Matching Items (199)
147887-Thumbnail Image.png
Description

For my thesis/creative project, I created a prototype for a mental health app. Each section of the prototype has a purpose of instilling mindfulness and healthy habits that can promote and lead to sustainable mental health. Throughout the paper I explain my reasoning for starting this project, the science of

For my thesis/creative project, I created a prototype for a mental health app. Each section of the prototype has a purpose of instilling mindfulness and healthy habits that can promote and lead to sustainable mental health. Throughout the paper I explain my reasoning for starting this project, the science of mindfulness and how it can bring about positive mental and physical changes, and the design theory behind the prototype.

ContributorsZaja, Peter (Author) / Sopha, Matthew (Thesis director) / Arrfelt, Mathias (Committee member) / Department of Finance (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148237-Thumbnail Image.png
Description

Creation of a database and Python API to clean, organize, and streamline data collection from an updated Qualtrics survey used to capture applicant information for the Fleischer Scholars Program run by the W. P. Carey UG Admissions Office.

ContributorsGordon, Nicolas A (Co-author) / Moreno, Luciano (Co-author) / Sopha, Matthew (Thesis director) / Moser, Kathleen (Committee member) / Department of Supply Chain Management (Contributor) / Department of Information Systems (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
149953-Thumbnail Image.png
Description
The theme for this work is the development of fast numerical algorithms for sparse optimization as well as their applications in medical imaging and source localization using sensor array processing. Due to the recently proposed theory of Compressive Sensing (CS), the $\ell_1$ minimization problem attracts more attention for its ability

The theme for this work is the development of fast numerical algorithms for sparse optimization as well as their applications in medical imaging and source localization using sensor array processing. Due to the recently proposed theory of Compressive Sensing (CS), the $\ell_1$ minimization problem attracts more attention for its ability to exploit sparsity. Traditional interior point methods encounter difficulties in computation for solving the CS applications. In the first part of this work, a fast algorithm based on the augmented Lagrangian method for solving the large-scale TV-$\ell_1$ regularized inverse problem is proposed. Specifically, by taking advantage of the separable structure, the original problem can be approximated via the sum of a series of simple functions with closed form solutions. A preconditioner for solving the block Toeplitz with Toeplitz block (BTTB) linear system is proposed to accelerate the computation. An in-depth discussion on the rate of convergence and the optimal parameter selection criteria is given. Numerical experiments are used to test the performance and the robustness of the proposed algorithm to a wide range of parameter values. Applications of the algorithm in magnetic resonance (MR) imaging and a comparison with other existing methods are included. The second part of this work is the application of the TV-$\ell_1$ model in source localization using sensor arrays. The array output is reformulated into a sparse waveform via an over-complete basis and study the $\ell_p$-norm properties in detecting the sparsity. An algorithm is proposed for minimizing a non-convex problem. According to the results of numerical experiments, the proposed algorithm with the aid of the $\ell_p$-norm can resolve closely distributed sources with higher accuracy than other existing methods.
ContributorsShen, Wei (Author) / Mittlemann, Hans D (Thesis advisor) / Renaut, Rosemary A. (Committee member) / Jackiewicz, Zdzislaw (Committee member) / Gelb, Anne (Committee member) / Ringhofer, Christian (Committee member) / Arizona State University (Publisher)
Created2011
151948-Thumbnail Image.png
Description
Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor

Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor the SHS installed in their homes remotely. This is typically realized by giving the SHS network access ability. Although the SHS's network access ability brings a lot of conveniences to the home owners, it also makes the SHS facing more security threats than ever before. As a result, when designing a SHS, the security threats it might face should be given careful considerations. System security threats can be solved properly by understanding them and knowing the parts in the system that should be protected against them first. This leads to the idea of solving the security threats a SHS might face from the requirements engineering level. Following this idea, this paper proposes a systematic approach to generate the security requirements specifications for the SHS. It can be viewed as the first step toward the complete SHS security requirements engineering process.
ContributorsXu, Rongcao (Author) / Ghazarian, Arbi (Thesis advisor) / Bansal, Ajay (Committee member) / Lindquist, Timothy (Committee member) / Arizona State University (Publisher)
Created2013
151950-Thumbnail Image.png
Description
Social media offers a powerful platform for the independent digital content producer community to develop, disperse, and maintain their brands. In terms of information systems research, the broad majority of the work has not examined hedonic consumption on Social Media Sites (SMS). The focus has mostly been on the organizational

Social media offers a powerful platform for the independent digital content producer community to develop, disperse, and maintain their brands. In terms of information systems research, the broad majority of the work has not examined hedonic consumption on Social Media Sites (SMS). The focus has mostly been on the organizational perspectives and utilitarian gains from these services. Unlike through traditional commerce channels, including e-commerce retailers, consumption enhancing hedonic utility is experienced differently in the context of a social media site; consequently, the dynamic of the decision-making process shifts when it is made in a social context. Previous research assumed a limited influence of a small, immediate group of peers. But the rules change when the network of peers expands exponentially. The assertion is that, while there are individual differences in the level of susceptibility to influence coming from others, these are not the most important pieces of the analysis--unlike research centered completely on influence. Rather, the context of the consumption can play an important role in the way social influence factors affect consumer behavior on Social Media Sites. Over the course of three studies, this dissertation will examine factors that influence consumer decision-making and the brand personalities created and interpreted in these SMS. Study one examines the role of different types of peer influence on consumer decision-making on Facebook. Study two observes the impact of different types of producer message posts with the different types of influence on decision-making on Twitter. Study three will conclude this work with an exploratory empirical investigation of actual twitter postings of a set of musicians. These studies contribute to the body of IS literature by evaluating the specific behavioral changes related to consumption in the context of digital social media: (a) the power of social influencers in contrast to personal preferences on SMS, (b) the effect on consumers of producer message types and content on SMS at both the profile level and the individual message level.
ContributorsSopha, Matthew (Author) / Santanam, Raghu T (Thesis advisor) / Goul, Kenneth M (Committee member) / Gu, Bin (Committee member) / Arizona State University (Publisher)
Created2013
150509-Thumbnail Image.png
Description
Gathering and managing software requirements, known as Requirement Engineering (RE), is a significant and basic step during the Software Development Life Cycle (SDLC). Any error or defect during the RE step will propagate to further steps of SDLC and resolving it will be more costly than any defect in other

Gathering and managing software requirements, known as Requirement Engineering (RE), is a significant and basic step during the Software Development Life Cycle (SDLC). Any error or defect during the RE step will propagate to further steps of SDLC and resolving it will be more costly than any defect in other steps. In order to produce better quality software, the requirements have to be free of any defects. Verification and Validation (V&V;) of requirements are performed to improve their quality, by performing the V&V; process on the Software Requirement Specification (SRS) document. V&V; of the software requirements focused to a specific domain helps in improving quality. A large database of software requirements from software projects of different domains is created. Software requirements from commercial applications are focus of this project; other domains embedded, mobile, E-commerce, etc. can be the focus of future efforts. The V&V; is done to inspect the requirements and improve the quality. Inspections are done to detect defects in the requirements and three approaches for inspection of software requirements are discussed; ad-hoc techniques, checklists, and scenario-based techniques. A more systematic domain-specific technique is presented for performing V&V; of requirements.
ContributorsChughtai, Rehman (Author) / Ghazarian, Arbi (Thesis advisor) / Bansal, Ajay (Committee member) / Millard, Bruce (Committee member) / Arizona State University (Publisher)
Created2012
148408-Thumbnail Image.png
Description

User privacy in the current society is at risk. This project will emphasize the importance of calling attention to data privacy issues in regard to companies selling user data.

ContributorsBerg, Dylan Robert (Author) / Sopha, Matthew (Thesis director) / Jordan, Erin (Committee member) / Department of Information Systems (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148461-Thumbnail Image.png
Description

Employers perceive students are not qualified to enter the workforce. Students also feel unprepared to enter the workforce, resulting in a perceived skills gap between skills taught in schools and skills demanded by employers. My study examines the actual skills gap between skills taught in five Information Systems programs and

Employers perceive students are not qualified to enter the workforce. Students also feel unprepared to enter the workforce, resulting in a perceived skills gap between skills taught in schools and skills demanded by employers. My study examines the actual skills gap between skills taught in five Information Systems programs and skills demanded by employers in nine IT professions. In the scope of my analysis, I provide a discussion of my project methodology, answers for my research questions used to complete the gap analysis, and grounded recommendations to Information Systems programs on how to close the skills gap. Lastly, I also include future considerations that researchers may utilize to study my topic in greater detail. Students and schools can both use my analysis to improve their respective weaknesses and capitalize on their strengths in terms of hard skills required for the workforce.

ContributorsShourie, Varun (Author) / Sopha, Matthew (Thesis director) / Ahmad, Altaf (Committee member) / Department of Information Systems (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
136283-Thumbnail Image.png
Description
This undergraduate thesis explores the efficacy of developing a translator generator in the Prolog programming language using Lexical Functional Grammars. A bidirectional machine translator between English and Hungarian, developed as a proof-of-concept case study, is discussed and assessed. The benefits and drawbacks of this approach as generalized to Machine Translation

This undergraduate thesis explores the efficacy of developing a translator generator in the Prolog programming language using Lexical Functional Grammars. A bidirectional machine translator between English and Hungarian, developed as a proof-of-concept case study, is discussed and assessed. The benefits and drawbacks of this approach as generalized to Machine Translation systems are also discussed, along with possible areas of future work.
ContributorsLane, Ryan Andrew (Author) / Bansal, Ajay (Thesis director) / Bansal, Srividya (Committee member) / Barrett, The Honors College (Contributor)
Created2015-05
148420-Thumbnail Image.png
Description

Home advantage affects the game in almost all team sports across the world. Due to<br/>COVID and all of the precautions being taken to keep games played, more extensive research is able to be conducted about what factors truly go into creating a home advantage. Some common factors of home advantage

Home advantage affects the game in almost all team sports across the world. Due to<br/>COVID and all of the precautions being taken to keep games played, more extensive research is able to be conducted about what factors truly go into creating a home advantage. Some common factors of home advantage include the crowd, facility familiarity, and travel. In the English Premier League, there are no fans allowed at any of the games; furthermore, in the NBA, a bubble was created at one neutral venue with no fans in attendance. Even with the NBA being at a neutral site, there was still a “home team” at every game. The sports betting industry struggled due to failing to shift betting lines in accordance with this decreased home advantage. With these leagues removing some of the factors that are frequently associated with home advantage, analysts are able to better see what the results would be of removing these variables. The purpose of this research is to determine if these adjustments made due to COVID had an impact on the home advantage in different leagues around the world, and if they did, to what extent. Individual game data from the past 10 seasons were used for analysis of both the NBA and the Premier League. The results show that there is a significant difference in win percentage between prior seasons and seasons behind closed doors. In addition to win percentage, many other game statistics see a significant shift as well. Overall, the significance of being the home team disappears in games following the COVID-19 break.

ContributorsOsborne, Ashley A (Author) / Sopha, Matthew (Thesis director) / McIntosh, Daniel (Committee member) / Department of Information Systems (Contributor) / Department of Marketing (Contributor) / WPC Graduate Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05