Current Search: Electronic Thesis or Dissertation (x) » Technological innovations (x)
View All Items
Pages
- Title
- A planar cable-driven robotic device for physical therapy assistance.
- Creator
- Morris, Melissa M., College of Engineering and Computer Science, Department of Ocean and Mechanical Engineering
- Abstract/Description
-
The design and construction of a tri-cable, planar robotic device for use in neurophysical rehabilitation is presented. The criteria for this system are based primarily on marketability factors, rather than ideal models or mathematical outcomes. The device is designed to be low cost and sufficiently safe for a somewhat disabled individual to use unsupervised at home, as well as in a therapist's office. The key features are the use of a barrier that inhibits the user from coming into contact...
Show moreThe design and construction of a tri-cable, planar robotic device for use in neurophysical rehabilitation is presented. The criteria for this system are based primarily on marketability factors, rather than ideal models or mathematical outcomes. The device is designed to be low cost and sufficiently safe for a somewhat disabled individual to use unsupervised at home, as well as in a therapist's office. The key features are the use of a barrier that inhibits the user from coming into contact with the cables as well as a "break-away" joystick that the user utilizes to perform the rehabilitation tasks. In addition, this device is portable, aesthetically acceptable and easy to operate. Other uses of this system include sports therapy, virtual reality and teleoperation of remote devices.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/FADTsup3358410p
- Subject Headings
- Medical physics, Robotics, Biomechanics, Physical therapy, Technological innovations, Neural networks (Computer science)
- Format
- Set of related objects
- Title
- The creative process is profoundly altered by changes in technology.
- Creator
- Hieronymus, Bruce, Florida Atlantic University, Keaton, Kenneth
- Abstract/Description
-
Individuals throughout time have had a desire to reach beyond their surrounding intellectual and physical environment and explore new territories. Throughout their lives they have continually acquired knowledge. Technology is the application of this knowledge to solve problems. As the knowledge base of humankind has grown at an exponential rate, the presence of technology has also grown. Today technology has surpassed controls and is moving at a rampant rate of speed permitting the...
Show moreIndividuals throughout time have had a desire to reach beyond their surrounding intellectual and physical environment and explore new territories. Throughout their lives they have continually acquired knowledge. Technology is the application of this knowledge to solve problems. As the knowledge base of humankind has grown at an exponential rate, the presence of technology has also grown. Today technology has surpassed controls and is moving at a rampant rate of speed permitting the introduction of new levels of knowledge in all different layers of society. This, however, permits the creation and expression of new thoughts without the acquisition of previously required knowledge. Creativity is progressing rapidly without controls and the objects being created are somewhat questionable.
Show less - Date Issued
- 1999
- PURL
- http://purl.flvc.org/fcla/dt/15690
- Subject Headings
- Technological innovations, Computer music, Technology--Social aspects, Creative ability
- Format
- Document (PDF)
- Title
- The Role of Cues in Buyers' Evaluations of Service Innovations.
- Creator
- Ramesan, Jayendra, Florida Atlantic University, Georgoff, David M.
- Abstract/Description
-
This dissertation integrates knowledge from consumer behavior, diffusion research, strategy and MIS to investigate the effects of information cues such as price, brand equity, and technology on buyers' service evaluations and behavioral intentions. Specifically, the effects of these information cues on buyers' perceptions of service quality, value and purchase intentions are examined. In addition, this study examines the role of two intervening variables, namely, sacrifice (monetary costs)...
Show moreThis dissertation integrates knowledge from consumer behavior, diffusion research, strategy and MIS to investigate the effects of information cues such as price, brand equity, and technology on buyers' service evaluations and behavioral intentions. Specifically, the effects of these information cues on buyers' perceptions of service quality, value and purchase intentions are examined. In addition, this study examines the role of two intervening variables, namely, sacrifice (monetary costs) and ease of use (non-monetary costs) in buyers' service evaluations. Two interactive services, a home banking service (Citibank & Ameritech) and a home shopping service (Time Warner) were described in a concept test format to subjects in a 4 x 2 x 2 between-subjects factorial design experiment. The sample for the home banking service (281) was composed of undergraduate students drawn from the university while the sample for the home shopping service (409), was composed of individuals living in the South Florida area. The experimental treatments, manipulation checks, dependent and intervening variables were measured using multiple-item seven point Likert-type scales. The data was analyzed using econometric modeling techniques. In both experiments, service quality perceptions were found to be significantly influenced by technology and brand equity perceptions. Brand equity was the main determinant of service quality in both experiments. Service value perceptions were driven by direct effects from service quality, sacrifice and ease of use and indirectly driven by technology and price perceptions. The role of brand equity in value perceptions is ambiguous. Sacrifice was related positively to price perceptions in both studies. Purchase intentions were explained only by value perceptions in both studies. The results suggest that service quality and service value are very different. The value function is more complex than service quality. Service organizations that attempt to create customer value by maximizing service quality ratings at the lowest price need to emphasize other value based determinants such as technology and ease of use. The model suggests a crossfunctional approach should be employed for service design and development in order to maximize service quality and customer value. In addition, this study recommends a substantive pre-launch service concept development and delivery effort by service organizations before introducing new services.
Show less - Date Issued
- 1996
- PURL
- http://purl.flvc.org/fcla/dt/12452
- Subject Headings
- Human Information Processing--Research, Consumer Satisfaction--Evaluation, Marketing--Management, Quality of Products--Evaluation, Technological innovations, Customer services--Quality control
- Format
- Document (PDF)
- Title
- Reputation and trust-based security in wireless sensor networks.
- Creator
- Srinivasan, Avinash., College of Engineering and Computer Science, Florida Atlantic University, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This dissertation presents the results of research that led to the development of a novel reputation and trust-based monitoring paradigm for secure and reliable computing in Wireless Sensor Networks (WSNs). WSNs have undergone tremendous technological advances over the last few years. They have caused a giant leap toward "proactive computing," a paradigm where computers anticipate human needs and, when necessary, act on their behalf. Therefore, we cannot deploy such a critical technology...
Show moreThis dissertation presents the results of research that led to the development of a novel reputation and trust-based monitoring paradigm for secure and reliable computing in Wireless Sensor Networks (WSNs). WSNs have undergone tremendous technological advances over the last few years. They have caused a giant leap toward "proactive computing," a paradigm where computers anticipate human needs and, when necessary, act on their behalf. Therefore, we cannot deploy such a critical technology without first addressing the security and privacy challenges to ensure that it does not turn against those whom it is meant to benefit. The core application of WSNs is to detect and report events, be it military or civilian applications. The building blocks of a WSN are small, battery-powered, lowcost, self-contained devices called "sensors" that measure factors like light, temperature, pressure, vibration, motion, etc. A WSN usually consists of hundreds of thousands of sensors that operate in unattended, hostile territories to monitor a given geographical area. Once deployed, the wireless sensors self-organize into ad-hoc wireless networks in order to cope with the dynamics of the surveillance field. During the post deployment phase, the wireless sensors aggregate data, then process and generate a report, which is subsequently relayed from one sensor to the next using secure multi-hop routing until the data reaches its desired destination, which is usually the sink. Since sensors operate in unattended and hostile territories, the adversary can capture a sensor node physically and extract all the information stored onboard, including cryptographic keying material. With this unique situation, WSNs are subject to a unique attack referred to as an "Insider Attack," in which the adversary becomes a legitimate member of the network being represented by the captured node., To overcome this unique situation, a distributed Reputation and Trust-based Monitoring System (RTMS) is required. The most critical contribution of this dissertation work has been the proposal and design of a novel, clique-based, distributed group-key establishment protocol with specific application to RTMSs. We have also proposed and evaluated the application of RTMS models for securing beacon-based localization in WSNs addressing information asymmetry attacks, and proposed a novel k-parent tree model for securing broadcast communication in WSNs with an underlying RTMS model. Other issues addressed in this dissertation work include the proposal of a Connected Dominating Set (CDS) based reputation dissemination and bootstrapping model. This model also enables secure, certificateless node mobility and enables the model to be robust to ID Spoofing and node replication attacks.
Show less - Date Issued
- 2008
- PURL
- http://purl.flvc.org/FAU/77652
- Subject Headings
- Sensor networks, Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Ad hoc networks (Computer networks), Security measures
- Format
- Document (PDF)
- Title
- Secure routing in wireless sensor networks.
- Creator
- Ibriq, Jamil, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme...
Show moreThis research addresses communication security in the highly constrained wireless sensor environment. The goal of the research is twofold: (1) to develop a key management scheme that provides these constrained systems with the basic security requirements and evaluate its effectiveness in terms of scalability, efficiency, resiliency, connectivity, and flexibility, and (2) to implement this scheme on an appropriate routing platform and measure its efficiency., The proposed key management scheme is called Hierarchical Key Establishment Scheme (HIKES). In HIKES, the base station, acting as the central trust authority, empowers randomly selected sensors to act as local trust authorities, authenticating on its behalf the cluster members and issuing to them all secret keys necessary to secure their communications. HIKES uses a novel key escrow scheme that enables any sensor node selected as a cluster head to generate all the cryptographic keys needed to authenticate other sensors within its cluster. This scheme localizes secret key issuance and reduces the communication cost with the base station. The key escrow scheme also provides the HIKES with as large an addressing mechanism as needed. HIKES also provides a one-step broadcast authentication mechanism. HIKES provides entity authentication to every sensor in the network and is robust against most known attacks. We propose a hierarchical routing mechanism called Secure Hierarchical Energy-Efficient Routing protocol (SHEER). SHEER implements HIKES, which provides the communication security from the inception of the network. SHEER uses a probabilistic broadcast mechanism and a three-level hierarchical clustering architecture to improve the network energy performance and increase its lifetime., Simulation results have shown that HIKES provides an energy-efficient and scalable solution to the key management problem. Cost analysis shows that HIKES is computationally efficient and has low storage requirement. Furthermore, high degree of address flexibility can be achieved in HIKES. Therefore, this scheme meets the desired criteria set forth in this work. Simulation studies also show that SHEER is more energy-efficient and has better scalability than the secure version of LEACH using HIKES.
Show less - Date Issued
- 2007
- PURL
- http://purl.flvc.org/FAU/42771
- Subject Headings
- Sensor networks, Security measures, Ad hoc networks (Computer networks), Security measures, Wireless communication systems, Security measures, Wireless communication systems, Technological innovations, Mobile computing
- Format
- Document (PDF)
- Title
- Classification techniques for noisy and imbalanced data.
- Creator
- Napolitano, Amri E., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Machine learning techniques allow useful insight to be distilled from the increasingly massive repositories of data being stored. As these data mining techniques can only learn patterns actually present in the data, it is important that the desired knowledge be faithfully and discernibly contained therein. Two common data quality issues that often affect important real life classification applications are class noise and class imbalance. Class noise, where dependent attribute values are...
Show moreMachine learning techniques allow useful insight to be distilled from the increasingly massive repositories of data being stored. As these data mining techniques can only learn patterns actually present in the data, it is important that the desired knowledge be faithfully and discernibly contained therein. Two common data quality issues that often affect important real life classification applications are class noise and class imbalance. Class noise, where dependent attribute values are recorded erroneously, misleads a classifier and reduces predictive performance. Class imbalance occurs when one class represents only a small portion of the examples in a dataset, and, in such cases, classifiers often display poor accuracy on the minority class. The reduction in classification performance becomes even worse when the two issues occur simultaneously. To address the magnified difficulty caused by this interaction, this dissertation performs thorough empirical investigations of several techniques for dealing with class noise and imbalanced data. Comprehensive experiments are performed to assess the effects of the classification techniques on classifier performance, as well as how the level of class imbalance, level of class noise, and distribution of class noise among the classes affects results. An empirical analysis of classifier based noise detection efficiency appears first. Subsequently, an intelligent data sampling technique, based on noise detection, is proposed and tested. Several hybrid classifier ensemble techniques for addressing class noise and imbalance are introduced. Finally, a detailed empirical investigation of classification filtering is performed to determine best practices.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/369201
- Subject Headings
- Combinatorial group theory, Data mining, Technological innovations, Decision trees, Machine learning, Filters (Mathematics)
- Format
- Document (PDF)
- Title
- The "Stop-It anti-fidgeting device.
- Creator
- Barnard, Scott A., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Fidgeting and otherwise constant movements in individuals can be beneficial in those who suffer from Attention Deficit/Hyperactivity Disorder or Generalized Anxiety Disorder as well as others. However this constant movement can also be a distraction to others as well as protrude an air of no self confidence. It is the drawbacks from these actions that we wish to address. By developing an intelligent system that can detect these motions and alert the user, it will allow the wearer of the...
Show moreFidgeting and otherwise constant movements in individuals can be beneficial in those who suffer from Attention Deficit/Hyperactivity Disorder or Generalized Anxiety Disorder as well as others. However this constant movement can also be a distraction to others as well as protrude an air of no self confidence. It is the drawbacks from these actions that we wish to address. By developing an intelligent system that can detect these motions and alert the user, it will allow the wearer of the device to self correct. It is in this self control that one may exhibit more confidence or simply reduce the level of irritation experienced by those in the immediate vicinity. We have designed and built a low cost, mobile, lightweight, untethered, wearable prototype device. It will detect these actions and deliver user selectable biofeedback through a light emitting diode, buzzer, vibromotor or an electric shock to allow for self control.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/368612
- Subject Headings
- Restless legs syndrome, Treatment, Technological innovations, Agitation (Psychology), Biomedical engineering, Neural networks (Neurobiology)
- Format
- Document (PDF)
- Title
- Non-destructive evaluation of reinforced asphalt pavement built over soft organic soils.
- Creator
- Pohly, Daniel D., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Research, tests and analysis are presented on several reinforcements placed in the asphalt overlay of a roadway built over soft organic soils. Non-destructive Evaluation (NDE) methods and statistical analysis were used to characterize the pavement before and after rehabilitative construction. Before reconstruction, falling weight deflectometer, rut and ride tests were conducted to evaluate the existing pavement and determine the statistical variability of critical site characteristics. Twenty...
Show moreResearch, tests and analysis are presented on several reinforcements placed in the asphalt overlay of a roadway built over soft organic soils. Non-destructive Evaluation (NDE) methods and statistical analysis were used to characterize the pavement before and after rehabilitative construction. Before reconstruction, falling weight deflectometer, rut and ride tests were conducted to evaluate the existing pavement and determine the statistical variability of critical site characteristics. Twenty-four 500ft. test sections were constructed on the roadway including sixteen reinforced asphalt and eight control sections at two test locations that possessed significantly different subsoil characteristics. NDE tests were repeated after reconstruction to characterize the improvements of the test sections. Test results were employed to quantify the stiffness properties of the pavement based on load-deflection data to evaluate the relative performance of the reinforced sections. Statistical analysis of the data showed the stiffness of the reinforced sections was consistently higher than the control sections.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/368253
- Subject Headings
- Soil remediation, Technological innovations, Structural stability, Design, Pavements, Performance, Management, Data processing, Structural analysis (Engineering)
- Format
- Document (PDF)
- Title
- Evaluation of power function approximation of NEXRAD and rain gauge based precipitation estimates.
- Creator
- Mayes-Fernandez, Mario., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Radar rainfall estimates have become a decision making tool for scientists, engineers and water managers in their tasks for developing hydrologic models, water supply planning, restoration of ecosystems, and flood control. In the present study, the utility of a power function for linking the rain gauge and radar estimates has been assessed. Mean daily rainfall data from 163 rain gauges installed within the South Florida Water Management District network have been used and their records from...
Show moreRadar rainfall estimates have become a decision making tool for scientists, engineers and water managers in their tasks for developing hydrologic models, water supply planning, restoration of ecosystems, and flood control. In the present study, the utility of a power function for linking the rain gauge and radar estimates has been assessed. Mean daily rainfall data from 163 rain gauges installed within the South Florida Water Management District network have been used and their records from January 1st, 2002 to October 31st, 2007 analyzed. Results indicate that the power function coefficients and exponents obtained by using a non-linear optimization formulation, show spatial variability mostly affected by type of rainfall events occurring in the dry or wet seasons, and that the linear distance from the radar location to the rain gauge has a significant effect on the computed values of the coefficients and exponents.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/367761
- Subject Headings
- Radar meteorology, Technological innovations, Weather forecasting, Technological innovations, Precipitation (Meteorology), Measurement, Weather control, Mathematical models
- Format
- Document (PDF)
- Title
- Cement stabilization of organic soils for controlling secondary compression behavior.
- Creator
- Ramirez, Juan., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Western Palm Beach County, FL is characterized by thick deposits organic soils at shallow depths. Because of their high void ratio and compressibility, these soils undergo large primary consolidation followed by extended periods of secondary compression causing excessive premature structural distress. Although soil stabilization has been largely used with remarkable results in soft, expansive and non-organic soils, limited research and practice exist in the implementation with highly organic...
Show moreWestern Palm Beach County, FL is characterized by thick deposits organic soils at shallow depths. Because of their high void ratio and compressibility, these soils undergo large primary consolidation followed by extended periods of secondary compression causing excessive premature structural distress. Although soil stabilization has been largely used with remarkable results in soft, expansive and non-organic soils, limited research and practice exist in the implementation with highly organic soils. The main motivation of this research was to investigate the effects of cement stabilization on the compressibility behavior of organic rich soils, and develop mix design criteria for optimum cement contents necessary to induce the desired engineering behavior. This optimized mix design may provide guidelines for Deep Mixing Methods in organic soils.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/367760
- Subject Headings
- Soil consolidation, Measurement, Soils, Organic compound content, Soil remediation, Technological innovations, Concrete construction, Structural stability, Design
- Format
- Document (PDF)
- Title
- Probabilistic predictor-based routing in disruption-tolerant networks.
- Creator
- Yuan, Quan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Disruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the...
Show moreDisruption-Tolerant Networks (DTNs) are the networks comprised of a set of wireless nodes, and they experience unstable connectivity and frequent connection disruption because of the limitations of radio range, power, network density, device failure, and noise. DTNs are characterized by their lack of infrastructure, device limitation, and intermittent connectivity. Such characteristics make conventional wireless network routing protocols fail, as they are designed with the assumption the network stays connected. Thus, routing in DTNs becomes a challenging problem, due to the temporal scheduling element in a dynamic topology. One of the solutions is prediction-based, where nodes mobility is estimated with a history of observations. Then, the decision of forwarding messages during data delivery can be made with that predicted information. Current prediction-based routing protocols can be divided into two sub-categories in terms of that whether they are probability related: probabilistic and non-probabilistic. This dissertation focuses on the probabilistic prediction-based (PPB) routing schemes in DTNs. We find that most of these protocols are designed for a specified topology or scenario. So almost every protocol has some drawbacks when applied to a different scenario. Because every scenario has its own particular features, there could hardly exist a universal protocol which can suit all of the DTN scenarios. Based on the above motivation, we investigate and divide the current DTNs scenarios into three categories: Voronoi-based, landmark-based, and random moving DTNs. For each category, we design and implement a corresponding PPB routing protocol for either basic routing or a specified application with considering its unique features., Specifically, we introduce a Predict and Relay routing protocol for Voronoi-based DTNs, present a single-copy and a multi-copy PPB routing protocol for landmark-based DTNs, and propose DRIP, a dynamic Voronoi region-based publish/subscribe protocol, to adapt publish/subscribe systems to random moving DTNs. New concepts, approaches, and algorithms are introduced during our work.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359928
- Subject Headings
- Routers (Computer networks), Computer network protocols, Computer networks, Reliability, Computer algorithms, Wireless communication systems, Technological innovations
- Format
- Document (PDF)
- Title
- Reliable, energy-aware cross-layer protocol for wireless sensor networks.
- Creator
- Badi, Ahmed., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back...
Show moreThis research addresses communication reliability in the highly constrained wireless sensor networks environment. We propose a cross-layer, reliable wireless sensor protocol design. The protocol benefits from the body of research in the two areas of wireless sensors reliability research and wireless sensors energy conservation research. The protocol introduces a new energy saving technique that considers reliability as a design parameter and constraint. The protocol also introduces a new back-off algorithm that dynamically adjusts to the data messages reliability needs. Other cross-layer techniques that the protocol introduces are dynamic MAC retry limit and dynamic transmission power setting that is also based on the messages reliability requirements. Cross layer design is defined as the interaction between the different stack layers with the goal of improving performance. It has been used in ad hoc wireless systems to improve throughput, latency, and quality of service (QoS). The improvements gained in performance come at a price. This includes decreased architecture modularity and designs may be hard to debug, maintain or upgrade. Cross-layer design is valuable for wireless sensor networks due to the severe resource constraints. The proposed protocol uses cross-layer design as a performance and energy optimization technique. Nevertheless, the protocol avoids introducing layer interdependencies by preserving the stack architecture and optimizes the overall system energy and reliability performance by information sharing. The information is embedded as flags in the data and control messages that are moving through the stack. Each layer reads these flags and adjusts its performance and handling of the message accordingly. The performance of the proposed protocol is evaluated using simulation modeling. The reference protocol used for evaluation is APTEEN., We developed simulation programs for the proposed protocol and for APTEEN protocol using the JiST/SWANS simulation tool. The performance evaluation results show that the proposed protocol achieves better energy performance than the reference protocol. Several scalability experiments show that the proposed protocol scales well and has better performance for large networks. Also, exhaustive bandwidth utilization experiments show that for heavily-utilized or congested networks, the proposed protocol has high reliability in delivering messages classified as important.
Show less - Date Issued
- 2009
- PURL
- http://purl.flvc.org/FAU/359921
- Subject Headings
- Computer network protocols, Wireless communication systems, Technological innovations, Sensor networks, Power resources, Efficiency
- Format
- Document (PDF)
- Title
- DIgital assist: comparison of two note-taking methods (traditional vs. digital pen) for students with emotional behavioral disorders.
- Creator
- Rody, Carlotta A., College of Education, Department of Exceptional Student Education
- Abstract/Description
-
High school biology classes traditionally follow a lecture format to disseminate content and new terminology. With the inclusive practices of No Child Left Behind, the Common Core State Standards, and end-of-course exam requirement for high school diplomas, classes include a large range of achievement levels and abilities. Teachers assume, often incorrectly, that students come to class prepared to listen and take notes. In a standard diploma, high school biology class in a separate school for...
Show moreHigh school biology classes traditionally follow a lecture format to disseminate content and new terminology. With the inclusive practices of No Child Left Behind, the Common Core State Standards, and end-of-course exam requirement for high school diplomas, classes include a large range of achievement levels and abilities. Teachers assume, often incorrectly, that students come to class prepared to listen and take notes. In a standard diploma, high school biology class in a separate school for students with emotional and behavioral disorders, five students participated in a single-subject, alternating treatment design study that compared the use of regular pens and digital pens to take notes during 21 lecture sessions. Behavior measures were threefold between the two interventions: (a) quantity of notes taken per minute during lectures, (b) quantity of notes or notations taken during review pauses, and (c) percent of correct responses on the daily comprehension quizzes. ... However, the differences were minor, and recommendations are made for specific training in note-taking, the pause strategy, and digital pen fluency which may produce different results for both note-taking and quiz scores.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362580
- Subject Headings
- Study skills, Technological innovations, Note-taking, Technological innovations, Educational psychology, Problem children, Education, Behavior disorders in children, Behavioral assessment of children, Emotional problems of children
- Format
- Document (PDF)
- Title
- Impact of interference on connectivity and outage performances in wireless communication networks: interference-based channel models.
- Creator
- Mukasa, Constantine, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
In recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We...
Show moreIn recent years, a plethora of wireless applications such as Bluetooth and Ultra-wide band (UWB) radio have emerged. This drastic increase has overly congested the spectrum. So, new networks such as cognitive radios that can solve the spectrum congestion have emerged. But in such networks, interference is introduced at the physical layer. We study and develop an interference model capable of capturing the intrinsic characteristics of the coexistence of such wireless applications. We investigate the effect of interference using device isolation probability or outage probability in presence Rayleigh and Nakagami-m fading at the physical layer and the impact of lognormal shadowing. We assume that the devices are either deterministically placed or randomly distributed according to a Poisson point process. We derive explicit expressions for the isolation probability and outage probability that give insight into how these channel impairments affect communication in these applications. We use computer simulations to validate our analytical results.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362551
- Subject Headings
- Wireless communication systems, Technological innovations, Wireless communication systems, Mathematical models, Orthogonal frequency division multiplexing
- Format
- Document (PDF)
- Title
- Joint TCP congestion control and wireless-link scheduling for mobile Internet applications.
- Creator
- Li, Zhaoquan., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude...
Show moreThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet protocol suite, which is used by major Internet applications such as World Wide Web, email, remote administration and file transfer. TCP implements scalable and distributed end-to-end congestion control algorithms to share network resources among competing users. TCP was originally designed primarily for wired networks, and it has performed remarkably well as the Internet scaled up by six orders of magnitude in the past decade. However, many studies have shown that the unmodified standard TCP performs poorly in networks with large bandwidth-delay products and/or lossy wireless links. In this thesis, we analyze the problems TCP exhibits in the wireless communication environment, and develop joint TCP congestion control and wireless-link scheduling schemes for mobile applications. ... Different from the existing solutions, the proposed schemes can be asynchronously implemented without message passing among network nodes; thus they are readily deployable with current infrastructure. Moreover, global convergence/stability of the proposed schemes to optimal equilibrium is established using the Lyapunov method in the network fluid model. Simulation results are provided to evaluate the proposed schemes in practical networks.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/fcla/dt/3362481
- Subject Headings
- Wireless communication systems, Quality control, Mobile communication systems, Technological innovations, TCP/IP (Computer network protocol), Ad hoc networks (Computer networks), Computer network protocols, Wireless Internet
- Format
- Document (PDF)
- Title
- Vetting sources in social media environments: strategies emplyed by journalists of The Palm Beach Post.
- Creator
- Brown, Michelle D., Dorothy F. Schmidt College of Arts and Letters, School of Communication and Multimedia Studies
- Abstract/Description
-
This qualitative research study explores the relationship between reducing uncertainty and assigning source credibility in the context of social media sites (SMS) and examines the effect of uncertainty reduction within the social media environment on the development of relationships between journalists and their sources. For this study, interviews were conducted with professional journalists to determine whether uncertainty was reduced and credibility was established with sources via SMS (i.e...
Show moreThis qualitative research study explores the relationship between reducing uncertainty and assigning source credibility in the context of social media sites (SMS) and examines the effect of uncertainty reduction within the social media environment on the development of relationships between journalists and their sources. For this study, interviews were conducted with professional journalists to determine whether uncertainty was reduced and credibility was established with sources via SMS (i.e., Facebook, Twitter, and LinkedIn) and what theoretical strategies journalists used to reduce their uncertainty. The study also aims to determine if correlations exist between a reporter's age, beat, and/or personal adoption of SMS and the reporter's usage of SMS for source development. The interviews were conducted with 15 journalists of The Palm Beach Post (West Palm Beach, Florida), using a standardized interview protocol. Subjects were asked to voluntarily participate in a face-to-face interview with the researcher. Reporters were selected based upon their gender and cultural ethnicity, which was representative of the newsroom demographics of The Palm Beach Post at that time. This research aims to contribute to the uncertainty reduction theory in the realm of computer-mediated communications, specifically with regard to the use of SMS in forming and maintaining journalist-source relationships.
Show less - Date Issued
- 2013
- PURL
- http://purl.flvc.org/FAU/3360765
- Subject Headings
- Digital media, Social aspects, Mass media, Technological innovations, Newspaper publishing, Social aspects, American newspapers, Objectivity, Journalistic ethics, Journalism, Moral and ethical aspects, Newspapers, Sections, columns, etc, Sources
- Format
- Document (PDF)
- Title
- Computer interaction system to identify learning patterns and improve performance in children with autism spectrum disorders.
- Creator
- Petersen, Jake Levi., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Autism Spectrum Disorders (ASD) affects one in every 110 children. Medical and educational research have demonstrated that ASD children's social skills and adaptation can be much improved, provided that interventions are early and intensive enough. The advancement of computer technologies and their ubiquitous penetration in people's life make them widely available to support intensive sociocognitive rehabilitation. Additionally, computer interactions are a natural choice for people with...
Show moreAutism Spectrum Disorders (ASD) affects one in every 110 children. Medical and educational research have demonstrated that ASD children's social skills and adaptation can be much improved, provided that interventions are early and intensive enough. The advancement of computer technologies and their ubiquitous penetration in people's life make them widely available to support intensive sociocognitive rehabilitation. Additionally, computer interactions are a natural choice for people with autism who value lawful and "systematizing" tools. A number of computer-aided approaches have been developed, showing effectiveness and generalization, but little quantitative research was conducted to identify the critical factors of engaging and improving the child's interest and performance. This thesis designs an adaptive computer interaction system, called Ying, which detects learning patterns in children with ASD and explores the computer interactive possibilities. The system tailors its content based on periodic performance assessments that offer a more effective learning path for children with ASD.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3356786
- Subject Headings
- Autism spectrum disorders, Treatment, Technological innovations, Optical pattern recognition, Children with disabilities, Education, Technological innovations, Assistive computer technology, Compter-assisted instruction, Computers and people with disabilities
- Format
- Document (PDF)
- Title
- Impacts of queue jumpers and transit signal priority on bus rapid transit.
- Creator
- Reza, R.M. Zahid., College of Engineering and Computer Science, Department of Civil, Environmental and Geomatics Engineering
- Abstract/Description
-
Exclusive bus lanes and the Transit Signal Priority are often not effective in saturated peak-traffic conditions. An alternative way of providing priority for transit can be queue jumpers, which allows buses to bypass and then cut out in front of waiting queue by getting an early green signal. Utah Transit authority deployed Bus Rapid Transit system at Salt Lake County, Utah along W 3500 S. This research evaluates the impacts of queue jumpers with TSP on Bus Rapid Transit (BRT) and private...
Show moreExclusive bus lanes and the Transit Signal Priority are often not effective in saturated peak-traffic conditions. An alternative way of providing priority for transit can be queue jumpers, which allows buses to bypass and then cut out in front of waiting queue by getting an early green signal. Utah Transit authority deployed Bus Rapid Transit system at Salt Lake County, Utah along W 3500 S. This research evaluates the impacts of queue jumpers with TSP on Bus Rapid Transit (BRT) and private vehicular traffic. Four VISSIM models were developed for analysis : Basic scenario, no TSP with queue jumpers, TSP with no queue jumbers, and TSP with queue jumpers. In TQ scenario travel time was reduced between 13.2-19.82% with respect to basic scenario. At the same time, travel time of private traffic increased very little 0.38-3.28%. Two TSP strategies : green extension and red truncation are implemented in this research work.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3355877
- Subject Headings
- Bus lines, Technological innovations, Traffic signs and signals, Technological innovations, Traffic signal preemption, Traffic congestion
- Format
- Document (PDF)
- Title
- Asset identification using image descriptors.
- Creator
- Friedel, Reena Ursula., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
Asset management is a time consuming and error prone process. Information Technology (IT) personnel typically perform this task manually by visually inspecting assets to identify misplaced assets. If this process is automated and provided to IT personnel it would prove very useful in keeping track of assets in a server rack. A mobile based solution is proposed to automate this process. The asset management application on the tablet captures images of assets and searches an annotated database...
Show moreAsset management is a time consuming and error prone process. Information Technology (IT) personnel typically perform this task manually by visually inspecting assets to identify misplaced assets. If this process is automated and provided to IT personnel it would prove very useful in keeping track of assets in a server rack. A mobile based solution is proposed to automate this process. The asset management application on the tablet captures images of assets and searches an annotated database to identify the asset. We evaluate the matching performance and speed of asset matching using three different image feature descriptors. Methods to reduce feature extraction and matching complexity were developed. Performance and accuracy tradeoffs were studied, domain specific problems were identified, and optimizations for mobile platforms were made. The results show that the proposed methods reduce complexity of asset matching by 67% when compared to the matching process using unmodified image feature descriptors.
Show less - Date Issued
- 2012
- PURL
- http://purl.flvc.org/FAU/3342051
- Subject Headings
- Data mining, Technological innovations, Mobile computing, User-centered system design, Application software, Development
- Format
- Document (PDF)
- Title
- Prognosis and health monitoring communications quality of service.
- Creator
- Tavtilov, Timur, College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
This thesis research was funded by the Southeast National Marine Renewable Energy Center (SNMREC) at Florida Atlantic University. Its objective is the development of Quality of Service (QoS) mechanisms for the wireless communications architecture used by the Prognosis and Health Monitoring (PHM) subsystem. There are numerous technical challenges that the PHM Communications Subsystem tries to solve. Due to ocean platform mobility from waves, currents, and other environmental factors, signal...
Show moreThis thesis research was funded by the Southeast National Marine Renewable Energy Center (SNMREC) at Florida Atlantic University. Its objective is the development of Quality of Service (QoS) mechanisms for the wireless communications architecture used by the Prognosis and Health Monitoring (PHM) subsystem. There are numerous technical challenges that the PHM Communications Subsystem tries to solve. Due to ocean platform mobility from waves, currents, and other environmental factors, signal quality can vary significantly. As a result, the wireless link between the electric generator platform and shore systems will have variable quality in terms of data rate, delay, and availability. In addition, the data traffic that flows from generator sensors and PHM applications to the shore systems consists of numerous types of messages that have different QoS demands (e.g. delay) and priority that depends on the message type, user ID, sensor location, and application-dependent parameters. The PHM Communications subsystem must handle effectively high priority messages, such as alarms, alerts, and remote control commands from shore systems. It also performs QoS in the application layer, so it can read the contents of every message to prioritize them. In order to perform QoS in the application layer the PHM subsystem relies on Java Servlet multithreaded technology and different queuing techniques to control message transmission order. Furthermore, it compresses all traffic that comes from the ocean-based electric generator/turbine platform to reduce the load on the wireless link. The PHM Communications subsystem consists of three components: the wireless link, the Link Manager, and the Web Services Network Proxy. We present experimental results for the Web Services Network Proxy and demonstrate the effectiveness of XML data compression and semantic-based message scheduling over a link with variable capacity.
Show less - Date Issued
- 2011
- PURL
- http://purl.flvc.org/FAU/3334098
- Subject Headings
- Computer network architecture, Service-oriented architecture (Computer science), Wireless communication services, Technological innovations, Wireless communication services, Quality control
- Format
- Document (PDF)