Matching Items (10)
Filtering by

Clear all filters

150585-Thumbnail Image.png
Description
The purpose of this research paper is to discuss John Carter's Cantata, the musical development of this composition, and provide a brief history of this African American musician and composer. Presently, there exists very little research regarding Carter's life and compositions. From a musician's perspective, this paper discusses the challenges

The purpose of this research paper is to discuss John Carter's Cantata, the musical development of this composition, and provide a brief history of this African American musician and composer. Presently, there exists very little research regarding Carter's life and compositions. From a musician's perspective, this paper discusses the challenges of singing and performing the Cantata for future performers and provides a reference for their preparation. This project also examines John Carter's musical style and analyzes the structure of the Cantata. African-American folk songs were an inspiration to Carter's compositions, especially this particular work. As an African-American, his life and background played a role in his inspiration of composition. With borrowed music, he reveals a basic truth about this period of American history; how the lives of slaves influenced in the development of this particular genre. Additionally, John Carter's style of composition is examined, including the application of jazz and modal scales in his Cantata. Performance practice is examined for both the singer and pianist in a way that best represents the composer's original and unique intent. From vocal safety to breath control, a singer may find several challenges when performing this eclectic piece. This paper provides a guide for singers. A brief overview of the pianist's role in the Cantata is also included. Characteristic words of the African-American vernacular found in Carter's Cantata are briefly discussed and identified (i.e. "them" vs. "dem"). It is essential that any performer, both beginning and advanced, should have a proper understanding of the concepts that Carter had so carefully crafted. This paper endeavors to provide a deeper sense of understanding to what Carter had intended for both the performer and the listener.
ContributorsNa, Bora (Author) / Britton, David (Thesis advisor) / Bush, Jeffrey (Committee member) / Campbell, Andrew (Committee member) / Rogers, Rodney (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2012
151098-Thumbnail Image.png
Description
The craft of improvisation at the organ has survived a long period of dormancy and is experiencing a strong resurgence in the twenty-first century. This project seeks to establish a precedence for the value of notated music as a resource in learning improvisation, and then, through music analysis, provide examples

The craft of improvisation at the organ has survived a long period of dormancy and is experiencing a strong resurgence in the twenty-first century. This project seeks to establish a precedence for the value of notated music as a resource in learning improvisation, and then, through music analysis, provide examples of how that process can develop. The result of the ideas presented here is a pathway whereby any disciplined organist can learn to imitate composed music, assimilate the musical ideas, and innovate through the act of spontaneous improvisation.
ContributorsHoward, Devon (Author) / Marshall, Kimberly (Thesis advisor) / Ryan, Russell (Committee member) / Kocour, Michael (Committee member) / Norton, Kay (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2012
131747-Thumbnail Image.png
Description
One of the major sources of authentication is through the use of username and password systems. Ideally, each password is a unique identifier known by a single individual. In reality however, exposed passwords from past data breaches reveal vulnerabilities that are traceable to passwords created today. Vulnerabilities include repetitions of

One of the major sources of authentication is through the use of username and password systems. Ideally, each password is a unique identifier known by a single individual. In reality however, exposed passwords from past data breaches reveal vulnerabilities that are traceable to passwords created today. Vulnerabilities include repetitions of characters, words, character sequences, and phrases that are used in a password. This project was observed in English to highlight the vulnerabilities that can come from utilizing the English language. However, the vulnerabilities highlighted in this project can also be applicable in languages across the world. It was observed that through the common types of digital attacks, brute force attack and dictionary attack work effectively against weak passwords. Brute force attack revealed that a user could expose an alphanumeric password of length eight in as little as one and a half days. In addition, dictionary attacks revealed that an alphanumeric password of length eight can be exposed in a shorter amount of time if the password contains a single long word or phrase thought to be secure. During this attack analysis, it found that passwords become significantly more secure in the utilization of alphanumeric passwords of minimal length of eight. In addition, the password must also not be a particular phrase or word with simplistic characteristics for adequate strength against dictionary attack. The solution to using username and password systems is to create a password utilizing as many characters as possible while still retaining memorability. If creating a password of this type is not feasible, there is a need to use technological solutions to keep the current system of username and passwords as secure as possible under daily life. Otherwise, there will be a need to replace the username and password system altogether before it becomes insecure by technology.
ContributorsTipton, Tony T (Co-author) / Tipton, Tony (Co-author) / Meuth, Ryan (Thesis director) / Tirupalavanam, Ganesh (Committee member) / Computer Science and Engineering Program (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
135099-Thumbnail Image.png
Description
Smartphone privacy is a growing concern around the world; smartphone applications routinely take personal information from our phones and monetize it for their own profit. Worse, they're doing it legally. The Terms of Service allow companies to use this information to market, promote, and sell personal data. Most users seem

Smartphone privacy is a growing concern around the world; smartphone applications routinely take personal information from our phones and monetize it for their own profit. Worse, they're doing it legally. The Terms of Service allow companies to use this information to market, promote, and sell personal data. Most users seem to be either unaware of it, or unconcerned by it. This has negative implications for the future of privacy, particularly as the idea of smart home technology becomes a reality. If this is what privacy looks like now, with only one major type of smart device on the market, what will the future hold, when the smart home systems come into play. In order to examine this question, I investigated how much awareness/knowledge smartphone users of a specific demographic (millennials aged 18-25) knew about their smartphone's data and where it goes. I wanted three questions answered: - For what purposes do millennials use their smartphones? - What do they know about smartphone privacy and security? - How will this affect the future of privacy? To accomplish this, I gathered information using a distributed survey to millennials attending Arizona State University. Using statistical analysis, I exposed trends for this demographic, discovering that there isn't a lack of knowledge among millennials; most are aware that smartphone apps can collect and share data and many of the participants are not comfortable with the current state of smartphone privacy. However, more than half of the study participants indicated that they never read an app's Terms of Service. Due to the nature of the privacy vs. convenience argument, users will willingly agree to let apps take their personal in- formation, since they don't want to give up the convenience.
ContributorsJones, Scott Spenser (Author) / Atkinson, Robert (Thesis director) / Chavez-Echeagaray, Maria Elena (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2016-12
163974-Thumbnail Image.png
Description
Low-level optimization is the process of handwriting key parts of applications in assembly code that is better than what can be generated from a higher-level language. In performance-intensive applications, this is key to ensuring efficient code. This is generally something that is taught in on the job training, but knowledge

Low-level optimization is the process of handwriting key parts of applications in assembly code that is better than what can be generated from a higher-level language. In performance-intensive applications, this is key to ensuring efficient code. This is generally something that is taught in on the job training, but knowledge of it improves college student’s skill sets and makes them more desirable employees I have created material for a course teaching this low-level optimization with assembly code. I specifically focus on the x86 architecture, as this is one of the most prolific computer architectures. The course contains a series of lecture videos, live coding videos, and structured programming assignments to support the learning objectives. This material is presented in an entirely autonomous way, which serves as remote learning material and can be easily added as supplemental material to an existing course.
ContributorsAbraham, Jacob (Author) / Meuth, Ryan (Thesis director) / Nakamura, Mutsumi (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
166227-Thumbnail Image.png
Description
Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done

Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done with industry standard performance technology and protocols to create an accessible interface for creative expression. Artificial intelligence models were created to generate art based on simple text inputs. Users were then invited to display their creativity using the software, and a comprehensive performance showcased the potential of the system for artistic expression.
ContributorsPardhe, Joshua (Author) / Lim, Kang Yi (Co-author) / Meuth, Ryan (Thesis director) / Brian, Jennifer (Committee member) / Hermann, Kristen (Committee member) / Barrett, The Honors College (Contributor) / Dean, W.P. Carey School of Business (Contributor) / Watts College of Public Service & Community Solut (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
166228-Thumbnail Image.png
Description
Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done

Artistic expression can be made more accessible through the use of technological interfaces such as auditory analysis, generative artificial intelligence models, and simplification of complicated systems, providing a way for human driven creativity to serve as an input that allow users to creatively express themselves. Studies and testing were done with industry standard performance technology and protocols to create an accessible interface for creative expression. Artificial intelligence models were created to generate art based on simple text inputs. Users were then invited to display their creativity using the software, and a comprehensive performance showcased the potential of the system for artistic expression.
ContributorsLim, Kang Yi (Author) / Pardhe, Joshua (Co-author) / Meuth, Ryan (Thesis director) / Brian, Jennifer (Committee member) / Hermann, Kristen (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2022-05
Description

Nowadays, kids are exposed to technology at an incredibly early age. According to a study by YouGov in the United Kingdom, 88% of 12-year-olds are entrusted with their own devices and 85% of children at age 6 have access to a tablet at home (YouGov). In the US, according to

Nowadays, kids are exposed to technology at an incredibly early age. According to a study by YouGov in the United Kingdom, 88% of 12-year-olds are entrusted with their own devices and 85% of children at age 6 have access to a tablet at home (YouGov). In the US, according to MarketingProfs 75% of children 8 and under have access to some type of smart device. In an ever-growing technological world, it is important to make sure that kids are enjoying entertainment that enhances their growth and protects them from inappropriate content (Nanji). I wanted to create a browser game that explains the importance of Security in a colorful, fun environment with a friendly playable character. The game I created is a 2D platformer in which the player learns about the importance of passwords and keeping them secure.

ContributorsMichalik, Jacob (Author) / Meuth, Ryan (Thesis director) / Kobayashi, Yoshihiro (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2023-05
Description
Highly active in the fields of viola performance, composition, recording, and pedagogy, Lionel Tertis is known as one of the first and most influential career violists. Established in 1980, the Lionel Tertis International Viola Competition and Festival was founded in his honor and occurs triennially at the Isle of Man.

Highly active in the fields of viola performance, composition, recording, and pedagogy, Lionel Tertis is known as one of the first and most influential career violists. Established in 1980, the Lionel Tertis International Viola Competition and Festival was founded in his honor and occurs triennially at the Isle of Man. While addressing facets of the professional violist with workshops, lectures, and masterclasses, this event provides a venue for competitive performers, acting as a platform for new viola repertoire.

Each competitor must prepare an extensive set of viola repertoire, among which is a compulsory piece for unaccompanied viola by an English composer. These commissioned works require the virtuosity and expression available within a contemporary musical language; this additionally challenges competitors to provide an artistic interpretation relatively untouched by tradition or common practice.

Although these pieces are written specifically for the competition, the commissioned works have the capacity to reach beyond the competition sphere and are highly programmable in most recital and solo performance settings. These pieces provide the contemporary violist with a greater selection of repertoire that displays idiomatic and expressive strengths of the viola.

My project commemorates the contributions of Lionel Tertis to the advancement of viola repertoire and performance with the study of works written a century post his prolific career. The secondary intent is to provide biographical information about each composer and to explore how these highly programmable works enrich the violist and their repertoire, ultimately bringing recognition to these new works for solo viola. Through biographical research, musical analysis, interviews and the recording process, I will provide a performer's analysis and supplemental recordings for three of these works: Darkness Draws In by David Matthews, Sonatine I by Roger Steptoe and Through a Limbeck by John Woolrich.
ContributorsWuenschel, Allyson Kay (Author) / Buck, Nancy (Thesis advisor) / Carpenter, Ellon (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2017
Description
Pacific Suite (2016) is a four-movement work for solo piano composed by the author of this paper, Holly Kordahl, that incorporates elements of several musical idioms, including Impressionism, tintinnabuli (as in the music of Arvo Pärt), post-modernism, minimalism and improvisation. This Doctorate of Musical Arts project consists of a descriptive

Pacific Suite (2016) is a four-movement work for solo piano composed by the author of this paper, Holly Kordahl, that incorporates elements of several musical idioms, including Impressionism, tintinnabuli (as in the music of Arvo Pärt), post-modernism, minimalism and improvisation. This Doctorate of Musical Arts project consists of a descriptive paper, analysis, score and recording. The piece features varying levels of performer independence and improvisation along with notated music. Each movement is named after a different environment of the Pacific Ocean: Great Barrier Reef, Mariana Trench, Sunlit Zone, and Bikini Atoll.

Pacific Suite is engaging to mature pianists and accessible to students. The score of Pacific Suite is a blank canvas in some ways; almost all dynamics, tempi, pedaling, and fingerings are to be determined by the performer. The first movement, Great Barrier Reef, presents different musical vignettes. The second movement, Mariana Trench, requires the performer to improvise extensively while following provided instructions. The third movement, Sunlit Zone, asks the performer to improvise on a theme of Debussy. The final movement, Bikini Atoll, illustrates events of nuclear testing at Bikini Atoll in the 1940s.
ContributorsKordahl, Holly (Author) / Meir, Baruch (Thesis advisor) / Bolanos, Gabriel (Committee member) / Campbell, Andrew (Committee member) / Hamilton, Robert (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2020