Current Search: access (x)
Pages
-
-
Title
-
EFFICIENT TECHNIQUES FOR RELEVANCE FEEDBACK PROCESSING IN CONTENT-BASED IMAGE RETRIEVAL.
-
Creator
-
Liu, Danzhou, Hua, Kien, University of Central Florida
-
Abstract / Description
-
In content-based image retrieval (CBIR) systems, there are two general types of search: target search and category search. Unlike queries in traditional database systems, users in most cases cannot specify an ideal query to retrieve the desired results for either target search or category search in multimedia database systems, and have to rely on iterative feedback to refine their query. Efficient evaluation of such iterative queries can be a challenge, especially when the multimedia database...
Show moreIn content-based image retrieval (CBIR) systems, there are two general types of search: target search and category search. Unlike queries in traditional database systems, users in most cases cannot specify an ideal query to retrieve the desired results for either target search or category search in multimedia database systems, and have to rely on iterative feedback to refine their query. Efficient evaluation of such iterative queries can be a challenge, especially when the multimedia database contains a large number of entries, and the search needs many iterations, and when the underlying distance measure is computationally expensive. The overall processing costs, including CPU and disk I/O, are further emphasized if there are numerous concurrent accesses. To address these limitations involved in relevance feedback processing, we propose a generic framework, including a query model, index structures, and query optimization techniques. Specifically, this thesis has five main contributions as follows. The first contribution is an efficient target search technique. We propose four target search methods: naive random scan (NRS), local neighboring movement (LNM), neighboring divide-and-conquer (NDC), and global divide-and-conquer (GDC) methods. All these methods are built around a common strategy: they do not retrieve checked images (i.e., shrink the search space). Furthermore, NDC and GDC exploit Voronoi diagrams to aggressively prune the search space and move towards target images. We theoretically and experimentally prove that the convergence speeds of GDC and NDC are much faster than those of NRS and recent methods. The second contribution is a method to reduce the number of expensive distance computation when answering k-NN queries with non-metric distance measures. We propose an efficient distance mapping function that transfers non-metric measures into metric, and still preserves the original distance orderings. Then existing metric index structures (e.g., M-tree) can be used to reduce the computational cost by exploiting the triangular inequality property. The third contribution is an incremental query processing technique for Support Vector Machines (SVMs). SVMs have been widely used in multimedia retrieval to learn a concept in order to find the best matches. SVMs, however, suffer from the scalability problem associated with larger database sizes. To address this limitation, we propose an efficient query evaluation technique by employing incremental update. The proposed technique also takes advantage of a tuned index structure to efficiently prune irrelevant data. As a result, only a small portion of the data set needs to be accessed for query processing. This index structure also provides an inexpensive means to process the set of candidates to evaluate the final query result. This technique can work with different kernel functions and kernel parameters. The fourth contribution is a method to avoid local optimum traps. Existing CBIR systems, designed around query refinement based on relevance feedback, suffer from local optimum traps that may severely impair the overall retrieval performance. We therefore propose a simulated annealing-based approach to address this important issue. When a stuck-at-a-local-optimum occurs, we employ a neighborhood search technique (i.e., simulated annealing) to continue the search for additional matching images, thus escaping from the local optimum. We also propose an index structure to speed up such neighborhood search. Finally, the fifth contribution is a generic framework to support concurrent accesses. We develop new storage and query processing techniques to exploit sequential access and leverage inter-query concurrency to share computation. Our experimental results, based on the Corel dataset, indicate that the proposed optimization can significantly reduce average response time while achieving better precision and recall, and is scalable to support a large user community. This latter performance characteristic is largely neglected in existing systems making them less suitable for large-scale deployment. With the growing interest in Internet-scale image search applications, our framework offers an effective solution to the scalability problem.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002728, ucf:48162
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002728
-
-
Title
-
The Impact of User-Generated Interfaces on the Participation of Users with a Disability in Virtual Environments: Blizzard Entertainment's World of Warcraft Model.
-
Creator
-
Merritt, Donald, McDaniel, Rudy, Zemliansky, Pavel, Mauer, Barry, Kim, Si Jung, University of Central Florida
-
Abstract / Description
-
When discussing games and the experience of gamers those with disabilities are often overlooked. This has left a gap in our understanding of the experience of players with disabilities in virtual game worlds. However there are examples of players with disabilities being very successful in the virtual world video game World of Warcraft, suggesting that there is an opportunity to study the game for usability insight in creating other virtual world environments. This study surveyed World of...
Show moreWhen discussing games and the experience of gamers those with disabilities are often overlooked. This has left a gap in our understanding of the experience of players with disabilities in virtual game worlds. However there are examples of players with disabilities being very successful in the virtual world video game World of Warcraft, suggesting that there is an opportunity to study the game for usability insight in creating other virtual world environments. This study surveyed World of Warcraft players with disabilities online for insight into how they used interface addons to manage their experience and identity performance in the game. A rubric was also created to study a selection of addons for evidence of the principles of Universal Design for Learning (UDL). The study found that World of Warcraft players with disabilities do not use addons more than able-bodied players, but some of the most popular addons do exhibit many or most of the principles of UDL. UDL principles appear to have emerged organically from addon iterations over time. The study concludes by suggesting that the same approach to user-generated content for the game interface taken by the creators of World of Warcraft, as well as high user investment in the environment, can lead to more accessible virtual world learning environments in the future.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005667, ucf:50175
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005667
-
-
Title
-
WHY EVIDENCE MATTERS: EXAMINING THE KNOWLEDGE AND PERCEPTION OF PRE-SERVICE TEACHERS.
-
Creator
-
Campbell, Stefanie, Storey, Valerie, University of Central Florida
-
Abstract / Description
-
Evidence-based educational policymaking has become a global phenomenon (Wiseman, 2010). According to the Institute of Education Sciences, evidence-based education is "an integration of the professional wisdom and the best available empirical evidence on making decision about how to deliver instructions" (IES, US Department of Education, 2012). This suggests that best practice requires teachers to ensure that instructional strategies and programs implemented in their classroom have been...
Show moreEvidence-based educational policymaking has become a global phenomenon (Wiseman, 2010). According to the Institute of Education Sciences, evidence-based education is "an integration of the professional wisdom and the best available empirical evidence on making decision about how to deliver instructions" (IES, US Department of Education, 2012). This suggests that best practice requires teachers to ensure that instructional strategies and programs implemented in their classroom have been studied in scientific experiments to determine their effectiveness. The general public, as well as practicing teachers, holds an assumption that educators have knowledge as to what is evidence-based education. However, this is not always the case. The objective of this these include: to document how pre-service teachers access research findings and what types of findings they use in their practice, to identify the purposes of its utilization, to identify the factors that influence research utilization, and to ensure the accessibility of the findings of this study. The population for this study will be pre-service teachers at a large public higher education institution and one state college. In order to meet these objectives I conducted a survey, a pre-service teacher focus group, and an interview with faculty. Research findings will impact pre-service teacher preparation programs and increase our understanding of the link between the researchers and educators
Show less
-
Date Issued
-
2014
-
Identifier
-
CFH0004707, ucf:45406
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004707
-
-
Title
-
Heterogeneous Reconfigurable Fabrics for In-circuit Training and Evaluation of Neuromorphic Architectures.
-
Creator
-
Mohammadizand, Ramtin, DeMara, Ronald, Lin, Mingjie, Sundaram, Kalpathy, Fan, Deliang, Wu, Annie, University of Central Florida
-
Abstract / Description
-
A heterogeneous device technology reconfigurable logic fabric is proposed which leverages the cooperating advantages of distinct magnetic random access memory (MRAM)-based look-up tables (LUTs) to realize sequential logic circuits, along with conventional SRAM-based LUTs to realize combinational logic paths. The resulting Hybrid Spin/Charge FPGA (HSC-FPGA) using magnetic tunnel junction (MTJ) devices within this topology demonstrates commensurate reductions in area and power consumption over...
Show moreA heterogeneous device technology reconfigurable logic fabric is proposed which leverages the cooperating advantages of distinct magnetic random access memory (MRAM)-based look-up tables (LUTs) to realize sequential logic circuits, along with conventional SRAM-based LUTs to realize combinational logic paths. The resulting Hybrid Spin/Charge FPGA (HSC-FPGA) using magnetic tunnel junction (MTJ) devices within this topology demonstrates commensurate reductions in area and power consumption over fabrics having LUTs constructed with either individual technology alone. Herein, a hierarchical top-down design approach is used to develop the HSC(&)#173; FPGA starting from the configurable logic block (CLB) and slice structures down to LUT circuits and the corresponding device fabrication paradigms. This facilitates a novel architectural approach to reduce leakage energy, minimize communication occurrence and energy cost by eliminating unnecessary data transfer, and support auto-tuning for resilience. Furthermore, HSC-FPGA enables new advantages of technology co-design which trades off alternative mappings between emerging devices and transistors at runtime by allowing dynamic remapping to adaptively leverage the intrinsic computing features of each device technology. HSC-FPGA offers a platform for fine-grained Logic-In-Memory architectures and runtime adaptive hardware.An orthogonal dimension of fabric heterogeneity is also non-determinism enabled by either low(&)#173; voltage CMOS or probabilistic emerging devices. It can be realized using probabilistic devices within a reconfigurable network to blend deterministic and probabilistic computational models. Herein, consider the probabilistic spin logic p-bit device as a fabric element comprising a crossbar(&)#173; structured weighted array. The programmability of the resistive network interconnecting p-bit devices can be achieved by modifying the resistive states of the array's weighted connections. Thus, the programmable weighted array forms a CLB-scale macro co-processing element with bitstream programmability. This allows field programmability for a wide range of classification problems and recognition tasks to allow fluid mappings of probabilistic and deterministic computing approaches. In particular, a Deep Belief Network (DBN) is implemented in the field using recurrent layers of co-processing elements to form an n(&)#215; m1(&)#215;m2(&)#215;...(&)#215;mi weighted array as a configurable hardware circuit with an n-input layer followed by i?1 hidden layers. As neuromorphic architectures using post-CMOS devices increase in capability and network size, the utility and benefits of reconfigurable fabrics of neuromorphic modules can be anticipated to continue to accelerate.
Show less
-
Date Issued
-
2019
-
Identifier
-
CFE0007502, ucf:52643
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007502
-
-
Title
-
Real-time SIL Emulation Architecture for Cooperative Automated Vehicles.
-
Creator
-
Gupta, Nitish, Pourmohammadi Fallah, Yaser, Rahnavard, Nazanin, Vosoughi, Azadeh, University of Central Florida
-
Abstract / Description
-
This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless...
Show moreThis thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test scenarios for evaluating safety applications is a very challenging task. This is mainly due to the randomness in communication, difficulty in recreating vehicle movements precisely, and safety concerns for certain scenarios. We propose to develop a standalone Remote Vehicle Emulator (RVE) that can reproduce V2V messages of remote vehicles from simulations or from previous tests, while also emulating the over the air behavior of multiple communicating nodes. This is expected to significantly accelerate the development cycle. RVE is a unique and easily configurable emulation cum simulation setup to allow Software in the Loop (SIL) testing of connected vehicle applications in a realistic and safe manner. It will help in tailoring numerous test scenarios, expediting algorithm development and validation as well as increase the probability of finding failure modes. This, in turn, will help improve the quality of safety applications while saving testing time and reducing cost.The RVE architecture consists of two modules, the Mobility Generator, and the Communication emulator. Both of these modules consist of a sequence of events that are handled based on the type of testing to be carried out. The communication emulator simulates the behavior of MAC layer while also considering the channel model to increase the probability of successful transmission. It then produces over the air messages that resemble the output of multiple nodes transmitting, including corrupted messages due to collisions. The algorithm that goes inside the emulator has been optimized so as to minimize the communication latency and make this a realistic and real-time safety testing tool. Finally, we provide a multi-metric experimental evaluation wherein we verified the simulation results with an identically configured ns3 simulator. With the aim to improve the quality of testing of CVS applications, this unique architecture would serve as a fundamental design for the future of CVS application testing.
Show less
-
Date Issued
-
2018
-
Identifier
-
CFE0007185, ucf:52280
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0007185
-
-
Title
-
ANALYSIS OF THE RELATIONSHIP BETWEEN THE LEVEL OF EDUCATIONAL COMPUTER GAME USE AND MILKEN EXEMPLAR TEACHER INSTRUCTIONAL STRATEGIES.
-
Creator
-
Dahan Marks, Yaela, Proctor, Michael, University of Central Florida
-
Abstract / Description
-
This research examines the nature and level of educational computer-based game techniques adoption by Milken Educator Award winning teachers in achieving success in their classrooms. The focus of the research is on their level of acceptance of educational computer-based games and the nature of game usage to increase student performance in the classroom. With Davis' (1985) Technology Acceptance Model (Davis, 1985) as the conceptual framework, the research also examines how teachers'...
Show moreThis research examines the nature and level of educational computer-based game techniques adoption by Milken Educator Award winning teachers in achieving success in their classrooms. The focus of the research is on their level of acceptance of educational computer-based games and the nature of game usage to increase student performance in the classroom. With Davis' (1985) Technology Acceptance Model (Davis, 1985) as the conceptual framework, the research also examines how teachers' perceptions of educational computer-based games influence their willingness to incorporate these teaching methods in their classroom. The approach utilizes a descriptive survey to develop and evaluate responses from exemplar teachers about the level and nature of their use (or lack thereof) of educational computer-based games and implementation in the classroom. Further, this research seeks to identify successful and unsuccessful techniques in the use of educational computer-based games in the classroom. In addition, data collection and analysis will seek to identify the strength of relationships between content-specific educational computer-based games and subject; educational computer-based games and gender; educational computer-based games and age; etc. A teacher who is exemplary as defined by Milken Educator Awards possesses, "exceptional educational talent as evidenced by effective instructional practices and student learning results in the classroom and school". Survey findings are placed within the Technology Acceptance Model framework developed by Davis.
Show less
-
Date Issued
-
2011
-
Identifier
-
CFE0003682, ucf:48811
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0003682
-
-
Title
-
Resource Allocation and Pricing in Secondary Dynamic Spectrum Access Networks.
-
Creator
-
Khairullah, Enas, Chatterjee, Mainak, Zou, Changchun, Lang, Sheau-Dong, Catbas, Necati, University of Central Florida
-
Abstract / Description
-
The paradigm shift from static spectrum allocation to a dynamic one has opened many challenges that need to be addressed for the true vision of Dynamic Spectrum Access (DSA) to materialize. This dissertation proposes novel solutions that include: spectrum allocation, routing, and scheduling in DSA networks. First, we propose an auction-based spectrum allocation scheme in a multi-channel environment where secondary users (SUs) bid to buy channels from primary users (PUs) based on the signal to...
Show moreThe paradigm shift from static spectrum allocation to a dynamic one has opened many challenges that need to be addressed for the true vision of Dynamic Spectrum Access (DSA) to materialize. This dissertation proposes novel solutions that include: spectrum allocation, routing, and scheduling in DSA networks. First, we propose an auction-based spectrum allocation scheme in a multi-channel environment where secondary users (SUs) bid to buy channels from primary users (PUs) based on the signal to interference and noise ratio (SINR). The channels are allocated such that i) the SUs get their preferred channels, ii) channels are re-used, and iii) there is no interference. Then, we propose a double auction-based spectrum allocation technique by considering multiple bids from SUs and heterogeneity of channels. We use virtual grouping of conflict-free buyers to transform multi-unit bids to single-unit bids. For routing, we propose a market-based model where the PUs determine the optimal price based on the demand for bandwidth by the SUs. Routes are determined through a series of price evaluations between message senders and forwarders. Also, we consider auction-based routing for two cases where buyers can bid for only one channel or they could bid for a combination of non-substitutable channels. For a centralized DSA, we propose two scheduling algorithms-- the first one focuses on maximizing the throughput and the second one focuses on fairness. We extend the scheduling algorithms to multi-channel environment. Expected throughput for every channel is computed by modelling channel state transitions using a discrete-time Markov chain. The state transition probabilities are calculated which occur at the frame/slot boundaries. All proposed algorithms are validated using simulation experiments with different network settings and their performance are studied.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006890, ucf:51723
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006890
-
-
Title
-
The Role of Invitational Theory on Minority Student Enrollment in Advanced Placement Courses.
-
Creator
-
McDonald, Jason, Murray, Kenneth, Murray, Barbara, Baldwin, Lee, Hutchinson, Cynthia, University of Central Florida
-
Abstract / Description
-
The number of students enrolling in Advanced Placement (AP) classes has been increasing in Florida and across the nation over the last decade. However, this trend is not happening for traditionally underserved groups of students such as African Americans, Hispanics, and students from low socioeconomic backgrounds. These minority groups are underrepresented in AP classes, while Asian and White students are overrepresented. This trend is alarming because there are qualified minority students...
Show moreThe number of students enrolling in Advanced Placement (AP) classes has been increasing in Florida and across the nation over the last decade. However, this trend is not happening for traditionally underserved groups of students such as African Americans, Hispanics, and students from low socioeconomic backgrounds. These minority groups are underrepresented in AP classes, while Asian and White students are overrepresented. This trend is alarming because there are qualified minority students who have a great chance of being successful in AP classes according to AP Potential(TM) data. For some reason though, these qualified minority and low income students are nevertheless not enrolling in AP classes. The purpose of this research was to investigate whether or not the extension of inviting messages to enroll in AP courses was dependent upon students' ethnic and/or socioeconomic background. A mixture of quantitative and qualitative research methods were employed to examine how the role of invitational theory affects minority student enrollment in AP classes. Mean scale scores from a survey were used to measure student attitudes about how welcoming and inviting schools were when it came to student recruitment into AP classes. T-tests and an analysis of variance were used to determine if there were differences in attitudes among students currently enrolled in AP classes, students of various economic means, and students of various ethnicities. Results from this study found that students already in AP classes felt very invited to challenge themselves in AP classes by teachers, administrators, parents, and peers. Richer students, Whites, and Asians also felt more invited to join AP classes than did poorer, African American, and Hispanic students, though these results were not statistically significant. To increase enrollment in AP classes, the overwhelming response from students was that schools should advertise the pros and cons of taking an AP class. Future research should examine students' perspectives regarding inviting school cultures in regions outside of the southeastern United States. Researchers should also focus on students in urban high schools as previous research has only examined student attitudes in rural and suburban high schools. Finally, future research should examine inviting school cultures from other stakeholders' perspectives such as parents and teachers.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFE0005529, ucf:50329
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005529
-
-
Title
-
Quantifying Trust and Reputation for Defense against Adversaries in Multi-Channel Dynamic Spectrum Access Networks.
-
Creator
-
Bhattacharjee, Shameek, Chatterjee, Mainak, Guha, Ratan, Zou, Changchun, Turgut, Damla, Catbas, Necati, University of Central Florida
-
Abstract / Description
-
Dynamic spectrum access enabled by cognitive radio networks are envisioned to drivethe next generation wireless networks that can increase spectrum utility by opportunisticallyaccessing unused spectrum. Due to the policy constraint that there could be no interferenceto the primary (licensed) users, secondary cognitive radios have to continuously sense forprimary transmissions. Typically, sensing reports from multiple cognitive radios are fusedas stand-alone observations are prone to errors...
Show moreDynamic spectrum access enabled by cognitive radio networks are envisioned to drivethe next generation wireless networks that can increase spectrum utility by opportunisticallyaccessing unused spectrum. Due to the policy constraint that there could be no interferenceto the primary (licensed) users, secondary cognitive radios have to continuously sense forprimary transmissions. Typically, sensing reports from multiple cognitive radios are fusedas stand-alone observations are prone to errors due to wireless channel characteristics. Suchdependence on cooperative spectrum sensing is vulnerable to attacks such as SecondarySpectrum Data Falsification (SSDF) attacks when multiple malicious or selfish radios falsifythe spectrum reports. Hence, there is a need to quantify the trustworthiness of radios thatshare spectrum sensing reports and devise malicious node identification and robust fusionschemes that would lead to correct inference about spectrum usage.In this work, we propose an anomaly monitoring technique that can effectively cap-ture anomalies in the spectrum sensing reports shared by individual cognitive radios duringcooperative spectrum sensing in a multi-channel distributed network. Such anomalies areused as evidence to compute the trustworthiness of a radio by its neighbours. The proposedanomaly monitoring technique works for any density of malicious nodes and for any physicalenvironment. We propose an optimistic trust heuristic for a system with a normal risk attitude and show that it can be approximated as a beta distribution. For a more conservativesystem, we propose a multinomial Dirichlet distribution based conservative trust framework,where Josang's Belief model is used to resolve any uncertainty in information that mightarise during anomaly monitoring. Using a machine learning approach, we identify maliciousnodes with a high degree of certainty regardless of their aggressiveness and variations intro-duced by the pathloss environment. We also propose extensions to the anomaly monitoringtechnique that facilitate learning about strategies employed by malicious nodes and alsoutilize the misleading information they provide. We also devise strategies to defend against a collaborative SSDF attack that islaunched by a coalition of selfish nodes. Since, defense against such collaborative attacks isdifficult with popularly used voting based inference models or node centric isolation techniques, we propose a channel centric Bayesian inference approach that indicates how much the collective decision on a channels occupancy inference can be trusted. Based on the measured observations over time, we estimate the parameters of the hypothesis of anomalous andnon-anomalous events using a multinomial Bayesian based inference. We quantitatively define the trustworthiness of a channel inference as the difference between the posterior beliefsassociated with anomalous and non-anomalous events. The posterior beliefs are updated based on a weighted average of the prior information on the belief itself and the recently observed data.Subsequently, we propose robust fusion models which utilize the trusts of the nodes to improve the accuracy of the cooperative spectrum sensing decisions. In particular, we propose three fusion models: (i) optimistic trust based fusion, (ii) conservative trust based fusion, and (iii) inversion based fusion. The former two approaches exclude untrustworthy sensing reports for fusion, while the last approach utilizes misleading information. Allschemes are analyzed under various attack strategies. We propose an asymmetric weightedmoving average based trust management scheme that quickly identifies on-off SSDF attacks and prevents quick trust redemption when such nodes revert back to temporal honest behavior. We also provide insights on what attack strategies are more effective from the adversaries' perspective.Through extensive simulation experiments we show that the trust models are effective in identifying malicious nodes with a high degree of certainty under variety of network and radio conditions. We show high true negative detection rates even when multiple malicious nodes launch collaborative attacks which is an improvement over existing voting based exclusion and entropy divergence techniques. We also show that we are able to improve the accuracy of fusion decisions compared to other popular fusion techniques. Trust based fusion schemes show worst case decision error rates of 5% while inversion based fusion show 4% as opposed majority voting schemes that have 18% error rate. We also show that the proposed channel centric Bayesian inference based trust model is able to distinguish between attacked and non-attacked channels for both static and dynamic collaborative attacks. We are also able to show that attacked channels have significantly lower trust values than channels that are not(-) a metric that can be used by nodes to rank the quality of inference on channels.
Show less
-
Date Issued
-
2015
-
Identifier
-
CFE0005764, ucf:50081
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0005764
-
-
Title
-
BELIEFS OF GRADUATE STUDENTS ABOUT UNSTRUCTURED COMPUTER USE IN FACE-TO-FACE CLASSES WITH INTERNET ACCESS AND ITS INFLUENCE ON STUDENT RECALL.
-
Creator
-
Johnson, Gregory, Gunter, Glenda, University of Central Florida
-
Abstract / Description
-
The use of computers equipped with Internet access by students during face-to-face (F2F) class sessions is perceived as academically beneficial by a growing number of students and faculty members in universities across the United States. Nevertheless, some researchers suggest unstructured computer use detached from the immediate class content may negatively influence student participation, increase distraction levels, minimize recall of recently presented information, and decrease student...
Show moreThe use of computers equipped with Internet access by students during face-to-face (F2F) class sessions is perceived as academically beneficial by a growing number of students and faculty members in universities across the United States. Nevertheless, some researchers suggest unstructured computer use detached from the immediate class content may negatively influence student participation, increase distraction levels, minimize recall of recently presented information, and decrease student engagement. This study investigates graduate students' beliefs about computer use with Internet access during graduate face-to-face lecture classes in which computer use is neither mandated nor integrated in the class and the effect of such use on student recall. Methods include a 44-item questionnaire to investigate graduate students' beliefs about computers and two experiments to investigate the influence of computer use during a lecture on students' memory recall. One experimental group (open laptop) used computers during a lecture while the other (closed laptop) did not. Both groups were given the same memory recall test after the lectures, and the resulting scores were analyzed. Two weeks later, a second phase of the experiment was implemented in which laptop groups were reversed. Results from the first experiment indicated no statistically significant difference in recall scores between the open laptop group (M = 54.90, SD = 19.65) and the closed laptop group (M = 42.86, SD = 16.68); t (29) = -1.82, p = .08 (two tailed). Conversely, the second experiment revealed statistically significant differences in scores between the open laptop (M = 39.67, SD = 15.97) and the closed laptop group (M = 59.29, SD = 26.88); t (20.89) = 2.37, p = .03 (two tailed). The magnitude of the difference in mean scores (mean difference = 19.62, 95% CI: 2.39 to 36.85) was large (eta squared = 0.17). Multiple regression analysis suggests two factors accounted for 10% of the variance in recall scores: (1) students' beliefs about distractions from computer use, and (2) beliefs about the influence of computer use on memory recall. Based on survey findings, participants (N=116) viewed computers and Internet access in graduate classes as helpful academic tools, but distractions from computer use were major sources of concern for students who used computers in graduate classes and those who did not. Additionally, participants believed academic productivity would increase if instructors integrated computer use appropriately in the curricula. Results of the survey and experiments suggest unstructured computer use with Internet access in the graduate classroom is strongly correlated with increased student distractions and decreased memory recall. Thus, restricting unstructured computer use is likely to increase existing memory recall levels, and increasing unstructured computer use is likely to reduce memory recall. Recommendations include changes in the way students use computers, pedagogical shifts, computer integration strategies, modified seating arrangements, increased accountability, and improved interaction between instructors and students.
Show less
-
Date Issued
-
2009
-
Identifier
-
CFE0002950, ucf:47966
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0002950
-
-
Title
-
Role Ambiguity: Defining the Elusive Role of the Special Education Teacher Who Works in Inclusive Settings.
-
Creator
-
Slanda, Dena, Little, Mary, Martin, Suzanne, Pearl, Cynthia, Boote, David, University of Central Florida
-
Abstract / Description
-
This phenomenological study examined the lived experiences of special education teachers who worked in inclusive settings. Given the increasing number of students with disabilities receiving special education services in the general education classroom (U.S. Department of Education, 2016), there is a critical need to understand the dynamic role of a special education teacher who works in inclusive settings. Federal mandates have required special education teachers working in inclusive...
Show moreThis phenomenological study examined the lived experiences of special education teachers who worked in inclusive settings. Given the increasing number of students with disabilities receiving special education services in the general education classroom (U.S. Department of Education, 2016), there is a critical need to understand the dynamic role of a special education teacher who works in inclusive settings. Federal mandates have required special education teachers working in inclusive settings to rethink their roles (McLeskey, Landers, Hoppey, (&) Williamson, 2011) and restructure their approach to providing specially-designed services. Further, these roles are dependent on those who interpret and implement policy and access to finite resources. This study used a phenomenological research method to examine the roles and responsibilities of special education teachers. Semi-structured interviews were conducted with seven participants (N = 7). A thematic analysis resulted in five overarching themes. The five themes included: (a) supporting students with disabilities within a support facilitation model; (b) role ambiguity of the special education teacher; (c) the lack of roles and responsibilities of the special education teacher within the MTSS framework; (d) the changing role of collaboration and communication; and (e) the challenges impacting the inclusion of students with disabilities in the general education setting. This study exposed the multiple facets of school and district policies that directly affected special educators' roles and responsibilities, as well as the emergence of a new role as a support facilitator.
Show less
-
Date Issued
-
2017
-
Identifier
-
CFE0006796, ucf:51821
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0006796
-
-
Title
-
Microscopic Assessment of Transportation Emissions on Limited Access Highways.
-
Creator
-
Abou-Senna, Hatem, Radwan, Ahmed, Abdel-Aty, Mohamed, Al-Deek, Haitham, Cooper, Charles, Johnson, Mark, University of Central Florida
-
Abstract / Description
-
On-road vehicles are a major source of transportation carbon dioxide (CO2) greenhouse gas emissions in all the developed countries, and in many of the developing countries in the world. Similarly, several criteria air pollutants are associated with transportation, e.g., carbon monoxide (CO), nitrogen oxides (NOx), and particulate matter (PM). The need to accurately quantify transportation-related emissions from vehicles is essential. Transportation agencies and researchers in the past have...
Show moreOn-road vehicles are a major source of transportation carbon dioxide (CO2) greenhouse gas emissions in all the developed countries, and in many of the developing countries in the world. Similarly, several criteria air pollutants are associated with transportation, e.g., carbon monoxide (CO), nitrogen oxides (NOx), and particulate matter (PM). The need to accurately quantify transportation-related emissions from vehicles is essential. Transportation agencies and researchers in the past have estimated emissions using one average speed and volume on a long stretch of roadway. With MOVES, there is an opportunity for higher precision and accuracy. Integrating a microscopic traffic simulation model (such as VISSIM) with MOVES allows one to obtain precise and accurate emissions estimates. The new United States Environmental Protection Agency (USEPA) mobile source emissions model, MOVES2010a (MOVES) can estimate vehicle emissions on a second-by-second basis creating the opportunity to develop new software (")VIMIS 1.0(") (VISSIM/MOVES Integration Software) to facilitate the integration process. This research presents a microscopic examination of five key transportation parameters (traffic volume, speed, truck percentage, road grade and temperature) on a 10-mile stretch of Interstate 4 (I-4) test bed prototype; an urban limited access highway corridor in Orlando, Florida. The analysis was conducted utilizing VIMIS 1.0 and using an advanced custom design technique; D-Optimality and I-Optimality criteria, to identify active factors and to ensure precision in estimating the regression coefficients as well as the response variable.The analysis of the experiment identified the optimal settings of the key factors and resulted in the development of Micro-TEM (Microscopic Transportation Emissions Meta-Model). The main purpose of Micro-TEM is to serve as a substitute model for predicting transportation emissions on limited access highways to an acceptable degree of accuracy in lieu of running simulations using a traffic model and integrating the results in an emissions model. Furthermore, significant emission rate reductions were observed from the experiment on the modeled corridor especially for speeds between 55 and 60 mph while maintaining up to 80% and 90% of the freeway's capacity. However, vehicle activity characterization in terms of speed was shown to have a significant impact on the emission estimation approach.Four different approaches were further examined to capture the environmental impacts of vehicular operations on the modeled test bed prototype. First, (at the most basic level), emissions were estimated for the entire 10-mile section (")by hand(") using one average traffic volume and average speed. Then, three advanced levels of detail were studied using VISSIM/MOVES to analyze smaller links: average speeds and volumes (AVG), second-by-second link driving schedules (LDS), and second-by-second operating mode distributions (OPMODE). This research analyzed how the various approaches affect predicted emissions of CO, NOx, PM and CO2. The results demonstrated that obtaining accurate and comprehensive operating mode distributions on a second-by-second basis improves emission estimates. Specifically, emission rates were found to be highly sensitive to stop-and-go traffic and the associated driving cycles of acceleration, deceleration, frequent braking/coasting and idling. Using the AVG or LDS approach may overestimate or underestimate emissions, respectively, compared to an operating mode distribution approach.Additionally, model applications and mitigation scenarios were examined on the modeled corridor to evaluate the environmental impacts in terms of vehicular emissions and at the same time validate the developed model (")Micro-TEM("). Mitigation scenarios included the future implementation of managed lanes (ML) along with the general use lanes (GUL) on the I-4 corridor, the currently implemented variable speed limits (VSL) scenario as well as a hypothetical restricted truck lane (RTL) scenario. Results of the mitigation scenarios showed an overall speed improvement on the corridor which resulted in overall reduction in emissions and emission rates when compared to the existing condition (EX) scenario and specifically on link by link basis for the RTL scenario.The proposed emission rate estimation process also can be extended to gridded emissions for ozone modeling, or to localized air quality dispersion modeling, where temporal and spatial resolution of emissions is essential to predict the concentration of pollutants near roadways.
Show less
-
Date Issued
-
2012
-
Identifier
-
CFE0004777, ucf:49788
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFE0004777
-
-
Title
-
BRAVE NEW WORLD RELOADED: ADVOCATING FOR BASIC CONSTITUTIONAL SEARCH PROTECTIONS TO APPLY TO CELL PHONES FROM EAVESDROPPING AND TRACKING BY THE GOVERNMENT AND CORPORATE ENTITIES.
-
Creator
-
Berrios-Ayala, Mark, Milon, Abby, University of Central Florida
-
Abstract / Description
-
Imagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM...
Show moreImagine a world where someone's personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters' (GCHQ) mass shadowing sharing plan to America's Russian inspiration, SORM. Some countries are following the United States' poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation's strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today's blurred privacy expectations.
Show less
-
Date Issued
-
2014
-
Identifier
-
CFH0004537, ucf:45187
-
Format
-
Document (PDF)
-
PURL
-
http://purl.flvc.org/ucf/fd/CFH0004537
Pages