Barrett, The Honors College at Arizona State University proudly showcases the work of undergraduate honors students by sharing this collection exclusively with the ASU community.

Barrett accepts high performing, academically engaged undergraduate students and works with them in collaboration with all of the other academic units at Arizona State University. All Barrett students complete a thesis or creative project which is an opportunity to explore an intellectual interest and produce an original piece of scholarly research. The thesis or creative project is supervised and defended in front of a faculty committee. Students are able to engage with professors who are nationally recognized in their fields and committed to working with honors students. Completing a Barrett thesis or creative project is an opportunity for undergraduate honors students to contribute to the ASU academic community in a meaningful way.

Displaying 1 - 10 of 92
Filtering by

Clear all filters

166415-Thumbnail Image.png
Description

Social injustice issues are a familiar, yet very arduous topic to define. This is because they are difficult to predict and tough to understand. Injustice issues negatively affect communities because they directly violate human rights and they span a wide range of areas. For instance, injustice issues can relate to

Social injustice issues are a familiar, yet very arduous topic to define. This is because they are difficult to predict and tough to understand. Injustice issues negatively affect communities because they directly violate human rights and they span a wide range of areas. For instance, injustice issues can relate to unfair labor practices, racism, gender bias, politics etc. This leaves numerous individuals wondering how they can make sense of social injustice issues and perhaps take efforts to stop them from occurring in the future. In an attempt to understand the rather complicated nature of social injustice, this thesis takes a data driven approach to define a social injustice index for a specific country, India. The thesis is an attempt to quantify and track social injustice through social media to see the current social climate. This was accomplished by developing a web scraper to collect hate speech data from Twitter. The tweets collected were then classified by their level of hate and presented on a choropleth map of India. Ultimately, a user viewing the ‘India Social Injustice Index’ map should be able to simply view an index score for a desired state in India through a single click. This thesis hopes to make it simple for any user viewing the social injustice map to make better sense of injustice issues.

ContributorsDeosthali, Shefali (Author) / Chavez-Echeagaray, Maria Elena (Thesis director) / Mathews, Nicolle (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
162272-Thumbnail Image.png
Description

The pandemic that hit in 2020 has boosted the growth of online learning that involves the booming of Massive Open Online Course (MOOC). To support this situation, it will be helpful to have tools that can help students in choosing between the different courses and can help instructors to understand

The pandemic that hit in 2020 has boosted the growth of online learning that involves the booming of Massive Open Online Course (MOOC). To support this situation, it will be helpful to have tools that can help students in choosing between the different courses and can help instructors to understand what the students need. One of those tools is an online course ratings predictor. Using the predictor, online course instructors can learn the qualities that majority course takers deem as important, and thus they can adjust their lesson plans to fit those qualities. Meanwhile, students will be able to use it to help them in choosing the course to take by comparing the ratings. This research aims to find the best way to predict the rating of online courses using machine learning (ML). To create the ML model, different combinations of the length of the course, the number of materials it contains, the price of the course, the number of students taking the course, the course’s difficulty level, the usage of jargons or technical terms in the course description, the course’s instructors’ rating, the number of reviews the instructors got, and the number of classes the instructors have created on the same platform are used as the inputs. Meanwhile, the output of the model would be the average rating of a course. Data from 350 courses are used for this model, where 280 of them are used for training, 35 for testing, and the last 35 for validation. After trying out different machine learning models, wide neural networks model constantly gives the best training results while the medium tree model gives the best testing results. However, further research needs to be conducted as none of the results are not accurate, with 0.51 R-squared test result for the tree model.

ContributorsWidodo, Herlina (Author) / VanLehn, Kurt (Thesis director) / Craig, Scotty (Committee member) / Barrett, The Honors College (Contributor) / Department of Management and Entrepreneurship (Contributor) / Computer Science and Engineering Program (Contributor)
Created2021-12
162277-Thumbnail Image.png
Description

This creative project is a short story in the Gothic genre followed by an explanation of certain literary elements and decisions. The Gothic genre often explores supernatural and uncomfortable topics that can challenge the reader’s perception and understanding of the world. Through this means of storytelling, authors are given the

This creative project is a short story in the Gothic genre followed by an explanation of certain literary elements and decisions. The Gothic genre often explores supernatural and uncomfortable topics that can challenge the reader’s perception and understanding of the world. Through this means of storytelling, authors are given the opportunity to connect the supernatural with complex and sensitive topics that may be difficult or even taboo to speak about in certain locations and time periods. In this thesis, I embrace the traditions of the Gothic-genre with a story that focuses on the issues prevalent today. The years 2020 and 2021 have been unprecedented times for humanity. Technology continues to grow at an alarming rate, suicide rates of young people have been on the rise for years, and a global pandemic has people adapting to all new ways of living. During these ever changing times, it is the Gothic that may provide guidance through these uncertainties by shedding light on the problems that will plague humanity both today and tomorrow. The story follows an outcast from society who aids in the creation of a divine monster, and the consequences that follow.

ContributorsFleming, Matthew (Author) / Fette, Donald (Thesis director) / Hoyt, Heather (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2021-12
164650-Thumbnail Image.png
Description
As record heatwaves are being seen across the globe, new tools are needed to support urban planners when considering infrastructure additions. This project focuses on developing an interactive web interface that evaluates the effectiveness of various shade structures based on certain parameters. The interface requests user input for location, date,

As record heatwaves are being seen across the globe, new tools are needed to support urban planners when considering infrastructure additions. This project focuses on developing an interactive web interface that evaluates the effectiveness of various shade structures based on certain parameters. The interface requests user input for location, date, and shade type, then returns information on sun position, weather data, and hourly mean radiant temperature (MRT). This tool will allow urban city planners to create more efficient and effective shade structures to meet the public’s needs.
ContributorsMuir, Maya (Author) / Maciejewski, Ross (Thesis director) / Middel, Ariane (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2022-05
166652-Thumbnail Image.png
Description
Adaptive capacity to climate change is the ability of a system to mitigate or take advantage of climate change effects. Research on adaptive capacity to climate change suffers fragmentation. This is partly because there is no clear consensus around precise definitions of adaptive capacity. The aim of this thesis is

Adaptive capacity to climate change is the ability of a system to mitigate or take advantage of climate change effects. Research on adaptive capacity to climate change suffers fragmentation. This is partly because there is no clear consensus around precise definitions of adaptive capacity. The aim of this thesis is to place definitions of adaptive capacity into a formal framework. I formalize adaptive capacity as a computational model written in the Idris 2 programming language. The model uses types to constrain how the elements of the model fit together. To achieve this, I analyze nine existing definitions of adaptive capacity. The focus of the analysis was on important factors that affect definitions and shared elements of the definitions. The model is able to describe an adaptive capacity study and guide a user toward concepts lacking clarity in the study. This shows that the model is useful as a tool to think about adaptive capacity. In the future, one could refine the model by forming an ontology for adaptive capacity. One could also review the literature more systematically. Finally, one might consider turning to qualitative research methods for reviewing the literature.
ContributorsManuel, Jason (Author) / Bazzi, Rida (Thesis director) / Pavlic, Theodore (Committee member) / Middel, Ariane (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description
In this work, we explore the potential for realistic and accurate generation of hourly traffic volume with machine learning (ML), using the ground-truth data of Manhattan road segments collected by the New York State Department of Transportation (NYSDOT). Specifically, we address the following question– can we develop a ML algorithm

In this work, we explore the potential for realistic and accurate generation of hourly traffic volume with machine learning (ML), using the ground-truth data of Manhattan road segments collected by the New York State Department of Transportation (NYSDOT). Specifically, we address the following question– can we develop a ML algorithm that generalizes the existing NYSDOT data to all road segments in Manhattan?– by introducing a supervised learning task of multi-output regression, where ML algorithms use road segment attributes to predict hourly traffic volume. We consider four ML algorithms– K-Nearest Neighbors, Decision Tree, Random Forest, and Neural Network– and hyperparameter tune by evaluating the performances of each algorithm with 10-fold cross validation. Ultimately, we conclude that neural networks are the best-performing models and require the least amount of testing time. Lastly, we provide insight into the quantification of “trustworthiness” in a model, followed by brief discussions on interpreting model performance, suggesting potential project improvements, and identifying the biggest takeaways. Overall, we hope our work can serve as an effective baseline for realistic traffic volume generation, and open new directions in the processes of supervised dataset generation and ML algorithm design.
ContributorsOtstot, Kyle (Author) / De Luca, Gennaro (Thesis director) / Chen, Yinong (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
166188-Thumbnail Image.png
Description
Data breaches and software vulnerabilities are increasingly severe problems that incur both monetary and reputational costs for companies as well as societal impacts. While companies have clear monetary and legal incentives to mitigate risk of data breaches, companies have significantly less incentive to mitigate software product vulnerabilities, and their existing

Data breaches and software vulnerabilities are increasingly severe problems that incur both monetary and reputational costs for companies as well as societal impacts. While companies have clear monetary and legal incentives to mitigate risk of data breaches, companies have significantly less incentive to mitigate software product vulnerabilities, and their existing incentive is widely considered insufficient. In this thesis, I initially set out to perform a statistical analysis correlating company characteristics and behavior with the characteristics of the data breaches they suffer, as well as performing a metaanalysis of existing literature. While the attempted statistical analysis was hindered by lack of sufficiently comprehensive free company datasets, I have recorded my efforts in finding suitable databases. I have also performed an exploratory literature review of 15 papers in the field of improving cybersecurity, and identified four blockers to security addressed and three elements of solutions proposed by the papers, as well as derived insights from the distribution of these blockers and elements of solutions in the papers reviewed.
ContributorsMac, Anthony (Author) / Bazzi, Rida (Thesis director) / Shoshitaishvili, Yan (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
165522-Thumbnail Image.png
Description
Now that home security systems are readily available at a low cost, these systems are commonly being installed to watch over homes and loved ones. These systems are fairly easy to install and can provide 4k Ultra HD resolution. The user can configure the sensitivity and areas to monitor and

Now that home security systems are readily available at a low cost, these systems are commonly being installed to watch over homes and loved ones. These systems are fairly easy to install and can provide 4k Ultra HD resolution. The user can configure the sensitivity and areas to monitor and receive object detection notifications. Unfortunately, once the customer starts to use the system, they often find that the notifications are overwhelming and soon turn them off. After hearing the same experience from multiple friends and family I thought it would be a good topic for my thesis. I examined a top selling security system sold at a bulk retail store and have implemented improved detection techniques that advance object detection and reduce false notifications. The additional algorithms will support the processing of both near real-time streams and saved video file processing, which existing security systems do not include.
ContributorsBustillos, Adriana (Author) / Meuth, Ryan (Thesis director) / Nakamura, Mutsumi (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
164346-Thumbnail Image.png
Description

Th NTRU cryptosystem is a lattice-based encryption scheme. Several parameters determine the speed, size, correctness rate and security of the algorithm. These parameters need to be carefully selected for the algorithm to function correctly. This thesis includes a short overview of the NTRU algorithm and its mathematical background before discussing

Th NTRU cryptosystem is a lattice-based encryption scheme. Several parameters determine the speed, size, correctness rate and security of the algorithm. These parameters need to be carefully selected for the algorithm to function correctly. This thesis includes a short overview of the NTRU algorithm and its mathematical background before discussing the results of experimentally testing various different parameter sets for NTRU and determining the effect that different relationships between these parameters have on the overall effectiveness of NTRU.

ContributorsPeterson, Steven (Author) / Jones, John (Thesis director) / Sprung, Florian (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2022-05
165121-Thumbnail Image.png
Description

This paper addresses echo chambers, an online phenomena wherein social media users can "only hear their own voice". In this paper I will examine the history and recent proliferation of online echo chambers. I will outline a comprehensive theory of echo chamber generation and maintenance, intended for educational value. I

This paper addresses echo chambers, an online phenomena wherein social media users can "only hear their own voice". In this paper I will examine the history and recent proliferation of online echo chambers. I will outline a comprehensive theory of echo chamber generation and maintenance, intended for educational value. I then conduct my own experiment based on previous echo chamber detection work.

ContributorsFinnegan, Colin (Author) / Liu, Huan (Thesis director) / Alatawi, Faisal (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05