Matching Items (28)
Filtering by

Clear all filters

151631-Thumbnail Image.png
Description
Whenever a text is transmitted, or communicated by any means, variations may occur because editors, copyists, and performers are often not careful enough with the source itself. As a result, a flawed text may come to be accepted in good faith through repetition, and may often be preferred over the

Whenever a text is transmitted, or communicated by any means, variations may occur because editors, copyists, and performers are often not careful enough with the source itself. As a result, a flawed text may come to be accepted in good faith through repetition, and may often be preferred over the authentic version because familiarity with the flawed copy has been established. This is certainly the case with regard to Manuel M. Ponce's guitar editions. An inexact edition of a musical work is detrimental to several key components of its performance: musical interpretation, aesthetics, and the original musical concept of the composer. These phenomena may be seen in the case of Manuel Ponce's Suite in D Major for guitar. The single published edition by Peer International Corporation in 1967 with the revision and fingering of Manuel López Ramos contains many copying mistakes and intentional, but unauthorized, changes to the original composition. For the present project, the present writer was able to obtain a little-known copy of the original manuscript of this work, and to document these discrepancies in order to produce a new performance edition that is more closely based on Ponce's original work.
ContributorsReyes Paz, Ricardo (Author) / Koonce, Frank (Thesis advisor) / Solis, Theodore (Committee member) / Rotaru, Catalin (Committee member) / Arizona State University (Publisher)
Created2013
151405-Thumbnail Image.png
Description
Critical infrastructures in healthcare, power systems, and web services, incorporate cyber-physical systems (CPSes), where the software controlled computing systems interact with the physical environment through actuation and monitoring. Ensuring software safety in CPSes, to avoid hazards to property and human life as a result of un-controlled interactions, is essential and

Critical infrastructures in healthcare, power systems, and web services, incorporate cyber-physical systems (CPSes), where the software controlled computing systems interact with the physical environment through actuation and monitoring. Ensuring software safety in CPSes, to avoid hazards to property and human life as a result of un-controlled interactions, is essential and challenging. The principal hurdle in this regard is the characterization of the context driven interactions between software and the physical environment (cyber-physical interactions), which introduce multi-dimensional dynamics in space and time, complex non-linearities, and non-trivial aggregation of interaction in case of networked operations. Traditionally, CPS software is tested for safety either through experimental trials, which can be expensive, incomprehensive, and hazardous, or through static analysis of code, which ignore the cyber-physical interactions. This thesis considers model based engineering, a paradigm widely used in different disciplines of engineering, for safety verification of CPS software and contributes to three fundamental phases: a) modeling, building abstractions or models that characterize cyberphysical interactions in a mathematical framework, b) analysis, reasoning about safety based on properties of the model, and c) synthesis, implementing models on standard testbeds for performing preliminary experimental trials. In this regard, CPS modeling techniques are proposed that can accurately capture the context driven spatio-temporal aggregate cyber-physical interactions. Different levels of abstractions are considered, which result in high level architectural models, or more detailed formal behavioral models of CPSes. The outcomes include, a well defined architectural specification framework called CPS-DAS and a novel spatio-temporal formal model called Spatio-Temporal Hybrid Automata (STHA) for CPSes. Model analysis techniques are proposed for the CPS models, which can simulate the effects of dynamic context changes on non-linear spatio-temporal cyberphysical interactions, and characterize aggregate effects. The outcomes include tractable algorithms for simulation analysis and for theoretically proving safety properties of CPS software. Lastly a software synthesis technique is proposed that can automatically convert high level architectural models of CPSes in the healthcare domain into implementations in high level programming languages. The outcome is a tool called Health-Dev that can synthesize software implementations of CPS models in healthcare for experimental verification of safety properties.
ContributorsBanerjee, Ayan (Author) / Gupta, Sandeep K.S. (Thesis advisor) / Poovendran, Radha (Committee member) / Fainekos, Georgios (Committee member) / Maciejewski, Ross (Committee member) / Arizona State University (Publisher)
Created2012
171515-Thumbnail Image.png
Description
The notion of the safety of a system when placed in an environment with humans and other machines has been one of the primary concerns of practitioners while deploying any cyber-physical system (CPS). Such systems, also called safety-critical systems, need to be exhaustively tested for erroneous behavior. This generates the

The notion of the safety of a system when placed in an environment with humans and other machines has been one of the primary concerns of practitioners while deploying any cyber-physical system (CPS). Such systems, also called safety-critical systems, need to be exhaustively tested for erroneous behavior. This generates the need for coming up with algorithms that can help ascertain the behavior and safety of the system by generating tests for the system where they are likely to falsify. In this work, three algorithms have been presented that aim at finding falsifying behaviors in cyber-physical Systems. PART-X intelligently partitions while sampling the input space to provide probabilistic point and region estimates of falsification. PYSOAR-C and LS-EMIBO aims at finding falsifying behaviors in gray-box systems when some information about the system is available. Specifically, PYSOAR-C aims to find falsification while maximizing coverage using a two-phase optimization process, while LS-EMIBO aims at exploiting the structure of a requirement to find falsifications with lower computational cost compared to the state-of-the-art. This work also shows the efficacy of the algorithms on a wide range of complex cyber-physical systems. The algorithms presented in this thesis are available as python toolboxes.
ContributorsKhandait, Tanmay Bhaskar (Author) / Pedrielli, Giulia (Thesis advisor) / Fainekos, Georgios (Thesis advisor) / Gopalan, Nakul (Committee member) / Arizona State University (Publisher)
Created2022
ContributorsKoonce, Frank (Performer) / ASU Library. Music Library (Publisher)
Created1993-12-01
ContributorsKoonce, Frank (Performer) / Reberger, Robert (Performer) / Saari, Scott (Performer) / ASU Library. Music Library (Publisher)
Created1985-12-08
ContributorsKoonce, Frank (Performer) / Koonce, Joanne Lamont (Performer) / ASU Library. Music Library (Publisher)
Created1983-02-03
ContributorsKoonce, Frank (Performer) / Guitar ensemble (Performer) / ASU Library. Music Library (Publisher)
Created1991-12-07
ContributorsKoonce, Frank (Performer) / ASU Library. Music Library (Publisher)
Created1995-11-27
ContributorsKoonce, Frank (Performer) / ASU Library. Music Library (Publisher)
Created1990-04-02
ContributorsKoonce, Frank (Performer) / Guitar ensemble (Performer) / ASU Library. Music Library (Publisher)
Created1986-12-01