• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 296
  • 47
  • 27
  • 27
  • 25
  • 22
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 530
  • 258
  • 246
  • 80
  • 65
  • 57
  • 49
  • 42
  • 40
  • 37
  • 33
  • 31
  • 30
  • 27
  • 26
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
291

Feedback and Error Corrections : on Swedish Students' Written English Assignments

Eriksson, Maria January 2006 (has links)
<p>It is important to think about how to correct an essay and what the students should learn from it. My aim in this paper, is to look into what different researchers have said about feedback on written assignments and carry out a study of the kind of feedback that is actually used in secondary school today – and of what students and teachers think about it.</p><p>The results show that underlining is the marking technique mostly used in the secondary school where I did my investigation. This technique was also mostly preferred amongst the students. Two teachers were interviewed and both said that they used underlining because experience has shown that this marking technique is the most effective one. Furthermore, the results from the essays differed when analyzing errors corrected with complete underlining, partial underlining, crossing out and giving the right answer. One marking technique got good results when dealing with one kind of error, and worse in others. My conclusion is that teachers need to vary their marking technique depending on the specific kind of error.</p><p>Also, the results from a questionnaire showed that most of the students would like to get feedback on every written assignment. Not many of them said that they were already getting it, although this was what both teachers claimed. To conclude, there are many different ways to deal with marking and feedback. The key-word seems to be variation. As long as teachers vary their ways of dealing with marking and giving feedback, they will eventually find one or two that are most effective. Involving the students in this decision can also be a good idea, if they are interested.</p>
292

The Research of Network Security in IP Traceback

Tseng, Yu-kuo 29 September 2004 (has links)
With the dramatic expansion of computers and communication networks, computer crimes, such as threatening letters, fraud, and theft of intellectual property have been growing at a dreadful rate. The increasing frequency of malicious computer attacks on government agencies and Internet businesses has caused severe economic waste and unique social threats. The problems of protecting data and information on computers and communication networks has become even more critical and challenging, since the widespread adoption of the Internet and the Web. Consequently, it is very urgent to design an integrated network-security architecture so as to make information safer, proactively or reactively defeat any network attack, make attackers accountable, and help the law enforcement system to collect the forensic evidences. Among a variety of attacks on computer servers or communication networks, a prevalent, famous, and serious network-security subject is known as "Denial of Service" (DoS) or "Distributed Denial of Service" (DDoS) attacks. According to an investigation on computer crime conducted by CSI/FBI in 2003, Internet DoS/DDoS have increased in frequency, severity, and sophistication, and have caught international attentions to the vulnerability of the Internet. DoS/DDoS attacks consume the resources of a remote host or network, thereby denying or degrading service to legitimate users. Such attacks are among the hardest security problems to address because they are simple to implement, difficult to prevent, and very difficult to trace. Therefore, this dissertation will firstly concentrate on how to resolve these troublesome DoS/DDoS problems. This is considered as the first step to overcome generic network security problems, and to achieve the final goal for accomplishing a total solution of network security. Instead of tolerating DoS/DDoS attacks by mitigating their effect, to trace back the attacking source for eliminating the attacker is an aggressive and better approach. However, it is difficult to find out the true attacking origin by utilizing the incorrect source IP address faked by the attacker. Accordingly, this dissertation will aim at conquering this representative network security problem, i.e. DoS/DDoS attacks, with IP traceback, and designing an optimal IP traceback. IP traceback ¡X the ability to trace IP packets to their origins¡Xis a significant step toward identifying, and thus stopping, attackers. A promising solution to the IP traceback is probabilistic packet marking (PPM). This traceback approach can be applied during or after an attack, and it does not require any additional network traffic, router storage, or packet size increase. Therefore, the IP traceback research on countering DoS/DDoS attacks will be based on PPM scheme. In this dissertation, three outstanding improvements among four PPM criteria¡Xthe convergency, the computational overhead, and the incomplete PPM deployment problem¡Xhas been achieved. PPM-NPC is proposed to improve the PPM convergency and computational overhead. With non-preemptively compensation, the probability of each marked packet arrived at the victim equals its original marking probability. Therefore, PPM-NPC will efficiently achieve the optimal convergent situation by simply utilizing a 2-byte integer counter. Another better scheme, CPPM, is also proposed, such that the marked packets can be fully compensated as well while they are remarked. With CPPM, the probability of each marked packet arrived at the victim will also equal its original marking probability. Consequently, CPPM will achieve the optimal convergent situation efficiently as well. Furthermore, RPPM-NPC is presented to advance the accuracy of a reconstructed path in an incomplete PPM deployment environment by correcting and recovering any discontinuous individual transparent router and any segment of consecutive double transparent routers. This scheme may also reduce the deployment overhead without requiring the participation of all routers on the attack path. Except for these improved criteria, PPM robustness, some weak assumptions in PPM, and a few unsolved problems for PPM, e.g. reflective DDoS attacks, will also be improved in the future. It is also interesting in combining other network security researches, such as IDS, system access control mechanism, etc., for constructing a more complete network security architecture. Therefore, this research hereby is done in order to completely resolve the troublesome flood-style DoS/DDoS problems, and as the basis for accomplishing a total solution of network security.
293

The Ce Marking And The Implementation In Turkey: The Challenges And The Complexities

Sarbay, Zeynep Saygin 01 February 2012 (has links) (PDF)
The CE mark confirms that all applicable provisions are fulfilled with regard to conformity assessment within the scope of &ldquo / New Approach&rdquo / directives. The CE mark is a mandatory conformity mark for products placed on the market in the European Union. As a candidate country Turkey is obliged to achieve constitutional modifications in the quality infrastructure institutions to succeed European Union harmonization. The aim of this thesis is to research the harmonization problems in Turkish quality infrastructure system and analyze the challenges and complexities in legal approximation and implementation. Turkey has harmonization problems in standardization, conformity assessment and accreditation / proceed from inability of implementing operating methods and lack of specialized knowledge. These problems disorganize the quality infrastructure system and create disadvantage against Turkish manufacturer and consumer.
294

Composing metaphors : metaphors for writing in the composition classroom /

Hart, Gwendolyn A. January 2009 (has links)
Thesis (Ph.D.)--Ohio University, June, 2009. / Release of full electronic text on OhioLINK has been delayed until June 1, 2014. Includes bibliographical references (leaves 303-316)
295

Composing metaphors metaphors for writing in the composition classroom /

Hart, Gwendolyn A. January 2009 (has links)
Thesis (Ph.D.)--Ohio University, June, 2009. / Title from PDF t.p. Release of full electronic text on OhioLINK has been delayed until June 1, 2014. Includes bibliographical references (leaves 303-316)
296

An investigation of teachers' written and oral comments on pupils' learning performances in English teaching

McAlpine, Amelia Nimmo January 1982 (has links)
The research began with the study of teachers' written comments on pupils' written work in an English teaching context. There were several reasons for the selection of the written comment as the subject of an investigation: first, the comment communicates the teacher's response to the pupil's work, and as such it offers a potential source of information to the pupil of relevance to his learning. In addition, written comments, as a form of individualised teaching on an informal day-to-day basis, seem likely to represent a significant portion of the total feedback received by any one pupil in relation to his individual performance. Third, to date, teachers' comments have not figured to any real extent as an area of research. Where they have, they have tended to be part of a wider study which did not involve the conceptualisation of comments as providing instructive information of value to the learner. For all of these reasons, an investigation of the character and possible contribution of the written comment to pupil learning seemed a potentially worthwhile area for research. Hence, the written comment is the focus of the first part of this study. Though the work began with the written comment, in time the questions emerging from the initial investigation suggested the value of extending the field to include a detailed study of the relationship between the classroom context and the written comment; and, more significantly as it turned out, of the oral comment as instructive feedback to the learner. Oral comments, therefore, are the subject of the second part. In the third section, the main questions arising from the oral comment data are examined. This meant in fact consideration of some teachers' images of the aspect of their teaching which most features the oral comment. In summary, the three parts of the study are: 1) an investigation of written comments; 2) an investigation of oral comments; 3) a report of teachers' accounts of one major aspect of their teaching.
297

Nominal Arguments and Language Variation

Jiang, Li January 2012 (has links)
This dissertation investigates nominal arguments in classifier languages (ClLs). There are two main goals. The first is to explore what is constant and what varies in the way ClLs form nominal arguments. The second goal is to understand the relationship between argument formation in classifier languages and argument formation more generally. Three classifier languages are the center of the discussion: Mandarin, a ClL without overt evidence of determiners, Yi, a head-final ClL which will be shown to have overt determiners, and Bengali, a ClL that has already been argued to have overt evidence of determiners. In addition to paying particular attention to these three ClLs, the discussion of nominal arguments also covers a wider range of ClLs and number marking languages (NMLs) from Romance, Germanic, and Slavic, as well as Hindi. In this dissertation we will argue for the following three points. First, numeral constructions (NCs) have identical syntax and semantics in ClLs and NMLs (possibly universally); specifically, we argue that NCs have a predicative interpretation and an argumental interpretation that arises via a choice function in the lexical entry of numerals. Secondly, we argue that language variation in the nominal domain is due primarily to two interrelated factors: what nouns denote (kinds or properties) and what low functional heads (i.e. number morphology (#) and classifiers) denote; we show how this variation in the nominal domain can be related to a more general macroparameter. Thirdly, we argue that determiners in ClLs are in fact expected, contrary to the standard view, but while they can combine with numeral-classifier phrases (ClPs) and numeral-less ClPs, they can never combine with bare nouns. The proposal is that bare nouns in ClLs are always argumental regardless of whether or not there are determiners. In the last chapter of this dissertation, we show that the developed analysis of nominal arguments and language variation yields an updated language typology of argument formation. With this proposed analysis of nominal arguments, we may be a few steps closer to a general theory of argument formation of wide cross-linguistic applicability. / Linguistics
298

A quantitative analysis of the role of referentiality and DOM in modern Peninsular Spanish

Abing, Jesse Lee 17 June 2011 (has links)
Differential Object Marking (henceforth, DOM) in Spanish involves the use of the object marker a to overtly mark certain direct objects (Juan conoce a la mamá de Pedro.). The literature on this phenomenon is extensive. Previous typological/functionalist work (e.g. Aissen 2003, Croft 2003, von Heusinger and Kaiser 2007) has characterized the likelihood of DOM in terms of properties of the direct object including animacy, definiteness and specificity. According to recent grammatical variationist work on Mexican Spanish (Lizarraga Navarro and Mora-Bustos 2010), these two factors are the most highly correlated with overt DOM in Spanish. While some empirical studies corroborate portions of these findings (e.g. von Heusinger 2008), none have provided a complete quantified analysis of the entire set of features as discussed in terms of the Referentiality Scale (von Heusinger 2008) including specificity and non-argumentals for Modern European Spanish. This empirically-based corpus study investigates the distribution of DOM in the 20th and 21st Century European Spanish focusing on the features comprising the scales of animacy and referentiality. The results obtained in this study provide evidence that the referential features like specificity and definiteness are indeed significant factors that condition DOM along with verb type. This study also sheds light on the validity of the claim made in diachronic work for the systematic spread of DOM (e.g. Melis 1995, Laca 2006, von Heusinger and Kaiser 2010). / text
299

The predictive value for college achievement of records in Arizona high schools

Angell, James Knickerbocker, 1897- January 1940 (has links)
No description available.
300

A study in prediction in the College of Engineering of the University of Arizona

Weller, Ralph, 1912- January 1940 (has links)
No description available.

Page generated in 0.0689 seconds