Matching Items (33)
Filtering by

Clear all filters

150046-Thumbnail Image.png
Description
This thesis describes a synthetic task environment, CyberCog, created for the purposes of 1) understanding and measuring individual and team situation awareness in the context of a cyber security defense task and 2) providing a context for evaluating algorithms, visualizations, and other interventions that are intended to improve cyber situation

This thesis describes a synthetic task environment, CyberCog, created for the purposes of 1) understanding and measuring individual and team situation awareness in the context of a cyber security defense task and 2) providing a context for evaluating algorithms, visualizations, and other interventions that are intended to improve cyber situation awareness. CyberCog provides an interactive environment for conducting human-in-loop experiments in which the participants of the experiment perform the tasks of a cyber security defense analyst in response to a cyber-attack scenario. CyberCog generates the necessary performance measures and interaction logs needed for measuring individual and team cyber situation awareness. Moreover, the CyberCog environment provides good experimental control for conducting effective situation awareness studies while retaining realism in the scenario and in the tasks performed.
ContributorsRajivan, Prashanth (Author) / Femiani, John (Thesis advisor) / Cooke, Nancy J. (Thesis advisor) / Lindquist, Timothy (Committee member) / Gary, Kevin (Committee member) / Arizona State University (Publisher)
Created2011
151626-Thumbnail Image.png
Description
The purpose of this thesis study was to evaluate the nature of social anxiety in clinic-referred African American children versus their Caucasian counterparts. In particular, social anxiety symptom endorsement along the Social Phobia and Anxiety Inventory Scale for Children (SPAI-C; Beidel, Turner, & Morris, 1995) was examined in a sample

The purpose of this thesis study was to evaluate the nature of social anxiety in clinic-referred African American children versus their Caucasian counterparts. In particular, social anxiety symptom endorsement along the Social Phobia and Anxiety Inventory Scale for Children (SPAI-C; Beidel, Turner, & Morris, 1995) was examined in a sample of 107 African American and 364 Caucasian children (ages 7- to 17-years old) referred for anxiety. To evaluate symptom endorsement, simple descriptive analyses were conducted whereas measurement invariance tests were examined using confirmatory factor analyses. For the most commonly endorsed items, African American and Caucasian children shared seven of the top 10 most commonly identified social anxiety symptoms. Similar social fears across ethnicity focused on "assertiveness in situations perceived to be difficult" and ""speaking to large groups of peers they do not know." Findings also showed that African American children were more likely to report symptoms of "shaking when in social situations" than Caucasian children, and Caucasian children were more likely to report symptoms of "embarrassment when in front of adults" compared to African American children, but this was also on the basis of two items. When it came to the five factors of the SPAI-C, results showed measurement invariance across African American and Caucasian children. Overall, there were more similarities than differences between African American and Caucasian children in social anxiety symptoms based on the SPAI-C. Findings from this thesis study shed light on how to best accurately identify social anxiety among African American children compared to Caucasians, a contribution that can potentially impact assessment, treatment planning, and program response evaluation.
ContributorsWynne, Henry (Author) / Pina, Armando (Thesis advisor) / Gonzales, Nancy (Committee member) / Millsap, Roger (Committee member) / Arizona State University (Publisher)
Created2013
151308-Thumbnail Image.png
Description
The present study utilized longitudinal data from a high-risk community sample (n= 377; 166 trauma-exposed; 54% males; 52% children of alcoholics; 73% non-Hispanic/Latino Caucasian; 22% Hispanic/Latino; 5% other ethnicity) to test a series of hypotheses that may help explain the risk pathways that link traumatic stress, posttraumatic stress disorder (PTSD)

The present study utilized longitudinal data from a high-risk community sample (n= 377; 166 trauma-exposed; 54% males; 52% children of alcoholics; 73% non-Hispanic/Latino Caucasian; 22% Hispanic/Latino; 5% other ethnicity) to test a series of hypotheses that may help explain the risk pathways that link traumatic stress, posttraumatic stress disorder (PTSD) symptomatology, and problematic alcohol and drug use. Specifically, this study examined whether pre-trauma substance use problems increase risk for trauma exposure (the high-risk hypothesis) or PTSD symptoms (the susceptibility hypothesis), whether PTSD symptoms increase risk for later alcohol/drug problems (the self-medication hypothesis), and whether the association between PTSD symptoms and alcohol/drug problems is due to shared risk factors (the shared vulnerability hypothesis). This study also examined the roles of gender and ethnicity in these pathways. A series of logistic and negative binomial regressions were performed in a path analysis framework. A composite pre-trauma family adversity variable was formed from measures of family conflict, family life stress, parental alcoholism, and other parent psychopathology. Results provided the strongest support for the self-medication hypothesis, such that PTSD symptoms predicted higher levels of later alcohol and drug problems among non-Hispanic/Latino Caucasian participants, over and above the influences of pre-trauma family adversity, pre-trauma substance use problems, trauma exposure, and demographic variables. Results partially supported the high-risk hypothesis, such that adolescent substance use problems had a marginally significant unique effect on risk for assaultive violence exposure but not on overall risk for trauma exposure. There was no support for the susceptibility hypothesis, as pre-trauma adolescent substance use problems did not significantly influence risk for PTSD diagnosis/symptoms over and above the influence of pre-trauma family adversity. Finally, there was little support for the shared vulnerability hypothesis. Neither trauma exposure nor preexisting family adversity accounted for the link between PTSD symptoms and later substance use problems. These results add to a growing body of literature in support of the self-medication hypothesis. Findings extend previous research by showing that PTSD symptoms may influence the development of alcohol and drug problems over and above the influence of trauma exposure itself, preexisting family risk factors, and baseline levels of substance use.
ContributorsHaller, Moira (Author) / Chassin, Laurie (Thesis advisor) / Davis, Mary (Committee member) / Pina, Armando (Committee member) / Tein, Jenn-Yun (Committee member) / Arizona State University (Publisher)
Created2014
151948-Thumbnail Image.png
Description
Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor

Smart home system (SHS) is a kind of information system aiming at realizing home automation. The SHS can connect with almost any kind of electronic/electric device used in a home so that they can be controlled and monitored centrally. Today's technology also allows the home owners to control and monitor the SHS installed in their homes remotely. This is typically realized by giving the SHS network access ability. Although the SHS's network access ability brings a lot of conveniences to the home owners, it also makes the SHS facing more security threats than ever before. As a result, when designing a SHS, the security threats it might face should be given careful considerations. System security threats can be solved properly by understanding them and knowing the parts in the system that should be protected against them first. This leads to the idea of solving the security threats a SHS might face from the requirements engineering level. Following this idea, this paper proposes a systematic approach to generate the security requirements specifications for the SHS. It can be viewed as the first step toward the complete SHS security requirements engineering process.
ContributorsXu, Rongcao (Author) / Ghazarian, Arbi (Thesis advisor) / Bansal, Ajay (Committee member) / Lindquist, Timothy (Committee member) / Arizona State University (Publisher)
Created2013
151187-Thumbnail Image.png
Description
The moderating effects of five characteristics of peers--their effortful control, anger, sadness, aggression, and positive peer behavior--were investigated in two separate series of analyses of preschooler's social behavior: (a) the relation between children's own effortful control and social behavior, and (b) the relation between children's shyness and reticent behavior. Latent

The moderating effects of five characteristics of peers--their effortful control, anger, sadness, aggression, and positive peer behavior--were investigated in two separate series of analyses of preschooler's social behavior: (a) the relation between children's own effortful control and social behavior, and (b) the relation between children's shyness and reticent behavior. Latent variable interactions were conducted in a structural equation framework. Peer context anger and effortful control, albeit with unexpected results, interacted with children's own characteristics to predict their behavior in both the EC and shy model series; these were the only significant interactions obtained for the EC model series. The relation between shyness and reticent behavior, however, showed the greatest impact of peer context and, conversely, the greatest susceptibility to environmental variations; significant interactions were obtained in all five models, despite the limited range of peer context sadness and aggression observed in this study.
ContributorsHuerta, Snježana (Author) / Eisenberg, Nancy (Thesis advisor) / Spinrad, Tracy (Committee member) / Pina, Armando (Committee member) / Geiser, Christian (Committee member) / Arizona State University (Publisher)
Created2012
151275-Thumbnail Image.png
Description
The pay-as-you-go economic model of cloud computing increases the visibility, traceability, and verifiability of software costs. Application developers must understand how their software uses resources when running in the cloud in order to stay within budgeted costs and/or produce expected profits. Cloud computing's unique economic model also leads naturally to

The pay-as-you-go economic model of cloud computing increases the visibility, traceability, and verifiability of software costs. Application developers must understand how their software uses resources when running in the cloud in order to stay within budgeted costs and/or produce expected profits. Cloud computing's unique economic model also leads naturally to an earn-as-you-go profit model for many cloud based applications. These applications can benefit from low level analyses for cost optimization and verification. Testing cloud applications to ensure they meet monetary cost objectives has not been well explored in the current literature. When considering revenues and costs for cloud applications, the resource economic model can be scaled down to the transaction level in order to associate source code with costs incurred while running in the cloud. Both static and dynamic analysis techniques can be developed and applied to understand how and where cloud applications incur costs. Such analyses can help optimize (i.e. minimize) costs and verify that they stay within expected tolerances. An adaptation of Worst Case Execution Time (WCET) analysis is presented here to statically determine worst case monetary costs of cloud applications. This analysis is used to produce an algorithm for determining control flow paths within an application that can exceed a given cost threshold. The corresponding results are used to identify path sections that contribute most to cost excess. A hybrid approach for determining cost excesses is also presented that is comprised mostly of dynamic measurements but that also incorporates calculations that are based on the static analysis approach. This approach uses operational profiles to increase the precision and usefulness of the calculations.
ContributorsBuell, Kevin, Ph.D (Author) / Collofello, James (Thesis advisor) / Davulcu, Hasan (Committee member) / Lindquist, Timothy (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2012
161626-Thumbnail Image.png
Description
Calculus as a math course is important subject students need to succeed in, in order to venture into STEM majors. This thesis focuses on the early detection of at-risk students in a calculus course which can provide the proper intervention that might help them succeed in the course. Calculus has

Calculus as a math course is important subject students need to succeed in, in order to venture into STEM majors. This thesis focuses on the early detection of at-risk students in a calculus course which can provide the proper intervention that might help them succeed in the course. Calculus has high failure rates which corroborates with the data collected from Arizona State University that shows that 40% of the 3266 students whose data were used failed in their calculus course.This thesis proposes to utilize educational big data to detect students at high risk of failure and their eventual early detection and subsequent intervention can be useful. Some existing studies similar to this thesis make use of open-scale data that are lower in data count and perform predictions on low-impact Massive Open Online Courses(MOOC) based courses. In this thesis, an automatic detection method of academically at-risk students by using learning management systems(LMS) activity data along with the student information system(SIS) data from Arizona State University(ASU) for the course calculus for engineers I (MAT 265) is developed. The method will detect students at risk by employing machine learning to identify key features that contribute to the success of a student. This thesis also proposes a new technique to convert this button click data into a button click sequence which can be used as inputs to classifiers. In addition, the advancements in Natural Language Processing field can be used by adopting methods such as part-of-speech (POS) tagging and tools such as Facebook Fasttext word embeddings to convert these button click sequences into numeric vectors before feeding them into the classifiers. The thesis proposes two preprocessing techniques and evaluates them on 3 different machine learning ensembles to determine their performance across the two modalities of the class.
ContributorsDileep, Akshay Kumar (Author) / Bansal, Ajay (Thesis advisor) / Cunningham, James (Committee member) / Acuna, Ruben (Committee member) / Arizona State University (Publisher)
Created2021
187325-Thumbnail Image.png
Description
SLAM (Simultaneous Localization and Mapping) is a problem that has existed for a long time in robotics and autonomous navigation. The objective of SLAM is for a robot to simultaneously figure out its position in space and map its environment. SLAM is especially useful and mandatory for robots that want

SLAM (Simultaneous Localization and Mapping) is a problem that has existed for a long time in robotics and autonomous navigation. The objective of SLAM is for a robot to simultaneously figure out its position in space and map its environment. SLAM is especially useful and mandatory for robots that want to navigate autonomously. The description might make it seem like a chicken and egg problem, but numerous methods have been proposed to tackle SLAM. Before the rise in the popularity of deep learning and AI (Artificial Intelligence), most existing algorithms involved traditional hard-coded algorithms that would receive and process sensor information and convert it into some solvable sensor-agnostic problem. The challenge for these sorts of methods is having to tackle dynamic environments. The more variety in the environment, the poorer the results. Also due to the increase in computational power and the capability of deep learning-based image processing, visual SLAM has become extremely viable and maybe even preferable to traditional SLAM algorithms. In this research, a deep learning-based solution to the SLAM problem is proposed, specifically monocular visual SLAM which is solving the problem of SLAM purely with a singular camera as the input, and the model is tested on the KITTI (Karlsruhe Institute of Technology & Toyota Technological Institute) odometry dataset.
ContributorsRupaakula, Krishna Sandeep (Author) / Bansal, Ajay (Thesis advisor) / Baron, Tyler (Committee member) / Acuna, Ruben (Committee member) / Arizona State University (Publisher)
Created2023
193524-Thumbnail Image.png
Description
Astronomy has a data de-noising problem. The quantity of data produced by astronomical instruments is immense, and a wide variety of noise is present in this data including artifacts. Many types of this noise are not easily filtered using traditional handwritten algorithms. Deep learning techniques present a potential solution to

Astronomy has a data de-noising problem. The quantity of data produced by astronomical instruments is immense, and a wide variety of noise is present in this data including artifacts. Many types of this noise are not easily filtered using traditional handwritten algorithms. Deep learning techniques present a potential solution to the identification and filtering of these more difficult types of noise. In this thesis, deep learning approaches to two astronomical data de-noising steps are attempted and evaluated. Pre-existing simulation tools are utilized to generate a high-quality training dataset for deep neural network models. These models are then tested on real-world data. One set of models masks diffraction spikes from bright stars in James Webb Space Telescope data. A second set of models identifies and masks regions of the sky that would interfere with sky surface brightness measurements. The results obtained indicate that many such astronomical data de-noising and analysis problems can use this approach of simulating a high-quality training dataset and then utilizing a deep learning model trained on that dataset.
ContributorsJeffries, Charles George (Author) / Bansal, Ajay (Thesis advisor) / Windhorst, Rogier (Committee member) / Acuna, Ruben (Committee member) / Arizona State University (Publisher)
Created2024
157365-Thumbnail Image.png
Description
UVLabel was created to enable radio astronomers to view and annotate their own data such that they could then expand their future research paths. It simplifies their data rendering process by providing a simple user interface to better access sections of their data. Furthermore, it provides an interface to track

UVLabel was created to enable radio astronomers to view and annotate their own data such that they could then expand their future research paths. It simplifies their data rendering process by providing a simple user interface to better access sections of their data. Furthermore, it provides an interface to track trends in their data through a labelling feature.

The tool was developed following the incremental development process in order to quickly create a functional and testable tool. The incremental process also allowed for feedback from radio astronomers to help guide the project's development.

UVLabel provides both a functional product, and a modifiable and scalable code base for radio astronomer developers. This enables astronomers studying various astronomical interferometric data labelling capabilities. The tool can then be used to improve their filtering methods, pursue machine learning solutions, and discover new trends. Finally, UVLabel will be open source to put customization, scalability, and adaptability in the hands of these researchers.
ContributorsLa Place, Cecilia (Author) / Bansal, Ajay (Thesis advisor) / Jacobs, Daniel (Thesis advisor) / Acuna, Ruben (Committee member) / Arizona State University (Publisher)
Created2019