Dissertations / Theses on the topic 'Context control'

To see the other types of publications on this topic, follow the link: Context control.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Context control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Belotti, Rudi. "SOPHIE: context modelling and control." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Global Information Systems Group, 2004. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vetter, Philipp. "Context estimation in sensorimotor control." Thesis, University College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368950.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Almutairi, Abdulgader. "Context-aware and adaptive usage control model." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9592.

Full text
Abstract:
Information protection is a key issue for the acceptance and adoption of pervasive computing systems where various portable devices such as smart phones, Personal Digital Assistants (PDAs) and laptop computers are being used to share information and to access digital resources via wireless connection to the Internet. Because these are resources constrained devices and highly mobile, changes in the environmental context or device context can affect the security of the system a great deal. A proper security mechanism must be put in place which is able to cope with changing environmental and system context. Usage CONtrol (UCON) model is the latest major enhancement of the traditional access control models which enables mutability of subject and object attributes, and continuity of control on usage of resources. In UCON, access permission decision is based on three factors: authorisations, obligations and conditions. While authorisations and obligations are requirements that must be fulfilled by the subject and the object, conditions are subject and object independent requirements that must be satisfied by the environment. As a consequence, access permission may be revoked (and the access stopped) as a result of changes in the environment regardless of whether the authorisations and obligations requirements are met. This constitutes a major shortcoming of the UCON model in pervasive computing systems which constantly strive to adapt to environmental changes so as to minimise disruptions to the user. We propose a Context-Aware and Adaptive Usage Control (CA-UCON) model which extends the traditional UCON model to enable adaptation to environmental changes in the aim of preserving continuity of access. Indeed, when the authorisation and obligations requirements are fulfilled by the subject and object, and the conditions requirements fail due to changes in the environmental or the system context, our proposed model CA-UCON triggers specific actions in order to adapt to the new situation, so as to ensure continuity of usage. We then propose an architecture of CA-UCON model, presenting its various components. In this model, we integrated the adaptation decision with usage decision architecture, the comprehensive definition of each components and reveals the functions performed by each components in the architecture are presented. We also propose a novel computational model of our CA-UCON architecture. This model is formally specified as a finite state machine. It demonstrates how the access request of the subject is handled in CA-UCON model, including detail with regards to revoking of access and actions undertaken due to context changes. The extension of the original UCON architecture can be understood from this model. The formal specification of the CA-UCON is presented utilising the Calculus of Context-aware Ambients (CCA). This mathematical notation is considered suitable for modelling mobile and context-aware systems and has been preferred over alternatives for the following reasons: (i) Mobility and Context awareness are primitive constructs in CCA; (ii) A system's properties can be formally analysed; (iii) Most importantly, CCA specifications are executable allowing early validation of system properties and accelerated development of prototypes. For evaluation of CA-UCON model, a real-world case study of a ubiquitous learning (u-learning) system is selected. We propose a CA-UCON model for the u-learning system. This model is then formalised in CCA and the resultant specification is executed and analysed using an execution environment of CCA. Finally, we investigate the enforcement approaches for CA-UCON model. We present the CA-UCON reference monitor architecture with its components. We then proceed to demonstrate three types of enforcement architectures of the CA-UCON model: centralised architecture, distributed architecture and hybrid architecture. These are discussed in detail, including the analysis of their merits and drawbacks.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Kaining. "Context-based coalition access control for ubiquitous computing." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27193.

Full text
Abstract:
The need for coalition access control among individuals and organizations has increased significantly in the past years as the need for spontaneous access to information increases. However, a significant deterrent to the ability to connect in a spontaneous manner in coalition collaborative applications is the difficulty in users from different domains being able to access resources or services located and owned by other entities. Coalition access control encompasses control mechanisms dealing with access between users of two or more different organizations or enterprises. These users could be co-located or remotely located. The thesis first presents a delegation based D-TMAC model that extends traditional TMAC across organizations for formal coalition environments, and a context-based coalition access control model, which apply context information as conditions on delegation. Then the thesis proposes a Session-based Coalition Access Control Architecture (SCACA) and provides practical implementation that enables dynamic coalition access control over a communication session in a spontaneous manner. The presented system architecture and methodology leverages the IETF SIP protocol as an underlying communication mechanism in order to greatly minimize the administration overhead and rapidly adapt the dynamic nature of access control in spontaneous coalition environments. The result is that, during a spontaneous coalition communication across organizations, every endpoint can access other endpoints' resources and share its own resources to all the other endpoints as well. Moreover, these privileges will dynamically change as the status of the coalition communication changes.
APA, Harvard, Vancouver, ISO, and other styles
5

Saleem, Ahmad Nadeem. "Control, conflict, and motivation in socio-cultural context." Thesis, Middlesex University, 1998. http://eprints.mdx.ac.uk/8019/.

Full text
Abstract:
The central argument of this thesis is that unlike in the West, organizational behavior in the Middle East and the Indian sub-continent is, predominantly, not a function of work/task related imperatives but largely determined by the broader socio-cultural context, norms and values of the respective societies. Based on extensive interviews and participant and nonparticipant observation in the Middle East and sub-continent, and content analysis of media reports and lìterature, the effects of the respective socio-cultural contexts are documented in terms of three key determinants of organizational behavior, conflict, control and motivation. The thesis examines traditional and modern 'Western' sources of literature regarding control, conflict and motivation and the nature of culture itself and draws attention to the need for modification in certain 'Euroamerican' theories when applied to the strong social, familial and cultural structures, values, beliefs and assumptions present in the two other cultures investigated. Recommendations are put forward as to the kind of changes in the socio-cultural context of the Middle East and Indian sub-continent, if organizational behavior is to be transformed. In conclusion, a picture emerges of the stark differences between the cultures in terms of status, incomes, role of family and state, social control, family structure, population pressures and religious control - all of which are evidence of the predominance of the sociocultural context in determining organizational behavior. A theory is offered stating that organizational behavior is primarily a derivative of the structures and functions of broader socio-cultural institutions. A corollary of the said theory is that patterns of control, conflict, and motivation are strongly influenced by the structural-functional properties of a socio-cultural system, and hence, 'intrinsic motivation' is a rare phenomenon.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmed, Ali Ahmed Ali. "Context-aware access control in ubiquitous computing (CRAAC)." Thesis, University of Manchester, 2010. https://www.research.manchester.ac.uk/portal/en/theses/contextaware-access-control-in-ubiquitous-computing-craac(1eaa4390-7062-4af5-8aa5-d645d91fa547).html.

Full text
Abstract:
Ubiquitous computing (UbiComp) envisions a new computing environment, where computing devices and related technology are widespread (i.e. everywhere) and services are provided at anytime. The technology is embedded discreetly in the environment to raise users' awareness. UbiComp environments support the proliferation of heterogeneous devices such as embedded computing devices, personal digital assistants (PDAs), wearable computers, mobile phones, laptops, office desktops (PCs), and hardware sensors. These devices may be interconnected by common networks (e.g. wired, wireless), and may have different levels of capabilities (i.e. computational power, storage, power consumption, etc). They are seamlessly integrated and interoperated to provide smart services (i.e. adaptive services). A UbiComp environment provides smart services to users based on the users' and/or system's current contexts. It provides the services to users unobtrusively and in turn the user's interactions with the environment should be as non-intrusive and as transparent as possible. Access to such smart services and devices must be controlled by an effective access control system that adapts its decisions based on the changes in the surrounding contextual information. This thesis aims at designing an adaptive fine-grained access control solution that seamlessly fits into UbiComp environments. The solution should be flexible in supporting the use of different contextual information and efficient, in terms of access delays, in controlling access to resources with divergent levels of sensitivity. The main contribution of this thesis is the proposal of the Context-Risk-Aware Access Control (CRAAC) model. CRAAC achieves fine-grained access control based upon the risk level in the underlying access environment and/or the sensitivity level of the requested resource object. CRAAC makes new contributions to the access control field, those include 1) introducing the concept of level of assurance based access control, 2) providing a method to convert the contextual attributes values into the corresponding level of assurance, 3) Proposing two methods to aggregate the set of level of assurance into one requester level of assurance, 4) supporting four modes of working each suits a different application context and/or access control requirements, 5) a comprehensive access control architecture that supports the CRAAC four modes of working, and 6) an evaluation of the CRAAC performance at runtime.
APA, Harvard, Vancouver, ISO, and other styles
7

Nguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Awwad, Tarek. "Context-aware worker selection for efficient quality control in crowdsourcing." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI099/document.

Full text
Abstract:
Le crowdsourcing est une technique qui permet de recueillir une large quantité de données d'une manière rapide et peu onéreuse. Néanmoins, La disparité comportementale et de performances des "workers" d’une part et la variété en termes de contenu et de présentation des tâches par ailleurs influent considérablement sur la qualité des contributions recueillies. Par conséquent, garder leur légitimité impose aux plateformes de crowdsourcing de se doter de mécanismes permettant l’obtention de réponses fiables et de qualité dans un délai et avec un budget optimisé. Dans cette thèse, nous proposons CAWS (Context AwareWorker Selection), une méthode de contrôle de la qualité des contributions dans le crowdsourcing visant à optimiser le délai de réponse et le coût des campagnes. CAWS se compose de deux phases, une phase d’apprentissage opérant hors-ligne et pendant laquelle les tâches de l’historique sont regroupées de manière homogène sous forme de clusters. Pour chaque cluster, un profil type optimisant la qualité des réponses aux tâches le composant, est inféré ; la seconde phase permet à l’arrivée d’une nouvelle tâche de sélectionner les meilleurs workers connectés pour y répondre. Il s’agit des workers dont le profil présente une forte similarité avec le profil type du cluster de tâches, duquel la tâche nouvellement créée est la plus proche. La seconde contribution de la thèse est de proposer un jeu de données, appelé CrowdED (Crowdsourcing Evaluation Dataset), ayant les propriétés requises pour, d’une part, tester les performances de CAWS et les comparer aux méthodes concurrentes et d’autre part, pour tester et comparer l’impact des différentes méthodes de catégorisation des tâches de l’historique (c-à-d, la méthode de vectorisation et l’algorithme de clustering utilisé) sur la qualité du résultat, tout en utilisant un jeu de tâches unique (obtenu par échantillonnage), respectant les contraintes budgétaires et gardant les propriétés de validité en terme de dimension. En outre, CrowdED rend possible la comparaison de méthodes de contrôle de qualité quelle que soient leurs catégories, du fait du respect d’un cahier des charges lors de sa constitution. Les résultats de l’évaluation de CAWS en utilisant CrowdED comparés aux méthodes concurrentes basées sur la sélection de workers, donnent des résultats meilleurs, surtout en cas de contraintes temporelles et budgétaires fortes. Les expérimentations réalisées avec un historique structuré en catégories donnent des résultats comparables à des jeux de données où les taches sont volontairement regroupées de manière homogène. La dernière contribution de la thèse est un outil appelé CREX (CReate Enrich eXtend) dont le rôle est de permettre la création, l’extension ou l’enrichissement de jeux de données destinés à tester des méthodes de crowdsourcing. Il propose des modules extensibles de vectorisation, de clusterisation et d’échantillonnages et permet une génération automatique d’une campagne de crowdsourcing
Crowdsourcing has proved its ability to address large scale data collection tasks at a low cost and in a short time. However, due to the dependence on unknown workers, the quality of the crowdsourcing process is questionable and must be controlled. Indeed, maintaining the efficiency of crowdsourcing requires the time and cost overhead related to this quality control to stay low. Current quality control techniques suffer from high time and budget overheads and from their dependency on prior knowledge about individual workers. In this thesis, we address these limitation by proposing the CAWS (Context-Aware Worker Selection) method which operates in two phases: in an offline phase, the correlations between the worker declarative profiles and the task types are learned. Then, in an online phase, the learned profile models are used to select the most reliable online workers for the incoming tasks depending on their types. Using declarative profiles helps eliminate any probing process, which reduces the time and the budget while maintaining the crowdsourcing quality. In order to evaluate CAWS, we introduce an information-rich dataset called CrowdED (Crowdsourcing Evaluation Dataset). The generation of CrowdED relies on a constrained sampling approach that allows to produce a dataset which respects the requester budget and type constraints. Through its generality and richness, CrowdED helps also in plugging the benchmarking gap present in the crowdsourcing community. Using CrowdED, we evaluate the performance of CAWS in terms of the quality, the time and the budget gain. Results shows that automatic grouping is able to achieve a learning quality similar to job-based grouping, and that CAWS is able to outperform the state-of-the-art profile-based worker selection when it comes to quality, especially when strong budget ant time constraints exist. Finally, we propose CREX (CReate Enrich eXtend) which provides the tools to select and sample input tasks and to automatically generate custom crowdsourcing campaign sites in order to extend and enrich CrowdED
APA, Harvard, Vancouver, ISO, and other styles
9

Crump, Matthew John Charles Milliken Bruce. "Context-specific learning and control: An instance based view of flexible online control." *McMaster only, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Prouzeau, Arnaud. "Collaboration around wall displays in command and control contexts." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS544/document.

Full text
Abstract:
Dans cette thèse, j’étudie les avantages des Murs d’Écran Interactif à Haute Résolution(UHRIWD - Ultra High Resolution Interactive Wall Displays) pour la collaboration. Je me concentre sur uncontexte de collaboration bien précis: la surveillance des systèmes critiques dans les salles de contrôle. Desvisites de ces salles et ainsi que des interviews avec des opérateurs montrent qu’une collaborationplus ou moins étroite est nécessaire en fonction de la situation. C’est lorsqu’une collaboration étroiteest nécessaire que je pense qu’un UHRIWD peut être bénéfique pour celle ci. Je montre d’abordqu’un mur d’écran encourage la collaboration étroite comparée à l’utilisation de plusieurs postes detravail individuels. Puis je montre comment une technique d’interaction peut avoir une influence sur letype de collaboration. Par exemple, une technique avec une large empreinte visuelle va encouragerune collaboration plus étroite. J’applique cela dans la conception de techniques pour afficher desprédictions de trafic parallèlement au trafic en temps réel dans une salle de contrôle de trafic routier.Pour finir, je propose des techniques pour faciliter les transitions entre les différents écrans d’unesalle de contrôle
In this thesis, I study the benefits of collaboration in front of Ultra-High ResolutionInteractive Wall Displays (UHRWD). I focus on the specific collaborative context of control rooms.Visits of control rooms and interviews with operators show that different degrees of collaboration arerequired in function of the situation. I believe that a UHRIWD could be beneficial in situations whenclose collaboration is needed. I first show that wall display encourages close collaboration comparedto multiple separate displays. Then I show that the interaction techniques can also influence thedegree of collaboration, for instance, a technique with a large visual footprint also encourages a closecollaboration. I apply this in the design of technique to visualize road traffic forecast on a wall displayfor road traffic control centres. Finally, I propose techniques to help the transition between thedifferent setups of a control room: the workstations and the wall display
APA, Harvard, Vancouver, ISO, and other styles
11

Rölli, Marc. "Power Regimes of Control: Remarks on their Neoliberal Context." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A72861.

Full text
Abstract:
In speaking of the society of control, new qualities of current social conditions are usually addressed in a diffuse rather than precise manner. Quite often, e.g. within surveillance studies, it is associated with technologies modelled after the fiction of god-like omnipotence of visual surveillance (cf. Gehring 2017). The relevance of a power of cybernetics – according to Wiener, the science of systemic control – which resonates in the concept of control, refers to normally invisible operations of technical systems that permanently evaluate data streams according to discursively determined parameters and in connection with commercial interests (cf. Wiener 1948).
APA, Harvard, Vancouver, ISO, and other styles
12

Arnaut, Lynn Y. "An evaluation of display/control gain in the context of control-display interface optimization." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/49978.

Full text
Abstract:
Display/control gain is the amount of movement that occurs on a display in response to a unit amount of movement on the control. Two studies were conducted to determine the adequacy of identifying the optimum gain for an interface as a method of control-display interface optimization. The first study examined the effects of changes in both the maximum control input and the display width on target acquisition performance with a touch tablet and a trackball. The hypothesis that an interaction between the control input and the display output would determine performance was not supported for either device. There was a main effect of the control input for the touch tablet, and significant effects of the control input and the display width for the trackball. The results also indicate that, at least for the touch tablet, gain is not a sufficient specification for performance. The second study evaluated the effects of changes in the display amplitude, the display target width, and the control amplitude. There were significant interactions among these three factors for both touch tablet and trackball target acquisition performance. These results extend the findings of the first study with respect to the inability of gain to predict performance. In addition, the inadequacy of Fitts' Law as it applies to the given interfaces is discussed.
Ph. D.
incomplete_metadata
APA, Harvard, Vancouver, ISO, and other styles
13

Bhatia, Nupur. "Policy Management in Context-Aware Networks." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92015.

Full text
Abstract:
The Ambient Network (AN) Project is part of the European Commission’s 6th Framework Programme and aims to enable cooperation between heterogeneous networks, using current and future wireless technologies, minimising the effort of mobile users to gain access to the services that they are interested in - irrespective of their location or the network they are currently using. Because of the highly mobile nature of users and a demand for instant and dynamic access to services, these networks have to be composed ‘on the fly’ without any pre-configurations. The use of context information in AN can remove the need for pre-configuration of networks, hence making them autonomic. However, a concern exists that the free and uncontrolled dissemination of context information could breech the privacy of the participants. It is extremely important to address these privacy issues in order to control who has access to what context information. This control can be achieved through the use of well defined policies. This creates a requirement for a framework in the ContextWare architecture for protecting context information. This masters thesis project is part of an effort to create a policy based infrastructure for authorisation of access to network context information within the AN. The thesis investigates, models, and designs an architecture for a policy management system based on OASIS XACML, that creates an extension to the architecture for management of context information in the AN. In addition to a policy management architecture within an AN, a policy management architecture for composing ANs is also created. To facilitate the transfer of requests and policies, the thesis creates a Policy Management Protocol. The designed architecture was then implemented to create a proof of concept. The designed architecture and protocol were evaluated by running tests on the prototype. The measurements from the tests are analysed and presented in this thesis. The analysis of the experimental data indicates that a policy management system is both feasible and practical. The results show that the delay overhead caused by introducing policy management in a distributed context provisioning system, ranges from 1.7% in a system without load to 6% in a worst case scenario. The throughput of the policy management system is 15 requests per second under load.
Ambient Network är ett EU-finansierat project inom det 6:e ramprogrammet.Projektets mål är att möjliggöra samarbete mellan heterogena nätverk, som använderbåde dagens men även framtidens trådlösa teknologier, för att minimeraslutanvändarens insats för att nå den tjänst de är intresserade av – oberoende av platseller vilket nätverk de använder. På grund av den stora delen av mobila användaresom kräver omedelbar och dynamisk tillgång till tjänster måste dessa nätverk gåsamman ’on the fly’ utan tidigare konfigurering.Användningen av context information i Ambient Networks kan elmininera behovet avförkonfigurering av nätverk, följaktligen blir de då autonoma. Dock, ett problem somuppkommer med detta är att den fria och okontrollerade spridningen av contextinformation bryter integriteten för deltagarna. Det är väldigt viktigt att ta itu med dettaproblem för att kunna kontrollera vilka som har tillgång till vilken contextinformation. Den här kontrollen kan uppnås genom väldefinierade policies. Dettaskapar ett behov av ett ramverk inom ContextWare arkitekturen för att skydda dentillgängliga context informationen. Den här uppsatsen är en del i ansträngningen att skapa en policy baserad infrastrukturför attestering av tillgång till context information inom Ambient Networks. Uppsatsenundersöker och designar en arkitektur för ett policy handhavande system som ärbaserat på OASIS XACML, den bygger vidare på arkitekturen för handhavande avcontext information i Ambient Networks. Utöver policy hantering inom ett ambientnetwork skapas också policy hantering mellan ambient networks när de förenas. Denframtagna arkitekturen är därefter implementerad för att visa på konceptets hållbarhet. En sammanslagning av två policy handhavande system när två nätverk slås ihop ärbehandlat endast i teorin, det är inte implementerat. Designen utvärderas genom att köra test på den implementerade versionen ochdärefter analysera och visa resultaten i rapporten. Dessa test innehåller mätningar avfördröjningen av en enda begäran samt flera, responstiden i ett system med policyhanteringjämfört med utan samt prestandan i ett policy-hanteringssystem med en litenmängd policies jämfört med en större mängd policies.
APA, Harvard, Vancouver, ISO, and other styles
14

Matos, Ricardo Jorge Magalhães de. "Context-based wireless mesh networks." Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12450.

Full text
Abstract:
Doutoramento em Engenharia Electrotécnica
In the modern society, new devices, applications and technologies, with sophisticated capabilities, are converging in the same network infrastructure. Users are also increasingly demanding in personal preferences and expectations, desiring Internet connectivity anytime and everywhere. These aspects have triggered many research efforts, since the current Internet is reaching a breaking point trying to provide enough flexibility for users and profits for operators, while dealing with the complex requirements raised by the recent evolution. Fully aligned with the future Internet research, many solutions have been proposed to enhance the current Internet-based architectures and protocols, in order to become context-aware, that is, to be dynamically adapted to the change of the information characterizing any network entity. In this sense, the presented Thesis proposes a new architecture that allows to create several networks with different characteristics according to their context, on the top of a single Wireless Mesh Network (WMN), which infrastructure and protocols are very flexible and self-adaptable. More specifically, this Thesis models the context of users, which can span from their security, cost and mobility preferences, devices’ capabilities or services’ quality requirements, in order to turn a WMN into a set of logical networks. Each logical network is configured to meet a set of user context needs (for instance, support of high mobility and low security). To implement this user-centric architecture, this Thesis uses the network virtualization, which has often been advocated as a mean to deploy independent network architectures and services towards the future Internet, while allowing a dynamic resource management. This way, network virtualization can allow a flexible and programmable configuration of a WMN, in order to be shared by multiple logical networks (or virtual networks - VNs). Moreover, the high level of isolation introduced by network virtualization can be used to differentiate the protocols and mechanisms of each context-aware VN. This architecture raises several challenges to control and manage the VNs on-demand, in response to user and WMN dynamics. In this context, we target the mechanisms to: (i) discover and select the VN to assign to an user; (ii) create, adapt and remove the VN topologies and routes. We also explore how the rate of variation of the user context requirements can be considered to improve the performance and reduce the complexity of the VN control and management. Finally, due to the scalability limitations of centralized control solutions, we propose a mechanism to distribute the control functionalities along the architectural entities, which can cooperate to control and manage the VNs in a distributed way.
Na sociedade actual, novos dispositivos, aplicações e tecnologias, com capacidades sofisticadas, estão a convergir na mesma infra-estrutura de rede. Os utilizadores são também cada vez mais exigentes nas suas preferências e expectativas pessoais, desejando conetividade `a Internet em qualquer hora e lugar. Estes aspectos têm desencadeado muitos esforços de investigação, dado que a Internet atual está a atingir um ponto de rutura ao tentar promover flexibilidade para os utilizadores e lucros para os operadores, enquanto lida com as exigências complexas associadas `a recente evolução. Em sintonia com a linha de investigação para a Internet do futuro, muitas soluções têm sido propostas para melhorar as arquiteturas e protocolos da Internet atual, de forma a torná-los sensíveis ao contexto, isto é, adaptá-los dinamicamente `a alteração da informação que caracteriza qualquer entidade de rede. Neste sentido, a presente Tese propõe uma nova arquitetura que permite criar várias redes com diferentes características de acordo com o contexto das mesmas, sobre uma única rede em malha sem fios (WMN), cuja infra-estructura e protocolos são muito flexíveis e auto-adaptáveis. Mais especificamente, esta Tese modela o contexto dos utilizadores, que pode abranger as suas preferências de segurança, custo e mobilidade, capacidades dos seus dispositivos ou requisitos de qualidade dos seus serviços, de forma a transformar uma WMN num conjunto de redes lógicas. Cada rede lógica ´e configurada para satisfazer um conjunto de necessidades de contexto do utilizador (como exemplo, suporte de mobilidade elevada e de baixa seguran¸ca). Para implementar esta arquitetura centrada no utilizador, esta Tese utiliza a virtualização de redes, que tem muitas vezes sido defendida como um meio para implementar arquiteturas e serviços de rede de uma forma independente, enquanto permite uma gestão dinâmica dos recursos. Desta forma, a virtualização de redes pode permitir uma configuração flexível e programável de uma WMN, a fim de ser partilhada por várias redes lógicas (ou redes virtuais - VNs). Além disso, o grau de isolamento introduzido pela virtualização de redes pode ser utilizado para diferenciar os protocolos e mecanismos de cada VN baseada em contexto. Esta arquitetura levanta vários desafios para controlar e gerir as VNs em tempo real, e em resposta `a dinâmica dos utilizadores e da WMN. Neste contexto, abordamos os mecanismos para: (i) descobrir e selecionar a VN a atribuir a um utilizador; (ii) criar, adaptar e remover as topologias e rotas das VNs. Também exploramos a possibilidade de considerar a taxa de variação dos requisitos de contexto dos utilizadores de forma a melhorar o desempenho e reduzir a complexidade do controlo e gestão das VNs. Finalmente, devido ´as limitações de escalabilidade das soluções de controlo centralizadas, propomos um mecanismo para distribuir as funcionalidades de controlo ao longo das entidades da arquitectura, que podem cooperar para controlar e gerir as VNs de uma forma distribuída.
APA, Harvard, Vancouver, ISO, and other styles
15

Schäfer, Dirk. "Context-sensitive speech recognition in the air traffic control simulation." [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=961514280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Theodoulis, Spilios. "Robust Control in a Nonlinear Context for Large Operating Domains." Phd thesis, Université Paris Sud - Paris XI, 2008. http://tel.archives-ouvertes.fr/tel-00352237.

Full text
Abstract:
Cette thèse porte sur le problème de commande des systèmes non-linéaires à paramètres variants rencontrés souvent (mais non seulement) dans le domaine aéronautique, avec la technique de séquencement de gains par linéarisation. Une stratégie innovante, appelée extended - Loop Shaping Design Procedure (e-LSDP), qui facilite et systématise la tache du scientique pour le calcul d'une loi de commande séquencée pour ce type de systèmes, est ici proposée.
Cette stratégie est basée sur une pré-compensation (loop shaping) faite à partir des systèmes linéarisés du système non-linéaire autour d'un petit nombre de points de fonctionnement en utilisant des compensateurs de structure simple (e.g. PID), et de plus en utilisant une compensation additionnelle/corrective type retour de sortie H1 statique. Les points de fonctionnement de la deuxième compensation sont calculés à l'aide d'un algorithme de choix de points de synthèse basé sur la connexion des théories de la gap métrique et de la commande H1 par loop shaping. La loi de commande globale non-linéaire séquencée est finalement obtenue en utilisant une interpolation de tous les gains des com-pensateurs impliqués pendant la phase de synthèse.
La méthode proposée ici est validée sur deux exemples d'application : le pilotage autour de l'axe de tangage d'un missile fortement manœuvrant et d'un véhicule de rentrée atmosphérique. Les deux autopilotes sont testés de façon intensive en utilisant des simulations non-linéaires, une analyse Monte Carlo et linéaire à temps figé afin de démontrer leurs excellentes caractéristiques en termes de performance et de robustesse.
APA, Harvard, Vancouver, ISO, and other styles
17

Shiller, Douglas M. "Understanding speech motor control in the context of orofacial biomechanics." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=84435.

Full text
Abstract:
A series of experiments are described which explore the relationship between biomechanical properties and the control of jaw movement in speech. This relationship is documented using kinematic analyses in conjunction with a mathematical model of jaw motion and direct measures of jaw stiffness.
In the first experiment, empirical and modeling studies were carried out to examine whether the nervous system compensates for naturally occurring forces acting on the jaw during speech. As subjects walk or run, loads to the jaw vary with the direction and magnitude of head acceleration. While these loads are large enough to produce a measurable effect on jaw kinematics, variation in jaw position during locomotion is shown to be substantially reduced when locomotion is combined with speech. This reduction in jaw motion is consistent with the idea that in speech, the control of jaw movement is adjusted to offset the effects of head acceleration. Results of simulation studies using a physiologically realistic model of the jaw provide further evidence that subjects compensate for the effects of self-generated loads by adjusting neural control signals.
A second experiment explores the idea that a principle mechanical property of the jaw---its spring-like behavior, or stiffness---might influence patterns of kinematic variation in speech movements. A robotic device was used to deliver mechanical perturbations to the jaw in order to quantify stiffness in the mid-sagittal plane. The observed stiffness patterns were non-uniform, with higher stiffness in the protrusion-retraction direction. Consistent with the idea that kinematic patterns reflect directional asymmetries in stiffness, a detailed relationship between jaw kinematic variability and stiffness was observed---kinematic variability was consistently higher under conditions in which jaw stiffness was low. Modeling studies suggested that the pattern of jaw stiffness is significantly determined by jaw geometrical properties and muscle force generating abilities.
A third experiment examines the extent to which subjects are able to alter the three-dimensional pattern of jaw stiffness in a task-dependent manner. Destabilizing loads were applied to the jaw in order to disrupt the ability of subjects to maintain a static jaw posture. Subjects adapted by increasing jaw stiffness in a manner that depended on the magnitude and, to a more limited extent, direction of the destabilizing load. The results support the idea that stiffness properties can be controlled in the jaw, and thus may play a role in regulating mechanical interactions in the orofacial system.
APA, Harvard, Vancouver, ISO, and other styles
18

Rayner, Danielle. "Informal social control in the context of deindustrialisation and disinvestment." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52677/.

Full text
Abstract:
The thesis is a qualitative ethnographic study which examines the interaction between the operation of informal social control and de-industrialisation, in the context of austerity measures and public sector retrenchment. Drawing theoretical and methodological insights from the Chicago School, which argued that population churn and competing value systems in the ‘zone of transition’ inhibited the transmission of pro-social values (Shaw and McKay, 1947), this research develops these insights in a setting where these phenomena are absent in order to understand the implications of this changed context for informal social control. This study develops a definition of informal social control past its traditional focus on crime and anti-social behaviour and towards the control of actors and behaviours which are deemed socially problematic due to their transgression of local cultures of decency and respectability. This localised culture of respectability is itself the product of a shared identity and collective memory of hardship in a stable community where these values have been transmitted. This research builds out of an inductive examination of what residents viewed as the key issues facing them, namely combating a spoiled identity which was drawn from stigmatising media depictions of poverty and which painted all residents as being ‘workshy’. The implications for future research build on the construction of ‘decent’ identities in the post-industrial context and the ways in which identity is managed and renegotiated in an environment where even respectable individuals experience spoiled identities. It uncovers hidden orders within a seemingly disorganised community and demonstrates the extent to which state-based theories of crime control cannot account for levels of conformity to pro-social normative orders. In the ‘age of austerity’ this study highlights the importance of further research into the conditions under which this conformity may break down across a variety of different contexts.
APA, Harvard, Vancouver, ISO, and other styles
19

Petchchedchoo, Pattanant. "Management Control Systems (MCS) in the Context of Knowledge Management." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.508826.

Full text
Abstract:
The inspirations for this study were a call for research into the evolution of management accounting in the context of knowledge management (Bhimani and Roberts, 2004) and the increasing interest of Thai public and private organisations in implementing knowledge management initiatives, which were encouraged by the Thai government in order to move Thailand towards becoming a knowledge economy. The aim of this research is to extend the current knowledge and understanding of the adoption and evolution of management control systems (MCS) in the context of knowledge management. The study provides insights into whether and to what extent an MCS can be used to promote knowledge management. This includes an investigation of the mechanisms ofMCS that can be used to encourage knowledge management in organisations. It also involves defining what is meant by the terms knowledge and knowledge management, as these terms are broadly and differently defined in the literature of the various relevant disciplines. Two case studies of Thai organisations were used to explore the implications of MCS for knowledge management The cases provided contextual insights into the practicalities of knowledge management and MCS in the context of knowledge management The cases are in different businesses (one financially-oriented and the other non-financially-oriented) and different organisational contexts (one a bureaucratic organisation and the other a professionally dominated organisation). The differences in business purposes and organisational settings provide detailed data on how MCS can be devdoped to support knowledge management in different contexts. The findings suggest that the two organisations used the behaviouml mechanisms of MCS to promote their knowledge management initiatives in order to accomplish two aims: developing human capital and structural capital Several people-based knowledge management methods (e.g. education and training, communities of practice- (CoPs), etc.) were developed to achieve these aims. Three behvioural mechanisms of MCS (ie. individual performance measures, incentive systems and organisational rules) were used to encourage employees to participate in knowledge management work. MCS for knowledge management in the bank (a bureaucmtic and financially-oriented organisation) is more problematic than in the university partly because the bank's MCS is financially-oriented and more hierarchical than the university's, which is knowledge-oriented and more horizontal. The study also illustrates the use of personnel and cultural controls for promoting knowledge management in the two organisations. Finally, a conceptual framework, for explaining the synergy of MCS and knowledge management, is proposed for further development The framework suggests that the role of MCS in the context of knowledge has two dimensions: promoting horizontal co-ordination (by connecting economic activities horizontally) and encouraging HRM practices.
APA, Harvard, Vancouver, ISO, and other styles
20

Beyl, Tim [Verfasser]. "Workflow-based Context-aware Control of Surgical Robots / Tim Beyl." München : Verlag Dr. Hut, 2016. http://d-nb.info/1084385694/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lynch, Clifford. "The New Context for Bibliographic Control In the New Millennium." the Library of Congress, 2000. http://hdl.handle.net/10150/105464.

Full text
Abstract:
Information finding is changing in a world of digital information and associated search systems, with particular focus on methods of locating information that are distinct from, but complementary to, established practices of bibliographic description. A full understanding of these developments is essential in re-thinking bibliographic control in the new millennium, because they fundamentally change the roles and importance of bibliographic metadata in information discovery processes. There are three major approaches to finding information: through bibliographic surrogates, that represent an intellectual description of aspects and attributes of a work; through computational, content-based techniques that compare queries to parts of the actual works themselves; and through social processes that consider works in relationship to the user and his or her characteristics and history, to other works, and also to the behavior of other communities of users.
APA, Harvard, Vancouver, ISO, and other styles
22

Vile, Matthew. "Gun Control Policy Preference in Context: A Contextually Sensitive Model of Gun Control Policy Preferences." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/332.

Full text
Abstract:
Using data from the 2000 American National Election Study and the Uniform Crime Reports, this research studies the impact of core values and contextual effects on gun control policy preferences. The research seeks to produce a contextually sensitive model of gun control policy preferences that accounts for the nature of the elite message war regarding the issue of gun control and for both long and short-term contextual factors that might sway individual opinions at the point of stimulus (e.g., the survey question). While the analysis does find conditioning effects, the effects do not conform to the theoretical expectations, and they are generally weaker than expected. In contrast, the research demonstrates the strong connections that formed in the public’s mind between ideological, partisan and gender-based core values and gun control policy preferences. These results are consistent with research that found the effects of political messages often vary in counterintuitive ways due to variance in the strength of the message and political awareness (Zaller 1992). Replicating this research across various time periods permits the investigation of the decay rate of impacts on individual policy preferences created by substantial, one-time contextual effects. It may be that contextual effects have a substantial impact in the short-term, but these short-term impacts are mitigated over the longterm by continual reinforcement of the basic themes employed by elites in the message war surrounding the issue.
APA, Harvard, Vancouver, ISO, and other styles
23

Bandeira, Junior Marcos. "CONTROLE DE ACESSO A RECURSOS COMPUTACIONAIS DE FORMA FLEXÍVEL E DINÂMICA ATRAVÉS DE CONTEXTO." Universidade Federal de Santa Maria, 2010. http://repositorio.ufsm.br/handle/1/8139.

Full text
Abstract:
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
A model of access control aims to limit the actions that a User can have legitimate in a system. Its purpose is to improve security by ensuring the properties of integrity and confidentiality. The model of access control is considered standard based on profiles or roles. The profiles are functions that the User can exercise and access permissions to objects are associated with a profile according to their function. The model-based profiles can not take into account aspects of the environment where the access occurs, it limits the possibilities of establishing policies for the most comprehensive security accompanying the scenario of technological change. Models that extend the model-based profiles have been proposed, there are settings in them that make possible the mapping of the environment where the access occurs, also called context, however, there is no consensus on the representation of context and security policies demonstrated by definitions of these models are specific to their use cases. This work presents a model based access control in context expressions CABEC. This model has definitions based on models that extend the model based on profiles, however, shows the construction of security policies for different domains. Security policies built with the CABEC take into account dynamic information environment and their combinations. These aspects are important because they increase the wealth of security policies and flexibility in its construction. The dynamic aspects of context refers to information the moment of interaction, are given as time intervals, number of simultaneous access, physical access, location. The aspect of flexibility in policy construction comes from the possibility of the security manager to choose the amount of rules and combinations thereof, can build a policy that takes into account the rule of office hours combined with the role that the subject is exerting at the time, or simply considering a rule that takes into account only its location. With a model of access control that takes into account dynamic information and their combination increases the security and, consequently, the gain in productivity in relation to ownership of availability of services, data and computing resources.
Um modelo de controle de acesso tem o objetivo de limitar as ações que um usuário legítimo pode exercer em um sistema. Sua finalidade é melhorar a segurança garantindo as propriedades de integridade e confidencialidade. O modelo de controle de acesso considerado padrão é o baseado em perfis ou papéis. Os perfis são funções que o usuário pode exercer e as permissões de acesso a objetos são associadas a um perfil de acordo com a sua função. O modelo baseado em perfis não consegue levar em conta aspectos do ambiente onde ocorre o acesso, isso limita as possibilidades de construção de políticas de segurança mais abrangentes que acompanhem o cenário da evolução tecnológica. Modelos que estendem do modelo baseado em perfis foram propostos, neles existem definições que tornam possível o mapeamento do ambiente onde ocorre o acesso, também chamado de contexto, porém, não existe um consenso em relação à representação do contexto e as políticas de segurança demonstradas pelas definições desses modelos são específicas para seus casos de uso. Esse trabalho apresenta um modelo de controle de acesso baseado em expressões de contexto CABEC. Tal modelo possui definições baseadas nos modelos que estendem o modelo baseado em perfis, porém, demonstra a construção de políticas de segurança para domínios diferentes. As políticas de segurança construídas com o CABEC levam em consideração informações dinâmicas do ambiente e suas combinações. Esses aspectos são importantes, pois aumentam a riqueza das políticas de segurança e a flexibilidade na sua construção. Os aspectos dinâmicos do contexto se referem a informações do instante da interação, são dados como intervalos de tempo, quantidade de acessos simultâneos, meio físico de acesso, localização. O aspecto da flexibilidade na construção das políticas vem da possibilidade do gerente de segurança escolher a quantidade de regras e suas combinações, pode construir uma política que leve em conta a regra de horário de expediente combinada com a função que o sujeito está exercendo naquele momento, ou simplesmente considerar uma regra que leva em conta somente sua localização. Com um modelo de controle de acesso que leva em conta informações dinâmicas e suas combinações aumenta-se a segurança e, conseqüentemente, se ganha em produtividade em relação à propriedade de disponibilidade de serviços, dados e recursos computacionais.
APA, Harvard, Vancouver, ISO, and other styles
24

Devlic, Alisa. "Context-addressed communication dispatch." Licentiate thesis, KTH, Communication Systems, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-10282.

Full text
Abstract:

This research concerns exploiting knowledge of the user's environment (i.e., context information) to enrich a user's communication making it more personal, by ensuring that the user receives only relevant messages and calls in his/her current context, and to facilitate more opportunities for communication interactions with people that are in the same context and that share the same interests as this user. We describe in this licentiate thesis the concepts of context-addressed messaging and context-aware session control that enable users to: (1) send messages to others based on their context, rather than their network address and (2) to initiate, adapt, and terminate user's communication sessions based on this user's current context, respectively. These concepts address questions such as: how to discover, select, and switch to an optimal communication means to meet varying user, contextual, communication, and device resource requirements and preferences. A key to solving these problems is to create a representation of the user's context-dependent preferences and to process the user's context-dependent preferences which are part of context triggers. These context triggers can initiate a communication event upon a particular context update. Additionally, in order to provide the described context-aware communication functions, these mechanisms need timely access to the acquired (desired) context information. This in turn raises a plethora of other questions, such as how to discover sensors that provide the desired context information; how to acquire raw context data from these sensors; how to abstract, process, and model this data to become "understandable" to applications and system components; and how to distribute this context to applications that are running on different nodes.

 

This research is split into three different parts. The first part concerns investigating and implementing context management functions. As part of this research we propose a novel approach for context synthesis using context operators. We also propose a design architecture for context-aware middleware that mediates between the sensors and applications, and that is able to share and retrieve context from other nodes in the network. The second part of our research concerns our proposed mechanism for context-addressed messaging. To implement this mechanism we designed our own message format, called the Common Profile for Context-Addressed Messaging (CPCAM) that is able to use any high level context to compose a context-based address. Additionally, we proposed to use context-based filtering to find the correct message recipients and determine if this message is relevant to these potential message recipients in their current context, as well as to deliver this message to the recipients' preferred device that is adapted using their preferred communication means. At the end of this second part we design context-addressed messaging system operations on top of a SIP and SIMPLE-based network infrastructure. The third part of our research describes context-aware session control mechanisms using context switch and context trigger constructs. A context-switch selects an action from a set of context-dependent actions upon an incoming communication event based on the receiver's current context. In contrast, a context trigger initiates an action based on a context update and the user's preferences that are specified in this updated context. This part illustrates in several examples the context-aware session control mechanisms, i.e. the initiation of a communication session based on the match of a user's preferences and current context, as well as adaptation and (if necessary) termination of an ongoing communication session based upon the user's context-dependent preferences.

 

The research leading to this licentiate has created network and system level models necessary for implementation of a context-addressed communication system that would enable users to easily design their own personalized, context-aware communication services. The necessary constructs and properties of these models are designed and analyzed in the thesis, as well as in conference papers and other documents published in the process of doing the research for this thesis. A number of remaining open issues and challenges have been outlined as part of the future work.

 


EU FP6 MIDAS (Middleware Platform for Developing and Deploying Advanced Mobile Services)
EU FP6 MUSIC (Self-adapting Applications for Mobile Users In Ubiquitous Computing Environments)
APA, Harvard, Vancouver, ISO, and other styles
25

Lam, Yu-chau. "A study of the drainage policy in the context of flood prevention in Hong Kong." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B21036688.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

LI, ZHEN. "Control Flow Graph Based Attacks : In the Context of Flattened Programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155770.

Full text
Abstract:
This report addresses de-obfuscation on programs. The targeted obfuscation scheme is the control flow flattening, which is an obfuscation method focusing on hiding the control flow of a program. This scheme introduces a special block named dispatcher into the program. The control flow of the program is reconstructed to be directed back to the dispatcher whenever the execution of a basic block ends. By doing this, in the flattened program, each basic block could be recognized as a precursor or a successor of any other basic blocks. While the realcontrol flow of the program is merely disclosed during the execution of the program.This report aims to remove the dispatcher added in the flattenedprogram and rebuild the control flow of its original program. To achieve the targets, this report presents a de-obfuscation model based on theControl Flow Graph of an obfuscated program. The de-flattening model makes use of both static analysis and dynamic analysis.The de-flattening model primarily relies on execution paths which are obtained by executing a program dynamically. The idea is that in the execution paths, after eliminating the dispatcher block, the real control flow of the original program is disclosed. Then based on these real execution paths, the control flow of the program without obfuscation could be constructed.In order to obtain the full program structure, we need to gather the execution paths that result in a full coverage of the program. Merely with dynamic analysis, this could hardly be achieved. Therefore, static analysis are introduced. In the de-flattening model, the execution paths within a program are computed with the assistance of dynamic execution path analysis, which is a study to statically compute the feasible paths in a program by solving logical formulas obtained during the exploration of the program code. With this static analysis method, the model is adequate to reverse the flattened program to its original structure.The obfuscated programs are distributed in binaries, our research provides insights to de-obfuscation on binaries directly. Besides, the deflattening result obtained in the report is valuable for improvements to existing code obfuscation techniques.
APA, Harvard, Vancouver, ISO, and other styles
27

Kalalas, Charalampos. "Enabling LTE for Control System Applications in a Smart Grid Context." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-150344.

Full text
Abstract:
The next generation electric power system, known as Smart Grid, is expected to alleviate the energy shortage problem by exploiting renewable energy resources. The Smart Grid communication network, with its diverse structure, constitutes an indispensable component in the new power system. In terms of power industry standards, the International Electrotechnical Commission (IEC) 61850 framework is of particular note. Originally defined to cover the stringent requirements for automation within the substation, IEC 61850 is proving to be a versatile standard that can also be applied to the medium- and low-voltage networks while facilitating control applications. Long Term Evolution (LTE) appears as a remarkable candidate for supporting remote automation tasks in the electricity grid, offering low latency, high throughput and quality of service differentiation in a single radio access technology. In the context of the thesis, a performance evaluation of the integration of LTE technology with IEC 61850 communication services is carried out. A characterization of the network architecture and the performance requirements for intelligent power system management is performed and an analytical model for the scheduling framework is proposed. Emphasis is given on the development of optimal prioritization schemes and techniques in order to ensure control data scheduling in situations when LTE background traffic coexists in the network. In addition, realistic communication scenarios specifically designed to emulate real network operations are considered and extensive simulations are performed with the use of Ericsson’s radio system simulator platform. The results have demonstrated that LTE networks successfully meet the performance requirements for wide-area automation tasks within a Smart Grid context. Given the size of the LTE ecosystem, such an evolution constitutes an attractive path for future wireless communication.
APA, Harvard, Vancouver, ISO, and other styles
28

Leslin, Jelin. "Hardware Acceleration in the Context of Motion Control for Autonomous Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-288854.

Full text
Abstract:
State estimation filters are computationally intensive blocks used to calculate uncertain/unknown state values from noisy/not available sensor inputs in any autonomous systems. The inputs to the actuators depend on these filter’s output and thus the scheduling of filter has to be at very small time intervals. The aim of this thesis is to investigate the possibility of using hardware accelerators to perform this computation. To make a comparative study, 3 filters that predicts 4, 8 and 16 state information was developed and implemented in Arm real time and application purpose CPU, NVIDIA Quadro and Turing GPU, and Xilinx FPGA programmable logic. The execution, memory transfer time, and the total developement time to realise the logic in CPU, GPU and FPGA is discussed. The CUDA developement environment was used for the GPU implementation and Vivado HLS with SDSoc environment was used for the FPGA implementation. The thesis concludes that a hardware accelerator is needed if the filter estimates 16 or more state information even if the processor is entirely dedicated for the computation of filter logic. Otherwise, for a 4 and 8 state filter the processor shows similar performance as an accelerator. However, in a real time environment the processor is the brain of the system, so it has to give instructions to many other functions parallelly. In such an environment, the instruction and data caches of the processor will be disturbed and there will be a fluctuation in the execution time of the filter for every iteration. For this, the best and worst case processor timings are calculated and discussed.
Tillståndsberäkningsfilter är beräkningsintensiva block som används för att beräkna osäkra / okända tillståndsvärden från bullriga / ej tillgängliga sensoringångar i autonoma system. Ingångarna till manöverdonen beror på filterens utgång och därför måste schemaläggningen av filtret ske med mycket små tidsintervall. Syftet med denna avhandling är att undersöka möjligheten att använda hårdvaruacceleratorer för att utföra denna beräkning. För att göra en jämförande studie utvecklades och implementerades 3 filter som förutsäger information om 4, 8 och 16 tillstånd i realtid med applikationsändamålen CPU, NVIDIA Quadro och Turing GPU, och Xilinx FPGA programmerbar logik. Exekvering, minnesöverföringstid och den totala utvecklingstiden för att förverkliga logiken i båda hårdvarorna diskuteras. CUDAs utvecklingsmiljö användes för GPU-implementeringen och Vivado HLS med SDSoc-miljö användes för FPGA-implementering. Avhandlingen drar slutsatsen att en hårdvaru-accelerator behövs om filtret uppskattar information om mer än 16 tillstånd även om processorn är helt dedikerad för beräkning av filterlogik. För 4 och 8 tillståndsfilter, visar processorn liknande prestanda som en accelerator. Men i realtid är processorn hjärnan i systemet; så den måste ge instruktioner till många andra funktioner parallellt. I en sådan miljö kommer processorns instruktioner och datacacher att störas och det kommer att bli en fluktuation i exekveringstiden för filtret för varje iteration. För detta beräknas och diskuteras de bästa och värsta fallstiderna.
APA, Harvard, Vancouver, ISO, and other styles
29

German, Richard Neil. "The role of landscape context in biological control of cereal aphids." Thesis, University of Leeds, 2012. http://etheses.whiterose.ac.uk/4165/.

Full text
Abstract:
Producing enough food to sustainably meet the demands of a growing global population is one of the greatest challenges we face. In wheat, 8% of yield is lost to insect herbivores before harvest, so improving pest control would contribute significantly to food security. Given the negative effects of chemical insecticides, managing habitat to boost numbers of pest natural enemies offers a promising alternative. Recent studies highlight the importance of wider landscape context for natural enemy management, but there is uncertainty over which landscape characteristics are most important for different natural enemies, how this varies temporally, and which management strategies are worthwhile. In this thesis novel analytical approaches using random forests were used to explore temporal and inter-specific variation in the influence of landscape context on species of aphid and hymenopterous parasitoid in winter wheat fields in the UK, and to produce models predicting the abundance of aphids, parasitoids and syrphid larvae as functional groups. Aphid and parasitoid numbers responded strongly to the spatial configuration of vegetation parcels, both being more common in more fine-grained landscapes. Syrphid larvae were more abundant when arable land was rare within 1500 metres. Seasonal variation in landscape influence was more important than annual or inter-species differences for both aphids and parasitoids. Map-based simulations were then performed to predict the outcome of hypothetical land-use scenarios, using a novel method based on statistical models. Displacement of non-crop vegetation by arable land, alongside increased aggregation, produced consistently undesirable results. Estimates of the economic value of natural enemies to farmers were made, showing the potential to reduce yield loss and insecticide cost by at least £55 per hectare through beneficial habitat management. At high aphid densities, natural enemies were more valuable under insecticide free management. Future work and implications of these results are discussed in chapter 6.
APA, Harvard, Vancouver, ISO, and other styles
30

Hill, Dawn Marie. "Contextual (setting/situational) Control of Pro/Anti Environmental Behavior." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/196064.

Full text
Abstract:
Proenvironmental behavior (PEB) studies have largely taken a person-centered approach under the assumption that behavior is primarily determined by person attributes. Studies measure knowledge, values, environmentalism, attitudes, etc. - all of which apparently reside in the individual and are posited to cause pro/anti-environmental intention. Unfortunately, it has been demonstrated that intention only leads to behavior roughly 30% of the time. One reason this breakdown may exist is that half of the "causal" story is missing, which is how much the context (setting/situation) controls behavior. This study attempted to enhance the empirical literature by relying on an evolutionary foundation focused on an empirical investigation of extant contexts that present to-be-solved adaptive problems and that display affordances and cues to adaptive behavior. Furthermore, this study compares the predictive efficacy of both the Theory of Planned Behavior (TPB) constructs and new evolutionary and functionalist constructs of life history strategy, environmentalism (conceived more as past behavioral history) and consumerism. This study simultaneously contrast-tested this new evolutionarily and contextually-driven approach with the conventional person-centered approach using the same subjects to empirically determine which approach accounts for the most variance (i.e. a multiple working hypothesis format). The dependent variable presented a closer approximation to real behavior in real-life situations as depicted in written multidimensional vignettes, instead of measuring intention alone in a contextual vacuum. Environmental and non-environmental settings were included, as well as theoretically driven situational dimensions that varied systematically to strategically "cue" specific adaptive problems. This study approach relied on the notion that only when the person by context relationship is studied simultaneously can PEB be better predicted. Results confirmed that settings carried a significant proportion of variance in the collapsed 16 situations tested. The TPB paradigm predicted aggregate behavior; however, it (along with measured specific intentions) did not predict specific behavioral choices in the unique situations. Overall results were mixed but suggested that new lines of research attending to the contexts and social situations in which environmental behavior occurs can provide a better basis for understanding and affecting changes in behavior toward environmental ends, as will be required for achieving long-term environmental sustainability.
APA, Harvard, Vancouver, ISO, and other styles
31

Lehan, Mackin Melissa Ann. "The social context of pregnancy intention." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/3336.

Full text
Abstract:
Pregnancy intention is extensively examined in the literature and the concept of "unintended" pregnancy is considered a significant health problem. Large efforts have been made to reduce negative health consequences presumably associated with pregnancies that are unexpected, unwanted, or mistimed but have had limited impact. A study was conducted to examine contextual issues surrounding women's experiences with pregnancy intention its intersection with knowledge, perceptions, and use of emergency contraception in a population of female university students. The project was a mixed method study including a survey examining demographic characteristics, sexual history, and knowledge and use characteristics in addition to interviews exploring prospective perceptions of pregnancy intention. An integrative review informed the background of the study demonstrating the need for expansion of current concepts of pregnancy intention that inform measurement and subsequent interventions. Quantitative survey results provide new information including higher rates of use in comparison to previous studies but persistence of misinformation. Qualitative interview findings illustrate a process by which individual agency in terms of sexual and pregnancy decision making is influenced by a precursor of the embodiment of convictions and empowerment. Combined conclusions confirm the need of exploring the role of the social context on pregnancy intention, suggest ways in which nurses can empower women to be their own agents of health, and start discussions of how intervention approaches to pregnancy intention can be improved.
APA, Harvard, Vancouver, ISO, and other styles
32

Steinfeld, Michael. "Contextual Control Of Instrumental Actions And Habits Following Retroactive Interference." ScholarWorks @ UVM, 2019. https://scholarworks.uvm.edu/graddis/1041.

Full text
Abstract:
It is commonly accepted that instrumental responses that have been extinguished can return. For example, in a phenomenon known as the renewal effect, extinguished behaviors return upon removal from the extinction context. Another well-accepted notion is that instrumental behaviors can be thought of as goal-directed actions, which form over the course of moderate amounts of practice or training, and habits, which form after extended practice. Despite years of research on both topics, what happens to actions and habits following extinction is poorly understood. The present experiments examined the renewal of actions and habits following retroactive interference paradigms such as extinction and additional training. Experiment 1 examined renewal of an action following its extinction in a separate context, and demonstrated that the extinguished behavior renewed as an action upon return to the acquisition context. Experiment 2 asked the same question about habits, and found that the behavior renewed as a habit after extinction upon return to the acquisition context. Experiment 3 examined renewal of goal-directed responding in one context following extensive training and conversion into habit in another context. It demonstrated that a single response could manifest as a habit in one context, and renew as an action in the original training context. Experiment 4 asked if this effect depends on returning to the acquisition context, or simply removal from the habit training context. The results suggest that mere removal from the habit training context is sufficient to renew the goal-directed properties of a behavior. Together, the results suggest that actions and habits can be inhibited in a context-specific manner by extinction, and that instrumental behaviors can have both action and habit properties that can each renew under the proper circumstances. The results also expand on the notion that habits are especially context specific, while actions can transfer across contexts.
APA, Harvard, Vancouver, ISO, and other styles
33

Yortanli, Ahmet. "A Certificate Based, Context Aware Access Control Model For Multi Domain Environments." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613000/index.pdf.

Full text
Abstract:
A certificate based approach is proposed for access control operations of context aware systems for multi domain environments. New model deals with the removal of inter-domain communication requirement in access request evaluation process. The study is applied on a prototype implementation with configuration for two dierent cases to show the applicability of the proposed certificate based, context aware access control model for multi domain environments. The outputs for the cases show that proposed access control model can satisfy the requirements of a context aware access control model while removing inter domain communication needs which may cause some latency in access request evaluation phase.
APA, Harvard, Vancouver, ISO, and other styles
34

Black, Angus Hugh. "Software quality assurance in a remote client/contractor context." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006615.

Full text
Abstract:
With the reliance on information technology and the software that this technology utilizes increasing every day, it is of paramount importance that software developed be of an acceptable quality. This quality can be achieved through the utilization of various software engineering standards and guidelines. The question is, to what extent do these standards and guidelines need to be utilized and how are these standards and guidelines implemented? This research focuses on how guidelines developed by standardization bodies and the unified process developed by Rational can be integrated to achieve a suitable process and version control system within the context of a remote client/contractor small team environment.
APA, Harvard, Vancouver, ISO, and other styles
35

Zhang, Ni (Jenny). "Preserving individual privacy in context-aware ubiquitous computing environments : an intelligent and distributed agent technology for context-dependent privacy control." Thesis, University College London (University of London), 2008. http://discovery.ucl.ac.uk/1446221/.

Full text
Abstract:
Context-aware computing aims to take advantage of contextual knowledge to make decisions about how to dynamically provide services or adapt to meet user requirements. A tradeoff exists between preserving individual privacy and disclosing information to benefit from rich and interesting services. Although privacy issues have been recognized as a great barrier to the adoption and a long-term success of the context-aware computing, an extensive literature review conducted by the author has indicated that only a small subset of the privacy needs and challenges have been moderately addressed, and demand for adequate privacy protection in the context-aware paradigm is significant. This doctoral work introduces a distributed privacy protection model to tackle the challenges and overcome the limitations of existing solutions, and proposes an intelligent agent technology to facilitate a relatively unobtrusive user participation in controlling the disclosure of their sensitive information. It aims at addressing two key concerns of preserving privacy in context-aware ubiquitous computing environments: privacy feedback (i.e. notifying individuals of relevant information disclosure) and privacy management (i.e. allowing individuals to express their privacy preferences and manage their privacy levels). The proposal of the intelligent privacy agent is characterized by developing automated privacy preference mechanisms to enforce privacy control in response to context changes. More specifically, the author has developed a Privacy Policy/Preference Language to facilitate a common understanding of privacy requirements, and has exploited ontology-based methods to enable semantic policy analysis of context-dependent privacy preferences. A proof-of-concept implementation using Web Service technologies demonstrates that the proposed privacy solution can be deployed to achieve interoperability across system platforms and devices, and is scalable to the global Internet Quantatitive performance evaluations are conducted to validate the novel approaches of using hybrid reasoning mechanisms to perform the task of semantic privacy policy evaluation, preference conflict and redundancy detection, and context perception.
APA, Harvard, Vancouver, ISO, and other styles
36

Fruehauf, Lindsay Morgan. "Cognitive Control and Context Maintenance in Individuals with Obsessive-Compulsive Disorder (OCD)." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8476.

Full text
Abstract:
Context maintenance, an aspect of cognitive control, is the internal representation and utilization of task-relevant information that helps achieve task goals. Alterations in context maintenance may be responsible for the cognitive difficulties seen in people with obsessive-compulsive disorder (OCD). We used two tasks designed to measure context maintenance: a) the cued-Stroop, a single-trial version of Golden’s Stroop test that varies the cue for each trial (color-naming or word-reading), and b) the AX-CPT task, a continuous performance task that has participants respond to an “A” only when followed by an “X,” with all other non-target trials labeled as AY, BX, and BY (and “Y” and “B” representing all non-X and non-A letters, respectively). Participants included 31 people with OCD and 30 psychiatrically-healthy controls that completed a neuropsychological test battery, self-report questionnaires measuring mood and symptom severity, and the computerized cued-Stroop and AX-CPT tasks. There was a 1s or 5s delay between the cue and probe for both tasks so as to vary the duration of context maintenance. We conducted a 2 (Group) x 2 (Delay) x 3 (Trial Type) repeated measures ANOVA for the cued-Stroop and a 2 (Group) x 2 (Delay) x 4 (Trial Type) repeated measures ANOVA for the AX-CPT. Dependent measures included median reaction times (RT) and mean error rates (ER). Both groups showed a congruency effect for the cued-Stroop, with slower RTs and greater ERs for the incongruent trials than the neutral and congruent trials, as well as lower ERs for BY trials compared to BX and AY trials of the AX-CPT task. There were no significant differences in RTs or ERs between groups for delay or condition for the cued-Stroop (ps > .45) or for the AX-CPT (ps > .07). The present study shows that people with OCD did not show deficits in context maintenance in two separate tasks. Limitations include low power, higher functioning participants with OCD, and the presence of comorbid depression and anxiety in some participants with OCD.
APA, Harvard, Vancouver, ISO, and other styles
37

Avdis, Alexandros. "Large eddy simulation of synthetic jets in the context of flow control." Thesis, Imperial College London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497939.

Full text
Abstract:
The current research focuses on the use of synthetic jets with a rectangular orifice of high aspect ratio as means of separation suppression. Large Eddy Simulations of a synthetic jet in a quiescent domain and a the flow over a two-dimensional hill with a synthetic jet in the vicinity of separation were undertaken. Experimental results presented during the NASA workshop titledI "CFD Validation a of Synthetic Jets and Turbulent Separation Control" were used for validation purposes. In the case of the flow of a synthetic jet in a quiescent domain, agreement between LES and experimental results is only qualitative. The The jet spread is under-predicted and the centre-line velocity is over-predicted downstream of the jet orifice. Also the primary vortex pair is shown to travel slower than that in the experiment. In the case of the flow over a two-dimensional hill, the flow without any kind of separation control as well as the tlow with a synthetic jet in the vicinity of separation were simulated. The agreement in long-time-averaged velocity and Reynolds stresses between LES and experimental resuhs was good in both baseline and synthetic-jet cases.
APA, Harvard, Vancouver, ISO, and other styles
38

Naghiyev, Eldar. "Device-free localisation in the context of domestic energy saving control methods." Thesis, University of Nottingham, 2014. http://eprints.nottingham.ac.uk/14314/.

Full text
Abstract:
A reduction in greenhouse gas emissions by the energy sector is required to decelerate global warming. With the domestic sector being the biggest energy consumer, a great amount of saving potential is available in the operation of dwellings. This thesis is proposing to improve domestic energy efficiency by combining energy saving control measures designed to be made by occupants and automation systems, called Combined Occupant and Automation Control (COAC). It highlights that the occupant’s position is necessary to effectively integrate both of those conservation methods. Three unobtrusive domestic occupant detection technologies were identified and compared for this purpose. Device-free Localisation (DfL), an emerging technology, which was found to be the most suited for a COAC system, was then investigated further by the means of a series of technical experiments. A questionnaire, investigating user perception of DfL and of COAC systems, was conducted. Furthermore, case studies were undertaken, during which three dwellings with real occupants received prototypes of a COAC system, consisting of automated washing appliances and a smart pricing scheme. As part of these case studies, semi-structured interviews were conducted. User preferences with regards to the COAC system’s interface and operation were established. Also, behavioural changes, induced by occupant control methods, were observed. The different studies furthermore found that financial gain was the main incentive to save energy. Automation system’s support in conserving energy was demonstrated to be distinctly appreciated and although security and privacy concerns were prevalent, DfL’s support was also permitted. Furthermore, guidance was developed for DfL setup and operation, especially with regards to using an automation system’s infrastructure for this purpose. In conclusion, this research suggests that the novel concept of integrating DfL and COAC meets the technical and practical requirements for general adoption, and hence provides another tool in the race against global warming.
APA, Harvard, Vancouver, ISO, and other styles
39

Chuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.

Full text
Abstract:
Whitelisting IP addresses and hostnames allow organizations to employ a default-deny approach to network traffic. Organizations employing a default-deny approach can stop many malicious threats, even including zero-day attacks, because it only allows explicitly stated legitimate activities. However, creating a comprehensive whitelist for a default-deny approach is difficult due to user-supplied destinations that can only be known at the time of usage. Whitelists, therefore, interfere with user experience by denying network traffic to user-supplied legitimate destinations. In this thesis, we focus on creating dynamic whitelists that are capable of allowing user-supplied network activity. We designed and built a system called Harbinger, which leverages user interface activity to provide contextual information in which network activity took place. We built Harbinger for Microsoft Windows operating systems and have tested its usability and effectiveness on four popular Microsoft applications. We find that Harbinger can reduce false positives-positive detection rates from 44%-54% to 0%-0.4% in IP and DNS whitelists. Furthermore, while traditional whitelists failed to detect propagation attacks, Harbinger detected the same attacks 96% of the time. We find that our system only introduced six milliseconds of delay or less for 96% of network activity.
APA, Harvard, Vancouver, ISO, and other styles
40

Henderson-Ross, Jodi A. "Informal Social Control in Action: Neighborhood Context, Social Differentiation, and Selective Efficacy." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1395755045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Goldberg, Lisa Stephanie. "Understanding Self-Control, Motivation, & Attention in the Context of Eating Behavior." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1499450056.

Full text
Abstract:
Obesity and overweight continue to be a growing problem in the United States and abroad. Maintaining self-control in tempting food environments is necessary in order to avoid weight gain, yet is difficult for many individuals to achieve. In order to understand how self-control resources interact with motivation to affect selective attention to foods, 128 college student participants (42 males) varied in their controlled and autonomous motivation for healthy eating were randomly assigned to either an ego-depletion (n = 61) or control manipulation (n = 67). Implicit selective attention to food stimuli was subsequently assessed using a food flanker task that contained healthy and unhealthy foods. Results showed that overall, participants responded more quickly to unhealthy food targets and experienced more distraction by unhealthy food flankers relative to healthy foods. Moreover, ego-depleted participants were faster in responding to unhealthy target food stimuli compared to healthy food stimuli, whereas those in the control group did not differ in their responses to healthy and unhealthy targets. Neither autonomous nor controlled motivation was associated with differences in attention to food stimuli and did not interact with ego-depletion. These results indicate that independent of motivations for healthy eating, reduced self-control resources lead to changes in processing speed for unhealthy food stimuli, which may have implications for subsequent consumption and ultimately weight regulation.
APA, Harvard, Vancouver, ISO, and other styles
42

Hill, Frances Margaret. "An evaluative study of quality circle operation and outcomes in a western context." Thesis, Queen's University Belfast, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.276829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Carmona, Matthew P. "Controlling the design of private sector residential development : context, practice and innovation." Thesis, University of Nottingham, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Mohamad, Nasri Nurfaradilla. "Reconceptualisation of self-directed learning in a Malaysian context." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/20461.

Full text
Abstract:
The concept of self-directed learning (SDL) has been extensively studied; however, the majority of studies have explored learners’ perspectives on SDL, with less attention paid to investigating SDL from educators’ perspectives. Surprisingly, while assessment and feedback have long been recognized as powerful elements which influence how learners approach their learning, and key research studies have examined how both assessment and feedback can encourage and enhance the development of SDL, this nevertheless remains an area that would benefit from increased attention. Moreover, although there is a growing body of literature investigating the cultural dimension of SDL, most of these studies are limited to examining the formation of SDL among individuals influenced by Western or Confucian cultures, ignoring the existence of other cultural groups. This study, which investigates Malaysian teacher educators’ conceptualisations of SDL, begins to address these gaps. The key research questions which guided the study are: 1) How do teacher educators in Malaysia conceptualise learning? 2) How do teacher educators in Malaysia conceptualise SDL? 3) To what extent do teacher educators in Malaysia perceive themselves as self-directed learners? 4) What kind of learning opportunities do teacher educators in Malaysia create for their learners to foster the development of SDL, and what is the particular role of assessment and feedback in SDL? Twenty Malaysian teacher educators were interviewed to obtain their views on SDL and to identify their pedagogical practices which may foster or hinder the development of SDL approaches among their learners. A constructivist grounded theory approach was used to inform the methodological framework of this study, whilst a hybrid inductive and deductive analysis approach was used to analyse the interview data. The findings of the current study suggest that most assessment and feedback practices are heavily focused on assessments designed by educators and on educator-generated feedback, in which learners are passive recipients. It is argued that these practices have significantly contradicted the primary principle of SDL, which characterises the learner as the key agent of his or her own learning. The findings of this study suggest that a more comprehensive conceptualisation of SDL is required that recognises the fundamental role of both the self and of educators in SDL, and acknowledges the impact of the socio-cultural context on SDL. Informed by the existing SDL literature, and derived from fine-grained analysis of the interview data, the proposed definition of SDL and reconceptualised SDL framework foreground SDL as socially constructed learning where the learner takes control of his or her own learning processes within complex socio cultural contexts. The thesis concludes by recommending that future research (i) explores the central role of assessment and feedback in the context of SDL and (ii) investigates the impact of various cultures on learning, in order to develop a broader and more nuanced understanding of SDL.
APA, Harvard, Vancouver, ISO, and other styles
45

Taher, Milad A. M. "Taguchi quality by design approach : an investigation within the context of Make-To-Order manufacturing." Thesis, University of Newcastle upon Tyne, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260977.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Siu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

McKittrick, Alan. "Inter-organisational management control in the context of transactional business process outsourcing arrangements." Thesis, University of Ulster, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604653.

Full text
Abstract:
Purpose - Research into post contract management control in inter-organizational relationships in general is immature and studies of transactional arrangements such as back-office BPO even more so. The global BPO market has grown from over $47 Billion in 2006 to over $75 Billion by 2011. However, satisfaction with such arrangements has been reported to be very low. Neither management control nor economic theories appear able to fully explain how control is realized between firms. This research provides a detailed qualitative analysis of post contract management control methods utilized in practice in a BPO context. Design / methodology / approach - an embedded multiple case study of four transactional BPO arrangements was employed to support generalizability. Data was collected from the USA, UK and India. Sources of evidence from both sides of the dyadic relationship were used to minimize problems of construct validity. A case study protocol was established to maximize case study reliability. Data analysis comprised within case and cross case analyses.
APA, Harvard, Vancouver, ISO, and other styles
48

Beyl, Tim [Verfasser], and H. [Akademischer Betreuer] Wörn. "Workflow-based Context-aware Control of Surgical Robots / Tim Beyl. Betreuer: H. Wörn." Karlsruhe : KIT-Bibliothek, 2015. http://d-nb.info/1081722207/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Page, Teneille. "Effortful Control, Attention and Executive Functioning in the Context of Autism Spectrum Disorder." Master's thesis, Faculty of Humanities, 2019. http://hdl.handle.net/11427/30545.

Full text
Abstract:
Autism Spectrum Disorder (ASD) involves a broad presentation of symptoms classified along continuum of severity, with core deficits in Social Affect and Restricted, Repetitive Behaviours required for formal diagnosis (American Psychiatric Association, 2013; Lauritsen, 2013). The development of particular cognitive, behavioural and interpersonal difficulties seen in ASD is of great interest. Temperament offers particular value given that it influences the development of social behaviours, emotionality and self-regulation (Shiner et al., 2012). The self-regulatory temperament factor, effortful control, is known to be diminished in ASD (Garon et al., 2009, 2016) and is theorised to be related to attention and executive functioning (Rothbart & Rueda, 2005). This link is of particular interest, given that attention and executive function deficits are prominent in ASD (Craig et al., 2016; Lai et al., 2017; Sanders, Johnson, Garavan, Gill, & Gallagher, 2008). To date, however, a thorough literature search failed to yield a study which has investigated whether effortful control,attention and executive functioning are concurrently associated with ASD symptomatology.Moreover, the relationship between effortful control, attention and executive functioning is not as unambiguous as previously theorised in typical development, with little investigation into these relationships in ASD. To elucidate the association effortful control, attention and executive functioning have with ASD symptomatology, the relationship between effortful control and these cognitive variable needs to be better established empirically. Therefore the current investigation’s aims were twofold. Study One investigated the relationship of effortful control with attention and executive functions in neurotypical and ASD samples. Study Two explored the association between effortful control, attention, executive functions and core ASD deficits (i.e. Social Affect and Restricted, Repetitive Behaviours). A sample of 38 ASD and 38 neurotypical boys (aggregate-matched on key demographic factors), aged 6 - 15, and their primary caregivers were recruited. Study One considered both groups (n=76) and featured both quasi-experimental and relational investigations. Study Two focused only on the ASD sample (n=38) and used a purely relational design. Neurocognitive measures were used to assess two attention domains (i.e. attention span and sustained attention), and three executive functions (i.e. working memory, inhibition and switching). Effortful control was measured using a parent-report questionnaire and ASD core deficits were examined using the Autism Diagnostic Observation Schedule, Second edition (ADOS-2; Lord, Luyster, Gotham, & Guthrie, 2012). Results of Study One revealed effortful control was a significant predictor of attention span, working memory and inhibition, with ASD participants performing significantly more poorly on these cognitive domains and rated significantly more poorly on effortful control. Study Two’s results indicated that Social Affect was significantly correlated with inhibition and the interaction effect between effortful control and working memory. Furthermore, only effortful control, attention span and their interaction effect were significantly associated with Restricted Repetitive Behaviours. Specifically, effortful control was found to moderate this relationship. At high levels of effortful control, increased attention span was associated with less Restricted, Repetitive Behaviours. These findings may aid efforts to establish a predictive model for ASD core deficits on the basis of temperament and cognitive difficulties. Keywords: Autism Spectrum Disorder (ASD), Effortful Control, Attention, Executive Functions, Social Affect, Restricted Repetitive Behaviours
APA, Harvard, Vancouver, ISO, and other styles
50

Santin, Joseph M. "Context-dependence of physiological systems: environment-physiology interactions in the respiratory control system." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright149336916471128.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography