• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 7446
  • 1271
  • 988
  • 661
  • 506
  • 274
  • 192
  • 123
  • 84
  • 69
  • 69
  • 69
  • 69
  • 69
  • 69
  • Tagged with
  • 14749
  • 5072
  • 1881
  • 1674
  • 1363
  • 1361
  • 1246
  • 1235
  • 1225
  • 907
  • 859
  • 817
  • 768
  • 765
  • 749
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

The dynamics of altruism : the interaction of personality with the effects of failure and the response to help

Messili, R. January 1990 (has links)
No description available.
402

Shifting task 'set' : exploring non-spatial aspects of intentional control

Hsieh, Shulan January 1993 (has links)
No description available.
403

The agent and related categories in early Welsh and early Irish with special reference to narrative texts : aspects of marking and usage

Mueller, Nicole January 1992 (has links)
No description available.
404

Young children's understanding of division

Squire, Sarah B. January 2000 (has links)
No description available.
405

An experimental investigation of executive processes

Ward, Geoff January 1993 (has links)
No description available.
406

Health anxiety and coping with health threats

Lister, Anne-Marie January 2002 (has links)
No description available.
407

The development of saccadic eye movements during visual spatial tasks

Coles, Peter Richard January 1986 (has links)
No description available.
408

Cognitive Solutions for Resource Management in Wireless Sensor Networks

El Mougy, AMR 05 February 2013 (has links)
Wireless Sensor Networks (WSN) is an important technology that can be used to provide new data sets for many applications ranging from healthcare monitoring to military surveillance. Due to the increasing popularity of WSNs, user demands have evolved as well. To achieve the end-to-end goals and requirements of the applications, managing the resources of the network becomes a critical task. Cognitive networking techniques for resource management have been proposed in recent years to provide performance gains over traditional design methodologies. However, even though several tools have been considered in cognitive network design, they show limitations in their adaptability, complexity, and their ability to consider multiple conflicting goals. Thus, this thesis proposes novel cognitive solutions for WSNs that include a reasoning machine and a learning protocol. Weighted Cognitive Maps (WCM) and Q-Learning are identified as suitable tools for addressing the aforementioned challenges and designing the cognitive solutions due to their ability to consider conflicting objectives with low complexity. WCM is a mathematical tool that has powerful inference capabilities. Thus, they are used to design a reasoning machine for WSNs. Two case studies are proposed in this thesis that illustrate the capabilities of WCMs and their flexibility in supporting different application requirements and network types. In addition, an elaborate theoretical model based on Markov Chains (MC) is proposed to analyze the operation of the WCM system. Extensive computer simulations and analytical results show the ability of the WCM system to achieve the end-to-end goals of the network and find compromises between conflicting constraints. On the other hand, Q-Learning is a well known reinforcement learning algorithm that is used to evaluate the actions taken by an agent over time. Thus, it is used to design a learning protocol that improves the performance of the WCM system. Furthermore, to ensure that the learning protocol operates efficiently, methods for improving the learning speed and achieving distributed learning across multiple nodes are proposed as well. Extensive computer simulations show that the learning protocol improves the performance of the WCM system in several metrics. / Thesis (Ph.D, Electrical & Computer Engineering) -- Queen's University, 2013-02-04 16:24:55.385
409

Cooperative Cognitive Radio Networks: Spectrum Acquisition and Co-Channel Interference Effect

Abu Alkheir, ALA 05 February 2013 (has links)
Cooperative Spectrum Sensing (CSS) allows Cognitive Radio Networks (CRNs) to locate vacant spectrum channels and to protect active Primary Users (PUs). However, the achieved detection accuracy is proportional to the duration of the CSS process which, unfortunately, reduces the time of useful communication as well as increases the Co-Channel Interference (CCI) perceived by an active PU. To overcome this, this thesis proposes three CSS strategies, namely the Dual-Threshold CSS (DTCSS), the Maximum CSS (MCSS), and the Max-Min CSS (MMCSS). These strategies reduce the number of reporting terminals while maintaining reliable performance and minimal CCI e ect. The performance of these three methods is analyzed, and the numerical and simulations results illustrate the accuracy of the derived results as well as the achieved performance gains. The second part of this thesis studies the impact of CCI on the performance of a number of transmission techniques used by CRNs. These are Chase combining Hybrid Automatic Repeat Request (HAQR), Fixed Relaying (FR), Selective Relaying (SR), Incremental Relaying (IR), and Selective Incremental Relaying (SIR). The performance of these techniques is studied in terms of the average spectral e ciency, the outage probability, and the error probability. To obtain closed forms for the error probabilities, this thesis proposes a novel accurate approximation of the exponential integral function using a sum of exponentials. / Thesis (Ph.D, Electrical & Computer Engineering) -- Queen's University, 2013-02-05 13:39:22.35
410

Systemic effects of human factors in information security

Kelley, Timothy D. 19 December 2014 (has links)
<p> This dissertation couples the growing corpus of human subjects and behavioral research in information security with large-scale data and robust quantitative methods. Linking human subject experimentation with theoretical models enables the information security community to reason more effectively about the system-wide effects of user behavior. I examine how users interact with the digital environment, how those interactions affect decision-making, and how aggregate decision-making affects system-wide vulnerabilities. This interdisciplinary challenge requires a combination of techniques from cognitive neuroscience, social network analysis, human-subjects research, dynamical systems, network theory, and agent-based models. </p><p> In the first section, eye-tracking data demonstrates the relationships between expertise and online perceptual awareness of security cues. Expertise is shown to be only a small factor in attention to security cues, and task-type proves to be much larger indicator of attention, with tasks requiring the use of personal accounts driving attention to cues. This section uses Bayesian ANOVA to evaluate users' perceptual awareness of security cues as they complete common online tasks, as it relates to user sophistication and task type. </p><p> The second section uses a theoretical epidemiological model of malware spread to investigate factors that might mitigate the prevalence of malware in a coupled, two-population model. This both demonstrates that cost is the largest factor for affecting malware prevalence, outside of malware infection rates, and identifies appropriate strategies for system-wide botnet mitigation. </p><p> The final section utilizes an agent-based model of mobile application adoption combined with social network data and mobile marketplace policy. The result is an examination of the dynamic effects of user and market behavior on the spread of mobile malware and the second order effects, such as privacy loss, due to that spread. This model reveals that well-regulated markets are effective at limiting malware spread, but user behavior grows in importance as markets become less restricted. </p><p> Each study examines ways in which users interact with their technology, the aggregate effects of those behaviors, and identifies possible inflection points to change system-wide behaviors. This dissertation integrates empirical behavioral studies to develop a better understanding of digital behavior, thus enabling a more holistic approach to information security.</p>

Page generated in 0.0496 seconds