Current Search: Mobile computing (x)
View All Items
Pages
- Title
- VoIP Network Security and Forensic Models using Patterns.
- Creator
- Pelaez, Juan C., Fernandez, Eduardo B., Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Voice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred....
Show moreVoice over Internet Protocol (VoIP) networks is becoming the most popular telephony system in the world. However, studies of the security of VoIP networks are still in their infancy. VoIP devices and networks are commonly attacked, and it is therefore necessary to analyze the threats against the converged network and the techniques that exist today to stop or mitigate these attacks. We also need to understand what evidence can be obtained from the VoIP system after an attack has occurred. Many of these attacks occur in similar ways in different contexts or environments. Generic solutions to these issues can be expressed as patterns. A pattern can be used to guide the design or simulation of VoIP systems as an abstract solution to a problem in this environment. Patterns have shown their value in developing good quality software and we expect that their application to VoIP will also prove valuable to build secure systems. This dissertation presents a variety of patterns (architectural, attack, forensic and security patterns). These patterns will help forensic analysts as well, as secure systems developers because they provide a systematic approach to structure the required information and help understand system weaknesses. The patterns will also allow us to specify, analyze and implement network security investigations for different architectures. The pattern system uses object-oriented modeling (Unified Modeling Language) as a way to formalize the information and dynamics of attacks and systems.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/fau/fd/FA00012576
- Subject Headings
- Internet telephony--Security measures, Computer network protocols, Global system for mobile communications, Software engineering
- Format
- Document (PDF)
- Title
- Implementations Of The DTM, DADCQ And SLAB VANET Broadcast Protocols For The Ns-3 Simulator.
- Creator
- Alwakeel, Ahmed M., Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean...
Show moreThis work presents the implementations of three adaptive broadcast protocols for vehicular ad hoc networks (VANET) using the Network Simulator 3 (Ns-3). Performing real life tests for VANET protocols is very costly and risky, so simulation becomes a viable alternative technique. Ns-3 is one of the most advanced open source network simulators. Yet Ns-3 lacks implementations of broadcast protocols for VANET. We first implement the Distance to Mean (DTM) protocol, which uses the distance to mean to determine if a node should rebroadcast or not. We then implement the Distribution-Adaptive Distance with Channel Quality (DADCQ) protocol, which uses node distribution, channel quality and distance to determine if a node should favor rebroadcasting. The third protocol, Statistical Location-Assisted Broadcast protocol (SLAB), is an improvement of DADCQ which automates the threshold function design using machine learning. Our NS-3 implementations of the three protocols have been validated against their JiST/SWANS implementations.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004565, http://purl.flvc.org/fau/fd/FA00004565
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Technological innovations., Wireless communication systems--Technological innovations., Mobile communication systems--Technological innovations., Mobile computing., Intelligent transportation systems--Mathematical models., Routing protocols (Computer network protocols)
- Format
- Document (PDF)
- Title
- An uncertainty-aware reputation system in mobile networks: analysis and applications.
- Creator
- Li, Feng., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Many emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on...
Show moreMany emerging mobile networks aim to provide wireless network services without relying on any infrastructure. The main challenge in these networks comes from their self-organized and distributed nature. There is an inherent reliance on collaboration among the participants in order to achieve the aimed functionalities. Therefore, establishing and quantifying trust, which is the driving force for collaboration, is important for applications in mobile networks. This dissertation focuses on evaluating and quantifying trust to stimulate collaboration in mobile networks, introducing uncertainty concepts and metrics, as well as providing the various analysis and applications of uncertainty-aware reputation systems. Many existing reputation systems sharply divide the trust value into right or wrong, thus ignoring another core dimension of trust: uncertainty. As uncertainty deeply impacts a node's anticipation of others' behavior and decisions during interaction, we include it in the reputation system. Specifically, we use an uncertainty metric to directly reflect a node's confidence in the sufficiency of its past experience, and study how the collection of trust information may affect uncertainty in nodes' opinions. Higher uncertainty leads to higher transaction cost and reduced acceptance of communication. We exploit mobility to efficiently reduce uncertainty and to speed up trust convergence. We also apply the new reputation system to enhance the analysis of the interactions among mobile nodes, and present three sample uncertainty-aware applications. We integrate the uncertainty-aware reputation model with game theory tools, and enhance the analysis on interactions among mobile nodes., Instead of reactively protecting the mobile networks from existing attacks as in the traditional security paradigms, the analysis in this dissertation gives more insights on nodes' rationality in the interaction, which will enable the mechanism design in mobile networks to be security and incentive compatible. Moreover, we present three sample applications, in which we clearly identify the challenges, specifically formalize the problems, and cleverly employ the uncertainty mitigation schemes. These applications show that the uncertainty definition and mitigation schemes can benefit a broad range of applications, including fields such as security, network services, and routing.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/210520
- Subject Headings
- Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Computer network architectures, Mobile computing, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Joint TCP congestion control and wireless-link scheduling for mobile Internet applications.
- Creator
- Li, Zhaoquan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude...
Show moreThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude in the past decade. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication environment, and develop joint TCP congestion control and wireless-link scheduling schemes for mobile applications. ... Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployable with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362481
- Subject Headings
- Wireless communication systems, Quality control, Mobile communication systems, Technological innovations, TCP/IP (Computer network protocol), Ad hoc networks (Computer networks), Computer network protocols, Wireless Internet
- Format
- Document (PDF)
- Title
- Simulator and location-aware routing protocol for mobile ad hoc acoustic networks of AUVs.
- Creator
- Carlson, Edward A., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Acoustic networks of autonomous underwater vehicles (AUVs) show great promise, but a lack of simulation tools and reliance on protocols originally developed for terrestrial radio networks has hindered progress. This work addresses both issues. A new simulator of underwater communication among AUVs provides accurate communication modeling and flexible vehicle behavior, while a new routing protocol, location-aware source routing (LASR) provides superior network performance. The new simulator...
Show moreAcoustic networks of autonomous underwater vehicles (AUVs) show great promise, but a lack of simulation tools and reliance on protocols originally developed for terrestrial radio networks has hindered progress. This work addresses both issues. A new simulator of underwater communication among AUVs provides accurate communication modeling and flexible vehicle behavior, while a new routing protocol, location-aware source routing (LASR) provides superior network performance. The new simulator was used to evaluate communication without networking, and then with networking using the coding or dynamic source routing (DSR) protocols. The results confirmed that a network was essential to ensure effective fleet-wide communication. The flooding protocol provided extremely reliable communication but with low message volumes. The DSR protocol, a popular routing protocol due to its effectiveness in terrestrial radio networks, proved to be a bad choice in an acoustic environment: in most cases, it suffered from both poor reliability and low message volumes. Due to the high acoustic latency, even moderate vehicle speeds caused the network topology to change faster than DSR could adapt. DSR's reliance on shortest-path routing also proved to be a significant disadvantage. Several DSR optimizations were also tested; most proved to be unhelpful or actually harmful in an underwater acoustic network. LASR was developed to address the problems noted in flooding and DSR. LASR was loosely derived from DSR, most significantly retaining source routes and the reply/request route discovery technique. However, LASR added features which proved, in simulation, to be significant advantages -- two of the most effective were a link/route metric and a node tracking system. To replace shortest-path routing, LASR used the expected transmission count (ETX) metric., This allowed LASR to make more informed routing decisions which greatly increased performance compared to DSR. The node tracking system was the most novel addition: using only implicit communication coupled with the use of time-division multiple access (TDMA), the tracking system provided predicted node locations. These predictions made it possible for LASR to proactively respond to topology changes. In most cases, LASR outperformed flooding and DSR in message delivery reliability and message delivery volume.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/187208
- Subject Headings
- Ad hoc networks (Computer networks), Computer network protocols, Routers (Computer networks), Mobile communication systems, Design and construction, Remote submersibles, Design and construction
- Format
- Document (PDF)
- Title
- Task allocation and path planning for acoustic networks of AUVs.
- Creator
- Deng, Yueyue, College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
Controlling the cooperative behaviors of a fleet of autonomous underwater vehicles in a stochastic, complex environment is a formidable challenge in artificial intelligence. The complexity arises from the challenges of limited navigation and communication capabilities of underwater environment. A time critical cooperative operation by acoustic networks of Multiple Cooperative Vehicles (MCVs) necessitates a robust task allocation mechanism and an efficient path planning model. In this work, we...
Show moreControlling the cooperative behaviors of a fleet of autonomous underwater vehicles in a stochastic, complex environment is a formidable challenge in artificial intelligence. The complexity arises from the challenges of limited navigation and communication capabilities of underwater environment. A time critical cooperative operation by acoustic networks of Multiple Cooperative Vehicles (MCVs) necessitates a robust task allocation mechanism and an efficient path planning model. In this work, we present solutions to investigate two aspects of the cooperative schema for multiple underwater vehicles under realistic underwater acoustic communications: a Location-aided Task Allocation Framework (LAAF) algorithm for multi-target task assignment and a mathematical programming model, the Grid-based Multi-Objective Optimal Programming (GMOOP), for finding an optimal vehicle command decision given a set of objectives and constraints. We demonstrate that, the location-aided auction strategies perform significantly better than the generic auction algorithm in terms of effective task allocation time and information bandwidth requirements. In a typical task assignment scenario, the time needed in the LAAF algorithm is only a fraction compared to the generic auction algorithm. On the other hand; the GMOOP path planning technique provides a unique means for multi-objective tasks by cooperative agents with limited communication capabilities. Under different environmental settings, the GMOOP path planning technique is proved to provide a method with balance of sufficient expressive power and flexibility, and its solution algorithms tractable in terms of mission completion time, with a limited increase of overhead in acoustic communication. Prior to this work, existing multi-objective action selection methods were limited to robust networks where constant communication available., The dynamic task allocation, together with the GMOOP path planning controller, provides a comprehensive solution to the search-classify tasks for cooperative AUVs.
Show less - Date Issued
- 2010
- PURL
- http://purl.flvc.org/FAU/1927865
- Subject Headings
- Computer network protocols, Routers (Computer networks), Remote submersibles, Design and construction, Mobile communication systems, Design and construction, Ad hoc networks (Computer networks)
- Format
- Document (PDF)
- Title
- Traffic congestion detection using VANET.
- Creator
- Padron, Francisco M., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
We propose a distributed, collaborative traffic congestion detection and dissemination system using VANET that makes efficient use of the communication channel, maintains location privacy, and provides drivers with real-time information on traffic congestions over long distances. The system uses vehicles themselves, equipped with simple inexpensive devices, as gatherers and distributors of information without the need for costly road infrastructure such as sensors, cameras or external...
Show moreWe propose a distributed, collaborative traffic congestion detection and dissemination system using VANET that makes efficient use of the communication channel, maintains location privacy, and provides drivers with real-time information on traffic congestions over long distances. The system uses vehicles themselves, equipped with simple inexpensive devices, as gatherers and distributors of information without the need for costly road infrastructure such as sensors, cameras or external communication equipment. Additionally, we present a flexible simulation and visualization framework we designed and developed to validate our system by showing its effectiveness in multiple scenarios and to aid in the research and development of this and future VANET applications.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/186684
- Subject Headings
- Vehicular ad-hoc networks (Computer networks), Traffic congestion, Mathematical models, Mobile communication systems, Evaluation, Traffic congestion, Prevention
- Format
- Document (PDF)
- Title
- Going on the Grid: Secondary Teachers’ Implementation of Mobile Handheld Devices as Instructional Tools.
- Creator
- Berger, Allison S., Weber, Roberta K., Florida Atlantic University, College of Education, Department of Curriculum, Culture, and Educational Inquiry
- Abstract/Description
-
This mixed methods study examined secondary teachers’ technology selfefficacy, their professional development activities regarding mobile handheld devices, and how those activities affect their use of mobile devices as instructional tools. Additionally, this study also explored teachers’ perceptions of other factors that act as barriers or enablers to their use of such devices. The study included 104 middle and high school teachers who taught in a large, urban public school district in the...
Show moreThis mixed methods study examined secondary teachers’ technology selfefficacy, their professional development activities regarding mobile handheld devices, and how those activities affect their use of mobile devices as instructional tools. Additionally, this study also explored teachers’ perceptions of other factors that act as barriers or enablers to their use of such devices. The study included 104 middle and high school teachers who taught in a large, urban public school district in the Southeastern United States. Data were collected through the administration of an electronic survey and semi-structured interviews. The researcher utilized multiple regression and moderator analyses, as well as qualitative analysis of the interview data. The results of the multiple regression analysis revealed teachers’ technologyrelated self-efficacy to be a significant predictor of their instructional use of mobile handheld devices. However, secondary teachers’ level of professional development was found not to contribute significantly to the model. The moderator analysis too revealed professional development to be a nonsignificant factor. The findings of the qualitative phase of the study revealed secondary teachers’ awareness of their varied and fluid technology-related self-efficacy, as well as those factors that modify it. Qualitative data also revealed four categories of essential elements that teachers must have in order to most effectively implement mobile handheld devices within their pedagogy: intellectual capital, emotional capital, social-cultural capital, and technological capital. When lacking, these elements can represent barriers to teachers’ implementation of mobile handheld devices. Targeted professional development and increased funding to minimize the digital divide are recommended to reduce these barriers. The findings of the study inform designers of professional development programs, school and district and secondary teachers, as they are all stakeholders in the process of increasing the effective implementation of mobile handheld devices as instructional tools.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004649, http://purl.flvc.org/fau/fd/FA00004649
- Subject Headings
- Computer assisted instruction, Education -- Effect of technological innovations on, Educational innovations, Educational technology, Internet in education, Mobile communication systems in education, Pocket computers
- Format
- Document (PDF)
- Title
- Secure routing in wireless sensor networks.
- Creator
- Ibriq, Jamil, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme...
Show moreThis research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime., Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/42771
- Subject Headings
- Sensor networks, Security measures, Ad hoc networks (Computer networks), Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Mobile computing
- Format
- Document (PDF)
- Title
- Smart Broadcast Protocol Design For Vehicular Ad hoc Networks.
- Creator
- Limouchi, Elnaz, Mahgoub, Imad, Florida Atlantic University, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Multi-hop broadcast is one of the main approaches to disseminate data in VANET. Therefore, it is important to design a reliable multi-hop broadcast protocol, which satis es both reachability and bandwidth consumption requirements. In a dense network, where vehicles are very close to each other, the number of vehicles needed to rebroadcast the message should be small enough to avoid a broad- cast storm, but large enough to meet the reachability requirement. If the network is sparse, a higher...
Show moreMulti-hop broadcast is one of the main approaches to disseminate data in VANET. Therefore, it is important to design a reliable multi-hop broadcast protocol, which satis es both reachability and bandwidth consumption requirements. In a dense network, where vehicles are very close to each other, the number of vehicles needed to rebroadcast the message should be small enough to avoid a broad- cast storm, but large enough to meet the reachability requirement. If the network is sparse, a higher number of vehicles is needed to retransmit to provide a higher reachability level. So, it is obvious that there is a tradeo between reachability and bandwidth consumption. In this work, considering the above mentioned challenges, we design a number of smart broadcast protocols and evaluate their performance in various network den- sity scenarios. We use fuzzy logic technique to determine the quali cation of vehicles to be forwarders, resulting in reachability enhancement. Then we design a band- width e cient fuzzy logic-assisted broadcast protocol which aggressively suppresses the number of retransmissions. We also propose an intelligent hybrid protocol adapts to local network density. In order to avoid packet collisions and enhance reachability, we design a cross layer statistical broadcast protocol, in which the contention window size is adjusted based on the local density information. We look into the multi-hop broadcast problem with an environment based on game theory. In this scenario, vehicles are players and their strategy is either to volunteer and rebroadcast the received message or defect and wait for others to rebroadcast. We introduce a volunteer dilemma game inspired broadcast scheme to estimate the probability of forwarding for the set of potential forwarding vehicles. In this scheme we also introduce a fuzzy logic-based contention window size adjustment system. Finally, based on the estimated spatial distribution of vehicles, we design a transmission range adaptive scheme with a fuzzy logic-assisted contention window size system, in which a bloom lter method is used to mitigate overhead. Extensive experimental work is obtained using simulation tools to evaluate the performance of the proposed schemes. The results con rm the relative advantages of the proposed protocols for di erent density scenarios.
Show less - Date Issued
- 2017
- PURL
- http://purl.flvc.org/fau/fd/FA00004902, http://purl.flvc.org/fau/fd/FA00004902
- Subject Headings
- Vehicular ad hoc networks (Computer networks)--Design and construction., Mobile communication systems., Wireless communication systems--Technological innovations., Wireless sensor networks., Routing protocols (Computer network protocols), Computer algorithms.
- Format
- Document (PDF)
- Title
- Energy cost evaluation of a secure 802.11 wireless transmission using NS-2.
- Creator
- Martins, Joao Marcelo Galindo., Florida Atlantic University, Mahgoub, Imad, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Mobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately,...
Show moreMobile devices capable of transmitting and receiving data over an 802.11 network have become very common gadgets in our society. Most small mobile devices available in the market today come with integrated 802.11 radio. The extraordinary growth of this technology has also introduced several worries regarding the vulnerabilities that exist by transmitting data over the air. In order to minimize such problems, encryption algorithms were added as an option to be used with 802.11. Unfortunately, the usage of encryption algorithms also causes a faster depletion of the energy resources available to a mobile device. Depending on the encryption algorithm implementation, a greater number of packets may be required in order to transmit the same amount of data that would be transmitted with less packets over a non-encrypted channel. The objective of this research is to analyze and evaluate the affects that the encryption algorithms used by wireless security protocols can have during data transmission over a wireless medium.
Show less - Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/13292
- Subject Headings
- Wireless communication systems--Security measurer--Evaluation, Coding theory--Evaluation, Computer architecture--Standards--Evaluation, IEEE 80211 (Standard), Mobile communication systems--Power supply--Evaluation
- Format
- Document (PDF)
- Title
- Statistical broadcast protocol design for VANET.
- Creator
- Slavik, Michael J., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This work presents the development of the Statistical Location-Assisted Broadcast (SLAB) protocol, a multi-hop wireless broadcast protocol designed for vehicular ad-hoc networking (VANET). Vehicular networking is an important emerging application of wireless communications. Data dissemination applications using VANET promote the ability for vehicles to share information with each other and the wide-area network with the goal of improving navigation, fuel consumption, public safety, and...
Show moreThis work presents the development of the Statistical Location-Assisted Broadcast (SLAB) protocol, a multi-hop wireless broadcast protocol designed for vehicular ad-hoc networking (VANET). Vehicular networking is an important emerging application of wireless communications. Data dissemination applications using VANET promote the ability for vehicles to share information with each other and the wide-area network with the goal of improving navigation, fuel consumption, public safety, and entertainment. A critical component of these data dissemination schemes is the multi-hop wireless broadcast protocol. Multi-hop broadcast protocols for these schemes must reliably deliver broadcast packets to vehicles in a geographically bounded region while consuming as little wireless bandwidth as possible. This work contains substantial research results related to development of multi-hop broadcast protocols for VANET, culminating in the design of SLAB. Many preliminary research and development efforts have been required to arrive at SLAB. First, a high-level wireless broadcast simulation tool called WiBDAT is developed. Next, a manual optimization procedure is proposed to create efficient threshold functions for statistical broadcast protocols. This procedure is then employed to design the Distribution-Adaptive Distance with Channel Quality (DADCQ) broadcast protocol, a preliminary cousin of SLAB. DADCQ is highly adaptive to node density, node spatial distribution pattern, and wireless channel quality in realistic VANET scenarios. However, the manual design process used to create DADCQ has a few deficiencies. In response to these problems, an automated design procedure is created that uses a black-box global optimization algorithm to search for efficient threshold functions that are evaluated using WiBDAT. SLAB is finally designed using this procedure., Expansive simulation results are presented comparing the performance of SLAB to two well-published VANET broadcast protocols, p -persistence and Advanced Adaptive Gossip (AAG), and to DADCQ. The four protocols are evaluated under varying node density and speed on five different road topologies with varying wireless channel fading conditions. The results demonstrate that unlike p-persistence and AAG, SLAB performs well across a very broad range of environmental conditions. Compared to its cousin protocol DADCQ, SLAB achieves similar reachability while using around 30% less wireless bandwidth, highlighting the improvement in the automated design methodology over the manual design.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3172947
- Subject Headings
- Vehicular ad-hoc networks (Computer networks), Design and construction, Vehicular ad-hoc networks (Computer networks), Technological innovations, Wireless communication systems, Technological innovations, Wireless communication systems, Security measures, Mobile communication systems, Evaluation
- Format
- Document (PDF)
- Title
- An examination of the implementation of the Intel Essentials project-based learning model on middle and secondary reading and language arts FCAT student achievement and engagement.
- Creator
- Wright, Jeremy R., College of Education, Department of Curriculum, Culture, and Educational Inquiry
- Abstract/Description
-
The purpose of this study was to identify (1) the effectiveness of the Intel Essentials model of project-based learning based on student Florida Comprehensive Assessment test (FCAT) reading scores; (2) the differences in student engagement between students in classes with teachers trained in the Intel Essentials model of project-based learning and teachers not trained in the model as measured by the Beliefs about Classroom Structures Survey; (3) the level of implementation (high, average, or...
Show moreThe purpose of this study was to identify (1) the effectiveness of the Intel Essentials model of project-based learning based on student Florida Comprehensive Assessment test (FCAT) reading scores; (2) the differences in student engagement between students in classes with teachers trained in the Intel Essentials model of project-based learning and teachers not trained in the model as measured by the Beliefs about Classroom Structures Survey; (3) the level of implementation (high, average, or low) of teachers trained in the Intel Essentials model of project-based learning; and (4) any correlation between the level of implementation and the level of student engagement. A total of 32 teachers participated in the study. The teachers were split into 2 groups: the experimental group (N = 16) that participated in the Intel Essentials Training, and the control group (N = 16) that did not participate in the training. The results for this study were mixed. The students of the experimental group teachers (N = 780) had significantly higher (p < .05) FCAT scores than that of the control group students (N = 643). The control group with the exception of Motivating Tasks subscale had significantly higher levels of engagement. The correlation between level of implementation and student engagement produced a moderate negative correlation, meaning that the Intel trained teachers with the highest levels of implementation had the lowest levels of engagement.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369395
- Subject Headings
- School improvement programs, Project method in teaching, Mobile communication systems in education, Academic achievement, Methodology, Education, Secondary, Computer-assisted instruction, Florida Comprehensive Assessment Test, Education, Effect of technological innovations on
- Format
- Document (PDF)
- Title
- Social Interaction on Facebook.
- Creator
- Hanrahan, Jeffrey, Maniaci, Michael, Florida Atlantic University, Charles E. Schmidt College of Science, Department of Psychology
- Abstract/Description
-
How we share our good news with people can have a significant effect on our lives. Sharing good news on social media sites involves a process called capitalization. Capitalization has been shown to increase well-being when others provide appropriate responses in face-to-face interactions. To see if this effect on well-being extends to our online presence, this study utilized the social media site Facebook to observe if capitalization predicted well-being and relationship satisfaction. This...
Show moreHow we share our good news with people can have a significant effect on our lives. Sharing good news on social media sites involves a process called capitalization. Capitalization has been shown to increase well-being when others provide appropriate responses in face-to-face interactions. To see if this effect on well-being extends to our online presence, this study utilized the social media site Facebook to observe if capitalization predicted well-being and relationship satisfaction. This study used data collected from 137 participants recruited from an undergraduate participant pool and from Amazon Mechanical Turk. Consistent with hypotheses, participants who reported receiving active and constructive responses after sharing a positive event on Facebook also reported greater personal well-being and relationship satisfaction. Although future experimental research is needed to establish causality, the current results suggest that the ways in which friends respond to social media posts are associated with personal and relationship well-being.
Show less - Date Issued
- 2016
- PURL
- http://purl.flvc.org/fau/fd/FA00004602, http://purl.flvc.org/fau/fd/FA00004602
- Subject Headings
- Social media., Online social networks., Social networks--Psychological aspects., Social networks--Health aspects., Mobile communication systems--Social aspects., Human-computer interaction--Psychological aspects., Information society., Interpersonal communication--Psychological aspects.
- Format
- Document (PDF)
- Title
- Imagining Kandinsky’s theories as a synesthetic iPhone app.
- Creator
- Torlen, Anna, Bargsten, Joey, Florida Atlantic University, Dorothy F. Schmidt College of Arts and Letters, School of Communication and Multimedia Studies
- Abstract/Description
-
Wassily Kandinsky wrote Über das Geistige in der Kunst, in 1912, and was translated from German into English by Michael Sadler. Naming it at first, “The Art of Spiritual Harmony” in 1914 it is known as, Concerning the Spiritual in Art. He wrote color and music theories based on angles, synesthetic experiences, subjective instincts, chromotherapy, and shapes. Kandinsky’s theories are worth continuing to research and bring forth into the new generation of technology where we can see music as...
Show moreWassily Kandinsky wrote Über das Geistige in der Kunst, in 1912, and was translated from German into English by Michael Sadler. Naming it at first, “The Art of Spiritual Harmony” in 1914 it is known as, Concerning the Spiritual in Art. He wrote color and music theories based on angles, synesthetic experiences, subjective instincts, chromotherapy, and shapes. Kandinsky’s theories are worth continuing to research and bring forth into the new generation of technology where we can see music as numerical expressions. The goal of this iPhone Application is to teach users the relationship between color and music based on Kandinsky’s theories.
Show less - Date Issued
- 2015
- PURL
- http://purl.flvc.org/fau/fd/FA00004414, http://purl.flvc.org/fau/fd/FA00004414
- Subject Headings
- Art and music, Art, Modern -- 20th century -- Psychological aspects, Blaue Reiter (Group of artists), Computer art -- Technique, Expressionism (Art) -- 20th century, Kandinsky, Wassily -- 1866-1944 -- Concerning the spiritual in art -- Criticism and interpretation, Kandinsky, Wassily -- 1866-1944 -- Influence, Spirituality in art, iPhone (Smartphone) -- Mobile apps
- Format
- Document (PDF)