• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 16
  • 9
  • 6
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 96
  • 11
  • 11
  • 11
  • 11
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Transparent and Fluid : Is a liquid loyalty the answer? Nurses and loyalty in a postmodern context

Öhrn, Jan January 2014 (has links)
No description available.
12

Sjuksköterskans erfarenheter av mötet med kvinnor som varit utsatta för våld i nära relationer : En litteraturbaserad studie / The nurse´s experiences of meeting women who have been exposed to violence in close relationships

Nordling, Julia, Nordström, Pernilla January 2021 (has links)
Background: Violence against women is a global public health problem that has consequenses for the individual as well as the society. The number of women exposed to violence is assumed to have increased in connection with the Covid-19 pandemic. Many are exposed to violence in their home environment where their partner is the perpetrator. Women often avoid seeking medical care and therefore the number of unreported cases is assumed to be high. Since the nurse often is the first to come in contact with the abused woman, it is important that the nurse has the knowledge required to be able to identify the women.  Aim: The aim of this study was to highlight the nurse´s experiences of meeting women who have been exposed to violence in close relationships. Aim: The aim of this study was to highlight the nurse´s experiences of meeting women who have been exposed to violence in close relationships.   Results: The study resulted in two main themes: the nurse’s internal factors and the nurse’s external factors. Seven subthemes were designed: emotional impact, perceptions and attitudes, treatment, stress and lack of time, the nurse’s responsibility, lack of knowledge, identifying violence and a supportive environment.  Conclusion: The nurse has a responsibility to care for women exposed to violence. The results of this study showed that there is a lack of knowledge, which leads to the nurses feeling insecure in their profession. Furthermore, organizational factors as well as the nurse´s own feelings affect the work with the abused women.
13

Female Trombonists’ Experiences of Gender Bias

Poff, Em I., Deadman, Alison P. 06 April 2022 (has links)
Abstract Female Trombonists’ Experiences of Gender Bias Em Poff and Dr. Alison Deadman, Department of Music, College of Arts and Sciences, East Tennessee State University, Johnson City, TN. Compared with their male counterparts, female trombonists are underrepresented throughout the United States especially in collegiate teaching positions. Does this underrepresentation cause fewer females to pursue playing the trombone and does gender bias play a role? After discussing the historical roles and excepted musical instruments for women to play during the 19th century, this document makes note of many women who were able to surpass societal norms and make their own musical choices. The purpose of this study is to discover if gender bias towards female trombonists exists and if it is a relevant negative factor in the experiences of and musical opportunities open to female trombonists today. This study and the survey questions were inspired by Melissa Ewing’s dissertation, Examining the Under-Representation of Female Euphonium Players in the USA. In order to create a trombone-centered survey, I modified Ewing’s survey questions and added other questions to help gain useful information from female trombone students and trombone professors. I limited my study to 4-year universities in the United States. The names of trombone professors were collected from the College Music Society directory. These professors were surveyed and asked to provide their own gender identity as well as the gender ratio of their studio. In addition, they were asked to forward a survey focused on the college experience of female-identifying trombonists to their female-identifying students. My study will serve as a resource for future research on female-identifying trombonists and gender studies in general regarding musical instruments.
14

Sjuksköterskans erfarenheter av att identifiera våldsutsatta kvinnor : En litteraturstudie / Nurses’ experiences of identifying abused women : A literature study

Olausson, Jonna, Andersson, Johanna January 2024 (has links)
Background: Women around the world are subjected to violence in intimate relationships. Statistics indicate that one in three women has experienced intimate partner violence. The violence women are subjected to occurs in different forms and primarily behind closed doors in their homes. Nurses play a significant role in identifying violence in their interactions with these women, as they often withhold this information from healthcare providers. Aim: The aim was to describe nurse's experiences of identifying women exposed to violence. Method: A literature study based on eight qualitative scientific articles from the nurse's perspective and analysed with Friberg’s five-step model. Results: The result consists of two main themes and seven subthemes. It turned out that nurses often get emotionally affected when they hear the abused women talk about their experiences. Nurses' previous experiences have a significant role in the care encounter. Other factors that affect the nurses' ability to identify abused women are perceived to be lack of knowledge, lack of routine and lack of time. But also the dilemma of nurses believing that it is not their responsibility to identify abused women. Conclusion: Nurses have a lack of knowledge about the subject which results in them hesitating and not daring to ask the question about violence. The conclusion is that several factors affect the nurse in the identification of abused women. Nurses need to improve their knowledge of the subject and need clear guidelines from their workplace to be able to take their responsibility.
15

Enhancing Student Graduation Rates by Mitigating Failure, Dropout, and Withdrawal in Introduction to Statistical Courses Using Statistical and Machine Learning

Abbaspour Tazehkand, Shahabeddin 01 January 2024 (has links) (PDF)
The elevated rates of failure, dropout, and withdrawal (FDW) in introductory statistics courses pose a significant barrier to students' timely graduation from college. Identifying actionable strategies to support instructors in facilitating student success by reducing FDW rates is paramount. This thesis undertakes a comprehensive approach, leveraging various machine learning algorithms to address this pressing issue. Drawing from three years of data from an introductory statistics course at one of the largest universities in the USA, this study examines the problem in depth. Numerous predictive classification models have been developed, showcasing the efficacy of machine learning techniques in this context. Actionable insights gleaned from these statistical and machine learning models have been consolidated, offering valuable guidance for instructors. Moreover, the complete analytical framework, encompassing data identification, integration, feature engineering, model development, and report generation, is meticulously outlined. By sharing this methodology, the aim is to empower researchers in the field to extend these approaches to similarly critical courses, fostering a more supportive learning environment. Ultimately, this endeavor seeks to enhance student retention and success, thereby contributing to the broader goal of promoting timely graduation from college.
16

Codes et jeux de soustraction et de poursuite dans les graphes / Codes and subtraction and pursuit games in graphs

Coupechoux, Pierre 15 June 2018 (has links)
Les codes identifiants ont été introduits en 1998 par Karpovsky, Chakrabarty et Levitin. Un code identifiant est un sous-graphe tel que chaque sommet est identifié de manière unique par les sommets du code qui l'entourent. Il existe plusieurs variantes de ces codes, dont notamment une version colorée dans laquelle les sommets sont identifiés par les couleurs dans leur voisinage. Dans cette thèse, nous cherchons en particulier à construire un cycle le plus grand possible qui admette une coloration identifiante, étant donné un nombre de couleurs fixé. Nous avons aussi étudié le problème des codes identifiants sur une classe particulière de graphes orientés : les tournois. Dans une seconde partie, nous avons aussi étudié deux jeux particuliers. Le premier est une généralisation des jeux octaux - qui se jouent normalement sur un tas - aux graphes. Plus précisemment, le jeu 0.33 ; chaque joueur peut retirer un ou deux sommets voisins d'un graphe, sans déconnecter ce dernier. Le premier qui ne peut plus jouer perd. Nous avons été capable de caractériser les issues de ce jeu dans des classes de graphes particulières, les étoiles subdivisées et les bi-étoiles subdivisées. Le second jeu est appelé le jeu du Pompier (Firefighter). Il consiste à arrêter un feu qui se propage dans un graphe en protégeant des sommets à chaque tour. Nous avons résolu une conjecture sur ce jeu, et introduit la version online, pour laquelle nous avons pu donner des résultats d'approximation. / Identifying codes were introduced in 1998 by Karpovsky, Chakrabarty and Levitin. An identifying code is a subgraph such that each vertex is uniquely identified by the vertices in its neighborhood. There are several variants of these codes, including a colored version where the vertices are identified by the colors in their neighborhood. In this phd, we want to build an identifying coloring of a large cycle, given a fixed number of colors. We also studied identified codes in a certain class of oriented graphs: tournaments. We have also studied some topics in the game theory. The first one is a generalization of octal games, where we play on a graph instead of a heap. More precisely, the 0.33 game; each player can remove one or two vertices in a graph, with no disconnection allowed. The first player who cannot play loses. We studied this game in some graph classes: subdivided stars and subdivided bistars. The other game is called the Firefighter game. It's a one player game, where this one wants to contain a spreading fire in a graph. We solved a conjecture about this game, and introduced the online version of the game, for which we found some approximation results.
17

Music, music therapy and identity : investigating how South African children from socio-economically deprived communities identify with music

Langeveldt, Mareli 21 November 2007 (has links)
This dissertation profiles the way in which primary school children from socio-economically deprived communities in South Africa, specifically Heideveld and Eersterust, identify with music. The purpose of the study is to investigate how these children do, think, feel and talk about music and to explore the implications thereof for music therapist working in these specific or similar South African communities. The sentence completion responses of the children conveyed two ways in which they view identifying with music. The first is identifying with music and the second is using music as a tool through which one can identify with others. The way in which the children identify with music or through music in music therapy sessions, influences the therapeutic relationship as well as clinical interventions of the music therapist. Therefore, music therapists need to be sensitive to the way in which clients identify with music. / Dissertation (MMus (Music Therapy))--University of Pretoria, 2005. / Music / MMus (Music Therapy) / Unrestricted
18

De bortglömda eleverna? : En kvalitativ studie om en kommuns arbete kring särskilt begåvade elever i matematik / The forgotten pupils? : A qualitative study of a municipality’s work with gifted pupils in mathematics

Malmgren, Ellen, Gunell, Moa January 2019 (has links)
Syftet med föreliggande studie är att beskriva en kommuns arbete med att upptäcka och bedriva undervisning för elever med särskild begåvning i matematik samt hur detta arbete stöds. Metoden som användes för studien var semistrukturerade intervjuer med fem olika skolaktörer (matematikutvecklare, specialpedagoger och lärare). Den insamlade datan analyserades med hjälp av Cobb och Jacksons (2012) teoretiska ramverk för hur matematikundervisning kan förbättras och utvecklas i större skala. Resultaten visar att kommunen, enligt deltagande skolaktörer, inte arbetar aktivt med att upptäcka särskilt begåvade elever i matematik, men de elever som utmärker sig utreds. Vidare visar resultaten att kommunen, enligt skolaktörerna, bedriver matematikundervisning för dessa elever på olika sätt beroende på elevernas individuella behov och skolans resurser. Resultaten visar även på att skolaktörerna upplever stöd i arbetet med särskilt begåvade elever i matematik genom det kollegiala samarbetet på olika organisatoriska nivåer i kommunen. Skolaktörerna finner även stöd i utredningar och kartläggningar i arbetet kring särskilt begåvade elever i matematik samt anpassat material och fortbildningar kring dessa elever. Från resultatet kan tre slutsatser dras. Den första slutsatsen är att kommunen inte arbetar systematiskt med att identifiera särskilt begåvade elever i matematik. Den andra slutsatsen är att matematikundervisningen för dessa elever bedrivs på olika sätt på den enskilda skolan. Den tredje slutsatsen är att skolaktörerna upplever att de har flera typer av stöd för att arbeta med att upptäcka och undervisa särskilt begåvade elever i matematik. / The purpose of this study is to describe the effort to identify and conduct teaching for gifted pupils in mathematics and how this work is supported in a larger Swedish municipality. The method used for the study was semistructured interviews with five school actors (mathematics developer, special educators and teachers). The collected data was analysed by the means of Cobb and Jackson’s (2012) theoretical framework for how mathematics instruction can be improved and developed on a larger scale. The results show that the municipality, according to participating school actors, does not work systematically to identify gifted pupils in mathematics, only the pupils who clearly distinguish themselves are identified. Further on the results show that the municipality, according to the school actors, conducts teaching in mathematics for these pupils in different ways depending on the needs of the individual pupil and available resources at the respective schools. The results also show that the school actors feel supported in their work with gifted pupils in mathematics through collegial cooperation on different organizational levels. The school actors also find support in the mappings of gifted pupils in mathematics, as well as custom made materials and professional development around these pupils. Three conclusions are drawn from the results. The first conclusion is that the municipality does not systematically work to identify gifted pupils in mathematics. The second conclusion is that mathematics instruction is conducted in different ways at the individual school. The third conclusion is that the school actors experience several different kinds of supports in distinguishing and conducting instruction for gifted pupils in mathematics.
19

Improving the quality of bug data in software repositories

Auwal, Bilyaminu Romo January 2016 (has links)
Context : Researchers have increasingly recognised the benefit of mining software repositories to extract information. Thus, integrating a version control tool (VC tool) and bug tracking tool (BT tool) in mining software repositories as well as synchronising missing bug tracking data (BT data) and version control log (VC log) becomes of paramount importance, in order to improve the quality of bug data in software repositories. In this way, researchers can do good quality research for software project benefit especially in open source software projects where information is limited in distributed development. Thus, shared data to track the issues of the project are not common. BT data often appears not to be mirrored when considering what developers logged as their actions, resulting in reduced traceability of defects in the development logs (VC logs). VC system (Version control system) data can be enhanced with data from bug tracking system (BT system), because VC logs reports about past software development activities. When these VC logs and BT data are used together, researchers can have a more complete picture of a bug’s life cycle, evolution and maintenance. However, current BT system and VC systems provide insufficient support for cross-analysis of both V Clogs and BT data for researchers in empirical software engineering research: prediction of software faults, software reliability, traceability, software quality, effort and cost estimation, bug prediction, and bug fixing. Aims and objectives: The aim of the thesis is to design and implement a tool chain to support the integration of a VC tool and a BT tool, as well as to synchronise the missing VC logs and BT data of open-source software projects automatically. The syncing process, using Bicho (BT tool) and CVSAnalY (VC tool), will be demonstrated and evaluated on a sample of 344 open source software (OSS) projects. Method: The tool chain was implemented and its performance evaluated semi-automatically. The SZZ algorithm approach was used to detect and trace BT data and VC logs. In its formulation, the algorithm looks for the terms "Bugs," or "Fixed" (case-insensitive) along with the ’#’ sign, that shows the ID of a bug in the VC system and BT system respectively. In i addition, the SZZ algorithm was dissected in its formulation and precision and recall analysed for the use of “fix”, “bug” or “# + digit” (e.g., #1234), was detected was detected when tracking possible bug IDs from the VC logs of the sample OSS projects. Results: The results of this analysis indicate that use of “# + digit” (e.g., #1234) is more precise for bug traceability than the use of the “bug” and “fix” keywords. Such keywords are indeed present in the VC logs, but they are less useful when trying to connect the development actions with the bug traces – that is, their recall is high. Overall, the results indicate that VC log and BT data retrieved and stored by automatic tools can be tracked and recovered with better accuracy using only a part of the SZZ algorithm. In addition, the results indicate 80-95% of all the missing BT data and VC logs for the 344 OSS projects has been synchronised into Bicho and CVSAnalY database respectively. Conclusion: The presented tool chain will eliminate and avoid repetitive activities in traceability tasks, as well as software maintenance and evolution. This thesis provides a solution towards the automation and traceability of BT data of software projects (in particular, OSS projects) using VC logs to complement and track missing bug data. Synchronising involves completing the missing data of bug repositories with the logs de tailing the actions of developers. Synchronising benefit various branches of empirical software engineering research: prediction of software faults, software reliability, traceability, software quality, effort and cost estimation, bug prediction ,and bug fixing.
20

Identifying Children at Risk for Violence and Developing Practical Strategies for Protective Factors

Kridler, Jamie Branam 01 April 2003 (has links)
No description available.

Page generated in 0.1031 seconds