This study examined a web-based undergraduate course structured around social learning theories through the lens of social construction as a theoretical framework and a case study research method. The purpose of the study was to investigate students' learning experiences from a cognitively guided research framework. Instructional strategies practiced in the...
The scarcity of wireless spectrum resources and the overwhelming demand for wireless broadband resources have prompted industry, government agencies and academia within the wireless communities to develop and come up with effective solutions that can make additional spectrum available for broadband data. As part of these ongoing efforts, cognitive radio...
Apple launched their first “tap-and-pay” mobile payment solution called “ApplePay” in October 2014 in the United States. Quickly catching up with the popularity of Apple Pay, Google launched their own mobile “tap-and-pay” paymentsolution called “Android Pay”. Both the companies claim that their tap-and-paysolutions are more convenient and more secure than...
The ability to create reproducible cryptographically secure keys from temporal environments (e.g., images) has the potential to be a contributor to effective cryptographic mechanisms. Due to the noisy nature of these environments, achieving this goal in a user friendly fashion is a very challenging task, especially since there exists a...
In this thesis, we present semantic equivalence rules for an extension of the choice calculus and sound operations for an implementation of variational lists. The choice calculus is a calculus for describing variation and the formula choice calculus is an extension with formulas. We prove semantic equivalence rules for the...
The search for the stand density that optimizes growth and hence generates the maximum amount of wood is one of the philosopher’s stone in modern forestry. Since scientific methods were applied to forestry, numerous generations of foresters have studied the relations between stocking density and growth, obtaining diverse results and...
In this paper, we propose a credit-based resource allocation technique for dynamic spectrum access (DSA) systems that is robust against malicious and selfi sh behaviors and ensures good overall system fairness performance while also allowing spectrum users to achieve high amounts of service. We also propose a new objective function...
Linear wireless sensor networks (LWSN) are special class of wireless sensor networks where sensor nodes are deployed in a straight line. Monitoring industrial pipelines, railroads, tunnels, power lines, and borders are applications of LWSNs. Wireless sensors are tiny devices with limited energy resources; therefore, efficient energy routing in LWSNs is...
Free / Open Source Software developers come from a myriad of different backgrounds. While some contribute for personal reasons, many become involved because they receive compensation from corporations or foundations. The motivation for participating in a project can have dramatic impacts on how and what contribution an individual makes. These...
Physical-Layer Network Coding (PNC) is a promising technique that has great potentials for improving the achievable data rates of end-to-end flows through higher packet transmission rates, thereby increasing the overall network throughput. In this thesis, we study the performance of the PNC transmission techniques for unidirectional end-to-end flows in multi-hop...