Matching Items (172)
Filtering by

Clear all filters

150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
148121-Thumbnail Image.png
Description

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is

This thesis proposes hardware and software security enhancements to the robotic explorer of a capstone team, in collaboration with the NASA Psyche Mission Student Collaborations program. The NASA Psyche Mission, launching in 2022 and reaching the metallic asteroid of the same name in 2026, will explore from orbit what is hypothesized to be remnant core material of an early planet, potentially providing key insights to planet formation. Following this initial mission, it is possible there would be scientists and engineers interested in proposing a mission to land an explorer on the surface of Psyche to further document various properties of the asteroid. As a proposal for a second mission, an interdisciplinary engineering and science capstone team at Arizona State University designed and constructed a robotic explorer for the hypothesized surfaces of Psyche, capable of semi-autonomously navigating simulated surfaces to collect scientific data from onboard sensors. A critical component of this explorer is the command and data handling subsystem, and as such, the security of this system, though outside the scope of the capstone project, remains a crucial consideration. This thesis proposes the pairing of Trusted Platform Module (TPM) technology for increased hardware security and the implementation of SELinux (Security Enhanced Linux) for increased software security for Earth-based testing as well as space-ready missions.

ContributorsAnderson, Kelly Joanne (Author) / Bowman, Catherine (Thesis director) / Kozicki, Michael (Committee member) / Electrical Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This thesis explores the potential for software to act as an educational experience for engineers who are learning system dynamics and controls. The specific focus is a spring-mass-damper system. First, a brief introduction of the spring-mass-damper system is given, followed by a review of the background and prior work concerning

This thesis explores the potential for software to act as an educational experience for engineers who are learning system dynamics and controls. The specific focus is a spring-mass-damper system. First, a brief introduction of the spring-mass-damper system is given, followed by a review of the background and prior work concerning this topic. Then, the methodology and main approaches of the system are explained, as well as a more technical overview of the program. Lastly, a conclusion and discussion of potential future work is covered. The project was found to be useful by several engineers who tested it. While there is still plenty of functionality to add, it is a promising first attempt at teaching engineers through software development.

ContributorsRobbins, Alexander Kalani (Author) / Kobayashi, Yoshihiro (Thesis director) / Benson, David (Committee member) / Mechanical and Aerospace Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148043-Thumbnail Image.png
Description

Automated vehicles are becoming more prevalent in the modern world. Using platoons of automated vehicles can have numerous benefits including increasing the safety of drivers as well as streamlining roadway operations. How individual automated vehicles within a platoon react to each other is essential to creating an efficient method of

Automated vehicles are becoming more prevalent in the modern world. Using platoons of automated vehicles can have numerous benefits including increasing the safety of drivers as well as streamlining roadway operations. How individual automated vehicles within a platoon react to each other is essential to creating an efficient method of travel. This paper looks at two individual vehicles forming a platoon and tracks the time headway between the two. Several speed profiles are explored for the following vehicle including a triangular and trapezoidal speed profile. It is discovered that a safety violation occurs during platoon formation where the desired time headway between the vehicles is violated. The aim of this research is to explore if this violation can be eliminated or reduced through utilization of different speed profiles.

ContributorsLarson, Kurt Gregory (Author) / Lou, Yingyan (Thesis director) / Chen, Yan (Committee member) / Civil, Environmental and Sustainable Eng Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148001-Thumbnail Image.png
Description

High-entropy alloys possessing mechanical, chemical, and electrical properties that far exceed those of conventional alloys have the potential to make a significant impact on many areas of engineering. Identifying element combinations and configurations to form these alloys, however, is a difficult, time-consuming, computationally intensive task. Machine learning has revolutionized many

High-entropy alloys possessing mechanical, chemical, and electrical properties that far exceed those of conventional alloys have the potential to make a significant impact on many areas of engineering. Identifying element combinations and configurations to form these alloys, however, is a difficult, time-consuming, computationally intensive task. Machine learning has revolutionized many different fields due to its ability to generalize well to different problems and produce computationally efficient, accurate predictions regarding the system of interest. In this thesis, we demonstrate the effectiveness of machine learning models applied to toy cases representative of simplified physics that are relevant to high-entropy alloy simulation. We show these models are effective at learning nonlinear dynamics for single and multi-particle cases and that more work is needed to accurately represent complex cases in which the system dynamics are chaotic. This thesis serves as a demonstration of the potential benefits of machine learning applied to high-entropy alloy simulations to generate fast, accurate predictions of nonlinear dynamics.

ContributorsDaly, John H (Author) / Ren, Yi (Thesis director) / Zhuang, Houlong (Committee member) / Mechanical and Aerospace Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148065-Thumbnail Image.png
Description

Self-efficacy in engineering, engineering identity, and coping in engineering have been shown in previous studies to be highly important in the advancement of one’s development in the field of engineering. Through the creation and deployment of a 17 question survey, undergraduate and first year masters students were asked to provide

Self-efficacy in engineering, engineering identity, and coping in engineering have been shown in previous studies to be highly important in the advancement of one’s development in the field of engineering. Through the creation and deployment of a 17 question survey, undergraduate and first year masters students were asked to provide information on their engagement at their university, their demographic information, and to rank their level of agreement with 22 statements relating to the aforementioned ideas. Using the results from the collected data, exploratory factor analysis was completed to identify the factors that existed and any correlations. No statistically significant correlations between the identified three factors and demographic or engagement information were found. There needs to be a significant increase in the data sample size for statistically significant results to be found. Additionally, there is future work needed in the creation of an engagement measure that successfully reflects the level and impact of participation in engineering activities beyond traditional coursework.

ContributorsJones, Elizabeth Michelle (Author) / Ganesh, Tirupalavanam (Thesis director) / Graham, Kaely (Committee member) / Electrical Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148195-Thumbnail Image.png
Description

The colossal global counterfeit market and advances in cryptography including quantum computing supremacy have led the drive for a class of anti-counterfeit tags that are physically unclonable. Dendrites, previously considered an undesirable side effect of battery operation, have promise as an extremely versatile version of such tags, with their fundamental

The colossal global counterfeit market and advances in cryptography including quantum computing supremacy have led the drive for a class of anti-counterfeit tags that are physically unclonable. Dendrites, previously considered an undesirable side effect of battery operation, have promise as an extremely versatile version of such tags, with their fundamental nature ensuring that no two dendrites are alike and that they can be read at multiple magnification scales. In this work, we first pursue a simulation for electrochemical dendrites that elucidates fundamental information about their growth mechanism. We then translate these results into physical dendrites and demonstrate methods of producing a hash from these dendrites that is damage-tolerant for real-world verification. Finally, we explore theoretical curiosities that arise from the fractal nature of dendrites. We find that uniquely ramified dendrites, which rely on lower ion mobility and conductive deposition, are particularly amenable to wavelet hashing, and demonstrate that these dendrites have strong commercial potential for securing supply chains at the highest level while maintaining a low price point.

ContributorsSneh, Tal (Author) / Kozicki, Michael (Thesis director) / Gonzalez-Velo, Yago (Committee member) / School of Molecular Sciences (Contributor) / Department of Physics (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148215-Thumbnail Image.png
Description

Time studies are an effective tool to analyze current production systems and propose improvements. The problem that motivated the project was that conducting time studies and observing the progression of components across the factory floor is a manual process. Four Industrial Engineering students worked with a manufacturing company to develo

Time studies are an effective tool to analyze current production systems and propose improvements. The problem that motivated the project was that conducting time studies and observing the progression of components across the factory floor is a manual process. Four Industrial Engineering students worked with a manufacturing company to develop Computer Vision technology that would automate the data collection process for time studies. The team worked in an Agile environment to complete over 120 classification sets, create 8 strategy documents, and utilize Root Cause Analysis techniques to audit and validate the performance of the trained Computer Vision data models. In the future, there is an opportunity to continue developing this product and expand the team’s work scope to apply more engineering skills on the data collected to drive factory improvements.

ContributorsJohnson, Katelyn Rose (Co-author) / Martz, Emma (Co-author) / Chmelnik, Nathan (Co-author) / de Guzman, Lorenzo (Co-author) / Ju, Feng (Thesis director) / Courter, Brandon (Committee member) / Industrial, Systems & Operations Engineering Prgm (Contributor, Contributor) / Industrial, Systems & Operations Engineering Prgm (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148216-Thumbnail Image.png
Description

Time studies are an effective tool to analyze current production systems and propose improvements. The problem that motivated the project was that conducting time studies and observing the progression of components across the factory floor is a manual process. Four Industrial Engineering students worked with a manufacturing company to develo

Time studies are an effective tool to analyze current production systems and propose improvements. The problem that motivated the project was that conducting time studies and observing the progression of components across the factory floor is a manual process. Four Industrial Engineering students worked with a manufacturing company to develop Computer Vision technology that would automate the data collection process for time studies. The team worked in an Agile environment to complete over 120 classification sets, create 8 strategy documents, and utilize Root Cause Analysis techniques to audit and validate the performance of the trained Computer Vision data models. In the future, there is an opportunity to continue developing this product and expand the team’s work scope to apply more engineering skills on the data collected to drive factory improvements.

ContributorsChmelnik, Nathan (Co-author) / de Guzman, Lorenzo (Co-author) / Johnson, Katelyn (Co-author) / Martz, Emma (Co-author) / Ju, Feng (Thesis director) / Courter, Brandon (Committee member) / Industrial, Systems & Operations Engineering Prgm (Contributor, Contributor) / Industrial, Systems & Operations Engineering Prgm (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011