• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 622
  • 124
  • 124
  • 119
  • 71
  • 50
  • 20
  • 18
  • 17
  • 14
  • 12
  • 10
  • 8
  • 5
  • 4
  • Tagged with
  • 1412
  • 372
  • 234
  • 161
  • 159
  • 143
  • 139
  • 127
  • 125
  • 115
  • 111
  • 102
  • 96
  • 89
  • 86
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Using SetPSO to determine RNA secondary structure

Neethling, Charles Marais. January 2008 (has links)
Thesis (MSc (Computer science))--University of Pretoria, 2008. / Includes bibliographical references.
42

A system for programming with interactive graphical support

Pong, Man-chi. January 1980 (has links)
Thesis (M.Phil.)--University of Hong Kong, 1980. / Also available in print.
43

Representing text structure for automatic processing

Price, Lynne Ann. January 1978 (has links)
Thesis--Wisconsin. / Vita. Includes bibliographical references (leaves 172-178).
44

Structured cabling

Sanchez Martin, Jesus Alberto 01 October 2012 (has links)
This thesis discusses the design and implementation of a structured cabling system. A structured cabling is the way of standardizing the communications like telephony and ISDN in the buildings and facilitate the future scalability. In our case, we study the structured cabling system for a certain University building (in cooperation with Technical Services of University of Patras (Planning & Networks Directorate), University of Patras). The study of structured cabling is based in the necessities of the building. Depends of the building and its purpose the necessities are different. For a University building the structured cabling is design as a work place, so the study will be focus on a professional sphere, based in some defined standards. We need to define the exactly components that will be part of the system and their localization in the building, as well as their cost and installation. For this purpose we use AutoCAD in order to help us to define the needed components and their localization, with the help of some plans of the building. / -
45

Struktuurgrafiekgrammatikas

Tew, Arthur William 02 April 2014 (has links)
M.Sc. (Computer Science) / In this thesis a study is made of graphs, graph grammars as well as grammars which represent structures in three dimensions. Structure graphs are defined for the first time in this thesis. The definition thereof is based upon that of ordinary graphs, they differ however in that certain geometric properties are assigned to the arcs of the graphs, Two different types of structure graph grammars are defined. Structure graph grammars derive structure graphs as language. The geometric properties of the structure graphs appear as context's in the grammars. A study is mode of the properties of· the structure graph grammars. A comparison between the two types of grammars is also given. The properties of the languages derived by each are also discussed. Existing computer systems which model chemical processes are also discussed. Finally a discussion is given of a software system which was developed as part of this study.
46

Vergelyking tussen die SORT en 'n dagtaakoefening in terme van die voorspelling van bestuursukses

Van den Berg, Adriaan Stefanus 01 September 2015 (has links)
M.A. / Please refer to full text to view abstract
47

Påverkad strukturerad produktion produktiviteten? : Analys av mätningar från byggbranschen

Ragnerstam, Anders January 2012 (has links)
The cost of construction projects have increased during the past few years. Different actors in the construction industry work together to advocate various measures to mitigate these cost increases. One of these measures is to try to improve the efficiency in the phase of production. By striving for a kind of standardization with a constant quest for improvement, the productivity can increase while the costs of production fall. For this thesis has a case study been conducted at the construction company JM AB which is seeking this. They call the approach structured production and have implemented various measures to achieve a more productive output. Based on information from reconciliations, the cost and the spent hours of craftsmen have been analyzed at the company where the case study took place. The compilations are presented in graphs and analyzes based on regression lines and mathematical ratios. The conclusion is that structured production affects the productivity. Costs and number of hours for craftsmen are in the period 2007-2011 affected, both positively and negatively.
48

SSDE : structured software development environment

Norman, Michael John January 1990 (has links)
Bibliography: pages 219-230. / Software engineers have identified many problem areas regarding the development of software. There is a need for improving system and program quality at design level, ensuring that design costs remain within the budget, and increasing the productivity of designers. Structured Software Development Environment (SSDE) provides the system designer with an interactive menu-driven environment, and a framework within which he can conveniently express and manipulate his proposed solution. This representation is in terms of both a conceptual model and a detailed software logic definition. Thus SSDE provides tools for both high-level (or logical) and low-level (or physical) design. It allows a user to follow his own preferred methodology rather than restricting him to one specific strategy. SSDE builds and maintains databases that record all design decisions. It provides the system designer with a mechanism whereby systems can easily be modified and new systems can evolve from similar existing systems. There are several auxiliary facilities as productivity aids. SSDE generates PASCAL code for low-level design constructs, ·full documentation of both the high- and low-level designs for inclusion in the project file, as well as a skeleton manual. The system was evaluated by a number of independent users. This exercise clearly demonstrated its success as an aid in expressing, understanding, manipulating and solving software development problems.
49

Implementation of a structured training program for retrospective video analysis of Parkinson's disease

Eden, Gabrielle Marie 21 February 2019 (has links)
INTRODUCTION: Retrospective video analysis (RVA) has been a popular method of analysis in many research fields, evidenced by autism behavioral research, child play behavior, and caregiver-resident interactions (Baranek, 1999; Gilchrist et al., 2018; Gilmore-Bykovskyi, 2015). Given the widespread use of RVA, the number of studies using it to augment their study designs provide sparse details about the training methods for this level of analysis, making it difficult to maintain a standard level of rigor across different institutions (Haidet, Tate, Divirgilio-Thomas, Kolanowski, & Happ, 2009). METHODS: A structured training program was developed for naïve coders (n=5). The structured training program was composed of five stages with careful introduction of behaviors and regular checkpoints. Statistical Analysis: The output generated by the naïve trainees was analyzed with paired t-tests, Fisher’s Exact Test, ANOVA, percent agreement, and Cohen’s kappa. RESULTS: No difference was found between the different trainees, demonstrating the trainees were trained to a similar level of expertise. The overall recognition of behaviors increased by 2.1% from the first to last training video analysis. Discrete behaviors had a higher level of agreement. CONCLUSIONS: The structured training program demonstrated a small increase in the recognition of behaviors, with a higher recognition in the derived MDS-UPDRS behaviors.
50

Expanding Protection Motivation Theory: The Role of Individual Experience in Information Security Policy Compliance

Mutchler, Leigh A (Leigh Ann) 15 December 2012 (has links)
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual’s experience in the context of information security behavior was explored through the lens of protection motivation theory. The practical foundation was provided by the framework of Security Education, Training, and Awareness (SETA) programs which are typically used by organizations within the United States to instruct employees regarding information security. A pilot study and primary study were conducted with separate data collections and analyses. Both existing and new measures were tested in the study which used a Modified Solomon Four Group Design to accommodate data collection via a web-based survey that included a two-treatment experimental component. The primary contribution to academia proposed in this study was to expand the protection motivation theory by including direct and vicarious experience regarding both threats and responses to the threats. Clear definitions and valid and reliable reflective measures for each of the four experience constructs were developed and are presented in this dissertation. Furthermore, the study demonstrated that all four forms of experience play an important part in the prediction of the primary constructs in the protection motivation model, and as such ultimately play an important part in the prediction of behavioral intent in the context of information security. The primary contribution to practice was expected to be specifically related to the application of fear appeals within a SETA instructional framework. The contribution to practice made by this dissertation became instead the implications resulting from the strong performance of the experience constructs. Specifically, experience, both direct and vicarious, and with threats and with responses, are all important influences on individuals’ behavioral choices regarding information security and should continue to be explored in this context.

Page generated in 0.0532 seconds