Search results
(221 - 240 of 1,057)
Pages
- Title
- COORDINATED DRIVING IN CONNECTED AND AUTONOMOUS VEHICLE SYSTEM -- OPTIMAL ADVANCE LANE CHANGE ZONES AND COORDINATED PLATOON CAR FOLLOWING CONTROL
- Creator
- Gong, Siyuan
- Date
- 2017, 2017-07
- Description
-
The connected and autonomous vehicle (CAV) system enables countless innovative coordinated driving approaches, such as coordinated lane change...
Show moreThe connected and autonomous vehicle (CAV) system enables countless innovative coordinated driving approaches, such as coordinated lane change and car-following in microscopic CAV control, and coordinated rounding and parking in macroscopic traffic flow guidance, which will improve the performance of our transportation system by enhancing traffic mobility, providing safe driving environment and reducing fuel consumption. Since the lane change and car-following behavior are indicated as crucial factors of traffic safety and efficiency, this dissertation focuses on developing the coordinated driving schemes in microscopic control and operation of lane change and car-following maneuvers. In particular, I develop an lane change zone optimization strategy and the coordinated platoon car-following control for a pure CAV platoon and a mixed platoon (i.e. mixed with human-drive vehicles and CAVs) respectively. This dissertation first explore the management strategy of the mandatory lane change near a two-lane highway off-ramp by optimizing the location of advance warning. The proposed approach considers that the area downstream of the advance warning includes two zones: the green and yellow zones corresponding to their respective most like lane change maneuvers. An optimization model is proposed to search for the optimal green and yellow zones. Traffic flow theory such as Greenshield model and shock wave analysis are used to analyze the impacts of the S-MLC and D-MLC maneuvers on the traffic delay. Numerical experiments indicate that the proposed optimization model can identify the optimal location to set the advance MLC warning nearby an off-ramp so that the traffic delay resulting from lane change maneuvers is minimized, and the corresponding capacity drop and traffic oscillation can be efficiently mitigated. Then, this research develops a novel car-following control scheme for a platoon of connected and autonomous vehicles on a straight highway. The platoon is modeled as an interconnected multi-agent dynamical system subject to physical and safety constraints. A constrained optimization based control scheme is proposed to ensure an entire platoon’s transient traffic smoothness and asymptotic dynamic performance. This dissertation develops dual based distributed algorithms to compute optimal solutions with proven convergence. Furthermore, the asymptotic stability of the unconstrained linear closed-loop system is established. These stability analysis results provide a principle to select penalty weights in the underlying optimization problem to achieve the desired closed-loop performance for both the transient and the asymptotic dynamics. By the motivation that CAVs and human-drive vehicles will co-exist on the road for a long period in the near future, the third part of this dissertation extends the pure CAV coordinated platooning control to the mixed flow environment. By integrating the Newell car-following model, a real-time curve matching algorithm is implemented to calibrate the ca-following model and anticipate the movement of human-drive vehicle by the real-time trajectory data. The constrained MPC are developed for each CAV platoon, considering their movement interaction through the human-drive vehicle platoon. Furthermore, this study provide a modified dual based distributed algorithm to improve convergence speed of the primal problem for the dual based distributed algorithm in Chapter 4. Several requirements of the penalty weights selection are provided by stability analysis under the unconstrained conditions. The numerical experiments based on field data will be conducted to illustrate the effectiveness and efficiency of the proposed the solution approach and the platoon control schemes.
Ph.D. in Civil Engineering, July 2017
Show less
- Title
- HARDWARE/SOFTWARE CO-DESIGN PARTITIONING ALGORITHM FOR MACHINE VISION APPLICATIONS
- Creator
- Gonnot, Thomas
- Date
- 2017, 2017-05
- Description
-
Advancements in FPGA technologies now allows the implementation of machine vision using hardware component rather than processors for...
Show moreAdvancements in FPGA technologies now allows the implementation of machine vision using hardware component rather than processors for increased efficiency. The combination of hardware and software implementations, however, can provide even more efficient results by combining the advantages of both technologies. This leads to the problem of partitioning the machine vision algorithms between hardware and software. The hardware/software partition problem is NP-hard, which means that a solution to the problem can be checked in polynomial time, but the time to find the solution is not predictable. Automated methods based on a genetic algorithm or discrete particle swarm optimization algorithm allow a designer to implement computer vision algorithms without concerns for the hardware/software partitioning. Their reliance on randomness to explore different partitioning selections, however, means that the optimum result might not be reached and that the processing time cannot be predicted. This dissertation introduces a model for image processing and computer vision algorithms in a set of elementary blocks, each of which is assigned one or more configuration. This configuration can be either hardware or software and is linked to the corresponding resource utilization and performance. A procedure is also introduced to allocate the different blocks to either hardware or software, and a cost function is defined to evaluate the relevance of the generated design. The implementation of the model and procedure allows for the partitioning of any image processing in polynomial time by checking various implementations and selecting the optimum solution. This thesis includes two test cases used to test the efficiency of the method. The shift-invariant features transform is used to demonstrate the viability of the partitioning results on an algorithm containing multiple image convolution operations in parallel. The neural network, on the other hand, is used to demonstrate the performances of the procedure when machine vision algorithm contains many blocks. Finally, this dissertation present a set of machine vision applications, such as object tracking, object recognition, optical character recognition, facial recognition, and visually impaired assistance. The proposed model and procedure could be included in the design flow of hardware/software co-design tools and provide a library of image processing blocks ready to be implemented. This would allow image processing and computer vision designers would be able to implement any algorithm efficiently in hardware/software co-design without the need to know how to partition it.
Ph.D. in Electrical Engineering, May 2017
Show less
- Title
- ADVANCES IN VEHICLE-TERRAIN INTERACTION MODELING FOR SMALL, RIGID-WHEELED VEHICLES OPERATING ON DEFORMABLE TERRAIN
- Creator
- Meirion-griffith, Gareth
- Date
- 2012-04-22, 2012-05
- Description
-
This thesis presents advances in the eld of terramechanics, the study of ve- hicle mobility performance, for small, rigid-wheeled vehicles...
Show moreThis thesis presents advances in the eld of terramechanics, the study of ve- hicle mobility performance, for small, rigid-wheeled vehicles operating on deformable terrain. Speci cally, the thesis proposes new models for vehicle performance model- ing through the development of novel pressure-sinkage equations. The semi-empirical equations of terramechanics, rst developed by Bekker in the 1950s, couple vehicle mobility systems and terrain geotechnical properties to yield an understanding of the manner in which traction is developed o -road. This is important because on de- formable terrain mobility is often limited not by the vehicle's torque or power, but by the strength of the terrain and its ability to support locomotion. Classical terramechanics models have proven to be instrumental in the design, modeling, and operation of large, man-driven vehicles for applications such as agri- cultural, military, and commercial transport. However, these models are not appro- priate for vehicles with wheels less than approximately 50 cm in diameter [MGS11a] [SMGSM08] [RBC02]. This is a critical problem because of the increasing prolifer- ation of small, robotic vehicles. In particular, space agencies such as the National Aeronautics and Space Administration (NASA), the Japanese Aerospace Exploration Agency (JAXA), and the European Space Agency (ESA) have shown great interest in the application of terramechanics to planetary exploration rover mobility. At the inception of the author's research, several independent sources had noted the limited accuracy of classical terramechanics models for small-wheeled vehi- cles. However, an understanding of the cause of these inaccuracies was absent. This thesis provides an understanding of these inaccuracies, their cause, and a solution. Using laboratory experiments, fi eld test data, theoretical development, and vehicle simulation, this thesis proposes a modi fied terramechanics framework for predicting small, rigid-wheel traction.
Ph.D. in Mechanical and Aerospace Engineering, May 2012
Show less
- Title
- CAPACITY ANALYSIS OF MULTI-RADIO MULTI-CHANNEL (MR-MC) WIRELESS NETWORK
- Creator
- Li, Hongkun
- Date
- 2012-11-15, 2012-12
- Description
-
The multi-radio multi-channel (MR-MC) networking provides a generic computing platform for a wide range of next-generation wireless networks,...
Show moreThe multi-radio multi-channel (MR-MC) networking provides a generic computing platform for a wide range of next-generation wireless networks, e.g., wireless mesh networks based on the IEEE 802.16, 4G cellular networks based on the long term evolution (LTE), and cognitive radio networks based on the dynamic spectrum sharing. Multiple radio interfaces and channels allow more flexible network configuration to achieve higher network capacity. However, the capacity of the MR-MC networking is not well studied due to the lack of effective tool addressing the complex interactions of the channel assignment and radio interface allocation problem. Moreover, how to efficiently utilize multiple interfaces and channels is unexplored. Generally, we have the four main contributions in this work. 1) an efficient methodology is proposed to compute the optimal capacity of MR-MC network and the concept of critical set is revealed. 2) two sufficient conditions are developed for the flow assignment, which can be constructed and verified in distributed manner. Both conditions achieve a provable portion of the optimal capacity region. 3) a novel framework and efficient algorithms are developed for the dynamic network control in the MR-MC network. 4) a new routing metric is proposed to consider both delay and interference for path selection, and a routing protocol is designed correspondingly. Specifically, we originally construct a new multi-dimensional conflict graph (MDCG) to describe all the interference relationship in the MR-MC network. Based on MDCG, we formulate a multi-commodity flow (MCF) problem augmented with maximal independent set (MIS) constraint to compute the optimal capacity, so that the optimal capacity planning in MR-MC networks can be transformed from integer programming regime to linear programming regime. We further provide the new concept of critical MIS set, and estimate the upper bound of the size of critical MIS set. Therefore, a heuristic algorithm is designed to systematically compute those MISs, which are more likely to be involved in critical set. Moreover, we develop the sufficient conditions for the flow rate assignment, which achieve viii a provable portion of the optimal capacity region, termed as efficiency ratio. These sufficient constraints could be constructed and verified in the distributed and localized manner. We develop new method to compute the efficiency ratio for each sufficient condition by exploring the disruptively different geometric property of MR-MC networks compared with single radio single channel network. Then we develop a new framework to systematically study the resource allocation problem considering the dynamic network control in the MRMC network. The framework not only facilitates the formulation of throughput-optimal scheduling for the MR-MC network, but also allows us optimally solving the joint resource allocation problem, including routing, channel/interface assignment, flow allocation and scheduling. At last, a new routing metric is proposed to consider not only the transmission delay also queuing delay. In addition, in the MR-MC context, the inter-flow interference and intra-flow interference are taken into account. An AODV-based routing protocol is designed to implement the new metric.
PH.D in Electrical and Computer Engineering, December 2012
Show less
- Title
- CHILD TEMPERAMENT AND PARENTING BEHAVIOR AT AGE 5: DO THEY PREDICT CHILD COPING AT AGE 6?
- Creator
- Hwang, Maria D’aniello
- Date
- 2014, 2014-07
- Description
-
Coping has been shown to be related to many positive outcomes in children, including better psychological adjustment, positive social...
Show moreCoping has been shown to be related to many positive outcomes in children, including better psychological adjustment, positive social relationships and higher achievement. Additionally, coping abilities in childhood and adolescence can serve as risk or protective factors for psychopathology. Both parenting and child temperament have been shown to be related to child coping; however, these variables have never been examined simultaneously. The transition from kindergarten to grammar-school is considered to be important because children must learn to adjust to this critical, more structured environment. As a result, it is important to determine what factors contribute to adaptive coping at the time when children begin formal school. The aim of this study was to: (a) examine the relationship between child negative affect (NA), effortful control (EC), parenting variables (support/scaffolding, support/engagement, and hostility/coercion), and child coping; and (b) to determine if parenting moderates the effects of temperament on adaptive coping. Participants included 796 (391 males and 405 females) children and their primary caregivers. Children were assessed at ages 5 and 6 years. NA and EC were assessed by parent-report with the Child Behavior Questionnaire. EC also was assessed with an observer-rated task, Gift Delay, which measures the child’s ability to delay a prepotent response, and with two subtests from the NEPSY; Knock and Tap, and Statue. Parenting variables (support/engagement and hostility/coercion) were assessed by parent-report with the Parenting Behavior Inventory and through an observation task, which was assessed by a factor-analyzed composite of variables rated during the National Institute for Child Health and Human Development 3-Boxes Task (support/scaffolding). Coping adaptability was assessed using the Early Childhood Coping Puppet Interview. Results of hierarchical regression analyses indicated that NA, EC, support/scaffolding, support/engagement, and hostility/coercion were not related to child coping adaptability. There also was no evidence of moderation of the relationship between temperament and coping by parenting. Post hoc analyses indicated that for males, lower SES was related to more adaptive coping. Implications of these findings and suggestions for further research are discussed.
Ph.D. in Psychology, July 2014
Show less
- Title
- AN EVALUATION OF THE FEASIBILITY OF AN ONLINE FAMILY-BASED INDICATED PREVENTION PROGRAM FOR ADOLESCENT EATING DISORDERS
- Creator
- Lebow, Jocelyn R.
- Date
- 2011-10, 2011-12
- Description
-
Adolescent eating disorders are highly impairing class of mental illness, marked by chronicity and recurrence. Data indicate that early...
Show moreAdolescent eating disorders are highly impairing class of mental illness, marked by chronicity and recurrence. Data indicate that early intervention, before anorexia nervosa (AN) or bulimia nervosa (BN) symptoms become entrenched, leads to an increased likelihood of positive outcomes (Fisher, Schneider, Burns, Symons & Mandel 2001; Le Grange, Loeb, Van Orman & Jellar, 2004). As such, numerous prevention programs have been developed for adolescent eating disorders, with mixed success (Shaw, 2008, Stice, Shaw & Marti, 2007). Most recently, programs have utilized the technology of the Internet to make prevention and early intervention more accessible and cost effective for affected teens and families. The current study assessed the feasibility of an original Internet-based indicated prevention program for families of adolescents with subsyndromal eating disorders. The program was based on the empirically-supported Family Based Treatment (FBT) for adolescent AN and BN. Seven families (comprised of 7 caregivers and 7 adolescents with subthreshold levels of eating disorder symptoms) were enrolled in the study, and 4 families successfully completed all program requirements. Four separate aims were assessed including: evaluation of program acceptability, identification of recruitment and retention patterns, assessment of program compliance and dosage received, and analysis of preliminary outcomes. Results suggested that the program was acceptable to all participants, and that the program format and content were positively received. Preliminary outcome data was limited due to the small sample size, however, descriptive analyses showed that the program had a significant effect on the reduction of all cognitive and behavioral eating disorder symptoms, as well as on the reduction of adolescent depressive symptoms. Adolescent ix self esteem was not significantly impacted by program participation. Compliance results were less straightforward. Program adherence was mixed, and further investigation is needed to clarify patterns of compliance and retention. Finally, the recruitment strategies used were found to not be feasible. Despite a wide-ranging and multi-faceted recruitment strategy, rates were very slow. Further, a large percentage of interested potential participants had to be excluded, calling into question the appropriateness of the applicant pool that was accessed through the implemented program of recruitment. Implications of these findings, possible explanations and suggestions for future research are discussed.
Ph.D. in Psychology, December 2011
Show less
- Title
- STIGMA AND MENTAL ILLNESS: THE ROLE OF STEREOTYPE THREAT ON PERFORMANCE OF COGNITIVE MEASURES
- Creator
- Hautamaki, Julie Bilyeu
- Date
- 2013, 2013-05
- Description
-
Deficits in cognitive functioning observed in people with schizophrenia are well-documented; however, social psychologists recognize that...
Show moreDeficits in cognitive functioning observed in people with schizophrenia are well-documented; however, social psychologists recognize that additional societal factors, such as stigma and discrimination, may further contribute to these observed deficits in functioning. This study investigated the role of stereotype threat on cognitive functioning of people with schizophrenia. This group encounters stigma in various realms such as employment, relationships and housing. The negative stereotypes regarding this population have been well-documented and studied. In the current study, 60 participants were randomized into a control or stereotype condition. The participants completed a series of cognitive tests and the Structured Clinical Interview for DSM-IV Axis I Disorders (SCID-I). Participants in the stereotype threat condition were primed with a statement and questions to induce stereotype threat. The order of test administration was part of the threat induction. Stereotype threat was not found to impact the performance of cognitive measures for this group. In-group identification, stigma endorsement, and anxiety levels did not predict performance on cognitive measures.
PH.D in Psychology, May 2013
Show less
- Title
- VISUAL TRAINING AT ILLINOIS INSTITUTE OF TECHNOLOGY: AESTHETICS IN ARCHITECTURAL EDUCATION
- Creator
- Jones, Kristin
- Date
- 2016, 2016-05
- Description
-
Over the course of 78 years, an aesthetic ideal which embodies architectural values has been collectively cultivated through Visual Training...
Show moreOver the course of 78 years, an aesthetic ideal which embodies architectural values has been collectively cultivated through Visual Training at the Illinois Institute of Technology (IIT) school of architecture in Chicago. This dissertation provides a comprehensive explanation of Visual Training as it has been conducted at IIT. It promotes a better understanding of the background of Visual Training, the pedagogical practice of the Visual Training exercises, and the ongoing value of the course. The dissertation traces the underpinnings of Visual Training through the writings of Walter Peterhans, founder and Professor of Visual Training at IIT from 1938-1960, Ludwig Mies van der Rohe, Professor and Director of Architecture at IIT from 1938-1958 and other key figures. The thesis shows how the Visual Training program at IIT was influenced by movements in philosophy and mathematics in early 20th century Germany and how existing pedagogy at the Bauhaus was adapted to serve its aim. The dissertation includes an explanation of each exercise in the Visual Training program. It makes explicit the point of each exercise, how each one is conducted and why. Original detailed descriptions, illustrated with examples, show what a student gains from each exercise and how the process of performing the exercise achieves that end. The dissertation compares the way in which the Visual Training program originally developed in relation to other courses in the architecture curriculum to disclose the meaning of architecture, and what has happened in Visual Training as the architecture program at IIT has continued to evolve. The thesis brings to light enduring epistemological tensions underlying architectural education.
Ph.D. in Architecture, May 2016
Show less
- Title
- Polymorphic Network-on-Chip Datapath Architecture for Reconfigurable Computing Machines
- Creator
- Weber, Joshua
- Date
- 2012-04-18, 2012-05
- Description
-
Polymorphic processors have considerable advantages in performance over existing reconfigurable designs. Polymorphic processors combine the...
Show morePolymorphic processors have considerable advantages in performance over existing reconfigurable designs. Polymorphic processors combine the flexibility and ease of a general purpose processor with the performance optimizations made possible through reconfigurable arrays. Polymorphic processors provide all the ease of programming from a traditional general purpose processor while incorporating the significant performance gains that can be realized using reconfigurable arrays. Polymorphic processors can be categorized by the level of integration between the general purpose processor and the reconfigurable array. At coarse levels of integration, the processor and reconfigurable array execute independently and exchange data utilizing bus structures. These systems perform robustly for high level datadriven optimizations, allowing large segments of processing to be quickly performed on fast reconfigurable resources. However, the overhead of data transfer between the processor and array limits the benefit to fine grained optimizations. Other architectures attempt a tight coupling of reconfigurable arrays, placing them within the processor as reconfigurable coprocessors and functional units. This technique allows fine grained optimizations of small scale, highly repeated computations, but finds it difficult to replicate the gains made in large coarse grained optimizations. To achieve an even more tightly coupled design than any prior work, the fundamental architecture of the processor is changed. The datapath of the processor is eliminated and replaced with a network-on-chip communications framework. This framework connects a system of reconfigurable arrays. Some of these reconfigurable blocks are tasked with execution of standard, general purpose processor computations, emulating the standard pipeline stages of a SPARC processor. Additional reconfigurable blocks are available to the end-user to incorporate custom application specific optimizations. This new polymorphic NoC datapath (PolyNoC) processor is able to provide a more tightly integrated architecture with significant performance advantages. The PolyNoC processor is able to incorporate both fine and coarse grained optimizations, producing a polymorphic processor able to provide performance improvements for a wide range of target applications. This thesis presents the architectural design of the PolyNoC processor. The unique design constraints resulting from the use of the NoC as a datapath will be fully explored. The impact of these constraints will be incorporated into the design of a suitable NoC for the PolyNoC processor. A cycle-accurate simulator of the PolyNoC processor has been constructed. This simulator is used to examine the performance of the PolyNoC processor when executing unmodified, industry standard benchmark programs. To demonstrate the advantages of application specific extensions to the processor, accelerators are added for each benchmark. The performance of the Poly- NoC processor is promising.
Ph.D. Computer Science, May 2012
Show less
- Title
- CYBER ATTACKS AGAINST STATE ESTIMATION IN POWER SYSTEMS: VUNERABILITY ANALYSIS AND PROTECTION STRATEGIES
- Creator
- Liu, Xuan
- Date
- 2015, 2015-07
- Description
-
Power grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart...
Show morePower grid is one of the most critical infrastructures in a nation and could suffer a variety of cyber attacks. With the development of Smart Grid, cyber security has become an area of growing concern. False data injection attack has recently attracted wide research interest. This thesis proposes a false data attack model with incomplete network information and develops optimal attack strategies for attacking load measurements and the real-time topology of a power grid. The impacts of false data on the economic and reliable operations of power systems are quantitatively analyzed in this thesis. To mitigate the risk of cyber attacks, a distributed protection strategies are also developed. It has been shown that an attacker can design false data to avoid being detected by the control center if the network information of a power grid is known to the attacker. In practice, however, it is very hard or even impossible for an attacker to obtain all network information of a power grid. In this thesis, we propose a local load redistribution attacking model based on incomplete network information and show that an attacker only needs to obtain the network information of the local attacking region to inject false data into smart meters in the local region without being detected by the state estimator. A heuristic algorithm is developed to determine a feasible attacking region by obtaining reduced network information. This thesis investigates the impacts of false data on the operations of power systems. It has been shown that false data can be designed by an attacker to: 1) mask the real-time topology of a power grid; 2) overload a transmission line; 3) disturb the line outage detection based on PMU data. To mitigate the risk of cyber attacks, this thesis proposes a new protection strategy, which intends to mitigate the most damaging effect of LR attacks on power system operation. The objective is to mitigate the damage effects of false data injection attacks by increasing the attacking cost of an attacker. This is achieved by protecting a small set of critical measurements. To further reduce the computation complexity, we also propose a mixed integer linear programming approach to separate the power grid into several subnetworks, then distributed protection strategy is applied to each subnetwork. The results of this thesis reveal the mechanism of local false data injection attacks and highlight the importance and complexity of defending power systems against false data injection attacks.
Ph.D. in Electrical and Computer Engineering, July 2015
Show less
- Title
- TEMPORAL AND SPATIOTEMPORAL MODELS FOR SHORT-CRIME PREDICTION
- Creator
- Liu, Xiaomu
- Date
- 2017, 2017-07
- Description
-
One of the most important aspects of predictive policing is identifying the likely time and place of crime occurrences so as to prevent future...
Show moreOne of the most important aspects of predictive policing is identifying the likely time and place of crime occurrences so as to prevent future crimes. The ability to make short-term predictions may be of particular importance for optimizing police resource allocation. The goal of this study is to investigate the temporal and spatiotemporal pattern of crime in the city of Chicago and to build corresponding predictive models. First, a temporal model for forecasting citywide violent crime time count is proposed. This model is composed of a long-term trend and short-term variations using data of time, weather and crime. The importance of model reproducibility is addressed in this study to produce low-complexity models. We introduce an approach that provides a way to extend the model selection criterion to both prediction accuracy and model reproducibility. The experimental results show that models produced by this approach outperform several simple time-series models. It is also found that these models typically include fewer variables; therefore, they are more interpretable, and may provide superior generalization error. Next we develop a framework that provides predictions for tomorrow’s violent crime counts at the level of a police district. The procedures include citywide daily violent crime count prediction, violent crime density estimation, and distributing citywide predictions to districts according to the estimated densities. In order to estimate the crime spatial densities, we use mesh modeling and demonstrate that a mesh model can be used as the structure for modeling the spatial variation of crime rate since it is well adapted to the inhomogeneous crime distribution. The experimental results show that our method provides more-accurate forecasts than those given by historical crime statistics. One aspect of studying spatial pattern of crimes is identifying geographical regions with similar crime characteristics. Specifically, we illustrate applying unsupervised clustering techniques to segment the city into sub-regions. We explore the use of Gaussian mixture models combined with a Markov random field for the purpose of regularization. We also propose a framework for the evaluation of clustering models without knowing the ground truth, which can present a more-complete picture for model selection in unsupervised clustering problems. Finally, we develop a spatiotemporal prediction method that predicts the locations where violent crimes or property crimes are most likely to occur tomorrow. Crime incidents are rasterized by a spatiotemporal grid. Other factors that affect the time and location preferences of criminal activities are also leveraged and represented by that grid. Each spatiotemporal grid cell is treated as an example for training and testing our models. We also explore whether pooling data from various sub-regions based on spatial clustering can improve model performance. The experimental results show that our models are more accurate than conventional hot-spot models. It is found that the effects of using different training samples are not consistent, which depends on target crime type.
Ph.D. in Electrical Engineering, July 2017
Show less
- Title
- CROSS-ETHNIC VARIATION IN THE RELATION BETWEEN PARENT AND CHILD BEHAVIORS AND YOUNG CHILDREN’S ACADEMIC AND SOCIAL FUNCTIONING
- Creator
- Bae, Hyo
- Date
- 2011-04-20, 2011-05
- Description
-
The aim of this study was to determine if there is cross-ethnic variation in the relationships between parent behaviors, child behaviors, and...
Show moreThe aim of this study was to determine if there is cross-ethnic variation in the relationships between parent behaviors, child behaviors, and young children’s academic and social functioning. Participants included 96 African American, 117 Hispanic, and 395 White 5-year-old children and their parents. Self-reported parenting (Support/Engagement and Hostility/Coercion) was assessed with the Parent Behavior Inventory. Observed parent (Scaffolding) and child behaviors (Engagement/Persistence) were assessed using the Three Boxes Task videotaped parent-child interaction paradigm. Children’s academic skills were measured with three subtests of the Woodcock-Johnson Tests of Achievement-3rd Edition (Letter-Word Identification, Passage Comprehension, and Quantitative Concepts), and their social skills were measured with the Social Skills Rating System. Results of moderated regression analyses indicated that there were no direct effects of parenting on academic achievement, but that child Engagement/Persistence was related to academic achievement. With regard to social skills, Support/Engagement was related to Cooperation, Assertion, Responsibility, and Self-Control, while Hostility/Coercion was related to Cooperation, Responsibility, and Self-Control. Scaffolding was not directly related to social skills. Also, these analyses showed that the majority of these relationships were invariant across ethnic groups, with only a few significant interaction effects. Specifically, higher levels of Scaffolding were related to higher reading scores for African American children, while Scaffolding was not related to reading for White children. Although higher levels of Hostility/Coercion were related to lower reading scores for White children, this relationship was not significant for Hispanic children. Higher levels of Scaffolding were related to higher math scores for African American children. For White children, however, higher levels of Scaffolding were related to lower math scores. There were no ethnic differences in the relation between parent and child behaviors and social skills. Finally, results indicated that Scaffolding was indirectly related to academic and social functioning through Engagement/Persistence, and there was no ethnic variation in these relationships across African American, Hispanic, and White children. The implications of these findings and future directions for research are discussed.
Ph.D. in Psychology, May 2011.
Show less
- Title
- THEORETICAL ANALYSIS OF REAL-TIME SCHEDULING ON RESOURCES WITH PERFORMANCE DEGRADATION AND PERIODIC REJUVENATION
- Creator
- Hua, Xiayu
- Date
- 2017, 2017-07
- Description
-
In 1973, Liu and Layland [81] published their seminal paper on schedulability analysis of real-time system for both EDF and RM schedulers. In...
Show moreIn 1973, Liu and Layland [81] published their seminal paper on schedulability analysis of real-time system for both EDF and RM schedulers. In this work, they provide schedulability conditions and schedulability utilization bounds for both EDF and RM scheduling algorithms, respectively. In the following four decades, scheduling algorithms, utilization bounds and schedulability analyses for real-time tasks have been studied intensively. Amongst those studies, most of the research rely on a strong assumption that the performance of a computing resource does not change during its lifetime. Unfortunately, for many long standing real-time systems, such as data acquisition systems (DAQ) [74, 99], deep-space exploration programs [120, 119] and SCADA systems for power, water and other national infrastructures [121, 26], the performance of computational resources suffer notably performance degradations after a long and continuous execution period [61]. To overcome the performance degradation in long standing systems, countermeasures, which are also called system rejuvenation approaches in the literature [123, 61, 126], were introduced and studied in depth in the last two decades. Rejuvenation approaches recover system performance when being invoked and hence benefit most long standing applications [30, 102, 11, 12, 39]. However, for applications with real-time requirements, the system downtime caused by rejuvenation process, along with the decreasing performance during the system’s available time, makes the existing real-time scheduling theories difficult to be applied directly. To address this problem, this thesis studies the schedulability issues of a realtime task set running on long standing computing systems that suffers performance degradation and uses rejuvenation mechanism to recover. Our first study in the thesis focus on a simpler resource model, i.e. the periodic resource model, which only considers periodic rejuvenations. We introduce a method, i.e., Periodic Resource Integration, to combine multiple periodic resources into a single equivalent periodic resource and provide the schedulability analysis based on the combined periodic resource for real-time tasks. By integrating multiple periodic resources into one, existing real-time scheduling researches on single periodic resource can be directly applied on multiple periodic resources. In our second study, we extend the periodic resource mode to a new resource model, the P2-resource model, in our second work to characterize resources with both the performance degradation and the periodic rejuvenation. We formally define the P2-resource and analyze the schedulability of real-time task sets on a P2-resource. In particular, we first analyze the resource supply status of a given P2-resource and provide its supply bound and linear supply bound functions. We then developed the schedulability conditions for a task set running on a P2-resource with EDF or RM scheduling algorithms, respectively. We further derive utilization bounds of both EDF and RM scheduling algorithms, respectively, for schedulability test purposes. With the P2-resource model and the schedulability analysis on a single P2- resource, we further extend our work to multiple P2-resources. In this research, we 1) analyze the schedulability of a real-time task set on multiple P2-resources under fixedpriority scheduling algorithm, 2) introduce the GP-RM-P2 algorithm and 3) provide the utilization bound for this algorithm. Simulation results show that in most cases, the sufficient bounds we provide are tight. As the rejuvenation technology keeps advancing, many systems are now able to perform rejuvenations in different system layers. To accommodate this new advances, we study the schedulability conditions of a real-time task set on a single P2-resource with both cold or warm rejuvenations. We introduce a new resource model, the P2-resource with duel-level rejuvenation, i.e., P2D-resource, to accommodate this new feature. We first study the supply bound and the linear supply bound of a given P2D-resource. We then study the sufficient utilization bounds for both RM and EDF scheduling algorithms, respectively.
Ph.D. in Computer Science, July 2017
Show less
- Title
- CONTRIBUTIONS TO ALGORITHMIC MATROID PROBLEMS
- Creator
- Huang, Jinyu
- Date
- 2015, 2015-07
- Description
-
In this thesis, we obtain several algorithms for problems related to matroids, a structure that generalizes the concept of linear independence...
Show moreIn this thesis, we obtain several algorithms for problems related to matroids, a structure that generalizes the concept of linear independence in a vector space and an acyclic subgraph structure in a graph. Matroids have been widely applied in combinatorial optimization, graph theory, coding theory and so forth. Specifically, our results include: In this thesis, we present a constant-competitive online algorithm of the matroid secretary problem for the partition matroids without information of the partition and for the paving matroids. We also introduce the multi-objective matroid secretary problem that extends the matroid secretary problem, in which the weight function is a k-vector w = [w1, · · · , wk]. We show a constant competitive algorithm of the multiobjective matroid secretary problem for the uniform matroids and for the paving matroids. Since bases of a matroid generalize many important combinatorial structures, many counting problems can be expressed as a problem that counts the number of bases of a matroid. An efficient approximate counting algorithm can be designed provided that a rapidly-mixing Markov chain that samples bases of a matroid can be constructed. Let Φ(G) be the conductance of the base-exchange graph G. Matroid- Expansion Conjecture (1989, Mihai and Vazirani) states that Φ(G) ≥ 1 for any base-exchange graph G of a matroid, which implies an FPRAS (fully-polynomial randomized approximation scheme) for counting the number of bases of a matroid. We use λ2, the second smallest eigenvalue of L, the discrete Laplacian matrix of G, to prove the Matroid-Expansion Conjecture for any paving matroid, for any balanced matroid, and for the direct sum of a paving matroid with a balanced matroid. A maximum linear matroid parity set is called a basic matroid parity set, if its size is the rank of the matroid. We show that determining the existence of a common base (basic matroid parity set) for linear matroid intersection (linear matroid parity) is in NC2, provided that there are polynomial number of common bases (basic matroid parity sets). For graphic matroids, we show that finding a common base for matroid intersection is in NC2, if the number of common bases is polynomial bounded. We also give a new RNC2 algorithm that finds a common base for graphic matroid intersection. Finally, we prove that if there is a black-box NC algorithm for PIT (Polynomial Identity Testing), then there is an NC algorithm to determine the existence of a common base (basic matroid parity set) for linear matroid intersection (linear matroid parity).
Ph.D. in Applied Mathematics, July 2015
Show less
- Title
- ANTI-TUMOR SPLICING: RESTORING THE TUMOR SUPPRESSOR BAX IN MICROSATELLITE UNSTABLE TUMORS
- Creator
- Haferkamp, Bonnie
- Date
- 2011-11, 2011-12
- Description
-
Microsatellite instability (MSI) is a hallmark for many tumors, especially colon, endometrial, gastric and bladder. Bax, a tumor suppressor...
Show moreMicrosatellite instability (MSI) is a hallmark for many tumors, especially colon, endometrial, gastric and bladder. Bax, a tumor suppressor and pro-death Bcl-2 family member, is frequently mutated in MSI tumors. A microsatellite mutation produces a frameshift with premature termination, leading to “Bax-negative” tumors. Although low Bax expression in tumors is often associated with poor prognosis, several studies have correlated lack of Bax in MSI tumors with improved prognosis. However, the molecular explanation for this paradox is unknown. Here we show that “Bax-negative” tumors in fact generate a novel family of anti-tumor Bax-MSI isoforms through alternative splicing. The thesis includes two parts. In Chapter One, we fully characterize one Bax-MSI isoform, BaxΔ2. We show that BaxΔ2 is detrimental to cancer cells but through a non-conventional death pathway, with differential sensitivity to chemotherapeutics. In Chapter Two, we present an entire family of Bax-MSI isoforms, and illustrate a potential molecular mechanism behind its production. We show that the frequency of Bax alternative splicing is significantly higher in MSI than non-MSI tumors, and that BaxΔ2 trans splicing requirements are ubiquitous in human cell lines. The discovery of functional Bax isoforms in Bax-mutated tumors may help explain why the apparent loss of Baxα in tumors is sometimes associated with a better prognosis. In addition, the unique sequences of Bax-MSI isoforms can serve as biomarkers for diagnostic and treatment purposes. Importantly, identification of Bax-MSI isoforms will provide a great opportunity from a genetic approach or drug design for treatment of MSI cancer.
Ph.D. in Biology, December 2011
Show less
- Title
- RUMINATION AS A PROCESS THROUGH WHICH COGNITIVE VULNERABILITIES ARE RELATED TO NEGATIVE AFFECT ON BOTH THE TRAIT- AND STATE-LEVEL
- Creator
- Hutman, Paul J.
- Date
- 2017, 2017-07
- Description
-
The purpose of this paper is twofold. First, it reviewed the empirical and theoretical literature on rumination as well as three cognitive...
Show moreThe purpose of this paper is twofold. First, it reviewed the empirical and theoretical literature on rumination as well as three cognitive vulnerabilities (intolerance of uncertainty, positive meta-cognitive beliefs about rumination, and thought suppression) associated with negative emotionality. Second, this paper tested trait- and state-level hypotheses that posit (a) rumination is a mediator that connects the three cognitive vulnerabilities to general negative affect and (b) each cognitive vulnerability has a unique relationship to rumination. Rumination is a transdiagnostic and passive, repetitive thought process known to incite and perpetuate a number of negative emotional states and hinder instrumental behavior (e.g., treatment adherence and social support). Although mainly studied as a trait-like tendency, research studying the act of ruminating found it to be a ubiquitous process, experienced as self-focused, unpleasant, and uncontrollable. Ruminating has a number of precipitants (cognitive avoidance, experiencing acute stress, and receiving negative feedback), occurs more often in those experiencing depression, and is associated with inciting or exacerbating negative emotional states (regardless of one’s diagnostic status). To test hypotheses, data was gathered from 77 adults, half reporting a mental health diagnosis, who reported on the intensity with which they experience the cognitive vulnerabilities, rumination, and negative affect on both the trait- and state-level. Findings support rumination as a process through which cognitive vulnerabilities are connected to negative emotionality. Findings indicate all cognitive vulnerabilities were uniquely predictive of rumination when measured as a trait, but only thought suppression uniquely predicted the act of ruminating. Emphasis was placed on discussion of the theoretical and clinical implications of these findings and potential directions for future research.
Ph.D. in Psychology, July 2017
Show less
- Title
- DYNAMIC ANALYSIS OF UNCERTAIN STRUCTURES USING IMPRECISE PROBABILIY
- Creator
- Bergerson, Joshua D.
- Date
- 2014, 2014-05
- Description
-
A new method for dynamic response spectrum analysis of structures with uncertainty in their mechanical properties utilizing the notion of...
Show moreA new method for dynamic response spectrum analysis of structures with uncertainty in their mechanical properties utilizing the notion of imprecise probability is developed. This finite-element-based method is capable of obtaining probabilistic bounds of the dynamic response of the structure with uncertainty defined by enveloping p-boxes. The developed method obtains probabilistic bounds on 1) the mode shapes, 2) modal coordinates, and 3) modal participation factor, leading to the p-boxes of modal responses. Finally maximum modal responses are combined to obtain the structure’s maximum total response with consideration of uncertainty. Numerical examples demonstrating the developed method are included. Keywords: Structural Dynamics, Uncertainty, Imprecise Probability, P-Box.
PH.D in Civil Engineering, May 2014
Show less
- Title
- PREDICTING CORTICAL RESPONSE DURING TRANSCRANIAL MAGNETIC STIMULATION IN HUMANS
- Creator
- Krieg, Todd
- Date
- 2014, 2014-07
- Description
-
Transcranial magnetic stimulation (TMS) is capable of noninvasively activating neurons in the brain. TMS can induce persistent effects and is...
Show moreTranscranial magnetic stimulation (TMS) is capable of noninvasively activating neurons in the brain. TMS can induce persistent effects and is being increasingly used in both clinical and research applications. Despite this growing interest, the relationship between TMS-generated electric fields (E-fields) and specific cortical electrophysiological responses is not well understood. Most analytical approaches focus on applied magnetic field strength in the target region as the primary factor, placing activation on the gyral crowns. However, imaging studies show cortical targets are typically located in the sulcal banks. To study this causal relationship, we combined subject-specific detailed finite element modeling (FEM) to calculate induced E-field information and employed concurrent TMS-PET data as a measure of cortical response. The research presented in this work is divided into three main parts, each one building on the results of the previous: (1) We determined that neocortical surface orientation was a critical determinant of regional activation by studying the locations of activation during TMS on the cortical surface. Results indicated that brain activations were primarily sulcal for both the TMS and task activations. This study provided further evidence that a major factor in cortical activation during TMS is the orientation of the cortical surface with respect to the induced E-fields. This was demonstrated by the fact that the sulcal bank of the primary motor cortex had larger cerebral blood flow (CBF) responses during TMS despite the gyral crown of the cortex being subjected to a larger magnetic field magnitude. (2) We sought to determine the E-field characteristics that lead to cortical activation. We found that decomposing the E-field into orthogonal vector components based on the cortical surface geometry (and hence, cortical neuron directions) led to significant differences between the regions of cortex that were active and non-active. Specifically, active regions had significantly higher E-field components in the normal orthodromic direction (i.e., parallel to pyramidal neurons in the dendrite-to-axon orientation) and in the tangential direction (i.e., parallel to interneurons) at high spatial gradient. In contrast, nonactive regions had higher E-field vectors in the antidromic normal direction. This provides important new understanding of the factors by which TMS induces cortical activation necessary for predictive and repeatable use of this noninvasive stimulation modality. (3) Finally, two different but related algorithms were formulated using different optimization approaches that provide a means for predicting topographical maps of cortical activation in humans. This is the first study to produce an algorithm for predicting the electrophysiological responses of neurons in the cortex based on both gross and microscopic brain anatomy correlated to relevant experimental recordings. This new innovation could provide an invaluable tool for predicting regions of cortical activation that may permit, among other benefits, improved prescriptive TMS protocols to optimize therapeutic response to TMS treatment.
Ph.D. in Biomedical Engineering, July 2014
Show less
- Title
- AN AUTOMATED ENGINEERING PROCESS TO VERIFY THE CORRECT COORDINATION OF MULTILAYER RECOVERY
- Creator
- Kroculick, Joseph
- Date
- 2017, 2017-05
- Description
-
Recovery is a critical function in backbone networks. The primary function of recovery is to provide connectivity regardless of which layer...
Show moreRecovery is a critical function in backbone networks. The primary function of recovery is to provide connectivity regardless of which layer recovery operates at. Another function of recovery is for all services traversing a failed link to be restored in a way that is consistent with a service user’s requirements. These requirements can include the consideration of factors such as (1) the cost of recovery, (2) the amount of traffic restored, and (3) the delay in restoring units of traffic. With more options available to recover traffic, providing an integrated recovery solution is necessary. An important force driving the evolution of network devices to transport services such as IP traffic is the layering of network resources. Layering enables networks to increase capacity by extending legacy SONET networks to interface with optical wavelengths. Inconsistent provisioning can prevent service continuity from being achieved during a failure. Continuity of service has been recognized as one key business goal. Furthermore, since recovery can occur at a different time than when it is provisioned, inconsistent provisioning is determined after the fact, with services left unrepaired, repaired unnecessarily at an extra cost, or not repaired fast enough. A network manager can check if recovery is consistent with a global perspective on how traffic should be restored by comparing the provisioning at each device against suitable properties of a formal representation. To address this issue an engineering method was developed to detect errors in provisioning automated recovery processes in multilayer and multiprotocol transport networks. This dependability assessment process (DAP) leverages inference techniques provided by Semantic Web technologies in order to detect network-device provisioning errors. Provisioning should be accompanied by methodologies, processes, and activities to ensure that it can be trusted to achieve a desired network state. The DAP takes into account unique constraints in the telecommunications domain including bottom-up evolution of physical layer technologies to provide connectivity, and lack of a universal model of network functionality. This method is applied to assessing the correctness of provisioning decisions for a protection switching application in a transport network in both the spatial and temporal domains.
Ph.D. in Computer Science, May 2017
Show less
- Title
- ANANALYSIS OF ZOO AND AQUARIUM PROVIDED TEACHER PROFESSIONAL DEVELOPMENT
- Creator
- Kubarek-sandor, Joy
- Date
- 2014, 2014-12
- Description
-
Informal science institutions are a significant provider of science teacher professional development. As pressure continues to critically...
Show moreInformal science institutions are a significant provider of science teacher professional development. As pressure continues to critically analyze the work of teachers and their effectiveness in the classroom, it is important to understand how informal science institutions contribute to effective change in teacher science content knowledge and pedagogy. This research study analyzed zoo and aquarium provided teacher professional development to respond to the research questions: How do zoos and aquaria determine and assess their goals for teacher professional development? How do these goals align with effective teacher change for science content knowledge and pedagogy? Theoretical frameworks for high quality teacher professional development, effective evaluation of teacher professional development, and learning in informal science settings guided the research. The sample for the study was AZA accredited zoos and aquariums providing teacher professional development (N=107). Data collection consisted of an online questionnaire, follow-up interviews, and content analysis of teacher professional development artifacts. Analysis revealed that by and large zoos and aquariums are lacking in their provision of science teacher professional development. Most professional development focuses on content or resources, neglecting pedagogy. Assessments mismatch the goals and rely heavily on self-report and satisfaction measures. The results demonstrate a marked difference between those zoos and aquariums that are larger in capacity versus those that are medium to small in size. This may be an area of research for the future, as well as analyzing the education resources produced by zoos and aquariums as these were emphasized heavily as a way they serve teachers.
Ph.D. in Mathematics and Science Education, December 2014
Show less