• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14429
  • 10946
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 4556
  • 3245
  • 3244
  • 980
  • 976
  • 889
  • 749
  • 721
  • 695
  • 680
  • 652
  • 616
  • 565
  • 561
  • 543
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

實施資訊科技教育與香港中學教師的工作: 一個質性研究的探索 = The implementation of information technology in education and the work of teacher in Hong Kong secondary school : a qualitative exploratory study. Implementation of information technology in education and the work of teacher in Hong Kong secondary school: a qualitative exploratory study Shi shi zi xun ke ji jiao yu yu Xianggang zhong xue jiao shi de gong zuo: yi ge zhi xing yan jiu de tan suo = The implementation of information technology in education and the work of teacher in Hong Kong secondary school : a qualitative exploratory study.

2002 (has links)
"2002年7月31日". 論文(哲學碩士)--香港中文大學, 2002. 參考文獻 (leaves 168-181). 附中英文摘要. "2002 nian 7 yue 31 ri". Lun wen (zhe xue shuo shi)--Xianggang zhong wen da xue, 2002. Can kao wen xian (leaves 168-181). Fu Zhong Ying wen zhai yao. 目錄 --- p.i 目錄摘要 --- p.iii Abstract --- p.iv 鳴謝 --- p.v Chapter 第一章 --- 緒論 --- p.1 Chapter 1.1. --- 研究背景 --- p.1 Chapter 1.2. --- 硏究意義 --- p.2 Chapter 1.3. --- 研究目的與研究問題 --- p.3 Chapter 第二章 --- 文獻綜述(I) --- p.8 Chapter 2.1. --- 何謂資訊科技教育 --- p.8 Chapter 2.2. --- IT的重要性:一個「資訊年代」的議論 --- p.9 Chapter 2.3. --- 推行資訊科技教育的理念 --- p.10 Chapter 2.4. --- 香港資訊科技教育的實施策略 --- p.11 Chapter 2.5. --- IT的憧憬與現實:如何實施的問題 --- p.14 Chapter 第三章 --- 文獻綜述(II) --- p.22 Chapter 3.1. --- 「課程實施」的理論探索 --- p.22 Chapter 3.2. --- 資訊科技教育下的教師角色與工作 --- p.32 Chapter 3.3. --- 「教師工作」與「課程實施」的互動 --- p.41 Chapter 3.4. --- 小結 --- p.49 Chapter 第四章 --- 硏究設計與方法 --- p.50 Chapter 4.1. --- 硏究的思考進路與理論架構 --- p.50 Chapter 4.2. --- 硏究方法 --- p.52 Chapter 4.3. --- 資料搜集與分析 --- p.56 Chapter 4.4. --- 硏究信度與效度 --- p.62 Chapter 4.5. --- 硏究倫理問題 --- p.63 Chapter 4.6. --- 硏究限制 --- p.64 Chapter 第五章 --- 資料整理及分析 --- p.66 Chapter 5.1. --- 受訪者的背景資料 --- p.66 Chapter 5.2. --- 受訪者所屬學校的IT政策 --- p.72 Chapter 5.3. --- 「甚麼是資訊科技教育´」ؤ教師的定義 --- p.77 Chapter 5.4. --- 教師如何使用IT --- p.83 Chapter 5.5. --- 從教師工作處境脈絡理解資訊科技教育的實施 --- p.87 Chapter 5.6. --- 教師工作的自主與被動 --- p.120 Chapter 5.7. --- 實施資訊科技教育與教師工作分配 --- p.124 Chapter 5.8. --- 教師工作的自我界定 --- p.135 Chapter 第六章 --- 問題討論及結果歸納 --- p.139 Chapter 6.1. --- 有關硏究問題的討論 --- p.139 Chapter 6.2. --- 硏究結果的要點歸納 --- p.150 Chapter 第七章 --- 啓示與總結 --- p.152 Chapter 7.1. --- 研究結果的啓示 --- p.152 Chapter 7.2. --- 對政策發展的建議與反思 --- p.157 Chapter 7.3. --- 結語 --- p.164 參考書目 --- p.168 Bibliography --- p.170
2

Subaltern public spheres on the Internet: a case study of a Chinese online discussion board.

2003 (has links)
Zhang Weiyu. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 170-177). Abstracts in English and Chinese. Introduction --- p.1 Chapter I --- Subaltern Public Spheres on the Internet --- p.5 Democracy and the Internet --- p.5 Public sphere as a democratic ideal --- p.7 Chapter ´Ø --- Habermasian public sphere --- p.8 Chapter ´Ø --- Multiple public spheres --- p.11 Chapter ´Ø --- Habermasian public sphere vs. multiple public spheres --- p.17 Public sphere and the Internet --- p.21 Chapter ´Ø --- Habermasian public sphere on the Internet --- p.23 Chapter ´Ø --- Multiple public spheres on the Internet --- p.27 Chapter II --- Subaltern Public Spheres in China --- p.30 The history of Chinese civil society --- p.30 Civil society in contemporary China --- p.32 Chapter ´Ø --- Definitions of civil society --- p.32 Chapter ´Ø --- Trade union and the caged social organizations --- p.34 Chapter ´Ø --- Entrepreneurial class and the incorporated social organizations --- p.36 Chapter ´Ø --- Discussions --- p.38 Multiple public spheres in contemporary China --- p.39 Chapter ´Ø --- Mass media and the dominant public sphere --- p.41 Chapter ´Ø --- The premises of subaltern public sphere in China --- p.42 Chapter ´Ø --- Subaltern public spheres in contemporary China --- p.44 Chapter III --- Research Questions and Research Design --- p.48 Research questions --- p.48 Research site: an online discussion board of movies --- p.48 Chapter ´Ø --- Why BBS? --- p.49 Chapter ´Ø --- Why movies? --- p.51 Research methods --- p.54 Chapter IV --- Bulletin Boards as Subaltern Public Spheres --- p.57 Introduction of Rear Window --- p.58 Chapter ´Ø --- The development of Rear Window --- p.59 Chapter ´Ø --- The contents on Rear Window --- p.61 Chapter ´Ø --- The users of Rear Window --- p.63 Accessibility of Rear Window --- p.65 Chapter ´Ø --- Accessibility of the Internet in China --- p.65 Chapter ´Ø --- Accessibility of xici.net --- p.66 Chapter ´Ø --- Accessibility of Rear Window --- p.68 Discourse on RearWindow --- p.73 Chapter ´Ø --- "Introduction of the discussions about ""Movies are a kind of politics""" --- p.75 Chapter ´Ø --- The goal of the discussion --- p.77 Chapter ´Ø --- The equality of the discussion --- p.80 Chapter ´Ø --- The rationality of the discussion --- p.85 Chapter ´Ø --- The communicative rationality of the participants --- p.89 Chapter ´Ø --- Other kinds of discourse --- p.93 Discussions and conclusions --- p.95 Chapter V --- Relationships among the Subaltern Public Sphere and the State --- p.98 The autonomy from the state --- p.100 Chapter ´Ø --- Control at the level of state --- p.102 Chapter ´Ø --- Control at the level of websites --- p.107 Chapter ´Ø --- Control at the level of boardmasters --- p.111 Chapter ´Ø --- Control through self-censorship --- p.112 The discursive resistance toward the state --- p.114 Discussions and conclusions --- p.125 Chapter VI --- Relationships between the Subaltern Public sphere and the Market Economy --- p.129 The Internet economy in China and the subaltern public sphere --- p.132 The pirate movie industry and the subaltern public sphere --- p.138 Private movie watching and the market economy --- p.142 Discussions and conclusions --- p.147 Chapter VII --- Relationships between the Subaltern Public Sphere and the Mass Media --- p.149 The competition between RearWindow and mass media --- p.151 The collaboration between RearWindow and mass media --- p.154 Discussions and conclusions --- p.159 Discussions and Conclusions --- p.161 Subaltern public spheres --- p.161 Democratic potential of the Internet --- p.165 Chinese civil society and Chinese public sphere --- p.166 Limitations of the study --- p.168 Bibliography --- p.170 Appendix: Survey Questionnaire --- p.178
3

A study of the effects of TCP designs on server efficiency and throughputs on wired and wireless networks.

2003 (has links)
Yeung, Fei-Fei. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 144-146). Abstracts in English and Chinese. Introduction --- p.1 Chapter Part I: --- A New Socket API for Enhancing Server Efficiency --- p.5 Chapter Chapter 1 --- Introduction --- p.6 Chapter 1.1 --- Brief Background --- p.6 Chapter 1.2 --- Deficiencies of Nagle's Algorithm and Goals and Objectives of this Research --- p.7 Chapter 1.2.1 --- Effectiveness of Nagle's Algorithm --- p.7 Chapter 1.2.2 --- Preventing Small Packets via Application Layer --- p.9 Chapter 1.2.3 --- Minimum Delay in TCP Buffer --- p.10 Chapter 1.2.4 --- Maximum Delay in TCP Buffer --- p.11 Chapter 1.2.5 --- New Socket API --- p.12 Chapter 1.3 --- Scope of Research and Summary of Contributions --- p.12 Chapter 1.4 --- Organization of Part 1 --- p.13 Chapter Chapter 2 --- Background --- p.14 Chapter 2.1 --- Review of Nagle's Algorithm --- p.14 Chapter 2.2 --- Additional Problems Inherent in Nagle's Algorithm --- p.17 Chapter 2.3 --- Previous Proposed Modifications on Nagle's Algorithm --- p.22 Chapter 2.3.1 --- The Minshall Modification --- p.22 Chapter 2.3.1.1 --- The Minshall Modification --- p.22 Chapter 2.3.1.2 --- The Minshall et al. Modification --- p.23 Chapter 2.3.2 --- The Borman Modification --- p.23 Chapter 2.3.3 --- The Jeffrey et al. Modification --- p.25 Chapter 2.3.3.1 --- The EOM and MORE Variants --- p.25 Chapter 2.3.3.2 --- The DLDET Variant --- p.26 Chapter 2.3.4 --- Comparison Between Our Proposal and Related Works --- p.26 Chapter Chapter 3 --- Min-Delay-Max-Delay TCP Buffering --- p.28 Chapter 3.1 --- Minimum Delay --- p.29 Chapter 3.1.1 --- Why Enabling Nagle's Algorithm Alone is Not a Solution? --- p.29 Chapter 3.1.2 --- Advantages of Min-Delay TCP-layer Buffering versus Application-layer Buffering --- p.30 Chapter 3.2 --- Maximum Delay --- p.32 Chapter 3.2.1 --- Why Enabling Nagle's Algorithm Alone is Not a Solution? --- p.32 Chapter 3.2.2 --- Advantages of Max-delay TCP Buffering versus Nagle's Algorithm --- p.33 Chapter 3.3 --- Interaction with Nagle's Algorithm --- p.34 Chapter 3.4 --- When to Apply Our Proposed Scheme? --- p.36 Chapter 3.5 --- New Socket Option Description --- p.38 Chapter 3.6 --- Implementation --- p.40 Chapter 3.6.1 --- Small Packet Transmission Decision Logic --- p.42 Chapter 3.6.2 --- Modified API --- p.44 Chapter Chapter 4 --- Experiments --- p.46 Chapter 4.1 --- The Effect of Kernel Buffering Mechanism on the Service Time --- p.47 Chapter 4.1.1 --- Aims and Methodology --- p.47 Chapter 4.1.2 --- Comparison of Transmission Time Required --- p.49 Chapter 4.2 --- Performance of Min-Delay-Max-Delay Scheme --- p.56 Chapter 4.2.1 --- Methodology --- p.56 Chapter 4.2.1.1 --- Network Setup --- p.56 Chapter 4.2.1.2 --- Traffic Model --- p.58 Chapter 4.2.1.3 --- Delay Measurement --- p.60 Chapter 4.2.2 --- Efficiency of Busy Server --- p.62 Chapter 4.2.2.1 --- Performance of Nagle's algorithm --- p.62 Chapter 4.2.2.2 --- Performance of Min-Delay TCP Buffering Scheme --- p.67 Chapter 4.2.3 --- Limiting Delay by Setting TCP´ؤMAXDELAY --- p.70 Chapter 4.3 --- Performance Sensitivity Discussion --- p.77 Chapter 4.3.1 --- Sensitivity to Data Size per Invocation of send() --- p.77 Chapter 4.3.2 --- Sensitivity to Minimum Delay --- p.83 Chapter 4.3.3 --- Sensitivity to Round Trip Time --- p.85 Chapter Chapter 5 --- Conclusion --- p.88 Chapter Part II: --- Two Analytical Models for a Refined TCP Algorithm (TCP Veno) for Wired/Wireless Networks --- p.91 Chapter Chapter 1 --- Introduction --- p.92 Chapter 1.1 --- Brief Background --- p.92 Chapter 1.2 --- Motivation and Two Analytical Models --- p.95 Chapter 1.3 --- Organization of Part II --- p.96 Chapter Chapter 2 --- Background --- p.97 Chapter 2.1 --- TCP Veno Algorithm --- p.97 Chapter 2.1.1 --- Packet Loss Type Identification --- p.97 Chapter 2.1.2 --- Refined AIMD Algorithm --- p.99 Chapter 2.1.2.1 --- Random Loss Management --- p.99 Chapter 2.1.2.2 --- Congestion Management --- p.100 Chapter 2.2 --- A Simple Model of TCP Reno --- p.101 Chapter 2.3 --- Stochastic Modeling of TCP Reno over Lossy Channels --- p.103 Chapter Chapter 3 --- Two Analytical Models --- p.104 Chapter 3.1 --- Simple Model --- p.104 Chapter 3.1.1 --- Random-loss Only Case --- p.105 Chapter 3.1.2 --- Congestion-loss Only Case --- p.108 Chapter 3.1.3 --- The General Case (Random + Congestion Loss) --- p.110 Chapter 3.2 --- Markov Model --- p.115 Chapter 3.2.1 --- Congestion Window Evolution --- p.115 Chapter 3.2.2 --- Average Throughput Formulating --- p.119 Chapter 3.2.2.1 --- Random-loss Only Case --- p.120 Chapter 3.2.2.2 --- Congestion-loss Only Case --- p.122 Chapter 3.2.2.3 --- The General Case (Random + Congestion Loss) --- p.123 Chapter Chapter 4 --- Comparison with Experimental Results and Discussions --- p.127 Chapter 4.1 --- Throughput versus Random Loss Probability --- p.127 Chapter 4.2 --- Throughput versus Normalized Buffer Size --- p.132 Chapter 4.3 --- Throughput versus Bandwidth in Asymmetric Networks --- p.135 Chapter 4.3 --- Summary --- p.136 Chapter Chapter 5 --- Sensitivity of TCP Veno Throughput to Various Parameters --- p.137 Chapter 5.1 --- Multiplicative Decrease Factor (α) --- p.137 Chapter 5.2 --- Number of Backlogs (β) and Fractional Increase Factor (γ) --- p.139 Chapter Chapter 6 --- Conclusions --- p.142 Bibliography --- p.144
4

Negotiating gender: masculine women in Hong Kong.

2003 (has links)
Kam Yip Lo Lucetta. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 201-207). Abstracts in English and Chinese. Chapter ONE --- INTRODUCTION: THE GENDERS THAT HAVE NO NAMES --- p.1 After the Title: Some Linguistic Troubles --- p.2 Who are masculine women? --- p.4 Research Areas --- p.5 Methodology --- p.6 Informants --- p.11 Relations: Informants and the Researcher --- p.18 Chapter TWO --- LITERATURE REVIEW --- p.21 Overview --- p.22 Ethnographic Studies --- p.27 Queer Studies --- p.30 Chinese Gender Studies --- p.36 Living Genders in Contexts --- p.39 Chapter THREE --- THEORETICAL FRAMEWORK --- p.41 The Sex/Gender Framework --- p.43 The Destabilization of Sex --- p.47 The Gender Which is Performative --- p.51 The Identity Forever in Motion --- p.56 After the Earthquake: Birth at the Rupture --- p.62 Chapter FOUR --- GENDER DISCOURSES IN HONG KONG --- p.65 The Cultural Superiority of Masculinity --- p.71 Tomboy as a Phase Before Mature Femininity --- p.74 The Degenderization of Ageing Women --- p.75 Masculine women are lesbians --- p.78 Defeminization as a Protective Strategy Against Male Sexual Assault --- p.80 Women with a plain and practical dressing style are the capable work type --- p.83 Masculine women are easy-going and can be buddies to both sexes --- p.85 Failed Adulthood --- p.86 Failed Womanhood --- p.86 Women dress and behave like men are pathological beings --- p.88 Women dress and behave like men want to be men and be a rival to men --- p.89 Negotiations in the Media --- p.90 Chapter FIVE --- TACKLING LABELS: PUBLIC NAMES AND SELF RECOGNITIONS --- p.99 The Public Labels --- p.100 Self Recognitions --- p.108 Chapter SIX --- ACCOMMODATING MASCULINITIES: NEGOTIATIONS IN FAMILY AND THE PUBLIC --- p.119 Family --- p.120 Public Mis-recognition --- p.148 Chapter SEVEN --- ACCOMMODATING MASCULINITIES: NEGOTIATIONS IN LOVE AND SOCIAL NETWORKS --- p.162 Courting Relationship --- p.162 Social Networks --- p.169 Chapter EIGHT --- RECOGNITIONS THROUGH MIS-RECONGTION --- p.191 The Engendering Process --- p.192 Theory and Living Practices --- p.194 The Mere Facts of Mis-recognition --- p.197 New Significations of Masculinity --- p.198 Bibliography --- p.201 Appendix 1: Profile of the Researcher --- p.208 Appendix 2: Negotiating Gender: An On-going Dialogue Between Selves --- p.211
5

A task allocation protocol for real-time financial data mining system.

2003 (has links)
Lam Lui-fuk. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 75-76). Abstracts in English and Chinese. ABSTRACT --- p.I 摘要 --- p.II ACKNOWLEDGEMENT --- p.III TABLE OF CONTENTS --- p.IV LIST OF FIGURES --- p.VIII LIST OF ABBREVIATIONS --- p.X Chapter CHAPTER 1 --- INTRODUCTION --- p.1 Chapter 1.1 --- Introduction --- p.1 Chapter 1.2. --- Motivation and Research Objective --- p.3 Chapter 1.3. --- Organization of the Dissertation --- p.3 Chapter CHAPTER 2 --- BACKGROUND STUDIES --- p.5 Chapter 2.1 --- The Contract Net Protocol --- p.5 Chapter 2.2 --- Two-tier software architectures --- p.8 Chapter 2.3 --- Three-tier software architecture --- p.9 Chapter CHAPTER 3 --- SYSTEM ARCHITECTURE --- p.12 Chapter 3.1 --- Introduction --- p.12 Chapter 3.2 --- System Architecture Overview --- p.12 Chapter 3.2.1 --- Client Layer --- p.13 Chapter 3.2.2 --- Middle Layer --- p.13 Chapter 3.2.3 --- Back-end Layer --- p.14 Chapter 3.3 --- Advantages of the System Architecture --- p.14 Chapter 3.3.1 --- "Separate the presentation components, business logic and data storage" --- p.14 Chapter 3.3.2 --- Provide a central-computing platform for user using different computing platforms --- p.15 Chapter 3.3.3 --- Improve system capacity --- p.15 Chapter 3.3.4 --- Enable distributed computing --- p.16 Chapter CHAPTER 4. --- SOFTWARE ARCHITECTURE --- p.17 Chapter 4.1 --- Introduction --- p.17 Chapter 4.2 --- Descriptions of Middle Layer Server Side Software Components --- p.17 Chapter 4.2.1 --- Data Cache --- p.18 Chapter 4.2.2 --- Functions Library --- p.18 Chapter 4.2.3 --- Communicator --- p.18 Chapter 4.2.4 --- Planner Module --- p.19 Chapter 4.2.5 --- Scheduler module --- p.19 Chapter 4.2.6 --- Execution Module --- p.20 Chapter 4.3 --- Overview the Execution of Service Request inside Server --- p.20 Chapter 4.4 --- Descriptions of Client layer Software Components --- p.21 Chapter 4.4.1 --- Graphical User Interface --- p.22 Chapter 4.5 --- Overview of Task Execution in Advanced Client ´ةs Application --- p.23 Chapter 4.6 --- The possible usages of task allocation protocol --- p.24 Chapter 4.6.1 --- Chart Drawing --- p.25 Chapter 4.6.2 --- Compute user-defined technical analysis indicator --- p.25 Chapter 4.6.3 --- Unbalance loading --- p.26 Chapter 4.6.4 --- Large number of small data mining V.S. small number of large data mining --- p.26 Chapter 4.7 --- Summary --- p.27 Chapter CHAPTER 5. --- THE CONTRACT NET PROTOCOL FOR TASK ALLOCATION --- p.28 Chapter 5.1 --- Introduction --- p.28 Chapter 5.2 --- The FIPA Contract Net Interaction Protocol --- p.28 Chapter 5.2.1 --- Introduction to the FIPA Contract Net Interaction Protocol --- p.28 Chapter 5.2.2 --- Strengths of the FIPA Contract Net Interaction Protocol for our system --- p.30 Chapter 5.2.3 --- Weakness of the FIPA Contractor Net Interaction Protocol for our system --- p.32 Chapter 5.3 --- The Modified Contract Net Protocol --- p.33 Chapter 5.4 --- The Implementation of the Modified Contract Net Protocol --- p.39 Chapter 5.5 --- Summary --- p.46 Chapter CHAPTER 6. --- A CLIENT AS SERVER MODEL USING MCNP FOR TASK ALLOCATION --- p.48 Chapter 6.1 --- Introduction --- p.48 Chapter 6.2 --- The CASS System Model --- p.48 Chapter 6.3 --- The analytical model of the CASS system --- p.51 Chapter 6.4 --- Performance Analysis of the CASS System --- p.55 Chapter 6.5 --- Performance Simulation --- p.62 Chapter 6.6 --- An Extension of the Load-Balancing Algorithm for Non-Uniform Client's Service Time Distribution --- p.68 Chapter 6.7 --- Summary --- p.69 Chapter CHAPTER 7. --- CONCLUSION AND FUTURE WORK --- p.71 Chapter 7.1 --- Conclusion --- p.71 Chapter 7.2 --- Future Work --- p.73 BIBLIOGRAPHY --- p.75
6

Covering AIDS in China: a study of People's daily and Southern weekend, 1985-2001.

2003 (has links)
Tang Le. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 102-116). Abstracts in English and Chinese. Abstract (in English) --- p.i Abstract (in Chinese) --- p.ii Chapter Chapter 1 - --- Introduction --- p.1 Chapter 1.1. --- The AIDS epidemic in China --- p.1 Chapter 1.2. --- The media system in China --- p.5 Chapter Chapter 2 - --- Literature Review --- p.14 Chapter 2.1. --- AIDS coverage in previous studies --- p.14 Chapter 2.2. --- Framing --- p.19 Chapter 2.3. --- Significance of this study --- p.26 Chapter Chapter 3 - --- Research Design --- p.28 Chapter 3.1. --- Research hypothesis --- p.28 Chapter 3.2. --- Research method --- p.30 Chapter Chapter 4 - --- Results --- p.36 Chapter 4.1. --- Discourse analysis --- p.36 Chapter 4.2. --- Content analysis --- p.49 Chapter Chapter 5 - --- Conclusion and Discussion --- p.67 Chapter 5.1. --- Conclusion1 --- p.67 Chapter 5.2. --- Conclusion2 --- p.71 Chapter 5.3. --- Discussion of reasons --- p.77 Chapter 5.4. --- Implications --- p.85 Note --- p.93 Appendix --- p.96 Bibliography --- p.102
7

Substitute or complement? Hong Kong students' motives and patterns of using online and print newspapers.

2003 (has links)
Wong Ka Yee, Janice. Thesis submitted in: December 2002. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 95-106). Abstracts in English and Chinese. Chapter Chapter One --- Introduction and Analytical Framework --- p.1 Chapter I. --- Introduction --- p.1 Chapter II. --- Background: Online Newspapers in Hong Kong --- p.3 Chapter III. --- urpose of the Study --- p.5 Chapter Chapter Two --- Literature Review --- p.8 Chapter I. --- Media Characteristics --- p.8 Chapter II. --- Different Viewpoints on the relationship betweenrint and online newspaper --- p.14 Chapter III. --- Online newspaper usage from a communicationerspective: Theoretical approach --- p.23 Chapter Chapter Three --- Research Framework --- p.32 Chapter I. --- Research Questions --- p.32 Chapter Chapter Four --- Methodology --- p.38 Chapter I. --- Sample --- p.38 Chapter II. --- Samplingrocedure --- p.39 Chapter III. --- Data Collection --- p.40 Chapter IV. --- Questionnaire --- p.40 Chapter V. --- Measurements --- p.41 Chapter VI. --- Analyticalrocedure --- p.44 Chapter Chapter Five: --- Statistical Findings --- p.46 Chapter I. --- articipants'rofile --- p.46 Chapter II. --- Media Usageatterns --- p.46 Chapter III. --- Hypothesis Testing --- p.46 Chapter IV. --- Gratification Seeking --- p.47 Chapter V. --- rofiles --- p.57 Chapter VI. --- Impact of Online Newspaper on Traditional Media --- p.64 Chapter Chapter Six --- Discussion and Conclusion --- p.68 Chapter I. --- Discussions --- p.68 Chapter II. --- Limitations --- p.74 Chapter III. --- Suggestions for Future Research --- p.75 Appendix I --- p.77 Appendix II --- p.85 Bibliography --- p.92
8

Face recognition using different training data.

2003 (has links)
Li Zhifeng. Thesis submitted in: December 2002. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 49-53). Abstracts in English and Chinese. Abstract --- p.i Acknowledgments --- p.v Table of Contents --- p.vi List of Figures --- p.viii List of Tables --- p.ix Chapter Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Face Recognition Problem and Challenge --- p.1 Chapter 1.2 --- Applications --- p.2 Chapter 1.3 --- Face Recognition Methods --- p.3 Chapter 1.4 --- The Relationship Between the Face Recognition Performance and Different Training Data --- p.5 Chapter 1.5 --- Thesis Overview --- p.6 Chapter Chapter 2 --- PCA-based Recognition Method --- p.7 Chapter 2.1 --- Review --- p.7 Chapter 2.2 --- Formulation --- p.8 Chapter 2.2.1 --- Karhunen-Loeve transform (KLT) --- p.8 Chapter 2.2.2 --- Multilevel Dominant Eigenvector Estimation (MDEE) --- p.12 Chapter 2.3 --- Analysis of The Effect of Training Data on PCA-based Method --- p.13 Chapter Chapter 3 --- LDA-based Recognition Method --- p.17 Chapter 3.1 --- Review --- p.17 Chapter 3.2 --- Formulation --- p.18 Chapter 3.2.1 --- The Pure LDA --- p.18 Chapter 3.2.2 --- LDA-based method --- p.19 Chapter 3.3 --- Analysis of The Effect of Training Data on LDA-based Method --- p.21 Chapter Chapter 4 --- Experiments --- p.23 Chapter 4.1 --- Face Database --- p.23 Chapter 4.1.1 --- AR face database --- p.23 Chapter 4.1.2 --- XM2VTS face database --- p.24 Chapter 4.1.3 --- MMLAB face database --- p.26 Chapter 4.1.4 --- Face Data Preprocessing --- p.27 Chapter 4.2 --- Recognition Formulation --- p.29 Chapter 4.3 --- PCA-based Recognition Using Different Training Data Sets --- p.29 Chapter 4.3.1 --- Experiments on MMLAB Face Database --- p.30 Chapter 4.3.1.1 --- Training Data Sets and Testing Data Sets --- p.30 Chapter 4.3.1.2 --- Face Recognition Performance Using Different Training Data Sets --- p.31 Chapter 4.3.2 --- Experiments on XM2VTS Face Database --- p.33 Chapter 4.3.3 --- Comparison of MDEE and KLT --- p.36 Chapter 4.3.4 --- Summary --- p.38 Chapter 4.4 --- LDA-based Recognition Using Different Training Data Sets --- p.38 Chapter 4.4.1 --- Experiments on AR Face Database --- p.38 Chapter 4.4.1.1 --- The Selection of Training Data and Testing Data --- p.38 Chapter 4.4.1.2 --- LDA-based recognition on AR face database --- p.39 Chapter 4.4.2 --- Experiments on XM2VTS Face Database --- p.40 Chapter 4.4.3 --- Training Data Sets and Testing Data Sets --- p.41 Chapter 4.4.4 --- Experiments on XM2VTS Face Database --- p.42 Chapter 4.4.5 --- Summary --- p.46 Chapter Chapter 5 --- Summary --- p.47 Bibliography --- p.49
9

An agent for online auctions: bidding and bundling goods for multiple clients.

2003 (has links)
by Chi-Lun Chau. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 91-93). Abstracts in English and Chinese. Abstract --- p.i Acknowledgement --- p.iv Table of Contents --- p.v List of Figures --- p.viii Definitions --- p.1 Chapter Chapter 1 - --- Introduction --- p.2 Chapter 1.1 --- Background --- p.2 Chapter 1.2 --- Testing Environment --- p.4 Chapter 1.2.1 --- Game Overview --- p.4 Chapter 1.2.2 --- Auctions --- p.5 Chapter 1.2.3 --- Utility and Scores --- p.8 Chapter 1.3 --- Thesis Contribution and Organization --- p.10 Chapter Chapter 2 - --- Relatfd Work --- p.12 Chapter 2.1 --- Traditional auction theory --- p.12 Chapter 2.2 --- Technologies related to online auctions --- p.13 Chapter 2.3 --- Recent researches on online auctions --- p.14 Chapter 2.3.1 --- Priceline (proposed by Amy Greenwald) --- p.16 Chapter 2.3.2 --- ATTac: Integer Linear Programming (ILP) --- p.17 Chapter 2.3.3 --- RoxyBot: Beam search --- p.19 Chapter Chapter 3 - --- Theoretical model for agents in online auctions --- p.20 Chapter 3.1 --- High-level planning --- p.20 Chapter 3.2 --- Mathematical model --- p.21 Chapter Chapter 4 - --- Agent Architecture and Mechanisms --- p.26 Chapter 4.1 --- Architecture --- p.26 Chapter 4.2 --- Cost Estimator (CE) --- p.29 Chapter 4.2.1 --- Closed auction --- p.29 Chapter 4.2.2 --- "Open ""take-it or leave-it"" market" --- p.30 Chapter 4.2.3 --- Open continuous double auction (CDA) --- p.31 Chapter 4.2.4 --- Open multi-unit ascending auction --- p.33 Chapter 4.4.2.1 --- Historical clearing prices --- p.33 Chapter 4.4.2.2 --- Increasing marginal costs --- p.35 Chapter 4.4.2.3 --- Bid winning probability --- p.37 Chapter 4.3 --- Allocation and Acquisition Solver (AAS) --- p.39 Chapter 4.3.1 --- Un-coordinated VS coordinated aspiration --- p.39 Chapter 4.3.2 --- Optimal VS heuristic approach --- p.40 Chapter 4.3.3 --- An greedy approach with coordinated aspiration --- p.41 Chapter 4.4 --- The Bidders --- p.44 Chapter 4.4.1 --- """Take-it or leave-it"" market" --- p.44 Chapter 4.4.2 --- Multi-unit ascending auction --- p.46 Chapter 4.4.2.1 --- Budget bidding --- p.47 Chapter 4.4.2.2 --- Low price bidding --- p.49 Chapter 4.4.3 --- Continuous double auction (CDA) --- p.51 Chapter 4.4.3.1 --- Review of fuzzy reasoning mechanism --- p.52 Chapter 4.4.3.2 --- Fuzzy Reasoning in FL-strategy --- p.54 Chapter 4.4.3.3 --- Adaptive Risk Attitude --- p.59 Chapter Chapter 5 - --- Results --- p.61 Chapter 5.1 --- TAC '02 Competition --- p.62 Chapter 5.1.1 --- Tournament result of our working agent --- p.63 Chapter 5.1.2 --- "Comparisons between CUHK, ATTac and Roxybot" --- p.65 Chapter 5.1.3 --- Low-price Bidding --- p.66 Chapter 5.2 --- Controlled Environment --- p.67 Chapter 5.2.1 --- Software platform --- p.67 Chapter 5.2.2 --- Aggressive agent vs. Adaptive agent --- p.68 L-agent (aggressive agent) --- p.68 S-agent (adaptive agent) --- p.69 Experimental Setting --- p.70 Experimental Results --- p.71 The Hawk-Dove Game --- p.72 Chapter 5.2.3 --- Our agent model --- p.73 Experimental Setting --- p.73 Experimental Results --- p.74 Chapter 5.2.4 --- Historical clearing price --- p.75 Experimental Setting --- p.76 Experimental Result --- p.76 Comparisons among different approaches --- p.77 Chapter 5.2.5 --- Increasing marginal cost --- p.79 Experimental Setting --- p.79 Experimental Result --- p.79 Chapter 5.2.6 --- Bid winning probability --- p.81 Experimental Setting --- p.81 Experimental Result --- p.81 Chapter 5.2.7 --- FL-strategy --- p.82 A-strategy --- p.83 Experimental Setting --- p.84 Experimental Result --- p.85 Chapter Chapter 6 - --- Conclusion and Future work --- p.87 Reference --- p.91
10

On the relation between the Shannon entropy and the von Neumann entropy.

2003 (has links)
Ho Siu-wai. Thesis (M.Phil.)--Chinese University of Hong Kong, 2003. Includes bibliographical references (leaves 103-104). Abstracts in English and Chinese. Chapter Chapter 1 --- Introduction --- p.1 Chapter 1.1 --- Classical Information Theory --- p.2 Chapter 1.1.1 --- Shannon Entropy --- p.3 Chapter 1.1.2 --- "Shannon Joint Entropy, Conditional Entropy, Mutual Information and Conditional Mutual Information" --- p.5 Chapter 1.1.3 --- Applications of Shannon Entropy --- p.7 Chapter 1.2 --- Mathematical background for Quantum Mechanics --- p.8 Chapter 1.2.1 --- Dirac Notation --- p.8 Chapter 1.2.2 --- Linear Operators and Matrices --- p.11 Chapter 1.2.3 --- Spectral Decomposition and Diagonalization --- p.11 Chapter 1.2.4 --- Functions of Normal Matrices --- p.12 Chapter 1.2.5 --- Trace --- p.13 Chapter 1.2.6 --- Kronecker Product --- p.13 Chapter 1.3 --- Elementary Quantum Mechanics --- p.14 Chapter 1.3.1 --- State Space --- p.15 Chapter 1.3.2 --- Evolution --- p.16 Chapter 1.3.3 --- Quantum Measurements --- p.17 Chapter 1.3.4 --- Joint Systems --- p.20 Chapter 1.3.5 --- Quantum Mixtures --- p.22 Chapter 1.3.6 --- Subsystems --- p.28 Chapter 1.4 --- von Neumann Entropy --- p.31 Chapter 1.4.1 --- Definition --- p.32 Chapter 1.4.2 --- Applications of the von Neumann Entropy --- p.34 Chapter 1.4.3 --- Conditional Entropy --- p.34 Chapter 1.5 --- Organization of The Thesis --- p.36 Chapter Chapter 2 --- Problem Formulations --- p.38 Chapter 2.1 --- Measurements that Produce Pure States --- p.39 Chapter 2.2 --- The Shannon Entropy of a Quantum States --- p.41 Chapter 2.3 --- An Equivalent Density Matrix Obtained by Mixing Orthogonal States --- p.44 Chapter Chapter 3 --- Pure Post-Measurement States (PPMS) Measurements --- p.46 Chapter 3.1 --- Introduction --- p.46 Chapter 3.2 --- Definition of PPMS measurements --- p.46 Chapter 3.3 --- Properties of PPMS Measurement --- p.52 Chapter 3.4 --- An Alternative Definition of von Neumann entropy in terms of PPMS Measurements --- p.73 Chapter Chapter 4 --- Mental Measurement of a Quantum State --- p.75 Chapter 4.1 --- Introduction --- p.75 Chapter 4.2 --- An Alternative Definition of a Projective Measurement --- p.76 Chapter 4.3 --- Characteristics of a Projective PPMS Measurement --- p.81 Chapter 4.4 --- The Choice of the Mental Measurement --- p.84 Chapter 4.5 --- An Alternative Definition of von Neumann Entropy by Means of a Mental Measurement --- p.86 Chapter 4.6 --- Construction of the Mental Measurement --- p.86 Chapter Chapter 5 --- Completeness of Density Matrix Postulate --- p.92 Chapter 5.1 --- Introduction --- p.92 Chapter 5.2 --- Complete Specification of Quantum Ensemble by Density Matrix --- p.93 Chapter 5.3 --- An Alternative Definition of von Neumann Entropy by Shannon Entropy --- p.98 Chapter Chapter 6 --- Conclusion and Future Works --- p.99 Chapter 6.1 --- Conclusion --- p.99 Chapter 6.2 --- Future Work --- p.101 Reference --- p.103

Page generated in 0.2747 seconds