• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7
  • 1
  • 1
  • Tagged with
  • 12
  • 12
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Mediated chameleons: An integration of nonconscious behavioral mimicry and the parallel process model of nonverbal communication.

Beatty, Keturi D. 05 1900 (has links)
This study explored the state of art education in Turkey as revealed by pre-service art education university instructors, and the potential of incorporating visual culture studies in pre-service art education in Turkey. The instructors' ideas about visual culture, and popular culture, the impact it might have, the content (objects), and the practices within the context of Turkey were examined. Visual culture was examined from an art education perspective that focuses on a pedagogical approach that emphasizes the perception and critique of popular culture and everyday cultural experiences, and the analysis of media including television programs, computer games, Internet sites, and advertisements. A phenomenological human science approach was employed in order to develop a description of the perception of visual culture in pre-service art education in Turkey as lived by the participants. In-person interviews were used to collect the data from a purposive sample of 8 faculty members who offered undergraduate and graduate art education pedagogy, art history, and studio courses within four-year public universities. This empirical approach sought to obtain comprehensive descriptions of an experience through semi-structural interviews. These interviews employed open-ended questions to gather information about the following: their educational and professional background; their definitions of art education and art teacher education and what it means for them to teach pre-service art education; critical reflections on the educational system of Turkey; perceptions of visual and popular culture; and finally individual approaches to teaching art education. This study was conducted for the purpose of benefiting pre-service art teacher education in general and specifically in Turkey. It provided the rationale, the nature, and pedagogy of visual culture as well as the why and how of visual culture art education in the context of Turkey. Furthermore, it provided insights into the potential contribution of the concept of visual culture to the understanding of art and improvement of art teacher training in the context of Turkey.
2

The Co-Construction of Self-Talk and Illness Narratives: An HIV Intervention Case Study

Bueno, Yvette 20 March 2009 (has links)
This case study investigates the co-construction communication patterns that emerged during an Human Immunodeficiency Virus (HIV) intervention designed to reduce negative and critical self-talk. The transcripts of eight sequential acupressure and behavioral (SAB) counseling intervention sessions between a therapist and two medically nonadherent HIV-infected women were analyzed using Giorgi's (1989, 1994, 1997, 2006) phenomeonlogical method of inquiry. The analysis revealed three major themes: "assessing the present," "reviewing the past," and "forging the future," and eight subthemes: "safe atmosphere," "disclosure," "negotiating meaning," "releasing the past," "breaking the past-to-present pattern," "reducing uncertainty," "generating options," and "projecting images." Prior to the intervention sessions, the women reported experiencing negative and critical self-talk and inconsistent medication adherence. Self-talk and illness narrative modifications were evident within and across sessions as the therapist used sequential acupressure and behavioral counseling techniques. During the one month follow-up, the participants reported no experience of negative and critical self-talk and described actions taken toward goals discussed and imagined during the intervention such as medication adherence, exercise, and reenrollment in school. The co-construction themes that emerged in the intervention were consistent with findings in the comforting message literature with specific parallels to the factor analysis findings of Bippus (2001). This work lends support to comforting message research and suggests that distinctions between everyday comforting messages and chronic illness support strategies may be more similar than anticipated. Other study conclusions include clinical and practical implications for people working with HIV-infected individuals.
3

Scared Textless: The Influence of Sensation Seeking Tendencies and Need for Cognition on Texting while Driving Fear Appeals

Boenker, Madeline Lee 2011 August 1900 (has links)
Texting is ubiquitous; the International Association for the Wireless Telecommunications Industry reported that 4.1 billion text messages were sent per day in the first half of 2009. In isolation, texting does not injure individuals; however, when combined with driving, lives have changed for the worse. The National Safety Council estimates that 1.6 million crashes per year can be attributed to distracted drivers either talking on cell phones or texting while driving and nearly 28 percent of all crashes in the United States can be ascribed to these behaviors. An increasing number of texting while driving fear appeal campaigns are being utilized in the media. Therefore, the purpose of this research was to create and test theoretically-based messages aimed at discouraging texting while driving. Formative research along with the Extended Parallel Process Model was used for guidance in the creation of the fear appeal messages. No low threat message was used for the main study after repeated message validations failed. For the study, three high threat messages varied only by a single paragraph which targeted beliefs about benefits, mastery, and ubiquity of texting while driving. 155 undergraduates at Texas A & M University completed a pretest, read the high threat message, and answered a posttest. Need for cognition and sensation seeking tendencies were measured in order to understand the effects such personality traits have on message perceptions. Five major outcomes were revealed even though numerous hypotheses were unsupported. There was a significant interaction between perceived threat and sensation seeking tendencies on message realism. There was a significant interaction between perceived threat and need for cognition on message realism. There was a significant interaction between perceived threat and need for cognition on message accuracy. There was a significant interaction between perceived threat and need for cognition on attitudes. There was a significant positive correlation between perceived threat and perceived message sensation value. This project provides support that sensation seeking tendencies and need for cognition do interacted with perceived threat on perceptions of message effectiveness and that perceived message sensation value was positively related to perceived threat. Results also revealed the prevalence of texting while driving behavior and relationships between personality traits and texting while driving. Sensation seeking tendencies were positively correlated with initiating text messages while driving. Need for cognition was negatively correlated with reading and replying to text messages while driving.
4

A Study of the Performance Benefits of Controlling Parallel Asynochrous Iteractive Applications

Joseph, P J 09 1900 (has links)
High performance networks of workstation are becoming increasingly popular a parallel computing platform because of their lower cost. Both message passing and software distributed shared memory (DSM) programming paradigms have been developed and employed on such distributed hardware platforms. An important performance bottleneck in these systems is the effective data transmission latency, which is poorer than in high-speed parallel computer interconnection networks. Iterative algorithms are used in a large class of applications like solution of partial algorithms are used, optimization problems, solutions to systems of linear equations, and so on. These can be parallelized in a straight-forward fashion with cad1 node computing a part of the data set and also synchronizing and exchanging data with the other nodes as required. But these synchronous version perform poorly when message transmission delays are high, as is the case in network of workstations. The asynchronous parallel version of these algorithms provide an additional degree of freedom to address large data transmission latencies. These algorithms do not synchronize, and behave correctly in the presence of losses and delays in the propagation of updates. Thus, in shared memory systems they do not synchronize accesses to shared data and they will work correctly even in the presence of delays and losses in updates. This gives synchronous algorithms a performance advantage over their synchronous counterparts since synchronization costs are avoided and further computation can be overlapped with communication. The message generation rate of asynchronous algorithms is however greater than that of their synchronous counterparts. Uncontrolled asynchronous runs can create a large network load resulting in large queuing delays, which in turn can increase the message generation of the asynchronous algorithms. This is especially possible in lower bandwidth network like that in network of workstations. Such a positive feedback loop leads to unstable network conditions. Recent work has tried to improve the performance of asynchronous algorithms on a distributed shared memory (DSM) system by adaptively buffering shared memory updates depending on the network load, and transmitting multiple updates together. This reduces congestion and message transmission overhead, but could still result in slow convergence since nothing is guaranteed about, the update propagation delay. Also, although adaptive throttling of message will kick in once the network gets heavily loaded, it cannot, prevent the initial flooding. Furthermore, the processor is not freed when computation with the available values does not result in much further convergence. In this thesis we present an alternate method of controlling iterative methods and present performance results for the same. We propose a new system-supported blocking read primitive, termed Global Read that is guaranteed to return a value of acceptable age of the specified location in a DSM system. The main idea is to enforce an upper bound on the age of shared updates seen by a node in a manner visible to the underlying system (DSM). Information about processes being blocked can be used for adapting the underlying system, especially the network, towards better performance. A reading process is throttled until its Global-Read is satisfied, thus implementing program-level flow control and also freeing the processor. The Global-Read can also help in communication-based scheduling of, processes. Performance evaluation using a benchmark from Cray, on a network of workstations and on the IBM SP2 parallel computer, showed good performance improvements. We also present results of a systematic study wherein we implement parallel code for different iterative techniques for the solution of Lap lace equation wing PVM, anti characterize when controlled asynchrony work befit. We studied the improvements in computation time and analyzed the sources of this improvement, using various input and parallelism, on both IBM SP2 and a network of workstations. We find significant performance improvements for controlling asynchrony when the traffic generated by the asynchronous algorithm becomes more than what can be sustained by the network. But we found that the scalability of the applications is limited by the software overhead for messages. Systems which have reduced software overhead will show very good scalable performance for controlled asynchrony.
5

Man-Made Messages: Investigating the influence of health messaging on men's physical activity behaviours

HATCHELL, ALEXANDRA 31 August 2011 (has links)
Men engage in fewer health-promoting behaviours than women. Despite being more active than women, the majority of men are inactive. Physical activity (PA) decreases the risk of developing numerous chronic conditions and may be an optimal behaviour to target in men’s health interventions. However, informational resources and health-promotion interventions for men are lacking. To address this gap, we conducted two studies using the Extended Parallel Process Model (EPPM; Witte, 1992) as a guiding framework. Study 1 examined relevant and appealing health message content for men and explored the relevance and applicability of EPPM constructs to men’s health messages and PA messages in particular. Four semi-structured focus groups and four semi-structured telephone interviews were conducted. Participants (n=26) easily related to the EPPM constructs. Participants preferred demographically-tailored health messages that addressed modifiable behaviours (e.g. PA) and self-regulatory strategies (e.g. planning) and included reputable sources, strong language, and sex appeal. From these findings, four sets of PA messages with different combinations of risk and efficacy information were developed. Study 2 tested the effectiveness of these EPPM-based messages to increase men’s PA intentions and behaviours. Inactive participants (n=353) were randomly assigned to one of four message groups and read four health messages over four consecutive days. Intentions were assessed at baseline and the first follow-up (Day 5) while manipulation check items were assessed at Day 5. PA behaviour was assessed at baseline and the second follow-up (Day 14). Men who received low efficacy and risk information were less likely to meet the Canadian PA guidelines at Day 14 than men who only received low efficacy information (OR=2.15 95% CI:0.963-4.80, Wald=3.49, p=0.062). Providing risk information led to increases in PA behaviours (F(1, 157)=7.29, p=0.008, d=.22). Intentions to be active were greater in the high efficacy group than the low efficacy group (F(1, 345)=4.10, p=0.044, d=.21). Bivariate correlations indicated a disconnect between fear and efficacy perceptions, intentions, and defensive avoidance. From these collective findings, we provide insight into the EPPM as it relates to men’s PA behaviours, propose preliminary recommendations regarding the development of PA messages for men, and suggest areas for future research. / Thesis (Master, Kinesiology & Health Studies) -- Queen's University, 2011-08-30 17:32:12.392
6

The equivocation of codes

Schofield, Mark January 2018 (has links)
Equivocation was introduced by Shannon in the late 1940’s in seminal papers that kick-started the whole field of information theory. Much ground has been covered on equivocation’s counterpart, channel capacity and in particular, its bounds. However, less work has been carried out on the evaluation of the equivocation of a code transmitted across a channel. The aim of the work covered in this thesis was to use a probabilistic approach to investigate and compare the equivocation of various codes across a range of channels. The probability and entropy of each output, given each input, can be used to calculate the equivocation. This gives a measure of the ambiguity and secrecy of a code when transmitted across a channel. The calculations increase exponentially in magnitude as both the message length and code length increase. In addition, the impact of factors such as erasures and deletions also serve to significantly complicate the process. In order to improve the calculation times offered by a conventional, linearly-programmed approach, an alternative strategy involving parallel processing with a CUDA-enabled (Compute Unified Device Architecture) graphical processor was employed. This enabled results to be obtained for codes of greater length than was possible with linear programming. However, the practical implementation of a CUDA driven, parallel processed solution gave rise to significant issues with both the software implementation and subsequent platform stability. By normalising equivocation results, it was possible to compare different codes under different conditions, making it possible to identify and select codes that gave a marked difference in the equivocation encountered by a legitimate receiver and an eavesdropper. The introduction of code expansion provided a novel method for enhancing equivocation differences still further. The work on parallel processing to calculate equivocation and the use of code expansion was published in the following conference: Schofield, M., Ahmed, M. & Tomlinson, M. (2015), Using parallel processing to calculate and improve equivocation, in ’IEEE Conference Publications - IEEE 16th International Conference on Communication Technology’. In addition to the novel use of a CUDA-enabled graphics process to calculated equivocation, equivocation calculations were also performed for expanded versions of the codes. Code expansion was shown to yield a dramatic increase in the achievable equivocation levels. Once methods had been developed with the Binary Symmetric Channel (BSC), they were extended to include work with intentional erasures on the BSC, intentional deletions on the BSC and work on the Binary Erasure Channel (BEC). The work on equivocation on the BSC with intentional erasures was published in: Schofield, M. et al, (2016), Intentional erasures and equivocation on the binary symmetric channel, in ’IEEE Conference Publications - International Computer Symposium’, IEEE, pp 233-235. The work on the BEC produced a novel outcome due to the erasure correction process employed. As the probability of an erasure occurring increases, the set of likely decoded outcomes diminishes. This directly impacts the output entropy of the system by decreasing it, thereby also affecting the equivocation value of the system. This aspect was something that had not been encountered previously. The work also extended to the consideration of intentional deletions on the BSC and the Binary Deletion Channel (BDC) itself. Although the methods used struggled to cope with the additional complexity brought by deletions, the use of Varshamov-Tenengolts codes on the BSC with intentional deletions showed that family of codes to be well suited to the channel arrangement as well as having the capability to be extended to enable the correction of multiple deletions.
7

Toward Automatically Composed FPGA-Optimized Robotic Systems Using High-Level Synthesis

Lin, Szu-Wei 14 April 2023 (has links) (PDF)
Robotic systems are known to be computationally intensive. To improve performance, developers tend to implement custom robotic algorithms in hardware. However, a full robotic system typically consists of many interconnected algorithmic components that can easily max-out FPGA resources, thus requiring the designer to adjust each algorithm design for each new robotic systems in order to meet specific systems requirements and limited resources. Furthermore, manual development of digital circuitry using a hardware description language (HDL) such as verilog or VHDL, is error-prone, time consuming, and often takes months or years to develop and verify. Recent developments in high-level synthesis (HLS), enable automatic generation of digital circuit designs from high-level languages such as C or C++. In this thesis, we propose to develop a database of HLS-generated pareto-optimal hardware designs for various robotic algorithms, such that a fully automated process can optimally compose a complete robotic system given a set of system requirements. In the first part of this thesis, we take a first step towards this goal by developing a system for automatic selection of an Occupancy Grid Mapping (OGM) implementation given specific system requirements and resource thresholds. We first generate hundreds of possible hardware designs via Vitis HLS as we vary parameters to explore the designs space. We then present results which evaluate and explore trade-offs of these designs with respect to accuracy, latency, resource utilization, and power. Using these results, we create a software tool which is able to automatically select an optimal OGM implementation. After implementing selected designs on a PYNQ-Z2 FPGA board, our results show that the runtime of the algorithm improves by 35x over a C++-based implementation. In the second part of this thesis, we extend these same techniques to the Particle Filter (PF) algorithm by implementing 7 different resampling methods and varying parameters on hardware, again via HLS. In this case, we are able to explore and analyze thousands of PF designs. Our evaluation results show that runtime of the algorithm using Local Selection Resampling method reaches the fastest performance on an FPGA and can be as much as 10x faster than in C++. Finally, we build another design selection tool that automatically generates an optimal PF implementation from this design space for a given query set of requirements.
8

Injuries among individuals with pre-existing spinal cord injury: understanding injury patterns, burdens, and prevention

Heiden, Erin Ose 01 December 2013 (has links)
As a growing body of research has focused on the individual, social, and environmental factors that facilitate life after spinal cord injury (SCI), particular emphasis has been placed on health conditions that are modifiable and preventable. Subsequent injuries are a serious health problem for individuals with SCI. They are a direct threat to further morbidity and mortality, and are both a cause and consequence other secondary health conditions. As a first step toward understanding this public health problem, the purpose of this dissertation research was to describe the patterns, burdens, and prevention of subsequent injury among individuals with SCI. In three distinct, but related studies, this dissertation examined the characteristics of hospitalizations due to an injury among individuals with paraplegia, and compared the differences in length of stay (LOS) and hospital costs of injury hospitalizations between individuals with quadriplegia versus paraplegia. In addition, it explored the experience of subsequent injury among individuals with SCI who return to work and examined perceptions of threat and efficacy in preventing subsequent injury using the Extended Parallel Process Model. Using discharge level weighting available in the Nationwide Inpatient Sample, Study 1 calculated national estimates of injury hospitalizations for individuals with paraplegia by patient, hospital, and injury characteristics. Most injury hospitalizations occurred among males, to individuals 35-49 years, and were due to falls, poisonings, or motor vehicle traffic. With the same dataset, Study 2 used logistic regression to estimate the effect of patient characteristics on odds of hospitalized patients with quadriplegia versus paraplegia, and linear regression to estimate predicted differences in hospital costs for individuals with quadriplegia compared to paraplegia. Fewer injury hospitalizations but longer hospital stays, and higher hospital costs per discharge were found for individuals with quadriplegia compared to individuals with paraplegia. Males, younger age, and the uninsured were significant predictors of higher hospital costs. Finally, Study 3 used in-depth interviews to qualitatively explore the perceptions on subsequent injury among individuals with SCI who return to work, and found individuals with SCI who return to work recognized the importance of preventing subsequent injury, and were taking actions to prevent subsequent injury in their daily life and in the workplace. The significance of this research is that it is the first description of injury hospitalizations for all causes of injury by specific type of SCI, and the associated medical outcomes of LOS and direct medical costs. Prevention of subsequent injury should be a priority. The perceptions of individuals with SCI about the severity of and their susceptibility to injury and the efficacy of individual and environmental actions to prevent subsequent injury described in this research should be used to inform the development of interventions that prevent subsequent injury.
9

Blurring Safety Between Online and Offline Worlds: Archival, Correlational, and Experimental Evidence of Generalized Threat in the Digital Age

January 2017 (has links)
abstract: Decades of research in cyberpsychology and human-computer interaction has pointed to a strong distinction between the online and offline worlds, suggesting that attitudes and behaviors in one domain do not necessarily generalize to the other. However, as humans spend increasing amounts of time in the digital world, psychological understandings of safety may begin to influence human perceptions of threat while online. This dissertation therefore examines whether perceived threat generalizes between domains across archival, correlational, and experimental research methods. Four studies offer insight into the relationship between objective indicators of physical and online safety on the levels of nation and state; the relationship between perceptions of these forms of safety on the individual level; and whether experimental manipulations of one form of threat influence perceptions of threat in the opposite domain. In addition, this work explores the impact of threat perception-related personal and situational factors, as well as the impact of threat type (i.e., self-protection, resource), on this hypothesized relationship. Collectively, these studies evince a positive relationship between physical and online safety in macro-level actuality and individual-level perception. Among individuals, objective indicators of community safety—as measured by zip code crime data—were a positive reflection of perceptions of physical safety; these perceptions, in turn, mapped onto perceived online safety. The generalization between perceived physical threat and online threat was stronger after being exposed to self-protection threat manipulations, possibly underscoring the more dire nature of threats to bodily safety than those to valuable resources. Most notably, experimental findings suggest that it is not the physical that informs the digital, but rather the opposite: Online threats blur more readily into physical domains, possibly speaking to the concern that dangers specific to the digital world will bleed into the physical one. This generalization of threat may function as a strategy to prepare oneself for future dangers wherever they might appear; and indeed, perceived threat in either world positively influenced desires to act on recommended safety practices. Taken together, this research suggests that in the realm of threat perception, the boundaries between physical and digital are less rigid than may have been previously believed. / Dissertation/Thesis / Doctoral Dissertation Psychology 2017
10

Knowledge and skills required by supervisors in order to provide effective supervision for child and youth care workers in South Africa

Michael, Jacqueline Cecilia 09 September 2013 (has links)
Many child and youth care organisations in South Africa struggle to implement adequate supervision structures for their child and youth care workers. If supervisors in this field had adequate knowledge and skills, they could enable child and youth care workers to grow and develop competently and provide more professional services to troubled young people in South Africa, This qualitative research sought to identify what knowledge and skills supervisors need in child and youth care settings in South Africa to provide effective supervision to workers. This research confirmed that there are specific skills and knowledge required by supervisors in child and youth care settings in South Africa and while there is an awareness of these in some settings, they are not being fully utilised in organised supervision structures. / Social Work / M.Tech. (Child and Youth Care)

Page generated in 0.0799 seconds