• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 214
  • 25
  • 25
  • 12
  • 10
  • 8
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 361
  • 107
  • 61
  • 53
  • 49
  • 46
  • 41
  • 39
  • 38
  • 34
  • 32
  • 30
  • 28
  • 26
  • 25
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

A study of topic and topic change in conversational threads

Cowan-Sharp, Jessy. January 2009 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Martell, Craig H. "September 2009." Description based on title screen as viewed on November 9, 2009. Includes bibliographical references (p. 77). Also available in print.
12

Communication strategies for email at work

Kwok, Pak Wing Parkson 01 January 2001 (has links)
No description available.
13

The influence of electronic mail on communication patterns among educators /

McLaughlin, Louise A. January 2003 (has links)
No description available.
14

Teaching students how to tailor messages: lessons learned from a technical communication course

Baechle, Mary Frances 05 December 2016 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Tailoring messages is the process of customizing messages that are more relevant for the receiver, with the aim of improving the recipient’s engagement with and understanding about information in the message. Little research has been done to look at tailored messages in technical communication about healthcare technology, even though the use of technology in healthcare, and the complexity of that technology, continues to increase. Research was performed to investigate if students who plan to work in the healthcare technology field can demonstrate an understanding about tailoring messages and can tailor messages in their technical communication. A four-phase Action Research Cycle for inquiry into teaching and learning was used to modify course materials and analyze work for six assignments submitted by 14 students enrolled in Technical Communication for the Health Care Professions, TCM 38000, during the 2015 spring semester. Although TCM 38000 has always been open to students in other majors, the majority of students who take the course are in the Health Engineering Technology Management (HETM) program at Purdue’s School of Engineering and Technology on the campus of Indiana University Purdue University Indianapolis (IUPUI) in Indianapolis. Overall, the modifications made to TCM 38000 were successful in helping students begin to learn about tailoring messages and create messages tailored for a specific end-user in their technical communication developed for some course assignments. In their Reflections for a User Manual assignment, the majority of students explained that they used what they learned through course materials and discussions to reach beyond their learning and come up with techniques for tailoring messages on their own. Students used word choice, information content and role-play techniques to determine the end-user’s information needs and then to tailor messages in their manuals to address those needs. After reflecting on the results of the research, some course materials will be modified so that students can gain a deeper understanding about tailoring messages and can have more opportunities to practice writing tailored messages in course assignments. Research implications expand beyond the classroom into workplace training for organizations that have both technical and non-technical employees that must effectively communicate.
15

La communication pour réduire l'incertitude en contexte de changement organisationnel : le cas d'une acquisition transfrontalière

Marcoux, Christian January 2002 (has links)
Mémoire numérisé par la Direction des bibliothèques de l'Université de Montréal.
16

Generic Transaction Message Interface for Operations of Communication Networks

Byrne, Charles J. 10 1900 (has links)
International Telemetering Conference Proceedings / October 13-16, 1986 / Riviera Hotel, Las Vegas, Nevada / Transaction messages are those which control action at a remote point. They are used in communication networks for such functions as surveillance of alarms, performance monitoring, administration of data bases and tests of leased circuits. Generic interface requirements permit full compatibility of a wide range of telecommunications equipment with common operations systems. The specifications cover all aspects of the interface, from connectors to messages. Existing commercial standards are used where appropriate, including those of the Open System Interconnection (OSI) model. This paper covers the methods used to define the requirements and reports on the status of work in various standards groups.
17

SMS gener@tion: a study on the language of text messaging in Hong Kong

Li, Sui-sum, Bosco., 李瑞琛. January 2007 (has links)
published_or_final_version / abstract / Linguistics / Master / Master of Philosophy
18

Résumé politics : how campaigns use background appeals to win votes and elections

Arbour, Brian Kearney 27 May 2010 (has links)
The dissertation examines the use of background appeals in campaign messages. I argue that background appeals allow campaigns to meet two seemingly conflicting incentives in the same message—the incentive to reduce voters’ uncertainty about their candidate, and the incentive to remain ambiguous in their issue positions. Background appeals allow voters to know more about a candidate and develop more certainty about what he will do in office. At the same times, campaigns can achieve this goal while avoiding specific policy commitments, which, on controversial issues, might repel a significant part of the electorate. I test my argument by examining how campaigns plan on using candidates’ backgrounds by interviewing a sample of political consultants. The consultants I interviewed make the candidate’s background a top priority in developing a message plan for their clients. They want to show voters “who their candidate is” as a means of developing likeability and credibility with voters. As expected, campaigns use background appeals frequently, in nearly 80% of advertisements aired by US Senate campaigns in 2000 and 2002. But in these appeals, campaigns avoid specifically connecting their candidate to particular policies. Also, the appeal of ambiguity is so great that campaigns only use more specific background appeals when discussing the opponent’s background. Background appeals can have a positive effect on perceptions of a candidate. Using an experimental design, I vary the background of a mock candidate for Congress while holding constant his issue position. Respondents regard the candidate more favorably when they learn about his occupation than when they receive no such information. / text
19

Commodification and consciousness

Wallace, Sarah Melissa 24 September 2010 (has links)
The United Colors of Benetton is a high-end clothing company that has been deemed as an iconic brand because of their non-traditional print advertisements. From the late 1980s to the early 1990s, the Benetton campaign used photographic images to symbolize social (and sometimes controversial) messages pertaining to race, gender, religion, sexuality and multiculturalism. Benetton claims that their advertising campaign sought to promote diversity, worldwide. However, others believed that their true motive was to gain revenue by placing sensitive social, political cultural issues and messages into an exchange system. The varieties in opinions about Benetton’s motives are highly dependent on how consumers interpret their advertisements. This paper will not only examine the ways in which consumers encode and decode social messages in Benetton’s print advertisements, but will also attempt to understand the process of attitudinal change through a theoretical approach by using discourse analysis. Further recommendations will be given that detail the importance of how consumers can become more active in their participation of encoding and decoding messages by the use of media literacy. / text
20

Investigating unsupervised feature learning for email spam classification

Diale, Melvin January 2017 (has links)
A dissertation submitted in partial ful llment of the requirements for the degree Master of Science. School of Computer Science and Applied Mathematics, Faculty of Science, University of the Witwatersrand, Johannesburg. November 2017 / In the cyberspace, spam emails are used as a way to divulge sensitive information of victims through social engineering. There are various classi cation systems that have been employed previously to identify spam emails. The primary objective of email spam classi cation systems is to classify incoming email as either legitimate (non-spam) or spam emails. The spam classi cation task can thus be regarded as a two-class classi cation problem. This kind of a problem involves the use of various classi ers such as Decision Trees (DTs) and Support Vector Machines (SVMs). DTs and SVMs have been shown to perform well on email spam classi cation tasks. Several studies have failed to mention how these classi ers were optimized in terms of their hyperparameters. As a result, poor performance was encountered with complex datasets. This is because SVM classi er is dependent on the selection of the kernel function and the optimization of kernel hyperparameters. Additionally, many studies on spam email ltering task use words and characters to compute Term-Frequency (TF) based feature space. However, TF based feature space leads to sparse representation due to the continuous vocabulary growth. This problem is linked with the curse of dimensionality. Overcoming dimensionality issues involves the use of feature reduction techniques. Traditional feature reduction techniques, for instance, Information Gain (IG) may cause feature representations to lose important features for identifying spam emails. This proposed study demonstrates the use of Distributed Memory (DM), Distributed Bag of Words (DBOW), Cosine Similarity (CS) and Autoencoder for feature representation to retain a better class separability. Generated features enable classi ers to identify spam emails in a lower dimension feature space. The use of the Autoencoder for feature reduction led to improved classi cation performance. Furthermore, a comparison of kernel functions and CS measure is taken into consideration to evaluate their impacts on classi ers when employed for feature transformation. The study further shows that removal of more frequent words, which have been regarded as noisy words and stemming process, may negatively a ect the performance of the classi ers when word order is taken into consideration. In addition, this study investigates the performance of DTs and SVM classi ers on the publicly available datasets. This study makes a further investigation on the selection of optimal kernel function and optimization of kernel hyperparameters for each feature representation. It is further investigated whether the use of Stacked Autoencoder as a pre-processing step for multilayer perceptron (MLP) will lead to improved classi cation results. / MT 2018

Page generated in 0.0417 seconds