Matching Items (257)
149668-Thumbnail Image.png
Description
Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different

Service based software (SBS) systems are software systems consisting of services based on the service oriented architecture (SOA). Each service in SBS systems provides partial functionalities and collaborates with other services as workflows to provide the functionalities required by the systems. These services may be developed and/or owned by different entities and physically distributed across the Internet. Compared with traditional software system components which are usually specifically designed for the target systems and bound tightly, the interfaces of services and their communication protocols are standardized, which allow SBS systems to support late binding, provide better interoperability, better flexibility in dynamic business logics, and higher fault tolerance. The development process of SBS systems can be divided to three major phases: 1) SBS specification, 2) service discovery and matching, and 3) service composition and workflow execution. This dissertation focuses on the second phase, and presents a privacy preserving service discovery and ranking approach for multiple user QoS requirements. This approach helps service providers to register services and service users to search services through public, but untrusted service directories with the protection of their privacy against the service directories. The service directories can match the registered services with service requests, but do not learn any information about them. Our approach also enforces access control on services during the matching process, which prevents unauthorized users from discovering services. After the service directories match a set of services that satisfy the service users' functionality requirements, the service discovery approach presented in this dissertation further considers service users' QoS requirements in two steps. First, this approach optimizes services' QoS by making tradeoff among various QoS aspects with users' QoS requirements and preferences. Second, this approach ranks services based on how well they satisfy users' QoS requirements to help service users select the most suitable service to develop their SBSs.
ContributorsYin, Yin (Author) / Yau, Stephen S. (Thesis advisor) / Candan, Kasim (Committee member) / Dasgupta, Partha (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2011
150189-Thumbnail Image.png
Description
This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log

This thesis research attempts to observe, measure and visualize the communication patterns among developers of an open source community and analyze how this can be inferred in terms of progress of that open source project. Here I attempted to analyze the Ubuntu open source project's email data (9 subproject log archives over a period of five years) and focused on drawing more precise metrics from different perspectives of the communication data. Also, I attempted to overcome the scalability issue by using Apache Pig libraries, which run on a MapReduce framework based Hadoop Cluster. I described four metrics based on which I observed and analyzed the data and also presented the results which show the required patterns and anomalies to better understand and infer the communication. Also described the usage experience with Pig Latin (scripting language of Apache Pig Libraries) for this research and how they brought the feature of scalability, simplicity, and visibility in this data intensive research work. These approaches are useful in project monitoring, to augment human observation and reporting, in social network analysis, to track individual contributions.
ContributorsMotamarri, Lakshminarayana (Author) / Santanam, Raghu (Thesis advisor) / Ye, Jieping (Thesis advisor) / Davulcu, Hasan (Committee member) / Arizona State University (Publisher)
Created2011
152247-Thumbnail Image.png
Description
Surface plasmon resonance (SPR) has emerged as a popular technique for elucidating subtle signals from biological events in a label-free, high throughput environment. The efficacy of conventional SPR sensors, whose signals are mass-sensitive, diminishes rapidly with the size of the observed target molecules. The following work advances the current SPR

Surface plasmon resonance (SPR) has emerged as a popular technique for elucidating subtle signals from biological events in a label-free, high throughput environment. The efficacy of conventional SPR sensors, whose signals are mass-sensitive, diminishes rapidly with the size of the observed target molecules. The following work advances the current SPR sensor paradigm for the purpose of small molecule detection. The detection limits of two orthogonal components of SPR measurement are targeted: speed and sensitivity. In the context of this report, speed refers to the dynamic range of measured kinetic rate constants, while sensitivity refers to the target molecule mass limitation of conventional SPR measurement. A simple device for high-speed microfluidic delivery of liquid samples to a sensor surface is presented to address the temporal limitations of conventional SPR measurement. The time scale of buffer/sample switching is on the order of milliseconds, thereby minimizing the opportunity for sample plug dispersion. The high rates of mass transport to and from the central microfluidic sensing region allow for SPR-based kinetic analysis of binding events with dissociation rate constants (kd) up to 130 s-1. The required sample volume is only 1 μL, allowing for minimal sample consumption during high-speed kinetic binding measurement. Charge-based detection of small molecules is demonstrated by plasmonic-based electrochemical impedance microscopy (P-EIM). The dependence of surface plasmon resonance (SPR) on surface charge density is used to detect small molecules (60-120 Da) printed on a dextran-modified sensor surface. The SPR response to an applied ac potential is a function of the surface charge density. This optical signal is comprised of a dc and an ac component, and is measured with high spatial resolution. The amplitude and phase of local surface impedance is provided by the ac component. The phase signal of the small molecules is a function of their charge status, which is manipulated by the pH of a solution. This technique is used to detect and distinguish small molecules based on their charge status, thereby circumventing the mass limitation (~100 Da) of conventional SPR measurement.
ContributorsMacGriff, Christopher Assiff (Author) / Tao, Nongjian (Thesis advisor) / Wang, Shaopeng (Committee member) / LaBaer, Joshua (Committee member) / Chae, Junseok (Committee member) / Arizona State University (Publisher)
Created2013
152123-Thumbnail Image.png
Description
This dissertation investigates the condition of skeletal muscle insulin resistance using bioinformatics and computational biology approaches. Drawing from several studies and numerous data sources, I have attempted to uncover molecular mechanisms at multiple levels. From the detailed atomistic simulations of a single protein, to datamining approaches applied at the systems

This dissertation investigates the condition of skeletal muscle insulin resistance using bioinformatics and computational biology approaches. Drawing from several studies and numerous data sources, I have attempted to uncover molecular mechanisms at multiple levels. From the detailed atomistic simulations of a single protein, to datamining approaches applied at the systems biology level, I provide new targets to explore for the research community. Furthermore I present a new online web resource that unifies various bioinformatics databases to enable discovery of relevant features in 3D protein structures.
ContributorsMielke, Clinton (Author) / Mandarino, Lawrence (Committee member) / LaBaer, Joshua (Committee member) / Magee, D. Mitchell (Committee member) / Dinu, Valentin (Committee member) / Willis, Wayne (Committee member) / Arizona State University (Publisher)
Created2013
150987-Thumbnail Image.png
Description
In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned

In this dissertation, two interrelated problems of service-based systems (SBS) are addressed: protecting users' data confidentiality from service providers, and managing performance of multiple workflows in SBS. Current SBSs pose serious limitations to protecting users' data confidentiality. Since users' sensitive data is sent in unencrypted forms to remote machines owned and operated by third-party service providers, there are risks of unauthorized use of the users' sensitive data by service providers. Although there are many techniques for protecting users' data from outside attackers, currently there is no effective way to protect users' sensitive data from service providers. In this dissertation, an approach is presented to protecting the confidentiality of users' data from service providers, and ensuring that service providers cannot collect users' confidential data while the data is processed or stored in cloud computing systems. The approach has four major features: (1) separation of software service providers and infrastructure service providers, (2) hiding the information of the owners of data, (3) data obfuscation, and (4) software module decomposition and distributed execution. Since the approach to protecting users' data confidentiality includes software module decomposition and distributed execution, it is very important to effectively allocate the resource of servers in SBS to each of the software module to manage the overall performance of workflows in SBS. An approach is presented to resource allocation for SBS to adaptively allocating the system resources of servers to their software modules in runtime in order to satisfy the performance requirements of multiple workflows in SBS. Experimental results show that the dynamic resource allocation approach can substantially increase the throughput of a SBS and the optimal resource allocation can be found in polynomial time
ContributorsAn, Ho Geun (Author) / Yau, Sik-Sang (Thesis advisor) / Huang, Dijiang (Committee member) / Ahn, Gail-Joon (Committee member) / Santanam, Raghu (Committee member) / Arizona State University (Publisher)
Created2012
150705-Thumbnail Image.png
Description
Recombinant protein expression is essential to biotechnology and molecular medicine, but facile methods for obtaining significant quantities of folded and functional protein in mammalian cell culture have been lacking. Here I describe a novel 37-nucleotide in vitro selected sequence that promotes unusually high transgene expression in a vaccinia driven cytoplasmic

Recombinant protein expression is essential to biotechnology and molecular medicine, but facile methods for obtaining significant quantities of folded and functional protein in mammalian cell culture have been lacking. Here I describe a novel 37-nucleotide in vitro selected sequence that promotes unusually high transgene expression in a vaccinia driven cytoplasmic expression system. Vectors carrying this sequence in a monocistronic reporter plasmid produce >1,000-fold more protein than equivalent vectors with conventional vaccinia promoters. Initial mechanistic studies indicate that high protein expression results from dual activity that impacts both transcription and translation. I suggest that this motif represents a powerful new tool in vaccinia-based protein expression and vaccine development technology.
ContributorsFlores, Julia Anne (Author) / Chaput, John C (Thesis advisor) / Jacobs, Bertram (Committee member) / LaBaer, Joshua (Committee member) / Arizona State University (Publisher)
Created2012
151108-Thumbnail Image.png
Description
Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing

Information technology (IT) outsourcing, including foreign or offshore outsourcing, has been steadily growing over the last two decades. This growth in IT outsourcing has led to the development of different hubs of services across nations, and has resulted in increased competition among service providers. Firms have been using IT outsourcing to not only leverage advanced technologies and services at lower costs, but also to maintain their competitive edge and grow. Furthermore, as prior studies have shown, there are systematic differences among industries in terms of the degree and impact of IT outsourcing. This dissertation uses a three-study approach to investigate issues related to IT outsourcing at the macro and micro levels, and provides different perspectives for understanding the issues associated with IT outsourcing at a firm and industry level. The first study evaluates the diffusion patterns of IT outsourcing across industries at aggregate level and within industries at a firm level. In addition, it analyzes the factors that influence the diffusion of IT outsourcing and tests models that help us understand the rate and patterns of diffusion at the industry level. This study establishes the presence of hierarchical contagion effects in the diffusion of IT outsourcing. The second study explores the role of location and proximity of industries to understand the diffusion patterns of IT outsourcing within clusters using the spatial analysis technique of space-time clustering. It establishes the presence of simultaneous space and time interactions at the global level in the diffusion of IT outsourcing. The third study examines the development of specialized hubs for IT outsourcing services in four developing economies: Brazil, Russia, India, and China (BRIC). In this study, I adopt a theory-building approach involving the identification of explanatory anomalies, and propose a new hybrid theory called- knowledge network theory. The proposed theory suggests that the growth and development of the IT and related services sector is a result of close interactions among adaptive institutions. It is also based on new knowledge that is created, and which flows through a country's national diaspora of expatriate entrepreneurs, technologists and business leaders. In addition, relevant economic history and regional geography factors are important. This view diverges from the traditional view, wherein effective institutions are considered to be the key determinants of long-term economic growth.
ContributorsMann, Arti (Author) / Kauffman, Robert J. (Thesis advisor) / Santanam, Raghu (Thesis advisor) / St. Louis, Robert (Committee member) / Anselin, Luc (Committee member) / Nault, Barrie R (Committee member) / Arizona State University (Publisher)
Created2012
136109-Thumbnail Image.png
Description
Students across the United States lack the necessary skills to be successful college students in Science, Technology and Math (STEM) majors and as a result post-secondary institutions are developing summer bridge programs to aid in their transition. As they develop these programs, effective theory and approach are critical to developing

Students across the United States lack the necessary skills to be successful college students in Science, Technology and Math (STEM) majors and as a result post-secondary institutions are developing summer bridge programs to aid in their transition. As they develop these programs, effective theory and approach are critical to developing successful programs. Though there are a multitude of theories on successful student development, a focus on self-efficacy is critical. Summer Bridge programs across the country as well as the Bio Bridge summer program at Arizona State University were studied alone and through the lens of Cognitive Self-Efficacy Theory as mentioned in Albert Bandura's "Perceived Self-Efficacy in Cognitive Development and Functioning." Cognitive Self-Efficacy Theory provides a framework for self-efficacy development in academic settings. An analysis of fifteen bridge programs found that a large majority focused on developing academic capabilities and often overlooked development of community and social efficacy. An even larger number failed to focus on personal psychology in managing self-debilitating thought patterns based on published goals. Further, Arizona State University's Bio Bridge program could not be considered successful at developing cognitive self-efficacy or increasing retention as data was inconclusive. However, Bio Bridge was tremendously successful at developing social efficacy and community among participants and faculty. Further research and better evaluative techniques need to be developed to understand the program's effectiveness in cognitive self-efficacy development and retention.
ContributorsTummala, Sailesh Vardhan (Author) / Orchinik, Miles (Thesis director) / Brownell, Sara (Committee member) / Shortlidge, Erin (Committee member) / Barrett, The Honors College (Contributor) / School of Life Sciences (Contributor)
Created2015-05
135905-Thumbnail Image.png
Description
This study was conducted to observe the effects of vitamin C supplementation upon the expression of sICAM-1 in asthmatic subject. Two groups were created, each with a sample size of 4 subjects. One group was the vitamin C group (VC) and the other was the placebo group (PL). The study

This study was conducted to observe the effects of vitamin C supplementation upon the expression of sICAM-1 in asthmatic subject. Two groups were created, each with a sample size of 4 subjects. One group was the vitamin C group (VC) and the other was the placebo group (PL). The study was analyzed through observing concentrations of biomolecules present within samples of blood plasma and nasal lavages. These included vitamin C, sICAM-1 expression, and histamine. The following P-values calculated from the data collected from this study. The plasma vitamin C screening was p=0.3, and after 18 days of supplementation, p=0.03. For Nasal ICAM p=0.5 at Day 0, p=0.4 at Day 4, and p=0.9 at Day 18. For the Histamine samples p=0.9 at Day 0 and p=0.9 at Day 18. The following P-values calculated from the data collected from both studies. The plasma vitamin C screening was p=0.8, and after 18 days of supplementation, p=0.03. The change of vitamin C at the end of this study and the combined data both had a P-value that was calculated to be lower than 0.05, which meant that this change was significant because it was due to the intervention and not chance. For Nasal ICAM samples p=0.7 at Day 0, p=0.7 at Day 4, and p=1 at Day 18. For the Histamine p=0.7 at Day 0 and p=0.9 at Day 18. This study carries various implications although the study data was unable to show much significance. This was the second study to test this, and as more research is done, and the sample size grows, one will be able to observe whether this really is the mechanism through which vitamin C plays a role in immunological functions.
ContributorsKapadia, Chirag Vinay (Author) / Johnston, Carol (Thesis director) / LaBaer, Joshua (Committee member) / School of Molecular Sciences (Contributor) / Barrett, The Honors College (Contributor)
Created2015-12
135962-Thumbnail Image.png
Description
Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective

Cyber-weapons and the rapid progression of utilizing cyberspace in conflict poses several risks to states and their ability to maintain control of their respective technological infrastructures. Susceptibility to these weapons extend to virtually all existing nations, and indicates a critical need for transnational organizations and their members to establish collective strategies for governing cyber-arms. In this paper, the United Nations, as a prime example of an influential transnational organization, is utilized as a case study for a framework that seeks to define and establish guidelines for arms control policy as it relates to cyber-weapons. Presented is a strategy that seeks to define cyber-warfare and cyber-weapons, distinguish it from other existing forms of weapons and warfare, and outline recommended actions for the United Nations and its affiliates, including the United Nations Office for Disarmament Affairs and United Nations Security Council.
ContributorsSidhu, Arman Singh (Author) / Berliner, Daniel (Thesis director) / Santanam, Raghu (Committee member) / Barrett, The Honors College (Contributor) / School of Politics and Global Studies (Contributor) / Department of Information Systems (Contributor)
Created2015-12