Matching Items (1,231)
Filtering by

Clear all filters

161469-Thumbnail Image.png
Description
The purpose of this study is to explore the role of leadership communication incultivating compassion at work. To do so, this study utilizes positive deviance case selection and qualitative, semi-structured interviews to explore employees’ experiences with highly compassionate leaders. These interviews allow insight into employees’ perspectives on expressing suffering at

The purpose of this study is to explore the role of leadership communication incultivating compassion at work. To do so, this study utilizes positive deviance case selection and qualitative, semi-structured interviews to explore employees’ experiences with highly compassionate leaders. These interviews allow insight into employees’ perspectives on expressing suffering at work and experiences of compassionate communication from leaders. The findings of this study extend current understandings of compassion at work by highlighting the role of uncertainty to express suffering in limiting compassion, uncovering leadership communication behaviors that cultivate compassion, and illustrating dynamics that leaders navigate when reacting compassionately. Specifically, this study extends compassion theory by (1) demonstrating that uncertainty related to emotional disclosure limits employees’ sharing of personal suffering, which shapes and limits compassion processes, (2) illustrating that individuals holding traditionally marginalized or minoritized identities face additional uncertainty related to expressing pain and suffering, (3) highlighting a relational orientation that emphasizes personal well-being as enabling the compassion processes, (4) outlining anticipatory compassion as a specific discursive move that conveys care and opens space to express specific pains and suffering, and (5) empirically illustrating three dialectical tensions that punctuate the dynamic interactions between leaders and employees when relating and (re)acting compassionately.
ContributorsTietsort, Cristopher John (Author) / Adame, Elissa A (Thesis advisor) / Tracy, Sarah J (Thesis advisor) / Alberts, Jess A (Committee member) / Craig, Jennifer D (Committee member) / Arizona State University (Publisher)
Created2021
154403-Thumbnail Image.png
Description
Traditionally, visualization is one of the most important and commonly used methods of generating insight into large scale data. Particularly for spatiotemporal data, the translation of such data into a visual form allows users to quickly see patterns, explore summaries and relate domain knowledge about underlying geographical phenomena that would

Traditionally, visualization is one of the most important and commonly used methods of generating insight into large scale data. Particularly for spatiotemporal data, the translation of such data into a visual form allows users to quickly see patterns, explore summaries and relate domain knowledge about underlying geographical phenomena that would not be apparent in tabular form. However, several critical challenges arise when visualizing and exploring these large spatiotemporal datasets. While, the underlying geographical component of the data lends itself well to univariate visualization in the form of traditional cartographic representations (e.g., choropleth, isopleth, dasymetric maps), as the data becomes multivariate, cartographic representations become more complex. To simplify the visual representations, analytical methods such as clustering and feature extraction are often applied as part of the classification phase. The automatic classification can then be rendered onto a map; however, one common issue in data classification is that items near a classification boundary are often mislabeled.

This thesis explores methods to augment the automated spatial classification by utilizing interactive machine learning as part of the cluster creation step. First, this thesis explores the design space for spatiotemporal analysis through the development of a comprehensive data wrangling and exploratory data analysis platform. Second, this system is augmented with a novel method for evaluating the visual impact of edge cases for multivariate geographic projections. Finally, system features and functionality are demonstrated through a series of case studies, with key features including similarity analysis, multivariate clustering, and novel visual support for cluster comparison.
ContributorsZhang, Yifan (Author) / Maciejewski, Ross (Thesis advisor) / Mack, Elizabeth (Committee member) / Liu, Huan (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2016
154380-Thumbnail Image.png
Description
In brain imaging study, 3D surface-based algorithms may provide more advantages over volume-based methods, due to their sub-voxel accuracy to represent subtle subregional changes and solid mathematical foundations on which global shape analyses can be achieved on complicated topological structures, such as the convoluted cortical surfaces. On the other hand,

In brain imaging study, 3D surface-based algorithms may provide more advantages over volume-based methods, due to their sub-voxel accuracy to represent subtle subregional changes and solid mathematical foundations on which global shape analyses can be achieved on complicated topological structures, such as the convoluted cortical surfaces. On the other hand, given the enormous amount of data being generated daily, it is still challenging to develop effective and efficient surface-based methods to analyze brain shape morphometry. There are two major problems in surface-based shape analysis research: correspondence and similarity. This dissertation covers both topics by proposing novel surface registration and indexing algorithms based on conformal geometry for brain morphometry analysis.

First, I propose a surface fluid registration system, which extends the traditional image fluid registration to surfaces. With surface conformal parameterization, the complexity of the proposed registration formula has been greatly reduced, compared to prior methods. Inverse consistency is also incorporated to drive a symmetric correspondence between surfaces. After registration, the multivariate tensor-based morphometry (mTBM) is computed to measure local shape deformations. The algorithm was applied to study hippocampal atrophy associated with Alzheimer's disease (AD).

Next, I propose a ventricular surface registration algorithm based on hyperbolic Ricci flow, which computes a global conformal parameterization for each ventricular surface without introducing any singularity. Furthermore, in the parameter space, unique hyperbolic geodesic curves are introduced to guide consistent correspondences across subjects, a technique called geodesic curve lifting. Tensor-based morphometry (TBM) statistic is computed from the registration to measure shape changes. This algorithm was applied to study ventricular enlargement in mild cognitive impatient (MCI) converters.

Finally, a new shape index, the hyperbolic Wasserstein distance, is introduced. This algorithm computes the Wasserstein distance between general topological surfaces as a shape similarity measure of different surfaces. It is based on hyperbolic Ricci flow, hyperbolic harmonic map, and optimal mass transportation map, which is extended to hyperbolic space. This method fills a gap in the Wasserstein distance study, where prior work only dealt with images or genus-0 closed surfaces. The algorithm was applied in an AD vs. control cortical shape classification study and achieved promising accuracy rate.
ContributorsShi, Jie, Ph.D (Author) / Wang, Yalin (Thesis advisor) / Caselli, Richard (Committee member) / Li, Baoxin (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2016
154195-Thumbnail Image.png
Description
Improving energy efficiency has always been the prime objective of the custom and automated digital circuit design techniques. As a result, a multitude of methods to reduce power without sacrificing performance have been proposed. However, as the field of design automation has matured over the last few decades, there have

Improving energy efficiency has always been the prime objective of the custom and automated digital circuit design techniques. As a result, a multitude of methods to reduce power without sacrificing performance have been proposed. However, as the field of design automation has matured over the last few decades, there have been no new automated design techniques, that can provide considerable improvements in circuit power, leakage and area. Although emerging nano-devices are expected to replace the existing MOSFET devices, they are far from being as mature as semiconductor devices and their full potential and promises are many years away from being practical.

The research described in this dissertation consists of four main parts. First is a new circuit architecture of a differential threshold logic flipflop called PNAND. The PNAND gate is an edge-triggered multi-input sequential cell whose next state function is a threshold function of its inputs. Second a new approach, called hybridization, that replaces flipflops and parts of their logic cones with PNAND cells is described. The resulting \hybrid circuit, which consists of conventional logic cells and PNANDs, is shown to have significantly less power consumption, smaller area, less standby power and less power variation.

Third, a new architecture of a field programmable array, called field programmable threshold logic array (FPTLA), in which the standard lookup table (LUT) is replaced by a PNAND is described. The FPTLA is shown to have as much as 50% lower energy-delay product compared to conventional FPGA using well known FPGA modeling tool called VPR.

Fourth, a novel clock skewing technique that makes use of the completion detection feature of the differential mode flipflops is described. This clock skewing method improves the area and power of the ASIC circuits by increasing slack on timing paths. An additional advantage of this method is the elimination of hold time violation on given short paths.

Several circuit design methodologies such as retiming and asynchronous circuit design can use the proposed threshold logic gate effectively. Therefore, the use of threshold logic flipflops in conventional design methodologies opens new avenues of research towards more energy-efficient circuits.
ContributorsKulkarni, Niranjan (Author) / Vrudhula, Sarma (Thesis advisor) / Colbourn, Charles (Committee member) / Seo, Jae-Sun (Committee member) / Yu, Shimeng (Committee member) / Arizona State University (Publisher)
Created2015
153618-Thumbnail Image.png
Description
A community in a social network can be viewed as a structure formed by individuals who share similar interests. Not all communities are explicit; some may be hidden in a large network. Therefore, discovering these hidden communities becomes an interesting problem. Researchers from a number of fields have developed algorithms

A community in a social network can be viewed as a structure formed by individuals who share similar interests. Not all communities are explicit; some may be hidden in a large network. Therefore, discovering these hidden communities becomes an interesting problem. Researchers from a number of fields have developed algorithms to tackle this problem.

Besides the common feature above, communities within a social network have two unique characteristics: communities are mostly small and overlapping. Unfortunately, many traditional algorithms have difficulty recognizing these small communities (often called the resolution limit problem) as well as overlapping communities.

In this work, two enhanced community detection techniques are proposed for re-working existing community detection algorithms to find small communities in social networks. One method is to modify the modularity measure within the framework of the traditional Newman-Girvan algorithm so that more small communities can be detected. The second method is to incorporate a preprocessing step into existing algorithms by changing edge weights inside communities. Both methods help improve community detection performance while maintaining or improving computational efficiency.
ContributorsWang, Ran (Author) / Liu, Huan (Thesis advisor) / Sen, Arunabha (Committee member) / Colbourn, Charles (Committee member) / Arizona State University (Publisher)
Created2015
153858-Thumbnail Image.png
Description
Browsing Twitter users, or browsers, often find it increasingly cumbersome to attach meaning to tweets that are displayed on their timeline as they follow more and more users or pages. The tweets being browsed are created by Twitter users called originators, and are of some significance to the browser who

Browsing Twitter users, or browsers, often find it increasingly cumbersome to attach meaning to tweets that are displayed on their timeline as they follow more and more users or pages. The tweets being browsed are created by Twitter users called originators, and are of some significance to the browser who has chosen to subscribe to the tweets from the originator by following the originator. Although, hashtags are used to tag tweets in an effort to attach context to the tweets, many tweets do not have a hashtag. Such tweets are called orphan tweets and they adversely affect the experience of a browser.

A hashtag is a type of label or meta-data tag used in social networks and micro-blogging services which makes it easier for users to find messages with a specific theme or content. The context of a tweet can be defined as a set of one or more hashtags. Users often do not use hashtags to tag their tweets. This leads to the problem of missing context for tweets. To address the problem of missing hashtags, a statistical method was proposed which predicts most likely hashtags based on the social circle of an originator.

In this thesis, we propose to improve on the existing context recovery system by selectively limiting the candidate set of hashtags to be derived from the intimate circle of the originator rather than from every user in the social network of the originator. This helps in reducing the computation, increasing speed of prediction, scaling the system to originators with large social networks while still preserving most of the accuracy of the predictions. We also propose to not only derive the candidate hashtags from the social network of the originator but also derive the candidate hashtags based on the content of the tweet. We further propose to learn personalized statistical models according to the adoption patterns of different originators. This helps in not only identifying the personalized candidate set of hashtags based on the social circle and content of the tweets but also in customizing the hashtag adoption pattern to the originator of the tweet.
ContributorsMallapura Umamaheshwar, Tejas (Author) / Kambhampati, Subbarao (Thesis advisor) / Liu, Huan (Committee member) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2015
153842-Thumbnail Image.png
Description
ABSTRACT



Psychological assessments contain important diagnostic information and are central to therapeutic service delivery. Therapists' personal biases, invalid cognitive schemas, and emotional reactions can be expressed in the language of the assessments they compose, causing clients to be cast in an unfavorable light. Logically, the opinions of subsequent

ABSTRACT



Psychological assessments contain important diagnostic information and are central to therapeutic service delivery. Therapists' personal biases, invalid cognitive schemas, and emotional reactions can be expressed in the language of the assessments they compose, causing clients to be cast in an unfavorable light. Logically, the opinions of subsequent therapists may then be influenced by reading these assessments, resulting in negative attitudes toward clients, inaccurate diagnoses, adverse experiences for clients, and poor therapeutic outcomes. However, little current research exists that addresses this issue. This study analyzed the degree to which strength-based, deficit-based, and neutral language used in psychological assessments influenced the opinions of counselor trainees (N= 116). It was hypothesized that participants assigned to each type of assessment would describe the client using adjectives that closely conformed to the language used in the assessment they received. The hypothesis was confirmed (p = .000), indicating significant mean differences between all three groups. Limitations and implications of the study were identified and suggestions for further research were discussed.
ContributorsScott, Angela N (Author) / Kinnier, Richard (Thesis advisor) / Homer, Judith (Committee member) / Kurpius, Sharon (Committee member) / Arizona State University (Publisher)
Created2015
153870-Thumbnail Image.png
Description

This study investigated how young adults communicate their decision to religiously disaffiliate to their parents. Both the context in which the religious disaffiliation conversation took place and the communicative behaviors used during the religious disaffiliation conversation were studied. Research questions and hypotheses were guided by Family Communication Patterns Theory and

This study investigated how young adults communicate their decision to religiously disaffiliate to their parents. Both the context in which the religious disaffiliation conversation took place and the communicative behaviors used during the religious disaffiliation conversation were studied. Research questions and hypotheses were guided by Family Communication Patterns Theory and Face Negotiation Theory. A partially mixed sequential quantitative dominate status design was employed to answer the research questions and hypotheses. Interviews were conducted with 10 young adults who had either disaffiliated from the Church of Jesus Christ of Latter-day Saints or the Watch Tower Society. During the interviews, the survey instrument was refined; ultimately, it was completed by 298 religiously disaffiliated young adults. For the religious disaffiliation conversation’s context, results indicate that disaffiliated Jehovah’s Witnesses had higher conformity orientations than disaffiliated Latter-day Saints. Additionally, disaffiliated Jehovah’s Witnesses experienced more stress than disaffiliated Latter-day Saints. Planning the conversation in advance did lead to the disaffiliation conversation being less stressful for young adults. Furthermore, the analysis found that having three to five conversations reduced stress significantly more than having one or two conversations. For the communicative behaviors during the religious disaffiliation conversation, few differences were found in regard to prevalence of the facework behaviors between the two groups. Of the 14 facework behaviors, four were used more often by disaffiliated JW than disaffiliated LDS—abuse, passive aggressive, pretend, and defend self. In terms of effectiveness, the top five facework behaviors were talk about the problem, consider the other, have a private discussion, remain calm, and defend self. Overall, this study begins the conversation on how religious disaffiliation occurs between young adults and their parents and extends Family Communication Patterns Theory and Face Negotiation Theory to a new context.

ContributorsFisk, Megan R (Author) / Cheong, Pauline (Thesis advisor) / Roberto, Anthony (Committee member) / Gee, James (Committee member) / Arizona State University (Publisher)
Created2015
156906-Thumbnail Image.png
Description
Affectionate communication is one way individuals express love and appreciation (Floyd, 2006). Recently, communication scholars have recommended individuals increase their expressions of affection for health benefits (Brezsnyak & Whisman, 2004; Floyd et al., 2009; Floyd & Riforgiate, 2008). However, because communication is limited during military deployment, increasing affectionate communication is

Affectionate communication is one way individuals express love and appreciation (Floyd, 2006). Recently, communication scholars have recommended individuals increase their expressions of affection for health benefits (Brezsnyak & Whisman, 2004; Floyd et al., 2009; Floyd & Riforgiate, 2008). However, because communication is limited during military deployment, increasing affectionate communication is difficult for military families to implement. One form of affectionate communication that shows the promise of health benefits for military couples during deployment is affectionate writing. Working from Pennebaker’s written disclosure paradigm and Floyd’s affectionate exchange theory, the purpose of the current study is to identify whether at-home romantic partners of deployed U.S. Navy personnel can reap the benefits of affectionate communication during military deployment. To test a causal relationship between affectionate writing and communication outcomes, specifically relational satisfaction and stress, a four-week experiment was conducted. Eighty female at-home romantic partners of currently deployed U.S. Navy personnel were recruited for the study and randomly assigned to one of three conditions: (a) an experimental condition in which individuals were instructed to write affectionate letters to their deployed partners for 20 minutes once a week for three weeks, (b) a control condition in which individuals were instructed to write about innocuous or non-emotional topics for 20 minutes once a week for three weeks, or (c) a control condition in which individuals were not given instructions to write for the duration of the study. Individuals who engaged in affectionate writing reported higher levels of relational satisfaction than both the control groups, however, there were no differences in reported stress for the three groups. In fact, stress decreased throughout the duration of the study regardless of the condition in which participants had been placed. Additionally, individuals with secure attachment styles were more satisfied and less stressed than individuals with preoccupied and fearful attachment styles. Finally, individuals who perceived their relationship to be equitable, and to a slightly lesser extent, overbenefitted, during deployment reported higher levels of relational satisfaction. Overall, the findings support and extend affectionate exchange theory. Specifically, the results suggest that individuals can experience distance from their partners and still benefit from affectionate communication via writing; additionally, expressions of affectionate communication need not be reciprocal. Theoretical, methodological, clinical, and pedagogical implications are discussed.
ContributorsVeluscek, Alaina M (Author) / Guerrero, Laura (Thesis advisor) / Alberts, Jess (Committee member) / Brougham, M. Jennifer (Committee member) / Arizona State University (Publisher)
Created2018
156898-Thumbnail Image.png
Description
Virtual digital assistants are automated software systems which assist humans by understanding natural languages such as English, either in voice or textual form. In recent times, a lot of digital applications have shifted towards providing a user experience using natural language interface. The change is brought up by the degree

Virtual digital assistants are automated software systems which assist humans by understanding natural languages such as English, either in voice or textual form. In recent times, a lot of digital applications have shifted towards providing a user experience using natural language interface. The change is brought up by the degree of ease with which the virtual digital assistants such as Google Assistant and Amazon Alexa can be integrated into your application. These assistants make use of a Natural Language Understanding (NLU) system which acts as an interface to translate unstructured natural language data into a structured form. Such an NLU system uses an intent finding algorithm which gives a high-level idea or meaning of a user query, termed as intent classification. The intent classification step identifies the action(s) that a user wants the assistant to perform. The intent classification step is followed by an entity recognition step in which the entities in the utterance are identified on which the intended action is performed. This step can be viewed as a sequence labeling task which maps an input word sequence into a corresponding sequence of slot labels. This step is also termed as slot filling.

In this thesis, we improve the intent classification and slot filling in the virtual voice agents by automatic data augmentation. Spoken Language Understanding systems face the issue of data sparsity. The reason behind this is that it is hard for a human-created training sample to represent all the patterns in the language. Due to the lack of relevant data, deep learning methods are unable to generalize the Spoken Language Understanding model. This thesis expounds a way to overcome the issue of data sparsity in deep learning approaches on Spoken Language Understanding tasks. Here we have described the limitations in the current intent classifiers and how the proposed algorithm uses existing knowledge bases to overcome those limitations. The method helps in creating a more robust intent classifier and slot filling system.
ContributorsGarg, Prashant (Author) / Baral, Chitta (Thesis advisor) / Kumar, Hemanth (Committee member) / Yang, Yezhou (Committee member) / Arizona State University (Publisher)
Created2018