores experiences of women as they pursue post-secondary computing education in various contexts. Using in-depth interviews, the current study employs qualitative methods and draws from an intersectional approach to focus on how the various barriers emerge for women in different types of computing cultures. In-depth interviews with ten participants were conducted over the course of eight months. Analytical frameworks drawn from the digital divide and explorations of the role of hidden curricula in higher education contexts were used to analyze computing experiences in earlier k-12, informal, workplace, and post-secondary educational contexts to understand how barriers to computing emerge for women. Findings suggest several key themes. First, early experiences in formal education contexts are alienating women who develop an interest in computing. Opportunities for self-guided exploration, play, and tinkering help sustain interest in computing for women of color to engage in computing at the post-secondary level. Second, post-secondary computing climates remain hostile places for women, and in particular, for women of color. Thirdly, women employ a combination of different strategies to navigate these post-secondary computing cultures. Some women internalized existing dominant cultures of computing programs. Others chose exclusively online programs in computing to avoid negative interactions based on assumptions about their identity categories. Some women chose to forge their own pathways through computing to help diversify the culture via teaching, creating their own businesses, and through social programs.
ContributorsRatnabalasuriar, Sheruni (Author) / Romero, Mary (Thesis advisor) / Margolis, Eric (Committee member) / Lim, Merlyna (Committee member) / Arizona State University (Publisher)
Created2012
131525-Thumbnail Image.png
Description
The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark

The original version of Helix, the one I pitched when first deciding to make a video game
for my thesis, is an action-platformer, with the intent of metroidvania-style progression
and an interconnected world map.

The current version of Helix is a turn based role-playing game, with the intent of roguelike
gameplay and a dark fantasy theme. We will first be exploring the challenges that came
with programming my own game - not quite from scratch, but also without a prebuilt
engine - then transition into game design and how Helix has evolved from its original form
to what we see today.
ContributorsDiscipulo, Isaiah K (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131529-Thumbnail Image.png
Description
RecyclePlus is an iOS mobile application that allows users to be knowledgeable in the realms of sustainability. It gives encourages users to be environmental responsible by providing them access to recycling information. In particular, it allows users to search up certain materials and learn about its recyclability and how to

RecyclePlus is an iOS mobile application that allows users to be knowledgeable in the realms of sustainability. It gives encourages users to be environmental responsible by providing them access to recycling information. In particular, it allows users to search up certain materials and learn about its recyclability and how to properly dispose of the material. Some searches will show locations of facilities near users that collect certain materials and dispose of the materials properly. This is a full stack software project that explores open source software and APIs, UI/UX design, and iOS development.
ContributorsTran, Nikki (Author) / Ganesh, Tirupalavanam (Thesis director) / Meuth, Ryan (Committee member) / Watts College of Public Service & Community Solut (Contributor) / Department of Information Systems (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
134157-Thumbnail Image.png
Description
This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of

This paper details the specification and implementation of a single-machine blockchain simulator. It also includes a brief introduction on the history & underlying concepts of blockchain, with explanations on features such as decentralization, openness, trustlessness, and consensus. The introduction features a brief overview of public interest and current implementations of blockchain before stating potential use cases for blockchain simulation software. The paper then gives a brief literature review of blockchain's role, both as a disruptive technology and a foundational technology. The literature review also addresses the potential and difficulties regarding the use of blockchain in Internet of Things (IoT) networks, and also describes the limitations of blockchain in general regarding computational intensity, storage capacity, and network architecture. Next, the paper gives the specification for a generic blockchain structure, with summaries on the behaviors and purposes of transactions, blocks, nodes, miners, public & private key cryptography, signature validation, and hashing. Finally, the author gives an overview of their specific implementation of the blockchain using C/C++ and OpenSSL. The overview includes a brief description of all the classes and data structures involved in the implementation, including their function and behavior. While the implementation meets the requirements set forward in the specification, the results are more qualitative and intuitive, as time constraints did not allow for quantitative measurements of the network simulation. The paper concludes by discussing potential applications for the simulator, and the possibility for future hardware implementations of blockchain.
ContributorsRauschenbach, Timothy Rex (Author) / Vrudhula, Sarma (Thesis director) / Nakamura, Mutsumi (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
134286-Thumbnail Image.png
Description
Many researchers aspire to create robotics systems that assist humans in common office tasks, especially by taking over delivery and messaging tasks. For meaningful interactions to take place, a mobile robot must be able to identify the humans it interacts with and communicate successfully with them. It must also be

Many researchers aspire to create robotics systems that assist humans in common office tasks, especially by taking over delivery and messaging tasks. For meaningful interactions to take place, a mobile robot must be able to identify the humans it interacts with and communicate successfully with them. It must also be able to successfully navigate the office environment. While mobile robots are well suited for navigating and interacting with elements inside a deterministic office environment, attempting to interact with human beings in an office environment remains a challenge due to the limits on the amount of cost-efficient compute power onboard the robot. In this work, I propose the use of remote cloud services to offload intensive interaction tasks. I detail the interactions required in an office environment and discuss the challenges faced when implementing a human-robot interaction platform in a stochastic office environment. I also experiment with cloud services for facial recognition, speech recognition, and environment navigation and discuss my results. As part of my thesis, I have implemented a human-robot interaction system utilizing cloud APIs into a mobile robot, enabling it to navigate the office environment, identify humans within the environment, and communicate with these humans.
Created2017-05
134293-Thumbnail Image.png
Description
Lie detection is used prominently in contemporary society for many purposes such as for pre-employment screenings, granting security clearances, and determining if criminals or potential subjects may or may not be lying, but by no means is not limited to that scope. However, lie detection has been criticized for being

Lie detection is used prominently in contemporary society for many purposes such as for pre-employment screenings, granting security clearances, and determining if criminals or potential subjects may or may not be lying, but by no means is not limited to that scope. However, lie detection has been criticized for being subjective, unreliable, inaccurate, and susceptible to deliberate manipulation. Furthermore, critics also believe that the administrator of the test also influences the outcome as well. As a result, the polygraph machine, the contemporary device used for lie detection, has come under scrutiny when used as evidence in the courts. The purpose of this study is to use three entirely different tools and concepts to determine whether eye tracking systems, electroencephalogram (EEG), and Facial Expression Emotion Analysis (FACET) are reliable tools for lie detection. This study found that certain constructs such as where the left eye is looking at in regard to its usual position and engagement levels in eye tracking and EEG respectively could distinguish between truths and lies. However, the FACET proved the most reliable tool out of the three by providing not just one distinguishing variable but seven, all related to emotions derived from movements in the facial muscles during the present study. The emotions associated with the FACET that were documented to possess the ability to distinguish between truthful and lying responses were joy, anger, fear, confusion, and frustration. In addition, an overall measure of the subject's neutral and positive emotional expression were found to be distinctive factors. The implications of this study and future directions are discussed.
ContributorsSeto, Raymond Hua (Author) / Atkinson, Robert (Thesis director) / Runger, George (Committee member) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134294-Thumbnail Image.png
Description
Global violent conflict has become an increasing problem in recent decades, especially in the African continent. Civil wars, terrorism, riots, and political violence has wrought havoc not only on civilian lives, but also on economic foundations. Trade networks are a way to measure these economic foundations. To summarize trade networks

Global violent conflict has become an increasing problem in recent decades, especially in the African continent. Civil wars, terrorism, riots, and political violence has wrought havoc not only on civilian lives, but also on economic foundations. Trade networks are a way to measure these economic foundations. To summarize trade networks clustering coefficient as well as trade quantity/value summation measures are used. To understand effects of global trade on violent conflict, Pearson product-moment correlations are utilized. This work details a comparison of African national economies and violent conflict events using clustering coefficient, trade summation measures and Pearson correlation coefficient.
ContributorsKadambi, Sagarika Sanjay (Author) / Maciejewski, Ross (Thesis director) / Shutters, Shade (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
135660-Thumbnail Image.png
Description
This paper presents work that was done to create a system capable of facial expression recognition (FER) using deep convolutional neural networks (CNNs) and test multiple configurations and methods. CNNs are able to extract powerful information about an image using multiple layers of generic feature detectors. The extracted information can

This paper presents work that was done to create a system capable of facial expression recognition (FER) using deep convolutional neural networks (CNNs) and test multiple configurations and methods. CNNs are able to extract powerful information about an image using multiple layers of generic feature detectors. The extracted information can be used to understand the image better through recognizing different features present within the image. Deep CNNs, however, require training sets that can be larger than a million pictures in order to fine tune their feature detectors. For the case of facial expression datasets, none of these large datasets are available. Due to this limited availability of data required to train a new CNN, the idea of using naïve domain adaptation is explored. Instead of creating and using a new CNN trained specifically to extract features related to FER, a previously trained CNN originally trained for another computer vision task is used. Work for this research involved creating a system that can run a CNN, can extract feature vectors from the CNN, and can classify these extracted features. Once this system was built, different aspects of the system were tested and tuned. These aspects include the pre-trained CNN that was used, the layer from which features were extracted, normalization used on input images, and training data for the classifier. Once properly tuned, the created system returned results more accurate than previous attempts on facial expression recognition. Based on these positive results, naïve domain adaptation is shown to successfully leverage advantages of deep CNNs for facial expression recognition.
ContributorsEusebio, Jose Miguel Ang (Author) / Panchanathan, Sethuraman (Thesis director) / McDaniel, Troy (Committee member) / Venkateswara, Hemanth (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
Description
Only in the world of acting can an individual be denied a job simply on the basis of their appearance, and in my thesis, I sought to explore alternatives to this through the concept of nontraditional casting and casting against "type", which included the presentation of a full-length production of

Only in the world of acting can an individual be denied a job simply on the basis of their appearance, and in my thesis, I sought to explore alternatives to this through the concept of nontraditional casting and casting against "type", which included the presentation of a full-length production of the musical "Once on this Island" which I attempted to cast based on vocal quality and skill alone rather than taking physical characteristics into account. I researched the history and implementation of nontraditional casting, both in regards to race and other factors such as gender, socio-economic status, and disability. I also considered the legal and intellectual property challenges that nontraditional casting can pose. I concluded from this research that while nontraditional casting is only one solution to the problem, it still has a great deal of potential to create diversity in theater. For my own show, I held the initial auditions via audio recording, though the callback auditions were held in person so that I and my crew could appraise dance and acting ability. Though there were many challenges with our cast after this initial round of auditions, we were able to solidify our cast and continue through the rehearsal process. All things said, the show was very successful. It is my hope that those who were a part of the show, either as part of the production or the audience, are inspired to challenge the concept of typecasting in contemporary theater.
ContributorsBriggs, Timothy James (Author) / Yatso, Toby (Thesis director) / Dreyfoos, Dale (Committee member) / Barrett, The Honors College (Contributor) / School of Music (Contributor)
Created2014-12