• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 550
  • 267
  • 256
  • 89
  • 77
  • 30
  • 26
  • 20
  • 12
  • 11
  • 11
  • 11
  • 11
  • 11
  • 11
  • Tagged with
  • 1560
  • 188
  • 188
  • 171
  • 115
  • 100
  • 97
  • 95
  • 85
  • 74
  • 74
  • 70
  • 66
  • 65
  • 65
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

AFFORDANSER I TRÄ- OCH METALLSLÖJDSSALEN : - upphov till "oönskade" elevhandlingar?

Bjarme, Emil January 2010 (has links)
I detta examensarbete har jag undersökt elevers beteenden och handlingar i en trä- och metallslöjdssal i en 6-9 skola utifrån James J. Gibsons affordansteori, The theory of affordances, vilken inriktar sig på de handlingserbjudanden - affordanser - en viss miljö erbjuder individen. Studien har grundats på antagandet att trä- och metallslöjdssalen är en miljö vars särpräglade karaktär, full av virke, verktyg, maskiner och slöjdföremål, har en särskilt stark inverkan på eleverna och i detta tenderar att inbjuda till handlingar som kan resultera i konflikter vilka kan utgöra säkerhetsrisker. Syftet har därmed varit att försöka identifiera och analysera för slöjdsalen typiska handlingar, som ur ett lärar- och säkerhetsperspektiv kan betraktas som oönskade. Jag har huvudsakligen tagit stöd i forskning kring miljöpsykologi med inriktning mot lärandemiljöer, samt forskning kring skolans slöjdverksamhet. Metoden för insamling av empiriskt material har varit en kombination av direkt observation och observation med videokamera. Min slutsats är att många av de handlingar som direkt kan relateras till slöjdsalen bör ses i ett större perspektiv där de är delar i beteenden som är allmäna i  alla skolans miljöer. Beteenden som härstammar ur interaktioner och kommunikation mellan elever som kan antas vara tämligen normal för åldern, oavsett miljö. Genom att analysera handlingarna har nyanser och aspekter framträtt som antyder att det sannolikt finns goda skäl att som lärare omvärdera sina åsikter och reflektera över sina förutfattade meningar om vad som är acceptabelt och inte, avseende elevers beteenden. Det har åtminstone jag gjort.
292

Material transport system design in manufacturing

Wan, Yen-Tai 06 April 2006 (has links)
This dissertation focuses on the material transport system design problem (MTSDP), integrating decisions of technology selection and flow network design. This research is motivated by the design of material transport systems (MTS) in manufacturing plants. The objective is to design a MTS with minimum lifetime costs, subject to service requirements, flow network restrictions, and limited resources. We characterize the MTSDP from the perspectives of task requirements, transport technology, and space utilization. A classification is proposed for transport technologies such that instances in the same class share the same properties, and a decision framework is proposed to emphasize the inter-relationships of three major decisions: task clustering, network connecting, and technology selection. We consider fixed and variable costs, arc capacities, and empty travel in our formulations. We propose two solution approaches for the MTSDP. The first is the compact formulation (CF) approach where the three major decisions are handled by a mixed integer non-linear programming (MINLP) formulation. Relaxation techniques are applied to linearize the model. The solution of the resulting linear formulation (MILP) provides a lower bound to that of MINLP. A tightened formulation reduces the computational time by a factor of 3.85. The experiment also shows that when control system costs are significant, designs with multiple-task clusters are more economical than those restricted to single-task clusters. The other approach is clustering/set partition (CSP), where the three decisions are decomposed and solved sequentially. In an example MTS design problem, three methods are compared: CSP, a GREEDY approach from the literature, and enumeration. CSP finds the optimal solution, while GREEDY results in 31% greater costs. A similar comparison with another example is made for the CF and CSP approaches. We apply the CSP approach in a case problem, using data from an auto parts manufacturer. We include flow path crossing constraints and perform experiments to determine solution quality over a range of small problem sizes. The largest difference from optimality is 3.34%, and the average is 0.98%. More importantly, based on these experiments, it seems there is no evidence that the difference percentage grows with an increase in the number of tasks.
293

The Development of the Exception Handling Mechanisms Based on BPEL4WS

Chang, Hsiang-chin 23 July 2004 (has links)
Because of the advance of Internet and the outsourcing, multi-company cooperation is imperative under this circumstance. In order to monitor states between partners during execution, this thesis develops exception handling mechanisms based on Web service stack. After detecting exceptions, the first step is to make use of the fault handler and compensation handler provided by the BPEL4WS specification to roll back planned or even executed business processes belonging to the same scope to the original state. The second step is to utilize the resources searching mechanism, including BE4WS and BCME, to find suitable substitutes to make a replacement or find fitting partners to cooperate with the original one. The third step is to take advantage of the extensibility, flexibility and scalability of BPEL4WS business process to adjust and re-form a new one to handle this unexpected situation. This study uses the LCD supply chain as an example to evaluate the proposed exception handling mechanisms. The result shows that the proposed methods obtain encouraging performance. The major contribution of this research is the initiation efforts on developing exception handling mechanisms based on Web service technologies to improve the exception handling performance.
294

Conflict Handling Style, Acquiescence Response and Confucianism: A Cross-Cultural Perspective of Evaluation of Trainers/Instructors

Chen, Yi-Chieh 17 August 2009 (has links)
There is an increasing trend in this globalized economy for Asian corporations to utilize Western management practices. However, studies have shown not all western management practices can be imported into Asian corporations without accounting for the values and beliefs of Asian employees. This study will explore the effects of Confucianism on the respondents¡¦ evaluation of their trainers/instructors. The specific purpose of this study is to examine the differences between Taiwanese and North Americans respondents in (1) Confucius influence, (2) conflict handling style, and tendency of (3) acquiescence response, when evaluating trainers/instructors. The relationships among these major variables were examined statistically. Results strongly suggest that Confucianism has a significant and positive impact on the tendency of acquiescence response. This response may skew the evaluation results in Taiwan, where the influence of Confucianism is significant as compared to North America. The data and analysis provided by this study is a useful reference for Asian corporations looking to import western management practices, and for international corporations looking to standardize their management systems across differing cultures.
295

Dreaming as a mechanism for emotional handling : did dreams become more emotional after 9/11?

Palmenfelt, August January 2007 (has links)
<p>This study investigates the effects of traumatic experiences on emotional content of dreams. The theoretical framework of the present study is both the threat simulation theory and Hartmann’s theory of dreams as a mechanism for handling emotions after traumatic events. Both theories predict an increase in negative emotions after trauma but assign a different function for this increase. The subjects in this study (N = 16) were regularly writing dream diaries which after the 9/11 attack gave the researchers an unique opportunity to study the exact impact of events on dream content. Each subject’s ten last dreams before 9/11, and ten first dreams after 9/11, were analysed according to the emotional content. The results showed no significant differences in the number or tone of emotions in the before dreams compared to the after dreams. Possibly because none of the subjects experienced the event first hand.</p>
296

Formkrav för testamente : Möjlighet till digitalt testamente

Bergkvist, Joakim January 2010 (has links)
No description available.
297

Cryptographic Key Masking During Run-Time

Andersson, Marcus January 2008 (has links)
<p>Many of the products commercially available today contain some form of encrypted or hashed data. It can involve DRM protection, licenses and certificates, signatures or identification information. Regardless of what the data is intended for, it is protected for a reason and may be worth a great deal of money to the owner.</p><p>There are numerous examples of products that have been subject to hacking in the form of simple memory attacks. If the keys are made all too easily extracted, the value of the protected data will soon be lost.</p><p>The aim of the thesis work discussed in this report was to evaluate the vulnerabilities in mobile phones to this sort of attacks and to find possible security enhancements that can be applied. A method is proposed where masking will secure the cryptology keys while they reside in the memory.</p><p>Different masks are developed and tested - The effects on performance are measured and the security is evaluated.</p><p>The thesis work concludes that it is possible to implement masking on many of the security functions using keys and that the masks will increase security. The conclusion also states that the time consumption of the masking heavily depends on which mask that is used and that the masking could be applied in such a way that the level of masking can be varied.</p>
298

Using intelligent vehicle control rules to improve AMHS performance in highly dynamic manufacturing environments /

Putra, Handi Chandra, January 1900 (has links)
Thesis (M.S.)--Texas State University-San Marcos, 2008. / Vita. Includes bibliographical references (leaves 43-46). Also available on microfilm.
299

Operation based facilities design /

Chittratanawat, Sarawoot, January 2001 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 2001. / Typescript. Vita. Includes bibliographical references (leaves 396-419). Also available on the Internet.
300

A study of knowledge, attitudes and behaviour with regard to food safety, in the Welsh hospitality and catering industry.

Coleman, Philip Dennis. January 2000 (has links)
Thesis (Ph. D.)--Open University. BLDSC no. DX214362.

Page generated in 0.3021 seconds