Matching Items (85)
150234-Thumbnail Image.png
Description
Introductory programming courses, also known as CS1, have a specific set of expected outcomes related to the learning of the most basic and essential computational concepts in computer science (CS). However, two of the most often heard complaints in such courses are that (1) they are divorced from the reality

Introductory programming courses, also known as CS1, have a specific set of expected outcomes related to the learning of the most basic and essential computational concepts in computer science (CS). However, two of the most often heard complaints in such courses are that (1) they are divorced from the reality of application and (2) they make the learning of the basic concepts tedious. The concepts introduced in CS1 courses are highly abstract and not easily comprehensible. In general, the difficulty is intrinsic to the field of computing, often described as "too mathematical or too abstract." This dissertation presents a small-scale mixed method study conducted during the fall 2009 semester of CS1 courses at Arizona State University. This study explored and assessed students' comprehension of three core computational concepts - abstraction, arrays of objects, and inheritance - in both algorithm design and problem solving. Through this investigation students' profiles were categorized based on their scores and based on their mistakes categorized into instances of five computational thinking concepts: abstraction, algorithm, scalability, linguistics, and reasoning. It was shown that even though the notion of computational thinking is not explicit in the curriculum, participants possessed and/or developed this skill through the learning and application of the CS1 core concepts. Furthermore, problem-solving experiences had a direct impact on participants' knowledge skills, explanation skills, and confidence. Implications for teaching CS1 and for future research are also considered.
ContributorsBillionniere, Elodie V (Author) / Collofello, James (Thesis advisor) / Ganesh, Tirupalavanam G. (Thesis advisor) / VanLehn, Kurt (Committee member) / Burleson, Winslow (Committee member) / Arizona State University (Publisher)
Created2011
137617-Thumbnail Image.png
Description
This honors thesis utilizes smart home components and concepts from Dr. Burleson's Game as Life, Life as Game (GaLLaG) systems. The thesis focuses on an automated lifestyle, where individuals utilize technology, such as door sensors, appliance and lamp modules, and system notifications, to assist in daily activities. The findings from

This honors thesis utilizes smart home components and concepts from Dr. Burleson's Game as Life, Life as Game (GaLLaG) systems. The thesis focuses on an automated lifestyle, where individuals utilize technology, such as door sensors, appliance and lamp modules, and system notifications, to assist in daily activities. The findings from our efforts to date indicate that after weeks of observations, there is no evidence that automated lifestyles create more productive and healthy lifestyles and lead to overall satisfaction in life; however, there are certain design principles that would assist future home automation applications.
ContributorsRosales, Justin Bart (Author) / Burleson, Winslow (Thesis director) / Walker, Erin (Committee member) / Hekler, Eric (Committee member) / Civil, Environmental and Sustainable Engineering Programs (Contributor) / Barrett, The Honors College (Contributor)
Created2013-05
151802-Thumbnail Image.png
Description
The complexity of the systems that software engineers build has continuously grown since the inception of the field. What has not changed is the engineers' mental capacity to operate on about seven distinct pieces of information at a time. The widespread use of UML has led to more abstract software

The complexity of the systems that software engineers build has continuously grown since the inception of the field. What has not changed is the engineers' mental capacity to operate on about seven distinct pieces of information at a time. The widespread use of UML has led to more abstract software design activities, however the same cannot be said for reverse engineering activities. The introduction of abstraction to reverse engineering will allow the engineer to move farther away from the details of the system, increasing his ability to see the role that domain level concepts play in the system. In this thesis, we present a technique that facilitates filtering of classes from existing systems at the source level based on their relationship to concepts in the domain via a classification method using machine learning. We showed that concepts can be identified using a machine learning classifier based on source level metrics. We developed an Eclipse plugin to assist with the process of manually classifying Java source code, and collecting metrics and classifications into a standard file format. We developed an Eclipse plugin to act as a concept identifier that visually indicates a class as a domain concept or not. We minimized the size of training sets to ensure a useful approach in practice. This allowed us to determine that a training set of 7:5 to 10% is nearly as effective as a training set representing 50% of the system. We showed that random selection is the most consistent and effective means of selecting a training set. We found that KNN is the most consistent performer among the learning algorithms tested. We determined the optimal feature set for this classification problem. We discussed two possible structures besides a one to one mapping of domain knowledge to implementation. We showed that classes representing more than one concept are simply concepts at differing levels of abstraction. We also discussed composite concepts representing a domain concept implemented by more than one class. We showed that these composite concepts are difficult to detect because the problem is NP-complete.
ContributorsCarey, Maurice (Author) / Colbourn, Charles (Thesis advisor) / Collofello, James (Thesis advisor) / Davulcu, Hasan (Committee member) / Sarjoughian, Hessam S. (Committee member) / Ye, Jieping (Committee member) / Arizona State University (Publisher)
Created2013
151940-Thumbnail Image.png
Description
Biological systems are complex in many dimensions as endless transportation and communication networks all function simultaneously. Our ability to intervene within both healthy and diseased systems is tied directly to our ability to understand and model core functionality. The progress in increasingly accurate and thorough high-throughput measurement technologies has provided

Biological systems are complex in many dimensions as endless transportation and communication networks all function simultaneously. Our ability to intervene within both healthy and diseased systems is tied directly to our ability to understand and model core functionality. The progress in increasingly accurate and thorough high-throughput measurement technologies has provided a deluge of data from which we may attempt to infer a representation of the true genetic regulatory system. A gene regulatory network model, if accurate enough, may allow us to perform hypothesis testing in the form of computational experiments. Of great importance to modeling accuracy is the acknowledgment of biological contexts within the models -- i.e. recognizing the heterogeneous nature of the true biological system and the data it generates. This marriage of engineering, mathematics and computer science with systems biology creates a cycle of progress between computer simulation and lab experimentation, rapidly translating interventions and treatments for patients from the bench to the bedside. This dissertation will first discuss the landscape for modeling the biological system, explore the identification of targets for intervention in Boolean network models of biological interactions, and explore context specificity both in new graphical depictions of models embodying context-specific genomic regulation and in novel analysis approaches designed to reveal embedded contextual information. Overall, the dissertation will explore a spectrum of biological modeling with a goal towards therapeutic intervention, with both formal and informal notions of biological context, in such a way that will enable future work to have an even greater impact in terms of direct patient benefit on an individualized level.
ContributorsVerdicchio, Michael (Author) / Kim, Seungchan (Thesis advisor) / Baral, Chitta (Committee member) / Stolovitzky, Gustavo (Committee member) / Collofello, James (Committee member) / Arizona State University (Publisher)
Created2013
Description
Laboratory automation systems have seen a lot of technological advances in recent times. As a result, the software that is written for them are becoming increasingly sophisticated. Existing software architectures and standards are targeted to a wider domain of software development and need to be customized in order to use

Laboratory automation systems have seen a lot of technological advances in recent times. As a result, the software that is written for them are becoming increasingly sophisticated. Existing software architectures and standards are targeted to a wider domain of software development and need to be customized in order to use them for developing software for laboratory automation systems. This thesis proposes an architecture that is based on existing software architectural paradigms and is specifically tailored to developing software for a laboratory automation system. The architecture is based on fairly autonomous software components that can be distributed across multiple computers. The components in the architecture make use of asynchronous communication methodologies that are facilitated by passing messages between one another. The architecture can be used to develop software that is distributed, responsive and thread-safe. The thesis also proposes a framework that has been developed to implement the ideas proposed by the architecture. The framework is used to develop software that is scalable, distributed, responsive and thread-safe. The framework currently has components to control very commonly used laboratory automation devices such as mechanical stages, cameras, and also to do common laboratory automation functionalities such as imaging.
ContributorsKuppuswamy, Venkataramanan (Author) / Meldrum, Deirdre (Thesis advisor) / Collofello, James (Thesis advisor) / Sarjoughian, Hessam S. (Committee member) / Johnson, Roger (Committee member) / Arizona State University (Publisher)
Created2012
151275-Thumbnail Image.png
Description
The pay-as-you-go economic model of cloud computing increases the visibility, traceability, and verifiability of software costs. Application developers must understand how their software uses resources when running in the cloud in order to stay within budgeted costs and/or produce expected profits. Cloud computing's unique economic model also leads naturally to

The pay-as-you-go economic model of cloud computing increases the visibility, traceability, and verifiability of software costs. Application developers must understand how their software uses resources when running in the cloud in order to stay within budgeted costs and/or produce expected profits. Cloud computing's unique economic model also leads naturally to an earn-as-you-go profit model for many cloud based applications. These applications can benefit from low level analyses for cost optimization and verification. Testing cloud applications to ensure they meet monetary cost objectives has not been well explored in the current literature. When considering revenues and costs for cloud applications, the resource economic model can be scaled down to the transaction level in order to associate source code with costs incurred while running in the cloud. Both static and dynamic analysis techniques can be developed and applied to understand how and where cloud applications incur costs. Such analyses can help optimize (i.e. minimize) costs and verify that they stay within expected tolerances. An adaptation of Worst Case Execution Time (WCET) analysis is presented here to statically determine worst case monetary costs of cloud applications. This analysis is used to produce an algorithm for determining control flow paths within an application that can exceed a given cost threshold. The corresponding results are used to identify path sections that contribute most to cost excess. A hybrid approach for determining cost excesses is also presented that is comprised mostly of dynamic measurements but that also incorporates calculations that are based on the static analysis approach. This approach uses operational profiles to increase the precision and usefulness of the calculations.
ContributorsBuell, Kevin, Ph.D (Author) / Collofello, James (Thesis advisor) / Davulcu, Hasan (Committee member) / Lindquist, Timothy (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2012
Description
The fashion industry dubs couture as high fashion, yet couture never reaches the finish line when it comes to comfort. Most of the brand name high heels on the market are too painful to wear for long periods of time. For this project, I have developed 3D printed high heels

The fashion industry dubs couture as high fashion, yet couture never reaches the finish line when it comes to comfort. Most of the brand name high heels on the market are too painful to wear for long periods of time. For this project, I have developed 3D printed high heels with detachable insoles that will relieve tired feet based on the principle of reflexology. The product integrates traditional flexible insoles with Arduino computing and the result is a functional surface that can ease the pain of the wearer. This paper introduces the product and with it, under-explored opportunities to customize your own high heels at home. Essentially, each consumer will have the ability to personalize and switch out their style without sacrificing comfort. Soon, a consumer will be a designer.
ContributorsNguyen, Nhi N. (Author) / Ingalls, Todd (Thesis director) / Gigantino, Josh (Committee member) / Barrett, The Honors College (Contributor) / Herberger Institute for Design and the Arts (Contributor) / School of Arts, Media and Engineering (Contributor)
Created2015-05
136565-Thumbnail Image.png
Description
Modern technologies have allowed for new ways to tell stories. Specifically, interactive film is a medium that has existed for quite some time, but has never really been a widely used or accepted means of conveying narratives in an engaging and effective way. After reviewing some of the most popular

Modern technologies have allowed for new ways to tell stories. Specifically, interactive film is a medium that has existed for quite some time, but has never really been a widely used or accepted means of conveying narratives in an engaging and effective way. After reviewing some of the most popular interactive films to date, I sought to create an interactive film that takes some of the most effective tools implemented by these works of art. I ultimately created If: an Interactive Film with the knowledge I gained. If follows a date between a couple and gives a single audience member the ability to choose the way the narrative progresses at key moments in the narrative. Cycling ‘74’s Max object-oriented programming environment facilitates this interactive film through an audio-driven video feedback system.
ContributorsConte, Salvatore Anthony (Author) / Sha, Xin Wei (Thesis director) / Connell, Ellery (Committee member) / Barrett, The Honors College (Contributor) / School of Arts, Media and Engineering (Contributor)
Created2015-05
Description
2 and a half years ago a group of ASU men heard the startling statistic that 1 in 4 women will experience completed or attempted sexual assault by the time they graduate college. This fact along with their experience of seeing how women are treated at ASU prompted them to

2 and a half years ago a group of ASU men heard the startling statistic that 1 in 4 women will experience completed or attempted sexual assault by the time they graduate college. This fact along with their experience of seeing how women are treated at ASU prompted them to create a culture where men respect women. Shortly after, a group of women noticed the impact these men were having on the campus and formed the club WoW Factor to come alongside Man Up. In 2013 both clubs came together to form The Respect Movement to combat the issue of sexual assault by building a culture of respect between men and women. The issue of sexual assault is not unique to just ASU. This is an epidemic on campuses all across the nation affecting thousands of lives in a very destructive way. I truly believe that the issue of sexual assault is this generation's civil rights issue, but I am excited because the solution has started right here at ASU. The Respect Movement is not trying to address every symptom of the culture of disrespect. We boiled down the culture of disrespect to arguably the most tangible and visible symptom which is the epidemic of sexual assault on our campus. Our response is to create a safe place, which is a culture of respect on how men and women relate, and it is based on timeless transcendent truths and core values. The problem of sexual assault exists because there is a culture of disrespect; it is between how men and women relate, and that's fed by what men believe about themselves and women, and what women believe about themselves and men. Very few cultural messages are saying that a man is someone who takes responsibility, rejects passivity, leads courageously, and initiates respect - which we define respect as putting others needs above our own. If we can get men believing different about who they are and what they value, their attitudes will change, followed by behavior - meanwhile they have people walking this out next to them modeling the right behavior ultimately experiencing real character change. It is also counter cultural to say that a woman is someone who takes responsibility, rejects devaluing messages, declares the worth of others, and influences through respect. If men and women are both going after those things, they will build healthy relationships and the issue of sexual assault will start to chip away. It has to be both going towards core values that challenge and change character. Because if positive character change happens we will see positive culture change. Our main goal is to build a culture of respect and end sexual assault. But you can't build a culture without leaders. Yes, this movement is seeking relationship with every student, but in order to change the culture and prevent crisis from happening, we have to not only build a hospital at the bottom, but a fence at the top. How we do that is by investing our mentorship into what we have identified as the leaders on both the High School and College campuses. That is, athletes on the high school campuses and Greek life on college campuses. We seek to train leaders to become relational mentors through life on life mentorship and modeling of the right behavior based on core values.
ContributorsMaenner, Justin Alan (Author) / Koretz, Lora (Thesis director) / Smith, Sr. (Committee member) / Novicky, Colton (Committee member) / Barrett, The Honors College (Contributor) / School of Arts, Media and Engineering (Contributor)
Created2015-05
Description
This thesis is a technical project management overview of development of software for a student startup venture named TableTop. There were many changes made throughout the process in order to address new conditions as to keep the vision of the project on the most direct and reasonable path. Development followed

This thesis is a technical project management overview of development of software for a student startup venture named TableTop. There were many changes made throughout the process in order to address new conditions as to keep the vision of the project on the most direct and reasonable path. Development followed the agile product development model in order to adapt as the concept pivoted or as hurdles presented themselves. The goal at the end of the project was to have a well-defined business model based off of the lean startup business model canvas. The business model would shape development of the software that needed to be functional and ready for testing by the completion of the thesis. Functional was defined as having completed the user and merchant side of the application including communication between both. Ultimately, a user needed to be able to complete a transaction that a merchant had submitted on the software.
ContributorsMaloney, Ryan Daniel (Author) / Mayron, Liam (Thesis director) / Peck, Sidnee (Committee member) / Barrett, The Honors College (Contributor) / School of Arts, Media and Engineering (Contributor)
Created2015-05