This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 314
Filtering by

Clear all filters

151880-Thumbnail Image.png
Description
The connection between Hollywood costume design and the films of the 007/James Bond franchise, especially in regards to the changing perspective of the “Bond Girl”, is an intricate relationship that has previously been little researched. In the most recent Bond films, in particular, the female characters have become more powerful

The connection between Hollywood costume design and the films of the 007/James Bond franchise, especially in regards to the changing perspective of the “Bond Girl”, is an intricate relationship that has previously been little researched. In the most recent Bond films, in particular, the female characters have become more powerful than the early characters and their roles within the narratives have changed with their characters taking on stronger and more integral roles. This thesis seeks to examine the films of the 007/James Bond franchise and how the rhetoric of the franchise’s costume design affects the representation of femininity and power in regards to the Bond Girls. After an overview of Bond history and costume theory, two films are analyzed as case studies: Dr. No (1962) which marks the beginning of the film franchise and Casino Royale (2006), which marks the more recent turn the films have taken. This thesis examines how the representations of Bond Girls and the use of costume design for their characters have changed over the course of the franchise from the days of Sean Connery to the recent reboot of the franchise with Daniel Craig as 007 James Bond. In addition to an examination of Bond Girl costume design, this thesis considers the role and influence of the costume designers. A designer’s vision of a character is derived from both the writing and the physical features of the actresses before them. Here this thesis considers how the rhetorical choices made by designers have contributed to an understanding of the relationship between femininity and power. Finally it shows how the costumes effect the power of the female characters and how the Bond Girls of today (Casino Royale) compare and/or contrast to Bond Girls of the past (Dr. No). This thesis combines the areas of feminist film theory and costume theory to provide an original rhetorical analysis of the Bond series in relation to costume design and examines the rhetorical statements made by the costume designers in their designs for the characters and how those statements influence the representations of the characters.
ContributorsSeverson, Andrea (Author) / Goggin, Maureen (Thesis advisor) / Ore, Ersula (Committee member) / Lamp, Kathleen (Committee member) / Arizona State University (Publisher)
Created2013
151708-Thumbnail Image.png
Description
Simultaneously culture heroes and stumbling buffoons, Tricksters bring cultural tools to the people and make the world more habitable. There are common themes in these figures that remain fruitful for the advancement of culture, theory, and critical praxis. This dissertation develops a method for opening a dialogue with Trickster figures.

Simultaneously culture heroes and stumbling buffoons, Tricksters bring cultural tools to the people and make the world more habitable. There are common themes in these figures that remain fruitful for the advancement of culture, theory, and critical praxis. This dissertation develops a method for opening a dialogue with Trickster figures. It draws from established literature to present a newly conceived and more flexible Trickster archetype. This archetype is more than a collection of traits; it builds on itself processually to form a method for analysis. The critical Trickster archetype includes the fundamental act of crossing borders; the twin ontologies of ambiguity and liminality; the particular tactics of humor, duplicity, and shape shifting; and the overarching cultural roles of culture hero and stumbling buffoon. Running parallel to each archetypal element, though, are Trickster's overarching critical spirit of Quixotic utopianism and underlying telos of manipulating human relationships. The character 'Q' from Star Trek: The Next Generation is used to demonstrate the critical Trickster archetype. To be more useful for critical cultural studies, Trickster figures must also be connected to their socio-cultural and historical contexts. Thus, this dissertation offers a second set of analytics, a dialogical method that connects Tricksters to the worlds they make more habitable. This dialogical method, developed from the work of M. M. Bakhtin and others, consists of three analytical tools: utterance, intertextuality, and chronotope. Utterance bounds the text for analysis. Intertextuality connects the utterance, the text, to its context. Chronotope suggests particular spatio-temporal relationships that help reveal the cultural significance of a dialogical performance. Performance artists Andre Stitt, Ann Liv Young, and Steven Leyba are used to demonstrate the method of Trickster dialogics. A concluding discussion of Trickster's unique chronotope reveals its contributions to conceptions of utopia and futurity. This dissertation offers theoretical advancements about the significance and tactics of subversive communication practices. It offers a new and unique method for cultural and performative analyses that can be expanded into different kinds of dialogics. Trickster dialogics can also be used generatively to direct and guide the further development of performative praxis.
ContributorsSalinas, Chema (Author) / de la Garza, Amira (Thesis advisor) / Carlson, Cheree (Committee member) / Olson, Clark (Committee member) / Ellsworth, Angela (Committee member) / Arizona State University (Publisher)
Created2013
152179-Thumbnail Image.png
Description
As the complexity of robotic systems and applications grows rapidly, development of high-performance, easy to use, and fully integrated development environments for those systems is inevitable. Model-Based Design (MBD) of dynamic systems using engineering software such as Simulink® from MathWorks®, SciCos from Metalau team and SystemModeler® from Wolfram® is quite

As the complexity of robotic systems and applications grows rapidly, development of high-performance, easy to use, and fully integrated development environments for those systems is inevitable. Model-Based Design (MBD) of dynamic systems using engineering software such as Simulink® from MathWorks®, SciCos from Metalau team and SystemModeler® from Wolfram® is quite popular nowadays. They provide tools for modeling, simulation, verification and in some cases automatic code generation for desktop applications, embedded systems and robots. For real-world implementation of models on the actual hardware, those models should be converted into compilable machine code either manually or automatically. Due to the complexity of robotic systems, manual code translation from model to code is not a feasible optimal solution so we need to move towards automated code generation for such systems. MathWorks® offers code generation facilities called Coder® products for this purpose. However in order to fully exploit the power of model-based design and code generation tools for robotic applications, we need to enhance those software systems by adding and modifying toolboxes, files and other artifacts as well as developing guidelines and procedures. In this thesis, an effort has been made to propose a guideline as well as a Simulink® library, StateFlow® interface API and a C/C++ interface API to complete this toolchain for NAO humanoid robots. Thus the model of the hierarchical control architecture can be easily and properly converted to code and built for implementation.
ContributorsRaji Kermani, Ramtin (Author) / Fainekos, Georgios (Thesis advisor) / Lee, Yann-Hang (Committee member) / Sarjoughian, Hessam S. (Committee member) / Arizona State University (Publisher)
Created2013
152188-Thumbnail Image.png
Description
This study analyzes syllabi for first-year college composition courses and interview responses to examine how the choices made by instructors affect online course design. Using the Syllabus Assessment Instrument designed by Madson, Melchert and Whipp (2004), this dissertation looks specifically at attendance and participation policies, course behavior policies, contact information,

This study analyzes syllabi for first-year college composition courses and interview responses to examine how the choices made by instructors affect online course design. Using the Syllabus Assessment Instrument designed by Madson, Melchert and Whipp (2004), this dissertation looks specifically at attendance and participation policies, course behavior policies, contact information, required material choices, course organization decisions and tool decisions to reveal how instructors do or do not accommodate online class pedagogies. This study finds that the choices instructors make in syllabus design provide significant information about the overall online course design itself. Using Selber's multiliteracies as a frame for understanding the choices made by instructors, this study finds that instructors focus primarily on functional literacies in their discourses and in the way they communicate their choices to students. Instructors vary in how they inform students of the mechanics of how to interact with tools, how often to interact with the online course, and how to use the tools within the online course. While these aspects of online courses are important, focusing on these aspects of the online course overshadows alternative perspectives on tool use that could encourage critical reflection by both instructors and students. To help instructors and departments design more effective syllabi and courses, this study raises questions and offers observations about how instructors communicate policies and how they understand these policies and pedagogies in online courses. In providing general guidelines for syllabus design and course design, this study will help writing instructors and composition programs better understand the significance of the choices they make in online course design.
ContributorsPfannenstiel, Amber Nicole (Author) / Goggin, Peter (Thesis advisor) / Daly Goggin, Maureen (Committee member) / Hayes, Elisabeth (Committee member) / Arizona State University (Publisher)
Created2013
152138-Thumbnail Image.png
Description
The current research examines the influence of disciplines, advisors, committees, language, culture, and previous experiences in students' search and selection of dissertation topics, as well as whether and how students react to those influences during this process. Invention has been an area of research for rhetoricians for centuries, but most

The current research examines the influence of disciplines, advisors, committees, language, culture, and previous experiences in students' search and selection of dissertation topics, as well as whether and how students react to those influences during this process. Invention has been an area of research for rhetoricians for centuries, but most modern research focuses exclusively on the pre-writing process in first composition classrooms (Young, 1976). The current research collected survey and interview data from second- and third-year Ph.D. students in natural sciences, social sciences, and humanities at a large research university in the United States. 80 second- and third-year Ph.D. students completed an online survey; 11 students and four of their advisors participated in a semi-structured interview. The results demonstrate that the majority of students spent over three months in the selection of dissertation topics, and the humanities students tended to spend longer time in this process than social sciences or humanities students. Additionally, students have much in common in their perception of the criteria they would use in the selection of dissertation topics, and those criteria are similar to what previous researchers (Isaac, Koenigsknecht, Malaney, & Karras, 1989; Kozma, 1997; Sessions, 1971) have identified. However, when it comes to the actual selection experiences, the interviews show that students do not necessarily apply those criteria rationally. Moreover, disciplines appear to have an overarching effect on students' topic selection. Natural sciences advisors appeared to have more direct involvement in students' topic choice than advisors in social sciences or humanities. The linguistic and cultural backgrounds of the eleven doctoral participants were not found influential in their selection of dissertation topics. Finally, although Ph.D. advisors generally have a good understanding of students' academic progress, their knowledge of the students' personal and professional concerns may differ, and the latter knowledge is crucial in their advising on students' dissertation topic choice. The current study suggests invention in the scholar and researcher level is significantly different from that of first-year composition classrooms. The successful invention of dissertation topics is indispensable of the influence of disciplines, programs as well as the intellectual and practical support students can receive.
ContributorsXia, Jing (Author) / Matsuda, Paul K (Thesis advisor) / James, Mark (Committee member) / Renaud, Claire (Committee member) / Arizona State University (Publisher)
Created2013
151941-Thumbnail Image.png
Description
With increasing transistor volume and reducing feature size, it has become a major design constraint to reduce power consumption also. This has given rise to aggressive architectural changes for on-chip power management and rapid development to energy efficient hardware accelerators. Accordingly, the objective of this research work is to facilitate

With increasing transistor volume and reducing feature size, it has become a major design constraint to reduce power consumption also. This has given rise to aggressive architectural changes for on-chip power management and rapid development to energy efficient hardware accelerators. Accordingly, the objective of this research work is to facilitate software developers to leverage these hardware techniques and improve energy efficiency of the system. To achieve this, I propose two solutions for Linux kernel: Optimal use of these architectural enhancements to achieve greater energy efficiency requires accurate modeling of processor power consumption. Though there are many models available in literature to model processor power consumption, there is a lack of such models to capture power consumption at the task-level. Task-level energy models are a requirement for an operating system (OS) to perform real-time power management as OS time multiplexes tasks to enable sharing of hardware resources. I propose a detailed design methodology for constructing an architecture agnostic task-level power model and incorporating it into a modern operating system to build an online task-level power profiler. The profiler is implemented inside the latest Linux kernel and validated for Intel Sandy Bridge processor. It has a negligible overhead of less than 1\% hardware resource consumption. The profiler power prediction was demonstrated for various application benchmarks from SPEC to PARSEC with less than 4\% error. I also demonstrate the importance of the proposed profiler for emerging architectural techniques through use case scenarios, which include heterogeneous computing and fine grained per-core DVFS. Along with architectural enhancement in general purpose processors to improve energy efficiency, hardware accelerators like Coarse Grain reconfigurable architecture (CGRA) are gaining popularity. Unlike vector processors, which rely on data parallelism, CGRA can provide greater flexibility and compiler level control making it more suitable for present SoC environment. To provide streamline development environment for CGRA, I propose a flexible framework in Linux to do design space exploration for CGRA. With accurate and flexible hardware models, fine grained integration with accurate architectural simulator, and Linux memory management and DMA support, a user can carry out limitless experiments on CGRA in full system environment.
ContributorsDesai, Digant Pareshkumar (Author) / Vrudhula, Sarma (Thesis advisor) / Chakrabarti, Chaitali (Committee member) / Wu, Carole-Jean (Committee member) / Arizona State University (Publisher)
Created2013
151948-Thumbnail Image.png
Description
Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor

Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor the SHS installed in their homes remotely. This is typically realized by giving the SHS network access ability. Although the SHS's network access ability brings a lot of conveniences to the home owners, it also makes the SHS facing more security threats than ever before. As a result, when designing a SHS, the security threats it might face should be given careful considerations. System security threats can be solved properly by understanding them and knowing the parts in the system that should be protected against them first. This leads to the idea of solving the security threats a SHS might face from the requirements engineering level. Following this idea, this paper proposes a systematic approach to generate the security requirements specifications for the SHS. It can be viewed as the first step toward the complete SHS security requirements engineering process.
ContributorsXu, Rongcao (Author) / Ghazarian, Arbi (Thesis advisor) / Bansal, Ajay (Committee member) / Lindquist, Timothy (Committee member) / Arizona State University (Publisher)
Created2013
Description
Multicore processors have proliferated in nearly all forms of computing, from servers, desktop, to smartphones. The primary reason for this large adoption of multicore processors is due to its ability to overcome the power-wall by providing higher performance at a lower power consumption rate. With multi-cores, there is increased need

Multicore processors have proliferated in nearly all forms of computing, from servers, desktop, to smartphones. The primary reason for this large adoption of multicore processors is due to its ability to overcome the power-wall by providing higher performance at a lower power consumption rate. With multi-cores, there is increased need for dynamic energy management (DEM), much more than for single-core processors, as DEM for multi-cores is no more a mechanism just to ensure that a processor is kept under specified temperature limits, but also a set of techniques that manage various processor controls like dynamic voltage and frequency scaling (DVFS), task migration, fan speed, etc. to achieve a stated objective. The objectives span a wide range from maximizing throughput, minimizing power consumption, reducing peak temperature, maximizing energy efficiency, maximizing processor reliability, and so on, along with much more wider constraints of temperature, power, timing, and reliability constraints. Thus DEM can be very complex and challenging to achieve. Since often times many DEMs operate together on a single processor, there is a need to unify various DEM techniques. This dissertation address such a need. In this work, a framework for DEM is proposed that provides a unifying processor model that includes processor power, thermal, timing, and reliability models, supports various DEM control mechanisms, many different objective functions along with equally diverse constraint specifications. Using the framework, a range of novel solutions is derived for instances of DEM problems, that include maximizing processor performance, energy efficiency, or minimizing power consumption, peak temperature under constraints of maximum temperature, memory reliability and task deadlines. Finally, a robust closed-loop controller to implement the above solutions on a real processor platform with a very low operational overhead is proposed. Along with the controller design, a model identification methodology for obtaining the required power and thermal models for the controller is also discussed. The controller is architecture independent and hence easily portable across many platforms. The controller has been successfully deployed on Intel Sandy Bridge processor and the use of the controller has increased the energy efficiency of the processor by over 30%
ContributorsHanumaiah, Vinay (Author) / Vrudhula, Sarma (Thesis advisor) / Chatha, Karamvir (Committee member) / Chakrabarti, Chaitali (Committee member) / Rodriguez, Armando (Committee member) / Askin, Ronald (Committee member) / Arizona State University (Publisher)
Created2013
151794-Thumbnail Image.png
Description
Rhetorical theorist Kenneth Burke has asserted the significance of paying equal, if not more attention to, propagandist rhetoric, arguing that "there are other ways of burning books on the pyre-and the favorite method of the hasty reviewer is to deprive himself and his readers by inattention." Despite Burke's exhortation, attention

Rhetorical theorist Kenneth Burke has asserted the significance of paying equal, if not more attention to, propagandist rhetoric, arguing that "there are other ways of burning books on the pyre-and the favorite method of the hasty reviewer is to deprive himself and his readers by inattention." Despite Burke's exhortation, attention to white supremacist discourse has been relatively meager. Historians Clive Webb and Charles Eagles have called for further research on white supremacy arguing that attention to white supremacist discourse is important both to fully understand and appreciate pro-civil rights rhetoric in context and to develop a more complex understanding of white supremacist rhetoric. This thesis provides a close examination of the literature and rhetoric of two white supremacist organizations: the Citizens' Council, an organization that sprang up in response to the 1954 landmark decision of Brown v. Board of Education and Stromfront.org, a global online forum community that hosts space for supporters of white supremacy. Memory scholars Barbie Zelizer, John Bodnar, and Stephen Brown note the usability of memory to shape social, political, and cultural aspects of society and the potential implications of such shaping. Drawing from this scholarship, the analysis of these texts focuses specifically on the rhetorical shaping of memory as a vehicle to promote white supremacy. Through an analysis of the Citizens' Council's use of historical events, national figures and cultural stereotypes, Chapter 1 explicates the organization's attempt to form a memorial narrative that worked to promote political goals, create a sense of solidarity through resistance, and indoctrinate the youth in the ideology of white supremacy. Chapter 2 examines the rhetorical use of memory on Stormfront and explains how the website capitalizes upon the wide reaching global impact of World War II to construct a memorial narrative that can be accessed by a global audience of white supremacists. Ultimately, this thesis offers a focused review of the rhetorical signatures of two white supremacist groups with the aim of combating contemporary instantiations of racist discourse.
ContributorsLadenburg, Kenneth (Author) / Ore, Ersula (Thesis advisor) / Miller, Keith (Committee member) / Bebout, Lee (Committee member) / Arizona State University (Publisher)
Created2013
151823-Thumbnail Image.png
Description
This research conducts two methods of rhetorical analysis of State of the Union Addresses: 1. Computational linguistic analysis of all State of the Union Addresses from 1790-2007, and 2. Close-readings and rhetorical analyses of two addresses: one by President Truman and one by President Reagan. This research shows the following

This research conducts two methods of rhetorical analysis of State of the Union Addresses: 1. Computational linguistic analysis of all State of the Union Addresses from 1790-2007, and 2. Close-readings and rhetorical analyses of two addresses: one by President Truman and one by President Reagan. This research shows the following key findings: 1. I am able to see general shifts in the authors' approaches to the State of the Union Address through historical computational analyses of the content of all speeches, and 2. Through close readings, I can understand the impact of the author's ethos and the historical context on the addresses, something that would not be readily revealed in a computational analysis. This study starts with a historical computational linguistic analysis of all State of the Union Addresses between 1790 and 2007. The study follows with close-readings of two State of the Union Addresses from the early and late Cold War period in-context: 1. Harry Truman's 1951 Address and 2. Ronald Reagan's 1986 Address. The main conclusions drawn from this research are that close-readings of State of the Union Addresses cannot be replaced by computational analyses, but can work in tandem with computerized text analysis to reveal shifts in rhetorical and topical features. This paper argues that there must be more close analyses in coordination with large-scale text analysis in order to understand the complexities of rhetorical situations.
ContributorsWegner, Peter (Author) / Goggin, Maureen (Thesis advisor) / Boyd, Patricia (Committee member) / Goggin, Peter (Committee member) / Arizona State University (Publisher)
Created2013