ASU Electronic Theses and Dissertations
This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.
In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.
Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.
Filtering by
- Creators: Shen, Wei
- Creators: Huang, Dijiang
To address the first issue, I draw an important distinction between international investment banks and multinational investment banks. For an international investment bank to be regarded as a multinational, I propose that it must have a strong presence (i.e., holding at least one percent of the market share) in at least two of the seven major capital markets in the world. Using this criterion, I identify 25 multinational investment banks. I then analyze their home countries’ domestic market conditions and propose that the following six factors are important to the development of multinational investment banks: the size of the home country’s gross domestic product (GDP), the total capitalization of its domestic security market, the number of its Global 500 firms, the volume of its foreign direct investment (FDI), the internationalization of its currency, and the openness of its capital market to foreign investors.
By comparisons, I find that China’s domestic market conditions are comparable to the home countries of multinational investment banks with respect to the size of GDP, total market capitalization, the number of Global 500 firms, and the volume of FDI. What China lags behind are the internationalization of currency and the openness of capital market to foreign investors. Given the current trends of development, it is very likely that China will be able to catch up on the latter within ten years, thus meeting all the conditions necessary for the development of multinational investment banks.
Based on the above findings, I suggest that Chinese investment banks seize this historical opportunity, speed up the internationalization of their businesses, and learn from the experiences of global industry leaders to become truly multinational corporations.
industry has brought about unique set of challenges and opportunities. ARM architecture
in particular has evolved to a point where it supports implementations across wide spectrum
of performance points and ARM based tablets and smart-phones are in demand. The
enhancements to basic ARM RISC architecture allow ARM to have high performance,
small code size, low power consumption and small silicon area. Users want their devices to
perform many tasks such as read email, play games, and run other online applications and
organizations no longer desire to provision and maintain individual’s IT equipment. The
term BYOD (Bring Your Own Device) has come into being from demand of such a work
setup and is one of the motivation of this research work. It brings many opportunities such
as increased productivity and reduced costs and challenges such as secured data access,
data leakage and amount of control by the organization.
To provision such a framework we need to bridge the gap from both organizations side
and individuals point of view. Mobile device users face issue of application delivery on
multiple platforms. For instance having purchased many applications from one proprietary
application store, individuals may want to move them to a different platform/device but
currently this is not possible. Organizations face security issues in providing such a solution
as there are many potential threats from allowing BYOD work-style such as unauthorized
access to data, attacks from the devices within and outside the network.
ARM based Secure Mobile SDN framework will resolve these issues and enable employees
to consolidate both personal and business calls and mobile data access on a single device.
To address application delivery issue we are introducing KVM based virtualization that
will allow host OS to run multiple guest OS. To address the security problem we introduce
SDN environment where host would be running bridged network of guest OS using Open
vSwitch . This would allow a remote controller to monitor the state of guest OS for making
important control and traffic flow decisions based on the situation.
This thesis is organized as follows. First, I provide a brief description about the emergence and development of China’s guarantee industry, as well as its current status. Next, I explain what kinds of risks faced by guarantee firms in China that influence their performance and survival, and summarize the various external and internal risk factors. I also conduct one in-depth case analysis to illustrate how a guarantee firm can better identify the risks it is exposed to. Next, on the basis of another in-depth case analysis, I develop a framework that can help guarantee firms to systematically develop effective measures of risk identification and prevention. I conclude with a discussion of this study’s implications for guarantee firms and the regulatory governmental agencies in China.
With the applications now having direct access to the flow table entries, it is easy to have inconsistencies arise in the flow table rules. Since the flow rules are structured similar to firewall rules, the research done in analyzing and identifying firewall rule conflicts can be adapted to work with OpenFlow rules.
The main work of this thesis is to implement flow conflict detection logic in OpenDaylight and inspect the applicability of techniques in visualizing the conflicts. A hierarchical edge-bundling technique coupled with a Reingold-Tilford tree is employed to present the relationship between the conflicting rules. Additionally, a table-driven approach is also implemented to display the details of each flow.
Both types of visualization are then tested for correctness by providing them with flows which are known to have conflicts. The conflicts were identified properly and displayed by the views.
On the basis of prior research findings and the current situation of the Chinese securities industry, I first develop a theoretical model about the sources of competitive advantage for Chinese securities companies, and then compile a comprehensive list of observable indicators that can be used to assess a Chinese securities company’s core competency. Next, I conduct a quantitative analysis to assess the core competency and relative market positions of the leading Chinese securities companies using data from 2010 to 2014. Overall, the results suggest that market-driven M&As increases the core competency of the acquiring securities companies. I then conduct four in-depth case analyses to better understand the mechanisms through which M&As can help increase the acquiring firms' core competency. I conclude with a discussion of the findings and their implications for Chinese securities companies and the overseeing governmental agencies.
The approach to attack detection in cyber systems is based on a multimodal artificial neural network (MANN) using the collected network traffic data from completely observable cyber systems for training and testing. Since the training of MANN is computationally intensive, to reduce the computational overhead, an efficient feature selection algorithm using the genetic algorithm is developed and incorporated in this approach.
In order to detect attacks in cyber systems in partially observable environments, an approach to estimating the types of states in partially observable cyber systems, which is the first phase of attack detection in cyber systems in partially observable environments, is presented. The types of states of such cyber systems are useful to detecting cyber-attacks in such cyber systems. This approach involves the use of a convolutional neural network (CNN), and unsupervised learning with elbow method and k-means clustering algorithm.