This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 131
151824-Thumbnail Image.png
Description
There is a lack of music therapy services for college students who have problems with depression and/or anxiety. Even among universities and colleges that offer music therapy degrees, there are no known programs offering music therapy to the institution's students. Female college students are particularly vulnerable to depression and anxiety

There is a lack of music therapy services for college students who have problems with depression and/or anxiety. Even among universities and colleges that offer music therapy degrees, there are no known programs offering music therapy to the institution's students. Female college students are particularly vulnerable to depression and anxiety symptoms compared to their male counterparts. Many students who experience mental health problems do not receive treatment, because of lack of knowledge, lack of services, or refusal of treatment. Music therapy is proposed as a reliable and valid complement or even an alternative to traditional counseling and pharmacotherapy because of the appeal of music to young women and the potential for a music therapy group to help isolated students form supportive networks. The present study recruited 14 female university students to participate in a randomized controlled trial of short-term group music therapy to address symptoms of depression and anxiety. The students were randomly divided into either the treatment group or the control group. Over 4 weeks, each group completed surveys related to depression and anxiety. Results indicate that the treatment group's depression and anxiety scores gradually decreased over the span of the treatment protocol. The control group showed either maintenance or slight worsening of depression and anxiety scores. Although none of the results were statistically significant, the general trend indicates that group music therapy was beneficial for the students. A qualitative analysis was also conducted for the treatment group. Common themes were financial concerns, relationship problems, loneliness, and time management/academic stress. All participants indicated that they benefited from the sessions. The group progressed in its cohesion and the participants bonded to the extent that they formed a supportive network which lasted beyond the end of the protocol. The results of this study are by no means conclusive, but do indicate that colleges with music therapy degree programs should consider adding music therapy services for their general student bodies.
ContributorsAshton, Barbara (Author) / Crowe, Barbara J. (Thesis advisor) / Rio, Robin (Committee member) / Davis, Mary (Committee member) / Arizona State University (Publisher)
Created2013
151653-Thumbnail Image.png
Description
Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling

Answer Set Programming (ASP) is one of the most prominent and successful knowledge representation paradigms. The success of ASP is due to its expressive non-monotonic modeling language and its efficient computational methods originating from building propositional satisfiability solvers. The wide adoption of ASP has motivated several extensions to its modeling language in order to enhance expressivity, such as incorporating aggregates and interfaces with ontologies. Also, in order to overcome the grounding bottleneck of computation in ASP, there are increasing interests in integrating ASP with other computing paradigms, such as Constraint Programming (CP) and Satisfiability Modulo Theories (SMT). Due to the non-monotonic nature of the ASP semantics, such enhancements turned out to be non-trivial and the existing extensions are not fully satisfactory. We observe that one main reason for the difficulties rooted in the propositional semantics of ASP, which is limited in handling first-order constructs (such as aggregates and ontologies) and functions (such as constraint variables in CP and SMT) in natural ways. This dissertation presents a unifying view on these extensions by viewing them as instances of formulas with generalized quantifiers and intensional functions. We extend the first-order stable model semantics by by Ferraris, Lee, and Lifschitz to allow generalized quantifiers, which cover aggregate, DL-atoms, constraints and SMT theory atoms as special cases. Using this unifying framework, we study and relate different extensions of ASP. We also present a tight integration of ASP with SMT, based on which we enhance action language C+ to handle reasoning about continuous changes. Our framework yields a systematic approach to study and extend non-monotonic languages.
ContributorsMeng, Yunsong (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Fainekos, Georgios (Committee member) / Lifschitz, Vladimir (Committee member) / Arizona State University (Publisher)
Created2013
152495-Thumbnail Image.png
Description
Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server

Attribute Based Access Control (ABAC) mechanisms have been attracting a lot of interest from the research community in recent times. This is especially because of the flexibility and extensibility it provides by using attributes assigned to subjects as the basis for access control. ABAC enables an administrator of a server to enforce access policies on the data, services and other such resources fairly easily. It also accommodates new policies and changes to existing policies gracefully, thereby making it a potentially good mechanism for implementing access control in large systems, particularly in today's age of Cloud Computing. However management of the attributes in ABAC environment is an area that has been little touched upon. Having a mechanism to allow multiple ABAC based systems to share data and resources can go a long way in making ABAC scalable. At the same time each system should be able to specify their own attribute sets independently. In the research presented in this document a new mechanism is proposed that would enable users to share resources and data in a cloud environment using ABAC techniques in a distributed manner. The focus is mainly on decentralizing the access policy specifications for the shared data so that each data owner can specify the access policy independent of others. The concept of ontologies and semantic web is introduced in the ABAC paradigm that would help in giving a scalable structure to the attributes and also allow systems having different sets of attributes to communicate and share resources.
ContributorsPrabhu Verleker, Ashwin Narayan (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2014
152385-Thumbnail Image.png
Description
This thesis addresses the ever increasing threat of botnets in the smartphone domain and focuses on the Android platform and the botnets using Online Social Networks (OSNs) as Command and Control (C&C;) medium. With any botnet, C&C; is one of the components on which the survival of botnet depends. Individual

This thesis addresses the ever increasing threat of botnets in the smartphone domain and focuses on the Android platform and the botnets using Online Social Networks (OSNs) as Command and Control (C&C;) medium. With any botnet, C&C; is one of the components on which the survival of botnet depends. Individual bots use the C&C; channel to receive commands and send the data. This thesis develops active host based approach for identifying the presence of bot based on the anomalies in the usage patterns of the user before and after the bot is installed on the user smartphone and alerting the user to the presence of the bot. A profile is constructed for each user based on the regular web usage patterns (achieved by intercepting the http(s) traffic) and implementing machine learning techniques to continuously learn the user's behavior and changes in the behavior and all the while looking for any anomalies in the user behavior above a threshold which will cause the user to be notified of the anomalous traffic. A prototype bot which uses OSN s as C&C; channel is constructed and used for testing. Users are given smartphones(Nexus 4 and Galaxy Nexus) running Application proxy which intercepts http(s) traffic and relay it to a server which uses the traffic and constructs the model for a particular user and look for any signs of anomalies. This approach lays the groundwork for the future host-based counter measures for smartphone botnets using OSN s as C&C; channel.
ContributorsKilari, Vishnu Teja (Author) / Xue, Guoliang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Dasgupta, Partha (Committee member) / Arizona State University (Publisher)
Created2013
152332-Thumbnail Image.png
Description
Using data from an eight-year longitudinal study of 214 children's social and emotional development, I conducted three studies to (1) examine patterns of agreement for internalizing (INT) and externalizing (EXT) symptomatology among different informants (mothers, fathers, teachers, and adolescents) using a recently developed structural equation modeling approach for multi-trait, multi-method

Using data from an eight-year longitudinal study of 214 children's social and emotional development, I conducted three studies to (1) examine patterns of agreement for internalizing (INT) and externalizing (EXT) symptomatology among different informants (mothers, fathers, teachers, and adolescents) using a recently developed structural equation modeling approach for multi-trait, multi-method data; (2) examine the developmental trajectories for INT and EXT and predict individual differences in symptom development using temperament and parenting variables; and (3) describe patterns of INT and EXT co-occurrence and predict these patterns from temperament and parenting. In Study 1, longitudinal invariance was established for mothers', fathers' and teachers' reports over a six-year period. Sex, age, and SES did not substantially moderate agreement among informants, although both sex and age were differentially related to symptomatology depending on the informant. Agreement among teachers and mothers, but not among mothers and fathers, differed by domain of symptomatology, and was greater for EXT than for INT. In Study 2, latent profile analysis, a person-centered analytic approach, did not provide easily interpretable patterns of symptom development, a failure that is likely the result of the relatively modest sample size. Latent growth curve models, an alternative analytic approach, did provide good fit to the data. Temperament and parenting variables were examined as predictors of the latent growth parameters in these models. Although there was little prediction of the slope, effortful control was negatively related to overall levels of EXT, whereas impulsivity and anger were positively related. Mutually responsive orientation, a measure of the parent-child relationship, was a more consistent predictor of EXT than was parental warmth. Furthermore, the relation between mutually responsive orientation and EXT was partially mediated by inhibitory control. Across informants, there were few consistent predictors of INT. In Study 3, latent profile analysis was used to classify individuals into different patterns of INT and EXT co-occurrence. In these models, a similar class structure was identified for mothers and for teachers. When temperament and parenting were examined as predictors of co-occurring symptomatology, few significant interactions were found and results largely replicated prior findings from this data set using arbitrary symptom groups.
ContributorsSulik, Michael John (Author) / Eisenberg, Nancy (Thesis advisor) / Spinrad, Tracy L (Thesis advisor) / Lemery-Chalfant, Kathryn (Committee member) / Wolchik, Sharlene A (Committee member) / Arizona State University (Publisher)
Created2013
152639-Thumbnail Image.png
Description
Sometimes difficult life events challenge our existing resources in such a way that routinized responses are inadequate to handle the challenge. Some individuals will persist in habitual, automatic behavior, regardless of environmental cues that indicate a mismatch between coping strategy and the demands of the stressor. Other individuals will marshal

Sometimes difficult life events challenge our existing resources in such a way that routinized responses are inadequate to handle the challenge. Some individuals will persist in habitual, automatic behavior, regardless of environmental cues that indicate a mismatch between coping strategy and the demands of the stressor. Other individuals will marshal adaptive resources to construct new courses of action and reconceptualize the problem, associated goals and/or values. A mixed methods approach was used to describe and operationalize cognitive shift, a relatively unexplored construct in existing literature. The study was conducted using secondary data from a parent multi-year cross-sectional study of resilience with eight hundred mid-aged adults from the Phoenix metro area. Semi-structured telephone interviews were analyzed using a purposive sample (n=136) chosen by type of life event. Participants' beliefs, assumptions, and experiences were examined to understand how they shaped adaptation to adversity. An adaptive mechanism, "cognitive shift," was theorized as the transition from automatic coping to effortful cognitive processes aimed at novel resolution of issues. Aims included understanding when and how cognitive shift emerges and manifests. Cognitive shift was scored as a binary variable and triangulated through correlational and logistic regression analyses. Interaction effects revealed that positive personality attributes influence cognitive shift most when people suffered early adversity. This finding indicates that a certain complexity, self-awareness and flexibility of mind may lead to a greater capacity to find meaning in adversity. This work bridges an acknowledged gap in literature and provides new insights into resilience.
ContributorsRivers, Crystal T (Author) / Zautra, Alex (Thesis advisor) / Davis, Mary (Committee member) / Kurpius, Sharon (Committee member) / Arizona State University (Publisher)
Created2014
152874-Thumbnail Image.png
Description
The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In

The widespread adoption of mobile devices gives rise to new opportunities and challenges for authentication mechanisms. Many traditional authentication mechanisms become unsuitable for smart devices. For example, while password is widely used on computers as user identity authentication, inputting password on small smartphone screen is error-prone and not convenient. In the meantime, there are emerging demands for new types of authentication. Proximity authentication is an example, which is not needed for computers but quite necessary for smart devices. These challenges motivate me to study and develop novel authentication mechanisms specific for smart devices.

In this dissertation, I am interested in the special authentication demands of smart devices and about to satisfy the demands. First, I study how the features of smart devices affect user identity authentications. For identity authentication domain, I aim to design a continuous, forge-resistant authentication mechanism that does not interrupt user-device interactions. I propose a mechanism that authenticates user identity based on the user's finger movement patterns. Next, I study a smart-device-specific authentication, proximity authentication, which authenticates whether two devices are in close proximity. For prox- imity authentication domain, I aim to design a user-friendly authentication mechanism that can defend against relay attacks. In addition, I restrict the authenticated distance to the scale of near field, i.e., a few centimeters. My first design utilizes a user's coherent two-finger movement on smart device screen to restrict the distance. To achieve a fully-automated system, I explore acoustic communications and propose a novel near field authentication system.
ContributorsLi, Lingjun (Author) / Xue, Guoliang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Ye, Jieping (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2014
153523-Thumbnail Image.png
Description
Low-income Mexican American women face significant risk for poor health during the postpartum period. Chronic stressors are theorized to negatively impact mental and physical health outcomes. However, physiological factors associated with increased self-regulatory capacity, such as resting heart rate variability, may buffer the impact of stress. In a sample of

Low-income Mexican American women face significant risk for poor health during the postpartum period. Chronic stressors are theorized to negatively impact mental and physical health outcomes. However, physiological factors associated with increased self-regulatory capacity, such as resting heart rate variability, may buffer the impact of stress. In a sample of 322 low-income Mexican American women (mother age 18-42; 84% Spanish-speaking; modal family income $10,000-$15,000), the interactive influence of resting heart rate variability and three chronic prenatal stressors (daily hassles, negative life events, economic stress) on maternal cortisol output, depressive symptoms, and self-rated health at 12 weeks postpartum was assessed. The hypothesized interactive effects between resting heart rate variability and the chronic prenatal stressors on the health outcomes were not supported by the data. However, results showed that a higher number of prenatal daily hassles was associated with increased postpartum depressive symptoms, and a higher number of prenatal negative life events was associated with lower postpartum cortisol output. These results suggest that elevated chronic stress during the prenatal period may increase risk for poor health during the postpartum period.
ContributorsJewell, Shannon Linda (Author) / Luecken, Linda J. (Thesis advisor) / Lemery-Chalfant, Kathryn (Committee member) / Perez, Marisol (Committee member) / Arizona State University (Publisher)
Created2015
152989-Thumbnail Image.png
Description
The current study delineated the developmental trajectories of early childhood externalizing and internalizing symptoms reported by mothers and fathers, and examined the role of the 18-month observed parenting quality × Respiratory Sinus Arrhythmia

(RSA) interaction in predicting these trajectories. Child sex was tested as a covariate and moderator. It was

The current study delineated the developmental trajectories of early childhood externalizing and internalizing symptoms reported by mothers and fathers, and examined the role of the 18-month observed parenting quality × Respiratory Sinus Arrhythmia

(RSA) interaction in predicting these trajectories. Child sex was tested as a covariate and moderator. It was found that children's low baseline RSA or high RSA reactivity , in comparison to high baseline RSA or low RSA reactivity , was more reactive as a function

of early parenting quality when predicting the development of early childhood problem symptoms. Differential patterns of the interaction between parenting quality and RSA were detected for mothers' and fathers' reports. Mother-reported models showed a diathesis-stress pattern, whereas the father-reported model showed a vantage-sensitivity pattern, especially for internalizing symptoms. This may imply the potential benefit of fathers' active engagement in children's early development. In addition, the effect of the parenting quality × RSA interaction in predicting the mother-reported models was found

to be further moderated by child sex. Specifically, the parenting quality × baseline RSA interaction was significantly predictive of girls' 54-month internalizing, and the parenting quality × RSA reactivity interaction significantly predicted boys' internalizing slope. Girls with low baseline RSA or boys with high RSA reactivity were vulnerable to the less positive parenting, exhibiting high levels of 54-month internalizing symptoms or slow decline in internalizing over time, respectively. Future research directions were discussed in terms of integrating the measures of SNS and PNS in psychopathology study,

exploring the mechanisms underlying the sex difference in parenting quality × RSA interaction, and comparing the findings of children's typical and atypical development.
ContributorsLi, Yi (Author) / Eisenberg, Nancy (Thesis advisor) / Spinrad, Tracy (Thesis advisor) / Lemery-Chalfant, Kathryn (Committee member) / Wilkens, Natalie (Committee member) / Arizona State University (Publisher)
Created2014
153041-Thumbnail Image.png
Description
A firewall is a necessary component for network security and just like any regular equipment it requires maintenance. To keep up with changing cyber security trends and threats, firewall rules are modified frequently. Over time such modifications increase the complexity, size and verbosity of firewall rules. As the rule set

A firewall is a necessary component for network security and just like any regular equipment it requires maintenance. To keep up with changing cyber security trends and threats, firewall rules are modified frequently. Over time such modifications increase the complexity, size and verbosity of firewall rules. As the rule set grows in size, adding and modifying rule becomes a tedious task. This discourages network administrators to review the work done by previous administrators before and after applying any changes. As a result the quality and efficiency of the firewall goes down.

Modification and addition of rules without knowledge of previous rules creates anomalies like shadowing and rule redundancy. Anomalous rule sets not only limit the efficiency of the firewall but in some cases create a hole in the perimeter security. Detection of anomalies has been studied for a long time and some well established procedures have been implemented and tested. But they all have a common problem of visualizing the results. When it comes to visualization of firewall anomalies, the results do not fit in traditional matrix, tree or sunburst representations.

This research targets the anomaly detection and visualization problem. It analyzes and represents firewall rule anomalies in innovative ways such as hive plots and dynamic slices. Such graphical representations of rule anomalies are useful in understanding the state of a firewall. It also helps network administrators in finding and fixing the anomalous rules.
ContributorsKhatkar, Pankaj Kumar (Author) / Huang, Dijiang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Syrotiuk, Violet R. (Committee member) / Arizona State University (Publisher)
Created2014