• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 326
  • 181
  • 59
  • 49
  • 40
  • 36
  • 8
  • 6
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 1
  • Tagged with
  • 843
  • 125
  • 120
  • 102
  • 89
  • 81
  • 75
  • 73
  • 67
  • 53
  • 46
  • 46
  • 45
  • 41
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
351

Embodied Cognition and Deception : The Influence of Emotional Congruence in Detecting Lies

Määttä, Jessica January 2012 (has links)
The influence of facial mimicry and emotional congruence on emotional information processing has previously only been studied in isolation. In the current study their influence on the ability to detect deception will be investigated. In order to recognize the emotional states of others one mimics their emotional facial expression, and being in a congruent emotional state as a person or an emotional message enables faster processing of emotional information. Can emotional congruence between the receiver’s emotional state and a message told affect participants’ ability to detect deception when judging whether a person at a video recording is telling the truth or not? How does emotional congruence affect participants’ speed and confidence when making these judgments? The results showed that participants reported higher confidence but slower response times when making an accurate judgment in the congruent scenario, when compared to the incongruent scenario, but did not perform better than what could be expected by chance in detecting deception. Consequently, emotional congruence had an impact, not on participants’ performance in detecting deception, but only on their meta-cognitive evaluations of their judgments, but confidence rating did not seem to be an indicator of accuracy. In future research the design can be used in order to investigate other potential aspects, such as emotional empathy and other types of emotional congruence, and their influence on the ability to detect deception.
352

Oljeläckage torkparti PM12 : Utvärdering av oljeläckage i torkparti PM12 / Evaluation of oil leakage in dryer section PM12

Folmerz, Mattias January 2017 (has links)
Stora Enso Kvarnsveden är ett pappersbruk lokaliserat vid Dalälven i Kvarnsveden. Bruket har för tillfället två producerande maskiner och detta arbete behandlar en av dem, vilken är PM12. På PM12 har man problem med oljeläckage i maskinens torkparti. Läckagen uppstår genom de lagerhus som finns för att bära upp torkpartiets valsar. I detta arbete har man undersökt vad läckagen beror på med fokus på dess lagertätningar. Syftet och målet med detta arbete har varit att utreda varför läckagen uppstår samt att generera koncept för att minska eller helt eliminera läckagen. Arbetet har innefattat diverse mätningar och utredningar för att komma till rätta med problemet. En litteraturstudie har genomförts för att identifiera felorsaker samt lösningar. Koncept har genererats utifrån studien samt de mätningar som utförts. Man har inte under arbetets gång helt kommit fram till vad läckagen beror på men man har kommit en bra bit på vägen. Förslag till fortsatt arbete har getts där det rekommenderas mer specifikt vilka typer av mätningar som bör genomföras samt de koncept man som bör bygga vidare på. / Stora Enso Kvarnsveden is a paper mill located at Dalälven in Kvarnsveden. The utility currently has two producing machines, and this study deals with one of them, which is PM12. At PM12 there is a problem with oil leaks in the machine's drying section. Leakage occurs through the bearing houses who are there to support the dryer's rollers. In this study, it has been investigated what the leakage is due to focusing on its bearing seals. The purpose of this study has been to investigate why leakage occurs and to generate concepts to reduce or eliminate leaks. The study has included various measurements and investigations to address the problem. A literature study has been conducted to identify causes and solutions. Concepts have been generated from the literature study as well as the measurements that have been taken. After this study it´s not fully realized why the leakage occurs, but it had come a long bit on the way. Proposals for continued work have been given, where it is recommended more specifically what kind of measurements that should be done and the concepts that should be further developed.
353

Informationsläckage : Orsaker, hantering och påverkan av informationsläckage enligt enskilda individer på organisationer inom den privata samt offentliga sektorn.

Gajek, Arneo, Bard Forsberg, Amanda January 2015 (has links)
Idag är information en av de viktigaste resurser som en organisation kan ha. På grund av den stora mängden information som flödar inom organisationen har det blivit en allt svårare resurs att skydda. Informationsläckage av hemligstämplad information blir därmed ett vanligt problem och kan leda till förödande konsekvenser för organisationer. Informationsläckage kan hanteras samt påverka organisationer på olika sätt och i denna studie undersöker vi huruvida det finns någon skillnad på hur de organisationer vi intervjuat inom den offentliga samt privata sektorn hantera samt påverkas av informationsläckage. Undersökningen inkluderar även vad enskilda individer, som på något sätt är kopplade till informationssäkerheten, inom organisationerna anser är anledningen till att någon väljer att bryta mot informationssäkerheten och läcka information.  En kvalitativ studie har gjorts på sex olika organisationer i Ljungby kommun där vi alltså intervjuat 11 personer med någon anknytning till informationssäkerhet med inriktning mot sekretessavtal. Enligt resultatet framgår det att samtliga informanter är medvetna om problemet informationsläckage och till stor del eniga om hur organisationerna de arbetar på skulle påverkas vid ett informationsläckage samt hur detta skulle hanteras. De informanter som kunde svara på hur de upplevde att organisationerna skulle kunna påverkas menade att organisationernas anseende och förtroende skulle kunna skadas på sikt. Enligt informanterna finns det även likheter i hur organisationerna hanterar informationsläckage, där fem av sex individer i organisationer inom den privata sektorn samt tre av fem informanter i organisationer inom den offentliga sektorn, arbetar med någon typ av avtal/handlingsplan. 10 av 11 informanter tror att det är ett omedvetet val till att läcka information och att det oftast sker till följd av misstag och obetänksamhet. / Information is one of the most important resources of an organization in today’s society. Because of the large amount of information that flows within the organization, information has become an increasingly difficult resource to protect. Information leakage of classified information has become a common problem and can lead to devastating consequences for organizations if it is not handled with care. Information leakage can be managed and affect organizations differently. In this paper we aim to further examine whether there are any differences between how organizations in the public and the private sectors are managing and being affected by information leakage. This paper also aims to examine what the individuals of each organization believe is the reason to why an employee would leak information. A qualitative study has been made on six different organizations in the municipality of Ljungby, where 11 people were interviewed with association to information security with focus on confidentiality agreements. According to our results it appears that all informants are aware of information leakage and agree upon how information leakage should be handled in their organizations and how it would affect them. The informants who could answer on how they believe the organization would be affected said that the organization’s reputation and trust could be affected over time. There are also similarities in how the organizations manage information leakage according to our informants, were five of six informants within the private sector and three of six informants within the public sector, work with some type of contract/action plan. 10 of 11 informants believe it’s an unconscious choice to leak information and that is mostly happens because of mistakes and recklessness.
354

On-site leakage in selected suburbs of Johannesburg, South Africa

Lugoma, Faustin Tessa 05 September 2012 (has links)
M.Ing. / An investigation was conducted on on-site leakage in selected suburbs of Johannesburg to determine the average leakage flow rate of water lost per property, as well as the distribution patterns of leakage flow rates for two categories of properties: Residential (single domestic houses on stands) and Other (non-domestic and large domestic users). The incentive of this research project, funded by the Water Research Commission (WRC) of South Africa, was to provide figures and to gain insight into the magnitude of water lost at the consumer level, also defined as "on-site leakage". Little was published on on-site losses compared to water losses in municipal distribution systems. The key information for this study was collected through physical inspection of a group of randomly selected properties and by means of measurements taken from municipal water meters used for billing purpose. The project was assisted by Johannesburg Water (Pty) Ltd who provided a list of 233 properties having water meters of less than five years old. These properties were chosen at random and included properties whose meters were replaced due to meter failure or customer complaints. The results of the research show that overall 64 % of investigated properties had measurable on-site leakage at an average rate of 22.9 I/h per property, equivalent to a monthly volume loss of 16.5 kl per property. The median rate was 5.7 I/h per property, translated into a volume loss of 4.1 kl/month per property. An analysis of the data revealed that the general extreme value distribution and its derivatives (Frechet, Wakeby, Exponential and Gamma) provide good descriptions of the distribution of on-site leakage rates. The apparent losses resulting from metering errors were also estimated. The results of this study should be of interest to water engineers and to decision-makers involved in water demand management. It could form a basis for further investigation in the analysis of on-site leakage on a large scale in South Africa by systematically monitoring all segregated categories of users throughout different cities and towns in South Africa.
355

Investigation of selected properties of a resin-based root canal filling material : an in vitro study

Asheibi, Fatma K. January 2014 (has links)
Following chemo-mechanical cleaning of the root canal system, the provision of a fluid-tight seal is one of the main requirements for successful endodontic treatment. Gutta percha with a sealer has been considered as the gold standard root canal filling for many years. However, it does not have all the properties of an ideal root canal filling. A resin-based root filling, Resilon, has been introduced which has the advantage of bonding to the root canal dentine forming a “monoblock”. Different properties of Resilon have been investigated, but some properties using different obturation techniques and in retreatment need further investigation. The aim of this project was to investigate selected properties of Resilon in primary endodontic treatment (quality of obturation using either cold lateral condensation or thermal compaction, and push-out bond strength following the use of different intracanal medicaments) and secondary endodontic treatment (removability using a combination of hand and rotary instrumentation, fracture resistance and leakage resistance following different removal techniques).Using micro-CT, the volume of voids in root canals obturated with Resilon in comparison with gutta percha using either cold lateral condensation or thermal compaction was investigated. The results showed that there was no significant difference between the two materials regardless of the obturation technique. The use of Vitapex and iodoform was found to significantly reduce the bond strength of Resilon to dentine in comparison with calcium hydroxide and its aqueous combination with iodoform (Calcipast1). The effectiveness of the combined use of hand K-files and ProTaper retreatment files in removal of Resilon using either cold lateral condensation or thermal compaction was compared to that of gutta percha. Micro-CT assessment showed that Resilon resulted in significantly more remaining material than gutta percha when thermal compaction was used. Fracture resistance of retreated roots filled with Resilon was found to be not significantly different from those filled with gutta percha irrespective to the removal technique (either hand K-files or ProTaper retreatment files). Using the same retreatment techniques, dye leakage resistance of root canals re-filled with Resilon was compared with that of primarily treated root canals. The results showed that there was no significant difference in leakage resistance between re-treated and primarily treated root canals. Obturation with Resilon was shown to have no significant advantage over gutta percha in terms of quality of obturation and fracture resistance in retreated roots. More investigation of the clinical performance of Resilon is required before it can be considered as a replacement for gutta percha.
356

A New Wireless Sensor Node Design for Program Isolation and Power Flexibility

Skelton, Adam W. 12 1900 (has links)
Over-the-air programming systems for wireless sensor networks have drawbacks that stem from fundamental limitations in the hardware used in current sensor nodes. Also, advances in technology make it feasible to use capacitors as the sole energy storage mechanism for sensor nodes using energy harvesting, but most current designs require additional electronics. These two considerations led to the design of a new sensor node. A microcontroller was chosen that meets the Popek and Goldberg virtualization requirements. The hardware design for this new sensor node is presented, as well as a preliminary operating system. The prototypes are tested, and demonstrated to be sustainable with a capacitor and solar panel. The issue of capacitor leakage is considered and measured.
357

Developing an Enhanced Model for Combined Heat and Air Infiltration Energy Simulation

Younes, Chadi 07 November 2012 (has links)
The need for efficient, sustainable, and planned utilization of resources is ever more critical. In the U.S. alone, buildings consume 34.8 Quadrillion (1015) BTU of energy annually at a cost of $1.4 Trillion. Of this energy 58% is utilized for heating and air conditioning. Several building energy analysis tools have been developed to assess energy demands and lifecycle energy costs in buildings. Such analyses are also essential for an efficient HVAC design that overcomes the pitfalls of an under/over-designed system. DOE-2 is among the most widely known full building energy analysis models. It also constitutes the simulation engine of other prominent software such as eQUEST, EnergyPro, PowerDOE. Therefore, it is essential that DOE-2 energy simulations be characterized by high accuracy. Infiltration is an uncontrolled process through which outside air leaks into a building. Studies have estimated infiltration to account for up to 50% of a building’s energy demand. This, considered alongside the annual cost of buildings energy consumption, reveals the costs of air infiltration. It also stresses the need that prominent building energy simulation engines accurately account for its impact. In this research the relative accuracy of current air infiltration calculation methods is evaluated against an intricate Multiphysics Hygrothermal CFD building envelope analysis. The full-scale CFD analysis is based on a meticulous representation of cracking in building envelopes and on real-life conditions. The research found that even the most advanced current infiltration methods, including in DOE-2, are at up to 96.13% relative error versus CFD analysis. An Enhanced Model for Combined Heat and Air Infiltration Simulation was developed. The model resulted in 91.6% improvement in relative accuracy over current models. It reduces error versus CFD analysis to less than 4.5% while requiring less than 1% of the time required for such a complex hygrothermal analysis. The algorithm used in our model was demonstrated to be easy to integrate into DOE-2 and other engines as a standalone method for evaluating infiltration heat loads. This will vastly increase the accuracy of such simulation engines while maintaining their speed and ease of use characteristics that make them very widely used in building design.
358

Influencia de sistemas adesivos na penetração e infiltração marginal de materiais resinosos empregados no selamento de fossas e fissuras oclusais

Sousa, Maria de Fatima Alves de 03 June 1998 (has links)
Orientadores: Regina Maria Puppin Rontani, Mario Fernando de Goes / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Odontologia de Piracicaba / Made available in DSpace on 2018-07-24T01:23:45Z (GMT). No. of bitstreams: 1 Sousa_MariadeFatimaAlvesde_M.pdf: 3394004 bytes, checksum: eb6d811292eb170c25158510f6fe88e1 (MD5) Previous issue date: 1998 / Resumo: A efetividade e sucesso clínico dos sei antes dependem da sua retenção na superfície oclusal. Este estudo avaliou a penetração do selante FluroShield (Dentsply) e do compômero Compoglass (Vivadent) e a infiltração do corante fucsina básica na interface esmalte/material. Foram selecionados 64 pré-molares hígidos, distribuídos em 8 grupos, dos quais 4 foram submetidos à técnica convencional (TC) e os outros à técnica Invasiva (TI). Os tratamentos realizados foram: grupo 1- TC e aplicação do Compoglass; grupo 2- TI e aplicação do Compoglass; grupo 3- TC, agente adesivo SCA e Compoglass; grupo 4- TI, agente adesivo SCA e Compoglass; grupo 5- TC e aplicação do FluroShield; grupo 6- TI e aplicação do FluroShield; grupo 7- TC, primer/adesivo PSA e FluroShield; grupo 8- TI, primer/adesivo PSA e FluroShield. Em seguida, os dentes foram submetidos a 500 ciclos térmicos, em banhos alternados de 5 o e 60°c e a seguir imersos em uma solução de fucsina básica a 0,5% por 24 horas. Os dentes foram seccionados no sentido vestíbulo-lingual, polidos e as superfícies observadas em um microscópio óptico, sendo as imagens processadas em um computador através do software (Diracom3). Os valores dos percentuais de penetração dos materiais foram submetidos à análise de variância e ao teste de Tukey (p< 0,05). O material Compoglass aplicado pela técnica convencional, sem o uso de adesivo apresentou média de penetração inferior aos demais tratamentos, sendo a diferença entre as médias estatisticamente significativa. O material FluroShield apresentou médias de penetração semelhantes quando aplicado por ambas as técnicas convencional e invasiva, com ou sem a prévia aplicação de adesivo (p>0,05). A ocorrência de infiltração para as amostras tratadas com Compoglass sem adesivo foi estatisticamente superior ao mesmo material aplicado com adesivo pelo Teste exato de Fisher (p<0,05). Entre as técnicas convencional e invasiva não houve diferenças estatisticamente significativas ao nível de 5%, na ocorrência de infiltração, tanto para Compoglass quanto para FluroShield, pelo teste exato de Fisher. FluroShield aplicado sem adesivo apresentou os menores percentuais de amostras com infiltração quando comparado com o mesmo material associado ao uso de adesivo. Conclui-se que, os maiores percentuais de penetração e os menores percentuais de infiltração foram encontrados para o material FluroShield aplicado sem o adesivo. Para o material Compoglass os maiores percentuais de penetração e menores percentuais de infiltração foram encontrados quando associado ao emprego de adesivo / Abstract: The sealants effectiveness and clinical success depend on retention and reduction of the occlusal caries. This study evaluated the penetration and the microleakage of the FluroShield Sealant (Dentsply) and the Compoglass compomer (Vivadent). Sixty-four premolars, noncarious were used and they were divided into eight groups. Four groups were submitted to Enameloplasty Sealant Technique (EST) and the other one to Conventional Sealant Technique (CST). The group 1: CST and applied Compoglass; group 2: EST and applied Compoglass; group 3: CST, primer SCA and Compoglass; group 4: EST, primer SCA and Compoglass; group 5: CST and applied FluroShield; group 6: EST and applied and Fluroshield; group 7: CST, primer PSA and FluroShield; grupo 8: EST, primer PSA and FluroShield. After that, the teeth were termocycled 500x at temperature 5° and 60°C, and imersed in a 0.5% solution basic fuchsin dye for 24 hours. The teeth were sectioned in a bucal-lingual direction, and they were polished. The surfaces were evaluated on the optical microscope. The images were captured into the computer (Diracom3 System). The percentage data of the penetration of both materiais were submitted to variance analyses and Tukey's Test (p<0.05). The penetration data from the Compoglass samples with no adhesive used by the conventional sealant technique were significantly lower than the other groups (p<0.05). The penetration means those were obtained with the use of FluroShield for both techniques, conventional and invasive, did not show significant differences statistically (p>0.05). Compoglass applied without adhesive showed more leakage percentages than the same material applied with adhesive. FluroShield no adhesive showed lower leakage percentages than the same material used with adhesive. FluroShield used no adhesive and Compoglass used with adhesive provided the highest percentage of penetration and the lowest leakage / Mestrado / Materiais Dentarios / Mestre em Odontologia
359

Quantifying Information Leakage via Adversarial Loss Functions: Theory and Practice

January 2020 (has links)
abstract: Modern digital applications have significantly increased the leakage of private and sensitive personal data. While worst-case measures of leakage such as Differential Privacy (DP) provide the strongest guarantees, when utility matters, average-case information-theoretic measures can be more relevant. However, most such information-theoretic measures do not have clear operational meanings. This dissertation addresses this challenge. This work introduces a tunable leakage measure called maximal $\alpha$-leakage which quantifies the maximal gain of an adversary in inferring any function of a data set. The inferential capability of the adversary is modeled by a class of loss functions, namely, $\alpha$-loss. The choice of $\alpha$ determines specific adversarial actions ranging from refining a belief for $\alpha =1$ to guessing the best posterior for $\alpha = \infty$, and for the two specific values maximal $\alpha$-leakage simplifies to mutual information and maximal leakage, respectively. Maximal $\alpha$-leakage is proved to have a composition property and be robust to side information. There is a fundamental disjoint between theoretical measures of information leakages and their applications in practice. This issue is addressed in the second part of this dissertation by proposing a data-driven framework for learning Censored and Fair Universal Representations (CFUR) of data. This framework is formulated as a constrained minimax optimization of the expected $\alpha$-loss where the constraint ensures a measure of the usefulness of the representation. The performance of the CFUR framework with $\alpha=1$ is evaluated on publicly accessible data sets; it is shown that multiple sensitive features can be effectively censored to achieve group fairness via demographic parity while ensuring accuracy for several \textit{a priori} unknown downstream tasks. Finally, focusing on worst-case measures, novel information-theoretic tools are used to refine the existing relationship between two such measures, $(\epsilon,\delta)$-DP and R\'enyi-DP. Applying these tools to the moments accountant framework, one can track the privacy guarantee achieved by adding Gaussian noise to Stochastic Gradient Descent (SGD) algorithms. Relative to state-of-the-art, for the same privacy budget, this method allows about 100 more SGD rounds for training deep learning models. / Dissertation/Thesis / Doctoral Dissertation Electrical Engineering 2020
360

Information leakage and Stackelberg leadership in Cournot competition

LUO, Huajiang 25 August 2015 (has links)
In duopoly Cournot competition with sequential moves, it is well known that each player prefers Stackelberg leadership without demand uncertainty. We study the same game when the demand is uncertain, and firms possess some private information about the uncertain demand. There are two effects of private information in this game. First, when the Stackelberg leader moves first, its private information is leaked to, or inferred by the Stackelberg follower via the output quantity. Hence, the Stackelberg follower makes decision based on more accurate information than the leader. Second, the leader incurs a cost to signal its information to the follower, which hurts the leader. Both effects hurt the Stackelberg leader, then the follower may earn more ex ante profit than the leader. When the demand is continuous, Gal-or (1987) assumes that firms follow linear decision rules and reports that the follower always sets a higher output quantity than the leader and earns more profit than the leader. However, our study finds that it is true if and only if the demand is unboundedly distributed. Otherwise, the Stackelberg leader's Pareto-optimal output quantity is not linear in its private information unless it observes the highest signal, and the follower does not always earn more ex ante profit than the leader. When the demand is discretely distributed, we study how the number of demand states influences the effect of cost of signaling. With more demand states, the effect of cost of signaling on the leader becomes more significant, and the follower may earn more ex ante profit than the leader.

Page generated in 0.1995 seconds