• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 77
  • 7
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 100
  • 100
  • 97
  • 25
  • 24
  • 15
  • 14
  • 14
  • 13
  • 12
  • 12
  • 11
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

Gestion des connaissances et communication médiatisée : traçabilité et structuration des messages professionnels / Knowledge manageemnt and mediated communication : traceability and structure of professional emais

Rauscher, François 13 October 2016 (has links)
Même si le capital immatériel représente une part de plus en plus importante de la valeur de nos organisations, il n’est pas toujours possible de stocker, tracer ou capturer les connaissances et les expertises, par exemple dans des projets de taille moyenne. Le courrier électronique est encore largement utilisé dans les projets d’entreprise en particulier entre les équipes géographiquement dispersées. Dans cette étude, nous présentons une nouvelle approche pour détecter les zones à l'intérieur de courriels professionnels où des éléments de connaissances sont susceptibles de se trouver. Nous définissons un contexte étendu en tenant compte non seulement du contenu du courrier électronique et de ses métadonnées, mais également des compétences et des rôles des utilisateurs. Également l’analyse pragmatique linguistique est mêlée aux techniques usuelles du traitement de langage naturel. Après avoir décrit notre méthode KTR et notre modèle, nous l'appliquons à un corpus réel d’entreprise et évaluons les résultats en fonction des algorithmes d’apprentissage, de filtrage et de recherche / Even if intangible capital represents an increasingly important part of the value of our enterprises, it’s not always possible to store, trace or capture knowledge and expertise, for instance in middle sized projects. Email it still widely used in professional projects especially among geographically distributed teams. In this study we present a novel approach to detect zones inside business emails where elements of knowledge are likely to be found. We define an enhanced context taking into account not only the email content and metadata but also the competencies of the users and their roles. Also linguistic pragmatic analysis is added to usual natural language processing techniques. After describing our model and method KTR, we apply it to a real life corpus and evaluate the results based on machine learning, filtering and information retrieval algorithms
92

Design and implementation of personal health data monitoring and retrieval system for health providers

Ojo-Seriki, D. F. 17 August 2020 (has links)
M. Tech. (Department of Process Control and Computer System, Faculty of Engineering and Technology), Vaal University of Technology. / Personal health record system (PHRS) is a tool that is used in maintaining the health and wellness of an individual as well as helping with illness of an individual. PHRS gives the individual access to a wide range of credible health information, data, and knowledge. Individuals can use that access to improve their health and manage their diseases. Patients with chronic illness can track and manage their health in conjunction with their health provider, this will promote early intervention when they encounter an abnormality or complications. Continuous monitoring and storing of health information has been a challenge for patients and health providers. Personal health data monitoring and retrieval system for health providers was designed and implemented. The main aim of this study was to develop an accurate, secure and flexible personal health data monitoring and retrieval system for health providers (PHRS). This was achieved. The research showed that when a patient health information (Electrocardiogram (ECG) and temperature) was monitored, the heartbeat (ECG) sensor output the value as an analog value to the signal processing (NodeMCU) which was then converted to a digital value. The temperature sensor used in this research is a digital sensor which lowers the amount of ADC conversion that was done. The digital values are displayed on LCD, its send to a personal health data storage system which was designed for health information storage purposes. It also sends the value to a retrieval system which is an android application that is connected to the data storage system to display health information to the health providers from a remote location. Personal health data storage and the retrieval system are secure due to the Message queuing telemetry transport (MQTT) protocol used in the application layer. The MQTT protocol is secure due to the secure socket layer (SSL) which is an encryption based on presentation layer embedded inside the MQTT protocol. After the comparison of the software simulation and the prototype test, the differences in the value for the heartbeat and temperature sensor indicate 0.04 BPM and 0.04 oC which shows the accuracy of the sensing circuit. Personal health data monitoring and retrieval system developed is applicable and useful to multiple entities in and around South Africa such as; Ministry of health, hospitals, sport and recreations.
93

Doing Good While Going Public: Ramping Up the ExactTarget Foundation Amidst the IPO Process (Q1 2012)

Ross, Nicole Kristine 14 February 2013 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / indefinitely
94

Bulk unsolicited electronic messages (spam) : a South African perspective

Geissler, Michelle Lara 30 November 2004 (has links)
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global economy billions of dollars a year in lost productivity, anti-spam measures and computer resources. It has forced governments to enact legislation against the problem and it has prompted the development of numerous technical countermeasures. Spam can only be defeated by a combination of legal measures, informal measures (including self regulation and social norms), technical measures and consumer education. Because spam is a relatively recent and evolving problem, the application of various common law mechanisms are explored, including the law of privacy and the law of nuisance. Various constitutional concerns may also arise in the context of spam, and the right to freedom of expression must be balanced against other competing rights and values, including the right to privacy. Comparative legislation is examined, because it is important to recognise trends in spam legislation in other jurisdictions so as to ensure a measure of interoperability with those laws. The practical difficulties in identifying spammers, and the lack of jurisdiction over offshore offenders affect the practical implementation of the current protection offered by the ECT Act. In conclusion, this thesis identifies the need for direct anti-spam legislation in South Africa, and suggests various clauses that will need to be catered for in the legislation. It is submitted that "opt-in" legislation should be preferred over "opt-out" legislation. It is further submitted that a definition of spam should be based on the volume and indiscriminate nature of the e-mail, and not only on whether the communication was commercial. Therefore, a definition of bulk unsolicited e-mail is proposed. / Criminal & Procedural Law / LLD
95

Examining hybrid spaces for newcomer English language learners: a critical discourse analysis of email exchanges with business professionals / Critical discourse analysis of email exchanges with business professionals

Kramer, Benjamin Paul, 1968- 28 August 2008 (has links)
This paper provides analysis of a series of email correspondences between secondary newcomer immigrant students and Latino business professionals within the same urban community. The author, using James Gee's discourse theory (1990, 1996, 1999, 2004) contends that school-based discourses and structures have historically operated as barriers to academic success and societal acceptance for the vast majority of secondary English Language Learners, indicating the systemic perpetuation of a racist, classist, xenophobic social order through the public schools. When an attempt is made to sidestep these school-based discourses and put students in direct contact with mature, successful practitioners of English outside of the education community, the students encounter "mentor talk," a set of discourses that uncritically embrace the notions of a neutral, meritocratic, knowledge-based socioeconomic order. At the same time, students encounter language that can be appropriated for their own creative constructions of identity as they seek to position themselves in a new society. Even when there exists a strong alignment between the student's socially-situated identity presentation and the ideological thrust of "mentor talk," many societal barriers stand in the pathway of social and educational advancement. More often, the student identities express resistance, often subtle, to the standard, hegemonizing guidelines for success they have been offered. / text
96

Bulk unsolicited electronic messages (spam) : a South African perspective

Geissler, Michelle Lara 30 November 2004 (has links)
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global economy billions of dollars a year in lost productivity, anti-spam measures and computer resources. It has forced governments to enact legislation against the problem and it has prompted the development of numerous technical countermeasures. Spam can only be defeated by a combination of legal measures, informal measures (including self regulation and social norms), technical measures and consumer education. Because spam is a relatively recent and evolving problem, the application of various common law mechanisms are explored, including the law of privacy and the law of nuisance. Various constitutional concerns may also arise in the context of spam, and the right to freedom of expression must be balanced against other competing rights and values, including the right to privacy. Comparative legislation is examined, because it is important to recognise trends in spam legislation in other jurisdictions so as to ensure a measure of interoperability with those laws. The practical difficulties in identifying spammers, and the lack of jurisdiction over offshore offenders affect the practical implementation of the current protection offered by the ECT Act. In conclusion, this thesis identifies the need for direct anti-spam legislation in South Africa, and suggests various clauses that will need to be catered for in the legislation. It is submitted that "opt-in" legislation should be preferred over "opt-out" legislation. It is further submitted that a definition of spam should be based on the volume and indiscriminate nature of the e-mail, and not only on whether the communication was commercial. Therefore, a definition of bulk unsolicited e-mail is proposed. / Criminal and Procedural Law / LLD
97

Changement et apprentissage chez les professeurs utilisant la télécommunication dans leur enseignement

Bossé, Marielle January 2001 (has links)
Thèse numérisée par la Direction des bibliothèques de l'Université de Montréal.
98

Investigating politeness among IsiZulu mother tongue and non-mother tongue speakers in higher education open distance learning environment

Nene, Jabulani Owen 11 1900 (has links)
This study aims to explore politeness shown by lecturers during tuition and student support conversations with the objective of promoting polite interactions between IsiZulu mother tongue and non-mother tongue speakers in higher education in South Africa. In particular, the study investigates the way in which politeness in email communication influences learning outcomes within an ODL environment, using quantitative and qualitative research methodologies, a questionnaire as well as interviews to collect data from a cross-section of students from an Open Distance Learning (ODL) institution. All the results drawn from the data sources, namely the questionnaires and interviews, were enumerated according to the data collection tools used. Version 12 of SPSS and Nvivo were used to analyse the quantitative data. The analysis is also based on the politeness strategies of Brown and Levinson (1978) as well as a conceptual framework that links all the variables. Based on the results, the research hypotheses are accepted, thus indicating that politeness in email communication influences learning outcomes within an ODL environment. In particular, the results show that, overall, lecturers who employ politeness contribute positively to student compliance. Accordingly, the study recommends that ODL should recognise both the role of language in communication as well as the power and influence of politeness in communication. / African Languages / D. Litt. et Phil.
99

The impact of social network sites on written isiXhosa : a case study of a rural and an urban high school

Dlutu, Bongiwe Agrienette January 2014 (has links)
The use of cellphones has increased all over the world. That invites many academics to conduct research on the usage of these devices, especially by young people, since young people join Social Network Sites (Facebook, Mxit, 2go, Whatsapp) and use a shorthand language. Most studies are related to the use of English and other languages that are recognised by computer software. There are few studies, if any, that have been done in relation to the use of African Languages on these sites. This research therefore aims to seek to explore the use of African Languages, especially isiXhosa, in assessing how technology might help in language development through the usage of SNSs that learners already use to equip them with educational material in their mother tongue. This study was conducted in two high schools, Nogemane Senior Secondary School in a disadvantaged and remote rural community with limited access to additional educational material such as magazines, newspapers, and television. The school also lacks basic study materials such as textbooks from the Education Department and they have no access to a library and laboratory. They also only have very few subjects to choose from. Nombulelo Senior Secondary School is in Grahamstown. This school has good infrastructure and learners have access to different technological devices and they can access libraries. What is common between learners in both schools is that they are all doing isiXhosa as a first language and are using SNSs to interact with each other. This study has found that learners enjoy using SNSs rather than reading the printed books. Furthermore, they enjoy and prefer interacting in isiXhosa in their conversations. Learners also use the web to post and show their creative writing, regardless of the shorthand form writing they use on the SNSs. This study has found that learners are not well equipped with basic isiXhosa skills when reaching the FET phase. They lack the understanding of standard isiXhosa idioms and proverbs. That clearly means that they are equipped in the more modern forms of literature rather than the traditional oral forms. IsiXhosa teachers also see SNSs as the better platform to engage with learners and they suggest that there must be a section in the subjects at school that teaches about cyber bullying and being safe online. This thesis also presents examples of new and contemporary forms of SNS-speak that are used by learners in both the rural and urban schools. This study is more concerned with SNSs for literacy development and to assess whether the shorthand writing has negative or positive effects in writing isiXhosa. This is done against the backdrop of a literature review which explores new literacies, computer mediated communication, social identity models as well as language policy and planning.
100

The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study

Tladi, Sebolawe Erna Mokowadi 06 1900 (has links)
The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provisions are scattered in pieces of legislation dealing with diverse issues including: consumer protection; direct marketing; credit laws; and electronic transactions and communications. In addition to these provisions, an Amendment Bill to one of these laws and two Bills covering cybercrimes and cyber-security issues have been published. In this thesis, a question is asked on whether the current fragmented anti-spam provisions are adequate in protecting consumers. Whether the overlaps between these pieces of legislation are competent to deal with the ever increasing threats on electronic communications at large. Finally, the question as to whether a multi-faceted approach, which includes a Model Law on spam would be a suitable starting point setting out requirements for the sending of unsolicited electronic communications can be sufficient in protecting consumers. And as spam is not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations in order to combat spam at a global level. / Mercantile Law / LL. D.

Page generated in 0.0915 seconds