Dissertations / Theses on the topic 'Token system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Token system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nalli, Sehar K. "SYNCHRONIZED TOKEN GENERATOR SYSTEM." Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1146151257.
Full textPark, Jongbum. "Parallel token processing in an asynchronous trigger system." [Florida] : State University System of Florida, 1999. http://etd.fcla.edu/etd/uf/1999/amg2152/park%5Fj.pdf.
Full textTitle from first page of PDF file. Document formatted into pages; contains xiii, 166 p.; also contains graphics. Vita. Includes bibliographical references (p. 160-165).
Li, Bo. "On the optimization of the token bucket control mechanism." Thesis, University of Ottawa (Canada), 2003. http://hdl.handle.net/10393/26339.
Full textMcNeely, Mitchell P. "A Comparison of Fixed- and Variable-Ratio Token Exchange-Production Schedules with Children with Autism Spectrum Disorder." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404526/.
Full textWenhua, Qi, Zhang Qishan, and Liu Hailong. "RESEARCH OF SECURITY HARDWARE IN PKI SYSTEM." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606688.
Full textSecurity hardware based on asymmetric algorithm is the key component of Public Key Infrastructure (PKI), which decides the safety and performance of system. Security device in server or client have some common functions. We designed the client token and cryptographic server to improve the performance of PKI, and got obvious effect.
Waggy, Kimberly. "The effects of a token economy system in comparison to social praise on the manifest behaviors of elementary learning disabled students." Huntington, WV : [Marshall University Libraries], 2002. http://www.marshall.edu/etd/descript.asp?ref=441.
Full textBursum, Kim. "Initial Comparative Empirical Usability Testing for the Collaborative Authentication System." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6614.
Full textTomaka, Ashley. "Evaluation of a level system with a built in token economy to decrease inappropriate behaviors of individuals with mental retardation." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003116.
Full textLöbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Universitätsbibliothek Leipzig, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-218169.
Full textLöbler, Helge. "When trust makes it worse - rating agencies as disembedded service systems in the U.S. financial crisis." Informs, 2014. https://ul.qucosa.de/id/qucosa%3A15267.
Full textYao, Li-Jun. "Real-time communications in token ring networks." Title page, abstract and contents only, 1994. http://web4.library.adelaide.edu.au/theses/09PH/09phy248.pdf.
Full textGordon, Heidi. ""Picture This"| Token Economy Systems With or Without Pictures." Thesis, Trinity Christian College, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10814013.
Full textThis study investigates the outcome of using two different types of token economy boards to reduce disruptive behavior and off-task behavior of children ages five to seven, in a self- contained special education setting in a suburban public school. The purpose of using two different types of token economy boards is to find out which token board is more effective in reducing target behaviors. One token board is personalized with a picture of the student and their favorite characters or toys; the other chart is plain with no personalized pictures at all, other than a Board Maker picture of the preferred behavior and a picture of the reward.
The sample used for data collection consists of three students, one female and two males, aged 5 to 7, diagnosed with Autism. Data collection included a detailed and accurate count of the disruptive and off-task behaviors that were logged onto data sheets. Data was collected from the student’s arrival in the morning until dismissal time at the end of the school day by having each one-to-one paraprofessional use a clicker counter for each disruptive behavior. The collection of data took place over five consecutive weeks, where the two token economy boards were alternated weekly for each child. The aim for this study is to draw conclusions on which token board provided better results in positive behavior, as well as if a noticeable preference was observed in the student’s reactions to the different token boards.
Mixed methods research was used in this investigation, which includes the mixing of qualitative and quantitative data. My hypothesis stated that a higher rate of on-task behavior would occur, with less disruptive behavior, by using a token board with personalized pictures for this age group of children. The conclusions of this investigation show that a higher rate of on-task behavior with less disruptive behaviors occurred from using the plain token economy board for this age group with their current medical diagnosis of autism.
Washington, Kyle. "A wireless token ring approach for contention resolution in a wimax environment." Diss., Online access via UMI:, 2006.
Find full textVašková, Barbora. "Kamerové zabezpečení objektu s nízkým datovým tokem." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413086.
Full textWang, C. J. "The Lexical Token Converter : Hardware support for Large Knowledge Based Systems." Thesis, University of Manchester, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.383888.
Full textMcGillvray, Patrick J. "Integration of Systems Management Departments 0TR, 4TR, and 8TR token ring local area networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304520.
Full textLiu, Hailong, Wenhua Qi, Qishan Zhang, and Jinpei Wu. "PKI/PMI AND SMART TOKENS IN HEALTHCARE INFORMATION SYSTEMS." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606668.
Full textWhile healthcare industry is striving to achieve e-health systems for improvements in healthcare quality, cost, and access, privacy and security about medical records should be considered carefully. This paper makes a deep study of Public Key Infrastructures (PKIs) and Privilege Management Infrastructures (PMIs) and how they can secure e-health systems. To access resources, e.g. patient records, both authentication and authorization are needed, so public key certificates and attribute certificates are both required to protect healthcare information. From a typical medical scenario, we see not only static but also dynamic permissions are required. Dynamic authorization maybe the most complex problem in e-health systems.
Pokorný, Lukáš. "Multiplatformní autentizační systém." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220411.
Full textHedberg, David. "Autentisiering av användare i datoriserade miljöer hos SMF - biometri kontra tokens : En jämförelse av två sätt att implementera autentisering av användare." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18816.
Full textAs technology evolves, corporations and enterprises are forced to evolve alongside it. Storing company information and data on servers and computers have become common practice.Initially, the goal with the work presented was to compare biometric authentication and token authentication in relation so SMEs. In the current landscape there is no comprehensive study in these two methods of authentication in relation to SMEs. A framework was developed for system administrators to use when choosing one of these methods of authentication. The framework is a summarization of the works analytical part.A literature study was conducted to reach the goal. Three databases were used as sources of information. These three were namely IEEEXplore, ACM Digital Library, and ScienceDirect. From these sources, literature was identified on which the study was then based. Thematic coding was used to analyze the collected data.After the process of collecting and including/excluding was complete, a total of 28 articles remained. From these articles a total of 10 themes were identified from the thematic coding. These themes were cost, integrity, usability, security pros, security cons, two-factor authentication, scalability, biometric types, token types, and future biometric technology. Four of these were more prevalent, namely cost, integrity, usability, and security.After the analysis was finished the themes that emerged as important were integrity and usability. Because of this, the framework is heavily influenced by these themes and they are particularly important for system administrators to consider.
Jajtner, Petr. "Implementace OTP ve vybraném systému." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-260667.
Full textČerný, Pavel. "Prednasky.com - systém pro automatické zpracování přednášek." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2015. http://www.nusl.cz/ntk/nusl-264970.
Full textLing, Jintao. "Coronavirus public sentiment analysis with BERT deep learning." Thesis, Högskolan Dalarna, Informatik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:du-34253.
Full textNakasaki, Rosania Felix. "A persuasão em dois gêneros discursivos: um enfoque sistêmico-funcional." Pontifícia Universidade Católica de São Paulo, 2011. https://tede2.pucsp.br/handle/handle/13512.
Full textConselho Nacional de Desenvolvimento Científico e Tecnológico
Reading and writing are the basis for a critical reading of the world, and it is from them that starts the process of awareness of rights and duties of citizens, essential to the process of democratization. The main goal of teaching Portuguese at any level of education should be to provide conditions for the development of the student's language, its discourse, its capacity of expression in oral and written language (Koch, 2002). By the way, says Freire (2001), the educator who does not have a critical baggage and do not make a creative educational work is considered "dumb" before the world and himself. Second Demo (1996), the formation of critical-creative and participatory specifically depends on learning to learn, learn to think better act, innovate, and this, educators need to be prepared, as are the trainers. As a teacher of Portuguese believe I have, more than other professionals, the task of studying the importance of language, whether in oral texts, whether in writing, in real use - language - and investigate how these texts can be worth of speech acts, direct or indirect inducement, thus building a textual world (Downing, 2003), 'realities' are not always compatible with the factual world. According to Fowler (1991), any aspect of linguistic structure carries ideological meaning - lexical selection, syntactic option, etc.. - All have their raison d'etre. There are always different ways of saying the same thing, and these alternative modes are not accidental. One of the factors which contribute to enable the blending of facts and interests of various kinds, not always perceptible to the reader, and that underlie the text, is the Appraisal (Appraisal) (MARTIN, 2000, 2003), a reticular system of descriptions of options semantics to evaluate people, things and phenomena. He and his group have developed techniques to be applied systematically to the full text of any record, working within the general framework of Systemic Functional Linguistics. Persuasion, in particular the implicit persuasion (attitude tokens), it is not always realized by adjectives and adverbs clearly persuasive, but also thanks to certain choices lexicogrammatical not considered in the interpersonal tradition, but that, combined with specific contexts and that cumulatively occur as the text unfolds - the logogênese (Halliday 1992, 1993; Halliday, Matthiessen 1999), makes them highly effective. This research aims to examine the persuasion that runs two different genres: a chronic and talk show on TV, to see how it is done through the tokens of attitude in these contexts of use of language. To do so, must answer the following research questions: (a) how is persuasion through the tokens in the chronic attitude and talk show? (b) what choices lexicogrammatical are more used to the achievement of tokens in each gender? The results show that the criticism is built by irony, alternating alignments with explicit evaluative attitude and tokens. Such resources involve tokens signed on facts known to the reader, thus ideational, the speech of the animator, but enclosing Social Assessments negative, leaving the role of author (Goffman 1979) to the caller
A leitura e a escrita são a base para uma leitura crítica do mundo, e é a partir delas que se inicia o processo de consciência dos direitos e deveres do cidadão, indispensável ao processo de democratização. O principal objetivo do ensino de Língua Portuguesa, em qualquer nível de ensino, deve ser o de proporcionar condições para o desenvolvimento da linguagem do aluno, da sua discursividade, da sua capacidade de expressão na linguagem oral e escrita (KÖCHE 2002). A propósito, diz Freire (2001), que o educador que não possuir uma bagagem crítica e não fizer um trabalho educativo criativo é considerado mudo , perante o mundo e a si mesmo. Segundo Demo (1996), a formação de sujeitos críticos-criativos e participativos depende especificamente de aprender a aprender, saber pensar para melhor intervir, inovar, e isto, os educadores têm que estar preparados, já que são os formadores. Como professora de Língua Portuguesa acredito ter, mais que outros profissionais, a incumbência de estudar a importância da língua, seja em textos orais, seja na escrita, em situação real de uso a linguagem -, e investigar em que medida os textos podem se valer de atos de fala diretos ou indiretos de persuasão, construindo, assim, um mundo textual (DOWNING 2003), de 'realidades' nem sempre compatíveis com o mundo factual. Segundo Fowler (1991), qualquer aspecto da estrutura linguística carrega significação ideológica - seleção lexical, opção sintática, etc. todos têm sua razão de ser. Há sempre modos diferentes de dizer a mesma coisa, e esses modos não são alternativas acidentais. Um dos elementos que concorrem para possibilitar a mesclagem de fatos e interesses de várias naturezas, nem sempre perceptíveis ao leitor, e que subjazem ao texto, é a Avaliatividade (Appraisal) (MARTIN 2000; 2003), um sistema reticular de descrições de opções semânticas para avaliar pessoas, coisas e fenômenos. Ele e seu grupo desenvolveram técnicas para ser aplicadas sistematicamente a textos inteiros de qualquer registro, trabalhando dentro do enquadre geral da Linguística Sistêmico- Funcional. A persuasão, em especial a persuasão implícita (tokens de Atitude), nem sempre é realizada por adjetivos e advérbios claramente persuasivos, mas graças também a determinadas escolhas léxico-gramaticais, não consideradas interpessoais na tradição, mas que, combinadas a contextos específicos e que acontecem cumulativamente conforme o texto se desenrola - a logogênese (HALLIDAY 1992, 1993; HALLIDAY; MATTHIESSEN 1999), tornam-nas altamente eficazes. A presente pesquisa tem como objetivo examinar a persuasão que percorre dois gêneros diferentes: a crônica e o talk show na TV, para verificar como ela é feita através dos tokens de Atitude nesses contextos de uso de língua. Para tanto, deve responder às seguintes perguntas de pesquisa: (a) como é feita a persuasão através dos tokens de Atitude na crônica e no talk show? (b) que escolhas léxico-gramaticais são mais utilizados para a realização dos tokens em cada um dos gêneros? Os resultados mostram que a crítica é construída através da ironia, que alterna alinhamentos com Avaliatividade explícita e com tokens de Atitude. Esse tokens envolvem recursos firmados em fatos de conhecimento do leitor/ouvinte, portanto ideacionais, na fala do Animador, mas que encerram Apreciações Sociais negativas, deixando o papel de 'Autor' (GOFFMAN 1979) para o interlocutor
Bennison-Chapman, Lucy. "The role and function of 'tokens' and sealing practices in the Neolithic of the Near East : the question of early recording systems, symbolic storage, precursors to writing, gaming, or monitoring devices in the world's first villages." Thesis, University of Liverpool, 2014. http://livrepository.liverpool.ac.uk/2008477/.
Full textChiu, Cheng-Yung, and 邱政湧. "Token Passing Model Applied to Continuous Mandarin Keyword Spotting System." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/xjbp63.
Full text中原大學
資訊工程研究所
91
Using speech signal as input to manipulate computer is an important application of speech signal processing research. The system described in our study, is implemented by using Token Passing Model with keyword spotting under Microsoft Visual C++ 6.0 and Windows 2000 operation system. The system utilize the coefficient of Mel-Frequency Cepstrum as the feature parameter, then use the method of CHMM (Continuous Hidden Markov Model) to establish acoustic model. The 415 syllables in Mandarin are further decomposed into right context dependent sub-syllabic units, which are 113 Right Context Dependent INITIAL and 39 Context Independent FINAL. The INITIAL/FINAL are represented by 3-state/4-state. In addition, build a silence and short pause acoustic model, which are represented by 4-state. Then the system uses Token Passing to build a filler model keyword spotting system, and uses the Utterance Verification technology to verify the utterance correct or incorrect. Finally, the research develops a speech input interface system and uses hierarchical architecture method to reduce the number of keyword and uses agent of Text To Speech to lead the users. The system also uses positive and negative sentence to promote the detection rate of keyword spotting.
YOU, ZONG-SIAN, and 游宗憲. "RFID Combined Token System Applied To The Elementary School Class Resource." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/62247082599588659208.
Full text亞洲大學
資訊工程學系碩士在職專班
101
With the wave of returning to the mainstream with the implementation of special education students, a large number of special education students are placed in the elementary resource classes. Special education students need more specific methods to help develop good behavior and learning so that resource room teachers requires using behavior change techniques to improve the learning and behavior of special education students. In this study, behavior-change tokens system technology is used to assist teachers in the reward system. The tokens system in the past easily damaged and lost was difficult to record student behavior for a long time, and spent more time, Therefore, RFID technology used in this study through fast recognition has the advantages of high correct recognition, read and write capabilities, label penetrating, and long life to assist teachers to construct a system for teachers to easily implement the token system and improve the shortcomings of monetary system with conventional labor practices, so that teachers can have more time to teach.
Gu, Wan-Chi, and 辜婉琪. "Synthesis of Token-Conserved Petri Net in an Automated Mould Filling System." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/70634906948774606156.
Full text國立交通大學
工業工程與管理學系
101
In this thesis, a new token-conserved Petri net design method is proposed for a given automated mould filling system. The development of this new design method consists of three stages: the formation of synthesis rules, the design of elementary manufacturing processes, and the synthesis of token-conserved Petri net. At the synthesis rules formation stage, many decomposition examples from token-conserved Petri nets into Eulerian marked graphs are observed and analyzed. Subsequently their characteristic features for reversing the decomposition process are induced in order to form the synthesis rules. At the elementary manufacturing process stage, three Eulerian marked graph based on hierarchy transformation method are designed according to different manufacturing requests. At the token-conserved Petri net synthesis stage, two design steps are involved. One is to generate a token-conserved Petri net from three Eulerian marked graphs using the synthesis rules. The other is to transform the token-conserved Petri net into an interpreted Petri net for controlling the given automated mould filling system.
Ying-Hsuan, Chen, and 陳螢萱. "An action research on using token system in teaching English in a junior high school." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/68107033294354185252.
Full text國立臺中教育大學
課程與教學研究所
99
This study was intended to investigate the teaching technique and viewpoints of teacher’s integration of token system into English teaching in junior high school. An action research method was used to help improve the problem of students’ individual learning differences. The purposes of the study are stated as follows: 1. to discuss relevant theories and studies of token system 2. to explore the application of the token system in English teaching in junior high school 3. to implement token system in action research of English teaching in junior high school. 4. to provide teachers with the implication of using token system in teaching English The participants of the study were 34 first-year junior high school students. The instruction lasted a semester, five classes a week. The process of using token system in teaching English was shown in observation, interview, and researcher’s reflective journal. Also, students’ learning performance and interests were emphasized. Based on the results, using the token system in teaching English seemed to improve students’ learning performance, but it would be better applied with other teaching techniques. It was effective to have students do drills, but flexible adjustments were necessary to students’ needs. Students’ learning interests would also be raised by creating a friendly learning environment. It was suggested that individual student should be promised with an opportunity to success and that teachers paid attention to the possible effects on students with lower academic achievement. Finally, the researcher should also keep working on teaching improvements and the interaction with students.
Cheng, Ya-Wen, and 鄭雅文. "An Action Research on Using Token System in Mathematical Remedial Teaching in Fifth Grade Class." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/30855786770155883068.
Full text國立臺中教育大學
教師專業碩士學位學程
104
Action research method was adopted in this study, which involved 7 students (4 boys, 3 girls) in a mathematical remedial teaching class of fifth grade in Hao-Wen elementary school in Changhua, and token system were implemented in this class. Data were collected through qualitative research (including observation records, interviews, and teaching diary) and quantitative research (learning status and learning interests questionnaire) to explore the process of mathematical remedial teaching and the performance of students’ learning interest. The results of this study were listed as follows: 1. Adding the criterion of non-target behavior in the token system guided students efficiently to behave properly. It’s painful for students that the researcher took away the token from students. Therefore, in this study, the researcher avoided the criterion of non-target behavior by taking away the tokens. Because of that, students will follow the rules. 2. The instructive material awards guided students efficiently to have proper attitude. The researcher used meaningful, valuable and instructive material awards but costly purchases. 3. Implementing token system promoted low achievement students’ learning interest in mathematic. Furthermore, gaining tokens was an encouragement as well as an approval. Because of the tokens, students had more confidence in learning. 4. Implementing token system enhanced the researcher’s professional development. The research learned the enhancement by using token system and designed “Quizzes” and “Math Board Games” to improve the competent of curriculum design and the difficulty adjustment of the curriculum. Based on the results of the study, the researcher provided some suggestions for other teachers and the future study.
Hung, Su-Ya, and 黃蜀雅. "The Key Success Factors of the Xi-Hu Cool Virtual Token On-Line Incentive System." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/62210758835728033337.
Full text實踐大學
家庭研究與兒童發展學系碩士班
98
The study combines qualitative study method and quantitative study method by integrating thematic analyses and questionnaire surveys. The contents of related projects of Xi-Hu on-line incentive system, discussions from various fields, and the data of the development of web-based archives are used to understand and recapitulate the executed results and situations of the incentive system. The study finds that Xi-Hu virtual coin on-line incentive system corporate web-based learning process mechanism, and adopts students’ learning motivation and expectancy to design the incentive system, which, thereby, stimulates students’ interests to actively and continuously participate in the on-line learning activities. School could thereby utilize the interest and transfer it to the curriculum and teaching activities. The quantitative study uses questionnaire surveys. On-line questionnaires were conducted to 322 registering 4th~6th graders, key success factors of the Xi-Hu virtual coins were obtained from these students’ evaluation. The first part of the study uses descriptive statistics to analyze students’ personal data, IT facilities, percentage of the learning motivations and expectancy. The second part uses digression method to recognize the factors that influence students’ evaluation of the incentive system. The results of the study indicate that ease of use, usefulness, valence and self development have evident influence over students’ evaluation. Nine key success factors are induced from four variables (the key person, IT environment, standard of value, and learning community). In conclusion, the results of the study can be of assistance to the administration in evaluating the possibility of integrating virtual currency to incentive system, and to serve as reference for future researchers.
Bailey, Dawn A. Bailey Jon S. "The use of collaborative goal setting to impact instructional aide implementation of a school-wide behavior management system /." Diss., 2005. http://etd.lib.fsu.edu/theses/available/etd-07112005-131027/.
Full textAdvisor: Dr. Jon S. Bailey, Florida State University, College of Arts and Sciences, Dept. of Psychology. Title and description from dissertation home page (viewed Sept. 15, 2005). Document formatted into pages; contains vii, 60 pages. Includes bibliographical references.
曾靖娟TSENG, CHING-CHUAN. "The Study on the Process of Classroom Regulations for Young Children Based on the Implementation of Token System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/d6w3xc.
Full text國立臺中教育大學
教師專業碩士學位學程
104
This study implemented a token system to assess children’s behavior in routine classroom courses. The difficulties associated with the implementation of the token system in a conventional kindergarten class were examined, and possible coping strategies are highlighted. Such strategies can serve as a reference for teachers in their professional development. An action research method was applied to children assigned to the Orange Class at Hsinchu County State Star Elementary School, and relevant documents and data collected over a period of 3 months were analyzed. The specific findings of this study are outlined as follows: 1.Use of token system to establish a regular classroom course: First, discussions were held with teachers, after which the token system was implemented. Subsequently, the implemented token system was continually adjusted by observing children’s behavior as they used this system and the conventional token system. This study determined that the implemented token system has a higher efficiency level than does the conventional token system. 2.Difficulties faced and coping strategies: (1) Administering the two token systems to the children confused them. Therefore, the use of a standard token system is recommended. (2) Because different teachers have different thoughts, and procedures developing consistent token implementation standards is difficult; additional teacher consultations are thus required to achieve such standards.(3) Reinforcement exchange procedures are complex and time consuming, and such procedures must be simplified.(4) Change provisions of tokens for failing to set records and inconvenient, so pre-set standard routine. (5) Different token system operators have inconsistent token usage trends; thus, only one teacher must operate the token system. (6) Because of the lengthy token exchange procedures, children may easily lose patience; therefore, token exchange standards must be lowered. (7) Because individual differences are observed and recorded, some children may develop a sense of failure. Hence, the scoring system must be changed. 3.Researcher of professional development: Researcher can enhance their class management and token systems skills. Finally, the results of this study can serve as a reference for kindergarten teachers and future research in the development of token systems.
Lim, Jiin-Yuh, and 林蓁巸. "Action Research on the Influence of Token Reward System on the Seventh Graders' Mathematics Learning Motivation and Academic Achievement." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/479c3m.
Full text國立彰化師範大學
科學教育研究所
106
The purpose of this study is to enable the researcher to more clearly grasp the implementation of the token reward system, analyze how the token reward system affects the seventh grade students' learning motivation towards mathematics, and explore the effects of the token reward system on the seventh grade students' academic achievements in mathematics. This study adopts the method of action research, implementing the token reward system developed by the researcher in seventh grader's mathematics learning. A total of 152 seventh grade students from three classes of the researcher participated in this research. After implementing the token reward system for two semesters in an academic year, the researcher made the following conclusions: 1. By means of constant revisions and improvements, the researcher can better monitor the implementation of the token reward system. 2. The results of the token reward system showed a significant decrease in students’ responses to the mathematics learning motivation scale. Therefore, the researcher carried out a feeling survey and a sampling interview to collect the students’ feedback. However, the students' feedbacks were rather positive, which affirm that the implementation of the token reward system in teaching activities helps to arouse students’ interest in the learning of mathematics. 3. The token reward system showed a positive effect on students’ academic achievement in mathematics significantly, since students had performed better in midterm and final term assessments compared with their early term assessments. 4. Students involved in the token reward system showed a better academic achievement in mathematics compared to those who learned mathematics through the did not receive the token reward system method. Finally, according to the research findings, the researcher could put forward some suggestions to the school authorities in order to enhance the effectiveness of mathematics learning by implementing the token reward system.
Falkenreck, Jan. "Integration von Methoden und Verfahren zur gesicherten Übertragung von Daten und zur Authentifizierung in ein webbasiertes System." 2002. https://ul.qucosa.de/id/qucosa%3A16530.
Full textHsu, Chih-hsin, and 徐智信. "A Study on Applying a Token System to the Class Management - Take an Elementary School in Xin-Bei City for Example." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/26109640841089136919.
Full text世新大學
資訊傳播學研究所(含碩專班)
100
The purpose of this research is to establish the type of classroom rules management by token system. Also, exploring the concrete influence on the students' behavior under the token system, and discussing the teachers' profession development in this experience. The research method of this paper is Education Action Methods. Quantification is subordinate to methods of qualitative. Take the 5th grade elementary school students in Xin-Bei City for example. The conclusion is drawn by the students' information, the researcher's teaching log, and the records of interview and analyses.The final conclusions are below: To understand the students' situation is the first thing. Teachers and students establish the classroom rules together. The teachers communicate with the parents to make a common consensus and the students get familiar with the rules. Next, all the classroom rules should be taught to the students continuously. The principle is more encouragement, and less punishment. The teachers can use the positive reinforcement and social encouragement to lead the students to the right behavior. Then, playing games can make the classroom rules management more interesting. It also makes the students put themselves into the model of classroom rules management and attract the class solidarity.The teachers have to know the timing of reward and make the exchange of the reinforcement the best efficiency. After that , to use the orderly competition well. Let every student get the opportunity to succeed. So, the students have the motivation to gain fulfillment and satisfaction. Finally, teachers can make a self- examination through this action research. They can also establish their own strategies of classroom rules management from the problems they find.
Chen, Ya-Ping, and 陳雅萍. "The Action Research on Applying a Token System to the Classroom Management of the Elementary School-Take One Class for Example." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/s3zf6d.
Full text中臺科技大學
文教事業經營研究所
101
This study takes the action research method to evaluate the teaching effectiveness of applied token system to the classroom management. This study applies Skinner’s “Reinforcement theory” and Maslow’s “Need-hierarchy theory” as a theoretical foundation. The subjects of this study were 26 fourth-grades students in the researcher’s school during 24weeks. The researcher collected the experimental data through observation records, interviews, reflection notes, questionnaire surveys, students’ diaries, and focused group interviews. According to the literature review, research finding and discussion, and also the process of planning, execution, reflection, and adjustment, the conclusions are:The adjustment of token system strengthens students’ behavior. It guides students to build up positive and adequate behavior, and helps students to learn self-discipline. The researcher also discussed the difficulties of token system and provided some possible solutions. Based on the results of study, the researcher provided some suggestions for the future study and to other teachers who are interested in applied token system to the classroom management.
LIN, HSIANG-YIN, and 林香吟. "An Action Research on the Effectiveness of Classroom Regulations and Classroom Climate in Junior High School Based on the Implementation of Token System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/85448389098795169586.
Full text國立臺中教育大學
教育學系
102
The action research was adopted in this study: 31 seventh grade students from homeroom were included (16 boys, 15 girls), and token system were implemented in this class. Data were collected through qualitative research (including observation records, interviews, reflection notes, and questionnaire surveys from parents and full-time teachers) and quantitative research (including descriptive statistics and classroom climate inventory of junior high school) to explore the effectiveness of classroom regulations and classroom climate in junior high school based on the implementation of token system. The results were as follows: 1.The token system could help most of the students build up good self-discipline while the rest should be disciplined with other strategies. Among those strategies that the researcher worked on, group mechanism was the most effective one. 2.Implementing token system could create the classroom climate effectively, especially when it was used to inspire the whole class to strive for classr honor. 3.Token system should make good use of group force owing to junior high school students’ overemphasis on peers relationship. Therefore, “group mechanism” helped the well-behaved students inspire those who didn’t behave so well and thus helped cultivate a positive climate. 4.Token system should be accompanied by other strategies. In this study, strategies that had been used were – discipline strategy, complimentary teaching, and related counseling strategies. 5.Implementing token system helped to avoid the tense relationship between teachers and students. Based on the results of the study, the researcher provided some suggestions for other teachers, school administration organization, and the future study.
Green, Breton. "Multiple ring networks in clustered traffic environments." Thesis, 1998. http://hdl.handle.net/10413/6200.
Full textThesis (M.Sc.-Electronic Engineering)-University of Natal, 1998.
Huang, Mau-Jing, and 黃茂景. "REAL TIME SYSTEMS ON TOKEN BUS NETWORKS." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/05165065642598133454.
Full text大同工學院
資訊工程研究所
81
The token bus LAN based on the IEEE 802.4 protocol has gradually become as the standard local network in both the industrial automation and process control. It consists of several attractive characteristics, such as deterministic nature, simplicity, efficiency, reliability and priority scheme, which facilitate the design and implementation of most time-critical applications that require the real time communication with limited transmission delay. Ths research is on a symmetric token-passing bus network carrying multiple classes of traffic. we present three TRTs assignment strategies that meets the requirements of waiting time and bandwidth by considering the message arrival rate of each class, The TRT value is set to the maximum circulation time value for each class in strategy one. In strategy two, after class 6 has transmitted its data, the other classes devide the remaining network badwidth. In the case of strategy three, the class 6 first make use of the network bandwidth, and then the other classes are allowed to employ the network bandwidth in descending order. In order to fit different applications, we explore the situations when laxity is existed or not, and when the network is overload or underload.
Liu, Yi-Sheng. "A token based MAC protocol for wireless ad hoc networks." Thesis, 2003. http://hdl.handle.net/10413/4172.
Full textThesis (M.Sc.-Engineering)-University of Natal, 2003.
Wong, William King. "Packet scheduling in wireless systems by Token Bank Fair Queueing algorithm." Thesis, 2005. http://hdl.handle.net/2429/17184.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Liu, Yi-Sheng. "Hybrid token-CDMA MAC protocol for wireless networks." Thesis, 2009. http://hdl.handle.net/10413/819.
Full textChang, Tsai-Chen, and 張在宸. "Single Sign On system by using dynamic tokens." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/88tx9r.
Full text銘傳大學
資訊管理學系碩士在職專班
94
This paper presents an authentication scheme for mobile terminal station. In order to improve the performance of the authentication scheme for conventional single-sign-on (SSO), this paper tries to carry on the authentication and trade by dynamic staff of authority (Dynamic Tokens). We propose a secure and efficient scheme that suitable for mobile terminal network environment. Under SSO Proxy Model, we design four strategies of inquiry tactics, it including Base Strategy, Circulator-history Strategy, Provider-Probability Strategy and Mix Strategy. We also verify these strategies by SMPL simulation. As the result, the experimental result shows that our proposed scheme, Mix Strategy, outperform other extant schemes.
Chen, Kun-Ting, and 陳坤定. "A Token-based Approach to Load Balancing of Heterogeneous, Multi-resource Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/49448376697768521590.
Full text國立交通大學
資訊科學與工程研究所
98
The Internet has become an indispensible media where people access various on-line services, such as executing personalized applications, browsing and publishing web contents, communicating with friends and co-workers, and so on. From the server-side perspective, providing an Internet service requires sufficient CPU power as well as other kinds of resources such as memory, disk space, and network bandwidth, in order to maintain satisfactory service quality. When the kinds of services increase and their popularity vary, how to ensure quality of service without acquiring excessive computing resources becomes a challenge. Modern web-based systems employ various load balancing techniques in order to spread user requests among multiple machines. However, most of these techniques assume that servers are homogenous with similar resource capacities. Because different services impose different requirements on different kinds of resources, and the request rates for different services are also different, these load balancing techniques may not operate optimally and result in unnecessary resource contention. We have studied the problem of load balancing among machines with heterogeneous resource capacities in a traditional resource scheduling context, and proposed a market-based approach to effectively reducing unnecessary system bottleneck. In this thesis, we extend the previous study but focus on web-based systems, where requests tend to be small in processing time but large in volume. To apply the same market-based principle, we propose a token-based approach in which the servers do not exchange load on a per-request basis, but rather on a token basis where each token represents a workload with specific multi-resource requirements. Our goal is to balance the server load and to make efficient use of all the available system resources. We have conduct extensive simulation under different system configurations and compare our method with existing load balancing schemes. The results showed that our approach provides substantial performance improvement, capable of delivering equivalent system throughput with fewer machines.
Liebau, Nicolas Christopher. "Trusted Accounting in Peer-to-Peer Environments - A Novel Token-based Accounting Scheme for Autonomous Distributed Systems." Phd thesis, 2008. https://tuprints.ulb.tu-darmstadt.de/1193/1/Dissertation_liebau_2008-Main.pdf.
Full textToben, Tobe [Verfasser]. "Analysis of dynamic evolution systems by spotlight abstraction refinement / vorgelegt von Tobe Toben." 2009. http://d-nb.info/996733183/34.
Full textBoussicaut, Claudine Renee Standley Jayne M. "The effects of music therapy and token economy systems versus music therapy on decreasing inappropriate behaviors with students labeled emotionally disturbed." Diss., 2004. http://etd.lib.fsu.edu/theses/available/etd-04142004-222110/.
Full textAdvisor: Jayne M. Standley, Florida State University, School of Music. Title and description from thesis home page (viewed 9-28-04). Document formatted into pages; contains 36 pages. Includes biographical sketch. Includes bibliographical references.
Barrulas, João Pedro Valadares. "Analysis of Code Blocks for Concern Detection in MATLAB Systems." Master's thesis, 2019. http://hdl.handle.net/10362/92298.
Full textLiebau, Nicolas Christopher [Verfasser]. "Trusted accounting in peer-to-peer environments : a novel token-based accounting scheme for autonomous distributed systems = Vertrauenswürdiges Accounting in Peer-to-Peer-Umgebungen / von Nicolas Christopher Liebau." 2008. http://d-nb.info/993918131/34.
Full textMorita, Plinio Pelegrini. "Use of Technological Tools for Supporting Interpersonal Trust: From Modelling to Fostering Trust Through Design." Thesis, 2014. http://hdl.handle.net/10012/8448.
Full text