6 resultados para incentive scheme

em Digital Commons at Florida International University


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this inquiry was to investigate the perceptions of former service personnel, students and their parents about the organizational effectiveness of the Ghana National Service Scheme (GNSS). The inquiry addressed the following questions: How do the participants perceive the effectiveness of the national service program on the Ghanaian society? What are the perceptions of school administrators who worked with service personnel, parents and students vis-à-vis the over all impact of the GNSS on the educational system? What are the perceptions of former service personnel, students and their parents in regard to the impact of the GNSS on them? ^ The GNSS is a part within the ministry of education, which is also part in the Ghanaian social structure. Hence, a systems theory approach which asks, “How and why a system as a whole functions as it does” (Patton, 1990), was utilized in the study. Methodologies included purposive sampling; interviews; participant observation, and follow-up interviews. The study was conducted over a six-moth period. ^ A cross-sectional survey design was used to generate data. The survey was followed up with an ethnographic study where in-depth, face-to-face interviews were conducted together with observations. The results were described and interpreted. ^ The summary of findings concludes that perceptional determinants of the effectiveness of the GNSS were biased by the age and zone of origin but not gender. This partially agrees with Marenin's (1990) except for gender. A significant difference was detected between the responses of those who were officials of the National service Secretariat and of former service personnel. The administrators defended the status quo and demonstrated their deeper knowledge about the scheme. The former personnel and parents freely criticized the program when necessary and did not seem to know much about the GNSS. Respondents mostly stressed the need for the secretariat to focus on the following areas: (1) involvement in the agricultural sector of the economy, (2) involvement in rural mass, civic and health education, (3) adequacy of remuneration and personnel welfare, and (4) ensuring posting of personnel to areas of their expertise. Recommendation for further research concluded the study. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The purpose of this study was to design a preventive scheme using directional antennas to improve the performance of mobile ad hoc networks. In this dissertation, a novel Directionality based Preventive Link Maintenance (DPLM) Scheme is proposed to characterize the performance gain [JaY06a, JaY06b, JCY06] by extending the life of link. In order to maintain the link and take preventive action, signal strength of data packets is measured. Moreover, location information or angle of arrival information is collected during communication and saved in the table. When measured signal strength is below orientation threshold , an orientation warning is generated towards the previous hop node. Once orientation warning is received by previous hop (adjacent) node, it verifies the correctness of orientation warning with few hello pings and initiates high quality directional link (a link above the threshold) and immediately switches to it, avoiding a link break altogether. The location information is utilized to create a directional link by orienting neighboring nodes antennas towards each other. We call this operation an orientation handoff, which is similar to soft-handoff in cellular networks. ^ Signal strength is the indicating factor, which represents the health of the link and helps to predict the link failure. In other words, link breakage happens due to node movement and subsequently reducing signal strength of receiving packets. DPLM scheme helps ad hoc networks to avoid or postpone costly operation of route rediscovery in on-demand routing protocols by taking above-mentioned preventive action. ^ This dissertation advocates close but simple collaboration between the routing, medium access control and physical layers. In order to extend the link, the Dynamic Source Routing (DSR) and IEEE 802.11 MAC protocols were modified to use the ability of directional antennas to transmit over longer distance. A directional antenna module is implemented in OPNET simulator with two separate modes of operations: omnidirectional and directional. The antenna module has been incorporated in wireless node model and simulations are performed to characterize the performance improvement of mobile ad hoc networks. Extensive simulations have shown that without affecting the behavior of the routing protocol noticeably, aggregate throughput, packet delivery ratio, end-to-end delay (latency), routing overhead, number of data packets dropped, and number of path breaks are improved considerably. We have done the analysis of the results in different scenarios to evaluate that the use of directional antennas with proposed DPLM scheme has been found promising to improve the performance of mobile ad hoc networks. ^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the advantages and popularity of Permanent Magnet (PM) motors due to their high power density, there is an increasing incentive to use them in variety of applications including electric actuation. These applications have strict noise emission standards. The generation of audible noise and associated vibration modes are characteristics of all electric motors, it is especially problematic in low speed sensorless control rotary actuation applications using high frequency voltage injection technique. This dissertation is aimed at solving the problem of optimizing the sensorless control algorithm for low noise and vibration while achieving at least 12 bit absolute accuracy for speed and position control. The low speed sensorless algorithm is simulated using an improved Phase Variable Model, developed and implemented in a hardware-in-the-loop prototyping environment. Two experimental testbeds were developed and built to test and verify the algorithm in real time.^ A neural network based modeling approach was used to predict the audible noise due to the high frequency injected carrier signal. This model was created based on noise measurements in an especially built chamber. The developed noise model is then integrated into the high frequency based sensorless control scheme so that appropriate tradeoffs and mitigation techniques can be devised. This will improve the position estimation and control performance while keeping the noise below a certain level. Genetic algorithms were used for including the noise optimization parameters into the developed control algorithm.^ A novel wavelet based filtering approach was proposed in this dissertation for the sensorless control algorithm at low speed. This novel filter was capable of extracting the position information at low values of injection voltage where conventional filters fail. This filtering approach can be used in practice to reduce the injected voltage in sensorless control algorithm resulting in significant reduction of noise and vibration.^ Online optimization of sensorless position estimation algorithm was performed to reduce vibration and to improve the position estimation performance. The results obtained are important and represent original contributions that can be helpful in choosing optimal parameters for sensorless control algorithm in many practical applications.^

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In her piece entitled - Current Status Of Collectability Of Gaming-Related Credit Dollars - Ruth Lisa Wenof, Graduate Student at Florida International University initially states: “Credit is an important part of incentives used to lure gamblers to gaming establishments. However, a collection problem exists in casinos retrieving gaming-related credit losses of individuals living in states where gambling is illegal. The author discusses the history of this question, citing recent cases related to Atlantic City.” This author’s article is substantially laden with legal cases associated with casinos in New Jersey; Atlantic City to be exact. The piece is specific to the segment of the gaming industry that the title suggests, and as such is written in a decidedly technical style. “Legalized casino gaming, which was approved by the citizens of New Jersey on November 8, 1976, has been used as a unique tool of urban redevelopment for Atlantic City,” Wenof says in providing some background on this ‘Jersey shore municipality. “Since Resorts International opened its casino…revenues from gambling have increased rapidly. Resorts' gross win in 1978 was $134 million,” Wenof says. “Since then, the combined gross win of the city's 11 casinos has been just shy of $7.5 billion.” The author points out that the competition for casino business is fierce and that credit dollars play an integral role in soliciting such business. “Credit plays a most important part in every casino hotel. This type of gambler is given every incentive to come to a particular hotel,” says the author. “Airplanes, limousines, suites, free meals, and beverages all become a package for the person who can sign a marker. The credit department of a casino is similar to that of a bank. A banker who loans money knows that it must be paid back or his bank will fail. This is indeed true of a casino,” Wenof warns in outlining the potential problem that this article is fundamentally designed around. In providing further background on credit essentials and possible pitfalls, Wenof affords: “…on the Casino Control Act the State Commission of Investigation recommended to the legislature that casinos should not be allowed to extend credit at all, by reason of a concern for illicit diversion of revenues, which is popularly called skimming within the industry…” Although skimming is an after-the-fact problem, and is parenthetic to loan returns, it is an important element of the collective [sic] credit scheme. “A collection problem of prime importance is if a casino can get back gaming-related credit dollars advanced by the casino to a gambler who lives in a state where gambling is illegal,” is a central factor to consider, Wenof reveals. This is a primary focus of this article. Wenof touches on the social/societal implications of gambling, and then continues the discussion by citing a host of legal cases pertaining to debt collection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer networks produce tremendous amounts of event-based data that can be collected and managed to support an increasing number of new classes of pervasive applications. Examples of such applications are network monitoring and crisis management. Although the problem of distributed event-based management has been addressed in the non-pervasive settings such as the Internet, the domain of pervasive networks has its own characteristics that make these results non-applicable. Many of these applications are based on time-series data that possess the form of time-ordered series of events. Such applications also embody the need to handle large volumes of unexpected events, often modified on-the-fly, containing conflicting information, and dealing with rapidly changing contexts while producing results with low-latency. Correlating events across contextual dimensions holds the key to expanding the capabilities and improving the performance of these applications. This dissertation addresses this critical challenge. It establishes an effective scheme for complex-event semantic correlation. The scheme examines epistemic uncertainty in computer networks by fusing event synchronization concepts with belief theory. Because of the distributed nature of the event detection, time-delays are considered. Events are no longer instantaneous, but duration is associated with them. Existing algorithms for synchronizing time are split into two classes, one of which is asserted to provide a faster means for converging time and hence better suited for pervasive network management. Besides the temporal dimension, the scheme considers imprecision and uncertainty when an event is detected. A belief value is therefore associated with the semantics and the detection of composite events. This belief value is generated by a consensus among participating entities in a computer network. The scheme taps into in-network processing capabilities of pervasive computer networks and can withstand missing or conflicting information gathered from multiple participating entities. Thus, this dissertation advances knowledge in the field of network management by facilitating the full utilization of characteristics offered by pervasive, distributed and wireless technologies in contemporary and future computer networks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Computer networks produce tremendous amounts of event-based data that can be collected and managed to support an increasing number of new classes of pervasive applications. Examples of such applications are network monitoring and crisis management. Although the problem of distributed event-based management has been addressed in the non-pervasive settings such as the Internet, the domain of pervasive networks has its own characteristics that make these results non-applicable. Many of these applications are based on time-series data that possess the form of time-ordered series of events. Such applications also embody the need to handle large volumes of unexpected events, often modified on-the-fly, containing conflicting information, and dealing with rapidly changing contexts while producing results with low-latency. Correlating events across contextual dimensions holds the key to expanding the capabilities and improving the performance of these applications. This dissertation addresses this critical challenge. It establishes an effective scheme for complex-event semantic correlation. The scheme examines epistemic uncertainty in computer networks by fusing event synchronization concepts with belief theory. Because of the distributed nature of the event detection, time-delays are considered. Events are no longer instantaneous, but duration is associated with them. Existing algorithms for synchronizing time are split into two classes, one of which is asserted to provide a faster means for converging time and hence better suited for pervasive network management. Besides the temporal dimension, the scheme considers imprecision and uncertainty when an event is detected. A belief value is therefore associated with the semantics and the detection of composite events. This belief value is generated by a consensus among participating entities in a computer network. The scheme taps into in-network processing capabilities of pervasive computer networks and can withstand missing or conflicting information gathered from multiple participating entities. Thus, this dissertation advances knowledge in the field of network management by facilitating the full utilization of characteristics offered by pervasive, distributed and wireless technologies in contemporary and future computer networks.