• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 212
  • 25
  • 25
  • 12
  • 10
  • 8
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 359
  • 107
  • 60
  • 52
  • 48
  • 46
  • 41
  • 39
  • 38
  • 34
  • 32
  • 30
  • 28
  • 26
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Modernizing school communication systems : using text messaging to improve student academic performance /

Crisp, Matthew Scott. January 1900 (has links)
Thesis (Ph. D.)--Oregon State University, 2010. / Printout. Includes bibliographical references (leaves 141-144). Also available on the World Wide Web.
72

The significance of the available media and modes of communication at a television station /

White, Catherine Jane. January 2004 (has links)
Thesis (Ph. D.)--University of Washington, 2004. / Vita. Includes bibliographical references (leaves 192-200).
73

Effectiveness of traditional and web-based interventions on utilization of sport psychology services exploring the stages of change /

Zizzi, Samuel J. January 2000 (has links)
Thesis (Ed. D.)--West Virginia University, 2000. / Title from document title page. Document formatted into pages; contains vii, 93 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 56-62).
74

As soon as I'm famous

Elza, Stacey. January 1900 (has links)
Thesis (M.F.A.)--West Virginia University, 2007. / Title from document title page. Document formatted into pages; contains xi, 197 p. Includes abstract.
75

Detecting IP prefix hijack events using BGP activity and AS connectivity analysis

Alshamrani, Hussain Hameed January 2017 (has links)
The Border Gateway Protocol (BGP), the main component of core Internet connectivity, suffers vulnerability issues related to the impersonation of the ownership of IP prefixes for Autonomous Systems (ASes). In this context, a number of studies have focused on securing the BGP through several techniques, such as monitoring-based, historical-based and statistical-based behavioural models. In spite of the significant research undertaken, the proposed solutions cannot detect the IP prefix hijack accurately or even differentiate it from other types of attacks that could threaten the performance of the BGP. This research proposes three novel detection methods aimed at tracking the behaviour of BGP edge routers and detecting IP prefix hijacks based on statistical analysis of variance, the attack signature approach and a classification-based technique. The first detection method uses statistical analysis of variance to identify hijacking behaviour through the normal operation of routing information being exchanged among routers and their behaviour during the occurrence of IP prefix hijacking. However, this method failed to find any indication of IP prefix hijacking because of the difficulty of having raw BGP data hijacking-free. The research also proposes another detection method that parses BGP advertisements (announcements) and checks whether IP prefixes are announced or advertised by more than one AS. If so, events are selected for further validation using Regional Internet Registry (RIR) databases to determine whether the ASes announcing the prefixes are owned by the same organisation or different organisations. Advertisements for the same IP prefix made by ASes owned by different organisations are subsequently identified as hijacking events. The proposed algorithm of the detection method was validated using the 2008 YouTube Pakistan hijack event; the analysis demonstrates that the algorithm qualitatively increases the accuracy of detecting IP prefix hijacks. The algorithm is very accurate as long as the RIRs (Regional Internet Registries) are updated concurrently with hijacking detection. The detection method and can be integrated and work with BGP routers separately. Another detection method is proposed to detect IP prefix hijacking using a combination of signature-based (parsing-based) and classification-based techniques. The parsing technique is used as a pre-processing phase before the classification-based method. Some features are extracted based on the connectivity behaviour of the suspicious ASes given by the parsing technique. In other words, this detection method tracks the behaviour of the suspicious ASes and follows up with an analysis of their interaction with directly and indirectly connected neighbours based on a set of features extracted from the ASPATH information about the suspicious ASes. Before sending the extracted feature values to the best five classifiers that can work with the specifications of an implemented classification dataset, the detection method computes the similarity between benign and malicious behaviours to determine to what extent the classifiers can distinguish suspicious behaviour from benign behaviour and then detect the hijacking. Evaluation tests of the proposed algorithm demonstrated that the detection method was able to detect the hijacks with 96% accuracy and can be integrated and work with BGP routers separately.
76

Tailoring feedback and messages to encourage meat consumption reduction

Schnabelrauch Arndt, Chelsea A. January 1900 (has links)
Doctor of Philosophy / Department of Psychological Sciences / Laura A. Brannon / Though the research on vegetarianism and meat consumption reduction has dramatically increased over the last few decades, almost all of this research focuses on current vegetarians/meat reducers and non-vegetarians’ perceptions of vegetarianism (Boyle, 2007; Ruby, 2012). Research targeting non-vegetarians and attempting to influence their meat consumption is virtually non-existent. Thus, the intent of the present dissertation was to effectively decrease individuals’ meat consumption habits and alter individuals’ attitudes toward meat. As research has repeatedly found that messages that are tailored to an individual are more persuasive and effective at influencing health behaviors (Bull et al., 2001; Ryan & Lauver, 2002)) and attitudes (e.g., Murray-Johnson & Witte, 2003; Rimal & Adkins, 2003), the present dissertation specifically sought to determine the effectiveness of tailored meat consumption reduction feedback and messages to influence individuals’ intentions to consume meat and attitudes toward meat consumption. Specifically, this dissertation investigated the effectiveness of messages specific to individuals’ behavior (a behavioral feedback approach), messages oriented to individuals’ self-schemas, egoistic and altruistic oriented messages, and feedback/messages tailored to individuals’ values. Contrary to the hypotheses, the results of the present studies suggested that individuals’ willingness to reduce their meat consumption is not differentially affected by different types of feedback/messages; however, this lack of significant impact for tailored feedback/messages may due to various limitations that are discussed at length within the present dissertation. Despite the possible limitations of the studies conducted, the present dissertation has made significant contributions to the meat consumption reduction literature. The first of its kind, this dissertation importantly illustrates the importance of and need for research encouraging meat consumption reduction.
77

JMS communication : Communicating with a legacy JMS broker using JavaScript

Bylund, Patrick January 2017 (has links)
The objective of this thesis is to research how to use JavaScript to communicate with a legacy JMS broker, specifically OpenMQ 4.1 and implementing a proof- of-concept of this. This proof-of-concept should be able to send and receive JMS messages. The necessary preparations for designing this application was to research possible ways of communicating with different JMS brokers using oth- er languages than Java. This research showed that the only viable method in or- der to communicate with this version of OpenMQ is to create a Java bridge be- tween JavaScript and the JMS broker. The results shows that it's possible to use JavaScript to communicate with OpenMQ 4.1 by using a Java Bridge together with NodeJS. This result is performed by making an integration test, by first sending a message with a certain ID to the API and then receiving a response at the intended response destination with the same ID. The front-end of the proof- of-concept provides a web application UI for performing this integration test. Future improvements of this implementation can be done by extending the Java Bridge and API in such a way that it can be used against many different JMS brokers. The configuration data used can also be stored in more reliable ways, if multiple users are using the API and web application at the same time, for example by using a database instead of JSON files.
78

Let’s talk about Perfection : An investigating of how decorative techniques and non-decorative text can create a dialogue in garments, with the body as a billboard

Berner Wik, Tove January 2017 (has links)
This collection is an investigation of how decorative techniques and non-decorative text can create a dialogue in garments, with the body as a billboard. The work is based on two different aspects. The first one deals with the question of how people look at embellishments, and the second is the message aspect. The investigation wants to find out how we can communicate with the human body as a billboard and the topic of the communication is an idea about perfection. The writer’s dyslexia experiences are used as a recurs and gives the topic a new dimension. The work explores new ways to deal with embellishments, techniques and messages. It shows that the statement T-shirt is not the only perfect garment to decorate and that garments can communicate a message in more ways than with a flat print.
79

The role of e-mail messages in the chain of communication and use of language in e-mails among colleagues in a secondary school setting

Chan, Hok Kan Angela Pearl 01 January 2004 (has links)
No description available.
80

A comparative analysis of the views of master trainer and learners on HIV/AIDS messages

Mlambo, Gezephi Cordelia Constance 08 May 2013 (has links)
The purpose of the study was to investigate the views of master trainers for life skills and the views of secondary school learners concerning the information they receive on HIV/AIDS. Master trainers are educators who were identified by the Department of Education to train groups of people and learners in various schools about life skills. Life skills can be described as the adaptive and positive behaviour that enables individuals to deal effectively with the demands and challenges of everyday life. My assumption was that there may be a relationship between how the messages are communicated and understood and adolescent behaviour. There may also be factors that contribute to a lack of change in behaviour - despite the information disseminated on HIV/AIDS. To reach out to young South Africans with effective prevention programmes has become a key to slowing the rate of HIV infection and ensuring a stronger future for the country (UNAIDS, 2006). This is done through awareness programmes in school-based life skills education, which is part of the life orientation programme. Knowledge of the views would be important to all people involved in the battle against the pandemic and may benefit, particularly, those educators who have been assigned the special role of disseminating HIV prevention messages. Learners receive messages from different sources, such as media, peers, parents and educators in various institutions. The problem is that despite the knowledge acquired through various programmes, learners are still unwilling to translate that knowledge into positive behaviour (low risk sexual behaviour). Girls are still falling pregnant and, therefore, it is very important to look at the messages learners get and how they understand them as this may have an influence on their behaviour. This research has used a qualitative approach to collect and analyse data. Semi-structured interviews were used because to obtain rich descriptive data that helped the researcher to understand the participants’ construction of knowledge and social reality (Maree et al., 2009).Two master trainers from each of the three identified secondary schools were interviewed. Group interviews were used for and learners. The study was conducted in Barberton in the Ehlanzeni region of Mpumalanga. The data was collected using a tape-recorder. Permission and consent was sought and obtained to collect data in the schools that were involved in the study. The data was analysed and several themes were identified. The messages that the learners received from the Life Skills programmes were perceived in different ways. The different sources of knowledge concerning HIV/AIDS that the learners accessed at the time contained conflicting messages. More emphasis was placed on the debate around the use of condoms, while there were other issues that needed attention, such as decaying moral standards, lack of parental support, peer influence and material needs - all factors that lead to risky sexual behaviour in teenage learners. / Dissertation (MEd)--University of Pretoria, 2012. / Education Management and Policy Studies / unrestricted

Page generated in 0.0562 seconds