171 |
Time Windows for Indexing Language Comprehension in Adults With and Without AphasiaHassan, Fatimah Hani B. January 2012 (has links)
No description available.
|
172 |
Fundamentals and Application of Large Area Dielectrowetting Optical ShuttersRussell, Ann C. January 2014 (has links)
No description available.
|
173 |
Development of a PC software package using windows 95 and visual C++ to evaluate traffic safety improvements based upon accidents per unit timeYu, Kuan Tao January 1996 (has links)
No description available.
|
174 |
Windows and Mirrors: A Collection of Personal EssaysBaker, Holly T. 20 July 2010 (has links)
No description available.
|
175 |
Thermal energy conservation with draperies and a plastic window liner /Sloan, Donna Lucille January 1984 (has links)
No description available.
|
176 |
An experimental investigation of glass breakage in compartment firesSkelly, Michael J. 25 April 2009 (has links)
An experimental investigation has been completed which studied the breaking of window glass by fire. The experiments were carried out in a specially designed compartment to achieve two-layer flows characteristic of normal building fires. The experimental data was collected from two test groups: the first for windows with their edges insulated from the fire (edge-protected) and the second for windows uniformly heated by the fire (edge-unprotected).
The results of the edge-protected window tests indicated that the glass breakage was caused by a critical temperature difference between the central heated portion of the pane and the glass edge. The experimental work showed the critical value to be approximately 90C. After the material properties of the glass were determined, the theoretical findings of Keski-Rahkonen were used to obtain a value of 70C; the difference attributed to radiative heating. The test results also demonstrated a distinctive loss of integrity by the windows. When breakage occurred, the cracks spread throughout the glass, joined together and caused at least partial collapse of the pane.
The results from the edge-unprotected window tests were quite different. There were relatively few cracks developed and almost no propagation across the glass. Consequently, there was no window collapse in any of these cases. The breakage did initiate at a consistent glass temperature value, however, the mechanism for these tests is not known. / Master of Science
|
177 |
A Network Measurement Tool for Handheld DevicesTan, SiewYeen Agnes 04 June 2003 (has links)
This thesis describes a performance measurement tool that allows a user to measure network performance using a handheld device. The measurement tool consists of a client program that runs on a Microsoft Pocket PC device and a server program that runs on a regular Microsoft Windows computer. Both programs are Windows applications implemented in C/C++ using the Microsoft Embedded Visual Tool and Microsoft Visual Studio. The use of a Pocket PC device provides mobility to users, which can save time and energy when performing experiments. The thesis describes the design of the performance measurement application, implementation issues, and tests conducted using the tool. / Master of Science
|
178 |
The life cycle of a technological innovation: a theoretical overview and a cross-site case studyBlunt, Rockie January 2004 (has links)
Thesis (Ed.D.)--Boston University / PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you. / This dissertation studied the implementation of Outlook 98, Microsoft's desktop information management software, at Saybrook University and Bancroft Valley Bank (fictitious names). The major research question was, What does the life cycle of Outlook 98 at Saybrook University and Bancroft National Bank tell us about the pattern of implementation at these two sites, and what roles do users' "technological frames" play in each site's implementation process?
Employing a qualitative methodology and a conceptual framework based on Wanda Orlikowski's works on "technological frames" (nature of technology, technology strategy and technology in use) and an "episodic" (three-stage) pattern of adaptation, the author conducted unstructured and structured interviews, directly observed meetings and training sessions, and analyzed existing documents to ascertain participants' experience with Outlook 98. The findings corroborated Orlikowski's descriptions of the frames and episodic adaptation, and uncovered three new insights related to the technological frames.
First, the frames first appeared in a pre-implementation stage, or what Zaltman, Duncan and Holbek (1973) call the "Formation of Attitudes Toward the Innovation" substage of an innovation's initiation stage. The users' spontaneous and vivid figurative language-similes and metaphors-presented images of motion, rest and calm, and momentary stasis before further motion in the various stages.
Second, users at both sites experienced "antecedent intolerance," the author's term for a drastic change in their nature of technology frame, from an originally negative perception of the new software and a reluctance to use it to an eventual refusal to give it up. The shift in their frames was so complete that it represented not merely a modification of the original frames but a replacement of them.
And third, the findings suggest two new domains of technological frames: a User/Change Agent domain (users' and change agents' perceptions of each other) and a Learning the Technology domain, which the author feels is so important that he proposes a new ASK Model of Learning, an approach to training that would address users' attitudes in the pre-implementation stage and first stage of use, skills in the second stage, and knowledge in the third stage. / 2999-01-01
|
179 |
Uttryck och intryck : En studie om skillnaderna mellan avsikt och uppfattning på Windows Live Messenger / Expression and impression : A study of the differences between intention and conception on Windows Live MessengerAhlm, Caroline January 2010 (has links)
Face-to-face communication is always complemented with non-verbal signals that give us clues as to how a message shall be interpreted, but as communication is moved online the possibilities to express oneself becomes more limited. This paper focuses on the instant messaging client Windows Live Messenger and three of the non-verbal functions that it provides (nudges, winks and emotes). The purpose of the paper and its underlying study is to compare the senders' intentions with the receivers' conceptions when it comes to these functions. The study was done as a questionnaire with two different versions of the questions, one looking at the senders' intentions and the other at the receivers' conceptions. The results were then compared in order to look for tendencies. The results showed that the most common intention among the senders was also the most common conception among the receivers, but that the rest of the attitudes didn't match at all. The functions that are supposed to help the conversation flow often create ambiguity instead and lead to vagueness, misconceptions and annoyance. / Kommunikation som sker ansikte mot ansikte kompletteras alltid med icke-verbala signaler som ger ledtrådar till hur ett budskap ska tolkas, men i och med att kommunikationen flyttas online begränsas möjligheterna att uttrycka sig. Uppsatsen fokuserar på chatt-tjänsten Windows Live Messenger och tre av de icke-verbala funktioner som den tillhandahåller (vibbar, blinkningar och uttryckssymboler). Syftet med uppsatsen och dess bakomliggande studie är att jämföra avsändarnas avsikter med mottagarnas uppfattningar när det gäller dessa funktioner. Studien utfördes med kvantitativ metod i form av en enkätundersökning. Respondenterna fördelades jämnt mellan två olika enkäter vilka behandlade avsändarnas avsikter och mottagarnas uppfattningar var för sig. Resultaten av de två enkäterna jämfördes sedan med varandra i ett försök att avläsa vissa tendenser. Analysen visade att den vanligaste avsikten hos avsändarna också var den vanligaste uppfattningen hos mottagarna, men att resterande åsikter inte alls stämde överens. Funktionerna som ska hjälpa konversationen framåt visar sig istället vara mångtydiga och leda till så väl oklarheter som missförstånd och irritation.
|
180 |
Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsriskerLejdemalm, Roger, Andreasson, Daniel January 2008 (has links)
<p>I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.</p><p>Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps. Framförallt nämndes det i samband med lanseringen av Windows Vista att säkerheten var det som stod högst på listan.</p><p>Vi har tillsammans med WM-data i Stockholm tagit fram en programvara för fjärradministration av Windows. Huvudmålet var att med hjälp av våra baskunskaper i programmering skapa ett program för Windows XP och Windows Vista där en rad funktioner skulle kunna fjärrstyras utan att en användare vid den drabbade datorn upptäckte intrånget.</p><p>I denna rapport beskrivs utvecklingen av programvaran och de tester som gjorts på de båda operativsystemen. Vidare delas begreppet ”skadlig kod” upp i kategorierna virus, maskar, trojaner samt rootkits och förklaras mer ingående tillsammans med en historisk bild över hur utvecklingen av skadlig kod har sett ut.</p> / <p>In media today, you often read about different security threats and risks that one has to be aware of. Many things must be taken into consideration in order to maintain your integrity and information secrecy. It might be new virus outbreak, a new trojan or some kind of spy ware that undetected finds the way to your computer. It’s hard to keep track of all terms and types of malicious code, and with greater understanding, the risk of infection decreases. The development when it comes to malicious code is as strong as the one in commercial software development. From the 80’s until present day, every area in the development of malicious code has evolved, from strategy and purpose to the pure complexity of the code.</p><p>Microsoft, the worlds leading supplier of operating systems and web browsers, ensure us with every new release, that measures has been taken in order to enhance the security features. As the new operating system Windows Vista was released, spokesmen said that the security was now the highest priority.</p><p>We have, together with WM-data in Stockholm, developed software for remote administration of Windows. The objectives where by using our limited programming skills only, to come up with a program for Windows XP and Windows Vista, where a number of functions could be remotely executed without alerting a user at the infected computer.</p><p>This report describes the development of the software together with test results of execution on both operating systems. Further on, the report discusses different types of malicious code, such as viruses, worms, Trojans and root kits, together with a historical study of the development of malicious code.</p>
|
Page generated in 0.0281 seconds