• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 120
  • 13
  • 13
  • 11
  • 6
  • 5
  • 5
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 229
  • 55
  • 47
  • 44
  • 43
  • 41
  • 39
  • 28
  • 25
  • 22
  • 21
  • 20
  • 19
  • 19
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

An intelligent vehicle security system based on human behaviors modeling.

January 2006 (has links)
by Meng Xiaoning. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 99-106). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Motivation --- p.1 / Chapter 1.2 --- Overview --- p.2 / Chapter 1.3 --- Organization of the Thesis --- p.3 / Chapter 2 --- Related Research --- p.6 / Chapter 2.1 --- Information Technology in Cars --- p.6 / Chapter 2.2 --- Anti-theft Protection --- p.8 / Chapter 2.3 --- Learning Human Behaviors --- p.10 / Chapter 2.4 --- Neural Network Learning --- p.11 / Chapter 3 --- Experimental Design --- p.14 / Chapter 3.1 --- Overview --- p.14 / Chapter 3.2 --- Driving Simulation Subsystem --- p.14 / Chapter 3.3 --- Data Sensing and Capturing Subsystem --- p.15 / Chapter 3.4 --- Data Analysis Subsystem --- p.17 / Chapter 4 --- Data Preprocessing for Feature Selection --- p.23 / Chapter 4.1 --- Introduction --- p.23 / Chapter 4.2 --- Fast Fourier Transform --- p.23 / Chapter 4.3 --- Principal Component Analysis --- p.24 / Chapter 4.4 --- Independent Component Analysis --- p.26 / Chapter 5 --- Classification via Support Vector Machine --- p.28 / Chapter 5.1 --- Introduction --- p.28 / Chapter 5.1.1 --- Why Using Support Vector Machine --- p.28 / Chapter 5.1.2 --- Mathematic Description --- p.29 / Chapter 5.2 --- Problem Formulation --- p.31 / Chapter 5.3 --- Approach --- p.31 / Chapter 5.4 --- Experimental Results --- p.34 / Chapter 5.4.1 --- Preprocess Data Analysis --- p.34 / Chapter 5.4.2 --- Models Design --- p.37 / Chapter 5.5 --- Discussion --- p.44 / Chapter 6 --- Evaluation via Hidden Markov Model --- p.47 / Chapter 6.1 --- Introduction --- p.47 / Chapter 6.1.1 --- Why Using Hidden Markov Model --- p.48 / Chapter 6.1.2 --- Mathematic Description --- p.50 / Chapter 6.2 --- Problem Formulation --- p.51 / Chapter 6.3 --- Approach --- p.53 / Chapter 6.4 --- Experimental Results --- p.56 / Chapter 6.4.1 --- Model-to-model Measure --- p.56 / Chapter 6.4.2 --- Human-to-model Measure --- p.63 / Chapter 6.4.3 --- Parameters Optimization --- p.66 / Chapter 6.5 --- Discussion --- p.69 / Chapter 7 --- System Design and Implementation --- p.71 / Chapter 7.1 --- Introduction --- p.71 / Chapter 7.2 --- Hardware --- p.72 / Chapter 7.3 --- Software --- p.78 / Chapter 7.4 --- System Demonstration --- p.80 / Chapter 8 --- Conclusion and Future Work --- p.82 / Chapter 8.1 --- Contributions --- p.82 / Chapter 8.2 --- Future Work --- p.84 / Chapter A --- Hidden Markov Model Training --- p.87 / Chapter A.1 --- Forward-backward Algorithm --- p.87 / Chapter A.2 --- Baum-Welch Algorithm --- p.87 / Chapter B --- Human Driving Behavior Data --- p.90 / Chapter C --- Publications Resulted from the Study --- p.98
92

Mapping the Flow of Theft Endangered Goods in EU

Can Özberk, Bahattin January 2010 (has links)
Every country in world has opportunities for different type of productions and this leads compensation. According to this, International Trade has become very important in all countries worldwide for ages; it helps the developing of the country and contributes more convenient area for the citizens. It is because nations have to live with trading. In this manner, many agreements are signed to get efficient merchandising because international trade contains many risks like intervention, political, non-acceptance, credit, war and also uncontrollable events. European Union can be considered as an agreement since its fundamental principal is free movement of people and goods.Increasing of movement of these goods around the European Union is seen as “easy pickings” by crime groups and nowadays society is facing with this criminal behavior. That motivation causes many problems for supply chain and logistics. Transportation systems are being tried to adjust as more secured while opportunity to thefts attacks to goods are rising.The complexity of this problem is tried to be solved by good reporting of incidents, pointing out the hot spots or the hot products which are related to EU. It is obvious that there is lack of good reporting or coordinating.According to this thesis a lot of work can be done in order to get brief look for the theft endangered goods which are on road and dangerous zones for theft attacks at EU. This thesis will map out specific countries, cities and positions that are particularly exposed to theft attacks. (For example, Schiphol Airport is chosen as the hottest spot and its hottest products are electronic and music devices while many reports and statistical works are being observed.)
93

O game The Grand Theft Auto V como rede de letramentos: um estudo de caso

Oliveira, Vinícius Oliveira de 04 December 2015 (has links)
Submitted by Cristiane Chim (cristiane.chim@ucpel.edu.br) on 2016-12-14T12:34:17Z No. of bitstreams: 1 Vinícius dissertação biblioteca.pdf: 3547787 bytes, checksum: 9dac22034b8705d80dbecf81c82ae05a (MD5) / Made available in DSpace on 2016-12-14T12:34:17Z (GMT). No. of bitstreams: 1 Vinícius dissertação biblioteca.pdf: 3547787 bytes, checksum: 9dac22034b8705d80dbecf81c82ae05a (MD5) Previous issue date: 2015-12-04 / Conselho Nacional de Pesquisa e Desenvolvimento Científico e Tecnológico - CNPq# / #-2555911436985713659# / #600 / Being grounded in the consideration that games are texts (MAGNANI, 2008), Network Literacy (BUZATO, 2009, 2012a, 2012b, 2014) and sites of engagement (SCOLLON, 2001, NORRIS, 2004) my aim, in this dissertation, is analyzing the semiotic and discursive course of a subject that plays the game The Grand Theft Auto V. The reason for choosing is justified by two aspects: 1) It is an adult game that, in other words, needs many hours to be played, according to what Gee (2007) points out. 2) It deeply characterizes the cultural universe of the students, because this game has sold, according to the newzoo site, thirty four million copies in thirteen months since its release. This purpose is justified by the fact that, if we want to idealize proper schools and/or pedagogies for games, in the educational sphere, we have to, at first, analyze the complex discursive and semiotic process that characterize their playing. The theoretical background of this dissertation is divided into four chapters: 1) The state of art videogame studies. 2) Literacy: One theme and three turns. 3) Games and the produce of meaning. 4) Mediated Discourse Analysis. Methodologically, I use an online monitoring software called Open Broadcaster Software (OBS) in order to analyze all spaces that the subject goes while he is playing this game. This way to do ethnography is called Connective Ethnography (LEANDER e MCKIM, 2003; LEANDER E LOVORN, 2006), because it traces the person’s activity as online, as offline. Besides it, the questionnaire that was previously applied in order to analyze the subject’s profile. The results of this study showed that the analyzed subject had mobilized two different kinds of literacies: 1) Literacy in the web pages. 2) Literacies in the virtual world of the game. In these second kind of literacies, the analyzed subject used to assimilate the Discourses of the game that made the avatar become a killer, or a robber, for example. / Estando ancorado na consideração de que os games são ora textos (MAGNANI, 2008), ora Letramentos em Rede (BUZATO, 2009, 2012a,2012b, 2014), ora sítios de engajamento (SCOLLON, 2001, NORRIS, 2004), busco, nesta dissertação, analisar o percurso semiótico e discursivo de um sujeito que joga o game The Grand Theft Auto V. O motivo para escolher este jogo está justificado em dois aspectos principais: 1) Trata-se de um jogo adulto, ou seja, exige várias horas para ser praticado, conforme Gee (2007) aponta. 2) Caracteriza sobremaneira o universo cultural dos sujeitos que estão na escola, fato notado pelo marcante volume de vendas destacado pelo site newzoo – trinta e quatro milhões de cópias em treze meses desde seu lançamento. Essa proposta se justifica pelo fato de que, para pensarmos em escolas e/ou pedagogias, que sejam responsivas aos games, na esfera educacional, devemos, primeiramente, analisar os processos complexos, semióticos e discursivos que caracteriza seu jogar. O referencial teórico deste trabalho é dividido em quatro capítulos: 1) O estado da arte nos estudos de videogame. 2) Letramento: Um tema e três Viradas. 3) Games e produção de sentido. 4) Análise do Discurso Mediado. Metodologicamente, uso o software de monitoramento online Open Broadcaster Software (OBS) para analisar todos os espaços que o sujeito percorre enquanto joga o game. Essa forma de etnografia empregada é chamada de etnografia conectiva (LEANDER e MCKIM, 2003; LEANDER E LOVORN, 2006), pois rastreia a atividade do sujeito, tanto online, quanto off-line. Soma-se a isso o questionário previamente aplicado, cujo objetivo era analisar o perfil do sujeito. Os resultados desse percurso revelaram que o sujeito analisado mobilizou dois tipos diferentes de letramentos: 1) Letramentos em páginas da web. 2) Letramentos no mundo virtual do game. Nesses últimos letramentos, o analisado acabava assimilando os Discursos do game que, ora revelavam o avatar do jogador como um matador, ora o revelavam como um ladrão, por exemplo.
94

An Exploratory Look at Thefts from Construction Sites

Shrestha, Joseph, Osborne, Dustin Lee 10 April 2019 (has links)
Theft of construction equipment, materials, and tools from construction sites results in approximately one billion dollars in direct annual losses to the U.S. construction industry per year. A better understanding of theft characteristics is vital to reducing this figure. This study analyzes over 15,000 incidents from the National Incident-Based Reporting System (NIBRS) to understand characteristics such as theft prevalence, average monetary losses, and recovery rates. The study finds that contractors lost an average of about $6,000 per incident. Trucks are the most expensive theft targets, with an average loss of about $42,000 per incident, and also the most likely item to be recovered (55% of the time). However, recovery rate across all targets was less than 7%. The results of this study provide the most accurate and extensive statistics to date on construction theft characteristics. The study also identifies best practices to reduce thefts such as the use of survellience systems. Further, the use of advanced marking and tracking systems to safeguard expensive equipment and vehicles and aid their recoveries are discussed. The findings are expected to aid contractors and law enforcement agencies in formulating methods for reducing thefts of construction items and improving the likelihood of their recoveries.
95

Identifying Business Risk Factors of Identity Theft

Minniti, Robert K. 01 January 2016 (has links)
Businesses are under pressure to identify and control risks affecting profitability, including the risk of fraud. Identity theft, a type of fraud, costs businesses, governments, and individuals in excess of $56 billion a year. In order to develop good internal controls to help prevent and detect fraud, it is necessary to identify the risks to the business, but business owners are not always aware of what risk factors relate to identity theft. A nonexperimental research design formed the basis of this research study. The population for this study was data from all 50 U.S. states, represented via government databases maintained by the Federal Trade Commission, the U.S. Census Bureau, and the Department of Labor from all 50 U.S. states from 2008 until 2014. The fraud triangle theory formed the theoretical framework for this study. Regression analysis determined the significance of relationships between state-specific instances of international immigration, state-specific unemployment rates, and state-specific instances of identity theft. Both state-specific instances of international immigration and state-specific unemployment rates demonstrated a significant and positive relationship with instances of identity theft. The implications for positive social change include improved understanding of risk factors for identity theft, which could lead to lower costs of operation for businesses and lower prices for consumers.
96

Leadership Strategies to Reduce Occupational Fraud in Banking

Edwards, Vincent Dewayne 01 January 2019 (has links)
Banks are in a precarious position due to increasing corporate losses from prolonged instances of employee-driven occupational fraud. The purpose of this single case study was to explore the leadership strategies some bank leaders used to reduce corporate losses from occupational fraud. The fraud triangle theory was the conceptual framework for this study. Data collection consisted of semistructured interviews with 11 bank managers at various levels within the bank, and a focus group session with 8 frontline managers. Data were analyzed using Yin's 5-step data analysis process, which entailed descriptive coding and sequential review of the interview transcripts. Member checks and interviewing until data saturation occurred helped to ensure the trustworthiness of the findings. Six themes emerged as the key study findings: effective communication, leading by example, empowerment, incentivizing, engendering trust, and personal integrity. Managers use of strategies incorporating these themes helped to improve employees' commitment to achieving their organization's corporate vision and establishing a sense of ownership whereby the employees would better protect and value organizational assets. The board of directors, senior managers, and frontline managers could all apply the strategies, thus reducing the likelihood of occupational fraud. Application of the study findings could contribute to social change by enabling bank leaders to create a positive organizational environment in which their employees make better choices to behave ethically, demonstrate financial responsibility with regards to corporate assets, and become principle agents of the organization.
97

Leadership Style and the Link with Counterproductive Work Behavior (CWB): An Investigation Using the Job-Stress/CWB Model

Bruursema, Kari 13 December 2004 (has links)
Relations among job stressors, leadership style, emotional reactions to work,counterproductive work behavior (CWB), and autonomy were investigated. Participants representing a wide variety of jobs were surveyed. Results indicate that transactional leadership style is related to negative emotions and occurrence of CWB. Relationships between variables were mediated by emotions.
98

Detecting SSH identity theft in HPC cluster environments using Self-organizing maps

Leufvén, Claes January 2006 (has links)
<p>Many of the attacks on computing clusters and grids have been performed by using stolen authentication passwords and unprotected SSH keys, therefore there is a need for a system that can detect intruders masquerading as ordinary users. Our assumption is that an attacker behaves significantly different compared to an ordinary user. Previous work in this area is for example statistical analysis of process accounting using Support Vector Machines. We can formalize this into a classification problem that we will solve with Self-organizing maps. The proposed system will work in a tier model that uses process accounting and SSH log messages as data sources.</p>
99

Using Web bugs and honeytokens to investigate the source of phishing attacks

McRae, Craig Michael, January 2008 (has links)
Thesis (M.S.)--Mississippi State University. Department of Computer Science and Engineering. / Title from title screen. Includes bibliographical references.
100

The Walls Are Closing In: Comparing Property Crime Victimization Risk In Gated And Non-Gated Communities

Branic, Nicholas 01 January 2012 (has links)
In recent years, a growing proportion of the population has moved into gated communities in response to an increasingly pandemic fear of crime. While a sizable body of research has addressed fear of crime and perceived safety in gated communities, few studies have investigated actual rates of victimization. The studies that do compare victimization in gated and non-gated communities tend to be localized assessments and present mixed findings on the effectiveness of community gating as a form of protection from crime. The present study utilizes a cross-section of National Crime Victimization Survey data to investigate the micro-level effects of living in gated communities across the United States. Additionally, a routine activities approach is used to determine whether increasing levels of guardianship exhibit differential effects in gated versus non-gated communities. Findings from logit and rare events logit regression analyses generally suggest that living in a gated community does not significantly influence the likelihood of victimization, although in some cases the odds either increased or decreased. Other measures of guardianship exhibit a variety of positive and negative effects on victimization likelihood. Suggestions for future research on gated communities and victimization include more comprehensive measurement of community- and household-level security as well as taking account of community characteristics such as informal social control and residential solidarity. Policy implications from this research include greater attention to gated community design and layout in order to reduce the likelihood of residents being victimized. In addition, residents may benefit from education on the actual risks of crime and realistic steps to reduce the likelihood of being targeted by potential offenders.

Page generated in 0.0448 seconds