• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 167
  • 47
  • 33
  • 10
  • 7
  • 6
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 326
  • 89
  • 84
  • 66
  • 66
  • 65
  • 60
  • 58
  • 57
  • 54
  • 50
  • 33
  • 31
  • 30
  • 28
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
231

Gender Inequality in the Law: Deficiencies of Battered Woman Syndrome and a New Solution to Closing the Gender Gap in Self-Defense Law

Doyle, Meredith C. 01 January 2011 (has links)
Dr. Lenore Walker developed battered woman syndrome to address the issue of domestic violence and to give battered women a defense in situations in which they kill their abusive partners when they are not overtly threatening them. Self-defense law is based on male on male combat. Women are less able to protect themselves in an attack by a man, and so they may preemptively attack their sleeping partners to avoid a situation in which they cannot adequately protect themselves. Battered woman syndrome explains why these battered women act in a way that is irrational to a non-battered person. Walker's theory of learned helplessness explains why the woman does not leave the abusive relationship, and the cycle of violence theory explains why she perceives an imminent threat. Battered woman syndrome is problematic in its legal application because of problems with its scientific validity and reliability. It also furthers gender stereotypes and blurs the line between a justification and an excuse defense. While, Dr. Walker's intentions were good, battered woman syndrome is inadequate. Women's difference from men still have to be acknowledged in cases in which battered women kill their husband's, but social agency framework is a more effective way to acknowledge gender differences. This framework takes into account social circumstances that would explain a woman's actions rather than including pathology. This would explain why the woman did not leave an abusive relationship. To avoid the pathology of BWS while explaining why the woman felt an imminent threat, the defense can turn to a pattern of abuse that helps her reasonably recognize when violence is likely.
232

Threat-sensitive learning and generalization of predator recognition by aquatic vertebrates

Ferrari, Maud C.O. 29 January 2009 (has links)
Many prey species lack innate recognition of their potential predators. Hence, learning is required for them to recognize and respond to predation threats. When wild-caught, these same species may show amazing sophistication in their responses to predator cues. They are able to adjust the intensity of their antipredator responses to a particular predator according to the degree of threat posed by that predator. This ability is therefore acquired through learning. While many studies have shown that prey can learn to respond to predator cues through different learning modes, little is known about what the prey are actually learning. The results presented in this thesis show that learned predator recognition goes beyond the simple labelling of predators as dangerous. Using fathead minnows (Pimephales promelas), woodfrog (Rana sylvatica) tadpoles and boreal chorus frog (Pseudacris maculata) tadpoles, I demonstrated that a one time learning event, either through pairing with alarm cues or through social learning, was enough for prey to learn the level of threat associated with the novel predator cues. I showed that the level of danger associated with the predator cues was determined by the concentration of alarm cues when learning through pairing of alarm cues, or by the intensity of antipredator response displayed by the tutors and by the tutor-to-observer ratio when learning occurred through cultural transmission. Moreover, when subsequently exposed to predator cues, prey adjusted their antipredator responses according to the change in concentration of predator cues between the learning event and the subsequent exposure. Prey displayed stronger antipredator responses when exposed to higher concentrations of predator cues and vice versa. When minnows were provided with conflicting information about the danger level associated with a predator, they displayed a safety strategy and used the most recent information available to respond to predation threats. On a longer time scale, the data also suggest that woodfrog tadpoles are able to learn to respond to predation threats according to the risk posed by the predator at different times of day. Finally, I showed that prey learn to recognize particular characteristics of predators and can generalize their antipredator responses to novel species sharing those characteristics. However, generalization of predator recognition is dependent on the level of risk associated with the predator. Threat-sensitive learning is an extremely complex process shaped by the millions of years of selection imposed by predators on prey.
233

Designing Lost Circulation Pills For Polymer Based Drill-in Fluids

Kahvecioglu, Alper 01 December 2008 (has links) (PDF)
Specially designed non-damaging lost circulation pills (LCP) are being effectively applied for drilling depleted zones worldwide. Optimizing the LCP compositions stop the lost circulation effectively and protect the production zone from liquid and solids invasion significantly. Shape, particle size distribution and concentration of the lost circulation materials (LCM) are key parameters determining the effectiveness of LCP. In this study, the Permeability Plugging Apparatus (PPA) is utilized to evaluate effectiveness of various LCM&rsquo / s in curing the lost circulation. Sized calcium carbonates are used as LCM in different concentrations and in different particle size distribution. Lost circulation zones are simulated using the ceramic disks and slotted disks. Ceramic disks with nominal pore sizes 20, 35, 60, 90, and 150 microns are characterized in terms of pore size distribution using the computerized image analysis technique. Filter cake quality, spurt loss and filtrate volume are basic parameters to be evaluated in this study. Tests are performed at 75 F and 300 psi of differential.
234

The Ottoman Ulema Group And State Of Practicing

Gundogdu, Ismail 01 February 2009 (has links) (PDF)
In this study, it is aimed to analyze the learned (ilmiye) group that was important part of the military class of the Ottoman Empire and the ilmiye group had three important members. They were judges (kadis), professors (m&uuml / derrises) and muftis (m&uuml / ft&uuml / s) and they were analyzed from the beginning to the end of the career line as a dynamic process. Due to the vast nature of the subject, one needed to delimit the research in terms of time and space. In that regard, it was chosen the 18th century and the districts belonging to the Anatolian kaz&acirc / skerlik (chief justice). Due also to the impossibility to cover the whole Ottoman eras of six hundred years, the eighteenth century was chosen, the period following the classical period and preceding the era of modernization. This was because the 18th century was the era when the classical institutions of the Ottoman Empire could no longer resist the forces of change. The extent of changes, which took place in this century, might constitute a topic for other researches. On the other hand, the need to delimit the area of research to the Anatolian chief justice (kaz&acirc / skerlik) was a result of technical and methodological necessity.
235

The Role Of Vakif Institution In The Conservation Of Vakif Based Cultural Heritage

Akar, Tuba 01 March 2009 (has links) (PDF)
Founded by individuals for religious and charity purposes, the Vakif institution was the main institution in the construction and conservation of the built environment in the Ottoman period. Religious, charitable, municipal, educational, social and health services were provided by spaces such as k&uuml / lliyes, mosques, medreses, hans, baths, shops, etc. which were built through the Vakif Institution. As the underlying concept of the vakif institution was serving forever, the repair of these spaces &ndash / the vakif buildings &ndash / was accepted as a fundamental issue for ensuring the functionality and continuity of the vakif. With this aim, vakif institution set the legal, administrative, technical and financial bases for the continuity of the system within its autonomous and local structure in the classical Ottoman period. With the westernization movements in the Tanzimat era, vakifs were gathered under a central institution called Evkaf Nezareti, which had a central budget and administrative structure. In the Republican period, the General Directorate of Pious Foundations (GDPF) took this centralized institutional structure as it was and since then GDPF has been the heir of the vakif institution and vakif heritage in Turkey. However, GDPF has still not adopted an effective conservation policy. GDPF&rsquo / s attitudes towards the conservation of the vakif cultural properties are far from the understandings of the classical vakif system. Briefly, the change of the main concept of the vakif system after the classical Ottoman period can be considered as the main reason for the increased number of vakif buildings in ruinous state. From this perspective, this thesis aims at forming a model mainly based on adapting the positive aspects of the classical vakif system into the GDPF&rsquo / s conservation mechanism of vakif-based immovable cultural properties. The focus is given on the examination and comparison of the vakif system&rsquo / s past and present attitudes towards sustainable conservation. In this line, it is aimed to adapt the vakif systems&rsquo / applicable legal, administrative and financial approaches towards the conservation to GDPF within the limits of the current administrative and legal system. At another level, the functionality of the proposed model forming of the necessary administrative and legal arrangements is given importance.
236

Auditable And Verifiable Electronic Voting With Homomorphic Rsa Tallying

Yucel, Okan 01 July 2010 (has links) (PDF)
In this work, we investigate the general structure and the concepts behind the contemporary electronic voting schemes, with special emphasis on voter verifiable preferential voting, homomorphic tallying and voter privacy. We firstly propose a modification in the Single Transferable Voting (STV) method to be applied to large scale elections with electoral barriers. Our proposal prevents the loss of votes and distributes them securely to the second or higher choices of their voters. This method is most suitably used in e-voting with the voter verifiable &ldquo / Pr&ecirc / t &agrave / Voter: All-In-One&rdquo / scheme that utilizes mix-networks for anonymity. We present a case study considering 2007 Turkish Parliamentary Elections to demonstrate the effect of preferential voting on the election systems that have electoral barriers. After the mathematical formulation of the election procedure, we calculate the wasted votes in 2007 elections and present simulation results for 69 election regions (that have no independent parliament members) by using a combination of &ldquo / modified STV and d&rsquo / Hondt&rdquo / methods, according to four different, politically unbiased scenarios on the distribution of secondary vote choices. Additionally, we modify the &ldquo / Pr&ecirc / t &agrave / Voter: All-In-One&rdquo / scheme by proposing three security enhancing modifications in its ballot construction phase: 1) ballot serial number, 2) digital signature of the first clerk in the mix-net, 3) different random numbers for each row of the ballot. Finally, we demonstrate the potential of multiplicative homomorphic algorithms like RSA for homomorphic tallying. The idea is based on the association of each candidate on the electronic ballot with a prime number, and unique prime factorization of the general vote product. We propose novel randomization methods for homomorphic RSA tallying, and discuss the performance and complexity of the scheme with such randomizations. Our suggestion for an auditable and verifiable e-voting scheme that employs homomorphic RSA tallying with proper randomization has advantages over El Gamal and Paillier tallying, such as having the least encryption complexity and strong anonymity resistant to unlimited computational power.
237

Post- Use Design Thinking For Product Design Process And Sustainability A Study On An Educational Project In Glass Packaging

Coskun, Aykut 01 September 2010 (has links) (PDF)
The rapid disposal of products has detrimental effects on environment which is increasing resource consumption for the production of new products, along with the waste production. Therefore, designing long lasting products has great importance for achieving sustainable consumption and production. The present study analyzes the implications of an approach called post-use design thinking for achieving sustainable consumption and production through product longevity. To explore that approach, two educational industrial design projects are analyzed throughout the study. The results suggest that post-use design thinking should be considered at the early stages of the design process. The idea generation exercises developed specifically for this design thinking seem to be helpful in generating design solutions for post-use phase. The results also indicate that the post-use design thinking is feasible in terms of design and production for glass packaging products, which is the specific case analyzed throughout the research.
238

Control Of A Satellite With Flexible Smart Beam During Slew Maneuver

Urek, Halime 01 September 2011 (has links) (PDF)
In this thesis, an attitude control system based on Linear Quadratic Regulator (LQR) technique is developed for a hypothetical Earth observation satellite with a long flexible boom. To improve pointing performance of the satellite, the piezoelectric actuators are used as well. The boom is rectangular made of aluminum with the surface bonded piezoelectric layers on all four surfaces. The boom is modeled using finite elements. The pointing performance of the satellite using various metrics is evaluated through simulations. Effectiveness of the piezoelectric actuators is demonstrated.
239

Use Of Waste Pyrite From Mineral Processing Plants In Soil Remediation

Aydin, Gulsen 01 November 2011 (has links) (PDF)
Pyrite (FeS2) is commonly present in complex sulphide ores in significant amounts. After the enrichment of such ores by flotation, pyrite is either produced as a separate concentrate and sold to acid manufactures or removed and disposed off as tailing. Due to lack of demand from manufacturers, most of pyrites is usually disposed off as tailing. Therefore, pyrite is usually a waste from complex sulphide ores. Yet, it may be a remediation additive for calcareous soils and calcareous- alkali soils deficient in Fe and other micronutrients such as Cu, Zn and Mn. Waste pyrite may be also an alternative amendment to gypsum because of the production of sulphuric acid which is effectively used in the reclamation of calcareous alkali soils. The effectiveness of adding waste pyrite and sulphuric acid produced from waste pyrite to calcareous-alkali soil (Sarayk&ouml / y-Ankara) and calcareous soil (Gaziantep) was studied under laboratory conditions. Pure gypsum was also used as an amendment for the comparison of the effectiveness of waste pyrite in the reclamation of alkali soils. Gypsum, powder waste pyrite and sulphuric acid were applied to the soil with reference to the gypsum requirement (GR) of the soils. Greenhouse pot tests were carried out with wheat as test plant to determine the effect of waste pyrite treatment on the plant yield (wheat) and on the amount of micronutrient (Fe, Cu, Zn, Mn) essential for plant growth. Hazard potential of pyritic tailings in terms of heavy metal contamination was also taken into account. The results showed that the soil pH and exchangeable sodium percentage (ESP), indicators of alkalization, decreased upon pyrite addition to calcareous- alkali soils of Sarayk&ouml / y-Ankara. It was also found that pyritic tailings were effective in the increasing level of essential micronutrients (Fe, Cu, Zn and Mn) for plant growth in both soils. This was ascertained by the dry matter yield of the plants in the green house pot tests. Heavy metal toxicity caused by pyrite which is a rightful concern remained well below the legal limits in the soils. Thus, it was concluded that the application of pyritic tailings promoted rapid amelioration of calcareous-alkali soil (Sarayk&ouml / y-Ankara) and calcareous soil (Gaziantep) with no deleterious heavy metal contamination.
240

Understanding emerging adulthood from the perspective of those transitioning from foster care and those experiencing homelessness : the role of policy in supporting competency during the transition to adulthood

Gomez, Rebecca Jean 07 November 2013 (has links)
The unsatisfactory achievement of adult competency among emerging adults aging out of foster care is well documented. However few studies have examined how development within the child welfare system impacts the ability to achieve competence. In this study, homeless emerging adults who had not aged out of foster care were compared to peers who were homeless and aged out of foster care. The child welfare system is a unique environment with its own policies. In order to better understand the process of development within the child welfare system, the current study used life course developmental theory to understand how the child welfare system affects the development of children and their ability to achieve competencies. Specifically, the role of learned helplessness in influencing the developmental trajectory of children aging out of foster care was examined. The data were collected utilizing participatory action research methods and the use of this methodology among homeless emerging adults is explored. The current study analyzes data collected by the Texas Network of Youth Services. The study examined issues surrounding the transition to adulthood among homeless emerging adults using a participatory action research methodology. The sample included emerging adults 18 to 25 years old who were homeless (n=134). A subset of the sample aged out of foster care. The results indicated that, 1) homeless emerging adults who have not aged out of foster care may be an appropriate comparison group for those who have aged out, 2) homeless emerging adults who aged out of foster care were more likely to have a perception of learned helplessness that may impede their ability to achieve adult competency when compared to those who did not age out of foster care, and 3) despite receiving services to prepare them for adulthood, homeless emerging adults who aged out of foster care had just as much difficulty achieving adult competency as their homeless peers who did not receive these services. Finally, results showed that the use of participatory action research among homeless emerging adults may be a promising approach for future research. Participants expressed feeling empowered and having perceptions that indicated self-efficacy. This indicated that this type of methodology may be promising in altering perceptions of learned helplessness. / text

Page generated in 0.0302 seconds