• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 250
  • 53
  • 50
  • 40
  • 28
  • 22
  • 21
  • 17
  • 12
  • 8
  • 6
  • 5
  • 4
  • 4
  • 3
  • Tagged with
  • 597
  • 100
  • 66
  • 58
  • 58
  • 56
  • 52
  • 51
  • 47
  • 47
  • 47
  • 45
  • 43
  • 41
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Theorizing Sonata Form from the Margins: The Keyboard Sonata in Eighteenth-Century Spain

Espinosa, Bryan Stevens 05 1900 (has links)
This study describes a set of salient formal norms for the eighteenth-century Spanish keyboard sonata through an application of Hepokoski and Darcy's sonata theory, William Caplin's form-functional theory, and Robert Gjerdingen's schema theory. It finds that particular thematic types, intra-thematic functions, and rhetorical markers characterize this repertoire. In order to trace the development of these norms throughout the eighteenth century, this work is organized into two parts. The first part (Chapters 2 and 3) examines the mid-century Spanish keyboard sonatas of Sebastián de Albero (1722–1756), Joaquín Ojinaga (1719–1789), and their contemporaries. The second part (Chapters 4 and 5) examines the late-century Spanish keyboard sonatas of Manuel Blasco de Nebra (1750–1783) and his contemporaries.
192

"Tänk om pappa ser att jag har målat naglarna?" : En kvalitativ intervjustudie med yrkesverksamma inom skola med syfte att undersöka machokultur / "What if dad sees that i have painted my nails?" : A qualitative interviewstudy with people working in school purposing to study macho culture

Evertsson, Agnes, Pihlkvist, Anton January 2023 (has links)
The following study aims to investigate the concept of macho culture among younger boys in schools. The paper examines the extent to which the concept can be seen as a problem and whether schools are working with the topic. The paper is presented inductively through qualitative data collection based on interview studies. Before that, two theories, hegemonic masculinity and the gender schema theory, which permeate the study's results and analysis. The interview study took place over the course of the thesis and involved eight different professional school counsellors in different municipalities. The data generated was then subjected to thematic analysis where four themes emerged: poor attitudes, difficulties with emotions, limited norms and working methods. The constructed themes are later presented in terms of results, but also as a discussion analysis to highlight the connection with selected theories and previous research. Conclusions relevant to the study include the recognition of macho culture as a problem in the schools where we conducted interviews, the problem of working methods, and the influence of norms and values from home. / Följande studie syftar till att undersöka begreppet machokultur bland yngre killar inom skolvärlden. Uppsatsen kommer att studera i vilken grad begreppet kan ses som ett problem och huruvida skolor arbetar runt ämnet. Genom att inhämta data kvalitativt med utgångspunkt i intervjustudier har uppsatsen framställts induktivt. Dessförinnan introduceras två teorier, den hegemoniska maskuliniteten och the gender schema theory som genomsyrar studiens resultat och analys. Intervjustudien har skett över tid under uppsatsens förlopp och har innefattat åtta olika yrkesverksamma skolkuratorer och skolsocionomer inom varierande kommuner. Den data som framställts har sedan genomgått en tematisk analys där fyra teman framträdde: dålig attityd, svårt med känslor, snäva normer och svårt att omsätta arbete i praktiken. De teman som konstruerats presenteras senare rent resultatmässigt men även som en diskussionsanalys för att belysa anknytning till valda teorier samt tidigare forskning. Slutsatser som ligger till vikt för studien är bland annat erkännandet av machokultur som ett problem på de skolor där vi utfört intervjuer, problematiken med arbetssätt samt präglandet av normer och värderingar hemifrån.
193

A Flexible Graph-Based Data Model Supporting Incremental Schema Design and Evolution

Braunschweig, Katrin, Thiele, Maik, Lehner, Wolfgang 26 January 2023 (has links)
Web data is characterized by a great structural diversity as well as frequent changes, which poses a great challenge for web applications based on that data. We want to address this problem by developing a schema-optional and flexible data model that supports the integration of heterogenous and volatile web data. Therefore, we want to rely on graph-based models that allow to incrementally extend the schema by various information and constraints. Inspired by the on-going web 2.0 trend, we want users to participate in the design and management of the schema. By incrementally adding structural information, users can enhance the schema to meet their very specific requirements.
194

OPEN—Enabling Non-expert Users to Extract, Integrate, and Analyze Open Data

Braunschweig, Katrin, Eberius, Julian, Thiele, Maik, Lehner, Wolfgang 27 January 2023 (has links)
Government initiatives for more transparency and participation have lead to an increasing amount of structured data on the web in recent years. Many of these datasets have great potential. For example, a situational analysis and meaningful visualization of the data can assist in pointing out social or economic issues and raising people’s awareness. Unfortunately, the ad-hoc analysis of this so-called Open Data can prove very complex and time-consuming, partly due to a lack of efficient system support.On the one hand, search functionality is required to identify relevant datasets. Common document retrieval techniques used in web search, however, are not optimized for Open Data and do not address the semantic ambiguity inherent in it. On the other hand, semantic integration is necessary to perform analysis tasks across multiple datasets. To do so in an ad-hoc fashion, however, requires more flexibility and easier integration than most data integration systems provide. It is apparent that an optimal management system for Open Data must combine aspects from both classic approaches. In this article, we propose OPEN, a novel concept for the management and situational analysis of Open Data within a single system. In our approach, we extend a classic database management system, adding support for the identification and dynamic integration of public datasets. As most web users lack the experience and training required to formulate structured queries in a DBMS, we add support for non-expert users to our system, for example though keyword queries. Furthermore, we address the challenge of indexing Open Data.
195

Set-Derivability of Multidimensional Aggregates

Albrecht, J., Günzel, H., Lehner, Wolfgang 12 January 2023 (has links)
A common optimization technique in data warehouse environments is the use of materialized aggregates. Aggregate processing becomes complex, if partitions of aggregates or queries are materialized and reused later. Most problematic are the implication problems regarding the restriction predicates. We show that in the presence of hierarchies in a multidimensional environment an efficient algorithm can be given to construct - or to derive - an aggregate from one or more overlapping materialized aggregate partitions (set-derivability).
196

Examining self-monitoring as a moderator of the effectiveness of social norms and self-schema matched messages for reducing binge drinking among college students

Miller, Megan Michelle January 1900 (has links)
Master of Science / Department of Psychology / Laura A. Brannon / Self-monitoring was examined as a moderator of the effectiveness of persuasive messages for reducing college student binge drinking. Low self-monitors tend to be influenced by their personal values and attitudes, while high self-monitors tend to be influenced by the behavior of those around them. Via a website simulation, college students were presented with one of three types of anti-binge drinking messages: a self-schema message, which highlighted how responsible drinking is consistent with the message recipient’s personal values and attitudes; a social norms message, which explained that most college students drink less than one might think they do; or a control message, which stated in general terms that people can experience a variety of problems from binge drinking. Overall intended drinking behavior in the self-schema message condition was almost identical to that of the social norms message condition, both of which were lower than drinking intentions in the control message condition. When presented with a self-schema matched message, low self-monitors intended to drink less alcohol than did high self-monitors, but these means were not significantly different. However, high self-monitors intended to drink significantly less than did low self-monitors when presented with a social norms message. The results suggest that self-schema matched messages may be effective at reducing binge drinking for most students, and that social norms messages may be equally as effective but only for high self-monitors.
197

'They are exactly as bank notes are' : perceptions and technologies of bank note forgery during the Bank Restriction Period, 1797-1821

Mockford, Jack January 2014 (has links)
Previous studies of Bank Note forgery in England during the Bank Restriction Period have adopted a highly institutional focus. Thus, much is known about the role played by both the Bank of England and the workings of the criminal justice system in combating both forgers and forged note utterers. The question of how the new system of small denomination Bank Notes impacted upon the day to day lives and understandings of the people that used them has received far less attention. The actual means by which Bank Notes were themselves forged has also been overlooked. This has led to a somewhat two-dimensional view of these notes as material objects. This thesis will engage with common mentalities and perceptions, seeking to write a 'new history from below' of both Bank Notes and their forgery in this period. Its primary aims will be to explore the question of why the English people were so easily imposed upon by forged Bank Notes; the various means by which forged notes could be constructed; and what an analysis of both of these points can tell us about economic and social understandings of non-elite people at this time. It will be argued that by studying instances in which small denomination Bank Notes were routinely exchanged, we can highlight a significant dichotomy of understanding in a society that was starting to engage with a new culture of promise based fiduciary paper money, yet was still deeply rooted in early-modern notions of paper instruments as objects of personal credit and debt. The thesis will show that heavy exposure to Bank Notes at this time clearly equipped some contemporaries with their own personalised sets of aesthetic and material "standards", against which the "goodness" of any monetary instrument with which they were presented would be compared. Others continued to examine the material aspect of Bank Notes via a direct comparison or consultation with others. Neither approach was always successful and indeed whatever method was adopted, the common occurrence of the materials and technologies required to construct a credible imitation of a Bank Note meant that it was not just illiterate persons that were susceptible to being deceived. Even a reading of the Bank Note's literate text failed to provide sufficient defence against the activities of the forger.
198

Systematic Analysis and Methodologies for Hardware Security

Moein, Samer 18 December 2015 (has links)
With the increase in globalization of Integrated Circuit (IC) design and production, hardware trojans have become a serious threat to manufacturers as well as consumers. These trojans could be intensionally or accidentally embedded in ICs to make a system vulnerable to hardware attacks. The implementation of critical applications using ICs makes the effect of trojans an even more serious problem. Moreover, the presence of untrusted foundries and designs cannot be eliminated since the need for ICs is growing exponentially and the use of third party software tools to design the circuits is now common. In addition if a trusted foundry for fabrication has to be developed, it involves a huge investment. Therefore, hardware trojan detection techniques are essential. Very Large Scale Integration (VLSI) system designers must now consider the security of a system against internal and external hardware attacks. Many hardware attacks rely on system vulnerabilities. Moreover, an attacker may rely on deprocessing and reverse engineering to study the internal structure of a system to reveal the system functionality in order to steal secret keys or copy the system. Thus hardware security is a major challenge for the hardware industry. Many hardware attack mitigation techniques have been proposed to help system designers build secure systems that can resist hardware attacks during the design stage, while others protect the system against attacks during operation. In this dissertation, the idea of quantifying hardware attacks, hardware trojans, and hardware trojan detection techniques is introduced. We analyze and classify hardware attacks into risk levels based on three dimensions Accessibility/Resources/Time (ART). We propose a methodology and algorithms to aid the attacker/defender to select/predict the hardware attacks that could use/threaten the system based on the attacker/defender capabilities. Because many of these attacks depends on hardware trojans embedded in the system, we propose a comprehensive hardware trojan classification based on hardware trojan attributes divided into eight categories. An adjacency matrix is generated based on the internal relationship between the attributes within a category and external relationship between attributes in different categories. We propose a methodology to generate a trojan life-cycle based on attributes determined by an attacker/defender to build/investigate a trojan. Trojan identification and severity are studied to provide a systematic way to compare trojans. Trojan detection identification and coverage is also studied to provide a systematic way to compare detection techniques and measure their e effectiveness related to trojan severity. We classify hardware attack mitigation techniques based on the hardware attack risk levels. Finally, we match these techniques to the attacks the could countermeasure to help defenders select appropriate techniques to protect their systems against potential hardware attacks. / Graduate / 0544 / 0984 / samerm@uvic.ca
199

Teenage Clumsiness: Does it exist?

2015 June 1900 (has links)
Adolescence is characterized by systematic and dramatic physical and behavioural changes, the most noticeable physical growth is the rapid increase in stature marked by peak height velocity (PHV). Anecdotally, many people are aware that as youth pass through their adolescent growth spurt there is a perceived period of physical awkwardness; however, there is no scientific agreement as to whether a period of awkwardness associated with the adolescent growth actually exists. Previous research has focused on the development of general motor performance or gross motor coordination. Increases in strength during adolescence may mask the effect of a stage of adolescent awkwardness on general motor performance tasks. To detect adolescent awkwardness it is necessary to measure either performance of skills that specifically do not depend on strength, or body awareness. The purpose of this study was to investigate whether female adolescents’ awareness of their body size and movement was influenced by biological maturation, and whether adolescent awkwardness could be detected in performance of sport specific skills independent of strength. An endpoint matching task was used to measure awareness of foot position in space by measuring the distance (mm) between a reference and matching endpoint position (endpoint matching error (EME)) with eyes either open or closed. The Johnson wall volley and a ball juggling task were used to measure soccer specific skill and coordination. Thirty six female youth soccer players, aged 10-14 years, were recruited. Age at PHV was predicted from measures of age, height, leg length and weight. Three groups were identified: pre-PHV (n=6), PHV (n=5) and post –PHV (n=25). Mean group differences were assessed using ANOVA. It was found that when the endpoint matching task was performed with eyes open there was no significant difference in mean EME between groups (p > 0.05). With eyes closed the PHV group performed worse than the pre-PHV and post-PHV groups. The Post-PHV group significantly (p < 0.05) decreased their EME (22.2 ± 13.9) compared to the PHV group (32.8 ± 17.6) but no difference was found with the Pre-PHV group (27.5 ± 15.7). On the wall volley test the Post-PHV group performed significantly (p < 0.05) better compared to the PHV group but not the Pre-PHV group. The Post-PHV group performed significantly (p < 0.05) better on the ball juggling task compared to both the Pre-PHV and the PHV groups. In conclusion, the results suggest that in the year around PHV body awareness, as measured by EME, may plateau or decrease and that soccer skill performance plateaus. This plateau or decrease in body awareness and soccer skills involving coordination is likely temporary; participants in this study who were > 6 months past PHV had significantly better body awareness and soccer skill performance than those participants who were within 6 months of PHV. The results from the endpoint matching task also indicate that a measure of body size and movement awareness has the potential to be used to measure changes in body awareness during the adolescent growth spurt. The results of this study suggest that teenage clumsiness could exists. However, a definitive study with larger maturity groups followed over time is required to confirm this statement.
200

La structuration sémantique des contenus des documents audiovisuels selon les points de vue de la production

Bui Thi, Minh Phung 26 June 2003 (has links) (PDF)
Dans le contexte des progrès sensibles en termes de technologies de l'information et de normes associées à la vidéo, notre travail propose des outils de description flexible et à forte teneur sémantique des contenus audiovisuels au niveau du plan – le PSDS (Production Shot Description Scheme) – orientés par l'approche sémiotique et selon les points de vue des professionnels de la production. Nous constatons que les contenus audio-visuels ont une triple dimension sémantique – la sémantique technique, la sémantique du monde narratif et la sémiotique – et chaque niveau a sa propre description ontologique. La sémiotique complète la sémantique technique et thématique du contenu de la vidéo en expliquant pour quelles raisons les structures dynamiques du texte filmique peuvent produire ces interprétations sémantiques. Mobilisant tant des techniques d'analyse automatiques des média que des modèles existants, des terminologies, des théories et des discours du monde de cinéma, cette approche peut offrir une traduction naturelle et simple entre les différents niveaux sémantiques. La description orientée-objet à multiples points de vue des contenus implique de mettre en évidence dans l'arbre ontologique les unités significatives du domaine et leurs caractéristiques. Ces unités constituent les informations fondamentales pour l'appréhension du sens du récit. Elles sont représentées par des concepts qui constituent un réseau sémantique où les utilisateurs peuvent naviguer à la recherche d'informations. Chaque concept est un noeud du réseau sémantique du domaine visé. Représentées ensuite selon le formalisme Mpeg-7 et XML Schema, les connaissances intégrées dans les schémas de description du plan de la vidéo peuvent servir de base à la construction d'environnements interactifs d'édition des images. La vidéo y devient un flux informationnel dont les données peuvent être balisées, annotées, analysées et éditées. Les métadonnées analysées dans notre travail, comprenant des informations relevant de trois étapes de la production (pré-production, production et post-production) doivent permettre aux applications de gérer et manipuler les objets de la vidéo, ainsi que les représentations de leur sémantique, afin de les réutiliser dans plusieurs offres d'accès telles que l'indexation du contenu, la recherche, le filtrage, l'analyse et l'appréhension des images du film.

Page generated in 0.0175 seconds