• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 13
  • 8
  • 7
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 97
  • 28
  • 26
  • 21
  • 13
  • 12
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The Effects of Picture and Word Presentations on Recognition and Memory Accuracy in Autism Spectrum Disorder

Borlase, Megan Alana January 2011 (has links)
The purpose of the present study was to investigate the false memory rates for word and picture Deese-Roediger-McDermott (DRM) lists in children, adolescents and adults with autism spectrum disorder (ASD). Deese (1959), Roediger and McDermott (1995) developed the DRM paradigm as a method for testing the effects of semantic intrusion on the creation of false recollections. This method is used in the current thesis to test false memory in participants with Autism Spectrum Disorder (ASD), a disorder characterised by social, language and behavioural deficits. False memory studies of adults with this disorder have had conflicting results and found ASD participants have lower or similar false memory rates to controls. Experiment 1 compared false memory rates in 11 children, 11 adolescents and 5 adults with ASD to 15 children, 11 adolescents and 7 adult controls. ASD participants had higher false critical lure rates and lower studied item recognition rates than controls regardless of age. Adolescents had higher false and studied memory than children while adults had higher studied but lower false recognition rates than the younger groups. Due to the use of short DRM lists the adult participants recognised the fewest critical lures. In Experiment 2 there were 6 ASD children and 9 ASD adolescents compared with 6 control children and 9 control adolescents who were all tested both individually and in collaborative trios. Collaboration was beneficial to ASD adolescents and control children and adolescents by reducing false recognition and increasing studied item recognition. Collaboration was more beneficial for ASD adolescents and control children in the correct rejection of critical lures and for control adolescents in the recognition of studied items possibly due to decision making techniques. Critical lure recognition did not vary between collaborative trios and individuals and studied item recognition was decreased by collaboration in the ASD children. The observed decision making techniques employed revealed a clear pattern in social development and suggest ASD adolescents, but not ASD children, would benefit from group work. Overall the findings of this study, when taken into context with previous DRM studies, suggest that ASD participants have a delay in their social development and in the development of their association networks.
22

Περιγραφή και ανάλυση IP TV / IP TV overview and analysis

Φούκος, Γιώργος, Βλάχος, Βασίλης 13 September 2011 (has links)
Το αντικείμενο της παρούσας διπλωματικής εργασίας είναι η περιγραφή και ανάλυση συστημάτων IP TV. Στο 1ο κεφάλαιο παρατίθεται ο ορισμός του IP TV και γίνεται αναφορά στην διαφορά του από το internet TV. Στη συνέχεια παρουσιάζεται η υποδομής ενός IP TV δικτύου, οι εφαρμογές του και οι υπηρεσίες που αυτό μπορεί να παρέχει στους χρήστες. Κατόπιν περιγράφονται τα πλεονεκτήματα της ψηφιακής μετάδοσης σήματος και αναλύονται τα μοντέλα συνεργασίας και διαχείρισης περιεχομένου. Στο 2ο κεφάλαιο εμβαθύνουμε στα ευρυζωνικά δίκτυα και στη διανομή του IP TV και πως αυτή επιτυγχάνεται μέσω διαφόρων τεχνολογιών που εφαρμόζονται σήμερα (πιο συγκεκριμένα το ADSL). Ταυτόχρονα επεξηγούνται οι τεχνολογίες του δικτύου πυρήνα που ακολουθούνται από τους παρόχους και αφορούν - κατά το μεγαλύτερο μέρος τους - στα ενσύρματα δίκτυα καθώς και ποιοί παράγοντες αυτών επηρεάζουν το IP TV. Στο 3ο κεφάλαιο ακολουθεί λεπτομερής τεχνική περιγραφή και ανάλυση των συστημάτων IP TV, των υπηρεσιών τύπου Broadcast και των διαδραστικών υπηρεσιών video κατ’ απαίτηση του συνδρομητή. Εξειδικεύονται τα επιμέρους τμήματα ενός ολοκληρωμένου IP TV συστήματος, παρουσιάζεται το πώς αυτά αλληλεπιδρούν μεταξύ τους αλλά και με το σύνολο του δικτύου. Αναλύεται το δίκτυο ασφαλείας που απαραιτήτως δημιουργείται για να είναι δυνατή η λειτουργία αυτών των συστημάτων και οι τρόποι μετάδοσης του περιεχομένου. Επιπρόσθετα περιγράφεται η τεχνολογία multicasting σε IP TV δίκτυο και η αρχιτεκτονική που απαιτείται για να επιτευχθεί. Στο 4ο κεφάλαιο δίνεται ιδιαίτερη έμφαση στις τεχνικές ασφαλείας που εφαρμόζονται και ειδικότερα στα IP TV Conditional Access και στα συστήματα DRM. Αναλύεται το πώς αυτά υλοποιούνται σε επίπεδο hardware και σε επίπεδο software (λογισμικού) και παρουσιάζονται οι τεχνικές κρυπτογράφησης που ακολουθούνται. Γίνεται αναφορά υβριδικών τέτοιων συστημάτων που περικλείουν μέρος και των 2 προαναφερθέντων τεχνικών και μελετώνται τα συστήματα DRM και πως αυτά υλοποιούνται. Η σημαντική εφαρμογή των IP TV συστημάτων, video on demand (χρήση βίντεο υπηρεσίας κατ’ απαίτηση του χρήστη) αναλύεται στο 5ο κεφάλαιο. Αυτό το κεφάλαιο έχει αφιερωθεί στην συγκεκριμένη υπηρεσία, στο πώς αυτή είναι διαθέσιμη σήμερα εμπορικά, πως κατέστη δυνατή η υλοποίηση της τεχνικά, τα πρωτόκολλα που χρησιμοποιούνται στα εν λόγω δίκτυα. Τέλος (6ο και 7ο κεφάλαιο) παρουσιάζονται λύσεις από παρόχους που δραστηριοποιούνται στον Ελλαδικό χώρο (για τους οποίους υπήρχε διαθέσιμη πληροφορία) και στο 8ο κεφάλαιο παρουσιάζονται οι τεχνικές απαιτήσεις για την υπηρεσία IP TV. / --
23

Design support for eco-efficiency improvements in manufacturing

Litos, Lampros January 2016 (has links)
Eco-efficiency improvements in manufacturing is a controversial subject for researchers, practitioners as well as policy makers. The widely accepted definition of "doing more with less" is not accurate enough to guide the design of improvements that can deliver products in a sustainable way. The outcome of these challenges is evident through significant environmental performance variations across various levels of manufacturing operations. The study is driven by the complexity of manufacturing systems and sought to offer design support for practitioners that aim to improve eco-efficiency. A maturity model has been developed in this work that simulates the influence of manufacturing practices on eco-efficiency. The model takes the form of a maturity grid (PMGE) that overlooks practices at process, management systems and top-management levels and incorporates 15 dimensions of performance overall. Evidence shows that practices tend to evolve from reactive to proactive as manufacturing systems mature and embrace eco- efficiency as a systemic property. It was also found that mature companies achieve improvements in energy and resources by relying on existing internal capabilities. Tools to facilitate research and intervene with practitioners in real-life problems were developed and tested. The researcher combined research findings and tools into a maturity-based method (PMGEM) for eco-efficiency improvements. The method intends to help practitioners plan and design eco- efficiency improvements aligned to existing internal capabilities and adopt a more proactive behaviour to environmental challenges. PMGEM was ultimately applied in two case studies with ultimate goal to help practitioners resolve real-life challenges. The applications were positively commented and encourage further work in this field. The researcher envisages that methods such as PMGEM are deeply needed in manufacturing to support practitioners approach complex concepts such as eco-efficiency. Simplification and decomposition techniques with a clear intended use can facilitate the implementation of ambitious improvement strategies for sustainable development.
24

Digital Rights Management on an IP-based set-top box / Digital Rights Managemnet för en IP-baserad set-top box

Hallbäck, Erik January 2005 (has links)
Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed. This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
25

Digital rights management of audio distribution in mobile networks

Löytynoja, M. (Mikko) 05 December 2008 (has links)
Abstract Nowadays, content is increasingly in digital form and distributed in the Internet. The ease of making perfect copies of the digital content has created a need to develop a means to protect it. Digital rights management (DRM) relates to systems designed to protect the intellectual property rights of the digital content. The DRM systems try to enable a secure distribution of digital content to the users and to prevent the unauthorized copying, usage, and distribution of the content. This is usually done in practice using encryption and digital watermarking techniques. This thesis concentrates on the problem of protecting and distributing multimedia content securely in mobile environment. The research objectives are: (1) to design an overall DRM architecture which allows an easy content distribution to the user in mobile environment; (2) to develop protection methods that can be used in mobile devices with limited computational capabilities to prevent unauthorized usage of the audio content; (3) to create methods for managing and enforcing the user’s rights and restrictions to the content usage; (4) to study a method for providing the users with an easy access to new digital content and services. The research is carried out by first developing an overall DRM platform to mobile environment. The experimental prototype of the platform is implemented on server side to PC environment and the client runs on a mobile phone. The platform is used to test the functionality and complexity of the content protection methods developed which are based on digital watermarking and encryption techniques. The main results of the thesis are: (1) a DRM platform for mobile devices that supports peer-to-peer networking and license negotiation; (2) audio protection methods utilizing digital watermarking and encryption techniques which support content superdistribution and content preview; (3) methods for counting offline how many times content has been played on the user’s terminal using watermarking and hash chains; (4) a method for adding metadata, such as a web link, into audio content, so that it survives digital to analog to digital transformation and recording with a mobile phone.
26

Innovation inom Digital Rights Management / Innovation within Digital Rights Management

Agushi, Camrie January 2005 (has links)
The thesis deals with the topic of Digital Rights Management (DRM), more specifically the innovation trends within DRM. It is focused on three driving forces of DRM. Firstly, DRM technologies, secondly, DRM standards and thirdly, DRM interoperability. These driving forces are discussed and analyzed in order to explore innovation trends within DRM. In the end, a multi-facetted overview of today’s DRM context is formed. One conclusion is that the aspect of Intellectual Property Rights is considered to be an important indicator of the direction DRM innovation is heading. / Uppsatsen behandlar ämnet Digital Rights Management (DRM), mer specifikt innovationstrenderna inom DRM. Fokus är på tre drivkrafter i DRM. För det första, DRM teknologier, för det andra, DRM standarder, och för det tredje, DRM interoperabilitet. Dessa drivkrafter diskuteras och analyseras för att kunna utforska innovationstrenderna inom DRM. Avslutningsvis formas en multifacetterad översikt av dagens DRM-kontext. En slutsats är att aspekten av Intellectual Property Rights anses vara en viktig indikator av den riktning som DRM innovationen går mot.
27

Le droit à l'interopérabilité : études de droit de la consommation / The right to interoperability : study of consume law

Duponchelle, Marie 09 April 2015 (has links)
L'interopérabilité devrait être officiellement reconnue, aujourd'hui, comme un droit du consommateur : elle répond à ses besoins de maîtriser ses données, ainsi que d'interconnecter ses outils numériques. Ce droit devrait être opposable aux sujets passifs que sont les éditeurs de logiciels et de contenus numériques. Cependant, le corpus juridique actuel, comprenant essentiellement une obligation d'information précontractuelle et une obligation de ne pas faire obstacle à l'interopérabilité, ne permet pas la mise en œuvre effective de ce droit. Il semble donc nécessaire de formuler des propositions de révision des textes existants, dans la préservation d'un équilibre avec la protection du droit d'auteur et des droits voisins. En premier lieu, s'agissant de l'obligation d'information, les modifications doivent viser à la systématisation de l'information précontractuelle relativement à l'interopérabilité logicielle, à la charge des sujets passifs du droit. En second lieu, s'agissant de l'obligation de ne pas faire obstacle à l'interopérabilité, les propositions doivent avoir pour objet l'instauration d'une réelle obligation de faire, relativement à la mise en œuvre de l'interopérabilité, ce selon deux axes : une obligation de recourir à un format ouvert et non protégé de données ; l'établissement d'une responsabilité de plein droit concernant cette obligation de mise en œuvre effective de l'interopérabilité. / Today, interoperability should be formally recognized as a consumers' right: it meets their needs to control their data, and to interconnect their digital tools. This right should be enforceable against publishers of software and digital contents, considered as passive subjects. However, the current legal corpus, which actually only comprises a pre-contractual information requirement and an obligation not to obstruct interoperability, does not allow for an effective implementation of this right. It therefore seems necessary to make proposals for the revision of existing texts, which would preserve a balance with the protection of copyright and related rights. First, with regard to the information requirement, the changes should be aimed at a systematization of pre-contractual information regarding software interoperability, implemented by the passive subjects of law. Second, with regard to the obligation not to obstruct interoperability, proposals must aim at the establishment of a real obligation to act, with respect to the implementation of interoperability, in two ways : a requirement to use open and unprotected data formats ; the establishment of a strict liability to ensure an effective implementation of interoperability.
28

Analýza trhu s elektronickými knihami / Analysis of eBooks Market

Nováková, Marie January 2013 (has links)
The presented thesis analyzes the eBook market. The aim of the thesis is to establish the optimal way of pricing electronic books. The most important entities of book markets are defined, and the utmost stress is put on changes in the entities' role that have been brought about by the coming of eBooks. The thesis is not only limited to the model of sales of eBooks, but also discussed are alternative business models based on the eBook as an object of monetization. The conclusion of the thesis summarizes the findings, and introduces possible trends in the development of the described subject.
29

The Effects of Blocked and Random Word Lists on the Production of False Memories

Williams, Melonie 01 January 2007 (has links) (PDF)
This study separated participants into four different conditions based on a 2 (blocked or random study trials) x 2 (blocked or random test trials) between-subjects design. Using the Deese-Roediger-McDermott (DRM) paradigm the researcher investigated whether or not false memories were produced at the time of study or the time of test. According to the paradigm, participants who view a series of categorical words (mad, fear, hate, rage, temper) are thought to semantically associate critical lures (anger), as a part of the list presented, more frequently than participants who see a string of unrelated terms. The production of false memory is commonly accredited to the priming effect and the relationships among categorical terms. The current study explored whether manipulating blocked versus random word lists had an effect on false memory rates and further examined the conditions under which false memories are produced, in order to gain a better understanding of the phenomenon. Participants' responses were assessed based on their recall under either blocked or random conditions in both the study and test phases. Using measures of recognition and reaction time (RT), the results indicate that false memories are created primarily during original study and not during · the test of recognition. However, although the highest rates of false memories occurred during the blocked-study condition, the fastest reaction times for false memories were seen during blocked-test. These findings can contribute to the theoretical understanding of the origin of false memory. After comparing false memory rates and reaction times, concluding whether or not the mind exclusively produces these memories during the encoding process has yet to be determined.
30

PEER TO PEER DIGITAL RIGHTS MANAGEMENT USING BLOCKCHAIN

Rinaldi, James 01 January 2018 (has links) (PDF)
Content distribution networks deliver content like videos, apps, and music to users through servers deployed in multiple datacenters to increase availability and delivery speed of content. The motivation of this work is to create a content distribution network that maintains a consumer’s rights and access to works they have purchased indefinitely. If a user purchases content from a traditional content distribution network, they lose access to the content when the service is no longer available. The system uses a peer to peer network for content distribution along with a blockchain for digital rights management. This combination may give users indefinite access to purchased works. The system benefits content rights owners because they can sell their content in a lower cost manner by distributing costs among the community of peers.

Page generated in 0.038 seconds