Barrett, The Honors College at Arizona State University proudly showcases the work of undergraduate honors students by sharing this collection exclusively with the ASU community.

Barrett accepts high performing, academically engaged undergraduate students and works with them in collaboration with all of the other academic units at Arizona State University. All Barrett students complete a thesis or creative project which is an opportunity to explore an intellectual interest and produce an original piece of scholarly research. The thesis or creative project is supervised and defended in front of a faculty committee. Students are able to engage with professors who are nationally recognized in their fields and committed to working with honors students. Completing a Barrett thesis or creative project is an opportunity for undergraduate honors students to contribute to the ASU academic community in a meaningful way.

Displaying 1 - 6 of 6
Filtering by

Clear all filters

133782-Thumbnail Image.png
Description
As we already know, fresh water is essential to human life as it sustains and replenishes our bodies. Water sustainability is clearly an important issue that need to be addressed in our world of growing demand and shrinking resources. The ASU Future H2O program seeks to make a difference in

As we already know, fresh water is essential to human life as it sustains and replenishes our bodies. Water sustainability is clearly an important issue that need to be addressed in our world of growing demand and shrinking resources. The ASU Future H2O program seeks to make a difference in the development of water sustainability programs by performing experiments that convert urine into reusable water. The goal is to make reusable water processes become inexpensive and easily accessible to local businesses. This promises a significant environmental impact. In order to make the process of development more efficient we can combine engineering technology with scientific experimentation. As an engineering student and an advocate of water sustainability, I have a chance to design the front-end platform that will use IoT to make the experimental process more accessible and effective. In this paper, I will document the entire process involved in the designing process and what I have learned.
ContributorsTran, Phung Thien (Author) / Boscovic, Dragan (Thesis director) / Boyer, Treavor (Committee member) / School of Earth and Space Exploration (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
Description

Through my work with the Arizona State University Blockchain Research Lab (BRL) and JennyCo, one of the first Healthcare Information (HCI) HIPAA - compliant decentralized exchanges, I have had the opportunity to explore a unique cross-section of some of the most up and coming DLTs including both DAGs and blockchains.

Through my work with the Arizona State University Blockchain Research Lab (BRL) and JennyCo, one of the first Healthcare Information (HCI) HIPAA - compliant decentralized exchanges, I have had the opportunity to explore a unique cross-section of some of the most up and coming DLTs including both DAGs and blockchains. During this research, four major technologies (including JennyCo’s own systems) presented themselves as prime candidates for the comparative analysis of two models for implementing JennyCo’s system architecture for the monetization of healthcare information exchanges (HIEs). These four identified technologies and their underlying mechanisms will be explored thoroughly throughout the course of this paper and are listed with brief definitions as follows: Polygon - “Polygon is a “layer two” or “sidechain” scaling solution that runs alongside the Ethereum blockchain. MATIC is the network’s native cryptocurrency, which is used for fees, staking, and more” [8]. Polygon is the scalable layer involved in the L2SP architecture. Ethereum - “Ethereum is a decentralized blockchain platform that establishes a peer-to-peer network that securely executes and verifies application code, called smart contracts.” [9] This foundational Layer-1 runs thousands of nodes and creates a unique decentralized ecosystem governed by turing complete automated programs. Ethereum is the foundational Layer involved in the L2SP. Constellation - A novel Layer-0 data-centric peer-to-peer network that utilizes the “Hypergraph Transfer Protocol or HGTP, a DLT known as a [DAG] protocol with a novel reputation-based consensus model called Proof of Reputable Observation (PRO). Hypergraph is a feeless decentralized network that supports the transfer of $DAG cryptocurrency.” [10] JennyCo Protocol - Acts as a HIPAA compliant decentralized HIE by allowing consumers, big businesses, and brands to access and exchange user health data on a secure, interoperable, and accessible platform via DLT. The JennyCo Protocol implements utility tokens to reward buyers and sellers for exchanging data. Its protocol nature comes from its DLT implementation which governs the functioning of on-chain actions (e.g. smart contracts). In this case, these actions consist of secure and transparent health data exchange and monetization to reconstitute data ownership to those who generate that data [11]. With the direct experience of working closely with multiple companies behind the technologies listed, I have been exposed to the benefits and deficits of each of these technologies and their corresponding approaches. In this paper, I will use my experience with these technologies and their frameworks to explore two distributed ledger architecture protocols in order to determine the more effective model for implementing JennycCo’s health data exchange. I will begin this paper with an exploration of blockchain and directed acyclic graph (DAG) technologies to better understand their innate architectures and features. I will then move to an in-depth look at layered protocols, and healthcare data in the form of EHRs. Additionally, I will address the main challenges EHRs and HIEs face to present a deeper understanding of the challenges JennyCo is attempting to address. Finally, I will demonstrate my hypothesis: the Hypergraph Transfer Protocol (HGTP) model by Constellation presents significant advantages in scalability, interoperability, and external data security over the Layer-2 Scalability Protocol (L2SP) used by Polygon and Ethereum in implementing the JennyCo protocol. This will be done through a thorough breakdown of each protocol along with an analysis of relevant criteria including but not limited to: security, interoperability, and scalability. In doing so, I hope to determine the best framework for running JennyCo’s HIE Protocol.

ContributorsVan Bussum, Alexander (Author) / Boscovic, Dragan (Thesis director) / Grando, Adela (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
Description
In this paper I defend the argument that public reaction to news headlines correlates with the short-term price direction of Bitcoin. I collected a month's worth of Bitcoin data consisting of news headlines, tweets, and the price of the cryptocurrency. I fed this data into a Long Short-Term Memory Neural

In this paper I defend the argument that public reaction to news headlines correlates with the short-term price direction of Bitcoin. I collected a month's worth of Bitcoin data consisting of news headlines, tweets, and the price of the cryptocurrency. I fed this data into a Long Short-Term Memory Neural Network and built a model that predicted Bitcoin price for a new timeframe. The model correctly predicted 75% of test set price trends on 3.25 hour time intervals. This is higher than the 53.57% accuracy tested with a Bitcoin price model without sentiment data. I concluded public reaction to Bitcoin news headlines has an effect on the short-term price direction of the cryptocurrency. Investors can use my model to help them in their decision-making process when making short-term Bitcoin investment decisions.
ContributorsSteinberg, Sam (Author) / Boscovic, Dragan (Thesis director) / Davulcu, Hasan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131060-Thumbnail Image.png
Description
All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point

All modern multiplayer games are administered by having players connect to a remote server which is used to provide the ground truth for game state and player actions. This use of a central server provides a simple and intuitive way to administer game servers but also provides a single point of failure, as each server must be able to process all actions coming in and make a decision on whether the action is allowed or not, and how to update the game state accordingly. In cases where the server is under significant load, either from a very popular game release or from a deliberate attack, the game slows down or completely crashes. When there is a server action backlog, this can allow malicious actors to perform previously impossible actions. By instead using a decentralized platform, we can build a robust system that allows playing games through a P2P manner, filling in the need for central servers with consensus algorithms that provide the security on the part of a central authority. This project aims to show that a decentralized solution can be used to create a transparent, fully playable game of Monopoly with complex features that would be more scalable, reliable, and cost-effective compared to a centralized solution; meaning that games could be produced that costs pennies to publish and modify, taking seconds to propagate changes globally, and most importantly, cost nothing for upkeep. The codebase is available here: https://github.com/SirNeural/monopoly
ContributorsXu, Yun Hui (Author) / Boscovic, Dragan (Thesis director) / Foy, Joseph (Committee member) / Computer Science and Engineering Program (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
Description
Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended

Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended third party on their behalf. This has great applications for computer networks where certain devices lack sufficient computational power to secure themselves and may rely on trusted and computationally more powerful peers, particularly within edge and fog networks. Although there are multiple proxy digital signature schemas that are circulated within cryptography-centric research papers, a practical software implementation has yet to be created. In this paper we describe Mengde Signatures: the first practical software implementation of proxy digital signatures. We expound upon the current architecture and process for how proxy signatures are implemented and function in a software engineering context. Although applicable to many different types of networks, we showcase the application of Mengde Signatures on an open source Proof-Of-Work Blockchain.
ContributorsMendoza, Francis (Author) / Boscovic, Dragan (Thesis director) / Zhao, Ming (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
164866-Thumbnail Image.png
Description

This project aims to mint NFT's on the Ethereum blockchain with upgraded functionality. This functionality helps user verifiability and increases a user's control over their NFT.

ContributorsHoppe, Aidan (Author) / Boscovic, Dragan (Thesis director) / Pesic, Sasa (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05