Open Access. Powered by Scholars. Published by Universities.®

Education Commons

Open Access. Powered by Scholars. Published by Universities.®

Special Education and Teaching

Kennesaw State University

Conference

Articles 1 - 2 of 2

Full-Text Articles in Education

Adapting Applied Behavior Analysis In Autism Intervention To Improve Individualized Education For Children With Autism, Elisabeth Alonso Nov 2021

Adapting Applied Behavior Analysis In Autism Intervention To Improve Individualized Education For Children With Autism, Elisabeth Alonso

Symposium of Student Scholars

Applied Behavior Analysis (ABA) intervention for children diagnosed with autism provides detailed assessments of the clients’ abilities and guides skill acquisition with the goal of transitioning the client, often into a typical school classroom. The lack of accessible autism training and access to knowledgeable ABA professionals in school settings prevents teachers from engaging with their students on the autism spectrum. Furthermore, this gap in training does not equip teachers to follow through with the research-based interventions to improve students’ quality of life. Teachers must have an understanding of ABA in layman’s terms to improve the child’s classroom functioning. This research …


Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne Oct 2018

Study Of Physical Layer Security And Teaching Methods In Wireless Communications, Zhijian Xie, Christopher Horne

KSU Proceedings on Cybersecurity Education, Research and Practice

In most wireless channels, the signals propagate in all directions. For the communication between Alice and Bob, an Eavesdropper can receive the signals from both Alice and Bob as far as the Eavesdropper is in the range determined by the transmitting power. Through phased array antenna with beam tracking circuits or cooperative iteration, the signals are confined near the straight line connecting the positions of Alice and Bob, so it will largely reduce the valid placement of an Eavesdropper. Sometimes, this reduction can be prohibitive for Eavesdropper to wiretap the channel since the reduced space can be readily protected. Two …