Matching Items (434)

Filtering by

Clear all filters

134113-Thumbnail Image.png

AhriBot: A Python Bot Written for Discord Tasks

Description

Since the release of Discord in March of 2015 it has become the choice VoIP client for 25 million users, pulling in more each day from many sources including online video games with no voice chat, such as League of

Since the release of Discord in March of 2015 it has become the choice VoIP client for 25 million users, pulling in more each day from many sources including online video games with no voice chat, such as League of Legends. With such an expansive user base and many servers hosting multiple users during all times of the day, for a server admin to always be monitoring users is unreasonable. AhriBot aims to solve this problem by providing general administration through a command system to a server while it is logged onto that server. Specifically, AhriBot will be tailored for use on servers where League of Legends is primarily being played. Using commands issued to AhriBot, users can get statistics about their current game. By providing a set of features for general users, and a more specific set of features for League of Legends, AhriBot provides a greater experience and will help players to have quicker access to information about the game without having to travel to multiple outside sources.

Contributors

Agent

Created

Date Created
2017-12

134257-Thumbnail Image.png

HA-MRA: A Human-Aware Multi-Robot Architecture

Description

This thesis describes a multi-robot architecture which allows teams of robots to work with humans to complete tasks. The multi-agent architecture was built using Robot Operating System and Python. This architecture was designed modularly, allowing the use of different planners

This thesis describes a multi-robot architecture which allows teams of robots to work with humans to complete tasks. The multi-agent architecture was built using Robot Operating System and Python. This architecture was designed modularly, allowing the use of different planners and robots. The system automatically replans when robots connect or disconnect. The system was demonstrated on two real robots, a Fetch and a PeopleBot, by conducting a surveillance task on the fifth floor of the Computer Science building at Arizona State University. The next part of the system includes extensions for teaming with humans. An Android application was created to serve as the interface between the system and human teammates. This application provides a way for the system to communicate with humans in the loop. In addition, it sends location information of the human teammates to the system so that goal recognition can be performed. This goal recognition allows the generation of human-aware plans. This capability was demonstrated in a mock search and rescue scenario using the Fetch to locate a missing teammate.

Contributors

Agent

Created

Date Created
2017-05

134133-Thumbnail Image.png

Study of Hackathons through Desert Hacks

Description

Hackathons are 24-36 hour events where participants are encouraged to learn, collaborate, and build technological inventions with leaders, companies, and peers in the tech community. Hackathons have been sweeping the nation in the recent years especially at the collegiate level;

Hackathons are 24-36 hour events where participants are encouraged to learn, collaborate, and build technological inventions with leaders, companies, and peers in the tech community. Hackathons have been sweeping the nation in the recent years especially at the collegiate level; however, there is no substantial research or documentation of the actual effects of hackathons especially at the collegiate level. This makes justifying the usage of valuable time and resources to host hackathons difficult for tech companies and academic institutions. This thesis specifically examines the effects of collegiate hackathons through running a collegiate hackathon known as Desert Hacks at Arizona State University (ASU). The participants of Desert Hacks were surveyed at the start and at the end of the event to analyze the effects. The results of the survey implicate that participants have grown in base computer programming skills, inclusion in the tech community, overall confidence, and motivation for the technological field. Through these results, this study can be used to help justify the necessity of collegiate hackathons and events similar.

Contributors

Agent

Created

Date Created
2017-12

134134-Thumbnail Image.png

Women and Hackathons: An Analysis on Hackathons' Effects on Women's Motivation in Computer-Related Fields

Description

In today's world, technology plays a large role in everyone's life. However, there is a short supply of professionals to fill the roles in the computing field. When examining closer, it is clear that one group has a smaller representation:

In today's world, technology plays a large role in everyone's life. However, there is a short supply of professionals to fill the roles in the computing field. When examining closer, it is clear that one group has a smaller representation: women. This can be contributed to many factors early in the women's lives and academic careers. In hopes of increasing the number of women computing professionals, this thesis aimed to understand the problem of a lack of women in technology and studied how hackathons could be a possible solution. The research followed Desert Hacks as it examines the typical participants as well as the hackathons effects on women's morale in technology. Two important questions during the investigation were what kind of women are attending hackathons and how do women feel about the technology industry after a hackathon? The results suggested that hackathon had an overall positive effect on women's motivation in the computing field. Additionally, most research participants believed that everyone has the potential to do well in the field and that gender inclusion is important for the industry. This ideology can foster a healthy environment for women to become more motivated in computing. Through these results, hackathons can be seen as another mean to help motivate women in the field and open up the possibility of future studies of women and hackathons.

Contributors

Agent

Created

Date Created
2017-12

134769-Thumbnail Image.png

Developing an HTML5 Autonomous Robot Web Simulator

Description

In order to adequately introduce students to computer science and robotics in an exciting and engaging manner certain teaching techniques should be used. In recent years some of the most popular paradigms are Visual Programming Languages. Visual Programming Languages are

In order to adequately introduce students to computer science and robotics in an exciting and engaging manner certain teaching techniques should be used. In recent years some of the most popular paradigms are Visual Programming Languages. Visual Programming Languages are meant to introduce problem solving skills and basic programming constructs inherent to all modern day languages by allowing users to write programs visually as opposed to textually. By bypassing the need to learn syntax students can focus on the thinking behind developing an algorithm and see immediate results that help generate excitement for the field and reduce disinterest due to startup complexity and burnout. The Introduction to Engineering course at Arizona State University supports this approach by teaching students the basics of autonomous maze traversing algorithms and using ASU VIPLE, a Visual Programming Language developed to connect with and direct real-world robots. However, some startup time is needed to learn how to interface with these robots using ASU VIPLE. That is why the HTML5 Autonomous Robot Web Simulator was created -- by encouraging students to use the simulator the problem solving behind autonomous maze traversing algorithms can be introduced more quickly and with immediate affirmation. Our goal was to improve this simulator and add features so that the simulator could be accessed and used for a more wide variety of introductory Computer Science lessons. Features scattered across past implementations of robotic simulators were aggregated in a cross platform solution. Upon initial development, a classroom test group revealed usability concerns and a demonstration of students' mental models. Mean time for task completion was 8.1min - compared to 2min for the authors. The simulator was updated in response to test group feedback and new instructor requirements. The new implementation reduces programming overhead while maintaining a learning environment with support for even the most complex applications.

Contributors

Agent

Created

Date Created
2016-12

134797-Thumbnail Image.png

Virtual Office Assistant

Description

With the progression of different industries moving away from employing secretaries for business professionals and professors, there exists a void in the area of personal assistance. This problem has existing solutions readily available to replace this service, i.e. secretary or

With the progression of different industries moving away from employing secretaries for business professionals and professors, there exists a void in the area of personal assistance. This problem has existing solutions readily available to replace this service, i.e. secretary or personal assistant, tend to range from expensive and useful to inexpensive and not efficient. This leaves a low cost niche into the market of a virtual office assistant or manager to display messages and to help direct people in obtaining contact information. The development of a low cost solution revolves around the software needed to solve the various problems an accessible and user friendly Virtual Interface in which the owner of the Virtual Office Manager/Assistant can communicate to colleagues who are at standby outside of the owner's office and vice versa. This interface will be allowing the owner to describe the status pertaining to their absence or any other message sent to the interface. For example, the status of the owner's work commute can be described with a simple "Running Late" phrase or a message like "Busy come back in 10 minutes". In addition, any individual with an interest to these entries will have the opportunity to respond back because the device will provide contact information. When idle, the device will show supplemental information such as the owner's calendar and name. The scope of this will be the development and testing of solutions to achieve these goals.

Contributors

Created

Date Created
2016-12

134266-Thumbnail Image.png

TSCAN: Toward a Static and Customizable Analysis for Node.js

Description

Node.js is an extremely popular development framework for web applications. The appeal of its event-driven, asynchronous flow and the convenience of JavaScript as its programming language have driven its rapid growth, and it is currently deployed by leading companies in

Node.js is an extremely popular development framework for web applications. The appeal of its event-driven, asynchronous flow and the convenience of JavaScript as its programming language have driven its rapid growth, and it is currently deployed by leading companies in retail, finance, and other important sectors. However, the tools currently available for Node.js developers to secure their applications against malicious attackers are notably scarce. While there has been a substantial amount of security tools created for web applications in many other languages such as PHP and Java, very little exists for Node.js applications. This could compromise private information belonging to companies such as PayPal and WalMart. We propose a tool to statically analyze Node.js web applications for five popular vulnerabilites: cross-site scripting, SQL injection, server-side request forgery, command injection, and code injection. We base our tool off of JSAI, a platform created to parse client-side JavaScript for security risks. JSAI is novel because of its configuration capabilities, which allow a user to choose between various analysis options at runtime in order to select the most thorough analysis with the least amount of processing time. We contribute to the development of our tool by rigorously analyzing and documenting vulnerable functions and objects in Node.js that are relevant to the vulnerabilities we have selected. We intend to use this documentation to build a robust Node.js static analysis tool and we hope that other developers will also incorporate this analysis into their Node.js security projects.

Contributors

Created

Date Created
2017-05

148193-Thumbnail Image.png

A Discreet Mobile Application for Domestic Violence Victims

Description

This project explores how modern mobile technology can be used to provide support for domestic violence victims. The goal of the project is to create a proof-of-concept iOS mobile application that maintains a discreet safety front and provides domestic violence

This project explores how modern mobile technology can be used to provide support for domestic violence victims. The goal of the project is to create a proof-of-concept iOS mobile application that maintains a discreet safety front and provides domestic violence victims with resources and safety planning. The design and implementation are disguised as a hair salon app to maintain a low profile on the user’s phone. The HairHelp app features quick exit navigation, a secure database to store a user’s private and personal documents in case of emergency, and a checklist of safety planning measures. The steps taken in this project serve as the foundation for a larger project in the long term.

Contributors

Agent

Created

Date Created
2021-05

148209-Thumbnail Image.png

Room & Cardboard

Description

In 2018, the United States generated 37.4 million more U.S. tons of paper and cardboard material compared to in 1960 (EPA, 2020). As the United States produces a disproportionate amount of packaging waste every year when accounting for population size,

In 2018, the United States generated 37.4 million more U.S. tons of paper and cardboard material compared to in 1960 (EPA, 2020). As the United States produces a disproportionate amount of packaging waste every year when accounting for population size, it has become increasingly difficult to mitigate waste production, lessen the environmental impact of generating more paperboard materials, and move towards a more ethical circular economy. In efforts to adopt the principles of a green economy, deviate from the linear supply chain model, minimize packaging waste, and encourage more sustainable lifestyles, we developed a business centered around a circular, service based model called Room & Cardboard. Our initiative collects cardboard waste generated in and around the ASU community and repurposes it for dorm-style furniture available for students to rent throughout the school year. Using cardboard, we have built prototypes for two products (desk lamps and shoe racks) that are sturdy, visually pleasing, and recyclable. Our initiative helps to reduce cardboard packaging waste by upcycling cardboard waste into products that will increase the lifespan of the cardboard material. At the end of the product’s life span, in cases of severe damage, we will turn the product into a seed board made with blended cardboard paste that can then be used to plant a succulent we will make available to students to buy as dorm decor. The feedback on our initiative through online surveys and in-person tabling has generated enough traction for Dean Rendell of Barrett, the Honors College at Arizona State University to consider a test-drive of our products in the upcoming Fall semester.

Contributors

Agent

Created

Date Created
2021-05

148340-Thumbnail Image.png

Pool Level Monitor and Autofill System: A Smart Home Device

Description

As smart home devices become more common in households across the globe, it is<br/>surprising that companies who specialize in IoT devices have not exploited the world of swimming<br/>pools. As a pool owner and avid IoT user, it has become increasingly

As smart home devices become more common in households across the globe, it is<br/>surprising that companies who specialize in IoT devices have not exploited the world of swimming<br/>pools. As a pool owner and avid IoT user, it has become increasingly obvious to me that such<br/>devices are necessary. Thus, I have developed an embedded system – connected to a web-based<br/>reporting system – that accurately reports common chemical levels of a swimming pool. In<br/>addition, this system includes an autofill function with information about the amount of water<br/>dispensed. This system gives pool owners access to an all-in-one device that can be used on any<br/>pool, new or old. Future implementations include a personalized application to display the pool<br/>levels and user-defined suggestions when certain levels become too high or low.

Contributors

Agent

Created

Date Created
2021-05