• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 59
  • 13
  • 9
  • 7
  • 6
  • 5
  • 3
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 138
  • 22
  • 13
  • 12
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Testování podpory kvalitativních požadavků služeb v experimentální datové síti / Testing of QoS support in experimental data network

Fogl, Miroslav January 2011 (has links)
This work deals with the qualitative requirements on services in IP networks based on technology Ethernet. We describe basic methods for imposing quality control mechanisms on services within networks. We elaborate on the ways, in which packets can be handled, overload controlled and transfer speed in network elements limited. Attention is given also to the Network Layer and Link Layer. Based on concrete specifications of network devices in UTKO laboratory an experimental network was designed and constructed. Network consisting of routers and switches linked several servers with client stations. Various types of data transfers (VoIP, HTTP, FTP, video) were generated. Several techniques for handling packets with different priorities were verified and compared. We observed that, in situations when connections are under full load, implementation of QoS support in the network becomes very important. This observation was confirmed by measurements. We also measured the parameters of the system during simulations of various situations, such as overload of a connection due to unsolicited operations or failure of a connection between routers. In order to guarantee the quality of services it is necessary to create a domain, in which rules are consistently observed in all network elements.
62

Äquivalenz schwach expandierter Argumentationsframeworks in ausgewählten Semantiken

Hermann, Christopher 12 February 2018 (has links)
In dieser Arbeit haben wir uns mit der Äquivalenz schwach expandierter Argumentationsframeworks beschäftigt. Zunächst haben wir nochmal die Grundlagen der formalen Argumentation und der Semantiken der Akzeptierbarkeit wiederholt. Anschließend betrachteten wir die Konzepte der Expansionen und Splittings und konnten einen direkten Zusammenhang zwischen diesen feststellen. Daraufhin wandten wir uns den Splitting-Resultaten von Baumann [3] zu. Wir haben Redukte und Modifikationen kennengelernt und gesehen wie man diese zur Berechnung neuer Extensionen verwenden kann, nachdem ein Argumentationframework expandiert wurde. Dies geschieht durch das Berechnen einer Extension des ursprünglichen Frameworks, das Ermitteln der Modifikation des Redukts der Erweiterung und deren Extension und anschließende Vereinigung der beiden Extensionen zu einer neuen Extension des Gesamtframeworks.
63

A Hybrid Discourse Analysis of Client-Preferred Identity Co-Construction Within Brief Narrative Single Session Therapy

Henneberry, Jesse 29 April 2022 (has links)
Single session therapy (SST) is a form of psychotherapy that has been researched and practiced internationally since the 1980s. More recently it has been widely employed from the therapeutic modality of narrative therapy - more commonly known as brief narrative single session therapy. Narrative therapy - an internationally practiced psychotherapy in its own right - operates from a blending of social constructionist and Foucauldian/poststructural theory where therapists support clients to co-construct preferred identities amidst powerful discourses which constrain this process. While the co-construction of client-preferred identity is multilayered, studies within this field have historically leaned on social constructionist explanations of how this process occurs at the expense of the Foucauldian/poststructural perspective. This study blends these two perspectives, both conceptually and methodologically, to understand how client-preferred identity co-construction occurs in brief narrative single session therapy. From the social constructionist perspective, the preferred identity that narrative therapy seeks to foreground is viewed as something that is constructed within the session between the client and therapist rather than something that is fully formed prior to the session’s start. Yet, from the Foucauldian/poststructural perspective this process also occurs within the culturally available discourses that are afforded to us. To highlight both perspectives I conducted a hybrid discourse analysis that included a macro-focused Foucauldian discourse analysis and a micro-focused element of discursive psychology, on five appointment-based sessions of brief narrative single session therapy. Immediately following the recording of each session clients and therapists filled out separate post-session questionnaires to share their impressions and experiences of these single sessions. The results of this study present rich examples of how working practitioners trained in brief narrative single session therapy support clients in the co-construction of preferred identities in the context of constraining cultural discourses. In addition, alternative discourses that supported the work of client-preferred identity co-construction based within these sessions, and found within the fields of narrative therapy and the brief therapy movement, were identified. Comments from participant post-session questionnaires offer supplementary perspectives that add greater context to the findings from my analysis of sessions. Implications for the training, practice, and study of brief narrative single session therapy are discussed.
64

Examining the morphological and behavioral paradox of aye-ayes (Daubentonia madagascariensis) in Torotorofotsy, Madagascar

Sefczek, Timothy Mikhail January 2018 (has links)
No description available.
65

What's in a name? Lived experiences of transgender college students using a preferred name policy

Lieberth, Mitch R. 21 December 2020 (has links)
No description available.
66

Experiencing Preferred Teaching Narratives: A Phenomenological Study of Exemplary Counselor Educators

Alexander, Hilary J. P. 27 April 2021 (has links)
No description available.
67

Preferred Sensor Selection for Damage Estimation in Civil Structures

Styckiewicz, Matthew 01 January 2013 (has links) (PDF)
Detecting structural damage in civil structures through non-destructive means is a growing field in civil engineering. There are many viable methods, but they can often be time consuming and costly; requiring large amounts of data to be collected. By determining which data are the most optimal at detecting damage and which are not the methods can be better optimized. The objective of this thesis was to adapt an existing method of data optimization, used for damage detection in mechanical engineering applications, for use with civil structures. The existing method creates Parameter Signatures based on characteristics from the system being analyzed, from which preferred locations for recording data are determined. For civil structures this method could potentially be used to locate the preferred locations to place accelerometers such that the minimum number of accelerometers is needed to properly detect the location and severity of damage in the structure. This method was first tested on fully analytical computer model structures under perfect conditions to determine its mathematical feasibility with civil structures. It was then tested on data recorded from physical test structures under “real-world” conditions to determine its feasibility as an actual damage detection optimization procedure. Results from the analytical testing show that this is in fact a viable method for determining the preferred sensor positions in civil structures. Furthermore, these results were verified for a variety of excitation types. Physical testing was inconclusive, leading to great insight about what obstacles are impeding this method and should looked at in future research.
68

Acceptance of Biometric Systemsfor User Authentication and Identification

Dobaibi, Mymoon January 2023 (has links)
Biometric systems have become increasingly popular for user authentication andidentification across various domains, including smartphones, laptops, financial services,healthcare, and security. These systems offer enhanced security and quickaccess to data, aiming to address the challenges associated with passwords and pins.However, achieving a method that provides a 100% guarantee in all fields and for alldevices remains a challenge. To explore user perceptions on the acceptance of biometricsystems, an online survey was conducted with 99 participants from diversebackgrounds, education levels, ages, and countries. The survey focused on understandingusers’ acceptance of biometric systems based on their experiences and perspectives.Additionally, it aimed to investigate whether demographic factors, suchas age, education, and background, influence user acceptance. The study also comparedthe preferred authentication technique among users with findings from previousstudies. The survey results supported previous research, showing that fingerprinttechnology is the most recommended and preferred method for user authentication,followed by facial recognition. This study sheds light on the growing adoption ofbiometric systems to overcome password-related issues and provides valuable insightsinto user preferences for authentication and identification methods.
69

Relationship between Discomfort and Muscle Activation at the Preferred Critical Boundary in Reaching

Petrovic, Milena 01 May 2009 (has links)
No description available.
70

Study of Forming of Composite Materials with Abaqus CAE and The Preferred Fiber Orientation (PFO) Model

Li, Yumeng January 2017 (has links)
No description available.

Page generated in 0.0356 seconds