Matching Items (156)
137721-Thumbnail Image.png
Description
Prior to World War II, about 55,000 Jews were living in Prague, a very cosmopolitan and artistic city. They represented nearly twenty percent of the city’s population. By the end of the war, at least two-thirds of them had died in the Holocaust. The Nazis converted the small fortress town

Prior to World War II, about 55,000 Jews were living in Prague, a very cosmopolitan and artistic city. They represented nearly twenty percent of the city’s population. By the end of the war, at least two-thirds of them had died in the Holocaust. The Nazis converted the small fortress town of Theresienstadt, near Prague, into a transport camp for Jews on their way to Auschwitz and other death camps. Theresienstadt was where the Nazis sent most Jewish Czech intellectuals, military veterans, artists, and members of the upper class who were well connected. It was also the camp they chose to present to the international community. For all of these reasons—Theresienstadt’s isolation, the demography of the inmates there, and the Nazis’ desire to use it to fool the international community—the Nazis allowed unparalleled self-administration and artistic freedoms.
Arguably the most noteworthy result was its flourishing musical community. Composers and performers who had worked together in Prague prior to the war were able to continue to do so freely in ways that Jewish people were not allowed anywhere else in occupied Europe. They kept the musicians in Theresienstadt—delaying their deportations to Auschwitz—longer than almost anyone else in the camp, until the threat of Soviet liberation was imminent. This thesis aims to explore the lives and works of four Theresienstadt composers: Viktor Ullmann, Pavel Haas, Gideon Klein, and Hans Krása. All four of these artists were successful prior to the war, spent time in Theresienstadt, and were sent to Auschwitz on the same transport on October 16, 1944. Three of the four died in the gas chambers of Auschwitz, and Klein was sent on to the Fürstengrube concentration camp, where he was shot and killed in January 1945. These composers and their music should be remembered, studied, and performed, not only for historical and moral reasons, but also for artistic ones. Their works represent some of the finest music in the German tradition written during this period. In conjunction with this paper, I have arranged Gideon Klein’s String Trio—one of the pieces profiled here—for saxophone quartet. Members of the Arizona State University saxophone studio will perform it twice in April. I hope that the performances will help make audiences aware of the strength of the music that came out of Theresienstadt, and reinforce the fact that it remains highly relevant. In this thesis, the composers’ careers before and during their time in Theresienstadt will be traced, as well as the measures they took to preserve their music, their interactions with each other, and their efforts to use hidden messages in their music. It is hoped that this document will help fill an important gap in the history of European music in the twentieth century.
ContributorsSchwimmer, Jack Denmark (Author) / Creviston, Hannah (Thesis director) / Feisst, Sabine (Committee member) / Creviston, Christopher (Committee member) / Barrett, The Honors College (Contributor) / School of Music (Contributor) / School of Politics and Global Studies (Contributor)
Created2013-05
137724-Thumbnail Image.png
Description
Over the past several years, the three major mobile platforms have seen
tremendous growth and success; as a result, the platforms have been the target
of many malicious attacks. These attacks often request certain permissions in
order to carry out the malicious activities, and uninformed users usually grant
them. One prevalent example of this

Over the past several years, the three major mobile platforms have seen
tremendous growth and success; as a result, the platforms have been the target
of many malicious attacks. These attacks often request certain permissions in
order to carry out the malicious activities, and uninformed users usually grant
them. One prevalent example of this type of malware is one that requests
permission  to  the  device’s  SMS  service,  and  once  obtained,  uses  the  SMS
service to accrue charges to the user. This type of attack is one of the most
prevalent on the Android application marketplace, and requires a long-term
solution. Replication of an attack is necessary to fully understand efficient
prevention methods, and due to the open-source nature of Android development,
to determine the likely mechanics of the attack as feasible.
This study uses the Hacker News application, an open source application
that is available for download through GitHub as a basis for creating a malware
application to study the SMS attack and explore prevention methods. From the
results and knowledge gained from both research and experimentation, a
proposition for a more secure operating system architecture was defined to
prevent and mitigate various attacks on mobile systems with a focus on SMS
attacks.
ContributorsRomo, James Tyler (Co-author) / Rezende, Bryan (Co-author) / Whitaker, Jeremy (Co-author) / Ahn, Gail-Joon (Thesis director) / Wilkerson, Kelly (Committee member) / Conquest, Kevin (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
137309-Thumbnail Image.png
Description
Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise

Modern computer processors contain an embedded firmware known as microcode that controls decode and execution of x86 instructions. Although proprietary and relatively obscure, this microcode can be modified using updates released by hardware manufacturers to correct processor logic flaws (errata). At the same time, a malicious microcode update could compromise a processor by implementing new malicious instructions or altering the functionality of existing instructions, including processor-accelerated virtualization or cryptographic primitives. Not only is this attack vector capable of subverting all software-enforced security policies and access controls, but it also leaves behind no postmortem forensic evidence since the write-only patch memory is cleared upon system reset. Although supervisor privileges (ring zero) are required to update processor microcode, this attack cannot be easily mitigated due to the implementation of microcode update functionality within processor silicon. In this paper, we reveal the microarchitecture and mechanism of microcode updates, present a security analysis of this attack vector, and provide some mitigation suggestions.
Created2014-05
137558-Thumbnail Image.png
Description
Our goals in our project are to enable management of distributed systems from one central location, record system logs and audit system based on these logs, and to demonstrate feasibility of platform-independent management of distributed systems based on CIM schema. In order to achieve these goals, we will have to

Our goals in our project are to enable management of distributed systems from one central location, record system logs and audit system based on these logs, and to demonstrate feasibility of platform-independent management of distributed systems based on CIM schema. In order to achieve these goals, we will have to overcome research challenges such as identifying meaningful CIM classes and attributes that could help to achieve this goal, how to gather managed objects of these CIM classes to collect such attributes on a given platform, and to research whether a platform's implementation of CIM is complete or incomplete so as to decide which platform would be the best to implement our solution. Even if a platform's implementation of CIM is incomplete, would we be able to create our own solution to a missing attribute and perhaps provide our own extension of the implementation? One major practical accomplishment will include developing a tool to allow distributed systems management regardless of a target system's platform. However, our research accomplishments will include having found the CIM classes that would be advantageous for system management and determining which platform would be best to work with managed objects of these classes.
ContributorsTrang, Patrick D (Author) / Ahn, Gail-Joon (Thesis director) / Chen, Yinong (Committee member) / Wilson, Adrian (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
137481-Thumbnail Image.png
Description
We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI

We discuss processes involved in user-centric security design, including the synthesis of goals based on security and usability tasks. We suggest the usage of implicit security and the facilitation of secureuser actions. We propose a process for evaluating usability flaws by treating them as security threats and adapting traditional HCI methods. We discuss how to correct these flaws once they are discovered. Finally, we discuss the Usable Security Development Model for developing usable secure systems.
ContributorsJorgensen, Jan Drake (Author) / Ahn, Gail-Joon (Thesis director) / VanLehn, Kurt (Committee member) / Wilkerson, Kelly (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2013-05
136233-Thumbnail Image.png
Description
This research covers the relationship between popular electronic dance music (EDM) and the seasons and climate. The precedence and relevance of the research is outlined through prior research initiatives by Karen Aplin and Paul Williams on the effect of weather on classical music. The hypothesis is that the climate will

This research covers the relationship between popular electronic dance music (EDM) and the seasons and climate. The precedence and relevance of the research is outlined through prior research initiatives by Karen Aplin and Paul Williams on the effect of weather on classical music. The hypothesis is that the climate will affect how music by artists residing within the climate and the seasons will affect the popularity of certain genres. Warmer climates will produce songs that are more upbeat and energetic while colder climates will result in songs that are more complex and heavy. The analysis of this hypothesis will be performed in two parts. The first will be a data driven analysis from Beatport.com's Top 100 EDM charts to observe the season's impact on genre popularity. The second will be a case study analysis of a number of artists from around the world to observe climate impact on EDM. From the analysis, we are able to draw the connection that climate does in fact have an impact on the types of music produced. Likewise, we are able to conclude that there is a distinct variation in deep house, techno/tech house, and house as a result of the seasons shifting. Techno/tech house is more popular in the warmer spring and summer months and house and deep house have a higher standing in the colder fall and winter months.
ContributorsMuzzy, Bryce Richard (Author) / Feisst, Sabine (Thesis director) / Tobias, Evan (Committee member) / Industrial, Systems (Contributor) / Barrett, The Honors College (Contributor) / School of Music (Contributor) / WPC Graduate Programs (Contributor)
Created2015-05
149360-Thumbnail Image.png
Description
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over

Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC resource management and programming systems. These types of systems offer a new programming target for scalable application developers and have gained popularity over the past few years. However, most cloud computing systems in operation today are proprietary and rely upon infrastructure that is invisible to the research community, or are not explicitly designed to be instrumented and modified by systems researchers. In this research, Xen Server Management API is employed to build a framework for cloud computing that implements what is commonly referred to as Infrastructure as a Service (IaaS); systems that give users the ability to run and control entire virtual machine instances deployed across a variety physical resources. The goal of this research is to develop a cloud based resource and service sharing platform for Computer network security education a.k.a Virtual Lab.
ContributorsKadne, Aniruddha (Author) / Huang, Dijiang (Thesis advisor) / Tsai, Wei-Tek (Committee member) / Ahn, Gail-Joon (Committee member) / Arizona State University (Publisher)
Created2010
131168-Thumbnail Image.png
Description
Throughout history, African-Americans have had to fight for their civil rights. There were many ways used to voice their opinions and advance the civil rights movement, including protests and marches. One very effective method was through music and the creation of jazz. Louis Armstrong was an innovator and major influence

Throughout history, African-Americans have had to fight for their civil rights. There were many ways used to voice their opinions and advance the civil rights movement, including protests and marches. One very effective method was through music and the creation of jazz. Louis Armstrong was an innovator and major influence of jazz. His abilities as an artist were recognized by society, above his political position or class status.
The topic of my thesis is Louis Armstrong and his influence on society and the Civil Rights Movement. The intent is to demonstrate how Louis Armstrong aided the Civil Rights Movement by using his music to promote social justice and racial equality. The focus will be on the context of African-Americans, their social status, and rights from the early 1900s to the mid-1900s. I will connect this to important events in that time such as the fight against Jim Crow Laws and how Louis Armstrong played a role in ending segregation. He accomplished this by pushing the movement forward through speeches, fund-raising events, and his innovation of jazz. Armstrong’s gift was a form of swing jazz that advanced improvisation and emotion of music.
He was criticized for playing to segregated audiences and was thought to keep offensive stereotypes alive. However, Louis Armstrong battled against these conspiracies by performing fund-raising events and through public political stances against the oppression of African-Americans. As an example, he was outspoken about his disapproval of government and the public for their treatment of the nine African-American students enrolled at Little Rock. This resulted in the first time the school would be unsegregated between whites and blacks. Louis Armstrong worked hard in the fight against segregation and used his mastery of jazz to advance the civil rights movement. Finally, I will make a proposal as to how society can learn from Louis Armstrong and how to inspire new innovative forms of positively influencing society to help the less fortunate.
ContributorsSchmerler, Cameron (Author) / Wells, Christopher (Thesis director) / Feisst, Sabine (Committee member) / Department of Management and Entrepreneurship (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131587-Thumbnail Image.png
Description
This paper is the culmination of my creative project for graduation from Barrett, the Honors College at Arizona State University. The creative portion of the project consisted of researching Québécois (or French-Canadian) composers and specifically finding music for flute and piano. I wished to find pieces that could prove valuable

This paper is the culmination of my creative project for graduation from Barrett, the Honors College at Arizona State University. The creative portion of the project consisted of researching Québécois (or French-Canadian) composers and specifically finding music for flute and piano. I wished to find pieces that could prove valuable in expanding the standard flute repertoire. My goal with this project was to shed light on some fairly unknown and certainly under-played pieces for flute and piano by French-Canadian composers and learn those pieces for my senior recital on March 2, 2020. This summary of the research experience and the process of recital preparation is intended to be a guide for flutists who may work on these pieces in the future and musicians on any instrument who take on a similar project of introducing new pieces to their instrument’s existing repertory.
ContributorsRule, Renee Rejane (Author) / Buck, Elizabeth (Thesis director) / Feisst, Sabine (Committee member) / Dean, W.P. Carey School of Business (Contributor) / School of Music (Contributor) / Department of English (Contributor, Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
132742-Thumbnail Image.png
Description
By 2030, the number of people above the age of 65 is projected to outnumber those under the age of 18 for the first time in United States history. With a growing older population, it is predicted that the amount of people moving into nursing homes and care facilities will

By 2030, the number of people above the age of 65 is projected to outnumber those under the age of 18 for the first time in United States history. With a growing older population, it is predicted that the amount of people moving into nursing homes and care facilities will also increase. However, a pressing problem is the high prevalence of depression and anxiety among elderly people residing in institutionalized living arrangements. With drugs and antidepressants less effective at treating patients with both dementia and depression, there is a need for more non-pharmacological interventions geared toward improving older adults’ mental well-being. In response, the potential therapeutic effect of exploring virtual nature through EcoRift—which provides dynamic and realistic 360-degree audio and visual environments—on older adults’ mental well-being was examined in this study. Ten individuals (3 men and 7 women) aged 50 and above were recruited and each participant experienced the virtual nature sojourns for 15 minutes once a week, for a total of three weeks. Pre- and post- virtual reality (VR) survey questionnaires were implemented to gauge the participants’ emotional response, including overall well-being and level of relaxation. Physiological measures such as heart rate and blood pressure were also taken before and after the VR experience. Findings show that immersion in nature through virtual reality improves older adults’ mental well-being by eliciting a transient sense of relaxation, peacefulness, and happiness. Further studies need to be performed in order to validate EcoRift’s effect on physiology; however, preliminary data suggests that immersive virtual nature also acts to decrease blood pressure. Overall, EcoRift shows to be a promising tool for bridging access to remote natural environments and may be a mentally beneficial activity for patients isolated in hospitals, hospices, and nursing homes.
ContributorsChien, Naomi Wei-Chia (Author) / Feisst, Sabine (Thesis director) / Cordes, Colleen (Committee member) / School of Life Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2019-05