Matching Items (54)
Filtering by

Clear all filters

Description

Personal electric vehicles, or PEVs, help individuals navigate short to mid distance commutes in environments that lack effective public transportation solutions. This is known as the “Last Mile” problem. A particular solution, electric skateboards, are highly energy efficient due to their size but lack auxiliary features for safety and user-convenience

Personal electric vehicles, or PEVs, help individuals navigate short to mid distance commutes in environments that lack effective public transportation solutions. This is known as the “Last Mile” problem. A particular solution, electric skateboards, are highly energy efficient due to their size but lack auxiliary features for safety and user-convenience connected to the same battery supply. Plus, almost all conventional electric boards come with proprietary software and hardware designs, meaning that modifying or improving upon their logic is extremely difficult if not impossible. Therefore, our group aims to prototype an improved, open-source electric skateboard design to determine the feasibility of our ideas.

ContributorsWoodburne, Ian (Author) / Garcia, Brendan (Co-author) / Meuth, Ryan (Thesis director) / Michael, Katina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
165522-Thumbnail Image.png
Description
Now that home security systems are readily available at a low cost, these systems are commonly being installed to watch over homes and loved ones. These systems are fairly easy to install and can provide 4k Ultra HD resolution. The user can configure the sensitivity and areas to monitor and

Now that home security systems are readily available at a low cost, these systems are commonly being installed to watch over homes and loved ones. These systems are fairly easy to install and can provide 4k Ultra HD resolution. The user can configure the sensitivity and areas to monitor and receive object detection notifications. Unfortunately, once the customer starts to use the system, they often find that the notifications are overwhelming and soon turn them off. After hearing the same experience from multiple friends and family I thought it would be a good topic for my thesis. I examined a top selling security system sold at a bulk retail store and have implemented improved detection techniques that advance object detection and reduce false notifications. The additional algorithms will support the processing of both near real-time streams and saved video file processing, which existing security systems do not include.
ContributorsBustillos, Adriana (Author) / Meuth, Ryan (Thesis director) / Nakamura, Mutsumi (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description

This project tackles a real-world example of a classroom with college students to discover what factors affect a student’s outcome in the class as well as investigate when and why a student who started well in the semester may end poorly later on. First, this project performs a statistical analysis

This project tackles a real-world example of a classroom with college students to discover what factors affect a student’s outcome in the class as well as investigate when and why a student who started well in the semester may end poorly later on. First, this project performs a statistical analysis to ensure that the total score of a student is truly based on the factors given in the dataset instead of due to random chance. Next, factors that are the most significant in affecting the outcome of scores in zyBook assignments are discovered. Thirdly, visualization of how students perform over time is displayed for the student body as a whole and students who started well at the beginning of the semester but trailed off towards the end. Lastly, the project also gives insight into the failure metrics for good starter students who unfortunately did not perform as well later in the course.

ContributorsChung, Michael (Author) / Meuth, Ryan (Thesis director) / Samara, Marko (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
Description
In response to the lasting negative effects of the COVID-19 pandemic on driver’s education and road safety, this thesis is intended to create an iOS application that recognizes and reports on poor driving habits. The end user opens the application to start a trip, the application records GPS data and

In response to the lasting negative effects of the COVID-19 pandemic on driver’s education and road safety, this thesis is intended to create an iOS application that recognizes and reports on poor driving habits. The end user opens the application to start a trip, the application records GPS data and information from APIs containing environmental information in a consistent, synchronized manner, patterns in said data are analyzed by the application to flag events representing different issues when driving, and when the user presses a button to end the trip, a report of the events is presented. The project was developed using a complete design process, including a full Research and Development process and detailed design documentation. Separate components of the application were developed in an iterative structure, with GPS information, the data synchronization system, API parsing and recording, data analysis, and feedback all being designed and tested separately. The application ultimately reached late beta status, with target stability and test results being achieved in typical use cases.
ContributorsBronzi, John (Author) / Meuth, Ryan (Thesis director) / Yee, Richard (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-12
Description
The number of extreme wildfires is on the rise globally, and predicting the size of a fire will help officials make appropriate decisions to mitigate the risk the fire poses against the environment and humans. This study attempts to find the burned area of fires in the United States based

The number of extreme wildfires is on the rise globally, and predicting the size of a fire will help officials make appropriate decisions to mitigate the risk the fire poses against the environment and humans. This study attempts to find the burned area of fires in the United States based on attributes such as time, weather, and location of the fire using machine learning methods.
ContributorsPrabagaran, Padma (Author, Co-author) / Meuth, Ryan (Thesis director) / McCulloch, Robert (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2022-12
Description
This study aims to combine the wisdom of crowds with ML to make more accurate stock price predictions for a select set of stocks. Different from prior works, this study uses different input elicitation techniques to improve crowd performance. In addition, machine learning is used to support the crowd. The

This study aims to combine the wisdom of crowds with ML to make more accurate stock price predictions for a select set of stocks. Different from prior works, this study uses different input elicitation techniques to improve crowd performance. In addition, machine learning is used to support the crowd. The influence of ML on the crowd is tested by priming participants with suggestions from an ML model. Lastly, the market conditions and stock popularity is observed to better understand crowd behavior.
ContributorsBhogaraju, Harika (Author) / Escobedo, Adolfo R (Thesis director) / Meuth, Ryan (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-12
161217-Thumbnail Image.png
Description

Among classes in the Computer Science curriculum at Arizona State University, Automata Theory is widely considered to be one of the most difficult. Many Computer Science concepts have strong visual components that make them easier to understand. Binary trees, Dijkstra's algorithm, pointers, and even more basic concepts such as arrays

Among classes in the Computer Science curriculum at Arizona State University, Automata Theory is widely considered to be one of the most difficult. Many Computer Science concepts have strong visual components that make them easier to understand. Binary trees, Dijkstra's algorithm, pointers, and even more basic concepts such as arrays all have very strong visual components. Not only that, but resources for them are abundantly available online. Automata Theory, on the other hand, is the first Computer Science course students encounter that has a significant focus on deep theory. Many
of the concepts can be difficult to visualize, or at least take a lot of effort to do so. Furthermore, visualizers for finite state machines are hard to come by. Because I thoroughly enjoyed learning about Automata Theory and parsers, I wanted to create a program that involved the two. Additionally, I thought creating a program for visualizing automata would help students who struggle with Automata Theory develop a stronger understanding of it.

ContributorsSmith, Andrew (Author) / Burger, Kevin (Thesis director) / Meuth, Ryan (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2021-12
131747-Thumbnail Image.png
Description
One of the major sources of authentication is through the use of username and password systems. Ideally, each password is a unique identifier known by a single individual. In reality however, exposed passwords from past data breaches reveal vulnerabilities that are traceable to passwords created today. Vulnerabilities include repetitions of

One of the major sources of authentication is through the use of username and password systems. Ideally, each password is a unique identifier known by a single individual. In reality however, exposed passwords from past data breaches reveal vulnerabilities that are traceable to passwords created today. Vulnerabilities include repetitions of characters, words, character sequences, and phrases that are used in a password. This project was observed in English to highlight the vulnerabilities that can come from utilizing the English language. However, the vulnerabilities highlighted in this project can also be applicable in languages across the world. It was observed that through the common types of digital attacks, brute force attack and dictionary attack work effectively against weak passwords. Brute force attack revealed that a user could expose an alphanumeric password of length eight in as little as one and a half days. In addition, dictionary attacks revealed that an alphanumeric password of length eight can be exposed in a shorter amount of time if the password contains a single long word or phrase thought to be secure. During this attack analysis, it found that passwords become significantly more secure in the utilization of alphanumeric passwords of minimal length of eight. In addition, the password must also not be a particular phrase or word with simplistic characteristics for adequate strength against dictionary attack. The solution to using username and password systems is to create a password utilizing as many characters as possible while still retaining memorability. If creating a password of this type is not feasible, there is a need to use technological solutions to keep the current system of username and passwords as secure as possible under daily life. Otherwise, there will be a need to replace the username and password system altogether before it becomes insecure by technology.
ContributorsTipton, Tony T (Co-author) / Tipton, Tony (Co-author) / Meuth, Ryan (Thesis director) / Tirupalavanam, Ganesh (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131363-Thumbnail Image.png
Description
Behavioral economics suggests that emotions can affect an individual’s decision making. Recent research on this idea’s application on large societies hints that there may exist some correlation or maybe even some causation relationship between public sentiment—at least what can be pulled from Twitter—and the movement of the stock market. One

Behavioral economics suggests that emotions can affect an individual’s decision making. Recent research on this idea’s application on large societies hints that there may exist some correlation or maybe even some causation relationship between public sentiment—at least what can be pulled from Twitter—and the movement of the stock market. One major result of consistent research on whether or not public sentiment can predict the movement of the stock market is that public sentiment, as a feature, is becoming more and more valid as a variable for stock-market-based machine learning models. While raw values typically serve as invaluable points of data, when training a model, many choose to “engineer” new features for their models—deriving rates of change or range values to improve model accuracy.
Since it doesn’t hurt to attempt to utilize feature extracted values to improve a model (if things don’t work out, one can always use their original features), the question may arise: how could the results of feature extraction on values such as sentiment affect a model’s ability to predict the movement of the stock market? This paper attempts to shine some light on to what the answer could be by deriving TextBlob sentiment values from Twitter data, and using Granger Causality Tests and logistic and linear regression to test if there exist a correlation or causation between the stock market and features extracted from public sentiment.
ContributorsYu, James (Author) / Meuth, Ryan (Thesis director) / Nakamura, Mutsumi (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131390-Thumbnail Image.png
Description
For our creative project, we initially wanted to work on a web application that would allow people with busy schedules to easily create and share events while also discovering other events that may interest them. With that in mind, we created the Group Event Planner App, a full stack project

For our creative project, we initially wanted to work on a web application that would allow people with busy schedules to easily create and share events while also discovering other events that may interest them. With that in mind, we created the Group Event Planner App, a full stack project that lays down a foundation for all of our goals while focusing primarily on the proposed recommendation algorithms that enable its users to discover events that are likely to pique their interest. The development of our recommendation algorithms took inspiration from existing implementations, such as those at Amazon, YouTube, and Netflix, and resulted in a creative amalgamation.
ContributorsRussell, Preston (Co-author) / Sonnier, Connor (Co-author) / Chen, Yinong (Thesis director) / Meuth, Ryan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05