This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 155
Filtering by

Clear all filters

Description
Several contemporary clarinet works use Chinese folk music elements from different regions in new compositions to entice listener's and performer's appreciation of Chinese culture. However, to date, limited academic research on this topic exists. This research paper introduces six contemporary clarinet works by six Chinese composers: Qigang Chen's Morning Song,

Several contemporary clarinet works use Chinese folk music elements from different regions in new compositions to entice listener's and performer's appreciation of Chinese culture. However, to date, limited academic research on this topic exists. This research paper introduces six contemporary clarinet works by six Chinese composers: Qigang Chen's Morning Song, Yan Wang's Mu ma zhi ge (The Song of Grazing Horses), An-lun Huang's Capriccio for Clarinet and Strings Op. 41, Bijing Hu's The Sound of Pamir Clarinet Concerto, Mei-Mi Lan's Concerto for Clarinet and String Orchestra with Harp and Percussion, and Yu-Hui Chang's Three Fantasias for Solo Clarinet in B-flat. They are examined from different perspectives, including general structure, style, and rejuvenated folk music use. The focus of this research paper is to investigate the use of Chinese folk music in several works in collaboration with the composers. The author found that although contemporary composers use Chinese folk music differently in their works (i.e., some use melodies, others use harmony, while others use modes), each work celebrates the music and culture of the folk music on which the pieces are based. It is the author's hope to stimulate people's interest in music using Chinese folk music elements, and bring these lesser known works into the common clarinet repertoire.
ContributorsFeng, Chiao-Ting (Author) / Spring, Robert (Thesis advisor) / Gardner, Joshua (Committee member) / Micklich, Albie (Committee member) / Rogers, Rodney (Committee member) / Schuring, Martin (Committee member) / Arizona State University (Publisher)
Created2013
152134-Thumbnail Image.png
Description
Bright Summer, a one-movement piece for orchestra, was composed in Arizona, and completed in February 2013. The piece is approximately twelve minutes long. The motivation for writing this piece was the death of my mother the year before, in 2012. The prevailing mood of this work is bright and pleasant,

Bright Summer, a one-movement piece for orchestra, was composed in Arizona, and completed in February 2013. The piece is approximately twelve minutes long. The motivation for writing this piece was the death of my mother the year before, in 2012. The prevailing mood of this work is bright and pleasant, expressing my mother's cheerful personality when she was alive. It also portrays bright summer days which resemble my mother's spirit. Thus, soundscape plays an important role in this work. It depicts summer breeze, rustling sounds of leaves, and, to translate a Korean saying, "high blue skies." This soundscape opens the piece as well as closes it. In the middle section, the fast upbeat themes represent my mother's witty and optimistic personality. The piece also contains the presence of a hymn tune, The Love of God is Greater Far, which informs the motivic content and also functions as the climax of the piece. It was my mother's favorite hymn and we used to sing it together following her conversion to Christianity. The piece contains three main sections, which are held together by transitional material based on the soundscape and metric modulations. Unlike my earlier works, Bright Summer is tonal, with upper tertian harmonies prevailing throughout the piece. However, the opening and closing soundscapes do not have functional harmonies. For example, tertian chords appear and vanish silently, leaving behind some resonant sounds without any harmonic progression. Overall, the whole piece is reminiscent of my mother who lived a beautiful life.
ContributorsKim, JeeYeon (Composer) / DeMars, James (Thesis advisor) / Hackbarth, Glenn (Committee member) / Rogers, Rodney (Committee member) / Levy, Benjamin (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
151775-Thumbnail Image.png
Description
ABSTRACT Musicians endure injuries at an alarming rate, largely due to the misuse of their bodies. Musicians move their bodies for a living and therefore should understand how to move them in a healthy way. This paper presents Body Mapping as an injury prevention technique specifically directed toward collaborative pianists.

ABSTRACT Musicians endure injuries at an alarming rate, largely due to the misuse of their bodies. Musicians move their bodies for a living and therefore should understand how to move them in a healthy way. This paper presents Body Mapping as an injury prevention technique specifically directed toward collaborative pianists. A body map is the self-representation in one's brain that includes information on the structure, function, and size of one's body; Body Mapping is the process of refining one's body map to produce coordinated movement. In addition to preventing injury, Body Mapping provides a means to achieve greater musical artistry through the training of movement, attention, and the senses. With the main function of collaborating with one or more musical partners, a collaborative pianist will have the opportunity to share the knowledge of Body Mapping with many fellow musicians. This study demonstrates the author's credentials as a Body Mapping instructor, the current status of the field of collaborative piano, and the recommendation for increased body awareness. Information on the nature and abundance of injuries and Body Mapping concepts are also analyzed. The study culminates in a course syllabus entitled An Introduction to Collaborative Piano and Body Mapping with the objective of imparting fundamental collaborative piano skills integrated with proper body use. The author hopes to inform educators of the benefits of prioritizing health among their students and to provide a Body Mapping foundation upon which their students can build technique.
ContributorsBindel, Jennifer (Author) / Campbell, Andrew (Thesis advisor) / Doan, Jerry (Committee member) / Rogers, Rodney (Committee member) / Ryan, Russell (Committee member) / Schuring, Martin (Committee member) / Arizona State University (Publisher)
Created2013
151825-Thumbnail Image.png
Description
There are a significant number of musical compositions for violin by composers who used folk songs and dances of various cultures in their music, including works by George Enescu, Béla Bartók and György Ligeti. Less known are pieces that draw on the plethora of melodies and rhythms from Turkey. The

There are a significant number of musical compositions for violin by composers who used folk songs and dances of various cultures in their music, including works by George Enescu, Béla Bartók and György Ligeti. Less known are pieces that draw on the plethora of melodies and rhythms from Turkey. The purpose of this paper is to help performers become more familiar with two such compositions: Fazil Say's Sonata for Violin and Piano and Cleopatra for Solo Violin. Fazil Say (b. 1970) is considered to be a significant, contemporary Turkish composer. Both of the works discussed in this document simulate traditional "Eastern" instruments, such as the kemenҫe, the baðlama, the kanun and the ud. Additionally, both pieces use themes from folk melodies of Turkey, Turkish dance rhythms and Arabian scales, all framed within traditional structural techniques, such as ostinato bass and the fughetta. Both the Sonata for Violin and Piano and Cleopatra are enormously expressive and musically interesting works, demanding virtuosity and a wide technical range. Although this document does not purport to be a full theoretical analysis, by providing biographical information, analytical descriptions, notes regarding interpretation, and suggestions to assist performers in overcoming technical obstacles, the writer hopes to inspire other violinists to consider learning and performing these works.
ContributorsKalantzi, Panagiota (Author) / Jiang, Danwen (Thesis advisor) / Hill, Gary (Committee member) / Rogers, Rodney (Committee member) / Rotaru, Catalin (Committee member) / Arizona State University (Publisher)
Created2013
151646-Thumbnail Image.png
Description
The purpose of this project is twofold: to contribute to the literature of chamber ensembles comprising mixed wind, string, and percussion instruments by producing arrangements of three piano rags by William Bolcom; and to highlight Bolcom's pivotal role in the ragtime revival of the 1960's and 1970's. Through his influence

The purpose of this project is twofold: to contribute to the literature of chamber ensembles comprising mixed wind, string, and percussion instruments by producing arrangements of three piano rags by William Bolcom; and to highlight Bolcom's pivotal role in the ragtime revival of the 1960's and 1970's. Through his influence as a scholar, composer, and performer, Bolcom (b. 1938), one of the most prominent American composers of his generation, helped garner respect for ragtime as art music and as one of America's great popular music genres. Bolcom's 3 Ghost Rags were written in the tradition of classic piano rags, but with a compositional sensibility that is influenced by the fifty years that separate them from the close of the original ragtime era. The basis for the present orchestrations of 3 Ghost Rags is the collection of instrumental arrangements of piano rags published by Stark Publishing Co., entitled Standard High-Class Rags. More familiarly known as the "Red Back Book," this publication was representative of the exchange of repertoire between piano and ensembles and served as a repertory for the various ragtime revivals that occurred later in the twentieth century. In creating these orchestrations of Bolcom's piano rags, the author strove to provide another medium in which Bolcom's music could be performed, while orchestrating the music for an historically appropriate ensemble.
ContributorsMelley, Eric Charles (Author) / Hill, Gary W. (Thesis advisor) / Bailey, Wayne (Committee member) / Norton, Kay (Committee member) / Rogers, Rodney (Committee member) / Russell, Timothy (Committee member) / Arizona State University (Publisher)
Created2013
151653-Thumbnail Image.png
Description
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling

Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the non-monotonic nature of the ASP semantics, such enhancements turned out to be non-trivial and the existing extensions are not fully satisfactory. We observe that one main reason for the difficulties rooted in the propositional semantics of ASP, which is limited in handling first-order constructs (such as aggregates and ontologies) and functions (such as constraint variables in CP and SMT) in natural ways. This dissertation presents a unifying view on these extensions by viewing them as instances of formulas with generalized quantifiers and intensional functions. We extend the first-order stable model semantics by by Ferraris, Lee, and Lifschitz to allow generalized quantifiers, which cover aggregate, DL-atoms, constraints and SMT theory atoms as special cases. Using this unifying framework, we study and relate different extensions of ASP. We also present a tight integration of ASP with SMT, based on which we enhance action language C+ to handle reasoning about continuous changes. Our framework yields a systematic approach to study and extend non-monotonic languages.
ContributorsMeng, Yunsong (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Fainekos, Georgios (Committee member) / Lifschitz, Vladimir (Committee member) / Arizona State University (Publisher)
Created2013
152422-Thumbnail Image.png
Description
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may

With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end users tend to change configurations of their systems without paying attention to the security. Hence, it is not straightforward to protect systems from being changed by unconscious users in a timely manner. Detecting the installation of harmful applications is not sufficient since attackers may exploit risky software as well as commonly used software. In addition, checking the assurance of security configurations periodically is disadvantageous in terms of time and cost due to zero-day attacks and the timing attacks that can leverage the window between each security checks. Therefore, event-driven monitoring approach is critical to continuously assess security of a target system without ignoring a particular window between security checks and lessen the burden of exhausted task to inspect the entire configurations in the system. Furthermore, the system should be able to generate a vulnerability report for any change initiated by a user if such changes refer to the requirements in the standards and turn out to be vulnerable. Assessing various systems in distributed environments also requires to consistently applying standards to each environment. Such a uniformed consistent assessment is important because the way of assessment approach for detecting security vulnerabilities may vary across applications and operating systems. In this thesis, I introduce an automated event-driven security assessment framework to overcome and accommodate the aforementioned issues. I also discuss the implementation details that are based on the commercial-off-the-self technologies and testbed being established to evaluate approach. Besides, I describe evaluation results that demonstrate the effectiveness and practicality of the approaches.
ContributorsSeo, Jeong-Jin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Lee, Joohyung (Committee member) / Arizona State University (Publisher)
Created2014
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152555-Thumbnail Image.png
Description
Nelson Rolihlahla Mandela was born July 18, 1918 into the Madiba clan in Mvezo, Transkei, South Africa. Mandela was a lawyer by trade and a freedom fighter who envisioned freedom and equality for all South Africans regardless of race. In 1965, Mandela was imprisoned at Robben Island for twenty-seven years

Nelson Rolihlahla Mandela was born July 18, 1918 into the Madiba clan in Mvezo, Transkei, South Africa. Mandela was a lawyer by trade and a freedom fighter who envisioned freedom and equality for all South Africans regardless of race. In 1965, Mandela was imprisoned at Robben Island for twenty-seven years for treason and terrorist activities against the South African apartheid regime: he was assigned prison numbers 46664. In 1992, Mandela was released from prison and two years later not only became the first democratically elected president of South Africa, but also its first black president. "Madiba 46664" is an eight-minute chamber work scored for flute, oboe, clarinet in B-flat, and bassoon; vibraphone, and two percussionists; piano; violins, violas, and celli. The work blends traditional South African rhythms of the drumming culture with elements of Western harmony and form in contrasting textures of homophony, polyphony and antiphony. "Madiba 46664" utilizes Mandela's prison number, birthdate and age (at the time the composition process began in 2013) for the initial generation of meter, rhythm, harmony, melody, and form. The work also shares intercultural concepts that can be seen in the works of three contemporary African composers, South Africans Jeanne Zaidel-Rudolph and Andile Khumalo, and Nigerian Ayo Oluranti. Each section represents a period of Mandela's life as a freedom fighter, a prisoner, and a president. The inspiration stems from the composer's discussions with Mandela soon after his release from prison and prior to his presidency. These lively discussions pertained to the state of traditional music in then apartheid South Africa and led to this creation. The conversations also played a role in the creative process.
ContributorsMabingnai, Collette Sipho (Composer) / DeMars, James (Thesis advisor) / Hackbarth, Glenn (Committee member) / Humphreys, Jere (Committee member) / Rockmaker, Jody (Committee member) / Rogers, Rodney (Committee member) / Arizona State University (Publisher)
Created2014
152290-Thumbnail Image.png
Description
Concerto for Piano and Chamber Orchestra was conceived in February of 2013, and conceptually it is my attempt to fuse personal expressions of jazz and classical music into one fully realized statement. It is a three movement work (fast, slow, fast) for 2 fl., 2 ob., 2 cl., bsn., 2

Concerto for Piano and Chamber Orchestra was conceived in February of 2013, and conceptually it is my attempt to fuse personal expressions of jazz and classical music into one fully realized statement. It is a three movement work (fast, slow, fast) for 2 fl., 2 ob., 2 cl., bsn., 2 hrn., 2 tpt., tbn., pno., perc., str. (6,4,2,2,1). The work is approximately 27 minutes in duration. The first movement of the Concerto is written in a fluid sonata form. A fugato begins where the second theme would normally appear, and the second theme does not fully appear until near the end of the solo piano section. The result is that the second theme when finally revealed is so reminiscent of the history of jazz and classical synthesis that it does not sound completely new, and in fact is a return of something that was heard before, but only hinted at in this piece. The second movement is a kind of deconstructive set of variations, with a specific theme and harmonic pattern implied throughout the movement. However, the full theme is not disclosed until the final variation. The variations are interrupted by moments of pure rhythmic music, containing harmony made up of major chords with an added fourth, defying resolution, and dissolving each time back into a new variation. The third movement is in rondo form, using rhythmic and harmonic influences from jazz. The percussion plays a substantial role in this movement, acting as a counterpoint to the piano part throughout. This movement and the piece concludes with an extended coda, inspired indirectly by the simple complexities of an improvisational piano solo, building in complexity as the concerto draws to a close.
ContributorsSneider, Elliot (Author) / Rogers, Rodney (Thesis advisor) / DeMars, James (Committee member) / Hackbarth, Glenn (Committee member) / Solis, Theodore (Committee member) / Arizona State University (Publisher)
Created2013