• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 134
  • 91
  • 33
  • 32
  • 26
  • 16
  • 13
  • 13
  • 9
  • 7
  • 6
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 443
  • 92
  • 84
  • 82
  • 61
  • 50
  • 39
  • 37
  • 34
  • 33
  • 32
  • 32
  • 30
  • 29
  • 29
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Operaciones de la División de Cuartos (HO11), ciclio 2014 2

Vela Patricia/Seminario Silvia 24 July 2014 (has links)
El curso esta orientado a que los alumnos adquieran los conocimientos necesarios sobre la estructura y operación del departamento de Ama de llaves, como departamento clave de un establecimiento de hospedaje.
32

Stimulus fading within check-in/check-out

Kauffman, Amy Lynne 09 1900 (has links)
xi, 111 p. ; ill. (some col.) A print copy of this title is available through the UO Libraries. Search the library catalog for the location and call number. / To address the growing academic and social needs of students, schools must utilize efficient and effective methods of behavior support. Targeted interventions support students who are at-risk for developing more severe problem behaviors. These interventions are implemented similarly across a group of students, and thus serve as an efficient and cost effective method of behavior support. Check in Check out (CICO) is a targeted group intervention that has a growing research base supporting its efficacy (Crone & Horner, 2003; Todd, Campbell, Meyer, & Horner, 2008). Although there is a growing research base, no studies have examined maintenance of reductions in problem behavior upon fading. The present study examines (1) if a functional relation exists between CICO and reductions in problem behavior, and (2) which components of CICO can be successfully faded with reductions in problem behavior maintaining. In addition, this study examines if teacher attention varies across phases of the study, and predicts successful fading procedures. A reversal design was used to evaluate the efficacy of CICO and subsequent fading phases in four elementary school aged boys. Results indicated that CICO was functionally related to reductions in classroom problem behavior in all four participants. In addition, a functional relation was established with CICO and increases in academic achievement in three participants. Fading procedures were mildly successful, with only some intervention components being removed with reductions in problem behavior maintaining. The amount of adult attention did not vary across study phases, however adult attention became less dependent on problem behavior during the CICO and first fading phase. Clinical and conceptual implications, as well as future research will be discussed. / Adviser: Cynthia Anderson
33

An Evaluation of An Assessment of Check-In/Check-Out with Children who are Homeless in an After School Care Program

Camacho, Ana Paula 29 June 2016 (has links)
Schoolwide Positive Behavior Interventions and Support (SWPBIS) is an approach designed to improve the correct implementation, consistent use, and maintenance of evidence-based practices related to behavior, classroom management and school discipline systems. Check-in/Check-out (CICO) is often recognized as a successful intervention in SWPBIS. However, most of the research on the use of CICO has focused on the school setting. This study provided an extension to the literature by examining the effects of the CICO program with homeless children attending an afterschool program. A non-concurrent multiple baseline across participants design was used to evaluate the CICO program effects. Students were exposed to a CICO intervention in which problem behaviors were targeted for reduction and task engagement was targeted for acquisition. Of the five participants selected for the study four participants were exposed to a CICO intervention. Results demonstrated a decrease in problem behaviors and an increase in task engagement for all four participants.
34

Designing a digital key for hotel applications / Designa en digital nyckel för hotellapplikationer

Dikken, Niels January 2020 (has links)
Although hotels have already started to implement online check-ins and digital keys in their applications, there has not been much research on the design of these prominent features. This thesis focuses on designing a digital key that is both easy to use and perceived as safe. A Research through Design approach was followed consisting of semi-structured interviews, an analysis of textual user reviews, and Lo-Fi and Hi-Fi prototyping in order to understand the needs and problems users face while receiving and using a digital key, as well as to provide further design directions for this feature. The findings showed that using a mobile phone to open a door or gate was already part of some of the participants’daily life. Still, many people do not like to rush into this digitalization. Hotel guests do not seem very worried about safety and using a digital key because the level of trust is high in the hospitality industry. The design presented in this paper serves as a starting point on how to design the receiving and using of a digital key. / Även om hotell redan har börjat implementera online check-in och digitala nycklar i sina applikationer, finns det idag inte mycket forskning kring design och utformning av dessa framträdande funktioner. Denna avhandling fokuserar på att designa en digital nyckel som både är enkel och smidig att använda, samtidigt som den av användaren skall uppfattas som säker. Ett forskning genom design tillvägagångssätt har använts, som består av semistrukturerade intervjuer, en analys av skriftliga användarrecensioner, samt Lo-Fi och Hi-Fi prototyper. Detta för att skapa förståelse kring de behov och problem som användarna upplever vid mottagande och användning av en digital nyckel, samt för att ge ytterligare vägledning kring design av denna funktion. Resultaten visade att användandet av en mobiltelefon för att öppna en dörr eller port redan var en del av vissa av deltagarnas dagliga liv. Samtidigt är det många som inte vill göra denna digitala transformation allt för snabbt. Hotellgäster verkar inte vara oroliga för säkerheten eller att använda en digital nyckel då man upplever ett starkt förtroende inom hotellindustrin. Den design som presenteras i denna avhandling utgör en startpunkt för hur mandesignar mottagandet och användandet av en digital nyckel.
35

An Evaluation of the Relationship Between Function of Behavior and a Modified Check-In, Check-Out Intervention using a Daily Behavior Report Card

Klein, Christopher John 15 August 2014 (has links)
The purpose of the study is to evaluate if the effectiveness of a check-in, check-out (CICO) intervention varies based on the function maintaining students’ target behaviors as determined by functional analyses prior to the implementation of the intervention. Participants in the study consisted of 6 children enrolled in general education Kindergarten classes across 6 teachers in the Southeastern United States. Upon completion of a functional analysis, participants were determined to fit into functional groups (i.e., combined attention and escape, attention, and escape), then a modified between groups design with a component of a multiple-baseline across participants design was completed. Overall, the current study found that the CICO intervention increased desired behavior as measured by points earned on the daily behavior report card ratings across baseline to intervention phases. All functional groups displayed an increase in average points earned from baseline phase across intervention phases. The results of the current study have implications within the educational systems for selecting interventions within the response to intervention framework, utilizing functional analysis for the CICO intervention, and acceptability of evidence based interventions. Limitations and recommendations for future research are presented.
36

AN INTRODUCTION TO LOW-DENSITY PARITY-CHECK CODES

Moon, Todd K., Gunther, Jacob H. 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Low-Density Parity-Check (LDPC) codes are powerful codes capable of nearly achieving the Shannon channel capacity. This paper presents a tutorial introduction to LDPC codes, with a detailed description of the decoding algorithm. The algorithm propagates information about bit and check probabilities through a tree obtained from the Tanner graph for the code. This paper may be useful as a supplement in a course on error-control coding or digital communication.
37

Can Space Time Encoding and Adaptive Equalization Benefit Rotary-Wing Missions at the Yuma Proving Ground?

Diehl, Michael, Swain, Jason, Wilcox, Tab 10 1900 (has links)
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV / The US Army Yuma Proving Ground (YPG) utilizes telemetry in several critical ways. Data, video, and voice from test aircraft provides YPG the information necessary to effectively execute missions. This information must be displayed real-time for efficient use of available flight time, making a robust telemetry link vital. In seeking an increased telemetry downlink capability, YPG considered three new technologies: Space Time Coding (STC), Adaptive Equalization (EQ), and Low Density Parity Check (LDPC). These technologies have shown reduced multipath and increased datalink reliability on fixed-wing aircraft; however, YPG's concern was the technology's benefits on rotary wing aircraft tested here. To assess potential benefits of these technologies, YPG conducted flight tests using representative flight profiles and vendor-supplied equipment to collect quantitative and qualitative data.
38

Implementation of BIM in the Municipal Plan Review Process

Ricardo Belliard, Liz Shantalle 01 May 2016 (has links)
Obtaining a building permit is an important step for any construction project. Whether it is for a new construction or a remodel job, the process involves a plan review performed by building officials. The purpose of this research was to explore ways in which Building Information Modeling (BIM) could be used to aid code officials during the plan review process. The objectives of the study were to determine if the level of detail in BIM was complete enough to allow a plan review to be perform accurately, to identify the extent to which architects are comfortable with using their models for the plan review, and to identify barriers to implementation. A case study was conducted where BIM was used to supplement the traditional 2D plans plan review process. Additionally, a survey was given to local architects to obtain their thoughts on using BIM in the plan review process. The research found that BIM has the potential of helping code officials visualize the project, extract information from objects, and allow them to have a better understanding of unique building features relationship to other building elements. Challenges of using BIM in the plan review process identified by architects included: the accuracy of the model, the level of detail modeled, legal implications, and ability of reviewers to use BIM.
39

Equivocation of Eve using two edge type LDPC codes for the binary erasure wiretap channel

Andersson, Mattias, Rathi, Vishwambhar, Thobaben, Ragnar, Kliewer, Joerg, Skoglund, Mikael January 2010 (has links)
We consider transmission over a binary erasure wiretap channel using the code construction method introduced by Rathi et al. based on two edge type Low-Density Parity-Check (LDPC) codes and the coset encoding scheme. By generalizing the method of computing conditional entropy for standard LDPC ensembles introduced by Méasson, Montanari, and Urbanke to two edge type LDPC ensembles, we show how the equivocation for the wiretapper can be computed. We find that relatively simple constructions give very good secrecy performance and are close to the secrecy capacity. / <p>Copyright 2010 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works. QC 20120110</p>
40

Cyclic Redundancy Check for Zigbee-Based Meeting Attendance Registration System

Cheng, Yuelong, Ma, Xiaoying January 2012 (has links)
The research accomplished in this dissertation is focused on the design of effective solutions to the problem that error codes occur in the ZigBee-based meeting attendance registration system. In this work, several different check algorithms are compared, and the powerful error-detecting Cyclic Redundancy Check (CRC) algorithm is studied. In view of the features of the meeting attendance registration system, we implement the check module of CRC-8. This work also considers the data reliability. We assume use retransmission mechanism to ensure the validity and completeness of transmission data. Finally, the potential technical improvement and future work are presented.

Page generated in 0.0268 seconds