Matching Items (420)
150019-Thumbnail Image.png
Description
Currently Java is making its way into the embedded systems and mobile devices like androids. The programs written in Java are compiled into machine independent binary class byte codes. A Java Virtual Machine (JVM) executes these classes. The Java platform additionally specifies the Java Native Interface (JNI). JNI allows Java

Currently Java is making its way into the embedded systems and mobile devices like androids. The programs written in Java are compiled into machine independent binary class byte codes. A Java Virtual Machine (JVM) executes these classes. The Java platform additionally specifies the Java Native Interface (JNI). JNI allows Java code that runs within a JVM to interoperate with applications or libraries that are written in other languages and compiled to the host CPU ISA. JNI plays an important role in embedded system as it provides a mechanism to interact with libraries specific to the platform. This thesis addresses the overhead incurred in the JNI due to reflection and serialization when objects are accessed on android based mobile devices. It provides techniques to reduce this overhead. It also provides an API to access objects through its reference through pinning its memory location. The Android emulator was used to evaluate the performance of these techniques and we observed that there was 5 - 10 % performance gain in the new Java Native Interface.
ContributorsChandrian, Preetham (Author) / Lee, Yann-Hang (Thesis advisor) / Davulcu, Hasan (Committee member) / Li, Baoxin (Committee member) / Arizona State University (Publisher)
Created2011
149977-Thumbnail Image.png
Description
Reliable extraction of human pose features that are invariant to view angle and body shape changes is critical for advancing human movement analysis. In this dissertation, the multifactor analysis techniques, including the multilinear analysis and the multifactor Gaussian process methods, have been exploited to extract such invariant pose features from

Reliable extraction of human pose features that are invariant to view angle and body shape changes is critical for advancing human movement analysis. In this dissertation, the multifactor analysis techniques, including the multilinear analysis and the multifactor Gaussian process methods, have been exploited to extract such invariant pose features from video data by decomposing various key contributing factors, such as pose, view angle, and body shape, in the generation of the image observations. Experimental results have shown that the resulting pose features extracted using the proposed methods exhibit excellent invariance properties to changes in view angles and body shapes. Furthermore, using the proposed invariant multifactor pose features, a suite of simple while effective algorithms have been developed to solve the movement recognition and pose estimation problems. Using these proposed algorithms, excellent human movement analysis results have been obtained, and most of them are superior to those obtained from state-of-the-art algorithms on the same testing datasets. Moreover, a number of key movement analysis challenges, including robust online gesture spotting and multi-camera gesture recognition, have also been addressed in this research. To this end, an online gesture spotting framework has been developed to automatically detect and learn non-gesture movement patterns to improve gesture localization and recognition from continuous data streams using a hidden Markov network. In addition, the optimal data fusion scheme has been investigated for multicamera gesture recognition, and the decision-level camera fusion scheme using the product rule has been found to be optimal for gesture recognition using multiple uncalibrated cameras. Furthermore, the challenge of optimal camera selection in multi-camera gesture recognition has also been tackled. A measure to quantify the complementary strength across cameras has been proposed. Experimental results obtained from a real-life gesture recognition dataset have shown that the optimal camera combinations identified according to the proposed complementary measure always lead to the best gesture recognition results.
ContributorsPeng, Bo (Author) / Qian, Gang (Thesis advisor) / Ye, Jieping (Committee member) / Li, Baoxin (Committee member) / Spanias, Andreas (Committee member) / Arizona State University (Publisher)
Created2011
149991-Thumbnail Image.png
Description
With the introduction of compressed sensing and sparse representation,many image processing and computer vision problems have been looked at in a new way. Recent trends indicate that many challenging computer vision and image processing problems are being solved using compressive sensing and sparse representation algorithms. This thesis assays some applications

With the introduction of compressed sensing and sparse representation,many image processing and computer vision problems have been looked at in a new way. Recent trends indicate that many challenging computer vision and image processing problems are being solved using compressive sensing and sparse representation algorithms. This thesis assays some applications of compressive sensing and sparse representation with regards to image enhancement, restoration and classication. The first application deals with image Super-Resolution through compressive sensing based sparse representation. A novel framework is developed for understanding and analyzing some of the implications of compressive sensing in reconstruction and recovery of an image through raw-sampled and trained dictionaries. Properties of the projection operator and the dictionary are examined and the corresponding results presented. In the second application a novel technique for representing image classes uniquely in a high-dimensional space for image classification is presented. In this method, design and implementation strategy of the image classification system through unique affine sparse codes is presented, which leads to state of the art results. This further leads to analysis of some of the properties attributed to these unique sparse codes. In addition to obtaining these codes, a strong classier is designed and implemented to boost the results obtained. Evaluation with publicly available datasets shows that the proposed method outperforms other state of the art results in image classication. The final part of the thesis deals with image denoising with a novel approach towards obtaining high quality denoised image patches using only a single image. A new technique is proposed to obtain highly correlated image patches through sparse representation, which are then subjected to matrix completion to obtain high quality image patches. Experiments suggest that there may exist a structure within a noisy image which can be exploited for denoising through a low-rank constraint.
ContributorsKulkarni, Naveen (Author) / Li, Baoxin (Thesis advisor) / Ye, Jieping (Committee member) / Sen, Arunabha (Committee member) / Arizona State University (Publisher)
Created2011
150353-Thumbnail Image.png
Description
Advancements in computer vision and machine learning have added a new dimension to remote sensing applications with the aid of imagery analysis techniques. Applications such as autonomous navigation and terrain classification which make use of image classification techniques are challenging problems and research is still being carried out to find

Advancements in computer vision and machine learning have added a new dimension to remote sensing applications with the aid of imagery analysis techniques. Applications such as autonomous navigation and terrain classification which make use of image classification techniques are challenging problems and research is still being carried out to find better solutions. In this thesis, a novel method is proposed which uses image registration techniques to provide better image classification. This method reduces the error rate of classification by performing image registration of the images with the previously obtained images before performing classification. The motivation behind this is the fact that images that are obtained in the same region which need to be classified will not differ significantly in characteristics. Hence, registration will provide an image that matches closer to the previously obtained image, thus providing better classification. To illustrate that the proposed method works, naïve Bayes and iterative closest point (ICP) algorithms are used for the image classification and registration stages respectively. This implementation was tested extensively in simulation using synthetic images and using a real life data set called the Defense Advanced Research Project Agency (DARPA) Learning Applied to Ground Robots (LAGR) dataset. The results show that the ICP algorithm does help in better classification with Naïve Bayes by reducing the error rate by an average of about 10% in the synthetic data and by about 7% on the actual datasets used.
ContributorsMuralidhar, Ashwini (Author) / Saripalli, Srikanth (Thesis advisor) / Papandreou-Suppappola, Antonia (Committee member) / Turaga, Pavan (Committee member) / Arizona State University (Publisher)
Created2011
150362-Thumbnail Image.png
Description
There are many wireless communication and networking applications that require high transmission rates and reliability with only limited resources in terms of bandwidth, power, hardware complexity etc.. Real-time video streaming, gaming and social networking are a few such examples. Over the years many problems have been addressed towards the goal

There are many wireless communication and networking applications that require high transmission rates and reliability with only limited resources in terms of bandwidth, power, hardware complexity etc.. Real-time video streaming, gaming and social networking are a few such examples. Over the years many problems have been addressed towards the goal of enabling such applications; however, significant challenges still remain, particularly, in the context of multi-user communications. With the motivation of addressing some of these challenges, the main focus of this dissertation is the design and analysis of capacity approaching coding schemes for several (wireless) multi-user communication scenarios. Specifically, three main themes are studied: superposition coding over broadcast channels, practical coding for binary-input binary-output broadcast channels, and signalling schemes for two-way relay channels. As the first contribution, we propose an analytical tool that allows for reliable comparison of different practical codes and decoding strategies over degraded broadcast channels, even for very low error rates for which simulations are impractical. The second contribution deals with binary-input binary-output degraded broadcast channels, for which an optimal encoding scheme that achieves the capacity boundary is found, and a practical coding scheme is given by concatenation of an outer low density parity check code and an inner (non-linear) mapper that induces desired distribution of "one" in a codeword. The third contribution considers two-way relay channels where the information exchange between two nodes takes place in two transmission phases using a coding scheme called physical-layer network coding. At the relay, a near optimal decoding strategy is derived using a list decoding algorithm, and an approximation is obtained by a joint decoding approach. For the latter scheme, an analytical approximation of the word error rate based on a union bounding technique is computed under the assumption that linear codes are employed at the two nodes exchanging data. Further, when the wireless channel is frequency selective, two decoding strategies at the relay are developed, namely, a near optimal decoding scheme implemented using list decoding, and a reduced complexity detection/decoding scheme utilizing a linear minimum mean squared error based detector followed by a network coded sequence decoder.
ContributorsBhat, Uttam (Author) / Duman, Tolga M. (Thesis advisor) / Tepedelenlioğlu, Cihan (Committee member) / Li, Baoxin (Committee member) / Zhang, Junshan (Committee member) / Arizona State University (Publisher)
Created2011
Description

Consider Steven Cryos’ words, “When disaster strikes, the time to prepare has passed.” Witnessing domestic water insecurity in events such as Hurricane Katrina, the instability in Flint, Michigan, and most recently the winter storms affecting millions across Texas, we decided to take action. The period between a water supply’s disruption

Consider Steven Cryos’ words, “When disaster strikes, the time to prepare has passed.” Witnessing domestic water insecurity in events such as Hurricane Katrina, the instability in Flint, Michigan, and most recently the winter storms affecting millions across Texas, we decided to take action. The period between a water supply’s disruption and restoration is filled with anxiety, uncertainty, and distress -- particularly since there is no clear indication of when, exactly, restoration comes. It is for this reason that Water Works now exists. As a team of students from diverse backgrounds, what started as an honors project with the Founders Lab at Arizona State University became the seed that will continue to mature into an economically sustainable business model supporting the optimistic visions and tenants of humanitarianism. By having conversations with community members, conducting market research, competing for funding and fostering progress amid the COVID-19 pandemic, our team’s problem-solving traverses the disciplines. The purpose of this paper is to educate our readers about a unique solution to emerging issues of water insecurity that are nested across and within systems who could benefit from the introduction of a personal water reclamation system, showcase our team’s entrepreneurial journey, and propose future directions that will this once pedagogical exercise to continue fulfilling its mission: To heal, to hydrate and to help bring safe water to everyone.

ContributorsReitzel, Gage Alexander (Co-author) / Filipek, Marina (Co-author) / Sadiasa, Aira (Co-author) / Byrne, Jared (Thesis director) / Sebold, Brent (Committee member) / Historical, Philosophical & Religious Studies (Contributor) / School of Human Evolution & Social Change (Contributor, Contributor) / Historical, Philosophical & Religious Studies, Sch (Contributor) / Department of Psychology (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
147847-Thumbnail Image.png
Description

The Constitution is a document that was made over 200 years ago by a population that could have never imagined the type of technology or social advances made in the 21st century. This creates a natural rift between governing ideals between then and now, that needs to be addressed. Rather

The Constitution is a document that was made over 200 years ago by a population that could have never imagined the type of technology or social advances made in the 21st century. This creates a natural rift between governing ideals between then and now, that needs to be addressed. Rather than holding the values of the nation to a time when people were not considered citizens because of the color of their skin, there need to be updates made to the Constitution itself. The need for change and the mechanisms were both established by the Framers while creating and advancing the Constitution. The ideal process to go about these changes is split between the formal Article V amendment process and judicial activism. The amendment process has infinite scope for changes that can be done, but due to the challenge involved in trying to pass any form of the amendment through both State and Federal Congresses, that process should be reserved for only fundamental or structural changes. Judicial activism, by way of Supreme Court decisions, is a method best applied to the protection of people’s rights.

Created2021-05
148052-Thumbnail Image.png
Description

The thesis analyzes the apathetic youth turnout myth and researches to see if voter suppression can explain the reason behind low youth turnout. This thesis is a study done with Arizona State University students to assess their level of voter turnout, their levels of political engagement, and if they have

The thesis analyzes the apathetic youth turnout myth and researches to see if voter suppression can explain the reason behind low youth turnout. This thesis is a study done with Arizona State University students to assess their level of voter turnout, their levels of political engagement, and if they have experienced voter suppression. Respondents were also asked about the support given by ASU in terms of helping with the voting process. Results indicate that Arizona State students have high levels of political engagement, and that 1 in 5 ASU students have experienced voter suppression. Furthermore, ASU students on a whole are uncertain about the role ASU should play in supporting students with the voting process.

Created2021-05
147987-Thumbnail Image.png
Description

As political campaigning becomes increasingly digital and data-driven, data privacy has become a question of democratic governance. Yet, Congress has yet to pass a comprehensive federal data privacy law and even the strongest subnational data privacy laws exempt political campaigns from regulation. <br/><br/>This thesis examines how data privacy laws impact

As political campaigning becomes increasingly digital and data-driven, data privacy has become a question of democratic governance. Yet, Congress has yet to pass a comprehensive federal data privacy law and even the strongest subnational data privacy laws exempt political campaigns from regulation. <br/><br/>This thesis examines how data privacy laws impact data-driven and digital political campaigning. Specifically, it investigates what information is incorporated into the political data ecosystem, how data privacy laws regulate the collection of this data, and how actors in the political data ecosystem respond to these laws. It examines both sector-specific federal law and subnational data protection regulation through a case study of California. This research suggests that although the California Consumer Privacy Act and California Privacy Rights Act are landmark steps in American data protection, subnational data privacy law remains inhibited by the federal market-based approach.

ContributorsScovil, Daiva Julija (Author) / Gary, Marchant (Thesis director) / K, Royal (Committee member) / Historical, Philosophical & Religious Studies (Contributor, Contributor) / School of Politics and Global Studies (Contributor, Contributor) / Historical, Philosophical & Religious Studies, Sch (Contributor, Contributor) / Watts College of Public Service & Community Solut (Contributor) / Barrett, The Honors College (Contributor)
Created2021-05
148002-Thumbnail Image.png
Description

Disinformation has long been a tactic used by the Russian government to achieve its goals. Today, Vladimir Putin aims to achieve several things: weaken the United States’ strength on the world stage, relieve Western sanctions on himself and his inner circle, and reassert dominant influence over Russia’s near abroad (the

Disinformation has long been a tactic used by the Russian government to achieve its goals. Today, Vladimir Putin aims to achieve several things: weaken the United States’ strength on the world stage, relieve Western sanctions on himself and his inner circle, and reassert dominant influence over Russia’s near abroad (the Baltics, Ukraine, etc.). This research analyzed disinformation in English, Spanish, and Russian; noting the dominant narratives and geopolitical goals Russia hoped to achieve by destabilizing democracy in each country/region.

Created2021-05