Matching Items (174)
150040-Thumbnail Image.png
Description
The Kasturba Gandhi Balika Vidyalaya (KGBV) policy scheme launched in 2004 by the Ministry of Human Resource Development, the Government of India, aims to provide secondary level education (grade 6-8) for girls residing predominantly in minority communities, the Scheduled Caste (SC), the Scheduled Tribe (ST), and the Other Backward Caste

The Kasturba Gandhi Balika Vidyalaya (KGBV) policy scheme launched in 2004 by the Ministry of Human Resource Development, the Government of India, aims to provide secondary level education (grade 6-8) for girls residing predominantly in minority communities, the Scheduled Caste (SC), the Scheduled Tribe (ST), and the Other Backward Caste (OBC). Since its launch, the Government of India established 2,578 KGBV schools in 27 states and union territories (UTs). The present study examines the new policy and its implementation at three KGBV schools located in rural villages of Uttar Pradesh (UP), India. The purpose was to analyze the Government of India's approach to increasing education opportunity and participation for educationally disadvantaged girls using the empowerment framework developed by Deepa Narayan. Observations at three schools, interviews with teachers and staff members of the implementation agency (i.e., Mahila Samakhya (MS)), and surveys administered to 139 teachers were conducted over a four month period in 2009. Adopting creative teaching approaches and learning activities, MS creates safe learning community which is appropriate for the rural girls. MS gives special attention to nurturing the girls' potential and empowering them inside and outside the school environment through social discussion, parental involvement, rigid discipline and structure, health and hygiene education, and physical and mental training. Interviews with the state program director and coordinators identified some conflicts within government policy schemes such as the Teacher-pupil ratios guidelines as a part of the programs for the universalization of elementary education. Major challenges include a high turnover rate of teachers, a lack of female teachers, a lack of provision after Class 8, and inadequate budget for medical treatment. Recommendations include promoting active involvement of male members in the process of girls' empowerment, making MS approaches of girls' education in rural settings standardized for wider dissemination, and developing flexible and strong partnership among local agencies and government organizations for effective service delivery.
ContributorsWatanabe, Miku (Author) / Fischman, Gustavo (Thesis advisor) / Wiley, Terrence (Committee member) / Mccarty, Teresa (Committee member) / Arizona State University (Publisher)
Created2011
150382-Thumbnail Image.png
Description
This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate

This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved.
ContributorsZhong, Yunji (Author) / Huang, Dijiang (Thesis advisor) / Dasgupta, Partha (Committee member) / Syrotiuk, Violet (Committee member) / Arizona State University (Publisher)
Created2011
149953-Thumbnail Image.png
Description
The theme for this work is the development of fast numerical algorithms for sparse optimization as well as their applications in medical imaging and source localization using sensor array processing. Due to the recently proposed theory of Compressive Sensing (CS), the $\ell_1$ minimization problem attracts more attention for its ability

The theme for this work is the development of fast numerical algorithms for sparse optimization as well as their applications in medical imaging and source localization using sensor array processing. Due to the recently proposed theory of Compressive Sensing (CS), the $\ell_1$ minimization problem attracts more attention for its ability to exploit sparsity. Traditional interior point methods encounter difficulties in computation for solving the CS applications. In the first part of this work, a fast algorithm based on the augmented Lagrangian method for solving the large-scale TV-$\ell_1$ regularized inverse problem is proposed. Specifically, by taking advantage of the separable structure, the original problem can be approximated via the sum of a series of simple functions with closed form solutions. A preconditioner for solving the block Toeplitz with Toeplitz block (BTTB) linear system is proposed to accelerate the computation. An in-depth discussion on the rate of convergence and the optimal parameter selection criteria is given. Numerical experiments are used to test the performance and the robustness of the proposed algorithm to a wide range of parameter values. Applications of the algorithm in magnetic resonance (MR) imaging and a comparison with other existing methods are included. The second part of this work is the application of the TV-$\ell_1$ model in source localization using sensor arrays. The array output is reformulated into a sparse waveform via an over-complete basis and study the $\ell_p$-norm properties in detecting the sparsity. An algorithm is proposed for minimizing a non-convex problem. According to the results of numerical experiments, the proposed algorithm with the aid of the $\ell_p$-norm can resolve closely distributed sources with higher accuracy than other existing methods.
ContributorsShen, Wei (Author) / Mittlemann, Hans D (Thesis advisor) / Renaut, Rosemary A. (Committee member) / Jackiewicz, Zdzislaw (Committee member) / Gelb, Anne (Committee member) / Ringhofer, Christian (Committee member) / Arizona State University (Publisher)
Created2011
149803-Thumbnail Image.png
Description
With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of

With the advent of technologies such as web services, service oriented architecture and cloud computing, modern organizations have to deal with policies such as Firewall policies to secure the networks, XACML (eXtensible Access Control Markup Language) policies for controlling the access to critical information as well as resources. Management of these policies is an extremely important task in order to avoid unintended security leakages via illegal accesses, while maintaining proper access to services for legitimate users. Managing and maintaining access control policies manually over long period of time is an error prone task due to their inherent complex nature. Existing tools and mechanisms for policy management use different approaches for different types of policies. This research thesis represents a generic framework to provide an unified approach for policy analysis and management of different types of policies. Generic approach captures the common semantics and structure of different access control policies with the notion of policy ontology. Policy ontology representation is then utilized for effectively analyzing and managing the policies. This thesis also discusses a proof-of-concept implementation of the proposed generic framework and demonstrates how efficiently this unified approach can be used for analysis and management of different types of access control policies.
ContributorsKulkarni, Ketan (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Huang, Dijiang (Committee member) / Arizona State University (Publisher)
Created2011
149823-Thumbnail Image.png
Description
In this dissertation I present data gathered from an eleven-month qualitative research study with adolescents living and working on the streets of Lima, Peru. Through the pairing of photovoice with participant observations, this work incorporates distinctive methodological and theoretical viewpoints in order to complicate prevailing understandings of street life.

In this dissertation I present data gathered from an eleven-month qualitative research study with adolescents living and working on the streets of Lima, Peru. Through the pairing of photovoice with participant observations, this work incorporates distinctive methodological and theoretical viewpoints in order to complicate prevailing understandings of street life. In this dissertation, I examine the identities that children and adolescents on the street develop in context, and the ways in which photography can be a useful tool in understanding identity development among this population. Through a framework integrating theories of identity and identity performance with spatial theories, I outline how identity development among children and adolescents living on the street is directly connected to their relationships with the urban landscape and the outreach organizations that serve them. The organizations and institutions that surround children on the street shape who they are, how they are perceived by society, and how they view and understand themselves in context. It is through the interaction with aid organizations and the urban landscape that a street identity is learned and developed. Furthermore, as organizations, children and adolescents come together within the context of the city, a unique street space is created. I argue that identity and agency are directly tied to this space. I also present the street as a thirdspace of possibility, where children and adolescents are able to act out various aspects of the self that they would be unable to pursue otherwise. Weaved throughout this dissertation are non-traditional writing forms including narrative and critical personal narrative addressing my own experiences conducting this research, my impact on the research context, and how I understand the data gathered.
ContributorsJoanou, Jamie Patrice (Author) / Swadener, Beth B. (Thesis advisor) / Margolis, Eric (Committee member) / Arzubiaga, Angela (Committee member) / Fischman, Gustavo (Committee member) / Arizona State University (Publisher)
Created2011
149840-Thumbnail Image.png
Description
The Civil Rights Project estimates that Black girls are among the least likely to graduate from high school. More specifically, only about half, or 56%, of freshman Black girls graduate with their class four years later. Beyond the statistics little is known about Black girls who drop out, why

The Civil Rights Project estimates that Black girls are among the least likely to graduate from high school. More specifically, only about half, or 56%, of freshman Black girls graduate with their class four years later. Beyond the statistics little is known about Black girls who drop out, why they leave school and what happens to them once they are gone. This study is a grounded theory analysis of the stories eight adult Black women told about dropping out of high school with a particular focus on how dropping out affected their lives as workers, mothers and returners to education. There is one conclusion about dropping out and another about Black female identity. First, the women in my study were adolescents during the 1980s, experienced life at the intersection of Blackness, womaness, and poverty and lived in the harsh conditions of a Black American hyperghetto. Using a synthesis between intersectionality and hyperghettoization I found that the women were so determined to improve their economic and personal conditions that they took on occupations that seemed to promise freedom, wealth and safety. Because they were so focused on their new lives, their school attendance suffered as a consequence. In the second conclusion I argued that Black women draw their insights about Black female identity from two competing sources. The two sources are their lived experience and popular controlling images of Black female identity.
ContributorsGriffin, Erica Nicole (Author) / Powers, Jeanne (Thesis advisor) / Fischman, Gustavo (Committee member) / Margolis, Eric (Committee member) / Arizona State University (Publisher)
Created2011
149851-Thumbnail Image.png
Description
This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute,

This research describes software based remote attestation schemes for obtaining the integrity of an executing user application and the Operating System (OS) text section of an untrusted client platform. A trusted external entity issues a challenge to the client platform. The challenge is executable code which the client must execute, and the code generates results which are sent to the external entity. These results provide the external entity an assurance as to whether the client application and the OS are in pristine condition. This work also presents a technique where it can be verified that the application which was attested, did not get replaced by a different application after completion of the attestation. The implementation of these three techniques was achieved entirely in software and is backward compatible with legacy machines on the Intel x86 architecture. This research also presents two approaches to incorporating software based "root of trust" using Virtual Machine Monitors (VMMs). The first approach determines the integrity of an executing Guest OS from the Host OS using Linux Kernel-based Virtual Machine (KVM) and qemu emulation software. The second approach implements a small VMM called MIvmm that can be utilized as a trusted codebase to build security applications such as those implemented in this research. MIvmm was conceptualized and implemented without using any existing codebase; its minimal size allows it to be trustworthy. Both the VMM approaches leverage processor support for virtualization in the Intel x86 architecture.
ContributorsSrinivasan, Raghunathan (Author) / Dasgupta, Partha (Thesis advisor) / Colbourn, Charles (Committee member) / Shrivastava, Aviral (Committee member) / Huang, Dijiang (Committee member) / Dewan, Prashant (Committee member) / Arizona State University (Publisher)
Created2011
149858-Thumbnail Image.png
Description
This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large,

This dissertation is focused on building scalable Attribute Based Security Systems (ABSS), including efficient and privacy-preserving attribute based encryption schemes and applications to group communications and cloud computing. First of all, a Constant Ciphertext Policy Attribute Based Encryption (CCP-ABE) is proposed. Existing Attribute Based Encryption (ABE) schemes usually incur large, linearly increasing ciphertext. The proposed CCP-ABE dramatically reduces the ciphertext to small, constant size. This is the first existing ABE scheme that achieves constant ciphertext size. Also, the proposed CCP-ABE scheme is fully collusion-resistant such that users can not combine their attributes to elevate their decryption capacity. Next step, efficient ABE schemes are applied to construct optimal group communication schemes and broadcast encryption schemes. An attribute based Optimal Group Key (OGK) management scheme that attains communication-storage optimality without collusion vulnerability is presented. Then, a novel broadcast encryption model: Attribute Based Broadcast Encryption (ABBE) is introduced, which exploits the many-to-many nature of attributes to dramatically reduce the storage complexity from linear to logarithm and enable expressive attribute based access policies. The privacy issues are also considered and addressed in ABSS. Firstly, a hidden policy based ABE schemes is proposed to protect receivers' privacy by hiding the access policy. Secondly,a new concept: Gradual Identity Exposure (GIE) is introduced to address the restrictions of hidden policy based ABE schemes. GIE's approach is to reveal the receivers' information gradually by allowing ciphertext recipients to decrypt the message using their possessed attributes one-by-one. If the receiver does not possess one attribute in this procedure, the rest of attributes are still hidden. Compared to hidden-policy based solutions, GIE provides significant performance improvement in terms of reducing both computation and communication overhead. Last but not least, ABSS are incorporated into the mobile cloud computing scenarios. In the proposed secure mobile cloud data management framework, the light weight mobile devices can securely outsource expensive ABE operations and data storage to untrusted cloud service providers. The reported scheme includes two components: (1) a Cloud-Assisted Attribute-Based Encryption/Decryption (CA-ABE) scheme and (2) An Attribute-Based Data Storage (ABDS) scheme that achieves information theoretical optimality.
ContributorsZhou, Zhibin (Author) / Huang, Dijiang (Thesis advisor) / Yau, Sik-Sang (Committee member) / Ahn, Gail-Joon (Committee member) / Reisslein, Martin (Committee member) / Arizona State University (Publisher)
Created2011
150249-Thumbnail Image.png
Description
ABSTRACT Early childhood education (ECE) teacher professional development refers to the various modalities of providing new and or additional content knowledge to the teachers who work with children birth to five. The purpose of this study was to examine the effectiveness of an Arizona United Way-administered intervention project designed to

ABSTRACT Early childhood education (ECE) teacher professional development refers to the various modalities of providing new and or additional content knowledge to the teachers who work with children birth to five. The purpose of this study was to examine the effectiveness of an Arizona United Way-administered intervention project designed to provide focused professional development activities to 15 ECE teachers at seven high-need, center-based early care and education settings. Specifically, this study determined if these interventions influenced the teachers to undertake formative career path changes such as college coursework. In addition, the study also sought to understand the views, beliefs, and attitudes of these ECE teachers and if/how their perspectives influenced their educational career paths. Data were gathered through the triangulated use of participants' responses to a survey, face-to-face interviews, and a focus group. Findings demonstrate that the teachers understand that professional development, such as college coursework, can increase a person's knowledge on a given topic or field of study, but that they feel qualified to be a teacher for children birth to five even though 12 of the 15 teachers do not hold an AA/AAS or BA/BS degree in any area of study. Further, the teachers suggested that if they were to earn a degree it would most likely be in another field of study beside education. These responses provide another reason professional development efforts to encourage ECE teachers to seek degrees in the field of education may be failing. If ECE teachers wanted to invest time, energy and funds they would acquire a degree, which provided more financial reward and professional respect. 
ContributorsOrtiz, Karen J. (Karen Jean) (Author) / Kelley, Michael F. (Thesis advisor) / Enz, Billie J. (Thesis advisor) / Romero, Mary (Committee member) / Fischman, Gustavo (Committee member) / Arizona State University (Publisher)
Created2011
150304-Thumbnail Image.png
Description
This dissertation examines Japanese preschool teachers' cultural practices and beliefs about the pedagogy of social-emotional development. The study is an interview-based, ethnographic study, which is based on the video-cued mutivocal ethnographic method. This study focuses on the emic terms that Japanese preschool teachers use to explain their practices, such as

This dissertation examines Japanese preschool teachers' cultural practices and beliefs about the pedagogy of social-emotional development. The study is an interview-based, ethnographic study, which is based on the video-cued mutivocal ethnographic method. This study focuses on the emic terms that Japanese preschool teachers use to explain their practices, such as amae (dependency), omoiyari (empathy), sabishii (loneliness), mimamoru (watching and waiting) and garari (peripheral participation). My analysis suggests that sabishii, amae, and omoiyari form a triad of emotional exchange that has a particular cultural patterning and salience in Japan and in the Japanese approach to the socialization of emotions in early childhood. Japanese teachers think about the development of the class as a community, which is different from individual-centric Western pedagogical perspective that gives more attention to each child's development. Mimamoru is a pedagogical philosophy and practice in Japanese early childhood education. A key component of Japanese teachers' cultural practices and beliefs about the pedagogy of social-emotional development is that the process requires the development not only of children as individuals, but also of children in a preschool class as a community. In addition, the study suggests that at a deeper level these emic concepts reflect more general Japanese cultural notions of time, space, sight, and body. This dissertation concludes with the argument that teachers' implicit cultural practices and beliefs is "A cultural art of teaching." Teachers' implicit cultural practices and beliefs are harmonized in the teachers' mind and body, making connections between them, and used depending on the nuances of a situation, as informed by teachers' conscious and unconscious thoughts. The study has also shown evidence of similar practices and logic vertically distributed within Japanese early childhood education, from the way teachers act with children, to the way directors act with teachers, to the way government ministries act with directors, to the way deaf and hearing educators act with their deaf and hearing students. Because these practices are forms of bodily habitus and implicit Japanese culture, it makes sense that they are found across fields of action.
ContributorsHayashi, Akiko (Author) / Tobin, Joseph (Thesis advisor) / Eisenberg, Nancy (Committee member) / Nakagawa, Kathryn (Committee member) / Fischman, Gustavo (Committee member) / Swadener, Elizabeth (Committee member) / Arizona State University (Publisher)
Created2011