Matching Items (21)
151500-Thumbnail Image.png
Description
Communication networks, both wired and wireless, are expected to have a certain level of fault-tolerance capability.These networks are also expected to ensure a graceful degradation in performance when some of the network components fail. Traditional studies on fault tolerance in communication networks, for the most part, make no assumptions regarding

Communication networks, both wired and wireless, are expected to have a certain level of fault-tolerance capability.These networks are also expected to ensure a graceful degradation in performance when some of the network components fail. Traditional studies on fault tolerance in communication networks, for the most part, make no assumptions regarding the location of node/link faults, i.e., the faulty nodes and links may be close to each other or far from each other. However, in many real life scenarios, there exists a strong spatial correlation among the faulty nodes and links. Such failures are often encountered in disaster situations, e.g., natural calamities or enemy attacks. In presence of such region-based faults, many of traditional network analysis and fault-tolerant metrics, that are valid under non-spatially correlated faults, are no longer applicable. To this effect, the main thrust of this research is design and analysis of robust networks in presence of such region-based faults. One important finding of this research is that if some prior knowledge is available on the maximum size of the region that might be affected due to a region-based fault, this piece of knowledge can be effectively utilized for resource efficient design of networks. It has been shown in this dissertation that in some scenarios, effective utilization of this knowledge may result in substantial saving is transmission power in wireless networks. In this dissertation, the impact of region-based faults on the connectivity of wireless networks has been studied and a new metric, region-based connectivity, is proposed to measure the fault-tolerance capability of a network. In addition, novel metrics, such as the region-based component decomposition number(RBCDN) and region-based largest component size(RBLCS) have been proposed to capture the network state, when a region-based fault disconnects the network. Finally, this dissertation presents efficient resource allocation techniques that ensure tolerance against region-based faults, in distributed file storage networks and data center networks.
ContributorsBanerjee, Sujogya (Author) / Sen, Arunabha (Thesis advisor) / Xue, Guoliang (Committee member) / Richa, Andrea (Committee member) / Hurlbert, Glenn (Committee member) / Arizona State University (Publisher)
Created2013
151519-Thumbnail Image.png
Description
Majority of the Sensor networks consist of low-cost autonomously powered devices, and are used to collect data in physical world. Today's sensor network deployments are mostly application specific & owned by a particular entity. Because of this application specific nature & the ownership boundaries, this modus operandi hinders large scale

Majority of the Sensor networks consist of low-cost autonomously powered devices, and are used to collect data in physical world. Today's sensor network deployments are mostly application specific & owned by a particular entity. Because of this application specific nature & the ownership boundaries, this modus operandi hinders large scale sensing & overall network operational capacity. The main goal of this research work is to create a mechanism to dynamically form personal area networks based on mote class devices spanning ownership boundaries. When coupled with an overlay based control system, this architecture can be conveniently used by a remote client to dynamically create sensor networks (personal area network based) even when the client does not own a network. The nodes here are "borrowed" from existing host networks & the application related to the newly formed network will co-exist with the native applications thanks to concurrency. The result allows users to embed a single collection tree onto spatially distant networks as if they were within communication range. This implementation consists of core operating system & various other external components that support injection maintenance & dissolution sensor network applications at client's request. A large object data dissemination protocol was designed for reliable application injection. The ability of this system to remotely reconfigure a network is useful given the high failure rate of real-world sensor network deployments. Collaborative sensing, various physical phenomenon monitoring also be considered as applications of this architecture.
ContributorsFernando, M. S. R (Author) / Dasgupta, Partha (Thesis advisor) / Bhattacharya, Amiya (Thesis advisor) / Gupta, Sandeep (Committee member) / Arizona State University (Publisher)
Created2013
152500-Thumbnail Image.png
Description
As networks are playing an increasingly prominent role in different aspects of our lives, there is a growing awareness that improving their performance is of significant importance. In order to enhance performance of networks, it is essential that scarce networking resources be allocated smartly to match the continuously changing network

As networks are playing an increasingly prominent role in different aspects of our lives, there is a growing awareness that improving their performance is of significant importance. In order to enhance performance of networks, it is essential that scarce networking resources be allocated smartly to match the continuously changing network environment. This dissertation focuses on two different kinds of networks - communication and social, and studies resource allocation problems in these networks. The study on communication networks is further divided into different networking technologies - wired and wireless, optical and mobile, airborne and terrestrial. Since nodes in an airborne network (AN) are heterogeneous and mobile, the design of a reliable and robust AN is highly complex. The dissertation studies connectivity and fault-tolerance issues in ANs and proposes algorithms to compute the critical transmission range in fault free, faulty and delay tolerant scenarios. Just as in the case of ANs, power optimization and fault tolerance are important issues in wireless sensor networks (WSN). In a WSN, a tree structure is often used to deliver sensor data to a sink node. In a tree, failure of a node may disconnect the tree. The dissertation investigates the problem of enhancing the fault tolerance capability of data gathering trees in WSN. The advent of OFDM technology provides an opportunity for efficient resource utilization in optical networks and also introduces a set of novel problems, such as routing and spectrum allocation (RSA) problem. This dissertation proves that RSA problem is NP-complete even when the network topology is a chain, and proposes approximation algorithms. In the domain of social networks, the focus of this dissertation is study of influence propagation in presence of active adversaries. In a social network multiple vendors may attempt to influence the nodes in a competitive fashion. This dissertation investigates the scenario where the first vendor has already chosen a set of nodes and the second vendor, with the knowledge of the choice of the first, attempts to identify a smallest set of nodes so that after the influence propagation, the second vendor's market share is larger than the first.
ContributorsShirazipourazad, Shahrzad (Author) / Sen, Arunabha (Committee member) / Xue, Guoliang (Committee member) / Richa, Andrea (Committee member) / Saripalli, Srikanth (Committee member) / Arizona State University (Publisher)
Created2014
152693-Thumbnail Image.png
Description
This dissertation research analyzes the vernacular cosmopolitan praxis of Muslim women in transnational cyberspaces related to topical and collective action networks, in an effort to detangle cosmopolitanism from its Western biases and to move away from studies of online Muslim populations based on geographical locations or homogenous networks, linking individuals

This dissertation research analyzes the vernacular cosmopolitan praxis of Muslim women in transnational cyberspaces related to topical and collective action networks, in an effort to detangle cosmopolitanism from its Western biases and to move away from studies of online Muslim populations based on geographical locations or homogenous networks, linking individuals through their religious practices or consumption of religious knowledge. Through highlighting praxes rather than contexts, this dissertation disrupts the East/West binary and challenges stereotypes ascribed to Muslim women. One of the research questions related to the cosmopolitan praxis of Muslim women is the following: in what ways do Muslim women engage with "others" online and contribute to bridging dissimilar people? Findings suggest that the social media use of Muslim women contributes to their subtle resistance against communal norms and, although it can serve as an extension to their voices, some of their voices are more readily mediated than others. I employ a connective content analysis methodology to put various datasets associated with topics and collective actions related to Muslim women into conversation. The methodology not only highlights consistencies in the qualitative themes that were iteratively developed through the analyses of the datasets, but also more tangible connections related to social media users, topics, and content. Consequently, this thesis is as much concerned with recasting Western-oriented conceptualizations of cosmopolitanism as it is with how networks dynamics foster and constrain cosmopolitan praxis because digital networks have the extraordinary capacity to link dissimilar people beyond any other type of medium. One of the research questions related to the methodology is: how do network dynamics facilitate and constrain cosmopolitan praxis? The substantive chapters related to the datasets discuss various forms of cosmopolitan praxis that were identified in the analysis: social media use by Muslim women that expands the connective memory, which could contribute to dispelling stereotypes ascribed to them; activism that addresses universal concerns related to women's rights regardless of context; dialogically devising basic standards of social conduct and gender relations; and expressions of tolerance toward divergent views, including alternative interpretations of Islamic beliefs and practices.
ContributorsRobinson, Rebecca S (Author) / Lim, Merlyna (Thesis advisor) / Ali, Souad T. (Committee member) / Parmentier, Mary Jane C, (Committee member) / Arizona State University (Publisher)
Created2014
152886-Thumbnail Image.png
Description
As the number of devices with wireless capabilities and the proximity of these devices to each other increases, better ways to handle the interference they cause need to be explored. Also important is for these devices to keep up with the demand for data rates while not compromising on

As the number of devices with wireless capabilities and the proximity of these devices to each other increases, better ways to handle the interference they cause need to be explored. Also important is for these devices to keep up with the demand for data rates while not compromising on industry established expectations of power consumption and mobility. Current methods of distributing the spectrum among all participants are expected to not cope with the demand in a very near future. In this thesis, the effect of employing sophisticated multiple-input, multiple-output (MIMO) systems in this regard is explored. The efficacy of systems which can make intelligent decisions on the transmission mode usage and power allocation to these modes becomes relevant in the current scenario, where the need for performance far exceeds the cost expendable on hardware. The effect of adding multiple antennas at either ends will be examined, the capacity of such systems and of networks comprised of many such participants will be evaluated. Methods of simulating said networks, and ways to achieve better performance by making intelligent transmission decisions will be proposed. Finally, a way of access control closer to the physical layer (a 'statistical MAC') and a possible metric to be used for such a MAC is suggested.
ContributorsThontadarya, Niranjan (Author) / Bliss, Daniel W (Thesis advisor) / Berisha, Visar (Committee member) / Ying, Lei (Committee member) / Arizona State University (Publisher)
Created2014
153271-Thumbnail Image.png
Description
This thesis presents a model for the buying behavior of consumers in a technology market. In this model, a potential consumer is not perfectly rational, but exhibits bounded rationality following the axioms of prospect theory: reference dependence, diminishing returns and loss sensitivity. To evaluate the products on different criteria, the

This thesis presents a model for the buying behavior of consumers in a technology market. In this model, a potential consumer is not perfectly rational, but exhibits bounded rationality following the axioms of prospect theory: reference dependence, diminishing returns and loss sensitivity. To evaluate the products on different criteria, the analytic hierarchy process is used, which allows for relative comparisons. The analytic hierarchy process proposes that when making a choice between several alternatives, one should measure the products by comparing them relative to each other. This allows the user to put numbers to subjective criteria. Additionally, evidence suggests that a consumer will often consider not only their own evaluation of a product, but also the choices of other consumers. Thus, the model in this paper applies prospect theory to products with multiple attributes using word of mouth as a criteria in the evaluation.
ContributorsElkholy, Alexander (Author) / Armbruster, Dieter (Thesis advisor) / Kempf, Karl (Committee member) / Li, Hongmin (Committee member) / Arizona State University (Publisher)
Created2014
156792-Thumbnail Image.png
Description
The rigidity of a material is the property that enables it to preserve its structure when deformed. In a rigid body, no internal motion is possible since the degrees of freedom of the system are limited to translations and rotations only. In the macroscopic scale, the rigidity and response of

The rigidity of a material is the property that enables it to preserve its structure when deformed. In a rigid body, no internal motion is possible since the degrees of freedom of the system are limited to translations and rotations only. In the macroscopic scale, the rigidity and response of a material to external load can be studied using continuum elasticity theory. But when it comes to the microscopic scale, a simple yet powerful approach is to model the structure of the material and its interparticle interactions as a ball$-$and$-$spring network. This model allows a full description of rigidity in terms of the vibrational modes and the balance between degrees of freedom and constraints in the system.

In the present work, we aim to establish a microscopic description of rigidity in \emph{disordered} networks. The studied networks can be designed to have a specific number of degrees of freedom and/or elastic properties. We first look into the rigidity transition in three types of networks including randomly diluted triangular networks, stress diluted triangular networks and jammed networks. It appears that the rigidity and linear response of these three types of systems are significantly different. In particular, jammed networks display higher levels of self-organization and a non-zero bulk modulus near the transition point. This is a unique set of properties that have not been observed in any other types of disordered networks. We incorporate these properties into a new definition of jamming that requires a network to hold one extra constraint in excess of isostaticity and have a finite non-zero bulk modulus. We then follow this definition by using a tuning by pruning algorithm to build spring networks that have both these properties and show that they behave exactly like jammed networks. We finally step into designing new disordered materials with desired elastic properties and show how disordered auxetic materials with a fully convex geometry can be produced.
ContributorsFaghir Hagh, Varda (Author) / Thorpe, Michael F. (Thesis advisor) / Beckstein, Oliver (Committee member) / Chamberlin, Ralph V. (Committee member) / Schmidt, kevin E. (Committee member) / Arizona State University (Publisher)
Created2018
134171-Thumbnail Image.png
Description
The purpose of this essay is to explain how celebrities manage their brand, as an image and commodity, using social media. Merriam-Webster defines "celebrity" as the "state of being celebrated." This essay will continue to explain how this state of celebration is a manufactured idea by the individual and the

The purpose of this essay is to explain how celebrities manage their brand, as an image and commodity, using social media. Merriam-Webster defines "celebrity" as the "state of being celebrated." This essay will continue to explain how this state of celebration is a manufactured idea by the individual and the media's portrayal. Celebrities are "well-known for their well-knowness" (Boorstin, 1961, p. 58). Boorstin (1961) explains celebrities achieve fame not for their achievements, but by creating a unique personality (as cited in Turner, 2004). Crowd culture, networks, and audience knowledge are tools celebrities must use to navigate digital nuances. They must manage performance of self, adhere to internet social norms, and the obsessive fame culture. Celebrities are often referred to have "star power" and have a certain "charisma." This cultural identity is "negotiated and formed" contrived by a team through promotion, publicity, and advertising (Turner, 2004). Celebrities market themselves through branded content, media used to promote a product, on their social media pages while targeting crowd cultures. Networks truly define how celebrities must brand themselves on social media. This person-to-person contact establishes fan and consumer connections that build the celebrity's base and following. Despite campaigning in a digital world, it goes back to people connecting with people, not accounts linking to accounts. Celebrities manufacture all of these strategies and tactics as they market themselves as a commodity to target crowd culture audiences. This is why targeting crowd cultures is vitally important for celebrities. This essay explores the techniques of select celebrities as they succeed and fail navigating digital nuances.
ContributorsPierce, Ellen (Author) / Jacoby, Jim (Thesis director) / Himberg, Julia (Committee member) / Department of English (Contributor) / Walter Cronkite School of Journalism and Mass Communication (Contributor) / Barrett, The Honors College (Contributor)
Created2017-12
136175-Thumbnail Image.png
Description
The purpose of this study is to discover the exposure and network patterns during the 2013-2015 Ebola Virus Disease epidemic. The author accomplished this by taking an opportunistic sample of news and academic articles, some of which may also capture cases untreated and therefore unrecorded by hospitals and treatment units.

The purpose of this study is to discover the exposure and network patterns during the 2013-2015 Ebola Virus Disease epidemic. The author accomplished this by taking an opportunistic sample of news and academic articles, some of which may also capture cases untreated and therefore unrecorded by hospitals and treatment units. Most of the 315 cases came from the Washington Post, New York Times, and World Health Organization, and they consistently captured between 1-2% of WHO case numbers. The results show that of cases with known exposures, 53.6% became infected through contact with sick family members. Hospital and funeral transmission accounted for the second and third most frequent exposure scenarios at 24.6% and 12.9% respectively. The exposures over time imply that hospital and funeral transmission prevention efforts have been successful, but family transmission has remained common throughout the outbreak. Prevention initiatives should focus on families earlier in epidemics to help control EVD's spread.
ContributorsCleaton, Julie Marie (Author) / Chowell, Gerardo (Thesis director) / Hurtado, Ana Magdalena (Committee member) / Barrett, The Honors College (Contributor) / School of Human Evolution and Social Change (Contributor) / School of Life Sciences (Contributor)
Created2015-05
137483-Thumbnail Image.png
Description
Analytic research on basketball games is growing quickly, specifically in the National Basketball Association. This paper explored the development of this analytic research and discovered that there has been a focus on individual player metrics and a dearth of quantitative team characterizations and evaluations. Consequently, this paper continued the exploratory

Analytic research on basketball games is growing quickly, specifically in the National Basketball Association. This paper explored the development of this analytic research and discovered that there has been a focus on individual player metrics and a dearth of quantitative team characterizations and evaluations. Consequently, this paper continued the exploratory research of Fewell and Armbruster's "Basketball teams as strategic networks" (2012), which modeled basketball teams as networks and used metrics to characterize team strategy in the NBA's 2010 playoffs. Individual players and outcomes were nodes and passes and actions were the links. This paper used data that was recorded from playoff games of the two 2012 NBA finalists: the Miami Heat and the Oklahoma City Thunder. The same metrics that Fewell and Armbruster used were explained, then calculated using this data. The offensive networks of these two teams during the playoffs were analyzed and interpreted by using other data and qualitative characterization of the teams' strategies; the paper found that the calculated metrics largely matched with our qualitative characterizations of the teams. The validity of the metrics in this paper and Fewell and Armbruster's paper was then discussed, and modeling basketball teams as multiple-order Markov chains rather than as networks was explored.
ContributorsMohanraj, Hariharan (Co-author) / Choi, David (Co-author) / Armbruster, Dieter (Thesis director) / Fewell, Jennifer (Committee member) / Brooks, Daniel (Committee member) / Barrett, The Honors College (Contributor) / School of Mathematical and Statistical Sciences (Contributor)
Created2013-05