Matching Items (8)
Filtering by

Clear all filters

131747-Thumbnail Image.png
Description
One of the major sources of authentication is through the use of username and password systems. Ideally, each password is a unique identifier known by a single individual. In reality however, exposed passwords from past data breaches reveal vulnerabilities that are traceable to passwords created today. Vulnerabilities include repetitions of

One of the major sources of authentication is through the use of username and password systems. Ideally, each password is a unique identifier known by a single individual. In reality however, exposed passwords from past data breaches reveal vulnerabilities that are traceable to passwords created today. Vulnerabilities include repetitions of characters, words, character sequences, and phrases that are used in a password. This project was observed in English to highlight the vulnerabilities that can come from utilizing the English language. However, the vulnerabilities highlighted in this project can also be applicable in languages across the world. It was observed that through the common types of digital attacks, brute force attack and dictionary attack work effectively against weak passwords. Brute force attack revealed that a user could expose an alphanumeric password of length eight in as little as one and a half days. In addition, dictionary attacks revealed that an alphanumeric password of length eight can be exposed in a shorter amount of time if the password contains a single long word or phrase thought to be secure. During this attack analysis, it found that passwords become significantly more secure in the utilization of alphanumeric passwords of minimal length of eight. In addition, the password must also not be a particular phrase or word with simplistic characteristics for adequate strength against dictionary attack. The solution to using username and password systems is to create a password utilizing as many characters as possible while still retaining memorability. If creating a password of this type is not feasible, there is a need to use technological solutions to keep the current system of username and passwords as secure as possible under daily life. Otherwise, there will be a need to replace the username and password system altogether before it becomes insecure by technology.
ContributorsTipton, Tony T (Co-author) / Tipton, Tony (Co-author) / Meuth, Ryan (Thesis director) / Tirupalavanam, Ganesh (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
130975-Thumbnail Image.png
Description
Immunotherapy is an effective treatment for cancer which enables the patient's immune system to recognize tumor cells as pathogens. In order to design an individualized treatment, the t cell receptors (TCR) which bind to a tumor's unique antigens need to be determined. We created a convolutional neural network to predict

Immunotherapy is an effective treatment for cancer which enables the patient's immune system to recognize tumor cells as pathogens. In order to design an individualized treatment, the t cell receptors (TCR) which bind to a tumor's unique antigens need to be determined. We created a convolutional neural network to predict the binding affinity between a given TCR and antigen to enable this.
ContributorsCai, Michael Ray (Author) / Lee, Heewook (Thesis director) / Meuth, Ryan (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
135041-Thumbnail Image.png
Description
The advent of big data analytics tools and frameworks has allowed for a plethora of new approaches to research and analysis, making data sets that were previously too large or complex more accessible and providing methods to collect, store, and investigate non-traditional data. These tools are starting to be applied

The advent of big data analytics tools and frameworks has allowed for a plethora of new approaches to research and analysis, making data sets that were previously too large or complex more accessible and providing methods to collect, store, and investigate non-traditional data. These tools are starting to be applied in more creative ways, and are being used to improve upon traditional computation methods through distributed computing. Statistical analysis of expression quantitative trait loci (eQTL) data has classically been performed using the open source tool PLINK - which runs on high performance computing (HPC) systems. However, progress has been made in running the statistical analysis in the ecosystem of the big data framework Hadoop, resulting in decreased run time, reduced storage footprint, reduced job micromanagement and increased data accessibility. Now that the data can be more readily manipulated, analyzed and accessed, there are opportunities to use the modularity and power of Hadoop to further process the data. This project focuses on adding a component to the data pipeline that will perform graph analysis on the data. This will provide more insight into the relation between various genetic differences in individuals with breast cancer, and the resulting variation - if any - in gene expression. Further, the investigation will look to see if there is anything to be garnered from a perspective shift; applying tools used in classical networking contexts (such as the Internet) to genetically derived networks.
ContributorsRandall, Jacob Christopher (Author) / Buetow, Kenneth (Thesis director) / Meuth, Ryan (Committee member) / Almalih, Sara (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
135099-Thumbnail Image.png
Description
Smartphone privacy is a growing concern around the world; smartphone applications routinely take personal information from our phones and monetize it for their own profit. Worse, they're doing it legally. The Terms of Service allow companies to use this information to market, promote, and sell personal data. Most users seem

Smartphone privacy is a growing concern around the world; smartphone applications routinely take personal information from our phones and monetize it for their own profit. Worse, they're doing it legally. The Terms of Service allow companies to use this information to market, promote, and sell personal data. Most users seem to be either unaware of it, or unconcerned by it. This has negative implications for the future of privacy, particularly as the idea of smart home technology becomes a reality. If this is what privacy looks like now, with only one major type of smart device on the market, what will the future hold, when the smart home systems come into play. In order to examine this question, I investigated how much awareness/knowledge smartphone users of a specific demographic (millennials aged 18-25) knew about their smartphone's data and where it goes. I wanted three questions answered: - For what purposes do millennials use their smartphones? - What do they know about smartphone privacy and security? - How will this affect the future of privacy? To accomplish this, I gathered information using a distributed survey to millennials attending Arizona State University. Using statistical analysis, I exposed trends for this demographic, discovering that there isn't a lack of knowledge among millennials; most are aware that smartphone apps can collect and share data and many of the participants are not comfortable with the current state of smartphone privacy. However, more than half of the study participants indicated that they never read an app's Terms of Service. Due to the nature of the privacy vs. convenience argument, users will willingly agree to let apps take their personal in- formation, since they don't want to give up the convenience.
ContributorsJones, Scott Spenser (Author) / Atkinson, Robert (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
163974-Thumbnail Image.png
Description
Low-level optimization is the process of handwriting key parts of applications in assembly code that is better than what can be generated from a higher-level language. In performance-intensive applications, this is key to ensuring efficient code. This is generally something that is taught in on the job training, but knowledge

Low-level optimization is the process of handwriting key parts of applications in assembly code that is better than what can be generated from a higher-level language. In performance-intensive applications, this is key to ensuring efficient code. This is generally something that is taught in on the job training, but knowledge of it improves college student’s skill sets and makes them more desirable employees I have created material for a course teaching this low-level optimization with assembly code. I specifically focus on the x86 architecture, as this is one of the most prolific computer architectures. The course contains a series of lecture videos, live coding videos, and structured programming assignments to support the learning objectives. This material is presented in an entirely autonomous way, which serves as remote learning material and can be easily added as supplemental material to an existing course.
ContributorsAbraham, Jacob (Author) / Meuth, Ryan (Thesis director) / Nakamura, Mutsumi (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
166227-Thumbnail Image.png
Description
Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done

Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done with industry standard performance technology and protocols to create an accessible interface for creative expression. Artificial intelligence models were created to generate art based on simple text inputs. Users were then invited to display their creativity using the software, and a comprehensive performance showcased the potential of the system for artistic expression.
ContributorsPardhe, Joshua (Author) / Lim, Kang Yi (Co-author) / Meuth, Ryan (Thesis director) / Brian, Jennifer (Committee member) / Hermann, Kristen (Committee member) / Barrett, The Honors College (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Watts College of Public Service & Community Solut (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
166228-Thumbnail Image.png
Description
Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done

Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done with industry standard performance technology and protocols to create an accessible interface for creative expression. Artificial intelligence models were created to generate art based on simple text inputs. Users were then invited to display their creativity using the software, and a comprehensive performance showcased the potential of the system for artistic expression.
ContributorsLim, Kang Yi (Author) / Pardhe, Joshua (Co-author) / Meuth, Ryan (Thesis director) / Brian, Jennifer (Committee member) / Hermann, Kristen (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description

Nowadays, kids are exposed to technology at an incredibly early age. According to a study by YouGov in the United Kingdom, 88% of 12-year-olds are entrusted with their own devices and 85% of children at age 6 have access to a tablet at home (YouGov). In the US, according to

Nowadays, kids are exposed to technology at an incredibly early age. According to a study by YouGov in the United Kingdom, 88% of 12-year-olds are entrusted with their own devices and 85% of children at age 6 have access to a tablet at home (YouGov). In the US, according to MarketingProfs 75% of children 8 and under have access to some type of smart device. In an ever-growing technological world, it is important to make sure that kids are enjoying entertainment that enhances their growth and protects them from inappropriate content (Nanji). I wanted to create a browser game that explains the importance of Security in a colorful, fun environment with a friendly playable character. The game I created is a 2D platformer in which the player learns about the importance of passwords and keeping them secure.

ContributorsMichalik, Jacob (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05