Matching Items (984)
153404-Thumbnail Image.png
Description
Splicing of digital images is a powerful form of tampering which transports regions of an image to create a composite image. When used as an artistic tool, this practice is harmless but when these composite images can be used to create political associations or are submitted as evidence in the

Splicing of digital images is a powerful form of tampering which transports regions of an image to create a composite image. When used as an artistic tool, this practice is harmless but when these composite images can be used to create political associations or are submitted as evidence in the judicial system they become more impactful. In these cases, distinction between an authentic image and a tampered image can become important.

Many proposed approaches to image splicing detection follow the model of extracting features from an authentic and tampered dataset and then classifying them using machine learning with the goal of optimizing classification accuracy. This thesis approaches splicing detection from a slightly different perspective by choosing a modern splicing detection framework and examining a variety of preprocessing techniques along with their effect on classification accuracy. Preprocessing techniques explored include Joint Picture Experts Group (JPEG) file type block line blurring, image level blurring, and image level sharpening. Attention is also paid to preprocessing images adaptively based on the amount of higher frequency content they contain.

This thesis also recognizes an identified problem with using a popular tampering evaluation dataset where a mismatch in the number of JPEG processing iterations between the authentic and tampered set creates an unfair statistical bias, leading to higher detection rates. Many modern approaches do not acknowledge this issue but this thesis applies a quality factor equalization technique to reduce this bias. Additionally, this thesis artificially inserts a mismatch in JPEG processing iterations by varying amounts to determine its effect on detection rates.
ContributorsGubrud, Aaron (Author) / Li, Baoxin (Thesis advisor) / Candan, Kasim (Committee member) / Kadi, Zafer (Committee member) / Arizona State University (Publisher)
Created2015
134154-Thumbnail Image.png
Description
The need for automated / computational fact checking has grown substantially in recent times due to the high volume of false information and limited workforce of human fact checkers. This need has spawned research and new developments in this field and has created many different systems and approaches to this

The need for automated / computational fact checking has grown substantially in recent times due to the high volume of false information and limited workforce of human fact checkers. This need has spawned research and new developments in this field and has created many different systems and approaches to this complex problem. This paper attempts to not just explain the most popular methods that are currently being used, but provide experimental results of the comparison of two different systems, the replication of results from their respective papers, and an annotated data-set of different test sentences to be used in these systems.
ContributorsRosenkilde, Trevor Curtis (Author) / Papotti, Paolo (Thesis director) / Candan, Kasim (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
133588-Thumbnail Image.png
Description
With the new independence of adulthood, college students are a group susceptible to adopting unsupported, if not harmful, health practices. A survey of Arizona State University undergraduate students (N=200) was conducted to evaluate supplement use, trust in information sources, and beliefs about supplement regulation. Of those who reported using supplements,

With the new independence of adulthood, college students are a group susceptible to adopting unsupported, if not harmful, health practices. A survey of Arizona State University undergraduate students (N=200) was conducted to evaluate supplement use, trust in information sources, and beliefs about supplement regulation. Of those who reported using supplements, college students most frequently received information from friends and family. STEM majors in fields unrelated to health who were taking a supplement were found to be less likely to receive information about the supplement from a medical practitioner than those in health fields or those in non-STEM majors (-26.9%, p=0.018). STEM majors in health-related fields were 15.0% more likely to treat colds and/or cold symptoms with research-supported methods identified from reliable sources, while non-health STEM and non-STEM majors were more likely to take unsupported cold treatments (p=0.010). Surveyed students, regardless of major, also stated they would trust a medical practitioner for supplement advice above other sources (88.0%), and the majority expressed a belief that dietary supplements are approved/regulated by the government (59.8%).
ContributorsPerez, Jacob Tanner (Author) / Hendrickson, Kirstin (Thesis director) / Lefler, Scott (Committee member) / College of Liberal Arts and Sciences (Contributor) / School of Molecular Sciences (Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
137433-Thumbnail Image.png
ContributorsChandler, N. Kayla (Author) / Neisewander, Janet (Thesis director) / Sanabria, Federico (Committee member) / Olive, M. Foster (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137434-Thumbnail Image.png
Description
I propose that norms regulate behaviors that negatively impact an individual's survival and reproduction. But because monitoring and enforcing of norms can be costly, individuals should be selective about which norms they police and under what circumstances they should do so. Two studies tested this idea by experimentally activating fitness-relevant

I propose that norms regulate behaviors that negatively impact an individual's survival and reproduction. But because monitoring and enforcing of norms can be costly, individuals should be selective about which norms they police and under what circumstances they should do so. Two studies tested this idea by experimentally activating fitness-relevant motives and having participants answer questions about the policing of norms. The first study examined a norm prescribing respect for status and another proscribing sexual coercion. Results from Study 1 failed to support the hypotheses; activating a status-seeking motive did not have the predicted effects on policing of the respect-status norm nor did activating a mating motive have the predicted effects on policing of the respect-status norm or anti-coercion norm. Study 2 examined two new norms, one prescribing that people stay home when sick and the other proscribing people from having sex with another person's partners. Study 2 also manipulated whether self or others were the target of the policing. Study 2 failed to provide support; a disease avoidance motive failed to have effects on policing of the stay home when sick norm. Individuals in a relationship under a mating motive wanted less policing of others for violation of the mate poaching norm than those in a baseline condition, opposite of the predicted effects.
ContributorsSmith, M. Kristopher (Author) / Neuberg, L. Steven (Thesis director) / Presson, Clark (Committee member) / Hruschka, J. Daniel (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137565-Thumbnail Image.png
Description
Literature in public administration emphasizes a growing dissatisfaction with government on the part of residents. Where there tends to be a lack in the literature is in terms of solutions to this problem. We would like to argue that the engagement process itself has the power to foster a profound

Literature in public administration emphasizes a growing dissatisfaction with government on the part of residents. Where there tends to be a lack in the literature is in terms of solutions to this problem. We would like to argue that the engagement process itself has the power to foster a profound attitudinal shift on the part of both residents and government. This paper explores the structural and cultural barriers to satisfactory public engagement both from literature and a combination of policy analysis, semi-structured interviews and participatory observation within the City of Tempe. We then provide recommendations to the City of Tempe on how to overcome these barriers and effect authentic public engagement practices. With these new suggested practices and mindsets, we provide a way that people can have the power to create their own community.
ContributorsRiffle, Morgan (Co-author) / Tchida, Celina (Co-author) / Ingram-Waters, Mary (Thesis director) / Grzanka, Patrick (Committee member) / King, Cheryl (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor)
Created2013-05
137451-Thumbnail Image.png
Description
This thesis examines the relationship between unofficial, official, and parallel Islam in Uzbekistan following the end of the Soviet Union. Key touchstone moments in Uzbekistan during the twentieth-century show the history between unofficial and official Islam and the resulting precedents set for Muslims gathering against the government. This historical analysis

This thesis examines the relationship between unofficial, official, and parallel Islam in Uzbekistan following the end of the Soviet Union. Key touchstone moments in Uzbekistan during the twentieth-century show the history between unofficial and official Islam and the resulting precedents set for Muslims gathering against the government. This historical analysis shows how President Karimov and the Uzbek government view and approach Islam in the country following independence.
ContributorsTieslink, Evan (Author) / Batalden, Stephen (Thesis director) / Kefeli, Agnes (Committee member) / Saikia, Yasmin (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor) / School of Politics and Global Studies (Contributor) / School of Historical, Philosophical and Religious Studies (Contributor)
Created2013-05
137145-Thumbnail Image.png
Description
Through this creative project, I executed a Distracted Driving Awareness Campaign at Arizona State University to raise awareness about the dangers of distracted driving, specifically texting while driving. As an Undergraduate Student Government Senator, my priority is the safety and success of students, both in and out of the classroom.

Through this creative project, I executed a Distracted Driving Awareness Campaign at Arizona State University to raise awareness about the dangers of distracted driving, specifically texting while driving. As an Undergraduate Student Government Senator, my priority is the safety and success of students, both in and out of the classroom. By partnering with State Farm and AT&T, we were able to raise awareness about the dangers of distracted driving and collected over 200 pledges from students to never text and drive.
ContributorsHibbs, Jordan Ashley (Author) / Miller, Clark (Thesis director) / Parmentier, Mary Jane (Committee member) / Barrett, The Honors College (Contributor) / College of Liberal Arts and Sciences (Contributor) / School of Politics and Global Studies (Contributor) / Department of Psychology (Contributor) / Graduate College (Contributor)
Created2014-05
135146-Thumbnail Image.png
Description
Teen dating violence is a significant problem in the U.S., with approximately 1 out of 3 teens experiencing some form of dating violence. BLOOM is a not-for-profit organization created by Donna Bartos. BLOOM's educators enter high schools in Arizona and present their educational program on dating abuse prevention. BLOOM's primary

Teen dating violence is a significant problem in the U.S., with approximately 1 out of 3 teens experiencing some form of dating violence. BLOOM is a not-for-profit organization created by Donna Bartos. BLOOM's educators enter high schools in Arizona and present their educational program on dating abuse prevention. BLOOM's primary goal is to educate teens on how to prevent teen dating violence and empower them with the skills leading to healthy relationships. After participants complete their educational program, a feedback card is filled out with an open-response section. This project focused on the open response section to analyze feedback cards through a process of code development, coding, and tallying. Information provided by this project could assist BLOOM in re-evaluating their curriculum, appealing to future investors, and growing their program to reach more students. With a coding system in place, BLOOM will also be able to better assess the impact they have on the participants of their program.
ContributorsHarmon, Ashley Nicole (Author) / Bodman, Denise (Thesis director) / Dumka, Larry (Committee member) / T. Denny Sanford School of Social and Family Dynamics (Contributor) / College of Liberal Arts and Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
153583-Thumbnail Image.png
Description
When scientific software is written to specify processes, it takes the form of a workflow, and is often written in an ad-hoc manner in a dynamic programming language. There is a proliferation of legacy workflows implemented by non-expert programmers due to the accessibility of dynamic languages. Unfortunately, ad-hoc workflows lack

When scientific software is written to specify processes, it takes the form of a workflow, and is often written in an ad-hoc manner in a dynamic programming language. There is a proliferation of legacy workflows implemented by non-expert programmers due to the accessibility of dynamic languages. Unfortunately, ad-hoc workflows lack a structured description as provided by specialized management systems, making ad-hoc workflow maintenance and reuse difficult, and motivating the need for analysis methods. The analysis of ad-hoc workflows using compiler techniques does not address dynamic languages - a program has so few constrains that its behavior cannot be predicted. In contrast, workflow provenance tracking has had success using run-time techniques to record data. The aim of this work is to develop a new analysis method for extracting workflow structure at run-time, thus avoiding issues with dynamics.

The method captures the dataflow of an ad-hoc workflow through its execution and abstracts it with a process for simplifying repetition. An instrumentation system first processes the workflow to produce an instrumented version, capable of logging events, which is then executed on an input to produce a trace. The trace undergoes dataflow construction to produce a provenance graph. The dataflow is examined for equivalent regions, which are collected into a single unit. The workflow is thus characterized in terms of its treatment of an input. Unlike other methods, a run-time approach characterizes the workflow's actual behavior; including elements which static analysis cannot predict (for example, code dynamically evaluated based on input parameters). This also enables the characterization of dataflow through external tools.

The contributions of this work are: a run-time method for recording a provenance graph from an ad-hoc Python workflow, and a method to analyze the structure of a workflow from provenance. Methods are implemented in Python and are demonstrated on real world Python workflows. These contributions enable users to derive graph structure from workflows. Empowered by a graphical view, users can better understand a legacy workflow. This makes the wealth of legacy ad-hoc workflows accessible, enabling workflow reuse instead of investing time and resources into creating a workflow.
ContributorsAcűna, Ruben (Author) / Bazzi, Rida (Thesis advisor) / Lacroix, Zoé (Thesis advisor) / Candan, Kasim (Committee member) / Arizona State University (Publisher)
Created2015