To see the other types of publications on this topic, follow the link: Detective work.

Dissertations / Theses on the topic 'Detective work'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Detective work.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

McGinley, Susan. "Detective Work in Tracing Animal Disease." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 1993. http://hdl.handle.net/10150/622369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Trott, Sarah Louise. "The detective as veteran : the trauma of war in the work of Raymond Chandler." Thesis, Swansea University, 2010. https://cronfa.swan.ac.uk/Record/cronfa42370.

Full text
Abstract:
Raymond Chandler created his detective Philip Marlowe not as the idealisation of heroic individualism as is commonly perceived, but instead as an authentic individual subjected to very real psychological frailties resulting from his traumatic experiences during World War One. Marlowe's characterisation goes beyond the traditional chivalric readings and should instead be interpreted as an authentic representation of a traumatised veteran in American society. Substituting the horror of the trenches for the corruption of the city. Chandler's disillusioned protagonist and his representation of an uncaring American society resonate strongly with the dislocation of the Lost Generation. Consequently, it is profitable to consider Chandler not simply as a generic writer but as a genuine literary figure. This thesis re-examines important primary documents highlighting extensive discrepancies in existing biographical narratives of Chandler's war experience, and unveils an account that is significantly different from that of his biographers, revealing the trauma that troubled Chandler throughout his life. The application of psychological behavioural interpretation to interrogate Chandler's novels demonstrates the variety of post-traumatic symptoms that tormented both Chandler and his protagonist. A close reading of his personal papers reveals the psychological symptoms of PTSD that were subconsciously encoded into Marlowe's characterisation. Marlowe can only be understood a character shaped by Chandler's own experiences. This conflation of the hard-boiled style and war experience has influenced many contemporary crime writers, particularly in the traumatic aftermath of the Vietnam War. The sum of this work offers a new understanding of Chandler's traumatic war experience, how that experience established the traditional archetype of detective fiction, and how this reading of his work allows Chandler to transcend generic limitations to be recognised as a key twentieth century literary figure.
APA, Harvard, Vancouver, ISO, and other styles
3

Nicklow, Stacy Olivia. "Sisterly Sleuths: The Hidden Cultural Work of Serial Modernism." OpenSIUC, 2016. https://opensiuc.lib.siu.edu/dissertations/1195.

Full text
Abstract:
Over the last two centuries, mass-produced serial narratives, especially those created for women, have been vilified or ignored by literary and cultural critics. Serial narratives, which include continuing stories published in installments and independent tales that form part of an overarching plot, have been maligned for their content, for the material realities of their mass production, and most simply for their popularity. Serial texts aimed at female audiences have been subjected to further criticisms: they have been judged as being trivial or insipid in content and as lacking aesthetic merit or cultural weight. Despite these criticisms, serial narratives were exceedingly popular with audiences in the late nineteenth and early twentieth centuries and by the end of the twentieth century became the dominant mode of storytelling across nearly all media. Popularity, far from being a reason to disparage these works, suggests the enormous power serial narratives have to both reflect and shape the culture that produces and consumes them. This cultural agency has long been overlooked, and this study hopes to change that. Serial narratives, it will be argued, train readers and viewers in various ways to actively participate in the narrative and in parallel ways in real life, an outcome especially noteworthy for modern female audiences. Ongoing and repetitive, serial narratives invite long-term engagement that enables audiences to participate imaginatively in the story itself and to embody the attitudes and behaviors of the serial protagonists in their own lives. In addition, because they are published on a potentially infinite basis, serial narratives are a medium through which modern audiences come to understand themselves and the world they inhabit. This connection between the reading and viewing choices of the modern citizen and their lived experiences, what I call serial modernism, provides a way of understanding how serial texts enact this connection particularly in relation to the modern woman’s increasing sense of agency and her continually evolving identity. Several serial texts from different eras and in different media that powerfully engage with evolving expectations of American women over the last 150 years will crystallize this connection: Louisa May Alcott’s Little Women series (1868-1886) and her serialized novel Work (1873); two silent film serials, The Perils of Pauline (1914) and The Hazards of Helen (1914-1917); two teenage sleuth series, Carolyn Keene’s Nancy Drew (1930-2003) and Margaret Sutton’s Judy Bolton (1930-1967); and Sara Paretsky’s adult detective series V.I. Warshawski (1982-present).
APA, Harvard, Vancouver, ISO, and other styles
4

Martinez, Nistal Clara. "Rewriting the limits between history and fiction : Jorge Luis Borges in the work of Leonardo Sciascia." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/29011.

Full text
Abstract:
This thesis examines the preoccupation with the relationship between history and fiction present in the work of Leonardo Sciascia and Jorge Luis Borges. By means of different narrative strategies, both authors underscore the narrative elements that underpin any reconstruction of the past, and in this way they link the process of reconstruction of past events to the process of rewriting of a literary work. They emphasise, however, that whereas the literary work can be enriched by multiple rewritings, multiple reconstructions of the same real past event risk threatening its truthfulness. This thesis investigates the different ways in which Borges’s and Sciascia’s works intersect, across three narrative forms: the detective story, the historical essay (inchiesta or ‘enquiry’ for Sciascia) and the historical fiction. The analysis of Sciascia’s texts starts from a focus on the structural similarities with the work of Borges in the detective story, paying particular attention to Il contesto (1971), Todo modo (1974), and Il cavaliere e la morte (1988). It then moves on to Sciascia’s inclusion of fragments of Borges’s texts in two of his inchieste, L’affaire Moro (1978) and Il teatro della memoria (1981). The last chapter of the thesis proposes a metafictional reading of Sciascia’s historical novel Il Consiglio d’Egitto (1963), in the light of the comparisons with Borges’s work undertaken in the previous chapters. The two key aims of this thesis are to show (1) that studying the ways in which Sciascia integrates Borges’s texts in his own writing allows a deeper understanding of Sciascia’s texts, but also underscores traits in Borges’s which might have been downplayed by previous criticism of his work, and (2) that reconsidering in the light of this understanding a number of Sciascia’s other texts where Borges’s influence is not explicit allows us to identify a preoccupation with regards to the relationship between history and fiction shared between both authors.
APA, Harvard, Vancouver, ISO, and other styles
5

Winterkvist, Frida. "”There is Nothing More Deceptive than an Obvious Fact” : A Feminist Study of the Detective Work by Miss Marple and Sherlock Holmes." Thesis, Högskolan i Gävle, Engelska, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-32473.

Full text
Abstract:
This comparative study focuses on the detective genre and is conducted through literary analysis with a feminist critical perspective of two of its most iconic protagonists, Sherlock Holmes and Miss Marple, created by Sir Arthur Conan Doyle in 1887 and Agatha Christie in 1930 respectively. The purpose is to attempt to establish the effect of the gender differences on these two protagonists. Both Holmes and Miss Marple are deemed as iconic in the detective genre, but the protagonists do not have similar experiences and are created by authors of different genders. Thus, the focus is to explore how gender differences are represented in the literary texts A Study in Scarlet (1887), “A Scandal in Bohemia” (1891), and The Murder at the Vicarage (1930) when it comes to their work as detectives. By using a feminist critical perspective and with the help of previous research, the differences in three central issues, that is, work methods, attitudes and method of disguise, are established. The most prominent result from the analysis is that Miss Marple has to work independently from the police force and trust another character, Leonard Clement, with what she knows hoping that Clement will use her observations to make the case move forward. By contrast, Holmes is approached by clients and even assists the police force in investigations, while Miss Marple is dismissed because of gender discrimination and ageism when she reaches out to the police force. Miss Marple is clearly a victim of gender discrimination and ageism, while Holmes is seen as eccentric but fully competent as a detective. Holmes is even described as having “extraordinary powers” while Miss Marple is described as an “old pussy” in a derogatory manner. Therefore, the results are that there is a significant difference in attitude where Holmes as a man encounters more positive attitudes and Miss Marple as a woman encounters more negative attitudes, all because of gender discrimination and ageism. These results are of great importance as it reveals what gender differences Holmes and Miss Marple encounter in their literary texts. It opens up the opportunity for more research in gender differences and gender discrimination in comparisons between protagonists. That Miss Marple is successful in the end, however, functions as a feminist statement.
APA, Harvard, Vancouver, ISO, and other styles
6

Johnson, Seth. "HISTORY, MYTH AND SECULARISM ACROSS THE BORDERLANDS: THE WORK OF MICHAEL CHABON." Kent State University / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=kent1392155557.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Теплинська, В., В. Теплинская та B. Teplynska. "Поетика хронотопу в британському детективному романі (на матеріалі творів Г. К. Честертона)". Thesis, Харківський національний педагогічний університет імені Г. С. Сковороди, 2020. http://dspace.hnpu.edu.ua/handle/123456789/5510.

Full text
Abstract:
В статті розглянуто британський детектив Г. К. Честертона. Специфіка авторської картини світу Честертона полягає в тому, що автор використовує художній хронотоп для трансформації жанру детективного оповідання в релігійну проповідь. Створюючи художній образ світу детективного твору, Честертон вдається до художніх засобів, запозичених зі сфери образотворчих мистецтв. При формуванні художнього простору Честертон використовує насамперед графічну лінеарність, а для створення художнього часу – гру світла і кольору, як у живописі. В статье рассмотрен британский детектив Г. К. Честертона. Специфика авторской картины мира Честертона заключается в том, что автор использует художественный хронотоп для трансформации жанра детективного рассказа в религиозную проповедь. Создавая художественный образ мира детективного произведения, Честертон прибегает к художественным средствам, заимствованных из сферы изобразительных искусств. При формировании художественного пространства Честертон использует прежде всего графическую линеарность, а для создания художественного времени – игру света и цвета, как в живописи. The article deals with the British detective story by G. K. Chesterton. The specifics of Chesterton's author's picture of the world lies in the fact that the author uses artistic chronotope to transform the genre of the detective story into a religious sermon. Creating an artistic image of the world of the detective work, Chesterton resorts to artistic means borrowed from the field of fine arts. In shaping artistic space Chesterton uses primarily graphic linearity, and to create artistic time – the play of light and colour, as in painting.
APA, Harvard, Vancouver, ISO, and other styles
8

Laredo, Jeanette A. "Reading the Ruptured Word: Detecting Trauma in Gothic Fiction from 1764-1853." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc862792/.

Full text
Abstract:
Using trauma theory, I analyze the disjointed narrative structure of gothic works from 1764-1853 as symptomatic of the traumatic experience. Gothic novels contain multiple structural anomalies, including gaps in experience that indicate psychological wounding, use of the supernatural to violate rational thought, and the inability of witnesses to testify to the traumatic event. These structural abnormalities are the result of trauma that characters within these texts then seek to prevent or repair via detection.
APA, Harvard, Vancouver, ISO, and other styles
9

Han, Wenjun. "A Connected Work Zone Hazard Detection System for Highway Construction Work Zones." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/90896.

Full text
Abstract:
Roadway construction workers have to work in close proximity to construction equipment as well as high-speed traffic, exposing them to an elevated risk of collisions. This research aims to develop an innovative holistic solution to reduce the risk of collisions at roadway work zones. To this end, a connected hazard detection and prevention system is developed to detect potential unsafe proximities in highway work zones and provide warning and instructions of imminent threats. This connected system collects real-time information from all the actors inside and outside of the work zone and communicates it with a cloud server. A hazard detection algorithm is developed to identify potential proximity hazards between workers and connected/automated vehicles (CAV) and/or construction equipment. Detected imminent threats are communicated to in-danger workers and/or drivers. The trajectories and safety status of each actor is visualized on Virginia Connected Corridors (VCC) Monitor, a custom web-based situational awareness tool, in real-time. To assure the accuracy of hazard detection, the algorithm accommodates various parameters including variant threat zones for workers-on-foot, vehicles, and equipment, the direction of movement, workers' distance to the work zone border, shape of road, etc. The designed system is developed and evaluated through various experiments on the Virginia's Smart Roads located at Virginia Tech. Data regarding activities of workers-on-foot was collected during experiments and was used and classified for activity recognition using supervised machine learning methods. A demonstration was held to evaluate the usability of the developed system, and the results proved the efficacy of the algorithm in successfully detecting potential collisions and provide prompt warnings and instructions. The developed holistic system elevates safety of highway construction and maintenance workers at work sites. It also helps managers and inspectors to keep track of the real-time safety status of their work zone actors as well as the accidents occurrences. As such, with the connected work zone hazard detection system, the safety level and productivity of the workers is expected to be greatly enhanced.<br>Master of Science<br>In order to reduce the risk of collisions for roadway construction workers, this research aims to develop an innovative holistic solution at roadway work zones. In this research, a connected hazard detection and prevention system is developed to detect potential collision hazards in highway work zones and generate warning and instructions of imminent threats. This system collects real-time information from all the workers, construction equipment and connected/automated vehicles (CAV) of the work. A hazard detection algorithm is developed to identify potential proximity hazards between them as well as to recognize the activities of workers. The trajectories and safety status of each worker, equipment or vehicle is visualized on Virginia Connected Corridors (VCC) Monitor, a custom web-based tool, in real-time. A demonstration was held to evaluate the developed system, and the results proved the efficacy of the algorithm in successfully detecting potential collisions and provide prompt warnings and instructions. The developed holistic system helps managers and inspectors to keep track of the real-time safety status of their work zone worker, equipment and vehicles as well as the accidents occurrences. As such, with the connected work zone hazard detection system, the safety level and productivity of the workers is expected to be greatly enhanced.
APA, Harvard, Vancouver, ISO, and other styles
10

Christoffersen, Dag, and Bengt Jonny Mauland. "Worm Detection Using Honeypots." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9454.

Full text
Abstract:
<p>This thesis describes a project that utilizes honeypots to detect worms. A detailed description of existing worm detection techniques using honeypots is given, as well as a study of existing worm propagation models. Simulations using some of these worm propagation models are also conducted. Although the results of the simulations coincide with the collected data from the actual outbreak of a network worm, they also conclude that it is difficult to produce realistic results prior to a worm outbreak. A worm detection mechanism called HoneyComb is incorporated in the honeypot setup installed at NTNU, and experiments are conducted to evaluate its effectiveness and reliability. The mechanism generated a large amount of false positives in these experiments, possibly due to an error discovered in the implementation of the detection algorithm. An architecture using honeypots for detection of unknown worms is proposed. This architecture is based on a combination of two recently published systems with the extension referred to as a Known-Attack (KA) filter. By using this filter, it is believed that the amount of traffic needed to be processed by the honeypot sensors will be considerably reduced.</p>
APA, Harvard, Vancouver, ISO, and other styles
11

Stafford, John, and John Stafford. "Behavior-based Worm Detection." Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12341.

Full text
Abstract:
The Internet has become a core component of our lives and businesses. Its reliability and availability are of paramount importance. There are many types of malware that impact the availability of the Internet, including network worms, bot-nets, viruses, etc. Detecting such attacks is a critical component of defending against them. This dissertation focuses on detecting and understanding self-propagating network worms, a type of malware with a proven record of disrupting the Internet. According to
APA, Harvard, Vancouver, ISO, and other styles
12

Kemp, E., M. Floyd, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "IPV Detection Strategies." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6406.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Floyd, M., E. Kemp, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "IPV Detection Strategies." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Lo, Wing Sze. "Statistics-based Chinese word segmentation and new word detection /." View Abstract or Full-Text, 2002. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202002%20LOW.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2002.<br>Includes bibliographical references (leaves 83-86). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
15

Kilaru, Aruna. "Lipid Detection and Visualization." Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/etsu-works/7731.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Agaiby, Hany. "Word boundary detection for engineering applications." Thesis, University of the West of Scotland, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.265933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sharma, Oliver. "Detecting worm mutations using machine learning." Thesis, University of Glasgow, 2008. http://theses.gla.ac.uk/469/.

Full text
Abstract:
Worms are malicious programs that spread over the Internet without human intervention. Since worms generally spread faster than humans can respond, the only viable defence is to automate their detection. Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean that new worms cannot be detected until the corresponding signatures are created, but that mutations of known worms will remain undetected because each mutation will usually have a different signature. The intuitive and seemingly most effective solution is to write more generic signatures, but this has been found to increase false alarm rates and is thus impractical. This dissertation investigates the feasibility of using machine learning to automatically detect mutations of known worms. First, it investigates whether Support Vector Machines can detect mutations of known worms. Support Vector Machines have been shown to be well suited to pattern recognition tasks such as text categorisation and hand-written digit recognition. Since detecting worms is effectively a pattern recognition problem, this work investigates how well Support Vector Machines perform at this task. The second part of this dissertation compares Support Vector Machines to other machine learning techniques in detecting worm mutations. Gaussian Processes, unlike Support Vector Machines, automatically return confidence values as part of their result. Since confidence values can be used to reduce false alarm rates, this dissertation determines how Gaussian Process compare to Support Vector Machines in terms of detection accuracy. For further comparison, this work also compares Support Vector Machines to K-nearest neighbours, known for its simplicity and solid results in other domains. The third part of this dissertation investigates the automatic generation of training data. Classifier accuracy depends on good quality training data -- the wider the training data spectrum, the higher the classifier's accuracy. This dissertation describes the design and implementation of a worm mutation generator whose output is fed to the machine learning techniques as training data. This dissertation then evaluates whether the training data can be used to train classifiers of sufficiently high quality to detect worm mutations. The findings of this work demonstrate that Support Vector Machines can be used to detect worm mutations, and that the optimal configuration for detection of worm mutations is to use a linear kernel with unnormalised bi-gram frequency counts. Moreover, the results show that Gaussian Processes and Support Vector Machines exhibit similar accuracy on average in detecting worm mutations, while K-nearest neighbours consistently produces lower quality predictions. The generated worm mutations are shown to be of sufficiently high quality to serve as training data. Combined, the results demonstrate that machine learning is capable of accurately detecting mutations of known worms.
APA, Harvard, Vancouver, ISO, and other styles
18

Kochmar, Ekaterina. "Error detection in content word combinations." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.709003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Cox, Cynthia Gail. "Bilingual word detectives transferability of word decoding skills for Spanish/English bilingual students /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2008. http://wwwlib.umi.com/cr/ucsd/fullcit?p1457293.

Full text
Abstract:
Thesis (M.A.)--University of California, San Diego, 2008.<br>Title from first page of PDF file (viewed Nov. 10, 2008). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 188-193).
APA, Harvard, Vancouver, ISO, and other styles
20

Haas, R., Jacek Smurzynski, and Marc A. Fagelson. "The Effect of Tinnitus on Gap Detection." Digital Commons @ East Tennessee State University, 2012. https://dc.etsu.edu/etsu-works/1601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hass, R., Jacek Smurzynski, and Marc Fagelson. "The Effect of Tinnitus on Gap Detection." Digital Commons @ East Tennessee State University, 2011. https://dc.etsu.edu/etsu-works/2214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Thepvongs, Somchart. "Use of Integrated Process Control Displays in Work System Design." Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/36775.

Full text
Abstract:
Given the continuing deployment of total quality control and total quality management initiatives by organizations, employees have seen changes in their work environment. Furthermore, the impact of downsizing has resulted in operators becoming responsible for the quality of their own processes. This study tested the impact of various display alternatives of control chart data on decision performance and mental workload.&nbsp; The control charts were shown as multiple two dimensional displays, a composite two dimensional display, and a composite three dimensional perspective display. Multiple two dimensional displays were found to have significantly higher decision accuracy and decision confidence ratings than either composite displays. No significant difference in decision accuracy and decision confidence ratings was found among the composite displays. The type of display did not have a significant effect on decision time. Mental workload was also found to be significantly affected by the type of display used. Multiple two dimensional displays imposed significantly lower levels of mental workload than either composite display. No significant difference in mental workload was found among the composite displays. These results indicated that multiple two dimensional displays should be used when control chart data from multiple processes must be displayed.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
23

Whittle, David. "Bruce Montgomery (1921-1978) : a biography with a catalogue of the musical works." Thesis, University of Nottingham, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.285461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hall, Brandi M., and L. Lee Glenn. "Detection and Management of Perinatal Depression by Midwives." Digital Commons @ East Tennessee State University, 2013. https://dc.etsu.edu/etsu-works/7488.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Schnall, Andrea [Verfasser]. "Speaker Adaptation for Word Prominence Detection / Andrea Schnall." Aachen : Shaker, 2018. http://d-nb.info/1161299440/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Wagner, Arno. "Entropy-based worm detection for fast IP networks." München Verl. Dr. Hut, 2008. http://d-nb.info/990984540/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Floyd, M., E. Kemp, Beth Ann Bailey, Ivy A. Click, and E. McCord-Duncan. "Development of an Intimate Partner Violence Detection Strategy for Men." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Swiger-Patterson, S., S. R. Piontkowski, Phillip R. Scheuerman, and Phillip R. Musich. "Detection of Cryptosporidium and Giardia in a Rural Water Source." Digital Commons @ East Tennessee State University, 1999. https://dc.etsu.edu/etsu-works/2922.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jonsson, Erik. "Semantic word classification and temporaldependency detection on cooking recipes." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122966.

Full text
Abstract:
This thesis presents an approach to automatically infer facts about cooking recipes.The analysis focuses on two aspects: recognizing words with special semantic meaningin a recipe such as ingredients and tools; and detecting temporal dependencies betweensteps in the cooking procedure. This is done by use of machine learning classicationand several dierent algorithms are benchmarked against each other.
APA, Harvard, Vancouver, ISO, and other styles
30

Chi, Xuemin 1979. "Word boundary detection using landmarks : a survey of consonants." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44402.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.<br>Includes bibliographical references (p. 107-111).<br>This project searches for consistent acoustic attributes in a broad set of American English consonants that would help in identifying their word positions in running speech. A database of sentences containing word pairs (e.g. "lay keys" vs. "lake ease" for /k/) of thirteen consonants (six stops, two affricates, three fricatives, and two nasals), controlled for prosodic boundaries, pitch accents, phonetic contexts, and word positions (initial vs. final), was recorded from six speakers. On the assumption that consonants might be articulated differently at word onsets, several temporal and spectral measurements were made and contrasted as a function of word position. The relatively simple measurement of duration did quite well in distinguishing word-initial (being longer) from word-final positions in our database. For stops and affricates at word onsets, speakers are found to lengthen closure and release durations differently, depending on voicing, suggesting that enhancement of paradigmatic contrast is made for these consonants. The identity of the following vowel (/i/ or /o/) had no consistent effect on the durations of the consonants. Word-initial consonants were found to be less variable than word-final ones, supporting the claim that word onsets are perceptual "islands of reliability" in the lexical access process. Durations of word-onset consonants were relatively constant within each sound class (voicing, stops, affricates, fricatives, nasals), independent of place of articulation. By using acoustic landmarks, from which information about manner as well as durations can be easily extracted, word segmentation and/or lexical access processes can start without the complete identification of all features (such as place) for a particular segment.<br>(cont.) Acoustic landmarks can thus be used either singly, in identifying acoustically interesting regions where place features can be identified, or in combinations, from which manner features (Park, 2008) and temporal elations can be derived, to drive higher-level processing (e.g. word segmentation and lexical access) of the speech signal.<br>by Xuemin Chi.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
31

Moss, Adam. "Detecting Lexical Semantic Change Using Probabilistic Gaussian Word Embeddings." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-412539.

Full text
Abstract:
In this work, we test two novel methods of using word embeddings to detect lexical semantic change, attempting to overcome limitations associated with conventional approaches to this problem. Using a diachronic corpus spanning over a hundred years, we generate word embeddings for each decade with the intention of evaluating how meaning changes are represented in embeddings for the same word across time. Our approach differs from previous works in this field in that we encode words as probabilistic Gaussian distributions and bimodal probabilistic Gaussian mixtures, rather than conventional word vectors. We provide a discussion and analysis of our results, comparing the approaches we implemented with those used in previous works. We also conducted further analysis on whether additional information regarding the nature of semantic change could be discerned from particular qualities of the embeddings we generated for our experiments. In our results, we find that encoding words as probabilistic Gaussian embeddings can provide an enhanced degree of reliability with regard to detecting lexical semantic change. Furthermore, we are able to represent additional information regarding the nature of such changes through the variance of these embeddings. Encoding words as bimodal Gaussian mixtures however is generally unsuccessful for this task, proving to be not reliable enough at distinguishing between discrete senses to effectively detect and measure such changes. We provide potential explanations for the results we observe, and propose improvements that can be made to our approach to potentially improve performance.
APA, Harvard, Vancouver, ISO, and other styles
32

Floyd, M., E. Kemp, E. McCord-Duncan, Beth Ann Bailey, Ivy A. Click, and J. Gorniewicz. "The Development of an Intimate Partner Violence Detection Strategy for Men." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/6417.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ousley, Lisa, Candice N. Short, and Candice D. Gentry. "Preventing Death from Melanoma: Misdiagnosis OUT Early Detection IN Primary Care." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/7155.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Leigh-Paffenroth, Elizabeth, and Saravanan Elangovan. "Behavioral and Electrophysiological Gap Detection in Listeners With and Without Hearing Loss." Digital Commons @ East Tennessee State University, 2009. https://dc.etsu.edu/etsu-works/1562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Elangovan, Saravanan, and Andrew Stuart. "Natural Boundaries in Gap Detection are Related to Categorical Perception of Stop Consonants." Digital Commons @ East Tennessee State University, 2008. https://dc.etsu.edu/etsu-works/1554.

Full text
Abstract:
Objectives: The hypothesis that a natural auditory psychophysical discontinuity contributes to a perceptual category boundary between voiced and voiceless English stop consonants was examined. Design: The relationships between voice onset time (VOT) phonetic boundary and gap-detection thresholds for conditions in which the sounds delimiting the gap were acoustically identical or different were examined in 18 native young adult English speakers. It was specifically hypothesized that between-channel gap-detection thresholds, in contrast to within-channel gap thresholds, would be better predictors of categorical VOT values for listeners. The stimuli used in the between-channel gap-detection task were designed such that dissimilar leading and trailing markers of the gap approximated a stop burst and a following vowel, both in terms of temporal and spectral relationships, while being devoid of phonetic identity. The stimuli used to examine the VOT measure were synthesized bilabial stop syllables in a continuum ranging from /ba/ to /pa/. Results: Statistically significant larger gap thresholds were found for the between-channel conditions than for the within-channel condition (p < 0.05). The center frequency of the trailing marker affected the between-channel gap thresholds with the thresholds improving as the center frequency increased (p < 0.05). Statistically significant positive correlations and predictive linear relations were found between VOT phonetic boundaries and between-channel gap thresholds (p < 0.05) but not within-channel gap thresholds (p > 0.05). Conclusions: A relationship between the phonetic boundary of voiced–voiceless speech sounds and the auditory temporal resolution task of detecting gaps placed within dissimilar markers, regardless of the center frequency of the trailing marker noise burst, was demonstrated. Detection of gaps between different nonspeech acoustic markers and categorical perception of VOT seems to share the same underlying perceptual timing mechanisms in native English speakers.
APA, Harvard, Vancouver, ISO, and other styles
36

You, Huiling. "Unsupervised Lexical Semantic Change Detection with Context-Dependent Word Representations." Thesis, Uppsala universitet, Institutionen för lingvistik och filologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-444871.

Full text
Abstract:
In this work, we explore the usefulness of contextualized embeddings from language models on lexical semantic change (LSC) detection. With diachronic corpora spanning two time periods, we construct word embeddings for a selected set of target words, aiming at detecting potential LSC of each target word across time. We explore different systems of embeddings to cover three topics: contextualized vs static word embeddings, token- vs type-based embeddings, and multilingual vs monolingual language models. We use a multilingual dataset covering three languages (English, German, Swedish) and explore each system of embedding with two subtasks, a binary classification task and a ranking task. We compare the performance of different systems of embeddings, and seek to answer our research questions through discussion and analysis of experimental results. We show that contextualized word embeddings are on par with static word embeddings in the classification task. Our results also show that it is more beneficial to use the contextualized embeddings from a multilingual model than from a language specific model in most cases. We present that token-based setting is strong for static embeddings, and type-based setting for contextual embeddings, especially for the ranking task. We provide some explanation for the results we achieve, and propose improvements that can be made to our experiments for future work.
APA, Harvard, Vancouver, ISO, and other styles
37

Leigh-Paffenroth, Elizabeth, and Saravanan Elangovan. "Behavioral and Electrophysiological Formant-Frequency Gap Detection in Listeners With and Without Hearing Loss." Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etsu-works/1563.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

DeFreeuw, Jonathan Daniel. "Embedding Network Information for Machine Learning-based Intrusion Detection." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/99342.

Full text
Abstract:
As computer networks grow and demonstrate more complicated and intricate behaviors, traditional intrusion detections systems have fallen behind in their ability to protect network resources. Machine learning has stepped to the forefront of intrusion detection research due to its potential to predict future behaviors. However, training these systems requires network data such as NetFlow that contains information regarding relationships between hosts, but requires human understanding to extract. Additionally, standard methods of encoding this categorical data struggles to capture similarities between points. To counteract this, we evaluate a method of embedding IP addresses and transport-layer ports into a continuous space, called IP2Vec. We demonstrate this embedding on two separate datasets, CTU'13 and UGR'16, and combine the UGR'16 embedding with several machine learning methods. We compare the models with and without the embedding to evaluate the benefits of including network behavior into an intrusion detection system. We show that the addition of embeddings improve the F1-scores for all models in the multiclassification problem given in the UGR'16 data.<br>MS
APA, Harvard, Vancouver, ISO, and other styles
39

Alhassam, Basil A., Lee Cutshaw, Jo-Ann Marrs, Jonathan M. Peterson, W. Andrew Clark, and Arsham Alamian. "Efficacy of Adipocytokines, Cpeptide and Ghrelin for Detecting Cardiometabolic Risk in Pre-Adolescent Hispanic Children." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/1385.

Full text
Abstract:
Background. The diagnosis of metabolic syndrome is currently based on synthesizing measurements on five different biochemical and anthropometric scales. The logistics involved makes it less than an ideal screening test of cardiometabolic risk. Adipocytokines, c-peptide and ghrelin have emerged as important non-traditional biomarkers for understanding cardio-metabolic risk, and offer potential as tests of cardiometabolic risk. However, optimal sensitivity and specificity cut-offs of non-traditional biomarkers for detecting cardiometabolic risk are scarce, especially in pre-adolescent ethnic minorities. Objective. To assess the efficacy of 7 non-traditional biomarkers for detecting 3 or more cardiometabolic risk factors in pre-adolescent Hispanic children. Methods. The study population consisted of a healthy control group of 23 children and an at-risk group of 15 children aged 2-10 years with 3 or more cardiometabolic risk factors (blood pressure>=90th percentile; waist circumference >=90th percentile; triglycerides>=95th percentile; and HDL<5th >percentile) who were recruited as part of a larger pilot study of metabolic syndrome in Hispanic children receiving well-child care at a community health center in Johnson City, TN, from June 2015 to September 2016. T-test, Mann-Whitney U and Chi-squared tests were used to assess differences in characteristics of the two groups. Spearman’s correlation analysis was used to assess the relationship between biomarkers and cardiometabolic risk factors. ROC analysis and the Youden’s J statistic=maximum (sensitivity +(specificity-1)) were used to determine biomarker cut-off for optimal sensitivity and specificity. Data analysis was performed using SAS 9.4. Results. The mean age of the sample was 6.48 years (SD=2.74). About half of the sample were girls (50.5%). The at-risk group had significantly higher systolic blood pressure, triglyceride levels, waist circumference, leptin and C-peptide levels, but significantly lower HDL-C levels than participants in the control group. Leptin [r (38) = 0.3, p
APA, Harvard, Vancouver, ISO, and other styles
40

Swiger-Patterson, S., Phillip R. Scheuerman, and Phillip R. Musich. "Evaluation of Two Filter Types for the Detection of Giardia and Cryptosporidium in Surface Water." Digital Commons @ East Tennessee State University, 1999. https://dc.etsu.edu/etsu-works/2923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Dunnion, Marie. "The masked employee and false performance : detecting unethical behaviour and investigating its effects on work relationships." Thesis, University of Worcester, 2014. http://eprints.worc.ac.uk/5104/.

Full text
Abstract:
This thesis was undertaken to investigate a specific type of unethical behaviour in the workplace within the context of the United Kingdom (UK) public sector. The main research aim was to develop an understanding of how to detect false performers. Parnell and Singer (2001) proposed the construct of False Performance (FP) when developing the Organisational Charlatan Scale (OCS) to measure organisational charlatanism (OC). According to their definition, false performers are those individuals who seek to improve their perceived performance at the expense of their actual performance. This type of employee deliberately portrays themselves as being better able to perform in a job role than they know themselves to be capable of. In the current study, the phenomenon of FP was explored in two phases using a sequential, mixed methods approach. The present research sought to address the gaps in the literature by extending previous quantitative efforts and carrying out the first qualitative study in this area. In the first qualitative phase, eight focus groups (n=51) were conducted, and grounded theory was used to analyse the data and generate theory. Management and Non-Management were questioned about their perceptions and experiences of FP, especially relating to the job interview and the performance appraisal interview. The intention was not to identify false performers in the focus groups, but rather to extract themes and patterns of FP behaviour. Results identified five categories common to both Management and Non-Management: Perceptions of FP in the Workplace; FP in the Interview; Does Trust Really Matter to the False Performer?; The Effect of FP on Co-Worker Morale; and Tackling FP in the Workplace. In the second phase, the qualitative results were used to inform the quantitative study. The focus group data helped to generate items for the development of a new measure of FP i.e. the False Performance Questionnaire (FPQ). To achieve the objective of producing a reliable new instrument, the FPQ was systematically developed in six stages, concluding with two phases of questionnaire administration. Using an item analytic and factor analytic approach, the FPQ was distributed in two phases (stages 5 and 6) in order to refine the item set. In stage 5, a 53-item version of the FPQ was tested on a sample of 129 employees in three public sector organisations. In stage 6, the FPQ was further refined and a 21-item FPQ was administered to a sample of 219 employees in four public sector organisations. Following exploratory and confirmatory factor analyses, a final 16-item solution with two subscales was found to have good reliability (α=0.76). In contrast, the nine-item OCS was found to demonstrate relatively low reliability (α=0.55). These findings indicate that the current study has generated a more robust and reliable measure of FP, thus achieving the overall objective of developing a new measure of FP i.e. the 16-item FPQ. As regression analyses revealed a significant but negative beta for job performance as a predictor of FP (β=-.159, p<0.05), this indicates that the lower the job performance, the higher the score on the FPQ, thus suggesting that employees rating highly in FP are likely to be substituting FP for job performance. Whilst FP was negatively and significantly correlated with job performance, no significant correlation was found between the Impression Management (IM) scale and the job performance scale. This suggests that whilst an IM score reveals little about actual job performance, a score on the FPQ could help predict future job performance. The thesis concludes by considering the future applications and practical implications of this research, which include: a) An increased understanding of how to detect FP in the workplace; b) Better selection processes; c) Fairer performance evaluation processes; and d) A more ethical work environment characterised by improved trust among co-workers.
APA, Harvard, Vancouver, ISO, and other styles
42

Linhardt, Julia [Verfasser], and Joachim [Akademischer Betreuer] Wegener. "Colorimetric detection of selected gases for work and food safety applications / Julia Linhardt ; Betreuer: Joachim Wegener." Regensburg : Universitätsbibliothek Regensburg, 2016. http://d-nb.info/1129956474/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Linhardt, Julia Verfasser], and Joachim [Akademischer Betreuer] [Wegener. "Colorimetric detection of selected gases for work and food safety applications / Julia Linhardt ; Betreuer: Joachim Wegener." Regensburg : Universitätsbibliothek Regensburg, 2016. http://nbn-resolving.de/urn:nbn:de:bvb:355-epub-337764.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Kusi, Joseph, Phillip R. Scheuerman, and Kurt J. Maier. "Antimicrobial Properties of Silver Nanoparticles May Interfere with Fecal Indicator Bacteria Detection in Pathogen Impaired Streams." Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/etsu-works/7834.

Full text
Abstract:
Silver nanoparticles (AgNPs) are expected to enter aquatic systems, but there are limited data on how they might affect microbial communities in pathogen impaired streams. We examined microbial community responses to citrate-AgNP (10.9 ± 0.7 nm) and polyvinylpyrrolidone (PVP)-AgNP (11.0 ± 0.7 nm) based on microbial concentration and enzyme activity in sediment from a pathogen impaired stream. Addition of each nanoparticle to sediment caused at least a 69% decrease in microbial concentration (1,264 ± 93.6 to 127 ± 29.5 CFU/g) and a 62% decrease in β-glucosidase activity (11.7 ± 2.1 to 1.3 ± 0.3 μg/g/h). Each AgNP reduced alkaline phosphatase activity but their effects were not statistically significant. Sediment exposed to 0.108 mg Ag/kg of AgNO3 resulted in a 92% decrease in microbial concentration and a reduced enzyme activity which was not statistically significant. Measured total silver in sediments treated with AgNPs which exhibited significant inhibition effects on the microbial community ranged from 0.19 ± 0.02 to 0.39 ± 0.13 mg Ag/kg. These concentrations tested in this study are much lower than the expected concentrations (2-14 mg Ag/kg) in freshwater sediments. The results of this study demonstrate that AgNPs can alter microbial community activity and population size, which may lead to false negative fecal indicator bacteria detection and enumeration using methods that rely on β-glucosidase activity. We conclude that the presence of AgNPs in impaired streams and recreational waters can influence pathogen detection methods, potentially affecting public health risk estimates.
APA, Harvard, Vancouver, ISO, and other styles
45

Pokhrel, Lok R., Nicholas Ettore, Zachary L. Jacobs, et al. "Novel Carbon Nanotube (cnt)-Based Ultrasensitive Sensors for Trace Mercury(ii) Detection in Water: A Review." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etsu-works/2878.

Full text
Abstract:
Infamous for “Mad hatter syndrome” and “Minamata disease”, mercury (Hg) is ranked high on the Agency for Toxic Substances and Disease Registry's priority list of hazardous substances for its potent neurologic, renal, and developmental toxicities. Most typical exposures are via contaminated water and food. Although regulations and advisories are exercised at various levels, Hg pollution from both natural and anthropogenic sources has remained a major public health and safety concern. Rapid detection of solvated aqueous Hg2+ ions at low levels is critical for immediate response and protection of those who are vulnerable (young children, pregnant and breast-feeding women) to acute and chronic exposures to Hg2+. Various types of sensors capable of detecting Hg in water have been developed. In particular, the novel use of engineered carbon nanotubes (CNTs) has garnered attention due to their specificity and sensitivity towards Hg2+ detection in solution. In this focused review, we describe the sensitivity, selectivity and mechanisms of Hg2+ ion sensing at trace levels by employing CNT-based various sensor designs, and appraise the open literature on the currently applied and “proof-of-concept” methods. Five different types of CNT-based sensor systems are described: potentiometric, DNA-based fluorescence, surface plasmon resonance (SPR), colorimetric, and stripping voltammetric assays. In addition, the recognized merits and shortcomings for each type of electrochemical sensors are discussed. The knowledge from this succinct review shall guide the development of the next generation CNT-based biochemical sensors for rapid Hg2+ detection in the environment, which is a significant first step towards human health risk analysis of this legacy toxicant.
APA, Harvard, Vancouver, ISO, and other styles
46

Lord, Stephen. "The art of detection : a study of the works of the works of Ruth Rendell and Sue Grafton /." Title page, contents and introduction only, 1997. http://web4.library.adelaide.edu.au/theses/09AR/09arl867.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Iorio, Cristina. "Detecting and referring battered women : an emergency department case study." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0024/MQ50699.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Zhou, Hanqing. "DBpedia Type and Entity Detection Using Word Embeddings and N-gram Models." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37324.

Full text
Abstract:
Nowadays, knowledge bases are used more and more in Semantic Web tasks, such as knowledge acquisition (Hellmann et al., 2013), disambiguation (Garcia et al., 2009) and named entity corpus construction (Hahm et al., 2014), to name a few. DBpedia is playing a central role on the linked open data cloud; therefore, the quality of this knowledge base is becoming a central point of focus. However, there are some issues with the quality of DBpedia. In particular, DBpedia suffers from three major types of problems: a) invalid types for entities, b) missing types for entities, and c) invalid entities in the resources’ description. In order to enhance the quality of DBpedia, it is important to detect these invalid types and resources, as well as complete missing types. The three main goals of this thesis are: a) invalid entity type detection in order to solve the problem of invalid DBpedia types for entities, b) automatic detection of the types of entities in order to solve the problem of missing DBpedia types for entities, and c) invalid entity detection in order to solve the problem of invalid entities in the resource description of a DBpedia entity. We compare several methods for the detection of invalid types, automatic typing of entities, and invalid entities detection in the resource descriptions. In particular, we compare different classification and clustering algorithms based on various sets of features: entity embedding features (Skip-gram and CBOW models) and traditional n-gram features. We present evaluation results for 358 DBpedia classes extracted from the DBpedia ontology. The main contribution of this work consists of the development of automatic invalid type detection, automatic entity typing, and automatic invalid entity detection methods using clustering and classification. Our results show that entity embedding models usually perform better than n-gram models, especially the Skip-gram embedding model.
APA, Harvard, Vancouver, ISO, and other styles
49

Suen, Yiu-kwan Edmond. "The detection of simulated malingering using a computerized chinese word priming test." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29727455.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Kanneganti, Sandeep. "DESIGN OF AN AUTOMATIC WORD BOUNDARY DETECTION SYSTEM USING THE COUNTING RULE." Master's thesis, Temple University Libraries, 2011. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/118926.

Full text
Abstract:
Electrical Engineering<br>M.S.E.<br>Word boundary detection is the stepping stone for many applications like keyword spotting, speech recognition, etc. It is proved that fifty percent of the speech recognition errors are due to the errors in the word boundary detector. Efficient word boundary detection can reduce the recognition errors and improve the performance of keyword spotting algorithms. Word boundary detection also helps in reducing the search space in the keyword spotting algorithm. Speech is non-stationary in nature and most of the time no utterance of the same word will be same as another utterance of same word. This makes it challenging to develop any speech processing algorithm. Many algorithms, to detect word boundaries, use acoustic features, lexical cues, energy, pitch etc. Acoustic features of energy, pitch and Teager Energy were used in this research to detect word boundaries. The strengths and drawbacks of each of the techniques are identified and the information from all the techniques was fused to obtain improved word boundary detection. Energy was able to detect word boundaries with 56% of the time, pitch with 68% of the time and Teager Energy with 72% of the time. Simple counting rule, which is based on reinforcement learning, was used in this research to fuse the detections from the three techniques to make a final decision on the word boundaries. This system does not need prior knowledge about the detection and false alarm probabilities of the techniques. The weights are adapted with the outcome in every iteration. Fusion of the decisions from energy, Teager Energy and pitch yielded a 79% hit rate on spontaneous speech using counting rule whereas linear opinion pool and log opinion pool produced 73% and 74% hit rate respectively.<br>Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography