Matching Items (229)
Filtering by

Clear all filters

151888-Thumbnail Image.png
Description
Knowing that disorder is related to crime, it has become essential for criminologists to understand how and why certain individuals perceive disorder. Using data from the Perceptions of Neighborhood Disorder and Interpersonal Conflict Project, this study uses a fixed photograph of a neighborhood, to assess whether individuals "see" disorder cues.

Knowing that disorder is related to crime, it has become essential for criminologists to understand how and why certain individuals perceive disorder. Using data from the Perceptions of Neighborhood Disorder and Interpersonal Conflict Project, this study uses a fixed photograph of a neighborhood, to assess whether individuals "see" disorder cues. A final sample size of n=815 respondents were asked to indicate if they saw particular disorder cues in the photograph. The results show that certain personal characteristics do predict whether an individual sees disorder. Because of the experimental design, results are a product of the individual's personal characteristics, not of the respondent's neighborhood. These findings suggest that the perception of disorder is not as clear cut as once thought. Future research should explore what about these personal characteristics foster the perception of disorder when it is not present, as well as, how to fight disorder in neighborhoods when perception plays such a substantial role.
ContributorsScott, Christopher (Author) / Wallace, Danielle (Thesis advisor) / Katz, Charles (Committee member) / Ready, Justin (Committee member) / Arizona State University (Publisher)
Created2013
152179-Thumbnail Image.png
Description
As the complexity of robotic systems and applications grows rapidly, development of high-performance, easy to use, and fully integrated development environments for those systems is inevitable. Model-Based Design (MBD) of dynamic systems using engineering software such as Simulink® from MathWorks®, SciCos from Metalau team and SystemModeler® from Wolfram® is quite

As the complexity of robotic systems and applications grows rapidly, development of high-performance, easy to use, and fully integrated development environments for those systems is inevitable. Model-Based Design (MBD) of dynamic systems using engineering software such as Simulink® from MathWorks®, SciCos from Metalau team and SystemModeler® from Wolfram® is quite popular nowadays. They provide tools for modeling, simulation, verification and in some cases automatic code generation for desktop applications, embedded systems and robots. For real-world implementation of models on the actual hardware, those models should be converted into compilable machine code either manually or automatically. Due to the complexity of robotic systems, manual code translation from model to code is not a feasible optimal solution so we need to move towards automated code generation for such systems. MathWorks® offers code generation facilities called Coder® products for this purpose. However in order to fully exploit the power of model-based design and code generation tools for robotic applications, we need to enhance those software systems by adding and modifying toolboxes, files and other artifacts as well as developing guidelines and procedures. In this thesis, an effort has been made to propose a guideline as well as a Simulink® library, StateFlow® interface API and a C/C++ interface API to complete this toolchain for NAO humanoid robots. Thus the model of the hierarchical control architecture can be easily and properly converted to code and built for implementation.
ContributorsRaji Kermani, Ramtin (Author) / Fainekos, Georgios (Thesis advisor) / Lee, Yann-Hang (Committee member) / Sarjoughian, Hessam S. (Committee member) / Arizona State University (Publisher)
Created2013
Description
ABSTRACT Research on self-control theory (Gottfredson & Hirschi, 1990) consistently supports its' central proposition that low self-control significantly affects crime. The theory includes other predictions, which have received far less empirical scrutiny. Among these is the argument that self-control is developed early in childhood and that individual differences then persist

ABSTRACT Research on self-control theory (Gottfredson & Hirschi, 1990) consistently supports its' central proposition that low self-control significantly affects crime. The theory includes other predictions, which have received far less empirical scrutiny. Among these is the argument that self-control is developed early in childhood and that individual differences then persist over time. Gottfredson and Hirschi contend that once established by age ten, self-control remains relatively stable over one's life-course (stability postulate). To determine the empirical status of Gottfredson and Hirschi's "stability postulate," a meta-analysis on existing empirical studies was conducted. Results for this study support the contentions made by Gottfredson and Hirschi, however the inclusion of various moderating variables significantly influenced this relationship. Keywords: self-control, self-control stability, absolute stability, relative stability
ContributorsMeyers, Travis J (Author) / Pratt, Travis (Thesis advisor) / Burt, Callie (Committee member) / Wright, Kevin (Committee member) / Arizona State University (Publisher)
Created2013
151941-Thumbnail Image.png
Description
With increasing transistor volume and reducing feature size, it has become a major design constraint to reduce power consumption also. This has given rise to aggressive architectural changes for on-chip power management and rapid development to energy efficient hardware accelerators. Accordingly, the objective of this research work is to facilitate

With increasing transistor volume and reducing feature size, it has become a major design constraint to reduce power consumption also. This has given rise to aggressive architectural changes for on-chip power management and rapid development to energy efficient hardware accelerators. Accordingly, the objective of this research work is to facilitate software developers to leverage these hardware techniques and improve energy efficiency of the system. To achieve this, I propose two solutions for Linux kernel: Optimal use of these architectural enhancements to achieve greater energy efficiency requires accurate modeling of processor power consumption. Though there are many models available in literature to model processor power consumption, there is a lack of such models to capture power consumption at the task-level. Task-level energy models are a requirement for an operating system (OS) to perform real-time power management as OS time multiplexes tasks to enable sharing of hardware resources. I propose a detailed design methodology for constructing an architecture agnostic task-level power model and incorporating it into a modern operating system to build an online task-level power profiler. The profiler is implemented inside the latest Linux kernel and validated for Intel Sandy Bridge processor. It has a negligible overhead of less than 1\% hardware resource consumption. The profiler power prediction was demonstrated for various application benchmarks from SPEC to PARSEC with less than 4\% error. I also demonstrate the importance of the proposed profiler for emerging architectural techniques through use case scenarios, which include heterogeneous computing and fine grained per-core DVFS. Along with architectural enhancement in general purpose processors to improve energy efficiency, hardware accelerators like Coarse Grain reconfigurable architecture (CGRA) are gaining popularity. Unlike vector processors, which rely on data parallelism, CGRA can provide greater flexibility and compiler level control making it more suitable for present SoC environment. To provide streamline development environment for CGRA, I propose a flexible framework in Linux to do design space exploration for CGRA. With accurate and flexible hardware models, fine grained integration with accurate architectural simulator, and Linux memory management and DMA support, a user can carry out limitless experiments on CGRA in full system environment.
ContributorsDesai, Digant Pareshkumar (Author) / Vrudhula, Sarma (Thesis advisor) / Chakrabarti, Chaitali (Committee member) / Wu, Carole-Jean (Committee member) / Arizona State University (Publisher)
Created2013
151948-Thumbnail Image.png
Description
Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor

Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor the SHS installed in their homes remotely. This is typically realized by giving the SHS network access ability. Although the SHS's network access ability brings a lot of conveniences to the home owners, it also makes the SHS facing more security threats than ever before. As a result, when designing a SHS, the security threats it might face should be given careful considerations. System security threats can be solved properly by understanding them and knowing the parts in the system that should be protected against them first. This leads to the idea of solving the security threats a SHS might face from the requirements engineering level. Following this idea, this paper proposes a systematic approach to generate the security requirements specifications for the SHS. It can be viewed as the first step toward the complete SHS security requirements engineering process.
ContributorsXu, Rongcao (Author) / Ghazarian, Arbi (Thesis advisor) / Bansal, Ajay (Committee member) / Lindquist, Timothy (Committee member) / Arizona State University (Publisher)
Created2013
151788-Thumbnail Image.png
Description
There has been a tremendous amount of innovation in policing over the last 40 years, from community and problem-oriented policing to hot spots and intelligence-led policing. Many of these innovations have been subjected to empirical testing, with mixed results on effectiveness. The latest innovation in policing is the Bureau of

There has been a tremendous amount of innovation in policing over the last 40 years, from community and problem-oriented policing to hot spots and intelligence-led policing. Many of these innovations have been subjected to empirical testing, with mixed results on effectiveness. The latest innovation in policing is the Bureau of Justice Assistance's Smart Policing Initiative (2009). Created in 2009, the SPI provides funding to law enforcement agencies to develop and test evidence-based practices to address crime and disorder. Researchers have not yet tested the impact of the SPI on the funded agencies, particularly with regard to core principles of the Initiative. The most notable of these is the collaboration between law enforcement agencies and their research partners. The current study surveyed SPI agencies and their research partners on key aspects of their Initiative. The current study uses mean score comparisons and qualitative responses to evaluate this partnership to determine the extent of its value and effect. It also seeks to determine the areas of police agency crime analysis and research units that are most in need of enhancement. Findings indicate that the research partners are actively involved in a range of aspects involved in problem solving under the Smart Policing Initiative, and that they have positively influenced police agencies' research and crime analysis functions, and to a lesser extent, have positively impacted police agencies' tactical operations. Additionally, personnel, technology, and training were found to be the main areas of the crime analysis and research units that still need to be enhanced. The thesis concludes with a discussion of the implications of these findings for police policy and practice.
ContributorsMartin-Roethele, Chelsie (Author) / White, Michael D. (Thesis advisor) / Ready, Justin (Committee member) / D'Anna, Matthew (Committee member) / Arizona State University (Publisher)
Created2013
151365-Thumbnail Image.png
Description
The purpose of this preliminary study is to determine if sentencing disparities exist between male and female teachers who have been convicted of sexual misconduct with a student in Maricopa County, Arizona over a ten-year period. The hypothesis is that male teachers convicted of sexual misconduct with a student will

The purpose of this preliminary study is to determine if sentencing disparities exist between male and female teachers who have been convicted of sexual misconduct with a student in Maricopa County, Arizona over a ten-year period. The hypothesis is that male teachers convicted of sexual misconduct with a student will receive harsher punishment than their female counterparts. In addition, this research will analyze the sentencing decisions of Arizona judges and prosecutors through plea-bargaining when compared with the presumptive sentence set by the Arizona Legislature. Issues that will be addressed include: a brief review of gender disparities in sentencing, sex offender sentencing, Arizona's rules of criminal procedure, and a review of the Arizona Revised Statutes pertaining to sexual crimes as well as the Arizona Supreme Court sentencing guidelines. The data set consists of fifteen different Maricopa County teachers who committed a sexual offense against a student and were convicted of that offense from February 2000 through September 2009. According to the results of this study, male teachers do receive harsher penalties than their female counterparts within Maricopa County.
ContributorsSimmon, Christopher (Author) / Holtfreter, Kristy (Thesis advisor) / Wright, Kevin (Committee member) / Spohn, Cassia (Committee member) / Arizona State University (Publisher)
Created2012
151383-Thumbnail Image.png
Description
Motion capture using cost-effective sensing technology is challenging and the huge success of Microsoft Kinect has been attracting researchers to uncover the potential of using this technology into computer vision applications. In this thesis, an upper-body motion analysis in a home-based system for stroke rehabilitation using novel RGB-D camera -

Motion capture using cost-effective sensing technology is challenging and the huge success of Microsoft Kinect has been attracting researchers to uncover the potential of using this technology into computer vision applications. In this thesis, an upper-body motion analysis in a home-based system for stroke rehabilitation using novel RGB-D camera - Kinect is presented. We address this problem by first conducting a systematic analysis of the usability of Kinect for motion analysis in stroke rehabilitation. Then a hybrid upper body tracking approach is proposed which combines off-the-shelf skeleton tracking with a novel depth-fused mean shift tracking method. We proposed several kinematic features reliably extracted from the proposed inexpensive and portable motion capture system and classifiers that correlate torso movement to clinical measures of unimpaired and impaired. Experiment results show that the proposed sensing and analysis works reliably on measuring torso movement quality and is promising for end-point tracking. The system is currently being deployed for large-scale evaluations.
ContributorsDu, Tingfang (Author) / Turaga, Pavan (Thesis advisor) / Spanias, Andreas (Committee member) / Rikakis, Thanassis (Committee member) / Arizona State University (Publisher)
Created2012
Description
This thesis introduces the Model-Based Development of Multi-iRobot Toolbox (MBDMIRT), a Simulink-based toolbox designed to provide the means to acquire and practice the Model-Based Development (MBD) skills necessary to design real-time embedded system. The toolbox was developed in the Cyber-Physical System Laboratory at Arizona State University. The MBDMIRT toolbox runs

This thesis introduces the Model-Based Development of Multi-iRobot Toolbox (MBDMIRT), a Simulink-based toolbox designed to provide the means to acquire and practice the Model-Based Development (MBD) skills necessary to design real-time embedded system. The toolbox was developed in the Cyber-Physical System Laboratory at Arizona State University. The MBDMIRT toolbox runs under MATLAB/Simulink to simulate the movements of multiple iRobots and to control, after verification by simulation, multiple physical iRobots accordingly. It adopts the Simulink/Stateflow, which exemplifies an approach to MBD, to program the behaviors of the iRobots. The MBDMIRT toolbox reuses and augments the open-source MATLAB-Based Simulator for the iRobot Create from Cornell University to run the simulation. Regarding the mechanism of iRobot control, the MBDMIRT toolbox applies the MATLAB Toolbox for the iRobot Create (MTIC) from United States Naval Academy to command the physical iRobots. The MBDMIRT toolbox supports a timer in both the simulation and the control, which is based on the local clock of the PC running the toolbox. In addition to the build-in sensors of an iRobot, the toolbox can simulate four user-added sensors, which are overhead localization system (OLS), sonar sensors, a camera, and Light Detection And Ranging (LIDAR). While controlling a physical iRobot, the toolbox supports the StarGazer OLS manufactured by HAGISONIC, Inc.
ContributorsSu, Shih-Kai (Author) / Fainekos, Georgios E (Thesis advisor) / Sarjoughian, Hessam S. (Committee member) / Artemiadis, Panagiotis K (Committee member) / Arizona State University (Publisher)
Created2012
152422-Thumbnail Image.png
Description
With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may

With the growth of IT products and sophisticated software in various operating systems, I observe that security risks in systems are skyrocketing constantly. Consequently, Security Assessment is now considered as one of primary security mechanisms to measure assurance of systems since systems that are not compliant with security requirements may lead adversaries to access critical information by circumventing security practices. In order to ensure security, considerable efforts have been spent to develop security regulations by facilitating security best-practices. Applying shared security standards to the system is critical to understand vulnerabilities and prevent well-known threats from exploiting vulnerabilities. However, many end users tend to change configurations of their systems without paying attention to the security. Hence, it is not straightforward to protect systems from being changed by unconscious users in a timely manner. Detecting the installation of harmful applications is not sufficient since attackers may exploit risky software as well as commonly used software. In addition, checking the assurance of security configurations periodically is disadvantageous in terms of time and cost due to zero-day attacks and the timing attacks that can leverage the window between each security checks. Therefore, event-driven monitoring approach is critical to continuously assess security of a target system without ignoring a particular window between security checks and lessen the burden of exhausted task to inspect the entire configurations in the system. Furthermore, the system should be able to generate a vulnerability report for any change initiated by a user if such changes refer to the requirements in the standards and turn out to be vulnerable. Assessing various systems in distributed environments also requires to consistently applying standards to each environment. Such a uniformed consistent assessment is important because the way of assessment approach for detecting security vulnerabilities may vary across applications and operating systems. In this thesis, I introduce an automated event-driven security assessment framework to overcome and accommodate the aforementioned issues. I also discuss the implementation details that are based on the commercial-off-the-self technologies and testbed being established to evaluate approach. Besides, I describe evaluation results that demonstrate the effectiveness and practicality of the approaches.
ContributorsSeo, Jeong-Jin (Author) / Ahn, Gail-Joon (Thesis advisor) / Yau, Stephen S. (Committee member) / Lee, Joohyung (Committee member) / Arizona State University (Publisher)
Created2014