Matching Items (7)
Filtering by

Clear all filters

134797-Thumbnail Image.png
Description
With the progression of different industries moving away from employing secretaries for business professionals and professors, there exists a void in the area of personal assistance. This problem has existing solutions readily available to replace this service, i.e. secretary or personal assistant, tend to range from expensive and useful to

With the progression of different industries moving away from employing secretaries for business professionals and professors, there exists a void in the area of personal assistance. This problem has existing solutions readily available to replace this service, i.e. secretary or personal assistant, tend to range from expensive and useful to inexpensive and not efficient. This leaves a low cost niche into the market of a virtual office assistant or manager to display messages and to help direct people in obtaining contact information. The development of a low cost solution revolves around the software needed to solve the various problems an accessible and user friendly Virtual Interface in which the owner of the Virtual Office Manager/Assistant can communicate to colleagues who are at standby outside of the owner's office and vice versa. This interface will be allowing the owner to describe the status pertaining to their absence or any other message sent to the interface. For example, the status of the owner's work commute can be described with a simple "Running Late" phrase or a message like "Busy come back in 10 minutes". In addition, any individual with an interest to these entries will have the opportunity to respond back because the device will provide contact information. When idle, the device will show supplemental information such as the owner's calendar and name. The scope of this will be the development and testing of solutions to achieve these goals.
ContributorsOffenberger, Spencer Eliot (Author) / Kozicki, Michael (Thesis director) / Goryll, Michael (Committee member) / Electrical Engineering Program (Contributor) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
137646-Thumbnail Image.png
Description
The project described here is a solar powered intrusion detection system consisting of three modules: a battery recharging circuit, a laser emitter and photodetector pair, and a Wi- Fi connectivity board. Over the preceding seven months, great care has been taken for the design and construction of this system. The

The project described here is a solar powered intrusion detection system consisting of three modules: a battery recharging circuit, a laser emitter and photodetector pair, and a Wi- Fi connectivity board. Over the preceding seven months, great care has been taken for the design and construction of this system. The first three months were spent researching and selecting suitable IC's and external components (e.g. solar panel, batteries, etc.). Then, the next couple of months were spent ordering specific materials and equipment for the construction of our prototype. Finally, the last two months were used to build a working prototype, with a substantial amount of time used for perfecting our system's packaging and operation. This report will consist of a detailed discussion of our team's research, design activities, prototype implementation, final budget, and final schedule. Technical discussion of the concepts behind our design will assist with understanding the design activities and prototype implementation sections that will follow. Due to the generous funding of the group from the Barrett Honors College, our overall budget available for the project was $1600. Of that amount, only $334.51 was spent on the actual system components, with $829.42 being spent on the equipment and materials needed for the testing and construction of the prototype. As far as the schedule goes, we are essentially done with the project. The only tasks left to finish are a successful defense of the project at the oral presentation on Friday, 29 March 2013, followed by a successful demo on 26 April 2013.
ContributorsTroyer, Nicole L. (Co-author) / Shtayer, Idan (Co-author) / Guise, Chris (Co-author) / Kozicki, Michael (Thesis director) / Roedel, Ronald (Committee member) / Goodnick, Stephen (Committee member) / Barrett, The Honors College (Contributor) / Electrical Engineering Program (Contributor)
Created2013-05
148467-Thumbnail Image.png
Description

This creative project is an extension of the work being done as part of Senior Design in<br/>developing the See-Through Car Pillar, a system designed to render the forward car pillars in a car<br/>invisible to the driver so they can have an unobstructed view utilizing displays, sensors, and a<br/>computer. The first

This creative project is an extension of the work being done as part of Senior Design in<br/>developing the See-Through Car Pillar, a system designed to render the forward car pillars in a car<br/>invisible to the driver so they can have an unobstructed view utilizing displays, sensors, and a<br/>computer. The first half of the paper provides the motivation, design and progress of the project, <br/>while the latter half provides a literature survey on current automobile trends, the viability of the<br/>See-Through Car Pillar as a product in the market through case studies, and alternative designs and <br/>technologies that also might address the problem statement.

ContributorsRoy, Delwyn J (Author) / Thornton, Trevor (Thesis director) / Kozicki, Michael (Committee member) / Electrical Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148121-Thumbnail Image.png
Description

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is hypothesized to be remnant core material of an early planet, potentially providing key insights to planet formation. Following this initial mission, it is possible there would be scientists and engineers interested in proposing a mission to land an explorer on the surface of Psyche to further document various properties of the asteroid. As a proposal for a second mission, an interdisciplinary engineering and science capstone team at Arizona State University designed and constructed a robotic explorer for the hypothesized surfaces of Psyche, capable of semi-autonomously navigating simulated surfaces to collect scientific data from onboard sensors. A critical component of this explorer is the command and data handling subsystem, and as such, the security of this system, though outside the scope of the capstone project, remains a crucial consideration. This thesis proposes the pairing of Trusted Platform Module (TPM) technology for increased hardware security and the implementation of SELinux (Security Enhanced Linux) for increased software security for Earth-based testing as well as space-ready missions.

ContributorsAnderson, Kelly Joanne (Author) / Bowman, Catherine (Thesis director) / Kozicki, Michael (Committee member) / Electrical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148195-Thumbnail Image.png
Description

The colossal global counterfeit market and advances in cryptography including quantum computing supremacy have led the drive for a class of anti-counterfeit tags that are physically unclonable. Dendrites, previously considered an undesirable side effect of battery operation, have promise as an extremely versatile version of such tags, with their fundamental

The colossal global counterfeit market and advances in cryptography including quantum computing supremacy have led the drive for a class of anti-counterfeit tags that are physically unclonable. Dendrites, previously considered an undesirable side effect of battery operation, have promise as an extremely versatile version of such tags, with their fundamental nature ensuring that no two dendrites are alike and that they can be read at multiple magnification scales. In this work, we first pursue a simulation for electrochemical dendrites that elucidates fundamental information about their growth mechanism. We then translate these results into physical dendrites and demonstrate methods of producing a hash from these dendrites that is damage-tolerant for real-world verification. Finally, we explore theoretical curiosities that arise from the fractal nature of dendrites. We find that uniquely ramified dendrites, which rely on lower ion mobility and conductive deposition, are particularly amenable to wavelet hashing, and demonstrate that these dendrites have strong commercial potential for securing supply chains at the highest level while maintaining a low price point.

ContributorsSneh, Tal (Author) / Kozicki, Michael (Thesis director) / Gonzalez-Velo, Yago (Committee member) / School of Molecular Sciences (Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
132279-Thumbnail Image.png
Description
Energy poverty is the lack of access to the basic energy resources needed for human development. Fossil fuels, through their heavy emissions and transience, are slowly but surely leaving room for change in the energy sector as renewable energy sources rise to the challenge of sustainable, clean, and cost-efficient energy

Energy poverty is the lack of access to the basic energy resources needed for human development. Fossil fuels, through their heavy emissions and transience, are slowly but surely leaving room for change in the energy sector as renewable energy sources rise to the challenge of sustainable, clean, and cost-efficient energy production. Because it is mostly located in rural areas, solutions crafted against energy poverty need to be appropriate for those areas and their development objectives. As top contenders, photovoltaics insertion in the energy market has largely soared creating, therefore, a need for its distributed energy resources to interconnect appropriately to the area electrical power system. EEE Senior Design Team 11 saw in this the need to design an advanced photovoltaic inverter with those desired grid functions but also leveraging the technological superiority of wide bandgap devices over silicon semiconductors. The honors creative project is an integral part of the senior design capstone project for Team 11. It has a two-front approach, first exploring the IEEE 1547-2018 standard on distributed energy resources; then focusing on the author’s personal contribution to the aforementioned senior design project: digital signal processing and grid support implementation. This report serves as an accompanying write up to the creative project.
ContributorsTall, Ndeye Maty (Author) / Ayyanar, Raja (Thesis director) / Kozicki, Michael (Committee member) / Electrical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
131314-Thumbnail Image.png
Description
The diagnosis for an attention deficit/hyperactivity disorder (ADHD) in children is heavily based on teacher or parent opinion, and not on scientific evidence. This causes children to be wrongly diagnosed with a disorder and be prescribed medicine that they do not need to be taking. This paper discusses a project

The diagnosis for an attention deficit/hyperactivity disorder (ADHD) in children is heavily based on teacher or parent opinion, and not on scientific evidence. This causes children to be wrongly diagnosed with a disorder and be prescribed medicine that they do not need to be taking. This paper discusses a project that was completed for the Child Study Lab (CSL) preschool at Arizona State University (ASU), in which children’s activity within a classroom was automatically recorded using ultra-wideband technology. This project’s goal was to gather location data on the children in the CSL and analyze and assess the collected data for any patterns of behavior. The hope was that if a child’s data displayed a pattern that strayed from the norm, that this analysis could pose as a more objective way to indicate that a child may have an attention deficit problem. Fractal Dimensions and Levy Flights were researched and applied to the data analysis portion of this project.
ContributorsKjerstad, Kamryn R (Author) / Kozicki, Michael (Thesis director) / Kupfer, Anne (Committee member) / Electrical Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05