This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 68
151635-Thumbnail Image.png
Description
Libby Larsen is one of the most performed and acclaimed composers today. She is a spirited, compelling, and sensitive composer whose music enhances the poetry of America's most prominent authors. Notable among her works are song cycles for soprano based on the poetry of female writers, among them novelist and

Libby Larsen is one of the most performed and acclaimed composers today. She is a spirited, compelling, and sensitive composer whose music enhances the poetry of America's most prominent authors. Notable among her works are song cycles for soprano based on the poetry of female writers, among them novelist and poet Willa Cather (1873-1947). Larsen has produced two song cycles on works from Cather's substantial output of fiction: one based on Cather's short story, "Eric Hermannson's Soul," titled Margaret Songs: Three Songs from Willa Cather (1996); and later, My Antonia (2000), based on Cather's novel of the same title. In Margaret Songs, Cather's poetry and short stories--specifically the character of Margaret Elliot--combine with Larsen's unique compositional style to create a surprising collaboration. This study explores how Larsen in these songs delves into the emotional and psychological depths of Margaret's character, not fully formed by Cather. It is only through Larsen's music and Cather's poetry that Margaret's journey through self-discovery and love become fully realized. This song cycle is a glimpse through the eyes of two prominent female artists on the societal pressures placed upon Margaret's character, many of which still resonate with women in today's culture. This study examines the work Margaret Songs by discussing Willa Cather, her musical influences, and the conditions surrounding the writing of "Eric Hermannson's Soul." It looks also into Cather's influence on Libby Larsen and the commission leading to Margaret Songs. Finally, a description of the musical, dramatic, and textual content of the songs completes this interpretation of the interactions of Willa Cather, Libby Larsen, and the character of Margaret Elliot.
ContributorsMcLain, Christi Marie (Author) / FitzPatrick, Carole (Thesis advisor) / Dreyfoos, Dale (Committee member) / Holbrook, Amy (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2013
151377-Thumbnail Image.png
Description
Arnold Schoenberg's 1908-09 song cycle, Das Buch der hängenden Gärten [The Book of the Hanging Gardens], opus 15, represents one of his most decisive early steps into the realm of musical modernism. In the midst of personal and artistic crises, Schoenberg set texts by Stefan George in a style he

Arnold Schoenberg's 1908-09 song cycle, Das Buch der hängenden Gärten [The Book of the Hanging Gardens], opus 15, represents one of his most decisive early steps into the realm of musical modernism. In the midst of personal and artistic crises, Schoenberg set texts by Stefan George in a style he called "pantonality," and described his composition as radically new. Though stylistically progressive, however, Schoenberg's musical achievement had certain ideologically conservative roots: the composer numbered among turn-of-the-century Viennese artists and thinkers whose opposition to the conventional and the popular--in favor of artistic autonomy and creativity--concealed a reactionary misogyny. A critical reading of Hanging Gardens through the lens of gender reveals that Schoenberg, like many of his contemporaries, incorporated strong frauenfeindlich [anti-women] elements into his work, through his modernist account of artistic creativity, his choice of texts, and his musical settings. Although elements of Hanging Gardens' atonal music suggest that Schoenberg valued gendered-feminine principles in his compositional style, a closer analysis of the work's musical language shows an intact masculinist hegemony. Through his deployment of uncanny tonal reminiscences, underlying tonal gestures, and closed forms in Hanging Gardens, Schoenberg ensures that the feminine-associated "excesses" of atonality remain under masculine control. This study draws upon the critical musicology of Susan McClary while arguing that Schoenberg's music is socially contingent, affected by the gender biases of his social and literary milieux. It addresses likely influences on Schoenberg's worldview including the philosophy of Otto Weininger, Freudian psychoanalysis, and a complex web of personal relationships. Finally, this analysis highlights the relevance of Schoenberg's world and its constructions of gender to modern performance practice, and argues that performers must consider interrelated historical, textual, and musical factors when interpreting Hanging Gardens in new contexts.
ContributorsGinger, Kerry Anne (Author) / FitzPatrick, Carole (Thesis advisor) / Dreyfoos, Dale (Committee member) / Mook, Richard (Committee member) / Norton, Kay (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2012
151384-Thumbnail Image.png
Description
ABSTRACT This document introduces singers and voice teachers to Dr. Alfred A. Tomatis's listening training method with a particular emphasis on its relevance to singers. After presenting an overview of Tomatis's work in the field of audio-psycho-phonology (circa 1947 through the 1990s) and specific ways that aspects of his theory

ABSTRACT This document introduces singers and voice teachers to Dr. Alfred A. Tomatis's listening training method with a particular emphasis on its relevance to singers. After presenting an overview of Tomatis's work in the field of audio-psycho-phonology (circa 1947 through the 1990s) and specific ways that aspects of his theory are relevant to singers' performance skills, this project investigates the impact of listening training on singers by examining published research. The studies described in this document have investigated the impact of listening training on elements of the singer's skill set, including but not limited to measures of vocal quality such as intonation, vocal control, intensity, and sonority, as well as language pronunciation and general musicianship. Anecdotal evidence, presented by performers and their observers, is also considered. The evidence generated by research studies and anecdotal reports strongly favors Tomatis-based listening training as a valid way to improve singers' performance abilities.
ContributorsHurley, Susan Lynn (Author) / Doan, Jerry (Thesis advisor) / Dreyfoos, Dale (Committee member) / Kopta, Anne (Committee member) / Norton, Kay (Committee member) / Thompson, Billie M (Committee member) / Arizona State University (Publisher)
Created2012
151621-Thumbnail Image.png
Description
The trained singer utilizes an awareness of her body as an instrument. When she becomes pregnant, her body changes in numerous ways to support the pregnancy. Many of these changes have great impact on her ability to sing during the pregnancy and postpartum periods. The voice may be altered positively

The trained singer utilizes an awareness of her body as an instrument. When she becomes pregnant, her body changes in numerous ways to support the pregnancy. Many of these changes have great impact on her ability to sing during the pregnancy and postpartum periods. The voice may be altered positively or negatively by the release of hormones. The body undergoes many changes that affect the posture and breathing required for singing. Most notably, the abdominal muscles are greatly impacted by the pregnancy. They are stretched by the growing uterus, and this affects their function. In addition, the linea alba (the connective tissue between the halves of the rectus abdominis) is softened by hormonal increases and subject to stretching as the uterus grows, predisposing it to weakness. Since the other abdominal muscles attach to the linea alba via connective tissue, maintaining the integrity of the linea alba during pregnancy and postpartum is vital to the operational function of the abdominal muscles. Protecting the vulnerable linea alba must be deliberately undertaken in two parts. First, conscious exercise is needed to preserve the linea alba during pregnancy and to rehabilitate it after pregnancy. Targeted exercises strengthen the transverse abdominis and shorten and approximate the two halves of the rectus abdominis. Second, modifications in daily movement are necessary to protect the linea alba while performing routine activities. Cesarean sections present additional surgical concerns for singers, including abdominal incisions, use of medication, and the rare need for general anesthesia via intubation. Recovery from a cesarean can be difficult due to abdominal pain, yet steps may be taken to speed healing at the hospital and at home. This paper provides an overview of how pregnancy affects the singer, discusses the effects of pregnancy and cesarean section, and provides a plan to protect the abdominal muscles during pregnancy and rehabilitate them in the postpartum period. It combines information from the fields of physical therapy, medicine, and surgery into a guide for the singer and voice teacher.
ContributorsWill, Andrea Pitman (Author) / Doan, Jerry (Thesis advisor) / Elgar Kopta, Anne (Thesis advisor) / Dreyfoos, Dale (Committee member) / Mills, Robert (Committee member) / Oldani, Robert W (Committee member) / Arizona State University (Publisher)
Created2013
152590-Thumbnail Image.png
Description
Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost

Access control is necessary for information assurance in many of today's applications such as banking and electronic health record. Access control breaches are critical security problems that can result from unintended and improper implementation of security policies. Security testing can help identify security vulnerabilities early and avoid unexpected expensive cost in handling breaches for security architects and security engineers. The process of security testing which involves creating tests that effectively examine vulnerabilities is a challenging task. Role-Based Access Control (RBAC) has been widely adopted to support fine-grained access control. However, in practice, due to its complexity including role management, role hierarchy with hundreds of roles, and their associated privileges and users, systematically testing RBAC systems is crucial to ensure the security in various domains ranging from cyber-infrastructure to mission-critical applications. In this thesis, we introduce i) a security testing technique for RBAC systems considering the principle of maximum privileges, the structure of the role hierarchy, and a new security test coverage criterion; ii) a MTBDD (Multi-Terminal Binary Decision Diagram) based representation of RBAC security policy including RHMTBDD (Role Hierarchy MTBDD) to efficiently generate effective positive and negative security test cases; and iii) a security testing framework which takes an XACML-based RBAC security policy as an input, parses it into a RHMTBDD representation and then generates positive and negative test cases. We also demonstrate the efficacy of our approach through case studies.
ContributorsGupta, Poonam (Author) / Ahn, Gail-Joon (Thesis advisor) / Collofello, James (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2014
152302-Thumbnail Image.png
Description
The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to

The energy consumption of data centers is increasing steadily along with the associ- ated power-density. Approximately half of such energy consumption is attributed to the cooling energy, as a result of which reducing cooling energy along with reducing servers energy consumption in data centers is becoming imperative so as to achieve greening of the data centers. This thesis deals with cooling energy management in data centers running data-processing frameworks. In particular, we propose ther- mal aware scheduling for MapReduce framework and its Hadoop implementation to reduce cooling energy in data centers. Data-processing frameworks run many low- priority batch processing jobs, such as background log analysis, that do not have strict completion time requirements; they can be delayed by a bounded amount of time. Cooling energy savings are possible by being able to temporally spread the workload, and assign it to the computing equipments which reduce the heat recirculation in data center room and therefore the load on the cooling systems. We implement our scheme in Hadoop and performs some experiments using both CPU-intensive and I/O-intensive workload benchmarks in order to evaluate the efficiency of our scheme. The evaluation results highlight that our thermal aware scheduling reduces hot-spots and makes uniform temperature distribution within the data center possible. Sum- marizing the contribution, we incorporated thermal awareness in Hadoop MapReduce framework by enhancing the native scheduler to make it thermally aware, compare the Thermal Aware Scheduler(TAS) with the Hadoop scheduler (FCFS) by running PageRank and TeraSort benchmarks in the BlueTool data center of Impact lab and show that there is reduction in peak temperature and decrease in cooling power using TAS over FCFS scheduler.
ContributorsKole, Sayan (Author) / Gupta, Sandeep (Thesis advisor) / Huang, Dijiang (Committee member) / Varsamopoulos, Georgios (Committee member) / Arizona State University (Publisher)
Created2013
152497-Thumbnail Image.png
Description
This paper and its accompanying recital examine three solo vocal works by Italian composer Alfredo Casella (1883-1947): "Larmes" from Cinq Mélodies (Op. 2); "Mort, ta servante est à ma porte" from L'adieu à la vie: Quatre lyriques funèbres extraites du "Gitanjali" de Rabindranath Tagore (Op. 26); and "Amante sono, vaghiccia,

This paper and its accompanying recital examine three solo vocal works by Italian composer Alfredo Casella (1883-1947): "Larmes" from Cinq Mélodies (Op. 2); "Mort, ta servante est à ma porte" from L'adieu à la vie: Quatre lyriques funèbres extraites du "Gitanjali" de Rabindranath Tagore (Op. 26); and "Amante sono, vaghiccia, di voi" from Tre canzoni trecentesche (Op. 36). Each of these songs is discussed as representative of Casella's three compositional periods. A fourth song, "Ecce odor filii mei" from Tre canti sacri per baritono et organo (Op. 66), is also examined, as an end-of-life composition. Some of the more important solo vocal works composed in each period are mentioned to show where the four selected songs fit into Casella's compositional output and to suggest music for further study or repertoire.
ContributorsGordon, Stefan (Author) / Mills, Robert (Thesis advisor) / Holbrook, Amy (Committee member) / FitzPatrick, Carole (Committee member) / Dreyfoos, Dale (Committee member) / Arizona State University (Publisher)
Created2014
Description
The purpose of this study is to examine and explore Hatha Yoga and how it relates to a practice consisting of singer-friendly yoga postures, how these postures may benefit the singer's mental and physical health, and how these techniques relate to designated research. The study also investigates yogic breathing techniques

The purpose of this study is to examine and explore Hatha Yoga and how it relates to a practice consisting of singer-friendly yoga postures, how these postures may benefit the singer's mental and physical health, and how these techniques relate to designated research. The study also investigates yogic breathing techniques and how these exercises relate to selected research. Lastly, the paper examines how the voice student and professional singer may alleviate anxiety by introducing a practice of daily yogic mediation of mudra and mantra techniques, and how voice teachers may better understand and assist their students with stage performance anxiety.
ContributorsHutton, Christopher (Singer) (Author) / Rogers, Rodney (Thesis advisor) / Doan, Jerry (Committee member) / Dreyfoos, Dale (Committee member) / Kopta, Anne (Committee member) / May, Judy (Committee member) / Arizona State University (Publisher)
Created2014
Description
From the time it was written, the aria "Largo al factotum" from Rossini's Il barbiere di Siviglia has been performed and ornamented in many different ways. The present study is an inventory and analysis of ornaments sung in 33 recordings from 1900 to 2011 and the major differences that they

From the time it was written, the aria "Largo al factotum" from Rossini's Il barbiere di Siviglia has been performed and ornamented in many different ways. The present study is an inventory and analysis of ornaments sung in 33 recordings from 1900 to 2011 and the major differences that they exhibit one from another. The singers in this study are baritones with international careers, who have performed the role of Figaro either at the Metropolitan Opera (New York) or at La Scala (Milan). The study identifies and tracks some of the changes in the ornamentation of the aria by noting common traits and new approaches across the one hundred eleven years of practice illustrated by the recordings.
ContributorsBriggs, Andrew Nathan (Author) / Mills, Robert (Committee member) / Oldani, Robert (Committee member) / Dreyfoos, Dale (Committee member) / FitzPatrick, Carole (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2014
153032-Thumbnail Image.png
Description
Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods

Most existing security decisions for both defending and attacking are made based on some deterministic approaches that only give binary answers. Even though these approaches can achieve low false positive rate for decision making, they have high false negative rates due to the lack of accommodations to new attack methods and defense techniques. In this dissertation, I study how to discover and use patterns with uncertainty and randomness to counter security challenges. By extracting and modeling patterns in security events, I am able to handle previously unknown security events with quantified confidence, rather than simply making binary decisions. In particular, I cope with the following four real-world security challenges by modeling and analyzing with pattern-based approaches: 1) How to detect and attribute previously unknown shellcode? I propose instruction sequence abstraction that extracts coarse-grained patterns from an instruction sequence and use Markov chain-based model and support vector machines to detect and attribute shellcode; 2) How to safely mitigate routing attacks in mobile ad hoc networks? I identify routing table change patterns caused by attacks, propose an extended Dempster-Shafer theory to measure the risk of such changes, and use a risk-aware response mechanism to mitigate routing attacks; 3) How to model, understand, and guess human-chosen picture passwords? I analyze collected human-chosen picture passwords, propose selection function that models patterns in password selection, and design two algorithms to optimize password guessing paths; and 4) How to identify influential figures and events in underground social networks? I analyze collected underground social network data, identify user interaction patterns, and propose a suite of measures for systematically discovering and mining adversarial evidence. By solving these four problems, I demonstrate that discovering and using patterns could help deal with challenges in computer security, network security, human-computer interaction security, and social network security.
ContributorsZhao, Ziming (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2014