This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 88
152136-Thumbnail Image.png
Description
Reductive dechlorination by members of the bacterial genus Dehalococcoides is a common and cost-effective avenue for in situ bioremediation of sites contaminated with the chlorinated solvents, trichloroethene (TCE) and perchloroethene (PCE). The overarching goal of my research was to address some of the challenges associated with bioremediation timeframes by improving

Reductive dechlorination by members of the bacterial genus Dehalococcoides is a common and cost-effective avenue for in situ bioremediation of sites contaminated with the chlorinated solvents, trichloroethene (TCE) and perchloroethene (PCE). The overarching goal of my research was to address some of the challenges associated with bioremediation timeframes by improving the rates of reductive dechlorination and the growth of Dehalococcoides in mixed communities. Biostimulation of contaminated sites or microcosms with electron donor fails to consistently promote dechlorination of PCE/TCE beyond cis-dichloroethene (cis-DCE), even when the presence of Dehalococcoides is confirmed. Supported by data from microcosm experiments, I showed that the stalling at cis-DCE is due a H2 competition in which components of the soil or sediment serve as electron acceptors for competing microorganisms. However, once competition was minimized by providing selective enrichment techniques, I illustrated how to obtain both fast rates and high-density Dehalococcoides using three distinct enrichment cultures. Having achieved a heightened awareness of the fierce competition for electron donor, I then identified bicarbonate (HCO3-) as a potential H2 sink for reductive dechlorination. HCO3- is the natural buffer in groundwater but also the electron acceptor for hydrogenotrophic methanogens and homoacetogens, two microbial groups commonly encountered with Dehalococcoides. By testing a range of concentrations in batch experiments, I showed that methanogens are favored at low HCO3 and homoacetogens at high HCO3-. The high HCO3- concentrations increased the H2 demand which negatively affected the rates and extent of dechlorination. By applying the gained knowledge on microbial community management, I ran the first successful continuous stirred-tank reactor (CSTR) at a 3-d hydraulic retention time for cultivation of dechlorinating cultures. I demonstrated that using carefully selected conditions in a CSTR, cultivation of Dehalococcoides at short retention times is feasible, resulting in robust cultures capable of fast dechlorination. Lastly, I provide a systematic insight into the effect of high ammonia on communities involved in dechlorination of chloroethenes. This work documents the potential use of landfill leachate as a substrate for dechlorination and an increased tolerance of Dehalococcoides to high ammonia concentrations (2 g L-1 NH4+-N) without loss of the ability to dechlorinate TCE to ethene.
ContributorsDelgado, Anca Georgiana (Author) / Krajmalnik-Brown, Rosa (Thesis advisor) / Cadillo-Quiroz, Hinsby (Committee member) / Halden, Rolf U. (Committee member) / Rittmann, Bruce E. (Committee member) / Stout, Valerie (Committee member) / Arizona State University (Publisher)
Created2013
151380-Thumbnail Image.png
Description
Microbial mat communities that inhabit hot springs in Yellowstone National Park have been studied for their biodiversity, energetics and evolutionary history, yet little is know about how these communities cope with nutrient limitation. In the present study the changes in assimilatory gene expression levels for nitrogen (nrgA), phosphorus (phoA), and

Microbial mat communities that inhabit hot springs in Yellowstone National Park have been studied for their biodiversity, energetics and evolutionary history, yet little is know about how these communities cope with nutrient limitation. In the present study the changes in assimilatory gene expression levels for nitrogen (nrgA), phosphorus (phoA), and iron (yusV) were measured under various nutrient enrichment experiments. While results for nrgA and phoA were inconclusive, results for yusV showed an increase in expression with the addition of N and Fe. This is the first data that shows the impact of nutrients on siderophore uptake regulation in hot spring microbes.
ContributorsThorne, Michele (Author) / Elser, James J (Thesis advisor) / Touchman, Jeffrey (Committee member) / Stout, Valerie (Committee member) / Arizona State University (Publisher)
Created2012
152583-Thumbnail Image.png
Description
The prevalence of antibiotic resistant bacterial pathogens has increased since the introduction of penicillin in the 1940s. Insufficient development of novel antibacterial agents is leaving us with a failing arsenal of therapies to combat these pathogenic organisms. We have identified a clay mineral mixture (designated CB) that exhibits in vitro

The prevalence of antibiotic resistant bacterial pathogens has increased since the introduction of penicillin in the 1940s. Insufficient development of novel antibacterial agents is leaving us with a failing arsenal of therapies to combat these pathogenic organisms. We have identified a clay mineral mixture (designated CB) that exhibits in vitro antibacterial activity against a broad spectrum of bacterial pathogens, yet the antibacterial mechanism of action remains unknown. Antibacterial susceptibility testing of four different clay samples collected from the same source revealed that these natural clays had markedly different antibacterial activity. X-ray diffraction analyses of these minerals revealed minor mineralogical differences across the samples; however, ICP analyses demonstrated that the concentrations of many elements, Fe, Co, Cu, Ni, and Zn in particular, vary greatly across the four clay mixture leachates. Supplementation of a non-antibacterial leachate containing lower concentrations of Fe, Co, Ni, Cu, and Zn to final ion concentrations and a pH equivalent to that of the antibacterial leachate resulted in antibacterial activity against E. coli and MRSA, confirming the role of these ions in the in vitro antibacterial clay mixture leachates. The prevailing hypothesis is that metal ions participate in redox cycling and produce ROS, leading to oxidative damage to macromolecules and resulting in cellular death. However, E. coli cells showed no increase in DNA or protein oxidative lesions and a slight increase in lipid peroxidation following exposure to CB-L. Supplementation of CB-L with ROS scavengers eliminated oxidative damage in E. coli, but did not rescue the cells from killing, indicating that in vitro killing is due to direct metal toxicity and not to indirect oxidative damage. Finally, we ion-exchanged non-antibacterial clays with Fe, Co, Cu, and Zn and established antibacterial activity in these samples. Treatment of MRSA skin infections with both natural and ion-exchanged clays significantly decreased the bacterial load after 7 days of treatment. We conclude that 1) in vitro clay-mediated killing is due to toxicity associated directly with released metal ions and not to indirect oxidative damage and 2) that in vivo killing is due to the physical properties of the clays rather than metal ion toxicity.
ContributorsOtto, Caitin Carol (Author) / Haydel, Shelley (Thesis advisor) / Stout, Valerie (Committee member) / Roberson, Robby (Committee member) / Sandrin, Todd (Committee member) / Rege, Kaushal (Committee member) / Arizona State University (Publisher)
Created2014
152348-Thumbnail Image.png
Description
Pathogenic Gram-negative bacteria employ a variety of molecular mechanisms to combat host defenses. Two-component regulatory systems (TCR systems) are the most ubiquitous signal transduction systems which regulate many genes required for virulence and survival of bacteria. In this study, I analyzed different TCR systems in two clinically-relevant Gram-negative bacteria, i.e.,

Pathogenic Gram-negative bacteria employ a variety of molecular mechanisms to combat host defenses. Two-component regulatory systems (TCR systems) are the most ubiquitous signal transduction systems which regulate many genes required for virulence and survival of bacteria. In this study, I analyzed different TCR systems in two clinically-relevant Gram-negative bacteria, i.e., oral pathogen Porphyromonas gingivalis and enterobacterial Escherichia coli. P. gingivalis is a major causative agent of periodontal disease as well as systemic illnesses, like cardiovascular disease. A microarray study found that the putative PorY-PorX TCR system controls the secretion and maturation of virulence factors, as well as loci involved in the PorSS secretion system, which secretes proteinases, i.e., gingipains, responsible for periodontal disease. Proteomic analysis (SILAC) was used to improve the microarray data, reverse-transcription PCR to verify the proteomic data, and primer extension assay to determine the promoter regions of specific PorX regulated loci. I was able to characterize multiple genetic loci regulated by this TCR system, many of which play an essential role in hemagglutination and host-cell adhesion, and likely contribute to virulence in this bacterium. Enteric Gram-negative bacteria must withstand many host defenses such as digestive enzymes, low pH, and antimicrobial peptides (AMPs). The CpxR-CpxA TCR system of E. coli has been extensively characterized and shown to be required for protection against AMPs. Most recently, this TCR system has been shown to up-regulate the rfe-rff operon which encodes genes involved in the production of enterobacterial common antigen (ECA), and confers protection against a variety of AMPs. In this study, I utilized primer extension and DNase I footprinting to determine how CpxR regulates the ECA operon. My findings suggest that CpxR modulates transcription by directly binding to the rfe promoter. Multiple genetic and biochemical approaches were used to demonstrate that specific TCR systems contribute to regulation of virulence factors and resistance to host defenses in P. gingivalis and E. coli, respectively. Understanding these genetic circuits provides insight into strategies for pathogenesis and resistance to host defenses in Gram negative bacterial pathogens. Finally, these data provide compelling potential molecular targets for therapeutics to treat P. gingivalis and E. coli infections.
ContributorsLeonetti, Cori (Author) / Shi, Yixin (Thesis advisor) / Stout, Valerie (Committee member) / Nickerson, Cheryl (Committee member) / Sandrin, Todd (Committee member) / Arizona State University (Publisher)
Created2013
152641-Thumbnail Image.png
Description
The advent of new high throughput technology allows for increasingly detailed characterization of the immune system in healthy, disease, and age states. The immune system is composed of two main branches: the innate and adaptive immune system, though the border between these two states is appearing less distinct. The adaptive

The advent of new high throughput technology allows for increasingly detailed characterization of the immune system in healthy, disease, and age states. The immune system is composed of two main branches: the innate and adaptive immune system, though the border between these two states is appearing less distinct. The adaptive immune system is further split into two main categories: humoral and cellular immunity. The humoral immune response produces antibodies against specific targets, and these antibodies can be used to learn about disease and normal states. In this document, I use antibodies to characterize the immune system in two ways: 1. I determine the Antibody Status (AbStat) from the data collected from applying sera to an array of non-natural sequence peptides, and demonstrate that this AbStat measure can distinguish between disease, normal, and aged samples as well as produce a single AbStat number for each sample; 2. I search for antigens for use in a cancer vaccine, and this search results in several candidates as well as a new hypothesis. Antibodies provide us with a powerful tool for characterizing the immune system, and this natural tool combined with emerging technologies allows us to learn more about healthy and disease states.
ContributorsWhittemore, Kurt (Author) / Sykes, Kathryn (Thesis advisor) / Johnston, Stephen A. (Committee member) / Jacobs, Bertram (Committee member) / Stafford, Phillip (Committee member) / Stout, Valerie (Committee member) / Arizona State University (Publisher)
Created2014
153308-Thumbnail Image.png
Description
Bacteria of the Legionella genus are a water-borne pathogen of increasing concern due to being responsible for more annual drinking water related disease outbreaks in the United States than all other microbes combined. Unfortunately, the development of public health policies concerning Legionella has impeded by several key factors,

Bacteria of the Legionella genus are a water-borne pathogen of increasing concern due to being responsible for more annual drinking water related disease outbreaks in the United States than all other microbes combined. Unfortunately, the development of public health policies concerning Legionella has impeded by several key factors, including a paucity of data on their interactions and growth requirements in water distribution networks, a poor understanding of potential transmission sources for legionellosis, and limitations in current methodology for the characterization of these pathogens. To address these issues, a variety of research approaches were taken. By measuring Legionella survival in tap water, association in pipe material biofilms, population dynamics in a model distribution system, and occurrence in drinking water distribution system biofilms, key aspects of Legionella ecology in drinking water systems were revealed. Through a series of experiments qualitatively and quantitatively examining the growth of Legionella via nutrients obtained from several water sources, environmental nutritional requirements and capability for growth in the absence of host organisms were demonstrated. An examination of automobile windshield washer fluid as a possible source of legionellosis transmission revealed Legionella survival in certain windshield washer fluids, growth within washer fluid reservoirs, high levels and frequency of contamination in washer fluid reservoirs, and the presence of viable cells in washer fluid spray, suggesting the potential for exposure to Legionella from this novel source. After performing a systematic and quantitative analysis of methodology optimization for the analysis of Legionella cells via matrix-assisted laser desorption/ionization time-of-flight mass spectrometry, several strains of this microbe isolated from separated and varied environmental water sampling sites were distinctly typed, demonstrating a potential application of this technology for the characterization of Legionella. The results from this study provide novel insight and methodology relevant to the development of programs for the monitoring and treatment of Legionella in drinking water systems.
ContributorsSchwake, David Otto (Author) / Abbaszadegan, Morteza (Thesis advisor) / Alum, Absar (Committee member) / Fox, Peter (Committee member) / Stout, Valerie (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014