scispace - formally typeset
Search or ask a question

Showing papers by "Florida Polytechnic University published in 2008"


Journal ArticleDOI
TL;DR: In this article, the authors examined the relationship between the force levels applied by police officers and the characteristics of the neighbourhoods where these events occurred, including race/ethnicity, family composition, residential turnover, crime levels, and neighbourhood levels of active physical resistance.
Abstract: This study examines relationships between the force levels applied by police officers and the characteristics of the neighbourhoods where these events occurred. The data upon which this study is based was drawn from a municipal police department in the southern USA for the year 2000. Information from the official Use of Force reports was linked to census block data and crime tract data, thus providing an opportunity to investigate whether severity of force varies with neighbourhood demographic characteristics. These characteristics include race/ethnicity, family composition, residential turnover, crime levels, and neighbourhood levels of active physical resistance. When controlling for the number of incidents of active physical resistance that occurred in a neighbourhood, only this variable and the racial composition of the neighbourhood remained consistent significant predictors of police use of force.

63 citations


Journal ArticleDOI
TL;DR: Self-regulated reading training is put forth as a partial remedy, and implementation of the most popular of these methods—SQ3R—is explained.
Abstract: For courses in a marketing curriculum to be effective where traditional textbook-based teaching methods are used, students must have sufficient ability to comprehend assigned reading materials. In addition, marketing graduates will have to read proficiently to meet the expectations of employers and to satisfy their own need to be highly competent self-directed learners. Self-regulated reading training is put forth as a partial remedy, and implementation of the most popular of these methods—SQ3R—is explained.

38 citations


Journal ArticleDOI
TL;DR: This model has particular utility, because it can begin to define the elements of risk and vulnerability that may be addressed using preventative measures as opposed to solely addressing intervention, which is often the case when addressing elder mistreatment and self‐neglect.
Abstract: This article presents a theoretical framework for the study of social and behavioral factors associated with elder self-neglect. The model presented reflects the authors' beliefs that a risk-vulnerability model offers a useful framework from which to study all forms of elder mistreatment, as well as elder self-neglect. This model has particular utility, because it can begin to define the elements of risk and vulnerability that may be addressed using preventative measures as opposed to solely addressing intervention, which is often the case when addressing elder mistreatment and self-neglect. The authors then address a method for using the Consortium for Research in Elder Self-neglect of Texas data as currently constructed and adding to that database to effectively study risks and vulnerabilities in the elder self-neglect population. These additional data would greatly expand the scope of the study. The discussant adds his perspective to the ideas proposed by the authors.

27 citations


Journal ArticleDOI
TL;DR: In this paper, the authors examined the factors that influence the perceptions of consumers engaged in the consumption of news online and found that the importance of several credibility measures, particularly those related to site design, are significantly related to attitude toward the site.
Abstract: The study examines the factors that influence the perceptions of consumers engaged in the consumption of news online. Measures of online communications effectiveness in the business sector are applied to the online news environment. Consumer reactions to two major cable news Web sites provide insight into the relationship between Web site credibility and attitude toward the site. The study points to the importance of several credibility measures (particularly those related to site design) that are significantly related to attitude toward the site. Conclusions related to media and consumption of online news are provided.

15 citations


Proceedings ArticleDOI
08 Dec 2008
TL;DR: A 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs is proposed, which is more capable in meeting the needs of QoS-sensitive applications.
Abstract: In 802.11-based wireless networks the stations (STAs) are associated with the available access points (APs) and communicate through them. In traditional handoff schemes the STAs get information about the active APs in their neighborhood by scanning the available channels and listen to transmitted beacons. This paper proposes a 802.11k compliant framework for cooperative handoff where the STAs are informed about the active APs by exchanging information with neighboring STAs. In this way we minimize the delay of the scanning procedure. We evaluate the performance of our mechanisms through simulations and we show that when our cooperative framework is applied the network performance is significantly improved. Consequently, our system is more capable in meeting the needs of QoS-sensitive applications.

8 citations


Proceedings ArticleDOI
08 Jul 2008
TL;DR: Transformation techniques on the GFA algorithm are applied to derive and implement an optimal 2D architecture based on specific performance parameters that can match 1,536 to 11,627,906 quadrants per second depending on the size of the matched quadrant.
Abstract: As new emerging multimedia applications demand constant bit rate improvements, it is becoming clear that H.264/AVC technology will not be able to meet these demands in spite of the 40-50% gain in bitrate over H.26X. Recently, a novel video coding scheme based on the generalized finite automata (GFA) modeling of video sequences in the bitplane wavelet domain has been proposed to address this problem. Unfortunately, this scheme requires a computing workload that is difficult to support with software implementations capable of meeting the performance requirements of target applications. This paper applies transformation techniques on the GFA algorithm to map it to high performance architectures. These techniques are used to derive and implement an optimal 2D architecture based on specific performance parameters. Implementation experiments show that a single row of this architecture can match 1,536 to 11,627,906 quadrants per second depending on the size of the matched quadrant.

1 citations


Proceedings ArticleDOI
15 May 2008
TL;DR: This paper proves that SQUID, with a time complexity of O(log N), can achieve 100% throughput without any speedup, and presents a novel queuing model that models crosspoint buffered switches under uniform traffic.
Abstract: Crosspoint buffered switches are emerging as the focus of research in high-speed routers. They have simpler scheduling algorithms, and achieve better performance than a bufferless crossbar switch. Crosspoint buffered switches have a buffer at each crosspoint. A cell is first delivered to a crosspoint buffer, and then transferred to the output port. With a speedup of two, a crosspoint buffered switch has previously been proved to provide 100% throughput. In this paper, we propose a 100% throughput scheduling algorithm without speedup, called SQUID. With this design, each input/output keeps track of the previously served virtual output queues (VOQs)/crosspoint buffers. We prove that SQUID, with a time complexity of O(log N), can achieve 100% throughput without any speedup. Our simulation results also show a delay performance comparable to outputqueued switches. We also present a novel queuing model that models crosspoint buffered switches under uniform traffic.