This collection includes both ASU Theses and Dissertations, submitted by graduate students, and the Barrett, Honors College theses submitted by undergraduate students. 

Displaying 1 - 10 of 387
Filtering by

Clear all filters

Description

The aim of this project was to create an original sound design and score for the ASU SOMDT production of HEDDATRON, by Elizabeth Meriwether. Composition and sound design was done primarily with a modular synthesizer. All audio editing was done in Reaper, and the cues were programmed in Qlab.

ContributorsJansen, Troy Sherk (Author) / Max, Bernstein (Thesis director) / Lance, Gharavi (Committee member) / School of Music, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148171-Thumbnail Image.png
Description

As the return to normality in the wake of the COVID-19 pandemic enters its early stages, the necessity for accurate, quick, and community-wide surveillance of SARS-CoV-2 has been emphasized. Wastewater-based epidemiology (WBE) has been used across the world as a tool for monitoring the pandemic, but studies of its efficacy

As the return to normality in the wake of the COVID-19 pandemic enters its early stages, the necessity for accurate, quick, and community-wide surveillance of SARS-CoV-2 has been emphasized. Wastewater-based epidemiology (WBE) has been used across the world as a tool for monitoring the pandemic, but studies of its efficacy in comparison to the best-known method for surveillance, randomly selected COVID-19 testing, has limited research. This study evaluated the trends and correlations present between SARS-CoV-2 in the effluent wastewater of a large university campus and random COVID-19 testing results published by the university. A moderately strong positive correlation was found between the random testing and WBE surveillance methods (r = 0.63), and this correlation was strengthened when accommodating for lost samples during the experiment (r = 0.74).

ContributorsWright, Jillian (Author) / Halden, Rolf (Thesis director) / Driver, Erin (Committee member) / School of Music, Dance and Theatre (Contributor) / School of Life Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148013-Thumbnail Image.png
Description

In this thesis paper, the mental health consequences of the COVID-19 pandemic are discussed. Chapter 1 discusses what inspired me to write this thesis and follows with a discussion of social isolation during the COVID-19 pandemic. Chapter 2 takes a step back and discusses biological effects of social isolation

In this thesis paper, the mental health consequences of the COVID-19 pandemic are discussed. Chapter 1 discusses what inspired me to write this thesis and follows with a discussion of social isolation during the COVID-19 pandemic. Chapter 2 takes a step back and discusses biological effects of social isolation in general. Chapter 3 discusses the psychological effects of social isolation. Finally, this thesis concludes with a discussion of what can be done to help those experiencing social isolation during the pandemic.

ContributorsHarvey, Kira Rachelle (Author) / Sturgess, Jessica (Thesis director) / Tucker, Derek (Committee member) / School of Music, Dance and Theatre (Contributor) / School of Life Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

In my undergraduate honors thesis, I strive to convey my idea that dance is more than just movement, it’s one of the many artistic tools used to express emotions; which therefore has the power to storytell without words. It is my hope to create a captivating form of art that

In my undergraduate honors thesis, I strive to convey my idea that dance is more than just movement, it’s one of the many artistic tools used to express emotions; which therefore has the power to storytell without words. It is my hope to create a captivating form of art that you not only view, but can interact and interpret.

ContributorsSawant, Sarika (Author) / Roses-Thema, Cynthia (Thesis director) / Sulikowski, James (Committee member) / College of Health Solutions (Contributor) / School of Music, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147995-Thumbnail Image.png
Description

For my creative project, I explored using natural sound to create a sound score or song. I used contrasting natural sounds to create the sound scores. Most of the sound recordings are from the New York City subways as well as other recordings around different cities in the United States.

For my creative project, I explored using natural sound to create a sound score or song. I used contrasting natural sounds to create the sound scores. Most of the sound recordings are from the New York City subways as well as other recordings around different cities in the United States. I created new sounds using sound manipulation techniques. I explored the use of electronic music production to translate the natural noise into the patterns, repetition and other elemental musical techniques to create a song. I used Ableton as the music production platform to develop the three songs.

ContributorsRischitelli, Zoe Danielle (Author) / Kaplan, Robert (Thesis director) / Swayze, Bill (Committee member) / College of Health Solutions (Contributor) / School of Music, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
Description

This qualitative project was done as a way to learn more about the personal experiences of Asian American participants surrounding education and how it has impacted their identities, and questions how and if the model minority stereotype has impacted the Asian American student particiapnts. 14 participants were interviewed one-on-one to

This qualitative project was done as a way to learn more about the personal experiences of Asian American participants surrounding education and how it has impacted their identities, and questions how and if the model minority stereotype has impacted the Asian American student particiapnts. 14 participants were interviewed one-on-one to see if there were any patterns in values that their parents had pushed, and revealed that cultural expectations influence the participants’s educational choices, leading to self-regulation in regards to education. Because the shared trait of these participants are being current Asian American students in university at the time of their interviews, experiences range with how acculturated their parents are, the ethnic background of their families, and prior expectations with education.

ContributorsFrancke, Katrielle Ely (Author) / Cayetano, Catalina (Thesis director) / Taylor, Jameien (Committee member) / Department of English (Contributor) / School of Humanities, Arts, and Cultural Studies (Contributor) / School of Music, Dance and Theatre (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011
150093-Thumbnail Image.png
Description
Action language C+ is a formalism for describing properties of actions, which is based on nonmonotonic causal logic. The definite fragment of C+ is implemented in the Causal Calculator (CCalc), which is based on the reduction of nonmonotonic causal logic to propositional logic. This thesis describes the language

Action language C+ is a formalism for describing properties of actions, which is based on nonmonotonic causal logic. The definite fragment of C+ is implemented in the Causal Calculator (CCalc), which is based on the reduction of nonmonotonic causal logic to propositional logic. This thesis describes the language of CCalc in terms of answer set programming (ASP), based on the translation of nonmonotonic causal logic to formulas under the stable model semantics. I designed a standard library which describes the constructs of the input language of CCalc in terms of ASP, allowing a simple modular method to represent CCalc input programs in the language of ASP. Using the combination of system F2LP and answer set solvers, this method achieves functionality close to that of CCalc while taking advantage of answer set solvers to yield efficient computation that is orders of magnitude faster than CCalc for many benchmark examples. In support of this, I created an automated translation system Cplus2ASP that implements the translation and encoding method and automatically invokes the necessary software to solve the translated input programs.
ContributorsCasolary, Michael (Author) / Lee, Joohyung (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Baral, Chitta (Committee member) / Arizona State University (Publisher)
Created2011
150148-Thumbnail Image.png
Description
In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and

In order to catch the smartest criminals in the world, digital forensics examiners need a means of collaborating and sharing information with each other and outside experts that is not prohibitively difficult. However, standard operating procedures and the rules of evidence generally disallow the use of the collaboration software and techniques that are currently available because they do not fully adhere to the dictated procedures for the handling, analysis, and disclosure of items relating to cases. The aim of this work is to conceive and design a framework that provides a completely new architecture that 1) can perform fundamental functions that are common and necessary to forensic analyses, and 2) is structured such that it is possible to include collaboration-facilitating components without changing the way users interact with the system sans collaboration. This framework is called the Collaborative Forensic Framework (CUFF). CUFF is constructed from four main components: Cuff Link, Storage, Web Interface, and Analysis Block. With the Cuff Link acting as a mediator between components, CUFF is flexible in both the method of deployment and the technologies used in implementation. The details of a realization of CUFF are given, which uses a combination of Java, the Google Web Toolkit, Django with Apache for a RESTful web service, and an Ubuntu Enterprise Cloud using Eucalyptus. The functionality of CUFF's components is demonstrated by the integration of an acquisition script designed for Android OS-based mobile devices that use the YAFFS2 file system. While this work has obvious application to examination labs which work under the mandate of judicial or investigative bodies, security officers at any organization would benefit from the improved ability to cooperate in electronic discovery efforts and internal investigations.
ContributorsMabey, Michael Kent (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011