Dissertationen zum Thema „Exploit testing“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-42 Dissertationen für die Forschung zum Thema "Exploit testing" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Flansburg, Kevin. „A framework for automated management of exploit testing environments“. Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.
Der volle Inhalt der QuelleVernersson, Susanne. „Penetration Testing in a Web Application Environment“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.
Der volle Inhalt der QuelleKahlström, Joakim, und Johan Hedlin. „Automating software installation for cyber security research and testing public exploits in CRATE“. Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.
Der volle Inhalt der QuelleAndersson, Gustaf, und Fredrik Andersson. „Android Environment Security“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.
Der volle Inhalt der QuelleBahabanian, Olivier. „Explicit deconvolution of wellbore storage distorted well test data“. Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.
Der volle Inhalt der QuelleMcNiel, Patrick D. „Implicit and explicit measures“. Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.
Der volle Inhalt der QuelleCollier, Benjamin Lee. „DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?“ UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.
Der volle Inhalt der QuelleAndersson, Daniel, und Fredrik Saliba. „Virtual testing of self-piercing rivet connections“. Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.
Der volle Inhalt der QuelleLiang, Yuli. „Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models“. Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.
Der volle Inhalt der QuellePillai, Anil Ph D. „Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance“. University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.
Der volle Inhalt der QuelleMartinez, Silas G. „Aggression and boxing performance: Testing the channeling hypothesis with multiple statistical methodologies“. Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1491929510847969.
Der volle Inhalt der QuelleSarfan, Laurel D. „A multimethod approach and novel intervention: Testing relations between implicit and explicit experiential avoidance and social anxiety disorder symptoms“. Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami159501616913879.
Der volle Inhalt der QuelleBasson, Gysbert. „An explicit finite difference method for analyzing hazardous rock mass“. Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17957.
Der volle Inhalt der QuelleENGLISH ABSTRACT: FLAC3D is a three-dimensional explicit nite difference program for solving a variety of solid mechanics problems, both linear and non-linear. The development of the algorithm and its initial implementation were performed by Itasca Consulting Group Inc. The main idea of the algorithm is to discritise the domain of interest into a Lagrangian grid where each cell represents an element of the material. Each cell can then deform according to a prescribed stress/strain law together with the equations of motion. An in-depth study of the algorithm was performed and implemented in Java. During the implementation, it was observed that the type of boundary conditions typically used has a major in uence on the accuracy of the results, especially when boundaries are close to regions with large stress variations, such as in mining excavations. To improve the accuracy of the algorithm, a new type of boundary condition was developed where the FLAC3D domain is embedded in a linear elastic material, named the Boundary Node Shell (BNS). Using the BNS shows a signi cant improvement in results close to excavations. The FLAC algorithm is also quite amendable to paralellization and a multi-threaded version that makes use of multiple Central Processing Unit (CPU) cores was developed to optimize the speed of the algorithm. The nal outcome is new non-commercial Java source code (JFLAC) which includes the Boundary Node Shell (BNS) and shared memory parallelism over and above the basic FLAC3D algorithm.
AFRIKAANSE OPSOMMING: FLAC3D is 'n eksplisiete eindige verskil program wat 'n verskeidenheid liniêre en nieliniêre soliede meganika probleme kan oplos. Die oorspronklike algoritme en die implimentasies daarvan was deur Itasca Consulting Group Inc. toegepas. Die hoo dee van die algoritme is om 'n gebied te diskritiseer deur gebruik te maak van 'n Lagrangese rooster, waar elke sel van die rooster 'n element van die rooster materiaal beskryf. Elke sel kan dan vervorm volgens 'n sekere spannings/vervormings wet. 'n Indiepte ondersoek van die algoritme was uitgevoer en in Java geïmplimenteer. Tydens die implementering was dit waargeneem dat die grense van die rooster 'n groot invloed het op die akkuraatheid van die resultate. Dit het veral voorgekom in areas waar stress konsentrasies hoog is, gewoonlik naby areas waar myn uitgrawings gemaak is. Dit het die ontwikkelling van 'n nuwe tipe rand kondisie tot gevolg gehad, sodat die akkuraatheid van die resultate kon verbeter. Die nuwe rand kondisie, genaamd die Grens Node Omhulsel (GNO), aanvaar dat die gebied omring is deur 'n elastiese materiaal, wat veroorsaak dat die grense van die gebied 'n elastiese reaksie het op die stress binne die gebied. Die GNO het 'n aansienlike verbetering in die resultate getoon, veral in areas naby myn uitgrawings. Daar was ook waargeneem dat die FLAC algoritme parralleliseerbaar is en het gelei tot die implentering van 'n multi-SVE weergawe van die sagteware om die spoed van die algoritme te optimeer. Die nale uitkomste is 'n nuwe nie-kommersiële Java weergawe van die algoritme (JFLAC), wat die implimentering van die nuwe GNO randwaardekondisie insluit, asook toelaat vir die gebruik van multi- Sentrale Verwerkings Eenheid (SVE) as 'n verbetering op die basiese FLAC3D algoritme.
Smith, Chelsea A. „Testing an Interference Competition Hypothesis to Explain the Decline of the Convergent Lady Beetle, Hippodamia convergens (Coleoptera: Coccinellidae), in Ohio“. The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339527346.
Der volle Inhalt der QuelleParkes, Geoffrey S. „Can psychometric testing be used to explain, predict and measure behavioural competences and the funding resource orchestration of the entrepreneur?“ Thesis, Aston University, 2015. http://publications.aston.ac.uk/26709/.
Der volle Inhalt der QuelleVaught, Donna Rae. „The effects of explicit instructions and processing demands on comprehension monitoring of learning disabled and nondisabled children“. Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/44694.
Der volle Inhalt der QuelleMaster of Science
Nopote, Nomvuyiseko Minty. „Establishing explicit perspectives of personality for a sample of Xhosa-speaking South Africans“. Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1145.
Der volle Inhalt der QuellePopov, Mikhail. „Analytic and Numerical Methods for the Solution of Electromagnetic Inverse Source Problems“. Doctoral thesis, KTH, Electromagnetic Theory, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3134.
Der volle Inhalt der QuelleOkura, Eve Kiyomi. „A Study of the Correlation Between Working Memory and Second Language EI Test Scores“. BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/3025.
Der volle Inhalt der QuelleFarias, Eliana Santos de. „Elabora??o de instrumento para identifica??o de alunos intelectualmente dotados por professores: estudo explorat?rio“. Pontif?cia Universidade Cat?lica de Campinas, 2012. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/446.
Der volle Inhalt der QuelleThe identification of students fitted and / or talent is characterized by a variety of possibilities. This identification may be multidimensional (areas, dimensions), multireferential (parents, teachers, psychologists and other staff), multi-method (methods, processes, tools), multi-temporal (time, stages of development), multi-contextual (tasks at school, at home and others), and multi-stage (stages or modules support). In this case, the figure of the teacher deserves, and effective participation through teacher nomination. In Brazil, there is no instrument with a favorable recommendation by the Federal Council of Psychology. Given this fact, the objective is to develop two studies, the first draw up a scale of appointing teachers for gifted and talented students as well as search for evidence of content validity, where as the second study, we sought evidence for the consistency of accuracy internal and validity based on internal structure and convergent and discriminant. After formulating the instrument (ENDI-p), the results of the first study indicate that the ENDI-p is ready for use, when looking at the kappa coefficient (km?dio= 0.778). The ENDI-p lost five items and had four items adapted to other areas other than the original. In the second study, by means of item-total correlation were removed 17 items from Endi-p showed that saturation index less than 0.30 (varimax rotation) which resulted in three major factors. With the removal of such items, the scale was a good value for the overall Cronbach's alpha (alfa= 0.801), but also for the three specific factors: F1 (alfa=0.892 with 23 items), F2 (alfa= 0.929 with 26 items), F3 (alfa= 0.727 with 7 items), given the goal 3. The Bartlett test of sphericity indicated a correlation between items (x2 0=4370,985; gl=1653; p<0,000). Since the measure of sampling adequacy for the application of factor analysis showed to be appropriate for the test of Kaiser-Meyer-Olkin (KMO = 0.498). The fourth objective was met through exploratory factor analysis (EFA) resulting in three factors. Objectives 5 and 6, about the search for evidence of validity based on relationships with external variables were partially met, which may suggest, for future studies using a larger sample.
A identifica??o de alunos dotados e/ou talentosos caracteriza-se por uma diversidade de possibilidades. Esta identifica??o pode ser multidimensional (?reas, dimens?es), multireferencial (pais, professores, psic?logos e outros agentes), multi-m?todo (meios, processos, instrumentos), multi-temporal (momentos, est?gios do desenvolvimento), multi-contextual (tarefas na escola, em casa e outros) e, multi-et?pica (fases ou m?dulos de apoio). Neste processo, a figura do professor merece destaque, e efetiva sua participa??o por meio de nomea??o docente. No Brasil, ainda n?o existe instrumento com recomenda??o favor?vel pelo Conselho Federal de Psicologia. Diante deste fato, objetivou-se por desenvolver dois estudos, no primeiro elaborar uma escala de nomea??o docente para alunos dotados e talentosos, bem como buscar por evidencias de validade de conte?do; j? no segundo estudo, buscou-se por evidencias de precis?o da consist?ncia interna, bem como validade baseada na estrutura interna e convergente e discriminante. Depois de elaborado o instrumento (ENDI-p), os resultados do primeiro estudo indicam que a ENDI-p est? pronta para uso, ao se observar o coeficiente de kappa (km?dio=0,778). A ENDI-p perdeu cinco itens e teve quatro itens adaptados para outras ?reas, que n?o as originais. No segundo estudo, por meio da correla??o item-total foram retirados 17 itens da ENDI-p que apresentaram ?ndices de satura??o inferiores a 0,30 (rota??o varimax) o que resultou em tr?s grandes fatores. Com a extra??o destes itens, a escala apresentou um bom valor para o Alpha de Cronbach geral (alfa=0,801), como tamb?m para os tr?s fatores espec?ficos: F1 (alfa=0,892 com 23 itens), F2 (alfa=0,929 com 26 itens), F3 (alfa=0,727 com 7 itens), atendendo ao objetivo 3. O teste de esfericidade de Bartlett indicou correla??o entre os itens (x2 0=4370,985; gl=1653; p<0,000). J? a medida de adequa??o da amostra para aplica??o da an?lise fatorial apresentou-se apropriada pelo teste de Kaiser-Meyer-Olkin (KMO=0,498). O quarto objetivo foi atendido por meio da an?lise fatorial explorat?ria (AFE) resultando em tr?s fatores. Os objetivos 5 e 6, a respeito da busca de evidencias de validade baseadas nas rela??es com vari?veis externas foram parcialmente atendidos, o que pode sugerir, para futuros estudos utilizar uma amostra maior.
Siyepu, Sibawu Witness. „The use of Van Hiele's theory to explore problems encountered in circle geometry: a grade 11 case study“. Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1004777.
Der volle Inhalt der QuelleStory, Virginia. „The Correlation Between the ACT, Inc. EXPLORE Test and Student Success in High School Advanced and Advanced Placement Mathematics Courses“. Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/etd/3584.
Der volle Inhalt der QuelleHsu, Ming-Yuan, und 許明淵. „Penetration Testing Approach by Mutating Sled of Exploit“. Thesis, 2008. http://ndltd.ncl.edu.tw/handle/61977630430195970741.
Der volle Inhalt der Quelle中原大學
資訊工程研究所
96
A worm is usually used to speedy spread the exploit code to host in the internet, and if it utilizing the encrypting technique, would causes the serious disasters. Since the traditional IDS are not able to detect the shellcode of the encrypted polymorphic worm. For against the polymorphic worm, we need to research how the polymorphism could mutate to evade the current detection mechanism. In this paper, we analyses and used the encryption and polymorphic decoder to test whether the IDS Snort, a signature-based IDS could detect out penetration testing tool or not. We propose a scheme to mutate the signature of a worm, to let any byte in sled and shellcode of the worm could be executed normally on destination to evade the IDSs like STRIDE or APE. Finally, we use Sasser and Blaster worms as examples to blend into normal traffic in our experiment and emulate a penetration test to IDSs, Snort and STRIDE. According to the emulation results, our penetration testing tool could be successful possess the exploit code and evading the IDS to the end host above 90%.
Chen, Hung-Wen, und 陳泓文. „A Systematic Exploit Strengthening Method Integrating with Penetration Testing Framework“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/90262424765902199873.
Der volle Inhalt der Quelle國立交通大學
資訊科學與工程研究所
103
Due to software quality issues, recent attacks on various systems are getting serious, and the software security issues therefore become an important research topic. These attacks on the software vulnerability will not only endanger the information infrastructure, but also impact the human safety. To improve the overall robustness of the system, we need a penetration test system to audit related systems. We have proposed the concept of the exploit toolchain to automate the whole process of fuzzing, exploitation, and post-exploitation integration with the metasploit framework. For the exploitation process, we must be able to bypass the recent protections and mitigations of the operating system, for example ASLR (Address space layout randomization) and DEP (Data Execution Prevention). We have enhanced the ROP (Return-oriented programming) technique to bypass ASLR and DEP protections by searching gadgets with larger sizes. We evaluate our system by generating ROP payloads from ten target programs in the size greater than 100K bytes. Compared with the results of another popular ROP tool, called ROPgadget, only three targets have been succeeded. We can also integrate the generated exploits into the Metasploit framework.
Cortez, Sánchez Joshep Joel. „Análisis de binarios usando ejecución simbólica“. Bachelor's thesis, 2018. http://hdl.handle.net/11086/11382.
Der volle Inhalt der QuelleEn el presente trabajo se estudia, analiza y contribuye en el uso de técnicas y herramientas modernas para el análisis de programas ejecutables binarios. Hacemos énfasis en el uso de ejecución simbólica, mencionando algunas herramientas desarrolladas con el fin de explotar esta técnica. Las principales herramientas estudiadas, yy sobre las que se profundiza en este trabajo son Angr y Manticore. Esta y otras técnicas se encuentran detalladas en +[SWS 16]El trabajo emplea como caso de estudio parte del proyecto Insecure Programming desarrollado por Gerardo Richarte en el año 2001 en el que se pueden observar distintas clases de vulnerabilidades sobre distintos programas, siendo nuestro objetivo principal analizar los mismos y tratar de aprovechar dichas vulnerabilidades para obtener control del flujo del programa.
In the present document, we study, analize and contribute in the use of modern techniques and tools for program analysis in binary fille programs. We emphasize about symbolic execution , and we describe developed tools with the purpose of exploiting this technique. In this work we will focus particularly on Angr and Manticore tools. This and another techniques are explained on [SWS 16].This work use as dataset part of Insecure Programming project developed by Gerardo Richarte in 2001 where we may observe diferent kinds of vulnerabilities in the programs, our main objective is to analyze them and try to take advantage of these vulnerabilities to obtain control over the flow of program execution.
Yang, Shao-Fu, und 楊少輔. „Explicit Testing of Small Clock Delay Fault“. Thesis, 2015. http://ndltd.ncl.edu.tw/handle/b42qsa.
Der volle Inhalt der Quelle國立清華大學
電機工程學系
103
A clock network in a 3D-IC is not only difficult to design, but also challenging to test. For high-performance designs with a rigorous clock-skew requirement, studies have shown that small defects in a clock tree network could lead to unexpected failures in the field and thus it need to be identified during the manufacturing test or functional test in order to improve the yield and maintain the reliability. In this thesis, we present a novel test method to determine if a clock network has any small delay fault. This method does not require any change of the clock network, and it is capable of detecting a delay fault as small as 40ps through outlier analysis, while locating the FFs affected by the fault in the meantime. Furthermore, the overall test process does not involve loading of test patterns and thus can be conducted very easily by a Built-In Self-Test (BIST) controller when it needed.
Chakrabarti, Sujit Kumar. „Using Explicit State Space Enumeration For Specification Based Regression Testing“. Thesis, 2008. http://hdl.handle.net/2005/738.
Der volle Inhalt der QuelleTang, ching-lin, und 唐慶麟. „The Triangular Testing Method to Explore Quality Hotel’s Catering Services“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/90017227642900849272.
Der volle Inhalt der Quelle育達科技大學
休閒事業管理系碩士班
102
ABSTRACT In This Study, According to The Triangular Testing Method to Explore Quality Hotel’s Catering Services. Studying Purposes Are to Understand Each Hotel’s Catering Service Quality Procedure & Each Hotel How to Promote Their Food & Beverage Service Operational Strategy. The Studying Results Showed That These Hotels Catering Services Are Completely Qualify International Hotel Standard, Suitable for 4 or 5 Stars Hotel. All of Them Are Very Respect Customer’s Satisfaction, about Customer’s Complaints Can Be Settled Immediately and Report to The Management People. The Main Complaints Were Two, Such as Meals Problem & Service Speed, Solution Ways Are Fully Authorized Their Management to Handle& Make up After Observation, Standing on The Guest Position ,The Research Worker Did The Observation form to Apply Hotel’s Management to Make A Reference & Improve Operational Details. Each Hotel’s Operational Strategies Are Focus on The Restaurant Design & Offer Specialty F&B to The Guest, The Working Problem Is Short of Manpower.
Calogeropoulos, Catherine. „Refining, testing and evaluating spatially explicit models for wind dispersed plants“. Thesis, 2005. http://spectrum.library.concordia.ca/8553/1/NR09950.pdf.
Der volle Inhalt der QuelleLee, Cyuan, und 李權. „Explore the integration of heterogeneous systems in hybrid dynamic testing technology“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/46494737469577606585.
Der volle Inhalt der Quelle國立清華大學
動力機械工程學系
102
Hardware-in-the-loop simulation (HILS) and dynamically substructured system (DSS) techniques are generally classified as hybrid methods for performance evaluation of engineering systems, combining both numerical simulation and hardware experiment parts. Principally, HILS techniques are widely applied to testing of power electronics and vehicle systems, while DSS methods emphasise on civil and structural engineering application. Although the two strategies are present in different between them are briefly discussed in this paper, in order to facilitate cross-literature communication about testing methodologies. To employ DSS tests, additional actuator systems and sensor devices are required, which interface the numerical and physical subsystems. However, the non-ideal actuator dynamics sometimes destabilise the test. Therefore, various modelling and control techniques are proposed in the literature to deal with DSS synchronisation control problems since 1999. The objective of this paper aims at discussing recent technical development concerning the modelling and control of DSS tests, including the following issues: parallel vs. series structures and delay differential equations vs. ordinary differential equations for DSS modelling, homogenous vs. heterogeneous concepts for dynamic analysis, and geometry-based vs. dynamics-based techniques for control development. With a series of literature review, theoretical analysis and experimental verification, the paper combines HILS with DSS and integrates their structure and control method. Then, discuss the difference between these two systems. Verify the restriction of dynamics proposed from literature by theoretical analysis and experimental application. Through the above content, this thesis will develop the theory which is more practical of engineering and experiment framework by the integration of hybrid test.
Relvas, Sofia Murteira. „Testing the Activity Budget Hypothesis to explain sexual segregation in red deer“. Master's thesis, 2020. http://hdl.handle.net/10316/92160.
Der volle Inhalt der QuelleComo um enigma complexo ainda por desvendar, a segregação sexual tem sido bastante estudada nos últimos anos, sobretudo em espécies de ungulados sexualmente dimórficas. Para uma melhor compreensão deste conceito, várias hipóteses foram propostas ao longo dos anos, em torno de duas componentes principais: segregação de habitat e segregação social. No entanto, nenhuma foi exclusivamente capaz de explicar este fenómeno, o que indica que múltiplos fatores se encontram na base da sua origem.Segundo a hipótese da sincronia de atividades, machos e fêmeas apresentam diferenças nos padrões de atividade devido a diferenças no dimorfismo no tamanho corporal, necessidades energéticas e eficiência digestiva. Este estudo tem, então, como objetivo avaliar os pressupostos que servem de base à hipótese da sincronia de atividades, de modo a explicar os padrões de segregação sexual. Através da análise de vídeos e fotos de armadilhas fotográficas, colocadas na Serra da Lousã, foi possível observar os diferentes padrões de atividade e segregação do veado. Os nossos resultados mostraram que machos e fêmeas apresentam uma segregação sexual acentuada ao longo do ano, exceto na época de acasalamento, altura em que machos e fêmeas mostram uma tendência para se agregarem em grupos mistos. Relativamente aos padrões de atividade, os resultados evidenciaram um padrão de atividade crepuscular e noturna por parte do veado. Em termos gerais, o maior grau de sincronização de atividades entre machos e fêmeas foi na época de acasalamento, o que é esperado face aos padrões de agregação e segregação sexual reportados. Deste modo, os nossos resultados apoiam a hipótese de sincronia de atividades, porém, outros estudos verificaram o oposto, e, por isso devemos ter em conta outros fatores para uma melhor interpretação da segregação sexual.
As a complex puzzle yet to be unveiled, sexual segregation has been extensively studied in recent years, especially in sexually dimorphic ungulate species. For a better understanding of this concept, several hypotheses have been proposed over the years, around two main components: habitat segregation and social segregation. However, none has been exclusively able to explain this phenomenon, which indicates that multiple factors are at the base of its origin. According to the activity budget hypothesis, males and females have differences in activity patterns due to differences in body size dimorphism, energy requirements and digestive efficiency. This study, then, aims to assess the assumptions that serve as the basis for the activity budget hypothesis, to explain the patterns of sexual segregation.Through the analysis of videos and photos from camera traps placed in the Lousã Mountain, it was possible to observe the different activity and segregation patterns of the red deer. Our results showed that males and females show marked sexual segregation throughout the year, except in the mating season, when males and females show a tendency to aggregate in mixed groups. Regarding activity patterns, the results showed a pattern of twilight and nocturnal activity by the red deer. In general terms, the highest degree of activity overlap between males and females was in the mating season, which is expected given the reported sexual aggregation and segregation patterns.In this way, our results support the activity budget hypothesis, however, other studies verified the opposite, and, therefore, we must take into account other factors for a better interpretation of sexual segregation.
Barnes, David Milller. „Depression and Distress in Blacks and Whites in the US: Testing a Hypothesis to Explain a Double Paradox“. Thesis, 2015. https://doi.org/10.7916/D8NK3CRB.
Der volle Inhalt der QuelleDa-QuanLuo und 羅達權. „To Explore Business Model and Competitive Strategy of Electrostatic Discharge Testing Equipment Distributor- The Case of K Company in Taiwan“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/68849412802144639983.
Der volle Inhalt der QuelleTürk, Pereira Philippe. „Testing the sour-grapes effect - how food deprivation and reward expectancy change implicit and explicit food-liking and food-wanting“. Doctoral thesis, 2010. https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-50591.
Der volle Inhalt der QuelleDie vorliegende Dissertation beschäftigt sich mit der Frage, wie Nahrungsdeprivation und Belohnungserwartung bzw. frustrative nonreward sich auf implizites und explizites essensbezogenes Liking und Wanting auswirkt. Experimente 1-3 konnten aufzeigen, dass hungrige Probanden ohne Konsumerwartung auf nahrungsbezogene Stimuli implizit stärker mit Wanting nicht aber mit Liking reagierten als satte Probanden. Implizites Liking unterschied sich dabei nicht in Abhängigkeit des Bedürfniszustandes der Probanden. Dabei führten weder Nahrungsdeprivation noch ausbleibende Belohnungserwartung dazu, dass Probanden mehr Frustration oder negative Stimmung berichteten. Stattdessen berichteten sie in allen Bedingungen eine generell positive Stimmung. Darüber hinaus zeigten hungrige Probanden mit Konsumerwartung in Experiment 2 sogar die gleichen impliziten liking- und wanting-bezogenen Einstellungen wie Probanden ohne Konsumerwartung. Sobald den Probanden jedoch eigene Kontrolle über den Konsum gegeben wurde, so verschwand diese Dissoziation (Experiment 3). In diesem Fall jedoch wurden die impliziten liking- und wanting-bezogenen Antworten auch nicht durch Nahrungsdeprivation moderiert, ein Ergebnis, das möglicherweise auf eine bereits eintretende Sättigung aufgrund des Konsums vor der indirekten Messung zurückzuführen sein könnte. Zudem legt Experiment 4 nahe, dass auch implizites nahrungsbezogenes Liking sensitiv zu sein scheint für Veränderung des Bedürfniszustandes. Moderat hungrige (2 Stunden nüchtern) im Vergleich zu statten Probanden zeigten dabei positivere implizite Einstellungen gegenüber bedürfnisrelevanten Reizen, stark deprivierte Probanden (15 Stunden nüchtern) zeigten jedoch tendenziell negativere implizite Einstellungen als moderat hungrige und satte Probanden. Dieses Muster konnte zusätzlich durch eine signifikante kurviliniare Funktion des Bedürfniszustandes statistisch abgesichert werden. Als ein interessanter Nebenbefund konnte zusätzlich gezeigt werden, dass bedürfnisirrelevante Reize schon bei moderatem Hunger unmittelbar negativer bewertet werden. Somit konnte der Devaluationseffekt von Brendl, Markman, und Messner (2003) mit indirekten Maßen repliziert werden. Im Gegensatz zu den impliziten Einstellungen, dissoziierten das selbstberichtete essensbezogene Liking und Wanting nicht in Abhängigkeit der Nahrungsdeprivation und Konsumerwartung. Stattdessen zeigten hungrige Probanden sowohl positivere liking- als auch wanting-bezogene Einstellungen als satte Probanden. Diese Ergebnisse werden vor dem Hintergrund unterschiedlicher theoretischer Annahmen zur Sensitivität impliziter und expliziter bedürfnisbezogener Einstellungen (z.B. motivationale Theorien, frustrative nonreward) diskutiert
Hou, Ju-Jung, und 侯如容. „Explore Hidden but Possibly Potential Drug- Drug Interactions of New Approved Drugs Using Text Mining Technique -Hypothesis Generation and Hypothesis testing“. Thesis, 2005. http://ndltd.ncl.edu.tw/handle/54564002094352465572.
Der volle Inhalt der Quelle高雄醫學大學
藥學研究所碩士在職專班
93
Drug interactions are worth to emphasize in safety use of drugs. A number of drugs are introduced into the market every year, and patients who have been identified drug-drug interactions between the new approved drug and other medications would be reported in medical literature. Based on safety concern of patients, to discovery drug interactions beforehand is very important. So we attempted to find a way to uncover some possible and hidden drug-drug interactions of a new drug. We used a text mining tool created by Swanson and Smalheiser called ARROWSMITH that facilitates the discovery of plausible hypotheses linking findings across specialties. By creating suggestive juxtapositions of searched and filtered records, ARROWSMITH is a useful tool for scientific discovery but not in itself a mechanism of scientific discovery. Digoxin and repaglinide were used as the model drugs to validate if ARROWSMITH could satisfy what we need in the area of identifying drug-drug interactions. Then we studied drug-drug interactions of some newly approved drugs, which included rosuvastatin, duloxetine, eplerenone, ezetimibe and memantine. In summary, we have found some hidden but possibly potential drug-drug interactions with rosuvastatin or duloxetine and they must further evaluation to comfirm. Based on results of eplerenone, ezetimibe and memantine, we could not uncover some possible and hidden drug interactions for those drugs.
Lin, Meng-Fei, und 林孟斐. „Explore the Relationship of Pet Attachment, the attitude of Traveling with Pet and Happiness: Testing the Moderating Effect of Pet Travel Products“. Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55e6p9.
Der volle Inhalt der Quelle亞洲大學
休閒與遊憩管理學系碩士在職專班
102
Due to emotional pet attachment, owners are more willing to travel with their pets. Owners can release their bodies’ and spiritual stresses by traveling with their pets, thus bring spiritual happiness, healthiness and well-being. Furthermore, the purpose of hotel business is to build continual operation successfully through providing excellent facilities, friendly services and happiness to owners while they are traveling with pets. The purpose of this research is to investigate the correlation among the pet attachment, the attitude of travelling with pets and happiness. We use pet travelling products as a moderator variable to explore the outcome effect of happiness. The results of this research can be used as management references for pet hotel business. The study population was sampled from aged over 20 in Taiwan of the Republic of China who had experiences of travelling with their pets overnight. We used questionnaires as an intended sampling method. The listed questions include pet attachment rating scale, the attitude of travelling rating scale, pet travelling products rating scale, the rating scale of happiness, and their personal profiles. In the research period, we issued 580 copies of questionnaires with 524 effective sample sizes (effective rate 90.34%). We utilize SPSS 18.0 statistical analysis tool for data analysis by methods of descriptive statistics, confidence interval analysis, factor analysis, Pearson correlation, and hierarchical multiple regression analysis. We conclude the following findings: (1)The pet attachment has the positive correlation with the attitude of travelling significantly. (2)The attitude of travelling has strong positive correlation with happiness. (3)The differentiated travelling products such as pet hotels’ facilities and friendly services contribute insignificantly moderating effects of happiness. (4)The pet attachment and happiness is positively and significantly correlated. (5)The attitude of travelling has moderatecorrelation with pet attachment and happiness.
WU, CHIH-KANG, und 吳致綱. „Using Technology Acceptance Model to Explore the User's Willingness to Pay for Online Testing Systems: The Empirical Study of Yamol Online Test“. Thesis, 2019. http://ndltd.ncl.edu.tw/handle/mka86y.
Der volle Inhalt der Quelle國立高雄師範大學
經營管理碩士在職專班
107
Assessment and testing have important links in learning activities. Online quiz sites can provide more convenient and efficient evaluation methods and even personalized learning services. Nowadays, the extensive use of digital learning is one of the important ways of learning. Based on this, this research uses the technology acceptance model to explore the user's willingness to pay for online testing systems. Treat System quality and content quality as external variables. Analyze the relationship between variables and perceived ease of use, perceived usefulness, using satisfaction, and willingness to pay. Provide research results to website administrators as a reference for management and development in the future. This study takes the users of the Yamol online test website as the research object. Data collection is conducted by online survey. A total of 3,232 valid questionnaires were obtained. Analysis of statistical tools such as descriptive statistics, t-test, and regression analysis are employed for the empirical examination. The results of the study include the following: (1) System quality significantly positively affects perceived usefulness. (2) System quality significantly positively affects perceived ease of use. (3) Contents quality significantly positively affects perceived usefulness. (4) Contents quality significantly positively affects perceived ease of use. (5) Perceived ease of use significantly positively affects perceived usefulness. (6) Perceived usefulness significantly positively affects willingness to pay. (7) Perceived usefulness significantly positively affects using satisfaction. (8) Perceived ease of use significantly positively affects using satisfaction. (9) Using satisfaction significantly positively affects willingness to pay. Finally, this study proposes that managerial work should include: (1) Continuous improvement of the using satisfaction of the test system. (2) Strengthening the search of various test questions. (3) Optimizing the design of the website-user interface. (4) Enhancing advanced features that paid users can enjoy. Another suggestion for future academic research is that the subsequent researchers can broaden the test platform of other multi-attributes to obtain a wider range of practical applications and scope.
Vanderlee, Mary-Louise. „Pilot testing a causal model that includes clusters of parent, child, teacher, and classroon variables, to explore the mechanisms underlying class size effects“. 2004. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=94557&T=F.
Der volle Inhalt der QuelleTürk, Pereira Philippe [Verfasser]. „Testing the sour-grapes effect : how food deprivation and reward expectancy change implicit and explicit food-liking and food-wanting / vorgelegt von Philippe Türk Pereira“. 2010. http://d-nb.info/1005932905/34.
Der volle Inhalt der QuelleChen, Hsiao-Pei, und 陳曉珮. „Discuss the Co-opetition Strategy of Packaging and Testing industry between Mainland and Taiwan And from perspective of Financial Analysis to Explore Operating Performance – ASE and JCET“. Thesis, 2016. http://ndltd.ncl.edu.tw/handle/p42439.
Der volle Inhalt der Quelle國立交通大學
管理學院財務金融學程
105
This study is based on case SWOT analysis to analyze the competitive advantages and disadvantages of Taiwan and the mainland leading manufactures of packaging and testing and to explore the possibilities of competitive strategies. From the perspective of earnings analysis of invividual companies operating results found that the human resource, R & D technology and high-end product process technology, the ASE is better than the JCET. On the other hand, the JCET with national financial support and high capital market benefits has an absolute advantage compared to the ASE. The two companies have complementary and collaboration space cooperation.
Weideman, Junita Grezelda. „The use of the draw a person (DAP) and DAP variations to explore the self in educational psychology“. Diss., 2012. http://hdl.handle.net/10500/6038.
Der volle Inhalt der QuelleFurther Teacher Education
M. Ed. (Guidance and Counselling)
Izaks, Jill. „A study of the effects of an undergraduate vocabulary programme on vocabulary development and academic literacy“. Diss., 2015. http://hdl.handle.net/10500/19204.
Der volle Inhalt der QuelleThis study examined the vocabulary and academic literacy levels of undergraduate students at the University of Namibia, as well as the effects of an explicit and an implicit vocabulary programme on vocabulary development and academic literacy. The study also sought to determine the effects of the programmes on students’ attitudes about vocabulary and explicit vocabulary strategies. The relationship between students’ vocabulary size, academic literacy levels, and their self-assessment of their vocabulary knowledge was examined. Many students had not reached the desired word mastery and did not have adequate academic literacy skills to cope with the demands of university. Students in the explicit group modestly improved receptive vocabulary knowledge at the end of the intervention but there was no significant improvement in academic literacy skills. Overall, students showed an increase in positive responses regarding their attitudes to vocabulary.
Linguistics and Modern Languages
M.A. (Applied Linguistics)