This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 169
Filtering by

Clear all filters

151873-Thumbnail Image.png
Description
This qualitative, action research study examines how teacher-writers' identities are constructed through the practice of revision in an extra-curriculum writing group. The writing group was designed to support the teacher-writers as they revised classroom research projects for submission for a scholarly journal. Using discourse analysis, the researcher explores how the

This qualitative, action research study examines how teacher-writers' identities are constructed through the practice of revision in an extra-curriculum writing group. The writing group was designed to support the teacher-writers as they revised classroom research projects for submission for a scholarly journal. Using discourse analysis, the researcher explores how the teacher-writers' identities are constructed in the contested spaces of revision. This exploration focuses on contested issues that invariably emerge in a dynamic binary of reader/writer, issues of authority, ownership, and unstable reader and writer identities. By negotiating these contested spaces--these contact zones--the teacher-writers construct opportunities to flex their rhetorical agency. Through rhetorical agency, the teacher-writers shift their discoursal identities by discarding and acquiring a variety of discourses. As a result, the practice of revision constructs the teacher-writers identities as hybrid, as consisting of self and other.
ContributorsClark-Oates, Angela (Author) / Smith, Karen (Thesis advisor) / Roen, Duane (Thesis advisor) / Fischman, Gustavo (Committee member) / Early, Jessica (Committee member) / Arizona State University (Publisher)
Created2013
151682-Thumbnail Image.png
Description
Examining the elements of the hidden curriculum in theatre education allows theatre educators the opportunity to reflect on their own pedagogy and its effects on the learner. The hidden curriculum refers to the unspoken or implicit values, norms, and beliefs that are transmitted through tacit messages. When the hidden curriculum

Examining the elements of the hidden curriculum in theatre education allows theatre educators the opportunity to reflect on their own pedagogy and its effects on the learner. The hidden curriculum refers to the unspoken or implicit values, norms, and beliefs that are transmitted through tacit messages. When the hidden curriculum remains veiled, the impact on the learner's education and socialization process can perpetuate gender, race, and class inequalities. In order to understand how the hidden curriculum manifests itself in theatre classrooms, we have to look at schools as "agents of legitimation, organized to produce and reproduce the dominant categories, values, and social relationships necessary for the maintenance of the larger society" (Giroux, 1983, p. 72). This qualitative study examined the hidden curriculum in theatre at the secondary level and looked at theatre teachers' pedagogy in reproducing elements of the hidden curriculum. Interviews, naturalistic observation, and a researcher reflective journal were employed in the data collection process to better understand: a) the elements of hidden curriculum that appear in theatre education at the secondary level, b) how the pedagogical practices of theatre teachers support societal structures, and c) how the hidden curriculum in theatre reinforces gender, race, and social class distinctions. Data were then coded and analyzed to find emergent themes. Multiple theoretical perspectives serve as a conceptual framework for understanding the hidden curriculum, and provide a neglected perspective of the hidden curriculum in theatre education. The theatre classroom provides a unique space to view hidden curriculum and can be viewed as a unique agent of social change. Themes related to the first research question emerged as: a) privileges for older students, b) school rules, c) respect for authority, d) acceptance of repetitive tasks, and c) punctuality. Themes related to the second research question emerged as: a) practices, b) procedures, c) rules, d) relationships, and e) structures. Finally, themes related to the third question emerged as: a) reinforcement of social inequality, b) perpetuation of class structure, and c) acceptance of social destiny. The discussion looks at the functions of theatre pedagogy in the reproduction of class, inequality, and institutionalized cultural norms.
ContributorsHines, Angela R (Author) / Saldana, Johnny (Thesis advisor) / Malewski, Erik (Committee member) / Fischman, Gustavo (Committee member) / Arizona State University (Publisher)
Created2013
152224-Thumbnail Image.png
Description
In this dissertation I attempt to find elements of education and curricular perspective in the Qur'an. I argue that there is little research in the field of curriculum instruction that discusses the Qur'an's educational aspects and, as a result, much ignorance of the Qur'an's material that deals with education and

In this dissertation I attempt to find elements of education and curricular perspective in the Qur'an. I argue that there is little research in the field of curriculum instruction that discusses the Qur'an's educational aspects and, as a result, much ignorance of the Qur'an's material that deals with education and curricular perspective in the Qur'an. Researchers may find many materials that deal with reading, memorizing, and reciting the Qur'an, along with references that deal with science and math in the Qur'an. Therefore, this dissertation answers the question: What curriculum exists within the Quran? This dissertation is divided into five chapters exploring various aspects of the curriculum. The word "curriculum" is used in one chapter to mean developing the person as a whole in all aspects of life whether spiritual, social, or mental while in the other chapter curriculum is used to refer to methods of instruction. I concluded that curriculum in the Qur'an uses different methods of instructions to develop the individual as a whole in all aspects of life while granting freedom of choice.
ContributorsRisha, Sarah (Author) / Margolis, Eric (Thesis advisor) / Fischman, Gustavo (Committee member) / Ali, Souad (Committee member) / Arizona State University (Publisher)
Created2013
152236-Thumbnail Image.png
Description
Continuous Delivery, as one of the youngest and most popular member of agile model family, has become a popular concept and method in software development industry recently. Instead of the traditional software development method, which requirements and solutions must be fixed before starting software developing, it promotes adaptive planning, evolutionary

Continuous Delivery, as one of the youngest and most popular member of agile model family, has become a popular concept and method in software development industry recently. Instead of the traditional software development method, which requirements and solutions must be fixed before starting software developing, it promotes adaptive planning, evolutionary development and delivery, and encourages rapid and flexible response to change. However, several problems prevent Continuous Delivery to be introduced into education world. Taking into the consideration of the barriers, we propose a new Cloud based Continuous Delivery Software Developing System. This system is designed to fully utilize the whole life circle of software developing according to Continuous Delivery concepts in a virtualized environment in Vlab platform.
ContributorsDeng, Yuli (Author) / Huang, Dijiang (Thesis advisor) / Davulcu, Hasan (Committee member) / Chen, Yinong (Committee member) / Arizona State University (Publisher)
Created2013
151670-Thumbnail Image.png
Description
Legislative changes and discussions about the United States falling further and further behind other nations in science, technology, engineering, and math (STEM) achievement are growing. As they grow, STEM instruction in elementary school has earned its place as a national area of interest in education. In the case of Ivory

Legislative changes and discussions about the United States falling further and further behind other nations in science, technology, engineering, and math (STEM) achievement are growing. As they grow, STEM instruction in elementary school has earned its place as a national area of interest in education. In the case of Ivory School District, teachers are being asked to radically change their daily practices by consistently implementing inquiry-based STEM experiences in their classrooms. As such, teachers are being asked to scale a divide between the district expectations and their knowledge and experience. Many fourth grade educators are teachers who have been trained as generalists and typically do not have specific background or experience in the philosophy, instructional strategies, or content associated with STEM. Using a prototype approach, this study aims to understand how such teachers conceptualize STEM instruction and the relationship between their experience and conceptions.
ContributorsKenney, Meghan (Author) / Fischman, Gustavo (Thesis advisor) / Powers, Jeanne (Committee member) / Rasch, Katherine D (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
152495-Thumbnail Image.png
Description
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server

Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server to enforce access policies on the data, services and other such resources fairly easily. It also accommodates new policies and changes to existing policies gracefully, thereby making it a potentially good mechanism for implementing access control in large systems, particularly in today's age of Cloud Computing. However management of the attributes in ABAC environment is an area that has been little touched upon. Having a mechanism to allow multiple ABAC based systems to share data and resources can go a long way in making ABAC scalable. At the same time each system should be able to specify their own attribute sets independently. In the research presented in this document a new mechanism is proposed that would enable users to share resources and data in a cloud environment using ABAC techniques in a distributed manner. The focus is mainly on decentralizing the access policy specifications for the shared data so that each data owner can specify the access policy independent of others. The concept of ontologies and semantic web is introduced in the ABAC paradigm that would help in giving a scalable structure to the attributes and also allow systems having different sets of attributes to communicate and share resources.
ContributorsPrabhu Verleker, Ashwin Narayan (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
152679-Thumbnail Image.png
Description
Through the disciplines of art education, anthropology and psychology the researcher examined research-based traits and characteristics of the creative process among a second year Title 1 urban high school art class. Within the theoretical framework of social justice, this micro-ethnographic study explored exactly what teaching and learning to be creative

Through the disciplines of art education, anthropology and psychology the researcher examined research-based traits and characteristics of the creative process among a second year Title 1 urban high school art class. Within the theoretical framework of social justice, this micro-ethnographic study explored exactly what teaching and learning to be creative implies and proposes a potential resolution for art teachers learning how to enhance teaching children how to think creatively. The research proposition is that student creativity occurs as a function of a series of interrelated factors including a nurturing classroom context, strong teacher-student dialogue, strategic questioning, purposeful incorporation of visual culture, and manipulation of content in favor of student interests within the culturally situated context of the art classroom. Navigating teacher-student relationships at moments of creative origination produced results indicating that the art teacher alone is the single most influential factor for enhancing creative outcomes in a classroom. Through incorporation of a variety of collaborative activities and comparative analysis of dissimilar content-driven projects generated evidence that artistic skills and creativity do not necessarily go hand-in-hand. The study finds that the artworks produced evidence based nuances of the creative traits of originality, fluency, flexibility, and elaboration in which profoundly varied in character depending on the content and the context. The study concludes that creativity cannot be strictly taught or learned, but rather that it can be enhanced through teacher nurturing and manipulation of content to encompass a socially intelligent uptake in the culture of art-making. Broader implications are suggested focusing on the significance of creative education and the impact it can have for educational systems, schools and undergraduate programs in art education. The researcher proposes an art education curriculum model that fosters both creative thinking and the unique learning needs of Title 1 urban students. The curriculum suggests the art teacher begin initial instruction by teaching students about the traits, characteristics and obstructions of creativity prior to teaching artistic skills sets to serve as a foundation of creative awareness from the start.
ContributorsForeman, Angela (Author) / Young, Bernard (Thesis advisor) / Stokrocki, Mary (Committee member) / Fischman, Gustavo (Committee member) / Arizona State University (Publisher)
Created2014
152956-Thumbnail Image.png
Description
Security has been one of the top concerns in cloud community while cloud resource abuse and malicious insiders are considered as top threats. Traditionally, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been widely deployed to manipulate cloud security, with the latter one providing additional prevention capability. However,

Security has been one of the top concerns in cloud community while cloud resource abuse and malicious insiders are considered as top threats. Traditionally, Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) have been widely deployed to manipulate cloud security, with the latter one providing additional prevention capability. However, as one of the most creative networking technologies, Software-Defined Networking (SDN) is rarely used to implement IDPS in the cloud computing environment because the lack of comprehensive development framework and processing flow. Simply migration from traditional IDS/IPS systems to SDN environment are not effective enough for detecting and defending malicious attacks. Hence, in this thesis, we present an IPS development framework to help user easily design and implement their defensive systems in cloud system by SDN technology. This framework enables SDN approaches to enhance the system security and performance. A Traffic Information Platform (TIP) is proposed as the cornerstone with several upper layer security modules such as Detection, Analysis and Prevention components. Benefiting from the flexible, compatible and programmable features of SDN, Customized Detection Engine, Network Topology Finder, Source Tracer and further user-developed security appliances are plugged in our framework to construct a SDN-based defensive system. Two main categories Python-based APIs are designed to support developers for further development. This system is designed and implemented based on the POX controller and Open vSwitch in the cloud computing environment. The efficiency of this framework is demonstrated by a sample IPS implementation and the performance of our framework is also evaluated.
ContributorsXiong, Zhengyang (Author) / Huang, Dijiang (Thesis advisor) / Xue, Guoliang (Committee member) / Dalvucu, Hasan (Committee member) / Arizona State University (Publisher)
Created2014