Current Search: Communication (x)
View All Items
Pages
- Title
- HEALTHCARE COMMUNICATION NETWORKS: THE DISSEMINATION OF EMPLOYEE INFORMATION FOR HOSPITAL SECURITY.
- Creator
-
Sumner, Jennifer, Liberman, Aaron, University of Central Florida
- Abstract / Description
-
ABSTRACT: Healthcare in the United States is a system that, organizationally speaking, is fragmented. Each hospital facility is independently operated and is responsible for the hiring of its own employees. However, corrupt individuals can take advantage of this fragmentation and move from hospital to hospital, gaining employment while hiding previous employment history. Traditionally, hospitals have been reluctant to share information on their previous employees, even with other hospitals,...
Show moreABSTRACT: Healthcare in the United States is a system that, organizationally speaking, is fragmented. Each hospital facility is independently operated and is responsible for the hiring of its own employees. However, corrupt individuals can take advantage of this fragmentation and move from hospital to hospital, gaining employment while hiding previous employment history. Traditionally, hospitals have been reluctant to share information on their previous employees, even with other hospitals, for fear of issues surrounding defamation, negligent hiring, and violation of the employee's privacy. However, growth in healthcare services is expected to rise exponentially in the near future, increasing the demand for employees. The need, therefore, to exchange pertinent information regarding employees will become necessary as hospitals seek qualified employees to fill positions throughout their organizations. One way to promote this information exchange is to develop trusted information sharing networks among hospital units. This study examined the problems surrounding organizational information sharing as well as the current level of employee information sharing being conducted by hospitals nationwide. Utilizing a survey of hospital administrators, this study drew upon the theoretical foundations of the Diffusion of Innovation Theory, the Knowledge Management Theory, the Social Exchange Theory and the earlier organizational information sharing frameworks established by Dawes (1996) and Landsbergen and Wolken (1998; 2001) in order to examine the variables that contribute to propensity of hospital administrators to engage in the sharing of employee information with other organizations.
Show less - Date Issued
- 2008
- Identifier
- CFE0002010, ucf:47609
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002010
- Title
- STUDY OF SYMBOLIC EXPRESSIONS IN PEKING OPERA'SCOSTUMES AND LYRICS.
- Creator
-
Li, Yiman, Akita, Kimiko, University of Central Florida
- Abstract / Description
-
This thesis represents an analysis of symbolic expressions used to convey traditional Chinese cultural values in marital relations as expressed through costumes and lyrics in Peking Opera plays and performances. Two symbols, dragon and phoenix, were selected from the costume collection. Four symbols--bird, tiger, wild goose, and dragon--were selected from compilations of lyrics. These symbols were selected because they expressed Chinese core cultural values, an imperial ideology based on...
Show moreThis thesis represents an analysis of symbolic expressions used to convey traditional Chinese cultural values in marital relations as expressed through costumes and lyrics in Peking Opera plays and performances. Two symbols, dragon and phoenix, were selected from the costume collection. Four symbols--bird, tiger, wild goose, and dragon--were selected from compilations of lyrics. These symbols were selected because they expressed Chinese core cultural values, an imperial ideology based on Confucian thoughts, which were practiced rigidly during Qing Dynasty (1644-1911). Modeling Theory is applied to argue that dragon and phoenix as visual symbols convey ideas about characters' background, marital relationship, social status shifts, and socio-culturally desirable values. Social Drama Theory is employed to analyze the lyrics to understand how ideal images of husband and wife are constructed. The archetypes of Chinese traditional culture that have influenced Chinese thought and action for centuries are discovered and discussed.
Show less - Date Issued
- 2008
- Identifier
- CFE0002149, ucf:47505
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002149
- Title
- EXAMINING INSTANT MESSAGING IMPACT ON LEARNING USING AN INTEGRATED WORKED-EXAMPLE FORMAT.
- Creator
-
Nasah, Angelique, Hirumi, Atsusi, University of Central Florida
- Abstract / Description
-
Instant messaging with Internet-based software is a ubiquitous form of communication in industrialized nations. In fact, many educators are observing that students engage with instant messaging while simultaneously engaged in academic activity. Though this type of multitasking is pervasive, educational researchers have not examined how the practice of instant messaging impacts learning outcomes. This dissertation describes the background, empirical and theoretical foundations, methods and...
Show moreInstant messaging with Internet-based software is a ubiquitous form of communication in industrialized nations. In fact, many educators are observing that students engage with instant messaging while simultaneously engaged in academic activity. Though this type of multitasking is pervasive, educational researchers have not examined how the practice of instant messaging impacts learning outcomes. This dissertation describes the background, empirical and theoretical foundations, methods and results of a study examining the impact of instant messaging activity on learning, where instant messaging and learning are simultaneous activities. The question posed is grounded in the related areas of instant messaging practices, the Generation M profile, Cognitive Load Theory, and integration of instant messaging in K-16 classrooms. This work presents empirical evidence pointing out the necessity of conducting empirical study regarding how instant messaging activity might impact learning. Quantitative methods used to conduct the study are presented including data collection instruments. The results of the study are discussed in broad terms related to Generation M and Cognitive Load Theory. Methodological limitations related to practice opportunities for the research sample as well as the performance measure used are detailed. In addition, implications of the results in relationship to those teaching members of Generation M in K-16 classrooms as well as those designing instruction for this population are discussed. The discussion concludes with recommendations for further research in this area.
Show less - Date Issued
- 2008
- Identifier
- CFE0002113, ucf:47540
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002113
- Title
- THE ROLE OF COMMUNICATION TECHNOLOGY IN ADOLESCENT RELATIONSHIPS AND IDENTITY DEVELOPMENT.
- Creator
-
Cyr, Betty-Ann, Berman, Dr. Steven, University of Central Florida
- Abstract / Description
-
Text messaging, e-mail, instant messaging, and social networking sites are changing the way people interact with each other. The popularity of these communication technologies among emerging adults in particular has grown exponentially, with little accompanying research to understand their influences on psychosocial development. This study explores the relationship between communication technology usage (text messaging, e-mail, instant messaging, and social networking) and adolescent...
Show moreText messaging, e-mail, instant messaging, and social networking sites are changing the way people interact with each other. The popularity of these communication technologies among emerging adults in particular has grown exponentially, with little accompanying research to understand their influences on psychosocial development. This study explores the relationship between communication technology usage (text messaging, e-mail, instant messaging, and social networking) and adolescent adjustment among 268 high school students. It was hypothesized that use of communication technology would be related to psychological adjustment, including identity development, relationship attachment and peer conflict. Participants were recruited from three public high schools in central Florida (69% female, 81.9% White). Time spent using communication technology was significantly correlated with psychological symptom severity (i.e. anxiety and depression), identity distress, peer aggression, and existential anxiety. It was also significantly but negatively correlated with relationship avoidance. Degree of usage of communication technology for interpersonal communication was significantly correlated with peer aggression, relationship anxiety, and existential anxiety. Those with a preoccupied style (high in relationship anxiety, low in relationship avoidance) spent significantly more time using communication technology than those in the dismissive (high in avoidance, low in anxiety), fearful (high in both), and secure (low in both) styles. Further analyses and their implications for adolescent development will be discussed.
Show less - Date Issued
- 2012
- Identifier
- CFH0004213, ucf:44908
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH0004213
- Title
- Understanding Crisis Communication and Mobility Resilience during Disasters from Social Media.
- Creator
-
Roy, Kamol, Hasan, Samiul, Eluru, Naveen, Wu, Yina, University of Central Florida
- Abstract / Description
-
Rapid communication during extreme events is one of the critical aspects of successful disaster management strategies. Due to their ubiquitous nature, social media platforms offer a unique opportunity for crisis communication. Moreover, social media usage on GPS enabled devices such as smartphones allow us to collect human movement data which can help understanding mobility during a disaster. This study leverages social media (Twitter) data to understand the effectiveness of social media...
Show moreRapid communication during extreme events is one of the critical aspects of successful disaster management strategies. Due to their ubiquitous nature, social media platforms offer a unique opportunity for crisis communication. Moreover, social media usage on GPS enabled devices such as smartphones allow us to collect human movement data which can help understanding mobility during a disaster. This study leverages social media (Twitter) data to understand the effectiveness of social media-based communication and the resilience of human mobility during a disaster. This thesis has two major contributions. First, about 52.5 million tweets related to hurricane Sandy are analyzed to assess the effectiveness of social media communication during disasters and identify the contributing factors leading to effective crisis communication strategies. Effectiveness of a social media user is defined as the ratio of attention gained over the number of tweets posted. A model is developed to explain more effective users based on several relevant features. Results indicate that during a disaster event, only few social media users become highly effective in gaining attention. In addition, effectiveness does not depend on the frequency of tweeting activity only; instead it depends on the number of followers and friends, user category, bot score (controlled by a human or a machine), and activity patterns (predictability of activity frequency). Second, to quantify the impacts of an extreme event to human movements, we introduce the concept of mobility resilience which is defined as the ability of a mobility infrastructure system to manage shocks and return to a steady state in response to an extreme event. We present a method to detect extreme events from geo-located movement data and to measure mobility resilience and loss of resilience due to those events. Applying this method, we measure resilience metrics from geo-located social media data for multiple types of disasters occurred all over the world. Quantifying mobility resilience may help us to assess the higher-order socio-economic impacts of extreme events and guide policies towards developing resilient infrastructures as well as a nation's overall disaster resilience.
Show less - Date Issued
- 2018
- Identifier
- CFE0007362, ucf:52090
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007362
- Title
- Implementing Gameplay Skills to Increase Eye Contact and Communication for Students with Emotional and Behavioral Disorder and Comorbid Disabilities.
- Creator
-
Wills-Jackson, Celestial, Hines, Rebecca, Dieker, Lisa, Lue, Martha, Wilkins, Ilene, University of Central Florida
- Abstract / Description
-
This study was conducted to examine the effectiveness of gameplay activities using a structured social skills program to increase both eye contact responses and the number of verbal responses during peer relationships for students with comorbid disabilities in a clinical setting.This SEL intervention was modified for children with comorbid autism spectrum disorder (ASD) and emotional and behavioral disorder (EBD). A single-subject, multiple-baseline, across-participants design was used....
Show moreThis study was conducted to examine the effectiveness of gameplay activities using a structured social skills program to increase both eye contact responses and the number of verbal responses during peer relationships for students with comorbid disabilities in a clinical setting.This SEL intervention was modified for children with comorbid autism spectrum disorder (ASD) and emotional and behavioral disorder (EBD). A single-subject, multiple-baseline, across-participants design was used. Participants included adolescents (n = 6) with comorbid disabilities, predominantly ASD and EBD, their board-certified behavior analysts (BCBA), and six behavior technicians. The researcher established and maintained face-to-face reciprocal peer social engagements (communication) and direct eye gaze (contact) with participants in dyad groups. Each session included a 60-minute video of peer social interactions. Direct observations, differential reinforcement of other behaviors (DRO), and pre- and post-Social Skills Improvement System-Rating Scales (SSIS-RS) were examined. Evidence of SEL intervention effectiveness was measured by percentage of nonoverlapping data points (PND). Social validity was measured using the multiple-rater SSIS-RS and intervention fidelity checklists evaluating the Sanford Harmony intervention. Results from data and visual analysis revealed all participants significantly increased their direct eye contact, verbal reciprocity, and social engagements after implementing the Harmony program. In addition, a PND value of 100% was calculated for each dependent variable indicating the Harmony program was a highly effective intervention increasing eye contact, verbal reciprocity, and social engagements for students with EBD and comorbid disabilities.
Show less - Date Issued
- 2018
- Identifier
- CFE0007266, ucf:52196
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007266
- Title
- Autonomous Discovery and Maintenance of Mobile Frees-Space-Optical Links.
- Creator
-
Khan, Mahmudur, Yuksel, Murat, Pourmohammadi Fallah, Yaser, Ewetz, Rickard, Turgut, Damla, Nam, Boo Hyun, University of Central Florida
- Abstract / Description
-
Free-Space-Optical (FSO) communication has the potential to play a significant role in future generation wireless networks. It is advantageous in terms of improved spectrum utilization, higher data transfer rate, and lower probability of interception from unwanted sources. FSO communication can provide optical-level wireless communication speeds and can also help solve the wireless capacity problem experienced by the traditional RF-based technologies. Despite these advantages, communications...
Show moreFree-Space-Optical (FSO) communication has the potential to play a significant role in future generation wireless networks. It is advantageous in terms of improved spectrum utilization, higher data transfer rate, and lower probability of interception from unwanted sources. FSO communication can provide optical-level wireless communication speeds and can also help solve the wireless capacity problem experienced by the traditional RF-based technologies. Despite these advantages, communications using FSO transceivers require establishment and maintenance of line-of-sight (LOS). We consider autonomous mobile nodes (Unmanned Ground Vehicles or Unmanned Aerial Vehicles), each with one FSO transceiver mounted on a movable head capable of scanning in the horizontal and vertical planes. We propose novel schemes that deal with the problems of automatic discovery, establishment, and maintenance of LOS alignment between these nodes with mechanical steering of the directional FSO transceivers in 2-D and 3-D scenarios. We perform extensive simulations to show the effectiveness of the proposed methods for both neighbor discovery and LOS maintenance. We also present a prototype implementation of such mobile nodes with FSO transceivers. The potency of the neighbor discovery and LOS alignment protocols is evaluated by analyzing the results obtained from both simulations and experiments conducted using the prototype. The results show that, by using such mechanically steerable directional transceivers and the proposed methods, it is possible to establish optical wireless links within practical discovery times and maintain the links in a mobile setting with minimal disruption.
Show less - Date Issued
- 2018
- Identifier
- CFE0007575, ucf:52573
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007575
- Title
- Digital Citizenship Tools for Cause-Based Campaigns: A Broadened Spectrum of Social Media Engagement and Participation-Scale Methodology.
- Creator
-
Miller, Jennifer, Vie, Stephanie, Scott, Blake, Flammia, Madelyn, St. Amant, Kirk, University of Central Florida
- Abstract / Description
-
Digital Citizenship Tools for Cause-Based Campaigns: A Broadened Spectrum of Social Media Engagement and Participation-Scale Methodology develops and applies two new tools for understanding, measuring, and recursively adjusting small to medium-size social media-based philanthropic campaigns to better foster participation and engagement(-)in other words, democratic digital citizenship. First, a theoretical model is offered broadening current binary conceptions of success and failure or impact...
Show moreDigital Citizenship Tools for Cause-Based Campaigns: A Broadened Spectrum of Social Media Engagement and Participation-Scale Methodology develops and applies two new tools for understanding, measuring, and recursively adjusting small to medium-size social media-based philanthropic campaigns to better foster participation and engagement(-)in other words, democratic digital citizenship. First, a theoretical model is offered broadening current binary conceptions of success and failure or impact of campaigns, situating specific participant actions in social media on a spectrum. Then, from that model, a new methodology is provided to measure participation and engagement generated by campaign posts. Recommendations are also offered for recursively adjusting campaign posts to better foster democratic digital citizenship. These tools were developed from data generated by #TheFaceOffChallenge, a research project representative of a typical small to medium-size cause-based campaign. #TheFaceOffChallenge also serves as a sample for analysis illustrating how to use these tools. While explicating these tools, this dissertation explores a broad range of topics related to better understanding democratic digital citizenship: online philanthropy, awareness, and digital activism; viral and memetic transmission; tensions between consumption and creation of ideas, content, and knowledge; public(s), counterpublics, and counter-efforts; literacies and access for engagement and participation in algorithmic environments; and visual communication and semiotics.
Show less - Date Issued
- 2018
- Identifier
- CFE0007227, ucf:52214
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007227
- Title
- THE PDF OF IRRADIANCE FOR A FREE-SPACE OPTICAL COMMUNICATIONS CHANNEL: A PHYSICS BASED MODEL.
- Creator
-
Wayne, David, Phillips, Ronald, University of Central Florida
- Abstract / Description
-
An accurate PDF of irradiance for a FSO channel is important when designing a laser radar, active laser imaging, or a communications system to operate over the channel. Parameters such as detector threshold level, probability of detection, mean fade time, number of fades, BER, and SNR are derived from the PDF and determine the design constraints of the receiver, transmitter, and corresponding electronics. Current PDF models of irradiance, such as the Gamma-Gamma, do not fully capture the...
Show moreAn accurate PDF of irradiance for a FSO channel is important when designing a laser radar, active laser imaging, or a communications system to operate over the channel. Parameters such as detector threshold level, probability of detection, mean fade time, number of fades, BER, and SNR are derived from the PDF and determine the design constraints of the receiver, transmitter, and corresponding electronics. Current PDF models of irradiance, such as the Gamma-Gamma, do not fully capture the effect of aperture averaging; a reduction in scintillation as the diameter of the collecting optic is increased. The Gamma-Gamma PDF of irradiance is an attractive solution because the parameters of the distribution are derived strictly from atmospheric turbulence parameters; propagation path length, Cn2, l0, and L0. This dissertation describes a heuristic physics-based modeling technique to develop a new PDF of irradiance based upon the optical field. The goal of the new PDF is three-fold: capture the physics of the turbulent atmosphere, better describe aperture averaging effects, and relate parameters of the new model to measurable atmospheric parameters. The modeling decomposes the propagating electromagnetic field into a sum of independent random-amplitude spatial plane waves using an approximation to the Karhunen-Loeve expansion. The scattering effects of the turbulence along the propagation path define the random-amplitude of each component of the expansion. The resulting PDF of irradiance is a double finite sum containing a Bessel function. The newly developed PDF is a generalization of the Gamma-Gamma PDF, and reduces to such in the limit. An experiment was setup and performed to measure the PDF of irradiance for several receiver aperture sizes under moderate to strong turbulence conditions. The propagation path was instrumented with scintillometers and anemometers to characterize the turbulence conditions. The newly developed PDF model and the GG model were compared to histograms of the experimental data. The new PDF model was typically able to match the data as well or better than the GG model under conditions of moderate aperture averaging. The GG model fit the data better than the new PDF under conditions of significant aperture averaging. Due to a limiting scintillation index value of 3, the new PDF was not compared to the GG for point apertures under strong turbulence; a regime where the GG is known to fit data well.
Show less - Date Issued
- 2010
- Identifier
- CFE0003209, ucf:48576
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003209
- Title
- WAVELENGTH-DIVISION-MULTIPLEXED TRANSMISSION USING SEMICONDUCTOR OPTICAL AMPLIFIERS AND ELECTRONIC IMPAIRMENT COMPENSATION.
- Creator
-
LI, XIAOXU, Li, Guifang, University of Central Florida
- Abstract / Description
-
Over the last decade, rapid growth of broadband services necessitated research aimed at increasing transmission capacity in fiber-optic communication systems. Wavelength division multiplexing (WDM) technology has been widely used in fiber-optic systems to fully utilize fiber transmission bandwidth. Among optical amplifiers for WDM transmission, semiconductor optical amplifier (SOA) is a promising candidate, thanks to its broad bandwidth, compact size, and low cost. In transmission systems...
Show moreOver the last decade, rapid growth of broadband services necessitated research aimed at increasing transmission capacity in fiber-optic communication systems. Wavelength division multiplexing (WDM) technology has been widely used in fiber-optic systems to fully utilize fiber transmission bandwidth. Among optical amplifiers for WDM transmission, semiconductor optical amplifier (SOA) is a promising candidate, thanks to its broad bandwidth, compact size, and low cost. In transmission systems using SOAs, due to their large noise figures, high signal launching powers are required to ensure reasonable optical signal-to-noise ratio of the received signals. Hence the SOAs are operated in the saturation region and the signals will suffer from SOA impairments including self-gain modulation, self-phase modulation, and inter channel crosstalk effects such as cross-gain modulation, cross-phase modulation, and four-wave mixing in WDM. One possibility to circumvent these nonlinear impairments is to use constant-intensity modulation format in the 1310 nm window where dispersion is also negligible. In this dissertation, differential phase-shift keying (DPSK) WDM transmission in the 1310 nm window using SOAs was first considered to increase the capacity of existing telecommunication network. A WDM transmission of 4 × 10 Gbit/s DPSK signals over 540 km standard single mode fiber (SSMF) using cascaded SOAs was demonstrated in a recirculating loop. In order to increase the transmission reach of such WDM systems, those SOA impairments must be compensated. To do so, an accurate model for quantum-dot (QD) SOA must be established. In this dissertation, the QD-SOA was modeled with the assumption of overall charge neutrality. Static gain was calculated. Optical modulation response and nonlinear phase noise were studied semi-analytically based on small-signal analysis. The quantitative studies show that an ultrafast gain recovery time of ~0.1 ps can be achieved when QD-SOAs are under high current injection, which leads to high saturation output power. However more nonlinear phase noise is induced when the QD-SOAs are used in the transmission systems operating at 10 Gbit/s or 40 Gbit/s. Electronic post-compensation for SOA impairments using coherent detection and digital signal processing (DSP) was investigated next in this dissertation. An on-off keying transmission over 100 km SSMF using three SOAs at 1.3 um were demonstrated experimentally with direct detection and SOA impairment compensation. The data pattern effect of the signal was compensated effectively. Both optimum launching power and Q-factor were improved by 8 dB. For advanced modulation formats involving phase modulation or in transmission windows with large dispersion, coherent detection must be used and fiber impairments in WDM systems need to be compensated as well. The proposed fiber impairment compensation is based on digital backward propagation. The corresponding DSP implementation was described and the required calculations as well as system latency were derived. Finally joint SOA and fiber impairment compensations were experimentally demonstrated for an amplitude-phase-shift keying transmission.
Show less - Date Issued
- 2009
- Identifier
- CFE0002932, ucf:47960
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002932
- Title
- CONNECTIONLESS APPROACH A LOCALIZED SCHEME TO MOBILE AD HOC NETWORKS.
- Creator
-
Ho, Yao, Hua, Kien, University of Central Florida
- Abstract / Description
-
According to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for...
Show moreAccording to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for Mobile Ad hoc NETwork (MANET) applications and Wireless Mesh Network (WMN) applications. A MANET is a self-organizing multi-hop wireless network where all nodes participate in the routing and data forwarding process. Such a network can be easily deployed in situations where no base station is available, and a network must be build spontaneously. In applications such as battlefield communications, national crises, disaster recovery, and sensor deployment, a wired network is not available and ad hoc networks provide the only feasible means of communications and information access. Ad hoc networks have also become commonplace for gaming, conferencing, electronic classrooms, and particularly vehicle-to-vehicle communications. A Wireless mash network (WMN) is collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. Their rapid deployment and ease of maintenance are suitable for on-demand network such as disaster recovery, homeland security, convention centers, hard-to-wire buildings and unfriendly terrains. One important problem with MANET is the routing protocol that needs to work well not just with a small network, but also sustain efficiency and scalability as the network gets expanded and the application transmits data in greater volume. In such an environment, mobility, channel error, and congestion are the main causes for packet loss. Due to mobility of mobile hosts, addressing frequent and unpredictable topology changes is fundamental to MANET research. Two general approaches have been considered: connection-oriented approach and connectionless-oriented approach. In the former, the emphasis is on how to reconnect quickly with low overhead when a broken link occurs. Examples of this approach includes , , , , , , , , , and . In contrast, connectionless-oriented approach focuses on minimizing the occurrence of broken links. We proposed one such scheme called Connectionless Approach (CLA) and . In CLA, the network area is divided into non-overlapping grid cells, each serving as a virtual router. Any physical router (i.e., mobile host), currently inside a virtual router, can help forward the data packet to the next virtual router along the virtual link. This process is repeated until the packet reaches its final destination. Since a virtual link is based on virtual routers which do not move, it is much more robust than physical links used in the connection-oriented techniques. Simulation results in our previous works and , based on GloMoSim , indicate that CLA performs significantly better than connection-oriented techniques (i.e., AODV, DSR, LAR, GRID, TMNR, and GPSR). The contribution of this work consists of investigating and developing new Connectionless-Oriented Approach for Mobile Ad Hoc Network. Two of the greatest impacts of this research are as follows. First, the new approach is targeted towards robustly support high mobility and large scale environment which has been adapted for vehicle-to-vehicle environment in . Second, the detailed simulations which compare eight representative routing protocols, namely AODV, DSR, LAR, GRID, TMNR, GPSR, CBF, and CLA, under high-mobility environments. As many important emergent applications of the technology involved high-mobility nodes, very little is known about the existing routing methods perform relative to each other in high-mobility environments. The simulation results provide insight into ad hoc routing protocols and offer guidelines for mobile ad hoc network applications. Next, we enhanced and extend the connectionless-oriented approach. The current connectionless-oriented approach, however, may suffer from packet drops since traffic congestion is not considered in the packet forwarding policy. We address this weakness by considering the connectionless-oriented approach with a collision avoidance routing technique. After that, we investigate techniques to enforce collaboration among mobile devices in supporting the virtual router functionality. Many works have been published to combat such problem - misbehaving nodes are detected and a routing algorithm is employed to avoid and penalize misbehaving nodes. These techniques, however, cannot be applied to the connectionless-oriented approach since any node in the general direction towards the destination node can potentially help forward the data packets. To address the security and cooperation issues for connectionless-oriented approach, we introduce a cooperation enforcement technique called 3CE (3-Counter Enforcement). In addition, wireless mesh networks have become increasingly popular in recent years. Wireless mash network (WMNs) are collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. We propose a paradigm that combines virtual routers and mesh nodes to create a hybrid network call VR-Mesh Network. This hybrid network can reduce number of mesh node needed without decrease the performance of the network.
Show less - Date Issued
- 2009
- Identifier
- CFE0002742, ucf:48146
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002742
- Title
- Talking Back: Mathematics Teachers Supporting Students' Engagement in a Common Core Standard for Mathematical Practice: A Case Study.
- Creator
-
Sotillo Turner, Mercedes, Dixon, Juli, Ortiz, Enrique, Gresham, Gina, Dieker, Lisa, University of Central Florida
- Abstract / Description
-
The researcher in this case study sought to determine the ways in which teachers support their students to create viable arguments and critique the reasoning of others (SMP3). In order to achieve this goal, the self-conceived classroom roles of two teachers, one experienced and one novice, were elicited and then compared to their actualized roles observed in the classroom. Both teachers were provided with professional development focused on supporting student engagement in SMP3. This...
Show moreThe researcher in this case study sought to determine the ways in which teachers support their students to create viable arguments and critique the reasoning of others (SMP3). In order to achieve this goal, the self-conceived classroom roles of two teachers, one experienced and one novice, were elicited and then compared to their actualized roles observed in the classroom. Both teachers were provided with professional development focused on supporting student engagement in SMP3. This professional development was informed by the guidelines that describe the behaviors students should exhibit as they are engaged in the standards for mathematical practice contained in the Common Core State Standards for Mathematics. The teachers were observed, video recorded, and interviewed during and immediately after the professional development. A final observation was performed four weeks after the PD. The marked differences in the teachers' characteristics depicted in each case added to the robustness of the results of the study. A cross-case analysis was performed in order to gauge how the novice and experienced teachers' roles compared and contrasted with each other. The comparison of the teachers' self-perception and their actual roles in the classroom indicated that they were not supporting their students as they thought they were. The analysis yielded specific ways in which novice and experienced teachers might support their students. Furthermore, the cross-case analysis established the support that teachers are able to provide to students depends on (a) teaching experience, (b) teacher content and pedagogical knowledge, (c) questioning, (d) awareness of communication, (e) teacher expectations, and (f) classroom management. Study results provide implications regarding the kinds of support teachers might need given their teaching experience and mathematics content knowledge as they attempt to motivate their students to engage in SMP3.
Show less - Date Issued
- 2014
- Identifier
- CFE0005553, ucf:50275
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005553
- Title
- An Investigation of Boaters' Attitudes toward and Usage of Targeted Mobile Apps.
- Creator
-
Bowerman, Kamra, Delorme, Denise, Brown, Timothy, Neuberger, Lindsay, University of Central Florida
- Abstract / Description
-
The purpose of this study was to understand boaters' adoption and usage of smartphones and mobile apps as well as to obtain their opinion on potential features of a targeted mobile app being developed as part of a broader interdisciplinary Florida Sea Grant outreach project. Data were gathered from an online survey of a sample of 164 boaters from the surrounding Central Florida area. In contrast with previous empirical mobile app studies, many respondents reported using mobile apps for...
Show moreThe purpose of this study was to understand boaters' adoption and usage of smartphones and mobile apps as well as to obtain their opinion on potential features of a targeted mobile app being developed as part of a broader interdisciplinary Florida Sea Grant outreach project. Data were gathered from an online survey of a sample of 164 boaters from the surrounding Central Florida area. In contrast with previous empirical mobile app studies, many respondents reported using mobile apps for information-seeking versus escape gratifications. Further more than half of the respondents' age sixty-five and over indicated using smartphones and mobile apps. These findings reflected recent national trend data showing shifting gratifications and an increase in technology use among older American adults. In regards to the planned mobile app, the study's respondents had favorable reactions to its potential features and indicated an above average intent toward downloading the app.
Show less - Date Issued
- 2013
- Identifier
- CFE0004655, ucf:49902
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004655
- Title
- Instructor Response to Uncivil Behaviors in the Classroom: An Application of Politeness Theory.
- Creator
-
Yrisarry, Natalie, Miller, Ann, Neuberger, Lindsay, Katt, James, University of Central Florida
- Abstract / Description
-
This study examines levels of politeness in real time instructor responses to classroom incivility behaviors. Student participants were randomly assigned to view a video of an instructor responding to either passive or active student incivility behaviors in various ways. The responses were based on politeness theory conceptualizations of avoidance, mid-level politeness, or bald on record responses. A 2 (i.e., passive, active student incivility) x 3 (i.e., avoidance, mid-level, or bald on...
Show moreThis study examines levels of politeness in real time instructor responses to classroom incivility behaviors. Student participants were randomly assigned to view a video of an instructor responding to either passive or active student incivility behaviors in various ways. The responses were based on politeness theory conceptualizations of avoidance, mid-level politeness, or bald on record responses. A 2 (i.e., passive, active student incivility) x 3 (i.e., avoidance, mid-level, or bald on record instructor response) experimental design formed six conditions. High quality video simulations of a classroom environment, portraying one of the six conditions, were created to specifically address these dimensions. Participants took a web based survey and evaluated the instructor with respect to effectiveness, credibility, and impact on student motivation. Results demonstrate students had most positive responses to bald on record instructor responses to active student incivility. When responding to passive student incivility, a less harsh response (i.e., avoidance, mid-level), while not significantly different from a bald on record response, indicate better outcomes. Therefore, in accordance with politeness theory, instructors should consider the level of imposition created by uncivil student behavior when calibrating responses, as student perceptions can be greatly affected. Theoretical and practical considerations as well as avenues for future research are presented.
Show less - Date Issued
- 2015
- Identifier
- CFE0005746, ucf:50084
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005746
- Title
- CLAIMS OF MISTAKEN IDENTITY:AN EXAMINATION OF U.S. TELEVISION FOOD COMMERCIALS AND THE ADULT OBESITY ISSUE.
- Creator
-
Delgado, Cristina, DeLorme, Denise, University of Central Florida
- Abstract / Description
-
Obesity is one of the major public health issues in the United States, often regarded as part of a global crisis. Companies invest billions of dollars each year towards television advertising campaigns aimed at convincing audiences how their ground-breaking discovery 'battles the bulge' or somehow offers an increased health benefit. This study examined how advertisers presented health-related claims, including health and nutrient-content claims, in U.S. adult-targeted television food...
Show moreObesity is one of the major public health issues in the United States, often regarded as part of a global crisis. Companies invest billions of dollars each year towards television advertising campaigns aimed at convincing audiences how their ground-breaking discovery 'battles the bulge' or somehow offers an increased health benefit. This study examined how advertisers presented health-related claims, including health and nutrient-content claims, in U.S. adult-targeted television food commercials. The claims were compared to FTC, FDA, and USDA laws, regulations, and recommendations. A content analysis of food advertising was conducted of commercials from major and cable network programs broadcast during prime-time in the first quarter of 2009. The majority of claims match current regulations when compared to Federal references. The results show that Nutrient and Wellness claims were the most frequently cited. The type of benefit, Healthy Eating, emerged almost 3 times more than any other benefit type. This is also similar to those results which suggest advertisers' intentions were to promote overall wellness in their content delivery. As such, the Wellness Approach was identified and conceptualized, leading towards full development of a Wellness Effect theory. Implications and future research opportunities are discussed on both a theoretical and practical level.
Show less - Date Issued
- 2009
- Identifier
- CFE0002565, ucf:48260
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002565
- Title
- ANALYSIS OF TIME SYNCHRONIZATION ERRORS IN HIGH DATA RATE ULTRAWIDEBAND ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING DATA LINKS.
- Creator
-
Bates, Lakesha, Jones, W. Linwood, University of Central Florida
- Abstract / Description
-
Emerging Ultra Wideband (UWB) Orthogonal Frequency Division Multiplexing (OFDM) systems hold the promise of delivering wireless data at high speeds, exceeding hundreds of megabits per second over typical distances of 10 meters or less. The purpose of this Thesis is to estimate the timing accuracies required with such systems in order to achieve Bit Error Rates (BER) of the order of magnitude of 10-12 and thereby avoid overloading the correction of irreducible errors due to misaligned timing...
Show moreEmerging Ultra Wideband (UWB) Orthogonal Frequency Division Multiplexing (OFDM) systems hold the promise of delivering wireless data at high speeds, exceeding hundreds of megabits per second over typical distances of 10 meters or less. The purpose of this Thesis is to estimate the timing accuracies required with such systems in order to achieve Bit Error Rates (BER) of the order of magnitude of 10-12 and thereby avoid overloading the correction of irreducible errors due to misaligned timing errors to a small absolute number of bits in error in real-time relative to a data rate of hundreds of megabits per second. Our research approach involves managing bit error rates through identifying maximum timing synchronization errors. Thus, it became our research goal to determine the timing accuracies required to avoid operation of communication systems within the asymptotic region of BER flaring at low BERs in the resultant BER curves. We propose pushing physical layer bit error rates to below 10-12 before using forward error correction (FEC) codes. This way, the maximum reserve is maintained for the FEC hardware to correct for burst as well as recurring bit errors due to corrupt bits caused by other than timing synchronization errors.
Show less - Date Issued
- 2004
- Identifier
- CFE0000197, ucf:46173
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000197
- Title
- Real-time SIL Emulation Architecture for Cooperative Automated Vehicles.
- Creator
-
Gupta, Nitish, Pourmohammadi Fallah, Yaser, Rahnavard, Nazanin, Vosoughi, Azadeh, University of Central Florida
- Abstract / Description
-
This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless...
Show moreThis thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test scenarios for evaluating safety applications is a very challenging task. This is mainly due to the randomness in communication, difficulty in recreating vehicle movements precisely, and safety concerns for certain scenarios. We propose to develop a standalone Remote Vehicle Emulator (RVE) that can reproduce V2V messages of remote vehicles from simulations or from previous tests, while also emulating the over the air behavior of multiple communicating nodes. This is expected to significantly accelerate the development cycle. RVE is a unique and easily configurable emulation cum simulation setup to allow Software in the Loop (SIL) testing of connected vehicle applications in a realistic and safe manner. It will help in tailoring numerous test scenarios, expediting algorithm development and validation as well as increase the probability of finding failure modes. This, in turn, will help improve the quality of safety applications while saving testing time and reducing cost.The RVE architecture consists of two modules, the Mobility Generator, and the Communication emulator. Both of these modules consist of a sequence of events that are handled based on the type of testing to be carried out. The communication emulator simulates the behavior of MAC layer while also considering the channel model to increase the probability of successful transmission. It then produces over the air messages that resemble the output of multiple nodes transmitting, including corrupted messages due to collisions. The algorithm that goes inside the emulator has been optimized so as to minimize the communication latency and make this a realistic and real-time safety testing tool. Finally, we provide a multi-metric experimental evaluation wherein we verified the simulation results with an identically configured ns3 simulator. With the aim to improve the quality of testing of CVS applications, this unique architecture would serve as a fundamental design for the future of CVS application testing.
Show less - Date Issued
- 2018
- Identifier
- CFE0007185, ucf:52280
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007185
- Title
- Turtle Cam: Live Multimedia Interaction For Engaging Potential Visitor Population To Canaveral National Seashore.
- Creator
-
Tortorelli, Brian, Cabrera, Cheryl, Lindgren, Robb, Reedy, Robert, University of Central Florida
- Abstract / Description
-
This project expands the outreach of the Canaveral National Seashore to its visitors, potential visitors, and virtual visitors through its goals in conservancy and preservation of its natural resources. This paper is involved with the current iteration of a series of digital media projects, the Sea Turtle Nest Camera, also known as, Turtle Cam. It details how and why this project was designed to be an ongoing initiative to assist in those goals.
- Date Issued
- 2012
- Identifier
- CFE0004330, ucf:49446
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004330
- Title
- GUIDELINES FOR TWENTY-FIRST CENTURY INSTRUCTIONAL DESIGN AND TECHNOLOGY USE: TECHNOLOGIES' INFLUENCE ON THE BRAIN.
- Creator
-
Gabriel, Jennifer, Flammia, Madelyn, University of Central Florida
- Abstract / Description
-
The increasingly global environment has spurred the economy in the United States as well as the economies in nearly every other nation. Although the U.S. remains the world leader in the global economy, research shows that the United States is at risk of losing its place as the world leader in science and innovation. Policymakers have recognized the need for research addressing global competitiveness. President Bush signed the America Competes Act, which calls for increased investment in...
Show moreThe increasingly global environment has spurred the economy in the United States as well as the economies in nearly every other nation. Although the U.S. remains the world leader in the global economy, research shows that the United States is at risk of losing its place as the world leader in science and innovation. Policymakers have recognized the need for research addressing global competitiveness. President Bush signed the America Competes Act, which calls for increased investment in innovation and education to improve U.S. competitiveness and President Barack Obama has named a platform, "Science, Technology and Innovation for a New Generation" which will extend and prioritize the efforts to improve math and science education. K‐12 U.S. students are graduating from high school unprepared to pursue degrees in science, technology, engineering and math (STEM) in college. Without STEM degrees they will be unable to pursue technology jobs after graduation. Statistics show that the U.S. is failing to produce as many graduates in STEM as other countries. In an increasingly global world, without graduates in STEM courses the U.S. is at risk of losing its position as the economic world leader. Government, industry and academia all agree that the U.S. needs to address education on a K‐12 level to ensure that U.S. students are equipped with twenty‐first century skills to compete in a twenty‐first century global economy. Twenty‐first century students are different from students of previous generations. Researchers argue that changes in the environment, specifically an increased exposure to technology, have changed the brains of twenty‐first century students; twenty‐first century students learn differently. However, twenty‐first century students are being taught with an instructional curriculum that was designed for a previous generation that did not have the same exposure to technology. This is causing a digital‐divide that is hindering the achievement of students. The instructional curriculum needs to be updated to meet the needs of twenty‐first century students. This thesis addresses this need from a technical communication perspective by arguing that the instructional design of twenty‐first century learning materials should be improved by adhering to guidelines for twenty‐first century learning characteristics and twenty‐first century technology use. The guidelines support a national goal to improve K‐12 achievement in order to increase U.S. STEM graduates and increase the U.S.'s ability to compete in a global economy.
Show less - Date Issued
- 2009
- Identifier
- CFE0002704, ucf:48183
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002704
- Title
- THE EFFECTS OF POWER DISTANCE, AND GENDER ON THE USE OF NONVERBAL IMMEDIACY BEHAVIORS IN SYMMETRICAL AND ASYMMETRICAL POWER CONDITIONS: A CROSS-CULTURAL STUDY.
- Creator
-
Santilli, Vincent, Miller, Ann, University of Central Florida
- Abstract / Description
-
Previous cross-cultural research in nonverbal immediacy indicates that nonverbal immediacy behavior varies across cultures, and some researchers have suggested that power distance might serve as a moderating variable, however no research has systematically set out to determine whether that is the case. This study assessed the perceived use of nonverbal immediacy under symmetric and asymmetric power conditions, as well as gender, in three cultures: Brazil, Kenya, and the United States....
Show morePrevious cross-cultural research in nonverbal immediacy indicates that nonverbal immediacy behavior varies across cultures, and some researchers have suggested that power distance might serve as a moderating variable, however no research has systematically set out to determine whether that is the case. This study assessed the perceived use of nonverbal immediacy under symmetric and asymmetric power conditions, as well as gender, in three cultures: Brazil, Kenya, and the United States. Quantitative data was collected from 527 participants who completed a nonverbal immediacy measure and an individual power distance measure under either a symmetric or an asymmetric power condition. Results related to power distance partially supported the idea that cultural power distance may act as a moderating variable with regard to the use of nonverbal immediacy behaviors. Related to gender, results revealed that: (a) female participants perceived more nonverbal immediacy behaviors than males, (b) under symmetric power conditions females were perceived to use more nonverbal immediacy than males, and (c) under asymmetric power conditions there was no statistically significant difference between use of nonverbal immediacy behaviors between females and males. Implications of results, limitations, and suggestions for future research are presented.
Show less - Date Issued
- 2010
- Identifier
- CFE0003043, ucf:48368
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003043