Matching Items (7)
Filtering by

Clear all filters

152113-Thumbnail Image.png
Description
The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different control algorithms. The focus

The rapid advancement of wireless technology has instigated the broad deployment of wireless networks. Different types of networks have been developed, including wireless sensor networks, mobile ad hoc networks, wireless local area networks, and cellular networks. These networks have different structures and applications, and require different control algorithms. The focus of this thesis is to design scheduling and power control algorithms in wireless networks, and analyze their performances. In this thesis, we first study the multicast capacity of wireless ad hoc networks. Gupta and Kumar studied the scaling law of the unicast capacity of wireless ad hoc networks. They derived the order of the unicast throughput, as the number of nodes in the network goes to infinity. In our work, we characterize the scaling of the multicast capacity of large-scale MANETs under a delay constraint D. We first derive an upper bound on the multicast throughput, and then propose a lower bound on the multicast capacity by proposing a joint coding-scheduling algorithm that achieves a throughput within logarithmic factor of the upper bound. We then study the power control problem in ad-hoc wireless networks. We propose a distributed power control algorithm based on the Gibbs sampler, and prove that the algorithm is throughput optimal. Finally, we consider the scheduling algorithm in collocated wireless networks with flow-level dynamics. Specifically, we study the delay performance of workload-based scheduling algorithm with SRPT as a tie-breaking rule. We demonstrate the superior flow-level delay performance of the proposed algorithm using simulations.
ContributorsZhou, Shan (Author) / Ying, Lei (Thesis advisor) / Zhang, Yanchao (Committee member) / Zhang, Junshan (Committee member) / Xue, Guoliang (Committee member) / Arizona State University (Publisher)
Created2013
152417-Thumbnail Image.png
Description
Medical students acquire and enhance their clinical skills using various available techniques and resources. As the health care profession has move towards team-based practice, students and trainees need to practice team-based procedures that involve timely management of clinical tasks and adequate communication with other members of the team. Such team-based

Medical students acquire and enhance their clinical skills using various available techniques and resources. As the health care profession has move towards team-based practice, students and trainees need to practice team-based procedures that involve timely management of clinical tasks and adequate communication with other members of the team. Such team-based procedures include surgical and clinical procedures, some of which are protocol-driven. Cost and time required for individual team-based training sessions, along with other factors, contribute to making the training complex and challenging. A great deal of research has been done on medically-focused collaborative virtual reality (VR)-based training for protocol-driven procedures as a cost-effective as well as time-efficient solution. Most VR-based simulators focus on training of individual personnel. The ones which focus on providing team training provide an interactive simulation for only a few scenarios in a collaborative virtual environment (CVE). These simulators are suited for didactic training for cognitive skills development. The training sessions in the simulators require the physical presence of mentors. The problem with this kind of system is that the mentor must be present at the training location (either physically or virtually) to evaluate the performance of the team (or an individual). Another issue is that there is no efficient methodology that exists to provide feedback to the trainees during the training session itself (formative feedback). Furthermore, they lack the ability to provide training in acquisition or improvement of psychomotor skills for the tasks that require force or touch feedback such as cardiopulmonary resuscitation (CPR). To find a potential solution to overcome some of these concerns, a novel training system was designed and developed that utilizes the integration of sensors into a CVE for time-critical medical procedures. The system allows the participants to simultaneously access the CVE and receive training from geographically diverse locations. The system is also able to provide real-time feedback and is also able to store important data during each training/testing session. Finally, this study also presents a generalizable collaborative team-training system that can be used across various team-based procedures in medical as well as non-medical domains.
ContributorsKhanal, Prabal (Author) / Greenes, Robert (Thesis advisor) / Patel, Vimla (Thesis advisor) / Smith, Marshall (Committee member) / Gupta, Ashish (Committee member) / Kaufman, David (Committee member) / Arizona State University (Publisher)
Created2014
153387-Thumbnail Image.png
Description
A core principle in multiple national quality improvement strategies is the engagement of chronically ill patients in the creation and execution of their treatment plans. Numerous initiatives are underway to use health information technology (HIT) to support patient engagement however the use of HIT and other factors such as health

A core principle in multiple national quality improvement strategies is the engagement of chronically ill patients in the creation and execution of their treatment plans. Numerous initiatives are underway to use health information technology (HIT) to support patient engagement however the use of HIT and other factors such as health literacy may be significant barriers to engagement for older adults. This qualitative descriptive study sought to explore the ways that older adults with multi-morbidities engaged with their plan of care. Forty participants were recruited through multiple case sampling from two ambulatory cardiology practices. Participants were English-speaking, without a dementia-related diagnosis, and between the ages of 65 and 86. The older adults in this study performed many behaviors to engage in the plan of care, including acting in ways to support health, managing health-related information, attending routine visits with their doctors, and participating in treatment planning. A subset of patients engaged in active decision-making because of the point they were at in their chronic disease. At that cross roads, they expressed uncertainly over which road to travel. Two factors influenced the engagement of older adults: a relationship with the provider that met the patient's needs, and the distribution of a Meaningful Use clinical summary at the conclusion of the provider visit. Participants described the ways in which the clinical summary helped and hindered their understanding of the care plan.

Insights gained as a result of this study include an understanding of the discrepancies between what the healthcare system expects of patients and their actual behavior when it comes to the creation of a care plan and the ways in which they take care of their health. Further research should examine the ability of various factors to enhance patient engagement. For example, it may be useful to focus on ways to improve the clinical summary to enhance engagement with the care plan and meet standards for a health literate document. Recommendations for the improvement of the clinical summary are provided. Finally, this study explored potential reasons for the infrequent use of online health information by older adults including the trusting relationship they enjoyed with their cardiologist.
ContributorsJiggins Colorafi, Karen (Author) / Lamb, Gerri (Thesis advisor) / Marek, Karen (Committee member) / Greenes, Robert (Committee member) / Evans, Bronwynne (Committee member) / Arizona State University (Publisher)
Created2015
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
155954-Thumbnail Image.png
Description
The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They

The telephone network is used by almost every person in the modern world. With the rise of Internet access to the PSTN, the telephone network today is rife with telephone spam and scams. Spam calls are significant annoyances for telephone users, unlike email spam, spam calls demand immediate attention. They are not only significant annoyances but also result in significant financial losses in the economy. According to complaint data from the FTC, complaints on illegal calls have made record numbers in recent years. Americans lose billions to fraud due to malicious telephone communication, despite various efforts to subdue telephone spam, scam, and robocalls.

In this dissertation, a study of what causes the users to fall victim to telephone scams is presented, and it demonstrates that impersonation is at the heart of the problem. Most solutions today primarily rely on gathering offending caller IDs, however, they do not work effectively when the caller ID has been spoofed. Due to a lack of authentication in the PSTN caller ID transmission scheme, fraudsters can manipulate the caller ID to impersonate a trusted entity and further a variety of scams. To provide a solution to this fundamental problem, a novel architecture and method to authenticate the transmission of the caller ID is proposed. The solution enables the possibility of a security indicator which can provide an early warning to help users stay vigilant against telephone impersonation scams, as well as provide a foundation for existing and future defenses to stop unwanted telephone communication based on the caller ID information.
ContributorsTu, Huahong (Author) / Doupe, Adam (Thesis advisor) / Ahn, Gail-Joon (Thesis advisor) / Huang, Dijiang (Committee member) / Zhang, Yanchao (Committee member) / Zhao, Ziming (Committee member) / Arizona State University (Publisher)
Created2017
155149-Thumbnail Image.png
Description
Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made

Cyber systems, including IoT (Internet of Things), are increasingly being used ubiquitously to vastly improve the efficiency and reduce the cost of critical application areas, such as finance, transportation, defense, and healthcare. Over the past two decades, computing efficiency and hardware cost have dramatically been improved. These improvements have made cyber systems omnipotent, and control many aspects of human lives. Emerging trends in successful cyber system breaches have shown increasing sophistication in attacks and that attackers are no longer limited by resources, including human and computing power. Most existing cyber defense systems for IoT systems have two major issues: (1) they do not incorporate human user behavior(s) and preferences in their approaches, and (2) they do not continuously learn from dynamic environment and effectively adapt to thwart sophisticated cyber-attacks. Consequently, the security solutions generated may not be usable or implementable by the user(s) thereby drastically reducing the effectiveness of these security solutions.

In order to address these major issues, a comprehensive approach to securing ubiquitous smart devices in IoT environment by incorporating probabilistic human user behavioral inputs is presented. The approach will include techniques to (1) protect the controller device(s) [smart phone or tablet] by continuously learning and authenticating the legitimate user based on the touch screen finger gestures in the background, without requiring users’ to provide their finger gesture inputs intentionally for training purposes, and (2) efficiently configure IoT devices through controller device(s), in conformance with the probabilistic human user behavior(s) and preferences, to effectively adapt IoT devices to the changing environment. The effectiveness of the approach will be demonstrated with experiments that are based on collected user behavioral data and simulations.
ContributorsBuduru, Arun Balaji (Author) / Yau, Sik-Sang (Thesis advisor) / Ahn, Gail-Joon (Committee member) / Davulcu, Hasan (Committee member) / Zhang, Yanchao (Committee member) / Arizona State University (Publisher)
Created2016
151499-Thumbnail Image.png
Description
Parkinson's disease, the most prevalent movement disorder of the central nervous system, is a chronic condition that affects more than 1000,000 U.S. residents and about 3% of the population over the age of 65. The characteristic symptoms include tremors, bradykinesia, rigidity and impaired postural stability. Current therapy based on augmentation

Parkinson's disease, the most prevalent movement disorder of the central nervous system, is a chronic condition that affects more than 1000,000 U.S. residents and about 3% of the population over the age of 65. The characteristic symptoms include tremors, bradykinesia, rigidity and impaired postural stability. Current therapy based on augmentation or replacement of dopamine is designed to improve patients' motor performance but often leads to levodopa-induced complications, such as dyskinesia and motor fluctuation. With the disease progress, clinicians must closely monitor patients' progress in order to identify any complications or decline in motor function as soon as possible in PD management. Unfortunately, current clinical assessment for Parkinson's is subjective and mostly influenced by brief observations during patient visits. Thus improvement or decline in patients' motor function in between visits is extremely difficult to assess. This may hamper clinicians while making informed decisions about the course of therapy for Parkinson's patients and could negatively impact clinical care. In this study we explored new approaches for PD assessment that aim to provide home-based PD assessment and monitoring. By extending the disease assessment to home, the healthcare burden on patients and their family can be reduced, and the disease progress can be more closely monitored by physicians. To achieve these aims, two novel approaches have been designed, developed and validated. The first approach is a questionnaire based self-evaluation metric, which estimate the PD severity through using self-evaluation score on pre-designed questions. Based on the results of the first approach, a smart phone based approach was invented. The approach takes advantage of the mobile computing technology and clinical decision support approach to evaluate the motor performance of patient daily activity and provide the longitudinal disease assessment and monitoring. Both approaches have been validated on recruited PD patients at the movement disorder program of Barrow Neurological Clinic (BNC) at St Joseph's Hospital and Medical Center. The results of validation tests showed favorable accuracy on detecting and assessing critical symptoms of PD, and shed light on promising future of implementing mobile platform based PD evaluation and monitoring tools to facilitate PD management.
ContributorsPan, Di (Author) / Petitti, Diana (Thesis advisor) / Greenes, Robert (Committee member) / Johnson, William (Committee member) / Dhall, Rohit (Committee member) / Arizona State University (Publisher)
Created2013