This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 143
Filtering by

Clear all filters

152134-Thumbnail Image.png
Description
Bright Summer, a one-movement piece for orchestra, was composed in Arizona, and completed in February 2013. The piece is approximately twelve minutes long. The motivation for writing this piece was the death of my mother the year before, in 2012. The prevailing mood of this work is bright and pleasant,

Bright Summer, a one-movement piece for orchestra, was composed in Arizona, and completed in February 2013. The piece is approximately twelve minutes long. The motivation for writing this piece was the death of my mother the year before, in 2012. The prevailing mood of this work is bright and pleasant, expressing my mother's cheerful personality when she was alive. It also portrays bright summer days which resemble my mother's spirit. Thus, soundscape plays an important role in this work. It depicts summer breeze, rustling sounds of leaves, and, to translate a Korean saying, "high blue skies." This soundscape opens the piece as well as closes it. In the middle section, the fast upbeat themes represent my mother's witty and optimistic personality. The piece also contains the presence of a hymn tune, The Love of God is Greater Far, which informs the motivic content and also functions as the climax of the piece. It was my mother's favorite hymn and we used to sing it together following her conversion to Christianity. The piece contains three main sections, which are held together by transitional material based on the soundscape and metric modulations. Unlike my earlier works, Bright Summer is tonal, with upper tertian harmonies prevailing throughout the piece. However, the opening and closing soundscapes do not have functional harmonies. For example, tertian chords appear and vanish silently, leaving behind some resonant sounds without any harmonic progression. Overall, the whole piece is reminiscent of my mother who lived a beautiful life.
ContributorsKim, JeeYeon (Composer) / DeMars, James (Thesis advisor) / Hackbarth, Glenn (Committee member) / Rogers, Rodney (Committee member) / Levy, Benjamin (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
151773-Thumbnail Image.png
Description
Norwegian composer Ola Gjeilo (b. 1978) is highly regarded as an accomplished and prolific composer of choral music. His creative output includes works for chorus, solo piano, and wind symphony. His unique style infuses elements of cinematic music, jazz and improvisation, with particularly intriguing selections of text. This study examines

Norwegian composer Ola Gjeilo (b. 1978) is highly regarded as an accomplished and prolific composer of choral music. His creative output includes works for chorus, solo piano, and wind symphony. His unique style infuses elements of cinematic music, jazz and improvisation, with particularly intriguing selections of text. This study examines the factors that influence Gjeilo's compositional techniques, and the musical interpretations of conductor Charles Bruffy in his preparation for The Phoenix Chorale's recording Northern Lights: Choral Works by Ola Gjeilo. The eleven works discussed in this study are: The Ground, Evening Prayer, Ubi caritas, Prelude, Northern Lights, The Spheres, Tota pulchra es, Serenity, Phoenix (Agnus Dei), Unicornis captivatur, and Dark Night of the Soul. As a relatively new and young composer, there is very little published literature on Gjeilo and his works. This study provides an intimate glance into the creative process of the composer. By composing in multiple styles and with a variety of inspirational sources, Gjeilo creates a fresh approach toward composition of new choral music. His style is revealed through interviews and numerous collaborations with conductors and performers who have prepared and performed his music, as well through an examination of the eleven works recorded by The Phoenix Chorale.
ContributorsGarrison, Ryan Derrick (Author) / Reber, William (Thesis advisor) / Saucier, Catherine (Committee member) / Rockmaker, Jody (Committee member) / Doan, Jerry (Committee member) / Arizona State University (Publisher)
Created2013
151610-Thumbnail Image.png
Description
This thesis presents a new arrangement of Richard Peaslee's trombone solo "Arrows of Time" for brass band. This arrangement adapts Peaslee's orchestration - and subsequent arrangement by Dr. Joshua Hauser for wind ensemble - for the modern brass band instrumentation and includes a full score. A brief biography of Richard

This thesis presents a new arrangement of Richard Peaslee's trombone solo "Arrows of Time" for brass band. This arrangement adapts Peaslee's orchestration - and subsequent arrangement by Dr. Joshua Hauser for wind ensemble - for the modern brass band instrumentation and includes a full score. A brief biography of Richard Peaslee and his work accompanies this new arrangement, along with commentary on the orchestration of "Arrows of Time", and discussion of the evolution and adaptation of the work for wind ensemble by Dr. Hauser. The methodology used to adapt these versions for the brass band completes the background information.
ContributorsMalloy, Jason Patrick (Author) / Ericson, John (Thesis advisor) / Oldani, Robert (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
152405-Thumbnail Image.png
Description
The German pianist and composer Johannes Brahms (1883-1897) wrote more than 122 works for a wide variety of ensembles and genres. Despite this remarkable productivity, and his widely heralded talent for innovation and technique as a composer, few of his works have been arranged for solo guitar, and these have

The German pianist and composer Johannes Brahms (1883-1897) wrote more than 122 works for a wide variety of ensembles and genres. Despite this remarkable productivity, and his widely heralded talent for innovation and technique as a composer, few of his works have been arranged for solo guitar, and these have focused primarily on his simpler, more melodic works. Conventional wisdom is that his music is "too dense" to be played on the guitar. As a result, there are no arrangements of orchestral works by Brahms in the standard repertoire for the guitar. In arranging Brahms's Serenade in D Major, movt. 1 for the guitar, I provide a counter argument that not all of Brahms's orchestral music is too dense all of the time. In Part I, I provide a brief overview of the history of, and sources for, the Serenade. Part II describes a step-by-step guide through the process of arranging orchestral repertoire for the solo guitar. Part III is an examination of the editing process that utilizes examples from the guitar arrangement of the Serenade in order to illustrate the various techniques and considerations that are part of the editing process. Part IV is a performance edition of the arrangement. In summary, the present arrangement of Brahms's Serenade, op.11 is the beginning of a conversation about why the "guitar world" should be incorporating the music of Brahms into the standard repertoire. The lessons learned, and the technical challenges discovered, should help inform future arrangers and guitar performers for additional compositions by Brahms.
ContributorsLanier, William Hudson (Author) / Koonce, Frank (Thesis advisor) / Micklich, Albie (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2013
152555-Thumbnail Image.png
Description
Nelson Rolihlahla Mandela was born July 18, 1918 into the Madiba clan in Mvezo, Transkei, South Africa. Mandela was a lawyer by trade and a freedom fighter who envisioned freedom and equality for all South Africans regardless of race. In 1965, Mandela was imprisoned at Robben Island for twenty-seven years

Nelson Rolihlahla Mandela was born July 18, 1918 into the Madiba clan in Mvezo, Transkei, South Africa. Mandela was a lawyer by trade and a freedom fighter who envisioned freedom and equality for all South Africans regardless of race. In 1965, Mandela was imprisoned at Robben Island for twenty-seven years for treason and terrorist activities against the South African apartheid regime: he was assigned prison numbers 46664. In 1992, Mandela was released from prison and two years later not only became the first democratically elected president of South Africa, but also its first black president. "Madiba 46664" is an eight-minute chamber work scored for flute, oboe, clarinet in B-flat, and bassoon; vibraphone, and two percussionists; piano; violins, violas, and celli. The work blends traditional South African rhythms of the drumming culture with elements of Western harmony and form in contrasting textures of homophony, polyphony and antiphony. "Madiba 46664" utilizes Mandela's prison number, birthdate and age (at the time the composition process began in 2013) for the initial generation of meter, rhythm, harmony, melody, and form. The work also shares intercultural concepts that can be seen in the works of three contemporary African composers, South Africans Jeanne Zaidel-Rudolph and Andile Khumalo, and Nigerian Ayo Oluranti. Each section represents a period of Mandela's life as a freedom fighter, a prisoner, and a president. The inspiration stems from the composer's discussions with Mandela soon after his release from prison and prior to his presidency. These lively discussions pertained to the state of traditional music in then apartheid South Africa and led to this creation. The conversations also played a role in the creative process.
ContributorsMabingnai, Collette Sipho (Composer) / DeMars, James (Thesis advisor) / Hackbarth, Glenn (Committee member) / Humphreys, Jere (Committee member) / Rockmaker, Jody (Committee member) / Rogers, Rodney (Committee member) / Arizona State University (Publisher)
Created2014
152754-Thumbnail Image.png
Description
Preservation Symphony is a short, multi-movement, orchestral composition that explores the versatility of the [016] pitch class set as the dominant unifying force of this cyclical work. The composition is scored for Piccolo, two Flutes, two Oboes, English Horn, two Clarinets, Bass Clarinet, full complement of Brass, Timpani, two Percussionists,

Preservation Symphony is a short, multi-movement, orchestral composition that explores the versatility of the [016] pitch class set as the dominant unifying force of this cyclical work. The composition is scored for Piccolo, two Flutes, two Oboes, English Horn, two Clarinets, Bass Clarinet, full complement of Brass, Timpani, two Percussionists, and Strings. Movement one is in sonata form; the [016] set is used in structuring its overall formal scheme. The primary focus of the movement is on the tritone [0 6] as a replacement for the traditional tonic and dominant polarity. The movement features a driving force that alternates between pulse subdivisions of even sixteenth notes and sixteenth-note triplets. Movement two is in simple binary form with a central tonality of A. An English Horn solo functions as both the opening of the movement and a transition from the tonality of movement one (F) into the new tonal center of A. The unifying pitch class set [016] is used in this movement in a Phrygian context. Movement two has a contemplative and dark tone, which is in stark contrast to the outer movements. Movement three has a lighter, upbeat nature. The movement is in rondo form with its main theme written in a folk-like character. This movement returns to F as the central tonality, completing the overall tonal plan of the work. As in movement one, it explores the tritone polarity of F and B. The movement also revisits the chromatic mediant relationship found in the middle of movement two in the oboes. The pitch class set is now used in the context of a Lydian-Mixolydian (or acoustic) scale, from which both the central and secondary themes of the rondo are derived.
ContributorsKemp, Tyler (Composer) / Rogers, Rodney (Thesis advisor) / DeMars, James (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2014
153335-Thumbnail Image.png
Description
With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands.

With the increasing user demand for low latency, elastic provisioning of computing resources coupled with ubiquitous and on-demand access to real-time data, cloud computing has emerged as a popular computing paradigm to meet growing user demands. However, with the introduction and rising use of wear- able technology and evolving uses of smart-phones, the concept of Internet of Things (IoT) has become a prevailing notion in the currently growing technology industry. Cisco Inc. has projected a data creation of approximately 403 Zetabytes (ZB) by 2018. The combination of bringing benign devices and connecting them to the web has resulted in exploding service and data aggregation requirements, thus requiring a new and innovative computing platform. This platform should have the capability to provide robust real-time data analytics and resource provisioning to clients, such as IoT users, on-demand. Such a computation model would need to function at the edge-of-the-network, forming a bridge between the large cloud data centers and the distributed connected devices.

This research expands on the notion of bringing computational power to the edge- of-the-network, and then integrating it with the cloud computing paradigm whilst providing services to diverse IoT-based applications. This expansion is achieved through the establishment of a new computing model that serves as a platform for IoT-based devices to communicate with services in real-time. We name this paradigm as Gateway-Oriented Reconfigurable Ecosystem (GORE) computing. Finally, this thesis proposes and discusses the development of a policy management framework for accommodating our proposed computational paradigm. The policy framework is designed to serve both the hosted applications and the GORE paradigm by enabling them to function more efficiently. The goal of the framework is to ensure uninterrupted communication and service delivery between users and their applications.
ContributorsDsouza, Clinton (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2015
153094-Thumbnail Image.png
Description
Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and

Android is currently the most widely used mobile operating system. The permission model in Android governs the resource access privileges of applications. The permission model however is amenable to various attacks, including re-delegation attacks, background snooping attacks and disclosure of private information. This thesis is aimed at understanding, analyzing and performing forensics on application behavior. This research sheds light on several security aspects, including the use of inter-process communications (IPC) to perform permission re-delegation attacks.

Android permission system is more of app-driven rather than user controlled, which means it is the applications that specify their permission requirement and the only thing which the user can do is choose not to install a particular application based on the requirements. Given the all or nothing choice, users succumb to pressures and needs to accept permissions requested. This thesis proposes a couple of ways for providing the users finer grained control of application privileges. The same methods can be used to evade the Permission Re-delegation attack.

This thesis also proposes and implements a novel methodology in Android that can be used to control the access privileges of an Android application, taking into consideration the context of the running application. This application-context based permission usage is further used to analyze a set of sample applications. We found the evidence of applications spoofing or divulging user sensitive information such as location information, contact information, phone id and numbers, in the background. Such activities can be used to track users for a variety of privacy-intrusive purposes. We have developed implementations that minimize several forms of privacy leaks that are routinely done by stock applications.
ContributorsGollapudi, Narasimha Aditya (Author) / Dasgupta, Partha (Thesis advisor) / Xue, Guoliang (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014
153126-Thumbnail Image.png
Description
The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The

The increasing number of continually connected mobile persons has created an environment conducive to real time user data gathering for many uses both public and private in nature. Publicly, one can envision no longer requiring a census to determine the demographic composition of the country and its sub regions. The information provided is vastly more up to date than that of a census and allows civil authorities to be more agile and preemptive with planning. Privately, advertisers take advantage of a persons stated opinions, demographics, and contextual (where and when) information in order to formulate and present pertinent offers.

Regardless of its use this information can be sensitive in nature and should therefore be under the control of the user. Currently, a user has little say in the manner that their information is processed once it has been released. An ad-hoc approach is currently in use, where the location based service providers each maintain their own policy over personal information usage.

In order to allow more user control over their personal information while still providing for targeted advertising, a systematic approach to the release of the information is needed. It is for that reason we propose a User-Centric Context Aware Spatiotemporal Anonymization framework. At its core the framework will unify the current spatiotemporal anonymization with that of traditional anonymization so that user specified anonymization requirement is met or exceeded while allowing for more demographic information to be released.
ContributorsSanchez, Michael Andrew (Author) / Ahn, Gail-Joon (Thesis advisor) / Doupe, Adam (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
153147-Thumbnail Image.png
Description
The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from

The rate at which new malicious software (Malware) is created is consistently increasing each year. These new malwares are designed to bypass the current anti-virus countermeasures employed to protect computer systems. Security Analysts must understand the nature and intent of the malware sample in order to protect computer systems from these attacks. The large number of new malware samples received daily by computer security companies require Security Analysts to quickly determine the type, threat, and countermeasure for newly identied samples. Our approach provides for a visualization tool to assist the Security Analyst in these tasks that allows the Analyst to visually identify relationships between malware samples.

This approach consists of three steps. First, the received samples are processed by a sandbox environment to perform a dynamic behavior analysis. Second, the reports of the dynamic behavior analysis are parsed to extract identifying features which are matched against other known and analyzed samples. Lastly, those matches that are determined to express a relationship are visualized as an edge connected pair of nodes in an undirected graph.
ContributorsHolmes, James Edward (Author) / Ahn, Gail-Joon (Thesis advisor) / Dasgupta, Partha (Committee member) / Doupe, Adam (Committee member) / Arizona State University (Publisher)
Created2014