• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 29
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 149
  • 149
  • 35
  • 27
  • 25
  • 24
  • 23
  • 21
  • 20
  • 20
  • 16
  • 16
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Proposta de um modelo de Credit Scoring para uma carteira de cr??dito consignado visando a????es de Cross-Sell.

OLIVEIRA, Marcos Santos 28 September 2016 (has links)
Submitted by Elba Lopes (elba.lopes@fecap.br) on 2016-12-12T17:27:40Z No. of bitstreams: 2 Marcos Santos Oliveira.pdf: 970582 bytes, checksum: 6d45d32bff529faa3e4f900f0ff06309 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) / Made available in DSpace on 2016-12-12T17:27:40Z (GMT). No. of bitstreams: 2 Marcos Santos Oliveira.pdf: 970582 bytes, checksum: 6d45d32bff529faa3e4f900f0ff06309 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2016-09-28 / This work has the objective to analyze the efficiency of the credit scoring model in cross-selling action to provide greater profitability aligned with the risk of new product. This study differs from others by using a database of clients who Payroll-linked loan from the conventional modeling of a Credit Scoring offer another product, the credit card that requires a better profile for meeting payments. The study resulted in 3 of profitability and performance scenarios. In Scenario 1 without use of shoring showed profitability of R$ 0.5 million and delinquencies of 16.1%. In the others scenarios with the use of the yields scores exceeded R$ 2.3 million and delinquencies below 9%. Scenarios 2 and 3 with just score Bureau companies. Scenario 4 includes Credit scoring model developed in this work, we showed the best discrimination between good and bad customers and the highest rate of approval, 75% against 64% of the best Bureau. For this, we used data provided by a financial institution. Using SPSS and statistical techniques, the risk analysis Relative, construction of dummies and Spearman correlation analysis, generated the model Logistic Regression Binary, validated with the Kolmogorov-Smirnov test, the ROC curve and others. The model developed credit scoring showed good results as to their power of customer classification. The effectiveness of Logistic Regression as credit performance prediction tool enables the application of the use of credit scoring model by the financial institution provider of data to improve profitability and default of the customer portfolio by credit card coming from the customer base of payroll loan. / Este trabalho tem o objetivo de analisar a efici??ncia do modelo de credit scoring na a????o de cross-selling para proporcionar uma maior rentabilidade alinhada ao risco do novo produto. A realiza????o deste estudo se diferencia dos demais por utilizar uma base de dados com clientes que realizaram empr??stimo Consignado, a partir da modelagem convencional de um Credit Scoring ofertar outro produto, o Cart??o de Cr??dito que exige um melhor perfil para cumprimento dos pagamentos. O estudo resultou em 3 cen??rios de rentabilidade e desempenho. No Cen??rio 1 sem uso do escoramento apresentou rentabilidade de R$ 0,5 milh??es e inadimpl??ncia de 16,1%. Nos demais cen??rios com uso de escores as rentabilidades ultrapassaram R$ 2,3 milh??es e inadimpl??ncias abaixo de 9%. Os Cen??rios 2 e 3 apenas com escore de empresas Bureau. O Cen??rio 4 inclui o modelo Cr??dit Scoring desenvolvido neste trabalho, apresentou a melhor discrimina????o entre clientes bons e maus e a maior taxa de aprova????o, sendo 75% contra 64% do melhor Bureau. Para isso, utilizou-se de dados fornecido por uma institui????o financeira. Utilizando o SPSS e t??cnicas estat??sticas, a an??lise de Risco Relativo, constru????o de dummies e a an??lise de correla????o de Spearman, foi gerado o modelo de Regress??o Log??stica Bin??ria, validado com o teste Kolmogorov-Smirnov, a Curva ROC e outros. O modelo de Credit Scoring desenvolvido apresentou resultados satisfat??rios quanto a seu poder de classifica????o dos clientes. A efic??cia da Regress??o Log??stica, como ferramenta de predi????o de performance de cr??dito, habilita a aplica????o da utiliza????o do modelo Credit Scoring pela institui????o financeira provedora dos dados para melhorar a rentabilidade e a inadimpl??ncia da carteira de clientes com Cart??o de Cr??dito oriundo da carteira de clientes do empr??stimo Consignado.
122

Technology in college classrooms : an action research examining the use of PowerPoint in ELL classrooms

Zhang, Weiwei 24 April 2012 (has links)
This research looks at the use of PowerPoint as an instructional tool for teaching English language learners (ELL) who studied in a language program at a state university in the Pacific Northwest. The purpose of the research was to discover and to explore the perceptions of PowerPoint supported teaching and learning that were held by the students, the instructors, and the student researcher. PowerPoint is one of the most commonly used technologies in classrooms, and its projection on screens has become a fundamental part of many students' daily routine. The basic design of this research study is based on Stringer's (2004) action research model, which operates on a repeated circle of reflecting, planning, acting and observing. This action research was generated by all participants, guided by instructors, and monitored by the planned objectives of the study's outcomes. A constructivist approach was used to understand the process of teaching and learning with PowerPoint, and feedback (questionnaires, interviews, and personal communications) was collected from the students in order to help instructors and the student researcher to determine the students' needs. There are four main sets of data in this study—data from students' questionnaires, from students' interviews, from instructors' interviews, and from the student researcher's classroom observations. Students were given questionnaires at the ends of weeks two to ten, and two students from each class were selected to be interviewed. Instructors were interviewed both at the beginning and at the end of the term. The student researcher observed all classes starting week two, and wrote notes which were included as part of the data. / Graduation date: 2012
123

A study of changes in students' understanding of three algebraic concepts: variables, expressions, and equality

Cushman, Jane Ries 29 August 2008 (has links)
Not available
124

Implementation of graph manipulation under X Window system environment

Hsieh, Chao-Ho January 1992 (has links)
In graph theory graphs are mathematical objects that can be used to model networks, data structures, process scheduling, computations and a variety of other systems where the relations between the objects in the system play a dominant role.We will now consider graphs as mathematically self-contained units with rich structure and comprehensive theory; as models for many phenomena, particularly those arising in computer systems; and as structures which can be processed by a variety of sophisticated and interesting algorithms.For graph theory presentation, we need a very good graphical user interface(GUI) to approach the goal. X Window system is ideally suited for such a purpose. This package program is based on X Window system environment. With this package, we can manipulate graphs by special functions which can put nodes, put edges, delete nodes, delete edges, change the whole graph size, move graph location, and modify edge weights. / Department of Computer Science
125

Fel eller rätt med upphovsrätt : En kritisk diskursanalys av den svenska debatten om upphovsrätten / Copyright or Copywrong : A Critical Discourse Analysis of the Swedish Debate on Copyright and Piracy

Björk, Moa-Lisa January 2018 (has links)
The aim of this paper is to investigate how the view on copyright emerges in the media debate, and the overall research question is what possible explanations there might be for the view being different depending on whom the writer is and whom s/he represents. The theoretical framework is Fairclough's critical discourse analysis and the method used is the analytic model in three stages that he presents in his book Language and Power (2001). The empirical material was selected through an initial search in Media Retriever, followed by a manual se-lection process, which resulted in a final selection of eight articles, all published in Swedish daily newspapers between the years 2006 and 2014. In the analysis, two main discourses were identified – the producer discourse and the consumer discourse – in which all the texts could be placed. The producer discourse puts the interests of the author first, and holds the view that copyright law must be strong to protect the authors' rights. The consumer discourse on the other hand puts the interest of the consumer first, and their view is that the public has the right to access the world's collect-ed knowledge and culture. This paper also examines the members' resources that authors bring to the texts in the form of common sense, and also in the form of a motive for entering in the debate. Furthermore, this paper also looks at the fact that power relations between the participants in the texts are complicated as they form a com-plex web of formal and informal power relations. The conclusion is that the main explanation for the different ways of viewing copyright is the two afore-mentioned discourses, and that the members' resources the authors bring to the texts are very ideological. The ideological arguments and the complex power relations result in very rigid positions in the debate. This is a two years master's thesis in Archive, Library and Museum studies.
126

A framework for secure human computer interaction.

Johnston, James 02 June 2008 (has links)
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust. / Labuschagne, L., Prof.
127

A comparison of web-based technologies to serve images from an Oracle9i database

Swales, Dylan 18 June 2013 (has links)
The nature of Internet and Intranet Web applications has changed from a static content-distribution medium into an interactive, dynamic medium, often used to serve multimedia from back-end object-relational databases to Web-enabled clients. Consequently, developers need to make an informed technological choice for developing software that supports a Web-based application for distributing multimedia over networks. This decision is based on several factors. Among the factors are ease of programming, richness of features, scalability, and performance. The research focuses on these key factors when distributing images from an Oracle9i database using Java Servlets, JSP, ASP, and ASP.NET as the server-side development technologies. Prototype applications are developed and tested within each technology: one for single image serving and the other for multiple image serving. A matrix of recommendations is provided to distinguish which technology, or combination of technologies, provides the best performance and development platform for image serving within the studied envirorunent. / KMBT_363 / Adobe Acrobat 9.54 Paper Capture Plug-in
128

Modélisation du grenaillage ultrason pour des pièces à géométrie complexe / Modelling of ultrasonic shot peening for parts with complex geometry

Badreddine, Jawad 04 April 2014 (has links)
Le grenaillage ultrason est un procédé mécanique de traitement de surfaces. Il consiste à projeter des billes à la surface de pièces métalliques, à l’aide d’un système acoustique vibrant ultrasonore. Lors du traitement, les billes sont contenues dans une enceinte spécialement conçue pour la pièce à traiter, et adoptent un comportement similaire à celui d’un gaz granulaire vibré. Le grenaillage ultrason sert à introduire des contraintes résiduelles de compression dans le matériau traité. Ces contraintes de compression sont bénéfiques pour la tenue en fatigue de la pièce et sa résistance à la corrosion sous contraintes.L’objectif des présents travaux de thèse consiste à modéliser la dynamique des billes pendant le traitement, et pour des pièces et géométries complexes. En effet, depuis son industrialisation, la mise au point du procédé se fait de manière empirique qui, avec la complexification des pièces mécaniques traitées pousse cette approche à ses limites. La mise au point peut donc s’avérer coûteuse en temps et aboutir à une solution partiellement optimisée. Ainsi, le modèle développé donne accès à une compréhension détaillée du grenaillage ultrason dans des conditions de traitement industrielles. Il constitue pour la première fois un outil d’aide à la conception des enceintes de traitement, offrant la possibilité d’une meilleure maitrise et optimisation du traitement, tout en réduisant les coûts de mise au point. La seconde contribution est de fournir aux modèles de prédiction des contraintes des données fiables et réalistes / Ultrasonic shot peening is a mechanical surface treatment process. It consists on projecting spherical shot onto a metallic surface, using an ultrasonic accoustic system. During the treatement, the shot are contained in a chamber, specially designed for the peened part, and behave similarely to a vibrated granular gas. Ultrasonic shot peening is used to introduce compressive residual stresses in the peened material. These compressive stresses help increasing the fatigue life span of the part and its resistance to stress corrosion cracking.The objectif of the present work consists on modeling the shot dynamics of the shot during the traitement, and for complex parts and geometries. Since its industrialization, the choice of the process parameters is done experimentally with trial and error. And with the ever increasing complexity of the peened parts, this approach is reaching its limits; thus becoming sometimes time consuming and providing partially optimized solutions.Therfore, the developped model gives access to a detailed understanding of ultrasonic shot peening in industrial treatment conditions. It represents for the first time a support tool for the design of peening chambers. This offers the possibility of a better control and optimization of the process, while reducing development costs. The second contribution lies in the model capacity to provide reliable and realistic input data to residual stresses prediction models
129

Teaching Two Children with Autism to Follow a Computer-Mediated Activity Schedule Utilizing Microsoft® PowerPoint® Presentation Software

Carmichael, Tammy 08 1900 (has links)
Children with autism typically exhibit deficits in behavior and also in visual processing. Development and implementation of visually-cued instructional procedures, combined with electronic technology, have been used successfully to teach children with autism complex behavior chains. This study used photographic activity schedules on computer slideshow software to teach two children with autism to follow computer-mediated cues and engage in four play activities, and to transition between each activity in their homes without the presence of a trained behavior therapist. Results of this study demonstrated that these technologies can be utilized in children's homes to promote computer-mediated play behavior while eliminating the necessary cost of a home behavior therapist to prompt and supervise such activities.
130

Uma introdução à otimização não linear e a solução de problemas simétricos via ALGENCAN / An introduction to nonlinear optimization and the solution of symmetric problems through ALGENCAN

Penachi, Rian, 1989- 27 August 2018 (has links)
Orientador: Luis Felipe Cesar da Rocha Bueno / Dissertação (mestrado profissional) - Universidade Estadual de Campinas, Instituto de Matemática Estatística e Computação Científica / Made available in DSpace on 2018-08-27T11:37:25Z (GMT). No. of bitstreams: 1 Penachi_Rian_M.pdf: 10723936 bytes, checksum: ee5a52edf4287fdd199dc8efff4b5869 (MD5) Previous issue date: 2015 / Resumo: Este trabalho propõe uma abordagem didática acerca de otimização não linear irrestrita e com restrições de igualdade, assim como um guia para o leitor que necessita instalar e utilizar o software ALGENCAN. Prezando por explorar ideias intuitivas do tema, o texto foca em estudar, muitas vezes geometricamente, problemas irrestritos e problemas com restrições de igualdade. Para o caso sem restrições é enfatizada a relação entre métodos de otimização e métodos para zeros de sistemas não lineares, destacando o Método de Newton. Métodos do tipo Lagrangiano Aumentado são o enfoque principal, particularmente em ALGENCAN, que é uma de suas implementações mais bem estabelecidas na literatura. As dificuldades encontradas em métodos computacionais para resolver problemas simétricos de otimização não linear com restrições também são estudadas. São apresentados vários exemplos simples de como a simetria do problema afeta o bom desempenho do método e as alternativas para contornar estes obstáculos. Além do mais, testes mais completos usando a coleção CUTEst comprovam que o algoritmo modificado que introduzimos é, pelo menos, tão competitivo quanto a versão original de ALGENCAN / Abstract: This work proposes a didactic approach concerning nonlinear unconstrained optimization and nonlinear equality constrained optimization, as well as a guide for the readers who need to install and use the ALGENCAN software. Exploring intuitive ideas of the subject, the focus of the text is to study, often in a geometric way, unconstrained problems and problems with equality constraints. For the case of unconstrained problems, it will be emphasized the relationship between optimization methods and methods for nonlinear systems, highlighting the Newton's Method. The main focus will be on the Augmented Lagrangian Method, particularly on ALGENCAN, which is one of the most well-established implementations in the literature. The difficulties found in computational methods to solve symmetric problems of nonlinear constrained optimization will be also studied. It will be shown, through several simple examples, how the symmetry of the problem affects the good performance of the method and the alternatives to overcome these difficulties. Moreover, more complete tests using CUTEst will be done, which will confirm that the modified algorithm introduced by us is, at least, as efficient as the original version of ALGENCAN / Mestrado / Matematica Aplicada e Computacional / Mestre em Matemática Aplicada e Computacional

Page generated in 0.0698 seconds