• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 383
  • 176
  • 42
  • 26
  • 26
  • 24
  • 20
  • 20
  • 12
  • 12
  • 9
  • 9
  • 9
  • 9
  • 9
  • Tagged with
  • 913
  • 212
  • 143
  • 139
  • 129
  • 102
  • 97
  • 84
  • 81
  • 80
  • 71
  • 70
  • 69
  • 67
  • 64
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Využití tvořivých metod ve výuce slohu na 2. st. ZŠ / Creative methods of essay writing at elementary school

ŠIMKOVÁ, Jana January 2007 (has links)
The work deals with a research of essay writing lessons conditions plus most common methods used at elementary school. The work suggests new solutions to making the lessons more entertaining. It also says how to draw pupils´ attention to the subject. Finally, it focuses on choosing the most suitable topics and genres with concrete examples. It is attached with the main theoretical terms.
162

Approaches to Natural Language Processing

Smith, Sydney 01 January 2018 (has links)
This paper explores topic modeling through the example text of Alice in Wonderland. It explores both singular value decomposition as well as non-­‐‑negative matrix factorization as methods for feature extraction. The paper goes on to explore methods for partially supervised implementation of topic modeling through introducing themes. A large portion of the paper also focuses on implementation of these techniques in python as well as visualizations of the results which use a combination of python, html and java script along with the d3 framework. The paper concludes by presenting a mixture of SVD, NMF and partially-­‐‑supervised NMF as a possible way to improve topic modeling.
163

DITA Education

ZHANG, YUNYE, CHENG, HANKE January 2011 (has links)
Now, it is the world that high and new technology industries dominate. With the expansion of different industry chains and the trend of economic globalization, thousands of innovative solutions enter into the life of people. However, with the appearance of these ideas, initiators always face the challenge of presenting them. An intuitive and absorbing presentation plays the most important role of making the ideas accepted. As the saying goes, “No matter how good a movie is, it is boring without voice”. No matter how superior the products are, they will not be understood without perfect technical documents. This thesis presents the latest information typing architecture – DITA (Darwin Information Typing Architecture) which gives you an overview of technical presentations. As a newly developing XML-based (Extensible Markup Language) standard, DITA is not as popular as it ought to be. Seldom people even technical writers know about DITA and its characteristics. So far, the lack of practical materials leads to the difficulty for beginners to study DITA. The aim of this thesis is mainly to introduce DITA and make a technical tutorial. In order to strengthen the comprehension about DITA, the thesis makes a comparison with DocBook, another popular XML-based standard for technical writing and the most competitive standard of DITA. In the thesis, we collect a large number of materials of DITA and DocBook, and refine them for their comparison. For the practical tutorial, we make some simple examples in a DITA project and implement them on Serna Free, an XML editor. As a result, the thesis presents the detailed comparison between DITA and Docbook, and the tutorial includes the basic and vital part of DITA features.   Key words: DITA map, topic, Syntext Serna Free, tutorial
164

Privacy rights in employment

Ball, Yvonne January 2008 (has links)
This thesis undertakes to research the development of domestic legal protection for privacy rights within employment. Unusually for a current work, it does this by returning to the genesis of the protections. The work challenges pervasive arguments that the notion of confidence did not protect privacy and exceptionally argues that the earliest incarnation of the notion of confidence was well equipped to protect private and personal information against disclosure. The thesis puts forward the novel view that the problems that have arisen in providing domestic protection for such information, in the absence of a right to privacy, are the result of an unfortunate narrowing of the original notion. This position is underpinned by the contention that a number of cases misinterpreted the nature of the original tort and did not fully recognise the requirement to provide protection against the acquisition of personal information. The historical analysis contributes to current knowledge by providing an alternative interpretation of the historical legal framework. This analysis provides an unorthodox assessment of the opportunities provided to the courts by the notion of confidence, to enhance both the theory and practical impact of the protection of privacy rights within employment Furthermore the thesis evaluates a broad range of case law from the European Court of Human Rights. These include general privacy cases, those involving wrongdoers as well as general employment cases. These cases are used to identify any consistent themes or conflicts in the application of the right to privacy. The evaluation produces a highly developed analysis and uncovers the latent significance of employment policies in both the protection of and the intrusion into, an employee's privacy. Most notably and distinctively the thesis identifies the important role that a well-crafted policy can have in augmenting an insubstantial legislative framework, provided that some legal basis provides the foundation for the policy. This evaluation also exposes the implications of any policy, which provides the basis for an interference with an employee's privacy and unconventionally highlights that the mere existence of such a policy can of itself amount to an intrusion, whether or not it is put into practice. Moreover, the thesis considers whether the incorporation of the right to privacy into domestic law has any impact upon private sector employers and employees. It heightens knowledge of the positive obligations placed upon the state and the courts to protect the right to privacy of all individuals against intrusions by the state and significantly against intrusions by other individuals or private sector organisations. The thesis therefore provides a valuable addition to current understanding of the interventionist and rigorous protections for privacy rights within employment, provided by the Strasbourg Court. This in turn provides the foundation for the unique evaluation of how effectively the right to privacy is incorporated into current domestic law. The thesis has taken the valuable opportunity provided by the tenth anniversary of the publication of the Human Rights Act 1998 to consider its impact upon privacy rights within employment. It takes advantage of the occasion to re-evaluate the categories of confidence and privacy and to analyse the principles underpinning the notions within domestic courts. The work exceptionally compares the development of domestic employment law with the development of general civil and criminal cases. This is an effective structure, which facilitates the development of arguments outlining how privacy rights within employment can be more effectively recognised and protected. The thesis does not shirk the challenges posed by the complex and difficult piece of legislation known as the Regulation of Investigatory Powers Act 2000, a particularly puzzling statute'. 1 It singularly and painstakingly reviews its provisions and questions whether accepted interpretations are correct or workable. The work offers an independent analysis of the rationale and application of its terms and brings to light the finding that despite its name Part II of the Act does not provide any powers and does not regulate the use of any existing powers but merely provides a framework, by which, intrusions may be undertaken by public authorities 'in accordance with the law' where there is no other statutory basis for the interference. The thesis makes an interesting case that other than where it creates criminal offences and civil liabilities for the interception of communications2, it has little if any effect upon the monitoring of employees, whether in the public or private sectors. The thesis also evaluates the Data Protection Act 1998 and The Employment Practices Code. It originally asserts that the Act and the Code provide the statutory basis for employers to intrude into the private lives of employees and prospective employees 'in accordance with the law' where it is necessary and proportionate to so; providing the employer has established and published policies that make the intrusion foreseeable in the circumstances. The fact that these arguments need to be evaluated and explained, naturally leads to the explicit conclusion that the incorporation of the rights protected by Article 8 in the statutory framework have failed to supply the necessary clarity to provide forseeability or to give, strengthen or explicitly restrict privacy rights within employment. Additionally, the creative comparison with the general privacy and criminal cases brings to light the evident disparity in the development of the case law in these areas compared with the development within employment cases. The thesis sets out the &adual but definite maturing of the protection noticeable in general privacy and criminal cases, particularly in v W [2003] EWCA Crim 1632 p. 98 2 Which themselves are modified by the Telecommunication (Lawful Business Practice) (Interception of Communications) Regulations, 2000 L1 relation to wrongdoing and rehabilitation, arguing that this has yet to filter into the employment cases. This leads to proposals for reform to remove the evident confusion for employers, employees, legal advisors, those providing oversight and commentators. The proposals encourage the judiciary to embrace the challenges and possibilities provided by the Human Rights Act 1998 to provide appropriate protections for privacy rights within employment. The thesis provides a platform for further research within this area and makes recommendations as to how the findings could be developed by both empirical research or by further comparative studies. The unusual approach to the research, the original nature of the findings and proposals for reform provide a valuable contribution to knowledge of the domestic legal framework, both statutory and common law suggesting both how it may be more effectively applied and how it could profitably be developed and clarified for both employers and employees. The thesis has thereby moved the debate to a different theoretical place from the established view of the ability of domestic law to effectively protect privacy rights within employment.
165

The emergence of incitement to genocide within the Nuremberg trial process : the case of Julius Streicher

Eastwood, Maggi January 2006 (has links)
This doctoral thesis explores a range of issues within the development of the offence of incitement to genocide. It examines how the 'notorious Jew-baiter' Julius Streicher, was prosecuted in 1945/46 before the International Military Tribunal (IMT) for 'the incitement of the persecution of the Jews'. The newly defined category of 'crimes against humanity' under Article 6( c) of the Nuremberg Charter, classified 'persecutions on political, racial, or religious grounds' as a new criminal offence. In 1945, the prosecution alleged that Streicher's anti­Semitic propaganda had paved the way for Hitler's extermination policy, leading to the mass murder of approximately six million Jews. On October I, 1946, the Tribunal held that Streicher's actions of 'incitement to murder and extermination' were classified as 'persecution' and found him guilty of crimes against humanity. This thesis asks the question how was it that 'words used as persecution' became recognised as an international criminal offence as a sub set of crimes against humanity, without being directly or expressly criminalised by the Charter? In order to provide an answer to this question, this thesis conducts the first in-depth analysis and comprehensive reconstruction of how the prosecution's case against Streicher developed during the various phases of the pre-trial and trial process. This detailed reconstruction, based on archival sources not previously discussed in the academic literature on Nuremberg, forms the most original element of the thesis. The present study critically examines the factual evidence raised and dropped during different stages in the development of Streicher' s case. It explores the various strategies and tactics deployed by the prosecution, and evaluates the success and weaknesses, along with the counterarguments submitted by Streicher' s defence counsel. The aim in explicating and discussing these issues and conflicts of strategic interpretations and reinterpretations is to provide an original perspective that effectively explores the process 'behind the scenes'. This study suggests that it was this process of selective interpretation and decision-making that resulted in the emergence, or 'birth', of a new offence, 'incitement to genocide' that today would be recognised as 'direct and public incitement to commit genocide', under Article III( c) of the 1948 Convention on the Prevention and Punishment of the Crime of Genocide.
166

Probabilistic Models of Topics and Social Events

Wei, Wei 01 December 2016 (has links)
Structured probabilistic inference has shown to be useful in modeling complex latent structures of data. One successful way in which this technique has been applied is in the discovery of latent topical structures of text data, which is usually referred to as topic modeling. With the recent popularity of mobile devices and social networking, we can now easily acquire text data attached to meta information, such as geo-spatial coordinates and time stamps. This metadata can provide rich and accurate information that is helpful in answering many research questions related to spatial and temporal reasoning. However, such data must be treated differently from text data. For example, spatial data is usually organized in terms of a two dimensional region while temporal information can exhibit periodicities. While some work existing in the topic modeling community that utilizes some of the meta information, these models largely focused on incorporating metadata into text analysis, rather than providing models that make full use of the joint distribution of metainformation and text. In this thesis, I propose the event detection problem, which is a multidimensional latent clustering problem on spatial, temporal and topical data. I start with a simple parametric model to discover independent events using geo-tagged Twitter data. The model is then improved toward two directions. First, I augmented the model using Recurrent Chinese Restaurant Process (RCRP) to discover events that are dynamic in nature. Second, I studied a model that can detect events using data from multiple media sources. I studied the characteristics of different media in terms of reported event times and linguistic patterns. The approaches studied in this thesis are largely based on Bayesian nonparametric methods to deal with steaming data and unpredictable number of clusters. The research will not only serve the event detection problem itself but also shed light into a more general structured clustering problem in spatial, temporal and textual data.
167

Interpretable and Scalable Bayesian Models for Advertising and Text

Bischof, Jonathan Michael 04 June 2016 (has links)
In the era of "big data", scalable statistical inference is necessary to learn from new and growing sources of quantitative information. However, many commercial and scientific applications also require models to be interpretable to end users in order to generate actionable insights about quantities of interest. We present three case studies of Bayesian hierarchical models that improve the interpretability of existing models while also maintaining or improving the efficiency of inference. The first paper is an application to online advertising that presents an augmented regression model interpretable in terms of the amount of revenue a customer is expected to generate over his or her entire relationship with the company---even if complete histories are never observed. The resulting Poisson Process Regression employs a marginal inference strategy that avoids specifying customer-level latent variables used in previous work that complicate inference and interpretability. The second and third papers are applications to the analysis of text data that propose improved summaries of topic components discovered by these mixture models. While the current practice is to summarize topics in terms of their most frequent words, we show significantly greater interpretability in online experiments with human evaluators by using words that are also relatively exclusive to the topic of interest. In the process we develop a new class of topic models that directly regularize the differential usage of words across topics in order to produce stable estimates of the combined frequency-exclusivity metric as well as proposing efficient and parallelizable MCMC inference strategies. / Statistics
168

Noto-ya-masogana : padi va boitshwaro

Lekganyane, Enniah Matemane 23 October 2012 (has links)
In this dissertation, Noto-ya Masogana is described as a moral story. The moral story can be distinguished from the didactic story and from the picaresque. The picaresque deals with a picaro who is the only main character. He is not presented as being trustworthy and responsible. As a result of this, this type of narrative is known as a 'Schelmroman' in German. The development of the story is simple and deals with the escapades of the picaro who goes on a journey. The didactic story presents the reader with a lesson, while the moral story indicates that a life well led will be rewarded. A life not well led will, in turn, be punished. In this narrative, Lesibana pays for his unfaithfulness to Mamahlo. He repents and the narrative has a happy ending. The method used in this investigation is based on an adjusted narratological model. Only the content and structure levels feature. The topic is identified as an important concept with regard to level one, the reason for this being that it influences the four different elements of the narrative, namely: characters, events time and place. Two main characters are distinguished, and the mutual relationship between them and less important characters receives attention. Events are divided into three categories according to importance. Events are thus called either essential, appropriate or coincidental. Two issues are relevant with regard to time; namely the moment at which an event takes place and the time which is occupied by an event. Place has a bearing on the natural as well as the sociocultural place. The concepts theme and narrating strategies play an important role on a structural level. In the discussion of the structure of Noto-ya-Masogana attention is paid to the exposition, the development, the climax and the resolution. The following techniques are relevant in this regard: motif, foreshadowing, retardation and acceleration of time, contrast, complication, focus and cycle. The study is conducted by comparing this novelette to the story of the Prodical Son and to the picaresque. Attention is also drawn to the author's use of the 'Makgoweng' motif. / Dissertation (MA)--University of Pretoria, 2012. / Philosophy / unrestricted
169

Collaborative Communication Interruption Management System (C-CIMS): Modeling Interruption Timings via Prosodic and Topic Modelling for Human-Machine Teams

Peters, Nia S. 01 December 2017 (has links)
Human-machine teaming aims to meld human cognitive strengths and the unique capabilities of smart machines to create intelligent teams adaptive to rapidly changing circumstances. One major contributor to the problem of human-machine teaming is a lack of communication skills on the part of the machine. The primary objective of this research is focused on a machine’s interruption timings or when a machine should share and communicate information with human teammates within human-machine teaming interactions. Previous work addresses interruption timings from the perspective of single human, multitasking and multiple human, single task interactions. The primary aim of this dissertation is to augment this area by approaching the same problem from the perspective of a multiple human, multitasking interaction. The proposed machine is the Collaborative Communication Interruption Management System (C-CIMS) which is tasked with leveraging speech information from a human-human task and making inferences on when to interrupt with information related to an orthogonal human-machine task. This study and previous literature both suggest monitoring task boundaries and engagement as candidate moments of interruptibility within multiple human, multitasking interactions. The goal then becomes designing an intermediate step between human teammate communication and points of interruptibility within these interactions. The proposed intermediate step is the mapping of low-level speech information such as prosodic and lexical information onto higher constructs indicative of interruptibility. C-CIMS is composed of a Task Boundary Prosody Model, a Task Boundary Topic Model, and finally a Task Engagement Topic Model. Each of these components are evaluated separately in terms of how they perform within two different simulated human-machine teaming scenarios and the speed vs. accuracy tradeoffs as well as other limitations of each module. Overall the Task Boundary Prosody Model is tractable within a real-time system because of the low-latency in processing prosodic information, but is less accurate at predicting task boundaries even within human-machine interactions with simple dialogue. Conversely, the Task Boundary and Task Engagement Topic Models do well inferring task boundaries and engagement respectively, but are intractable in a real-time system because of the bottleneck in producing automatic speech recognition transcriptions to make interruption decisions. The overall contribution of this work is a novel approach to predicting interruptibility within human-machine teams by modeling higher constructs indicative of interruptibility using low-level speech information.
170

Preventing 'unsound minds' from populating the British world : Australasian immigration control & mental illness 1830s-1920s

Kain, Jennifer S. January 2015 (has links)
This thesis examines the bureaucratic controls designed to restrict the entry of migrants perceived to be ‘mentally ill’ into New Zealand and Australia in the period between the 1830s and 1920s. It is the first study to analyse the evolution of these practices in this region and timeframe. It addresses a gap in the current literature because it explores the tensions that emerged when officials tried to implement government policy. This study sheds new light on the actions, motivations and ideologies of the British and Australasian officials who were responsible for managing and policing immigration. While there were attempts to coordinate the work of border officials, this proved very difficult to achieve in practice: some immigration controllers were, for instance, receptive to the theories that were coming out of international debates about border control, others retained a parochial perspective. The thesis argues that every attempt to systematise border management failed. The regulation of the broad spectrum of ‘mental illness’ was a messy affair: officials struggled with ill-defined terminology and a lack of practical instructions so tensions and misunderstandings existed across local, national and metropolitan levels. Based on extensive research in British, New Zealand and Australian archives, this study reveals the barriers that were created to prevent those deemed ‘mentally ill’ from migrating to regions imagined as ‘Greater Britain’. It shows how judgements about an individual’s state of mind were made in a number of locales: in Britain; on the voyage itself; and at the Australasian borders. This thesis, by exploring the disordered nature of immigration control, will add a new perspective to the existing scholarship on transnational immigration legislation and Australasian asylum studies. The in-depth examination of border control systems also contributes to our understanding of the links between migration and illness in the British world during this period.

Page generated in 0.0636 seconds