Current Search: information processing (x)
View All Items
- Title
- Mathematical Foundations of Adaptive Quantum Processing.
- Creator
-
Bonior, Daniel, Mucciolo, Eduardo, Martin, Keye, Argenti, Luca, Shivamoggi, Bhimsen, Marinescu, Dan, University of Central Florida
- Abstract / Description
-
Quantum information has the potential to revolutionize the way we store, process, transfer and acquire information [1,14,15,21,37]. In particular, quantum information offers exciting new approaches to secure communication, computation and sensing. However, in order to realize such technologies, we must first understand the effect that environmental noise has on a quantum system. This dissertation builds upon recent studies that have explored the underlying structure of quantum information and...
Show moreQuantum information has the potential to revolutionize the way we store, process, transfer and acquire information [1,14,15,21,37]. In particular, quantum information offers exciting new approaches to secure communication, computation and sensing. However, in order to realize such technologies, we must first understand the effect that environmental noise has on a quantum system. This dissertation builds upon recent studies that have explored the underlying structure of quantum information and the effects of qubit channels in quantum communication protocols.This work is divided into five main chapters, with Chapter 1 being a brief introduction to quantum information. We then begin Chapter 2 by defining the error function for our qubit communication protocols. From there we explore the properties of our error functions and the topological space that they form. In Chapter 3 we consider the newly patented process Adaptive Quantum Information Processing, patent number US9838141 B2; originally outlined by Martin in [23]. We restate the adaptive scheme and exemplify its application through the Prepare and Send Protocol and Quantum Key Distribution. Applying our results from Chapter 2, we obtain an expression for the adaptability of unital channels in these two protocols and classify the channels that admit the most improvement. We dedicate Chapter 4 to the derivation of gravitational noise, and show that in certain circumstances gravity results in a channel that can be maximally improved in Adaptive QKD [3,14,16]. Lastly, we study the set of error functions through the lens of domain theory. Domain theory is a subset of mathematics that was developed in order to rigorously formalize computations. The first four chapters are all consequences of past discoveries in the mathematical structure of quantum channels. In Chapter 5 we characterize the set of error functions through domain theory, extending the mathematical foundations of quantum information. [12,18,20, 22, 23,25].
Show less - Date Issued
- 2018
- Identifier
- CFE0007313, ucf:52124
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0007313
- Title
- Beyond Compliance: Examining the Role of Motivation in Vigilance Performance.
- Creator
-
Dewar, Alexis, Szalma, James, Sims, Valerie, Hancock, Peter, Matthews, Gerald, University of Central Florida
- Abstract / Description
-
Vigilance, or sustained attention, is the capacity to attend to information for a prolonged period of time (Davies (&) Parasuraman, 1982; Jerison, 1970; Warm, 1977). Due to limitations of the human nervous system, as well as the environmental context, attention can begin to wane over time. This results in a phenomenon referred to as the vigilance decrement, or a decline in vigilance performance as a function of time. The vigilance decrement can manifest as poorer attention and is thusly...
Show moreVigilance, or sustained attention, is the capacity to attend to information for a prolonged period of time (Davies (&) Parasuraman, 1982; Jerison, 1970; Warm, 1977). Due to limitations of the human nervous system, as well as the environmental context, attention can begin to wane over time. This results in a phenomenon referred to as the vigilance decrement, or a decline in vigilance performance as a function of time. The vigilance decrement can manifest as poorer attention and is thusly associated with poor performance, which is defined behaviorally as more lapses in the detection of critical signals and an increase in response time to these signals during watch. Given this, the present dissertation seeks to systematically examine the impact of two types of motivation (i.e., achievement motivation, autonomous motivation) on vigilance performance across four experiments. The present experiments manipulate information processing type, source complexity, and motivational task demands. Three hundred and ninety-eight participants completed either a cognitive task or sensory task, which were psychophysically equated in previous studies (Szalma (&) Teo, 2012; Teo, Szalma, (&) Schmidt, 2011), with or without motivational instructions, and with either low, medium, or high source complexity. Performance measures, perceived stress and workload, and changes to state motivation and engagement at pre-task and post-task are interpreted across three theories of information processing: resource-depletion theory, mind-wandering theory, and mindlessness theory. The results of each of the four studies are discussed in terms of overall support for the resource-depletionist account. The limitations of the present set of experiments and the future directions for research on motivation and sustained attention are also discussed.
Show less - Date Issued
- 2017
- Identifier
- CFE0006582, ucf:51312
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006582
- Title
- Identity construction and information processing in a coaching relationship: The effects of coach behavior on coachee goal-setting and commitment.
- Creator
-
Coultas, Christopher, Salas, Eduardo, Salazar, Maritza, Burke, Shawn, Fritzsche, Barbara, University of Central Florida
- Abstract / Description
-
Coaching (professional, business, executive, leadership) has been shown to be effective generally speaking, but questions remain regarding the explanatory mechanisms underlying coaching. I first propose a context-general model that unpacks the sociocognitive dynamics within coaching. The model explains the emergence of different types of coaching relationships, and how the nature of these relationships differentially determine coaching outcomes. Research and theory on social identity...
Show moreCoaching (professional, business, executive, leadership) has been shown to be effective generally speaking, but questions remain regarding the explanatory mechanisms underlying coaching. I first propose a context-general model that unpacks the sociocognitive dynamics within coaching. The model explains the emergence of different types of coaching relationships, and how the nature of these relationships differentially determine coaching outcomes. Research and theory on social identity construction and information processing in dyads provides the foundation upon which I outline a model describing the process and dynamics of coaching identity emergence. Beyond this emergence, my proposed model states that the coachee's understanding of appropriate interpersonal relations and division of labor between coach and coachee (i.e., his/her situated coaching identity or coaching structure schema) should partially dictate the focus and depth of the coachee's information processing during a coaching engagement. Past research has shown information processing to be a key determinant of decision-making and goal commitment, both of which are desirable outcomes within the coaching domain.To explore these issues, I developed a coaching exercise which simulated some of the early aspects of business, leadership, or executive coaching. During this simulation, participants were guided through a process which enabled them to think and talk about their strengths and weaknesses when using different conflict management behaviors. In discussing these aspects of conflict management, participants and coaches (i.e., trained research associates) walked through a supplementary process to facilitate the development of a series of goals (an (")action plan(")) that would enable the participant to improve his or her conflict management behaviors. At the end of the coaching session, participants were asked to what extent they felt committed to the goals they had developed and whether or not they expected them to be efficacious. Throughout the coaching session, participants were also asked at designated break points to report their levels of information processing and their understanding of the coaching structure schema for that particular coaching relationship. The experimental manipulation was presented at the beginning of the session, wherein the coach would explain to the coachee what the ideal nature of coaching should be. These explanations varied in terms of ascribing responsibility and division of labor (-) either to a generic coaching process, to the skill and ability of the coach, to the creativity of the participant, or to the joint interaction between coach and participant. Among other things, I hypothesized that coaching structure schemas that emphasized the participant's role in the coaching process would encourage more information processing, and consequently higher levels of goal commitment. Hypotheses were largely confirmed, showing that information processing and coaching structure schemas are important predictors of goal commitment at the end of one coaching session. The effects of the manipulation were mixed. Claiming behaviors (-) that is, the coach ascribing responsibility for coaching effectiveness to him/herself (-) were only marginally effective in shaping participants' coaching structure schemas. Granting behaviors (-) communicating to the participant that they are responsible for coaching effectiveness (-) were much more effective in facilitating helpful information processing and driving higher levels of goal commitment. One possible explanation for the relative effectiveness of granting over claiming may be that claiming requires a degree of credibility which the coach (again, a trained research associate) had not attained with the participants. Other findings pertain to: (1) the unique variance that independent measures of coach- and coachee-relevant structure schemas contribute to models predicting information processing and goal commitment, (2) the importance of identifying the type or focus of coachee information processing, and (3) the role that psychological mindedness may play in characterizing a more (")coachable(") coachee. Implications include: (1) measuring coachees' coaching structure schemas, (2) intentionally encouraging a more appropriate schema, (3) measuring coachees' psychological mindedness prior to coaching, and (4) dynamically monitoring coachees' schema and their information processing in order to assure better coaching effectiveness. Future researchers should explore ways to enact these implications and also to further explore the theoretical components of these practical implications, such as: (1) measurement methods for better assessing coaching schemas and information processing, (2) what the ideal timings are for different kinds of coaching schemas, and (3) different ways to encourage maximally adaptive and appropriate coaching structure schemas.
Show less - Date Issued
- 2014
- Identifier
- CFE0005319, ucf:50523
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005319
- Title
- FINDERS KEEPERS: A COMPARATIVE STUDY INVESTIGATING TEACHING THE FLORIDA RESEARCH PROCESS FINDS MODEL THROUGH THREE DIFFERENT APPROACHES AT THE ELEMENTARY SCHOOL LEVEL.
- Creator
-
Serrell, Karen, Beile, Penny, University of Central Florida
- Abstract / Description
-
The children's taunt "Finders Keepers, Losers Weepers" gives new credence to the information search process at the elementary school level. Children keep what they find, claim it as their own, and accept information without discernment or critique. This study examines the effectiveness of teaching information literacy skills through three different approaches. The first curricular approach uses direct instruction to teach children how to do research using the Florida Research Process...
Show moreThe children's taunt "Finders Keepers, Losers Weepers" gives new credence to the information search process at the elementary school level. Children keep what they find, claim it as their own, and accept information without discernment or critique. This study examines the effectiveness of teaching information literacy skills through three different approaches. The first curricular approach uses direct instruction to teach children how to do research using the Florida Research Process FINDS Model. The second approach pairs the FINDS Model with a unit of study that is related to classroom curriculum. The third approach examines the FINDS Model in conjunction with project learning, a constructivist model based on student interest. One hundred twenty- eight third grade students attending a public elementary school in Southwest Florida during the 2008-2009 school year participated in the study. A mixed-methods research approach was used to gather data. Quantitative data was collected with an information literacy pre and post test, and an anonymous media lessons' survey about student preferences. Qualitative data were gathered through a review of student work samples and student interviews. Statistically significant gains were found between the pre to post test scores for all three groups, however no statistically significant differences were found among groups. Although quantitative data did not reveal differences among the treatment groups, qualitative findings revealed that the group taught research skills through the connection to classroom curriculum approach performed better. Thus the findings of this study support existing research which proposes that the best practice for teaching research skills to young children is through a connection to classroom curriculum.
Show less - Date Issued
- 2009
- Identifier
- CFE0002957, ucf:47963
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0002957
- Title
- INVESTIGATING THE OPTIMAL PRESENTATION OF FEEDBACK IN SIMULATION-BASED TRAINING: AN APPLICATION OF THE COGNITIVE THEORY OF MULTIMEDIA LEARNING.
- Creator
-
Van Buskirk, Wendi, Bowers, Clint, University of Central Florida
- Abstract / Description
-
There are many different training interventions that can be used in simulation based training systems (e.g., cueing, hinting, highlighting, deliberate practice, etc.). However, the most widely used training intervention in the military is feedback, most often presented in the form of a debrief. With advances in technology, it is possible to measure and diagnose performance in real-time. Thus it is possible to provide immediate feedback during scenarios. However, training systems designers...
Show moreThere are many different training interventions that can be used in simulation based training systems (e.g., cueing, hinting, highlighting, deliberate practice, etc.). However, the most widely used training intervention in the military is feedback, most often presented in the form of a debrief. With advances in technology, it is possible to measure and diagnose performance in real-time. Thus it is possible to provide immediate feedback during scenarios. However, training systems designers should not consider the timing of feedback in isolation. There are other parameters of feedback that must also be considered which may have an impact on performance. Specifically, feedback content and modality may also have an impact on the appropriate timing of feedback and its' effectiveness in simulation training environments. Moreno and Mayer (2000) propose a cognitive theory of multimedia learning which describes how instruction is perceived and processed by a trainee. Using this theoretical framework, I investigate the optimal use of feedback while considering the interaction of feedback timing, content, and modality in scenario-based training environments. In order to investigate the relationship between the timing, modality, and content of feedback, a 2 (immediate, delayed) X 2 (visual, auditory) X 2 (process, outcome) between-subjects design was used (a no feedback control condition was also included). Ninety participants were randomly assigned to the nine experimental groups. These participants performed a visual-spatial military task called the Forward Observer PC-based Simulation. Results indicated that receiving feedback was beneficial to improve performance as compared to receiving no feedback. As hypothesized, during a visual-spatial task, auditory feedback presented during a scenario led to higher performance than visual feedback. Finally, while I did not support my hypothesis that an interaction between all three components of feedback would affect performance, it is promising that the pattern of results mirrored the hypothesized pattern. Theoretical and practical implications, as well as limitations of the current study and directions for future research are discussed.
Show less - Date Issued
- 2011
- Identifier
- CFE0003604, ucf:48875
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003604
- Title
- Entanglement and Coherence in Classical and Quantum Optics.
- Creator
-
Kagalwala, Kumel, Saleh, Bahaa, Abouraddy, Ayman, Christodoulides, Demetrios, Leuenberger, Michael, University of Central Florida
- Abstract / Description
-
We explore the concepts of coherence and entanglement as they apply to both the classical and quantum natures of light. In the classical domain, we take inspiration from the tools and concepts developed in foundational quantum mechanics and quantum information science to gain a better understanding of classical coherence theory of light with multiple degrees of freedom (DoFs). First, we use polarization and spatial parity DoFs to demonstrate the notion of classical entanglement, and show that...
Show moreWe explore the concepts of coherence and entanglement as they apply to both the classical and quantum natures of light. In the classical domain, we take inspiration from the tools and concepts developed in foundational quantum mechanics and quantum information science to gain a better understanding of classical coherence theory of light with multiple degrees of freedom (DoFs). First, we use polarization and spatial parity DoFs to demonstrate the notion of classical entanglement, and show that Bell's measure can serve as a useful tool in distinguishing between classical optical coherence theory. Second, we establish a methodical yet versatile approach called 'optical coherency matrix tomography' for reconstructing the coherency matrix of an electromagnetic beam with multiple DoFs. This technique exploits the analogy between this problem in classical optics and that of tomographically reconstructing the density matrix associated with multipartite quantum states in quantum information science. Third, we report the first experimental measurements of the 4 x 4 coherency matrix associated with an electromagnetic beam in which polarization and a spatial DoF are relevant, ranging from the traditional two-point Young's double slit to spatial parity and orbital angular momentum modes. In the quantum domain, we use the modal structure of classical fields to develop qubits and structure Hilbert spaces for use in quantum information processing. Advancing to three-qubit logic gates is an important step towards the success of optical schemes for quantum computing. We experimentally implement a variety of two- and three- qubit, linear and deterministic, single-photon, controlled, quantum logic gates using polarization and spatial parity qubits. Lastly, we demonstrate the implementation of two-qubit single-photon logic using polarization and orbital angular momentum qubits.
Show less - Date Issued
- 2015
- Identifier
- CFE0006334, ucf:51546
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006334
- Title
- Phonological Working Memory Deficits in ADHD Revisited: The Role of Lower-Level Information Processing Deficits in Impaired Working Memory Performance.
- Creator
-
Raiker, Joseph, Rapport, Mark, Beidel, Deborah, Mouloua, Mustapha, Vasquez, Eleazar, University of Central Florida
- Abstract / Description
-
Working memory deficits in children with ADHD are well established; however, insufficient evidence exists concerning the degree to which lower-level cognitive processes contribute to these deficits. The current study dissociates lower level information processing abilities (i.e., visual registration, orthographic conversion, and response output) in children with ADHD and typically developing children and examines the unique contribution of these processes to their phonological working memory...
Show moreWorking memory deficits in children with ADHD are well established; however, insufficient evidence exists concerning the degree to which lower-level cognitive processes contribute to these deficits. The current study dissociates lower level information processing abilities (i.e., visual registration, orthographic conversion, and response output) in children with ADHD and typically developing children and examines the unique contribution of these processes to their phonological working memory performance. Thirty-four boys between 8 and 12 years of age (20 ADHD, 14 typically developing) were administered novel information processing and phonological working memory tasks. Between-group differences were examined and bootstrap mediation analysis was used to evaluate the mediating effect of information processing deficits on phonological working memory performance. Results revealed moderate to large magnitude deficits in visual registration and encoding, orthographic to phonological conversion, and phonological working memory in children with ADHD. Subsequent mediation analyses, however, revealed that visual registration/encoding alone mediated the diagnostic group status/phonological working memory relationship and accounted for approximately 32% of the variance in children's phonological working memory performance. Diagnostic and treatment implications for understanding the complex interplay among multiple cognitive deficits in children with ADHD are discussed.
Show less - Date Issued
- 2014
- Identifier
- CFE0005694, ucf:50141
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005694
- Title
- AN EXPLORATION OF SONG AS A STRATEGY TO ENGAGE ELEMENTARY STUDENTS DURING SOCIAL STUDIES LESSONS.
- Creator
-
Rome, Morgan, Jennings-Towle, Kelly, University of Central Florida
- Abstract / Description
-
The purpose of this thesis is to explore how curriculum-related songs provide an engaging atmosphere for elementary students learning social studies concepts. The investigation done for this thesis examines the resources available to teachers in terms of songs to be used for pedagogical engagement of social studies lessons. Through research and video analyzations it can be concluded that students are overall intrigued by the usage of songs in their social studies lessons. During the social...
Show moreThe purpose of this thesis is to explore how curriculum-related songs provide an engaging atmosphere for elementary students learning social studies concepts. The investigation done for this thesis examines the resources available to teachers in terms of songs to be used for pedagogical engagement of social studies lessons. Through research and video analyzations it can be concluded that students are overall intrigued by the usage of songs in their social studies lessons. During the social studies lessons observed in the video analyzations, the elementary students are focused, exhibit positive body language, participate, and have fun. Since engagement is documented within the analyzed videos and supported through others' research to be beneficial for students, this thesis researched and found a place for songs in elementary social studies lessons. Since there are a lack of current social studies resources that contain a musical element, eight social studies lesson plans were produced specifically for this thesis to demonstrate how songs can be implemented into the elementary curriculum to engage students.
Show less - Date Issued
- 2018
- Identifier
- CFH2000302, ucf:45792
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFH2000302
- Title
- THE INFLUENCE OF STUDENTS'COGNITIVE STYLE ON A STANDARDIZED READING TEST ADMINISTERED IN THREE DIFFERENT FORMATS.
- Creator
-
Blanton, Elizabeth Lynn, Kysilka, Marcella L., University of Central Florida
- Abstract / Description
-
ABSTRACTThe purpose of this study was to examine the means of scores on three forms of a standardized reading comprehension test taken by community college students in developmental reading classes. The three forms of the test were administered as a timed multiple-choice test, a constructed response test, and an un-timed multiple-choice test. Scores on the Group Embedded Figures Test (GEFT) were used to classify the students who participated in the study as having field dependent (LOW GEFT),...
Show moreABSTRACTThe purpose of this study was to examine the means of scores on three forms of a standardized reading comprehension test taken by community college students in developmental reading classes. The three forms of the test were administered as a timed multiple-choice test, a constructed response test, and an un-timed multiple-choice test. Scores on the Group Embedded Figures Test (GEFT) were used to classify the students who participated in the study as having field dependent (LOW GEFT), mid-field dependent/independent (MID GEFT), or field independent (HIGH GEFT) tendencies. The paired samples test was used to analyze the scores among the students classified as LOW GEFT, MID GEFT, and HIGH GEFT for mean differences in scores on the three test formats. The data revealed that for LOW GEFT students, the format of the test impacted their scores, with the mean of the scores of the un-timed multiple-choice test being significantly higher than the timed multiple-choice test and the constructed response format. The data also showed that for the MID GEFT students the mean of the scores for the un-timed multiple-choice test was significantly higher than the means for the timed multiple-choice test scores and the constructed response test scores. However, no significant mean difference was found between the timed multiple-choice test scores and the constructed response test scores. For the HIGH GEFT students, significant mean difference existed only between the un-timed multiple-choice and the timed multiple- choice scores. The means of reading comprehension test scores on the three formats between the LOW GEFT, MID GEFT, and HIGH GEFT students indicated significant mean difference between the timed multiple choice test scores but not between the means of the scores for the constructed response and the un-timed multiple-choice test scores.Demographically, when the means of the reading test scores were analyzed with ethnicity as the controlling variable, the Hispanic students had a significantly higher mean on the scores for the constructed response test format. No other significant mean differences were found between the scores of the African American, Caucasian, Hispanic, or Native American students. When the means of the reading test scores were analyzed with gender as the controlling variable, no significant mean difference was found between the reading comprehension scores of the men and women. This study indicated that cognitive style had more impact on students' performance on a standardized test of reading comprehension than did ethnicity or gender. The un-timed multiple-choice format also had an equalizing effect on the means of the scores for these students.
Show less - Date Issued
- 2004
- Identifier
- CFE0000055, ucf:46085
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000055
- Title
- INTERFEROMETRY-BASED FREE SPACE COMMUNICATION AND INFORMATION PROCESSING.
- Creator
-
Arain, Muzamil, Riza, Nabeel, University of Central Florida
- Abstract / Description
-
This dissertation studies, analyzes, and experimentally demonstrates the innovative use of interference phenomenon in the field of opto-electronic information processing and optical communications. A number of optical systems using interferometric techniques both in the optical and the electronic domains has been demonstrated in the filed of signal transmission and processing, optical metrology, defense, and physical sensors. Specifically it has been shown that the interference of waves in...
Show moreThis dissertation studies, analyzes, and experimentally demonstrates the innovative use of interference phenomenon in the field of opto-electronic information processing and optical communications. A number of optical systems using interferometric techniques both in the optical and the electronic domains has been demonstrated in the filed of signal transmission and processing, optical metrology, defense, and physical sensors. Specifically it has been shown that the interference of waves in the form of holography can be exploited to realize a novel optical scanner called Code Multiplexed Optical Scanner (C-MOS). The C-MOS features large aperture, wide scan angles, 3-D beam control, no moving parts, and high beam scanning resolution. A C-MOS based free space optical transceiver for bi-directional communication has also been experimentally demonstrated. For high speed, large bandwidth, and high frequency operation, an optically implemented reconfigurable RF transversal filter design is presented that implements wide range of filtering algorithms. A number of techniques using heterodyne interferometry via acousto-optic device for optical path length measurements have been described. Finally, a whole new class of interferometric sensors for optical metrology and sensing applications is presented. A non-traditional interferometric output signal processing scheme has been developed. Applications include, for example, temperature sensors for harsh environments for a wide temperature range from room temperature to 1000 degree C.
Show less - Date Issued
- 2005
- Identifier
- CFE0000598, ucf:46478
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0000598
- Title
- The Impact of Technology on Management Control: Degradation, Empowerment, or Technology Dominance?.
- Creator
-
Canada, Joseph, Arnold, Vicky, Roberts, Robin, Sutton, Steven, Benford, Tanya, University of Central Florida
- Abstract / Description
-
The evolution of technology brings with it the evolution of business processes. Without a doubt, technology changes how work is performed. At first glance, workplace technology appears to be a great boon to society. However, research presents opposing views on how workplace technologies impact the individual. One perspective argues that organizations utilize technology to redesign work processes, such that the worker requires less skill, autonomy, and compensation. The opposing perspective...
Show moreThe evolution of technology brings with it the evolution of business processes. Without a doubt, technology changes how work is performed. At first glance, workplace technology appears to be a great boon to society. However, research presents opposing views on how workplace technologies impact the individual. One perspective argues that organizations utilize technology to redesign work processes, such that the worker requires less skill, autonomy, and compensation. The opposing perspective argues that organizations utilize technology to empower employees to improve efficiency and profits. This dissertation consists of three interrelated studies examining workplace technology's impact on decision makers. The first study examines the capability of an enterprise system to increase the application of scientific management techniques to middle management and, consequently, to degrade middle management's work by limiting their autonomy. The second study investigates the capability of an enterprise system to facilitate the empowerment of managers via mutual monitoring and social identification. The third study builds upon the first study by examining how limiting autonomy through technology impacts the intrinsic motivation of decision makers and, as a result, affects the decision making process. Study one applies labor process theory to explain how enterprise systems can degrade the work of middle management via scientific management techniques. The purpose of this study is to test if the expectations of labor process theory can be applied to enterprise systems. In order to test this assertion, a field survey utilizing 189 middle managers is employed and the data is analyzed using component based structural equation modeling. The results indicate that enterprise system integration increases two scientific management techniques, formalization and performance measurement, but do not reveal a significant relationship between enterprise system integration and routinization. Interestingly, the results also indicate that routinization is the only scientific management technique, of the three studied, that directly limits the autonomy of the middle managers. Although performance measurement does not reduce autonomy directly, performance measurement interacts with routinization to reduce autonomy. This study contributes to the enterprise system literature by demonstrating enterprise systems' ability to increase the degree of scientific management applied to middle management. It also contributes to labor process theory by revealing that routinization may be the scientific management technique that determines whether other control techniques are utilized in a manner consistent with labor process theory. The ability of an enterprise system to facilitate the application of Mary Parker Follett's managerial control concepts are investigated in the second study. Specifically, Follett theorizes that information sharing facilitates the internalization of group goals and empowers individuals to have more influence and be more effective. This study employs a survey of 206 managers to test the theoretical relationships. The results indicate that enterprise system integration increases information sharing in the form of mutual monitoring, consequently, leading to social identification among peer managers. Additionally, social identification among peer managers empowers managers to have more influence over the organization. The study contributes to empowerment research by acknowledging and verifying the role that social identification plays in translating an empowering work climate into empowered managers. The study's conclusion that enterprise system integration facilitates the application of Follett's managerial control concepts extends both enterprise system and managerial control literature. The third study builds upon study one by examining the affect that autonomy has upon the decision maker. This study marries self-determination theory and technology dominance theory to understand the role that self-determination, intrinsic motivation, and engagement have upon technology dominance. Self-determination theory asserts that higher degrees of self-determination increase intrinsic motivation. Furthermore, self-determination research finds that intrinsic motivation increases engagement, while technology dominance research indicates that lack of engagement is an antecedent of technology dominance. Thus, applying self-determination theory as a predictor of technology dominance suggests that autonomy and relatedness associated with a task increase the intrinsic motivation to complete that task and consequently increase engagement in the task. Task engagement, in turn, reduces the likelihood of technology dominance. The proposed theoretical model is tested experimentally with 83 junior level business students. The results do not support the theoretical model, however the findings reveal that intrinsic motivation does reduce the likelihood of technology dominance. This indicates that intrinsic motivation as a predictor of technology dominance should be further investigated. Additionally, the study contributes to technology dominance literature by exhibiting a more appropriate operationalization of the inappropriate reliance aspect of technology dominance. This dissertation reveals that various theories concerning workplace technology and management control techniques have both validity and limitations. Labor process theorists cannot assume that all technologies and management control techniques are utilized to undermine the employee's value to the organization, as Study 2 reveals that enterprise systems and mutual monitoring lead to empowered managers. Likewise, proponents of enterprise systems cannot assume that the integrated nature of enterprise systems is always utilized in an empowering manner, as Study 1 reveals the increased performance measurement through enterprise systems can be utilized to limit managers in a routinized job environment. While the third study was unable to determine that the control features in technology affect the intrinsic motivation to complete a task, the findings do reveal that intrinsic motivation is directly related to technology dominance. The findings and theoretical refinements demonstrate that workplace technology and management control have a complicated relationship with the employee and that the various theories concerning them cannot be applied universally.
Show less - Date Issued
- 2013
- Identifier
- CFE0004980, ucf:49569
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0004980
- Title
- A Multimedia Approach to Game-Based Training: Exploring the Effects of the Modality and Temporal Contiguity Principles on Learning in a Virtual Environment.
- Creator
-
Serge, Stephen, Mouloua, Mustapha, Bohil, Corey, Bowers, Clint, Priest Walker, Heather, University of Central Florida
- Abstract / Description
-
There is an increasing interest in using video games as a means to deliver training to individuals learning new skills or tasks. However, current research lacks a clear method of developing effective instructional material when these games are used as training tools and explaining how gameplay may affect learning. The literature contains multiple approaches to training and GBT but generally lacks a foundational-level and theoretically relevant approach to how people learn specifically from...
Show moreThere is an increasing interest in using video games as a means to deliver training to individuals learning new skills or tasks. However, current research lacks a clear method of developing effective instructional material when these games are used as training tools and explaining how gameplay may affect learning. The literature contains multiple approaches to training and GBT but generally lacks a foundational-level and theoretically relevant approach to how people learn specifically from video games and how to design instructional guidance within these gaming environments. This study investigated instructional delivery within GBT. Video games are a form of multimedia, consisting of both imagery and sounds. The Cognitive Theory of Multimedia Learning (CTML; Mayer 2005) explicitly describes how people learn from multimedia information, consisting of a combination of narration (words) and animation (pictures). This study empirically examined the effects of the modality and temporal contiguity principles on learning in a game-based virtual environment. Based on these principles, it was hypothesized that receiving either voice or embedded training would result in better performance on learning measures. Additionally, receiving a combination of voice and embedded training would lead to better performance on learning measures than all other instructional conditions.A total of 128 participants received training on the role and procedures related to the combat lifesaver (-) a non-medical soldier who receives additional training on combat-relevant lifesaving medical procedures. Training sessions involved an instructional presentation manipulated along the modality (voice or text) and temporal contiguity (embedded in the game or presented before gameplay) principles. Instructional delivery was manipulated in a 2x2 between-subjects design with four instructional conditions: Upfront-Voice, Upfront-Text, Embedded-Voice, and Embedded-Text. Results indicated that: (1) upfront instruction led to significantly better retention performance than embedded instructional regardless of delivery modality; (2) receiving voice-based instruction led to better transfer performance than text-based instruction regardless of presentation timing; (3) no differences in performance were observed on the simple application test between any instructional conditions; and (4) a significant interaction of modality-by-temporal contiguity was obtained. Simple effects analysis indicated differing effects along modality within the embedded instruction group, with voice recipients performing better than text (p = .012). Individual group comparisons revealed that the upfront-voice group performed better on retention than both embedded groups (p = .006), the embedded-voice group performed better on transfer than the upfront text group (p = .002), and the embedded-voice group performed better on the complex application test than the embedded-text group (p =.012). Findings indicated partial support for the application of the modality and temporal contiguity principles of CTML in interactive GBT. Combining gameplay (i.e., practice) with instructional presentation both helps and hinders working memory's ability to process information. Findings also explain how expanding CTML into game-based training may fundamentally change how a person processes information as a function of the specific type of knowledge being taught. Results will drive future systematic research to test and determine the most effective means of designing instruction for interactive GBT. Further theoretical and practical implications will be discussed.
Show less - Date Issued
- 2014
- Identifier
- CFE0005548, ucf:50271
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005548
- Title
- The influence of trait anxiety on information processing: An elaboration likelihood study.
- Creator
-
Appelbaum, Michael, Miller, Ann, Weger, Harry, Rubenking, Bridget, University of Central Florida
- Abstract / Description
-
This study explored the influence of trait anxiety on information processing in persuasive situations, and investigated cognitive load as a mediator of this relationship. The research presented was based off DeBono and McDermott's (1994) framework for exploring trait anxiety and persuasion. The theoretical lens used to explore information processing, the elaboration likelihood model (Petty (&) Cacioppo, 1986) posits that motivation and ability are necessary components to elaborate on a...
Show moreThis study explored the influence of trait anxiety on information processing in persuasive situations, and investigated cognitive load as a mediator of this relationship. The research presented was based off DeBono and McDermott's (1994) framework for exploring trait anxiety and persuasion. The theoretical lens used to explore information processing, the elaboration likelihood model (Petty (&) Cacioppo, 1986) posits that motivation and ability are necessary components to elaborate on a message. However, very little research has addressed ability variables like trait anxiety. I predicted that students high in trait anxiety would be persuaded by the attractiveness of the source (peripherally) whereas students low in trait anxiety would be persuaded by the strength of the arguments presented (centrally).Undergraduate students were asked to view a picture of a policy presenter and listen to a recording of the student's proposed policy statement. After listening to the recording participants wrote down their thoughts during the presentation and were tested on their ability to recall the arguments presented. They then completed a few scale items assessing their attitudes toward the policy as well as questions to maintain the cover story.Findings showed no difference in processing between low and high trait anxious individuals. However, there was a significant effect of anxiety on attitudes. Additionally, cognitive load was not found to be a mediator of the relationship between anxiety and attitudes.
Show less - Date Issued
- 2015
- Identifier
- CFE0005572, ucf:50262
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005572
- Title
- On the security of NoSQL cloud database services.
- Creator
-
Ahmadian, Mohammad, Marinescu, Dan, Wocjan, Pawel, Heinrich, Mark, Brennan, Joseph, University of Central Florida
- Abstract / Description
-
Processing a vast volume of data generated by web, mobile and Internet-enabled devices, necessitates a scalable and flexible data management system. Database-as-a-Service (DBaaS) is a new cloud computing paradigm, promising a cost-effective and scalable, fully-managed database functionality meeting the requirements of online data processing. Although DBaaS offers many benefits it also introduces new threats and vulnerabilities. While many traditional data processing threats remain, DBaaS...
Show moreProcessing a vast volume of data generated by web, mobile and Internet-enabled devices, necessitates a scalable and flexible data management system. Database-as-a-Service (DBaaS) is a new cloud computing paradigm, promising a cost-effective and scalable, fully-managed database functionality meeting the requirements of online data processing. Although DBaaS offers many benefits it also introduces new threats and vulnerabilities. While many traditional data processing threats remain, DBaaS introduces new challenges such as confidentiality violation and information leakage in the presence of privileged malicious insiders and adds new dimension to the data security. We address the problem of building a secure DBaaS for a public cloud infrastructure where, the Cloud Service Provider (CSP) is not completely trusted by the data owner. We present a high level description of several architectures combining modern cryptographic primitives for achieving this goal. A novel searchable security scheme is proposed to leverage secure query processing in presence of a malicious cloud insider without disclosing sensitive information. A holistic database security scheme comprised of data confidentiality and information leakage prevention is proposed in this dissertation. The main contributions of our work are:(i) A searchable security scheme for non-relational databases of the cloud DBaaS; (ii) Leakage minimization in the untrusted cloud.The analysis of experiments that employ a set of established cryptographic techniques to protect databases and minimize information leakage, proves that the performance of the proposed solution is bounded by communication cost rather than by the cryptographic computational effort.
Show less - Date Issued
- 2017
- Identifier
- CFE0006848, ucf:51777
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0006848
- Title
- Video categorization using semantics and semiotics.
- Creator
-
Rasheed, Zeeshan, Shah, Mubarak, Engineering and Computer Science
- Abstract / Description
-
University of Central Florida College of Engineering Thesis; There is a great need to automatically segment, categorize, and annotate video data, and to develop efficient tools for browsing and searching. We believe that the categorization of videos can be achieved by exploring the concepts and meanings of the videos. This task requires bridging the gap between low-level content and high-level concepts (or semantics). Once a relationship is established between the low-level computable...
Show moreUniversity of Central Florida College of Engineering Thesis; There is a great need to automatically segment, categorize, and annotate video data, and to develop efficient tools for browsing and searching. We believe that the categorization of videos can be achieved by exploring the concepts and meanings of the videos. This task requires bridging the gap between low-level content and high-level concepts (or semantics). Once a relationship is established between the low-level computable features of the video and its semantics, .the user would be able to navigate through videos through the use of concepts and ideas (for example, a user could extract only those scenes in an action film that actually contain fights) rat her than sequentially browsing the whole video. However, this relationship must follow the norms of human perception and abide by the rules that are most often followed by the creators (directors) of these videos. These rules are called film grammar in video production literature. Like any natural language, this grammar has several dialects, but it has been acknowledged to be universal. Therefore, the knowledge of film grammar can be exploited effectively for the understanding of films. To interpret an idea using the grammar, we need to first understand the symbols, as in natural languages, and second, understand the rules of combination of these symbols to represent concepts. In order to develop algorithms that exploit this film grammar, it is necessary to relate the symbols of the grammar to computable video features.
Show less - Date Issued
- 2003
- Identifier
- CFR0001717, ucf:52920
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFR0001717
- Title
- MODELING AND DESIGN OF A PHOTONIC CRYSTAL CHIP HOSTING A QUANTUM NETWORK MADE OF SINGLE SPINS IN QUANTUM DOTS THAT INTERACT VIA SINGLE PHOTONS.
- Creator
-
Seigneur, Hubert, Schoenfeld, Winston, University of Central Florida
- Abstract / Description
-
In this dissertation, the prospect of a quantum technology based on a photonic crystal chip hosting a quantum network made of quantum dot spins interacting via single photons is investigated. The mathematical procedure to deal with the Liouville-Von Neumann equation, which describes the time-evolution of the density matrix, was derived for an arbitrary system, giving general equations. Using this theoretical groundwork, a numerical model was then developed to study the spatiotemporal dynamics...
Show moreIn this dissertation, the prospect of a quantum technology based on a photonic crystal chip hosting a quantum network made of quantum dot spins interacting via single photons is investigated. The mathematical procedure to deal with the Liouville-Von Neumann equation, which describes the time-evolution of the density matrix, was derived for an arbitrary system, giving general equations. Using this theoretical groundwork, a numerical model was then developed to study the spatiotemporal dynamics of entanglement between various qubits produced in a controlled way over the entire quantum network. As a result, an efficient quantum interface was engineered allowing for storage qubits and traveling qubits to exchange information coherently while demonstrating little error and loss in the process; such interface is indispensable for the realization of a functional quantum network. Furthermore, a carefully orchestrated dynamic control over the propagation of the flying qubit showed high-efficiency capability for on-chip single-photon transfer. Using the optimized dispersion properties obtained quantum mechanically as design parameters, a possible physical structure for the photonic crystal chip was constructed using the Plane Wave Expansion and Finite-Difference Time-Domain numerical techniques, exhibiting almost identical transfer efficiencies in terms of normalized energy densities of the classical electromagnetic field. These promising results bring us one step closer to the physical realization of an integrated quantum technology combining both semiconductor quantum dots and sub-wavelength photonic structures.
Show less - Date Issued
- 2010
- Identifier
- CFE0003433, ucf:48391
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0003433
- Title
- Investigating the relationships between preferences, gender, and high school students' geometry performance.
- Creator
-
Mainali, Bhesh, Haciomeroglu, Erhan, Dixon, Juli, Andreasen, Janet, Bai, Haiyan, University of Central Florida
- Abstract / Description
-
In this quantitative study, the relationships between high school students' preference for solution methods, geometry performance, task difficulty, and gender were investigated. The data was collected from 161 high school students from six different schools at a county located in central Florida in the United States. The study was conducted during the 2013(-)2014 school year. The participants represented a wide range in socioeconomic status, were from a range of grades (10-12), and were...
Show moreIn this quantitative study, the relationships between high school students' preference for solution methods, geometry performance, task difficulty, and gender were investigated. The data was collected from 161 high school students from six different schools at a county located in central Florida in the United States. The study was conducted during the 2013(-)2014 school year. The participants represented a wide range in socioeconomic status, were from a range of grades (10-12), and were enrolled in different mathematics courses (Algebra 2, Geometry, Financial Algebra, and Pre-calculus). Data were collected primarily with the aid of a geometry test and a geometry questionnaire. Using a think-aloud protocol, a short interview was also conducted with some students.For the purpose of statistical analysis, students' preferences for solution methods were quantified into numeric values, and then a visuality score was obtained for each student. Students' visuality scores ranged from -12 to +12. The visuality scores were used to assess students' preference for solution methods. A standardized test score was used to measure students' geometry performance. The data analysis indicated that the majority of students were visualizers. The statistical analysis revealed that there was not an association between preference for solution methods and students' geometry performance. The preference for solving geometry problems using either visual or nonvisual methods was not influenced by task difficulty. Students were equally likely to employ visual as well as nonvisual solution methods regardless of the task difficulty. Gender was significant in geometry performance but not in preference for solution methods. Female students' geometry performance was significantly higher than male students' geometry performance. The findings of this study suggested that instruction should be focused on incorporating both visual and nonvisual teaching strategies in mathematics lesson activities in order to develop preference for both visual and nonvisual solution methods.
Show less - Date Issued
- 2014
- Identifier
- CFE0005374, ucf:50448
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005374
- Title
- Facilitating Information Retrieval in Social Media User Interfaces.
- Creator
-
Costello, Anthony, Tang, Yubo, Fiore, Stephen, Goldiez, Brian, University of Central Florida
- Abstract / Description
-
As the amount of computer mediated information (e.g., emails, documents, multi-media) we need to process grows, our need to rapidly sort, organize and store electronic information likewise increases. In order to store information effectively, we must find ways to sort through it and organize it in a manner that facilitates efficient retrieval. The instantaneous and emergent nature of communications across networks like Twitter makes them suitable for discussing events (e.g., natural disasters...
Show moreAs the amount of computer mediated information (e.g., emails, documents, multi-media) we need to process grows, our need to rapidly sort, organize and store electronic information likewise increases. In order to store information effectively, we must find ways to sort through it and organize it in a manner that facilitates efficient retrieval. The instantaneous and emergent nature of communications across networks like Twitter makes them suitable for discussing events (e.g., natural disasters) that are amorphous and prone to rapid changes. It can be difficult for an individual human to filter through and organize the large amounts of information that can pass through these types of social networks when events are unfolding rapidly. A common feature of social networks is the images (e.g., human faces, inanimate objects) that are often used by those who send messages across these networks. Humans have a particularly strong ability to recognize and differentiate between human Faces. This effect may also extend to recalling information associated with each human Face. This study investigated the difference between human Face images, non-human Face images and alphanumeric labels as retrieval cues under different levels of Task Load. Participants were required to recall key pieces of event information as they emerged from a Twitter-style message feed during a simulated natural disaster. A counter-balanced within-subjects design was used for this experiment. Participants were exposed to low, medium and high Task Load while responding to five different types of recall cues: (1) Nickname, (2) Non-Face, (3) Non-Face (&) Nickname, (4) Face and (5) Face (&) Nickname. The task required participants to organize information regarding emergencies (e.g., car accidents) from a Twitter-style message feed. The messages reported various events such as fires occurring around a fictional city. Each message was associated with a different recall cue type, depending on the experimental condition. Following the task, participants were asked to recall the information associated with one of the cues they worked with during the task. Results indicate that under medium and high Task Load, both Non-Face and Face retrieval cues increased recall performance over Nickname alone with Non-Faces resulting in the highest mean recall scores. When comparing medium to high Task Load: Face (&) Nickname and Non-Face significantly outperformed the Face condition. The performance in Non-Face (&) Nickname was significantly better than Face (&) Nickname. No significant difference was found between Non-Faces and Non-Faces (&) Nickname. Subjective Task Load scores indicate that participants experienced lower mental workload when using Non-Face cues than using Nickname or Face cues. Generally, these results indicate that under medium and high Task Load levels, images outperformed alphanumeric nicknames, Non-Face images outperformed Face images, and combining alphanumeric nicknames with images may have offered a significant performance advantage only when the image is that of a Face. Both theoretical and practical design implications are provided from these findings.
Show less - Date Issued
- 2014
- Identifier
- CFE0005318, ucf:50524
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005318
- Title
- Exploring Techniques for Providing Privacy in Location-Based Services Nearest Neighbor Query.
- Creator
-
Asanya, John-Charles, Guha, Ratan, Turgut, Damla, Bassiouni, Mostafa, Zou, Changchun, Mohapatra, Ram, University of Central Florida
- Abstract / Description
-
Increasing numbers of people are subscribing to location-based services, but as the popularity grows so are the privacy concerns. Varieties of research exist to address these privacy concerns. Each technique tries to address different models with which location-based services respond to subscribers. In this work, we present ideas to address privacy concerns for the two main models namely: the snapshot nearest neighbor query model and the continuous nearest neighbor query model. First, we...
Show moreIncreasing numbers of people are subscribing to location-based services, but as the popularity grows so are the privacy concerns. Varieties of research exist to address these privacy concerns. Each technique tries to address different models with which location-based services respond to subscribers. In this work, we present ideas to address privacy concerns for the two main models namely: the snapshot nearest neighbor query model and the continuous nearest neighbor query model. First, we address snapshot nearest neighbor query model where location-based services response represents a snapshot of point in time. In this model, we introduce a novel idea based on the concept of an open set in a topological space where points belongs to a subset called neighborhood of a point. We extend this concept to provide anonymity to real objects where each object belongs to a disjointed neighborhood such that each neighborhood contains a single object. To help identify the objects, we implement a database which dynamically scales in direct proportion with the size of the neighborhood. To retrieve information secretly and allow the database to expose only requested information, private information retrieval protocols are executed twice on the data. Our study of the implementation shows that the concept of a single object neighborhood is able to efficiently scale the database with the objects in the area.The size of the database grows with the size of the grid and the objects covered by the location-based services. Typically, creating neighborhoods, computing distances between objects in the area, and running private information retrieval protocols causes the CPU to respond slowly with this increase in database size. In order to handle a large number of objects, we explore the concept of kernel and parallel computing in GPU. We develop GPU parallel implementation of the snapshot query to handle large number of objects. In our experiment, we exploit parameter tuning. The results show that with parameter tuning and parallel computing power of GPU we are able to significantly reduce the response time as the number of objects increases. To determine response time of an application without knowledge of the intricacies of GPU architecture, we extend our analysis to predict GPU execution time. We develop the run time equation for an operation and extrapolate the run time for a problem set based on the equation, and then we provide a model to predict GPU response time.As an alternative, the snapshot nearest neighbor query privacy problem can be addressed using secure hardware computing which can eliminate the need for protecting the rest of the sub-system, minimize resource usage and network transmission time. In this approach, a secure coprocessor is used to provide privacy. We process all information inside the coprocessor to deny adversaries access to any private information. To obfuscate access pattern to external memory location, we use oblivious random access memory methodology to access the server. Experimental evaluation shows that using a secure coprocessor reduces resource usage and query response time as the size of the coverage area and objects increases.Second, we address privacy concerns in the continuous nearest neighbor query model where location-based services automatically respond to a change in object's location. In this model, we present solutions for two different types known as moving query static object and moving query moving object. For the solutions, we propose plane partition using a Voronoi diagram, and a continuous fractal space filling curve using a Hilbert curve order to create a continuous nearest neighbor relationship between the points of interest in a path. Specifically, space filling curve results in multi-dimensional to 1-dimensional object mapping where values are assigned to the objects based on proximity. To prevent subscribers from issuing a query each time there is a change in location and to reduce the response time, we introduce the concept of transition and update time to indicate where and when the nearest neighbor changes. We also introduce a database that dynamically scales with the size of the objects in a path to help obscure and relate objects. By executing the private information retrieval protocol twice on the data, the user secretly retrieves requested information from the database. The results of our experiment show that using plane partitioning and a fractal space filling curve to create nearest neighbor relationships with transition time between objects reduces the total response time.
Show less - Date Issued
- 2015
- Identifier
- CFE0005757, ucf:50098
- Format
- Document (PDF)
- PURL
- http://purl.flvc.org/ucf/fd/CFE0005757