• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 275
  • 31
  • 10
  • 9
  • 8
  • 7
  • 6
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 442
  • 442
  • 138
  • 110
  • 101
  • 69
  • 54
  • 54
  • 50
  • 43
  • 43
  • 40
  • 40
  • 39
  • 38
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

An intensional tool applied in French language educational software

Li, Honglian. 10 April 2008 (has links)
In this thesis the author presents a Web-based French language educational software system, French e-Flash Card (FFC), programmed using Intensional Markup Language (IML). The FFC site is, in some ways, a typical logic-based web application, which consists of a knowledge base of French grammar rules, a logic engine and a web based user interface. The FFC site is both interactive and dynamic, and incorporates Artificial Intelligence for French grammar. These special features, which distinguish FFC from most conventional language educational applications, are made possible by the intensional programming tool, IML, which allows rule-based markup in an intensional logic. The IML source files define whole families of pages indexed by parameters which specify, for instance, the particular subject matter, the degree of difficulty, and even the vocabulary choices and agreement constraints used to generate sample French sentences. This thesis describes the French e-Flash Card site, provides an overview of IML and defines a design approach for intensional programming which should enable web authors to find practical and systematic ways to program using intensional tools.
232

Online Islamic organizations and measuring Web effectiveness

Daniels, Minji 12 1900 (has links)
Approved for public release; distribution in unlimited. / Experts estimate that websites maintained by various Islamic extremists have increased to hundreds in recent years. Innovative operational capabilities enabled by Internet technology certainly pose serious challenges to U.S. counter-terrorism efforts. However, greater attention must be given to Islamic organizations that wage information campaigns, perpetuating resentment and discredit against the United States and her allies. While these sites may not openly call for violence, the sharing of common causes and goals with extremist organizations is worrisome. The repudiation of Western systems and global Islamization under the Shariah systems is often a transparent theme. The purpose of this thesis is to evaluate the effectiveness of these websites at attracting and engaging audiences to promote their cause by applying a web performance methodology commonly accepted in the commercial industry. / Lieutenant, United States Navy
233

Podnikání v oblasti internetového poradenství / Carry on business in the field of internet consultancy

Štrupl, Václav January 2010 (has links)
This dissertation is focused on internet consultancy, which is a branch younger than ten years. By internet consultancy we mean the area covering online promotion, consultations in the field of technical quality and usability of web pages, measuring and optimization of their commercial performance. Thus we do not mean the consultancy in other fields (e.g. social, health, economic) just using the internet as its form of communication, even though the same name is used for this activity, as well. The goal of this dissertation is to define the branch of consultancy in the field of creation and promotion of web pages and map it from technical, entrepreneurial and economical point of view. The case-study in the second part is based on the individual interviews with the key employees and on my more than five years long praxis with running the company H1.cz s.r.o., which was one of the first Czech companies running a business in this area. Its foundation, development and finally also sale provided me as a founder with both theoretical knowledge of the technical aspect of consultancy and realization of services and practical experience with running a company itself. In connection with my studies of information technologies at the university with economical focus I consider this experience very favorable for this dissertation. I have divided the text into following parts: - Definition of the internet consultancy as a branch. The goal of this part is to theoretically map the area of internet consultancy from the technical point of view and to describe the particular specializations and tasks that it consists of. - Specialties of consulting as a type of an entrepreneurial activity. This chapter briefly describes the consulting work as a type of business and its specificity comparing to other areas. - Case-study of the company H1.cz. The third part maps the particular activities in a company (management, marketing, sales, finance etc.) focused on internet consultancy. It also addresses the question of foundation and sale of the company as an inseparable part of entrepreneurship. By reading this dissertation one should obtain a detailed overview in the area of creation and promotion of web pages as well as in running a business in this young and dynamic branch. There is no complex source in the market related to this topic and so I hope this dissertation could become a starting point for everyone considering foundation of his own company in the internet field.
234

Critérios de avaliação da qualidade da informação em sistemas de internet banking / Factors for information quality evaluation in internet banking systems

Mattar, Alexandre 30 November 2007 (has links)
Diariamente surgem novas aplicações de sistemas baseados na internet, influenciando a forma como vivemos, trabalhamos e interagimos na sociedade. No entanto, a maioria dos sistemas é elaborada com base no senso comum e intuição, raramente utilizando conceitos de avaliação da qualidade da informação provida pelos websites. Numa tentativa de aprofundar mais este tipo de metodologia, este estudo faz uma adaptação ao modelo de avaliação de qualidade da informação de websites, proposto por Kim, Kishore e Sanders (2005), para avaliar de sistemas de internet banking. Foi realizado um levantamento entre alunos de graduação, com o objetivo de se verificar a aderência do modelo à sistemas de internet banking, bem como critérios factíveis de comparações entre instituições financeiras, a respeito de sistemas de internet banking. Como forma de atingir esses objetivos, foi feito uso de métodos estatísticos, com a utilização de análise fatorial, coeficiente alfa de Cronbach, método de escalas somadas e testes de médias, por meio de ANOVAS. / On a daily basis new internet based systems are born, changing the way we live, work and interact with the society. In spite of that, most of these systems are developed based on common sense and intuition, rarely using methodologies that involves data quality information. In order to explore more these methodologies, this study adapts the data quality information framework created by Kim, Kishore e Sanders (2005) in order to evaluate internet banking systems. A survey was made with undergraduate students, with the goal to verify how the framework applies to internet banking systems. A second goal is to reveal constructs that may be used to compare internet banking systems. In order to achieve these results, statistics will be taken place, using factor analysis, cronbach coefficient, summated scales and ANOVAS.
235

The impact of IT security psychological climate on salient user beliefs toward IT security: an empirical study

Unknown Date (has links)
There is a growing need to better understand what influences user behavior for developing comprehensive IT security systems. This study integrates two prominent bodies of research, the theory of planned behavior used to frame the factors influencing user behavior and individual level climate perceptions used to frame organizational environment influences, to develop a multidimensional IT security user behavior model. The model is then used as the basis for a survey based research to empirically test the hypotheses whether the perceived IT security climate of an organization significantly influences the users beliefs regarding the use of IT security. The intent of the study is to extend the theory of planned behavior and IT security literature by investigating salient IT security beliefs and environmental influences on those beliefs. First, anti-spyware was identified as an appropriate target IT security artifact, and then incorporated into a multi-phased research approach. Second, a semi-structured interview process was used to elicit salient beliefs regarding use of the IT security artifact. Third, IT security psychological climate was conceptualized based on the extant literature on organizational climate, safety climate and IT security in order to examine the organizational environment influences on these beliefs. Finally, a survey was used to collect data to validate the constructs and test the hypothesized relationships. / The study found that there was a significant positive relationship between IT security psychological climate and 1) the belief that anti-spyware will protect organizational interests such as privacy and data, 2) the belief that anti-spyware will prevent disruptions to work, 3) the belief that the approval of anti-spyware use by the technical support group is important, 4) the belief that monetary resources are needed to enable the use of anti-spyware, and 5) the belief that time is a facilitating condition for the use of anti-spyware. A discussion of the findings and their implications for theory and practice is provided. / by Janis A. Warner. / Thesis (Ph.D.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
236

The academic social network and research ranking system. / CUHK electronic theses & dissertations collection

January 2013 (has links)
Fu, Zhengjia. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2013. / Includes bibliographical references (leaves 107-116). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts also in Chinese.
237

AtoM, normas e padrões para a descrição e representação de informações e objetos digitais em ambientes digitais Web /

Silva, Talita Cristina da. January 2017 (has links)
Orientador: Maria José Vicentini Jorente / Banca: Natália Bolfarini Tognoli / Banca: Rodrigo Eduardo Botelho Francisco / Resumo: Diante das transformações, das tecnologias e a mudança no comportamento dos internautas, os arquivos e profissionais da informação encontram-se com novos desafios, quanto à busca, a recuperação e o acesso à informação. Neste discutiu-se sobre os temas: descrição arquivística, normalização em arquivos, criação e implantação dos padrões e normas, com vistas à representação da informação; e o AtoM, como resultado destes esforços, que é um software de descrição Arquivística gerenciado pelo grupo Access to Memory. O AtoM registra, gerencia e apresenta via Web descrições de documentos. O sistema de descrição foi criado para ser aplicado em instituições de arquivo. Buscou-se, então, realizar a análise de softwares para representação em ambiente Web. Investigou-se o tema "Representação da Informação Arquivística na Web 2.0", com o intuito de compreender o processo de organização (classificação e descrição) na tradição da biblioteconomia e arquivística. Também foram estudadas e comparadas as normas de descrição nacionais e internacionais. Por fim, realizou-se um levantamento bibliográfico dos autores que versam sobre o tema na área da Ciência da Informação. Esta pesquisa se justifica pela necessidade de padrões em arquivos e pela possibilidade de intercâmbio de informação e interoperabilidade que o AtoM tem para com outros sistemas, pois foi desenvolvido especificamente para descrição e em conformidade com as normas de descrição arquivística. A metodologia utilizada nessa investigação... (Resumo completo, clicar acesso eletrônico abaixo) / Abstract: Faced with the changes of technologies and in the behavior of Internet users, archives and information professionals experience new challenges in research, retrieval and access to information. Here some of the subjects that were discussed: archives' description, archives' normalization, creation and implementation of the standards and norms in order to represent the information; and AtoM. The result of these efforts: AtoM, it is archival description software managed by the Access to Memory group. AtoM records, manages and displays document descriptions via the Web. The description system was created to be applied in archival institutions. Therefore, it was aimed analyzing the software in Web environment. In order to understand the process organization (classification and description) in the librarianship and archival tradition, the topic "Representation of Archival Information in Web 2.0" was researched. It was also studied and compared national and international standards of description. Finally, a bibliographic survey of the authors on the subject in the area of Information Science was carried out. This research is justified by the need for standards in archives and by the possibility of information exchange and interoperability that AtoM has with other systems. The reason is that AtoM was developed specifically for description and in accordance with the norms of archival description. The methodology used in this research was the four pole method that is composed of the epi... (Complete abstract click electronic access below) / Mestre
238

Ranking and its applications on web search. / 排序算法及其在網絡搜索中的應用 / Pai xu suan fa ji qi zai wang luo sou suo zhong de ying yong

January 2011 (has links)
Wang, Wei. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (p. 106-122). / Abstracts in English and Chinese. / Abstract --- p.ii / Acknowledgement --- p.vi / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Overview --- p.1 / Chapter 1.2 --- Thesis Contributions --- p.5 / Chapter 1.3 --- Thesis Organization --- p.8 / Chapter 2 --- Background and Literature Review --- p.9 / Chapter 2.1 --- Label Ranking in Machine Learning --- p.11 / Chapter 2.1.1 --- Label Ranking --- p.11 / Chapter 2.1.2 --- Semi-Supervised Learning --- p.12 / Chapter 2.1.3 --- The Development of Label Ranking --- p.14 / Chapter 2.2 --- Question Retrieval in Community Question Answering --- p.16 / Chapter 2.2.1 --- Question Retrieval --- p.16 / Chapter 2.2.2 --- Basic Question Retrieval Models --- p.18 / Chapter 2.2.3 --- The Development of Question Retrieval Models --- p.21 / Chapter 2.3 --- Ranking through CTR by Building Click Models --- p.24 / Chapter 2.3.1 --- Click Model's Importance --- p.24 / Chapter 2.3.2 --- A Simple Example of Click Model --- p.25 / Chapter 2.3.3 --- The Development of Click Models --- p.27 / Chapter 3 --- Semi-Supervised Label Ranking --- p.30 / Chapter 3.1 --- Motivation: The Limitations of Supervised Label Ranking --- p.30 / Chapter 3.2 --- Label Ranking and Semi-Supervised Learning Framework --- p.32 / Chapter 3.2.1 --- Label Ranking and Semi-Supervised Learning Setup --- p.32 / Chapter 3.2.2 --- Information Gain Decision Tree for Label Ranking --- p.37 / Chapter 3.2.3 --- Instance Based Label Ranking --- p.39 / Chapter 3.2.4 --- Mallows Model Decision Tree for Label Ranking --- p.40 / Chapter 3.3 --- Experiments --- p.40 / Chapter 3.3.1 --- Dataset Description --- p.41 / Chapter 3.3.2 --- Experimental Results --- p.42 / Chapter 3.3.3 --- Discussion --- p.42 / Chapter 3.4 --- Summary --- p.44 / Chapter 4 --- An Application of Label Ranking --- p.45 / Chapter 4.1 --- Motivation: The Limitations of Traditional Question Retrieval --- p.45 / Chapter 4.2 --- Intention Detection Using Label Ranking --- p.47 / Chapter 4.2.1 --- Question Intention Detection --- p.48 / Chapter 4.2.2 --- Label Ranking Algorithms --- p.50 / Chapter 4.2.3 --- Some Other Learning Algorithms --- p.53 / Chapter 4.3 --- Improved Question Retrieval Using Label Ranking --- p.54 / Chapter 4.3.1 --- Question Retrieval Models --- p.55 / Chapter 4.3.2 --- Improved Question Retrieval Model --- p.55 / Chapter 4.4 --- Experimental Setup --- p.56 / Chapter 4.4.1 --- Experiment Objective --- p.56 / Chapter 4.4.2 --- Experiment Design --- p.56 / Chapter 4.4.3 --- DataSet Description --- p.57 / Chapter 4.4.4 --- Question Feature --- p.59 / Chapter 4.5 --- Experiment Result and Comments --- p.60 / Chapter 4.5.1 --- Question Classification --- p.60 / Chapter 4.5.2 --- Classification Enhanced Question Retrieval --- p.63 / Chapter 4.6 --- Summary --- p.69 / Chapter 5 --- Ranking by CTR in Click Models --- p.71 / Chapter 5.1 --- Motivation: The Relational Influence's Importance in Click Models --- p.71 / Chapter 5.2 --- Click Models in Sponsored Search --- p.75 / Chapter 5.2.1 --- A Brief Review on Click Models --- p.76 / Chapter 5.3 --- Collaborating Influence Identification from Data Analysis --- p.77 / Chapter 5.3.1 --- Quantity Analysis --- p.77 / Chapter 5.3.2 --- Psychology Interpretation --- p.82 / Chapter 5.3.3 --- Applications Being Influenced --- p.82 / Chapter 5.4 --- Incorporating Collaborating Influence into CCM . --- p.83 / Chapter 5.4.1 --- Dependency Analysis of CCM --- p.83 / Chapter 5.4.2 --- Extended CCM --- p.84 / Chapter 5.4.3 --- Algorithms --- p.85 / Chapter 5.5 --- Incorporating Collaborating Influence into TCM . --- p.87 / Chapter 5.5.1 --- TCM --- p.87 / Chapter 5.5.2 --- Extended TCM --- p.88 / Chapter 5.5.3 --- Algorithms --- p.88 / Chapter 5.6 --- Experiment --- p.90 / Chapter 5.6.1 --- Dataset Description --- p.90 / Chapter 5.6.2 --- Experimental Setup --- p.91 / Chapter 5.6.3 --- Evaluation Metrics --- p.91 / Chapter 5.6.4 --- Baselines --- p.92 / Chapter 5.6.5 --- Performance on RMS --- p.92 / Chapter 5.6.6 --- Performance on Click Perplexity --- p.93 / Chapter 5.6.7 --- Performance on Log-Likelihood --- p.93 / Chapter 5.6.8 --- Significance Discussion --- p.98 / Chapter 5.6.9 --- Sensitivity Analysis --- p.98 / Chapter 5.7 --- Summary --- p.102 / Chapter 6 --- Conclusion and Future Work --- p.103 / Chapter 6.1 --- Conclusion --- p.103 / Chapter 6.2 --- Future Work --- p.105 / Bibliography --- p.106
239

On web security: a trusted notification system.

January 2011 (has links)
Tse, Kai Shun Scottie. / "December 2010." / Thesis (M.Phil.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (p. 52-54). / Abstracts in English and Chinese. / Abstract --- p.ii / Acknowledgements --- p.iii / List of Figures --- p.vi / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Web 2.0 --- p.2 / Chapter 1.2 --- Research Motivation --- p.2 / Chapter 2 --- Background Study on Web Attacks --- p.4 / Chapter 2.1 --- Cross Site Scripting (XSS) --- p.5 / Chapter 2.2 --- Cross Channel Scripting (XCS) --- p.6 / Chapter 2.3 --- Cross Site Request Forgery (CSRF) --- p.6 / Chapter 2.4 --- Click Jacking --- p.7 / Chapter 2.5 --- Extension and plugins vulnerabilities --- p.8 / Chapter 2.6 --- Privacy Issue --- p.10 / Chapter 2.7 --- Network security --- p.12 / Chapter 2.8 --- Developer implementation flaw --- p.13 / Chapter 2.9 --- Chapter Summary --- p.15 / Chapter 3 --- Defenses on Web Attacks --- p.17 / Chapter 3.1 --- Same Origin Policy --- p.17 / Chapter 3.2 --- Filtering mechanism --- p.18 / Chapter 3.2.1 --- Client-side filtering --- p.18 / Chapter 3.2.2 --- Server-side filtering --- p.19 / Chapter 3.3 --- XSS Defenses --- p.20 / Chapter 3.4 --- CSRF Defenses --- p.22 / Chapter 3.5 --- Browser warnings --- p.23 / Chapter 3.6 --- Chapter Summary --- p.24 / Chapter 4 --- On web communication --- p.26 / Chapter 4.1 --- On cross domain communication --- p.26 / Chapter 4.1.1 --- HTML5 --- p.26 / Chapter 4.1.2 --- Flash 10 --- p.28 / Chapter 4.1.3 --- Extended studys crossdomain.xml of Flash --- p.29 / Chapter 4.2 --- On cross frame communication --- p.32 / Chapter 4.3 --- Trusted Notification System --- p.35 / Chapter 4.3.1 --- Assumptions --- p.35 / Chapter 4.3.2 --- Implementation Issues --- p.35 / Chapter 4.3.3 --- Information flow --- p.37 / Chapter 4.3.4 --- Features --- p.38 / Chapter 4.3.4.1 --- Counter fake --- p.38 / Chapter 4.3.4.2 --- Plug and play --- p.38 / Chapter 4.3.4.3 --- Mitigate future attacks --- p.39 / Chapter 4.3.4.4 --- Session persist after logout --- p.39 / Chapter 4.3.4.5 --- Follow the standards --- p.40 / Chapter 4.3.5 --- Related works --- p.40 / Chapter 4.4 --- Chapter Summary --- p.41 / Chapter 5 --- Conclusion --- p.43 / Chapter 5.1 --- Contributions --- p.43 / Chapter 5.2 --- Discussions and future work --- p.44 / Chapter A --- Non-persistent XSS attack on Horde --- p.45 / Chapter B --- Data tampering attack on facebook application --- p.50 / Bibliography --- p.52
240

Derivace a její aplikace ve středoškolské matematice s využitím internetu / Derivative and its application in high school mathematics with use of Internet.

Trnka, Karel January 2012 (has links)
The aim of this diploma thesis is to create derivative-focused web pages as a new part of a high school mathematics educational web portal. The web portal is operated by the Department of Mathematics Education, Faculty of Mathematics and Physics, Charles University in Prague. It is primarily intended as an additional learning resource for high school students. The diploma thesis consists of two main parts. The first part describes a search for and evaluation of similar web pages in Czech, Slovak, English and Hebrew, which deal with the topic of derivative. The second part details the creation of new web pages. In creating the web pages the author integrated interactive elements based on JavaScript, and interactive applets created with use of GeoGebra software. To display mathematical expressions on the web, the author used the technology MathJax, which works with languages of the typesetting systems TeX and LaTeX.

Page generated in 0.0681 seconds