Current Search: Computer networks (x)
View All Items
Pages
- Title
- Help or hype?: the role of Internet marketing in rural development strategies.
- Creator
- Klaas, Kathryn, Harriet L. Wilkes Honors College
- Abstract/Description
-
International development literature suggests that Internet marketing has the potential to play an important role in rural development. Despite the abundant theoretical support for incorporating Internet marketing into development strategies, there is little empirical evidence regarding whether Internet marketing actually generates development. This thesis helps fill this gap in the literature by investigating whether one Internet marketing application associated with development, competitive...
Show moreInternational development literature suggests that Internet marketing has the potential to play an important role in rural development. Despite the abundant theoretical support for incorporating Internet marketing into development strategies, there is little empirical evidence regarding whether Internet marketing actually generates development. This thesis helps fill this gap in the literature by investigating whether one Internet marketing application associated with development, competitive-online auctions (COAs), contributes to growth and poverty reduction. An analysis of price premiums earned in Latin American specialty coffee auctions and interviews with participating coffee farmers suggest that this application's strength lies in its ability to catalyze development; it provides the foundation from which farmers can pursue above-market prices, access new markets, and improve local living conditions. However, evidence also emphasizes that COAs do not inevitably advance development goals because their ability to do so is contingent on external factors, including the actions taken by individual farmers.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/209992
- Subject Headings
- Internet marketing, Small business, Computer network resources, Developmental economics, Rural development, Information technology, Economic aspects
- Format
- Document (PDF)
- Title
- Exploring teachers' perceptions of professional development in virtual learning teams.
- Creator
- Purnell, Courtney Paschal., College of Education, Department of Educational Leadership and Research Methodology
- Abstract/Description
-
The demand for virtual education is rapidly increasing due to the proliferation of legislation demanding class size limitations, funding cuts, and school choice across the United States. Virtual education leaders are discovering new ways to enhance and develop teachers to become more efficient and increase quality of learning online. Learning teams are one tool implemented by professional development departments in order to obtain a community of shared best practices and increase professional...
Show moreThe demand for virtual education is rapidly increasing due to the proliferation of legislation demanding class size limitations, funding cuts, and school choice across the United States. Virtual education leaders are discovering new ways to enhance and develop teachers to become more efficient and increase quality of learning online. Learning teams are one tool implemented by professional development departments in order to obtain a community of shared best practices and increase professional learning for teachers. ... The purpose of this exploratory case study was to investigate teachers' perceptions of the contribution of virtual learning teams to their professional development in a completely online K-12 environment. ... Five major themes emerged from the interviews, which were teacher professional development as it relates to student success, collaboration, balance, knowledge gained from being part of a virtual learning team, and teachers' perception of student success.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3358964
- Subject Headings
- Education, Effect of technological innovations on, Educational leadership, School management and organization, Teams in the workplace, Group work in education, Professional learning communities, Mentoring in education, Computer networks
- Format
- Document (PDF)
- Title
- Time-frequency classification of gamma oscillatory activity in the frontoparietal system during working memory.
- Creator
- Romano, Tracy A., Bressler, Steven L., Florida Atlantic University, Charles E. Schmidt College of Science, Center for Complex Systems and Brain Sciences
- Abstract/Description
-
Working memory (WM) is a process that allows for the temporary and limited storage of information for an immediate goal or to be stored into a more permanent system. A large number of studies have led to the widely accepted view that WM is mediated by the frontoparietal network (FPN), consisting of areas in the prefrontal cortex (PFC) and posterior parietal cortex (PPC). Current evidence suggests that task specific patterns of neuronal oscillatory activity within the FPN play a fundamental...
Show moreWorking memory (WM) is a process that allows for the temporary and limited storage of information for an immediate goal or to be stored into a more permanent system. A large number of studies have led to the widely accepted view that WM is mediated by the frontoparietal network (FPN), consisting of areas in the prefrontal cortex (PFC) and posterior parietal cortex (PPC). Current evidence suggests that task specific patterns of neuronal oscillatory activity within the FPN play a fundamental role in WM, and yet specific spatio-temporal properties of this activity are not well characterized. This study utilized multisite local field potential (LFP) data recorded from PFC and PPC sites in two macaque monkeys trained to perform a rule-based, Oculomotor Delayed Match-to-Sample task. The animals were required to learn which of two rules determined the correct match (Location matching or Identity matching). Following a 500 ms fixation period, a sample stimulus was presented for 500 ms, followed by a randomized delay lasting 800-1200 ms in which no stimulus was present. At the end of the delay period, a match stimulus was presented, consisting of two of three possible objects presented at two of three possible locations. When the match stimulus appeared, the monkey made a saccadic eye movement to the target. The rule in effect determined which object served as the target. Time-frequency plots of three spectral measures (power, coherence, and Wiener Granger Causality (WGC) were computed from MultiVariate AutoRegressive LFP time-series models estimated in a 100-ms window that was slid across each of three analysis epochs (fixation, sample, and delay). Low (25- 55 Hz) and high gamma (65- 100 Hz) activity were investigated separately due to evidence that they may be functionally distinct. Within each epoch, recording sites in the PPC and PFC were classified into groups according to the similarity of their power t-f plots derived by a K-means clustering algorithm. From the power-based site groups, the corresponding coherence and WGC were analyzed. This classification procedure uncovered spatial, temporal, and frequency dynamics of FPN involvement in WM and other co-occurring processes, such as sensory and target related processes. These processes were distinguishable by rule and performance accuracy across all three spectral measures- power, coherence, and WGC. Location and Identity rule were distinguishable by the low and high-gamma range.
Show less - Date Issued
- 2014
- PURL
- http://purl.flvc.org/fau/fd/FA00004157
- Subject Headings
- Brain--Physiology., Biological rhythms., Attention--Physiological aspects., Cognitive neuroscience., Memory--Age factors., Short-term memory., Neural networks (Computer science)
- Format
- Document (PDF)
- Title
- A min/max algorithm for cubic splines over k-partitions.
- Creator
- Golinko, Eric David, Charles E. Schmidt College of Science, Department of Mathematical Sciences
- Abstract/Description
-
The focus of this thesis is to statistically model violent crime rates against population over the years 1960-2009 for the United States. We approach this question as to be of interest since the trend of population for individual states follows different patterns. We propose here a method which employs cubic spline regression modeling. First we introduce a minimum/maximum algorithm that will identify potential knots. Then we employ least squares estimation to find potential regression...
Show moreThe focus of this thesis is to statistically model violent crime rates against population over the years 1960-2009 for the United States. We approach this question as to be of interest since the trend of population for individual states follows different patterns. We propose here a method which employs cubic spline regression modeling. First we introduce a minimum/maximum algorithm that will identify potential knots. Then we employ least squares estimation to find potential regression coefficients based upon the cubic spline model and the knots chosen by the minimum/maximum algorithm. We then utilize the best subsets regression method to aid in model selection in which we find the minimum value of the Bayesian Information Criteria. Finally, we preent the R2adj as a measure of overall goodness of fit of our selected model. We have found among the fifty states and Washington D.C., 42 out of 51 showed an R2adj value that was greater than 90%. We also present an overall model of the United States. Also, we show additional applications our algorithm for data which show a non linear association. It is hoped that our method can serve as a unified model for violent crime rate over future years.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342107
- Subject Headings
- Spline theory, Data processing, Bayesian statistical decision theory, Data processing, Neural networks (Computer science), Mathematical statistics, Uncertainty (Information theory), Probabilities, Regression analysis
- Format
- Document (PDF)
- Title
- Stochastic optimization of energy for multi-user wireless networks over fading channels.
- Creator
- Wang, Di, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Wireless devices in wireless networks are powered typically by small batteries that are not replaceable nor recharged in a convenient way. To prolong the operating lifetime of networks, energy efficiency is indicated as a critical issue and energy-efficient resource allocation designs have been extensively developed. We investigated energy-efficient schemes that prolong network operating lifetime in wireless sensor networks and in wireless relay networks. In Chapter 2, the energy-efficient...
Show moreWireless devices in wireless networks are powered typically by small batteries that are not replaceable nor recharged in a convenient way. To prolong the operating lifetime of networks, energy efficiency is indicated as a critical issue and energy-efficient resource allocation designs have been extensively developed. We investigated energy-efficient schemes that prolong network operating lifetime in wireless sensor networks and in wireless relay networks. In Chapter 2, the energy-efficient resource allocation that minimizes a general cost function of average user powers for small- or medium-scale wireless sensor networks, where the simple time-division multiple-access (TDMA) is adopted as the multiple access scheme. A class of Ç-fair cost-functions is derived to balance the tradeoff between efficiency and fairness in energy-efficient designs. Based on such cost functions, optimal channel-adaptive resource allocation schemes are developed for both single-hop and multi-hop TDMA sensor networks. In Chapter 3, optimal power control methods to balance the tradeoff between energy efficiency and fairness for wireless cooperative networks are developed. It is important to maximize power efficiency by minimizing power consumption for a given quality of service, such as the data rate; it is also equally important to evenly or fairly distribute power consumption to all nodes to maximize the network life. The optimal power control policy proposed is derived in a quasi-closed form by solving a convex optimization problem with a properly chosen cost-function. To further optimize a wireless relay network performance, an orthogonal frequency division multiplexing (OFDM) based multi-user wireless relay network is considered in Chapter 4., In the OFDM approach, each subcarrier is dynamically assigned to a source- destination link, and several relays assist communication between pairs of source-destination over their assigned subcarriers. Using a class of Ç-fair cost-functions to balance the tradeoff between energy efficiency and fairness, jointly with optimal subcarrier and power allocation schemes at the relays. Relevant algorithms are derived in quasi-closed form. Lastly, the proposed energy-efficient schemes are summarized and future work is discussed in Chapter 5.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3322519
- Subject Headings
- Stochastic processes, Data processing, Wireless communication systems, Mathematical models, Computer network protocols, Signal processing, Digital techniques, Code division multiple access, Waveless division multiplexing, Orthogonalization methods
- Format
- Document (PDF)
- Title
- Studies on Stochastic Multi-user Scheduling in Wireless Communication.
- Creator
- Wang, Di, Morgera, Salvatore D., Wang, Xin, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We developed a cross layer design which combines retransmission diversity and multi-user diversity for wireless communication. To this end, a joint design of adaptive modulation and coding with retransmission-based automatic repeat request protocol is outlined. This design is applied to devise multi-user scheduling schemes, which can optimally capture the available multi-user and retransmission diversities. In addition, the proposed on-line scheduling algorithms can operate even when the...
Show moreWe developed a cross layer design which combines retransmission diversity and multi-user diversity for wireless communication. To this end, a joint design of adaptive modulation and coding with retransmission-based automatic repeat request protocol is outlined. This design is applied to devise multi-user scheduling schemes, which can optimally capture the available multi-user and retransmission diversities. In addition, the proposed on-line scheduling algorithms can operate even when the underl ying fading channel distribution is unknown, while asymptotically converging to the offline benchmark with guarantees on prescribed fairness and rate requirements. Numerical results are provided to verify the merits of our novel schemes for multi-user transmissions over Nakagami block fading channels.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/fau/fd/FA00012568
- Subject Headings
- Stochastic processes--Data processing, Wireless communication systems, Computer network protocols, Code division multiple access, Modulation (Electronics), Signal processing--Digital techniques
- Format
- Document (PDF)
- Title
- Big 4 global networks: degree of homogeneity of audit quality among affiliates and relevance of PCAOB inspections.
- Creator
- Kassawat, Paulina M., Higgs, Julia, Florida Atlantic University, College of Business, School of Accounting
- Abstract/Description
-
The Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S....
Show moreThe Big 4 global networks (Deloitte, Ernst & Young [E&Y], KPMG, and PricewaterhouseCoopers [PwC]) market themselves as providers of worldwide seamless services and consistent audit quality through their members. Under the current environment in which these auditors operate, there are three types of global network members: inspected non-U.S. affiliates (inspected affiliates, hereafter), non-inspected non-U.S. affiliates (non-inspected affiliates, hereafter), and inspected U.S. offices (U.S. offices, hereafter). The recent suspension of the China-based Big 4 affiliates from auditing U.S.-listed companies calls into question whether these global networks can deliver the same level of audit quality across all their members and whether those located in jurisdictions denying access to the Public Company Accounting Oversight Board (PCAOB or Board, hereafter) to conduct inspections may benefit from such inspections. This study examines the effect of being an affiliate and the effect of PCAOB inspections on perceived audit quality. I use earnings response coefficients (ERCs) as a proxy for perceived audit quality.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004385, http://purl.flvc.org/fau/fd/FA00004385
- Subject Headings
- Auditing standards -- United States, Business enterprises -- Computer networks, Corporate governance, Disclosure in accounting -- United States, Financial services industry -- Management, Government accountability, Intternational standard on auditing, Public Company Accounting Oversight Board
- Format
- Document (PDF)
- Title
- Caring in nurse managers as described by staff nurses.
- Creator
- Swinderman, Todd D., Florida Atlantic University, Ray, Marilyn A.
- Abstract/Description
-
A descriptive study of caring in nurse managers as described by staff nurses is presented. Five participants provided data from semi-structured, open ended, audiotape recorded interviews. The transcribed interview data were coded, concepts were identified, and the conceptual unit of meaning emerged. A conceptual model was developed and subsequently was analyzed in relation to Boykin's and Schoenhofer's (1993) Nursing as Caring Theory. It was discovered that staff nurses respect a nurse...
Show moreA descriptive study of caring in nurse managers as described by staff nurses is presented. Five participants provided data from semi-structured, open ended, audiotape recorded interviews. The transcribed interview data were coded, concepts were identified, and the conceptual unit of meaning emerged. A conceptual model was developed and subsequently was analyzed in relation to Boykin's and Schoenhofer's (1993) Nursing as Caring Theory. It was discovered that staff nurses respect a nurse manager when she participates in direct nursing care, provides for the overall needs of the unit by negotiating with administrators, and nurtures nurses through listening to, encouraging, supporting and role modeling. Recommendations for nursing administration, practice, education and research are presented.
Show less - Date Issued
- 1997
- PURL
- http://purl.flvc.org/fcla/dt/15443
- Subject Headings
- Nurse administrators, Caring, Nursing services--Administration, Nursing informatics, Nursing--Computer network resources, Nursing--Data processing, Information storage and retrieval systems--Nursing, Nursing records, Nursing--Statistical services
- Format
- Document (PDF)
- Title
- Modeling access control of medical information.
- Creator
- Sorgente, Tami W., Florida Atlantic University, Fernandez, Eduardo B., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Medical information is very private and sensitive. With the digitization of medical data, it is becoming accessible through distributed systems, including the Internet. Access to all this information and appropriate exchange of data makes the job of health providers more effective, however, the number of people that can potentially access this information increases by orders of magnitude. Private health information is not well protected. We present guidelines for security models for medical...
Show moreMedical information is very private and sensitive. With the digitization of medical data, it is becoming accessible through distributed systems, including the Internet. Access to all this information and appropriate exchange of data makes the job of health providers more effective, however, the number of people that can potentially access this information increases by orders of magnitude. Private health information is not well protected. We present guidelines for security models for medical information systems. First, we model the structure of the medical information in the form of object-oriented patterns. Second, we study models and patterns in use today and compare them to our patterns. Next we define requirements necessary for controlling access, and describe the common policies and restrictions of security models for medical applications. We present some of the medical record access control restrictions directly in a conceptual model of the medical information.
Show less - Date Issued
- 2004
- PURL
- http://purl.flvc.org/fcla/dt/13163
- Subject Headings
- Medical records--Access control, Privacy, Right of, Freedom of information, Medical records--Data processing, Medicine--Research--Moral and ethical aspects, Confidential communications, Medical ethics, Information storage and retrieval systems--Medical care, Medical informatics, Computer security, Medicine--Computer networks
- Format
- Document (PDF)