Matching Items (209)
150585-Thumbnail Image.png
Description
The purpose of this research paper is to discuss John Carter's Cantata, the musical development of this composition, and provide a brief history of this African American musician and composer. Presently, there exists very little research regarding Carter's life and compositions. From a musician's perspective, this paper discusses the challenges

The purpose of this research paper is to discuss John Carter's Cantata, the musical development of this composition, and provide a brief history of this African American musician and composer. Presently, there exists very little research regarding Carter's life and compositions. From a musician's perspective, this paper discusses the challenges of singing and performing the Cantata for future performers and provides a reference for their preparation. This project also examines John Carter's musical style and analyzes the structure of the Cantata. African-American folk songs were an inspiration to Carter's compositions, especially this particular work. As an African-American, his life and background played a role in his inspiration of composition. With borrowed music, he reveals a basic truth about this period of American history; how the lives of slaves influenced in the development of this particular genre. Additionally, John Carter's style of composition is examined, including the application of jazz and modal scales in his Cantata. Performance practice is examined for both the singer and pianist in a way that best represents the composer's original and unique intent. From vocal safety to breath control, a singer may find several challenges when performing this eclectic piece. This paper provides a guide for singers. A brief overview of the pianist's role in the Cantata is also included. Characteristic words of the African-American vernacular found in Carter's Cantata are briefly discussed and identified (i.e. "them" vs. "dem"). It is essential that any performer, both beginning and advanced, should have a proper understanding of the concepts that Carter had so carefully crafted. This paper endeavors to provide a deeper sense of understanding to what Carter had intended for both the performer and the listener.
ContributorsNa, Bora (Author) / Britton, David (Thesis advisor) / Bush, Jeffrey (Committee member) / Campbell, Andrew (Committee member) / Rogers, Rodney (Committee member) / Ryan, Russell (Committee member) / Arizona State University (Publisher)
Created2012
150431-Thumbnail Image.png
Description
Playing an orchestral reduction is not always the most joyous of times for pianists. As pianists, we have to express a reduced idea of all the instruments and orchestral textures that are in the full score. However, in many cases, there are often omissions, errors or discrepancies in the existing

Playing an orchestral reduction is not always the most joyous of times for pianists. As pianists, we have to express a reduced idea of all the instruments and orchestral textures that are in the full score. However, in many cases, there are often omissions, errors or discrepancies in the existing published reductions. These reductions are made by a variety of people: editors, conductors, pianists, but rarely by the composer, and often do not reflect the composer's true intentions. While many reductions are technically playable, including the reduction of the Sibelius Violin Concerto that will form the basis of this paper, the arrangement of the orchestration can be obscured or inaccurate to the point where the violin soloist may not be receiving the best representation of the actual orchestration. A piano reduction should as closely as possible represent the original intention of the composer, both for the sake of the audience and the performers. The pianist should be able to provide the proper support and orchestration of any reduction for the instrumentalist or vocalist so that the same performance style and technique can be used while performing with either a piano reduction or a full orchestra. This research document contains a detailed examination of the various orchestral reductions of the Sibelius Violin Concerto, culminating in a new version by the author. In this discussion, the author will present a basic understanding of how to orchestrate at the piano through an in-depth explanation of piano skill and technique, practice techniques such as listening to a recorded version of the full orchestration while playing the piano, and ways to study and revise an existing piano reduction. The current published reductions of the Sibelius Violin Concerto contain many errors and discrepancies and will be contrasted with the author's own reduction, available for comparison and study in the appendix. This new revised reduction will clearly show the orchestral instruments represented throughout the score, demonstrate new techniques for various orchestral textures, and will yield a playable product that more closely represents the composer's original intentions.
ContributorsLee, Sehee (Author) / Campbell, Andrew (Thesis advisor) / Rogers, Rodney (Committee member) / Ryan, Russell (Committee member) / Britton, David (Committee member) / Landschoot, Thomas (Committee member) / Arizona State University (Publisher)
Created2011
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
150827-Thumbnail Image.png
Description
In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more

In modern healthcare environments, there is a strong need to create an infrastructure that reduces time-consuming efforts and costly operations to obtain a patient's complete medical record and uniformly integrates this heterogeneous collection of medical data to deliver it to the healthcare professionals. As a result, healthcare providers are more willing to shift their electronic medical record (EMR) systems to clouds that can remove the geographical distance barriers among providers and patient. Even though cloud-based EMRs have received considerable attention since it would help achieve lower operational cost and better interoperability with other healthcare providers, the adoption of security-aware cloud systems has become an extremely important prerequisite for bringing interoperability and efficient management to the healthcare industry. Since a shared electronic health record (EHR) essentially represents a virtualized aggregation of distributed clinical records from multiple healthcare providers, sharing of such integrated EHRs may comply with various authorization policies from these data providers. In this work, we focus on the authorized and selective sharing of EHRs among several parties with different duties and objectives that satisfies access control and compliance issues in healthcare cloud computing environments. We present a secure medical data sharing framework to support selective sharing of composite EHRs aggregated from various healthcare providers and compliance of HIPAA regulations. Our approach also ensures that privacy concerns need to be accommodated for processing access requests to patients' healthcare information. To realize our proposed approach, we design and implement a cloud-based EHRs sharing system. In addition, we describe case studies and evaluation results to demonstrate the effectiveness and efficiency of our approach.
ContributorsWu, Ruoyu (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2012
151152-Thumbnail Image.png
Description
Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control

Access control is one of the most fundamental security mechanisms used in the design and management of modern information systems. However, there still exists an open question on how formal access control models can be automatically analyzed and fully realized in secure system development. Furthermore, specifying and managing access control policies are often error-prone due to the lack of effective analysis mechanisms and tools. In this dissertation, I present an Assurance Management Framework (AMF) that is designed to cope with various assurance management requirements from both access control system development and policy-based computing. On one hand, the AMF framework facilitates comprehensive analysis and thorough realization of formal access control models in secure system development. I demonstrate how this method can be applied to build role-based access control systems by adopting the NIST/ANSI RBAC standard as an underlying security model. On the other hand, the AMF framework ensures the correctness of access control policies in policy-based computing through automated reasoning techniques and anomaly management mechanisms. A systematic method is presented to formulate XACML in Answer Set Programming (ASP) that allows users to leverage off-the-shelf ASP solvers for a variety of analysis services. In addition, I introduce a novel anomaly management mechanism, along with a grid-based visualization approach, which enables systematic and effective detection and resolution of policy anomalies. I further evaluate the AMF framework through modeling and analyzing multiparty access control in Online Social Networks (OSNs). A MultiParty Access Control (MPAC) model is formulated to capture the essence of multiparty authorization requirements in OSNs. In particular, I show how AMF can be applied to OSNs for identifying and resolving privacy conflicts, and representing and reasoning about MPAC model and policy. To demonstrate the feasibility of the proposed methodology, a suite of proof-of-concept prototype systems is implemented as well.
ContributorsHu, Hongxin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Dasgupta, Partha (Committee member) / Ye, Nong (Committee member) / Arizona State University (Publisher)
Created2012
151098-Thumbnail Image.png
Description
The craft of improvisation at the organ has survived a long period of dormancy and is experiencing a strong resurgence in the twenty-first century. This project seeks to establish a precedence for the value of notated music as a resource in learning improvisation, and then, through music analysis, provide examples

The craft of improvisation at the organ has survived a long period of dormancy and is experiencing a strong resurgence in the twenty-first century. This project seeks to establish a precedence for the value of notated music as a resource in learning improvisation, and then, through music analysis, provide examples of how that process can develop. The result of the ideas presented here is a pathway whereby any disciplined organist can learn to imitate composed music, assimilate the musical ideas, and innovate through the act of spontaneous improvisation.
ContributorsHoward, Devon (Author) / Marshall, Kimberly (Thesis advisor) / Ryan, Russell (Committee member) / Kocour, Michael (Committee member) / Norton, Kay (Committee member) / Rockmaker, Jody (Committee member) / Arizona State University (Publisher)
Created2012
136523-Thumbnail Image.png
Description
Cyber threats are growing in number and sophistication making it important to continually study and improve all dimensions of digital forensics. Teamwork in forensic analysis has been overlooked in systems even though forensics relies on collaboration. Forensic analysis lacks a system that is flexible and available on different electronic devices

Cyber threats are growing in number and sophistication making it important to continually study and improve all dimensions of digital forensics. Teamwork in forensic analysis has been overlooked in systems even though forensics relies on collaboration. Forensic analysis lacks a system that is flexible and available on different electronic devices which are being used and incorporated into everyday life. For instance, cellphones or tablets that are easy to bring on-the-go to sites where the first steps of forensic analysis is done. Due to the present day conversion to online accessibility, most electronic devices connect to the internet. Squeegee is a proof of concept that forensic analysis can be done on the web. The forensic analysis expansion to the web opens many doors to collaboration and accessibility.
ContributorsJuntiff, Samantha Maria (Author) / Ahn, Gail-Joon (Thesis director) / Kashiwagi, Jacob (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2015-05
135758-Thumbnail Image.png
Description
Food safety is vital to the well-being of society; therefore, it is important to inspect food products to ensure minimal health risks are present. A crucial phase of food inspection is the identification of foreign particles found in the sample, such as insect body parts. The presence of certain species

Food safety is vital to the well-being of society; therefore, it is important to inspect food products to ensure minimal health risks are present. A crucial phase of food inspection is the identification of foreign particles found in the sample, such as insect body parts. The presence of certain species of insects, especially storage beetles, is a reliable indicator of possible contamination during storage and food processing. However, the current approach to identifying species is visual examination by human analysts; this method is rather subjective and time-consuming. Furthermore, confident identification requires extensive experience and training. To aid this inspection process, we have developed in collaboration with FDA analysts some image analysis-based machine intelligence to achieve species identification with up to 90% accuracy. The current project is a continuation of this development effort. Here we present an image analysis environment that allows practical deployment of the machine intelligence on computers with limited processing power and memory. Using this environment, users can prepare input sets by selecting images for analysis, and inspect these images through the integrated pan, zoom, and color analysis capabilities. After species analysis, the results panel allows the user to compare the analyzed images with referenced images of the proposed species. Further additions to this environment should include a log of previously analyzed images, and eventually extend to interaction with a central cloud repository of images through a web-based interface. Additional issues to address include standardization of image layout, extension of the feature-extraction algorithm, and utilizing image classification to build a central search engine for widespread usage.
ContributorsMartin, Daniel Luis (Author) / Ahn, Gail-Joon (Thesis director) / Doupé, Adam (Committee member) / Xu, Joshua (Committee member) / Computer Science and Engineering Program (Contributor) / Department of Finance (Contributor) / Barrett, The Honors College (Contributor)
Created2016-05
ContributorsSpring, Robert (Performer) / Gardner, Joshua (Performer) / Buck, Elizabeth (Performer) / Schuring, Martin (Performer) / Micklich, Albie (Performer) / Ericson, John Q. (John Quincy), 1962- (Performer) / Smith, J. B., 1957- (Performer) / Ryan, Russell (Contributor) / ASU Library. Music Library (Publisher)
Created2018-09-16
137152-Thumbnail Image.png
Description
Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is

Radio Frequency Identification (RFID) technology allows objects to be identified electronically by way of a small electronic tag. RFID is quickly becoming quite popular, and there are many security hurdles for this technology to overcome. The iCLASS line of RFID, produced by HID Global, is one such technology that is widely used for secure access control and applications where a contactless authentication element is desirable. Unfortunately, iCLASS has been shown to have security issues. Nevertheless customers continue to use it because of the great cost that would be required to completely replace it. This Honors Thesis will address attacks against iCLASS and means for countering them that do not require such an overhaul.
ContributorsMellott, Matthew John (Author) / Ahn, Gail-Joon (Thesis director) / Thorstenson, Tina (Committee member) / Barrett, The Honors College (Contributor) / Computer Science and Engineering Program (Contributor)
Created2014-05