• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 220
  • 50
  • 24
  • 23
  • 20
  • 16
  • 10
  • 8
  • 6
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 503
  • 108
  • 107
  • 79
  • 78
  • 73
  • 73
  • 59
  • 56
  • 51
  • 51
  • 48
  • 47
  • 46
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Habitat suitability of the yellow rail in south-central Manitoba

Martin, Kristen 21 September 2012 (has links)
Little is known about the distribution and habitat suitability of yellow rails (Coturnicops noveboracensis) throughout their breeding range. Yellow rail and vegetation surveys were conducted at 80 wetlands in south-central Manitoba in 2010-2011 to evaluate the effectiveness of repeat-visit, call-broadcast night surveys for detecting this species and habitat associations of this species at the 3-km landscape, patch, and plot scales. Yellow rails were detected at 44% of the study wetlands. Yellow rail detection was imperfect (0.63 in each year), but call-broadcast increased the number of yellow rails detected. Future yellow rail survey efforts should employ call-broadcast and at least three surveys per survey point. Yellow rail presence was positively influenced by the amount of marsh/fen in the landscape and the proportion of rushes at the study wetlands. These characteristics should be considered when identifying potential yellow rail habitat in south-central Manitoba.
212

From Math Men to Mad Men: Digital Media & the New Ad Strategy

Flannery, John M 01 January 2014 (has links)
Developments in advertising are necessarily tied to shifts in media technology – by this very fact, the industry has changed significantly since the 1960s. In the 21st century, ad men have to contend with an increasingly complex and fractured digital landscape. Big, traditional ad agencies – like those depicted in the popular television series Mad Men – no longer dominate; instead, they are forced to compete with a growing class of digital marketing start-ups for a stake in tomorrow’s adscape. Innovative ad serving technologies, instead of creative-driven campaigns, rule the day. Internet technologies have created an environment in which identifying and engaging consumers on an individual level is entirely possible; in effect, the software engineers and data scientists capable of executing these types of campaigns – the “Math Men” – have become the new industry luminaries. And yet, there is still something to be said about the importance of a sentimental bond between the consumer and product. The type of advertising practiced by Don Draper and his real-life counterparts is based in a fundamental truth about human decision-making: emotions are an integral aspect of information-processing. While there is truth to the Math Men’s core principle that, “Advertising should deliver the right information to the right person at the right time,” There is a good reason that brands such as Coca-Cola, McDonald’s and GE – all vestiges of the Mad Men era – remain some of the most valuable and celebrated in the world. The paper will argue that the future of powerful ad content is dependent upon an appreciation of the Mad Men's creative philosophy, emboldened by an understanding of the ways in which media – and by extension ad serving technology – has advanced since the 1960s.
213

Phonetic aspects of CBC Radio Newsreading, 1937-1987

McGovern, Michael Thomas 10 November 2010 (has links)
This paper is a phonetic investigation of radio newsreading on the Canadian Broadcasting Corporation (CBC) from 1937 to 1987. Recorded newscasts from the first, third, and fifth decades of CBC history are examined. Brief histories of CBC Radio news and of the Office of Broadcast Language are included, and the bibliography brings together much scattered reference material on CBC language. Traditional auditory evaluations of selected aspects of voice quality settings, vowel quality, and voice dynamics are supplemented by instrumental measurements. The descriptive terminology of Laver (1980) is applied to identify the voice quality settings. The majority of newsreaders examined display the vocal settings of lowered larynx, open jaw, and the use of creaky phonation. This configuration enhances vocal resonance and is shown to be an established newsreading model, perceived as suitable to the authoritative presentation of information. The patterns of vocal settings identified for three test decades (1937-47, 1957-67, 1977-87) are supported by the results of acoustic analyses. Individual, group, and across-group statistical tests were executed on the results of acoustical waveform analyses of the peripheral vowels k n u/ produced by each newsreader. To test vowel quality as a sociolinguistic variable, the CBC formant data were compared with compatible /ae o u/ data from informants of the Survey of Vancouver English (Gregg, 1984). The results show that the speech of CBC Radio newsreaders cannot be associated with any particular SES class of the Vancouver Survey. As a result of the extensive variation in production found for both informant groups, the high back vowel phoneme /u/ remains ill-defined for Canadian English. The voice dynamic component in CBC Radio newscasts has changed over the years. Measurements of speech rate show that the duration of pauses post-1966 are dramatically shorter than those pre-1966. Sentence length is shown not to have changed considerably, but phrases have been lengthened and pauses shortened. A marked reduction in the percentage of silent time within the newscast has been the result. It is suggested that pitch fluctuations are now used more extensively than pausing to structure the text orally. Despite the changes in continuity, the articulation rate of the newsreaders, measured in syllables per second, has remained constant. These results indicate that the newsreaders are exceptionally skilled speakers. The prevalent voice settings and the averaged acoustic measurements for CBC vowels are presented as representative of a readily identifiable and publicly recognized standard of formal spoken Canadian English.
214

Newsroom convergence at the Mail & Guardian : A case study /

Van Noort, Elvira Esmeralda January 2007 (has links)
Thesis (M.A. (Journalism and Media Studies)) - Rhodes University, 2007 / "Thesis submitted in partial fulfilment for the degree of Master of Arts."
215

A light in every home Huda TV's articulation of Orthodox Sunni Islam in the global mediascape /

Maguire, Thomas E.R. January 1900 (has links)
Thesis (Ph. D.)--University of Texas at Austin, 2009. / Title from PDF title page (University of Texas Digital Repository, viewed on July 30, 2009). Vita. Includes bibliographical references.
216

Finding leadership in the "real world" of news the professional socialization of leadership development and issues of power, gender, race, and self esteem in a college broadcast journalism lab, a case study /

Collins, Janice Marie. January 2009 (has links)
Thesis (Ph.D.)--Ohio University, March, 2009. / Title from PDF t.p. Includes bibliographical references.
217

Demodulator techniques in satellite communications systems for direct broadcast systems.

Marzolini, Remo G. A. January 1995 (has links)
Thesis (PhD)-Open University. BLDSC no.DX190076.
218

Of Malicious Motes and Suspicious Sensors

Gilbert, Seth, Guerraoui, Rachid, Newport, Calvin 19 April 2006 (has links)
How much damage can a malicious tiny device cause in a single-hopwireless network? Imagine two players, Alice and Bob, who want toexchange information. Collin, a malicious adversary, wants to preventthem from communicating. By broadcasting at the same time as Alice orBob, Collin can destroy their messages or overwhelm them with his ownmalicious data. Being a tiny device, however, Collin can onlybroadcast up to B times. Given that Alice and Bob do not knowB, and cannot distinguish honest from malicious messages, howlong can Collin prevent them from communicating? We show the answerto be 2B + Theta(lg|V|) communication rounds, where V is theset of values that Alice and Bob may transmit. We prove this resultto be optimal by deriving an algorithm that matches our lowerbound---even in the stronger case where Alice and Bob do not start thegame at the same time.We then argue that this specific 3-player game captures the generalextent to which a malicious adversary can disrupt coordination in asingle-hop wireless network. We support this claim by deriving---via reduction from the 3-player game---round complexity lower boundsfor several classical n-player problems: 2B + Theta(lg|V|) for reliable broadcast,2B + Omega(lg(n/k)) for leader election among k contenders,and 2B + Omega(k*lg(|V|/k)) for static k-selection. We then consider an extension of our adversary model that also includes up to t crash failures. We study binary consensus as the archetypal problem for this environment and show a bound of 2B + Theta(t) rounds. We conclude by providing tight, or nearly tight, upper bounds for all four problems. The new upper and lower bounds in this paper represent the first such results for a wireless network in which the adversary has the ability to disrupt communication.
219

The development of an efficient and secure product entitlement system for Pay-TV in modern attack scenarios

Coetzee, Dirk Badenhorst 03 1900 (has links)
Thesis (MScEng)--Stellenbosch University, 2013. / ENGLISH ABSTRACT: A secure product entitlement system allows one party, such as a pay-TV operator, to broadcast the same collection of information to several receiving parties while only allowing a certain subset of the receiving parties to access the information. This system must still be secure in the scenario where all receiving parties who are not allowed access to the information, pool their resources in an attempt to gain access to the information. Such a product entitlement system must also be bandwidth e cient since it can be deployed in networks where bandwidth is at a premium. The foundations of modern encryption techniques is reviewed and a survey of existing techniques, used to secure content in broadcast environments, is studied. From this collection of techniques two were identi ed as bandwidth e cient and are discussed in more detail before being implemented. An attempt is then made to design a new secure bandwidth e cient encryption scheme for protecting content in a broadcast environment. Several iterations of the design is detailed, including the security aw which makes each design insecure. The nal design was implemented and compared in several metrics to the two previously selected bandwidth e cient schemes. A framework to test the correctness of the schemes over a network is also designed and implemented. Possible future avenues of research are identi ed with regards to creating a secure broadcast encryption scheme and improving the software solution in which to use such a scheme. / AFRIKAANSE OPSOMMING: 'n Veilige produk-aanspraak-stelsel stel een party, soos byvoorbeeld 'n betaal-TV-operateur, in staat om dieselfde versameling inligting na verskeie partye uit te saai, terwyl slegs 'n bepaalde deelversameling van die ontvangende partye toegelaat sal word om toegang tot die inligting te bekom. Hierdie stelsel moet steeds die inligting beskerm in die geval waar al die ontvangende partye wat toegang geweier word, hul hulpbronne saamsmee in 'n poging om toegang te verkry. So 'n produk-aanspraak-stelsel moet ook bandwydte doeltre end benut, aangesien dit gebruik kan word in netwerke waar bandwydte baie duur is. Die fondamente van die moderne enkripsietegnieke word hersien. 'n Opname van bestaande tegnieke wat gebruik word om inligting te beskerm in 'n uitsaai omgewing word bestudeer. Uit hierdie versameling tegnieke word twee geïdenti seer as tegnieke wat bandwydte doeltre end benut en word meer volledig bespreek voordat dit geïmplementeer word. 'n Poging word dan aangewend om 'n nuwe veilige bandwydte doeltre ende enkripsietegniek te ontwerp vir die beskerming van inligting wat uitgesaai word. Verskeie iterasies van die ontwerp word uiteengesit, met 'n bespreking van die sekuriteitsfout wat elke ontwerp onveilig maak. Die nale ontwerp is geïmplementeer en aan die hand van verskeie maatstawwe vergelyk met die twee bandwydte doeltre ende tegnieke, wat voorheen gekies is. 'n Raamwerk om die korrektheid van die tegnieke oor 'n netwerk te toets, is ook ontwerp en geïmplementeer. Moontlike toekomstige rigtings van navorsing word geïdenti seer met betrekking tot die skep van 'n veilige uitsaai enkripsietegniek en die verbetering van die sagtewareoplossing wat so 'n tegniek gebruik.
220

Adding Information to Complement a Football Broadcast : Exploring the possibilities of improving the viewer experience of a broadcasted football game with the use of additional information through motion tracking

Olsson, Tom January 2018 (has links)
This thesis aims to explore the possibilities of improving the viewer experience of a broadcasted football game with the use of additional information, applied to the footage with the use of motion tracking. This work was conducted in collaboration with SVT Design. which is the inhouse department of the Swedish television network (SVT) tasked with designing, developing and creating graphical solutions. One of the systems developed by SVT Design is the character generator Caspar CG. Which is an open source CG system used worldwide for broadcasting productions. In the spring of 2018, SVT Design presented the idea of incorporating a motion tracking feature within Caspar CG. This would be a feature which could be used during broadcasted sporting events to provide the viewers with additional information regarding the ongoing event. With the use of motion tracking, the additional information could be presented in a dynamic manner in the sense that the information would follow the motion of the tracked object. This thesis aimed to answer the following three research questions; What type of information could be displayed? When and how could this information be displayed? and lastly, how could the addition of information change the viewer’s experience of the football game? The conclusions aimed to provide SVT Design with a set of guidelines and requirements regarding the design and implementation of the additional information in a manner that would promote a positive viewer experience. The methodology applied for this thesis was a qualitative methodology utilizing research activities such as semi-structured interviews featuring three staff members of SVTs department of sport productions. The observation of two broadcasted football games. Along with two focus groups in which the participants were presented with a prototype developed in Adobe After Effects. Consisting of footage from the 2010 FIFA world cup along with additional information that was applied with the use of motion tracking. Through the analysis of the collected data, several recurring keywords and notions were identified and translated into requirements. The requirements, which was structured around the three research questions. Is for example that the information needs to be player specific and to provide an insight of the potential outcome of the game. Another example of a requirement being that the information is to be displayed when there is a break in action during the game. The result from this thesis indicated that if the specified requirements were met. The additional information applied during the broadcast could provide an improvement of the viewer’s experience of watching the broadcasted football game.

Page generated in 0.0438 seconds