ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
Filtering by
- Creators: Doupe, Adam
- Creators: Krajmalnik-Brown, Rosa
This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
I operated the bench-scale isMBfR system in 7 different conditions to evaluate its nitrate-removal performance. When I supplied H2 with the isMBfR (stages 1 - 6), I observed at least 70% nitrate removal, and almost all of the denitrification occurred in the "MBfR zone." When I stopped the H2 supply in stage 7, the nitrate-removal percentage immediately dropped from 92% (stage 6) to 11% (stage 7). Denitrification raised the pH of the bulk liquid to ~ 9.0 for the first 6 stages, but the high pH did not impair the performance of the denitrifiers. Microbial community analyses indicated that DB were the dominant bacteria in the "MBfR zone," while photosynthetic Cyanobacteria were dominant in the "photo-zone".
I derived stoichiometric relationships among COD, alkalinity, H2, Dissolved Oxygen (DO), and nitrate to model the nitrate removal capacity of the "MBfR zone." The stoichiometric relationships corresponded well to the nitrate-removal capacity for all stages expect stage 3, which was limited by the abundance of Denitrifying Bacteria (DB) so that the H2 supply capacity could not be completely used.
Finally, I analyzed two case studies for the real-world application of the isMBfR to constructed wetlands. Based on the characteristics for the wetlands and the stoichiometric relationships, I designed a feasible operation condition (membrane area and H2 pressure) for each wetland. In both cases, the amount of isMBfR surface area was modest, from 0.022 to 1.2 m2/m3 of wetland volume.
Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.
This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.