Barrett, The Honors College at Arizona State University proudly showcases the work of undergraduate honors students by sharing this collection exclusively with the ASU community.

Barrett accepts high performing, academically engaged undergraduate students and works with them in collaboration with all of the other academic units at Arizona State University. All Barrett students complete a thesis or creative project which is an opportunity to explore an intellectual interest and produce an original piece of scholarly research. The thesis or creative project is supervised and defended in front of a faculty committee. Students are able to engage with professors who are nationally recognized in their fields and committed to working with honors students. Completing a Barrett thesis or creative project is an opportunity for undergraduate honors students to contribute to the ASU academic community in a meaningful way.

Displaying 1 - 10 of 38
133370-Thumbnail Image.png
Description
The focus of human decomposition studies has traditionally been on how external factors affect the decomposition of a body. There is much less literature on how the decomposition of a human cadaver affects its local ecosystem. This study attempts to address the knowledge gap in current literature regarding how the

The focus of human decomposition studies has traditionally been on how external factors affect the decomposition of a body. There is much less literature on how the decomposition of a human cadaver affects its local ecosystem. This study attempts to address the knowledge gap in current literature regarding how the decomposition of human cadavers affects the bioavailability of essential plant nutrients (P, K, Ca, Fe, C and N) as well as toxins (As and Pb) in soil. By studying the bioavailability of plant nutrients, especially nitrogen, and toxins, this research hopes to inform new technologies and techniques for locating clandestine gravesites. The objectives of this study were twofold: 1) determine whether soils exposed to cadaveric decomposition can be visually distinguished from one another via macroscopic and microscopic observation and 2) observe general changes in nutrient and toxic element bioavailability and changes in carbon and nitrogen isotope ratios over time as well as spatially across a body. Visual analyses of soil samples, both macro- and microscopically did not show potential in distinguishing soil exposed to cadaver decomposition from unexposed soil. Relative bioavailability as well as overall bioavailable concentrations of both plant nutrients and toxins were highly elevated after 12 months. Toxins, such as As and Pb, tended to have greater bioavailable concentrations at the near-torso positions, though no consistent spatial trends between nutrient bioavailable concentrations were observed between the three individuals. Nitrogen concentrations and nitrogen isotope (δ15N) ratios show strong potential as markers of clandestine graves throughout the study period. While this research demonstrates further need to uncover what factors influence bioavailability of elements in gravesoil, it shows that the bioavailability of plant nutrients and toxins as well as δ15N ratios are greatly affected by cadaver decomposition, and emerging technologies in gravesite detection based on plant or soil changes have a solid foundation.
ContributorsAnderson, Sara Rae (Author) / Kobojek, Kimberly (Thesis director) / Gordon, Gwyneth (Committee member) / School of Mathematical and Natural Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131520-Thumbnail Image.png
Description
A lab protocol was created in order to introduce arson evidence analysis to students. The procedures dictate a thorough introduction from evidence handling procedures to analysis of common accelerant mass spectrum. The objectives of the lab protocol included classifying and describing various pieces of arson evidence and common accelerants as

A lab protocol was created in order to introduce arson evidence analysis to students. The procedures dictate a thorough introduction from evidence handling procedures to analysis of common accelerant mass spectrum. The objectives of the lab protocol included classifying and describing various pieces of arson evidence and common accelerants as well as synthesizing information about accelerant composition to interpret GC-MS data output. This would allow the student to experience first-hand what the subsection of arson analysis has to offer in the field of forensic science which could help the student decide on more specialties to study later on. I was unable to run the lab protocol in a laboratory setting, therefore in the future I want to use the lab protocol and receive feedback in order to improve the protocol so the student is receiving the best possible learning outcomes. The experience of creating a lab protocol in forensic science gave myself a greater understanding of what goes on behind an academic learning procedure and more insight on arson evidence analysis.
Created2020-05
Description
This project's goal was to design a Central Processing Unit (CPU) incorporating a fairly large instruction set and a multistage pipeline design with the potential to be used in a multi-core system. The CPU was coded and synthesized with Verilog. This was accomplished by building on the CPU design from

This project's goal was to design a Central Processing Unit (CPU) incorporating a fairly large instruction set and a multistage pipeline design with the potential to be used in a multi-core system. The CPU was coded and synthesized with Verilog. This was accomplished by building on the CPU design from fundamentals learned in CSE320 and increasing the instruction set to resemble a proper Reduced Instruction Set Computing (RISC) CPU system. A multistage pipeline was incorporated to the CPU to increase instruction throughput, or instructions per second. A major area of focus was on creating a multi-core design. The design used is master-slave in nature. The master core instructs the sub-cores where they should begin execution, the idea being that the operating system or kernel will be executing on the master core and the "user space" programs will be run on the sub-cores. The rationale behind this is that the system would specialize in running several small functions on all of its many supported cores. The system supports around 45 instructions, which include several types of jumps and branches (for changing the program counter based on conditions), arithmetic operations (addition, subtraction, or, and, etc.), and system calls (for controlling the core execution). The system has a very low Clocks per Instruction ratio (CPI), but to achieve this the second stage contains several modules and would most likely be a bottleneck for performance if implemented. The CPU is not perfect and contains a few errors and oversights, but the system as a whole functions as intended.
ContributorsKolden, Brian Andrew (Author) / Burger, Kevin (Thesis director) / Meuth, Ryan (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
135657-Thumbnail Image.png
Description
Bloodstain pattern analysis can provide telling evidence from a crime scene based on the clues left in the blood, but the field itself is highly problematic since the evidence extracted is dependent upon the interpretation of the analyst. Although some aspects of this type of analysis have been scientifically supported,

Bloodstain pattern analysis can provide telling evidence from a crime scene based on the clues left in the blood, but the field itself is highly problematic since the evidence extracted is dependent upon the interpretation of the analyst. Although some aspects of this type of analysis have been scientifically supported, most are not seen as positively accurate. Since certainty is the basis for acceptance of courtroom testimony, it is important that these unsettled aspects become more understood. This experiment examines the diameter of a weapon and how it affects its cast-off pattern. Weapons with four different diameters were used to generate 5 sample patterns under controlled conditions from each weapon diameter for a total of 20 patterns consisting of 3,367 droplets. The length and width of the pattern, the total number of droplets in the pattern, and the percentage of each droplet type (classified into low-velocity, medium-velocity, and high-velocity droplets) were recorded, averaged, and compared to each other individually using a t-test difference of two means assuming unequal variances. The results reveal that a higher percentage of droplets greater than 4 mm may indicate the use of a weapon with a wider diameter. The data also shows differences between the weapons that may be related to other factors besides the diameter of the weapon such as surface area or the curvature of the weapon. Still, more testing must be conducted to support these theories.
ContributorsBetz, Alexandra Marie (Author) / Kobojek, Kimberly (Thesis director) / Jacobson, David (Committee member) / School of Humanities, Arts, and Cultural Studies (Contributor) / School of Mathematical and Natural Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
136637-Thumbnail Image.png
Description
The purpose of this project was to construct and write code for a vehicle to take advantage of the benefits of combining stepper motors with mecanum wheels. This process involved building the physical vehicle, designing a custom PCB for the vehicle, writing code for the onboard microprocessor, and implementing motor

The purpose of this project was to construct and write code for a vehicle to take advantage of the benefits of combining stepper motors with mecanum wheels. This process involved building the physical vehicle, designing a custom PCB for the vehicle, writing code for the onboard microprocessor, and implementing motor control algorithms.
ContributorsDavis, Severin Jan (Author) / Burger, Kevin (Thesis director) / Vannoni, Greg (Committee member) / Barrett, The Honors College (Contributor) / School of International Letters and Cultures (Contributor) / Computer Science and Engineering Program (Contributor)
Created2015-05
136728-Thumbnail Image.png
Description
This project was centered around designing a processor model (using the C programming language) based on the Coldfire computer architecture that will run on third party software known as Open Virtual Platforms. The end goal is to have a fully functional processor that can run Coldfire instructions and utilize peripheral

This project was centered around designing a processor model (using the C programming language) based on the Coldfire computer architecture that will run on third party software known as Open Virtual Platforms. The end goal is to have a fully functional processor that can run Coldfire instructions and utilize peripheral devices in the same way as the hardware used in the embedded systems lab at ASU. This project would cut down the substantial amount of time students spend commuting to the lab. Having the processor directly at their disposal would also encourage them to spend more time outside of class learning the hardware and familiarizing themselves with development on an embedded micro-controller. The model will be accurate, fast and reliable. These aspects will be achieved through rigorous unit testing and use of the OVP platform which provides instruction accurate simulations at hundreds of MIPS (million instructions per second) for the specified model. The end product was able to accurately simulate a subset of the Coldfire instructions at very high rates.
ContributorsDunning, David Connor (Author) / Burger, Kevin (Thesis director) / Meuth, Ryan (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-12
136364-Thumbnail Image.png
Description
The purpose of this project was to program a Raspberry Pi to be able to play music from both local storage on the Pi and from internet radio stations such as Pandora. The Pi also needs to be able to play various types of file formats, such as mp3 and

The purpose of this project was to program a Raspberry Pi to be able to play music from both local storage on the Pi and from internet radio stations such as Pandora. The Pi also needs to be able to play various types of file formats, such as mp3 and FLAC. Finally, the project is also to be driven by a mobile app running on a smartphone or tablet. To achieve this, a client server design was employed where the Raspberry Pi acts as the server and the mobile app is the client. The server functionality was achieved using a Python script that listens on a socket and calls various executables that handle the different formats of music being played. The client functionality was achieved by programming an Android app in Java that sends encoded commands to the server, which the server decodes and begins playing the music that command dictates. The designs for both the client and server are easily extensible and allow for any future modifications to the project to be easily made.
ContributorsStorto, Michael Olson (Author) / Burger, Kevin (Thesis director) / Meuth, Ryan (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2015-05
133713-Thumbnail Image.png
Description
Marine conservation faces the unique challenge of trying to assess and protect species, like sharks, that have long migration tracks and are often targeted by fishing vessels in open and international waters. Over the last two decades, several large predatory shark populations have been greatly depleted despite local and international

Marine conservation faces the unique challenge of trying to assess and protect species, like sharks, that have long migration tracks and are often targeted by fishing vessels in open and international waters. Over the last two decades, several large predatory shark populations have been greatly depleted despite local and international organizations designed to help regulate and prevent predator removal to avoid disturbing the food web those sharks balance (Myers, Baum, Shepherd, Powers, & Peterson, 2007). Forensic science is a powerful tool that could give shark conservation efforts an edge on identifying shark species currently being targeted by unsustainable fisheries in international waters. Allowing offenders who break international conservation laws to be prosecuted for their crimes. Unfortunately, this unique and powerful tool has not been given the opportunity to be utilized as it should be. An overview of national and international agencies, organizations, and laws disclosed a strong foundation for wildlife conservation. However, current international organizations and laws that govern international waters leave much to be desired in regards to protecting shark species that are threatened due to being popular targets for fishing vessels. This paper examines the level of forensic science involvement in shark conservation efforts through a literature review, revealing a severe lack of real-life application of forensic science to marine conservation cases. Current issues that marine wildlife forensic science encounters while attempting to increase forensic capability. And finally, presenting proposals for the future, and new challenges, which aim to strengthen the relationship between forensic science and marine conservation.
ContributorsParker, Jamie Caitlin (Author) / Kobojek, Kimberly (Thesis director) / Polidoro, Beth (Committee member) / School of Mathematical and Natural Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133871-Thumbnail Image.png
Description
As human beings we go through the world interpreting – seeing a situation, gathering context, and making a decision on the meaning of the thing we just experienced. The philosopher Martin Heidegger calls this way of being hermeneutics – a practice of interpretation. This method of approach does not ignore

As human beings we go through the world interpreting – seeing a situation, gathering context, and making a decision on the meaning of the thing we just experienced. The philosopher Martin Heidegger calls this way of being hermeneutics – a practice of interpretation. This method of approach does not ignore a person’s bias, instead bias is highlighted, understood, and possibly even overcome. In the following pages the basic definition and process of hermeneutics will be discussed. Leading into the difference between calculative and meditative thought – scientific and philosophical – in order to later discuss the possibility and need to merge the two in the field of Forensic Science. Forensic Scientist uses hermeneutic thought by way of merging calculative and meditative thinking. In order to support this claim artistic renderings of ‘the pieces of an unknowable whole’ were created to literally illustrate this truth.
Forensic science is tasked with using calculative thinking with scientifically accepted methods of measurement and detection as well as the meditative task of applying their data to messy, real-world events. In order to support my supposition of forensic scientists being hermeneutical workers, three paintings were created. The three paintings can be considered a tryptic of sorts due to the context in which they are presented: forensic science. They each tell a story that is weaved within each other – spatter indicating violence long past, the empty void of a body gone, and the cold decomposition of a victim found. It is the forensic scientist that must interpret each piece separately and is tasked with finding how and why they are put together. The hermeneutical work of the forensic scientist interpreting a crime scene uses the same methods as one who interprets text. A forensic scientist opens possibilities of meaning in the same way that Martin Heidegger’s hermeneutic circle does. There is interplay between the interpreter (the forensic scientist) and the text (the crime scene), questions are formed (what happened here?) and responses are made (evidence found at the scene). This question and response outlook is what make the forensic scientist a hermeneutic thinker.
ContributorsCraig, Catherine Anne (Author) / Kobojek, Kimberly (Thesis director) / Watrous, Lisa (Committee member) / School of Mathematical and Natural Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
137216-Thumbnail Image.png
Description
Image stabilization is a highly desired feature for many systems involving cameras. A camera stabilizer effectively prevents or compensates for unwanted camera movement to provide this stabilization. The use of stabilized camera technology on board aerial vehicles is one such application where the stabilization can greatly improve the overall capability

Image stabilization is a highly desired feature for many systems involving cameras. A camera stabilizer effectively prevents or compensates for unwanted camera movement to provide this stabilization. The use of stabilized camera technology on board aerial vehicles is one such application where the stabilization can greatly improve the overall capability of the system. The requirements for such a system include a continuous control algorithm and hardware to determine and adjust the camera orientation. The topic of developing an aerial camera control and electronic stabilization system is thus explored in the contents of this paper.
ContributorsJauregui, Joseph (Co-author) / Brown, Steven (Co-author) / Burger, Kevin (Thesis director) / Hansen, Mark (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05