• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 111
  • 105
  • 26
  • 6
  • 5
  • 4
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 291
  • 81
  • 81
  • 62
  • 58
  • 57
  • 48
  • 34
  • 32
  • 30
  • 29
  • 26
  • 26
  • 23
  • 22
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

USING TEMPORAL NETWORKS TO FIND THE INFLUENCER NODE OF THE BUGGY SITES IN THE CODE COMMUNITIES

Kanwardeep Singh Walia (12091133) 14 April 2022 (has links)
<p>The cyber-attacks have increased, and with everything going digital, data theft has become a significant issue. This raises an alarm on the security of the source code. Sometimes, to release products early, the security of the code is compromised. Static analysis tools can help in finding possible security issues. Identifying and fixing the security issues may overwhelm the software developers. This process of "fixing" the errors or securing the code may take a lot of time, and the product may be released before all the errors are fixed. But these vulnerabilities in the source code may cost millions of dollars in case of a data breach. It is important to fix the security issues in the source code before releasing the product. This leads to the question of how to fix errors quickly so products can be rolled out with fewer security issues? A possible solution is to use temporal networks to find the influencer nodes in the source code. If these influencer variables are fixed, the connected security issues depending on the influencer in the community (functions) will also get fixed. The research question of the study: Can we identify the influencer node of the buggy site in the source code using temporal networks (K-tool) if the buggy sites present in the source code are identified using static analysis? The study also aims to know if it is faster to find the influencer node using the K-tool than the betweenness centrality algorithm. This research is an "Applied research" and will target the code written in C programming language. Possible vulnerabilities that can be fixed include "Integer Overflow", "Out of bounds", and "Buffer overflow." In the future, we plan to extend to other errors such as "Improper input validation." In this research, we will discuss how we can find the influencer node of the vulnerability (buggy site) in the source code after running the static analysis. Fixing this influencer node will fix the remaining errors pointed out by the static analysis. This will help in reducing the number of fixes to be done in the source code so that the product can be rolled out faster with less security issues.</p> <p><br></p>
122

Plant–Pollinator Network Structural Properties Differentially Affect Pollen Transfer Dynamics and Pollination Success

Arceo-Gómez, Gerardo, Barker, Daniel, Stanley, Amber, Watson, Travis, Daniels, Jesse 01 April 2020 (has links)
Plant–pollinator network studies have uncovered important generalities in the structure of these communities, rapidly advancing our understanding of the underlying drivers of such a structure. In spite of this, however, it is still unclear how changes in structural network properties influence overall plant pollination success. One key limitation is the lack of information on the relationship between network structural properties and aspects of pollination and plant reproductive success. Here, we estimate four plant species network structural metrics (interaction strength, weighted degree, closeness centrality, and specialization level), commonly used to describe their importance within plant–pollinator networks, at two different sites, and evaluate their effects on pollen deposition and pollen tube success. We found a positive effect of plant–pollinator specialization and a negative effect of closeness centrality on heterospecific pollen load size. We also found a marginal negative effect of closeness centrality on pollen tube success. Our results suggest that increasing plant–pollinator specialization within nested communities (pollinated by one or very few generalist insect species) may result in high levels of heterospecific pollen transfer. Furthermore, the differential effects of plant–pollinator network metrics on pollination success (pollen receipt and pollen tube success), highlight the need to integrate quantity (e.g. visitation rate) and quality (e.g. pollen delivery) aspects of pollination to achieve a more mechanistic understanding of the relationship between plant–pollinator network structure and function. Such knowledge is key to evaluate the resilience and stability of plant–pollinator communities and the services they provide in the face of increasing human disturbances.
123

Invasive species in Weddell Sea : Effects on food web structure

Wohlfarth, Inger-Marie January 2020 (has links)
The cold water of Antarctica has a unique endemic fauna, where durophagous predators are rare or absent. Due to climate change the water is heating up and the predators have begun to return to the Southern Ocean, which could bring a lot of changes to the food web. There is a high risk it will lead to losses in the unique marine fauna of Antarctica. The aim of this study is therefore to examine the potential effect these invasive species has on the food web structure in the Weddell Sea. To study this, several general network metrics were used (connectance, number of interactions, vulnerability and generality, trait distributions), as well as a number of centrality metrics (betweenness, closeness, PageRank). The analyses showed that none of the invasive species become important in the Weddell Sea food web. Nor do they significantly change the food web structure in any way which impact the importance of the native species. Their great opportunism regarding their prey species, and thereby their connectedness and thus their position in the network, are probably the main reason why theses invasive species did not become important in this food web. The lack of changes in the food web structure due to the presence of these invasive species are probably also a result of not including factors such as abundances and network dynamics in the analyses, which seem to be the driving forces when it comes to changes in food web structure caused by invasion of species.
124

The relationship between quality of work-life and quality of life based on the centrality and value of work in an individual’s life

Petersen, Rejeanne 04 February 2020 (has links)
The study sought to examine the relationship between quality of work-life and quality of life depending on how central work is in an individual’s life and what value work holds for them. Literature internationally has shown that because work forms such an integral part of individuals’ lives, that this could influence their experience of quality of life, indicating that a high quality of work life could lead to a high quality of life. Similarly, if work is a central life interest and dependent on the value that work holds, the loss of work could potentially influence quality of life. A cross-sectional, descriptive design was used, with a correlational approach. Snowball sampling was used to gather a sample of 163 working adults in South Africa, through a personal network of family and friends. Participants completed scales assessing the four variables of interest provided in an online questionnaire. The results indicated that individuals who experienced their quality of work-life as more positive also indicated a higher quality of life. This relationship was stronger when individuals saw work as having intrinsic value. However, the degree to which work was central to a person’s life, and to which work was seen as having value as it provided monetary rewards (extrinsic value), social connections and relationships (social value), or status (prestige value) were not found to alter the relationship between quality of work-life and quality of life. As shown previously in both international and local literature, work is always placed second to family in importance. Based on these findings, limitations and recommendations were suggested, as well as theoretical and practical implications.
125

Investigation of Posttraumatic Growth on Health Behaviors with Self-efficacy as a Mediator

Pellicano, Annissa 01 January 2019 (has links)
Research has been accumulating on the positive outcomes that people may experience following trauma. However, scholarly literature is deficient in the area of investigating the association among centrality of event (CE), posttraumatic growth (PTG), and health behaviors of women with histories of sexual trauma. The purpose of this quantitative cross-sectional study was to (a) determine the extent of the relationship between CE and PTG, (b) explore the relationship between PTG and health behaviors (i.e., drug, alcohol, and tobacco use, and physical activity), and (c) to determine whether general self-efficacy (SE) mediated these relationships. The theoretical frameworks used to inform this study were the theories of PTG and SE. A sample of 123 women with histories of sexual violence completed the Posttraumatic Growth Inventory, the Centrality of Events Scale-SF, the New General Self-Efficacy Scale, the Drug Abuse Screening Test-10, and health behavior questions from the Behavioral Risk Factor Surveillance System. The majority of participants reported that their experiences were highly central. Simple regression analysis indicated a marginal relationship between CE and PTG as well as a significant relationship between PTG and SE. PTG was not directly related to the health behaviors in this study. However, a bootstrap mediation analysis indicated that SE significantly mediated the relationship between PTG and physical activity. This study contributes to positive social change by helping women understand how their cognitions influence their SE and behaviors. Likewise, this study can inform practitioners on developing interventions through a lens of positive psychology to promote beneficial health behaviors.
126

Modeling Ballast Water Management Strategies for Slowing the Secondary Spread of Aquatic Invasive Species on the Laurentian Great Lakes

Kvistad, Jake T. January 2018 (has links)
No description available.
127

The Necessity and Challenges of Automatic Causal Map Processing: A Network Science Perspective

Freund, Alexander J. 28 April 2021 (has links)
No description available.
128

An Intersectional Study of Perceived Academic Climate and the Imposter Phenomenon in Psychology Students

Braun, Kelsey 01 August 2022 (has links)
Social exclusion in higher education can occur at multiple levels (e.g., systemic, institutional, interpersonal, individual), and individuals simultaneously hold multiple social identities that could influence their perceptions of academic climate. The current study utilized a mixed-methods convergent parallel design to explore the impact of multiple social identities, perceptions of academic climate, and the imposter phenomenon among psychology students. In the quantitative portion, participants (N = 142) completed an online survey related to gender centrality, academic climate, and imposter phenomenon. Gender group comparisons revealed that cisgender men indicated poorer perceptions of climate than cisgender women and gender minorities, but imposter phenomenon was higher among cisgender women and gender minorities than cisgender men. However, perceived academic climate did not mediate the relationship between gender and the imposter phenomenon nor did gender centrality moderate the indirect path of gender on imposter phenomenon through perceived academic climate. In the qualitative portion, participants (N = 14) provided insight, through semi-structured interviews, on the connectedness of perceived academic climate and imposter phenomenon based on the culmination of their multiple social identities. Six themes were identified through reflexive thematic analyses (1) benefits of psychology; 2) barriers of psychology; 3) privileged perspective; 4) stereotypic view of psychology; 5) imposter phenomenon connections; 6) enhancing and maintaining success). Integrated findings suggest a power shift within the context of psychology as individuals that hold traditionally subordinate social identities reported positive perceptions of academic climate, while individuals that hold traditionally dominant social identities perceived academic climate more poorly. However, positive perceptions of academic climate failed to combat the internalization of negative societal stereotypes of those in traditionally subordinate groups, which was associated with experiences of the imposter phenomenon. Future directions and implications for translating findings are discussed.
129

Parallel Mesh Adaptation and Graph Analysis Using Graphics Processing Units

Mcguiness, Timothy P 01 January 2011 (has links) (PDF)
In the field of Computational Fluid Dynamics, several types of mesh adaptation strategies are used to enhance a mesh’s quality, thereby improving simulation speed and accuracy. Mesh smoothing (r-refinement) is a simple and effective technique, where nodes are repositioned to increase or decrease local mesh resolution. Mesh partitioning divides a mesh into sections, for use on distributed-memory parallel machines. As a more abstract form of modeling, graph theory can be used to simulate many real-world problems, and has applications in the fields of computer science, sociology, engineering and transportation, to name a few. One of the more important graph analysis tasks involves moving through the graph to evaluate and calculate nodal connectivity. The basic structures of meshes and graphs are the same, as both rely heavily on connectivity information, representing the relationships between constituent nodes and edges. This research examines the parallelization of these algorithms using commodity graphics hardware; a low-cost tool readily available to the computing community. Not only does this research look at the benefits of the fine-grained parallelism of an individual graphics processor, but the use of Message Passing Interface (MPI) on large-scale GPU-based supercomputers is also studied.
130

Role of Positive Cognitions on Posttraumatic Growth for Childhood Maltreatment Survivors

Manis, Hannah Celeste 18 May 2021 (has links)
No description available.

Page generated in 0.063 seconds