Matching Items (3)
Filtering by

Clear all filters

156674-Thumbnail Image.png
Description
Working memory capacity and fluid intelligence are important predictors of performance in educational settings. Thus, understanding the processes underlying the relation between working memory capacity and fluid intelligence is important. Three large scale individual differences experiments were conducted to determine the mechanisms underlying the relation between working memory capacity and

Working memory capacity and fluid intelligence are important predictors of performance in educational settings. Thus, understanding the processes underlying the relation between working memory capacity and fluid intelligence is important. Three large scale individual differences experiments were conducted to determine the mechanisms underlying the relation between working memory capacity and fluid intelligence. Experiments 1 and 2 were designed to assess whether individual differences in strategic behavior contribute to the variance shared between working memory capacity and fluid intelligence. In Experiment 3, competing theories for describing the underlying processes (cognitive vs. strategy) were evaluated in a comprehensive examination of potential underlying mechanisms. These data help inform existing theories about the mechanisms underlying the relation between WMC and gF. However, these data also indicate that the current theoretical model of the shared variance between WMC and gF would need to be revised to account for the data in Experiment 3. Possible sources of misfit are considered in the discussion along with a consideration of the theoretical implications of observing those relations in the Experiment 3 data.
ContributorsWingert, Kimberly Marie (Author) / Brewer, Gene A. (Thesis advisor) / McNamara, Danielle (Thesis advisor) / McClure, Samuel (Committee member) / Redick, Thomas (Committee member) / Arizona State University (Publisher)
Created2018
157677-Thumbnail Image.png
Description
Self-control has been shown to be an important influence behind a variety of risk and protective behaviors, such as substance abuse. Although prior research points to the existence of multiple dimensions of self-control, this concept is not consistently defined and frequently only studied as a conglomerate in clinical research. The

Self-control has been shown to be an important influence behind a variety of risk and protective behaviors, such as substance abuse. Although prior research points to the existence of multiple dimensions of self-control, this concept is not consistently defined and frequently only studied as a conglomerate in clinical research. The current study sought to examine how two experimental manipulations of subcomponents of self-control (motivation and self-efficacy) affect real-world consumptive behavior after accounting for executive function. Additionally, the validity and reliability of a brief state survey measure of perceived self-control capacity, internal motivation, and external motivation was tested. The goal was to examine how basic scientific principles involved in self-control translate into clinically relevant behaviors, which may inform understanding of momentary lapses in self-control behavior, potentially leading to novel prevention and intervention efforts. 94 college students completed a 1-2 hour laboratory protocol during which they completed survey and laboratory-based tasks of self-control and related behaviors, executive function, and ad libitum alcohol consumption. Results showed that the self-efficacy manipulation successfully increased perceived self-control capacity, although this did not lead to a significant reduction in consumption. The motivation manipulation neither increased motivation nor reduced consumption in this sample. However, the brief state survey measure of self-control subcomponents demonstrated strong test-retest reliability and distinction from trait self-control, demonstrating its viability for use in future research. By elucidating the relationships between specific mechanisms of self-control, laboratory-based tasks and manipulations, and real-world consumptive behaviors, prevention and intervention efforts for problems such as alcohol abuse may be tailored to the needs of the individual and made more impactful and cost-effective.
ContributorsPapova, Anna (Author) / Corbin, William R. (Thesis advisor) / Brewer, Gene (Committee member) / Karoly, Paul (Committee member) / McClure, Samuel (Committee member) / Arizona State University (Publisher)
Created2020
157976-Thumbnail Image.png
Description
The open nature of the wireless communication medium makes it inherently vulnerable to an active attack, wherein a malicious adversary (or jammer) transmits into the medium to disrupt the operation of the legitimate users. Therefore, developing techniques to manage the presence of a jammer and to characterize the effect of

The open nature of the wireless communication medium makes it inherently vulnerable to an active attack, wherein a malicious adversary (or jammer) transmits into the medium to disrupt the operation of the legitimate users. Therefore, developing techniques to manage the presence of a jammer and to characterize the effect of an attacker on the fundamental limits of wireless communication networks is important. This dissertation studies various Gaussian communication networks in the presence of such an adversarial jammer.

First of all, a standard Gaussian channel is considered in the presence of a jammer, known as a Gaussian arbitrarily-varying channel, but with list-decoding at the receiver. The receiver decodes a list of messages, instead of only one message, with the goal of the correct message being an element of the list. The capacity is characterized, and it is shown that under some transmitter's power constraints the adversary is able to suspend the communication between the legitimate users and make the capacity zero.

Next, generalized packing lemmas are introduced for Gaussian adversarial channels to achieve the capacity bounds for three Gaussian multi-user channels in the presence of adversarial jammers. Inner and outer bounds on the capacity regions of Gaussian multiple-access channels, Gaussian broadcast channels, and Gaussian interference channels are derived in the presence of malicious jammers. For the Gaussian multiple-access channels with jammer, the capacity bounds coincide. In this dissertation, the adversaries can send any arbitrary signals to the channel while none of the transmitter and the receiver knows the adversarial signals' distribution.

Finally, the capacity of the standard point-to-point Gaussian fading channel in the presence of one jammer is investigated under multiple scenarios of channel state information availability, which is the knowledge of exact fading coefficients. The channel state information is always partially or fully known at the receiver to decode the message while the transmitter or the adversary may or may not have access to this information. Here, the adversary model is the same as the previous cases with no knowledge about the user's transmitted signal except possibly the knowledge of the fading path.
ContributorsHosseinigoki, Fatemeh (Author) / Kosut, Oliver (Thesis advisor) / Zhang, Junshan (Committee member) / Sankar, Lalitha (Committee member) / Bliss, Daniel (Committee member) / Arizona State University (Publisher)
Created2019