You limited your search to:

  Partner: UNT Libraries
 Department: School of Library and Information Sciences
Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Solutions for Dynamic Channel Assignment and Synchronization Problem for Distributed Wireless Multimedia System

Date: August 2002
Creator: Hong, SungBum
Description: The recent advances in mobile computing and distributed multimedia systems allow mobile hosts (clients) to access wireless multimedia Data at anywhere and at anytime. In accessing multimedia information on the distributed multimedia servers from wireless personal communication service systems, a channel assignment problem and synchronization problems should be solved efficiently. Recent demand for mobile telephone service have been growing rapidly while the electro-magnetic spectrum of frequencies allocated for this purpose remain limited. Any solution to the channel assignment problem is subject to this limitation, as well as the interference constraint between adjacent channels in the spectrum. Channel allocation schemes provide a flexible and efficient access to bandwidth in wireless and mobile communication systems. In this dissertation, both an efficient distributed algorithm for dynamic channel allocation based upon mutual exclusion model, and an efficient distributed synchronization algorithm using Quasi-sink for wireless and mobile multimedia systems to ensure and facilitate mobile client access to multimedia objects are proposed. Algorithm's performance with several channel systems using different types of call arrival patterns is determined analytically. A set of simulation experiments to evaluate the performance of our scheme using message complexity and buffer usage at each frame arrival time.
Contributing Partner: UNT Libraries
The gathering and use of information by fifth grade students with access to Palm® handhelds.

The gathering and use of information by fifth grade students with access to Palm® handhelds.

Date: December 2003
Creator: Peet, Martha Stuart Williamson
Description: Handheld computers may hold the possibility for a one-to-one computer: student ratio. The impact of the use of Palm® (Palm, Inc.) handhelds on information acquisition and use by 5th grade students in a North Texas school during a class research project was investigated. Five research questions were examined using observation, interviews, surveys, and document analysis. Are there differences in information gathering and use with the Palm between gifted, dyslexic, and regular learners? What relevance criteria do students use to evaluate a web site to determine whether to download the site to the Palm and afterwards whether to use the downloaded site's information in the report? How do the Palms affect the writing process? Do the animations and concept maps produced on the Palm demonstrate understanding of the intended concepts? Are there significant differences in results (i.e., final products grade) between Palm users and non-Palm users? Three groups of learners in the class, gifted, dyslexic, and regular learners, participated in the study. The regular and dyslexic students reported using Web sites that had not been downloaded to the Palm. Students reported several factors used to decide whether to download Web sites, but the predominant deciding factor was the amount of information. ...
Contributing Partner: UNT Libraries
Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment.

Date: August 2005
Creator: Ozeren, Suleyman
Description: Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation at the national and international level represents real obstacle toward effective response to these threats. In sum, lack of global consensus in terms of responding to cyberterrorism and cybercrime is the general problem. Terrorists and cyber criminals will exploit vulnerabilities, including technical, legal, political, and cultural. Such a broad range of vulnerabilities can be dealt with by comprehensive cooperation which requires efforts both at the national and international level. "Vulnerability-Comprehensive Cooperation-Freedom Scale" or "Ozeren Scale" identified variables that constructed the scale based on the expert opinions. Also, the study presented typology of cyberterrorism, which involves three general classifications of cyberterrorism; Disruptive and destructive information attacks, Facilitation of technology to support the ideology, and Communication, Fund raising, Recruitment, Propaganda (C-F-R-P). Such a typology is expected to help those who are in a position of decision-making and investigating activities as well as academicians in the area of ...
Contributing Partner: UNT Libraries
Information Needs of Art Museum Visitors: Real and Virtual

Information Needs of Art Museum Visitors: Real and Virtual

Date: December 2004
Creator: Kravchyna, Victoria
Description: Museums and libraries are considered large repositories of human knowledge and human culture. They have similar missions and goals in distributing accumulated knowledge to society. Current digitization projects allow both, museums and libraries to reach a broader audience, share their resources with a variety of users. While studies of information seeking behavior, retrieval systems and metadata in library science have a long history; such research studies in museum environments are at their early experimental stage. There are few studies concerning information seeking behavior and needs of virtual museum visitors, especially with the use of images in the museums' collections available on the Web. The current study identifies preferences of a variety of user groups about the information specifics on current exhibits, museum collections metadata information, and the use of multimedia. The study of information seeking behavior of users groups of museum digital collections or cultural collections allows examination and analysis of users' information needs, and the organization of cultural information, including descriptive metadata and the quantity of information that may be required. In addition, the study delineates information needs that different categories of users may have in common: teachers in high schools, students in colleges and universities, museum professionals, art ...
Contributing Partner: UNT Libraries
Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function.

Information systems assessment: development of a comprehensive framework and contingency theory to assess the effectiveness of the information systems function.

Date: August 2003
Creator: Myers, Barry L.
Description: The purpose of this research is to develop a comprehensive, IS assessment framework using existing IS assessment theory as a base and incorporating suggestions from other disciplines. To validate the framework and to begin the investigation of current IS assessment practice, a survey instrument was developed. A small group of subject matter experts evaluated and improved the instrument. The instrument was further evaluated using a small sample of IS representatives. Results of this research include a reexamination of the IS function measurement problem using new frameworks of analyses yielding (a) guidance for the IS manager or executive on which IS measures might best fit their organization, (b) a further verification of the important measures most widely used by IS executives, (c) a comprehensive, theoretically-derived, IS assessment framework, and by (d) the enhancement of IS assessment theory by incorporating ideas from actual practice. The body of knowledge gains a comprehensive, IS assessment framework that can be further tested for usefulness and applicability. Future research is recommended to substantiate and improve on these findings. Chapter 2 is a complete survey of prior research, subdivided by relevant literature divisions, such as organizational effectiveness, quality management, and IS assessment. Chapter 3 includes development of ...
Contributing Partner: UNT Libraries
E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

E-Learning and In-Service Training: An Exploration of the Beliefs and Practices of Trainers and Trainees in the Turkish National Police

Date: August 2007
Creator: Zengin, Selcuk
Description: This targeted research study, carried out by an officer of the Turkish National Police (TNP), investigated the perceptions and beliefs of TNP trainers and trainees towards the potential adoption and implementation of e-learning technology for in-service police training. Utilizing diffusion and innovation theory (DOI) (Rogers, 1995) and the conceptual technology integration process model (CTIM) (Nicolle, 2005), two different surveys were administered; one to the trainers and one to the trainees. The factor analyses revealed three shared trainer and trainee perceptions: A positive perception towards e-learning, personally and for the TNP; a belief in the importance of administrative support for e-learning integration; and the belief in importance of appropriate resources to facilitate integration and maintain implementation. Three major recommendations were made for the TNP. First, the research findings could be used as a road map by the TNP Education Department to provide a more flexible system to disseminate in-service training information. The second is to establish two-way channels of communication between the administration and the TNP personnel to efficiently operationalize the adoption and integration of e-learning technology. The third is the administrative provision of necessary hardware, software, and technical support.
Contributing Partner: UNT Libraries
Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Intangible Qualities of Rare Books: Toward a Decision-Making Framework for Preservation Management in Rare Book Collections, Based Upon the Concept of the Book as Object

Date: May 2006
Creator: Sheehan, Jennifer Karr
Description: For rare book collections, a considerable challenge is involved in evaluating collection materials in terms of their inherent value, which includes the textual and intangible information the materials provide for the collection's users. Preservation management in rare book collections is a complex and costly process. As digitization and other technological advances in surrogate technology have provided new forms representation, new dilemmas in weighing the rare book's inherently valuable characteristics against the possibly lesser financial costs of surrogates have arisen. No model has been in wide use to guide preservation management decisions. An initial iteration of such a model is developed, based on a Delphi-like iterative questioning of a group of experts in the field of rare books. The results are used to synthesize a preservation management framework for rare book collections, and a small-scale test of the framework has been completed through two independent analyses of five rare books in a functioning collection. Utilizing a standardized template for making preservation decisions offers a variety of benefits. Preservation decisions may include prioritizing action upon the authentic objects, or developing and maintaining surrogates in lieu of retaining costly original collection materials. The framework constructed in this study provides a method for reducing ...
Contributing Partner: UNT Libraries
Makeshift Information Constructions: Information Flow and Undercover Police

Makeshift Information Constructions: Information Flow and Undercover Police

Date: August 2005
Creator: Aksakal, Baris
Description: This dissertation presents the social virtual interface (SVI) model, which was born out of a need to develop a viable model of the complex interactions, information flow and information seeking behaviors among undercover officers. The SVI model was created from a combination of various philosophies and models in the literature of information seeking, communication and philosophy. The questions this research paper answers are as follows: 1. Can we make use of models and concepts familiar to or drawn from Information Science to construct a model of undercover police work that effectively represents the large number of entities and relationships? and 2. Will undercover police officers recognize this model as realistic? This study used a descriptive qualitative research method to examine the research questions. An online survey and hard copy survey were distributed to police officers who had worked in an undercover capacity. In addition groups of officers were interviewed about their opinion of the SVI model. The data gathered was analyzed and the model was validated by the results of the survey and interviews.
Contributing Partner: UNT Libraries
Assessment of a Library Learning Theory by Measuring Library Skills of Students Completing an Online Library Instruction Tutorial

Assessment of a Library Learning Theory by Measuring Library Skills of Students Completing an Online Library Instruction Tutorial

Date: May 2007
Creator: Watson, Dana L.
Description: This study is designed to reveal whether students acquire the domains and levels of library skills discussed in a learning library skills theory after participating in an online library instruction tutorial. The acquisition of the library skills is demonstrated through a review of the scores on online tutorial quizzes, responses to a library skills questionnaire, and bibliographies of course research papers. Additional areas to be studied are the characteristics of the participants enrolled in traditional and online courses at a community college and the possible influence of these characteristics on the demonstrated learning of library skills. Multiple measurement methods, identified through assessment of library instruction literature, are used to verify the effectiveness of the library skills theory and to strengthen the validity and reliability of the study results.
Contributing Partner: UNT Libraries
CT3 as an Index of Knowledge Domain Structure: Distributions for Order Analysis and Information Hierarchies

CT3 as an Index of Knowledge Domain Structure: Distributions for Order Analysis and Information Hierarchies

Date: December 2002
Creator: Swartz Horn, Rebecca
Description: The problem with which this study is concerned is articulating all possible CT3 and KR21 reliability measures for every case of a 5x5 binary matrix (32,996,500 possible matrices). The study has three purposes. The first purpose is to calculate CT3 for every matrix and compare the results to the proposed optimum range of .3 to .5. The second purpose is to compare the results from the calculation of KR21 and CT3 reliability measures. The third purpose is to calculate CT3 and KR21 on every strand of a class test whose item set has been reduced using the difficulty strata identified by Order Analysis. The study was conducted by writing a computer program to articulate all possible 5 x 5 matrices. The program also calculated CT3 and KR21 reliability measures for each matrix. The nonparametric technique of Order Analysis was applied to two sections of test items to stratify the items into difficulty levels. The difficulty levels were used to reduce the item set from 22 to 9 items. All possible strands or chains of these items were identified so that both reliability measures (CT3 and KR21) could be calculated. One major finding of this study indicates that .3 to .5 ...
Contributing Partner: UNT Libraries