Filtering by
- Creators: Computer Science and Engineering Program

The transmission dynamics of Tuberculosis (TB) involve complex epidemiological and socio-economical interactions between individuals living in highly distinct regional conditions. The level of exogenous reinfection and first time infection rates within high-incidence settings may influence the impact of control programs on TB prevalence. The impact that effective population size and the distribution of individuals’ residence times in different patches have on TB transmission and control are studied using selected scenarios where risk is defined by the estimated or perceive first time infection and/or exogenous re-infection rates.
Methods
This study aims at enhancing the understanding of TB dynamics, within simplified, two patch, risk-defined environments, in the presence of short term mobility and variations in reinfection and infection rates via a mathematical model. The modeling framework captures the role of individuals’ ‘daily’ dynamics within and between places of residency, work or business via the average proportion of time spent in residence and as visitors to TB-risk environments (patches). As a result, the effective population size of Patch i (home of i-residents) at time t must account for visitors and residents of Patch i, at time t.
Results
The study identifies critical social behaviors mechanisms that can facilitate or eliminate TB infection in vulnerable populations. The results suggest that short-term mobility between heterogeneous patches contributes to significant overall increases in TB prevalence when risk is considered only in terms of direct new infection transmission, compared to the effect of exogenous reinfection. Although, the role of exogenous reinfection increases the risk that come from large movement of individuals, due to catastrophes or conflict, to TB-free areas.
Conclusions
The study highlights that allowing infected individuals to move from high to low TB prevalence areas (for example via the sharing of treatment and isolation facilities) may lead to a reduction in the total TB prevalence in the overall population. The higher the population size heterogeneity between distinct risk patches, the larger the benefit (low overall prevalence) under the same “traveling” patterns. Policies need to account for population specific factors (such as risks that are inherent with high levels of migration, local and regional mobility patterns, and first time infection rates) in order to be long lasting, effective and results in low number of drug resistant cases.
In today's business environment, customer service is more critical than ever. It is a major factor when consumers decide where to take their business. However, consumer choice is not applicable to all businesses for example, public utilities. Consumers do not have a choice in picking which utility company provides them service; the choice depends upon local jurisdictions and predetermined service territories. This lack of choice creates a "forced relationship" between consumers and public utilities. Because the nature of this relationship can have a negative impact, public utilities need to reevaluate their approach and invest in effective customer service as a valuable tool to achieve their organizational goals. This study investigates the need for public utilities to expand their investment; explores the available avenues to expand their investment; and offers a recommended pathway with the features and interface to expand their investment. Technology is the key in achieving organizational goals as it can reengineer internal and external operations. Self-service technology (SST) along with the features of gamification enable an organization to reengineer both its internal and its external operations. Companies can shift work from employees to customers and develop new mediums for customer service interaction. Overall, three investments are analyzed: traditional call centers, online, and mobile. The analysis focuses on available features and how those features affect the achievement of organizational goals. Two studies comprise interviews with utility representatives and a customer survey completed to reinforce findings. Based on the research, a smartphone application is the best option to enhance customer service while addressing all organizational goals.
Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.
Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.
This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.
This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.
The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image, and likeness. The goal of the team was to help “prepare athletes to understand and properly navigate the evolving restrictions and guidelines around athlete name, image, and likeness”. In order to accomplish this, the team had to understand the problems student-athletes face with these changing rules and regulations. The team conducted basic market research to identify the problem. The problem discovered was the lack of communication between student-athletes and businesses. In order to verify this problem, the team conducted several interviews with Arizona State University Athletic Department personnel. From the interviews, the team identified that the user is the student-athletes and the buyer is the brands and businesses. Once the problem was verified and the user and buyer were identified, a solution that would best fit the customers was formulated. The solution is a platform that assists student-athletes navigate the changing rules of the NCAA by providing access to a marketplace optimized to working with student-athletes and offering an ease of maintaining relationships between student-athletes and businesses. The solution was validated through meetings with interested brands. The team used the business model and market potential to pitch the business idea to the brands. Finally, the team gained traction by initiating company partnerships.
A project about developing software for learning turned into a project for learning about software development. The submission here only includes the journal. However, the journal has a link to the public GitHub repository containing the source code for the thesis. The source code implements a program to facilitate self-study by allowing the user to create quizzes. The journal contains my experience working on the project (both successes and failures).