Thèses sur le sujet « Science and sate »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Science and sate.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Science and sate ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

GoluboviÄ, Boris 1967. « Study of near-infrared pumped solid-sate lasers and applications ». Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10046.

Texte intégral
Résumé :
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaves 114-121).
by Boris Golubovic.
Ph.D.
Styles APA, Harvard, Vancouver, ISO, etc.
2

Friend, Jennifer Ingrid Eubanks Eugene E. « Research on same-gender grouping in eighth-grade science classrooms ». Diss., UMK access, 2004.

Trouver le texte intégral
Résumé :
Thesis (Ph. D.)--School of Education. University of Missouri--Kansas City, 2004.
"A dissertation in urban leadership and policy studies in education, and education." Advisor: Eugene E. Eubanks. Typescript. Vita. Title from "catalog record" of the print edition. Description based on contents viewed Feb. 23, 2006. Includes bibliographical references (leaves 179-187). Online version of the print edition.
Styles APA, Harvard, Vancouver, ISO, etc.
3

Coche, Bernard. « Societe civile et developpement des services de sante en afrique sub-saharienne : de la sante mentale a la sante publique (doctorat : biologie et sciences de la sante) ». Rennes 1, 1999. http://www.theses.fr/1999REN1B037.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Doherty, Kevin Eric. « SAGE-GROUSE AND ENERGY DEVELOPMENT : INTEGRATING SCIENCE WITH CONSERVATION PLANNING TO REDUCE IMPACTS ». The University of Montana, 2009. http://etd.lib.umt.edu/theses/available/etd-03262009-132629/.

Texte intégral
Résumé :

Effective conservation planning in the face of rapid land use change requires knowledge of which habitats are selected at landscape scales, where those habitats are located, and how species ultimately respond to anthropogenic disturbance. I assessed sage-grouse (Centrocercus urophasianus) large scale habitat ecology and response to energy development in the winter and nesting seasons using radio-marked individuals in the Powder River Basin, Montana and Wyoming, USA. Landscape scale percent sagebrush (Artemisia spp.) cover at 4-km2 was the strongest predictor of use by sage-grouse in winter. After controlling for vegetation and topography, the addition the density of coal-bed natural gas wells within 4 km2 improved model fit (AIC -6.66, wi = 0.965) and indicated that sage-grouse avoided energy development. Nesting analyses showed that landscape context must be considered in addition to local scale habitat features (wi = 0.96). Findings provide managers a hierarchical filter in which to manage breeding habitats. Twice the amount of nesting habitat at 3, 5 and 10-km scales surrounded active leks versus random locations. Spatially explicit nesting and wintering models predicted independent sage-grouse locations (validation R2 ≥ 0.98). I incorporated knowledge of energy impacts into a study design that tested for threshold responses at regional scales analyzing 1,344 leks in Wyoming from 1997-2007. Potential impacts were indiscernible at 1-12 wells within 32.2 km2 of a lek (~1 well / 640 ac). At higher wells densities a time-lag showed higher rates of lek inactivity and steeper declines in bird abundance 4 years after than immediately following development. I spatially prioritized core areas for breeding sage-grouse across Wyoming, Montana, Colorado, Utah and the Dakotas and assessed risk of future energy development. Findings showed that bird abundance varies by state, core areas contain a disproportionately large segment of the breeding population and that risk of development within core areas varies regionally. My analyses document behavioral and demographic responses to energy development, offer new insights into large scale ecology of greater sage-grouse and provide resource managers with practical tools to guide conservation.

Styles APA, Harvard, Vancouver, ISO, etc.
5

Doherty, Kevin Eric. « Sage-grouse and energy development integrating science with conservation planning to reduce impacts / ». [Missoula, Mont.] : The University of Montana, 2008. http://etd.lib.umt.edu/theses/available/etd-03262009-132629/unrestricted/doherty.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
6

Benigeri, Mike. « La mesure de la sante dentaire : des indicateurs cliniques a l'auto-evaluation (doctorat : sciences de vie et de la sante) ». Paris 5, 2000. http://www.theses.fr/2000PA05W065.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
7

Allen, Kimberly, Sarah Kirby, Taylor McDonald et Bria Sledge. « B.E. Safe ». Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/secfr-conf/2018/schedule/2.

Texte intégral
Résumé :
Methodology: The Behavioral and Environmental Safety Program (B.E. Safe) for Early Childhood Professionals is being developed in response to Federal Safety regulations for childcare procedures and addresses social and emotional safety concerns. The curriculum includes Family Life Education content areas focusing on diversity, inclusion, social and emotional health, bullying prevention, supporting children with special needs, building relationships with parents, and understanding children’s behavior. Discussion of existing research: Research states that high quality childcare and education benefits all children (DHSS, 2015). Best practices indicate that Early Childhood Professionals need high quality training to be equipped to understand child development, strategies for working with families, and having the resources for supports when including children with disabilities in early childcare programs (DHSS, 2015). Not only should Early Childhood Professionals be equipped with the tools and resources to understand children’s behavior, educators need to demonstrate competency in state regulations, environmental safety for children, and playground safety (Sheridan, Edwards, Marvin & Knoche, 2009). B.E. Safe allows Early Childhood Professionals to engage in a research-based training that will help to ensure safety within their center. Connection to Theory: Behavior theories of child development incorporate environmental influences on behavior (Shute & Slee, 2015). A child’s early learning environment and the adults influence of children affects emotional, social, and physical development. B.E. Safe relates to Vygotsky’s Sociocultural Theory (1978) suggesting that children learn actively through hands on experiences. The Sociocultural Theory suggest that parents, caregivers, and a child’s environment from a young age is largely responsible for higher order functions (Shute & Slee, 2015). Proficiency in Adverse Childhood Experiences (ACEs) will allow participants to grasp how traumatic events can affect a child’s developmental process. Educating early childcare professionals on ACEs will allow for adults to be aware of what to look for, and how to keep children protected from adverse experiences (Sacks, Murphey & Moore, 2014). How will the study add to knowledge/innovative practice? Family Scientists will gain knowledge on best practices for providing Family Life Education to Early Childhood Professionals. Specifically, participants will gain knowledge on promoting inclusion, understanding behavior issues, developmental delays, and how to keep children safe from potential environmental hazards.
Styles APA, Harvard, Vancouver, ISO, etc.
8

McHenry, Kristen L. « Safe Practice ». Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/etsu-works/2535.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
9

Lindhult, Johan. « Operational Semantics for PLEX : A Basis for Safe Parallelization ». Licentiate thesis, Västerås : School of Innovation, Design and Engineering, Mälardalen University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-631.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
10

Axelrod, Brian Maxim. « Algorithms for safe robot navigation ». Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/119513.

Texte intégral
Résumé :
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 71-73).
As drones and autonomous cars become more widespread it is becoming increasingly important that robots can operate safely under realistic conditions. The noisy information fed into real systems means that robots must use estimates of the environment to plan navigation. Efficiently guaranteeing that the resulting motion plans are safe under these circumstances has proved difficult. We build a mathematical framework for analyzing the quality of estimated geometry, rigorously developing the notion of shadows. We then examine how to use these tools guarantee that a trajectory or policy is safe with only imperfect observations of the environment. We present efficient algorithms that can prove that trajectories or policies are safe with much tighter bounds than in previous work. Notably, the complexity of the environment does not affect our method's ability to evaluate if a trajectory or policy is safe. We also examine the implications of various mathematical formalisms of safety and arrive at a mathematical notion of safety of a long-term execution, even when conditioned on observational information.
by Brian Maxim Axelrod.
M. Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
11

Conn, Matthew B. « Feeling same-sex desire : law, science, and belonging in German-speaking central Europe, 1750-1945 ». Diss., University of Iowa, 2014. https://ir.uiowa.edu/etd/6929.

Texte intégral
Résumé :
My dissertation explains how the scientific study of sexuality became laden with emotions and the unforeseen results of this process. It begins with a scholarly tradition, forged during the eighteenth-century Enlightenment, which privileged sentimental articulations of feelings. This tradition helped inspire the late nineteenth-century foundation of sexology, or sexual science. Sexologists, as their discipline developed alongside the modern rational bureaucratic nation-state, maintained attention to emotive expressions. Sexologists also helped shape the interpretation and enforcement of laws against same-sex acts. While they built authority, however, sexologists lacked consensus. During the first third of the twentieth century, sexologists helped compile defendants' detailed sexual histories, replete with affective articulations of sexual desires, which led to calamitous consequences under National Socialism. Nazi technocrats utilized these same sexual histories, offered by same-sex attracted persons describing their feelings and actions before 1933, to prosecute them after a 1935 legal revision, which expanded the law's reach from specific acts to general expressions of feelings. My dissertation provides a genealogy of sexual research and the unexpected uses of its findings. It also revises the biography of sexology as an interdisciplinary field, braided with a history of emotions, tracing its previously underappreciated origins, tumultuous apex, and contested legacy.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Odent, Sylvie. « Etude genetique : de l'holoprosencephalie non syndromique (doctorat : biologie et sciences de la sante) ». Rennes 1, 2000. http://www.theses.fr/2000REN1B048.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Laurikkala, Minna. « DIFFERENT TIME, SAME PLACE, SAME STORY ? A SOCIAL DISORGANIZATION PERSPECTIVE TO EXAMINING JUVENILE HOMICIDES ». Doctoral diss., University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4405.

Texte intégral
Résumé :
In 2007, juveniles were involved in a minimum of 1,063 murders in the United States (Federal Bureau of Investigation, 2008), and a concern over juvenile homicide offenders remains. While increasingly more macrolevel research on juvenile homicide offending has been accumulated, particularly since the 1980s, research focusing on macrolevel correlates of juvenile homicides is still relatively scarce (MacDonald & Gover, 2005; Ousey & Campbell Augustine, 2001). In the first part of this study, several variables relating to the offender, victim, setting, and precursors to the homicide by race and gender were examined in order to provide details on the context of youth homicides between 1965 and 1995 in Chicago. The Homicides in Chicago, 1965-1995 data set and Census data for 1970, 1980, and 1990 were used in this study. The results indicate that changes in youth homicides over the 31-year time period involved increases in lethal gang altercations, particularly among Latinos, and increases in the use of automatic weapons. Young females had very little impact on homicide rates in Chicago. The second part of the study examined whether measures of social disorganization can aid in the prediction of homicides committed by youths, and a total of ten negative binomial models were run. The results of the analyses in the three time periods indicate that racial/ethnic heterogeneity, educational deprivation, unemployment, and family disruption are significantly and positively related to homicides. Foreign-born population and median household income were found to be significantly and negatively related to homicides. The significant indicators of social disorganization varied in the seven models for the disaggregated groups. Overall, the results reflect support for social disorganization theory. Limitations, suggestion for future research, and policy implications are also addressed.
Ph.D.
Department of Sociology
Sciences
Sociology
Styles APA, Harvard, Vancouver, ISO, etc.
14

Chen, Haogang. « Certifying a crash-safe file system ». Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/107325.

Texte intégral
Résumé :
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 93-99).
File systems are a cornerstone for storing and retrieving permanent data, yet they are complex enough to have bugs that might cause data loss, especially in the face of system crashes. FSCQ is the first file system that (1) provides a precise specification for the core subset of POSIX file-system APIs; and the APIs include fsync and fdatasync, which allow applications to achieve high I/O performance and crash safety, and that (2) provides a machine-checked proof that its I/O-efficient implementation meets this precise specification. FSCQ's proofs avoid crash-safety bugs that have plagued file systems, such as forgetting to insert a disk-write barrier between writing the data from the log and writing the log's commit block. FSCQ's specification also allows applications to prove their own crash safety, avoiding application-level bugs such as forgetting to invoke fsync on both the file and the containing directory. As a result, applications on FSCQ can provide strong guarantees: they will not lose data under any sequence of crashes. To state FSCQ's theorems, FSCQ introduces the Crash Hoare Logic (CHL), which extends traditional Hoare logic with a crash condition, a recovery procedure, and logical address spaces for specifying disk states at different abstraction levels. CHL also reduces the proof effort for developers through proof automation. Using CHL, the thesis developed, specified, and proved the correctness of the FSCQ file system. FSCQ introduces a metadata-prefix specification that captures the properties of fsync and fdatasync, based on Linux ext4's behavior. FSCQ also introduces disk sequences and disk relations to help formalize the metadata-prefix specification. The evaluation shows that FSCQ enables end-to-end verification of application crash safety, and that FSCQ's optimizations achieve I/O performance on par with that of Linux ext4.
by Haogang Chen.
Ph. D.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Buksh, Bala. « Services for activities in group editing 'sage' ». Thesis, Aston University, 1993. http://publications.aston.ac.uk/10679/.

Texte intégral
Résumé :
The project described in this thesis investigates the needs of a group of people working cooperatively in an OSI environment, and recommends tools and services to meet these needs. The project looks specifically at Services for Activities in Group Editing, and is identified as the `SAGE' project. The project uses case studies to identify user requirements and to determine common functionalities for a variety of group editing activities. A prototype is implemented in an X.400 environment to help refine user requirements, as a source of new ideas and to test the proposed functionalities. The conceptual modelling follows current CCITT proposals, but a new classification of group activities is proposed: Informative, Objective and Supportive application groups. It is proposed that each of these application groups have their own Service Agent. Use of this classification allows the possibility of developing three sets of tools which will cover a wide range of group activities, rather than developing tools for individual activities. Group editing is considered to be in the Supportive application group. A set of additional services and tools to support group editing are proposed in the context of the CCITT draft on group communication, X.gc. The proposed services and tools are mapped onto the X.400 series of recommendations, with the Abstract Service Definition of the operational objects defined, along with their associated component files, by extending the X.420 protocol functionality. It is proposed that each of the Informative, Objective and Supportive application groups should be implemented as a modified X.420 inter-personal messaging system.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Magnusson, Björn, et Måns Forslund. « SAFE AND EFFICIENT REINFORCEMENT LEARNING ». Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-76588.

Texte intégral
Résumé :
Pre-programming a robot may be efficient to some extent, but since a human has code the robot it will only be as efficient as the programming. The problem can solved by using machine learning, which lets the robot learn the most efficient way by itself. This thesis is continuation of a previous work that covered the development of the framework ​Safe-To-Explore-State-Spaces​ (STESS) for safe robot manipulation. This thesis evaluates the efficiency of the ​Q-Learning with normalized advantage function ​ (NAF), a deep reinforcement learning algorithm, when integrated with the safety framework STESS. It does this by performing a 2D task where the robot moves the tooltip on a plane from point A to point B in a set workspace. To test the viability different scenarios was presented to the robot. No obstacles, sphere obstacles and cylinder obstacles. The reinforcement learning algorithm only knew the starting position and the STESS pre-defined the workspace constraining the areas which the robot could not enter. By satisfying these constraints the robot could explore and learn the most efficient way to complete its task. The results show that in simulation the NAF-algorithm learns fast and efficient, while avoiding the obstacles without collision.
Förprogrammering av en robot kan vara effektiv i viss utsträckning, men eftersom en människa har programmerat roboten kommer den bara att vara lika effektiv som programmet är skrivet. Problemet kan lösas genom att använda maskininlärning. Detta gör att roboten kan lära sig det effektivaste sättet på sitt sätt. Denna avhandling är fortsättning på ett tidigare arbete som täckte utvecklingen av ramverket Safe-To-Explore-State-Spaces (STESS) för säker robot manipulation. Denna avhandling utvärderar effektiviteten hos ​Q-Learning with normalized advantage function (NAF)​, en deep reinforcement learning algoritm, när den integreras med ramverket STESS. Det gör detta genom att utföra en 2D-uppgift där roboten flyttar sitt verktyg på ett plan från punkt A till punkt B i en förbestämd arbetsyta. För att testa effektiviteten presenterades olika scenarier för roboten. Inga hinder, hinder med sfärisk form och hinder med cylindrisk form. Deep reinforcement learning algoritmen visste bara startpositionen och STESS-fördefinierade arbetsytan och begränsade de områden som roboten inte fick beträda. Genom att uppfylla dessa hinder kunde roboten utforska och lära sig det mest effektiva sättet att utföra sin uppgift. Resultaten visar att NAF-algoritmen i simulering lär sig snabbt och effektivt, samtidigt som man undviker hindren utan kollision.
Styles APA, Harvard, Vancouver, ISO, etc.
17

Blum, William. « The safe lambda calculus ». Thesis, University of Oxford, 2009. http://ora.ox.ac.uk/objects/uuid:537d45e0-01ac-4645-8aba-ce284ca02673.

Texte intégral
Résumé :
We consider a syntactic restriction for higher-order grammars called safety that constrains occurrences of variables in the production rules according to their type-theoretic order. We transpose and generalize this restriction to the setting of the simply-typed lambda calculus, giving rise to what we call the safe lambda calculus. We analyze its expressivity and obtain a result in the same vein as Schwichtenberg's 1976 characterization of the simply-typed lambda calculus: the numeric functions representable in the safe lambda calculus are exactly the multivariate polynomials; thus conditional is not definable. We also give a similar characterization for representable word functions. We then examine the complexity of deciding beta-eta equality of two safe simply-typed terms and show that this problem is PSPACE-hard. The safety restriction is then extended to other applied lambda calculi featuring recursion and references such as PCF and Idealized Algol (IA for short). The next contribution concerns game semantics. We introduce a new concrete presentation of this semantics using the theory of traversals. It is shown that the revealed game denotation of a term can be computed by traversing some souped-up version of the term's abstract syntax tree using adequately defined traversal rules. Based on this presentation and via syntactic reasoning we obtain a game-semantic interpretation of safety: the strategy denotations of safe lambda-terms satisfy a property called P-incremental justification which says that the player's moves are always justified by the last pending opponent's move of greater order occurring in the player's view. Next we look at models of the safe lambda calculus. We show that these are precisely captured by Incremental Closed Categories. A game model is constructed and is shown to be fully abstract for safe IA. Further, it is effectively presentable: two terms are equivalent just if they have the same set of complete O-incrementally justified plays---where O-incremental justification is defined as the dual of P-incremental justification. Finally we study safety from the point of view of algorithmic game semantics. We observe that in the third-order fragment of IA, the addition of unsafe contexts is conservative for observational equivalence. This implies that all the upper complexity bounds known for the lower-order fragments of IA also hold for the safe fragment; we show that the lower-bounds remain the same as well. At order 4, observational equivalence is known to be undecidable for IA. We conjecture that for the order-4 safe fragment of IA, the problem is reducible to the DPDA-equivalence problem and is thus decidable.
Styles APA, Harvard, Vancouver, ISO, etc.
18

López-Pineda, Andrés Humberto. « FlightCrew Browser : a safe browser for drivers ». Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85444.

Texte intégral
Résumé :
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2013.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 55-57).
Drivers have information needs they want to solve while driving, but current mobile browser interfaces can bring forth safety issues when users browse the web even though their attention is required elsewhere, as it is during driving. FlightCrew Browser is a crowd-adapted web browser using speech input, touch input, speech output, and visual output in appropriate, informative, and safe ways to empower the driver of a car to investigate an evolving information need. Our system uses human workers to do browsing interactions for the user, as well as pick data from webpages that will be returned to the user. We use three workers at a time in order to provide quality control by using a voting system to pick what answers the workers believed to be best for the user. The workers can hear the driver's query and see the last page the driver received answers from in order to provide a shared context. FlightCrew Browser provides a low-risk way for users to access the web when they are commuting or traveling alone. We evaluated our system using metrics and tests similar to those used by the National Highway Traffic Safety Administration and found that it is safer for drivers to use than existing mobile browsers.
by Andrés Humberto López-Pineda.
M. Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Lundberg, Johannes. « Safe Kernel Programming with Rust ». Thesis, KTH, Programvaruteknik och datorsystem, SCS, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-233255.

Texte intégral
Résumé :
Writing bug free computer code is a challenging task in a low-level language like C. While C compilers are getting better and better at detecting possible bugs, they still have a long way to go. For application programming we have higher level languages that abstract away details in memory handling and concurrent programming. However, a lot of an operating system's source code is still written in C and the kernel is exclusively written in C. How can we make writing kernel code safer? What are the performance penalties we have to pay for writing safe code? In this thesis, we will answer these questions using the Rust programming language. A Rust Kernel Programming Interface is designed and implemented, and a network device driver is then ported to Rust. The Rust code is analyzed to determine the safeness and the two implementations are benchmarked for performance and compared to each other. It is shown that a kernel device driver can be written entirely in safe Rust code, but the interface layer require some unsafe code. Measurements show unexpected minor improvements to performance with Rust.
Att skriva buggfri kod i ett lågnivåspråk som C är väldigt svårt. C-kompilatorer blir bättre och bättre på att upptäcka buggar men är ännu långt ifrån att kunna garantera buggfri kod. För applikationsprogrammering finns det tillgängligt olika högnivåspråk som abstrakterar bort den manuella minneshanteringen och hjälper med trådsäker programmering. Dock fortfarande så är större delar av operativsystemet och dess kärna är endast skriven i C. Hur kan vi göra programmering i kärnan säkrare? Vad är prestandakonsekvenserna av att använda ett säkrare språk? I denna uppsats ska vi försöka svara på dessa frågor genom att använda språket Rust. Ett programmeringsgränssnitt i Rust är implementerat i kärnan och en nätverksdrivrutin är portad till Rust. Källkoden skriven i Rust är analyserad för att bedömma säkerheten samt prestandan är jämförd mellan C och Rust implementationerna. Det är bevisat att vi kan skriva en drivrutin i enbart säker Rust om vi kan lita på några osäkra funktioner i gränssnittet. Mätningar visar lite bättre prestanda i Rust.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Tolley, Rebecca. « Sage Research Methods Online [workshop] ». Digital Commons @ East Tennessee State University, 2011. https://dc.etsu.edu/etsu-works/5753.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Turner, Sarah. « An investigation of teacher well-being as a key component of creativity in science classroom contexts in England ». Thesis, Loughborough University, 2016. https://dspace.lboro.ac.uk/2134/21744.

Texte intégral
Résumé :
This thesis considers pupils attitudes, teachers (and pupils ) creativity and teacher well-being. These three terms represent factors that are closely linked and have a synergistic relationship in determining learning outcomes. Research concerning these factors, and in particular the findings of action research concerning teachers well-being, are presented through eleven publications. This thesis, when viewed as a single piece of work, provides an insight into teachers everyday experiences, professional lives and their responsibilities. It utilises several research methods including questionnaires (approx. 200 teachers; 150 pupils), interviews (approx. 50 trainee teachers), and diaries (N = 2). The key findings suggest that more clarity is required concerning the meaning of creativity for all primary and secondary teachers and how it should be embedded in teachers practice. A safe classroom, one where a child can make mistakes, take risks and share their thoughts and feelings, is necessary for this to occur; teachers understanding of this concept is considerable and broadly based; however, results suggest that teachers approach this in different ways. Trainee teachers well-being is affected by their school placements and therefore time for them to learn and share with their peers was found to be both necessary and important. It was also found that the trainee teachers benefited from being taught about time-management as this skill was beneficial for their role. An intervention of a 90 minute lecture addressing stress, time-management, psychology models such as Maslow s hierarchy of needs and Rogers core conditions, was researched and proven helpful for trainee teachers (primary and secondary science). However, more discussion of the topics and models was required and therefore three workshops per academic year were trialled with the aim of creating a community of practice to normalise experiences. Questionnaire and interview data were highly positive about this intervention and evaluation of the content showed it was beneficial during school placements. The conclusion of this work is that creative pedagogy and a teacher s well-being are related: if we want our teachers to be creative practitioners in the classroom, we need to ensure that they are well in themselves. Although this conclusion is from a small case study, it could be generalizable to other teacher training courses and a crucial area for those working in teacher education to consider. Supporting and training trainee teachers in how to manage their professional lives so they are equipped personally and emotionally is reported in the findings as necessary for the profession.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Jupin, Joseph. « Temporal Graph Record Linkage and k-Safe Approximate Match ». Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/412419.

Texte intégral
Résumé :
Computer and Information Science
Ph.D.
Since the advent of electronic data processing, organizations have accrued vast amounts of data contained in multiple databases with no reliable global unique identifier. These databases were developed by different departments for different purposes at different times. Organizing and analyzing these data for human services requires linking records from all sources. RL (Record Linkage) is a process that connects records that are related to the identical or a sufficiently similar entity from multiple heterogeneous databases. RL is a data and compute intensive, mission critical process. The process must be efficient enough to process big data and effective enough to provide accurate matches. We have evaluated an RL system that is currently in use by a local health and human services department. We found that they were using the typical approach that was offered by Fellegi and Sunter with tuple-by-tuple processing, using the Soundex as the primary approximate string matching method. The Soundex has been found to be unreliable both as a phonetic and as an approximate string matching method. We found that their data, in many cases, has more than one value per field, suggesting that the data were queried from a 5NF data base. Consider that if a woman has been married 3 times, she may have up to 4 last names on record. This query process produced more than one tuple per database/entity apparently generating a Cartesian product of this data. In many cases, more than a dozen tuples were observed for a single database/entity. This approach is both ineffective and inefficient. An effective RL method should handle this multi-data without redundancy and use edit-distance for approximate string matching. However, due to high computational complexity, edit-distance will not scale well with big data problems. We developed two methodologies for resolving the aforementioned issues: PSH and ALIM. PSH – The Probabilistic Signature Hash is a composite method that increases the speed of Damerau-Levenshtein edit-distance. It combines signature filtering, probabilistic hashing, length filtering and prefix pruning to increase the speed of edit-distance. It is also lossless because it does not lose any true positive matches. ALIM – Aggregate Link and Iterative Match is a graph-based record linkage methodology that uses a multi-graph to store demographic data about people. ALIM performs string matching as records are inserted into the graph. ALIM eliminates data redundancy and stores the relationships between data. We tested PSH for string comparison and found it to be approximately 6,000 times faster than DL. We tested it against the trie-join methods and found that they are up to 6.26 times faster but lose between 10 and 20 percent of true positives. We tested ALIM against a method currently in use by a local health and human services department and found ALIM to produce significantly more matches (even with more restrictive match criteria) and that ALIM ran more than twice as fast. ALIM handles the multi-data problem and PSH allows the use of edit-distance comparison in this RL model. ALIM is more efficient and effective than a currently implemented RL system. This model can also be expanded to perform social network analysis and temporal data modeling. For human services, temporal modeling can reveal how policy changes and treatments affect clients over time and social network analysis can determine the effects of these on whole families by facilitating family linkage.
Temple University--Theses
Styles APA, Harvard, Vancouver, ISO, etc.
23

Sculthorpe, Neil. « Towards safe and efficient functional reactive programming ». Thesis, University of Nottingham, 2011. http://eprints.nottingham.ac.uk/11981/.

Texte intégral
Résumé :
Functional Reactive Programming (FRP) is an approach to reactive programming where systems are structured as networks of functions operating on time-varying values (signals). FRP is based on the synchronous data-flow paradigm and supports both continuous-time and discrete-time signals (hybrid systems). What sets FRP apart from most other reactive languages is its support for systems with highly dynamic structure (dynamism) and higher-order reactive constructs (higher-order data-flow). However, the price paid for these features has been the loss of the safety and performance guarantees provided by other, less expressive, reactive languages. Statically guaranteeing safety properties of programs is an attractive proposition. This is true in particular for typical application domains for reactive programming such as embedded systems. To that end, many existing reactive languages have type systems or other static checks that guarantee domain-specific constraints, such as feedback being well-formed (causality analysis). However, compared with FRP, they are limited in their capacity to support dynamism and higher-order data-flow. On the other hand, as established static techniques do not suffice for highly structurally dynamic systems, FRP generally enforces few domain-specific constraints, leaving the FRP programmer to manually check that the constraints are respected. Thus, there is currently a trade-off between static guarantees and dynamism among reactive languages. This thesis contributes towards advancing the safety and efficiency of FRP by studying highly structurally dynamic networks of functions operating on mixed (yet distinct) continuous-time and discrete-time signals. First, an ideal denotational semantics is defined for this kind of FRP, along with a type system that captures domain-specific constraints. The correctness and practicality of the language and type system are then demonstrated by proof-of-concept implementations in Agda and Haskell. Finally, temporal properties of signals and of functions on signals are expressed using techniques from temporal logic, as motivation and justification for a range of optimisations.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Boyapati, Chandrasekhar 1973. « SafeJava : a unified type system for safe programming ». Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/30087.

Texte intégral
Résumé :
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, February 2004.
Includes bibliographical references (p. 155-164).
Making software reliable is one of the most important technological challenges facing our society today. This thesis presents a new type system that addresses this problem by statically preventing several important classes of programming errors. If a program type checks, we guarantee at compile time that the program does not contain any of those errors. We designed our type system in the context of a Java-like object-oriented language; we call the resulting system SafeJava. The SafeJava type system offers significant software engineering benefits. Specifically, it provides a statically enforceable way of specifying object encapsulation and enables local reasoning about program correctness; it combines effects clauses with encapsulation to enable modular checking of methods in the presence of subtyping; it statically prevents data races and deadlocks in multithreaded programs, which are known to be some of the most difficult programming errors to detect, reproduce, and eliminate; it enables software upgrades in persistent object stores to be defined modularly and implemented efficiently; it statically ensures memory safety in programs that manage their own memory using regions; and it also statically ensures that real-time threads in real-time programs are not interrupted for unbounded amounts of time because of garbage collection pauses. Moreover, SafeJava provides all the above benefits in a common unified type system framework, indicating that seemingly different problems such as encapsulation, synchronization issues, software upgrades, and memory management have much in common.
(cont.) We have implemented several Java programs in SafeJava. Our experience shows that SafeJava is expressive enough to support common programming patterns, its type checking is fast and scalable, and it requires little programming overhead. In addition, the type declarations in SafeJava programs serve as documentation that lives with the code, and is checked throughout the evolution of code. The SafeJava type system thus has significant software engineering benefits and it offers a promising approach for improving software reliability.
by Chandrasekhar Boyapati.
Ph.D.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Blair, Zachary. « Same-Sex Marriages : A Cross-Cultural Analysis ». Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/739.

Texte intégral
Résumé :
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Arts and Sciences
Anthropology
Styles APA, Harvard, Vancouver, ISO, etc.
26

Leslie, Rebekah. « A Functional Approach to Memory-Safe Operating Systems ». PDXScholar, 2011. https://pdxscholar.library.pdx.edu/open_access_etds/499.

Texte intégral
Résumé :
Purely functional languages--with static type systems and dynamic memory management using garbage collection--are a known tool for helping programmers to reduce the number of memory errors in programs. By using such languages, we can establish correctness properties relating to memory-safety through our choice of implementation language alone. Unfortunately, the language characteristics that make purely functional languages safe also make them more difficult to apply in a low-level domain like operating systems construction. The low-level features that support the kinds of hardware manipulations required by operating systems are not typically available in memory-safe languages with garbage collection. Those that are provided may have the ability to violate memory- and type-safety, destroying the guarantees that motivate using such languages in the first place. This work demonstrates that it is possible to bridge the gap between the requirements of operating system implementations and the features of purely functional languages without sacrificing type- and memory-safety. In particular, we show that this can be achieved by isolating the potentially unsafe memory operations required by operating systems in an abstraction layer that is well integrated with a purely functional language. The salient features of this abstraction layer are that the operations it exposes are memory-safe and yet sufficiently expressive to support the implementation of realistic operating systems. The abstraction layer enables systems programmers to perform all of the low-level tasks necessary in an OS implementation, such as manipulating an MMU and executing user-level programs, without compromising the static memory-safety guarantees of programming in a purely functional language. A specific contribution of this work is an analysis of memory-safety for the abstraction layer by formalizing a meaning for memory-safety in the presence of virtual-memory using a novel application of noninterference security policies. In addition, we evaluate the expressiveness of the abstraction layer by implementing the L4 microkernel API, which has a flexible set of virtual memory management operations.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Gan, Yee Ling. « Redesigning the memory hierarchy for memory-safe programming languages ». Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/119765.

Texte intégral
Résumé :
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 69-75).
We present Hotpads, a new memory hierarchy designed from the ground up for modern, memory-safe languages like Java, Go, and Rust. Memory-safe languages hide the memory layout from the programmer. This prevents memory corruption bugs, improves programmability, and enables automatic memory management. Hotpads extends the same insight to the memory hierarchy: it hides the memory layout from software and enables hardware to take control over it, dispensing with the conventional flat address space abstraction. This avoids the need for associative caches and virtual memory. Instead, Hotpads moves objects across a hierarchy of directly-addressed memories. It rewrites pointers to avoid most associative lookups, provides hardware support for memory allocation, and unifies hierarchical garbage collection and data placement. As a result, Hotpads improves memory performance and efficiency substantially, and unlocks many new optimizations. This thesis contributes important optimizations for Hotpads and a comprehensive evaluation of Hotpads against prior work.
by Yee Ling Gan.
M. Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
28

Bank, Joseph A. « Code importing techiques for fast, safe client/server access ». Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/38788.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Duxovni, Faye(Faye Samara). « Mechanized proofs that hardware is safe from timing attacks ». Thesis, Massachusetts Institute of Technology, 2018. https://hdl.handle.net/1721.1/122053.

Texte intégral
Résumé :
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 47-48).
A recurring problem in cryptography engineering is the potential for secret data to be leaked through aspects of software and hardware that are orthogonal to functional correctness. In particular, much effort is put into writing cryptography code whose timing behavior - how many CPU clock cycles it takes to complete a given cryptographic operation - is independent of any secret inputs to that operation. This is a difficult problem because it depends not only on the code itself, but also on various optimizations such as branch prediction and memory caching implemented by the underlying hardware the program runs on. We make use of Kami, a domain-specific language for describing and formally verifying hardware modules, to build a system for constructing machine-checked proofs that a given piece of code running on a given RISC-V CPU design will not leak secret inputs through timing behavior. Our system allows software and hardware to be analyzed and verified independently, and we prove that any combination of software and hardware that meet our validation criteria will be safe from timing-based side channels. We demonstrate an example of validating a real cryptographic program and a concrete RISC-V CPU using our system, illustrating the applicability of our tools and laying the groundwork for validating more complex programs and CPUs.
by Faye Duxovni.
M. Eng.
M.Eng. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Styles APA, Harvard, Vancouver, ISO, etc.
30

Haggerty, Brian Thomas. « Safe havens in Syria : missions and requirements for an air campaign ». Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/95520.

Texte intégral
Résumé :
Thesis: S.M., Massachusetts Institute of Technology, Department of Political Science, 2014.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 102-109).
What if the United States had led its NATO allies to intervene in Syria's civil war in the midst of calls for humanitarian intervention in mid-2012? Despite the importance of this question for the study and evaluation of U.S. foreign policy, little exists in the way of systematic, open-source analysis of the military missions and material requirements for a possible Syrian intervention. This thesis assesses the scale, scope, and challenges of intervention in Syria at the time its proponents argue it would have been most effective. It does so through open-source analysis of a U.S.-led air campaign designed to mitigate the country's humanitarian crisis. The model of intervention analyzed -- broadly conceived as the establishment of safe havens around major Syrian population areas defended from the air -- offers a template for evaluating the utility of air power in the Syrian context more generally. The analysis suggests an intervention in mid-2012 to establish safe havens in Syria would have been a major military undertaking, likely requiring greater resources and facing greater risks than any of NATO's previous air campaigns in response to humanitarian crises in Bosnia, Kosovo, or Libya. The "low-risk" rationale for humanitarian intervention from the air thus appears far less persuasive in the Syrian case. The thesis concludes with implications for the application of air power to future humanitarian crises.
by Brian Thomas Haggerty.
S.M.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Colazzo, Dario. « Schemas for safe and efficient XML processing ». Habilitation à diriger des recherches, Université Paris Sud - Paris XI, 2011. http://tel.archives-ouvertes.fr/tel-00626227.

Texte intégral
Résumé :
Ce manuscrit d'Habilitation à Diriger des Recherches présente des résultats que j'ai obtenus dans le cadre d'activités de recherche menées depuis 2005 en tant que Maître de Conférences à l'Université Paris-Sud XI. Au début de cette période XML ( eXtensible Markup Language) était déjà reconnus comme le standard pour la représentation de données semi structurées. En même temps, XML c'est aussi affirmé comme format de représentation dans le contexte de l'intégration et l'échange de données. Pendant cette période mes intérêts de recherche se sont situés à la confluence des langages des bases de données et langages de programmation, et se sont focalisé sur l'utilisation des systèmes de types pour assurer la sureté et optimisation des programmes manipulant les données XML. Plus en détails, je me suis principalement intéressé à trois axes de recherche: i) optimisation de requêtes et mise à jours XML via la projection de données, ii) vérification de la correction des mappings entre deux schémas XML, iii) algorithmes efficaces pour la vérification d'inclusion entre schémas XML (une propriété qui est à la base des systèmes de types pour requêtes et mises à jour XML). Ce manuscrit d'Habilitation à Diriger des Recherches est consacré à ces trois axes de recherche, et présente le contexte, les motivations et résultats obtenus pour chacun des axes.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Rackin, Heather. « Female Same-Sex Sexual Desires : An Evolutionary Perspective ». Honors in the Major Thesis, University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/986.

Texte intégral
Résumé :
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Arts and Sciences
Anthropology
Styles APA, Harvard, Vancouver, ISO, etc.
33

Rolland, Yan. « Elements de perception , de modelisation et d'analyse de texture (doctorat : biologie et sciences de la sante) ». Rennes 1, 1997. http://www.theses.fr/1997REN1B022.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
34

Duberg, Daniel. « Safe Navigation of a Tele-operated Unmanned Aerial Vehicle ». Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-221701.

Texte intégral
Résumé :
Unmanned Aerial Vehicles (UAVs) can navigate in indoor environments and through environments that are hazardous or hard to reach for humans. This makes them suitable for use in search and rescue missions and by emergency response and law enforcement to increase situational awareness. However, even for an experienced UAV tele-operator controlling the UAV in these situations without colliding into obstacles is a demanding and difficult task. This thesis presents a human-UAV interface along with a collision avoidance method, both optimized for a human tele-operator. The objective is to simplify the task of navigating a UAV in indoor environments. Evaluation of the system is done by testing it against a number of use cases and a user study. The results of this thesis is a collision avoidance method that is successful in protecting the UAV from obstacles while at the same time acknowledges the operator’s intentions.
Obemannad luftfarkoster (UAV:er) kan navigera i inomhusmiljöer och genom miljöer som är farliga eller svåra att nå för människor. Detta gör dem lämpliga för användning i sök- och räddningsuppdrag och av akutmottagning och rättsväsende genom ökad situationsmedvetenhet. Dock är det även för en erfaren UAV-teleoperatör krävande och svårt att kontrollera en UAV i dessa situationer utan att kollidera med hinder. Denna avhandling presenterar ett människa-UAV-gränssnitt tillsammans med en kollisionsundvikande metod, båda optimerade för en mänsklig teleoperatör. Målet är att förenkla uppgiften att navigera en UAV i inomhusmiljöer. Utvärdering av systemet görs genom att testa det mot ett antal användningsfall och en användarstudie. Resultatet av denna avhandling är en kollisionsundvikande metod som lyckas skydda UAV från hinder och samtidigt tar hänsyn till operatörens avsikter.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Malobabic, Slavica. « Transient Safe Operating Area (TSOA) for ESD applications ». Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5420.

Texte intégral
Résumé :
A methodology to obtain design guidelines for gate oxide input pin protection and high voltage output pin protection in Electrostatic Discharge (ESD) time frame is developed through measurements and Technology Computer Aided Design (TCAD). A set of parameters based on transient measurements are used to define Transient Safe Operating Area (TSOA). The parameters are then used to assess effectiveness of protection devices for output and input pins. The methodology for input pins includes establishing ESD design targets under Charged Device Model (CDM) type stress in low voltage MOS inputs. The methodology for output pins includes defining ESD design targets under Human Metal Model (HMM) type stress in high voltage Laterally Diffused MOS (LDMOS) outputs. First, the assessment of standalone LDMOS robustness is performed, followed by establishment of protection design guidelines. Secondly, standalone clamp HMM robustness is evaluated and a prediction methodology for HMM type stress is developed based on standardized testing. Finally, LDMOS and protection clamp parallel protection conditions are identified.
ID: 031001296; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Adviser: Juin J. Liou.; Title from PDF title page (viewed March 7, 2013).; Thesis (Ph.D.)--University of Central Florida, 2012.; Includes bibliographical references (p. 252-262).
Ph.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering
Styles APA, Harvard, Vancouver, ISO, etc.
36

Al-Qora'n, Lamis Farah. « SAFE-FLOW : a systematic approach for safety analysis of clinical workflows ». Thesis, University of Hull, 2015. http://hydra.hull.ac.uk/resources/hull:13064.

Texte intégral
Résumé :
The increasing use of technology in delivering clinical services brings substantial benefits to the healthcare industry. At the same time, it introduces potential new complications to clinical workflows that generate new risks and hazards with the potential to affect patients’ safety. These workflows are safety critical and can have a damaging impact on all the involved parties if they fail. Due to the large number of processes included in the delivery of a clinical service, it can be difficult to determine the individuals or the processes that are responsible for adverse events. Using methodological approaches and automated tools to carry out an analysis of the workflow can help in determining the origins of potential adverse events and consequently help in avoiding preventable errors. There is a scarcity of studies addressing this problem; this was a partial motivation for this thesis. The main aim of the research is to demonstrate the potential value of computer science based dependability approaches to healthcare and in particular, the appropriateness and benefits of these dependability approaches to overall clinical workflows. A particular focus is to show that model-based safety analysis techniques can be usefully applied to such areas and then to evaluate this application. This thesis develops the SAFE-FLOW approach for safety analysis of clinical workflows in order to establish the relevance of such application. SAFE-FLOW detailed steps and guidelines for its application are explained. Then, SAFE-FLOW is applied to a case study and is systematically evaluated. The proposed evaluation design provides a generic evaluation strategy that can be used to evaluate the adoption of safety analysis methods in healthcare. It is concluded that safety of clinical workflows can be significantly improved by performing safety analysis on workflow models. The evaluation results show that SAFE-FLOW is feasible and it has the potential to provide various benefits; it provides a mechanism for a systematic identification of both adverse events and safeguards, which is helpful in terms of identifying the causes of possible adverse events before they happen and can assist in the design of workflows to avoid such occurrences. The clear definition of the workflow including its processes and tasks provides a valuable opportunity for formulation of safety improvement strategies.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Liu, Kun. « Improved Onsite Wastewater Disinfection and Nutrient Removal for Safe Discharge and Reuse ». The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1500588070537771.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Eggert, Jon Edward 1962. « Self-disclosure in male same-sex friendships ». Thesis, The University of Arizona, 1994. http://hdl.handle.net/10150/291779.

Texte intégral
Résumé :
The purpose of this study was to determine if a difference existed between a sample of fraternity residents and a sample of dormitory residents in the level of self-disclosure present in their same-sex friendships. Of additional import was whether or not self-disclosure, directed toward different target persons, varied according to the age of the discloser, the identity of the target person, and the reported closeness of the discloser to his father. A modified version of Sidney M. Jourard's Self-Disclosure Questionnaire was utilized to measure present levels of self-disclosure. Findings indicated there was a significant difference in self-disclosure with same-sex friends between the sample of fraternity residents and the sample of dormitory residents. Moreover, significant differences were found in the mean level of self-disclosure as it related to the identity of the target person, and to the reported closeness of the discloser to his father.
Styles APA, Harvard, Vancouver, ISO, etc.
39

Linder, Kari K. B. « For Fox Sake : Animal Roles and Interspecies Empathy ». Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1396.

Texte intégral
Résumé :
We classify animals into a few distinct groups: companion animals (pets and strays like dogs and cats), utility animals (animals that serve a purpose like cows farmed for dairy or meat or foxes farmed for fur), and wild animals (nondomestic animals in their natural habitat). This study will investigate empathic relationships between people and animals of these four types in two abuse scenarios (active abuse and neglect). These factors were manipulated in a 2x4 experimental design. I expect a closer relationship with humans will correlate with a higher degree of empathy for the victim such that homed companion animals will generate the most empathy, followed by stray, utility, and finally wild. Results supported this hypothesis to an extent. This research is intended to bridge gaps between empathy towards humans and empathy towards other animals. If we can manipulate the degree to which people tend to relate to animals by varying our descriptions of these animals, we can also manipulate people’s desire to protect them.
Styles APA, Harvard, Vancouver, ISO, etc.
40

Wang, Stephanie M. Eng Massachusetts Institute of Technology. « Certifying checksum-based logging in the RapidFSCQ crash-safe filesystem ». Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/106390.

Texte intégral
Résumé :
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2016.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 57-60).
As more and more software is written every day, so too are bugs. Formal verification is a way of using mathematical methods to prove that a program has no bugs. However, if formal verification is to see widespread use, it must be able to compete with unverified software in performance. Unfortunately, many of the optimizations that we take for granted in unverified software depend on assumptions that are difficult to verify. One such optimization is data checksums in logging systems, used to improve I/O efficiency while still ensuring data integrity after a crash. This thesis explores a novel method of modeling the probabilistic guarantees of a hash function. This method is then applied to the logging system underlying RapidFSCQ, a certified crash-safe filesystem, to support formally verified checksums. An evaluation of RapidFSCQ shows that it enables end-to-end verification of application and filesystem crash safety, and that RapidFSCQ's optimizations, including checksumming, achieve I/O performance on par with Linux ext4. Thus, this thesis contributes a formal model of hash function behavior with practical application to certified computer systems.
by Stephanie Wang.
M. Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Barenblat, Benjamin Ezra. « Memory-safe microcontroller applications with the Bedrock structured programming system ». Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100294.

Texte intégral
Résumé :
Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 71-72).
Microcontrollers - low-power, real-mode CPUS - drive digital electronics all over the world, making their safety and reliability critical. However, microcontrollers generally lack the memory protection common in desktop processors, so memory safety must come through other means. One such mechanism is Bedrock, a library for the Coq proof assistant that applies separation logic to a small c-like language, allowing programmers to prove memory-related properties about their code. I used Bedrock to build a security peripheral out of a Cortex-m3 microcontroller; my peripheral provides both AES encryption and append-only logging to a host system, and I showed the software it runs is memory-safe. Working with Bedrock was challenging but rewarding, and it provides a glimpse into a future where system programmers can prove code correct as a matter of course.
by Benjamin Ezra Barenblat.
M. Eng.
Styles APA, Harvard, Vancouver, ISO, etc.
42

Bendali, Fatah. « Epidemiologie des gastro-enterites neonatales chez le veau (doctorat : sciences de la vie et de la sante) ». Besançon, 1998. http://www.theses.fr/1998BESA3705.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Lavelock, Caroline. « Four Virtues : Interventions for Goodness' Sake ». VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3008.

Texte intégral
Résumé :
Empirical interest in promoting virtues has dramatically increased over the last decade. The present study will focus primarily on the warmth-based virtues of forgiveness and humility, and the conscientiousness-based virtues of patience and self-control. I introduced participants (N = 135) to a workbook intended to promote one of these four virtues, or to promote general positivity for participants in a workbook control condition. I hypothesized that virtue workbooks would produce higher levels of the target virtue, more so than in both a non-action control condition (n = 33) and in a control condition that completes a workbook that promotes general positivity. The forgiveness, humility, patience, and positivity workbooks did indeed build their respective targets. Virtue workbook participants reaped more benefits than the positivity participants, but both improved more than the control condition. These findings suggest that workbook interventions serve a valuable purpose in the promotion of goodness.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Yao, Conglun. « Strongly typed, compile-time safe and loosely coupled data persistence ». Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1186/.

Texte intégral
Résumé :
A large number of approaches have been developed to simplify construction of, and to reduce errors in, data-driven applications. However, these approaches have not been particularly concerned with compile-time type safety. Type mismatch errors between program and the database schema occur quite often during program development, and the techniques used in these approaches often defer error checking on database operations until runtime. In this thesis, we take a different approach from those previously proposed, based on strict type checking at compile time, type inference, higher-order functions, phantom types, object relational mapping, and loosely coupled database interaction. Instead of using external, literal XML file and string type SQL, we embed the mapping meta data and user defined queries directly in the program, the type safety of which is guaranteed by the program compiler. Such a result is achieved by introducing additional database schema information and using type avatars, a dummy structure used to extend the type checking to embedded queries, during compilation. We show that this approach is practical and effective by implementing a compile-time type-safe object relational framework, called Qanat, in the OCaml programming language and using a loosely coupled SQL database. We further report experimental results obtained by running a number of benchmark tests, and compare the resulting Qanat applications with the equivalent, raw database driver based applications.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Blessin, Joseph Richard. « 'Scientist Sade' and discovery in the High Enlightenment ». Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/12263.

Texte intégral
Résumé :
Sade has had many titles over the centuries. He was ‘Marquis’, a noblesse d’épée, sitting in his château atop Lacoste; ‘Wolf-man’, on the run from the authorities, a cause célèbre for his notorious sexual adventures; ‘Citizen’, a turncoat royalist, a functionary within the bureaucracy of the new French Assembly, eulogizer of the revolutionary heroes, Marat and Le Pelletier; and ‘Divine’, a patron saint of Romantic poets like Flaubert and Baudelaire, and later, the same for the Surrealists. Sade has yet to be given the name: ‘Scientist’. In my dissertation I lay out the ground work for defending this choice of designation by situating Sade and a sampling of his works within a defining period in the history of the object of scientific inquiry: from the eve of the 1789 French Revolution until its dénouement following the death of Robespierre. The three works of focus are Les 120 Journées (1785), Aline et Valcour, ou le Roman philosophique (1795) and La Philosophie dans le Boudoir (1795); and each one is strategically selected to bring to light singular events, marking important changes in humankind’s relationship with the natural world. This intense focus on Sade magnifies many times over the position Foucault had already assigned him in Les Mots et les chose (1966) when, in offering his own version of the evolution of the object of scientific inquiry from the Classical to the Modern Age, he isolates Sade as a heuristic bridge linking the two eras of his focus, using Sade’s erotic novels Justine (1791) and Juliette (1797) to support his argument. However overly pithy Foucault’s application of Sade may have been, it is felt that he lays a sufficient groundwork, one that I take up in my dissertation and push to even further depths. More than simply conforming to Foucault’s employment of Sade as the “midwife” to Modern science, I do two things of notable difference: 1) I take up the challenge Foucault set in the “Foreword to the English Edition” of Les Mots et les chose when he professes “embarrassment” over not being able to account for how “[…] instruments, techniques, institutions…” (p. xiii) of empirical sciences came to match in complexity those individuals and societies that would come to use them. On the one side, Foucault expresses a clear limitation; on the other, he offers up what he believes is half of what it takes to get at this limitation: “I left the problem of cause to one side. I chose instead to confine myself to describing the transformation themselves, thinking that this would be an indispensable step if, one day, a theory of scientific change and epistemological causality was to be constructed” (p. xiv). This dissertation offers up a heuristic framework to account for the relationship between both these sides Foucault can only adumbrate: the side of an emergent scientific knowledge and the ontological status of the producers of this knowledge. 2) I position Sade as a representative of an older scientific tradition, one overshadowed in Foucault’s emphasis on Sade and Modern science. Since Iwan Bloch compared Les 120 Journées to Psychopathia Sexualis, Richard von Krafft-Ebing’s 1886 manual of sexology, dedicated to documenting qualitatively all possible sexual deviancies in human behavior, most readings of Sade in the History of Science have taken him to be on the modern most end of the timeline of the History of Science (Foucault, 1966; Harari and Pellegrin, 1973; Morris, 1990; Vila, 1998; Polat, 2000; Quinlan, 2006; Quinlan, 2013). Some writers in recent years, however, have had the acuity to highlight older scientific influences on Sade’s oeuvre. Armelle St-Martin is one such example, who has written extensively on the influence of Italian science on Sade. Such a focus is a departure from a trend that sees English empiricism defining the scientific mindset in France that, it is believed, would have influenced Sade’s ideas. This would have included the “spirit of exactitude and method” (p. 91) D’Alembert (1751) speaks of in his panegyrics of Bacon, Locke and Newton in Discours préliminaire de l’Encyclopédie de Diderot or Voltaire’s popularization (1763) of all things English in Dictionnaire philosophique. The legacies of both these perspectives have weighed heavily on Caroline Warman’s reading of Sade, who sees him (2002) through a more “positive” prism of “sensationist materialism” in Sade: from materialism to pornography. St- Martin sees Sade’s scientific orientation directed rather towards much older and ulterior forms of scientific “objects”, ones much less “positive”. Casamaggi and St-Martin see pneumatological themes like miasmas and corruptions in Histoire de Juliette, arriving from Sade’s own explorations in such places as amongst the swamps and famously licentious denizen of Venice, the namesake for that special contagion: “maladies vénériennes”. Both these departures from Foucault’s conceptualization imply the need to articulate what I call a “negative” trajectory within the History of Science. This term plays an important part in how I engage with Sade and his contemporaries and its explication constitutes a significant aim throughout the course of my dissertation. Sade’s own inquiry into the object of scientific inquiry came at a time of great upheaval and he relied on one approach hitherto capable of articulating such “negativity”: metaphysics. The very notion of metaphysics was anathema for many, such as D’Alembert who even labeled it a despicable science in the relevant entry in L’encyclopédie de Diderot. This dissertation will situate Sade within this battle over the future of science in what was that all crucial period of history when the die was cast in favor of Modern science and its penchant for “positivity”; the period of the French Revolution.
Styles APA, Harvard, Vancouver, ISO, etc.
46

Msosa, Alan. « Human rights and same-sex intimacies in Malawi ». Thesis, University of Essex, 2018. http://repository.essex.ac.uk/21553/.

Texte intégral
Résumé :
In recent years, Malawi has received global attention as a global hotspot for human rights violations based on sexual orientation and gender identity since the arrest of Tiwonge Chimbalanga and Steven Monjeza for holding a wedding ceremony in 2009. The violations are a result of negative attitudes against ‘homosexuality’, and the application of anti-gay provisions of the Penal Code and the Marriages Divorce and Family Relations Act, which outlaw consensual adult same-sex relationships and non-conforming gender identities. Malawi’s failure to protect queer persons amounts to the violation of its domestic and international human rights obligations. Paradoxically, the Malawian Constitution and international human rights obligations (to which Malawi subscribes), guarantee equal and effective protection against discrimination, which I have argued that it includes discrimination based on sexual orientation and gender identity. This interdisciplinary study explores the life stories of 44 queer Malawians examining how the lack of human rights protection affects their daily lives. I have found that the majority of queer Malawians are unlikely to come out due to fear of stigma and discrimination. As a result, they are unable to claim the full status necessary to enable them to formally assert their identity, citizenship and relationship rights. Drawing from social construction theories, this study will show that local meanings regarding human rights and sexuality include a misinterpretation of SOGI-based human rights as ‘the right to conduct mathanyula’, which is locally (mis)understood to imply permission to engage in sexual activities between men and young boys. I have recommended a radical shift in the articulation of SOGI-based human rights so that it is understood as the equal entitlement to protections in accordance with Malawi’s domestic and international human rights obligations. If understood as the latter, Malawians are likely to endorse human rights protection based on sexual orientation and gender identity.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Leclercq, Christophe. « Hemodynamique et stimulation cardiaque permanente : applications au traitement des dysfonctions ventriculaires (doctorat : biologie et sciences de la sante) ». Rennes 1, 2000. http://www.theses.fr/2000REN1B046.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Möller, Kristin, et Malin Wahlström. « Byte av triagesystem från RETTS till SATS i ambulansverksamhet ». Thesis, Karlstads universitet, Institutionen för hälsovetenskaper (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-83458.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

Johansson, Linda, et Rebecka Hagman. « Same, Same but Different : -a Minor Field Study of the Future Red Cross Women´s Project, Malindi Branch, Kenya ». Thesis, Växjö University, School of Social Sciences, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-973.

Texte intégral
Résumé :

Same, Same, but Different

-a Minor Field Study of the Future Red Cross Women’s Project,

Malindi Branch, Kenya.

In May 2005, we received a scholarship from the Swedish International Development Agency, SIDA, to conduct a Minor Field Study about the future women’s project at the Malindi Red Cross branch, Kenya. The branch has since May 2002 been involved in a Twinning cooperation with the Swedish Red Cross Southeast Region.

The aim of this thesis is by using the Logical Framework Approach and the Intersectional perspective, to examine the situation for women in Malindi and the work of the Red Cross branch, in order to propose guidelines for the future Red Cross women’s project. The questions asked were: How can the guidelines for the women’s project be formulated in order for the vision of the Red Cross to be reached? What changes within the individual, societal and political sphere have to be accomplished in order to meet the needs and interests of different women in Malindi?

The work of the Red Cross is in a political science perspective interesting as it through its role of a humanitarian organisation and NGO, plays an important role in the Kenyan civil society, performing activities and providing services that originally should be supplied by the government.

We have found that it is not possible to talk about the woman in Malindi, due to the fact that women’s backgrounds, problems, needs and interests are different. Therefore it is of great importance that the Red Cross in order to accomplish its vision, i.e. to reach the most vulnerable, includes a gender and an intersectional approach into its activities and outreaches. There is a desire in Kenya to politicize the gender issue, however the future will show the will to actually implement these laws and reforms needed for the empowerment of the women. Moreover, different gender structures can only be achieved through the questioning of the traditional gender roles from both men and women and in this process we have recognised the Red Cross as an important moulder of public opinion. Finally we also want to suggest an inclusion of the gender- and the intersectional perspective into the method of LFA, since the traditional model is not sufficient in considering the different needs of different people.

Styles APA, Harvard, Vancouver, ISO, etc.
50

Hansen, Erica P. « Influence of Disturbance on Greater Sage-Grouse Habitat Selection in Southern Utah ». DigitalCommons@USU, 2016. https://digitalcommons.usu.edu/etd/5231.

Texte intégral
Résumé :
The greater sage-grouse (Centrocercus urophasianus; sage-grouse) is a species of conservation concern that occupies sagebrush-dominated (Artemisia spp.) landscapes across the western United States and southern Canada. The U. S. Fish and Wildlife Service (USFWS) reviewed the status of the sage-grouse in September 2015 and determined that it did not warrant protection under the Endangered Species Act due to collaborative efforts between numerous public and private stakeholders. However, this decision hinged on federal and state commitments to continue science-based management of sagebrush habitats. As human development increases across the west, there is an increasing need for understanding the impacts of disturbance on sage-grouse. Filling this knowledge gap is important because it will allow us to predict how sage-grouse populations may respond to changes in the future. I assessed how two types of disturbance (wildfire and transmission line construction) influenced habitat use of a population of sage-grouse in southern Utah. I deployed Global Positioning System (GPS) transmitters on 26 (21 male and 5 female) sage-grouse in the Bald Hills Sage-Grouse Management Area in 2014 and 2015 to record what habitat sage-grouse were using during the summer and winter seasons. I compared these used locations to habitat that was seasonally available to the birds using resource selection functions. My models showed that in the summer, birds showed preference for areas burned and reclaimed within the last 10 years. I suggest that this may be occurring because the birds are seeking out vegetation that was seeded by the Bureau of Land Management (BLM) during wildfire reclamation. In the winter, my models showed an overall 3% decrease in predicted probability of use for winter habitat in the vicinity of the transmission line corridor, but this change did not immediately result in increased avoidance by sage-grouse when comparing spatial distributions for sage-grouse locations within winter habitat near the transmission line. I suggest that this is because the new transmission line was paired with a preexisting line which was already avoided by sage-grouse. However, the construction of the new line could have long-term consequences outside the two year scope of my study. These impacts could be delayed because sage-grouse are strongly tied to historic habitats and may not change habitat use immediately in spite of landscape changes. Additionally, the presence of the new line could cause indirect landscape changes which may only manifest over longer time periods such as increasing human activity in the area or changing the distribution of avian predators of sage-grouse that use the transmission line for perching. I recommend continued monitoring of sage-grouse in the area to determine if any changes in habitat use manifest in future years.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie