Barrett, The Honors College Thesis/Creative Project Collection

Permanent Link Feedback

Contributor
Date Range
2013 2017

Malware forensics is a time-consuming process that involves a significant amount of data collection. To ease the load on security analysts, many attempts have been made to automate the intelligence gathering process and provide a centralized search interface. Certain of these solutions map existing relations between threats and can discover new intelligence by identifying correlations in the data. However, such systems generally treat each unique malware sample as its own distinct threat. This fails to model the real malware landscape, in which so many ``new" samples are actually variants of samples that have already been discovered. Were there some way ...

Contributors
Smith, Joshua Michael, Ahn, Gail-Joon, Zhao, Ziming, et al.
Created Date
2017-05

The goal of this research study was to empirically study the effects of a project based learning activity. The effectiveness of this study was benchmarked according to two results: the effectiveness in communicating the scope and impact of engineering, and the effectiveness in increasing interest in computer systems engineering (CSE). This research report presents an analysis of the effects of making engineering education socially relevant, interesting and accessible. High school students participated in a learning experience in which they designed flood evacuation systems that could warn a city of incoming floods. Both pre-assessments and post-assessments were implemented to capture students’ ...

Contributors
Ridhwaan, Syed, Ganesh, Tirupalavanam, Shrake, Scott, et al.
Created Date
2017-05

Malware that perform identity theft or steal bank credentials are becoming increasingly common and can cause millions of dollars of damage annually. A large area of research focus is the automated detection and removal of such malware, due to their large impact on millions of people each year. Such a detector will be beneficial to any industry that is regularly the target of malware, such as the financial sector. Typical detection approaches such as those found in commercial anti-malware software include signature-based scanning, in which malware executables are identified based on a unique signature or fingerprint developed for that malware. ...

Contributors
Anwar, Sajid, Chan, Tsz, Ahn, Gail-Joon, et al.
Created Date
2016-05

Computer Science and Dance are choice driven disciplines. The output of their processes are compositions of experience. Dancers are not computers and computers are not people but there are comparable traces of humanity in the way each interpret and interact with their respective inputs, outputs, and environments. These overlaps are perhaps not obvious, but in an increasingly specialized world it is important to discuss them. Dynamic Programming and improvisational movement exist within exclusive corners of their respective fields and are characterized by their inherent adaption to change. Inspired by the work of Ivar Hagendoorn, John Cage and other interdisciplinary artists, ...

Contributors
Ohlsen, Lai Yi Ni, Britt, Melissa, Crissman, Angel, et al.
Created Date
2016-05

In the area of hardware, reverse engineering was traditionally focused on developing clones—duplicated components that performed the same functionality of the original component. While reverse engineering techniques have been applied to software, these techniques have instead focused on understanding high-level software designs to ease the software maintenance burden. This approach works well for traditional applications that contain source code, however, there are circumstances, particularly regarding web applications, where it would be very beneficial to clone a web application and no source code is present, e.g., for security testing of the application or for offline mock testing of a third-party web ...

Contributors
Liao, Kevin, Doupe, Adam, Ahn, Gail-Joon, et al.
Created Date
2017-05

Twitter, the microblogging platform, has grown in prominence to the point that the topics that trend on the network are often the subject of the news and other traditional media. By predicting trends on Twitter, it could be possible to predict the next major topic of interest to the public. With this motivation, this paper develops a model for trends leveraging previous work with k-nearest-neighbors and dynamic time warping. The development of this model provides insight into the length and features of trends, and successfully generalizes to identify 74.3% of trends in the time period of interest. The model developed ...

Contributors
Marshall, Grant A, Liu, Huan, Morstatter, Fred, et al.
Created Date
2015-05

This paper explores how US Cold War nuclear testing in the Pacific Islands has been approached in three different regions –affected Pacific Islands, the US, and Japan. Because the US has failed to adequately address its nuclear past in the Pacific Islands, and Pacific Islander narratives struggle to reach the international community on their own, my study considers the possibility of Pacific Islanders finding greater outlet for their perspectives within dominant Japanese narratives, which also feature nuclear memory. Whereas the US government has remained largely evasive and aloof about the consequences of its nuclear testing in the Pacific, Japan encourages ...

Contributors
Hinze, Rie Victoria, Benkert, Volker, Moore, Aaron, et al.
Created Date
2015-12

Web-application development constantly changes – new programming languages, testing tools and programming methodologies are often proposed. The focus of this project is on the tool Selenium and the fairly new technique known as High Volume Automated Testing (HVAT). Both of these techniques were used to test the Just-in-Time Teaching and Learning Classroom Management System software. Selenium was used with a black-box testing technique and HVAT was employed in a white-box testing technique. Two of the major functionalities of this software were examined, which include the login and the professor functionality. The results of the black-box testing technique showed parts of ...

Contributors
Ejaz, Samira, Balasooriya, Janaka, Nakamura, Mutsumi, et al.
Created Date
2013-05

The ability to profile proteins allows us to gain a deeper understanding of organization, regulation, and function of different biological systems. Many technologies are currently being used in order to accurately perform the protein profiling. Some of these technologies include mass spectrometry, microarray based analysis, and fluorescence microscopy. Deeper analysis of these technologies have demonstrated limitations which have taken away from either the efficiency or the accuracy of the results. The objective of this project was to develop a technology in which highly multiplexed single cell in situ protein analysis can be completed in a comprehensive manner without the loss ...

Contributors
Gupta, Aakriti, Guo, Jia, Liang, Jianming, et al.
Created Date
2016-12

A fundamental component of Transhumanism, radical life extension is the process of utilizing ever increasing technologies to further extend the average life span of humans. This iterative process has continued to increase in speed since the digital age. As society develops a larger knowledge base, and scientific fields combine their knowledge bases, the capability of medical professionals continues to increase at an exponential rate. Through an understanding of these technological trends the social, legal, logistical and economic implications can be better understood. Scenarios can be used to better categorize these implications based on the evolution of these technologies. By considering ...

Contributors
Lightholder, Jack Anthony, Braden, Allenby, Brian, Jennifer, et al.
Created Date
2015-05

Barrett, the Honors College accepts high performing, academically engaged students and works with them in collaboration with all of the other academic units at Arizona State University. All Barrett students complete a thesis or creative project, supervised and defended in front of a faculty committee. The thesis or creative project allows students to explore an intellectual interest and produce an original piece of scholarly research. The thesis or creative project is a student’s opportunity to explore areas of academic interest with greater intensity than is possible in a single course. It is also an opportunity to engage with professors, nationally recognized in their fields and specifically interested and committed to working with honors students. This work provides tangible evidence of a student’s research, writing and creative skills to graduate schools and/or prospective employers.