• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 456
  • 10
  • 8
  • 6
  • Tagged with
  • 1052
  • 1052
  • 739
  • 316
  • 307
  • 307
  • 295
  • 287
  • 248
  • 239
  • 205
  • 204
  • 113
  • 86
  • 85
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
911

PARENT-IMPLEMENTED LANGUAGE INTERVENTION WITH YOUNG CHILDREN FROM LOW-SES ENVIRONMENTS WHO HAVE LANGUAGE IMPAIRMENT

Hatcher, Courtney Allison 01 January 2018 (has links)
In this study, the author examined the effects of training four parents from low-socioeconomic environments to use Enhanced Milieu Teaching (EMT) with their young children with language impairment. The investigator used a modified Teach-Model-Coach-Review method to teach parents to use the following EMT strategies during 8-10 individualized, home-based sessions: matched turns, expansions, time delays and milieu teaching prompts. A single-case multiple-baseline design across-behaviors replicated across four parent/child dyads was used to evaluate the parents' use of the EMT strategies. Child language outcomes were also assessed using pre- and post-intervention language samples. All parents learned and demonstrated use of each language support strategy to set criterion levels. Results from this study indicated a functional relation between the brief parent-implemented language intervention training and parents’ use of language support strategies. Additionally, all four children demonstrated gains in expressive language. Additional research is needed to assess fidelity and dosage of parents’ use of strategies on specific child language outcomes and to determine how to facilitate maintenance of parents’ use of strategies over time.
912

MYOSIN-XVA IS KEY MOLECULE IN ESTABLISHING THE ARCHITECTURE OF MECHANOSENSORY STEREOCILIA BUNDLES OF THE INNER EAR HAIR CELLS

Hadi, Shadan 01 January 2018 (has links)
Development of hair cell stereocilia bundles involves three stages: elongation, thickening, and supernumerary stereocilia retraction. Although Myo-XVa is known to be essential for stereocilia elongation, its role in retraction/thickening remains unknown. We quantified stereocilia numbers/diameters in shaker-2 mice (Myo15sh2) that have deficiencies in “long” and “short” isoforms of myosin-XVa, and in mice lacking only the “long” myosin-XVa isoform (Myo15ΔN). Our data showed that myosin-XVa is largely not involved in the developmental retraction of supernumerary stereocilia. In normal development, the diameters of the first (tallest)/second row stereocilia within a bundle are equal and grow simultaneously. The diameter of the third row stereocilia increases together with that of taller stereocilia until P1-2 and then either decreases almost two-fold in inner hair cells (IHCs) or stays the same in outer hair cells (OHCs), resulting in a prominent diameter gradation in IHCs and less prominent in OHCs. Sh2 mutation abolishes this gradation in IHCs/OHCs. Stereocilia of all rows grow in diameters nearly equally in Myo15sh2/sh2 IHCs and OHCs. Conversely, ΔN mutation does not affect normal stereocilia diameter gradation until ~P8. Therefore, myosin-XVa “short” isoform is essential for developmental thinning of third row stereocilia, which causes diameter gradation within a hair bundle.
913

THE IMPACT OF DYSPHAGIA AND GASTROSTOMY ON QUALITY OF LIFE IN CAREGIVERS OF PATIENTS WITH AMYOTROPHIC LATERAL SCLEROSIS

Goggin, Emily Clare Sither 01 January 2019 (has links)
There is little research studying the relationship between caregiver quality of life and gastrostomy, a palliative intervention recommended to manage dysphagia and malnutrition in patients diagnosed with Amyotrophic Lateral Sclerosis (ALS). To facilitate a more comprehensive assessment of treatment effectiveness and to better guide patients and their families, this study investigated the relationship between gastrostomy, caregiver strain, and patient disease-related factors. Patients with bulbar-onset ALS and their caregivers were recruited regardless of their decision to accept or decline future gastrostomy. Caregivers completed the Modified Caregiver Strain Index (MCSI) to assess levels of caregiver strain as an index of quality of life. Surveys were completed at 3-month intervals prior to gastrostomy and at a single time point following gastrostomy. Of 13 patient-caregiver dyads recruited, 1 dyad completed both phases of the study as of yet. This caregiver reported increased caregiver strain following gastrostomy. Medical interventions aimed at managing dysphagia, such as gastrostomy, may not have a predictable impact on caregiver strain, as indexed by the MCSI, or changes in caregiver strain may reflect characterological differences among patient-caregiver dyads. Other psychosocial factors within a given patient-caregiver dyad may be stronger predictors of caregiver strain, burden, and quality of life in caregivers.
914

An Adaptation of an Auditory Perception Test

Gonzalez, Daniel 26 June 2018 (has links)
The Auditory Perception Test for the Hearing Impaired, 3rd edition (APT/HI-3) was adapted into an auditory perception assessment tool for Spanish-speaking children called the Auditory Perception Test for the Hearing Impaired—Spanish (APT/HI-S). Test items from the APT/HI-S were then validated by three groups of Spanish-English bilinguals to determine if selected words were developmentally and linguistically appropriate for 3-year old children. Survey results revealed that 37 out of 62 words were considered developmentally and grammatically appropriate. The APT/HI-S was then administered to two 3-year old and two 5-year old children, two with typical hearing and two with hearing loss. Results revealed that language proficiency played an integral role in the measurement of auditory perception skills. The children demonstrated better performance when tested in their dominant language, reinforcing the need to have a language-specific assessment tool to obtain a more accurate picture of auditory and speech perception skills in children.
915

Feature-based rapid object detection : from feature extraction to parallelisation : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Computer Sciences at Massey University, Auckland, New Zealand

Barczak, Andre Luis Chautard January 2007 (has links)
This thesis studies rapid object detection, focusing on feature-based methods. Firstly, modifications of training and detection of the Viola-Jones method are made to improve performance and overcome some of the current limitations such as rotation, occlusion and articulation. New classifiers produced by training and by converting existing classifiers are tested in face detection and hand detection. Secondly, the nature of invariant features in terms of the computational complexity, discrimination power and invariance to rotation and scaling are discussed. A new feature extraction method called Concentric Discs Moment Invariants (CDMI) is developed based on moment invariants and summed-area tables. The dimensionality of this set of features can be increased by using additional concentric discs, rather than using higher order moments. The CDMI set has useful properties, such as speed, rotation invariance, scaling invariance, and rapid contrast stretching can be easily implemented. The results of experiments with face detection shows a clear improvement in accuracy and performance of the CDMI method compared to the standard moment invariants method. Both the CDMI and its variant, using central moments from concentric squares, are used to assess the strength of the method applied to hand-written digits recognition. Finally, the parallelisation of the detection algorithm is discussed. A new model for the specific case of the Viola-Jones method is proposed and tested experimentally. This model takes advantage of the structure of classifiers and of the multi-resolution approach associated with the detection method. The model shows that high speedups can be achieved by broadcasting frames and carrying out the computation of one or more cascades in each node.
916

On fast and space-efficient database normalization : a dissertation presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Palmerston North, New Zealand

Koehler, Henning January 2007 (has links)
A common approach in designing relational databases is to start with a relation schema, which is then decomposed into multiple subschemas. A good choice of sub- schemas can often be determined using integrity constraints defined on the schema. Two central questions arise in this context. The first issue is what decompositions should be called "good", i.e., what normal form should be used. The second issue is how to find a decomposition into the desired form. These question have been the subject of intensive research since relational databases came to life. A large number of normal forms have been proposed, and methods for their computation given. However, some of the most popular proposals still have problems: - algorithms for finding decompositions are inefficient - dependency preserving decompositions do not always exist - decompositions need not be optimal w.r.t. redundancy/space/update anomalies We will address these issues in this work by: - designing effcient algorithms for finding dependency preserving decompositions - proposing a new normal form which minimizes overall storage space. This new normal form is then characterized syntactically, and shown to extend existing normal forms.
917

The future of personal area networks in a ubiquitous computing world : a thesis presented in partial fulfillment of the requirements for the degree of Master of Information Sciences in Information Systems at Massey University at Massey University, Auckland, New Zealand

Zhao, Fei January 2008 (has links)
In the future world of ubiquitous computing, wireless devices will be everywhere. Personal area networks (PANs), networks that facilitate communications between devices within a short range, will be used to send and receive data and commands that fulfill an individual’s needs. This research determines the future prospects of PANs by examining success criteria, application areas and barrierschallenges. An initial set of issues in each of these three areas is identified from the literature. The Delphi Method is used to determine what experts believe what are the most important success criteria, application areas and barrierschallenges. Critical success factors that will determine the future of personal area networks include reliability of connections, interoperability, and usability. Key application areas include monitoring, healthcare, and smart things. Important barriers and challenges facing the deployment of PAN are security, interference and coexistence, and regulation and standards.
918

Database training for novice end users : a design research approach : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Systems at Massey University, Albany, New Zealand

Blakey, Jeremy Peter January 2008 (has links)
Of all of the desktop software available, that for the implementation of a database is some of the most complex. With the increasing number of computer users having access to this sophisticated software, but with no obvious way to learn the rudiments of data modelling for the implementation of a database, there is a need for a simple, convenient method to improve their understanding. The research described in this thesis represents the first steps in the development of a tool to accomplish this improvement. In a preliminary study using empirical research a conceptual model was used to improve novice end users’ understanding of the relational concepts of data organisation and the use of a database software package. The results showed that no conclusions could be drawn about either the artefact used or the method of evaluation. Following the lead of researchers in the fields of both education and information systems, a design research process was developed, consisting of the construction and evaluation of a training artefact. A combination of design research and a design experiment was used in the main study described in this thesis. New to research in information systems, design research is a methodology or set of analytical techniques and perspectives, and this was used to develop a process (development of an artefact) and a product (the artefact itself). The artefact, once developed, needed to be evaluated for its effectiveness, and this was done using a design experiment. The experiment involved exposing the artefact to a small group of end users in a realistic setting and defining a process for the evaluation of the artefact. The artefact was the tool that would facilitate the improvement of the understanding of data modelling, the vital precursor to the development of a database. The research was conducted among a group of novice end users who were exposed to the artefact, facilitated by an independent person. In order to assess whether there was any improvement in the novices’ understanding of relational data modelling and database concepts, they then completed a post-test. Results confirmed that the artefact, trialled through one iteration, was successful in improving the understanding of these novice end users in the area of data modelling. The combination of design research and design experiment as described above gave rise to a new methodology, called experimental design research at this early juncture. The successful outcome of this research will lead to further iterations of the design research methodology, leading in turn to the further development of the artefact which will be both useful and accessible to novice users of personal computers and database software. This research has made the following original contributions. Firstly, the use of the design research methodology for the development of the artefact, which proved successful in improving novice users’ understanding of relational data structures. Secondly, the novel use of a design experiment in an information systems project, which was used to evaluate the success of the artefact. And finally, the combination of the developed artefact followed by its successful evaluation using a design experiment resulted in the hybrid experimental design research methodology. The success of the implementation of the experimental design research methodology in this information systems project shows much promise for its successful application to similar projects.
919

Capturing event metadata in the sky : a Java-based application for receiving astronomical internet feeds : a thesis presented in partial fulfilment of the requirements for the degree of Master of Computer Science in Computer Science at Massey University, Auckland, New Zealand

Jiang, Feng January 2008 (has links)
When an astronomical observer discovers a transient event in the sky, how can the information be immediately shared and delivered to others? Not too long time ago, people shared the information about what they discovered in the sky by books, telegraphs, and telephones. The new generation of transferring the event data is the way by the Internet. The information of astronomical events is able to be packed and put online as an Internet feed. For receiving these packed data, an Internet feed listener software would be required in a terminal computer. In other applications, the listener would connect to an intelligent robotic telescope network and automatically drive a telescope to capture the instant Astrophysical phenomena. However, because the technologies of transferring the astronomical event data are in the initial steps, the only resource available is the Perl-based Internet feed listener developed by the team of eSTAR. In this research, a Java-based Internet feed listener was developed. The application supports more features than the Perl-based application. After applying the rich Java benefits, the application is able to receive, parse and manage the Internet feed data in an efficient way with the friendly user interface. Keywords: Java, socket programming, VOEvent, real-time astronomy
920

Ontological lockdown assessment : a thesis presented in partial fulfilment of the requirements for the degree of Master of Science in Information Technology at Massey University, Palmerston North, New Zealand

Steele, Aaron January 2008 (has links)
In order to keep shared access computers secure and stable system administrators resort to locking down the computing environment in order to prevent intentional and unintentional damage by users. Skilled attackers are often able to break out of locked down computing environments and intentionally misuse shared access computers. This misuse has resulted in cases of mass identity theft and fraud, some of which have had an estimated cost ranging in millions. In order to determine if it is possible to break out of locked down computing environments an assessment method is required. Although a number of vulnerability assessment techniques exist, none of the existing techniques are sufficient for assessing locked down shared access computers. This is due to the existing techniques focusing on traditional, application specific, software vulnerabilities. Break out path vulnerabilities (which are exploited by attackers in order to break out of locked down environments) differ substantially from traditional vulnerabilities, and as a consequence are not easily discovered using existing techniques. Ontologies can be thought of as a modelling technique that can be used to capture expert knowledge about a domain of interest. The method for discovering break out paths in locked down computers can be considered expert knowledge in the domain of shared access computer security. This research proposes an ontology based assessment process for discovering break out path vulnerabilities in locked down shared access computers. The proposed approach is called the ontological lockdown assessment process. The ontological lockdown assessment process is implemented against a real world system and successfully identifies numerous break out path vulnerabilities.

Page generated in 0.1307 seconds