To see the other types of publications on this topic, follow the link: Exploit testing.

Dissertations / Theses on the topic 'Exploit testing'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 42 dissertations / theses for your research on the topic 'Exploit testing.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Flansburg, Kevin. "A framework for automated management of exploit testing environments." Thesis, Georgia Institute of Technology, 2015. http://hdl.handle.net/1853/54912.

Full text
Abstract:
To demonstrate working exploits or vulnerabilities, people often share their findings as a form of proof-of-concept (PoC) prototype. Such practices are particularly useful to learn about real vulnerabilities and state-of-the-art exploitation techniques. Unfortunately, the shared PoC exploits are seldom reproducible; in part because they are often not thoroughly tested, but largely because authors lack a formal way to specify the tested environment or its dependencies. Although exploit writers attempt to overcome such problems by describing their dependencies or testing environments using comments, this informal way of sharing PoC exploits makes it hard for exploit authors to achieve the original goal of demonstration. More seriously, these non- or hard-to-reproduce PoC exploits have limited potential to be utilized for other useful research purposes such as penetration testing, or in benchmark suites to evaluate defense mechanisms. In this paper, we present XShop, a framework and infrastructure to describe environments and dependencies for exploits in a formal way, and to automatically resolve these constraints and construct an isolated environment for development, testing, and to share with the community. We show how XShop's flexible design enables new possibilities for utilizing these reproducible exploits in five practical use cases: as a security benchmark suite, in pen-testing, for large scale vulnerability analysis, as a shared development environment, and for regression testing. We design and implement such applications by extending the XShop framework and demonstrate its effectiveness with twelve real exploits against well-known bugs that include GHOST, Shellshock, and Heartbleed. We believe that the proposed practice not only brings immediate incentives to exploit authors but also has the potential to be grown as a community-wide knowledge base.
APA, Harvard, Vancouver, ISO, and other styles
2

Vernersson, Susanne. "Penetration Testing in a Web Application Environment." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-8934.

Full text
Abstract:
As the use of web applications is increasing among a number of different industries, many companies turn to online applications to promote their services. Companies see the great advantages with web applications such as convenience, low costs and little need of additional hardware or software configuration. Meanwhile, the threats against web applications are scaling up where the attacker is not in need of much experience or knowledge to hack a poorly secured web application as the service easily can be accessed over the Internet. While common attacks such as cross-site scripting and SQL injection are still around and very much in use since a number of years, the hacker community constantly discovers new exploits making businesses in need of higher security. Penetration testing is a method used to estimate the security of a computer system, network or web application. The aim is to reveal possible vulnerabilities that could be exploited by a malicious attacker and suggest solutions to the given problem at hand. With the right security fixes, a business system can go from being a threat to its users’ sensitive data to a secure and functional platform with just a few adjustments. This thesis aims to help the IT security consultants at Combitech AB with detecting and securing the most common web application exploits that companies suffer from today. By providing Combitech with safe and easy methods to discover and fix the top security deficiencies, the restricted time spent at a client due to budget concerns can be made more efficient thanks to improvements in the internal testing methodology. The project can additionally be of interest to teachers, students and developers who want to know more about web application testing and security as well as common exploit scenarios.
APA, Harvard, Vancouver, ISO, and other styles
3

Kahlström, Joakim, and Johan Hedlin. "Automating software installation for cyber security research and testing public exploits in CRATE." Thesis, Linköpings universitet, Databas och informationsteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-177401.

Full text
Abstract:
As cyber attacks are an ever-increasing threat to many organizations, the need for controlled environments where cyber security defenses can be tested against real-world attacks is increasing. These environments, called cyber ranges, exist across the world for both military and academic purposes of various scales. As the function of a cyber range involves having a set of computers, virtual or physical, that can be configured to replicate a corporate network or an industrial control system, having an automated method of configuring these can streamline the process of performing different exercises. This thesis aims to provide a proof of concept of how the installation of software with known vulnerabilities can be performed and examines if the software is vulnerable directly after installation. The Cyber Range And Training Environment (CRATE) developed by the Swedish Defence Research Agency (FOI) is used as a testbed for the installations and FOI-provided tools are used for launching automated attacks against the installed software. The results show that installations can be performed without Internet access and with minimal network traffic being generated and that our solution can rewrite existing software packages from the package manager Chocolatey to work with an on-premises repository with an 85% success rate. It is also shown that very few publicly available exploits succeed without any manual configuration of either the exploit or the targeted software. Our work contributes to making it easier to set up environments where cyber security research and training can be conducted by simplifying the process of installing vulnerable applications.
APA, Harvard, Vancouver, ISO, and other styles
4

Andersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.

Full text
Abstract:
In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server.
APA, Harvard, Vancouver, ISO, and other styles
5

Bahabanian, Olivier. "Explicit deconvolution of wellbore storage distorted well test data." Texas A&M University, 2006. http://hdl.handle.net/1969.1/4811.

Full text
Abstract:
The analysis/interpretation of wellbore storage distorted pressure transient test data remains one of the most significant challenges in well test analysis. Deconvolution (i.e., the "conversion" of a variable-rate distorted pressure profile into the pressure profile for an equivalent constant rate production sequence) has been in limited use as a "conversion" mechanism for the last 25 years. Unfortunately, standard deconvolution techniques require accurate measurements of flow-rate and pressure — at downhole (or sandface) conditions. While accurate pressure measurements are commonplace, the measurement of sandface flowrates is rare, essentially non-existent in practice. As such, the "deconvolution" of wellbore storage distorted pressure test data is problematic. In theory, this process is possible, but in practice, without accurate measurements of flowrates, this process can not be employed. In this work we provide explicit (direct) deconvolution of wellbore storage distorted pressure test data using only those pressure data. The underlying equations associated with each deconvolution scheme are derived in the Appendices and implemented via a computational module. The value of this work is that we provide explicit tools for the analysis of wellbore storage distorted pressure data; specifically, we utilize the following techniques: * Russell method (1966) (very approximate approach), * "Beta" deconvolution (1950s and 1980s), * "Material Balance" deconvolution (1990s). Each method has been validated using both synthetic data and literature field cases and each method should be considered valid for practical applications. Our primary technical contribution in this work is the adaptation of various deconvolution methods for the explicit analysis of an arbitrary set of pressure transient test data which are distorted by wellbore storage — without the requirement of having measured sandface flowrates.
APA, Harvard, Vancouver, ISO, and other styles
6

McNiel, Patrick D. "Implicit and explicit measures." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/28132.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Collier, Benjamin Lee. "DOES OPTIMISM EXPLAIN HOW RELIGIOUSNESS AFFECTS ALCOHOL USE AMONG COLLEGE STUDENTS?" UKnowledge, 2006. http://uknowledge.uky.edu/gradschool_theses/398.

Full text
Abstract:
Alcohol use, because of its many negative consequences, is the number one health problem facing college students. Because of this, researchers have looked for factors associated with reduced drinking. Religiousness is one such factor. Religiousness is a complex, multidimensional construct, and while it tends to be negatively associated with alcohol use, research progress has been slow due to the tendency of researchers to poorly operationalize this construct and to design studies that fail to go beyond the bivariate relationship of religiousness and alcohol use. In order to address these shortcomings, this study will assess two dimensions of religiousness, religious commitment/motivation and religious consequences, and will test a model, presented by Koenig et al., (2001), that postulates religiousness works through mental health in order to reduce alcohol use. More specifically, this study will test optimism as a possible mediator and moderator of the relationship between religiousness and alcohol use. This study used archival data from 260 (202 female and 58 male) Caucasian, Christian, undergraduate college students who completed a battery of surveys that included measures of religiousness, optimism, and alcohol use. A factor analysis was conducted on one measure of religiousness, the short form of the Faith Maturity Scale. Also, optimism was tested as both a mediator and a moderator for both dimensions of religiousness in predicting alcohol use. Findings indicated optimism is not a significant mediator of the religiousness-alcohol use relationship because optimism did not meet the preconditions for a mediator as it was not associated with alcohol use in this sample. Also, optimism was not a significant moderator of religious commitment/motivation, but it did moderate the relationship of religious consequences and alcohol use. Finally, the two dimensions of religiousness interacted in predicting alcohol use. While both dimensions of religiousness were negatively associated with alcohol use throughout the findings, gender was a significant moderator in all significant interactions. Several implications follow from this study. First, greater specificity is needed regarding Koenig et al.s (2001) model specifically in regards to which third variables are associated with which health outcomes and to whom the model applies. Second, this study highlights the importance of a multidimensional assessment of religiousness. Finally, this study indicates specificity is needed regarding what religious interventions will be helpful for which genders.
APA, Harvard, Vancouver, ISO, and other styles
8

Andersson, Daniel, and Fredrik Saliba. "Virtual testing of self-piercing rivet connections." Thesis, Luleå tekniska universitet, Institutionen för teknikvetenskap och matematik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79405.

Full text
Abstract:
The automotive industry is currently trying to replace the conventional steels to lightweight materials such as aluminum or carbon fiber to meet all stricter emission targets. When using such materials, traditional joining methods, such as spot welds, could be difficult to use. Therefore, more focus has been put on self-piercing rivets (SPR).In whole car models used in crash simulations, substitution models are used to model SPR joints. It is important to calibrate these models for different load cases. Volvo Cars Corporation (VCC) are currently calibrating using time-consuming physical tests where the SPR joint is subjected to loads in different directions. To save time, a way of virtually evaluating the SPR joint strength is therefore sought after. To do this, a method was developed using non-linear FEM in LS-DYNA. The method was then used to perform sensitivity studies concerning friction, sheet thickness and rivet geometry.The method developed can be divided into three parts. The process simulation, where the rivet insertion was simulated. A springback analysis, where the material is allowed to springback, closer resembling the real behaviour. Finally, the three destructive tests, lap-shear, cross-tension and KS2, were built using the geometry and initial values from the springback.For the process simulation, an explicit solution was used. To handle the large deformations present during the event, r-adaptivity was used together with a kill-element-method to describe failure, based on CrachFEM or Gissmo. The following springback analysis was then performed using one implicit step.For the destructive tests, a solid element representation of the SPR joint was created using the geometry and initial values from the springback. A shell-solid hybrid model was used to keep the computational time low.Using the method, a good correlation was found both for the process- and the destructive test simulations when compared to experiments. Furthermore, it could be concluded that friction, sheet thickness and rivet geometry affects the SPR joint strength and characteristics.
APA, Harvard, Vancouver, ISO, and other styles
9

Liang, Yuli. "Contributions to Estimation and Testing Block Covariance Structures in Multivariate Normal Models." Doctoral thesis, Stockholms universitet, Statistiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-115347.

Full text
Abstract:
This thesis concerns inference problems in balanced random effects models with a so-called block circular Toeplitz covariance structure. This class of covariance structures describes the dependency of some specific multivariate two-level data when both compound symmetry and circular symmetry appear simultaneously. We derive two covariance structures under two different invariance restrictions. The obtained covariance structures reflect both circularity and exchangeability present in the data. In particular, estimation in the balanced random effects with block circular covariance matrices is considered. The spectral properties of such patterned covariance matrices are provided. Maximum likelihood estimation is performed through the spectral decomposition of the patterned covariance matrices. Existence of the explicit maximum likelihood estimators is discussed and sufficient conditions for obtaining explicit and unique estimators for the variance-covariance components are derived. Different restricted models are discussed and the corresponding maximum likelihood estimators are presented. This thesis also deals with hypothesis testing of block covariance structures, especially block circular Toeplitz covariance matrices. We consider both so-called external tests and internal tests. In the external tests, various hypotheses about testing block covariance structures, as well as mean structures, are considered, and the internal tests are concerned with testing specific covariance parameters given the block circular Toeplitz structure. Likelihood ratio tests are constructed, and the null distributions of the corresponding test statistics are derived.
APA, Harvard, Vancouver, ISO, and other styles
10

Pillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Martinez, Silas G. "Aggression and boxing performance: Testing the channeling hypothesis with multiple statistical methodologies." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1491929510847969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sarfan, Laurel D. "A multimethod approach and novel intervention: Testing relations between implicit and explicit experiential avoidance and social anxiety disorder symptoms." Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami159501616913879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Basson, Gysbert. "An explicit finite difference method for analyzing hazardous rock mass." Thesis, Stellenbosch : Stellenbosch University, 2011. http://hdl.handle.net/10019.1/17957.

Full text
Abstract:
Thesis (MSc)--Stellenbosch University, 2011.
ENGLISH ABSTRACT: FLAC3D is a three-dimensional explicit nite difference program for solving a variety of solid mechanics problems, both linear and non-linear. The development of the algorithm and its initial implementation were performed by Itasca Consulting Group Inc. The main idea of the algorithm is to discritise the domain of interest into a Lagrangian grid where each cell represents an element of the material. Each cell can then deform according to a prescribed stress/strain law together with the equations of motion. An in-depth study of the algorithm was performed and implemented in Java. During the implementation, it was observed that the type of boundary conditions typically used has a major in uence on the accuracy of the results, especially when boundaries are close to regions with large stress variations, such as in mining excavations. To improve the accuracy of the algorithm, a new type of boundary condition was developed where the FLAC3D domain is embedded in a linear elastic material, named the Boundary Node Shell (BNS). Using the BNS shows a signi cant improvement in results close to excavations. The FLAC algorithm is also quite amendable to paralellization and a multi-threaded version that makes use of multiple Central Processing Unit (CPU) cores was developed to optimize the speed of the algorithm. The nal outcome is new non-commercial Java source code (JFLAC) which includes the Boundary Node Shell (BNS) and shared memory parallelism over and above the basic FLAC3D algorithm.
AFRIKAANSE OPSOMMING: FLAC3D is 'n eksplisiete eindige verskil program wat 'n verskeidenheid liniêre en nieliniêre soliede meganika probleme kan oplos. Die oorspronklike algoritme en die implimentasies daarvan was deur Itasca Consulting Group Inc. toegepas. Die hoo dee van die algoritme is om 'n gebied te diskritiseer deur gebruik te maak van 'n Lagrangese rooster, waar elke sel van die rooster 'n element van die rooster materiaal beskryf. Elke sel kan dan vervorm volgens 'n sekere spannings/vervormings wet. 'n Indiepte ondersoek van die algoritme was uitgevoer en in Java geïmplimenteer. Tydens die implementering was dit waargeneem dat die grense van die rooster 'n groot invloed het op die akkuraatheid van die resultate. Dit het veral voorgekom in areas waar stress konsentrasies hoog is, gewoonlik naby areas waar myn uitgrawings gemaak is. Dit het die ontwikkelling van 'n nuwe tipe rand kondisie tot gevolg gehad, sodat die akkuraatheid van die resultate kon verbeter. Die nuwe rand kondisie, genaamd die Grens Node Omhulsel (GNO), aanvaar dat die gebied omring is deur 'n elastiese materiaal, wat veroorsaak dat die grense van die gebied 'n elastiese reaksie het op die stress binne die gebied. Die GNO het 'n aansienlike verbetering in die resultate getoon, veral in areas naby myn uitgrawings. Daar was ook waargeneem dat die FLAC algoritme parralleliseerbaar is en het gelei tot die implentering van 'n multi-SVE weergawe van die sagteware om die spoed van die algoritme te optimeer. Die nale uitkomste is 'n nuwe nie-kommersiële Java weergawe van die algoritme (JFLAC), wat die implimentering van die nuwe GNO randwaardekondisie insluit, asook toelaat vir die gebruik van multi- Sentrale Verwerkings Eenheid (SVE) as 'n verbetering op die basiese FLAC3D algoritme.
APA, Harvard, Vancouver, ISO, and other styles
14

Smith, Chelsea A. "Testing an Interference Competition Hypothesis to Explain the Decline of the Convergent Lady Beetle, Hippodamia convergens (Coleoptera: Coccinellidae), in Ohio." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339527346.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Parkes, Geoffrey S. "Can psychometric testing be used to explain, predict and measure behavioural competences and the funding resource orchestration of the entrepreneur?" Thesis, Aston University, 2015. http://publications.aston.ac.uk/26709/.

Full text
Abstract:
Financing is a critical entrepreneurial activity (Shane et al. 2003) and within the study of entrepreneurship, behaviour has been identified as an area requiring further exploration (Bird et al. 2012). Since 2008 supply side conditions for SMEs have been severe and increasingly entrepreneurs have to bundle or ‘orchestrate’ funding from a variety of sources in order to successfully finance the firm (Wright and Stigliani 2013: p.15). This longitudinal study uses psychometric testing to measure the behavioural competences of a panel of sixty entrepreneurs in the Creative Industries sector. Interviews were conducted over a 3 year period to identify finance finding behaviour. The research takes a pragmatic realism perspective to examine process and the different behavioural competences of entrepreneurs. The predictive qualities of this behaviour are explored in a funding context. The research confirmed a strong behavioural characteristic as validated through interviews and psychometric testing, was an orientation towards engagement and working with other organisations. In a funding context, this manifested itself in entrepreneurs using networks, seeking advice and sharing equity to fund growth. These co-operative, collaborative characteristics are different to the classic image of the entrepreneur as a risk-taker or extrovert. Leadership and achievement orientation were amongst the lowest scores. Three distinctive groups were identified and also shown by subsequent analysis to be a positive contribution to how entrepreneurial behavioural competences can be considered. Belonging to one of these three clusters is a strong predictive indicator of entrepreneurial behaviour – in this context, how entrepreneurs access finance. These Clusters were also proven to have different characteristics in relation to funding outcomes. The study seeks to make a contribution through the development of a methodology for entrepreneurs, policy makers and financial institutions to identify competencies in finding finance and overcome problems in information asymmetry.
APA, Harvard, Vancouver, ISO, and other styles
16

Vaught, Donna Rae. "The effects of explicit instructions and processing demands on comprehension monitoring of learning disabled and nondisabled children." Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/44694.

Full text
Abstract:
The present study explored whether explicit instructions would improve the ability of learning disabled and non-disabled children to monitor their comprehension for explicitly stated inconsistencies in stories particularly when the processing demands were increased. Specifically, 24 LD and 24 NLD third and fourth-grade boys listened to three prose passages. Half of each group received explicit instructions describing exactly what type of anomaly was present in the story and the other half received general instructions. The processing demands were manipulated by presenting the stories to each child under three different conditions. In the easy presentation, the premise and contradictory sentences were adjacent. In the distractor task presentation, the premise and contradictory sentences were adjacent, but the child had to simultaneously monitor a secondary task while listening to the story. In the hard presentation, the premise and contradictory sentences were separated by two filler sentences. Multiple measures of detecting inconsistencies and recall were obtained. Past research has determined that LD children exhibit a production deficiency for monitoring inconsistencies in prose passages (Bos & Filip, 1984). However, the present research found that LD children do not exhibit a production deficiency for monitoring explicitly stated inconsistencies in passages. Furthermore, LD and NLD children exhibited the same proficiency in identifying the inconsistencies and recalling the stories. This research provides additional information that must be considered before labeling the LD child as an “inactive learner" (Torgesen, 1980).
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
17

Nopote, Nomvuyiseko Minty. "Establishing explicit perspectives of personality for a sample of Xhosa-speaking South Africans." Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1145.

Full text
Abstract:
Cross-cultural assessment in South Africa has become more prominent since the first democratic elections held in April 1994, as stronger demands for the cultural appropriateness of psychological tests have been made. The use of psychometric testing, including personality assessment in the workplace, is now strictly controlled by legislation, among others the Constitution of the Republic of South Africa (Act 108 of 1996), the Labour Relations Act (66 of 1995), and the Employment Equity Act (55 of 1998), and the Health Professions Act (56 of 1974). The present study forms part of the development process of the South African Personality Inventory (SAPI), which seeks to explore the indigenous personality structure of all the 11 official language groups found in South Africa and to then develop a personality inventory based on this. The present study aimed to explore and describe the personality facets and clusters that were found among a sample of 95 Xhosa-speaking South Africans. An exploratory descriptive research method was used and participants were selected by means of non-probability purposive sampling. Data were gathered by administering a biographical questionnaire and a tape-recorded 10- item interview questionnaire. Content analysis was used to analyse and reduce the data obtained from interviews into personality descriptors. Of the 1872 personality-descriptive words obtained from the interview questions, 164 facets of different personality characteristics were finally configured as a consequence of a data-reduction process. These facets were further categorised into a total of 37 personality sub-clusters and nine personality clusters which were labelled as Extraversion, Soft-heartedness, Conscientiousness, Emotional Stability, Intellect, Openness, Integrity, Relationship Harmony and Facilitating. These clusters and their sub-clusters resonate well with significant aspects and values of the Xhosa culture (e.g., Ubuntu). There also seems to be a moderate correspondence between the clusters and sub-clusters identified in the Xhosa-speaking sample and factors of the Five-Factor Model, especially with respect to the six clusters of Extraversion, Soft-heartedness, Conscientiousness, Emotional Stability, Intellect, and Openness. Nonetheless, differences in the composition of the clusters/facets were found, some of which are due to the more unique facets and sub-facets of personality identified in the Xhosa-speaking sample. The limitations of the study are identified and suggestions are made for further research.
APA, Harvard, Vancouver, ISO, and other styles
18

Popov, Mikhail. "Analytic and Numerical Methods for the Solution of Electromagnetic Inverse Source Problems." Doctoral thesis, KTH, Electromagnetic Theory, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Okura, Eve Kiyomi. "A Study of the Correlation Between Working Memory and Second Language EI Test Scores." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/3025.

Full text
Abstract:
A principal argument against the use of elicited imitation (EI) to measure L2 oral proficiency is that performance does not require linguistic knowledge, but requires only rote memorization. This study addressed the issue by administering two tests to the same group of students studying English as a second language: (1) a working memory test, and (2) an English oral proficiency EI test. Participants came from a range of English language proficiency levels. A Pearson correlation was performed on the test results for each participant. The hypothesis was that English EI scores and working memory scores would not correlate significantly. This would suggest that the two tests do differ in what they measure, and that the English EI test does measure knowledge of the language to some degree. The results of the Pearson correlation revealed that there was a small positive correlation between working memory and English EI scores, but that it was not significant. There was also a significantly positive correlation between students' English EI scores and ELC level. These findings suggest that the English EI test fundamentally functions as a language test, and not significantly as a working memory test.
APA, Harvard, Vancouver, ISO, and other styles
20

Farias, Eliana Santos de. "Elabora??o de instrumento para identifica??o de alunos intelectualmente dotados por professores: estudo explorat?rio." Pontif?cia Universidade Cat?lica de Campinas, 2012. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/446.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:29:57Z (GMT). No. of bitstreams: 1 Eliana Santos de Farias.pdf: 1151108 bytes, checksum: d8a60100a4bf3e58e4d3db0ecf8a6ca5 (MD5) Previous issue date: 2012-02-27
The identification of students fitted and / or talent is characterized by a variety of possibilities. This identification may be multidimensional (areas, dimensions), multireferential (parents, teachers, psychologists and other staff), multi-method (methods, processes, tools), multi-temporal (time, stages of development), multi-contextual (tasks at school, at home and others), and multi-stage (stages or modules support). In this case, the figure of the teacher deserves, and effective participation through teacher nomination. In Brazil, there is no instrument with a favorable recommendation by the Federal Council of Psychology. Given this fact, the objective is to develop two studies, the first draw up a scale of appointing teachers for gifted and talented students as well as search for evidence of content validity, where as the second study, we sought evidence for the consistency of accuracy internal and validity based on internal structure and convergent and discriminant. After formulating the instrument (ENDI-p), the results of the first study indicate that the ENDI-p is ready for use, when looking at the kappa coefficient (km?dio= 0.778). The ENDI-p lost five items and had four items adapted to other areas other than the original. In the second study, by means of item-total correlation were removed 17 items from Endi-p showed that saturation index less than 0.30 (varimax rotation) which resulted in three major factors. With the removal of such items, the scale was a good value for the overall Cronbach's alpha (alfa= 0.801), but also for the three specific factors: F1 (alfa=0.892 with 23 items), F2 (alfa= 0.929 with 26 items), F3 (alfa= 0.727 with 7 items), given the goal 3. The Bartlett test of sphericity indicated a correlation between items (x2 0=4370,985; gl=1653; p<0,000). Since the measure of sampling adequacy for the application of factor analysis showed to be appropriate for the test of Kaiser-Meyer-Olkin (KMO = 0.498). The fourth objective was met through exploratory factor analysis (EFA) resulting in three factors. Objectives 5 and 6, about the search for evidence of validity based on relationships with external variables were partially met, which may suggest, for future studies using a larger sample.
A identifica??o de alunos dotados e/ou talentosos caracteriza-se por uma diversidade de possibilidades. Esta identifica??o pode ser multidimensional (?reas, dimens?es), multireferencial (pais, professores, psic?logos e outros agentes), multi-m?todo (meios, processos, instrumentos), multi-temporal (momentos, est?gios do desenvolvimento), multi-contextual (tarefas na escola, em casa e outros) e, multi-et?pica (fases ou m?dulos de apoio). Neste processo, a figura do professor merece destaque, e efetiva sua participa??o por meio de nomea??o docente. No Brasil, ainda n?o existe instrumento com recomenda??o favor?vel pelo Conselho Federal de Psicologia. Diante deste fato, objetivou-se por desenvolver dois estudos, no primeiro elaborar uma escala de nomea??o docente para alunos dotados e talentosos, bem como buscar por evidencias de validade de conte?do; j? no segundo estudo, buscou-se por evidencias de precis?o da consist?ncia interna, bem como validade baseada na estrutura interna e convergente e discriminante. Depois de elaborado o instrumento (ENDI-p), os resultados do primeiro estudo indicam que a ENDI-p est? pronta para uso, ao se observar o coeficiente de kappa (km?dio=0,778). A ENDI-p perdeu cinco itens e teve quatro itens adaptados para outras ?reas, que n?o as originais. No segundo estudo, por meio da correla??o item-total foram retirados 17 itens da ENDI-p que apresentaram ?ndices de satura??o inferiores a 0,30 (rota??o varimax) o que resultou em tr?s grandes fatores. Com a extra??o destes itens, a escala apresentou um bom valor para o Alpha de Cronbach geral (alfa=0,801), como tamb?m para os tr?s fatores espec?ficos: F1 (alfa=0,892 com 23 itens), F2 (alfa=0,929 com 26 itens), F3 (alfa=0,727 com 7 itens), atendendo ao objetivo 3. O teste de esfericidade de Bartlett indicou correla??o entre os itens (x2 0=4370,985; gl=1653; p<0,000). J? a medida de adequa??o da amostra para aplica??o da an?lise fatorial apresentou-se apropriada pelo teste de Kaiser-Meyer-Olkin (KMO=0,498). O quarto objetivo foi atendido por meio da an?lise fatorial explorat?ria (AFE) resultando em tr?s fatores. Os objetivos 5 e 6, a respeito da busca de evidencias de validade baseadas nas rela??es com vari?veis externas foram parcialmente atendidos, o que pode sugerir, para futuros estudos utilizar uma amostra maior.
APA, Harvard, Vancouver, ISO, and other styles
21

Siyepu, Sibawu Witness. "The use of Van Hiele's theory to explore problems encountered in circle geometry: a grade 11 case study." Thesis, Rhodes University, 2005. http://hdl.handle.net/10962/d1004777.

Full text
Abstract:
The research presented in this thesis is a case study located in the interpretive paradigm of qualitative research. The focus is on the use of van Hiele's theory to explore problems encountered in circle geometry by grade 11 learners and making some policy recommendations concerning the curriculum structure and teaching of the geometry at all grades. The interpretation is based to the learners' background in geometry i.e. their prior knowledge and experience of learning geometry. The study was carried out over a period of three years. The data collection process took a period of two months (April and May 2003) with a group of 21 grade 11 mathematics learners in a rural senior secondary school in the Eastern Cape. The researcher used document analysis, worksheets, participants' observation, van Hiele tests, a questionnaire and semi-structured interviews to collect data. The study showed that the structure of the South African geometry syllabus consists of a some what disorganized mixture of concepts. It is not sequential and hierarchical and it sequences concepts in a seemingly unrelated manner. The study revealed that the South African high school geometry curriculum is presented at a higher van Hiele level than what the learners can attain. The findings of the study showed that many of the grade 11 learners were under-prepared for the study of more sophisticated geometry concepts and proofs. Three categories of reasons could be ascribed to this: Firstly, there was insufficient preparation of learners during the primary and senior phases. Secondly the study indicated that there is overload of geometry at the high school level in the South African mathematics curriculum. Thirdly, the over-reliance on the traditional approach to teaching geometry, poor presentation of mathematical technical concepts and language problems, were identified as possible additional reasons for the poor learner understanding of geometry in general and circle geometry in particular. The study recommends that the structure of the South African geometry curriculum should be revisited and redesigned. Teachers should be empowered and developed to be more effective in teaching geometry through further studies in mathematics and in-service workshops. They should also be engaged in the process of implementing the van Hiele's theory in the teaching of geometry in their classrooms.
APA, Harvard, Vancouver, ISO, and other styles
22

Story, Virginia. "The Correlation Between the ACT, Inc. EXPLORE Test and Student Success in High School Advanced and Advanced Placement Mathematics Courses." Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/etd/3584.

Full text
Abstract:
The purpose of this study was to compare the relationship between the mathematics portion of the EXPLORE test with students successes in advanced and Advanced Placement(AP) mathematics courses in high school. The data was collected from a rural Tennessee school system consisting of five years of data among graduated seniors. Analysis was completed to determine the difference between the two county high schools in advanced coursework. The findings of this study concluded a positive correlation between EXPLORE scores and the frequency of students who took advanced mathematics courses. Positive correlation between EXPLORE scores and student successes in advanced courses was also concluded. Two-sample t-test showed the school with the less frequency had a higher mean of successes in advanced mathematics. This school system consistently scored above the national average in the mathematics portion of the EXPLORE test. Ultimately, standardized test results can prove to be a means for guiding students toward challenging mathematics courses.
APA, Harvard, Vancouver, ISO, and other styles
23

Hsu, Ming-Yuan, and 許明淵. "Penetration Testing Approach by Mutating Sled of Exploit." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/61977630430195970741.

Full text
Abstract:
碩士
中原大學
資訊工程研究所
96
A worm is usually used to speedy spread the exploit code to host in the internet, and if it utilizing the encrypting technique, would causes the serious disasters. Since the traditional IDS are not able to detect the shellcode of the encrypted polymorphic worm. For against the polymorphic worm, we need to research how the polymorphism could mutate to evade the current detection mechanism. In this paper, we analyses and used the encryption and polymorphic decoder to test whether the IDS Snort, a signature-based IDS could detect out penetration testing tool or not. We propose a scheme to mutate the signature of a worm, to let any byte in sled and shellcode of the worm could be executed normally on destination to evade the IDSs like STRIDE or APE. Finally, we use Sasser and Blaster worms as examples to blend into normal traffic in our experiment and emulate a penetration test to IDSs, Snort and STRIDE. According to the emulation results, our penetration testing tool could be successful possess the exploit code and evading the IDS to the end host above 90%.
APA, Harvard, Vancouver, ISO, and other styles
24

Chen, Hung-Wen, and 陳泓文. "A Systematic Exploit Strengthening Method Integrating with Penetration Testing Framework." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/90262424765902199873.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
103
Due to software quality issues, recent attacks on various systems are getting serious, and the software security issues therefore become an important research topic. These attacks on the software vulnerability will not only endanger the information infrastructure, but also impact the human safety. To improve the overall robustness of the system, we need a penetration test system to audit related systems. We have proposed the concept of the exploit toolchain to automate the whole process of fuzzing, exploitation, and post-exploitation integration with the metasploit framework. For the exploitation process, we must be able to bypass the recent protections and mitigations of the operating system, for example ASLR (Address space layout randomization) and DEP (Data Execution Prevention). We have enhanced the ROP (Return-oriented programming) technique to bypass ASLR and DEP protections by searching gadgets with larger sizes. We evaluate our system by generating ROP payloads from ten target programs in the size greater than 100K bytes. Compared with the results of another popular ROP tool, called ROPgadget, only three targets have been succeeded. We can also integrate the generated exploits into the Metasploit framework.
APA, Harvard, Vancouver, ISO, and other styles
25

Cortez, Sánchez Joshep Joel. "Análisis de binarios usando ejecución simbólica." Bachelor's thesis, 2018. http://hdl.handle.net/11086/11382.

Full text
Abstract:
Tesis (Lic. en Ciencias. de la Computación)--Universidad Nacional de Córdoba, Facultad de Matemática, Astronomía, Física y Computación, 2018.
En el presente trabajo se estudia, analiza y contribuye en el uso de técnicas y herramientas modernas para el análisis de programas ejecutables binarios. Hacemos énfasis en el uso de ejecución simbólica, mencionando algunas herramientas desarrolladas con el fin de explotar esta técnica. Las principales herramientas estudiadas, yy sobre las que se profundiza en este trabajo son Angr y Manticore. Esta y otras técnicas se encuentran detalladas en +[SWS 16]El trabajo emplea como caso de estudio parte del proyecto Insecure Programming desarrollado por Gerardo Richarte en el año 2001 en el que se pueden observar distintas clases de vulnerabilidades sobre distintos programas, siendo nuestro objetivo principal analizar los mismos y tratar de aprovechar dichas vulnerabilidades para obtener control del flujo del programa.
In the present document, we study, analize and contribute in the use of modern techniques and tools for program analysis in binary fille programs. We emphasize about symbolic execution , and we describe developed tools with the purpose of exploiting this technique. In this work we will focus particularly on Angr and Manticore tools. This and another techniques are explained on [SWS 16].This work use as dataset part of Insecure Programming project developed by Gerardo Richarte in 2001 where we may observe diferent kinds of vulnerabilities in the programs, our main objective is to analyze them and try to take advantage of these vulnerabilities to obtain control over the flow of program execution.
APA, Harvard, Vancouver, ISO, and other styles
26

Yang, Shao-Fu, and 楊少輔. "Explicit Testing of Small Clock Delay Fault." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/b42qsa.

Full text
Abstract:
碩士
國立清華大學
電機工程學系
103
A clock network in a 3D-IC is not only difficult to design, but also challenging to test. For high-performance designs with a rigorous clock-skew requirement, studies have shown that small defects in a clock tree network could lead to unexpected failures in the field and thus it need to be identified during the manufacturing test or functional test in order to improve the yield and maintain the reliability. In this thesis, we present a novel test method to determine if a clock network has any small delay fault. This method does not require any change of the clock network, and it is capable of detecting a delay fault as small as 40ps through outlier analysis, while locating the FFs affected by the fault in the meantime. Furthermore, the overall test process does not involve loading of test patterns and thus can be conducted very easily by a Built-In Self-Test (BIST) controller when it needed.
APA, Harvard, Vancouver, ISO, and other styles
27

Chakrabarti, Sujit Kumar. "Using Explicit State Space Enumeration For Specification Based Regression Testing." Thesis, 2008. http://hdl.handle.net/2005/738.

Full text
Abstract:
Regression testing of an evolving software system may involve significant challenges. While, there would be a requirement of maximising the probability of finding out if the latest changes to the system has broken some existing feature, it needs to be done as economically as possible. A particularly important class of software systems are API libraries. Such libraries would typically constitute a very important component of many software systems. High quality requirements make it imperative to continually optimise the internal implementation of such libraries without affecting the external interface. Therefore, it is preferred to guide the regression testing by some kind of formal specification of the library. The testing problem comprises of three parts: computation of test data, execution of test, and analysis of test results. Current research mostly focuses on the first part. The objective of test data computation is to maximise the probability of uncovering bugs, and to do it with as few test cases as possible. The problem of test data computation for regression testing is to select a subset of the original test suite running which would suffice to test for bugs probably inserted in the modifications done after the last round of testing. A variant of this problem is that of regression testing of API libraries. The regression testing of an API is usually done by making function calls in such a way that the sequence of function calls thus made suffices a test specification. The test specification in turn embodies some concept of completeness. In this thesis, we focus on the problem of test sequence computation for the regression testing of API libraries. At the heart of this method lies the creation of a state space model of the API library by reverse engineering it by executing the system, with guidance from an formal API specification. Once the state space graph is obtained, it is used to compute test sequences for satisfying some test specification. We analyse the theoretical complexity of the problem of test sequence computation and provide various heuristic algorithms for the same. State space explosion is a classical problem encountered whenever there is an attempt of creating a finite state model of a program. Our method also faces this limitation. We explore a simple and intuitive method of ameliorating this problem – by simply reducing the size of the state vector. We develop the theoretical insights into this method. Also, we present experimental results indicating the practical effectiveness of this method. Finally, we bring all this together into the design and implementation of a tool called Modest.
APA, Harvard, Vancouver, ISO, and other styles
28

Tang, ching-lin, and 唐慶麟. "The Triangular Testing Method to Explore Quality Hotel’s Catering Services." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/90017227642900849272.

Full text
Abstract:
碩士
育達科技大學
休閒事業管理系碩士班
102
ABSTRACT In This Study, According to The Triangular Testing Method to Explore Quality Hotel’s Catering Services. Studying Purposes Are to Understand Each Hotel’s Catering Service Quality Procedure & Each Hotel How to Promote Their Food & Beverage Service Operational Strategy. The Studying Results Showed That These Hotels Catering Services Are Completely Qualify International Hotel Standard, Suitable for 4 or 5 Stars Hotel. All of Them Are Very Respect Customer’s Satisfaction, about Customer’s Complaints Can Be Settled Immediately and Report to The Management People. The Main Complaints Were Two, Such as Meals Problem & Service Speed, Solution Ways Are Fully Authorized Their Management to Handle& Make up After Observation, Standing on The Guest Position ,The Research Worker Did The Observation form to Apply Hotel’s Management to Make A Reference & Improve Operational Details. Each Hotel’s Operational Strategies Are Focus on The Restaurant Design & Offer Specialty F&B to The Guest, The Working Problem Is Short of Manpower.
APA, Harvard, Vancouver, ISO, and other styles
29

Calogeropoulos, Catherine. "Refining, testing and evaluating spatially explicit models for wind dispersed plants." Thesis, 2005. http://spectrum.library.concordia.ca/8553/1/NR09950.pdf.

Full text
Abstract:
Dispersal is the process by which plants expand their range and explore new habitats. When local habitats become inhospitable, dispersal ability becomes the key mechanism allowing species to evade extinction. Despite the efforts in obtaining empirical dispersal curves and developing sophisticated spatial models, the main issue that remains unresolved is that of scale. Although predictions at the local scale are better than those aiming to describe dispersal at greater distances, they remain too unrealistic to be used in subsequent models that govern growth, mortality and resource exploitation. My first chapter aims to improve predictions at the local scale by refining the parameters of a spatially explicit model. I determined the effect of substituting basal area for cone production as a proxy for seed output. The results showed that the r2 from the regression of predicted versus observed densities increased by 5% for seeds and 15% for seedling simulations. Next, I determined the effects of allowing the horizontal wind speeds to vary. The results showed that correlations of observed vs. predicted recruitment are a function of the assumed meteorological conditions used to drive them. My second chapter tested the ability of inverse modeling to predict recruitment both at the stand level and beyond. Using the maternally derived DNA from seed coats of the North American tree species Pinus strobus, I compared the most common approach (inverse modeling) with the newer but far more time-consuming method of using microsatellite markers. I showed that inverse modeling grossly underestimates seed dispersal potential in this species and thus caution against its continued use. With the aim to improve spatial models, this thesis would not be complete without an examination of the role of wind on seed abscission---the precursor to dispersal. Previous attempts to link the probability of abscission with meteorological phenomena were set within averaging times that exceeded the time frame of seed abscission (<1 second) by at least 15 times. Using 1-minute averaging times, I showed that seed release, for the wind dispersed tropical tree Ceiba aesculifolia, is proportional to the square of the horizontal wind speeds. Furthermore, the data showed that this relationship is highly time sensitive where a correlation is no longer evident at averaging times exceeding 25-minute intervals. This thesis is concluded by showing that updrafts are much more effective at causing seed release than all other wind directions (i.e. downdrafts and horizontal). What it can not show, however, is the frequency of upward abscission events within a forest environment and how these results can be implemented within spatially explicit models that predict the dispersal potential of seeds traveling horizontally or vertically. Indeed, this can be addressed in future work.
APA, Harvard, Vancouver, ISO, and other styles
30

Lee, Cyuan, and 李權. "Explore the integration of heterogeneous systems in hybrid dynamic testing technology." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/46494737469577606585.

Full text
Abstract:
碩士
國立清華大學
動力機械工程學系
102
Hardware-in-the-loop simulation (HILS) and dynamically substructured system (DSS) techniques are generally classified as hybrid methods for performance evaluation of engineering systems, combining both numerical simulation and hardware experiment parts. Principally, HILS techniques are widely applied to testing of power electronics and vehicle systems, while DSS methods emphasise on civil and structural engineering application. Although the two strategies are present in different between them are briefly discussed in this paper, in order to facilitate cross-literature communication about testing methodologies. To employ DSS tests, additional actuator systems and sensor devices are required, which interface the numerical and physical subsystems. However, the non-ideal actuator dynamics sometimes destabilise the test. Therefore, various modelling and control techniques are proposed in the literature to deal with DSS synchronisation control problems since 1999. The objective of this paper aims at discussing recent technical development concerning the modelling and control of DSS tests, including the following issues: parallel vs. series structures and delay differential equations vs. ordinary differential equations for DSS modelling, homogenous vs. heterogeneous concepts for dynamic analysis, and geometry-based vs. dynamics-based techniques for control development. With a series of literature review, theoretical analysis and experimental verification, the paper combines HILS with DSS and integrates their structure and control method. Then, discuss the difference between these two systems. Verify the restriction of dynamics proposed from literature by theoretical analysis and experimental application. Through the above content, this thesis will develop the theory which is more practical of engineering and experiment framework by the integration of hybrid test.
APA, Harvard, Vancouver, ISO, and other styles
31

Relvas, Sofia Murteira. "Testing the Activity Budget Hypothesis to explain sexual segregation in red deer." Master's thesis, 2020. http://hdl.handle.net/10316/92160.

Full text
Abstract:
Dissertação de Mestrado em Ecologia apresentada à Faculdade de Ciências e Tecnologia
Como um enigma complexo ainda por desvendar, a segregação sexual tem sido bastante estudada nos últimos anos, sobretudo em espécies de ungulados sexualmente dimórficas. Para uma melhor compreensão deste conceito, várias hipóteses foram propostas ao longo dos anos, em torno de duas componentes principais: segregação de habitat e segregação social. No entanto, nenhuma foi exclusivamente capaz de explicar este fenómeno, o que indica que múltiplos fatores se encontram na base da sua origem.Segundo a hipótese da sincronia de atividades, machos e fêmeas apresentam diferenças nos padrões de atividade devido a diferenças no dimorfismo no tamanho corporal, necessidades energéticas e eficiência digestiva. Este estudo tem, então, como objetivo avaliar os pressupostos que servem de base à hipótese da sincronia de atividades, de modo a explicar os padrões de segregação sexual. Através da análise de vídeos e fotos de armadilhas fotográficas, colocadas na Serra da Lousã, foi possível observar os diferentes padrões de atividade e segregação do veado. Os nossos resultados mostraram que machos e fêmeas apresentam uma segregação sexual acentuada ao longo do ano, exceto na época de acasalamento, altura em que machos e fêmeas mostram uma tendência para se agregarem em grupos mistos. Relativamente aos padrões de atividade, os resultados evidenciaram um padrão de atividade crepuscular e noturna por parte do veado. Em termos gerais, o maior grau de sincronização de atividades entre machos e fêmeas foi na época de acasalamento, o que é esperado face aos padrões de agregação e segregação sexual reportados. Deste modo, os nossos resultados apoiam a hipótese de sincronia de atividades, porém, outros estudos verificaram o oposto, e, por isso devemos ter em conta outros fatores para uma melhor interpretação da segregação sexual.
As a complex puzzle yet to be unveiled, sexual segregation has been extensively studied in recent years, especially in sexually dimorphic ungulate species. For a better understanding of this concept, several hypotheses have been proposed over the years, around two main components: habitat segregation and social segregation. However, none has been exclusively able to explain this phenomenon, which indicates that multiple factors are at the base of its origin. According to the activity budget hypothesis, males and females have differences in activity patterns due to differences in body size dimorphism, energy requirements and digestive efficiency. This study, then, aims to assess the assumptions that serve as the basis for the activity budget hypothesis, to explain the patterns of sexual segregation.Through the analysis of videos and photos from camera traps placed in the Lousã Mountain, it was possible to observe the different activity and segregation patterns of the red deer. Our results showed that males and females show marked sexual segregation throughout the year, except in the mating season, when males and females show a tendency to aggregate in mixed groups. Regarding activity patterns, the results showed a pattern of twilight and nocturnal activity by the red deer. In general terms, the highest degree of activity overlap between males and females was in the mating season, which is expected given the reported sexual aggregation and segregation patterns.In this way, our results support the activity budget hypothesis, however, other studies verified the opposite, and, therefore, we must take into account other factors for a better interpretation of sexual segregation.
APA, Harvard, Vancouver, ISO, and other styles
32

Barnes, David Milller. "Depression and Distress in Blacks and Whites in the US: Testing a Hypothesis to Explain a Double Paradox." Thesis, 2015. https://doi.org/10.7916/D8NK3CRB.

Full text
Abstract:
This dissertation tested a methodological explanation for a double paradox in psychiatric epidemiology: a lower prevalence of major depression in Blacks than Whites in the US, coupled with equal and higher levels of psychological distress in Blacks. The first paradox is a lower prevalence of major depression in Blacks than Whites. The second paradox is the discordant results from comparing Blacks and Whites on depression and distress. These are paradoxes from the vantage points of, respectively, dominant theory and conceptual and empirical understandings of the relationship between disorder and distress. The idea that Blacks in the US express depression and distress more somatically than Whites has been in the literature for decades. If true, it could explain the double paradox. A formal diagnosis of major depression requires endorsing a screening symptom, either sad mood or anhedonia, which are both psychological rather than somatic symptoms. To the extent Blacks express depression more somatically than Whites, depression could be disproportionately undercounted in Blacks due to a lower likelihood of Blacks endorsing a screening symptom, adjusting for underlying levels of depression. Measures of distress share symptom content with the diagnostic criteria for depression but typically do not require endorsing screening symptoms. Thus, if Blacks do somatize depression and distress more somatically than Whites, the depression algorithm may produce a greater undercount of depression in Blacks than Whites, whereas a similar undercount would not occur with distress measures. Accordingly, both paradoxes could be explained. This dissertation has three main parts. In part one, the double paradox is documented in a systematic literature review. Using data from two nationally representative household samples, parts two and three test whether Blacks express depression and distress, respectively, more somatically than Whites, whether this accounts for a lower likelihood of Blacks endorsing a screening symptom, and if (part two only) this explains the Black White depression paradox. The systematic review provides robust evidence of the double paradox. Parts two and three reveal slightly higher levels, respectively, of depression and distress somatization in Blacks than Whites. However, the underlying structure of these small differences provides no evidence of a broad somatization hypothesis in Blacks. Moreover, no evidence is found that the somatization difference inhibits Blacks' endorsement of screening symptoms. One unexpected finding points to subsequent steps to take towards resolving the double paradox.
APA, Harvard, Vancouver, ISO, and other styles
33

Da-QuanLuo and 羅達權. "To Explore Business Model and Competitive Strategy of Electrostatic Discharge Testing Equipment Distributor- The Case of K Company in Taiwan." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/68849412802144639983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Türk, Pereira Philippe. "Testing the sour-grapes effect - how food deprivation and reward expectancy change implicit and explicit food-liking and food-wanting." Doctoral thesis, 2010. https://nbn-resolving.org/urn:nbn:de:bvb:20-opus-50591.

Full text
Abstract:
The aim of the present thesis was to explore how food deprivation and reward expectancy versus frustrative nonreward change implicit and explicit food-liking and food-wanting. As a result, Experiment 1-3 were successful in revealing that liking- and wanting-related associations toward food stimuli dissociate as a function of food deprivation, given that participants were not rewarded with real food during the experiment. More specifically, whereas food-deprived participants showed more wanting-related associations toward food stimuli than satiated participants, the liking-related associations did not differ across both conditions of hunger. Overall, this effect could be replicated in 3 experiments using different manipulations of nonreward versus reward expectancy. However, neither food deprivation nor nonreward were found to influence participants’ self-reported mood and frustration. Moreover, participants of Experiment 2 anticipating food consumption showed the same liking- and wanting-related responses due to food deprivation than participants in the nonreward condition. But providing participants with individual control over food consumption abolished the dissociation of liking- and wanting-related associations. In this condition, however, participants’ liking- and wanting-related associations were not moderated by need state, maybe due to the (partial) consumption of snack food before the implicit attitude assessment. This, in turn, may have reduced participants’ disposition to respond with more liking- and wanting-related associations when being hungry. Finally, Experiment 4 revealed that the presentation of need-relevant vs. need-irrelevant stimuli prompted different liking-related associations depending on the time participants had fasted before the experiment. Specifically, it could be demonstrated that whereas moderately-hungry compared to satiated participants responded with more positive associations toward need-relevant stimuli, 15 hours food-deprived participants responded with more negative associations compared to moderately-hungry and satiated participants. Respectively, a significant curvilinear function of need state was obtained. In addition, participants were found to immediately respond more negatively to need-irrelevant stimuli as soon as they became moderately hungry, evidencing devaluation effects (see Brendl, Markman, & Messner, 2003) to also occur on an implicit level of responding. Contrary to the implicit liking- and wanting-related evaluations, self-reported explicit food-liking and food-wanting did not dissociate as a function of food deprivation and nonreward, revealing that participants’ explicit self-reports of food-liking and food-wanting did not mirror their implicit responses. As the most important result, it could be demonstrated that explicit food-liking and food-wanting varied positively as a function of need state. The results were discussed on the background of different theoretical assumptions on the malleability of implicit and explicit need-relevant attitudes (e.g. motivational theories, frustrative nonreward)
Die vorliegende Dissertation beschäftigt sich mit der Frage, wie Nahrungsdeprivation und Belohnungserwartung bzw. frustrative nonreward sich auf implizites und explizites essensbezogenes Liking und Wanting auswirkt. Experimente 1-3 konnten aufzeigen, dass hungrige Probanden ohne Konsumerwartung auf nahrungsbezogene Stimuli implizit stärker mit Wanting nicht aber mit Liking reagierten als satte Probanden. Implizites Liking unterschied sich dabei nicht in Abhängigkeit des Bedürfniszustandes der Probanden. Dabei führten weder Nahrungsdeprivation noch ausbleibende Belohnungserwartung dazu, dass Probanden mehr Frustration oder negative Stimmung berichteten. Stattdessen berichteten sie in allen Bedingungen eine generell positive Stimmung. Darüber hinaus zeigten hungrige Probanden mit Konsumerwartung in Experiment 2 sogar die gleichen impliziten liking- und wanting-bezogenen Einstellungen wie Probanden ohne Konsumerwartung. Sobald den Probanden jedoch eigene Kontrolle über den Konsum gegeben wurde, so verschwand diese Dissoziation (Experiment 3). In diesem Fall jedoch wurden die impliziten liking- und wanting-bezogenen Antworten auch nicht durch Nahrungsdeprivation moderiert, ein Ergebnis, das möglicherweise auf eine bereits eintretende Sättigung aufgrund des Konsums vor der indirekten Messung zurückzuführen sein könnte. Zudem legt Experiment 4 nahe, dass auch implizites nahrungsbezogenes Liking sensitiv zu sein scheint für Veränderung des Bedürfniszustandes. Moderat hungrige (2 Stunden nüchtern) im Vergleich zu statten Probanden zeigten dabei positivere implizite Einstellungen gegenüber bedürfnisrelevanten Reizen, stark deprivierte Probanden (15 Stunden nüchtern) zeigten jedoch tendenziell negativere implizite Einstellungen als moderat hungrige und satte Probanden. Dieses Muster konnte zusätzlich durch eine signifikante kurviliniare Funktion des Bedürfniszustandes statistisch abgesichert werden. Als ein interessanter Nebenbefund konnte zusätzlich gezeigt werden, dass bedürfnisirrelevante Reize schon bei moderatem Hunger unmittelbar negativer bewertet werden. Somit konnte der Devaluationseffekt von Brendl, Markman, und Messner (2003) mit indirekten Maßen repliziert werden. Im Gegensatz zu den impliziten Einstellungen, dissoziierten das selbstberichtete essensbezogene Liking und Wanting nicht in Abhängigkeit der Nahrungsdeprivation und Konsumerwartung. Stattdessen zeigten hungrige Probanden sowohl positivere liking- als auch wanting-bezogene Einstellungen als satte Probanden. Diese Ergebnisse werden vor dem Hintergrund unterschiedlicher theoretischer Annahmen zur Sensitivität impliziter und expliziter bedürfnisbezogener Einstellungen (z.B. motivationale Theorien, frustrative nonreward) diskutiert
APA, Harvard, Vancouver, ISO, and other styles
35

Hou, Ju-Jung, and 侯如容. "Explore Hidden but Possibly Potential Drug- Drug Interactions of New Approved Drugs Using Text Mining Technique -Hypothesis Generation and Hypothesis testing." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/54564002094352465572.

Full text
Abstract:
碩士
高雄醫學大學
藥學研究所碩士在職專班
93
Drug interactions are worth to emphasize in safety use of drugs. A number of drugs are introduced into the market every year, and patients who have been identified drug-drug interactions between the new approved drug and other medications would be reported in medical literature. Based on safety concern of patients, to discovery drug interactions beforehand is very important. So we attempted to find a way to uncover some possible and hidden drug-drug interactions of a new drug. We used a text mining tool created by Swanson and Smalheiser called ARROWSMITH that facilitates the discovery of plausible hypotheses linking findings across specialties. By creating suggestive juxtapositions of searched and filtered records, ARROWSMITH is a useful tool for scientific discovery but not in itself a mechanism of scientific discovery. Digoxin and repaglinide were used as the model drugs to validate if ARROWSMITH could satisfy what we need in the area of identifying drug-drug interactions. Then we studied drug-drug interactions of some newly approved drugs, which included rosuvastatin, duloxetine, eplerenone, ezetimibe and memantine. In summary, we have found some hidden but possibly potential drug-drug interactions with rosuvastatin or duloxetine and they must further evaluation to comfirm. Based on results of eplerenone, ezetimibe and memantine, we could not uncover some possible and hidden drug interactions for those drugs.
APA, Harvard, Vancouver, ISO, and other styles
36

Lin, Meng-Fei, and 林孟斐. "Explore the Relationship of Pet Attachment, the attitude of Traveling with Pet and Happiness: Testing the Moderating Effect of Pet Travel Products." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/55e6p9.

Full text
Abstract:
碩士
亞洲大學
休閒與遊憩管理學系碩士在職專班
102
Due to emotional pet attachment, owners are more willing to travel with their pets. Owners can release their bodies’ and spiritual stresses by traveling with their pets, thus bring spiritual happiness, healthiness and well-being. Furthermore, the purpose of hotel business is to build continual operation successfully through providing excellent facilities, friendly services and happiness to owners while they are traveling with pets. The purpose of this research is to investigate the correlation among the pet attachment, the attitude of travelling with pets and happiness. We use pet travelling products as a moderator variable to explore the outcome effect of happiness. The results of this research can be used as management references for pet hotel business. The study population was sampled from aged over 20 in Taiwan of the Republic of China who had experiences of travelling with their pets overnight. We used questionnaires as an intended sampling method. The listed questions include pet attachment rating scale, the attitude of travelling rating scale, pet travelling products rating scale, the rating scale of happiness, and their personal profiles. In the research period, we issued 580 copies of questionnaires with 524 effective sample sizes (effective rate 90.34%). We utilize SPSS 18.0 statistical analysis tool for data analysis by methods of descriptive statistics, confidence interval analysis, factor analysis, Pearson correlation, and hierarchical multiple regression analysis. We conclude the following findings: (1)The pet attachment has the positive correlation with the attitude of travelling significantly. (2)The attitude of travelling has strong positive correlation with happiness. (3)The differentiated travelling products such as pet hotels’ facilities and friendly services contribute insignificantly moderating effects of happiness. (4)The pet attachment and happiness is positively and significantly correlated. (5)The attitude of travelling has moderatecorrelation with pet attachment and happiness.
APA, Harvard, Vancouver, ISO, and other styles
37

WU, CHIH-KANG, and 吳致綱. "Using Technology Acceptance Model to Explore the User's Willingness to Pay for Online Testing Systems: The Empirical Study of Yamol Online Test." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/mka86y.

Full text
Abstract:
碩士
國立高雄師範大學
經營管理碩士在職專班
107
Assessment and testing have important links in learning activities. Online quiz sites can provide more convenient and efficient evaluation methods and even personalized learning services. Nowadays, the extensive use of digital learning is one of the important ways of learning. Based on this, this research uses the technology acceptance model to explore the user's willingness to pay for online testing systems. Treat System quality and content quality as external variables. Analyze the relationship between variables and perceived ease of use, perceived usefulness, using satisfaction, and willingness to pay. Provide research results to website administrators as a reference for management and development in the future. This study takes the users of the Yamol online test website as the research object. Data collection is conducted by online survey. A total of 3,232 valid questionnaires were obtained. Analysis of statistical tools such as descriptive statistics, t-test, and regression analysis are employed for the empirical examination. The results of the study include the following: (1) System quality significantly positively affects perceived usefulness. (2) System quality significantly positively affects perceived ease of use. (3) Contents quality significantly positively affects perceived usefulness. (4) Contents quality significantly positively affects perceived ease of use. (5) Perceived ease of use significantly positively affects perceived usefulness. (6) Perceived usefulness significantly positively affects willingness to pay. (7) Perceived usefulness significantly positively affects using satisfaction. (8) Perceived ease of use significantly positively affects using satisfaction. (9) Using satisfaction significantly positively affects willingness to pay. Finally, this study proposes that managerial work should include: (1) Continuous improvement of the using satisfaction of the test system. (2) Strengthening the search of various test questions. (3) Optimizing the design of the website-user interface. (4) Enhancing advanced features that paid users can enjoy. Another suggestion for future academic research is that the subsequent researchers can broaden the test platform of other multi-attributes to obtain a wider range of practical applications and scope.
APA, Harvard, Vancouver, ISO, and other styles
38

Vanderlee, Mary-Louise. "Pilot testing a causal model that includes clusters of parent, child, teacher, and classroon variables, to explore the mechanisms underlying class size effects." 2004. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=94557&T=F.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Türk, Pereira Philippe [Verfasser]. "Testing the sour-grapes effect : how food deprivation and reward expectancy change implicit and explicit food-liking and food-wanting / vorgelegt von Philippe Türk Pereira." 2010. http://d-nb.info/1005932905/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Chen, Hsiao-Pei, and 陳曉珮. "Discuss the Co-opetition Strategy of Packaging and Testing industry between Mainland and Taiwan And from perspective of Financial Analysis to Explore Operating Performance – ASE and JCET." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/p42439.

Full text
Abstract:
碩士
國立交通大學
管理學院財務金融學程
105
This study is based on case SWOT analysis to analyze the competitive advantages and disadvantages of Taiwan and the mainland leading manufactures of packaging and testing and to explore the possibilities of competitive strategies. From the perspective of earnings analysis of invividual companies operating results found that the human resource, R & D technology and high-end product process technology, the ASE is better than the JCET. On the other hand, the JCET with national financial support and high capital market benefits has an absolute advantage compared to the ASE. The two companies have complementary and collaboration space cooperation.
APA, Harvard, Vancouver, ISO, and other styles
41

Weideman, Junita Grezelda. "The use of the draw a person (DAP) and DAP variations to explore the self in educational psychology." Diss., 2012. http://hdl.handle.net/10500/6038.

Full text
Abstract:
During her theoretical training as an educational psychologist, the researcher was intrigued and fascinated by the expositions on the functioning of the self. With this study she pursued her goal to gain a clearer understanding of the formation and development of the self in a child, with the focus on the child in middle childhood (6 -12 years). In this study, she mainly focused on understanding the connection between the three crucial components of the self, self-concept and self-esteem. Her passion for art inspired her to be inventive and apply artistic creative methods of drawing, painting and clay human modelling as projective means to access the child’s unconscious mind, revealing pivotal experiences and emotions, revealing how the child relates to his or her self. According to this qualitative arts-based research study, the DAP (Draw a Person) and variations of PAP (Paint a Person) and CAP (Create a Person) with the use of appropriate DAP, PAP and CAP questionnaires, seem relevant therapeutic projective measures to assist in educational psychology in exploring the child’s self.
Further Teacher Education
M. Ed. (Guidance and Counselling)
APA, Harvard, Vancouver, ISO, and other styles
42

Izaks, Jill. "A study of the effects of an undergraduate vocabulary programme on vocabulary development and academic literacy." Diss., 2015. http://hdl.handle.net/10500/19204.

Full text
Abstract:
Text in English
This study examined the vocabulary and academic literacy levels of undergraduate students at the University of Namibia, as well as the effects of an explicit and an implicit vocabulary programme on vocabulary development and academic literacy. The study also sought to determine the effects of the programmes on students’ attitudes about vocabulary and explicit vocabulary strategies. The relationship between students’ vocabulary size, academic literacy levels, and their self-assessment of their vocabulary knowledge was examined. Many students had not reached the desired word mastery and did not have adequate academic literacy skills to cope with the demands of university. Students in the explicit group modestly improved receptive vocabulary knowledge at the end of the intervention but there was no significant improvement in academic literacy skills. Overall, students showed an increase in positive responses regarding their attitudes to vocabulary.
Linguistics and Modern Languages
M.A. (Applied Linguistics)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography