Matching Items (1,698)
Filtering by

Clear all filters

190888-Thumbnail Image.png
Description
Due to the internet being in its infancy, there is no consensus regarding policy approaches that various countries have taken. These policies range from strict government control to liberal access to the internet which makes protecting individual private data difficult. There are too many loopholes and various forms of policy

Due to the internet being in its infancy, there is no consensus regarding policy approaches that various countries have taken. These policies range from strict government control to liberal access to the internet which makes protecting individual private data difficult. There are too many loopholes and various forms of policy on how to approach protecting data. There must be effort by both the individual, government, and private entities by using theoretical mixed methods to approach protecting oneself properly online.
ContributorsPeralta, Christina A (Author) / Scheall, Scott (Thesis advisor) / Hollinger, Keith (Thesis advisor) / Alozie, Nicholas (Committee member) / Arizona State University (Publisher)
Created2023
Description
The interpersonal, subjective, and communication skills we carry with us are crucial to our professional successes, sometimes even more crucial than the technical skills we use to execute tasks. The engineering industry is wildly technical and competitive in order to define a better tomorrow for the human population. However, such

The interpersonal, subjective, and communication skills we carry with us are crucial to our professional successes, sometimes even more crucial than the technical skills we use to execute tasks. The engineering industry is wildly technical and competitive in order to define a better tomorrow for the human population. However, such a technical field often neglects the use of these soft skills, both originating from students, employees, and companies. In this thesis, I delve into the importance and various applications of soft skills within the engineering industry, the presence of a gap among engineers' expected versus actual soft skill usage, and if anything can be done to mend that gap.
ContributorsHove, Colton (Author) / Montoya, Detra (Thesis director) / Schlacter, John (Committee member) / Barrett, The Honors College (Contributor) / Department of Marketing (Contributor)
Created2023-12
Description
The honors thesis explores the relationship between academic majors and the entrepreneurial mindset, focusing on whether Computer Science students have a perceived edge. The study involves a survey of 121 diverse Arizona State University students, complemented by in-depth interviews with 12 participants across various majors. Insights reveal the complex interplay

The honors thesis explores the relationship between academic majors and the entrepreneurial mindset, focusing on whether Computer Science students have a perceived edge. The study involves a survey of 121 diverse Arizona State University students, complemented by in-depth interviews with 12 participants across various majors. Insights reveal the complex interplay of psychological factors influencing major selection, with Computer Science students advocating for more entrepreneurship-related courses. Challenges include time constraints for STEM majors in pursuing extracurricular activities and a call for universities to proactively integrate entrepreneurship education. While acknowledging the study's limitations, the thesis emphasizes the need for universities to adapt to changing student mindsets. Despite hurdles, the collective belief is that internal determination and effort drive students forward.
ContributorsAgarwal, Sarthak (Author) / Meuth, Ryan (Thesis director) / Sebold, Brent (Committee member) / Barrett, The Honors College (Contributor)
Created2023-12
190719-Thumbnail Image.png
Description
Social media platforms provide a rich environment for analyzing user behavior. Recently, deep learning-based methods have been a mainstream approach for social media analysis models involving complex patterns. However, these methods are susceptible to biases in the training data, such as participation inequality. Basically, a mere 1% of users generate

Social media platforms provide a rich environment for analyzing user behavior. Recently, deep learning-based methods have been a mainstream approach for social media analysis models involving complex patterns. However, these methods are susceptible to biases in the training data, such as participation inequality. Basically, a mere 1% of users generate the majority of the content on social networking sites, while the remaining users, though engaged to varying degrees, tend to be less active in content creation and largely silent. These silent users consume and listen to information that is propagated on the platform.However, their voice, attitude, and interests are not reflected in the online content, making the decision of the current methods predisposed towards the opinion of the active users. So models can mistake the loudest users for the majority. To make the silent majority heard is to reveal the true landscape of the platform. In this dissertation, to compensate for this bias in the data, which is related to user-level data scarcity, I introduce three pieces of research work. Two of these proposed solutions deal with the data on hand while the other tries to augment the current data. Specifically, the first proposed approach modifies the weight of users' activity/interaction in the input space, while the second approach involves re-weighting the loss based on the users' activity levels during the downstream task training. Lastly, the third approach uses large language models (LLMs) and learns the user's writing behavior to expand the current data. In other words, by utilizing LLMs as a sophisticated knowledge base, this method aims to augment the silent user's data.
ContributorsKarami, Mansooreh (Author) / Liu, Huan (Thesis advisor) / Sen, Arunabha (Committee member) / Davulcu, Hasan (Committee member) / Mancenido, Michelle V. (Committee member) / Arizona State University (Publisher)
Created2023
ContributorsDeliwala, Dheeti (Author) / Bryan, Chris (Thesis director) / Strickland, James (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor)
Created2023-12
ContributorsDeliwala, Dheeti (Author) / Bryan, Chris (Thesis director) / Strickland, James (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor)
Created2023-12
Description
For this study, my overarching goal was to understand the possibilities of humanity’s future in space exploration. Addressing the future of space exploration not only opens doors for a multitude of discoveries but may answer questions that can be essential to our survival on Earth. This study, more specifically, aimed

For this study, my overarching goal was to understand the possibilities of humanity’s future in space exploration. Addressing the future of space exploration not only opens doors for a multitude of discoveries but may answer questions that can be essential to our survival on Earth. This study, more specifically, aimed to determine how college students at Arizona State University, engineering and astronomy students in particular, visualize the future of space exploration, as in the future, they will become the leading experts at the forefront of all space-related developments. The method through which I have conducted this study is a short survey, consisting of a variety of questions, designed to encourage students to develop their own unique interpretations of space exploration and ultimately, its imminent future. The results ultimately demonstrated that most participants in the study believed that political obstacles were the most prevalent concern in the further development of space exploration. There also appeared to be a moderate outlook on the future success and vitality of space exploration among student scientists and engineers. From a statistical standpoint, there appeared to be no alarming difference of opinion between these two ASU student groups.
ContributorsMontano, Sebastian (Author) / Voorhees, Matthew (Thesis director) / Aganaba, Timiebi (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor) / School of Earth and Space Exploration (Contributor)
Created2023-12
Description
This creative project details 5 engineers who made contributions to the ways that we live life today, yet have received little to no recognition for their efforts. The 5 engineers presented are Gottfried Wilhelm Leibniz, George Stephenson, Charles Babbage, David Alter, and Nikola Tesla. Each engineer is detailed via a

This creative project details 5 engineers who made contributions to the ways that we live life today, yet have received little to no recognition for their efforts. The 5 engineers presented are Gottfried Wilhelm Leibniz, George Stephenson, Charles Babbage, David Alter, and Nikola Tesla. Each engineer is detailed via a portrait and a biography that covers a little bit of their life and the contributions that they made.
ContributorsNieves, Timothy (Author) / Davis, Turner (Thesis director) / Green, Heather (Committee member) / Barrett, The Honors College (Contributor) / Mechanical and Aerospace Engineering Program (Contributor)
Created2023-12
190728-Thumbnail Image.png
Description
Human civilization within the last two decades has largely transformed into an online one, with many of its associated activities taking place on computers and complex networked systems -- their analog and real-world equivalents having been rendered obsolete.These activities run the gamut from the ordinary and mundane, like ordering food,

Human civilization within the last two decades has largely transformed into an online one, with many of its associated activities taking place on computers and complex networked systems -- their analog and real-world equivalents having been rendered obsolete.These activities run the gamut from the ordinary and mundane, like ordering food, to complex and large-scale, such as those involving critical infrastructure or global trade and communications. Unfortunately, the activities of human civilization also involve criminal, adversarial, and malicious ones with the result that they also now have their digital equivalents. Ransomware, malware, and targeted cyberattacks are a fact of life today and are instigated not only by organized criminal gangs, but adversarial nation-states and organizations as well. Needless to say, such actions result in disastrous and harmful real-world consequences. As the complexity and variety of software has evolved, so too has the ingenuity of attacks that exploit them; for example modern cyberattacks typically involve sequential exploitation of multiple software vulnerabilities.Compared to a decade ago, modern software stacks on personal computers, laptops, servers, mobile phones, and even Internet of Things (IoT) devices involve a dizzying array of interdependent programs and software libraries, with each of these components presenting attractive attack-surfaces for adversarial actors. However, the responses to this still rely on paradigms that can neither react quickly enough nor scale to increasingly dynamic, ever-changing, and complex software environments. Better approaches are therefore needed, that can assess system readiness and vulnerabilities, identify potential attack vectors and strategies (including ways to counter them), and proactively detect vulnerabilities in complex software before they can be exploited. In this dissertation, I first present a mathematical model and associated algorithms to identify attacker strategies for sequential cyberattacks based on attacker state, attributes and publicly-available vulnerability information.Second, I extend the model and design algorithms to help identify defensive courses of action against attacker strategies. Finally, I present my work to enhance the ability of coverage-based fuzzers to identify software vulnerabilities by providing visibility into complex, internal program-states.
ContributorsPaliath, Vivin Suresh (Author) / Doupe, Adam (Thesis advisor) / Shoshitaishvili, Yan (Thesis advisor) / Wang, Ruoyu (Committee member) / Shakarian, Paulo (Committee member) / Arizona State University (Publisher)
Created2023
161954-Thumbnail Image.png
Description
In this dissertation, the nanofabrication process is characterized for fabrication of nanostructure on surface of silicon and gallium phosphide using silica nanosphere lithography (SNL) and metal assisted chemical etching (MACE) process. The SNL process allows fast process time and well defined silica nanosphere monolayer by spin-coating process after mixing N,N-dimethyl-formamide

In this dissertation, the nanofabrication process is characterized for fabrication of nanostructure on surface of silicon and gallium phosphide using silica nanosphere lithography (SNL) and metal assisted chemical etching (MACE) process. The SNL process allows fast process time and well defined silica nanosphere monolayer by spin-coating process after mixing N,N-dimethyl-formamide (DMF) solvent. The MACE process achieves the high aspect ratio structure fabrication using the reaction between metal and wet chemical. The nanostructures are fabricated on Si surface for enhanced light management, but, without proper surface passivation those gains hardly impact the performance of the solar cell. The surface passivation of nanostructures is challenging, not only due to larger surface areas and aspect ratios, but also has a direct result of the nanofabrication processes. In this research, the surface passivation of silicon nanostructures is improved by modifying the silica nanosphere lithography (SNL) and the metal assisted chemical etching (MACE) processes, frequently used to fabricate nanostructures. The implementation of a protective silicon oxide layer is proposed prior to the lithography process to mitigate the impact of the plasma etching during the SNL. Additionally, several adhesion layers are studied, chromium (Cr), nickel (Ni) and titanium (Ti) with gold (Au), used in the MACE process. The metal contamination is one of main damage and Ti makes the mitigation of metal contamination. Finally, a new chemical etching step is introduced, using potassium hydroxide at room temperature, to smooth the surface of the nanostructures after the MACE process. This chemical treatment allows to improve passivation by surface area control and removing surface defects. In this research, I demonstrate the Aluminum Oxide (Al2O3) passivation on nanostructure using atomic layer deposition (ALD) process. 10nm of Al2O3 layer makes effective passivation on nanostructure with optimized post annealing in forming gas (N2/H2) environment. However, 10nm thickness is not suitable for hetero structure because of carrier transportation. For carrier transportation, ultrathin Al2O3 (≤ 1nm) layer is used for passivation, but effective passivation is not achieved because of insufficient hydrogen contents. This issue is solved to use additional ultrathin SiO2 (1nm) below Al2O3 layer and hydrogenation from doped a-Si:H. Moreover, the nanostructure is creased on gallium phosphide (GaP) by SNL and MACE process. The fabrication process is modified by control of metal layer and MACE solution.
ContributorsKim, Sangpyeong (Author) / Honsberg, Christiana (Thesis advisor) / Bowden, Stuart (Committee member) / Goryll, Michael (Committee member) / Augusto, Andre (Committee member) / Arizona State University (Publisher)
Created2021