This collection includes most of the ASU Theses and Dissertations from 2011 to present. ASU Theses and Dissertations are available in downloadable PDF format; however, a small percentage of items are under embargo. Information about the dissertations/theses includes degree information, committee members, an abstract, supporting data or media.

In addition to the electronic theses found in the ASU Digital Repository, ASU Theses and Dissertations can be found in the ASU Library Catalog.

Dissertations and Theses granted by Arizona State University are archived and made available through a joint effort of the ASU Graduate College and the ASU Libraries. For more information or questions about this collection contact or visit the Digital Repository ETD Library Guide or contact the ASU Graduate College at gradformat@asu.edu.

Displaying 1 - 10 of 114
Filtering by

Clear all filters

151704-Thumbnail Image.png
Description
Research has shown that a developmental process of maturing out of alcohol involvement occurs during young adulthood, and that this process is related to both young adult role transitions (e.g., marriage) and personality developmental (e.g., decreased disinhibition and neuroticism). The current study extended past research by testing whether protective marriage

Research has shown that a developmental process of maturing out of alcohol involvement occurs during young adulthood, and that this process is related to both young adult role transitions (e.g., marriage) and personality developmental (e.g., decreased disinhibition and neuroticism). The current study extended past research by testing whether protective marriage and personality effects on maturing out were stronger among more severe late adolescent drinkers, and whether protective marriage effects were stronger among those who experienced more personality development. Parental alcoholism and gender were tested as moderators of marriage, personality, and late adolescent drinking effects on maturing out; and as distal predictors mediated by these effects. Participants were a subsample (N = 844; 51% children of alcoholics; 53% male, 71% non-Hispanic Caucasian, 27% Hispanic; Chassin, Barrera, Bech, & Kossak-Fuller, 1992) from a larger longitudinal study of familial alcoholism. Hypotheses were tested with latent growth models characterizing alcohol consumption and drinking consequence trajectories from late adolescence to adulthood (age 17-40). Past findings were replicated by showing protective effects of becoming married, sensation-seeking reductions, and neuroticism reductions on the drinking trajectories. Moderation tests showed that protective marriage effects on the drinking trajectories were stronger among those with higher pre-marriage drinking in late adolescence (i.e., higher growth intercepts). This might reflect role socialization mechanisms such that more severe drinking produces more conflict with the demands of new roles (i.e., role incompatibility), thus requiring greater drinking reductions to resolve this conflict. In contrast, little evidence was found for moderation of personality effects by late adolescent drinking or for moderation of marriage effects by personality. Parental alcoholism findings suggested complex moderated mediation pathways. Parental alcoholism predicted less drinking reduction through decreasing the likelihood of marriage (mediation) and muting marriage's effect on the drinking trajectories (moderation), but parental alcoholism also predicted more drinking reduction through increasing initial drinking in late adolescence (mediation). The current study provides new insights into naturally occurring processes of recovery during young adulthood and suggests that developmentally-tailored interventions for young adults could harness these natural recovery processes (e.g., by integrating role incompatibility themes and addressing factors that block role effects among those with familial alcoholism).
ContributorsLee, Matthew R. (Author) / Chassin, Laurie (Thesis advisor) / Corbin, William R. (Committee member) / Mackinnon, David P (Committee member) / Presson, Clark C. (Committee member) / Arizona State University (Publisher)
Created2013
151706-Thumbnail Image.png
Description
Past literature has indicated that the majority of people with alcohol problems never seek treatment and that this is especially true of women. Relatively few studies have investigated how different types of alcohol-related consequences longitudinally predict men and women's perceived need for treatment and their utilization of treatment services. The

Past literature has indicated that the majority of people with alcohol problems never seek treatment and that this is especially true of women. Relatively few studies have investigated how different types of alcohol-related consequences longitudinally predict men and women's perceived need for treatment and their utilization of treatment services. The current study sought to expand the literature by examining whether gender moderates the links between four frequently endorsed types of consequences and perceived need for or actual utilization of treatment. Two-hundred thirty-seven adults ages 21-36 completed a battery of questionnaires at two time points five years apart. Results indicated that there were four broad types of consequences endorsed by both men and women. Multiple-group models and Wald chi square tests indicated that there were no significant relationships between consequences and treatment outcomes. No gender moderation was found but post-hoc power analyses indicated that the study was underpowered to detect moderation. Researchers need to continue to study factors that predict utilization of alcohol treatment services and the process of recovery so that treatment providers can better address the needs of people with alcohol-related consequences in the areas of referral procedures, clinical assessment, and treatment service provision and planning.
ContributorsBeltran Gonzalez, Iris (Author) / Chassin, Laurie (Thesis advisor) / Tein, Jenn-Yun (Committee member) / Corbin, William (Committee member) / Barrera, Jr., Manuel (Committee member) / Arizona State University (Publisher)
Created2013
152230-Thumbnail Image.png
Description
Juvenile offenders suffer from substance use disorders at higher rates than adolescents in the general public. Substance use disorders also predict an increased risk for re-offending. Therefore, it is important that these juveniles, in particular, receive the appropriate substance use disorder treatment. The present study used logistic regression to test

Juvenile offenders suffer from substance use disorders at higher rates than adolescents in the general public. Substance use disorders also predict an increased risk for re-offending. Therefore, it is important that these juveniles, in particular, receive the appropriate substance use disorder treatment. The present study used logistic regression to test whether race/ethnicity would moderate the match between substance use disorder diagnosis and the receipt of a substance use disorder related service in a sample of male, serious juvenile offenders. Results showed that among those with a substance use disorder diagnosis, there were no race/ethnicity differences in the receipt of the appropriate service. However, among those without a substance use disorder diagnosis, non-Hispanic Caucasians were more likely to receive substance use service than were Hispanics or African-Americans. Post-hoc analyses revealed that when using a broader definition of substance use problems, significant differences by race/ethnicity in the prediction of service receipt were only observed at low levels of substance use problems. These findings shed light on how race/ethnicity may play a role in the recommendation of substance use disorder services in the juvenile justice system.
ContributorsMansion, Andre (Author) / Chassin, Laurie (Thesis advisor) / Dishion, Thomas (Committee member) / Knight, George (Committee member) / Arizona State University (Publisher)
Created2013
151945-Thumbnail Image.png
Description
In recent years we have witnessed a shift towards multi-processor system-on-chips (MPSoCs) to address the demands of embedded devices (such as cell phones, GPS devices, luxury car features, etc.). Highly optimized MPSoCs are well-suited to tackle the complex application demands desired by the end user customer. These MPSoCs incorporate a

In recent years we have witnessed a shift towards multi-processor system-on-chips (MPSoCs) to address the demands of embedded devices (such as cell phones, GPS devices, luxury car features, etc.). Highly optimized MPSoCs are well-suited to tackle the complex application demands desired by the end user customer. These MPSoCs incorporate a constellation of heterogeneous processing elements (PEs) (general purpose PEs and application-specific integrated circuits (ASICS)). A typical MPSoC will be composed of a application processor, such as an ARM Coretex-A9 with cache coherent memory hierarchy, and several application sub-systems. Each of these sub-systems are composed of highly optimized instruction processors, graphics/DSP processors, and custom hardware accelerators. Typically, these sub-systems utilize scratchpad memories (SPM) rather than support cache coherency. The overall architecture is an integration of the various sub-systems through a high bandwidth system-level interconnect (such as a Network-on-Chip (NoC)). The shift to MPSoCs has been fueled by three major factors: demand for high performance, the use of component libraries, and short design turn around time. As customers continue to desire more and more complex applications on their embedded devices the performance demand for these devices continues to increase. Designers have turned to using MPSoCs to address this demand. By using pre-made IP libraries designers can quickly piece together a MPSoC that will meet the application demands of the end user with minimal time spent designing new hardware. Additionally, the use of MPSoCs allows designers to generate new devices very quickly and thus reducing the time to market. In this work, a complete MPSoC synthesis design flow is presented. We first present a technique \cite{leary1_intro} to address the synthesis of the interconnect architecture (particularly Network-on-Chip (NoC)). We then address the synthesis of the memory architecture of a MPSoC sub-system \cite{leary2_intro}. Lastly, we present a co-synthesis technique to generate the functional and memory architectures simultaneously. The validity and quality of each synthesis technique is demonstrated through extensive experimentation.
ContributorsLeary, Glenn (Author) / Chatha, Karamvir S (Thesis advisor) / Vrudhula, Sarma (Committee member) / Shrivastava, Aviral (Committee member) / Beraha, Rudy (Committee member) / Arizona State University (Publisher)
Created2013
151338-Thumbnail Image.png
Description
Levels of heavy episodic drinking peak during emerging adulthood and contribute to the experience of negative consequences. Previous research has identified a number of trait-like personality characteristics that are associated with drinking. Studies of the Acquired Preparedness Model have supported positive expectancies, and to a lesser extent negative expectancies, as

Levels of heavy episodic drinking peak during emerging adulthood and contribute to the experience of negative consequences. Previous research has identified a number of trait-like personality characteristics that are associated with drinking. Studies of the Acquired Preparedness Model have supported positive expectancies, and to a lesser extent negative expectancies, as mediators of the relation between trait-like characteristics and alcohol outcomes. However, expectancies measured via self-report may reflect differences in learned expectancies in spite of similar alcohol-related responses, or they may reflect true individual differences in subjective responses to alcohol. The current study addressed this gap in the literature by assessing the relative roles of expectancies and subjective response as mediators within the APM in a sample of 236 emerging adults (74.7% male) participating in a placebo-controlled alcohol challenge study. The study tested four mediation models collapsed across beverage condition as well as eight separate mediation models with four models (2 beverage by 2 expectancy/subjective response) for each outcome (alcohol use and alcohol-related problems). Consistent with previous studies, SS was positively associated with alcohol outcomes in models collapsed across beverage condition. SS was also associated with positive subjective response in collapsed models and in the alcohol models. The hypothesized negative relation between SS and sedation was not significant. In contrast to previous studies, neither stimulation nor sedation predicted either weekly drinking or alcohol-related problems. While stimulation and alcohol use appeared to have a positive and significant association, this relation did not hold when controlling for SS, suggesting that SS and stimulation account for shared variability in drinking behavior. Failure to find this association in the placebo group suggests that, while explicit positive expectancies are related to alcohol use after controlling for levels of sensation seeking, implicit expectancies (at least as assessed by a placebo manipulation) are not. That the relation between SS and stimulation held only in the alcohol condition in analyses separate by beverage condition indicates that sensation seeking is a significant predictor of positive subjective response to alcohol (stimulation), potentially above and beyond expectancies.
ContributorsScott, Caitlin (Author) / Corbin, William (Thesis advisor) / Shiota, Michelle (Committee member) / Chassin, Laurie (Committee member) / Arizona State University (Publisher)
Created2012
151414-Thumbnail Image.png
Description
The hypothalamus pituitary adrenal (HPA) axis and the human genome are important components of the biological etiology of externalizing disorders. By studying the associations between specific genetic variants, diurnal cortisol, and externalizing symptoms we can begin to unpack this complex etiology. It was hypothesized that genetic variants from the corticotropine

The hypothalamus pituitary adrenal (HPA) axis and the human genome are important components of the biological etiology of externalizing disorders. By studying the associations between specific genetic variants, diurnal cortisol, and externalizing symptoms we can begin to unpack this complex etiology. It was hypothesized that genetic variants from the corticotropine releasing hormone receptor 1 (CRHR1), FK506 binding protein 51 (FKBP5), catechol-O-methyl transferase (COMT), and dopamine transporter (DAT1) genes and diurnal cortisol intercepts and slopes would separately predict externalizing symptoms. It was also hypothesized that genetic variants would moderate the association between cortisol and externalizing. Participants were 800 twins (51% boys), 88.5% Caucasian, M=7.93 years (SD=0.87) participating in the Wisconsin Twin Project. Hierarchical Linear Modeling (HLM) was used to separate the variance associated with state and trait cortisol measured across three consecutive days and trait cortisol measures were used. There were no main effects of genes on externalizing symptoms. The evening cortisol intercept, the morning cortisol slope and the evening cortisol slope predicted externalizing, but only in boys, such that boys with higher cortisol and flatter slopes across the day also had more externalizing symptoms. The morning cortisol intercept and CRHR1 rs242924 interacted to predict externalizing in both boys and girls, with GG carriers significantly higher compared to TT carriers at one standard deviation below the mean of morning cortisol. For boys only there was a significant interaction between the DAT1 variable number tandem repeat (VNTR) and the afternoon slope and a significant slope for 9/9 carriers and 9/10 carriers such that when the slope was more steep, boys carrying a nine had fewer externalizing symptoms but when the slope was less steep, they had more. Results confirm a link between diurnal trait cortisol and externalizing in boys, as well as moderation of that association by genetic polymorphisms. This is the first study to empirically examine this association and should encourage further research on the biological etiology of externalizing disorder symptoms.
ContributorsSwann, Gregory (Author) / Lemery-Chalfant, Kathryn (Thesis advisor) / Chassin, Laurie (Committee member) / Doane-Sampey, Leah (Committee member) / Arizona State University (Publisher)
Created2012
151527-Thumbnail Image.png
Description
Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation

Rapid technology scaling, the main driver of the power and performance improvements of computing solutions, has also rendered our computing systems extremely susceptible to transient errors called soft errors. Among the arsenal of techniques to protect computation from soft errors, Control Flow Checking (CFC) based techniques have gained a reputation of effective, yet low-cost protection mechanism. The basic idea is that, there is a high probability that a soft-fault in program execution will eventually alter the control flow of the program. Therefore just by making sure that the control flow of the program is correct, significant protection can be achieved. More than a dozen techniques for CFC have been developed over the last several decades, ranging from hardware techniques, software techniques, and hardware-software hybrid techniques as well. Our analysis shows that existing CFC techniques are not only ineffective in protecting from soft errors, but cause additional power and performance overheads. For this analysis, we develop and validate a simulation based experimental setup to accurately and quantitatively estimate the architectural vulnerability of a program execution on a processor micro-architecture. We model the protection achieved by various state-of-the-art CFC techniques in this quantitative vulnerability estimation setup, and find out that software only CFC protection schemes (CFCSS, CFCSS+NA, CEDA) increase system vulnerability by 18% to 21% with 17% to 38% performance overhead. Hybrid CFC protection (CFEDC) increases vulnerability by 5%, while the vulnerability remains almost the same for hardware only CFC protection (CFCET); notwithstanding the hardware overheads of design cost, area, and power incurred in the hardware modifications required for their implementations.
ContributorsRhisheekesan, Abhishek (Author) / Shrivastava, Aviral (Thesis advisor) / Colbourn, Charles Joseph (Committee member) / Wu, Carole-Jean (Committee member) / Arizona State University (Publisher)
Created2013
152415-Thumbnail Image.png
Description
We are expecting hundreds of cores per chip in the near future. However, scaling the memory architecture in manycore architectures becomes a major challenge. Cache coherence provides a single image of memory at any time in execution to all the cores, yet coherent cache architectures are believed will not scale

We are expecting hundreds of cores per chip in the near future. However, scaling the memory architecture in manycore architectures becomes a major challenge. Cache coherence provides a single image of memory at any time in execution to all the cores, yet coherent cache architectures are believed will not scale to hundreds and thousands of cores. In addition, caches and coherence logic already take 20-50% of the total power consumption of the processor and 30-60% of die area. Therefore, a more scalable architecture is needed for manycore architectures. Software Managed Manycore (SMM) architectures emerge as a solution. They have scalable memory design in which each core has direct access to only its local scratchpad memory, and any data transfers to/from other memories must be done explicitly in the application using Direct Memory Access (DMA) commands. Lack of automatic memory management in the hardware makes such architectures extremely power-efficient, but they also become difficult to program. If the code/data of the task mapped onto a core cannot fit in the local scratchpad memory, then DMA calls must be added to bring in the code/data before it is required, and it may need to be evicted after its use. However, doing this adds a lot of complexity to the programmer's job. Now programmers must worry about data management, on top of worrying about the functional correctness of the program - which is already quite complex. This dissertation presents a comprehensive compiler and runtime integration to automatically manage the code and data of each task in the limited local memory of the core. We firstly developed a Complete Circular Stack Management. It manages stack frames between the local memory and the main memory, and addresses the stack pointer problem as well. Though it works, we found we could further optimize the management for most cases. Thus a Smart Stack Data Management (SSDM) is provided. In this work, we formulate the stack data management problem and propose a greedy algorithm for the same. Later on, we propose a general cost estimation algorithm, based on which CMSM heuristic for code mapping problem is developed. Finally, heap data is dynamic in nature and therefore it is hard to manage it. We provide two schemes to manage unlimited amount of heap data in constant sized region in the local memory. In addition to those separate schemes for different kinds of data, we also provide a memory partition methodology.
ContributorsBai, Ke (Author) / Shrivastava, Aviral (Thesis advisor) / Chatha, Karamvir (Committee member) / Xue, Guoliang (Committee member) / Chakrabarti, Chaitali (Committee member) / Arizona State University (Publisher)
Created2014
151851-Thumbnail Image.png
Description
In this thesis we deal with the problem of temporal logic robustness estimation. We present a dynamic programming algorithm for the robust estimation problem of Metric Temporal Logic (MTL) formulas regarding a finite trace of time stated sequence. This algorithm not only tests if the MTL specification is satisfied by

In this thesis we deal with the problem of temporal logic robustness estimation. We present a dynamic programming algorithm for the robust estimation problem of Metric Temporal Logic (MTL) formulas regarding a finite trace of time stated sequence. This algorithm not only tests if the MTL specification is satisfied by the given input which is a finite system trajectory, but also quantifies to what extend does the sequence satisfies or violates the MTL specification. The implementation of the algorithm is the DP-TALIRO toolbox for MATLAB. Currently it is used as the temporal logic robust computing engine of S-TALIRO which is a tool for MATLAB searching for trajectories of minimal robustness in Simulink/ Stateflow. DP-TALIRO is expected to have near linear running time and constant memory requirement depending on the structure of the MTL formula. DP-TALIRO toolbox also integrates new features not supported in its ancestor FW-TALIRO such as parameter replacement, most related iteration and most related predicate. A derivative of DP-TALIRO which is DP-T-TALIRO is also addressed in this thesis which applies dynamic programming algorithm for time robustness computation. We test the running time of DP-TALIRO and compare it with FW-TALIRO. Finally, we present an application where DP-TALIRO is used as the robustness computation core of S-TALIRO for a parameter estimation problem.
ContributorsYang, Hengyi (Author) / Fainekos, Georgios (Thesis advisor) / Sarjoughian, Hessam S. (Committee member) / Shrivastava, Aviral (Committee member) / Arizona State University (Publisher)
Created2013
152778-Thumbnail Image.png
Description
Software has a great impact on the energy efficiency of any computing system--it can manage the components of a system efficiently or inefficiently. The impact of software is amplified in the context of a wearable computing system used for activity recognition. The design space this platform opens up is immense

Software has a great impact on the energy efficiency of any computing system--it can manage the components of a system efficiently or inefficiently. The impact of software is amplified in the context of a wearable computing system used for activity recognition. The design space this platform opens up is immense and encompasses sensors, feature calculations, activity classification algorithms, sleep schedules, and transmission protocols. Design choices in each of these areas impact energy use, overall accuracy, and usefulness of the system. This thesis explores methods software can influence the trade-off between energy consumption and system accuracy. In general the more energy a system consumes the more accurate will be. We explore how finding the transitions between human activities is able to reduce the energy consumption of such systems without reducing much accuracy. We introduce the Log-likelihood Ratio Test as a method to detect transitions, and explore how choices of sensor, feature calculations, and parameters concerning time segmentation affect the accuracy of this method. We discovered an approximate 5X increase in energy efficiency could be achieved with only a 5% decrease in accuracy. We also address how a system's sleep mode, in which the processor enters a low-power state and sensors are turned off, affects a wearable computing platform that does activity recognition. We discuss the energy trade-offs in each stage of the activity recognition process. We find that careful analysis of these parameters can result in great increases in energy efficiency if small compromises in overall accuracy can be tolerated. We call this the ``Great Compromise.'' We found a 6X increase in efficiency with a 7% decrease in accuracy. We then consider how wireless transmission of data affects the overall energy efficiency of a wearable computing platform. We find that design decisions such as feature calculations and grouping size have a great impact on the energy consumption of the system because of the amount of data that is stored and transmitted. For example, storing and transmitting vector-based features such as FFT or DCT do not compress the signal and would use more energy than storing and transmitting the raw signal. The effect of grouping size on energy consumption depends on the feature. For scalar features energy consumption is proportional in the inverse of grouping size, so it's reduced as grouping size goes up. For features that depend on the grouping size, such as FFT, energy increases with the logarithm of grouping size, so energy consumption increases slowly as grouping size increases. We find that compressing data through activity classification and transition detection significantly reduces energy consumption and that the energy consumed for the classification overhead is negligible compared to the energy savings from data compression. We provide mathematical models of energy usage and data generation, and test our ideas using a mobile computing platform, the Texas Instruments Chronos watch.
ContributorsBoyd, Jeffrey Michael (Author) / Sundaram, Hari (Thesis advisor) / Li, Baoxin (Thesis advisor) / Shrivastava, Aviral (Committee member) / Turaga, Pavan (Committee member) / Arizona State University (Publisher)
Created2014