Matching Items (734)
Filtering by

Clear all filters

Description
The US steel industry experienced a great decline between 1950-1985. Influenced by several government policies, the industry was first cartelized during the great depression and then subjected to an extremely powerful organized labor force. Due to high demand between and during WWII and the Korean War, the industry expanded capacity

The US steel industry experienced a great decline between 1950-1985. Influenced by several government policies, the industry was first cartelized during the great depression and then subjected to an extremely powerful organized labor force. Due to high demand between and during WWII and the Korean War, the industry expanded capacity using existing technologies. Simultaneously, organized labor was able to secure increased wages and large severance costs for firms that decided to shutdown existing steel mills. In the post war years this prevented firms from innovating through investing in newer, more efficient, technologies. Eventually US steel firms had no advantage against foreign producers who could produce steel cheaper and more efficiently.
ContributorsCole, Andrew Arthur (Author) / Lagakos, David (Thesis director) / DeSerpa, Allan (Committee member) / Dillon, Eleanor (Committee member) / Barrett, The Honors College (Contributor) / Economics Program in CLAS (Contributor)
Created2013-05
Description
For many years, the countries of Sub-Saharan Africa, like many other unindustrialized nations, followed the internally-oriented import substitution policies developed by theoreticians like Raul Prebisch. These measures were meant to force nations to develop their industrial capabilities in isolation from the rest of the world. However, these policies did little

For many years, the countries of Sub-Saharan Africa, like many other unindustrialized nations, followed the internally-oriented import substitution policies developed by theoreticians like Raul Prebisch. These measures were meant to force nations to develop their industrial capabilities in isolation from the rest of the world. However, these policies did little to improve the economy of many emerging countries. It was not until Asian countries switched to externally-oriented strategies that progress was made in their developing economies. In the early 1980s, a "Washington Consensus" was practiced that included a trade provision for the opening of emerging markets. Since then, many Sub-Saharan African nations have implemented policies that have opened up their markets to the rest of the world. However, most of these countries have not realized the benefits typically ascribed to open trade, causing some economists to doubt the economic growth benefits of trade liberalization. This thesis examines the connection between trade liberalization in Sub-Saharan Africa to review the consequences of recent trade reforms on the region's development and to identify some of the factors which contributed to individual countries successfully, or unsuccessfully, implementing trade liberalizing policies. It finds that the relationship between economic growth and trade liberalization is not as important as other growth factors and that there are multiple paths toward economic development.
ContributorsDussik, Jonathan Abraham DeBlock (Author) / DeSerpa, Allan (Thesis director) / Hill, John (Committee member) / Barrett, The Honors College (Contributor) / Department of Finance (Contributor) / Department of Economics (Contributor)
Created2014-12
ContributorsFishman, Jacob (Author) / DeSerpa, Allan (Thesis director) / Hill, John (Committee member) / Barrett, The Honors College (Contributor) / W. P. Carey School of Business (Contributor)
Created2012-12
Description

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.

ContributorsInjejikian, Angelica (Author) / Gonzalez-Sanchez, Javier (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.

ContributorsLarson, Kent Merle (Author) / Bazzi, Rida (Thesis director) / Shoshitaishvili, Yan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMarkabawi, Jah (Co-author) / Masud, Abdullah (Co-author) / Lobo, Ian (Co-author) / Koleber, Keith (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMasud, Abdullah Bin (Co-author) / Koleber, Keith (Co-author) / Lobo, Ian (Co-author) / Markabawi, Jah (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image,

The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image, and likeness. The goal of the team was to help “prepare athletes to understand and properly navigate the evolving restrictions and guidelines around athlete name, image, and likeness”. In order to accomplish this, the team had to understand the problems student-athletes face with these changing rules and regulations. The team conducted basic market research to identify the problem. The problem discovered was the lack of communication between student-athletes and businesses. In order to verify this problem, the team conducted several interviews with Arizona State University Athletic Department personnel. From the interviews, the team identified that the user is the student-athletes and the buyer is the brands and businesses. Once the problem was verified and the user and buyer were identified, a solution that would best fit the customers was formulated. The solution is a platform that assists student-athletes navigate the changing rules of the NCAA by providing access to a marketplace optimized to working with student-athletes and offering an ease of maintaining relationships between student-athletes and businesses. The solution was validated through meetings with interested brands. The team used the business model and market potential to pitch the business idea to the brands. Finally, the team gained traction by initiating company partnerships.

ContributorsSchulte, Brooke (Co-author) / Recato, Bella (Co-author) / Winston, Blake (Co-author) / Byrne, Jared (Thesis director) / Lee, Christopher (Committee member) / Kunowski, Jeffrey (Committee member) / Computer Science and Engineering Program (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

A project about developing software for learning turned into a project for learning about software development. The submission here only includes the journal. However, the journal has a link to the public GitHub repository containing the source code for the thesis. The source code implements a program to facilitate self-study

A project about developing software for learning turned into a project for learning about software development. The submission here only includes the journal. However, the journal has a link to the public GitHub repository containing the source code for the thesis. The source code implements a program to facilitate self-study by allowing the user to create quizzes. The journal contains my experience working on the project (both successes and failures).

ContributorsRoper, Branden Gerald (Author) / Miller, Phillip (Thesis director) / Zazkis, Dov (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Education has been at the forefront of many issues in Arizona over the past several years with concerns over lack of funding sparking the Red for Ed movement. However, despite the push for educational change, there remain many barriers to education including a lack of visibility for how Arizona schools

Education has been at the forefront of many issues in Arizona over the past several years with concerns over lack of funding sparking the Red for Ed movement. However, despite the push for educational change, there remain many barriers to education including a lack of visibility for how Arizona schools are performing at a legislative district level. While there are sources of information released at a school district level, many of these are limited and can become obscure to legislators when such school districts lie on the boundary between 2 different legislative districts. Moreover, much of this information is in the form of raw spreadsheets and is often fragmented between government websites and educational organizations. As such, a visualization dashboard that clearly identifies schools and their relative performance within each legislative district would be an extremely valuable tool to legislative bodies and the Arizona public. Although this dashboard and research are rough drafts of a larger concept, they would ideally increase transparency regarding public information about these districts and allow legislators to utilize the dashboard as a tool for greater understanding and more effective policymaking.

ContributorsColyar, Justin Dallas (Author) / Michael, Katina (Thesis director) / Maciejewski, Ross (Committee member) / Tate, Luke (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05