• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 5
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The Magnitude and Extent of Malfeasance on Unproctored Internet–Based Tests of Cognitive Ability and Personality

Glaze, Ryan M. 2009 August 1900 (has links)
The use of unproctored internet-based testing for employee selection is widespread. Although this mode of testing has advantages over onsite testing, researchers and practitioners continue to be concerned about potential malfeasance (e.g., cheating and response distortion) under high-stakes conditions. Therefore, the primary objective of the present study was to investigate potential malfeasance effects on the scores of an unproctored internet-based cognitive ability, and a personality test. This was accomplished by implementing a within-subjects design in which test takers first completed the tests as job applicants (high-stakes) or incumbents (low-stakes) then as research participants (low-stakes). The pattern of cognitive ability test score differences was more consonant with a psychometric practice effect than a malfeasance explanation. Thus, the results suggest that, if present, there was no evidence to indicate that wide- scale or systematic malfeasance unduly affected the test scores. This may have been due to the speeded nature of the test, which was used to preempt the potential for widespread cheating. Additionally, the unproctored personality administration resulted in similar mean shifts and similar proportions of test takers being suspected of distorting their responses as that reported in the extant literature for proctored tests. In their totality, these results suggest that an unproctored internet-based administration does not uniquely threaten personality measures in terms of elevated levels of response distortion compared to proctored measures.
2

Decision-Making Ability Beliefs

O'Dell, Nicholas West 10 August 2016 (has links)
No description available.
3

Faktory ovlivňující rychlost produkce ohýbaného tvaru slova u dětí ve věku do 15 let / Factors affecting speeded production of inflected word forms by children under age of 15

Salzmannová, Lucie January 2021 (has links)
The thesis focuses on the processing of morphologically complex words in Czech. It follows up on the previous research in the field of inflectional morphology, in which Czech is minimally represented. The thesis is divided into two parts. The first part describes the main theoretical approaches, which are connectionism and dualism. The second part describes an experiment, which was carried out following the previous research and aimed at comparing the claims of the two main approaches. The experiment was conducted on 37 native speakers of Czech aged from eight to eleven. The participants' task was to say as quickly as possible the genitive form of a noun that appeared on the screen of an electronic device in nominative form. The results of the research do not support the dualistic thoughts, but rather support the connectionist view. However, further empirical research is needed for a clear conclusion. Key words speeded production; inflected word form; frequency; language acquisition; inflection
4

Face recognition-based authentication and monitoring in video telecommunication systems

Van der Haar, Dustin Terence 07 June 2012 (has links)
M.Sc. (Computer Science) / A video conference is an interactive meeting between two or more locations, facilitated by simultaneous two-way video and audio transmissions. People in a video conference, also known as participants, join these video conferences for business and recreational purposes. In a typical video conference, we should properly identify and authenticate every participant in the video conference, if information discussed during the video conference is confidential. This prevents unauthorized and unwanted people from being part of the conference and exposing any confidential information during the video conference. Present existing video conferencing systems however, have problems in this area, resulting in some risks. These risks relate precisely to the lack of facilities to properly identify and authenticate participants, making it possible for unwanted/unauthorised participants to join the conference or masquerade as another participant. It is especially a problem, when facilitators or organisers are the only participants that know the authorised participants, or participants allowed in a video conference. In this dissertation, we review the risks that are present in video conferencing, and create a security system, (called BioVid) that mitigates the identification and authentication risks in video conferences. BioVid uses a Speeded-Up Robust Features or SURF-based face recognition approach, to identify and authenticate any participant in a video conference. BioVid continuously monitors the participants to check if masquerading has occurred and when it does detect an unauthorised participant, it informs the Service Provider. The Service Provider can then deal with the problem by either kicking the participant or asking the other participants to vote the unauthorised participant out of the video conference.
5

Identifikace objektů v obraze / The idnetification of the objects in the imege

Zavalina, Viktoriia January 2014 (has links)
Master´s thesis deals with methods of objects detection in the image. It contains theoretical, practical and experimental parts. Theoretical part describes image representation, the preprocessing image methods, and methods of detection and identification of objects. The practical part contains a description of the created programs and algorithms which were used in the programs. Application was created in MATLAB. The application offers intuitive graphical user interface and three different methods for the detection and identification of objects in an image. The experimental part contains a test results for an implemented program.

Page generated in 0.0441 seconds