Matching Items (38)
Filtering by

Clear all filters

156331-Thumbnail Image.png
Description
Graph theory is a critical component of computer science and software engineering, with algorithms concerning graph traversal and comprehension powering much of the largest problems in both industry and research. Engineers and researchers often have an accurate view of their target graph, however they struggle to implement a correct, and

Graph theory is a critical component of computer science and software engineering, with algorithms concerning graph traversal and comprehension powering much of the largest problems in both industry and research. Engineers and researchers often have an accurate view of their target graph, however they struggle to implement a correct, and efficient, search over that graph.

To facilitate rapid, correct, efficient, and intuitive development of graph based solutions we propose a new programming language construct - the search statement. Given a supra-root node, a procedure which determines the children of a given parent node, and optional definitions of the fail-fast acceptance or rejection of a solution, the search statement can conduct a search over any graph or network. Structurally, this statement is modelled after the common switch statement and is put into a largely imperative/procedural context to allow for immediate and intuitive development by most programmers. The Go programming language has been used as a foundation and proof-of-concept of the search statement. A Go compiler is provided which implements this construct.
ContributorsHenderson, Christopher (Author) / Bansal, Ajay (Thesis advisor) / Lindquist, Timothy (Committee member) / Acuna, Ruben (Committee member) / Arizona State University (Publisher)
Created2018
133896-Thumbnail Image.png
Description
After freelancing on my own for the past year and a half, I have realized that one of the biggest obstacles to college entrepreneurs is a fear or apprehension to sales. As a computer science major trying to sell my services, I discovered very quickly that I had not been

After freelancing on my own for the past year and a half, I have realized that one of the biggest obstacles to college entrepreneurs is a fear or apprehension to sales. As a computer science major trying to sell my services, I discovered very quickly that I had not been prepared for the difficulty of learning sales. Sales get a bad rap and very often is the last thing that young entrepreneurs want to try, but the reality is that sales is oxygen to a company and a required skill for an entrepreneur. Due to this, I compiled all of my knowledge into an e-book for young entrepreneurs starting out to learn how to open up a conversation with a prospect all the way to closing them on the phone. Instead of starting from scratch like I did, college entrepreneurs can learn the bare basics of selling their own services, even if they are terrified of sales and what it entails. In this e-book, there are tips that I have learned to deal with my anxiety about sales such as taking the pressure off of yourself and prioritizing listening more than pitching. Instead of trying to teach sales expecting people to be natural sales people, this e-book takes the approach of helping entrepreneurs that are terrified of sales and show them how they can cope with this fear and still close a client. In the future, I hope young entrepreneurs will have access to more resources that handle this fear and make it much easier for them to learn it by themselves. This e-book is the first step.
ContributorsMead, Kevin Tyler (Author) / Sebold, Brent (Thesis director) / Kruse, Gabriel (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
136091-Thumbnail Image.png
Description
Some of the most talented, innovative, and experimental artists are students, but they are often discouraged by the price of higher education and lack of scholarship or funding opportunities. Additionally, the art industry has become stagnant. Traditional brick-and-mortar galleries are not willing to represent young, unknown artists. Their overhead is

Some of the most talented, innovative, and experimental artists are students, but they are often discouraged by the price of higher education and lack of scholarship or funding opportunities. Additionally, the art industry has become stagnant. Traditional brick-and-mortar galleries are not willing to represent young, unknown artists. Their overhead is simply too high for risky choices.
The Student Art Project is art patronage for the 21st century—a curated online gallery featuring exceptional student artists. The Student Art Project is a highly curated experience for buyers. Only five artists are featured each month. Buyers are not bombarded with thousands of different products and separate artists “shops”. They can read artists bios and find art they connect with.
Student artists apply through an online form. Once accepted to the program, artists receive a $200 materials stipend to create an exclusive collection of 5-10 pieces. Original artwork and limited edition prints are sold through our website. These collections can potentially fund an entire year of college tuition, a life-changing amount for many students.
Brick-and-mortar galleries typically take 40-60% of the retail price of artwork. The Student Art Project will only take 30%, which we will use to reinvest in future artists. Other art websites, like Etsy, require the artists to ship, invoice, and communicate with customers. For students, this means less time spent in the classroom and less time developing their craft. The Student Art Project handles all business functions for our artists, allowing them to concentrate on what really matters, their education.
ContributorsDangler, Rebecca Leigh (Author) / Trujillo, Rhett (Thesis director) / Coleman, Sean (Committee member) / Barrett, The Honors College (Contributor) / Herberger Institute for Design and the Arts (Contributor) / Department of Management (Contributor)
Created2015-05
133811-Thumbnail Image.png
Description
The goal of this project is to gain market research insight into the handcrafted goods industry and apply this knowledge towards a business plan for a small crafts business: Creations by Songbird. We accomplish this goal by conducting primary and secondary research on the crafts selling industry to see who

The goal of this project is to gain market research insight into the handcrafted goods industry and apply this knowledge towards a business plan for a small crafts business: Creations by Songbird. We accomplish this goal by conducting primary and secondary research on the crafts selling industry to see who the target customer is and what their habits are. First, we conduct a literature review looking into the background of some known crafts sales platforms. We discover several consistent trends in product differentiation, retail price calculation, and search engine optimization that we will apply to our business plan. Next, we conduct primary market research in the form of observations, customer and business owner interviews, and surveys. We learn that Instagram is a widely used marketing tool and that Etsy and crafts shows are popular sales channels. Using the results of our research we conclude that the our target customers are women ages 18-24 and 50-59 who attend crafts shows several times per year and occasionally browse Etsy. Many of these women enjoy objects that are vintage style and on average they spend less than $50 per item. Applying the industry and market knowledge gleaned from our research we create a business plan that outlines a price/cost breakdown, marketing plan, and sales plan for Creations by Songbird. We plan to utilize Instagram as our main marketing tool and will sell records via crafts shows and Etsy. Based on our estimates, we conclude that Creations by Songbird will be a profitable business.
ContributorsWood, Sara (Co-author) / Ehmann, Victoria (Co-author) / Gray, Nancy (Thesis director) / Trujillo, Rhett (Committee member) / Department of Supply Chain Management (Contributor) / Department of Information Systems (Contributor) / W.P. Carey School of Business (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
137309-Thumbnail Image.png
Description
Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.
Created2014-05
137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
137152-Thumbnail Image.png
Description
Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is

Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is widely used for secure access control and applications where a contactless authentication element is desirable. Unfortunately, iCLASS has been shown to have security issues. Nevertheless customers continue to use it because of the great cost that would be required to completely replace it. This Honors Thesis will address attacks against iCLASS and means for countering them that do not require such an overhaul.
ContributorsMellott, Matthew John (Author) / Ahn, Gail-Joon (Thesis director) / Thorstenson, Tina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05
134762-Thumbnail Image.png
Description
IoT Media broadcast devices, such as the Roku stick, Amazon Fire, and Chromecast have been emerging onto the market recently as a portable and inexpensive alternative to cable and disk players, allowing easy integration between home and business Wi-Fi networks and television systems capable of supporting HDMI inputs without the

IoT Media broadcast devices, such as the Roku stick, Amazon Fire, and Chromecast have been emerging onto the market recently as a portable and inexpensive alternative to cable and disk players, allowing easy integration between home and business Wi-Fi networks and television systems capable of supporting HDMI inputs without the additional overhead of setting up a heavy or complicated player or computer. The rapid expansion of these products as a mechanism to provide for TV Everywhere services for entertainment as well as cheap office appliances brings yet another node in the rapidly expanding network of IoT that surrounds us today. However, the security implications of these devices are nearly unexplored, despite their prevalence. In this thesis, I will go over the structure and mechanisms of Chromecast, and explore some of the potential exploits and consequences of the device. The thesis contains an overview of the inner workings of Chromecast, goes over the segregation and limited control and fundamental design choices of the Android based OS. It then identifies the objectives of security, four different potential methods of exploit to compromise those objectives on a Chromecast and/or its attached network, including rogue applications, traffic sniffing, evil access points and the most effective one: deauthentication attack. Tests or relevant analysis were carried out for each of these methods, and conclusions were drawn on their effectiveness. There is then a conclusion revolving around the consequences, mitigation and the future implications of security issues on Chromecast and the larger IoT landscape.
ContributorsHuang, Kaiyi (Author) / Zhao, Ziming (Thesis director) / Ahn, Gail-Joon (Committee member) / W. P. Carey School of Business (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
Description
This Creative Project contains a short movie that is comprised of interviews with various business owners and entrepreneurs based in Arizona. The purpose of this project was originally to explore "how businesses finance their initial venture" but quickly evolved into open-ended interviews. Originally, one of the listed goals for the

This Creative Project contains a short movie that is comprised of interviews with various business owners and entrepreneurs based in Arizona. The purpose of this project was originally to explore "how businesses finance their initial venture" but quickly evolved into open-ended interviews. Originally, one of the listed goals for the project was to ensure that the movie be entertaining for the viewer. In order to gain the richest experience, it was decided that at least 8-10 entrepreneurs be interviewed for a 25 minute video. Since the creator of the video had no prior videography experience, it was assumed to be feasible \u2014 but in order to maintain the integrity of the interviews, and in order to provide the viewer with a better background, the format was changed to a 44 minute movie with 5 featured businesses, though more than 30 businesses were considered. It became clear that the diversity of available interviewees and the complexity of the businesses and financing methods made it impractical to feature such a technical topic in the movie. Balancing the entertainment value of the film and its functional, educational purpose proved to be one of the challenges for the completion of the project. Each interview stands alone its own right, but it's highly recommended that the viewer watch the entire feature. The businesses are featured in the following order: DryClean U.S., Jeffrey Rivera (sole-proprietor), Arizona Hops and Vines, Rune Wines, and The Duquesne House Inn and Gardens. The viewer will find that the businesses featured include both service-based businesses and product-based businesses. In all, over 300 hours of planning, filming, writing, and video-editing contributed to successful completion of this project.
ContributorsElliott, Spencer William (Author) / Trujillo, Rhett (Thesis director) / Peck, Sidnee (Committee member) / Department of Management and Entrepreneurship (Contributor) / Department of Economics (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
Description
What if unplanned free time could be spent with friends instead of trying to contact them? This app will do that by connecting you with friends who are ready to hang out. Kickback is a mobile app designed to connect individuals with their friends and businesses that offer opportunities to

What if unplanned free time could be spent with friends instead of trying to contact them? This app will do that by connecting you with friends who are ready to hang out. Kickback is a mobile app designed to connect individuals with their friends and businesses that offer opportunities to socialize in a group setting. The idea had been floating around in my head for a few years and this creative project gave me the opportunity to try my hand at making the idea into a reality. This thesis is a combination of technical efforts and business know-how that I had to learn in order to keep up along the way.
ContributorsFegard, Nathan (Author) / Sebold, Brent (Thesis director) / Trujillo, Rhett (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05