Dissertations / Theses on the topic 'Download data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 22 dissertations / theses for your research on the topic 'Download data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chen, Yingyong. "Maximizing data download capabilities for future constellation space missions." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1730.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ieong, Sze-Chung Ricci. "Dispute resolution against copyright infringement through internet download?" access abstract and table of contents access full-text, 2007. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?ma-slw-b21844173a.pdf.
Full text"Master of Arts in arbitration and dispute resolution dissertation, City University of Hong Kong" Title from PDF t.p. (viewed on May 22, 2007) Includes bibliographical references.
Chowdhury, H. (Helal). "Data download on the move in visible light communications:design and analysis." Doctoral thesis, Oulun yliopisto, 2016. http://urn.fi/urn:isbn:9789526213620.
Full textTiivistelmä Näkyvään valoon pohjautuvassa tiedonsiirrossa (VLC) valodiodeja (LED) käytetään lähettiminä, ilma on siirtokanava ja valoilmaisimia käytetään vastaanottimina. Tätä kutsutaan usein nimellä light fidelity (Li-Fi). Tässä työssä tarjoamme menetelmiä VLC ”hotspot” verkkojen suorituskyvyn arviointiin tiedonsiirtonopeus-etäisyysmalleilla skenaarioissa, jossa tietoa ladataan liikkeessä. Tässä kontekstissa tutkimme ensin optisen lähettimen komponenttien eri ominaisuuksia, kohinan lähteitä, keinovalon häiriömalleja ja tiedonsiirtolinkkien topologioita, jonka jälkeen esittelemme tiedonsiirtonopeuden ja etäisyyden välisen mallin. Toiseksi kehitetyn analyyttisen tiedonsiirto-etäisyys mallia käytetään arvioitaessa VLC hotspot verkkojen suorituskykyä sisäympäristössä sekä päivä että yö olosuhteissa. Simulointien tulokset osoittavat, että taustakohinalla on suuri vaikutus VLC verkkojen suorituskykyyn. Kuten odotettua, sisä- ja ulkotiloissa VLC hotspot toimii paremmin yöllä kuin päivällä. VLC hotspot verkkojen suorituskyky arvioidaan myös vastaanotetun tiedoston koon, eri bittivirhesuhteen vaatimuksilla ja liikkuvan käyttäjän nopeuden suhteen. Kolmanneksi tutkimme hybridi WLAN-VLC hotspot verkon suorituskykyä ja vertaamme sen suorituskykyä pelkän VLC- tai WLAN hotspot tapauksessa. Käsittelemme myös skenaarioita jossa tiedoston lataus tapahtuu liikkeessä sisätilassa yhden käyttäjän sekä monen käyttäjän tapauksissa. Tässä hybridi WLAN-VLC hotspot, sekä erilliset WLAN- ja VLC verkot ovat määritelty niiden tiedonsiirtonopeuden ja kantaman perusteella. Näiden verkkojen suorituskykyä arvioitaessa on tehty joukko tietokonesimulointeja verkossa tapahtuvasta tietojen lataamisesta liikkeessä ottamalla huomioon suorituskyvyn mittarit kuten tiedoston koko, keskimääräinen yhteyden kesto ja saavutettu läpäisy. Simuloinnin tulokset paljastavat, että hybridi WLAN-VLC toimii aina paremmin kuin pelkkä VLC tai WLAN hotspot sekä yhden että monen käyttäjän tapauksessa. Lopuksi työssä analysoidaan ehdotetun järjestelmän toteutettavuus ja mahdolliset edut käytettäessä hybridejä radio-optisia langattomia järjestelmiä. Tältä osin esitellään myös kooperatiiviseen viestintään perustuvat optiset releet parantamaan verkon kattavuutta ja energiatehokkuutta akkukäyttöisissä laitteissa. Mahdolliset hyödyt tunnistetaan palvelun konnektiivisuudessa ja energiatehokkuudessa akkukäyttöisissä laitteissa sisätiloissa. Simulointien tulokset osoittavat, että käyttäjien konnektiivisuus ja energiatehokkuus riippuvat käyttäjätiheydestä, kantaman ja etäisyyden välisestä suhteesta yhden hypyn ja monen hypyn välillä, releointi todennäköisyydestä ja käyttäjien mobiliteetista
Opitz, Andrea. "Stereo plastic calibration, simulation and data analysis /." [S.l.] : [s.n.], 2007. http://www.zb.unibe.ch/download/eldiss/07opitz_a.pdf.
Full textGerber, Manuel. "Predictive site detection and reconstruction a data-driven approach to the detection, analysis, reconstruction and excavation of ancient Near Eastern monumental architecture /." Bern : Selbstverl, 2003. http://www.zb.unibe.ch/download/eldiss/03gerber_m.pdf.
Full textHopkins, Ashley R. "Privacy Within Photo-Sharing and Gaming Applications: Motivation and Opportunity and the Decision to Download." Ohio University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1556821782704244.
Full textCanali, Davide. "Plusieurs axes d'analyse de sites web compromis et malicieux." Thesis, Paris, ENST, 2014. http://www.theses.fr/2014ENST0009/document.
Full textThe incredible growth of the World Wide Web has allowed society to create new jobs, marketplaces, as well as new ways of sharing information and money. Unfortunately, however, the web also attracts miscreants who see it as a means of making money by abusing services and other people's property. In this dissertation, we perform a multidimensional analysis of attacks involving malicious or compromised websites, by observing that, while web attacks can be very complex in nature, they generally involve four main actors. These are the attackers, the vulnerable websites hosted on the premises of hosting providers, the web users who end up being victims of attacks, and the security companies who scan the Internet trying to block malicious or compromised websites. In particular, we first analyze web attacks from a hosting provider's point of view, showing that, while simple and free security measures should allow to detect simple signs of compromise on customers' websites, most hosting providers fail to do so. Second, we switch our point of view on the attackers, by studying their modus operandi and their goals in a distributed experiment involving the collection of attacks performed against hundreds of vulnerable web sites. Third, we observe the behavior of victims of web attacks, based on the analysis of their browsing habits. This allows us to understand if it would be feasible to build risk profiles for web users, similarly to what insurance companies do. Finally, we adopt the point of view of security companies and focus on finding an efficient solution to detecting web attacks that spread on compromised websites, and infect thousands of web users every day
Henneberger, Sabine. "Entwicklung einer Analysemethode für Institutional Repositories unter Verwendung von Nutzungsdaten." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2011. http://dx.doi.org/10.18452/16399.
Full textWith the spread of internet usage over the past decades, access characteristics of electronic scientific publica-tions, especially the number of document downloads, are of increasing interest to the authors, publishers, technical providers and users of such publications. These download data of publications are usually obtained from the protocols of the IT systems of the provider. A data set is then created by filtering all accesses and subsequent summarizing over a certain time unit. Download data are the subject of scientific investigations, in which the concept of the Citation Impact is applied to the rate of use of a publication and the so-called Download Impact is formed. Special attention is paid to the relation between Citation Impact and Download Impact. In the case of Open Access publications, two types of access need to be distinguished. Human access and machine access are both captured and a reliable distinction is not possible yet. As a result, the data obtained for single publications are unreliable and subject to strong fluctuations. Nevertheless, they contain valuable information that can be made useful with the help of mathematical statistics. Analyzed with nonparametric methods, download data give information about the visibility of electronic publications on the Internet. These methods form the core of NoRA (Non-parametric Repository Analysis). With the help of NoRA, the operators of Open Access Repositories are able to analyze the download data of their electronic publications, to identify and correct deficiencies of visibility and to increase the quality of their online platform. The analytical method NoRA was successfully applied to data from Institutional Repositories of four universities. In each case, groups of publications were identified that differed significantly in their usage. Similarities in the results reveal factors that influence the usage data, which have not been taken into account previously. The presented results imply further applications of NoRA but also raise doubts about the value of download data of single publications.
Jílek, Radim. "Služba pro ověření spolehlivosti a pečlivosti českých advokátů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2017. http://www.nusl.cz/ntk/nusl-363772.
Full textSchäppi, Eggler Rodolpha. "Laufbahnberatung up to date - Ein modernes Internet-Tool ergänzt traditionelle bewährte Methoden /." Zürich, 2004. http://www.zhaw.ch/fileadmin/user_upload/psychologie/Downloads/Bibliothek/Arbeiten/D/d1829.pdf.
Full textSkogsberg, Peter. "Quantitative indicators of a successful mobile application." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123976.
Full textSmartphonebranschen har växt kraftigt de senaste åren. De två ledande operativsystemen, Google Android och Apple iOS, har vardera distributionskanaler som erbjuder hundratusentals mjukvaruapplikationer, eller appar. Det breda utbudet har bidragit till en mognande bransch, med nya växande affärs- och intäktsmodeller. Som apputvecklare finns grundläggande statistik och data för ens egna appar att tillgå via distributionskanalerna, men även via datakällor från tredje part. Den här rapporten behandlar hur mobil mjukvara utvärderas och bedöms kvantitativt av båda slutanvändare och utvecklare, samt vilka data och mått som är relevanta i sammanhanget. Ett urval av fritt tillgängliga tredjeparts datakällor och bevakningsverktyg presenteras, följt av en översikt av flertalet relevanta statistiska metoder och data mining-tekniker. Huvudsyftet med detta examensarbete är att utreda om fynd utifrån appstatistik kan ge förståelse för hur man utvecklar och utformar mer framgångsrika appar, som uppnår fler nedladdningar och/eller större intäkter. Efter den teoretiska bakgrunden diskuteras en konkret implementation, i form av en intern webplattform för appstatistik. Denna plattform utvecklades i samarbete med apputvecklaren The Mobile Life, som också bistod med tillgång till appdata för 16 av deras publicerade iOSoch Android-appar. Implementationen nyttjar automatiserad nedladdning och import av data från datakällor online, samt utgör ett grafiskt gränssnitt för att åskådliggöra datan med bland annat tabeller och grafer. Med hjälp av matematisk mjukvara har ett antal statistiska metoder tillämpats på det insamlade dataurvalet. Analysens omfattning inkluderar en kategorisering (klustring) av appar, existensen av en korrelation mellan mätvärden såsom appars ranking och dess antal nedladdningar, analys av vanligt förekommande ord ur apprecensioner, en regressionsanalysmodell för distributionen av nedladdningar samt en experimentell applicering av Paretos ”80-20”-regel som fanns lämplig för vår data. Rekommendationer till appföretaget inkluderar att bädda in bibliotek för appsessionsspårning, såsom Google Analytics, i dess framtida appar. Detta skulle möjliggöra insamling av mer detaljerad data såsom att mäta sessionslängd och användarlojalitet, vilket skulle möjliggöra mer intressanta analyser.
Srinivaasan, Gayathri. "Malicious Entity Categorization using Graph modelling." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202980.
Full textIdag, skadliga program inte bara skriva skadlig programvara men också använda förvirring, polymorfism, packning och ändlösa sådana undan tekniker för att fly detektering av antivirusprodukter (AVP). Förutom individens beteende av skadlig kod, de relationer som finns mellan dem spelar en viktig roll för att förbättra detektering av skadlig kod. Detta arbete syftar till att ge skadliga analytiker på F-Secure Labs att utforska olika sådana relationer mellan skadliga URL: er och fil prover i Förutom deras individuella beteende och aktivitet. De aktuella detektionsmetoder på F-Secure Labs analysera okända webbadresser och fil prover oberoende utan med beaktande av de korrelationer som kan finnas mellan dem. Sådan traditionella klassificeringsmetoder fungerar bra men är inte effektiva på att identifiera komplexa flerstegs skadlig kod som döljer sin aktivitet. Interaktioner mellan malware kan innefatta någon typ av nätverksaktivitet, släppa, nedladdning, etc. Till exempel, en okänd loader som ansluter till en skadlig webbplats som i sin tur släpper en skadlig nyttolast, bör verkligen vara svartlistad. En sådan analys kan hjälpa till att blockera malware infektion vid källan och även förstå hela infektion kedja. Resultatet av denna proof-of-concept studien är ett system som upptäcker ny skadlig kod med hjälp av diagram modellering för att sluta deras förhållande till kända skadliga program som en del av de skadliga klassificerings tjänster på F-Secure.
von, Wenckstern Michael. "Web applications using the Google Web Toolkit." Master's thesis, Technische Universitaet Bergakademie Freiberg Universitaetsbibliothek "Georgius Agricola", 2013. http://nbn-resolving.de/urn:nbn:de:bsz:105-qucosa-115009.
Full textDiese Diplomarbeit beschreibt die Erzeugung desktopähnlicher Anwendungen mit dem Google Web Toolkit und die Umwandlung klassischer Java-Programme in diese. Das Google Web Toolkit ist eine Open-Source-Entwicklungsumgebung, die Java-Code in browserunabhängiges als auch in geräteübergreifendes HTML und JavaScript übersetzt. Vorgestellt wird der Großteil des GWT Frameworks inklusive des Java zu JavaScript-Compilers sowie wichtige Sicherheitsaspekte von Internetseiten. Um zu zeigen, dass auch komplizierte graphische Oberflächen mit dem Google Web Toolkit erzeugt werden können, wird das bekannte Brettspiel Agricola mittels Model-View-Presenter Designmuster implementiert. Zur Ermittlung der richtigen Technologie für das nächste Webprojekt findet ein Vergleich zwischen dem Google Web Toolkit und JavaServer Faces statt
Lin, Szu-Hung, and 林思宏. "Statistical Multi-source Data Download Strategies for Mobile P2P Streaming." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/88033701596459256251.
Full text國立屏東科技大學
資訊管理系所
101
Provisioning of video streaming service in Mobile P2P networks is challenged by many facts in transmission, such as high data loss rate, burst loss, unstable connectivity, link and peer host heterogeneity. This thesis addresses these transport issues by proposing two novel schemes, statistical download (SD) and blockless interleaving (BI), which cooperatively work with UEP-FEC channel coding. SD improves the successful rate of data download by exploiting multi-source download according to a RTT-based probability model. BI conducts different interleaving policies of data download from respective source peers according to the associated channel loss process. Simulation results show that even the system presents high volatility and heterogeneity, when the size grows into large, SD can improve on-time data rate with moderate traffic overheads. Meanwhile, BI can improve the error recovery performance of UEP-FEC by eliminating the packet loss correlation. It turns out that the video continuity is significantly improved.
Lin, Hau-Chin, and 林皓嶔. "A Multiple Parallel Download Scheme with BoundaryBandwidth Consideration in Data Grids." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/71250195476154897462.
Full text國立東華大學
資訊工程學系
94
The advances of computer technology have promoted the quality of our daily life. However, the computing speed and the storage capacity of computers still can not satisfy users’ requirements. The concept of Data Grid is provided for this reason which consisted of many computers and makes the capabilities of compute and storage become infinite. The characteristic of Data Grid is distributing a file to many computers in order to decrease the download time of users. Thus, the parallel download method, which allows the user to download different part of a file form various computers simultaneously, is adapted to increase the decreasing degree of download time. As far as we know, there are many single parallel download methods are proposed to speed up the download time but the case of multiple parallel download jobs in a system is still not be considered. Single parallel download can decrease the download time, but it is just like a robber which will increase the download time of other users compared with the traditional download manner. If all jobs in the grid system are parallel download, the problem of resource waste is caused. In this article, we proposed a Boundary Bandwidth parallel download scheme (BB-parallel download) to limit the usage of upload bandwidth from the server and to avoid the bandwidth waste in entire system. Furthermore, it makes that each parallel download job will not influence others and will has best download time in the multiple parallel download jobs environment. We test the effects of file size, server count, and block size upon the parallel download time. The tested results show that the proposed BB-parallel download scheme outperforms than the static and the dynamic parallel download schemes.
Hsi, Shih-Chun, and 席士鈞. "An Efficient and Bandwidth Sensitive Parallel Download Scheme in Data Grids." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/bu7s9d.
Full text國立東華大學
資訊工程學系
95
For modern scientific applications such as astrophysics, astronomy, aerography, and biology, a large amount of storage space is required because of the large-scale datasets. Data Grid collects distributed storage resources such as hard disk space across heterogeneous networks to meet such requirements. In data grid environment, data replication service that copies the replicas to proper storage systems increases the reliability of the data access. By means of these replicas, parallel download creates multiple connections from the client side to the replica servers to improve the performance of the data transfer. During a large dataset transferring, the dynamic network status and different states of the replica servers make the transferring time hard to predict. If the available bandwidths of some replica servers become lower during the downloading progress, the completion time will be increased. Therefore, to adapt the bandwidth-variation and to make the data transferring more efficient, a parallel download scheme which is called EA (Efficient and Adaptive) parallel download is proposed in this thesis. The scheme is to re-evaluate all of the replica servers during the download progress and replace the decaying selected servers with better backup servers. According to our experiments in the Unigrid environment, the EA parallel download decreases the completion time by 1.63% to 13.45% in natural Unigrid environment and 6.28% to 30.56% in choreographed Unigrid environment when compared to the Recursive Co-Allocation scheme. It means that the proposed scheme adapts to the dynamic environment nicely and decreases the total download time effectively.
Nachappa, Thimmiah Gudiyangada. "Accessing meteorological data in INSPIRE." Master's thesis, 2009. http://hdl.handle.net/10362/8255.
Full textIn the information age, information is of vital importance to the economic and social development of a country. Meteorological data, is multidimensional, continually evolving, highly spatial and highly temporal in nature. It is of great importance to a wide range of stakeholders including national agencies, private weather services, defense, transportation, aviation, national infrastructures, financial institutions and the general public. Members of the WMO (World Meteorological Organization) have vast amounts of data. However, this data is stored in many different formats based on various conceptual models (e.g. BUFR, GRIB, NetCDF, HDF). INSPIRE is a European Union initiative to create interoperability between spatial datasets among various communities. The main goal of this project is to suggest the most appropriate INSPIRE Download Service to access meteorological data. This project uses BUFR data and tries to access it through Climate Science Modeling Language (CSML), which is a data model and software framework for accessing meteorological data and retrieve it through standard geospatial web services. Based on the testing, suitable INSPIRE Download Service will be suggested. This helps to bridge the gaps between the geospatial, meteorological communities, and policy makers.
Wu, Yun-daw, and 吳昀道. "E-Book Client Embedded Development: Customized Download Service and Data Storage Management Design." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/25874908612596993635.
Full text國立中央大學
資訊工程研究所
98
Recently, people talk about transforming traditional books into e-books. It seems that people are interested in e-books because its benefit can store hundreds of e-book in the small electronic device which can be from smart phones to electronic tablet devices with a 9.7 inches screen. We can take it around the world and can take time to read books in the environment where it is difficult for people to read books. According to the report[13], generally, the weight of e-book reader is not more than 2 pounds. At the same time, computers and Internet become more and more popular, so we can get and deliver e-book files conveniently. We can connect to the Internet in order to browse e-town website and buy e-books on it through 3G or wify. It will help us save our time for buying books in the book store. This thesis will talk about the implementation of e-book client on smart phone, especially for customized download service and data storage management design. The first problem confronts me is that how we use the system memory efficiently. We have to care about the balance between the memory usage and the execution rate. The second problem is that whole software is blocked when it is downloading e-books. We provide a solution for the first problem. It is that putting some data which e-book client doesn’t need now into the database file and getting those data from it when e-book client needs. The solution to the second problem is that we take advantage of Service in Android, and put it into another process so that our e-book client won''t be blocked by download jobs. This thesis proposes a design of data storage management for future extension. It can determine whether the application can access the data belonging to our e-book client.
Ho, Guan-Lin, and 何冠霖. "An Empirical Investigation of the Factors that Influence Individuals to Download Medical Data from My Health Bank." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/64nxgt.
Full text義守大學
醫務管理學系
105
Background and purpose: My health bank, issued by the Ministry of Health and Welfare of Taiwan, aimes to make people to understand medical information more clear and enable people to get their medical record and medication knowledge conveniently. However, the system was applied rarely and the usage was not high till now, Why people did not want to apply My health bank is therefore the issue that should be understood and resolved. If people have difficulty and problem, it is necessary to help people to conquer the barrier and solve the problem in order to increase the application rate of My health bank. The aim of this study is to understand the influencing factors and enable people to make use of My health bank. Materials and methods: According to Pender''s health promotion model, the research model includes seven factors: perceived benefits, perceived barriers, self-efficacy, perceived health status, health value, cues to action, social influence. The study utilized survey methodology and questionnaires were used to collect responses from individuals that was over 20 years old and came to a large regional hospital in southern Taiwan. Results and Conclusion: Totally, 258 questionnaires were distributed and 221 responses were collected, resulting in a response rate of 86%. The results of discriminant analysis showed that perceived barriers, perceived self-efficacy, and perceived health status significantly predict the use of My health bank. Based on the results, it is inferenced that the possible reason that individuals not applying for My health bank may be due to the requirement of card readers, household numbers of the household registers, computer harware and software. On the other hand, those who have applied for My health bank are in better health. This study suggests that the government should lower the barriers for the application of My health bank by individuals. Futher, the “opt-out system,” proposed by the Australia’ E-health, can also be adopted to reduce these obstacles. Finally, to increase the numbers of application counters for My health bank among hospitals are also suggested.
Saade, Gabriel. "Mobile data in handcuffs : how limited mobile data affect people’s behavior on mobile data usage and megabyte allocation in different locations." Master's thesis, 2020. http://hdl.handle.net/10400.14/31273.
Full textEm tempos modernos com o crescimento da importância do mundo digital, tem havido muitas mudanças no comportamento dos utilizadores de dados móveis. Cada vez mais, os consumidores têm acesso a tarifários de dados móveis ilimitados. Porém, o que aconteceria se o uso de dados viesse a ser limitado? Este estudo analisa as mudanças nos comportamentos dos participantes quando confrontados com limitações no tarifário. Parte das aplicações mais importantes para o consumidor são aplicações dos setores da mobilidade, comunicação, redes sociais e pesquisas de restaurantes. Existem diferentes investigações na área dos dados móveis, mas poucas dos mesmas realçam a importância das mudanças no comportamento e na priorização dos dados. Com o crescimento dos dados móveis, múltiplos negócios têm sido perturbados pela interconectividade dos consumidores e pela diferenciação das redes. Através de dados reais, este estudo mostra como as pessoas priorizam as suas aplicações quando expostas a limitações nos dados móveis. Os resultados da nossa pesquisa mostram-nos que, de facto, certos negócios podem ser afetados pelos dados móveis e pela sondagem de informação sujeita aos mesmos. A exposição à limitação de dados continuou a aumentar esta distorção, visto que os consumidores só usaram as aplicações que consideram mais importantes, a maioria dos quais relacionados com indústrias específicas como o turismo e a gastronomia. O estudo concluí que os consumidores no geral preferem ter velocidades de download de 70.2 megabytes por segundo do que velocidades de upload de 29.8 megabytes.
Yu-FenChen and 陳瑜棻. "Vehicular Proximity Service (V-ProSe) of Sharing the Downloaded Geo-based Landscape Data Using the Credit-based Cluster Scheme for Vehicular Social Network (VSN)." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/n98b28.
Full textCameron-Pesant, Sarah. "La webométrie en sciences sociales et humaines : analyse des données d’usage de la plateforme Érudit." Thèse, 2016. http://hdl.handle.net/1866/19549.
Full textThis study explores the usage of open access (OA) and delayed OA journals in the social sciences and humanities hosted by the journal platform Érudit. Relying on Érudit’s download data, the goals of the study are: 1) to describe the usage of scholarly articles, 2) to examine download patterns of national and international users, and 3) to analyze the effect of OA policies on journal download rates. The study is based on an analysis of 39,437,659 downloads, which were extracted from 999,367,190 HTTP requests stored in Érudit’s log files between 2010 and 2015. The results show that the majority of users came from Quebec, France and other French-speaking countries, and that most users access articles through Google. Download patterns varied between countries: although articles were most frequently accessed during working hours, US users were more active in the evening, at night and during weekends than Canadian and French users. The study also demonstrates a clear OA advantage, as freely available articles were downloaded more frequently than delayed OA articles affected by an embargo, and downloads per article increased substantially after embargos ended. This effect was less pronounced for Canadian users, who often have access to Érudit journals via institutional subscriptions and are thus not affected by the embargo periods. The results show the positive effect of OA on knowledge dissemination in Canada as well as internationally, and emphasize the importance of national journals in the social sciences and humanities.