• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 504
  • 120
  • 66
  • 35
  • 30
  • 28
  • 18
  • 15
  • 10
  • 6
  • 4
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 1022
  • 217
  • 213
  • 166
  • 142
  • 123
  • 120
  • 104
  • 99
  • 92
  • 80
  • 77
  • 77
  • 73
  • 67
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
721

誰會被主管排擠? 主管之部屬能力及威脅感知覺之探討 / Who Will Be Ostraized by Supervisor?The Study of Supervisors’ perception of Subordinates’ Competence and Threat

黃順凱 Unknown Date (has links)
本研究旨在探討主管排擠部屬行為的前因,以部屬能力與威脅感作為解釋之機制,部屬能力可藉由威脅感對主管排擠產生影響。並以集體認同、知覺相似性作為部屬能力與威脅感間關係的調節變項;最後則探討主管排擠對於部屬幸福感與部屬主管承諾的影響。 本研究採用便利性取樣,使用對偶方式進行資料收集,研究對象為一般私人企業之員工,共發出紙本問卷328套,回收234套,回收率為71%,有效問卷為207套,有效回收率為63%。藉由SPSS 20與Lisrel 8.8等統計軟體進行資料分析,本研究結果顯示,部屬能力會透過威脅感對主管排擠產生正向的間接效果;當部屬越知覺主管對自己有排擠行為時,部屬之主管承諾越低;部屬知覺主管排擠對部屬幸福感則不具影響;而不論是集體認同或是知覺相似性,對於部屬能力與威脅感間的關係,皆無預期之調節效果。最後,針對本研究之結果進行討論,並說明理論貢獻、管理意涵、研究限制與未來研究建議。 / This study aimed at investigating the antecedents of supervisor ostracism. We used subordinates’ competence and threat from subordinates as mechanisms to illustrate the antecedents of supervisor ostracism. We hope to explore the indirect effect of subordinates’ competence on supervisor ostracism via threat from subordinates. Moreover, we proposed that collective identity and perceived supervisor-subordinate similarity can moderate the relationship between subordinates’ competence and threat from subordinates. We further explore the direct effect of supervisor ostracism on supervisor commitment and well-being. The sample of this study is selected using convenience sampling, and the data is dyad-level data. Totally 328 questionnaires were issued and 234 were returned. The response rate is 71%. Among returned questionnaires, there were 207 effective questionnaires with the effective rate of 63%. The collected data was analyzed by SPSS 20 and Lisrel 8.8. The result indicated that subordinates’ competence has positive indirect effect on supervisor ostracism via threat from subordinates. Although subordinate perceived supervisor ostracism has negative effect on supervisor commitment, it had no effect on well-being. Supervisor collective identity and perceived supervisor-subordinate similarity did not moderate the relationship between subordinates’ competence and threat from subordinates. Finally, theoretical and managerial implications of these findings are discussed.
722

Facial affect processing in delusion-prone and deluded individuals: A continuum approach to the study of delusion formation

Green, Melissa Jayne January 2002 (has links)
This thesis examines attentional and cognitive biases for particular facial expressions in delusion-prone and deluded individuals. The exploration of cognitive biases in delusion-prone individuals provides one means of elucidating psychological processes that might be involved in the genesis of delusions. Chapter 1 provides a brief review of the continuum approach to schizophrenia, and outlines recent theoretical conceptualisations of delusions. The study of schizophrenia phenomena at the symptom level has become a popular method of inquiry, given the heterogeneous phenotypic expression of schizophrenia, and the uncertainty surrounding the existence of a core neuropathology. Delusions are one of the most commonly experienced symptoms of schizophrenia, and have traditionally been regarded as fixed, false beliefs that are pathognomonic of an organic disease process. However, recent phenomenological evidence of delusional ideation in the general population has led to the conceptualisation of delusions as multi-dimensional entities, lying at the extreme end of a continuum from normal through to maladaptive beliefs. Recent investigations of the information processing abnormalities in deluded individuals are reviewed in Chapter 2. This strand of research has revealed evidence of various biases in social cognition, particularly in relation to threat-related material, in deluded individuals. These biases are evident in probabilistic reasoning, attribution style, and attention, but there has been relatively little investigation of cognitive aberrations in delusion-prone individuals. In the present thesis, social-cognitive biases were examined in relation to a standard series of faces that included threat-related (anger, fear) and non-threatening (happy, sad) expressions, in both delusion-prone and clinically deluded individuals. Chapters 3 and 4 present the results of behavioural (RT, affect recognition accuracy) and visual scanpath investigations in healthy participants assessed for level of delusion- proneness. The results indicate that delusion-prone individuals are slower at processing angry faces, and show a general (rather than emotion-specific) impairment in facial affect recognition, compared to non-prone healthy controls. Visual scanpath studies show that healthy individuals tend to direct more foveal fixations to the feature areas (eyes, nose, mouth) of threat-related facial expressions (anger, fear). By contrast, delusion-prone individuals exhibit reduced foveal attention to threat-related faces, combined with �extended� scanpaths, that may be interpreted as an attentional pattern of �vigilance-avoidance� for social threat. Chapters 5 and 6 extend the work presented in Chapters 3 and 4, by investigating the presence of similar behavioural and attentional biases in deluded schizophrenia, compared to healthy control and non-deluded schizophrenia groups. Deluded schizophrenia subjects exhibited a similar delay in processing angry faces, compared to non-prone control participants, while both deluded and non-deluded schizophrenia groups displayed a generalised affect recognition deficit. Visual scanpath investigations revealed a similar style of avoiding a broader range of negative (anger, fear, sad) faces in deluded schizophrenia, as well as a common pattern of fewer fixations with shorter duration, and reduced attention to facial features of all faces in both deluded and non-deluded schizophrenia. The examination of inferential biases for emotions displayed in facial expressions is presented in Chapter 7 in a study of causal attributional style. The results of this study provide some support for a �self-serving� bias in deluded schizophrenia, as well as evidence for an inability to appreciate situational cues when making causal judgements in both delusion-prone and deluded schizophrenia. A theoretical integration of the current findings is presented in Chapter 8, with regard to the implications for cognitive theories of delusions, and neurobiological models of schizophrenia phenomena, more generally. Visual attention biases for threat-related facial expressions in delusion-prone and deluded schizophrenia are consistent with proposals of neural dysconnectivity between frontal-limbic networks, while attributional biases and impaired facial expression perception may reflect dysfunction in a broader �social brain� network encompassing these and medial temporal lobe regions. Strong evidence for attentional biases and affect recognition deficits in delusion-prone individuals implicates their role in the development of delusional beliefs, but the weaker evidence for attributional biases in delusion-prone individuals suggests that inferential biases about others� emotions may be relevant only to the maintenance of delusional beliefs (or that attributional biases for others� emotional states may reflect other, trait-linked difficulties related to mentalising ability). In summary, the work presented in this thesis demonstrates the utility of adopting a single-symptom approach to schizophrenia within the continuum framework, and attests to the importance of further investigations of aberrant social cognition in relation to the development of delusions.
723

Threat Analysis Using Goal-Oriented Action Planning : Planning in the Light of Information Fusion

Bjarnolf, Philip January 2008 (has links)
<p>An entity capable of assessing its and others action capabilities possess the power to predict how the involved entities may change their world. Through this knowledge and higher level of situation awareness, the assessing entity may choose the actions that have the most suitable effect, resulting in that entity’s desired world state.</p><p>This thesis covers aspects and concepts of an arbitrary planning system and presents a threat analyzer architecture built on the novel planning system Goal-Oriented Action Planning (GOAP). This planning system has been suggested for an application for improved missile route planning and targeting, as well as being applied in contemporary computer games such as F.E.A.R. – First Encounter Assault Recon and S.T.A.L.K.E.R.: Shadow of Chernobyl. The GOAP architecture realized in this project is utilized by two agents that perform action planning to reach their desired world states. One of the agents employs a modified GOAP planner used as a threat analyzer in order to determine what threat level the adversary agent constitutes. This project does also introduce a conceptual schema of a general planning system that considers orders, doctrine and style; as well as a schema depicting an agent system using a blackboard in conjunction with the OODA-loop.</p>
724

胡錦濤時期新安全觀下的中美關係 / China's New Security Concept and Sino-American Relations in Hu Jintao's Era

陳怡君, Chen, Yi Chun Unknown Date (has links)
冷戰結束後的「一超多強」情勢與「中國威脅論」興起,以美國為首的國際社會有圍堵「中國崛起」之意,中國遂提出「新安全觀」以維護周邊環境穩定。「新安全觀」有別於冷戰安全觀思維,強調以「和平共處五原則」與各國共處,以雙邊、多邊外交政策實踐,經由協商解決衝突。 此論文目的是瞭解中國在胡錦濤時期的「新安全觀」指導下的對外政策,與對美關係(一)詮釋中國「新安全觀」的背景、意涵及在外交上的實踐;(二)分析胡錦濤時期的外交政策;(三)分別就朝核問題、台海問題、南海主權爭議、人權問題等安全議題中,分析中國在「新安全觀」思維下與美國之互動關係。 / Since the end of the Cold War, there has no longer been superpower confrontation . Nonetheless the global situation has turned out to be a realm of “one superpower and many other powers.” As China’s threat emerges, China recognizes that the international community, especially the United States, is forging a strategy of containment. Therefore, the PRC initiates a “New Security Concept” to stabilize its adjacent environment, proclaiming a unique security concept, to implement bilateral and multilateral diplomatic ties with other nations. China emphasizes its “Five Principles of Peaceful Coexistence,” solving disputes with others by way of coordination and cooperation. In this thesis, the author reviews the Hu Jintao government foreign policy and strategy based on China’s “New Security Concept,” and explore “Big Power” diplomacy . The author also analyzes the evolving changes of Sino-U.S. relationship under the “New Security Concept” so as to realize China’s very motive in manipulating foreign policy.
725

Helikopters överlevnad mot en kvalificerad motståndare

Arrenäs, Rickard January 2018 (has links)
Syftet med studien har varit att ur ett militärtekniskt överlevnadsperspektiv ta fram underlag över vilken verkansförmåga helikopter 16 behöver under ett transportuppdrag, i en nationell insats där hotet utgörs av mekaniserat infanteri. Studien har genomförts som en kvalitativ studie med ett visst kvantitativt inslag och baseras på data och fakta hämtad ur öppen litteratur samt genom intervjuer av uppdragsspecialister med erfarenhet och kunskap inom dörrskytte. Till hjälp har metodverktyget A´WOT-analys använts, vilken är en hybrid till SWOT-analysen. Syftet med A´WOT-analysen är att skilja ut de faktorer som behövs för verkan från helikopter 16 mot en definierad motståndare. Det samlade resultatet och sammanfattningen av studien är att helikopter 16 verkansförmåga behöver en omfattande uppgradering, om uppdrag som egen taktisk enhet skall kunna genomföras i en hotmiljö som utgörs av en kvalificerad motståndare. / The purpose of the study has been to investigate, from a military technical survival perspective, the effectiveness of helicopter 16 during a transport mission, in a national effort where the threat consists of a qualified opponent. The study has been conducted as a qualitative study with a certain quantitative element and based on data and facts obtained from open literature as well as interviews by mission specialists with experience and knowledge from door gunnery. As a help, the method tool A'WOT analysis have been used, which is a hybrid to the SWOT analysis. The purpose of the A'WOT analysis is to distinguish important factors for the effect from helicopter 16 against a defined opponent. The overall result and summary of the study is that helicopter 16 action ability needs a proper upgrade if assignments as a tactical unit can be carried out in a hot environment dictated by a qualified opponent.
726

Vivre sous la menace : ethnographie de la vie quotidienne des étrangers en situation irrégulière en France / Living Under the Threat of Removal : ethnography of the Everyday Life of Unauthorized Migrants in France

Le Courant, Stefan 19 January 2015 (has links)
Cette thèse cherche à saisir, au plus près des expériences, ce que signifie pour les étrangers en situation irrégulière de vivre sous la menace de l’expulsion. L’interpellation policière susceptible de surgir à tout moment et le spectre de la reconduite à la frontière façonnent leur quotidien. Afin de garantir leur séjour sur le territoire français, les étrangers en situation irrégulière doivent constamment se confronter à d’innombrables questions auxquelles il leur est bien difficile de répondre : à qui puis-je faire confiance ? Où se situe le risque de l’arrestation ? Comment ne pas être découvert comme irrégulier ? La menace qui s’immisce dans les moindres replis de l’existence vient en troubler tous les repères. Vivre sous la menace impose alors, au-delà des seules tactiques de contournement et de dissimulation employées pour se soustraire aux contrôles policiers, de mener quotidiennement des investigations pour tenter de s’orienter au sein d’un univers opaque. C’est l’exploration de cette réalité déstabilisée qui fait l’objet de cette recherche. Sont ainsi analysés la perception, les contours et les effets de la menace. À partir d’un travail de terrain mené entre novembre 2005 et juin 2013, d’abord dans un local de rétention administrative de la région parisienne, puis à l’extérieur par le suivi des étrangers en situation irrégulière ayant échappé à leur expulsion, cette thèse interroge la politique de contrôle de l’immigration qui fait de la menace la forme de gouvernement d’une population. / This research attempts to describe what it means to live with the constant threat of deportation in France. The everyday lives of undocumented migrants are shaped by imminent police arrests and the specter of deportation. In order to guarantee their stay in France, unauthorized migrants must confront questions that are often very difficult to answer: Who can I trust? Where does the risk of arrest lie? How can I hide the fact that I am undocumented? This threat is constantly present in every crevice of their existence. To live under the threat of deportation then is more than simply avoiding and deceiving the authorities; unauthorized migrants are forced to constantly evaluate and adjust to an unpredictable destabilized world. It is with this self-questioning that this dissertation is concerned; it aims at analyzing the forms the threat takes, the perception that individuals have of it, and the effects it has on their everyday existence.Based on ethnographic research carried out between November 2005 and June 2013, firstly in a detention facility in the Parisian suburbs, and then out of the detention center, following undocumented migrants who were not deported, this dissertation questions immigration policies that use threat as a form of governing a population.
727

Development of a framework for Integrated Oil and gas Pipeline Monitoring and Incident Mitigation System (IOPMIMS)

Johnson, Chukwuemeka Eze January 2017 (has links)
The problem of Third Party Interference (TPI) on Oil and Gas Pipelines is on the rise across the world. TPI is not only common in developing countries but is now occasionally experienced in developed countries including Germany and the UK. The risks posed by these third-party activities on Oil and Gas pipelines are enormous and could be measured in terms of financial costs, environmental damages as well as health and safety implications. The quest for an end to these malicious activities has triggered a lot of studies into the root causes of pipeline TPI, other causes of pipeline failure, risks associated with pipeline failure and their mitigation measures. However, despite the significance of the effects of TPI, very little has been done to proffer an enduring solution through research. This research therefore aims at developing a framework for integrated oil and gas pipeline monitoring and incident mitigation system through integration of various wireless sensors for effective monitoring of oil and gas pipelines. Having identified the existing gaps in literature as lack of reliable, accurate and standard method for oil and gas pipeline risk assessment model, the study undertook a quantitative approach to develop an effective Quantitative Risk Assessment (QRA) model for pipelines. The QRA model developed benchmarks pipeline risk assessment and gives the parameters with which standard QRA could be measured. The research findings indicate that risk associated with Nigerian Pipeline system is in the intolerable region whereas TPI is an increasing menace across the globe. Further findings show that Support Vector Machine (SVM) gave the best performance with 91.2% accuracy while Neural Networks (NN) and Decision Tree (DT) gave 63% and 57% accuracies respectively in terms of pipeline failure mode prediction accuracies. It was recommended that operators should draw out Pipeline Integrity Management (PIM) programs and store pipeline data in a format that captures number of fatalities, property damages and costs as well as volume of oil or gas spilled to ensure that accurate data is obtainable for improved PIM. In conclusion, having achieved its aim and objectives evidenced by the framework, model developed, and the recommendations presented, the research has contributed in no small measure to providing a solution to pipeline incidences.
728

Ideational and material forces in threat perception : Saudi and Syrian choices in Middle East wars

Darwich, May Ayman Hassan January 2015 (has links)
How do states perceive threats? Why are material forces sometimes more prominent in shaping threat perception, whereas ideational ones are key in other instances? This study aims to move beyond the task of determining whether material or ideational factors offer a more plausible explanation by arguing that threat perception is a function of the interplay between material factors and state identity, the influence of which can run both ways. Based on ‘analytical eclecticism’, I develop a two-layered conception of security as both physical and ontological, in which the interaction of ideational and material forces can be analysed. Ontological security is intimately connected with identity; its pursuit, therefore, requires distinctiveness and differentiation from the ‘Other’ as well as a coherent and consistent identity narrative at the domestic level. Physical security, on the other hand, involves the identification of threats that constitute a danger to the survival of the state. While ontological and physical security spheres have distinct dynamics and processes, they constitute two interrelated layers. Accordingly, I argue that states can suffer from ontological insecurity while their physical security remains intact, and vice versa. In some instances, physical security and its corresponding material forces condition identity narratives while in other instances the causal arrow points in the other direction. To illustrate these processes, I present a ‘structured, focused’ comparison of Syrian and Saudi threat perceptions during three major wars in the region: the Iran-Iraq War (1980-1988), the 2006 Lebanon War, and the 2009 Gaza War. While providing novel insights for explaining the dynamics of threat perception in the Middle East, this study contributes to the broader IR literature by proposing a conceptual framework that links the literature on Self/Other relations, ontological security, and realism in IR theory. This study thus demonstrates the potential utility of bringing IR theory and the Middle East as an area study into closer dialogue.
729

The pragmatic particles 'enfin' and 'écoute' in French film and TV dialogue

Connors, Marianne Dorothy January 2016 (has links)
This thesis investigates the use of the pragmatic particles (PPs) 'enfin' and 'écoute' in French film dialogue, and their translations in British English subtitles. Using a corpus of nine films and eight episodes drawn from two television series – all released in the UK between 2005 and 2015, and equating to approximately twenty-two hours – the study identifies tokens across a much wider range of contexts than has previously been possible using traditional corpora. The main contribution is an analysis of PP functions. The results for 'enfin' show a different functional distribution of the particle to other corpora, with corrective 'enfin' occurring significantly less frequently. The relatively large number of tokens of performative and emotional (or affective) 'enfin' allows for an elaboration of these two categories, and a tendency is observed for 'enfin' to appear as an apparent disagreement mitigator in discussions between peers. With regard to 'écoute', it is argued that écoute1 functions as a face-threat mitigator in unequal relationships and écoute2 as an FTA, although the particle is multifunctional and some tokens exhibit characteristics of both categories. Attention is given to combinations of 'enfin' and 'écoute' with other particles: while there is a clear tendency for disagreement-mitigating 'enfin' to co-occur with 'mais', and for the precision and restrictive subcategories of the corrective to co-occur with 'je veux dire', other previously documented combinations ('enfin bon' and 'ben écoute') are not frequently occurring in the present corpus. The thesis also makes a significant contribution to the field of Audiovisual Translation (AVT). The English subtitles show high rates of omission for both particles consistent with previous research, with disagreement-mitigating 'enfin' particularly vulnerable to omission. However, the analysis reveals a surprising pattern regarding 'écoute': a clear division of labour between ‘look’ (used to translate more confrontational tokens) and ‘listen’ (more conciliatory and socially distant). The study includes an experimental analysis of the subtitles relative to their character limits, demonstrating a potential new approach for researchers wishing to investigate the impact of various subtitling constraints.
730

Amenaza por inestabilidad de las laderas en la cuenca del río Mocoy. Andes venezolanos / Amenaza por inestabilidad de las laderas en la cuenca del río Mocoy. Andes venezolanos

Montiel A., Katty, Maldonado B., Henry, Gouveia M., Edith Luz 10 April 2018 (has links)
In the intention to establish a geomorphologic zonation of the threat levels due to slope in-stability of the Mocoy hydrographic basin, an analysis of the biophysics conditions was made by using the heuristic method. Space variables of greater incidence in local dynamics were identified and processed in ARC/INFO, and applied methodological proposals associated to the matrix of spatial analysis of Leopold and the system of transparencies of MacHarg. It was possible to identify three levels of threat: low, moderate and high, which were correlated with the operating morphogenetic processes, the geologic structure and lithology, as well as with the land use of this important river basin in the northern flank of the Venezuelan Andes. The analysis of the implicit mechanisms in the collapse of geologic material, as well as the estimation of the future tendency and detection of the areas of greater threat, constitute the basis for a suitable mitigation problem of dangerous slope processes and the sediment contribution tothe fluvial system of the Mocoy river. / Con la intención de establecer una zonificación de los niveles de amenaza geomorfológica porinestabilidad de laderas de la cuenca hidrográfica del río Mocoy, se efectuó un análisis de las condiciones biofísicas, mediante el método heurístico y se identificaron las variables espaciales de mayor incidencia en la dinámica local, tratadas en ARC/INFO y con propuestas metodológicas asociadas a la matriz de análisis espacial de Leopold y el sistema de transparencias de MacHarg. Se logró representar tres niveles de amenaza: baja, moderada y alta, las cuales fueron correlacionadas con los procesos morfogenéticos actuantes, la estructura geológica y litología, así como también con el uso de la tierra de esta importante cuenca del flanco norandino vene- zolano. El análisis de los mecanismos implícitos en el colapso de material geológico, así como la estimación sobre la tendencia futura y detección de las áreas de mayor amenaza, constituyen las bases para una adecuada mitigación del problema de procesos de ladera peligrosos y el aportede sedimentos al sistema fluvial del río Mocoy.

Page generated in 0.078 seconds