• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 27
  • 22
  • 5
  • Tagged with
  • 27
  • 27
  • 11
  • 11
  • 10
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

憂鬱量表之編製及其相關因素之研究

劉育如 Unknown Date (has links)
本研究的主要目的是以美國全人醫治協會(American Holistic Medical Association,AHMA),提出的全人醫治取向(AHMA, 2005),發展出一份新取向的憂鬱量表,同時探討憂鬱症的相關因素。針對憂鬱症而言,全人的醫治方式需要檢視情緒、人際關係、身體和心靈等各個層面。因此,本研究所發展的自編憂鬱量表依全人醫治取向將其為分為認知取向、情緒取向、身體取向與人際取向等四個因素。 本研究量表的計分方式採用李克特式四點量表形式。原始量表共37題,依據文獻與醫院觀察所得資料編製而成。原始量表以專家效度作為刪題依據,刪題後的正式量表為22題。其計分方式,答「總是如此」得3分,「經常如此」2分,「偶爾如此」1分,「很少如此或沒有」0分。樣本分為實驗組(憂鬱症者)與效標組(非憂鬱症者),實驗組是以精神科醫師診斷為憂鬱症者共213人作為量表的填答對象,效標組是隨機抽取政大學生200人作為施測樣本,並以CES-D憂鬱量表作為效標。施測所得資料以SPSS進行描述統計、t考驗、效標關聯效度、分量表與總分之相關、區別分析、內部一致性信度的考驗;並以結構方程式模式(SEM)針對驗證性因素分析、多群組共變數結構與多群組潛在平均數結構進行考驗。 本研究的結論下: 一、本研究結果,憂鬱症好發年齡與國外25-44歲研究相符,與國內20-40歲研究結果相同。依據文獻所示,女性罹患憂鬱症的比例,為男性的2倍,本研究結果顯示與國內外研究結果是一致性。 二、各分量表與總分之間的相關從.836到.903皆為非常良好的係數值,表示本研究自編憂鬱量表具有良好的內部一致性。 三、本研究之效標關聯效度達0.939,雙尾檢定,達.01顯著水準,表示本研究所編製的量表,可測得所欲測得的特質。 四、本研究的自編量表整體內部一致性Cronbach's Alpha係數為.965,其他如刪除各單題後的總量表、校正後單題與總量表之相關、校正後單題與分量表之相關都顯示本研究自編憂鬱量表有良好的信度。 五、驗證性因素分析模式是合理適配的,表示當初四個向度假設是成立,而且這四個因素背後有一個潛在因素-「憂鬱症」存在。 六、實驗組與效標組在共變數結構上的考驗是沒有差異的,表示此自編憂鬱量表可以同時適用在實驗組與效標組。 七、分量表或總量表從t考驗值差異皆達.001顯著水準,另外區別分析Hit Ratio值為0.93,表示本研究自編之憂鬱量表具有良好之區別效度,可以有效地區別出實驗組與效標組。而在多群組潛在平均數結構上的考驗,效標組在自編憂鬱量表四個向度上的潛在平均數低於實驗組,表示本量表從潛在變項的考驗也可以有效地區辨實驗組與效標組。 / The main purpose of this study is to develop a depression scale in a new approach that reflects the whole-person approach to healing proposed by the AHMA (the American Holistic Medical Association) in the United States (AHMA, 2005), while at the same time probing into the relevant factors of depression disorders. Regarding depression disorders, a whole-person approach to healing requires the examination of multiple dimensions of the person, such as mood, interpersonal relationships, body, soul, etc. So, this study of the development of a self-establishment depression scale is divided into four dimensions: cognitive, mood, physical, and interpersonal, in accordance with the whole-person approach. The scale of this study adopts a four-item Likter scale to measure scores. The basic scale amounts to 37 items and works out according to the literature and the observing materials in hospitals. Items of the basic scale are deleted with expert validity. It is a 22- items formal scale after deleting items. Answer choices read and rate as follows: “always true” (3), “often true” (2), “true once in a while” (1), “seldom or not true” (0). Samples are separated into the experimental group (depressed person) and the criterion group (non-depressed person). In the experimental group, psychiatrists diagnosed 213 people for depressed person as the measuring target filling of the self-establishment depression scale. The criterion group consisted of 200 National Chengchi University students. CES-D was used as a criterion t. We used the program of SPSS to compute descriptive statistics, t-test, criterion-related validity, correlation of the sub-scales and the scale, discriminant, reliability of internal consistency with SPSS, and the estimations of confirmatory factory analysis, multi-sample covariance structure, multi-sample-latent-means structure with structural equation modeling (SEM). In sum, some conclusions of this research are as follows: 1. The result of this study show that depression disorder peaks during the ages of twenty-five to forty-four, consistent with in foreign and domestic research. As literature, depression disorder occurs in at double the rate in women as in men, and the result of this study is consistent with domestic and foreign studies. 2. The correlative coefficient of the sub-scales and the scale from .836 to.903 shows all as having very good coefficient value and that it has good internal consistency of the self-establishment depression scale. 3. The criterion-related validity of this research is up to 0.939, 2-tailed test reaches .01 level of significance which shows the self-establishment depression scale can examine the attributes which we want to find out. 4. The whole internal consistency Cronbach's Alpha coefficient of the self-establishment depression scale is .965, others like Cronbach's Alpha if item deleted, corrected item-total correlations single item with sub-scales and corrected item-total correlations single item with the scale all show good reliability. 5.The model confirmatory factory analysis is reasonably fit that shows four dimensions established supposing originally, and behind the back of four factors there is one latent variable – “depressive disorder” exists. 6.The estimation of covariance structure between the experimental group and the criterion group shows no difference that reveals the self-establishment depression scale can be suitable for the experimental group and the criterion group . 7.The sub-scale and the scale of the self-establishment depression scale from t-test reaches .01 level of significance, another time hit ratio value of discriminant is 0.93, both show that the self-establishment depression scale by this study can distinguish the experimental group and the criterion group efficiently. And at the estimation of multi-sample-latent-means structure shows the criterion group’s latent mean is lower than the experimental group’s, that means this scale can distinguish the experimental group and the criterion group usefully at the same time.
22

主從式架構下基於晶格之通行碼認證金鑰交換協定之研究 / A study of password-based authenticated key exchange from lattices for client/server model

鄭逸修 Unknown Date (has links)
基於通行碼之認證金鑰交換協定(Password-based Authenticated Key Exchange)為一項使要進行交換訊息之雙方做相互驗證並產生一把共享金鑰的技術。藉由通訊雙方共享一組通行碼做為身份驗證的依據,並且在驗證結束後產生一把僅有雙方才知道的祕密通訊金鑰,往後進行傳遞機密資訊時即可透過此金鑰建立安全的通訊管道。 本篇論文提出一個在主從式架構(Client/Server model)下基於晶格(lattice)之通行碼認證金鑰交換協定,用戶端只需記錄與伺服器共享之通行碼,而伺服器端除了通行碼外擁有屬於自己的公私鑰對,雙方間透過共享之通行碼進行相互驗證,並且在兩個步驟內完成認證及金鑰交換。在安全性上基於晶格密碼系統之難問題,若未來量子電腦問世能夠抵擋其強大運算能力之攻擊,達到安全且有效率之通行碼認證金鑰協議。 / The password-based authenticated key exchange is a technology that allows both parties to perform mutual authentication and generate a shared session key. They through the shared password as the basis for authentication and generate a session key that is only known by both parties. At last, they can use this key to establish a secure channel to transmit secret message. We propose a password-based authenticated key exchange from lattices for Client-Server model. The client only need to remember the password rather than the private key, and the server except keep the password and its own public/private key pair. Both parties execute the mutual authentication via the shared password and accomplish the key exchange within two steps. The security of our protocol is based on LWE problem for lattices, so it is secure even an attacker uses a quantum computer.
23

臺灣地區的人口推估研究 / The study of population projection: a case study in Taiwan area

黃意萍 Unknown Date (has links)
台灣地區的人口隨著生育率及死亡率的雙重下降而呈現快速老化,其中生育率的降低影響尤為顯著。民國50年時,台灣平均每位婦女生育5.58個小孩,到了民國70年卻只生育1.67個小孩,去年(民國90年)生育率更創歷年新低,只有1.4。死亡率的下降可由平均壽命的延長看出,民國75年時男性為70.97歲,女性為75.88歲;到了民國90年,男性延長到72.75歲,女性延長到78.49歲。由於生育率的變化幅度高於死亡率,對人口結構的影響較大,因此本文分成兩個部份,主要在研究台灣地區15至49歲婦女生育率的變化趨勢,再將研究結果用於台灣地區未來人口總數及其結構的預測。   本研究第一部分是生育率的研究,引進Gamma函數、Gompertz函數、Lee-Carter法三種模型及單一年齡組個別估計法,以民國40年至84年(西元1951年至1995年)的資料為基礎,民國85年至89年(西元1996年至2000年)資料為檢測樣本,比較模型的優劣,尋求較適合台灣地區生育率的模型,再以最合適的模型預測民國91年至140年(西元2002年至2051年)的生育率。第二部分是人口推估,採用人口變動要素合成方法(Cohort Component Projection Method)推估台灣地區未來50年的人口總數及其結構,其中生育率採用上述最適合台灣地區的模型、死亡率則引進國外知名的Lee-Carter法及SOA法(Society of Actuaries),探討人口結構,並與人力規劃處的結果比較之。 / Both the fertility rate and mortality rate have been experiencing dramatic decreases in recent years. As a result, the population aging has become one of the major concerns in Taiwan area, and the proportion of the elderly (age 65 and over) increases promptly from 2.6% in 1965 to 8.8% in 2001. The decrease of fertility rate is especially significant. For example, the total fertility rate was 5.58 in 1961, and then decreases dramatically to 1.67 in 1981 (1.4 in 2001), a reduction of almost 70% within 20 years.   The goal of this paper is to study the population aging in Taiwan area, in particular, the fertility pattern. The first part of this paper is to explore the fertility models and decide which model is the most suitable based on age-fertility fertility rates in Taiwan. The models considered are Gamma function, Gompertz function, Lee-Carter method and individual group estimation. We use the data from 1951 to 1995 as pilot data and 1996 to 2000 as test data to judge which model fit well. The second part of this study is to project the Taiwan population for the next 50 years, i.e. 2002-2051. The projection method used is Cohort Component Projection method, assuming the population in Taiwan area is closed. We also compare our projection result to that by Council for Economic Planning and Development, the Executive Yuan of the Republic of China.
24

以部分法修正地理加權迴歸 / A conditional modification to geographically weighted regression

梁穎誼, Leong , Yin Yee Unknown Date (has links)
在二十世紀九十年代,學者提出地理加權迴歸(Geographically Weighted Regression;簡稱GWR)。GWR是一個企圖解決空間非穩定性的方法。此方法最大的特性,是模型中的迴歸係數可以依空間的不同而改變,這也意味著不同的地理位置可以有不同的迴歸係數。在係數的估計上,每個觀察值都擁有一個固定環寬,而估計值可以由環寬範圍內的觀察值取得。然而,若變數之間的特性不同,固定環寬的設定可能會產生不可靠的估計值。 為了解決這個問題,本文章提出CGWR(Conditional-based GWR)的方法嘗試修正估計值,允許各迴歸變數有不同的環寬。在估計的程序中,CGWR運用疊代法與交叉驗證法得出最終的估計值。本文驗證了CGWR的收斂性,也同時透過電腦模擬比較GWR, CGWR與local linear法(Wang and Mei, 2008)的表現。研究發現,當迴歸係數之間存有正相關時,CGWR比其他兩個方法來的優異。最後,本文使用CGWR分析台灣高齡老人失能資料,驗證CGWR的效果。 / Geographically weighted regression (GWR), first proposed in the 1990s, is a modelling technique used to deal with spatial non-stationarity. The main characteristic of GWR is that it allows regression coefficients to vary across space, and so the values of the parameters can vary depending on locations. The parameters for each location can be estimated by observations within a fixed range (or bandwidth). However, if the parameters differ considerably, the fixed bandwidth may produce unreliable or even unstable estimates. To deal with the estimation of greatly varying parameter values, we propose Conditional-based GWR (CGWR), where a different bandwidth is selected for each independent variable. The bandwidths for the independent variables are derived via an iteration algorithm using cross-validation. In addition to showing the convergence of the algorithm, we also use computer simulation to compare the proposed method with the basic GWR and a local linear method (Wang and Mei, 2008). We found that the CGWR outperforms the other two methods if the parameters are positively correlated. In addition, we use elderly disability data from Taiwan to demonstrate the proposed method.
25

精品品牌奢侈量表建構之研究 / Constructing the Brand Luxury Scale

楊淳聿, Yang,Chun-Yu Unknown Date (has links)
「奢侈平民化」帶動奢侈品牌年年高成長的業績,卻迫使品牌必須面對截然不同的消費者態度與品味。品牌欲持續保有強勢地位,必須了解奢侈在消費者心目中的意義以及消費者如何評估奢侈品牌。因此,本研究欲探討台灣精品消費者認知中構成品牌奢侈的因素,建構衡量品牌奢侈之量表,並以量表探討消費者購買經驗對奢侈認知之影響,及分析個別品牌的現況及優劣勢,研擬具體的競爭策略方向。 本研究選取五個奢侈品牌作為分析標的,進行實證研究,期望達到下列研究目的: (1)驗證品牌奢侈量表,建立評估奢侈品牌的管理工具; (2)探討不同奢侈品牌購買經驗之消費者對各品牌奢侈認知的差異性; (3)探討各奢侈品牌在消費者心目中的知覺定位,擬定未來的策略方向。 依本研究之目的,擬定研究架構及確立抽樣設計,並發放問卷收集消費者資訊。之後以二階驗證性因素分析檢驗品牌奢侈量表模式品質;再利用量表探討不同購買經驗對奢侈認知的影響;最後則以多元尺度分析進行知覺定位分析,經實證分析得到以下研究發現: (1)品牌奢侈包含知覺炫耀性、知覺獨特性、知覺品質、知覺享樂價值與知覺延伸自我等五個構面,其影響力依序排列為知覺享樂價值>知覺延伸自我>知覺獨特性>知覺炫耀性>知覺品質。 (2)台灣地區消費者於購買奢侈品牌之產品後,對品牌奢侈程度的認知無明顯地降低,對品牌的奢侈評價與無購買經驗者沒有顯著差異。 (3)各奢侈品牌的改善重點主要包括知覺品質、知覺享樂價值以及知覺獨特性等三項,其中知覺品質為市場最重要之關鍵因素。 根據實證分析之結果,衍生出許多的策略涵意,包括掌握關鍵因素、規劃競爭策略以及未來發展方向等,可以作為奢侈品牌改善或塑造奢侈形象及規劃策略方向的參考依據。 / “Luxury Democratization” brings great growth to the luxury goods market, but also forced these brands to confront consumers with different attitudes and tastes. As a result, it is critical for luxury brand managers to understand consumer’s perception of brand luxury in order to maintain the brands’ luxury image. This research focused on the confirmation of Brand Luxury Scale to understand Taiwanese cousumers’ perception of brand luxury. Based on the Scale, the influence of purchase experience to luxury perception was tested, and the competitive advantages of five luxury brands were analyzed. Competitive strategies of each brand were futher developed. Research was conducted by using five luxury brands and expected to achieve the following research purposes: (1)Confirm the Brand Luxury Scale to establish a managerial tool for brand luxuriousness evaluation; (2)Use the Brand Luxury Scale to evaluate the influence of purchase experience to luxury perception; (3)Use the Brand Luxury Scale to evaluate consumers’ perception of different brands, and seek to imply different competitive strategies for these brands base on the analysis. After the conduction of research framework, sampling design and data collection, Secondary Comfirmatory Factor Analysis was used to confirm the structure of Brand Luxury Scale. 1-Way ANOVA was used to test the influence of purchase experience to luxury perception. Finally, Multi-Dimensional Scaling Analysis was implied to analyze the perceptual position of each brand. The research findings are as below: (1)Brand Luxury is constructed by five dimensions: Perceived Conspicuousness, Perceived Uniqueness, Perceived Quality, Perceived Hedonic, and Perceived Extended-self. The order of dimensional influence is Perceived Hedonic> Perceived Extended -self> Perceived Uniqueness> Perceived Conspicuousness> Perceived Quality. (2)No difference in brand luxury perception between different purchasing experience consumers was found, showing that the perceptions of brand luxury of Taiwanese consumers’ remain unchanged after purchase. (3)Perceived Quality is the most important dimension of all, and the five luxury brands tested needs to improve in dimensions of Perceived Quality, Perceived Hedonic, and Perceived Uniqueness. According to the results, several managerial implications were derived, including key factors in marketing and competitive strategy of each brand. These strategies can be used in improving the performance of perceived luxuriousness of brand, enhancing brand luxury image, and planning the direction of luxury marketing and brand strategy.
26

信用違約機率之預測─Robust Logitstic Regression

林公韻, Lin,Kung-yun Unknown Date (has links)
本研究所使用違約機率(Probability of Default, 以下簡稱PD)的預測方法為Robust Logistic Regression(穩健羅吉斯迴歸),本研究發展且應用這個方法是基於下列兩個觀察:1. 極端值常常出現在橫剖面資料,而且對於實證結果往往有很大地影響,因而極端值必須要被謹慎處理。2. 當使用Logit Model(羅吉斯模型)估計違約率時,卻忽略極端值。試圖不讓資料中的極端值對估計結果產生重大的影響,進而提升預測的準確性,是本研究使用Logit Model並混合Robust Regression(穩健迴歸)的目的所在,而本研究是第一篇使用Robust Logistic Regression來進行PD預測的研究。 變數的選取上,本研究使用Z-SCORE模型中的變數,此外,在考慮公司的營收品質之下,亦針對公司的應收帳款週轉率而對相關變數做了調整。 本研究使用了一些信用風險模型效力驗證的方法來比較模型預測效力的優劣,本研究的實證結果為:針對樣本內資料,使用Robust Logistic Regression對於整個模型的預測效力的確有提升的效果;當營收品質成為模型變數的考量因素後,能讓模型有較高的預測效力。最後,本研究亦提出了一些重要的未來研究建議,以供後續的研究作為參考。 / The method implemented in PD calculation in this study is “Robust Logistic Regression”. We implement this method based on two reasons: 1. In panel data, outliers usually exist and they may seriously influence the empirical results. 2. In Logistic Model, outliers are not taken into consideration. The main purpose of implementing “Robust Logistic Regression” in this study is: eliminate the effects caused by the outliers in the data and improve the predictive ability. This study is the first study to implement “Robust Logistic Regression” in PD calculation. The same variables as those in Z-SCORE model are selected in this study. Furthermore, the quality of the revenue in a company is also considered. Therefore, we adjust the related variables with the company’s accounts receivable turnover ratio. Some validation methodologies for default risk models are used in this study. The empirical results of this study show that: In accordance with the in-sample data, implementing “Robust Logistic Regression” in PD calculation indeed improves the predictive ability. Besides, using the adjusted variables can also improve the predictive ability. In the end of this study, some important suggestions are given for the subsequent studies.
27

可搜尋式加密和密文相等性驗證 / Searchable encryption and equality test over ciphertext

黃凱彬, Huang, Kaibin Unknown Date (has links)
本文深入探討許多基於公開金鑰密碼和通行碼的密文運算方案。首先第一個主題是「公開金鑰密碼」,從其基本架構和安全定義開始,透過文獻探討逐步地討論公開金鑰密碼學的各項特性、以及討論公開金鑰密碼中兩個常見的密文運算:同態加密系統和可交換性加密系統。同態運算是針對同一把公鑰加密的不同密文間的運算:兩個以同一把公鑰加密的密文可以在不解密的前提下進行運算,進而成為另一個合法密文。這個密文運算的結果等同於兩個明文做運算後再以該公鑰加密。可交換性加密系統是一個容許重複的加密系統:已用甲方公鑰加密的密文可以再度用乙方公鑰再加密,進而之成一個多收件者的密文。第一個主題圍繞著這兩個密文運算的技巧討論相關的加密方案。接下來第二個研究的的主題是「基於公開金鑰密碼之密文相等性驗證」,「密文相等性驗證」是密文運算中一個基礎但重要的功能,經授權的測試者可以在不解密密文的前提下,驗證兩個加密後的訊息是否相等。此外,除了相等或不相等之外,測試者無法得知密文中的其他訊息。「基於公開金鑰密碼之密文相等性驗證」相當於在「公開金鑰密碼」的基礎上,再加上「授權」和「密文相等性驗證」的功能。其中「授權」的範圍和「授權」的設計,直接影響到該方案的實用性及安全性,本文提出三個關於「授權」的主題:「單一密文授權」、「相容性授權」和「語意安全授權」。第三個研究主題是「 可搜尋式加密系統」, 常被應用於以下情境:使用者一個檔案及數個「關鍵字」進行加密,然後儲存在雲端伺服器上。當使用者想要對加密檔案進行關鍵字搜尋時,他可以自訂幾個想搜尋的「關鍵字」並對雲端伺服器發出搜尋要求。在收到搜尋要求後,雖然關鍵字都是加密儲存,仍可利用「可搜尋式加密」技巧將符合關鍵字搜尋的檔案傳回給收件者。整個過程中檔案和關鍵字都被加密保護,伺服器無法得知其儲存及搜尋內容。本文提出兩個「 可搜尋式加密系統」,分別是「子集合式多關鍵字可搜尋式加密系統」和「基於通行碼的可搜尋式加密系統」 。 / This dissertation addresses the research about ciphertext computation skills over public key encryption and password-authenticated cryptosystems. The first topic is related to the public key encryption, the framework and security notions for public key encryption are revised; and two common ciphertext-computable public key encryptions including homomorphic encryption and commutative encryption are following discussed. The homomorphic encryption denotes computations over ciphertexts encrypted using the same public key. The homomorphic operation over ciphertexts may be equal to the encryption of a new message computed between two original messages. In terms of commutative encryption, it stands for a repeated encryption system that Alice’s ciphertext can be duplicated encrypted using Bob’s public key. A dual-receiver ciphertext will appear after the commutative encryption. Following, based on the public key encryption, the second topic focuses on the public key encryption with equality test schemes, the basic and fundamental ciphertext computation. Briefly, the user-authorized testers are able to verify the equivalence between messages hidden in ciphertexts after they acquire trapdoors from ciphertext receivers; and the ciphertexts were never decrypted in the whole equality testing process. The scope and architecture of the authorization directly influence the application and security for equality test schemes. Three authorizations including “cipher-bound authorization”, “compatible authorization” and “semantic secure authorization” will be proposed. The third topic is keyword search. It works in the following scenario: a user outsources encrypted files and encrypted keywords on a cloud file storage system; then, when needed, the user is able to request a search query to the file server, which is corresponding to some encrypted keywords. Although files and keywords are encrypted, the server is still able to verify the match-up and return related files to the user. Two researches about keyword search are proposed: the subset multi-keyword search based on public key encryption, and the password-authenticated keyword search.

Page generated in 0.0359 seconds