• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 637
  • 447
  • 210
  • 159
  • 49
  • 45
  • 19
  • 17
  • 17
  • 16
  • 15
  • 15
  • 15
  • 15
  • 15
  • Tagged with
  • 1924
  • 317
  • 273
  • 200
  • 186
  • 185
  • 165
  • 152
  • 144
  • 138
  • 134
  • 132
  • 130
  • 119
  • 115
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
971

Linguistic Rights Of The Turkish Minority In Bulgaria

Haksoz, Cengiz 01 September 2007 (has links) (PDF)
This thesis analyses linguistic policies in Bulgaria, during the Ottoman, monarchical, communist and post-communist periods and its effects on the Turkish minority in Bulgaria. The linguistic policies in Bulgaria did not follow consistent policies / on the contrary, it followed different policies in different periods. The aim of this thesis is to analyse how the Turkish minority experiences and perceives linguistic rights in the post-communist period, such as study of and in Turkish language, Turkish minority media, use of minority personal names, naming of topographical places and the status of Turkish language in official and administrative institutions. For this purpose, in-depth interviews were carried out in ISiklar (Samuil) municipality in Bulgaria, where Turks constitute the absolute majority of the population. As a result of the analyses of the experiences of the Turkish minority, it was observed that (Turkish) linguistic rights and language were experienced by the Turkish minority in terms of ethnolinguistic identity. It is concluded that symbolic power and diglossia relationships between Turkish and Bulgarian languages affected the ways of perception of (Turkish) linguistic rights by the Turkish minority in Bulgaria.
972

Topics in exact precision mathematical programming

Steffy, Daniel E. 24 January 2011 (has links)
The focus of this dissertation is the advancement of theory and computation related to exact precision mathematical programming. Optimization software based on floating-point arithmetic can return suboptimal or incorrect resulting because of round-off errors or the use of numerical tolerances. Exact or correct results are necessary for some applications. Implementing software entirely in rational arithmetic can be prohibitively slow. A viable alternative is the use of hybrid methods that use fast numerical computation to obtain approximate results that are then verified or corrected with safe or exact computation. We study fast methods for sparse exact rational linear algebra, which arises as a bottleneck when solving linear programming problems exactly. Output sensitive methods for exact linear algebra are studied. Finally, a new method for computing valid linear programming bounds is introduced and proven effective as a subroutine for solving mixed-integer linear programming problems exactly. Extensive computational results are presented for each topic.
973

Techniques to facilitate symbolic execution of real-world programs

Anand, Saswat 11 May 2012 (has links)
The overall goal of this research is to reduce the cost of software development and improve the quality of software. Symbolic execution is a program-analysis technique that is used to address several problems that arise in developing high-quality software. Despite the fact that the symbolic execution technique is well understood, and performing symbolic execution on simple programs is straightforward, it is still not possible to apply the technique to the general class of large, real-world software. A symbolic-execution system can be effectively applied to large, real-world software if it has at least the two features: efficiency and automation. However, efficient and automatic symbolic execution of real-world programs is a lofty goal because of both theoretical and practical reasons. Theoretically, achieving this goal requires solving an intractable problem (i.e., solving constraints). Practically, achieving this goal requires overwhelming effort to implement a symbolic-execution system that can precisely and automatically symbolically execute real-world programs. This research makes three major contributions. 1. Three new techniques that address three important problems of symbolic execution. Compared to existing techniques, the new techniques * reduce the manual effort that may be required to symbolically execute those programs that either generate complex constraints or parts of which cannot be symbolically executed due to limitations of a symbolic-execution system. * improve the usefulness of symbolic execution (e.g., expose more bugs in a program) by enabling discovery of more feasible paths within a given time budget. 2. A novel approach that uses symbolic execution to generate test inputs for Apps that run on modern mobile devices such as smartphones and tablets. 3. Implementations of the above techniques and empirical results obtained from applying those techniques to real-world programs that demonstrate their effectiveness.
974

Analysis And Design Of Spatial Manipulators : An Exact Algebraic Approach Using Dual Numbers And Symbolic Computation

Bandyopadhyay, Sandipan 04 1900 (has links)
This thesis presents a unified framework for the analysis of instantaneous kinematics and statics of spatial manipulators. The proposed formulation covers the entire range of kinematic behavior, with kinematic singularity and isotropy appearing as special cases. An analogous treatment of statics is also presented. It is established that the formulations presented are capable of generating exact solutions in closed form for several interesting problems in manipulator analysis. Several such results have been obtained via extensive usage of symbolic computation tools developed for this purpose. The proposed approach is applicable to manipulators of different architectures. However, the focus is on the parallel and hybrid manipulators, as their analysis presents more challenges than their serial counterparts. The theory of screws has been adopted as the basis of the formulation. Instantaneous kinematics and statics are studied in terms of the principal bases of the space of twists, se(3), and the space of wrenches, se* (3), respectively. A dual number parameterisation of the motion space is adopted to make the formulation compact and dimensionally consistent. The properties of the dual combination obviate the need for an explicit scaling between the linear and angular velocities or the forces and moments. Hence the results obtained from the formulation are purely geometrical. The analysis of the twists is performed via the dual velocity Jacobian matrix. The principal basis of se(3) is obtained from the eigenproblem of a symmetrical dual matrix associated with the Jacobian. The notion of a dual eigenproblem is introduced in this context. Solutions are provided for the general case, as well as a few special cases. The computations involve the solution of at most a cubic equation for any arbitrary degree-of-freedom of rigid-body motion, and closed form results are therefore ensured. The results of the eigen-analysis lead to a decoupling of the rotational and the pure translational components of a rigid-body motion. This is termed as the partitioning of degrees-of-freedom. They also motivate an interesting classification of the manipulators based on the instantaneous partition of its degrees-of-freedom. This notion is further extended to analyse the effects of a singularity on the motion characteristics of a manipulator. Due to the duality of se(3) and se*(3), the formulation of statics is completely analogous, and involves, in essence, only the substitution of the dual wrench-transformation matrix for the dual Jacobian. A similar partitioning of the wrench system is introduced based on the eigen-decomposition in the context of statics. It is shown that the principal screws associated with either a system of twists or wrenches can be obtained from a generalised eigenproblem of two symmetric real matrices arising out of the symmetric dual matrix mentioned above. The general 2-and 3-screw systems are analysed in closed form via the generalised characteristic polynomial. Several special screw systems are described in terms of algebraic equations in terms of the coefficients of this polynomial. Principal bases for 4-and 5-systems are obtained in a novel fashion without deriving their reciprocal systems explicitly. Using the same approach based on the analysis of the characteristic polynomial, compact algebraic conditions for singularity and isotropy are derived as the special cases of a single formulation. The above formulations establish the existence of exact closed-form results. However, to implement them symbolically for a real application problem, capabilities in existing computer algebra systems do not suffice in general. Therefore simplification and computational algorithms are developed for dealing with large expressions with algebraic and trigonometric terms typically appearing in kinematics and statics. Three canonical forms of such expressions and the corresponding simplification schemes are presented. The theoretical developments are illustrated with examples of serial, parallel and hybrid manipulators throughout the thesis. However, the most important applications of these are in the kinematic and static analysis of a semi-regular Stewart platform manipulator (in which the top and bottom platforms are semi-regular hexagons). Using the degeneracy of the wrench transformation matrix as the singularity criterion, the singularity manifold of the manipulator is obtained via extensive application of the symbolic simplification algorithms. The constant-orientation singularity manifold is derived in a compact closed form, and a complete geometric characterisation and explicit parameterisation of the same are presented. The constant-position singularity manifold is also obtained in closed form. On the other hand, families of configurations of the manipulator for combined kinematic or static isotropy for a given architecture are derived in closed form. Also, architectural designs are obtained for the manipulator such that it exhibits combined kinematic or static isotropy at a given configuration.
975

Elektronisk mobbning i den nya nätkulturen : En kvalitativ studie utifrån två nätgemenskapers och två ideella stödorganisationers arbete och erfarenheter

Axelsson, Josefin, Albrektsson, Lina January 2007 (has links)
<p>Denna kvalitativa intervjustudie syftar till att definiera fenomenet elektronisk mobbning, att utreda ansvarsfrågan samt att kartlägga organisationernas arbete och eventuella samverkan. Resultatet baseras på intervjuer med BRIS, Friends, LunarStorm och Playahead som analyserades utifrån symbolisk interaktionism. Studien visar på hur liten skillnaden är mellan traditionell och elektronisk mobbning i hur den kommer till uttryck och vem den drabbar. Utmärkande för e-mobbning är spridningseffekten samt hur språket hårdnat i kommunikationen på Internet och andra elektroniska källor. Föräldrarna, skolan och barnen själva borde enligt organisationerna ta ansvar för att motverka e-mobbningen och de anser att lagstiftningen på området är bristfällig. Organisationernas arbete mot e-mobbning är relativt omfattande men effektiv samverkan saknas delvis.</p><p>Till följd av den nya nätkulturen och att unga besitter en betydligt högre IT-kompetens än vuxengenerationen har unga i stor utsträckning lämnats ensamma att interagera på Internet. Utifrån symbolisk interaktionisms idéer kring den sociala interaktionens betydelse för identitetsskapandet och behovet av en generaliserad andre kan den vuxna frånvaron vara en bidragande orsak till problematiken kring e-mobbning. Dessutom har vuxenfrånvaron lett till att symbolspråket i nätkulturen blivit betydligt tuffare. Uppsatsens slutsats består till stor del i hur stort behovet av vuxen närvaro är i den unga nätkulturen.</p> / <p>This qualitative study aims to examine how cyberbullying appears, who should be responsible for prevention and measures, and how four organizations work against and cooperates round cyberbullying. The result is based on interviews with BRIS, Friends, LunarStorm and Playahead and analyzed with help from symbolic interactionism. The result indicates little difference between cyberbullying and traditional bullying. The tougher language and the quicker circulation of information characterize bullying on the Internet. The responsibility should, according to the organizations, be placed upon the parents, the school and the children. Legislation regarding cyberbullying is insufficient. In the organizations otherwise rather comprehensive work, efficient cooperation is partly lacking.</p><p>The new Internet culture and the youths’ considerably higher IT-skills have led to that they to a greater extent have been left alone to interact on the Internet. According to symbolic interaktionism, satisfying development of the identity is highly dependent on social interaction and the idea of the generalized other. Therefore, the adult absence could be one of the most important explanations to cyberbullying, as well as to why the language has become more harsh and ruthless. To sum up, this essay emphasizes the need of adult presence in the new Internet culture.</p><p>Title: Cyberbullying in the Internet culture – a qualitative study of the work and experiences of two Internet communities and two non-profit organizations.</p>
976

Elevers självbild i skolan : Tjejers och killars beskrivningar av sig själva i skola och skolarbete

Gustafsson, Elisabeth, Jonsson, Romy January 2008 (has links)
<p>Abstrakt</p><p>Syftet med studien är att undersöka hur tjejer och killar ser på och upplever sig själva i relation till skolan. Det är således deras perspektiv som är centrala. Arbetet genomsyras av ett symboliskt interaktionistiskt synsätt som baseras på att människan behöver interagera med andra för att kunna skapa sin självbild.</p><p>Betydelsen av ungdomars självbilder i förhållande till skola och skolarbete är inte särskilt uppmärksammat, trots att skolgången är en lång period av livet. Studien baseras på observationer av två klasser i åk 7 samt tio intervjuer jämnt fördelade mellan tjejerna och killarna.</p><p>Resultatet visar på hur den enskilde elevens uppfattning om sig själv påverkas vid interaktion med andra, alltså sin sociala omgivning. Flera olika mönster för killarnas och tjejernas syn på sig själva framkom och visade variationen av deras uppfattningar om interaktionens betydelse. Det blev också tydligt vilka personer de ansåg ha störst betydelse för skapandet av deras självbilder. Killarna betonade kompisarna medan tjejerna betonade kompisarna och lärarna. Eleverna beskrev vad de ansåg vara typiska tjej- och killämnen. Eleverna klassade Engelska, Matematik och Svenska som tjejämnen och Idrott och Träslöjd som killämnen. Vi har dessutom kunnat se att eleverna utifrån situationen de är i intar olika identiteter.</p>
977

Symbolic uses of export information : implications for export performance

Korobilis-Magas, Evagelos January 2011 (has links)
As export competition becomes more intense and export success vital for survival (Katsikeas, 1994), so the effective processing and use of information regarding the international environment becomes a critical prerequisite for gaining competitive advantage (Leonidou and Theodosiou, 2004). Symbolic use of information is one type of information use, which although relatively underexplored to date, may be the most prevalent form of information use within organisations – especially in an export setting (Beyer and Trice, 1982). Symbolic use occurs when information is used for purposes other than the ones which led to its collection (Menon and Varadarajan, 1992). Symbolic use of information has been conceptualised as a multi-dimensional construct encompassing various dimensions (Vyas and Souchon, 2003). Examples include “exporters that engage in distorting market research findings, taking conclusions out of context, disclosing only the findings that confirm an executive‟s predetermined position or consciously ignoring information” (Toften and Olsen, 2004, p. 106). Symbolic use can also legitimate decisions reached on the basis of intuition or managerial assumptions (Vyas and Souchon, 2003). Although conceptual propositions of the potential relationship between each of the symbolic use dimensions and performance exist (Vyas and Souchon 2003), no empirical research has yet been undertaken. As a result, little is known about how and why symbolic use of export information may affect export performance, and under what circumstances. Furthermore, reliable and valid measures for each one of the symbolic use dimensions are absent in the literature. The purpose of this thesis is to fill in these research gaps. In so doing, a combination of both qualitative and quantitative methods is employed. The exploratory phase takes the form of in depth interviews with export decision makers in the UK. The data collected in this exploratory phase are analysed through the use of within-case and cross-case displays as per Miles and Huberman (1994) and are used not just for hypothesis development, but also to identify potential outcomes of using information symbolically in specific ways and to create pools of items for the development of measures of symbolic use. (Continues...).
978

Freedom fighters, freedom haters, martyrs, and evildoers: The social construction of suicide terrorism

Van de Voorde, Cécile Valérie 01 June 2006 (has links)
Suicide terrorism is characterized by the willingness of physically and psychologically war-trained individuals to die while destroying or attempting to annihilate enemy targets in furtherance of certain political or social objectives. Rooted in the historical, social, and psychological dimensions of international terrorism, suicide terrorism is neither a unique nor a new phenomenon. Its recent resurgence and the extensive media coverage it has received account for the misleading uniqueness of this violent, complex, and adaptive form of terrorism. This qualitative study examines the definitional and rhetorical processes by which suicide terrorism is socially constructed. Using a social constructionist theoretical framework coupled with a symbolic interactionist approach, this multi-case study effectively moves the analysis of suicide bombings beyond essentialist debates on asymmetrical warfare or terrorism and into a more nuanced appreciation of cultural meaning and human interaction. Hence this case study emphasizes how the interpretive understanding of suicide terrorism is associated with a biased representation of events and their alleged causes that is conditioned by deliberate attempts to stigmatize ideological enemies, manipulate public perceptions, and promote certain political interests. The primary research question is: How are socio-political processes, bureaucratic imperatives, and media structures involved in the social construction of suicide terrorism? Secondary research questions focus on determining how suicide terrorism is (a) a political weapon, (b) a communication tool, and (c) a politicized issue that fits into a moral panic framework. Methods used to conduct the analysis include in-depth interviews (phenomenological and elite interviewing) and document analysis (general document review and historical review). Findings highlight the interactions between suicide bombers (as contemporary folk devils), the news and entertainment media, the public, and agents of social control (politicians, lawmakers, law enforcement, and action groups), and their respective roles in the social construction of suicide terrorism. The limitations of the study, its significant theoretical and practical implications, as well as suggestions for future research are discussed.
979

Shaping Fuzzy Goals through Teacher-Student Interaction: A Detailed Look at Communication between Community College Faculty and Transfer Students

Leonard, Diana Kay January 2010 (has links)
SHAPING FUZZY GOALS THROUGH TEACHER-STUDENT INTERACTION: A DETAILED LOOK AT THE COMMUNICATION BETWEEN COMMUNITY COLLEGE FACULTY AND TRANSFER STUDENTS by Diana K. Leonard Faculty-student interactions have been largely neglected in the research regarding community colleges and community college transfer students. Yet faculty serve as points of institutional contact, and might also serve a central role in student experiences and decision-making. The purpose of this study was to increase our understanding of the dynamics and interactions that impact student experiences and decisions regarding transfer at the community college and to understand how those interactions contributed to goal formation. Symbolic interactionism (Blumer, 1969) provided a framework to guide the mixed-methods approach, which was primarily qualitative, utilizing online surveys and personal interviews to investigate students' interpretations of the student-teacher interactions. Quantitative data analysis measured teacher influence. 429 students who successfully transferred to a Research I university in the southwest, from in-state community colleges completed the survey. Ten students from this pool, subsequently interviewed, reflected various levels of uncertainty in their goals to transfer. These uncertain goals were termed "fuzzy" goals.In addition to symbolic interactionism as a framework, Stanton-Salazar's (1997) concept of institutional agents, supported with Bourdieu's (1977) cultural and social capital and Tinto's (1975) theory of social and academic integration were used to guide this study. Findings illustrated that students did utilize their teachers as institutional agents, who provided them with cultural knowledge and facilitated their understanding of procedures and processes through active as well as passive teacher-agency. Five themes emerged in students' interpretation of the student-teacher interactions: support, motivation, guidance, inspiration, and modeling. All had varying effects on students' uncertainty and contributed to shaping their fuzzy goals and to their social and academic integration into academe.This study can inform our understanding of the well-known gap in BA attainment between students who begin at a community college intending to transfer and students who begin at a four-year institution. Further, this study can inform strategic planning geared toward supporting teachers more fully in their role as institutional agents conveying social and cultural capital to students to increase their leverage for success once they transfer to the university.
980

Verification of Parameterized and Timed Systems : Undecidability Results and Efficient Methods

Deneux, Johann January 2006 (has links)
Software is finding its way into an increasing range of devices (phones, medical equipment, cars...). A challenge is to design verification methods to ensure correctness of software. We focus on model checking, an approach in which an abstract model of the implementation and a specification of requirements are provided. The task is to answer automatically whether the system conforms with its specification.We concentrate on (i) timed systems, and (ii) parameterized systems. Timed systems can be modeled and verified using the classical model of timed automata. Correctness is translated to language inclusion between two timed automata representing the implementation and the specification. We consider variants of timed automata, and show that the problem is at best highly complex, at worst undecidable. A parameterized system contains a variable number of components. The problem is to verify correctness regardless of the number of components. Regular model checking is a prominent method which uses finite-state automata. We present a semi-symbolic minimization algorithm combining the partition refinement algorithm by Paige and Tarjan with decision diagrams. Finally, we consider systems which are both timed and parameterized: Timed Petri Nets (TPNs), and Timed Networks (TNs). We present a method for checking safety properties of TPNs based on forward reachability analysis with acceleration. We show that verifying safety properties of TNs is undecidable when each process has at least two clocks, and explore decidable variations of this problem.

Page generated in 0.0408 seconds