Matching Items (1,128)
Filtering by

Clear all filters

Description
This paper explores the use of different classroom management styles by teachers engaged in a study. The study was focused on testing an educational computer program called The Doctor's Cure in s southwester school district with ready access to computers. The Doctor's Cure uses interactive storytelling and transformational play to

This paper explores the use of different classroom management styles by teachers engaged in a study. The study was focused on testing an educational computer program called The Doctor's Cure in s southwester school district with ready access to computers. The Doctor's Cure uses interactive storytelling and transformational play to teach seventh graders how to write persuasively. The definitions of student centered and teacher centered management styles used in this paper are drawn from Garret (2008) which suggests that teachers are not entirely one management style or the other, but a mix of the two. This paper closely examines three teachers, two with teacher centered styles and one with a student centered style in order to see which style was most effective in promoting the learning of persuasive writing skills. The findings tentatively indicate that teacher centered management styles yield larger gains in learning compared to more student centered styles.
ContributorsAyala, Joel Nicholas (Author) / Hayes, Elisabeth (Thesis director) / Siyahhan, Sinem (Committee member) / Holmes, Jeff (Committee member) / Barrett, The Honors College (Contributor) / Harrington Bioengineering Program (Contributor)
Created2013-05
Description
Electrochemical sensors function by detecting electroactive species at the electrode surface of a screen printed sensor. As more force is applied, the concentration of electroactive species at the surface of the sensor increases and a larger current is measured. Thus, when all conditions including voltage are made constant, as in

Electrochemical sensors function by detecting electroactive species at the electrode surface of a screen printed sensor. As more force is applied, the concentration of electroactive species at the surface of the sensor increases and a larger current is measured. Thus, when all conditions including voltage are made constant, as in Amp i-t, a quantifiable current can be read and the force applied can be calculated. Two common electrochemical techniques in which current is measured, cyclic voltammetry(CV) and amperometric i-t(Amp i-t), were used. A compressible sensor capable of transducing a force and acquiring feedback was created.
ContributorsFeldman, Austin Marc (Author) / LaBelle, Jeffrey (Thesis director) / Pizziconi, Vincent (Committee member) / Santello, Marco (Committee member) / Barrett, The Honors College (Contributor) / Harrington Bioengineering Program (Contributor)
Created2013-05
Description
Misfolding and aggregation of alpha-synuclein (a-syn) has been strongly correlated with the pathogenesis of Parkinson's disease (PD). Reagents such as single chain antibody fragments (scFv) that can interact with specific aggregate forms of a-syn can be very useful to study how different aggregate forms affect cells. Here we utilize two

Misfolding and aggregation of alpha-synuclein (a-syn) has been strongly correlated with the pathogenesis of Parkinson's disease (PD). Reagents such as single chain antibody fragments (scFv) that can interact with specific aggregate forms of a-syn can be very useful to study how different aggregate forms affect cells. Here we utilize two scFvs, D5 and 10H, that recognize two distinct oligomeric forms of a-syn to characterize the presence of different a-syn aggregates in animal models of PD.
ContributorsAlam, Now Bahar (Author) / Sierks, Michael (Thesis director) / Pauken, Christine (Committee member) / Williams, Stephanie (Committee member) / Barrett, The Honors College (Contributor) / Department of Psychology (Contributor) / Harrington Bioengineering Program (Contributor)
Created2013-05
Description
Motor behavior is prone to variable conditions and deviates further in disorders affecting the nervous system. A combination of environmental and neural factors impacts the amount of uncertainty. Although the influence of these factors on estimating endpoint positions have been examined, the role of limb configuration on endpoint variability has

Motor behavior is prone to variable conditions and deviates further in disorders affecting the nervous system. A combination of environmental and neural factors impacts the amount of uncertainty. Although the influence of these factors on estimating endpoint positions have been examined, the role of limb configuration on endpoint variability has been mostly ignored. Characterizing the influence of arm configuration (i.e. intrinsic factors) would allow greater comprehension of sensorimotor integration and assist in interpreting exaggerated movement variability in patients. In this study, subjects were placed in a 3-D virtual reality environment and were asked to move from a starting position to one of three targets in the frontal plane with and without visual feedback of the moving limb. The alternating of visual feedback during trials increased uncertainty between the planning and execution phases. The starting limb configurations, adducted and abducted, were varied in separate blocks. Arm configurations were setup by rotating along the shoulder-hand axis to maintain endpoint position. The investigation hypothesized: 1) patterns of endpoint variability of movements would be dependent upon the starting arm configuration and 2) any differences observed would be more apparent in conditions that withheld visual feedback. The results indicated that there were differences in endpoint variability between arm configurations in both visual conditions, but differences in variability increased when visual feedback was withheld. Overall this suggests that in the presence of visual feedback, planning of movements in 3D space mostly uses coordinates that are arm configuration independent. On the other hand, without visual feedback, planning of movements in 3D space relies substantially on intrinsic coordinates.
ContributorsRahman, Qasim (Author) / Buneo, Christopher (Thesis director) / Helms Tillery, Stephen (Committee member) / Barrett, The Honors College (Contributor) / Harrington Bioengineering Program (Contributor)
Created2014-05
Description

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question

Affective computing allows computers to monitor and influence people’s affects, in other words emotions. Currently, there is a lot of research exploring what can be done with this technology. There are many fields, such as education, healthcare, and marketing, that this technology can transform. However, it is important to question what should be done. There are unique ethical considerations in regards to affective computing that haven't been explored. The purpose of this study is to understand the user’s perspective of affective computing in regards to the Association of Computing Machinery (ACM) Code of Ethics, to ultimately start developing a better understanding of these ethical concerns. For this study, participants were required to watch three different videos and answer a questionnaire, all while wearing an Emotiv EPOC+ EEG headset that measures their emotions. Using the information gathered, the study explores the ethics of affective computing through the user’s perspective.

ContributorsInjejikian, Angelica (Author) / Gonzalez-Sanchez, Javier (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system

Cryptojacking is a process in which a program utilizes a user’s CPU to mine cryptocurrencies unknown to the user. Since cryptojacking is a relatively new problem and its impact is still limited, very little has been done to combat it. Multiple studies have been conducted where a cryptojacking detection system is implemented, but none of these systems have truly solved the problem. This thesis surveys existing studies and provides a classification and evaluation of each detection system with the aim of determining their pros and cons. The result of the evaluation indicates that it might be possible to bypass detection of existing systems by modifying the cryptojacking code. In addition to this classification, I developed an automatic code instrumentation program that replaces specific instructions with functionally similar sequences as a way to show how easy it is to implement simple obfuscation to bypass detection by existing systems.

ContributorsLarson, Kent Merle (Author) / Bazzi, Rida (Thesis director) / Shoshitaishvili, Yan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMarkabawi, Jah (Co-author) / Masud, Abdullah (Co-author) / Lobo, Ian (Co-author) / Koleber, Keith (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a

This paper is centered on the use of generative adversarial networks (GANs) to convert or generate RGB images from grayscale ones. The primary goal is to create sensible and colorful versions of a set of grayscale images by training a discriminator to recognize failed or generated images and training a generator to attempt to satisfy the discriminator. The network design is described in further detail below; however there are several potential issues that arise including the averaging of a color for certain images such that small details in an image are not assigned unique colors leading to a neutral blend. We attempt to mitigate this issue as much as possible.

ContributorsMasud, Abdullah Bin (Co-author) / Koleber, Keith (Co-author) / Lobo, Ian (Co-author) / Markabawi, Jah (Co-author) / Yang, Yingzhen (Thesis director) / Wang, Yancheng (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image,

The NCAA is changing the current rules and regulations around a student-athlete’s name, image, and likeness. Previously, student-athletes were not allowed to participate in business activities or noninstitutional promotional activities. With the new rule changes, student-athletes will be able to engage in business activities related to their own name, image, and likeness. The goal of the team was to help “prepare athletes to understand and properly navigate the evolving restrictions and guidelines around athlete name, image, and likeness”. In order to accomplish this, the team had to understand the problems student-athletes face with these changing rules and regulations. The team conducted basic market research to identify the problem. The problem discovered was the lack of communication between student-athletes and businesses. In order to verify this problem, the team conducted several interviews with Arizona State University Athletic Department personnel. From the interviews, the team identified that the user is the student-athletes and the buyer is the brands and businesses. Once the problem was verified and the user and buyer were identified, a solution that would best fit the customers was formulated. The solution is a platform that assists student-athletes navigate the changing rules of the NCAA by providing access to a marketplace optimized to working with student-athletes and offering an ease of maintaining relationships between student-athletes and businesses. The solution was validated through meetings with interested brands. The team used the business model and market potential to pitch the business idea to the brands. Finally, the team gained traction by initiating company partnerships.

ContributorsSchulte, Brooke (Co-author) / Recato, Bella (Co-author) / Winston, Blake (Co-author) / Byrne, Jared (Thesis director) / Lee, Christopher (Committee member) / Kunowski, Jeffrey (Committee member) / Computer Science and Engineering Program (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

Polymer drug delivery system offers a key to a glaring issue in modern administration routes of drugs and biologics. Poly(lactic-co-glycolic acid) (PLGA) can be used to encapsulate drugs and biologics and deliver them into the patient, which allows high local concentration (compared to current treatment methods), protection of the cargo

Polymer drug delivery system offers a key to a glaring issue in modern administration routes of drugs and biologics. Poly(lactic-co-glycolic acid) (PLGA) can be used to encapsulate drugs and biologics and deliver them into the patient, which allows high local concentration (compared to current treatment methods), protection of the cargo from the bodily environment, and reduction in systemic side effects. This experiment used a single emulsion technique to encapsulate L-tyrosine in PLGA microparticles and UV spectrophotometry to analyze the drug release over a period of one week. The release assay found that for the tested samples, the released amount is distinct initially, but is about the same after 4 days, and they generally follow the same normalized percent released pattern. The experiment could continue with testing more samples, test the same samples for a longer duration, and look into higher w/w concentrations such as 20% or 50%.

ContributorsSeo, Jinpyo (Author) / Vernon, Brent (Thesis director) / Pal, Amrita (Committee member) / Dean, W.P. Carey School of Business (Contributor) / Harrington Bioengineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05