• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 154
  • 103
  • 39
  • 20
  • 18
  • 12
  • 10
  • 8
  • 6
  • 5
  • 5
  • 5
  • 4
  • 3
  • 2
  • Tagged with
  • 463
  • 122
  • 105
  • 103
  • 84
  • 73
  • 73
  • 73
  • 73
  • 73
  • 72
  • 72
  • 65
  • 54
  • 49
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Effects of sexting on perceptions of sexual intent, sexual consent, and responsibility in sexual encounters

Dir, Allyson L. 05 1900 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Sexting has been linked to a range of sexual behaviors, including sexual assault; however, the mechanism through which sexting increases the risk for sexual assault is unknown. One explanation for the role of sexting in sexual assault could be due to gender differences in sexting and sexual communication. The current study examined men’s and women’s perceptions of sexting as a form of communicating sexual intent and sexual consent, and how sexting influences attributions of responsibility and blame in sexual encounters and alleged sexual assault. Additionally, considering the role of alcohol in sexual assault, the study also examined how both sexting and alcohol influenced individuals’ perceptions of a sexual scenario. Method:Using a factorial vignette design, N = 525 college students (48.6% women; 71% Caucasian) were randomly assigned to one of four vignettes regarding a sexual scenario between a man and woman (John and Jennifer), with sexting and/or alcohol involved. Results: Significant differences in sexting vs. texting conditions were seen for perceptions of sexual intent (F = 147.28, p< .01) and sexual consent (F = 105.86, p< .01). Men were more likely to perceive that sexual consent was exchanged (F = 9.16, p< .01) and to interpret the sext as a consent cue (F = 7.82, p< .01). John was attributed more responsibility/blame across all conditions (F = 154.58, p< .01); however, Jennifer was attributed more blame in the sexting conditions (F = 9.16, p< .01). Conclusion: Results suggest that despite sexting as a signal of sexual interest, there are differences in how men and women perceive sexting as sexual consent, which may influence the risk for sexual assault. Additionally, there are differential effects of sexting for men vs. women, such that women may be judged more harshly for sexting, suggesting evidence of the sexual double standard. Results offer important implications for sexual assault prevention and sexual gender roles.
72

A Study on Fine-Grained User Behavior Analysis in Web Search / Web検索における細粒度ユーザ行動の分析に関する研究

Umemoto, Kazutoshi 23 March 2016 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(情報学) / 甲第19852号 / 情博第603号 / 新制||情||105(附属図書館) / 32888 / 京都大学大学院情報学研究科社会情報学専攻 / (主査)教授 田中 克己, 教授 石田 亨, 教授 吉川 正俊 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
73

Analysis of Operator's Energy Savings with Wrong Estimation in Intent in an Exoskeleton System

Fang, Shanpu 28 August 2018 (has links)
No description available.
74

Teacher Participation and Motivation inProfessional Development

Hill, Krystal A 01 December 2015 (has links) (PDF)
Although professional development is accepted as important for making educational improvements, some have been unsuccessful due to how the teachers choose to participate, and the lack of motivation in teachers to attend or implement the suggested changes. A case study of secondary mathematics teachers in a required professional development is used to look at teachers' motivation and participation during the professional development. This study compared mathematics teachers' motivation to attend with ways of participating in order to determine how these influence a teacher's intent to change. It was found that certain aspects of motivation and participation does influence a teacher's intent to change.
75

Pharmacy Ownership Interest of Pharmacy Students

Lohana, Bhairavi B. January 2010 (has links)
No description available.
76

Capabilities, Strategic Intent and Firm Performance: An Empirical Investigation

Brown, Richard S. January 2013 (has links)
This dissertation consists of three papers that are linked through the topic of organizational capabilities. The first paper, entitled "Organizational Core Capabilities, Strategic Intent and Performance: A Study of the Pharmaceutical Industry," looks at the association between capabilities, strategic intent and performance. Employing capabilities theory and the strategic intent literature, I model (i) the association of firm-level capabilities and rigidities on performance, (ii) the association of strategic intent and performance and (iii) the interaction effects of capabilities and strategic intent upon performance. Our sample consists of pharmaceutical firms during the years 1993 to 2003 and I find that both capabilities and strategic intent are negatively associated with firm performance. The interaction of the two main effects is positively related to performance conditional on firms having high strategic intent. The findings point to potential evidence of core rigidities theory as well as strategic intent theory, which has yet to be empirically tested by scholars. The second paper is entitled "The Impact of Political Capabilities on Firm Performance: An Empirical Investigation." In this paper, I integrate capabilities theory with the literature on corporate political activity (CPA). The CPA literature has been robust in addressing the determinants of a firm's choice to engage in political activities but has been less robust in modeling the CPA-performance link. I address this by first integrating capabilities theory and political action and then by testing a number of constructs on a sample of Fortune 500 firms from varying industries. Specifically, I find that political action committee (PAC) intensity and lobbying intensity is associated with higher firm performance. I then interact PAC intensity with lobbying intensity and also find positive association between this interaction and performance, denoting that these two activities are complements and not substitutes. Finally, I moderate these relationships with industry concentration and find that performance increases for politically active firms as industries become more concentrated. The third paper is titled "Political Capabilities and Rigidities: The Case of AT&T's Acquisition Attempt of T-Mobile USA." This paper studies, in an in-depth case study, the political capabilities of American Telephone and Telegraph (AT&T), focusing on the years 1984-2011. Using capabilities and rigidities theory from management, I provide detailed evidence of (i) AT&T's intent to compete on political capabilities, (ii) the success derived from these political capabilities and (iii) situational failure resulting from an over-reliance on these political capabilities. In the empirical section, I show how the firm failed to assess external information that it needed to adjust its competitive strategy and, as a result, failed to acquire a key competitor. This paper makes contributions to capabilities research, rigidities research and corporate political activity. / Business Administration/Strategic Management
77

Entrepreneurial Orientation, Entrepreneurial Intent and New Venture Creation: Test of a Framework in a Chinese Context

Wu, Jinpei 21 July 2009 (has links)
The empirical evidence is rather weak and sometimes inconsistent as to what predicts an individual's decision to start a business. Among many possible causes, this study attempts to disentangle the effects of individual differences and context. I propose to use a framework involving an individual's entrepreneurial intent, entrepreneurial orientation and four individual difference factors as a means to isolate individual difference determinants of entrepreneurial intent. These are captured in new construct called entrepreneurial orientation. Samples of entrepreneurs and college students from the United States and China were used to test the relationships. The empirical results show that entrepreneurial orientation is positively related to individual differences factors and entrepreneurial intent. Even more, it fully or partially mediates the relationships between the individual differences and entrepreneurial intent. Among the four individual differences listed, opportunity recognition seems to be the best predictor of an individual's entrepreneurial orientation and entrepreneurial intent. Future research should further examine opportunity recognition and entrepreneurial orientation. It appears that attempting to isolate effects of individual differences from context can be a viable strategy for studying determinants of new venture creation. / Ph. D.
78

Inferring the Human's Objective in Human Robot Interaction

Hoegerman, Joshua Thomas 03 May 2024 (has links)
This thesis discusses the use of Bayesian Inference in inferring over the human's objective for Human-Robot Interaction, more specifically, it focuses upon the adaptation of methods to better utilize the information for inferring upon the human's objective for Reward Learning and Communicative Shared Autonomy settings. To accomplish this, we first examine state-of-the-art methods for approaching Bayesian Inverse Reinforcement learning where we explore the strengths and weaknesses of current approaches. After which we explore alternative methods for approaching the problem, borrowing similar approaches to those of the statistics community to apply alternative methods to improve the sampling process over the human's belief. After this, I then move to a discussion on the setting of Shared Autonomy in the presence and absence of communication. These differences are then explored in our method for inferring upon an environment where the human is aware of the robot's intention and how this can be used to dramatically improve the robot's ability to cooperate and infer upon the human's objective. In total, I conclude that the use of these methods to better infer upon the human's objective significantly improves the performance and cohesion between the human and robot agents within these settings. / Master of Science / This thesis discusses the use of various methods to allow robots to better understand human actions so that they can learn and work with those humans. In this work we focus upon two areas of inferring the human's objective: The first is where we work with learning what things the human prioritizes when completing certain tasks to better utilize the information inherent in the environment to best learn those priorities such that a robot can replicate the given task. The second body of work surrounds Shared Autonomy where we work to have the robot better infer what task a human is going to do and thus better allow the robot to assist with this goal through using communicative interfaces to alter the information dynamic the robot uses to infer upon that human intent. Collectively, the work of the thesis works to push that the current inference methods for Human-Robot Interaction can be improved through the further progression of inference to best approximate the human's internal model in a given setting.
79

Hand gestures as a trigger for system initialisation

Tan, Jason, O'Donnell, Jake January 2020 (has links)
Biometriska lösningar för åtkomstkontroll är ett blomstrande koncept. Precise Biometrics är ett företag som fokuserar på just biometriska lösningar relaterade till åtkomstkontroll. YOUNiQ är en produkt som fokuserar på ansiktsigenkänning. Denna produkt använder ansiktsigenkännig för att ge åtkomst till registrerade användare i systemet. Ett problem som uppstår vid att använda ansiktsigenkänning är att alla som befinner sig tillräckligt nära kameran blir skannade, även de som inte är registrerade. Denna avhandlingen har som mål att implementera ett avsiktsmedvetet system som använder en utlösare för att starta ett system. Istället för att använda ansiktsigenkänning på alla individer använder systemet gester som en utlösare för att starta systemet. Denna avhandlingen fokuserar inte på ansiktsigenkännning utan istället på utlösaren för att starta en process. Utvecklingsfasen sker i form utav en iterativ process för att skapa en prototyp. För att utvärdera systemet utfördes testfall för varje gest som är inkluderat i systemet. Efter testfallen var färdigställda sattes dem i ett verkligt scenario för att simulera en komplett interaktion med systemet. Utvärderingen användes sedan för att bestämma och vägleda för implementationen av ett avsiktsmedvetet system. Denna implementation kan ses som en signal till underliggande funktioner för att extrahera biometrisk data för till exempel ansiktsigenkänning. / Biometric solutions for access control is a thriving concept, Precise Biometrics is a company that focuses on just that. YOUNiQ is a product that focuses on facial identification for access control, with it comes an issue in where every person's face is being identified. This means identifying people that do not want to use the facial identification module. This thesis focuses on implementing an intent-aware system, a system which uses a trigger to begin a process. This thesis was done in collaboration with engineers at Precise Biometrics. Instead of identifying faces without permission the intent-aware system uses a trigger based on different hand gestures to begin the process. This thesis does not focus on face identification but instead the trigger before a specific process begins. The development phase consisted of an iterative process in creating the prototype system. In order to evaluate the system, test cases were done to verify accuracy of each hand gesture. Thereafter, a scenario was created to simulate an activation of the prototype system. The evaluation was used to determine the convenience and guidance when implementing intent-aware systems. Furthermore, the system can be seen as a form of trigger to allow for extracting biometric data in for example face identification.
80

Modélisation au niveau transactionnel de l'architecture et du contrôle relatifs à la gestion d'énergie de systèmes sur puce / TLM modelling of architecture and control of power management structure for system on chips

Affes, Hend 18 December 2015 (has links)
Les systèmes embarqués sur puce (SoC) envahissent notre vie quotidienne. Avec les progrès technologiques, ils intègrent de plus en plus de fonctionnalités complexes impliquant des charges de calcul et des tailles de mémoire importantes. Alors que leur complexité est une tendance clé, la consommation d’énergie est aussi devenue un facteur critique pour la conception de SoC. Dans ce contexte, nous avons étudié une approche de modélisation au niveau transactionnel qui associe à un modèle fonctionnel SystemC-TLM une description d’une structure de gestion d’un arbre d’horloge décrit au même niveau d’abstraction. Cette structure développée dans une approche de séparation des préoccupations fournit à la fois l’interface pour la gestion de puissance des composants matériels et pour le logiciel applicatif. L’ensemble des modèles développés est rassemblé dans une librairie ClkARCH. Pour appliquer à un modèle fonctionnel un modèle d’un arbre d’horloge, nous proposons une méthodologie en trois étapes : spécification, modélisation et simulation. Une étape de vérification en simulation est aussi considérée basée sur des contrats de type assertion. De plus, nos travaux visent à être compatibles avec des outils de conception actuels. Nous avons proposé une représentation d’une structure de gestion d’horloge et de puissance dans le standard IP-XACT permettant de produire les descriptions C++ des structures de gestion de puissance du SoC. Enfin, nous avons proposé une approche de gestion de puissance basée sur l’observation globale des états fonctionnels du système dans le but d’éviter ainsi des prises de décisions locales peu efficaces à une optimisation de l’énergie. / Embedded systems-on-chip (SoC) invade our daily life. With advances in semiconductor technology, these systems integrate more and more complex and energy-intensive features which generate increasing computation load and memory size requirements. While the complexity of these systems is a key trend, energy consumption has emerged as a critical factor for SoC designers. In this context, we have studied a modeling transactional level approach allowing a description of a clock tree and its management structure to be associated with a functional model, both described at the same abstraction level. This structure developed in a separation of concerns approach provides both the interface to the power consumption management of the hardware components and the application software. All the models developed are gathered in a C++ ClkArch library. To apply to a SystemC-TLM architecture model a clock tree intent with its control part, we propose a methodology based on three steps: specification, modeling and simulation. A verification step based on simulation is also considered using contracts of assertion type. This work aims to build a modelling approach on current design tools. So we propose a representation of a clock and power management structure in the IP-XACT standard allowing a C++ description of the SoC power management structures to be generated. Finally, a power management strategy based on the global functional states of the components of the system architecture is proposed. This strategy avoids local decision-making unsuited to optimized overall power/energy management.

Page generated in 0.0752 seconds