This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 70
152255-Thumbnail Image.png
Description
Many manmade chemicals used in consumer products are ultimately washed down the drain and are collected in municipal sewers. Efficient chemical monitoring at wastewater treatment (WWT) plants thus may provide up-to-date information on chemical usage rates for epidemiological assessments. The objective of the present study was to extrapolate this concept,

Many manmade chemicals used in consumer products are ultimately washed down the drain and are collected in municipal sewers. Efficient chemical monitoring at wastewater treatment (WWT) plants thus may provide up-to-date information on chemical usage rates for epidemiological assessments. The objective of the present study was to extrapolate this concept, termed 'sewage epidemiology', to include municipal sewage sludge (MSS) in identifying and prioritizing contaminants of emerging concern (CECs). To test this the following specific aims were defined: i) to screen and identify CECs in nationally representative samples of MSS and to provide nationwide inventories of CECs in U.S. MSS; ii) to investigate the fate and persistence in MSS-amended soils, of sludge-borne hydrophobic CECs; and iii) to develop an analytical tool relying on contaminant levels in MSS as an indicator for identifying and prioritizing hydrophobic CECs. Chemicals that are primarily discharged to the sewage systems (alkylphenol surfactants) and widespread persistent organohalogen pollutants (perfluorochemicals and brominated flame retardants) were analyzed in nationally representative MSS samples. A meta-analysis showed that CECs contribute about 0.04-0.15% to the total dry mass of MSS, a mass equivalent of 2,700-7,900 metric tonnes of chemicals annually. An analysis of archived mesocoms from a sludge weathering study showed that 64 CECs persisted in MSS/soil mixtures over the course of the experiment, with half-lives ranging between 224 and >990 days; these results suggest an inherent persistence of CECs that accumulate in MSS. A comparison of the spectrum of chemicals (n=52) analyzed in nationally representative biological specimens from humans and MSS revealed 70% overlap. This observed co-occurrence of contaminants in both matrices suggests that MSS may serve as an indicator for ongoing human exposures and body burdens of pollutants in humans. In conclusion, I posit that this novel approach in sewage epidemiology may serve to pre-screen and prioritize the several thousands of known or suspected CECs to identify those that are most prone to pose a risk to human health and the environment.
ContributorsVenkatesan, Arjunkrishna (Author) / Halden, Rolf U. (Thesis advisor) / Westerhoff, Paul (Committee member) / Fox, Peter (Committee member) / Arizona State University (Publisher)
Created2013
151653-Thumbnail Image.png
Description
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling

Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the non-monotonic nature of the ASP semantics, such enhancements turned out to be non-trivial and the existing extensions are not fully satisfactory. We observe that one main reason for the difficulties rooted in the propositional semantics of ASP, which is limited in handling first-order constructs (such as aggregates and ontologies) and functions (such as constraint variables in CP and SMT) in natural ways. This dissertation presents a unifying view on these extensions by viewing them as instances of formulas with generalized quantifiers and intensional functions. We extend the first-order stable model semantics by by Ferraris, Lee, and Lifschitz to allow generalized quantifiers, which cover aggregate, DL-atoms, constraints and SMT theory atoms as special cases. Using this unifying framework, we study and relate different extensions of ASP. We also present a tight integration of ASP with SMT, based on which we enhance action language C+ to handle reasoning about continuous changes. Our framework yields a systematic approach to study and extend non-monotonic languages.
ContributorsMeng, Yunsong (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Fainekos, Georgios (Committee member) / Lifschitz, Vladimir (Committee member) / Arizona State University (Publisher)
Created2013
151362-Thumbnail Image.png
Description
Urban water systems face sustainability challenges ranging from water quality, leaks, over-use, energy consumption, and long-term supply concerns. Resiliency challenges include the capacity to respond to drought, managing pipe deterioration, responding to natural disasters, and preventing terrorism. One strategy to enhance sustainability and resiliency is the development and adoption of

Urban water systems face sustainability challenges ranging from water quality, leaks, over-use, energy consumption, and long-term supply concerns. Resiliency challenges include the capacity to respond to drought, managing pipe deterioration, responding to natural disasters, and preventing terrorism. One strategy to enhance sustainability and resiliency is the development and adoption of smart water grids. A smart water grid incorporates networked monitoring and control devices into its structure, which provides diverse, real-time information about the system, as well as enhanced control. Data provide input for modeling and analysis, which informs control decisions, allowing for improvement in sustainability and resiliency. While smart water grids hold much potential, there are also potential tradeoffs and adoption challenges. More publicly available cost-benefit analyses are needed, as well as system-level research and application, rather than the current focus on individual technologies. This thesis seeks to fill one of these gaps by analyzing the cost and environmental benefits of smart irrigation controllers. Smart irrigation controllers can save water by adapting watering schedules to climate and soil conditions. The potential benefit of smart irrigation controllers is particularly high in southwestern U.S. states, where the arid climate makes water scarcer and increases watering needs of landscapes. To inform the technology development process, a design for environment (DfE) method was developed, which overlays economic and environmental performance parameters under different operating conditions. This method is applied to characterize design goals for controller price and water savings that smart irrigation controllers must meet to yield life cycle carbon dioxide reductions and economic savings in southwestern U.S. states, accounting for regional variability in electricity and water prices and carbon overhead. Results from applying the model to smart irrigation controllers in the Southwest suggest that some areas are significantly easier to design for.
ContributorsMutchek, Michele (Author) / Allenby, Braden (Thesis advisor) / Williams, Eric (Committee member) / Westerhoff, Paul (Committee member) / Arizona State University (Publisher)
Created2012
152650-Thumbnail Image.png
Description
Hydrocarbon spill site cleanup is challenging when contaminants are present in lower permeability layers. These are difficult to remediate and may result in long-term groundwater impacts. The research goal is to investigate strategies for long-term reduction of contaminant emissions from sources in low permeability layers through partial source treatment at

Hydrocarbon spill site cleanup is challenging when contaminants are present in lower permeability layers. These are difficult to remediate and may result in long-term groundwater impacts. The research goal is to investigate strategies for long-term reduction of contaminant emissions from sources in low permeability layers through partial source treatment at higher/lower permeability interfaces. Conceptually, this provides a clean/reduced concentration zone near the interface, and consequently a reduced concentration gradient and flux from the lower permeability layer. Treatment by in-situ chemical oxidation (ISCO) was evaluated using hydrogen peroxide (H2O2) and sodium persulfate (Na2S2O8). H2O2 studies included lab and field-scale distribution studies and lab emission reduction experiments. The reaction rate of H2O2 in soils was so fast it did not travel far (<1 m) from delivery points under typical flow conditions. Oxygen gas generated and partially trapped in soil pores served as a dissolved oxygen (DO) source for >60 days in field and lab studies. During that period, the laboratory studies had reduced hydrocarbon impacts, presumably from aerobic biodegradation, which rebounded once the O2 source depleted. Therefore field monitoring should extend beyond the post-treatment elevated DO. Na2S2O8 use was studied in two-dimensional tanks (122-cm tall, 122-cm wide, and 5-cm thick) containing two contrasting permeability layers (three orders of magnitude difference). The lower permeability layer initially contained a dissolved-sorbed contaminant source throughout this layer, or a 10-cm thick non-aqueous phase liquid (NAPL)-impacted zone below the higher/lower permeability interface. The dissolved-sorbed source tank was actively treated for 14 d. Two hundred days after treatment, the emission reduction of benzene, toluene, ethylbenzene, and p-xylene (BTEX) were 95-99% and methyl tert-butyl ether (MTBE) was 63%. The LNAPL-source tank had three Na2S2O8 and two sodium hydroxide (NaOH) applications for S2O82- base activation. The resulting emission reductions for BTEX, n-propylbenzene, and 1,3,5 trymethylbenzene were 55-73%. While less effective at reducing emissions from LNAPL sources, the 14-d treatment delivered sufficient S2O82- though diffusion to remediate BTEX from the 60 cm dissolved-sorbed source. The overall S2O82- utilization in the dissolved source experiment was calculated by mass balance to be 108-125 g S2O82-/g hydrocarbon treated.
ContributorsCavanagh, Bridget (Author) / Johnson, Paul C (Thesis advisor) / Westerhoff, Paul (Committee member) / Kavazanjian, Edward (Committee member) / Bruce, Cristin (Committee member) / Arizona State University (Publisher)
Created2014
152297-Thumbnail Image.png
Description
This thesis research focuses on developing a single-cell gene expression analysis method for marine diatom Thalassiosira pseudonana and constructing a chip level tool to realize the single cell RT-qPCR analysis. This chip will serve as a conceptual foundation for future deployable ocean monitoring systems. T. pseudonana, which is a common

This thesis research focuses on developing a single-cell gene expression analysis method for marine diatom Thalassiosira pseudonana and constructing a chip level tool to realize the single cell RT-qPCR analysis. This chip will serve as a conceptual foundation for future deployable ocean monitoring systems. T. pseudonana, which is a common surface water microorganism, was detected in the deep ocean as confirmed by phylogenetic and microbial community functional studies. Six-fold copy number differences between 23S rRNA and 23S rDNA were observed by RT-qPCR, demonstrating the moderate functional activity of detected photosynthetic microbes in the deep ocean including T. pseudonana. Because of the ubiquity of T. pseudonana, it is a good candidate for an early warning system for ocean environmental perturbation monitoring. This early warning system will depend on identifying outlier gene expression at the single-cell level. An early warning system based on single-cell analysis is expected to detect environmental perturbations earlier than population level analysis which can only be observed after a whole community has reacted. Preliminary work using tube-based, two-step RT-qPCR revealed for the first time, gene expression heterogeneity of T. pseudonana under different nutrient conditions. Heterogeneity was revealed by different gene expression activity for individual cells under the same conditions. This single cell analysis showed a skewed, lognormal distribution and helped to find outlier cells. The results indicate that the geometric average becomes more important and representative of the whole population than the arithmetic average. This is in contrast with population level analysis which is limited to arithmetic averages only and highlights the value of single cell analysis. In order to develop a deployable sensor in the ocean, a chip level device was constructed. The chip contains surface-adhering droplets, defined by hydrophilic patterning, that serve as real-time PCR reaction chambers when they are immersed in oil. The chip had demonstrated sensitivities at the single cell level for both DNA and RNA. The successful rate of these chip-based reactions was around 85%. The sensitivity of the chip was equivalent to published microfluidic devices with complicated designs and protocols, but the production process of the chip was simple and the materials were all easily accessible in conventional environmental and/or biology laboratories. On-chip tests provided heterogeneity information about the whole population and were validated by comparing with conventional tube based methods and by p-values analysis. The power of chip-based single-cell analyses were mainly between 65-90% which were acceptable and can be further increased by higher throughput devices. With this chip and single-cell analysis approaches, a new paradigm for robust early warning systems of ocean environmental perturbation is possible.
ContributorsShi, Xu (Author) / Meldrum, Deirdre R. (Thesis advisor) / Zhang, Weiwen (Committee member) / Chao, Shih-hui (Committee member) / Westerhoff, Paul (Committee member) / Arizona State University (Publisher)
Created2013
152495-Thumbnail Image.png
Description
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server

Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server to enforce access policies on the data, services and other such resources fairly easily. It also accommodates new policies and changes to existing policies gracefully, thereby making it a potentially good mechanism for implementing access control in large systems, particularly in today's age of Cloud Computing. However management of the attributes in ABAC environment is an area that has been little touched upon. Having a mechanism to allow multiple ABAC based systems to share data and resources can go a long way in making ABAC scalable. At the same time each system should be able to specify their own attribute sets independently. In the research presented in this document a new mechanism is proposed that would enable users to share resources and data in a cloud environment using ABAC techniques in a distributed manner. The focus is mainly on decentralizing the access policy specifications for the shared data so that each data owner can specify the access policy independent of others. The concept of ontologies and semantic web is introduced in the ABAC paradigm that would help in giving a scalable structure to the attributes and also allow systems having different sets of attributes to communicate and share resources.
ContributorsPrabhu Verleker, Ashwin Narayan (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
152385-Thumbnail Image.png
Description
This thesis addresses the ever increasing threat of botnets in the smartphone domain and focuses on the Android platform and the botnets using Online Social Networks (OSNs) as Command and Control (C&C;) medium. With any botnet, C&C; is one of the components on which the survival of botnet depends. Individual

This thesis addresses the ever increasing threat of botnets in the smartphone domain and focuses on the Android platform and the botnets using Online Social Networks (OSNs) as Command and Control (C&C;) medium. With any botnet, C&C; is one of the components on which the survival of botnet depends. Individual bots use the C&C; channel to receive commands and send the data. This thesis develops active host based approach for identifying the presence of bot based on the anomalies in the usage patterns of the user before and after the bot is installed on the user smartphone and alerting the user to the presence of the bot. A profile is constructed for each user based on the regular web usage patterns (achieved by intercepting the http(s) traffic) and implementing machine learning techniques to continuously learn the user's behavior and changes in the behavior and all the while looking for any anomalies in the user behavior above a threshold which will cause the user to be notified of the anomalous traffic. A prototype bot which uses OSN s as C&C; channel is constructed and used for testing. Users are given smartphones(Nexus 4 and Galaxy Nexus) running Application proxy which intercepts http(s) traffic and relay it to a server which uses the traffic and constructs the model for a particular user and look for any signs of anomalies. This approach lays the groundwork for the future host-based counter measures for smartphone botnets using OSN s as C&C; channel.
ContributorsKilari, Vishnu Teja (Author) / Xue, Guoliang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2013
152626-Thumbnail Image.png
Description
The influence of climate variability and reclaimed wastewater on the water supply necessitates improved understanding of the treatability of trace and bulk organic matter. Dissolved organic matter (DOM) mobilized during extreme weather events and in treated wastewater includes natural organic matter (NOM), contaminants of emerging concern (CECs), and microbial extracellular

The influence of climate variability and reclaimed wastewater on the water supply necessitates improved understanding of the treatability of trace and bulk organic matter. Dissolved organic matter (DOM) mobilized during extreme weather events and in treated wastewater includes natural organic matter (NOM), contaminants of emerging concern (CECs), and microbial extracellular polymeric substances (EPS). The goal of my dissertation was to quantify the impacts of extreme weather events on DOM in surface water and downstream treatment processes, and to improve membrane filtration efficiency and CECs oxidation efficiency during water reclamation with ozone. Surface water quality, air quality and hydrologic flow rate data were used to quantify changes in DOM and turbidity following dust storms, flooding, or runoff from wildfire burn areas in central Arizona. The subsequent impacts to treatment processes and public perception of water quality were also discussed. Findings showed a correlation between dust storm events and change in surface water turbidity (R2=0.6), attenuation of increased DOM through reservoir systems, a 30-40% increase in organic carbon and a 120-600% increase in turbidity following severe flooding, and differing impacts of upland and lowland wildfires. The use of ozone to reduce membrane fouling caused by vesicles (a subcomponent of EPS) and oxidize CECs through increased hydroxyl radical (HO●) production was investigated. An "ozone dose threshold" was observed above which addition of hydrogen peroxide increased HO● production; indicating the presence of ambient promoters in wastewater. Ozonation of CECs in secondary effluent over titanium dioxide or activated carbon did not increase radial production. Vesicles fouled ultrafiltration membranes faster (20 times greater flux decline) than polysaccharides, fatty acids, or NOM. Based upon the estimated carbon distribution of secondary effluent, vesicles could be responsible for 20-60% of fouling during ultrafiltration and may play a vital role in other environmental processes as well. Ozone reduced vesicle-caused membrane fouling that, in conjunction with the presence of ambient promoters, helps to explain why low ozone dosages improve membrane flux during full-scale water reclamation.
ContributorsBarry, Michelle (Author) / Barry, Michelle C (Thesis advisor) / Westerhoff, Paul (Committee member) / Fox, Peter (Committee member) / Halden, Rolf (Committee member) / Hristovski, Kiril (Committee member) / Arizona State University (Publisher)
Created2014
152874-Thumbnail Image.png
Description
The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In

The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In the meantime, there are emerging demands for new types of authentication. Proximity authentication is an example, which is not needed for computers but quite necessary for smart devices. These challenges motivate me to study and develop novel authentication mechanisms specific for smart devices.

In this dissertation, I am interested in the special authentication demands of smart devices and about to satisfy the demands. First, I study how the features of smart devices affect user identity authentications. For identity authentication domain, I aim to design a continuous, forge-resistant authentication mechanism that does not interrupt user-device interactions. I propose a mechanism that authenticates user identity based on the user's finger movement patterns. Next, I study a smart-device-specific authentication, proximity authentication, which authenticates whether two devices are in close proximity. For prox- imity authentication domain, I aim to design a user-friendly authentication mechanism that can defend against relay attacks. In addition, I restrict the authenticated distance to the scale of near field, i.e., a few centimeters. My first design utilizes a user's coherent two-finger movement on smart device screen to restrict the distance. To achieve a fully-automated system, I explore acoustic communications and propose a novel near field authentication system.
ContributorsLi, Lingjun (Author) / Xue, Guoliang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Ye, Jieping (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2014
153041-Thumbnail Image.png
Description
A firewall is a necessary component for network security and just like any regular equipment it requires maintenance. To keep up with changing cyber security trends and threats, firewall rules are modified frequently. Over time such modifications increase the complexity, size and verbosity of firewall rules. As the rule set

A firewall is a necessary component for network security and just like any regular equipment it requires maintenance. To keep up with changing cyber security trends and threats, firewall rules are modified frequently. Over time such modifications increase the complexity, size and verbosity of firewall rules. As the rule set grows in size, adding and modifying rule becomes a tedious task. This discourages network administrators to review the work done by previous administrators before and after applying any changes. As a result the quality and efficiency of the firewall goes down.

Modification and addition of rules without knowledge of previous rules creates anomalies like shadowing and rule redundancy. Anomalous rule sets not only limit the efficiency of the firewall but in some cases create a hole in the perimeter security. Detection of anomalies has been studied for a long time and some well established procedures have been implemented and tested. But they all have a common problem of visualizing the results. When it comes to visualization of firewall anomalies, the results do not fit in traditional matrix, tree or sunburst representations.

This research targets the anomaly detection and visualization problem. It analyzes and represents firewall rule anomalies in innovative ways such as hive plots and dynamic slices. Such graphical representations of rule anomalies are useful in understanding the state of a firewall. It also helps network administrators in finding and fixing the anomalous rules.
ContributorsKhatkar, Pankaj Kumar (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Syrotiuk, Violet R. (Committee member) / Arizona State University (Publisher)
Created2014