Current Search: connection (x)
View All Items
Pages
- Title
- Improving Safety under Reduced Visibility Based on Multiple Countermeasures and Approaches including Connected Vehicles.
- Creator
-
Wu, Yina, Abdel-Aty, Mohamed, Lee, JaeYoung, Eluru, Naveen, University of Central Florida
- Abstract / Description
-
The effect of low visibility on both crash occurrence and severity is a major concern in the traffic safety field. Different approaches were utilized in this research to analyze the effects of fog on traffic safety and evaluate the effectiveness of different fog countermeasures. First, a (")Crash Risk Increase Indicator (CRII)(") was proposed to explore the differences of crash risk between fog and clear conditions. A binary logistic regression model was applied to link the increase of crash...
Show moreThe effect of low visibility on both crash occurrence and severity is a major concern in the traffic safety field. Different approaches were utilized in this research to analyze the effects of fog on traffic safety and evaluate the effectiveness of different fog countermeasures. First, a (")Crash Risk Increase Indicator (CRII)(") was proposed to explore the differences of crash risk between fog and clear conditions. A binary logistic regression model was applied to link the increase of crash risk with traffic flow characteristics. Second, a new algorithm was proposed to evaluate the rear-end crash risk under fog conditions. Logistic and negative binomial models were estimated in order to explore the relationship between the potential of rear-end crashes and the reduced visibility together with other traffic parameters. Moreover, the effectiveness of real-time fog warning systems was assessed by quantifying and characterizing drivers' speed adjustments through driving simulator experiments. A hierarchical assessment concept was suggested to explore the drivers' speed adjustment maneuvers. Two linear regression models and one hurdle beta regression model were estimated for the indexes. Also, another driving simulator experiment was conducted to explore the effectiveness of Connected-Vehicles (CV) crash warning systems on the drivers' awareness of the imminent situation ahead to take timely crash avoidance action(s). Finally, a micro-simulation experiment was also conducted to evaluate the safety benefits of a proposed Variable Speed limit (VSL) strategy and CV technologies. The proposed VSL strategy and CV technologies were implemented and tested for a freeway section through the micro-simulation software VISSIM. The results of the above mentioned studies showed the impact of reduced visibility on traffic safety, and the effectiveness of different fog countermeasures.
Show less - Date Issued
- 2017
- Identifier
- CFE0006928, ucf:51704
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006928
- Title
- Pearl Necklaces.
- Creator
-
Redmond, Jordan, Thaxton, Terry, Stap, Donald, Neal, Mary, University of Central Florida
- Abstract / Description
-
Pearl Necklaces aims to excavate raw moments of connection and find beauty in the depravity of self and situation. Set in the Deep South, this collection of poems thrives on lusty nights, hard love, and the twinge of memory. The voices within range from youthful to jaded as they speak across pages, flowing into one another to create a pain-body which ultimately seeks closure in relationships with objects, family, drugs, lovers, body parts, heroes, and setting. Tuned to the lyrical voices of...
Show morePearl Necklaces aims to excavate raw moments of connection and find beauty in the depravity of self and situation. Set in the Deep South, this collection of poems thrives on lusty nights, hard love, and the twinge of memory. The voices within range from youthful to jaded as they speak across pages, flowing into one another to create a pain-body which ultimately seeks closure in relationships with objects, family, drugs, lovers, body parts, heroes, and setting. Tuned to the lyrical voices of poets Kim Addonizio, Lynn Emanuel, and Dorianne Laux, poems such as (")Learning Shapes,(") (")Things that Make Me Feel Cool,(") (")Can't Say Daddy, and (")Don't Miss Mississippi(") seek out what makes up a person as the collection continues to practice manipulation with language, tradition, and context in works like (")Pearl Necklaces(") and (")Golden Boy.(") Faithfully and sarcastically, these collected poems drive to the fuzzy edges of attachment and never come back.
Show less - Date Issued
- 2016
- Identifier
- CFE0006489, ucf:51394
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006489
- Title
- Using Biomarkers to Assess the Migratory Ecology and Reproduction of the Florida Green Turtle (Chelonia mydas).
- Creator
-
Chabot, Ryan, Mansfield, Kate, Worthy, Graham, Seminoff, Jeffrey, University of Central Florida
- Abstract / Description
-
Migratory connectivity between breeding and foraging areas is a vital component of the ecology of a diverse collection of marine vertebrates. Habitat quality, composition, and resource availability at these locations have direct ramifications for individual fitness. The green turtle (Chelonia mydas) is a long-lived, highly migratory species of conservation concern. Important green turtle nesting habitat in Florida is protected, but more information is needed to identify foraging habitats and...
Show moreMigratory connectivity between breeding and foraging areas is a vital component of the ecology of a diverse collection of marine vertebrates. Habitat quality, composition, and resource availability at these locations have direct ramifications for individual fitness. The green turtle (Chelonia mydas) is a long-lived, highly migratory species of conservation concern. Important green turtle nesting habitat in Florida is protected, but more information is needed to identify foraging habitats and the influence these habitats have on reproduction. Here, I used stable isotope analysis of ?13C, ?15N, and ?34S and satellite telemetry validation to determine the number of putative foraging areas used by the breeding aggregation at the Archie Carr National Wildlife Refuge (ACNWR), and the relative contribution of each foraging area. I evaluated the influence of foraging area and other variables on egg size, clutch size, hatching success, and emerging success using model selection frameworks. Isotopic values of skin and eggs were used to build conversion equations between the two tissue types. Results suggest strong migratory connectivity between the ACNWR and the Florida Keys/Florida Bay complex. I found that the influences of foraging area are likely to be more detectable when evaluating female-centric fitness metrics like clutch size and egg size; these influences are more muted in hatching and emerging success, which are strongly influenced by nest incubation conditions. These are the first green turtle-specific tissue conversion equations for ?13C and ?15N, and the first ?34S equation for any marine turtle species. These will allow researchers to have a (")common currency(") between frequently collected samples to better compare results.
Show less - Date Issued
- 2017
- Identifier
- CFE0006574, ucf:51314
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006574
- Title
- Road Networks, Social Disorganization and Lethality, an Exploration of Theory and an Examination of Covariates.
- Creator
-
Poole, Aaron, Corzine, Harold, Huff-Corzine, Lin, Mustaine, Elizabeth, Jarvis, John, Weaver, Gregory, University of Central Florida
- Abstract / Description
-
Utilizing a Criminal Event Perspective, the analyses of this dissertation test a variety of relationships to the dependent variable: the Criminal Lethality Index. Data from the National Incident-Based Reporting System, the Census and American Community Survey, the American Trauma Society, and data derived from the Census's mapping TIGER files are combined to create a database of 190 cities. This database is used to test road network connectivity (Gama Index), medical resources, criminal...
Show moreUtilizing a Criminal Event Perspective, the analyses of this dissertation test a variety of relationships to the dependent variable: the Criminal Lethality Index. Data from the National Incident-Based Reporting System, the Census and American Community Survey, the American Trauma Society, and data derived from the Census's mapping TIGER files are combined to create a database of 190 cities. This database is used to test road network connectivity (Gama Index), medical resources, criminal covariates and Social Disorganization variables in relation to a city's Criminal Lethality Index. OLS regression demonstrates a significant and negative relationship between a city's Gama Index and its Criminal Lethality Index. In addition, percent male, percent black, median income and percent of the population employed in diagnosing and treating medical professions were all consistently positively related to Criminal Lethality. The percent of males 16 to 24, percent of single parent households, and Concentrated Disadvantage Index were all consistently and negatively related to Criminal Lethality. Given these surprising results, additional diagnostic regressions are run using more traditional dependent variables such as the number of murders in a city and the proportion of aggravated assaults with major injuries per 100,000 population. These reveal the idiosyncratic nature of utilizing the Criminal Lethality Index. This dependent variable has proven useful in some circumstances and counterintuitive in others. The source of the seemingly unintuitive results is the fact that certain factors only reduce murders but many factors impact both murder and aggravated assaults, thereby creating difficultly when trying to predict patterns in Criminal Lethality.
Show less - Date Issued
- 2013
- Identifier
- CFE0005046, ucf:49961
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005046
- Title
- Migratory connectivity and carry-over effects in Northwest Atlantic loggerhead turtles (Caretta caretta, L.).
- Creator
-
Ceriani, Simona, Weishampel, John, Ehrhart, Llewellyn, Walters, Linda, Quintana-Ascencio, Pedro, Roth, James, Valdes, Eduardo, University of Central Florida
- Abstract / Description
-
Migration is a widespread and complex phenomenon in nature that has fascinated humans for centuries. Connectivity among populations influences their demographics, genetic structure and response to environmental change. Here, I used the loggerhead turtle (Caretta caretta, L.) as a study organism to address questions related to migratory connectivity and carry-over effects using satellite telemetry, stable isotope analysis and GIS interpolation methods. Telemetry identified foraging areas...
Show moreMigration is a widespread and complex phenomenon in nature that has fascinated humans for centuries. Connectivity among populations influences their demographics, genetic structure and response to environmental change. Here, I used the loggerhead turtle (Caretta caretta, L.) as a study organism to address questions related to migratory connectivity and carry-over effects using satellite telemetry, stable isotope analysis and GIS interpolation methods. Telemetry identified foraging areas previously overlooked for loggerheads nesting in Florida. Next, I validated and evaluated the efficacy of intrinsic markers as a complementary and low cost tool to assign loggerhead foraging regions in the Northwest Atlantic Ocean (NWA), using both a spatially implicit and spatially explicit (isoscapes) approach. I then focused on the nesting beaches and developed a common currency for isotopic studies based on unhatched eggs, which provide a non-invasive and non-destructive method for more extensive sampling to elucidate isotopic patterns across broader spatiotemporal scales. Lastly, I found that intra-population variations in foraging strategies affect annual and long-term reproductive output of loggerheads nesting in Florida. Understanding geospatial linkages is critical to the fostering of appropriate management and conservation strategies for migratory species. My multi-faceted approach contributes to the growing body of literature exploring migratory connectivity and carry-over effects.
Show less - Date Issued
- 2014
- Identifier
- CFE0005470, ucf:50390
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005470
- Title
- PROFESSIONAL SCHOOL COUNSELORS' PERSPECTIVES ON THE EFFECTS OF MILITARY PARENTAL DEPLOYMENT ON SCHOOL-AGE CHILDREN AND ADOLESCENTS.
- Creator
-
McCloud, Cheryl, Robinson, E.H. Mike, University of Central Florida
- Abstract / Description
-
This qualitative study used an exploratory phenomenological approach to examine professional school counselors' perspectives on the effects of military parental deployment on school aged children and adolescents. The voices of school counselors who work with military connected children are absent from the literature. The research site was a professional counseling conference in Germany in the fall of 2010. Participants consisted of 12 professional school counselors who work with school-aged...
Show moreThis qualitative study used an exploratory phenomenological approach to examine professional school counselors' perspectives on the effects of military parental deployment on school aged children and adolescents. The voices of school counselors who work with military connected children are absent from the literature. The research site was a professional counseling conference in Germany in the fall of 2010. Participants consisted of 12 professional school counselors who work with school-aged children and adolescents who have experienced parental military deployment. Participants adopted pseudonyms though several indicated an affiliation with Department of Defense Dependent Schools (DODDS) and therefore offered their unique perspectives as school counselors living in military communities and working almost exclusively with military connected children and families. Data collection consisted of individual interviews with counselor participants. Data analysis consisted of coding meaningful words and phrases and yielded 33 preliminary categories that became new codes. Analysis of relationships between codes resulted in the emergence of four distinct themes: Military Life, Stages of Deployment, Role of the Counselor, and Children and Adolescents. Themes were supported by quotations of meaningful statements, thus participant voices provide thick, rich descriptions of the phenomenon. Validity strategies included peer debriefing, researcher positionality, and multiple examinations of the data set.
Show less - Date Issued
- 2011
- Identifier
- CFE0004046, ucf:49128
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004046
- Title
- CONNECTIONLESS APPROACH A LOCALIZED SCHEME TO MOBILE AD HOC NETWORKS.
- Creator
-
Ho, Yao, Hua, Kien, University of Central Florida
- Abstract / Description
-
According to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for...
Show moreAccording to a Gartner Group (www.gartner.com) report in September 2008, the worldwide telecommunications market is on pace to reach $2 trillion in 2008. Gartner predicts that by 2012, the ratio of mobile to fixed connections will exceed 4-to-1. The North American mobile data market grew to 141.1 million connections in 2007, with a compound annual growth rate of 41.7 percent. It is believed that a large portion will be ad hoc and multi-hop connections, which will open many opportunities for Mobile Ad hoc NETwork (MANET) applications and Wireless Mesh Network (WMN) applications. A MANET is a self-organizing multi-hop wireless network where all nodes participate in the routing and data forwarding process. Such a network can be easily deployed in situations where no base station is available, and a network must be build spontaneously. In applications such as battlefield communications, national crises, disaster recovery, and sensor deployment, a wired network is not available and ad hoc networks provide the only feasible means of communications and information access. Ad hoc networks have also become commonplace for gaming, conferencing, electronic classrooms, and particularly vehicle-to-vehicle communications. A Wireless mash network (WMN) is collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. Their rapid deployment and ease of maintenance are suitable for on-demand network such as disaster recovery, homeland security, convention centers, hard-to-wire buildings and unfriendly terrains. One important problem with MANET is the routing protocol that needs to work well not just with a small network, but also sustain efficiency and scalability as the network gets expanded and the application transmits data in greater volume. In such an environment, mobility, channel error, and congestion are the main causes for packet loss. Due to mobility of mobile hosts, addressing frequent and unpredictable topology changes is fundamental to MANET research. Two general approaches have been considered: connection-oriented approach and connectionless-oriented approach. In the former, the emphasis is on how to reconnect quickly with low overhead when a broken link occurs. Examples of this approach includes , , , , , , , , , and . In contrast, connectionless-oriented approach focuses on minimizing the occurrence of broken links. We proposed one such scheme called Connectionless Approach (CLA) and . In CLA, the network area is divided into non-overlapping grid cells, each serving as a virtual router. Any physical router (i.e., mobile host), currently inside a virtual router, can help forward the data packet to the next virtual router along the virtual link. This process is repeated until the packet reaches its final destination. Since a virtual link is based on virtual routers which do not move, it is much more robust than physical links used in the connection-oriented techniques. Simulation results in our previous works and , based on GloMoSim , indicate that CLA performs significantly better than connection-oriented techniques (i.e., AODV, DSR, LAR, GRID, TMNR, and GPSR). The contribution of this work consists of investigating and developing new Connectionless-Oriented Approach for Mobile Ad Hoc Network. Two of the greatest impacts of this research are as follows. First, the new approach is targeted towards robustly support high mobility and large scale environment which has been adapted for vehicle-to-vehicle environment in . Second, the detailed simulations which compare eight representative routing protocols, namely AODV, DSR, LAR, GRID, TMNR, GPSR, CBF, and CLA, under high-mobility environments. As many important emergent applications of the technology involved high-mobility nodes, very little is known about the existing routing methods perform relative to each other in high-mobility environments. The simulation results provide insight into ad hoc routing protocols and offer guidelines for mobile ad hoc network applications. Next, we enhanced and extend the connectionless-oriented approach. The current connectionless-oriented approach, however, may suffer from packet drops since traffic congestion is not considered in the packet forwarding policy. We address this weakness by considering the connectionless-oriented approach with a collision avoidance routing technique. After that, we investigate techniques to enforce collaboration among mobile devices in supporting the virtual router functionality. Many works have been published to combat such problem - misbehaving nodes are detected and a routing algorithm is employed to avoid and penalize misbehaving nodes. These techniques, however, cannot be applied to the connectionless-oriented approach since any node in the general direction towards the destination node can potentially help forward the data packets. To address the security and cooperation issues for connectionless-oriented approach, we introduce a cooperation enforcement technique called 3CE (3-Counter Enforcement). In addition, wireless mesh networks have become increasingly popular in recent years. Wireless mash network (WMNs) are collection of mesh clients and mesh nodes (routers), with mesh nodes forming the backbone of the network and providing connection to the Internet and other network. We propose a paradigm that combines virtual routers and mesh nodes to create a hybrid network call VR-Mesh Network. This hybrid network can reduce number of mesh node needed without decrease the performance of the network.
Show less - Date Issued
- 2009
- Identifier
- CFE0002742, ucf:48146
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002742
- Title
- The effects of chronic sleep deprivation on sustained attention: A study of brain dynamic functional connectivity.
- Creator
-
He, Yiling, Karwowski, Waldemar, Xanthopoulos, Petros, Hancock, Peter, Mikusinski, Piotr, University of Central Florida
- Abstract / Description
-
It is estimated that about 35-40% of adults in the U.S. suffer from insufficient sleep. Chronic sleep deprivation has become a prevalent phenomenon because of contemporary lifestyle and work-related factors. Sleep deprivation can reduce the capabilities and efficiency of attentional performance by impairing perception, increasing effort to maintain concentration, as well as introducing vision disturbance. Thus, it is important to understand the neural mechanisms behind how chronic sleep...
Show moreIt is estimated that about 35-40% of adults in the U.S. suffer from insufficient sleep. Chronic sleep deprivation has become a prevalent phenomenon because of contemporary lifestyle and work-related factors. Sleep deprivation can reduce the capabilities and efficiency of attentional performance by impairing perception, increasing effort to maintain concentration, as well as introducing vision disturbance. Thus, it is important to understand the neural mechanisms behind how chronic sleep deprivation impairs sustained attention.In recent years, more attention has been paid to the study of the integration between anatomically distributed and functionally connected brain regions. Functional connectivity has been widely used to characterize brain functional integration, which measures the statistical dependency between neurophysiological events of the human brain. Further, evidence from recent studies has shown the non-stationary nature of brain functional connectivity, which may reveal more information about the human brain. Thus, the objective of this thesis is to investigate the effects of chronic sleep deprivation on sustained attention from the perspective of dynamic functional connectivity.A modified spatial cueing paradigm was used to assess human sustained attention in rested wakefulness and chronic sleep deprivation conditions. Partial least squares approach was applied to distinguish brain functional connectivity for the experimental conditions. With the integration of a sliding-window approach, dynamic patterns of brain functional connectivity were identified in two experimental conditions. The brain was modeled as a series of dynamic functional networks in each experimental condition. Graph theoretic analysis was performed to investigate the dynamic properties of brain functional networks, using network measures of clustering coefficient and characteristics path length.In the chronic sleep deprivation condition, a compensation mechanism between highly clustered organization and ineffective adaptability of brain functional networks was observed. Specifically, a highly clustered organization of brain functional networks was illustrated with a large clustering coefficient. This organization suggested that brain utilizes more connections to maintain attention in the chronic sleep deprivation condition. A smaller impact of clustering coefficient variation on characteristics path lengths indicated an ineffective adaptability of brain functional networks in the chronic sleep deprivation condition. In the rested wakefulness condition, brain functional networks showed the small-world topology in general, with the average small-world topology index larger than one. Small-world topology was identified as an optimal network structure with the balance between local information processing and global integration. Given the fluctuating values of the index over time, small-world brain networks were observed in most cases, indicating an effective adaptability of the human brain to maintain the dominance of small-world networks in the rested wakefulness condition. On the contrary, given that the average small-world topology index was smaller than one, brain functional networks generally exhibited random network structure. From the perspective of dynamic functional networks, even though there were few cases showing small-world brain networks, brain functional networks failed to maintain the dominance of small-world topology in the chronic sleep deprivation condition.In conclusion, to the best of our knowledge this thesis was the first to investigate the effects of chronic sleep deprivation on sustained attention from the perspective of dynamic brain functional connectivity. A compensation mechanism between highly clustered organization and ineffective adaptability of brain functional networks was observed in the chronic sleep deprivation condition. Furthermore, chronic sleep deprivation impaired sustained attention by reducing the effectiveness of brain functional networks' adaptability, resulting in the disrupted dominance of small-world brain networks.
Show less - Date Issued
- 2015
- Identifier
- CFE0006036, ucf:50990
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006036
- Title
- Real-time SIL Emulation Architecture for Cooperative Automated Vehicles.
- Creator
-
Gupta, Nitish, Pourmohammadi Fallah, Yaser, Rahnavard, Nazanin, Vosoughi, Azadeh, University of Central Florida
- Abstract / Description
-
This thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless...
Show moreThis thesis presents a robust, flexible and real-time architecture for Software-in-the-Loop (SIL) testing of connected vehicle safety applications. Emerging connected and automated vehicles (CAV) use sensing, communication and computing technologies in the design of a host of new safety applications. Testing and verification of these applications is a major concern for the automotive industry. The CAV safety applications work by sharing their state and movement information over wireless communication links. Vehicular communication has fueled the development of various Cooperative Vehicle Safety (CVS) applications. Development of safety applications for CAV requires testing in many different scenarios. However, the recreation of test scenarios for evaluating safety applications is a very challenging task. This is mainly due to the randomness in communication, difficulty in recreating vehicle movements precisely, and safety concerns for certain scenarios. We propose to develop a standalone Remote Vehicle Emulator (RVE) that can reproduce V2V messages of remote vehicles from simulations or from previous tests, while also emulating the over the air behavior of multiple communicating nodes. This is expected to significantly accelerate the development cycle. RVE is a unique and easily configurable emulation cum simulation setup to allow Software in the Loop (SIL) testing of connected vehicle applications in a realistic and safe manner. It will help in tailoring numerous test scenarios, expediting algorithm development and validation as well as increase the probability of finding failure modes. This, in turn, will help improve the quality of safety applications while saving testing time and reducing cost.The RVE architecture consists of two modules, the Mobility Generator, and the Communication emulator. Both of these modules consist of a sequence of events that are handled based on the type of testing to be carried out. The communication emulator simulates the behavior of MAC layer while also considering the channel model to increase the probability of successful transmission. It then produces over the air messages that resemble the output of multiple nodes transmitting, including corrupted messages due to collisions. The algorithm that goes inside the emulator has been optimized so as to minimize the communication latency and make this a realistic and real-time safety testing tool. Finally, we provide a multi-metric experimental evaluation wherein we verified the simulation results with an identically configured ns3 simulator. With the aim to improve the quality of testing of CVS applications, this unique architecture would serve as a fundamental design for the future of CVS application testing.
Show less - Date Issued
- 2018
- Identifier
- CFE0007185, ucf:52280
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007185
- Title
- Arrangement of Google Search Results and Imperial Ideology: Searching for Benghazi, Libya.
- Creator
-
Stewart, Jacob, Pigg, Stacey, Rounsaville, Angela, Walls, Douglas, University of Central Florida
- Abstract / Description
-
This project responds to an ongoing discussion in scholarship that identifies and analyzes the ideological functions of computer interfaces. In 1994, Cynthia Selfe and Richard Selfe claimed that interfaces are maps of cultural information and are therefore ideological (485). For Selfe and Selfe and other scholars, these interfaces carried a colonial ideology that resulted in Western dominance over other cultures. Since this early scholarship, our perspectives on interface have shifted with...
Show moreThis project responds to an ongoing discussion in scholarship that identifies and analyzes the ideological functions of computer interfaces. In 1994, Cynthia Selfe and Richard Selfe claimed that interfaces are maps of cultural information and are therefore ideological (485). For Selfe and Selfe and other scholars, these interfaces carried a colonial ideology that resulted in Western dominance over other cultures. Since this early scholarship, our perspectives on interface have shifted with changing technology; interfaces can no longer be treated as having persistent and predictable characteristics like texts. I argue that interfaces are interactions among dynamic information that is constantly being updated online. One of the most prominent ways users interact with information online is through the use of search engines such as Google. Interfaces like Google assist users in navigating dynamic cultural information. How this information is arranged in a Google search event has a profound impact on what meaning we make surrounding the search term.In this project, I argue that colonial ideologies are upheld in several Google search events for the term (")Benghazi, Libya.(") I claim that networked connection during Google search events leads to the creation and sustainment of a colonial ideology through patterns of arrangement. Finally, I offer a methodology for understanding how ideologies are created when search events occur. This methodology searches for patterns in connected information in order to understand how they create an ideological lens.
Show less - Date Issued
- 2014
- Identifier
- CFE0005267, ucf:50559
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005267