Current Search: Simulation (x)
View All Items
Pages
- Title
- PREDICTING AIR QUALITY NEAR ROADWAY INTERSECTIONS THROUGH THE APPLICATION OF A GAUSSIAN PUFF MODEL TO MOVING SOURCES.
- Creator
-
Kim, Brian, Wayson, Roger, University of Central Florida
- Abstract / Description
-
With substantial health and economic impacts attached to many highway-related projects, it has become imperative that the models used to assess air quality be as accurate as possible. The United States (US) Environmental Protection Agency (EPA) currently promulgates the use of CAL3QHC to model concentrations of carbon monoxide (CO) near roadway intersections. This model uses steady-state and macroscopic methods to model the physical phenomena (e.g., emission rates, atmospheric dispersion, etc...
Show moreWith substantial health and economic impacts attached to many highway-related projects, it has become imperative that the models used to assess air quality be as accurate as possible. The United States (US) Environmental Protection Agency (EPA) currently promulgates the use of CAL3QHC to model concentrations of carbon monoxide (CO) near roadway intersections. This model uses steady-state and macroscopic methods to model the physical phenomena (e.g., emission rates, atmospheric dispersion, etc.) occurring at intersections. These methods are not straightforward and unintuitive for the users. Therefore, this project investigated the possibility of developing a model that is theoretically more realistic and flexible than CAL3QHC. The new model entitled, Traffic Air Quality Simulation Model (TRAQSIM), uses a microscopic approach by modeling vehicle movements and dispersion in a simulation environment. Instead of steady-state plume equations used in the CAL3QHC model, TRAQSIM uses a discrete puff methodology that can be used to model time-based dispersion of pollutants. Most of the components incorporated into TRAQSIM have been drawn from existing methodologies and therefore, are not new. However, the combination of these different methods into a single integrated model is new and presents a novel approach to such a model. Initial verification and sensitivity/trend studies of the model indicate that TRAQSIM uses reasonable/realistic traffic parameters and behaves intuitively correct. A validation study showed that TRAQSIM produces good results when compared to actual measured data with an overall R2 value of 0.605 for 11 scenarios comprising 264 data points. Although most statistical parameters showed CAL3QHC agrees better overall with measured data (R2 value of 0.721), the comparisons were mixed on a scenario-by-scenario basis; that is, CAL3QHC showed better results for 6 scenarios and TRAQSIM showed better results for 5 scenarios. Additional tests with larger datasets, which were beyond the scope of this work, could be conducted to obtain more definitive conclusions and allow further development of TRAQSIM. While CAL3QHC is a mature model that has been developed over many years, TRAQSIM is new and has much more potential for improvement. The physical parameters used in TRAQSIM allow it to be more directly (more logically) improved than the approximations used in CAL3QHC. In addition, although the fundamental-level modeling in TRAQSIM make it a more complex model internally, it is much more intuitive for the user to understand and use.
Show less - Date Issued
- 2004
- Identifier
- CFE0000316, ucf:46306
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000316
- Title
- SAFETY ISSUES OF RED-LIGHT RUNNING AND UNPROTECTED LEFT-TURN AT SIGNALIZED INTERSECTIONS.
- Creator
-
Yan, Xuedong, Radwan, Essam, University of Central Florida
- Abstract / Description
-
Crashes categorized as running red light or left turning are most likely to occur at signalized intersections and resulted in substantial severe injuries and property damages. This dissertation mainly focused on these two types of vehicle crashes and the research methodology involved several perspectives. To examine the overall characteristics of red-light running and left-turning crashes, firstly, this study applied 1999-2001 Florida traffic crash data to investigate the accident propensity...
Show moreCrashes categorized as running red light or left turning are most likely to occur at signalized intersections and resulted in substantial severe injuries and property damages. This dissertation mainly focused on these two types of vehicle crashes and the research methodology involved several perspectives. To examine the overall characteristics of red-light running and left-turning crashes, firstly, this study applied 1999-2001 Florida traffic crash data to investigate the accident propensity of three aspects of risk factors related to traffic environments, driver characteristics, and vehicle types. A quasi-induced exposure concept and statistical techniques including classification tree model and multiple logistic regression were used to perform this analysis. Secondly, the UCF driving simulator was applied to test the effect of a proposed new pavement marking countermeasure which purpose is to reduce the red-light running rate at signalized intersections. The simulation experiment results showed that the total red-light running rate with marking is significantly lower than that without marking. Moreover, deceleration rate of stopping drivers with marking for the higher speed limit are significantly less than those without marking. These findings are encouraging and suggesting that the pavement marking may result in safety enhancement as far as right-angle and rear-end traffic crashes at signalized intersections. Thirdly, geometric models to compute sight distances of unprotected left-turns were developed for different signalized intersection configurations including a straight approach leading to a straight one, a straight approach leading to a curved one, and a curved approach leading to a curved one. The models and related analyses can be used to layout intersection design or evaluate the sight distance problem of an existing intersection configuration to ensure safe left-turn maneuvers by drivers.
Show less - Date Issued
- 2005
- Identifier
- CFE0000401, ucf:46347
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000401
- Title
- MODELING AND SIMULATION OF LONG TERM DEGRADATION AND LIFETIME OF DEEP-SUBMICRON MOS DEVICE AND CIRCUIT.
- Creator
-
CUI, ZHI, Liou, Juin J., University of Central Florida
- Abstract / Description
-
Long-term hot-carrier induced degradation of MOS devices has become more severe as the device size continues to scale down to submicron range. In our work, a simple yet effective method has been developed to provide the degradation laws with a better predictability. The method can be easily augmented into any of the existing degradation laws without requiring additional algorithm. With more accurate extrapolation method, we present a direct and accurate approach to modeling empirically the 0...
Show moreLong-term hot-carrier induced degradation of MOS devices has become more severe as the device size continues to scale down to submicron range. In our work, a simple yet effective method has been developed to provide the degradation laws with a better predictability. The method can be easily augmented into any of the existing degradation laws without requiring additional algorithm. With more accurate extrapolation method, we present a direct and accurate approach to modeling empirically the 0.18-ìm MOS reliability, which can predict the MOS lifetime as a function of drain voltage and channel length. With the further study on physical mechanism of MOS device degradation, experimental results indicated that the widely used power-law model for lifetime estimation is inaccurate for deep submicron devices. A better lifetime prediction method is proposed for the deep-submicron devices. We also develop a Spice-like reliability model for advanced radio frequency RF MOS devices and implement our reliability model into SpectreRF circuit simulator via Verilog-A HDL (Hardware Description Language). This RF reliability model can be conveniently used to simulate RF circuit performance degradation
Show less - Date Issued
- 2005
- Identifier
- CFE0000476, ucf:46360
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000476
- Title
- LEARNING AFRICAN-AMERICAN HISTORY IN A SYNTHETIC LEARNING ENVIRONMENT.
- Creator
-
Greenwood-Ericksen, Adams, Hancock, Peter, University of Central Florida
- Abstract / Description
-
Synthetic Learning Environments (SLEs) represent a hybrid of simulations and games, and in addition to their pedagogical content, rely on elements of story and interactivity to drive engagement with the learning material. The present work examined the differential impact of varying levels of story and interactivity on learning. The 2x2 between subjects design tested learning and retention among 4 different groups of participants, each receiving one of the 4 possible combinations of low and...
Show moreSynthetic Learning Environments (SLEs) represent a hybrid of simulations and games, and in addition to their pedagogical content, rely on elements of story and interactivity to drive engagement with the learning material. The present work examined the differential impact of varying levels of story and interactivity on learning. The 2x2 between subjects design tested learning and retention among 4 different groups of participants, each receiving one of the 4 possible combinations of low and high levels of story and interactivity. Objective assessments of participant performance yielded the unexpected finding that learners using the SLE performed more poorly than any other learning group, including the gold-standard baseline. This result is made even more surprising by the finding that participants rated their enjoyment of and performance in that condition highest among the four conditions in the experiment. This apparent example of metacognitive bias has important implications for understanding how affect, narrative structure, and interactivity impact learning tasks, particularly in synthetic learning environments.
Show less - Date Issued
- 2008
- Identifier
- CFE0002087, ucf:47580
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002087
- Title
- A HYBRID ROUTING PROTOCOL FOR COMMUNICATIONS AMONG NODES WITHHIGH RELATIVE SPEED IN WIRELESS MESH NETWORKS.
- Creator
-
PEPPAS, NIKOLAOS, Turgut, Damla, University of Central Florida
- Abstract / Description
-
Wireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information....
Show moreWireless mesh networks (WMN) is a new promising wireless technology which uses already available hardware and software components. This thesis proposes a routing algorithm for military applications. More specifically, a specialized scenario consisting of a network of flying Unmanned Aerial Vehicles (UAVs) executing reconnaissance missions is investigated. The proposed routing algorithm is hybrid in nature and uses both reactive and proactive routing characteristics to transmit information. Through simulations run on a specially built stand alone simulator, based on Java, packet overhead, delivery ratio and latency metrics were monitored with respect to varying number of nodes, node density and mobility. The results showed that the high overhead leads to high delivery ratio while latency tends to increase as the network grows larger. All the metrics revealed sensitivity in high mobility conditions.
Show less - Date Issued
- 2007
- Identifier
- CFE0001607, ucf:47165
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001607
- Title
- RESOURCE-CONSTRAINT AND SCALABLE DATA DISTRIBUTION MANAGEMENT FOR HIGH LEVEL ARCHITECTURE.
- Creator
-
Gupta, Pankaj, Guha, Ratan, University of Central Florida
- Abstract / Description
-
In this dissertation, we present an efficient algorithm, called P-Pruning algorithm, for data distribution management problem in High Level Architecture. High Level Architecture (HLA) presents a framework for modeling and simulation within the Department of Defense (DoD) and forms the basis of IEEE 1516 standard. The goal of this architecture is to interoperate multiple simulations and facilitate the reuse of simulation components. Data Distribution Management (DDM) is one of the six...
Show moreIn this dissertation, we present an efficient algorithm, called P-Pruning algorithm, for data distribution management problem in High Level Architecture. High Level Architecture (HLA) presents a framework for modeling and simulation within the Department of Defense (DoD) and forms the basis of IEEE 1516 standard. The goal of this architecture is to interoperate multiple simulations and facilitate the reuse of simulation components. Data Distribution Management (DDM) is one of the six components in HLA that is responsible for limiting and controlling the data exchanged in a simulation and reducing the processing requirements of federates. DDM is also an important problem in the parallel and distributed computing domain, especially in large-scale distributed modeling and simulation applications, where control on data exchange among the simulated entities is required. We present a performance-evaluation simulation study of the P-Pruning algorithm against three techniques: region-matching, fixed-grid, and dynamic-grid DDM algorithms. The P-Pruning algorithm is faster than region-matching, fixed-grid, and dynamic-grid DDM algorithms as it avoid the quadratic computation step involved in other algorithms. The simulation results show that the P-Pruning DDM algorithm uses memory at run-time more efficiently and requires less number of multicast groups as compared to the three algorithms. To increase the scalability of P-Pruning algorithm, we develop a resource-efficient enhancement for the P-Pruning algorithm. We also present a performance evaluation study of this resource-efficient algorithm in a memory-constraint environment. The Memory-Constraint P-Pruning algorithm deploys I/O efficient data-structures for optimized memory access at run-time. The simulation results show that the Memory-Constraint P-Pruning DDM algorithm is faster than the P-Pruning algorithm and utilizes memory at run-time more efficiently. It is suitable for high performance distributed simulation applications as it improves the scalability of the P-Pruning algorithm by several order in terms of number of federates. We analyze the computation complexity of the P-Pruning algorithm using average-case analysis. We have also extended the P-Pruning algorithm to three-dimensional routing space. In addition, we present the P-Pruning algorithm for dynamic conditions where the distribution of federated is changing at run-time. The dynamic P-Pruning algorithm investigates the changes among federates regions and rebuilds all the affected multicast groups. We have also integrated the P-Pruning algorithm with FDK, an implementation of the HLA architecture. The integration involves the design and implementation of the communicator module for mapping federate interest regions. We provide a modular overview of P-Pruning algorithm components and describe the functional flow for creating multicast groups during simulation. We investigate the deficiencies in DDM implementation under FDK and suggest an approach to overcome them using P-Pruning algorithm. We have enhanced FDK from its existing HLA 1.3 specification by using IEEE 1516 standard for DDM implementation. We provide the system setup instructions and communication routines for running the integrated on a network of machines. We also describe implementation details involved in integration of P-Pruning algorithm with FDK and provide results of our experiences.
Show less - Date Issued
- 2007
- Identifier
- CFE0001949, ucf:47447
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001949
- Title
- THE USE OF THE UCF DRIVING SIMIULATOR TO TEST THE CONTRIBUTION OF LARGER SIZE VEHICLES (LSVS) IN REAR-END COLLISIONS AND RED LIGHT RUNNING ON INTERSECTIONS.
- Creator
-
Harb, Rami, Radwan, Essam, University of Central Florida
- Abstract / Description
-
Driving safety has been an issue of great concern in the United States throughout the years. According to the National Center for Statistics and Analysis (NCSA), in 2003 alone, there were 6,267,000 crashes in the U.S. from which 1,915,000 were injury crashes, including 38,764 fatal crashes and 43,220 human casualties. The U.S. Department of Transportation spends millions of dollars every year on research that aims to improve roadway safety and decrease the number of traffic collisions. In...
Show moreDriving safety has been an issue of great concern in the United States throughout the years. According to the National Center for Statistics and Analysis (NCSA), in 2003 alone, there were 6,267,000 crashes in the U.S. from which 1,915,000 were injury crashes, including 38,764 fatal crashes and 43,220 human casualties. The U.S. Department of Transportation spends millions of dollars every year on research that aims to improve roadway safety and decrease the number of traffic collisions. In spring 2002, the Center for Advanced Traffic System Simulation (CATSS), at the University of Central Florida, acquired a sophisticated reconfigurable driving simulator. This simulator, which consists of a late model truck cab, or passenger vehicle cab, mounted on a motion base capable of operation with six degrees of freedom, is a great tool for traffic studies. Two applications of the simulator are to study the contribution of Light Truck Vehicles (LTVs) to potential rear-end collisions, the most common type of crashes, which account for about a third of the U.S. traffic crashes, and the involvement of Larger Size Vehicles (LSVs) in red light running. LTVs can obstruct horizontal visibility for the following car driver and has been a major issue, especially at unsignalized intersections. The sudden stop of an LTV, in the shadow of the blindness of the succeeding car driver, may deprive the following vehicle of a sufficient response time, leading to high probability of a rear-end collision. As for LSVs, they can obstruct the vertical visibility of the traffic light for the succeeding car driver on signalized intersection producing a potential red light running for the latter. Two sub-scenarios were developed in the UCF driving simulator for each the vertical and horizontal visibility blockage scenarios. The first sub-scenario is the base sub-scenario for both scenarios, where the simulator car follows a passenger car, and the second sub-scenario is the test sub-scenario, where the simulator car follows an LTV for the horizontal visibility blockage scenario and an LSV for the vertical visibility blockage scenario. A suggested solution for the vertical visibility blockage of the traffic light problem that consisted of adding a traffic signal pole on the right side of the road was also designed in the driving simulator. The results showed that LTVs produce more rear-end collisions at unsignalized intersections due to the horizontal visibility blockage and following car drivers' behavior. The results also showed that LSVs contribute significantly to red light running on signalized intersections and that the addition of a traffic signal pole on the right side of the road reduces the red light running probability.
Show less - Date Issued
- 2005
- Identifier
- CFE0000626, ucf:46513
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000626
- Title
- GRAPH-THEORETIC APPROACH TO MODELING PROPAGATION AND CONTROL OF NETWORK WORMS.
- Creator
-
Nikoloski, Zoran, Deo, Narsingh, University of Central Florida
- Abstract / Description
-
In today's network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2)...
Show moreIn today's network-dependent society, cyber attacks with network worms have become the predominant threat to confidentiality, integrity, and availability of network computing resources. Despite ongoing research efforts, there is still no comprehensive network-security solution aimed at controling large-scale worm propagation. The aim of this work is fivefold: (1) Developing an accurate combinatorial model of worm propagation that can facilitate the analysis of worm control strategies, (2) Building an accurate epidemiological model for the propagation of a worm employing local strategies, (3) Devising distributed architecture and algorithms for detection of worm scanning activities, (4) Designing effective control strategies against the worm, and (5) Simulation of the developed models and strategies on large, scale-free graphs representing real-world communication networks. The proposed pair-approximation model uses the information about the network structure--order, size, degree distribution, and transitivity. The empirical study of propagation on large scale-free graphs is in agreement with the theoretical analysis of the proposed pair-approximation model. We, then, describe a natural generalization of the classical cops-and-robbers game--a combinatorial model of worm propagation and control. With the help of this game on graphs, we show that the problem of containing the worm is NP-hard. Six novel near-optimal control strategies are devised: combination of static and dynamic immunization, reactive dynamic and invariant dynamic immunization, soft quarantining, predictive traffic-blocking, and contact-tracing. The analysis of the predictive dynamic traffic-blocking, employing only local information, shows that the worm can be contained so that 40\% of the network nodes are not affected. Finally, we develop the Detection via Distributed Blackholes architecture and algorithm which reflect the propagation strategy used by the worm and the salient properties of the network. Our distributed detection algorithm can detect the worm scanning activity when only 1.5% of the network has been affected by the propagation. The proposed models and algorithms are analyzed with an individual-based simulation of worm propagation on realistic scale-free topologies.
Show less - Date Issued
- 2005
- Identifier
- CFE0000640, ucf:46521
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000640
- Title
- MULTIPLE SCATTERING OF LIGHT IN INHOMOGENEOUS MEDIA AND APPLICATIONS.
- Creator
-
Mujat, Claudia, Dogariu, Aristide, University of Central Florida
- Abstract / Description
-
Light scattering-based techniques are being developed for non-invasive diagnostics of inhomogeneous media in various fields, such as medicine, biology, and material characterization. However, as most media of interest are highly scattering and have a complex structure, it is difficult to obtain a full analytical solution of the scattering problem without introducing approximations and assumptions about the properties of the system under consideration. Moreover, most of the previous studies...
Show moreLight scattering-based techniques are being developed for non-invasive diagnostics of inhomogeneous media in various fields, such as medicine, biology, and material characterization. However, as most media of interest are highly scattering and have a complex structure, it is difficult to obtain a full analytical solution of the scattering problem without introducing approximations and assumptions about the properties of the system under consideration. Moreover, most of the previous studies deal with idealized scattering situations, rarely encountered in practice. This dissertation provides new analytical, numerical, and experimental solutions to describe subtle effects introduced by the properties of the light sources, and by the boundaries, absorption and morphology of the investigated media. A novel Monte Carlo simulation was developed to describe the statistics of partially coherent beams after propagation through inhomogeneous media. The Monte Carlo approach also enabled us to study the influence of the refractive index contrast on the diffusive processes, to discern between different effects of absorption in multiple scattering, and to support experimental results on inhomogeneous media with complex morphology. A detailed description of chromatic effects in scattering was used to develop new models that explain the spectral dependence of the detected signal in applications such as imaging and diffuse reflectance measurements. The quantitative and non-invasive characterization of inhomogeneous media with complex structures, such as porous membranes, diffusive coatings, and incipient lesions in natural teeth was then demonstrated.
Show less - Date Issued
- 2004
- Identifier
- CFE0000048, ucf:46143
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000048
- Title
- REDUCTION OF VORTEX-DRIVEN OSCILLATIONS IN A SOLID ROCKET MOTOR COLD FLOW SIMULATION THROUGH ACTIVE CONTROL.
- Creator
-
Ward, Jami, Leonessa, Alexander, University of Central Florida
- Abstract / Description
-
Control of vortex-driven instabilities was demonstrated via a scaled-down, cold-flow simulation that modeled closed-end acoustics. When vortex shedding frequencies couple with the natural acoustic modes of a choked chamber, potentially damaging low-frequency instabilities may arise. Although passive solutions can be effective, an active control solution is preferable. An experiment was performed to demonstrate an active control scheme for the reduction of vortex-driven oscillations. A non...
Show moreControl of vortex-driven instabilities was demonstrated via a scaled-down, cold-flow simulation that modeled closed-end acoustics. When vortex shedding frequencies couple with the natural acoustic modes of a choked chamber, potentially damaging low-frequency instabilities may arise. Although passive solutions can be effective, an active control solution is preferable. An experiment was performed to demonstrate an active control scheme for the reduction of vortex-driven oscillations. A non-reacting experiment using a primary flow of air, where both the duct exit and inlet are choked, simulated the closed-end acoustics. Two plates, separated by 1.27 cm, produced the vortex shedding phenomenon at the chamber's first longitudinal mode. Two active control schemes, closed-loop and open-loop, were studied via a cold-flow simulation for validating the effects of reducing vortex shedding instabilities in the system. Actuation for both control schemes was produced by using a secondary injection method. The actuation system consisted of pulsing compressed air from a modifed, 2-stroke model airplane engine, controlled and powered by a DC motor. The use of open-loop only active control was not highly effective in reducing the amplitude of the first longitudinal acoustic mode, near 93 Hz, when the secondary injection was pulsed at the same modal frequency. This was due to the uncontrolled phasing of the secondary injection system. A Pulse Width Modulated (PWM) signal was added to the open-loop control scheme to correct for improper phasing of the secondary injection flow relative to the primary flow. This addition allowed the motor speed to be intermittently increased to a higher RPM before returning to the desired open-loop control state. This proved to be effective in reducing the pressure disturbance by approximately 46%. A closed-loop control scheme was then test for its effectiveness in controlling the phase of the secondary injection. Feedback of the system's state was determined by placing a dynamic pressure transducer near the chamber exit. Closed-loop active control, using the designed secondary injection system, was proven as an effective means of reducing the problematic instabilities. A 50% reduction in the FFT RMS amplitude was realized by utilizing a Proportional-Derivative controller to modify the phase of the secondary injection.
Show less - Date Issued
- 2006
- Identifier
- CFE0000920, ucf:46728
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000920
- Title
- ANALYSIS, MODELING, AND SIMULATION OF THE TIDES IN THE LOXAHATCHEE RIVER ESTUARY (SOUTHEASTERN FLORIDA).
- Creator
-
Bacopoulos, Peter, Hagen, Scott, University of Central Florida
- Abstract / Description
-
Recent cooperative efforts between the University of Central Florida, the Florida Department of Environmental Protection, and the South Florida Water Management District explore the development of a two-dimensional, depth-integrated tidal model for the Loxahatchee River estuary (Southeastern Florida). Employing a large-domain approach (i.e., the Western North Atlantic Tidal model domain), two-dimensional tidal flows within the Loxahatchee River estuary are reproduced to provide: 1)...
Show moreRecent cooperative efforts between the University of Central Florida, the Florida Department of Environmental Protection, and the South Florida Water Management District explore the development of a two-dimensional, depth-integrated tidal model for the Loxahatchee River estuary (Southeastern Florida). Employing a large-domain approach (i.e., the Western North Atlantic Tidal model domain), two-dimensional tidal flows within the Loxahatchee River estuary are reproduced to provide: 1) recommendations for the domain extent of an integrated, surface/groundwater, three-dimensional model; 2) nearshore, harmonically decomposed, tidal elevation boundary conditions. Tidal simulations are performed using a two-dimensional, depth-integrated, finite element-based code for coastal and ocean circulation, ADCIRC-2DDI. Multiple variations of an unstructured, finite element mesh are applied to encompass the Loxahatchee River estuary and different spatial extents of the Atlantic Intracoastal Waterway (AIW). Phase and amplitude errors between model output and historical data are quantified at five locations within the Loxahatchee River estuary to emphasize the importance of including the AIW in the computational domain. In addition, velocity residuals are computed globally to reveal significantly different net circulation patterns within the Loxahatchee River estuary, as depending on the spatial coverage of the AIW.
Show less - Date Issued
- 2006
- Identifier
- CFE0000925, ucf:46755
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000925
- Title
- THE ROLE OF DOMAIN EXPERTISE AND JUDGMENT IN DEALING WITH UNEXPECTED EVENTS.
- Creator
-
Kochan, Janeen, Jentsch, Florian, University of Central Florida
- Abstract / Description
-
Unexpected events, particularly those creating surprise, interrupt ongoing mental and behavioral processes, creating an increased potential for unwanted outcomes to the situation. Human reactions to unexpected events vary. One can hypothesize a number of reasons for this variation, including level of domain expertise, previous experience with similar events, emotional connotation, and the contextual surround of the event. Whereas interrupting ongoing activities and focusing attention...
Show moreUnexpected events, particularly those creating surprise, interrupt ongoing mental and behavioral processes, creating an increased potential for unwanted outcomes to the situation. Human reactions to unexpected events vary. One can hypothesize a number of reasons for this variation, including level of domain expertise, previous experience with similar events, emotional connotation, and the contextual surround of the event. Whereas interrupting ongoing activities and focusing attention temporarily on a surprising event may be a useful evolutionary response to a threatening situation, the same process may be maladaptive in today's highly dynamic world. The purpose of this study was to investigate how different aspects of expertise affected one's ability to detect and react to an unexpected event. It was hypothesized that there were two general types of expertise, domain expertise and judgment (Hammond, 2000), which influenced one's performance on dealing with an unexpected event. The goal of the research was to parse out the relative contribution of domain expertise, so the role of judgment could be revealed. The research questions for this study were: (a) Can we identify specific knowledges and skills which enhance one's ability to deal with unexpected events? (b) Are these skills "automatically" included in domain expertise? (c) How does domain expertise improve or deter one's reaction and response to unexpected events? (d) What role does judgment play in responding to surprise? The general hypothesis was that good judgment would influence the process of surprise at different stages and in different ways than would domain expertise. The conclusions from this research indicated that good judgment had a significant positive effect in helping pilots deal with unexpected events. This was most pronounced when domain expertise was low.
Show less - Date Issued
- 2005
- Identifier
- CFE0000721, ucf:46609
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000721
- Title
- IDENTIFICATION OF SYSTEM DESIGN FEATURES THAT AFFECT SICKNESS IN VIRTUAL ENVIRONMENTS.
- Creator
-
Drexler, Julie, Malone, Linda, University of Central Florida
- Abstract / Description
-
The terms "simulator" and "VR" are typically used to refer to specific types of virtual environments (VEs) which differ in the technology used to display the simulated environment. While simulators and VR devices may offer advantages such as low cost training, numerous studies on the effects to humans of exposure to different VEs indicate that motion sickness-like symptoms are often produced during or after exposure to the simulated environment. These deleterious side effects have the...
Show moreThe terms "simulator" and "VR" are typically used to refer to specific types of virtual environments (VEs) which differ in the technology used to display the simulated environment. While simulators and VR devices may offer advantages such as low cost training, numerous studies on the effects to humans of exposure to different VEs indicate that motion sickness-like symptoms are often produced during or after exposure to the simulated environment. These deleterious side effects have the potential to limit the utilization of VE systems if they jeopardize the health and/or safety of the user and create liability issues for the manufacturer. The most widely used method for assessing the adverse symptoms of VE exposure is the Simulator Sickness Questionnaire (SSQ). The method of scoring the symptoms reported by VE users permits the different sickness symptoms to be clustered into three general types of effects or subscales and the distribution or pattern of the three SSQ subscales provides a profile for a given VE device. In the current research, several different statistical analyses were conducted on the SSQ data obtained from 21 different simulator studies and 16 different VR studies in order to identify an underlying symptom structure (i.e., SSQ profile) or severity difference for various types of VE systems. The results of the research showed statistically significant differences in the SSQ profiles and the overall severity of sickness between simulator and VR systems, which provide evidence that simulator sickness and VR sickness represent distinct forms of motion sickness. Analyses on three types of simulators (i.e., Fixed- and Rotary-Wing flight simulators and Driving simulators) also found significant differences in the sickness profiles as well as the overall severity of sickness within different types of simulator systems. Analyses on three types of VR systems (i.e., HMD, BOOM, and CAVE) revealed that BOOM and CAVE systems have similar sickness profiles, which are different than the HMD system profile. Moreover, the results showed that the overall severity of sickness was greater in HMD systems than in BOOM and CAVE systems. Recommendations for future research included additional psychophysical studies to evaluate the relationship between various engineering characteristics of VE systems and the specific types of sickness symptoms that are produced from exposure to them.
Show less - Date Issued
- 2006
- Identifier
- CFE0000989, ucf:46700
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000989
- Title
- RECOGNIZING PAIN USING NOVEL SIMULATION TECHNOLOGY.
- Creator
-
Grace, Justin C, Allred, Kelly, University of Central Florida
- Abstract / Description
-
Effective pain management and time to treatment is essential in patient care. Despite scientific evidence supporting the need to treat pain and an emphasis on addressing pain as a priority, pain management continues to be an unresolved issue. As a member of the health care team, nurses are integral to optimal pain management. Currently, nursing schools have limited innovative or alternative methods for teaching pain assessment and management. Simulation in nursing education provides a unique...
Show moreEffective pain management and time to treatment is essential in patient care. Despite scientific evidence supporting the need to treat pain and an emphasis on addressing pain as a priority, pain management continues to be an unresolved issue. As a member of the health care team, nurses are integral to optimal pain management. Currently, nursing schools have limited innovative or alternative methods for teaching pain assessment and management. Simulation in nursing education provides a unique opportunity to expose students to realistic patient situations and allow them to learn and make mistakes without causing harm. However, modern low- and high-fidelity simulation technology is unable to display emotion, pain, or any facial expression. This limits training and education of conditions that may partially rely on the identification of symptoms based on the alteration of facial appearance, such as pain or stroke. This research explored student nurses� perception of new technology that displayed computer-generated faces, each expressing varying degrees of physical expressions of pain. A total of 15 nursing students participated in the study. Students were asked to interpret the level of pain in four sequential faces using a numeric rating scale of 0-10, with 0 indicating no pain, and 10 the most severe pain possible. After scoring the faces, students were asked to answer four open-ended questions addressing the technology. Results of the study indicate a majority of nursing students believe the technology should be implemented into nursing curriculum and interacting with the projected faces was more beneficial than traditional teaching methods. Eventually, the potential for increased identification of conditions requiring observation of subtle facial changes will be explored.
Show less - Date Issued
- 2016
- Identifier
- CFH2000002, ucf:45569
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH2000002
- Title
- DRIVING SIMULATOR VALIDATION AND REAR-END CRASH RISK ANALYSIS AT A SIGNALISED INTERSECTION.
- Creator
-
Chilakapati, Praveen, Abdel-Aty, Mohamed, University of Central Florida
- Abstract / Description
-
In recent years the use of advanced driving simulators has increased in the transportation engineering field especially in evaluating safety countermeasures. The driving simulator at UCF is a high fidelity simulator with six degrees of freedom. This research aims at validating the simulator in terms of speed and safety with the intention of using it as a test bed for high risk locations and to use it in developing traffic safety countermeasures. The Simulator replicates a real world...
Show moreIn recent years the use of advanced driving simulators has increased in the transportation engineering field especially in evaluating safety countermeasures. The driving simulator at UCF is a high fidelity simulator with six degrees of freedom. This research aims at validating the simulator in terms of speed and safety with the intention of using it as a test bed for high risk locations and to use it in developing traffic safety countermeasures. The Simulator replicates a real world signalized intersection (Alafaya trail (SR-434) and Colonial Drive (SR-50)). A total of sixty one subjects of age ranging from sixteen to sixty years were recruited to drive the simulator for the experiment, which consists of eight scenarios. This research validates the driving simulator for speed, safety and visual aspects. Based on the overall comparisons of speed between the simulated results and the real world, it was concluded that the UCF driving simulator is a valid tool for traffic studies related to driving speed behavior. Based on statistical analysis conducted on the experiment results, it is concluded that SR-434 northbound right turn lane and SR-50 eastbound through lanes have a higher rear-end crash risk than that at SR-50 westbound right turn lane and SR-434 northbound through lanes, respectively. This conforms to the risk of rear-end crashes observed at the actual intersection. Therefore, the simulator is validated for using it as an effective tool for traffic safety studies to test high-risk intersection locations. The driving simulator is also validated for physical and visual aspects of the intersection as 87.10% of the subjects recognized the intersection and were of the opinion that the replicated intersection was good enough or realistic. A binary logistic regression model was estimated and was used to quantify the relative rear-end crash risk at through lanes. It was found that in terms of rear-end crash risk SR50 east- bound approach is 23.67% riskier than the SR434 north-bound approach.
Show less - Date Issued
- 2006
- Identifier
- CFE0001391, ucf:46964
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001391
- Title
- ITERCHANGING DISCRETE EVENT SIMULATIONPROCESS INTERACTION MODELSUSING THE WEB ONTOLOGY LANGUAGE - OWL.
- Creator
-
Lacy, Lee, Sepulveda, Jose, University of Central Florida
- Abstract / Description
-
Discrete event simulation development requires significant investments in time and resources. Descriptions of discrete event simulation models are associated with world views, including the process interaction orientation. Historically, these models have been encoded using high-level programming languages or special purpose, typically vendor-specific, simulation languages. These approaches complicate simulation model reuse and interchange. The current document-centric World Wide Web is...
Show moreDiscrete event simulation development requires significant investments in time and resources. Descriptions of discrete event simulation models are associated with world views, including the process interaction orientation. Historically, these models have been encoded using high-level programming languages or special purpose, typically vendor-specific, simulation languages. These approaches complicate simulation model reuse and interchange. The current document-centric World Wide Web is evolving into a Semantic Web that communicates information using ontologies. The Web Ontology Language OWL, was used to encode a Process Interaction Modeling Ontology for Discrete Event Simulations (PIMODES). The PIMODES ontology was developed using ontology engineering processes. Software was developed to demonstrate the feasibility of interchanging models from commercial simulation packages using PIMODES as an intermediate representation. The purpose of PIMODES is to provide a vendor-neutral open representation to support model interchange. Model interchange enables reuse and provides an opportunity to improve simulation quality, reduce development costs, and reduce development times.
Show less - Date Issued
- 2006
- Identifier
- CFE0001353, ucf:46977
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0001353
- Title
- A METHODOLOGY TO STABILIZE THE SUPPLY CHAIN.
- Creator
-
Sarmiento, Alfonso, Rabelo, Luis, University of Central Florida
- Abstract / Description
-
In todayÃÂ's world, supply chains are facing market dynamics dominated by strong global competition, high labor costs, shorter product life cycles, and environmental regulations. Supply chains have evolved to keep pace with the rapid growth in these business dynamics, becoming longer and more complex. As a result, supply chains are systems with a great number of network connections among their multiple components. The interactions of the network components with respect...
Show moreIn todayÃÂ's world, supply chains are facing market dynamics dominated by strong global competition, high labor costs, shorter product life cycles, and environmental regulations. Supply chains have evolved to keep pace with the rapid growth in these business dynamics, becoming longer and more complex. As a result, supply chains are systems with a great number of network connections among their multiple components. The interactions of the network components with respect to each other and the environment cause these systems to behave in a highly nonlinear dynamic manner. Ripple effects that have a huge, negative impact on the behavior of the supply chain (SC) are called instabilities. They can produce oscillations in demand forecasts, inventory levels, and employment rates and, cause unpredictability in revenues and profits. Instabilities amplify risk, raise the cost of capital, and lower profits. To reduce these negative impacts, modern enterprise managers must be able to change policies and plans quickly when those consequences can be detrimental. This research proposes the development of a methodology that, based on the concepts of asymptotic stability and accumulated deviations from equilibrium (ADE) convergence, can be used to stabilize a great variety of supply chains at the aggregate levels of decision making that correspond to strategic and tactical decision levels. The general applicability and simplicity of this method make it an effective tool for practitioners specializing in the stability analysis of systems with complex dynamics, especially those with oscillatory behavior. This methodology captures the dynamics of the supply chain by using system dynamics (SD) modeling. SD was the chosen technique because it can capture the complex relationships, feedback processes, and multiple time delays that are typical of systems in which oscillations are present. If the behavior of the supply chain shows instability patterns, such as ripple effects, the methodology solves an optimization problem to find a stabilization policy to remove instability or minimize its impact. The policy optimization problem relies upon a theorem which states that ADE convergence of a particular state variable of the system, such as inventory, implies asymptotic stability for that variable. The stabilization based on the ADE requires neither linearization of the system nor direct knowledge of the internal structure of the model. Moreover, the ADE concept can be incorporated easily in any SD modeling language. The optimization algorithm combines the advantage of particle swarm optimization (PSO) to determine good regions of the search space with the advantage of local optimization to quickly find the optimal point within those regions. The local search uses a Powell hill-climbing (PHC) algorithm as an improved procedure to the solution obtained from the PSO algorithm, which assures a fast convergence of the ADE. The experiments showed that solutions generated by this hybrid optimization algorithm were robust. A framework built on the premises of this methodology can contribute to the analysis of planning strategies to design robust supply chains. These improved supply chains can then effectively cope with significant changes and disturbances, providing companies with the corresponding cost savings.
Show less - Date Issued
- 2010
- Identifier
- CFE0002986, ucf:47977
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002986
- Title
- ESTUARINE INFLUENCE ON TIDALLY DRIVEN CIRCULATION IN THE SOUTH ATLANTIC BIGHT.
- Creator
-
Bacopoulos, Peter, Hagen, Scott, University of Central Florida
- Abstract / Description
-
A high-resolution, finite element-based, shallow water equation model is developed to simulate the tides in the South Atlantic Bight. The model is constructed to include all of the estuarine features along the southeastern United States seaboard: coastal inlets, rivers and tidal creeks, sounds and lagoons, intertidal zones including salt marshes and mangrove swamps, and the Atlantic Intracoastal Waterway. The estuaries are represented in the finite element mesh using triangular elements with...
Show moreA high-resolution, finite element-based, shallow water equation model is developed to simulate the tides in the South Atlantic Bight. The model is constructed to include all of the estuarine features along the southeastern United States seaboard: coastal inlets, rivers and tidal creeks, sounds and lagoons, intertidal zones including salt marshes and mangrove swamps, and the Atlantic Intracoastal Waterway. The estuaries are represented in the finite element mesh using triangular elements with side lengths on the order of tens of meters. Also incorporated into the model is a spatially distributed bottom friction parameterization, based on the various landcover and benthic characteristics in the domain. The motivation to use this comprehensive representation of the system was inspired by a desire to capably account for the full estuarine tidal physics. In this approach, no calibration is performed and the model is used as a tool to assess the physical processes it describes. Upon its development, the model is first validated by accurately simulating tidal hydrodynamics in the South Atlantic Bight including the described estuaries. Variants of the model are then constructed by selectively removing estuarine features from the domain. All model representations are subsequently applied in nearly identical simulations: the only differing factor between the simulations being the inland extent of the estuaries described. The solutions are compared with respect to including versus excluding the estuarine features of the domain. Where water surface elevations are shown to be unaffected by the estuarine features of the South Atlantic Bight, tidal velocities exhibit far more sensitivity. This effect is pronounced locally, with regional effects extending offshore. Further analysis is performed on cross-sectional flows recomposed locally and on tidal energetics diagnosed throughout the domain. It is discovered that the high frictional environment of the vast estuarine surface area plays a role in local and regional tidal circulation in the South Atlantic Bight.
Show less - Date Issued
- 2009
- Identifier
- CFE0002891, ucf:48028
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002891
- Title
- Design and Motion Control of a Four Degree of Freedom Robotic Needle Guide for MRI-Guided Intervention.
- Creator
-
Zhang, Shihao, Song, Sang-Eun, Xu, Yunjun, Bagci, Ulas, University of Central Florida
- Abstract / Description
-
In the past several MRI compatible robotic needle guide devices for targeted prostate biopsy have been developed. The large and complex structure have been identified as the major limitations of those devices. Such limitations, in addition to complex steps for device to image registration have prevented widespread implementation of MRI-guided prostate biopsy despite the advantages of MRI compared to TRUS. We have designed a compact MRI-guided robotic intervention with the capability to have...
Show moreIn the past several MRI compatible robotic needle guide devices for targeted prostate biopsy have been developed. The large and complex structure have been identified as the major limitations of those devices. Such limitations, in addition to complex steps for device to image registration have prevented widespread implementation of MRI-guided prostate biopsy despite the advantages of MRI compared to TRUS. We have designed a compact MRI-guided robotic intervention with the capability to have angulated insertion to avoid damage to any anatomical feature along the needle path. The system consists of a novel mechanism driven Robotic Needle Guide (RNG). The RNG is a 4-DOF robotic needle manipulator mounted on a Gross Positioning Module (GPM), which is locked on the MRI table. The RNG consists of four parallel stacked disks with an engraved profile path. The rotary motion and positioning of the discs at an angle aids in guiding the biopsy needle. Once a clinician selects a target for needle insertion, the intervention provides possible insertion angles. Then, the most suitable angle is selected by the clinician based on the safest trajectory. The selected target and insertion angle are then computed as control parameters of RNG i.e. the discs are then rotated to the required angle. Insertion is followed by quick confirmation scans to ascertain needle position at all times.
Show less - Date Issued
- 2018
- Identifier
- CFE0007116, ucf:51942
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007116
- Title
- Analysis of Remote Tripping Command Injection Attacks in Industrial Control Systems Through Statistical and Machine Learning Methods.
- Creator
-
Timm, Charles, Caulkins, Bruce, Wiegand, Rudolf, Lathrop, Scott, University of Central Florida
- Abstract / Description
-
In the past decade, cyber operations have been increasingly utilized to further policy goals of state-sponsored actors to shift the balance of politics and power on a global scale. One of the ways this has been evidenced is through the exploitation of electric grids via cyber means. A remote tripping command injection attack is one of the types of attacks that could have devastating effects on the North American power grid. To better understand these attacks and create detection axioms to...
Show moreIn the past decade, cyber operations have been increasingly utilized to further policy goals of state-sponsored actors to shift the balance of politics and power on a global scale. One of the ways this has been evidenced is through the exploitation of electric grids via cyber means. A remote tripping command injection attack is one of the types of attacks that could have devastating effects on the North American power grid. To better understand these attacks and create detection axioms to both quickly identify and mitigate the effects of a remote tripping command injection attack, a dataset comprised of 128 variables (primarily synchrophasor measurements) was analyzed via statistical methods and machine learning algorithms in RStudio and WEKA software respectively. While statistical methods were not successful due to the non-linearity and complexity of the dataset, machine learning algorithms surpassed accuracy metrics established in previous research given a simplified dataset of the specified attack and normal operational data. This research allows future cybersecurity researchers to better understand remote tripping command injection attacks in comparison to normal operational conditions. Further, an incorporation of the analysis has the potential to increase detection and thus mitigate risk to the North American power grid in future work.
Show less - Date Issued
- 2018
- Identifier
- CFE0007257, ucf:52193
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007257