Matching Items (60)
151925-Thumbnail Image.png
Description
This research addresses human adaptive decisions made at the Pleistocene-Holocene transition - the transition from the Last Glacial Maximum (LGM) to the climate regime in which humankind now lives - in the Mediterranean region of southeast Spain. Although on a geological time scale the Pleistocene-Holocene transition is the latest in

This research addresses human adaptive decisions made at the Pleistocene-Holocene transition - the transition from the Last Glacial Maximum (LGM) to the climate regime in which humankind now lives - in the Mediterranean region of southeast Spain. Although on a geological time scale the Pleistocene-Holocene transition is the latest in a series of widespread environmental transformations due to glacial-interglacial cycles, it is the only one for which we have a record of the response by modern humans. Mediterranean Spain lay outside the refugium areas of late Pleistocene Europe, in which advancing ice sheets limited the land available for subsistence and caused relative demographic packing of hunter-gatherers. Therefore, the archaeological records of Mediterranean Spain contain more generally applicable states of the Pleistocene-Holocene transition, making it a natural laboratory for research on human adaptation to an environmental transformation. Foragers in Mediterranean Spain appear to have primarily adapted to macroclimatic change by extending their social networks to access new subsistence resources and by changing the mix of traditional relationships. Comparing faunal records from two cave sites near the Mediterranean coast with Geographic Information System (GIS) reconstructions of the coastal littoral plain from the LGM to the Holocene indicates the loss of the large ungulate species (mainly Bos primigenius and Equus) at one site coincided with the associated littoral disappearing due to sea level rise in the late Upper Paleolithic. Farther north, where portions of the associated littoral remained due to a larger initial mass and a more favorable topography, the species represented in the faunal record were constant through time. Social boundary defense definitions of territory require arranging social relationships in order to access even this lightly populated new hunting area on the interior plain. That the values of the least-cost-paths fit the parameters of two models equating varying degrees of social alliance with direct travel distances also helps support the hypothesis that foragers in Mediterranean Spain adapted to the consequences of macroclimatic change by extending their social networks to gain access to new subsistence resources Keeping these relationships stable and reliable was a mitigating factor in the mobility patterns of foragers during this period from direct travel to more distant down-the-line exchange. Information about changing conditions and new circumstances flowed along these same networks of social relationships. The consequences of climate-induced environmental changes are already a concern in the world, and human decisions in regard to future conditions are built upon past precedents. As the response to environmental risk centers on increasing the resilience of vulnerable smallholders, archaeology has an opportunity to apply its long-term perspective in the search for answers
ContributorsSchmich, Steven A (Author) / Clark, Geoffrey A. (Thesis advisor) / Barton, Michael (Thesis advisor) / Bearat, Hamdallah (Committee member) / Jochim, Michael A. (Committee member) / Arizona State University (Publisher)
Created2013
149471-Thumbnail Image.png
Description
Patterns of social conflict and cooperation among irrigation communities in southern Arizona from the Classic Hohokam through the Historic period (c. 1150 to c. 1900 CE) are analyzed. Archaeological survey of the Gila River Indian Community has yielded data that allow study of populations within the Hohokam core area (the

Patterns of social conflict and cooperation among irrigation communities in southern Arizona from the Classic Hohokam through the Historic period (c. 1150 to c. 1900 CE) are analyzed. Archaeological survey of the Gila River Indian Community has yielded data that allow study of populations within the Hohokam core area (the lower Salt and middle Gila valleys). An etic design approach is adopted that analyzes tasks artifacts were intended to perform. This research is predicated on three hypotheses. It is suggested that (1) projectile point mass and performance exhibit directional change over time, and weight can therefore be used as a proxy for relative age within types, (2) stone points were designed differently for hunting and warfare, and (3) obsidian data can be employed to analyze socioeconomic interactions. This research identifies variation in the distribution of points that provides evidence for aspects of warfare, hunting, and the social mechanisms involved in procuring raw materials. Ethnographic observations and archaeological data suggest that flaked-stone points were designed (1) for hunting ungulates, or (2) for use against people. The distribution of points through time and space consequently provides evidence for conflict, and those aspects of subsistence in which they played a role. Points were commonly made from obsidian, a volcanic glass with properties that allow sources to be identified with precision. Patterns in obsidian procurement can therefore be employed to address socioeconomic interactions. By the 18th century, horticulturalists were present in only a few southern Arizona locations. Irrigation communities were more widely distributed during the Classic Period; the causes of the collapse of these communities and relationships between prehistoric and historic indigenes have been debated for centuries. Data presented here suggest that while changes in material culture occurred, multiple lines of evidence for cultural continuity from the prehistoric to Historic periods are present. The O'Odham creation story suggests that the population fluctuated over time, and archaeological evidence supports this observation. It appears that alterations in cultural practices and migrations occurred during intervals of low population density, and these fluctuations forced changes in political, economic, and social relationships along the middle Gila River
ContributorsLoendorf, Christopher R. (Author) / Simon, Arleyn (Thesis advisor) / Clark, Geoffrey (Thesis advisor) / Barton, Michael (Committee member) / Ravesloot, John (Committee member) / Arizona State University (Publisher)
Created2010
Description
Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended

Proxy digital signatures are a subset of proxy cryptography that enable a peer, as a proxy delegator, to delegate signing privileges to another trusted peer, who becomes a proxy signer. The proxy signer then signs authorized transactions routed to it from the proxy delegator, to then send to the intended third party on their behalf. This has great applications for computer networks where certain devices lack sufficient computational power to secure themselves and may rely on trusted and computationally more powerful peers, particularly within edge and fog networks. Although there are multiple proxy digital signature schemas that are circulated within cryptography-centric research papers, a practical software implementation has yet to be created. In this paper we describe Mengde Signatures: the first practical software implementation of proxy digital signatures. We expound upon the current architecture and process for how proxy signatures are implemented and function in a software engineering context. Although applicable to many different types of networks, we showcase the application of Mengde Signatures on an open source Proof-Of-Work Blockchain.
ContributorsMendoza, Francis (Author) / Boscovic, Dragan (Thesis director) / Zhao, Ming (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
131073-Thumbnail Image.png
Description
Faults found in the arid to semi-arid Basin and Range Physiographic province of the southwestern US are given broad age definitions in terms of which features appear to be the oldest. Particularly in the northwestern corner of Arizona, detailed geomorphic studies on the tectonic history and timing of faulting are

Faults found in the arid to semi-arid Basin and Range Physiographic province of the southwestern US are given broad age definitions in terms of which features appear to be the oldest. Particularly in the northwestern corner of Arizona, detailed geomorphic studies on the tectonic history and timing of faulting are not widespread. At the base of the Virgin Mountains in northwestern Arizona is a fault scarp along the Piedmont Fault line. This normal fault crosses a series of alluvial fans that are filled with sediments of ambiguous ages. Previous studies that were done in this region find a broad, Miocene age for the exhumation and uplift of these surfaces, with some indications of Laramide faulting history. However, specific fault characteristics and a time constraint of the tectonic history of the Piedmont Fault scarp has yet to be established. Here, we aim to determine the age, fault-slip rate, seismic history, and potential hazard of the fault scarp near Scenic and Littlefield, Arizona through structure from motion (SfM) modeling, which is a form of photogrammetry using a drone. In addition, we distinguish the climatic and tectonic influences on the geomorphology observed along the scarp through analysis along the fault line. With data collected from a ~500 m section of the fault, we present results from a digital elevation model (DEM) and orthophotos derived through the SfM modelling. Based on field observations and morphologic dating, we determine that the Piedmont Fault experiences an approximately continuous fault-slip and an earthquake recurrence interval in the range of 7,000 years. The approximate age of the scarp is 16.0 ka ± 5 kyr. Therefore, we conclude that the earthquake hazard posed to nearby cities is minimal but not nonexistent. Future work includes further analysis of fault profiles due to uncertainty in the present one and Terrestrial Cosmogenic Nuclide (TCN) dating of samples taken from the tops of boulders in a residual debris flow sitting on faulted and unfaulted alluvia. Determining the ages for these boulder surfaces can hopefully further inform our knowledge of the tectonic activity present in the North Virgin Mountains.
ContributorsApel, Emily Virginia (Author) / Heimsath, Arjun (Thesis director) / Arrowsmith, Ramon (Committee member) / Whipple, Kelin (Committee member) / School of Molecular Sciences (Contributor) / School of International Letters and Cultures (Contributor) / Barrett, The Honors College (Contributor)
Created2020-12
131504-Thumbnail Image.png
Description
In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age

In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age of technology where everything is being digitalized and stored online, people all over the world are concerned about what is happening to their personal information and how they can trust it is being kept safe. This paper describes, first, the importance of protecting user data, second, one easy tool that companies and developers can use to help ensure that their user’s information (credit card information specifically) is kept safe, how to implement that tool, and finally, future work and research that needs to be done. The solution I propose is a software tool that will keep credit card data secured. It is only a small step towards achieving a completely secure data anonymized system, but when implemented correctly, it can reduce the risk of credit card data from being exposed to the public. The software tool is a script that can scan every viable file in any given system, server, or other file-structured Linux system and detect if there any visible credit card numbers that should be hidden.
ContributorsPappas, Alexander (Author) / Zhao, Ming (Thesis director) / Kuznetsov, Eugene (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131863-Thumbnail Image.png
Description
Quantum computers provide a promising future, where computationally difficult
problems can be executed exponentially faster than the current classical computers we have in use today. While there is tremendous research and development in the creation of quantum computers, there is a fundamental challenge that exists in the quantum world. Due to

Quantum computers provide a promising future, where computationally difficult
problems can be executed exponentially faster than the current classical computers we have in use today. While there is tremendous research and development in the creation of quantum computers, there is a fundamental challenge that exists in the quantum world. Due to the fragility of the quantum world, error correction methods have originated since 1995 to tackle the giant problem. Since the birth of the idea that these powerful computers can crunch and process numbers beyond the limit of the current computers, there exist several mathematical error correcting codes that could potentially give the required stability in the fragile and fault tolerant quantum world. While there has been a multitude of possible solutions, there is no one single error correcting code that is the key to solving the problem. Almost every solution presented has shared with it a limiting factor or an issue that prevents it from becoming the breakthrough that is desperately needed.

This paper gives an introductory knowledge of what is the quantum world and why there is a need for error correcting topologies. Finally, it introduces one recent topology that could be added to the list of possible solutions to this central problem. Rather than focusing on the mathematical frameworks, the paper introduces the main concepts so that most readers even outside the major field of computer science can understand what the main problem is and how this topology attempts to solve it.
ContributorsAhmed, Umer (Author) / Colbourn, Charles (Thesis director) / Zhao, Ming (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
Description
The mountains of western North America are spectacular and diverse, from sheer walls of crumbling black limestone in the Canadian Rockies, to smooth glacially polished granite in the Wind River Range, to gargantuan ice-clad volcanoes in the Cascades. These great bastions of rock, snow, and ice, still very much wild

The mountains of western North America are spectacular and diverse, from sheer walls of crumbling black limestone in the Canadian Rockies, to smooth glacially polished granite in the Wind River Range, to gargantuan ice-clad volcanoes in the Cascades. These great bastions of rock, snow, and ice, still very much wild and untamed, provide an incredible arena for adventure, exploration, and challenge. Over the past three years, I have devoted thousands of hours to exploring these vast wild places, climbing high peaks, steep cliffs, and frozen waterfalls. In doing so, I studied the rich geologic history of the mountains. This thesis project is a compilation of stories and images from those adventures, along with the stories of the mountains themselves: how the rocks were formed, thrust skyward, and sculpted over the ages into their present, glorious form. The photographic and detailed narrative of the geology and adventures is on a new website called Cloud Piercers, which currently features three geologically diverse mountain massifs: (1) Mount Rainier, an active volcano in the Cascade Range of Washington; (2) Mount Robson, the highest peak in the Canadian Rockies, within a terrain of folded Paleozoic sedimentary rocks; and (3) the Wind River Range of Wyoming, composed mostly of Archean metamorphic and granitic rocks. This website will be expanded in the future as the geologic studies and adventures continue.
ContributorsSteadman, Dane Kyle (Author) / Reynolds, Stephen (Thesis director) / Johnson, Julia (Committee member) / Heimsath, Arjun (Committee member) / School of Earth and Space Exploration (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
132750-Thumbnail Image.png
Description
Deep learning and AI have grabbed tremendous attention in the last decade. The substantial accuracy improvement by neural networks in common tasks such as image classification and speech recognition has made deep learning as a replacement for many conventional machine learning techniques. Training Deep Neural networks require a lot of

Deep learning and AI have grabbed tremendous attention in the last decade. The substantial accuracy improvement by neural networks in common tasks such as image classification and speech recognition has made deep learning as a replacement for many conventional machine learning techniques. Training Deep Neural networks require a lot of data, and therefore vast of amounts of computing resources to process the data and train the model for the neural network. The most obvious solution to solving this problem is to speed up the time it takes to train Deep Neural networks.
AI and deep learning workloads are different from the conventional cloud and mobile workloads, with respect to: (1) Computational Intensity, (2) I/O characteristics, and (3) communication pattern. While there is a considerable amount of research activity on the theoretical aspects of AI and Deep Learning algorithms that run with greater efficiency, there are only a few studies on the infrastructural impact of Deep Learning workloads on computing and storage resources in distributed systems.
It is typical to utilize a heterogeneous mixture of CPU and GPU devices to perform training on a neural network. Google Brain has a developed a reinforcement model that can place training operations across a heterogeneous cluster. Though it has only been tested with local devices in a single cluster. This study will explore the method’s capabilities and attempt to apply this method on a cluster with nodes across a network.
ContributorsNguyen, Andrew Hoang (Author) / Zhao, Ming (Thesis director) / Biookaghazadeh, Saman (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05
134537-Thumbnail Image.png
Description
Located in the Sunbelt of the Southwestern United States, Phoenix Arizona finds itself in one of the hottest, driest places in the world. Thankfully, Phoenix has the Salt River, Gila River, Verde River, and a vast aquifer to meet the water demands of the municipal, industrial, and agricultural sectors. However,

Located in the Sunbelt of the Southwestern United States, Phoenix Arizona finds itself in one of the hottest, driest places in the world. Thankfully, Phoenix has the Salt River, Gila River, Verde River, and a vast aquifer to meet the water demands of the municipal, industrial, and agricultural sectors. However, rampant groundwater pumping and over-allocation of these water supplies based on unprecedented, high flows of the Colorado River have created challenges for water managers to ensure adequate water supply for the future. Combined with the current 17-year drought and the warming and drying projections of climate change, the future of water availability in Phoenix will depend on the strength of water management laws, educating the public, developing a strong sense of community, and using development to manage population and support sustainability. As the prevalence of agriculture declines in and around Phoenix, a substantial amount of water is saved. Instead of storing this saved water, Phoenix is using it to support further development. Despite uncertainty regarding the abundant and continuous availability of Phoenix's water resources, development has hardly slowed and barely shifted directions to support sustainability. Phoenix was made to grow until it legally cannot expand anymore. In order to develop solutions, we must first understand the push for development in water-stressed Phoenix, Arizona.
ContributorsVasquez, Brianna Nicole (Author) / Heimsath, Arjun (Thesis director) / Whipple, Kelin (Committee member) / School of Earth and Space Exploration (Contributor) / School of Art (Contributor) / School of Community Resources and Development (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05
134328-Thumbnail Image.png
Description
As mobile devices have risen to prominence over the last decade, their importance has been increasingly recognized. Workloads for mobile devices are often very different from those on desktop and server computers, and solutions that worked in the past are not always the best fit for the resource- and energy-constrained

As mobile devices have risen to prominence over the last decade, their importance has been increasingly recognized. Workloads for mobile devices are often very different from those on desktop and server computers, and solutions that worked in the past are not always the best fit for the resource- and energy-constrained computing that characterizes mobile devices. While this is most commonly seen in CPU and graphics workloads, this device class difference extends to I/O as well. However, while a few tools exist to help analyze mobile storage solutions, there exists a gap in the available software that prevents quality analysis of certain research initiatives, such as I/O deduplication on mobile devices. This honors thesis will demonstrate a new tool that is capable of capturing I/O on the filesystem layer of mobile devices running the Android operating system, in support of new mobile storage research. Uniquely, it is able to capture both metadata of writes as well as the actual written data, transparently to the apps running on the devices. Based on a modification of the strace program, fstrace and its companion tool fstrace-replay can record and replay filesystem I/O of actual Android apps. Using this new tracing tool, several traces from popular Android apps such as Facebook and Twitter were collected and analyzed.
ContributorsMor, Omri (Author) / Zhao, Ming (Thesis director) / Zhao, Ziming (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / School of Mathematical and Statistical Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2017-05