Matching Items (1,230)
Filtering by

Clear all filters

147812-Thumbnail Image.png
Description

The thesis project merges interdisciplinary research to develop a self-directed creative intervention for immigrant youth, allowing them to make sense of their social and cultural identities. It takes research on self-awareness, multicultural identification, perceived belonging, and bibliotherapy to create a guided journal titled "Unearth," filled with art and writing prompts

The thesis project merges interdisciplinary research to develop a self-directed creative intervention for immigrant youth, allowing them to make sense of their social and cultural identities. It takes research on self-awareness, multicultural identification, perceived belonging, and bibliotherapy to create a guided journal titled "Unearth," filled with art and writing prompts that are age-appropriate for adolescents and that serve as avenues for self-exploration. The project ultimately engages a focus group discussion to understand the usability and accessibility of the intervention.

ContributorsDizon, Arni Elyz (Co-author) / Nawrocki, Andie (Co-author) / Pina, Armando (Thesis director) / Benoit, Renee (Committee member) / Causadias, Jose (Committee member) / Department of Psychology (Contributor) / School of Social Transformation (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Robots are often used in long-duration scenarios, such as on the surface of Mars,where they may need to adapt to environmental changes. Typically, robots have been built specifically for single tasks, such as moving boxes in a warehouse

Robots are often used in long-duration scenarios, such as on the surface of Mars,where they may need to adapt to environmental changes. Typically, robots have been built specifically for single tasks, such as moving boxes in a warehouse or surveying construction sites. However, there is a modern trend away from human hand-engineering and toward robot learning. To this end, the ideal robot is not engineered,but automatically designed for a specific task. This thesis focuses on robots which learn path-planning algorithms for specific environments. Learning is accomplished via genetic programming. Path-planners are represented as Python code, which is optimized via Pareto evolution. These planners are encouraged to explore curiously and efficiently. This research asks the questions: “How can robots exhibit life-long learning where they adapt to changing environments in a robust way?”, and “How can robots learn to be curious?”.

ContributorsSaldyt, Lucas P (Author) / Ben Amor, Heni (Thesis director) / Pavlic, Theodore (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148059-Thumbnail Image.png
Description

Generating an astounding $110.7 billion annually in domestic revenue alone [1], the world of accounting is one deceptively lacking automation of its most business-critical processes. While accounting tools do exist for the common person, especially when it is time to pay their taxes, such innovations scarcely exist for many larger

Generating an astounding $110.7 billion annually in domestic revenue alone [1], the world of accounting is one deceptively lacking automation of its most business-critical processes. While accounting tools do exist for the common person, especially when it is time to pay their taxes, such innovations scarcely exist for many larger industrial tasks. Exceedingly common business events, such as Business Combinations, are surprisingly manual tasks despite their $1.1 trillion valuation in 2020 [2]. This work presents the twin accounting solutions TurboGAAP and TurboIFRS: an unprecedented leap into these murky waters in an attempt to automate and streamline these gigantic accounting tasks once entrusted only to teams of experienced accountants.
A first-to-market approach to a trillion-dollar problem, TurboGAAP and TurboIFRS are the answers for years of demands from the accounting sector that established corporations have never solved.

ContributorsPreston, Michael Ernest (Co-author) / Capuano, Bailey (Co-author) / Kuhler, Madison (Co-author) / Chen, Yinong (Thesis director) / Hunt, Neil (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148075-Thumbnail Image.png
Description

University Devils is a Founders Lab Thesis group looking to find a way for post-secondary institutions to increase the number of and diversity of incoming applications through the utilization of gaming and gaming approaches in the recruitment process while staying low-cost. This propelling question guided the group through their work.

University Devils is a Founders Lab Thesis group looking to find a way for post-secondary institutions to increase the number of and diversity of incoming applications through the utilization of gaming and gaming approaches in the recruitment process while staying low-cost. This propelling question guided the group through their work. The team’s work primarily focused on recruitment efforts at Arizona State University, but the concept can be modified and applied at other post-secondary institutions. The initial research showed that Arizona State University’s recruitment focused on visiting the high schools of prospective students and providing campus tours to interested students. A proposed alternative solution to aid in recruitment efforts through the utilization of gaming was to create an online multiplayer game that prospective students could play from their own homes. The basic premise of the game is that one player is selected to be “the Professor” while the other players are part of “the Students.” To complete the game, the Students must complete a set of tasks while the Professor applies various obstacles to prevent the Students from winning. When a Student completes their objectives, they win and the game ends. The game was created using Unity. The group has completed a proof-of-concept of the proposed game and worked to advertise and market the game to students via social media. The team’s efforts have gained traction, and the group continues to work to gain traction and bring the idea to more prospective students.

ContributorsDong, Edmund Engsun (Co-author) / Ouellette, Abigail (Co-author) / Cole, Tyler (Co-author) / Byrne, Jared (Thesis director) / Pierce, John (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148081-Thumbnail Image.png
Description

This work describes the fundamentals of quantum mechanics in relation to quantum computing, as well as the architecture of quantum computing.

ContributorsDemaria, Rachel Emily (Author) / Foy, Joseph (Thesis director) / Hines, Taylor (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148091-Thumbnail Image.png
Description

The Electoral College, the current electoral system in the U.S., operates on a Winner-Take-All or First Past the Post (FPTP) principle, where the candidate with the most votes wins. Despite the Electoral College being the current system, it is problematic. According to Lani Guinier in Tyranny of the Majority, “the

The Electoral College, the current electoral system in the U.S., operates on a Winner-Take-All or First Past the Post (FPTP) principle, where the candidate with the most votes wins. Despite the Electoral College being the current system, it is problematic. According to Lani Guinier in Tyranny of the Majority, “the winner-take-all principle invariably wastes some votes” (121). This means that the majority group gets all of the power in an election while the votes of the minority groups are completely wasted and hold little to no significance. Additionally, FPTP systems reinforce a two-party system in which neither candidate could satisfy the majority of the electorate’s needs and issues, yet forces them to choose between the two dominant parties. Moreover, voting for a third party candidate only hurts the voter since it takes votes away from the party they might otherwise support and gives the victory to the party they prefer the least, ensuring that the two party system is inescapable. Therefore, a winner-take-all system does not provide the electorate with fair or proportional representation and creates voter disenfranchisement: it offers them very few choices that appeal to their needs and forces them to choose a candidate they dislike. There are, however, alternative voting systems that remedy these issues, such as a Ranked voting system, in which voters can rank their candidate choices in the order they prefer them, or a Proportional voting system, in which a political party acquires a number of seats based on the proportion of votes they receive from the voter base. Given these alternatives, we will implement a software simulation of one of these systems to demonstrate how they work in contrast to FPTP systems, and therefore provide evidence of how these alternative systems could work in practice and in place of the current electoral system.

ContributorsMartin, Autumn Nichole (Co-author) / Summers, Jack (Co-author) / Burger, Kevin (Thesis director) / Voorhees, Matthew (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147884-Thumbnail Image.png
Description

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.

ContributorsInjejikian, Angelica (Author) / Gonzalez-Sanchez, Javier (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147891-Thumbnail Image.png
Description

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.

ContributorsLarson, Kent Merle (Author) / Bazzi, Rida (Thesis director) / Shoshitaishvili, Yan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147898-Thumbnail Image.png
Description

The basis of social power which has expanded in the most dangerous way over the last few decades has been that of information control, and how that control is used. Misinformation and the intentional spread of misinformation referred to as disinformation, has become commonplace among various bodies of power to

The basis of social power which has expanded in the most dangerous way over the last few decades has been that of information control, and how that control is used. Misinformation and the intentional spread of misinformation referred to as disinformation, has become commonplace among various bodies of power to either expand their own influence or diminish opposing influence. The methods of disinformation utilized in the various spheres of politics, the commercial marketplace, and the media today are explored in depth to better contextualize and describe the problems that disinformation and its use pose in the world today.

ContributorsDoyle, Brenden C (Author) / Sturgess, Jessica (Thesis director) / Walker, Shawn (Committee member) / College of Health Solutions (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147926-Thumbnail Image.png
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsLobo, Ian (Co-author) / Koleber, Keith (Co-author) / Markabawi, Jah (Co-author) / Masud, Abdullah (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05