Matching Items (151)
152796-Thumbnail Image.png
Description
The Internet is transforming its look, in a short span of time we have come very far from black and white web forms with plain buttons to responsive, colorful and appealing user interface elements. With the sudden rise in demand of web applications, developers are making full use of the

The Internet is transforming its look, in a short span of time we have come very far from black and white web forms with plain buttons to responsive, colorful and appealing user interface elements. With the sudden rise in demand of web applications, developers are making full use of the power of HTML5, JavaScript and CSS3 to cater to their users on various platforms. There was never a need of classifying the ways in which these languages can be interconnected to each other as the size of the front end code base was relatively small and did not involve critical business logic. This thesis focuses on listing and defining all dependencies between HTML5, JavaScript and CSS3 that will help developers better understand the interconnections within these languages. We also explore the present techniques available to a developer to make his code free of dependency related defects. We build a prototype tool, HJCDepend, based on our model, which aims at helping developers discover and remove defects early in the development cycle.
ContributorsVasugupta (Author) / Gary, Kevin (Thesis advisor) / Lindquist, Timothy (Committee member) / Bansal, Ajay (Committee member) / Arizona State University (Publisher)
Created2014
150046-Thumbnail Image.png
Description
This thesis describes a synthetic task environment, CyberCog, created for the purposes of 1) understanding and measuring individual and team situation awareness in the context of a cyber security defense task and 2) providing a context for evaluating algorithms, visualizations, and other interventions that are intended to improve cyber situation

This thesis describes a synthetic task environment, CyberCog, created for the purposes of 1) understanding and measuring individual and team situation awareness in the context of a cyber security defense task and 2) providing a context for evaluating algorithms, visualizations, and other interventions that are intended to improve cyber situation awareness. CyberCog provides an interactive environment for conducting human-in-loop experiments in which the participants of the experiment perform the tasks of a cyber security defense analyst in response to a cyber-attack scenario. CyberCog generates the necessary performance measures and interaction logs needed for measuring individual and team cyber situation awareness. Moreover, the CyberCog environment provides good experimental control for conducting effective situation awareness studies while retaining realism in the scenario and in the tasks performed.
ContributorsRajivan, Prashanth (Author) / Femiani, John (Thesis advisor) / Cooke, Nancy J. (Thesis advisor) / Lindquist, Timothy (Committee member) / Gary, Kevin (Committee member) / Arizona State University (Publisher)
Created2011
156614-Thumbnail Image.png
Description
Academia is not what it used to be. In today’s fast-paced world, requirements

are constantly changing, and adapting to these changes in an academic curriculum

can be challenging. Given a specific aspect of a domain, there can be various levels of

proficiency that can be achieved by the students. Considering the wide array

Academia is not what it used to be. In today’s fast-paced world, requirements

are constantly changing, and adapting to these changes in an academic curriculum

can be challenging. Given a specific aspect of a domain, there can be various levels of

proficiency that can be achieved by the students. Considering the wide array of needs,

diverse groups need customized course curriculum. The need for having an archetype

to design a course focusing on the outcomes paved the way for Outcome-based

Education (OBE). OBE focuses on the outcomes as opposed to the traditional way of

following a process [23]. According to D. Clark, the major reason for the creation of

Bloom’s taxonomy was not only to stimulate and inspire a higher quality of thinking

in academia – incorporating not just the basic fact-learning and application, but also

to evaluate and analyze on the facts and its applications [7]. Instructional Module

Development System (IMODS) is the culmination of both these models – Bloom’s

Taxonomy and OBE. It is an open-source web-based software that has been

developed on the principles of OBE and Bloom’s Taxonomy. It guides an instructor,

step-by-step, through an outcomes-based process as they define the learning

objectives, the content to be covered and develop an instruction and assessment plan.

The tool also provides the user with a repository of techniques based on the choices

made by them regarding the level of learning while defining the objectives. This helps

in maintaining alignment among all the components of the course design. The tool

also generates documentation to support the course design and provide feedback

when the course is lacking in certain aspects.

It is not just enough to come up with a model that theoretically facilitates

effective result-oriented course design. There should be facts, experiments and proof

that any model succeeds in achieving what it aims to achieve. And thus, there are two

research objectives of this thesis: (i) design a feature for course design feedback and

evaluate its effectiveness; (ii) evaluate the usefulness of a tool like IMODS on various

aspects – (a) the effectiveness of the tool in educating instructors on OBE; (b) the

effectiveness of the tool in providing appropriate and efficient pedagogy and

assessment techniques; (c) the effectiveness of the tool in building the learning

objectives; (d) effectiveness of the tool in document generation; (e) Usability of the

tool; (f) the effectiveness of OBE on course design and expected student outcomes.

The thesis presents a detailed algorithm for course design feedback, its pseudocode, a

description and proof of the correctness of the feature, methods used for evaluation

of the tool, experiments for evaluation and analysis of the obtained results.
ContributorsRaj, Vaishnavi (Author) / Bansal, Srividya (Thesis advisor) / Bansal, Ajay (Committee member) / Mehlhase, Alexandra (Committee member) / Arizona State University (Publisher)
Created2018
156879-Thumbnail Image.png
Description
The Semantic Web contains large amounts of related information in the form of knowledge graphs such as DBpedia. These knowledge graphs are typically enormous and are not easily accessible for users as they need specialized knowledge in query languages (such as SPARQL) as well as deep familiarity of the ontologies

The Semantic Web contains large amounts of related information in the form of knowledge graphs such as DBpedia. These knowledge graphs are typically enormous and are not easily accessible for users as they need specialized knowledge in query languages (such as SPARQL) as well as deep familiarity of the ontologies used by these knowledge graphs. So, to make these knowledge graphs more accessible (even for non- experts) several question answering (QA) systems have been developed over the last decade. Due to the complexity of the task, several approaches have been undertaken that include techniques from natural language processing (NLP), information retrieval (IR), machine learning (ML) and the Semantic Web (SW). At a higher level, most question answering systems approach the question answering task as a conversion from the natural language question to its corresponding SPARQL query. These systems then utilize the query to retrieve the desired entities or literals. One approach to solve this problem, that is used by most systems today, is to apply deep syntactic and semantic analysis on the input question to derive the SPARQL query. This has resulted in the evolution of natural language processing pipelines that have common characteristics such as answer type detection, segmentation, phrase matching, part-of-speech-tagging, named entity recognition, named entity disambiguation, syntactic or dependency parsing, semantic role labeling, etc.

This has lead to NLP pipeline architectures that integrate components that solve a specific aspect of the problem and pass on the results to subsequent components for further processing eg: DBpedia Spotlight for named entity recognition, RelMatch for relational mapping, etc. A major drawback in this approach is error propagation that is a common problem in NLP. This can occur due to mistakes early on in the pipeline that can adversely affect successive steps further down the pipeline. Another approach is to use query templates either manually generated or extracted from existing benchmark datasets such as Question Answering over Linked Data (QALD) to generate the SPARQL queries that is basically a set of predefined queries with various slots that need to be filled. This approach potentially shifts the question answering problem into a classification task where the system needs to match the input question to the appropriate template (class label).

This thesis proposes a neural network approach to automatically learn and classify natural language questions into its corresponding template using recursive neural networks. An obvious advantage of using neural networks is the elimination for the need of laborious feature engineering that can be cumbersome and error prone. The input question would be encoded into a vector representation. The model will be trained and evaluated on the LC-QuAD Dataset (Large-scale Complex Question Answering Dataset). The dataset was created explicitly for machine learning based QA approaches for learning complex SPARQL queries. The dataset consists of 5000 questions along with their corresponding SPARQL queries over the DBpedia dataset spanning 5042 entities and 615 predicates. These queries were annotated based on 38 unique templates that the model will attempt to classify. The resulting model will be evaluated against both the LC-QuAD dataset and the Question Answering Over Linked Data (QALD-7) dataset.

The recursive neural network achieves template classification accuracy of 0.828 on the LC-QuAD dataset and an accuracy of 0.618 on the QALD-7 dataset. When the top-2 most likely templates were considered the model achieves an accuracy of 0.945 on the LC-QuAD dataset and 0.786 on the QALD-7 dataset.

After slot filling, the overall system achieves a macro F-score 0.419 on the LC- QuAD dataset and a macro F-score of 0.417 on the QALD-7 dataset.
ContributorsAthreya, Ram G (Author) / Bansal, Srividya (Thesis advisor) / Usbeck, Ricardo (Committee member) / Gary, Kevin (Committee member) / Arizona State University (Publisher)
Created2018
133342-Thumbnail Image.png
Description
An ethical dilemma is not a matter of “right” versus “wrong,” but rather it is a situation of conflicting values. A common ethical dilemma is that of honesty versus loyalty—is it better to tell the truth, or remain loyal to the company? In the Japanese culture, truth is

An ethical dilemma is not a matter of “right” versus “wrong,” but rather it is a situation of conflicting values. A common ethical dilemma is that of honesty versus loyalty—is it better to tell the truth, or remain loyal to the company? In the Japanese culture, truth is circumstantial and can vary with different situations. In a way, the Japanese idea of honesty reflects how highly they value loyalty. This overlap of values results in the lack of an ethical dilemma for the Japanese, which creates a new risk for fraud. Without this struggle, a Japanese employee does not have strong justification against committing fraud if it aligns with his values of honesty and loyalty.
This paper looks at the Japanese values relating to honesty and loyalty to show how much these ideas overlap. The lack of a conflict of values creates a risk for fraud, which will be shown through an analysis of the scandals of two Japanese companies, Toshiba and Olympus. These scandals shine light on the complexity of the ethical dilemma for the Japanese employees; since their sense of circumstantial honesty encourages them to lie if it maintains the harmony of the group, there is little stopping them from committing the fraud that their superiors asked them to commit.
In a global economy, understanding the ways that values impact business and decisions is important for both interacting with others and anticipating potential conflicts, including those that may result in or indicate potential red flags for fraud.
ContributorsTabar, Kelly Ann (Author) / Samuelson, Melissa (Thesis director) / Goldman, Alan (Committee member) / WPC Graduate Programs (Contributor) / W.P. Carey School of Business (Contributor) / School of Accountancy (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133357-Thumbnail Image.png
Description
The purpose of this study was to create a screening tool specifically for the identification of sex trafficking victims in the medical setting through the analysis of existing human trafficking screening tool studies geared towards use in the medical setting. Screening questions from these studies were compiled and modified into

The purpose of this study was to create a screening tool specifically for the identification of sex trafficking victims in the medical setting through the analysis of existing human trafficking screening tool studies geared towards use in the medical setting. Screening questions from these studies were compiled and modified into a survey that was distributed to healthcare professionals through the nationwide HEAL (Health Professional Education, Advocacy, Linkage) Trafficking listserv. Each screening tool study demonstrated benefits and disadvantages that were helpful in the sampling and selection of screening tool questions. The small sample size and a lack of data on the attitudes of medical professionals on sex trafficked victims were noted as limitations to this study. Further implications for this study would include validating the screening tool questions in a medical setting to determine the sensitivity of the survey in identifying patients as possible sex trafficking victims.
ContributorsCatano, Karen Samantha (Co-author) / Byun, Jiwon (Co-author) / Roe-Sepowitz, Dominique (Thesis director) / Lee, Maurice (Committee member) / School for the Science of Health Care Delivery (Contributor) / College of Integrative Sciences and Arts (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133358-Thumbnail Image.png
Description
Amidst transition are the citizens living and forging identity. This thesis is divided into three portions including Scotland, the Czech Republic, and Taiwan. Each section includes a history, literature, and interview investigation.
The analysis of Scotland includes the examination of identity as a consequence of Scottish history, the Scottish Referendum, and

Amidst transition are the citizens living and forging identity. This thesis is divided into three portions including Scotland, the Czech Republic, and Taiwan. Each section includes a history, literature, and interview investigation.
The analysis of Scotland includes the examination of identity as a consequence of Scottish history, the Scottish Referendum, and the Brexit Referendum. National identity is explored through literature and through the analysis of Dr. Neal McGarvey, a Scottish Economic Councilman, and Arizona State University exchange student Scott Fyfe. Scotland expressed strong political activism realized through their political participation and open discussions. Yet, their ability to demand change is hindered by the United Kingdom and will continue to be unless drastic changes occur.
The analysis of the Czech Republic includes Czech history from World War II through the Prague Spring, the Velvet Revolution, the split of Czechoslovakia, and the current Communist party. National identity defined by literature is observed in conjunction with interviews of Lukáš Rumian, an Arizona State University exchange student, the Čižmár family with a unique military background and split support for Communism, an anonymous family with multigenerational viewpoints, and lastly, a former refugee with strong opinions on immigration and cultural preservation. The findings of the Czech Republic are of an apathetic country with few avenues for political discussion or education. The generations face massive difference in their mindsets as they continue to be influenced by their Communist past.
The examination of Taiwanese independence includes a look at centuries of domination, the Chinese Kuomintang party, and the Sunflower Revolution. National identity highlighted through literature is paired with the interviews of Kun Baba, a Taiwanese orchard owner, an anonymous set of a college student, his girlfriend, and his father, and a Taiwanese aboriginal who openly explores the “bullying” of China. Findings of Taiwan establish a growing sense of Taiwanese identity and an outward-looking approach to preserving their independence from China.
These three countries each shared a desire to forge their futures yet took different approaches. Scotland being vocal but limited by government. The Czech Republic apathetic, yet citizens take advantage of democratic freedoms. Taiwan is creating political stances through elections, yet is finding these stances to be inadequate in securing a future of continued independence. Thus they search for international assistance. In each country, I realized the importance global citizenship has in promoting political discussions in a quest to understand the needs and desires of citizens internationally. With a deepened understanding of a nation’s political climate, global citizens can help citizens voice their opinion, increase literature of citizen opinion, receive government recognition, and secure the change they desire.
Note: The interview participants range from college students to retirees, ages 17-78. Many asked for anonymous reporting to protect their identity and employment status.
ContributorsCrynes, Victoria Elianna Navarette (Author) / Eaton, John (Thesis director) / Brashears, William (Committee member) / Monson, Angela (Committee member) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133361-Thumbnail Image.png
Description
Nuclear weapons possess enormous potential to inflict damage on our world. The majority of countries in the world denounce the proliferation of these weapons, but a minority of countries have a desire to proliferate. This essay analyzes the impact of regime type and alliance strength to a nuclear state on

Nuclear weapons possess enormous potential to inflict damage on our world. The majority of countries in the world denounce the proliferation of these weapons, but a minority of countries have a desire to proliferate. This essay analyzes the impact of regime type and alliance strength to a nuclear state on protégé proliferation decisions. Prior research focuses on single factors in proliferation decisions and fails to take in to account the multi-faceted factors that influence the international system that states operate in. The analysis finds that regime type gives an indication about a state’s likelihood to proliferate, but does not explain proliferation choices comprehensively. Alliance strength plays a large role in a state’s security calculations and must be analyzed in conjunction to regime type to understand proliferation decisions.
ContributorsHsu, Kai Nalu (Author) / Wright, Thorin (Thesis director) / Thies, Cameron (Committee member) / W.P. Carey School of Business (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133363-Thumbnail Image.png
Description
An in-depth analysis on the effects vortex generators cause to the boundary layer separation that occurs when an internal flow passes through a diffuser is presented. By understanding the effects vortex generators demonstrate on the boundary layer, they can be utilized to improve the performance and efficiencies of diffusers and

An in-depth analysis on the effects vortex generators cause to the boundary layer separation that occurs when an internal flow passes through a diffuser is presented. By understanding the effects vortex generators demonstrate on the boundary layer, they can be utilized to improve the performance and efficiencies of diffusers and other internal flow applications. An experiment was constructed to acquire physical data that could assess the change in performance of the diffusers once vortex generators were applied. The experiment consisted of pushing air through rectangular diffusers with half angles of 10, 20, and 30 degrees. A velocity distribution model was created for each diffuser without the application of vortex generators before modeling the velocity distribution with the application of vortex generators. This allowed the two results to be directly compared to one another and the improvements to be quantified. This was completed by using the velocity distribution model to find the partial mass flow rate through the outer portion of the diffuser's cross-sectional area. The analysis concluded that the vortex generators noticeably increased the performance of the diffusers. This was best seen in the performance of the 30-degree diffuser. Initially the diffuser experienced airflow velocities near zero towards the edges. This led to 0.18% of the mass flow rate occurring in the outer one-fourth portion of the cross-sectional area. With the application of vortex generators, this percentage increased to 5.7%. The 20-degree diffuser improved from 2.5% to 7.9% of the total mass flow rate in the outer portion and the 10-degree diffuser improved from 11.9% to 19.2%. These results demonstrate an increase in performance by the addition of vortex generators while allowing the possibility for further investigation on improvement through the design and configuration of these vortex generators.
ContributorsSanchez, Zachary Daniel (Author) / Takahashi, Timothy (Thesis director) / Herrmann, Marcus (Committee member) / Mechanical and Aerospace Engineering Program (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133367-Thumbnail Image.png
Description
In which industry that has ever been profit generating, does a firm profit from their failure? The United States has a mass incarceration problem. With 25% of the world prison population residing in the US, spending on detention costs the US government $80 billion annually. Over 50% of the individuals

In which industry that has ever been profit generating, does a firm profit from their failure? The United States has a mass incarceration problem. With 25% of the world prison population residing in the US, spending on detention costs the US government $80 billion annually. Over 50% of the individuals incarcerated in America are of black or Latino descent. This massive growth in the incarcerated population of America began in the 1970s and with the passive support of American citizens has created an industry whose players profit from the detention of people. Currently, the privately run detention facilities in the United States hold 7% of state prisoners, 18% of federal prisoners, and nearly 75% of ICE's undocumented detainee population. The detention of people for profit is an idea rooted in the same profit motive that allowed the institution of slavery to flourish. However even after the 13th Amendment abolished slavery in the U.S., the oppressive forces behind slave-era economics have been perpetuated through legislation and policies that continued the stratification of society and reinforcement of the social order. With the help of corporate lobbyists, political action committees, and organizations such as the American Legislative Exchange Council, the corporate shareholders of private prisons, such as CoreCivic and The GEO Group, are able to directly align their profit-driven interests with those of federal and state legislators. By the incorporation of legislation and policy into state and federal law, the shareholders of private prisons are able to directly affect legislation as well as their own potential for profit. The justification for the usage of private prisons is thought to be seen in the price savings and flexibility that it provides for federal and state governments. However, due to the law enforcement contractor's exemption from public record laws, there is no clear evidence of where the cost savings occur, or even if there are cost savings at all. Is it ethical for a for-profit-prison corporation to be responsible for the care, security, and rehabilitation of an individual, when if they fail to rehabilitate the individual, it will add to the number of inmates under their control? The measure of a prison's failure to rehabilitate an inmate is considered the recidivism rate, and is affected when an inmate leaves a detention facility, commits another crime, then is arrested. This profit motive is causing our society to incarcerate increasing numbers of people in private prisons. For-profit prisons financially benefit from long-term incarceration and recidivism. The passive investments from public and private employees and institutions through investment corporations are the legs that allow the private prison industry to stand. Twenty-nine investment firms, such as The Vanguard Group and Fidelity Investments, own nearly two-thirds of the two largest players in the private prison industry. This includes the passive investments by public institutions such as the Arizona State University Foundation's $600 million endowment fund as well as the $500 million directly invested into CoreCivic and GEO Group from the University of Texas/ Texas A&M Investment Management Company. The goal of abolishing private prisons will require years of litigation against the giants of the industry as well as the governmental entities supporting them. However, we can start today by demanding divestiture by our school and similar institutions as well continuing to share the knowledge of the oppressive forces associated with the detention of individuals for profit.
ContributorsBayham, Michael (Author) / Gomez, Alan (Thesis director) / Dacey, John (Committee member) / W.P. Carey School of Business (Contributor) / Department of Supply Chain Management (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05