Matching Items (672)
Filtering by

Clear all filters

152035-Thumbnail Image.png
Description
Coccidioidomycosis, also known as Valley Fever, is a disease caused by the dimorphic soil-dwelling fungus, Coccidioides sp. Coccidioidomycosis is difficult to diagnose because symptoms are similar to community-acquired pneumonia. Current diagnostic tests rely on antibody responses, but immune responses can be delayed and aberrant, resulting in false negative diagnoses. Unlike

Coccidioidomycosis, also known as Valley Fever, is a disease caused by the dimorphic soil-dwelling fungus, Coccidioides sp. Coccidioidomycosis is difficult to diagnose because symptoms are similar to community-acquired pneumonia. Current diagnostic tests rely on antibody responses, but immune responses can be delayed and aberrant, resulting in false negative diagnoses. Unlike serology, detection of coccidioidal proteins or other fungal components in blood could distinguish valley fever from other pulmonary infections and provide a definitive diagnosis. Using mass spectrometry (LC-MS/MS) we examined the plasma peptidome from patients with serologically confirmed coccidioidomycosis. Mass spectra were searched using the protein database from the Coccidioides species, generated and annotated by the Broad Institute. 15 of 20 patients with serologically confirmed coccidioidomycosis demonstrated the presence of a peptide in plasma, "PGLDSKSLACTFSQV" (PGLD). The peptide is derived from an open reading frame from a "conserved hypothetical protein" annotated with 2 exons, and to date, found only in the C. posadasii strain Silviera RMSCC 3488 genomic sequence. In this thesis work, cDNA sequence analysis from polyadenylated RNA confirms the peptide sequence and genomic location of the peptide, but does not indicate that the intron in the gene prediction of C. posadasii strain Silviera RMSCC 3488 is present. A monoclonal antibody generated against the peptide bound to a 16kDa protein in T27K coccidioidal lysate. Detecting components of the fungus plasma could be a useful diagnostic tool, especially when serology does not provide a definitive diagnosis.
ContributorsDuffy, Stacy Leigh (Author) / Lake, Douglas (Thesis advisor) / Magee, Dewey Mitch (Committee member) / Antwi, Kwasi (Committee member) / Arizona State University (Publisher)
Created2013
151709-Thumbnail Image.png
Description
Modified and artificial water sources can be used as a management tool for game and non-game wildlife species. State, federal, and private agencies allocate significant resources to install and maintain artificial water sources (AWS) annually. Capture mark recapture methods were used to sample small mammal communities in the vicinity of

Modified and artificial water sources can be used as a management tool for game and non-game wildlife species. State, federal, and private agencies allocate significant resources to install and maintain artificial water sources (AWS) annually. Capture mark recapture methods were used to sample small mammal communities in the vicinity of five AWS and five paired control sites (treatments) in the surrounding Sonoran desert from October 2011 to May 2012. I measured plant species richness, density, and percent cover in the spring of 2012. A Multi-response Permutation Procedure was used to identify differences in small mammal community abundance, biomass, and species richness by season and treatment. I used Principle Component Analysis to reduce 11 habitat characteristics to five habitat factors. I related rodent occurrence to habitat characteristics using multiple and logistic regression. A total of 370 individual mammals representing three genera and eight species of rodents were captured across 4800 trap nights. Desert pocket mouse (Chaetodipus penicillatus) was the most common species in both seasons and treatments. Whereas rodent community abundance, biomass, and richness were similar between seasons, community variables of AWS were greater than CS. Rodent diversity was similar between treatments. Desert pocket mouse abundance and biomass were twice as high at AWS when compared to controls. Biomass of white-throated woodrat (Neotoma albigula) was five times greater at AWS. Habitat characteristics were similar between treatments. Neither presence of water nor distance to water explained substantial habitat variation. Occurrence of rodent species was associated with habitat characteristics. Desert rodent communities are adapted for arid environments (i.e. Heteromyids) and are not dependent on "free water". Higher abundances of desert pocket mouse at AWS were most likely related to increased disturbance and debris and not the presence of water. The results of this study and previous studies suggest that more investigation is needed and that short term studies may not be able to detect interactions (if any) between AWS and desert small mammal communities.
ContributorsSwitalski, Aaron (Author) / Bateman, Heather L (Thesis advisor) / Miller, William (Committee member) / Alford, Eddie (Committee member) / Arizona State University (Publisher)
Created2013
151718-Thumbnail Image.png
Description
The increasing popularity of Twitter renders improved trustworthiness and relevance assessment of tweets much more important for search. However, given the limitations on the size of tweets, it is hard to extract measures for ranking from the tweet's content alone. I propose a method of ranking tweets by generating a

The increasing popularity of Twitter renders improved trustworthiness and relevance assessment of tweets much more important for search. However, given the limitations on the size of tweets, it is hard to extract measures for ranking from the tweet's content alone. I propose a method of ranking tweets by generating a reputation score for each tweet that is based not just on content, but also additional information from the Twitter ecosystem that consists of users, tweets, and the web pages that tweets link to. This information is obtained by modeling the Twitter ecosystem as a three-layer graph. The reputation score is used to power two novel methods of ranking tweets by propagating the reputation over an agreement graph based on tweets' content similarity. Additionally, I show how the agreement graph helps counter tweet spam. An evaluation of my method on 16~million tweets from the TREC 2011 Microblog Dataset shows that it doubles the precision over baseline Twitter Search and achieves higher precision than current state of the art method. I present a detailed internal empirical evaluation of RAProp in comparison to several alternative approaches proposed by me, as well as external evaluation in comparison to the current state of the art method.
ContributorsRavikumar, Srijith (Author) / Kambhampati, Subbarao (Thesis advisor) / Davulcu, Hasan (Committee member) / Liu, Huan (Committee member) / Arizona State University (Publisher)
Created2013
152234-Thumbnail Image.png
Description
One of the main challenges in planetary robotics is to traverse the shortest path through a set of waypoints. The shortest distance between any two waypoints is a direct linear traversal. Often times, there are physical restrictions that prevent a rover form traversing straight to a waypoint. Thus, knowledge of

One of the main challenges in planetary robotics is to traverse the shortest path through a set of waypoints. The shortest distance between any two waypoints is a direct linear traversal. Often times, there are physical restrictions that prevent a rover form traversing straight to a waypoint. Thus, knowledge of the terrain is needed prior to traversal. The Digital Terrain Model (DTM) provides information about the terrain along with waypoints for the rover to traverse. However, traversing a set of waypoints linearly is burdensome, as the rovers would constantly need to modify their orientation as they successively approach waypoints. Although there are various solutions to this problem, this research paper proposes the smooth traversability of the rover using splines as a quick and easy implementation to traverse a set of waypoints. In addition, a rover was used to compare the smoothness of the linear traversal along with the spline interpolations. The data collected illustrated that spline traversals had a less rate of change in the velocity over time, indicating that the rover performed smoother than with linear paths.
ContributorsKamasamudram, Anurag (Author) / Saripalli, Srikanth (Thesis advisor) / Fainekos, Georgios (Thesis advisor) / Turaga, Pavan (Committee member) / Arizona State University (Publisher)
Created2013
152236-Thumbnail Image.png
Description
Continuous Delivery, as one of the youngest and most popular member of agile model family, has become a popular concept and method in software development industry recently. Instead of the traditional software development method, which requirements and solutions must be fixed before starting software developing, it promotes adaptive planning, evolutionary

Continuous Delivery, as one of the youngest and most popular member of agile model family, has become a popular concept and method in software development industry recently. Instead of the traditional software development method, which requirements and solutions must be fixed before starting software developing, it promotes adaptive planning, evolutionary development and delivery, and encourages rapid and flexible response to change. However, several problems prevent Continuous Delivery to be introduced into education world. Taking into the consideration of the barriers, we propose a new Cloud based Continuous Delivery Software Developing System. This system is designed to fully utilize the whole life circle of software developing according to Continuous Delivery concepts in a virtualized environment in Vlab platform.
ContributorsDeng, Yuli (Author) / Huang, Dijiang (Thesis advisor) / Davulcu, Hasan (Committee member) / Chen, Yinong (Committee member) / Arizona State University (Publisher)
Created2013
152179-Thumbnail Image.png
Description
As the complexity of robotic systems and applications grows rapidly, development of high-performance, easy to use, and fully integrated development environments for those systems is inevitable. Model-Based Design (MBD) of dynamic systems using engineering software such as Simulink® from MathWorks®, SciCos from Metalau team and SystemModeler® from Wolfram® is quite

As the complexity of robotic systems and applications grows rapidly, development of high-performance, easy to use, and fully integrated development environments for those systems is inevitable. Model-Based Design (MBD) of dynamic systems using engineering software such as Simulink® from MathWorks®, SciCos from Metalau team and SystemModeler® from Wolfram® is quite popular nowadays. They provide tools for modeling, simulation, verification and in some cases automatic code generation for desktop applications, embedded systems and robots. For real-world implementation of models on the actual hardware, those models should be converted into compilable machine code either manually or automatically. Due to the complexity of robotic systems, manual code translation from model to code is not a feasible optimal solution so we need to move towards automated code generation for such systems. MathWorks® offers code generation facilities called Coder® products for this purpose. However in order to fully exploit the power of model-based design and code generation tools for robotic applications, we need to enhance those software systems by adding and modifying toolboxes, files and other artifacts as well as developing guidelines and procedures. In this thesis, an effort has been made to propose a guideline as well as a Simulink® library, StateFlow® interface API and a C/C++ interface API to complete this toolchain for NAO humanoid robots. Thus the model of the hierarchical control architecture can be easily and properly converted to code and built for implementation.
ContributorsRaji Kermani, Ramtin (Author) / Fainekos, Georgios (Thesis advisor) / Lee, Yann-Hang (Committee member) / Sarjoughian, Hessam S. (Committee member) / Arizona State University (Publisher)
Created2013
152100-Thumbnail Image.png
Description
Our research focuses on finding answers through decentralized search, for complex, imprecise queries (such as "Which is the best hair salon nearby?") in situations where there is a spatiotemporal constraint (say answer needs to be found within 15 minutes) associated with the query. In general, human networks are good in

Our research focuses on finding answers through decentralized search, for complex, imprecise queries (such as "Which is the best hair salon nearby?") in situations where there is a spatiotemporal constraint (say answer needs to be found within 15 minutes) associated with the query. In general, human networks are good in answering imprecise queries. We try to use the social network of a person to answer his query. Our research aims at designing a framework that exploits the user's social network in order to maximize the answers for a given query. Exploiting an user's social network has several challenges. The major challenge is that the user's immediate social circle may not possess the answer for the given query, and hence the framework designed needs to carry out the query diffusion process across the network. The next challenge involves in finding the right set of seeds to pass the query to in the user's social circle. One other challenge is to incentivize people in the social network to respond to the query and thereby maximize the quality and quantity of replies. Our proposed framework is a mobile application where an individual can either respond to the query or forward it to his friends. We simulated the query diffusion process in three types of graphs: Small World, Random and Preferential Attachment. Given a type of network and a particular query, we carried out the query diffusion by selecting seeds based on attributes of the seed. The main attributes are Topic relevance, Replying or Forwarding probability and Time to Respond. We found that there is a considerable increase in the number of replies attained, even without saturating the user's network, if we adopt an optimal seed selection process. We found the output of the optimal algorithm to be satisfactory as the number of replies received at the interrogator's end was close to three times the number of neighbors an interrogator has. We addressed the challenge of incentivizing people to respond by associating a particular amount of points for each query asked, and awarding the same to people involved in answering the query. Thus, we aim to design a mobile application based on our proposed framework so that it helps in maximizing the replies for the interrogator's query by diffusing the query across his/her social network.
ContributorsSwaminathan, Neelakantan (Author) / Sundaram, Hari (Thesis advisor) / Davulcu, Hasan (Thesis advisor) / Turaga, Pavan (Committee member) / Arizona State University (Publisher)
Created2013
152112-Thumbnail Image.png
Description
With the advent of social media (like Twitter, Facebook etc.,) people are easily sharing their opinions, sentiments and enforcing their ideologies on others like never before. Even people who are otherwise socially inactive would like to share their thoughts on current affairs by tweeting and sharing news feeds with their

With the advent of social media (like Twitter, Facebook etc.,) people are easily sharing their opinions, sentiments and enforcing their ideologies on others like never before. Even people who are otherwise socially inactive would like to share their thoughts on current affairs by tweeting and sharing news feeds with their friends and acquaintances. In this thesis study, we chose Twitter as our main data platform to analyze shifts and movements of 27 political organizations in Indonesia. So far, we have collected over 30 million tweets and 150,000 news articles from RSS feeds of the corresponding organizations for our analysis. For Twitter data extraction, we developed a multi-threaded application which seamlessly extracts, cleans and stores millions of tweets matching our keywords from Twitter Streaming API. For keyword extraction, we used topics and perspectives which were extracted using n-grams techniques and later approved by our social scientists. After the data is extracted, we aggregate the tweet contents that belong to every user on a weekly basis. Finally, we applied linear and logistic regression using SLEP, an open source sparse learning package to compute weekly score for users and mapping them to one of the 27 organizations on a radical or counter radical scale. Since, we are mapping users to organizations on a weekly basis, we are able to track user's behavior and important new events that triggered shifts among users between organizations. This thesis study can further be extended to identify topics and organization specific influential users and new users from various social media platforms like Facebook, YouTube etc. can easily be mapped to existing organizations on a radical or counter-radical scale.
ContributorsPoornachandran, Sathishkumar (Author) / Davulcu, Hasan (Thesis advisor) / Sen, Arunabha (Committee member) / Woodward, Mark (Committee member) / Arizona State University (Publisher)
Created2013
151901-Thumbnail Image.png
Description
ABSTRACT 1. Aposematic signals advertise prey distastefulness or metabolic unprofitability to potential predators and have evolved independently in many prey groups over the course of evolutionary history as a means of protection from predation. Most aposematic signals investigated to date exhibit highly chromatic patterning; however, relatives in these toxic groups

ABSTRACT 1. Aposematic signals advertise prey distastefulness or metabolic unprofitability to potential predators and have evolved independently in many prey groups over the course of evolutionary history as a means of protection from predation. Most aposematic signals investigated to date exhibit highly chromatic patterning; however, relatives in these toxic groups with patterns of very low chroma have been largely overlooked. 2. We propose that bright displays with low chroma arose in toxic prey species because they were more effective at deterring predation than were their chromatic counterparts, especially when viewed in relatively low light environments such as forest understories. 3. We analyzed the reflectance and radiance of color patches on the wings of 90 tropical butterfly species that belong to groups with documented toxicity that vary in their habitat preferences to test this prediction: Warning signal chroma and perceived chromaticity are expected to be higher and brightness lower in species that fly in open environments when compared to those that fly in forested environments. 4. Analyses of the reflectance and radiance of warning color patches and predator visual modeling support this prediction. Moreover, phylogenetic tests, which correct for statistical non-independence due to phylogenetic relatedness of test species, also support the hypothesis of an evolutionary correlation between perceived chromaticity of aposematic signals and the flight habits of the butterflies that exhibit these signals.
ContributorsDouglas, Jonathan Marion (Author) / Rutowski, Ronald L (Thesis advisor) / Gadau, Juergen (Committee member) / McGraw, Kevin J. (Committee member) / Arizona State University (Publisher)
Created2013
151754-Thumbnail Image.png
Description
It is commonly known that High Performance Computing (HPC) systems are most frequently used by multiple users for batch job, parallel computations. Less well known, however, are the numerous HPC systems servicing data so sensitive that administrators enforce either a) sequential job processing - only one job at a time

It is commonly known that High Performance Computing (HPC) systems are most frequently used by multiple users for batch job, parallel computations. Less well known, however, are the numerous HPC systems servicing data so sensitive that administrators enforce either a) sequential job processing - only one job at a time on the entire system, or b) physical separation - devoting an entire HPC system to a single project until recommissioned. The driving forces behind this type of security are numerous but share the common origin of data so sensitive that measures above and beyond industry standard are used to ensure information security. This paper presents a network security solution that provides information security above and beyond industry standard, yet still enabling multi-user computations on the system. This paper's main contribution is a mechanism designed to enforce high level time division multiplexing of network access (Time Division Multiple Access, or TDMA) according to security groups. By dividing network access into time windows, interactions between applications over the network can be prevented in an easily verifiable way.
ContributorsFerguson, Joshua (Author) / Gupta, Sandeep Ks (Thesis advisor) / Varsamopoulos, Georgios (Committee member) / Ball, George (Committee member) / Arizona State University (Publisher)
Created2013