• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 29
  • 9
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 53
  • 24
  • 16
  • 15
  • 12
  • 9
  • 9
  • 8
  • 8
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The meaning of stealing as lived in women with bulimia nervosa

McLagan, Beverley May 11 1900 (has links)
An exploratory case study using multiple cases investigated the question "What is the meaning of stealing in eating disordered women?" Seven women diagnosed with bulimia nervosa participated in in-depth interviews about this experience. The findings of these interviews revealed commonalities and variations in the patterns and dynamics of both stealing and bulimia. Important information emerged about this experience regarding restrictive family patterns, participants' reactions to these restrictions through stealing and the parallel restrictions and reactions of the bulimic behaviours they later imposed upon themselves. These results add new and in-depth information to the few existing quantitative studies and clinical knowledge addressing stealing in bulimic women. Recommendations for future research and implications for clinical practice were presented.
2

The meaning of stealing as lived in women with bulimia nervosa

McLagan, Beverley May 11 1900 (has links)
An exploratory case study using multiple cases investigated the question "What is the meaning of stealing in eating disordered women?" Seven women diagnosed with bulimia nervosa participated in in-depth interviews about this experience. The findings of these interviews revealed commonalities and variations in the patterns and dynamics of both stealing and bulimia. Important information emerged about this experience regarding restrictive family patterns, participants' reactions to these restrictions through stealing and the parallel restrictions and reactions of the bulimic behaviours they later imposed upon themselves. These results add new and in-depth information to the few existing quantitative studies and clinical knowledge addressing stealing in bulimic women. Recommendations for future research and implications for clinical practice were presented. / Education, Faculty of / Educational and Counselling Psychology, and Special Education (ECPS), Department of / Graduate
3

Vagysčių kriminologinė analizė / Stealing crime analysy

Miciūnaitė, Lina 04 January 2007 (has links)
Stealing, in Lithuania as in the entire world, make the biggest part of all crimes and are usually made by criminal acts. Consequently, the increase of criminality is related with increase of number of stealing. Properties take the important place in human being's life, thus, the loss of it affects every single victim causing not just material, but often moral trauma (especially burglary, when people consider one's home as home-castle or car stealing, even though it is not an expensive car). It is also important to make a note that stealing is the fastest ant the easiest illegal way to make a profit, that's why they are interesting by its unique features, which main point is that majority, who did crime- stole something, but also around 70%-80% all crimes are made by professionals. In this work author is talking about stealing as separate sort of crimes, because it is important thoroughly traverse roots of stealing, the development of tendency, structure and define thieves, name causes and factors, which stimulate stealing, so that one could effectively control stealing and apply correspondent preventive means. This master's work, which contains four parts, analyses the historical process with penal stealing assessment review, the rates of crimes: dynamics, bouclé, level, variation, investigation, stealing in general criminality contest. Moreover, work contains the defining of persons, review of court practice though penalizes and real porridge term, name and analyse... [to full text]
4

Early intervention for stealing: Interrupting the antisocial trajectory

McPhail, Lorna May January 2008 (has links)
This study investigated the effectiveness of the Triple P Programme to reduce stealing behaviour in three preadolescent children. Using behavioural monitoring and self-report questionnaires, outcome measures included stealing behaviour, parenting practices, parenting efficacy, and parental mental health. A measure of change was also included to identify change points in the therapeutic process. Results suggest that parent training is effective in the reduction of stealing behaviours, as positive changes were found across all the measures employed. This early intervention has the potential to disrupt an antisocial developmental trajectory for children who steal. Limitations of the study and directions for future research are discussed.
5

Intraspecific cache pilferage in larder-hoarding red squirrels (Tamiasciurus hudsonicus) in Kluane, Yukon

Donald, Jenna Unknown Date
No description available.
6

Intraspecific cache pilferage in larder-hoarding red squirrels (Tamiasciurus hudsonicus) in Kluane, Yukon

Donald, Jenna 11 1900 (has links)
Pilfering is thought to play a role in the evolution of scatter-hoarding strategies; but is not well understood in larder-hoarding animals. I studied intraspecific pilfering in red squirrels in Kluane, YT, Canada. The purpose of this project was to estimate the natural rate of cache pilferage, and to examine variation in pilfering behaviour. Results from experimental removal of territory owners, suggested that younger squirrels with smaller food caches were more likely to pilfer when given the opportunity. Survival over-winter was dependent on the number of cones cached and pilfering squirrels were less likely to survive. Using a mark-recapture study of marked cones I found that few individuals (14%) did any pilfering and stolen cones represented only 0.3% of total cones cached. It is clear that pilfering occurs at a much lower rate in Kluane than reported for red squirrels in other regions, and is less than rates reported for scatter-hoarding species. / Ecology
7

Early intervention for stealing: Interrupting the antisocial trajectory

McPhail, Lorna May January 2008 (has links)
This study investigated the effectiveness of the Triple P Programme to reduce stealing behaviour in three preadolescent children. Using behavioural monitoring and self-report questionnaires, outcome measures included stealing behaviour, parenting practices, parenting efficacy, and parental mental health. A measure of change was also included to identify change points in the therapeutic process. Results suggest that parent training is effective in the reduction of stealing behaviours, as positive changes were found across all the measures employed. This early intervention has the potential to disrupt an antisocial developmental trajectory for children who steal. Limitations of the study and directions for future research are discussed.
8

Contributions to Real Time Scheduling for Energy Autonomous Systems / Contributions à l’Ordonnancement en Temps Réel pour les Systèmes Autonomes en Energie

El Osta, Rola 26 October 2017 (has links)
La récupération de l’énergie ambiante en temps réel est une technique qui permet d’allonger significativement la durée de vie des systèmes embarqués, aujourd’hui limitée par la quantité d’énergie stockable dans les batteries traditionnelles. La récupération d’énergie renouvelable (energy harvesting) comme celle envisagée pour de nombreux objets sans fil, rend possible un fonctionnement quasiperpétuel de ces systèmes, sans intervention humaine, car sans recharge périodique de batterie ou de pile. Concevoir ce type de système autonome d’un point de vue énergétique devient très complexe lorsque celui-ci a en plus un comportement contraint par le temps et en particulier doit respecter des échéances de fin d’exécution au plus tard. Comme pour tout système temps réel, une problématique incontournable est de trouver un mécanisme d’ordonnancement dynamique capable de prendre en compte conjointement deux contraintes clés : le temps et l’énergie. Proposer et évaluer de nouvelles techniques d’ordonnancement pour que le système adopte un comportement énergétiquement neutre dans le respect des contraintes temps réel constitue le point central cette thèse. Plus précisément, nous considérons ici un ensemble de tâches mixtes constitué de tâches périodiques et de tâches apériodiques souples sans échéance. L’architecture matérielle retenue est monoprocesseur. Les tâches apériodiques ne sont connues qu’au moment de leur arrivée et les tâches périodiques sont supposées ordonnançables par l’ordonnanceur optimal ED-H. La question à laquelle nous voulons apporter une réponse se résume comme suit : comment servir les tâches apériodiques pour minimiser leur temps de réponse sans remettre en question la faisabilité des tâches périodiques. Dans cette thèse, nous répondons à cette question de façon incrémentale. Dans un premier temps, nous étendons le serveur classique dit en arrière plan au contexte du energy harvesting avec la proposition de deux nouveaux serveurs. Simples à implémenter, ces techniques offrent toutefois des performances limitées. C’est pourquoi, dans un second temps, nous proposons un nouveau serveur basé sur le vol de temps creux (en anglais, Slack Stealing), au sens des notions de laxité temporelle et de laxité énergétique. Une évaluation théorique de celui-ci nous permet d’établir son optimalité. Vu l’implémentation relativement complexe de ce serveur, dans un dernier temps, nous proposons un nouveau serveur dit à préservation de bande (en anglais, Total Bandwith), basé sur l’attribution d’échéances fictives avec une implémentation plus simple. Une étude expérimentale accompagne nos propositions et permet d’attester la performance de nouveaux serveurs de tâches apériodiques spécifiquement conçus pour les systèmes temps réel autonomes. / Real-time energy harvesting is a technology that significantly extends the lifetime of embedded systems. This technology is limited at present by the amount of energy that can be stored in traditional batteries. Renewable energy harvesting such as that envisaged for many wireless things, allows the quasi-perpetual systems operation without human intervention because it works without periodic recharging of battery. From an energy point of view, the design of this type of autonomous system becomes more complex since this process has in addition a behavior constrained by time, and particularly has to meet latest timing deadlines. As with any real-time system, an unavoidable problem is to find a dynamic scheduling mechanism able of considering jointly two key constraints: time and energy. Thus, the main objective of this thesis is to propose and evaluate new scheduling techniques that enable the system to adopt an energy-neutral behavior while respecting the real-time constraints. More precisely, we consider here a set of mixed tasks consisting of periodic tasks and soft aperiodic tasks without deadline. The hardware architecture chosen is monoprocessor. Aperiodic tasks are only known at the time of their arrival while periodic tasks are assumed to be schedulable by the optimal ED-H scheduler. In this thesis, we will provide appropriate solutions for the following question: how to serve aperiodic tasks in order to minimize their response time without challenging the feasibility of periodic tasks. Initially, we extend the conventional server (called Background) to the context of energy harvesting by the proposal of two new servers. These techniques can be easily implemented and offer limited performance. Secondly, we propose a new server based on Slack Stealing which uses the slack time and slack energy concepts. A theoretical evaluation of this one allows us to establish its optimality. Finally, due to the relatively complex implementation of this server, we propose a new server, called Total Bandwidth. This server is based on fictive deadlines assignment with a simpler implementation. All propositions are illustrated by experimental studies that allow us to investigate the performance of new aperiodic task servers specifically designed for autonomous real-time systems.
9

The role of police and civil society in combating cross-border stock theft

Rafolatsane, Api 29 August 2013 (has links)
Thesis (M.M. (Security))--University of the Witwatersrand, Faculty of Commerce, Law and Management, Graduate School of Public and Development Management, 2013. / Stock theft is a national crisis in, across and throughout Lesotho. This fact has led the Lesotho Mounted Police Service to place stock theft management under the serious crimes unit. In the mid-1990s stock theft reached epidemic proportions in the southern district adjoining the Eastern Cape Province of the Republic of South Africa. This problem still persists and has lately turned very violent and deadly in the Qachas’nek District. However, the Quthing district has seen a relative decrease in the rate of stock theft in the mid-2000s. The purpose of this study was to investigate the factors and strategies used in both Quthing and Qachas’nek districts to curb cross border stock theft. These factors and strategies are then compared to establish why crossborder stock theft is decreasing in Quthing while it escalates in Qachas’nek. The main finding of the research is that the Quthing community adopted the strategy of community policing and were trained on crime prevention while the opposite is true in the Qachas’nek district. A community policing strategy has not been adopted in Qachas’nek. It has also been established that training in community policing and crime prevention has to be offered to police officers and the members of crime prevention committee members. Lastly, the study revealed that laws governing stock theft have to be amended and the crime prevention committees should be better empowered
10

Exploring heterogeneous scheduling using the task-centric programming model

Podobas, Artur, Brorsson, Mats, Vlassov, Vladimir January 2012 (has links)
Computer architecture technology is moving towards more heteroge-neous solutions, which will contain a number of processing units with different capabilities that may increase the performance of the system as a whole. How-ever, with increased performance comes increased complexity; complexity that is now barely handled in homogeneous multiprocessing systems. The present study tries to solve a small piece of the heterogeneous puzzle; how can we exploit all system resources in a performance-effective and user-friendly way? Our proposed solution includes a run-time system capable of using a variety of different heterogeneous components while providing the user with the already familiar task-centric programming model interface. Furthermore, when dealing with non-uniform workloads, we show that traditional approaches based on centralized or work-stealing queue algorithms do not work well and propose a scheduling algorithm based on trend analysis to distribute work in a performance-effective way across resources. / <p>QC 20130429</p> / ENCORE

Page generated in 0.0536 seconds