• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2563
  • 1073
  • 779
  • 356
  • 271
  • 251
  • 93
  • 66
  • 54
  • 41
  • 37
  • 36
  • 34
  • 34
  • 32
  • Tagged with
  • 6668
  • 870
  • 779
  • 718
  • 638
  • 577
  • 550
  • 545
  • 406
  • 374
  • 354
  • 343
  • 334
  • 294
  • 260
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Network Goods, Information and Identification: Complementarities and Strategic Behavior

Lazzati, Natalia January 2011 (has links)
The notion of complementarity is fundamental to economics, as reflected in the large and growing number of studies that invoke alternate conceptions of this idea. Though complementarity has been studied for many years, its connection with theory of supermodularity is far more recent. Taking advantage of these techniques, the first three chapters of this dissertation study aspects of interest in network markets; endogenous information acquisition; and some insights into the comparison of player's equilibrium strategies. The last chapter applies this methodology to econometric identification.Chapter one provides a thorough analysis of oligopolistic markets with positive demand-side network externalities and perfect compatibility. With a general complementarity structure on the model primitives allowing for products with low or high stand-alone values, a nontrivial fulfilled-expectations equilibrium exists. We formalize the concept of industry viability, investigate its determinants, and show that viability is always enhanced by having more firms in the market and/or by technological progress.The second chapter studies covert information acquisition in common value Bayesian games of strategic complementarities. Using the supermodular stochastic order to arrange the structures of information increasingly in terms of preferences, we provide novel, easily interpretable conditions under which the value of information is globally convex, and study the implications in terms of the equilibrium configuration. Our analysis also enlightens the effect of information on players' behavior.Chapter three proposes a simple approach to compare players' equilibrium choices in asymmetric games with strategic complementarities. We offer three applications of our idea to industrial organization and behavioral economics.The last chapter studies (nonparametric) partial identification of treatment response with social interactions. It imposes economically driven monotone conditions to the primitives of the model, i.e., the structural equations, and shows that they imply shape restrictions on the distribution of potential outcomes by means of monotone comparative statics. We propose precise conditions that validate counterfactual predictions in models with multiple equilibria. Under three sets of assumptions, we identify sharp distributional bounds (in terms of stochastic dominance) on the potential outcomes given observable data. We illustrate our results by studying the effect of police per-capita on crime rates in New York state.
212

Towards the positional cloning of the Cornelia de Lange syndrome gene at chromosome 3q26.3

Imamwerdi, Burhan January 2000 (has links)
No description available.
213

Investigation of a biochemical marker of pulmonary eosinophil influx as a predictive assay for low molecular weight respiratory sensitisers

Blackwell, Malcolm Peter January 1999 (has links)
No description available.
214

The development of a genetic programming method for kinematic robot calibration

Dolinsky, Jens-Uwe January 2001 (has links)
No description available.
215

A genetic investigation of blood pressure and other quantitative cardiovascular risk factors in humans

Keavney, Bernard January 1999 (has links)
No description available.
216

Fingerprinting at the Bar : criminal identification in liberal and fascist Italy

Pagani, Massimiliano January 2009 (has links)
Between the end of the nineteenth and the first half of the twentieth century, criminal anthropology was a very influential theory for criminologists throughout the western world. Proposed by the Italian alienist Cesare Lombroso, its theoretical core centred on the figure of the “criminal man,” a character atavistic instinct forced to live a life of crime. By filling a gap in the literature, this work deals with the historical and sociological circumstances in which criminal anthropology emerged and prospered, and concentrates on the impact Lombroso’s theory had on the development of scientific policing in Italy since the beginning of the twentieth century. A detailed account of the causes that favoured the rise of Lombroso’s scientific police provides an explanation for the appeal criminal anthropology exerted on western political elites. In Italy, the Lombrosian approach left his mark on the development of highly specific forensic tools like fingerprinting, and this had a strong impact on their utilisation by fascist authorities as the account of a famous case of identity fraud occurred in Italy in 1927 revealed. As a result, it is argued that the production of Lombrosian scientific policing was shaped by the wider cultural and social goals of the actors involved, as it is of any other form of knowledge. By choosing to sideline Lombrosian techniques, fascist authorities favoured the exploitation of un-scientific methods of crime prevention that, it is argued, were not perceived as inferior, anachronistic, or unreliable. Such a choice was dictated by specific social goals that favoured the implementation of constitutional anthropology on Lombrosian science of the deviance. Finally, it is suggested that this socio-historical reading of the Italian case could cast more light on the complex relationship between totalitarianism, technology, and forms public surveillance.
217

The emotional eyewitness : an investigation into the effects of anger on eyewitness recall and recognition performance

Houston, Kate Alexandra January 2010 (has links)
The present thesis examined the effects of anger on the completeness and accuracy of eyewitness free and cued recall and recognition performance. Anger was revealed by a recent survey as the emotion experienced by the majority of eyewitnesses to crime, so is particularly important in this context. Previous literature has tended to use generic concepts such as ‘emotion’ or ‘stress’ to investigate emotion effects, but this thesis sought to examine the effect of the specific emotion of anger on memory. Experiment 1 tested theoretical predictions regarding the effects of anger on encoding and retrieval processes. In line with these predictions, angry participants provide more complete descriptions of a perpetrator compared to neutral participants. However, angry participants provide less complete descriptions of the perpetrator’s actions than their neutral counterparts. This pattern of results was replicated throughout all experiments in this thesis. Experiment 2 revealed that anger has no effect on the completeness and accuracy of victim descriptions. Experiment 3 found that the pattern of anger effects observed for a younger adult sample were also found when older adults were tested. This prompted a statistical comparison of younger and older adults which found very few age effects and no interactions between age of the participant, experience of anger and the category of detail recalled. The final experiment thoroughly investigated the effects of anger on participants’ ability to recognise the perpetrator from a photographic lineup. The main findings of this thesis suggest that while angry eyewitnesses may be able to provide a more complete description of the perpetrator, they may be less able to describe what he did, and less able to accurately recognise him from a lineup than neutral eyewitnesses. These findings are discussed in terms of cognitive and meta-cognitive models of encoding and retrieval.
218

RFID meets GWOT considering a new technology for a new kind of war

Kirby, Kevin Lee 06 1900 (has links)
The purpose of this thesis is to provide insight into the potential benefits that Radio Frequency Identification (RFID) technology may provide USSOCOM and other commands in the Global War on Terror. This thesis will explain the basic concept behind RFID, and cite some of the current day applications of today that are revolutionizing the civilian sector. More importantly, this thesis will introduce conceptual security applications that could benefit USSOCOM today, highlighting the possible successes and downfalls that these applications might include. / US Army (USA) author
219

Image-based mapping system for transplanted seedlings

McGahee, Kyle January 1900 (has links)
Master of Science / Department of Mechanical and Nuclear Engineering / Dale Schinstock / Developments in farm related technology have increased the importance of mapping individual plants in the field. An automated mapping system allows the size of these fields to scale up without being hindered by time-intensive, manual surveying. This research focuses on the development of a mapping system which uses geo-located images of the field to automatically locate plants and determine their coordinates. Additionally, this mapping process is capable of differentiating between groupings of plants by using Quick Response (QR) codes. This research applies to green plants that have been grown into seedlings before being planted, known as transplants, and for fields that are planted in nominally straight rows. The development of this mapping system is presented in two stages. First is the design of a robotic platform equipped with a Real Time Kinematic (RTK) receiver that is capable of traversing the field to capture images. Second is the post-processing pipeline which converts the images into a field map. This mapping system was applied to a field at the Land Institute containing approximately 25,000 transplants. The results show the mapped plant locations are accurate to within a few inches, and the use of QR codes is effective for identifying plant groups. These results demonstrate this system is successful in mapping large fields. However, the high overall complexity makes the system restrictive for smaller fields where a simpler solution may be preferable.
220

Investigating and comparing multimodal biometric techniques

19 May 2009 (has links)
M.Sc. / Determining the identity of a person has become vital in today’s world. Emphasis on security has become increasingly more common in the last few decades, not only in Information Technology, but across all industries. One of the main principles of security is that a system only be accessed by a legitimate user. According to the ISO 7498/2 document [1] (an international standard which defines an information security system architecture) there are 5 pillars of information security. These are Identification/Authentication, Confidentiality, Authorization, Integrity and Non Repudiation. The very first line of security in a system is identifying and authenticating a user. This ensures that the user is who he/she claims to be, and allows only authorized individuals to access your system. Technologies have been developed that can automatically recognize a person by his unique physical features. This technology, referred to as ‘biometrics’, allows us to quickly, securely and conveniently identify an individual. Biometrics solutions have already been deployed worldwide, and it is rapidly becoming an acceptable method of identification in the eye of the public. As useful and advanced as unimodal (single biometric sample) biometric technologies are, they have their limits. Some of them aren’t completely accurate; others aren’t as secure and can be easily bypassed. Recently it has been reported to the congress of the U.S.A [2] that about 2 percent of the population in their country do not have a clear enough fingerprint for biometric use, and therefore cannot use their fingerprints for enrollment or verification. This same report recommends using a biometric system with dual (multimodal) biometric inputs, especially for large scale systems, such as airports. In this dissertation we will investigate and compare multimodal biometric techniques, in order to determine how much of an advantage lies in using this technology, over its unimodal equivalent.

Page generated in 0.1216 seconds