Matching Items (1,229)
Filtering by

Clear all filters

150019-Thumbnail Image.png
Description
Currently Java is making its way into the embedded systems and mobile devices like androids. The programs written in Java are compiled into machine independent binary class byte codes. A Java Virtual Machine (JVM) executes these classes. The Java platform additionally specifies the Java Native Interface (JNI). JNI allows Java

Currently Java is making its way into the embedded systems and mobile devices like androids. The programs written in Java are compiled into machine independent binary class byte codes. A Java Virtual Machine (JVM) executes these classes. The Java platform additionally specifies the Java Native Interface (JNI). JNI allows Java code that runs within a JVM to interoperate with applications or libraries that are written in other languages and compiled to the host CPU ISA. JNI plays an important role in embedded system as it provides a mechanism to interact with libraries specific to the platform. This thesis addresses the overhead incurred in the JNI due to reflection and serialization when objects are accessed on android based mobile devices. It provides techniques to reduce this overhead. It also provides an API to access objects through its reference through pinning its memory location. The Android emulator was used to evaluate the performance of these techniques and we observed that there was 5 - 10 % performance gain in the new Java Native Interface.
ContributorsChandrian, Preetham (Author) / Lee, Yann-Hang (Thesis advisor) / Davulcu, Hasan (Committee member) / Li, Baoxin (Committee member) / Arizona State University (Publisher)
Created2011
150026-Thumbnail Image.png
Description
As pointed out in the keynote speech by H. V. Jagadish in SIGMOD'07, and also commonly agreed in the database community, the usability of structured data by casual users is as important as the data management systems' functionalities. A major hardness of using structured data is the problem of easily

As pointed out in the keynote speech by H. V. Jagadish in SIGMOD'07, and also commonly agreed in the database community, the usability of structured data by casual users is as important as the data management systems' functionalities. A major hardness of using structured data is the problem of easily retrieving information from them given a user's information needs. Learning and using a structured query language (e.g., SQL and XQuery) is overwhelmingly burdensome for most users, as not only are these languages sophisticated, but the users need to know the data schema. Keyword search provides us with opportunities to conveniently access structured data and potentially significantly enhances the usability of structured data. However, processing keyword search on structured data is challenging due to various types of ambiguities such as structural ambiguity (keyword queries have no structure), keyword ambiguity (the keywords may not be accurate), user preference ambiguity (the user may have implicit preferences that are not indicated in the query), as well as the efficiency challenges due to large search space. This dissertation performs an expansive study on keyword search processing techniques as a gateway for users to access structured data and retrieve desired information. The key issues addressed include: (1) Resolving structural ambiguities in keyword queries by generating meaningful query results, which involves identifying relevant keyword matches, identifying return information, composing query results based on relevant matches and return information. (2) Resolving structural, keyword and user preference ambiguities through result analysis, including snippet generation, result differentiation, result clustering, result summarization/query expansion, etc. (3) Resolving the efficiency challenge in processing keyword search on structured data by utilizing and efficiently maintaining materialized views. These works deliver significant technical contributions towards building a full-fledged search engine for structured data.
ContributorsLiu, Ziyang (Author) / Chen, Yi (Thesis advisor) / Candan, Kasim S (Committee member) / Davulcu, Hasan (Committee member) / Jagadish, H V (Committee member) / Arizona State University (Publisher)
Created2011
149977-Thumbnail Image.png
Description
Reliable extraction of human pose features that are invariant to view angle and body shape changes is critical for advancing human movement analysis. In this dissertation, the multifactor analysis techniques, including the multilinear analysis and the multifactor Gaussian process methods, have been exploited to extract such invariant pose features from

Reliable extraction of human pose features that are invariant to view angle and body shape changes is critical for advancing human movement analysis. In this dissertation, the multifactor analysis techniques, including the multilinear analysis and the multifactor Gaussian process methods, have been exploited to extract such invariant pose features from video data by decomposing various key contributing factors, such as pose, view angle, and body shape, in the generation of the image observations. Experimental results have shown that the resulting pose features extracted using the proposed methods exhibit excellent invariance properties to changes in view angles and body shapes. Furthermore, using the proposed invariant multifactor pose features, a suite of simple while effective algorithms have been developed to solve the movement recognition and pose estimation problems. Using these proposed algorithms, excellent human movement analysis results have been obtained, and most of them are superior to those obtained from state-of-the-art algorithms on the same testing datasets. Moreover, a number of key movement analysis challenges, including robust online gesture spotting and multi-camera gesture recognition, have also been addressed in this research. To this end, an online gesture spotting framework has been developed to automatically detect and learn non-gesture movement patterns to improve gesture localization and recognition from continuous data streams using a hidden Markov network. In addition, the optimal data fusion scheme has been investigated for multicamera gesture recognition, and the decision-level camera fusion scheme using the product rule has been found to be optimal for gesture recognition using multiple uncalibrated cameras. Furthermore, the challenge of optimal camera selection in multi-camera gesture recognition has also been tackled. A measure to quantify the complementary strength across cameras has been proposed. Experimental results obtained from a real-life gesture recognition dataset have shown that the optimal camera combinations identified according to the proposed complementary measure always lead to the best gesture recognition results.
ContributorsPeng, Bo (Author) / Qian, Gang (Thesis advisor) / Ye, Jieping (Committee member) / Li, Baoxin (Committee member) / Spanias, Andreas (Committee member) / Arizona State University (Publisher)
Created2011
149978-Thumbnail Image.png
Description
Belief affects behavior and rhetoric has the potential to bring about action. This paper is a critical content analysis of the ideology and rhetoric of key Islamist intellectuals and the Islamist organization Hizb ut-Tahrir, as stated on the website http://english.hizbuttahrir.org. The responses of specific Muslim Reformers are also analyzed. The

Belief affects behavior and rhetoric has the potential to bring about action. This paper is a critical content analysis of the ideology and rhetoric of key Islamist intellectuals and the Islamist organization Hizb ut-Tahrir, as stated on the website http://english.hizbuttahrir.org. The responses of specific Muslim Reformers are also analyzed. The central argument underlying this analysis centers on the notion that such Islamist ideology and its rhetorical delivery could be a significant trigger for the use of violence; interacting with, yet existing independently of, other factors that contribute to violent actions. In this case, a significant aspect of any solution to Islamist rhetoric would require that Muslim Reformers present a compelling counter-narrative to political Islam (Islamism), one that has an imperative to reduce the amount of violence in the region. Rhetoric alone cannot solve the many complicated issues in the region but we must begin somewhere and countering the explicit and implicit calls to violence of political Islamist organizations like Hizb ut-Tahrir seems a constructive step.
ContributorsBoyer, Paul Daniel (Author) / Mean, Lindsey (Thesis advisor) / Waldron, Vincent (Committee member) / Carter, Heather (Committee member) / Arizona State University (Publisher)
Created2010
150046-Thumbnail Image.png
Description
This thesis describes a synthetic task environment, CyberCog, created for the purposes of 1) understanding and measuring individual and team situation awareness in the context of a cyber security defense task and 2) providing a context for evaluating algorithms, visualizations, and other interventions that are intended to improve cyber situation

This thesis describes a synthetic task environment, CyberCog, created for the purposes of 1) understanding and measuring individual and team situation awareness in the context of a cyber security defense task and 2) providing a context for evaluating algorithms, visualizations, and other interventions that are intended to improve cyber situation awareness. CyberCog provides an interactive environment for conducting human-in-loop experiments in which the participants of the experiment perform the tasks of a cyber security defense analyst in response to a cyber-attack scenario. CyberCog generates the necessary performance measures and interaction logs needed for measuring individual and team cyber situation awareness. Moreover, the CyberCog environment provides good experimental control for conducting effective situation awareness studies while retaining realism in the scenario and in the tasks performed.
ContributorsRajivan, Prashanth (Author) / Femiani, John (Thesis advisor) / Cooke, Nancy J. (Thesis advisor) / Lindquist, Timothy (Committee member) / Gary, Kevin (Committee member) / Arizona State University (Publisher)
Created2011
149991-Thumbnail Image.png
Description
With the introduction of compressed sensing and sparse representation,many image processing and computer vision problems have been looked at in a new way. Recent trends indicate that many challenging computer vision and image processing problems are being solved using compressive sensing and sparse representation algorithms. This thesis assays some applications

With the introduction of compressed sensing and sparse representation,many image processing and computer vision problems have been looked at in a new way. Recent trends indicate that many challenging computer vision and image processing problems are being solved using compressive sensing and sparse representation algorithms. This thesis assays some applications of compressive sensing and sparse representation with regards to image enhancement, restoration and classication. The first application deals with image Super-Resolution through compressive sensing based sparse representation. A novel framework is developed for understanding and analyzing some of the implications of compressive sensing in reconstruction and recovery of an image through raw-sampled and trained dictionaries. Properties of the projection operator and the dictionary are examined and the corresponding results presented. In the second application a novel technique for representing image classes uniquely in a high-dimensional space for image classification is presented. In this method, design and implementation strategy of the image classification system through unique affine sparse codes is presented, which leads to state of the art results. This further leads to analysis of some of the properties attributed to these unique sparse codes. In addition to obtaining these codes, a strong classier is designed and implemented to boost the results obtained. Evaluation with publicly available datasets shows that the proposed method outperforms other state of the art results in image classication. The final part of the thesis deals with image denoising with a novel approach towards obtaining high quality denoised image patches using only a single image. A new technique is proposed to obtain highly correlated image patches through sparse representation, which are then subjected to matrix completion to obtain high quality image patches. Experiments suggest that there may exist a structure within a noisy image which can be exploited for denoising through a low-rank constraint.
ContributorsKulkarni, Naveen (Author) / Li, Baoxin (Thesis advisor) / Ye, Jieping (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2011
150017-Thumbnail Image.png
Description
The United States is facing an emerging principal shortage. This study examines an intervention to deliver professional development for assistant principals on their way to becoming principals. The intervention intended to boost their sense of efficacy as if they were principals while creating a supportive community of professionals for ongoing

The United States is facing an emerging principal shortage. This study examines an intervention to deliver professional development for assistant principals on their way to becoming principals. The intervention intended to boost their sense of efficacy as if they were principals while creating a supportive community of professionals for ongoing professional learning. The community was designed much like a professional learning community (PLC) with the intent of developing into a community of practice (CoP). The participants were all elementary school assistant principals in a Title I district in a large metropolitan area. The researcher interviewed an expert set of school administrators consisting of superintendents and consultants (and others who have knowledge of what a good principal ought to be) about what characteristics and skills were left wanting in principal applicants. The data from these interviews provided the discussion topics for the intervention. The assistant principals met regularly over the course of a semester and discussed the topics provided by the expert set of school administrators. Participant interaction within the sessions followed conversation protocols. The researcher was also a participant in the group and served as the coordinator. Each session was recorded and transcribed. The researcher used a mixed methods approach to analyze the intervention. Participants were surveyed to measure their efficacy before and after the intervention. The session transcripts were analyzed using open and axial coding. Data showed no statistically significant change in the participants' sense of efficacy. Data also showed the participants became a coalescing community of practice.
ContributorsRichman, Bryan (Author) / Puckett, Kathleen (Thesis advisor) / Smith, Jeffery (Committee member) / Foulger, Teresa (Committee member) / Arizona State University (Publisher)
Created2011
149691-Thumbnail Image.png
Description
This dissertation explores the rhetorical significance of persecution claims produced by demonstrably powerful publics in contemporary American culture. This ideological criticism is driven by several related research questions. First, how do members of apparently powerful groups (men, whites, and Christians) come to see themselves as somehow unjustly marginalized, persecuted, or

This dissertation explores the rhetorical significance of persecution claims produced by demonstrably powerful publics in contemporary American culture. This ideological criticism is driven by several related research questions. First, how do members of apparently powerful groups (men, whites, and Christians) come to see themselves as somehow unjustly marginalized, persecuted, or powerless? Second, how are these discourses related to the public sphere and counterpublicity? I argue that, despite startling similarities, these texts studied here are best understood not as counterpublicity but as a strategy of containment available to hegemonic publics. Because these rhetorics of persecution often seek to forestall movements toward pluralism and restorative justice, the analysis forwarded in this dissertation offers important contributions to ongoing theoretical discussions in the fields of public sphere theory and critical cultural theory and practical advice for progressive political activism and critical pedagogy.
ContributorsDuerringer, Christopher (Author) / Brouwer, Daniel (Thesis advisor) / Carlson, Cheree (Committee member) / McDonald, Kelly (Committee member) / Arizona State University (Publisher)
Created2011
149731-Thumbnail Image.png
Description

Employing qualitative methods and drawing from an intersectional framework which focuses on the multiple identities we all embody, this dissertation focuses on oppressions and resistance strategies employed by women of color in Xbox live, an online gaming community. Ethnographic observations and narrative interviewing reveal that women of color, as deviants

Employing qualitative methods and drawing from an intersectional framework which focuses on the multiple identities we all embody, this dissertation focuses on oppressions and resistance strategies employed by women of color in Xbox live, an online gaming community. Ethnographic observations and narrative interviewing reveal that women of color, as deviants within the space, face intersecting oppressions in gaming as in life outside the gaming world. They are linguistically profiled within the space based off of how they sound. They have responded with various strategies to combat the discrimination they experience. Some segregate themselves from the larger gaming population and many refuse to purchase games that depict women in a hyper-sexualized manner or that present people of color stereotypically. For others, the solution is to "sit-in" on games and disrupt game flow by 'player-killing' or engage in other 'griefing' activities. I analyze this behavior in the context of Black feminist consciousness and resistance and uncover that these methods are similar to women who employ resistance strategies for survival within the real world.

ContributorsGray, Kishonna (Author) / Anderson, Lisa M. (Thesis advisor) / Cheong, Pauline (Committee member) / Lim, Merlyna (Committee member) / Arizona State University (Publisher)
Created2011
149760-Thumbnail Image.png
Description
The current study is the first qualitative investigation aimed solely at understanding what it means to communicate conditional forgiveness in serious romantic relationships. Conditional forgiveness is forgiveness that has been offered with the stipulation that the errant behavior cease. It is a provocative topic because some argue genuine forgiveness

The current study is the first qualitative investigation aimed solely at understanding what it means to communicate conditional forgiveness in serious romantic relationships. Conditional forgiveness is forgiveness that has been offered with the stipulation that the errant behavior cease. It is a provocative topic because some argue genuine forgiveness is not conditional, but recent discoveries that have associated its use with severe transgressions and relational deterioration suggest it is a critical site for investigation. This inductive analysis of open-ended data from 201 anonymous surveys identified both distinctions between and intersections of conditional forgiveness, forgiveness, and reconciliation. A relational dialectics analysis also revealed that reconcilable-irreconcilable was the overarching tension for conditional forgivers and six additional tensions also were also discovered: individual identity-couple identity, safety-risk, certainty-uncertainty, mercy-justice, heart-mind, and expression-suppression. Of particular intrigue, the current analysis supports the previous discovery of implicit conditional forgiveness--suppressing conditions, sometimes in response to physical and substance abuse. Ultimately, the current analysis contributes to the enduring conversation aimed at understanding the communication and pursuit of forgiveness and reconciliation. It addresses one of the basic instincts and paradoxes of existing with others--the balance between vulnerability and protection.
ContributorsKloeber, Dayna Noel (Author) / Waldron, Vincent R. (Thesis advisor) / Kelley, Douglas L. (Committee member) / Kassing, Jeffrey W. (Committee member) / Fisher, Carla L. (Committee member) / Arizona State University (Publisher)
Created2011