To see the other types of publications on this topic, follow the link: Token system.

Dissertations / Theses on the topic 'Token system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Token system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Nalli, Sehar K. "SYNCHRONIZED TOKEN GENERATOR SYSTEM." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146151257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Park, Jongbum. "Parallel token processing in an asynchronous trigger system." [Florida] : State University System of Florida, 1999. http://etd.fcla.edu/etd/uf/1999/amg2152/park%5Fj.pdf.

Full text
Abstract:
Thesis (Ph. D.)--University of Florida, 1999.
Title from first page of PDF file. Document formatted into pages; contains xiii, 166 p.; also contains graphics. Vita. Includes bibliographical references (p. 160-165).
APA, Harvard, Vancouver, ISO, and other styles
3

Li, Bo. "On the optimization of the token bucket control mechanism." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26339.

Full text
Abstract:
During the past years, there has been an increasing interest in the design and development of network traffic controllers capable of ensuring the QoS requirements of a wide range of applications. In this thesis, based on previous work, we use a systems approach to construct a dynamic model for the token bucket mechanism: a traffic controller widely used in various QoS-aware protocol architectures. An enhanced model of multiplexor is also added into the multiple token buckets system model. In this way, the model represents a complete system at the access node of the network. We then develop an optimization algorithm based on a dynamic programming and genetic algorithm approach. Applying two MPEG-1 video traces and two self-similar traffic traces, we conduct an extensive campaign of numerical experiments allowing us to gain insight into the operation of the controller and evaluate the benefits of using a genetic algorithm approach to speed up the computation process based on dynamic programming. Our results show that the optimization is not only capable of getting the best cost, but also balancing the costs corresponding to different aspects. The results also shows that the use of the genetic algorithm proves particular useful in reducing the computation time required to optimize the operation of a system consisting of multiple token-bucket regulated sources.
APA, Harvard, Vancouver, ISO, and other styles
4

McNeely, Mitchell P. "A Comparison of Fixed- and Variable-Ratio Token Exchange-Production Schedules with Children with Autism Spectrum Disorder." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404526/.

Full text
Abstract:
The token economy is a widely used and versatile motivational system within applied behavior analysis. Moreover, token reinforcement procedures have been shown to be highly effective in the treatment of children with autism spectrum disorder (ASD). In the experimental analysis of behavior, token reinforcement contingencies are conceptualized as three interconnected schedule components: (1) the token-production schedule, (2) the exchange-production schedule, and (3) the token-exchange schedule. Basic work with nonhuman subjects has demonstrated that the exchange-production schedule is the primary driver of performance in these arrangements, and that variable-ratio exchange-production results in reduced pre-ratio pausing and greater overall rates of responding relative to fixed-ratio exchange-production schedules. However, little applied research has been conducted to assess the generality of these findings within applied settings. The purpose of this study was to determine if fixed- and variable-ratio token exchange-production schedules would exert differential effects on pre-ratio pausing and overall rates of responding for three children with ASD during a free-operant sorting task. The results showed that pre-ratio pausing and overall rates of responding were not differentially effected by the fixed- and variable-ratio exchange-production schedules. Discrepancies between the experimental work and the current study are discussed along with additional limitations.
APA, Harvard, Vancouver, ISO, and other styles
5

Wenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
Security hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
APA, Harvard, Vancouver, ISO, and other styles
6

Waggy, Kimberly. "The effects of a token economy system in comparison to social praise on the manifest behaviors of elementary learning disabled students." Huntington, WV : [Marshall University Libraries], 2002. http://www.marshall.edu/etd/descript.asp?ref=441.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bursum, Kim. "Initial Comparative Empirical Usability Testing for the Collaborative Authentication System." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6614.

Full text
Abstract:
The Collaborative Authentication (co-authentication) system is an authentication system that relies on some or all members of a pre-registered set of secure hardware tokens being concurrently present to an authentication server at the moment of authentication. Previous researchers have compared various embodiments of the co-authentication system to each other including using Quick Response (QR) codes/cellphone cameras and Near Field Communication (NFC) between tokens. This thesis concerns the initial design and implementation of empirical comparative testing mechanisms between one embodiment of the co-authentication system and other commonly used authentication systems. One contribution is the simulated standard user ID and password login in a computer browser and a simulated RSA SecureID ® one time password (OTP) and login with embedded usability testing mechanisms. Another contribution is the development and implementation of a new Bluetooth communication functionality between tokens. A third contribution is the addition of usability testing mechanisms to two versions of this new functionality.
APA, Harvard, Vancouver, ISO, and other styles
8

Tomaka, Ashley. "Evaluation of a level system with a built in token economy to decrease inappropriate behaviors of individuals with mental retardation." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Löbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-218169.

Full text
Abstract:
Rating agencies provide service by offering information about different kinds of securities and/or investment opportunities. This paper addresses questions often asked during the 2008 U.S. financial crisis: Why did no one see this coming? Why were all the explanations given afterward, not given before as precautions? Or if they were given before, why did nobody listen? Using Giddens’ idea of disembedded systems [Giddens A (1991a) The Consequences of Modernity (Polity Press, Cambridge, UK)], the paper describes and frames the phenomenon of U.S. financial crisis and the role of rating agencies in particular as a disembedded service system. Hereby it offers an explanation of the crises in contrast to the common incentive-oriented or moralizing perspectives. The paper shows that the U.S. financial crisis emerged from a disembedded service system, a simulacrum of ratings, which after a while was no more connected to the reality of securities. Information-providing service systems are in danger to become simulacra, and with it they can disembed. The paper offers a new insightful perspective on how to analyze and understand information-providing service systems and hence offers a perspective to avoid crises based on disembedded systems. This is the first paper to our knowledge to analyze information-providing service systems based on Giddens’ theory of abstract disembedded systems. It provides a new understanding of information-providing service systems that can help to avoid crises based on disembedded systems.
APA, Harvard, Vancouver, ISO, and other styles
10

Löbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Informs, 2014. https://ul.qucosa.de/id/qucosa%3A15267.

Full text
Abstract:
Rating agencies provide service by offering information about different kinds of securities and/or investment opportunities. This paper addresses questions often asked during the 2008 U.S. financial crisis: Why did no one see this coming? Why were all the explanations given afterward, not given before as precautions? Or if they were given before, why did nobody listen? Using Giddens’ idea of disembedded systems [Giddens A (1991a) The Consequences of Modernity (Polity Press, Cambridge, UK)], the paper describes and frames the phenomenon of U.S. financial crisis and the role of rating agencies in particular as a disembedded service system. Hereby it offers an explanation of the crises in contrast to the common incentive-oriented or moralizing perspectives. The paper shows that the U.S. financial crisis emerged from a disembedded service system, a simulacrum of ratings, which after a while was no more connected to the reality of securities. Information-providing service systems are in danger to become simulacra, and with it they can disembed. The paper offers a new insightful perspective on how to analyze and understand information-providing service systems and hence offers a perspective to avoid crises based on disembedded systems. This is the first paper to our knowledge to analyze information-providing service systems based on Giddens’ theory of abstract disembedded systems. It provides a new understanding of information-providing service systems that can help to avoid crises based on disembedded systems.
APA, Harvard, Vancouver, ISO, and other styles
11

Yao, Li-Jun. "Real-time communications in token ring networks." Title page, abstract and contents only, 1994. http://web4.library.adelaide.edu.au/theses/09PH/09phy248.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Gordon, Heidi. ""Picture This"| Token Economy Systems With or Without Pictures." Thesis, Trinity Christian College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10814013.

Full text
Abstract:

This study investigates the outcome of using two different types of token economy boards to reduce disruptive behavior and off-task behavior of children ages five to seven, in a self- contained special education setting in a suburban public school. The purpose of using two different types of token economy boards is to find out which token board is more effective in reducing target behaviors. One token board is personalized with a picture of the student and their favorite characters or toys; the other chart is plain with no personalized pictures at all, other than a Board Maker picture of the preferred behavior and a picture of the reward.

The sample used for data collection consists of three students, one female and two males, aged 5 to 7, diagnosed with Autism. Data collection included a detailed and accurate count of the disruptive and off-task behaviors that were logged onto data sheets. Data was collected from the student’s arrival in the morning until dismissal time at the end of the school day by having each one-to-one paraprofessional use a clicker counter for each disruptive behavior. The collection of data took place over five consecutive weeks, where the two token economy boards were alternated weekly for each child. The aim for this study is to draw conclusions on which token board provided better results in positive behavior, as well as if a noticeable preference was observed in the student’s reactions to the different token boards.

Mixed methods research was used in this investigation, which includes the mixing of qualitative and quantitative data. My hypothesis stated that a higher rate of on-task behavior would occur, with less disruptive behavior, by using a token board with personalized pictures for this age group of children. The conclusions of this investigation show that a higher rate of on-task behavior with less disruptive behaviors occurred from using the plain token economy board for this age group with their current medical diagnosis of autism.

APA, Harvard, Vancouver, ISO, and other styles
13

Washington, Kyle. "A wireless token ring approach for contention resolution in a wimax environment." Diss., Online access via UMI:, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Vašková, Barbora. "Kamerové zabezpečení objektu s nízkým datovým tokem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413086.

Full text
Abstract:
The topic of this master's thesis is devoted to design and realization of autonomous camera system of the selected object with possibility of remote access. The content of the theoretical part is description of components of the camera system and close analysis of the used software, including the selection of suitable components. The practical part is approaching to the initial installation of the system and verification of the functionality of individual components based on simple commands. The next step is developing an mobile application comunicattting with the camera system based on low data flow.
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, C. J. "The Lexical Token Converter : Hardware support for Large Knowledge Based Systems." Thesis, University of Manchester, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.383888.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

McGillvray, Patrick J. "Integration of Systems Management Departments 0TR, 4TR, and 8TR token ring local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Hailong, Wenhua Qi, Qishan Zhang, and Jinpei Wu. "PKI/PMI AND SMART TOKENS IN HEALTHCARE INFORMATION SYSTEMS." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606668.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
While healthcare industry is striving to achieve e-health systems for improvements in healthcare quality, cost, and access, privacy and security about medical records should be considered carefully. This paper makes a deep study of Public Key Infrastructures (PKIs) and Privilege Management Infrastructures (PMIs) and how they can secure e-health systems. To access resources, e.g. patient records, both authentication and authorization are needed, so public key certificates and attribute certificates are both required to protect healthcare information. From a typical medical scenario, we see not only static but also dynamic permissions are required. Dynamic authorization maybe the most complex problem in e-health systems.
APA, Harvard, Vancouver, ISO, and other styles
18

Pokorný, Lukáš. "Multiplatformní autentizační systém." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220411.

Full text
Abstract:
This thesis describes the design of a multiplatform authentication system that enables user authentication by using a wide variety of authentication tokens. The theoretical part is devoted to an overview of authentication interfaces with focus on modern methods of verification. There is also an overview of authentication schemes. The practical part gives requirements for an authentication terminal and sets a specific hardware structure, including the specification of individual functional blocks. The implementation of the software logic uses Java and JavaScript programming languages. Attention is also paid to the used authentication schemes including details and comparison of used platforms. Finally, we evaluate the user and security aspects of the proposed solution. It is also given the possibility of additional hardware and software optimization.
APA, Harvard, Vancouver, ISO, and other styles
19

Hedberg, David. "Autentisiering av användare i datoriserade miljöer hos SMF - biometri kontra tokens : En jämförelse av två sätt att implementera autentisering av användare." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18816.

Full text
Abstract:
Allt eftersom mer och mer information sparas på datorer så ökar även trycket på att denna information sparas säkert, och att endast behöriga personer kommer åt den.Syftet med arbetet var att se vilka skillnader som finns mellan biometri och tokens, och vilka skillnader som små till medelstora företag borde ta i beaktande när de väljer en autentiseringsmetod. Det förväntade resultatet var då en beskrivning, i form av ett ramverk, över vilka för- och nackdelar som finns med de två metoderna, och således vilken metod som ett enskilt företag som använder ramverket borde använda sig utav.Arbetet genomfördes via en litteraturstudie, i vilket tre databaser användes för att samla information. IEEEXplore, ACM Digital Library, och ScienceDirect var de tre databaser som användes för arbetet. I dessa identifierades ett antal artiklar, som delades upp i kodade kategorier utefter innehåll. Detta i syfte att utföra en tematisk kodad analys.Totalt identifierades 28 artiklar i de olika databaserna. I dessa artiklar identifierades kostnad, säkerhet, integritet, och användarvänlighet som några av de mesta omtalade ämnena. 7 utav de 28 artiklarna pratade om kostnad, 20 av artiklarna nämnde säkerhet, 5 nämnde integritet, och 9 pratade om användarvänlighet. Det fanns även ett antal mindre teman i tvåfaktorsautentisering, skalbarhet, typer av biometri, typer av tokens, och framtida teknologi inom biometri.Efter genomförd analys formulerades ett ramverk i vilket ett smått till medelstort företag kan se vilken metod av autentisering som passar deras företag bäst.
As technology evolves, corporations and enterprises are forced to evolve alongside it. Storing company information and data on servers and computers have become common practice.Initially, the goal with the work presented was to compare biometric authentication and token authentication in relation so SMEs. In the current landscape there is no comprehensive study in these two methods of authentication in relation to SMEs. A framework was developed for system administrators to use when choosing one of these methods of authentication. The framework is a summarization of the works analytical part.A literature study was conducted to reach the goal. Three databases were used as sources of information. These three were namely IEEEXplore, ACM Digital Library, and ScienceDirect. From these sources, literature was identified on which the study was then based. Thematic coding was used to analyze the collected data.After the process of collecting and including/excluding was complete, a total of 28 articles remained. From these articles a total of 10 themes were identified from the thematic coding. These themes were cost, integrity, usability, security pros, security cons, two-factor authentication, scalability, biometric types, token types, and future biometric technology. Four of these were more prevalent, namely cost, integrity, usability, and security.After the analysis was finished the themes that emerged as important were integrity and usability. Because of this, the framework is heavily influenced by these themes and they are particularly important for system administrators to consider.
APA, Harvard, Vancouver, ISO, and other styles
20

Jajtner, Petr. "Implementace OTP ve vybraném systému." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-260667.

Full text
Abstract:
At present, it is necessary to protect sensitive data against abuse, but also allow au-thorized persons to change these data. To increase the security of logging for authorized persons we often introduce a two-factors authentication, where the first step is verification of the user's identity and in a second step is required to insert a one-time password called OTP. This thesis deals with implementation of OTP and integration into the selected sys-tem. It also includes test and verification of the functionality of the selected solution.
APA, Harvard, Vancouver, ISO, and other styles
21

Černý, Pavel. "Prednasky.com - systém pro automatické zpracování přednášek." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264970.

Full text
Abstract:
The objective of this thesis is to create system for automated processing of the video lectures. There are two main parts in this thesis. Bash Framework, which is created from several separated atomic tasks. At the beginning we have a simple video prepared for processing. When it is processed, there are added intro part, subtitles and synchronized presentation. Second part of this thesis is a web application. It is designated for playing, editing and creating videos. Further it provides process management of created framework and whole system administration.
APA, Harvard, Vancouver, ISO, and other styles
22

Ling, Jintao. "Coronavirus public sentiment analysis with BERT deep learning." Thesis, Högskolan Dalarna, Informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:du-34253.

Full text
Abstract:
Microblog has become a central platform where people express their thoughts and opinions toward public events in China. With the sudden outbreak of coronavirus, the posts related to coronavirus are usually followed by a burst immediately in microblog volume, which provides a great opportunity to explore public sentiment about the events. In this context, sentiment analysis is helpful to explore how coronavirus affects public opinions. Deep learning has become a very popular technique for sentiment analysis. This thesis uses Bidirectional Encoder Representations from Transformers (BERT), a pre-trained unsupervised language representation model based on deep learning, to generate initial token embeddings that are further tuned by a neural network model on a supervised corpus, a sentiment classifier is constructed. We utilize data recently made available by the government of Beijing which contains 1 million blog posts from January 1 to February 20, 2020. Also, the model developed in this thesis can be used to track the sentiment variation with Weibo microblog data in the future. At the final stage, the variation of public sentiment is analyzed and presented with visualization charts of preformed people sentiment variation with the development of coronavirus in China. Comparison of the results between labeled data and all data is performed in order to explore how thoughts and opinions evolve in time. The result shows a significant growth of the negative sentiment on January 20 when a lockdown started in Wuhan, and afterward the growth becomes slower. Around February 7 when doctor Wenliang Li died, the number of negative sentiments reached its peak.
APA, Harvard, Vancouver, ISO, and other styles
23

Nakasaki, Rosania Felix. "A persuasão em dois gêneros discursivos: um enfoque sistêmico-funcional." Pontifícia Universidade Católica de São Paulo, 2011. https://tede2.pucsp.br/handle/handle/13512.

Full text
Abstract:
Made available in DSpace on 2016-04-28T18:22:19Z (GMT). No. of bitstreams: 1 Rosania Felix Nakasaki.pdf: 549665 bytes, checksum: 73f1980de400e0da43fd0f33741a1354 (MD5) Previous issue date: 2011-06-30
Conselho Nacional de Desenvolvimento Científico e Tecnológico
Reading and writing are the basis for a critical reading of the world, and it is from them that starts the process of awareness of rights and duties of citizens, essential to the process of democratization. The main goal of teaching Portuguese at any level of education should be to provide conditions for the development of the student's language, its discourse, its capacity of expression in oral and written language (Koch, 2002). By the way, says Freire (2001), the educator who does not have a critical baggage and do not make a creative educational work is considered "dumb" before the world and himself. Second Demo (1996), the formation of critical-creative and participatory specifically depends on learning to learn, learn to think better act, innovate, and this, educators need to be prepared, as are the trainers. As a teacher of Portuguese believe I have, more than other professionals, the task of studying the importance of language, whether in oral texts, whether in writing, in real use - language - and investigate how these texts can be worth of speech acts, direct or indirect inducement, thus building a textual world (Downing, 2003), 'realities' are not always compatible with the factual world. According to Fowler (1991), any aspect of linguistic structure carries ideological meaning - lexical selection, syntactic option, etc.. - All have their raison d'etre. There are always different ways of saying the same thing, and these alternative modes are not accidental. One of the factors which contribute to enable the blending of facts and interests of various kinds, not always perceptible to the reader, and that underlie the text, is the Appraisal (Appraisal) (MARTIN, 2000, 2003), a reticular system of descriptions of options semantics to evaluate people, things and phenomena. He and his group have developed techniques to be applied systematically to the full text of any record, working within the general framework of Systemic Functional Linguistics. Persuasion, in particular the implicit persuasion (attitude tokens), it is not always realized by adjectives and adverbs clearly persuasive, but also thanks to certain choices lexicogrammatical not considered in the interpersonal tradition, but that, combined with specific contexts and that cumulatively occur as the text unfolds - the logogênese (Halliday 1992, 1993; Halliday, Matthiessen 1999), makes them highly effective. This research aims to examine the persuasion that runs two different genres: a chronic and talk show on TV, to see how it is done through the tokens of attitude in these contexts of use of language. To do so, must answer the following research questions: (a) how is persuasion through the tokens in the chronic attitude and talk show? (b) what choices lexicogrammatical are more used to the achievement of tokens in each gender? The results show that the criticism is built by irony, alternating alignments with explicit evaluative attitude and tokens. Such resources involve tokens signed on facts known to the reader, thus ideational, the speech of the animator, but enclosing Social Assessments negative, leaving the role of author (Goffman 1979) to the caller
A leitura e a escrita são a base para uma leitura crítica do mundo, e é a partir delas que se inicia o processo de consciência dos direitos e deveres do cidadão, indispensável ao processo de democratização. O principal objetivo do ensino de Língua Portuguesa, em qualquer nível de ensino, deve ser o de proporcionar condições para o desenvolvimento da linguagem do aluno, da sua discursividade, da sua capacidade de expressão na linguagem oral e escrita (KÖCHE 2002). A propósito, diz Freire (2001), que o educador que não possuir uma bagagem crítica e não fizer um trabalho educativo criativo é considerado mudo , perante o mundo e a si mesmo. Segundo Demo (1996), a formação de sujeitos críticos-criativos e participativos depende especificamente de aprender a aprender, saber pensar para melhor intervir, inovar, e isto, os educadores têm que estar preparados, já que são os formadores. Como professora de Língua Portuguesa acredito ter, mais que outros profissionais, a incumbência de estudar a importância da língua, seja em textos orais, seja na escrita, em situação real de uso a linguagem -, e investigar em que medida os textos podem se valer de atos de fala diretos ou indiretos de persuasão, construindo, assim, um mundo textual (DOWNING 2003), de 'realidades' nem sempre compatíveis com o mundo factual. Segundo Fowler (1991), qualquer aspecto da estrutura linguística carrega significação ideológica - seleção lexical, opção sintática, etc. todos têm sua razão de ser. Há sempre modos diferentes de dizer a mesma coisa, e esses modos não são alternativas acidentais. Um dos elementos que concorrem para possibilitar a mesclagem de fatos e interesses de várias naturezas, nem sempre perceptíveis ao leitor, e que subjazem ao texto, é a Avaliatividade (Appraisal) (MARTIN 2000; 2003), um sistema reticular de descrições de opções semânticas para avaliar pessoas, coisas e fenômenos. Ele e seu grupo desenvolveram técnicas para ser aplicadas sistematicamente a textos inteiros de qualquer registro, trabalhando dentro do enquadre geral da Linguística Sistêmico- Funcional. A persuasão, em especial a persuasão implícita (tokens de Atitude), nem sempre é realizada por adjetivos e advérbios claramente persuasivos, mas graças também a determinadas escolhas léxico-gramaticais, não consideradas interpessoais na tradição, mas que, combinadas a contextos específicos e que acontecem cumulativamente conforme o texto se desenrola - a logogênese (HALLIDAY 1992, 1993; HALLIDAY; MATTHIESSEN 1999), tornam-nas altamente eficazes. A presente pesquisa tem como objetivo examinar a persuasão que percorre dois gêneros diferentes: a crônica e o talk show na TV, para verificar como ela é feita através dos tokens de Atitude nesses contextos de uso de língua. Para tanto, deve responder às seguintes perguntas de pesquisa: (a) como é feita a persuasão através dos tokens de Atitude na crônica e no talk show? (b) que escolhas léxico-gramaticais são mais utilizados para a realização dos tokens em cada um dos gêneros? Os resultados mostram que a crítica é construída através da ironia, que alterna alinhamentos com Avaliatividade explícita e com tokens de Atitude. Esse tokens envolvem recursos firmados em fatos de conhecimento do leitor/ouvinte, portanto ideacionais, na fala do Animador, mas que encerram Apreciações Sociais negativas, deixando o papel de 'Autor' (GOFFMAN 1979) para o interlocutor
APA, Harvard, Vancouver, ISO, and other styles
24

Bennison-Chapman, Lucy. "The role and function of 'tokens' and sealing practices in the Neolithic of the Near East : the question of early recording systems, symbolic storage, precursors to writing, gaming, or monitoring devices in the world's first villages." Thesis, University of Liverpool, 2014. http://livrepository.liverpool.ac.uk/2008477/.

Full text
Abstract:
The Neolithic in the Near East was a crucial transitional period, evidencing the appearance of the world’s first permanent farming villages, alongside significant changes in social structure, subsistence and artistic expression. This thesis focuses on an enigmatic artefact type; small, geometric clay objects, or “tokens”. “Tokens” appear in the 10th millennium BC, and by the late Neolithic they are present in abundance at large numbers of sites across the region, yet absent at others. The timing of the appearance of “tokens” is significant; however, until recently, the potential importance of these objects was often unrecognised. Schmandt-Besserat’s research (1992a, 1992b, 1996) represents the only comprehensive study on the subject. She claims “tokens” are mnemonic recording devices, appearing to meet the administrative needs of the first sedentary farming communities, eventually developing into the world’s earliest known written script. Though her interpretation is widely accepted, her evidence hails entirely from sites distant in space and time from where these objects initially appeared, and there is no solid evidence supporting the notion that Neolithic “tokens” formed a unified agricultural administrative framework. This thesis considers the classification, form and function of “tokens”, as well as their temporal and spatial distribution across sites, their find contexts and the relationship between them, sealings and stamp seals. It re-evaluates the validity of Schmandt-Besserat’s theory alongside alternative interpretations, including children’s toys, gaming pieces, administrative counting aids, and more complex accounting tools. Almost 3,000 “tokens” from three well documented case-study sites (Boncuklu Höyük, Çatalhöyük, Tell Sabi Abyad) and twenty less complete assemblages were studied in detail, recording their shape, dimensions, manufacture, use-wear, the find contexts, associated objects and the characteristics of the sites where they are found. This was complimented by a broader level survey charting the presence, number or absence of “tokens” at fifty-six additional sites. This study has shown that there is no correlation between “token” distribution according to region, time period, site size, or on-site activities. The range of shapes, degree of standardization and assemblage composition varies greatly from site to site, with little regional, temporal or other correlation. Variability is also evidenced in the nature of sites yielding “tokens”, and the immediate contexts in which they are found (e.g. refuse contexts, domestic contexts, administrative contexts, possible ritual contexts). Their generally large numbers when present, variability of deposition, high proportion found in disposal contexts, their simple shape and often crude appearance proves “tokens” were quickly and easily made, and disposed of as readily. All evidence supports the interpretation of “tokens” as multi-functional artefacts, fulfilling a variety of uses within and across settlements. Though sometimes used in accounting, they were not created to administer agricultural produce and were not part of a unified symbolic system. As objects they operated with fluidity of function and interpretation, with imbued value and meaning.
APA, Harvard, Vancouver, ISO, and other styles
25

Chiu, Cheng-Yung, and 邱政湧. "Token Passing Model Applied to Continuous Mandarin Keyword Spotting System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/xjbp63.

Full text
Abstract:
碩士
中原大學
資訊工程研究所
91
Using speech signal as input to manipulate computer is an important application of speech signal processing research. The system described in our study, is implemented by using Token Passing Model with keyword spotting under Microsoft Visual C++ 6.0 and Windows 2000 operation system. The system utilize the coefficient of Mel-Frequency Cepstrum as the feature parameter, then use the method of CHMM (Continuous Hidden Markov Model) to establish acoustic model. The 415 syllables in Mandarin are further decomposed into right context dependent sub-syllabic units, which are 113 Right Context Dependent INITIAL and 39 Context Independent FINAL. The INITIAL/FINAL are represented by 3-state/4-state. In addition, build a silence and short pause acoustic model, which are represented by 4-state. Then the system uses Token Passing to build a filler model keyword spotting system, and uses the Utterance Verification technology to verify the utterance correct or incorrect. Finally, the research develops a speech input interface system and uses hierarchical architecture method to reduce the number of keyword and uses agent of Text To Speech to lead the users. The system also uses positive and negative sentence to promote the detection rate of keyword spotting.
APA, Harvard, Vancouver, ISO, and other styles
26

YOU, ZONG-SIAN, and 游宗憲. "RFID Combined Token System Applied To The Elementary School Class Resource." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/62247082599588659208.

Full text
Abstract:
碩士
亞洲大學
資訊工程學系碩士在職專班
101
With the wave of returning to the mainstream with the implementation of special education students, a large number of special education students are placed in the elementary resource classes. Special education students need more specific methods to help develop good behavior and learning so that resource room teachers requires using behavior change techniques to improve the learning and behavior of special education students. In this study, behavior-change tokens system technology is used to assist teachers in the reward system. The tokens system in the past easily damaged and lost was difficult to record student behavior for a long time, and spent more time, Therefore, RFID technology used in this study through fast recognition has the advantages of high correct recognition, read and write capabilities, label penetrating, and long life to assist teachers to construct a system for teachers to easily implement the token system and improve the shortcomings of monetary system with conventional labor practices, so that teachers can have more time to teach.
APA, Harvard, Vancouver, ISO, and other styles
27

Gu, Wan-Chi, and 辜婉琪. "Synthesis of Token-Conserved Petri Net in an Automated Mould Filling System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/70634906948774606156.

Full text
Abstract:
碩士
國立交通大學
工業工程與管理學系
101
In this thesis, a new token-conserved Petri net design method is proposed for a given automated mould filling system. The development of this new design method consists of three stages: the formation of synthesis rules, the design of elementary manufacturing processes, and the synthesis of token-conserved Petri net. At the synthesis rules formation stage, many decomposition examples from token-conserved Petri nets into Eulerian marked graphs are observed and analyzed. Subsequently their characteristic features for reversing the decomposition process are induced in order to form the synthesis rules. At the elementary manufacturing process stage, three Eulerian marked graph based on hierarchy transformation method are designed according to different manufacturing requests. At the token-conserved Petri net synthesis stage, two design steps are involved. One is to generate a token-conserved Petri net from three Eulerian marked graphs using the synthesis rules. The other is to transform the token-conserved Petri net into an interpreted Petri net for controlling the given automated mould filling system.
APA, Harvard, Vancouver, ISO, and other styles
28

Ying-Hsuan, Chen, and 陳螢萱. "An action research on using token system in teaching English in a junior high school." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/68107033294354185252.

Full text
Abstract:
碩士
國立臺中教育大學
課程與教學研究所
99
This study was intended to investigate the teaching technique and viewpoints of teacher’s integration of token system into English teaching in junior high school. An action research method was used to help improve the problem of students’ individual learning differences. The purposes of the study are stated as follows: 1. to discuss relevant theories and studies of token system 2. to explore the application of the token system in English teaching in junior high school 3. to implement token system in action research of English teaching in junior high school. 4. to provide teachers with the implication of using token system in teaching English The participants of the study were 34 first-year junior high school students. The instruction lasted a semester, five classes a week. The process of using token system in teaching English was shown in observation, interview, and researcher’s reflective journal. Also, students’ learning performance and interests were emphasized. Based on the results, using the token system in teaching English seemed to improve students’ learning performance, but it would be better applied with other teaching techniques. It was effective to have students do drills, but flexible adjustments were necessary to students’ needs. Students’ learning interests would also be raised by creating a friendly learning environment. It was suggested that individual student should be promised with an opportunity to success and that teachers paid attention to the possible effects on students with lower academic achievement. Finally, the researcher should also keep working on teaching improvements and the interaction with students.
APA, Harvard, Vancouver, ISO, and other styles
29

Cheng, Ya-Wen, and 鄭雅文. "An Action Research on Using Token System in Mathematical Remedial Teaching in Fifth Grade Class." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/30855786770155883068.

Full text
Abstract:
碩士
國立臺中教育大學
教師專業碩士學位學程
104
Action research method was adopted in this study, which involved 7 students (4 boys, 3 girls) in a mathematical remedial teaching class of fifth grade in Hao-Wen elementary school in Changhua, and token system were implemented in this class. Data were collected through qualitative research (including observation records, interviews, and teaching diary) and quantitative research (learning status and learning interests questionnaire) to explore the process of mathematical remedial teaching and the performance of students’ learning interest. The results of this study were listed as follows: 1. Adding the criterion of non-target behavior in the token system guided students efficiently to behave properly. It’s painful for students that the researcher took away the token from students. Therefore, in this study, the researcher avoided the criterion of non-target behavior by taking away the tokens. Because of that, students will follow the rules. 2. The instructive material awards guided students efficiently to have proper attitude. The researcher used meaningful, valuable and instructive material awards but costly purchases. 3. Implementing token system promoted low achievement students’ learning interest in mathematic. Furthermore, gaining tokens was an encouragement as well as an approval. Because of the tokens, students had more confidence in learning. 4. Implementing token system enhanced the researcher’s professional development. The research learned the enhancement by using token system and designed “Quizzes” and “Math Board Games” to improve the competent of curriculum design and the difficulty adjustment of the curriculum. Based on the results of the study, the researcher provided some suggestions for other teachers and the future study.
APA, Harvard, Vancouver, ISO, and other styles
30

Hung, Su-Ya, and 黃蜀雅. "The Key Success Factors of the Xi-Hu Cool Virtual Token On-Line Incentive System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/62210758835728033337.

Full text
Abstract:
碩士
實踐大學
家庭研究與兒童發展學系碩士班
98
The study combines qualitative study method and quantitative study method by integrating thematic analyses and questionnaire surveys. The contents of related projects of Xi-Hu on-line incentive system, discussions from various fields, and the data of the development of web-based archives are used to understand and recapitulate the executed results and situations of the incentive system. The study finds that Xi-Hu virtual coin on-line incentive system corporate web-based learning process mechanism, and adopts students’ learning motivation and expectancy to design the incentive system, which, thereby, stimulates students’ interests to actively and continuously participate in the on-line learning activities. School could thereby utilize the interest and transfer it to the curriculum and teaching activities. The quantitative study uses questionnaire surveys. On-line questionnaires were conducted to 322 registering 4th~6th graders, key success factors of the Xi-Hu virtual coins were obtained from these students’ evaluation. The first part of the study uses descriptive statistics to analyze students’ personal data, IT facilities, percentage of the learning motivations and expectancy. The second part uses digression method to recognize the factors that influence students’ evaluation of the incentive system. The results of the study indicate that ease of use, usefulness, valence and self development have evident influence over students’ evaluation. Nine key success factors are induced from four variables (the key person, IT environment, standard of value, and learning community). In conclusion, the results of the study can be of assistance to the administration in evaluating the possibility of integrating virtual currency to incentive system, and to serve as reference for future researchers.
APA, Harvard, Vancouver, ISO, and other styles
31

Bailey, Dawn A. Bailey Jon S. "The use of collaborative goal setting to impact instructional aide implementation of a school-wide behavior management system /." Diss., 2005. http://etd.lib.fsu.edu/theses/available/etd-07112005-131027/.

Full text
Abstract:
Thesis (M. S.)--Florida State University, 2005.
Advisor: Dr. Jon S. Bailey, Florida State University, College of Arts and Sciences, Dept. of Psychology. Title and description from dissertation home page (viewed Sept. 15, 2005). Document formatted into pages; contains vii, 60 pages. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
32

曾靖娟TSENG, CHING-CHUAN. "The Study on the Process of Classroom Regulations for Young Children Based on the Implementation of Token System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/d6w3xc.

Full text
Abstract:
碩士
國立臺中教育大學
教師專業碩士學位學程
104
This study implemented a token system to assess children’s behavior in routine classroom courses. The difficulties associated with the implementation of the token system in a conventional kindergarten class were examined, and possible coping strategies are highlighted. Such strategies can serve as a reference for teachers in their professional development. An action research method was applied to children assigned to the Orange Class at Hsinchu County State Star Elementary School, and relevant documents and data collected over a period of 3 months were analyzed. The specific findings of this study are outlined as follows: 1.Use of token system to establish a regular classroom course: First, discussions were held with teachers, after which the token system was implemented. Subsequently, the implemented token system was continually adjusted by observing children’s behavior as they used this system and the conventional token system. This study determined that the implemented token system has a higher efficiency level than does the conventional token system. 2.Difficulties faced and coping strategies: (1) Administering the two token systems to the children confused them. Therefore, the use of a standard token system is recommended. (2) Because different teachers have different thoughts, and procedures developing consistent token implementation standards is difficult; additional teacher consultations are thus required to achieve such standards.(3) Reinforcement exchange procedures are complex and time consuming, and such procedures must be simplified.(4) Change provisions of tokens for failing to set records and inconvenient, so pre-set standard routine. (5) Different token system operators have inconsistent token usage trends; thus, only one teacher must operate the token system. (6) Because of the lengthy token exchange procedures, children may easily lose patience; therefore, token exchange standards must be lowered. (7) Because individual differences are observed and recorded, some children may develop a sense of failure. Hence, the scoring system must be changed. 3.Researcher of professional development: Researcher can enhance their class management and token systems skills. Finally, the results of this study can serve as a reference for kindergarten teachers and future research in the development of token systems.
APA, Harvard, Vancouver, ISO, and other styles
33

Lim, Jiin-Yuh, and 林蓁巸. "Action Research on the Influence of Token Reward System on the Seventh Graders' Mathematics Learning Motivation and Academic Achievement." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/479c3m.

Full text
Abstract:
碩士
國立彰化師範大學
科學教育研究所
106
The purpose of this study is to enable the researcher to more clearly grasp the implementation of the token reward system, analyze how the token reward system affects the seventh grade students' learning motivation towards mathematics, and explore the effects of the token reward system on the seventh grade students' academic achievements in mathematics. This study adopts the method of action research, implementing the token reward system developed by the researcher in seventh grader's mathematics learning. A total of 152 seventh grade students from three classes of the researcher participated in this research. After implementing the token reward system for two semesters in an academic year, the researcher made the following conclusions: 1. By means of constant revisions and improvements, the researcher can better monitor the implementation of the token reward system. 2. The results of the token reward system showed a significant decrease in students’ responses to the mathematics learning motivation scale. Therefore, the researcher carried out a feeling survey and a sampling interview to collect the students’ feedback. However, the students' feedbacks were rather positive, which affirm that the implementation of the token reward system in teaching activities helps to arouse students’ interest in the learning of mathematics. 3. The token reward system showed a positive effect on students’ academic achievement in mathematics significantly, since students had performed better in midterm and final term assessments compared with their early term assessments. 4. Students involved in the token reward system showed a better academic achievement in mathematics compared to those who learned mathematics through the did not receive the token reward system method. Finally, according to the research findings, the researcher could put forward some suggestions to the school authorities in order to enhance the effectiveness of mathematics learning by implementing the token reward system.
APA, Harvard, Vancouver, ISO, and other styles
34

Falkenreck, Jan. "Integration von Methoden und Verfahren zur gesicherten Übertragung von Daten und zur Authentifizierung in ein webbasiertes System." 2002. https://ul.qucosa.de/id/qucosa%3A16530.

Full text
Abstract:
Die Arbeit beschäftigt sich mit der Integration von Methoden und Verfahren zur gesicherten Übertragung und zur Authentifizierung. Es werden dies bezüglich Realisierungsmöglichkeiten für die Erweiterung einer bestehenden Applikation aufgezeigt und diskutiert. Die Sicherheitsanforderungen an die Anwendung werden aufgezeigt und bestehende Technologien bezüglich ihrer Verwendbarkeit für eine Authentifizierung in der Anwendung evaluiert. Die Integration der Methoden und Verfahren erfolgt prototypisch in die gewählte Anwendung. Besonderer Wert wird dabei auf die Authentifizierung von Nutzern am System und die verschlüsselte Übertragung von Daten über nicht private Netze gelegt. Die Arbeit gibt einen Einblick in die kryptographischen Grundlagen und verwendeten Verfahren und Standards. Das Anwendungsgebiet wird beschrieben und die Nutzungsstrategie der Anwendung wird dargelegt. Die Integration der Verfahren und Mechanismen in die Anwendung erfolgt unter Berücksichtigung der vorher gesetzten Ziele und der Lösungsansatz wird prototypisch implementiert und diskutiert.
APA, Harvard, Vancouver, ISO, and other styles
35

Hsu, Chih-hsin, and 徐智信. "A Study on Applying a Token System to the Class Management - Take an Elementary School in Xin-Bei City for Example." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/26109640841089136919.

Full text
Abstract:
碩士
世新大學
資訊傳播學研究所(含碩專班)
100
The purpose of this research is to establish the type of classroom rules management by token system. Also, exploring the concrete influence on the students' behavior under the token system, and discussing the teachers' profession development in this experience. The research method of this paper is Education Action Methods. Quantification is subordinate to methods of qualitative. Take the 5th grade elementary school students in Xin-Bei City for example. The conclusion is drawn by the students' information, the researcher's teaching log, and the records of interview and analyses.The final conclusions are below: To understand the students' situation is the first thing. Teachers and students establish the classroom rules together. The teachers communicate with the parents to make a common consensus and the students get familiar with the rules. Next, all the classroom rules should be taught to the students continuously. The principle is more encouragement, and less punishment. The teachers can use the positive reinforcement and social encouragement to lead the students to the right behavior. Then, playing games can make the classroom rules management more interesting. It also makes the students put themselves into the model of classroom rules management and attract the class solidarity.The teachers have to know the timing of reward and make the exchange of the reinforcement the best efficiency. After that , to use the orderly competition well. Let every student get the opportunity to succeed. So, the students have the motivation to gain fulfillment and satisfaction. Finally, teachers can make a self- examination through this action research. They can also establish their own strategies of classroom rules management from the problems they find.
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Ya-Ping, and 陳雅萍. "The Action Research on Applying a Token System to the Classroom Management of the Elementary School-Take One Class for Example." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/s3zf6d.

Full text
Abstract:
碩士
中臺科技大學
文教事業經營研究所
101
This study takes the action research method to evaluate the teaching effectiveness of applied token system to the classroom management. This study applies Skinner’s “Reinforcement theory” and Maslow’s “Need-hierarchy theory” as a theoretical foundation. The subjects of this study were 26 fourth-grades students in the researcher’s school during 24weeks. The researcher collected the experimental data through observation records, interviews, reflection notes, questionnaire surveys, students’ diaries, and focused group interviews. According to the literature review, research finding and discussion, and also the process of planning, execution, reflection, and adjustment, the conclusions are:The adjustment of token system strengthens students’ behavior. It guides students to build up positive and adequate behavior, and helps students to learn self-discipline. The researcher also discussed the difficulties of token system and provided some possible solutions. Based on the results of study, the researcher provided some suggestions for the future study and to other teachers who are interested in applied token system to the classroom management.
APA, Harvard, Vancouver, ISO, and other styles
37

LIN, HSIANG-YIN, and 林香吟. "An Action Research on the Effectiveness of Classroom Regulations and Classroom Climate in Junior High School Based on the Implementation of Token System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/85448389098795169586.

Full text
Abstract:
碩士
國立臺中教育大學
教育學系
102
The action research was adopted in this study: 31 seventh grade students from homeroom were included (16 boys, 15 girls), and token system were implemented in this class. Data were collected through qualitative research (including observation records, interviews, reflection notes, and questionnaire surveys from parents and full-time teachers) and quantitative research (including descriptive statistics and classroom climate inventory of junior high school) to explore the effectiveness of classroom regulations and classroom climate in junior high school based on the implementation of token system. The results were as follows: 1.The token system could help most of the students build up good self-discipline while the rest should be disciplined with other strategies. Among those strategies that the researcher worked on, group mechanism was the most effective one. 2.Implementing token system could create the classroom climate effectively, especially when it was used to inspire the whole class to strive for classr honor. 3.Token system should make good use of group force owing to junior high school students’ overemphasis on peers relationship. Therefore, “group mechanism” helped the well-behaved students inspire those who didn’t behave so well and thus helped cultivate a positive climate. 4.Token system should be accompanied by other strategies. In this study, strategies that had been used were – discipline strategy, complimentary teaching, and related counseling strategies. 5.Implementing token system helped to avoid the tense relationship between teachers and students. Based on the results of the study, the researcher provided some suggestions for other teachers, school administration organization, and the future study.
APA, Harvard, Vancouver, ISO, and other styles
38

Green, Breton. "Multiple ring networks in clustered traffic environments." Thesis, 1998. http://hdl.handle.net/10413/6200.

Full text
Abstract:
Ring networks are appropriate for the full range of network levels, including multiprocessor systems, local area computer networks and high speed backbones. The most well known and widely implemented examples are the IBM token ring and FDDI networks. Ring networks have the advantages of high channel utilisation and bounded delay if an n-limited service policy is used. The packet transfer delay, defined as the average time a packet spends in the network from the time it is generated until the time it is received at its destination node, improves with the number of rings on which a node is connected. However, many ring connections are not economically feasible since the cost of the ring interface increases with the number of rings. There has been an abundance of previous work on single token ring networks. A number of papers on slotted rings, register insertion rings and more complex ring architectures have also been published. However, there is very little existing literature on multiple ring networks as well as ring networks in clustered traffic environments, i.e. where nodes from the same cluster tend to communicate more with each other than with other nodes in the network. This thesis focuses on two network topologies that make use of multiple rings and are well suited to clustered traffic environments: the two-connected multiple ring (2-MR) and the destination removal double ring (DRDR). For the 2-MR network, three different practical token-based protocols are investigated in an attempt to optimise performance. It is further shown that significant performance improvements can be achieved by employing a slotted ring protocol rather than the token ring protocol. The DRDR network is also examined and its performance compared to the aforementioned architectures. For each of the six cases, both random and clustered traffic patterns are considered and compared. Analytical results are derived which are verified by results obtained from computer simulations. Furthermore, we look at exact methods of analysing ring networks. A mean value analysis of a single token ring network with a I-limited service discipline is performed, which clearly shows the complexity exact methods introduce. Finally, although it has been stated in the literature that an exact analysis of a multiple symmetrical token ring network is intractable, we present a novel Markov chain approach that gives exact results for near zero loads.
Thesis (M.Sc.-Electronic Engineering)-University of Natal, 1998.
APA, Harvard, Vancouver, ISO, and other styles
39

Huang, Mau-Jing, and 黃茂景. "REAL TIME SYSTEMS ON TOKEN BUS NETWORKS." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/05165065642598133454.

Full text
Abstract:
碩士
大同工學院
資訊工程研究所
81
The token bus LAN based on the IEEE 802.4 protocol has gradually become as the standard local network in both the industrial automation and process control. It consists of several attractive characteristics, such as deterministic nature, simplicity, efficiency, reliability and priority scheme, which facilitate the design and implementation of most time-critical applications that require the real time communication with limited transmission delay. Ths research is on a symmetric token-passing bus network carrying multiple classes of traffic. we present three TRTs assignment strategies that meets the requirements of waiting time and bandwidth by considering the message arrival rate of each class, The TRT value is set to the maximum circulation time value for each class in strategy one. In strategy two, after class 6 has transmitted its data, the other classes devide the remaining network badwidth. In the case of strategy three, the class 6 first make use of the network bandwidth, and then the other classes are allowed to employ the network bandwidth in descending order. In order to fit different applications, we explore the situations when laxity is existed or not, and when the network is overload or underload.
APA, Harvard, Vancouver, ISO, and other styles
40

Liu, Yi-Sheng. "A token based MAC protocol for wireless ad hoc networks." Thesis, 2003. http://hdl.handle.net/10413/4172.

Full text
Abstract:
The emergence of portable terminals in work and living environments is accelerating the progression of wireless networks. A wireless ad hoc network is a new network concept where users establish peer-to-peer communication among themselves independently, in their small area. Since the wireless medium is a shared resource, it becomes an important design issue to efficiently allocate bandwidth among users. MAC (Medium Access Control) layer arbitrates the channel access to the wireless medium and is also responsible for bandwidth allocation to different users, therefore a large amount of research has been conducted on various MAC protocols for ad hoc wireless networks. This dissertation begins with a survey of existing wireless MAC protocols. The survey includes protocols designed for different network generations and topologies, classifying them based on architecture and mode of operation. Next, we concentrate on the MAC protocols proposed for distributed wireless networks. We propose a new MAC protocol based on a token-passing strategy; which not only incorporates the advantages of the guaranteed access scheme into the distributed type of wireless networks, but also the data rate and delay level QoS guarantees. Data rate QoS provides fairness into sharing of the channel, while delay level QoS introduces a flexible prioritized access to channels by adjusting transmission permission to the current network traffic activities. A simulation model for the protocol is developed and delay and throughput performance results are presented. To examine the efficiency and performance of the proposed MAC scheme in an ad hoc wireless environment, it is incorporated into the Bluetooth structured network. The model is then simulated in the Bluetooth environment and performance results are presented. Furthermore, an analytical model is proposed and an approximate delay analysis conducted for the proposed MAC scheme. Analytical results are derived and compared with results obtained from computer simulations. The dissertation concludes with suggestions for improvements and future work.
Thesis (M.Sc.-Engineering)-University of Natal, 2003.
APA, Harvard, Vancouver, ISO, and other styles
41

Wong, William King. "Packet scheduling in wireless systems by Token Bank Fair Queueing algorithm." Thesis, 2005. http://hdl.handle.net/2429/17184.

Full text
Abstract:
The amalgamation of wireless systems is a vision for the next generation wireless systems where multimedia applications will dominate. One of the challenges for the operators of next generation networks is the delivery of quality-of-service (QoS) to the end users. Wireless scheduling algorithms play a critical and significant role in the user perception of QoS. However, the scarcity of wireless resources and its unstable channel condition present a challenge to providing QoS. To that end, this thesis proposes a novel scheduling algorithm Token Bank Fair Queuing (TBFQ) that is simple to implement and has the soft tolerance characteristic which is suitable under wireless constraints. TBFQ combines both token-based policing mechanism and fair throughput prioritization rule in scheduling packets over packet-switched wireless systems. This results in a simple design and yet achieves better performance and fairness than existing wireless scheduling strategies. The characterization of the algorithm, which leads to its tight bound performance, is conducted through numerical analysis that recursively determines the steady-state probability distribution of the bandwidth allocation process and ultimately the probability distribution of input queue. We found that the convergence of the recursion is remarkably fast and provides an accurate model and gives a tight bound. The performance of the algorithm is further analyzed through simulation in both TDMA and CDMA systems. In CDMA systems, the algorithm is modified and enhanced to take advantage of the advanced features offered by such system. Furthermore, a novel scheduling framework is proposed as part of the strategy for the deployment of the algorithm within a wireless network. An appropriate call admission control algorithm is also proposed for TBFQ.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Yi-Sheng. "Hybrid token-CDMA MAC protocol for wireless networks." Thesis, 2009. http://hdl.handle.net/10413/819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Chang, Tsai-Chen, and 張在宸. "Single Sign On system by using dynamic tokens." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/88tx9r.

Full text
Abstract:
碩士
銘傳大學
資訊管理學系碩士在職專班
94
This paper presents an authentication scheme for mobile terminal station. In order to improve the performance of the authentication scheme for conventional single-sign-on (SSO), this paper tries to carry on the authentication and trade by dynamic staff of authority (Dynamic Tokens). We propose a secure and efficient scheme that suitable for mobile terminal network environment. Under SSO Proxy Model, we design four strategies of inquiry tactics, it including Base Strategy, Circulator-history Strategy, Provider-Probability Strategy and Mix Strategy. We also verify these strategies by SMPL simulation. As the result, the experimental result shows that our proposed scheme, Mix Strategy, outperform other extant schemes.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Kun-Ting, and 陳坤定. "A Token-based Approach to Load Balancing of Heterogeneous, Multi-resource Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/49448376697768521590.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
98
The Internet has become an indispensible media where people access various on-line services, such as executing personalized applications, browsing and publishing web contents, communicating with friends and co-workers, and so on. From the server-side perspective, providing an Internet service requires sufficient CPU power as well as other kinds of resources such as memory, disk space, and network bandwidth, in order to maintain satisfactory service quality. When the kinds of services increase and their popularity vary, how to ensure quality of service without acquiring excessive computing resources becomes a challenge. Modern web-based systems employ various load balancing techniques in order to spread user requests among multiple machines. However, most of these techniques assume that servers are homogenous with similar resource capacities. Because different services impose different requirements on different kinds of resources, and the request rates for different services are also different, these load balancing techniques may not operate optimally and result in unnecessary resource contention. We have studied the problem of load balancing among machines with heterogeneous resource capacities in a traditional resource scheduling context, and proposed a market-based approach to effectively reducing unnecessary system bottleneck. In this thesis, we extend the previous study but focus on web-based systems, where requests tend to be small in processing time but large in volume. To apply the same market-based principle, we propose a token-based approach in which the servers do not exchange load on a per-request basis, but rather on a token basis where each token represents a workload with specific multi-resource requirements. Our goal is to balance the server load and to make efficient use of all the available system resources. We have conduct extensive simulation under different system configurations and compare our method with existing load balancing schemes. The results showed that our approach provides substantial performance improvement, capable of delivering equivalent system throughput with fewer machines.
APA, Harvard, Vancouver, ISO, and other styles
45

Liebau, Nicolas Christopher. "Trusted Accounting in Peer-to-Peer Environments - A Novel Token-based Accounting Scheme for Autonomous Distributed Systems." Phd thesis, 2008. https://tuprints.ulb.tu-darmstadt.de/1193/1/Dissertation_liebau_2008-Main.pdf.

Full text
Abstract:
Communication systems based on the peer-to-peer (p2p) paradigm present what is likely the most important development in Internet technology in recent years. In spite of the position of p2p systems as the largest source of traffic on the Internet, their commercial success is still limited. The basic tenets of p2p systems are cooperation among peers and completely decentralised communication. However, these can result in nontransparent actions, as well as opportunistic behaviour of the individual peers. Thus, the implementation of commercial p2p applications requires basic mechanisms to record transactions in the systems, i.e. the resource and service consumption, which will be used for charging, incentives, and control. These basic functionalities can be achieved by an accounting system that ideally should be fully distributed in keeping with the p2p spirit of such a system. Furthermore, it needs to be trustworthy so that the system cannot be misused by individual peers or groups of peers for gaining an undue advantage. Therefore, linking distributed accounting with distributed trustworthiness and distributed collaboration control presents a crucial challenge for the advancement of p2p systems. This dissertation researches this challenge by demonstrating the feasibility of fully distributed, trusted accounting in p2p systems with intrinsic automatic cooperation control by presenting and evaluating the token-based accounting scheme. The token-based accounting scheme's framework introduces tokens as a combination of permission objects and receipts. Permission objects grant to peers the right to consume services and resources. When a peer consumes them, it “spends” tokens, and tokens becomes receipts which contain accounting information about the transaction. This process implements effective accounting with intrinsic cooperation control. The token-based accounting scheme's system architecture is composed of four building blocks: Token structure, transaction protocols, token aggregation, and detection of double spending. The token structure ensures the authentication and integrity of accounting information, as well as the non-repudiation of transactions. The trustworthy transaction protocol introduces a novel transaction procedure that removes the benefits of defrauding the transaction partner but does not require the use of a third trusted party. Token aggregation swaps foreign tokens for new own tokens using a truly decentralised trustworthy process. With this process, a quorum of peers establishes a novel distributed basis of trust for p2p systems. This is achieved by applying threshold cryptography in combination with proactive secret sharing and with novel mechanisms that ensure the random selection of the quorum peers. The quorum size affects the scheme's trustworthiness and is determined using a stochastic model. Efficient detection of double spending is enabled by introducing aggregation accounts that store issuing and usage information about tokens. Aggregation accounts are located at third party peers, called account holder sets. Maintenance operations performed on the account holder sets prevent loss of data and ensure consistency of aggregation accounts. Aggregation accounts are protected against attacks and fraud attempts by concealing their location using a novel overlay routing mechanism. By using simulations for several churn scenarios, the required account holder set size is determined. These simulations prove the token-based accounting scheme's efficiency and the robustness of the storage mechanisms. The token-based accounting scheme was simulated in detail by varying the relevant parameters, i.e., quorum size, account holder set size, churn, and system size. The simulation results demonstrate the viability and efficiency of the novel token-based accounting scheme. Its applicability is shown in two application scenarios.
APA, Harvard, Vancouver, ISO, and other styles
46

Toben, Tobe [Verfasser]. "Analysis of dynamic evolution systems by spotlight abstraction refinement / vorgelegt von Tobe Toben." 2009. http://d-nb.info/996733183/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Boussicaut, Claudine Renee Standley Jayne M. "The effects of music therapy and token economy systems versus music therapy on decreasing inappropriate behaviors with students labeled emotionally disturbed." Diss., 2004. http://etd.lib.fsu.edu/theses/available/etd-04142004-222110/.

Full text
Abstract:
Thesis (M.M.) -- Florida State University, 2004.
Advisor: Jayne M. Standley, Florida State University, School of Music. Title and description from thesis home page (viewed 9-28-04). Document formatted into pages; contains 36 pages. Includes biographical sketch. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
48

Barrulas, João Pedro Valadares. "Analysis of Code Blocks for Concern Detection in MATLAB Systems." Master's thesis, 2019. http://hdl.handle.net/10362/92298.

Full text
Abstract:
It is known that the support provided by MATLAB for module decomposition is limited. Such limitations give rise to code symptoms, which can be explored for the development of techniques for the detection of concerns, namely unmodularised concerns. Recent work in the area of concern detection in MATLAB systems identified several recurring code patterns that can be associated to the presence of specific concerns. Some of the concerns detected proved to be unmodularised: they cut across the MATLAB system’s modular decomposition. The techniques already developed for detecting unmodularised concerns in MATLAB systems still lack precision and accuracy. As proposed in previous work, the techniques and tools for pinpointing and representing concern-detection patterns need maturing. This thesis contributes with a more accurate structure for representing MATLAB code bases in an intelligent repository for MATLAB code, developed prior to this work. It perfects the structure representing MATLAB code on which the repository is based, by refining the notion of code block, and collects code patterns found in previous publications aggregating them into a catalogue. Subsequently, a preliminary study is made on the application of codes of blocks for the detection of concerns, validating previous concern related patterns and evaluate the existence of new ones.
APA, Harvard, Vancouver, ISO, and other styles
49

Liebau, Nicolas Christopher [Verfasser]. "Trusted accounting in peer-to-peer environments : a novel token-based accounting scheme for autonomous distributed systems = Vertrauenswürdiges Accounting in Peer-to-Peer-Umgebungen / von Nicolas Christopher Liebau." 2008. http://d-nb.info/993918131/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Morita, Plinio Pelegrini. "Use of Technological Tools for Supporting Interpersonal Trust: From Modelling to Fostering Trust Through Design." Thesis, 2014. http://hdl.handle.net/10012/8448.

Full text
Abstract:
Trust is a core construct of our social lives, influencing how we interact with other individuals that are part of our social circle. Whether at work, in teams, or with friends and family, trust influences how much information we exchange with the other individuals and how we interact as a dyad. Defined as risk acceptance behaviour in situations where there is dependency between the parties, trusting another person means accepting some risks to benefit from the social integration of tasks and knowledge. In an institutional environment, trust is a core component of teamwork dynamics, having a strong influence on team effectiveness and performance. Teams are the backbone of current industry, research, healthcare, and business domains. Teams have the power to increase the momentum of projects and tasks, and may also benefit from the collective body of knowledge brought by experts from different fields. Teamwork also brings new constraints to the interpersonal dynamic; for instance, a lack of interpersonal trust can deeply impact the performance and effectiveness of a team. Without trust, communication and interaction between team members can be significantly impaired, limiting the ability of a team to perform and to become effective. As teams move to non-collocated work, the development of trust is restricted by the limited media richness of communication channels. The perceptual mechanisms that compose the major part of the trust development process become constrained, as behavioural cues are not readily available through Computer Mediated Communication Systems (CMCSs). For this reason, virtual teams can suffer from low, fragile, and delayed trust, impairing team effectiveness and performance. Given the increasing prevalence of non-collocated teams, there is a need for the development of a toolset for understanding, measuring, and fostering trust in distributed teamwork environments. The existing literature provides only a partial understanding of the trust formation process and does not encompass a detailed description of the perceptual mechanisms that would help explain trust formation and allow the design of interventions tailored at targeting trust. I started by developing a model that explains trust formation and the perceptual mechanisms involved in this process, in which I also incorporate the distinction between intuitive trust and calculative confidence. The Human Factors Interpersonal Trust State Formation Model developed in this thesis helps explain the situational variability of interpersonal trust, a very important characteristic to consider when using the knowledge about trust formation to inform design. This model explains how researchers and practitioners can develop designs and interventions to foster trust based on increasing the perception of trust-building cues. Similarly, good trust metrics must capture both a measurement of trust between two people and provide information about how each trust cue influences the formation of the trust state. With the intent of incorporating situational sensitivity to a trust metric, I designed the Quick Trust Assessment Scale (QTAS), based on the NASA-TLX structure, using a combination of direct rating of subjective subscales of trust, with a pairwise comparison of each pair of subscales. I evaluated the QTAS using Crombach’s Alpha and Factor Analysis. The results showed high internal validity and identified one component for extraction from the metric, since this component focused on measuring a construct outside the interest of the QTAS. The QTAS is the first trust metric to be developed that includes a component to measure the situational variability of trust. The next component of this thesis focuses on identifying and testing ways to foster trust in a specific other through electronic communication. To achieve this objective, I initially conducted an ethnographic study to identify how team members foster trust in face-to-face collaborations and which trust cues are most often exchanged. In this study, I identified the effect of a third party on fostering trust (liaison) and five behaviours, or trust building cues, that were most used: recommendation, validation, expertise, social network, and benevolence/willingness to help. These five behaviours were later converted into interface design objects (trust tokens), in the form of badges, to be used in CMCSs and social network environments, acting as surrogates for the missing trust cues. The trust tokens were tested on simulated social network interfaces to identify the effects of multiple latent factors. Results showed that the use of the trust tokens is independent of gender, age, education level, and personality type. However, use was dependent on the type of risk the participants were facing and their cultural background. Although trust tokens are effective in fostering trust behaviour, there was not a unified solution for every type of situation. In order to further validate the situational dependence of trust decisions, I have evaluated two major variables of interest. Through experimental manipulation, I demonstrated the influence of (1) situational risk and (2) cultural background on the use of trust cues. These findings are of relevance for the design of systems that support the development of interpersonal trust as they raise the awareness of the highly variable nature of trust. In order for designers, researchers, and practitioners to successfully influence trust behaviour in teamwork environments, they need to include interpersonal trust as a variable of interest in the design requirements of systems that support teamwork, as well as carefully consider the impact of their interventions, as their interventions will influence variably, depending on the situation and target population. Ultimately, this research program demonstrates the importance of including interpersonal trust as a variable of interest in and as a requirement for the design of systems that support teamwork and collaboration.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography