Matching Items (428)
Filtering by

Clear all filters

153487-Thumbnail Image.png
Description
Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL,

Internet browsers are today capable of warning internet users of a potential phishing attack. Browsers identify these websites by referring to blacklists of reported phishing websites maintained by trusted organizations like Google, Phishtank etc. On identifying a Unified Resource Locator (URL) requested by a user as a reported phishing URL, browsers like Mozilla Firefox and Google Chrome display an 'active' warning message in an attempt to stop the user from making a potentially dangerous decision of visiting the website and sharing confidential information like username-password, credit card information, social security number etc.

However, these warnings are not always successful at safeguarding the user from a phishing attack. On several occasions, users ignore these warnings and 'click through' them, eventually landing at the potentially dangerous website and giving away confidential information. Failure to understand the warning, failure to differentiate different types of browser warnings, diminishing trust on browser warnings due to repeated encounter are some of the reasons that make users ignore these warnings. It is important to address these factors in order to eventually improve a user’s reaction to these warnings.

In this thesis, I propose a novel design to improve the effectiveness and reliability of phishing warning messages. This design utilizes the name of the target website that a fake website is mimicking, to display a simple, easy to understand and interactive warning message with the primary objective of keeping the user away from a potentially spoof website.
ContributorsSharma, Satyabrata (Author) / Bazzi, Rida (Thesis advisor) / Walker, Erin (Committee member) / Gaffar, Ashraf (Committee member) / Arizona State University (Publisher)
Created2015
150212-Thumbnail Image.png
Description
This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management

This thesis addresses the problem of online schema updates where the goal is to be able to update relational database schemas without reducing the database system's availability. Unlike some other work in this area, this thesis presents an approach which is completely client-driven and does not require specialized database management systems (DBMS). Also, unlike other client-driven work, this approach provides support for a richer set of schema updates including vertical split (normalization), horizontal split, vertical and horizontal merge (union), difference and intersection. The update process automatically generates a runtime update client from a mapping between the old the new schemas. The solution has been validated by testing it on a relatively small database of around 300,000 records per table and less than 1 Gb, but with limited memory buffer size of 24 Mb. This thesis presents the study of the overhead of the update process as a function of the transaction rates and the batch size used to copy data from the old to the new schema. It shows that the overhead introduced is minimal for medium size applications and that the update can be achieved with no more than one minute of downtime.
ContributorsTyagi, Preetika (Author) / Bazzi, Rida (Thesis advisor) / Candan, Kasim S (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
150895-Thumbnail Image.png
Description
Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged

Broadcast Encryption is the task of cryptographically securing communication in a broadcast environment so that only a dynamically specified subset of subscribers, called the privileged subset, may decrypt the communication. In practical applications, it is desirable for a Broadcast Encryption Scheme (BES) to demonstrate resilience against attacks by colluding, unprivileged subscribers. Minimal Perfect Hash Families (PHFs) have been shown to provide a basis for the construction of memory-efficient t-resilient Key Pre-distribution Schemes (KPSs) from multiple instances of 1-resilient KPSs. Using this technique, the task of constructing a large t-resilient BES is reduced to finding a near-minimal PHF of appropriate parameters. While combinatorial and probabilistic constructions exist for minimal PHFs with certain parameters, the complexity of constructing them in general is currently unknown. This thesis introduces a new type of hash family, called a Scattering Hash Family (ScHF), which is designed to allow for the scalable and ingredient-independent design of memory-efficient BESs for large parameters, specifically resilience and total number of subscribers. A general BES construction using ScHFs is shown, which constructs t-resilient KPSs from other KPSs of any resilience ≤w≤t. In addition to demonstrating how ScHFs can be used to produce BESs , this thesis explores several ScHF construction techniques. The initial technique demonstrates a probabilistic, non-constructive proof of existence for ScHFs . This construction is then derandomized into a direct, polynomial time construction of near-minimal ScHFs using the method of conditional expectations. As an alternative approach to direct construction, representing ScHFs as a k-restriction problem allows for the indirect construction of ScHFs via randomized post-optimization. Using the methods defined, ScHFs are constructed and the parameters' effects on solution size are analyzed. For large strengths, constructive techniques lose significant performance, and as such, asymptotic analysis is performed using the non-constructive existential results. This work concludes with an analysis of the benefits and disadvantages of BESs based on the constructed ScHFs. Due to the novel nature of ScHFs, the results of this analysis are used as the foundation for an empirical comparison between ScHF-based and PHF-based BESs . The primary bases of comparison are construction efficiency, key material requirements, and message transmission overhead.
ContributorsO'Brien, Devon James (Author) / Colbourn, Charles J (Thesis advisor) / Bazzi, Rida (Committee member) / Richa, Andrea (Committee member) / Arizona State University (Publisher)
Created2012
154142-Thumbnail Image.png
Description
A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems

A load balancer is an essential part of many network systems. A load balancer is capable of dividing and redistributing incoming network traffic to different back end servers, thus improving reliability and performance. Existing load balancing solutions can be classified into two categories: hardware-based or software-based. Hardware-based load balancing systems are hard to manage and force network administrators to scale up (replacing with more powerful but expensive hardware) when their system can not handle the growing traffic. Software-based solutions have a limitation when dealing with a single large TCP flow. In recent years, with the fast developments of virtualization technology, a new trend of network function virtualization (NFV) is being adopted. Instead of using proprietary hardware, an NFV network infrastructure uses virtual machines running to implement network functions such as load balancers, firewalls, etc. In this thesis, a new load balancing system is designed and evaluated. This system is high performance and flexible. It can fully utilize the bandwidth between a load balancer and back end servers compared to traditional load balancers such as HAProxy. The experimental results show that using this NFV load balancer could have $n$ ($n$ is the number of back end servers) times better performance than HAProxy. Also, an extract, transform and load (ETL) application was implemented to demonstrate that this load balancer can shorten data load time. The experiment shows that when loading a large data set (18.3GB), our load balancer needs only 28\% less time than traditional load balancer.
ContributorsWu, Jinxuan (Author) / Syrotiuk, Violet R. (Thesis advisor) / Bazzi, Rida (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2015
157028-Thumbnail Image.png
Description
Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness,

Due to large data resources generated by online educational applications, Educational Data Mining (EDM) has improved learning effects in different ways: Students Visualization, Recommendations for students, Students Modeling, Grouping Students, etc. A lot of programming assignments have the features like automating submissions, examining the test cases to verify the correctness, but limited studies compared different statistical techniques with latest frameworks, and interpreted models in a unified approach.

In this thesis, several data mining algorithms have been applied to analyze students’ code assignment submission data from a real classroom study. The goal of this work is to explore

and predict students’ performances. Multiple machine learning models and the model accuracy were evaluated based on the Shapley Additive Explanation.

The Cross-Validation shows the Gradient Boosting Decision Tree has the best precision 85.93% with average 82.90%. Features like Component grade, Due Date, Submission Times have higher impact than others. Baseline model received lower precision due to lack of non-linear fitting.
ContributorsTian, Wenbo (Author) / Hsiao, Ihan (Thesis advisor) / Bazzi, Rida (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2019
133373-Thumbnail Image.png
Description
Many developing countries do not have health care systems that can afford technological biomedical devices or supplies to make such devices operational. To fill this void, nonprofit organizations, like Project C.U.R.E., recondition retired biomedical instrumentation so they can send medical supplies to help these developing countries. One of the issues

Many developing countries do not have health care systems that can afford technological biomedical devices or supplies to make such devices operational. To fill this void, nonprofit organizations, like Project C.U.R.E., recondition retired biomedical instrumentation so they can send medical supplies to help these developing countries. One of the issues with this is that sometimes the devices are unusable because components or expendable supplies are not available (Bhadelia). This issue has also been shown in the Impact Evaluations that Project C.U.R.E. receives from the clinics that explain the reasons why certain devices are no longer in use. That need underlies the idea on which this honors thesis has come into being. The purpose of this honors project was to create packing lists for biomedical instruments that Project C.U.R.E. recycles. This packing list would decrease the likelihood of important items being forgotten when sending devices. If an extra fuse, battery, light bulb, cuff or transducer is the difference between a functional or a nonfunctional medical device, such a list would be of benefit to Project C.U.R.E and these developing countries. In order to make this packing list, manuals for each device were used to determine what supplies were required, what was necessary for cleaning, and what supplies were desirable but functionally optional. This list was then added into a database that could be easily navigated and could help when packing up boxes for a shipment. The database also makes adding and editing the packing list simple and easy so that as Project C.U.R.E. gets more donated devices the packing list can grow.
ContributorsGraft, Kelsey Anne (Author) / Coursen, Jerry (Thesis director) / Walters, Danielle (Committee member) / Harrington Bioengineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131528-Thumbnail Image.png
Description
The Hippo signaling pathway is responsible for regulating organ size through cell proliferation, stemness, and apoptosis. Through targeting proteins Yes-associated kinase 1(YAP) and transcriptional co-activator with a PDZ-binding domain(TAZ), YAP/TAZ are unable to enter the nucleus and bind with coactivators to express target genes. To understand YAP/TAZ dynamics and its

The Hippo signaling pathway is responsible for regulating organ size through cell proliferation, stemness, and apoptosis. Through targeting proteins Yes-associated kinase 1(YAP) and transcriptional co-activator with a PDZ-binding domain(TAZ), YAP/TAZ are unable to enter the nucleus and bind with coactivators to express target genes. To understand YAP/TAZ dynamics and its role in tumorigenesis, tissue regeneration, and tissue degeneration, a regulatory network was modeled by ordinary differential equations. Using MATLAB, the deterministic behavior of the network was observed to determine YAP/TAZ activity in different states. Performing the bifurcation analysis of the system through Oscill8, three states were identified: tumorigenic/regenerative, degenerative, and homeostatic states. Further analysis through parameter modification allowed a better understanding of which proteins can be targeted for cancer and degenerative disease.
ContributorsBarra Avila, Diego Rodrigo (Author) / Tian, Xiaojun (Thesis director) / Wang, Xiao (Committee member) / Harrington Bioengineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
133882-Thumbnail Image.png
Description
Based on James Marcia's theory, identity development in youth is the degree to which one has explored and committed to a vocation [1], [2]. During the path to an engineering identity, students will experience a crisis, when one's values and choices are examined and reevaluated, and a commitment, when the

Based on James Marcia's theory, identity development in youth is the degree to which one has explored and committed to a vocation [1], [2]. During the path to an engineering identity, students will experience a crisis, when one's values and choices are examined and reevaluated, and a commitment, when the outcome of the crisis leads the student to commit to becoming an engineer. During the crisis phase, students are offered a multitude of experiences to shape their values and choices to influence commitment to becoming an engineering student. Student's identities in engineering are fostered through mentoring from industry, alumni, and peer coaching [3], [4]; experiences that emphasize awareness of the importance of professional interactions [5]; and experiences that show creativity, collaboration, and communication as crucial components to engineering. Further strategies to increase students' persistence include support in their transition to becoming an engineering student, education about professional engineers and the workplace [6], and engagement in engineering activities beyond the classroom. Though these strategies are applied to all students, there are challenges students face in confronting their current identity and beliefs before they can understand their value to society and achieve personal satisfaction. To understand student's progression in developing their engineering identity, first year engineering students were surveyed at the beginning and end of their first semester. Students were asked to rate their level of agreement with 22 statements about their engineering experience. Data included 840 cases. Items with factor loading less than 0.6 suggesting no sufficient explanation were removed in successive factor analysis to identify the four factors. Factor analysis indicated that 60.69% of the total variance was explained by the successive factors. Survey questions were categorized into three factors: engineering identity as defined by sense of belonging and self-efficacy, doubts about becoming an engineer, and exploring engineering. Statements in exploring engineering indicated student awareness, interest and enjoyment within engineering. Students were asked to think about whether they spent time learning what engineers do and participating in engineering activities. Statements about doubts about engineering to engineering indicated whether students had formed opinions about their engineering experience and had understanding about their environment. Engineering identity required thought in belonging and self-efficacy. Belonging statements called for thought about one's opinion in the importance of being an engineer, the meaning of engineering, an attachment to engineering, and self-identification as an engineer. Statements about self-efficacy required students to contemplate their personal judgement of whether they would be able to succeed and their ability to become an engineer. Effort in engineering indicated student willingness to invest time and effort and their choices and effort in their engineering discipline.
ContributorsNguyen, Amanda (Author) / Ganesh, Tirupalavanam (Thesis director) / Robinson, Carrie (Committee member) / Harrington Bioengineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133892-Thumbnail Image.png
Description
Alzheimer’s Disease (AD) affects over 5 million individuals in the U.S. and has a direct cost estimated in excess of $200 billion per year. Broadly speaking, there are two forms of AD—early-onset, familial AD (FAD) and late-onset-sporadic AD (SAD). Animal models of AD, which rely on the overexpression of FAD-related

Alzheimer’s Disease (AD) affects over 5 million individuals in the U.S. and has a direct cost estimated in excess of $200 billion per year. Broadly speaking, there are two forms of AD—early-onset, familial AD (FAD) and late-onset-sporadic AD (SAD). Animal models of AD, which rely on the overexpression of FAD-related mutations, have provided important insights into the disease. However, these models do not display important disease-related pathologies and have been limited in their ability to model the complex genetics associated with SAD.

Advances in cellular reprogramming, have enabled the generation of in vitro disease models that can be used to dissect disease mechanisms and evaluate potential therapeutics. To that end, efforts by many groups, including the Brafman laboratory, to generated patient-specific hiPSCs have demonstrated the promise of studying AD in a simplified and accessible system. However, neurons generated from these hiPSCs have shown some, but not all, of the early molecular and cellular hallmarks associated with the disease. Additionally, phenotypes and pathological hallmarks associated with later stages of the human disease have not been observed with current hiPSC-based systems. Further, disease relevant phenotypes in neurons generated from SAD hiPSCs have been highly variable or largely absent. Finally, the reprogramming process erases phenotypes associated with cellular aging and, as a result, iPSC-derived neurons more closely resemble fetal brain rather than adult brain.

It is well-established that in vivo cells reside within a complex 3-D microenvironment that plays a significant role in regulating cell behavior. Signaling and other cellular functions, such as gene expression and differentiation potential, differ in 3-D cultures compared with 2-D substrates. Nonetheless, previous studies using AD hiPSCs have relied on 2-D neuronal culture models that do not reflect the 3-D complexity of native brain tissue, and therefore, are unable to replicate all aspects of AD pathogenesis. Further, the reprogramming process erases cellular aging phenotypes. To address these limitations, this project aimed to develop bioengineering methods for the generation of 3-D organoid-based cultures that mimic in vivo cortical tissue, and to generate an inducible gene repression system to recapitulate cellular aging hallmarks.
ContributorsBounds, Lexi Rose (Author) / Brafman, David (Thesis director) / Wang, Xiao (Committee member) / Harrington Bioengineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133920-Thumbnail Image.png
Description
The combination of immunohistochemical (IHC) stainings and optical microscopy has allowed for the visualization of specific microscopic structures within tissue; however, limitations in light and antibody penetration mitigate the scale on which these images can be taken (Alshammari et al, 2016; Marx, 2014). Tissue clearing, specifically the removal of lipids

The combination of immunohistochemical (IHC) stainings and optical microscopy has allowed for the visualization of specific microscopic structures within tissue; however, limitations in light and antibody penetration mitigate the scale on which these images can be taken (Alshammari et al, 2016; Marx, 2014). Tissue clearing, specifically the removal of lipids to improve sample transparency, solves the former weakness well, but does not improve antibody penetration significantly (Chung et al, 2013; Treweek et al, 2015). Therefore, there is a need to equalize the maximum depth that light can pass through a section with the depth at which there is recognizable fluorescence. This is particularly important when staining blood vessels as traditional size limitations exclusively allows for cross sectional visualization. Passive CLARITY Technique (PACT) has been at the forefront of tissue clearing protocols, utilizing an acrylamide hydrogel solution to maintain structure and sodium dodecyl sulfate to wash out lipids (Tomer et al, 2014). PACT is limited in its ability to clear larger sections and is not conducive to IHC antibody diffusion (Treweek et al, 2015). In order to circumvent these drawbacks, CUBIC was developed as an alternative passive protocol, aimed at being scalable to any tissue size (Richardson, 2015; Susaki et al, 2015). This study compared the effectiveness of both protocols in high and low lipid tissues in the context of blood vessel staining efficacy. Upon initial comparison, it became apparent that there was a statistically significant difference in mean DAPI intensity at all depths, up to 200 micrometers, between CUBIC and PACT \u2014 the former showcasing brighter stainings. Moreover, it was found that PACT does not remove erythrocytes from the tissue meaning that their auto-fluorescence is seen during imaging. Therefore, for blood vessel stainings, only CUBIC was optimized and quantitatively analyzed. In both tissue conditions as well as for two stainings, DAPI and fibronectin (FNCT), optimized CUBIC demonstrated a statistically significant difference from standard CUBIC with regards to mean fluorescent intensity.
ContributorsSidhu, Gurpaul Singh (Author) / VanAuker, Michael (Thesis director) / Kodibagkar, Vikram (Committee member) / Harrington Bioengineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05