To see the other types of publications on this topic, follow the link: Internet Resources.

Dissertations / Theses on the topic 'Internet Resources'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet Resources.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Wallace, Rick L. "Internet Resources for Health Professionals." Digital Commons @ East Tennessee State University, 1999. https://dc.etsu.edu/etsu-works/8806.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Колібабчук, Е. І., Л. М. Магас, E. I. Kolibabchuk, and L. M. Mahas. "Hidden resources of the Internet." Thesis, ВНТУ, 2015. http://ir.lib.vntu.edu.ua/handle/123456789/4995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Колібабчук, Е. І., Л. М. Магас, E. I. Kolibabchuk, and L. M. Mahas. "Hidden resources of the Internet." Thesis, Вінницький національний аграрний університет, 2015. http://ir.lib.vntu.edu.ua/handle/123456789/5005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Basyuk, T., and Т. Басюк. "Promotion of Internet resources and environment link." Thesis, ЦНТУ, 2017. http://dspace.kntu.kr.ua/jspui/handle/123456789/7494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Banchs, Roca Albert. "Fair Allocation of Network Resources for Internet Users." Doctoral thesis, Universitat Politècnica de Catalunya, 2002. http://hdl.handle.net/10803/7025.

Full text
Abstract:
In a commercial Internet, the traffic behavior is determined by the contracts between the ISPs and the users, where a user can be a dial-up user, or one corporate network or a group of individual customers or networks. Since the user is the entity with whom the contract is signed, it should also be the unit to which network resources are allocated. However, while much research in the past has been directed to fair resource allocations for flows (e.g. maxmin fairness and proportional fairness), much less effort has been invested on fair allocation of resources for users. The work done in this thesis tries to fill this gap: we study how to share fairly the network resources among users, when a user can possibly send several flows through different paths.

The first part of the thesis focuses on the definition of a fairness criterion for the above problem: user maxmin fairness. The proposed criterion is based on the concepts of utility and welfare developed in the field of political science and political economics. We subdivide the problem of fairly allocating the network resources among users in two subproblems: 1) achieve fairness with respect to the utility experienced by the different users (inter-user fairness) and 2) achieve fairness with respect to the utility experienced by the different flows of a user (intra-user fairness). User maxmin fairness is the result of combining the two welfare functions that solve these two subproblems.

Along with the user maxmin fairness criterion, in this thesis we propose a mechanism to implement it: the User Fair Queuing (UFQ) mechanism. In UFQ, a user is allowed to assign any label values to his packets to indicate their relative priority. At the ingress, an algorithm is used to control these labels assigned by the user. We have shown mathematically that: (a) the proposed label control does not allow the asymptotic throughput of a user to exceed its fair rate, and (b) if users label their packets in order to maximize their level of satisfaction or utility, then the resulting bandwidth allocation is user maxmin fair.

In the last part of the thesis, we propose a network architecture for the Internet: the User Fair Differentiation (UFD) architecture. The UFD architecture extends the UFQ mechanism in such a way that its good features for resource sharing are preserved. In addition, UFD provides service differentiation, inter-domain communication, real-time traffic support and extensions for multicast and wireless. The fact that neither admission control nor signaling are required strongly contributes to the simplicity of UFD. The fact that no per-user state is kept at core nodes makes the proposed architecture scalable.

The performance of the UFD architecture has been extensively evaluated via simulations and a prototype implementation. Both simulation and experimental results have validated the architecture proposed in this thesis.
APA, Harvard, Vancouver, ISO, and other styles
6

Sherwood, Robert. "Discovering and securing shared resources on the internet." College Park, Md.: University of Maryland, 2008. http://hdl.handle.net/1903/8635.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2008.
Thesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
7

Witosurapot, Suntorn, and wsuntorn@fivedots coe psu ac th. "Resolving competition for resources between multimedia and traditional Internet applications." Swinburne University of Technology, 2004. http://adt.lib.swin.edu.au./public/adt-VSWT20050309.123048.

Full text
Abstract:
Although the Internet is the dominant broadband network, it still has a fundamental shortcoming in traffic management that does not properly support efficient use of resources together with differentiated quality of service for mixed traffic types. Even though a number of mechanisms have been proposed under key approaches of resource adaptation, resource reservation, and resource pricing, this problem remains unsolved to date because of its complexity and the way it relates to so many considerations of engineering and economics, and the diverse range of services desired by users. Hence it is considered difficult to devise a perfect mechanism that can universally solve this problem. In this respect, this dissertation contributes to insights into potential combinations and trade-offs of key approaches above in some efficient manner for managing traffic and scarce resources in the Internet. The first part of this work considers the combination of relaxed resource reservation and resource pricing schemes for handling the unfair bandwidth distribution problem in soft-bandwidth guarantee services of the Differentiated Services (DiffServ) Internet. We show that this unfairness problem can be handled using a network-user cooperative approach that addresses both individual user satisfaction and global optimization. We propose to add a mechanism based on price-based feedback signaling to DiffServ-capable routers providing Assured Forwarding (AF) Service so that they can offer per-flow signaling. This still allows them to work at an aggregate traffic level, hence the scalability feature of the DiffServ network can be retained. Our proposed mechanism allows the network to offer reliable service assurances via a distributed optimization algorithm, without introducing special protocols or requiring routers to have access of individual user requirements. Moreover, it can provide incentives for users to cooperate so that optimum performance can be accomplished. This approach has broad applicability and is relevant to all types of assured service classes. The second part of this work considers the combination of a specific resource pricing scheme based on a distributed optimization algorithm and multimedia adaptation schemes. Such a capability has not been available because most utility functions of multimedia applications do not meet the concavity constraints required by optimization algorithm. We proposed to overcome this limitation by redefining user utility functions into equivalent discrete forms and using combinatorial (discrete) optimization so that interfacing the resource-pricing scheme can be done in a normal way. However, to obtain feasible solutions in a scalable manner, an agent is included into the scheme for solving the combinatorial (discrete) optimization on behalf of a small group of users. In return, all users belonging to this group can benefit from social welfare maximization of their utilities over a network resource constraint. The last part of this work considers the combination of relaxed resource reservation and resource pricing schemes to enable a proper charging scheme for adaptive applications in the DiffServ Internet. We provide an optimization formulation of the problems of revenue and social welfare maximization, applied at a service provider (SP) who gives access to the DiffServ Internet. In this scheme, resources are provisioned per QoS-oriented class in a long time scale (service level agreement (SLA) duration), then priced based on user demand in the short time scale. We also show that the proposed charging scheme can provide feedback and incentives for users to use the network resource optimally via the standard packet marking, hence eliminating the need for specific pricing protocol. All of the proposals in this work can be used together, solving these key problems as a coordinated whole, and all use readily available network mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
8

Abedin, Reaz Ashraful. "Autonomous Object Category Learning for Service Robots Using Internet Resources." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128299.

Full text
Abstract:
With the developments in the field of Artificial Intelligence (AI), robots are becoming smarter, more efficient and capable of doing more dififcult tasks than before. Recent progress in Machine Learning has revolutionized the field of AI. Rather than performing pre-programmed tasks, nowadays robots are learning things, and becoming more autonomous along the way. However, in most of the cases, robots need a certain level of human assistance to learn something. To recognize or classify daily objects is a very important skill that a service robot should possess. In this research work, we have implemented a fully autonomous object category learning system for service robots, where the robot uses internet resources to learn object categories. It gets the name of an unknown object by performing reverse image search in the internet search engines, and applying a verification strategy afterwards. Then the robot retrieves a number of images of that object from internet and use those to generate training data for learning classifiers. The implemented system is tested in actual domestic environment. The classification performance is examined against some object categories from a benchmark dataset. The system performed decently with 78:40% average accuracy on ve object categories taken from the benchmark dataset and showed promising results in real domestic scenarios. There are existing research works that deal with object category learning for robots using internet images. But those works use Human-in-the-loop models, where humans assist the robot to get the object name for using it as a search cue to retrieve training images from internet. Our implemented system eliminates the necessity of human assistance by making the task of object name determination automatic. This facilitates the whole process of learning object categories with full autonomy, which is the main contribution of this research.
APA, Harvard, Vancouver, ISO, and other styles
9

Aly, Doaa Abd El Rehim Mohamed. "Assessing the development of voluntary internet financial reporting and disclosure in Egypt." Thesis, University of Hull, 2008. http://hydra.hull.ac.uk/resources/hull:2690.

Full text
Abstract:
Currently the provision of corporate financial information through the internet is a new issue confronting providers and users of financial information in Egypt. It is expected to be important as financial information would be disseminated worldwide and this availability of information could encourage people to invest in any part of the world. Studying internet reporting in Egypt will help in providing on line timely information, thus encouraging investors to invest in Egypt. It will meet stakeholders� demands for greater speed and volume of financial information. Businesses must find better and more effective ways of communicating financial information with these stakeholders. Therefore, there is a need to examine the role played by the internet in communicating financial information in Egypt, in order to find out how that role may be enhanced. The major objectives of the study were to 1) identify the extent of internet corporate financial reporting in the Egyptian companies; 2) identify factors which influence Egyptian listed companies to voluntarily adopt internet-based corporate financial reporting; 3) evaluate the effectiveness of voluntary internet financial reporting and disclosure to selected groups of users; and 4) explore the role of Investor Relations and auditors regarding internet financial reporting and their functions or procedures are affected. Innovation diffusion, institutional change, and economic-based theories were employed to explain the adoption of internet financial reporting in Egypt. To accomplish these objectives, a sequential explanatory triangulation design was employed, employing both quantitative and qualitative data collection and analysis. Quantitative methods were used to achieve the first and second objectives. A disclosure index was constructed to determine the level of voluntary internet financial reporting of the 100 most active listed Egyptian companies for the year ended 2004. Ten hypotheses were formulated to test the relationship between the level of voluntary financial internet disclosure and the company�s characteristics. It was found that 27 companies had no websites, the websites of 9 companies were under construction, 62 companies had websites and 35 companies disclosed their financial information on their websites. The average disclosure rates of financial information were 30% for the Egyptian companies which had websites and 44% for companies having websites and disclosing financial information. 100% of communication companies and 67% of financial services companies disclosed financial information on their websites and all communication companies had disclosure scores over 50%. The results of Univariate analysis revealed that firm size variables (total assets, total sales); leverage variables (Total Debt /Total Assets and Long term Debt/ Total Assets); foreign listing; industry type; and audit firm size are significantly associated with the extent of internet disclosure at least at the 5% level of significance. The results of multiple regressions indicated that profitability, foreign listing and industrial sector (communications and financial services) are important factors affecting the amount and presentation formatting of financial information disclosed on Egyptian companies� websites. Qualitative method was used to accomplish the second, third and fourth objectives. Seventeen interviews were conducted with stakeholders [Investor relations officers, financial analysts & fund managers, audit partners & key managers from Egyptian Stock Exchange]. A framework was developed which includes six main factors affecting companies� disclosure of financial information on the internet, which include companies� characteristics [Size, Foreign listing, Industrial sector (banking and communications sectors), Capital structure (Foreign investors, Governmental ownership, Number of shareholders)], management style, amount of paper-based disclosure, imitation, rules and regulations, and number of analysts covering the company. Investor relations officers should be responsible and decide upon the financial information to be published on companies� websites but this is not the case in Egypt. Auditors have no responsibility regarding internet financial reporting in Egypt. This study makes the following contribution to knowledge: - This study is the first which undertakes an empirical investigation regarding internet financial reporting and disclosure of Egyptian listed companies. - This is the first study to examine the effects of culture, organizational structure and demographic characteristics on the adoption of voluntary internet reporting and disclosure. - One of the significant features in this study is that it employed quantitative and qualitative methods to identify the factors which affect companies� adoption of voluntary internet financial reporting and disclosure in Egypt. - This study will contribute to the understanding of the concept, functions and activities of Investor Relations within companies and this might draw the attention to the importance of Investor Relations and help in the development of Investor Relations in Egypt. This is the first time that the role of Investor Relations has been investigated in Egypt, or indeed any Arab country. - The disclosure index used was modified to be suitable for companies working in the Egyptian environment context. This index could be used by other researchers to investigate internet financial reporting and disclosure for companies working in other Arab countries that are experiencing similar economic changes.
APA, Harvard, Vancouver, ISO, and other styles
10

Taylor, Todd M. "Internet influence on sports information gathering." Virtual Press, 2006. http://liblink.bsu.edu/uhtbin/catkey/1347737.

Full text
Abstract:
The Internet is changing the way people obtain their information, growing at a faster rate than any previous media outlet. Experts fully expect this growth to continue. The power of the Internet as a new media source has led to research concerning its effect on traditional media (newspaper, television, radio, and magazines) for certain tasks. However, research has yet to focus solely on sports information gathering, which has been identified as the number one reason men between eighteen and thirty-four years of age access the Internet. The purpose of this study was to examine where students get their sports information, to determine whether gathering sports information through the Internet leads to a decrease in gathering sports information through traditional media.
Department of Journalism
APA, Harvard, Vancouver, ISO, and other styles
11

Tallant, Meredith L. Molnar Joseph J. "Internet access, practice adoption, and conservation program participation in three Alabama watersheds." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Fall/Theses/TALLANT_MEREDITH_1.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Allen, Patricia Dougherty. "WebQuest investigation to acquire internet usage skills." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2077.

Full text
Abstract:
The purpose of this project was to develop a WebQuesst investigation that would facilitate student Internet usage. A WebQuest investigation is an inquiry-oriented activity in which most or all of the information that learners interact with comes from resources on the Internet.
APA, Harvard, Vancouver, ISO, and other styles
13

Moregård, Haubenwaller Andreas. "Distribution of Tasks to Processing Resources in the Internet of Things." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-238853.

Full text
Abstract:
In the Internet of Things (IoT), many applications focus on gathering data which can then be processed and visualized. However, such computations are usually distributed depending on parameters such as CPU and/or network load. This may mean that a significant amount of data needs to be transported over the network (either directly, or transparently using a network file system) in order for the data to be available to the node that is responsible for processing. In this thesis a method is proposed for deploying computations that can take factors such as data proximity into consideration. Thus, processing can be moved from central high-powered processing nodes to smaller devices on the edge of the network. By doing this, costs for gathering, processing and actuation can be minimized. In order to capture data dependencies among computations, and also to deploy and handle individual processing tasks in an easy way, the actor-model programming paradigm is used. To minimize the overall cost and to handle extra factors that influence the distribution of tasks, a constraint programming approach is used. The combination of these two techniques results in an efficient distribution of tasks to processing resources in IoT. Taking into consideration the NP-hard nature of this problem, we present empirical results that illustrate how this technique performs in relation to the amount of devices/actors.
APA, Harvard, Vancouver, ISO, and other styles
14

Algarni, Abdullah Faze. "Policing Internet fraud in Saudi Arabia : the mediation of risk in a theocratic society." Thesis, University of Hull, 2012. http://hydra.hull.ac.uk/resources/hull:13584.

Full text
Abstract:
This thesis aims to contribute to current debates on the policing of Internet fraud by introducing the Saudi Arabian experience. Drawing on the findings of field research focusing on the capital city of Riyadh, this study assesses the extent to which the Saudi state response to Internet fraud fits in with contemporary debates on cybercrime control within a late-modern penal framework as theorised in Western literature. At the same time, the study provides a detailed micro-sociological account of how the policing of Internet fraud is carried out in different police units within the city in which the case study was conducted. This involves an in-depth investigation into both the organisational and operational dimensions of the Saudi police response to such criminal activity. In this respect, the thesis explores and analyses how this new aspect of policing activity fits in with not only the existing organisational practices, but also the occupational and individual concerns of frontline officers (McCahill, 2002). Moreover, the study considers the implications of the Arab, Islamic and specifically Saudi culture, social norms, values and political environment for police responses to Internet fraud. An interpretive approach was adopted, employing a single case study strategy, which utilised two methods, i.e. participant observation and semi- structured interviews, to collect the required data. The observational data was generated from seven police departments that are directly involved in the policing of Internet fraud in Riyadh. Interviews were conducted with 41 participants, including representatives of both the managerial and operational levels at the units targeted in the observational work, officers from supporting departments and officers with key roles in planning, controlling and supervising the implementation of police policies and strategies in relation to Internet fraud, at both national and local levels. The findings revealed that the only way in which Saudi control strategies in response to cybercrime can be aligned with those followed by Western authorities is in relation to the state’s ‘expressive gestures’ (Garland, 1996, 2001). In this regard, evidence demonstrated that the legal and organisational innovations introduced by the Saudi state, ostensibly to address informational crimes, had serious limitations in achieving their declared purposes and were perceived by police participants as intended only to create and sustain a favourable global image. In contrast, the study failed to find a clear and wide application of plural policing of Internet fraud, which is characterised by networks of calculation through deploying instrumental ordering practices and risk management technologies. In addition to the limited relevance in an autocratic society such as Saudi Arabia of the ideological, socio-economic and political conditions that facilitated the emergence of the notion of plural policing in Western societies, the Saudi police organisation also appeared unready to engage in networked policing of Internet fraud. Moreover, it was shown how the policing response to Internet fraud was shaped by specific moral principles and cultural values. The findings of this thesis emphasise not only the persistent influence of ‘old’ cultural traditions and moral principles on officers’ perception of risk in Internet fraud and, consequently, their decision to respond to incidents brought to their attention, but also how police commitment to these cultural and religious values can place limits on the ability of technological systems to facilitate preventive policing of online fraudulent activities. Based on these findings, it is argued that policing of Internet fraud in Saudi Arabia, and the extent to which it aligns with the principles of crime control in late modernity, can only be understood by examining and analysing how new policing modes and cultural traditions merge and integrate to shape police response to such a novel criminal phenomenon as Internet fraud.
APA, Harvard, Vancouver, ISO, and other styles
15

Al-Qahtani, Mohammed Eid. "An investigation of the internet banking (IB) adoption, use, and success in Saudia Arabia (SA)." Thesis, University of Hull, 2014. http://hydra.hull.ac.uk/resources/hull:10123.

Full text
Abstract:
This thesis attempts to empirically investigate the different factors that have relation with the adoption, use and success (Dependent variables) of Internet Banking (IB). It extended the previous marketing literature and TAM model by investigating different factors that might have relationship with the adoption and use of the IB. In addition to that, and since the success of IB has not been found in the reviewed literature, this study introduces the success variable following the DeLone and McLean (2003) IS success model. This thesis responds to several researchers’ calls by conducting an investigation in Saudi Arabia (SA), where it has special socio-economic motives and social values such as Islamic Banking (IsB). The data of this study were collected through a survey (postal questionnaires), sample (n=1000), which has been conducted randomly using SA’s Residential Telephone Directory. A total of 228 usable questionnaires were returned (22.8% response rate). The data were analysed using descriptive statistics method, and a factor analysis was also used to classify the variables into a set of dimensions. Moreover, multiple regression analysis was performed to test the research hypotheses. As a result, the researches’ models of adoption, use and success have shown high, good and fair prediction powers (R²=62%, 39.4% and 30%, respectively), which are comaparable to other studies in the area. The research findings suggest that awareness, resistance to change, satisfaction, perceived ease of use, self-efficiency, high cost, availability of IsB services online, and income (independent variables) were affecting the IB customers’ adoption, use and success in different degrees. The awareness and self-efficiency of the IB were found to significantly affect the adoption of IB, whereas self-efficiency and satisfaction “convenience” significantly affect the use of IB. However, frequency and wide range of the used IB services, satisfaction “time saving and customers’ needs fulfilment”, income and the availability of IsB services were found to also affect the success of the IB services. Surprisingly, the research findings indicate that security does not contribute significantly to the adoption, use, and success of IB services and that is due to some reasons which is recommended for future studies. It is also essential to highlight that IB customers’ satisfaction was found to be a very significant factor in motivating the new adopters to use the services frequently, which will lead to a successful competitive performance. This thesis concludes with implications for researchers, practitioners, and policy makers in addition to research limitations and recommendations for future studies.
APA, Harvard, Vancouver, ISO, and other styles
16

Alhudaithy, Abdullatif I. R. "The influence of website design features and consumer characteristics on internet banking adoption in Saudi Arabia." Thesis, University of Hull, 2009. http://hydra.hull.ac.uk/resources/hull:7017.

Full text
Abstract:
Recent years have seen rapid growth of Internet technology and its incorporation into many areas, including banking. Despite the potential advantages offered, however, adoption of Internet Banking (IB) has been relatively low. This thesis aims to enhance understanding of customers' adoption of IB, with particular reference to commercial banks in the Kingdom of Saudi Arabia (KSA). It investigates the rationale for and current status of IB in the KSA. Then, taking as a framework the Decomposed Theory of Planned Behaviour (DTPB), with the additional construct of website features, it investigates what factors may influence Saudi customers' adoption of IB, including the potential impact of website features at different stages of the customer's decision-making process (DMP). The research targeted policy makers, IB managers and clients in all 11 commercial banks operating in KSA. Data were collected in two phases, each containing qualitative and quantitative elements. In phase one, focused on the bank perspective, interviews were held with 11 bank officials, to explore the thinking behind their IB provision and website design. Then, content analysis was used to investigate the features of 22 websites – 1 corporate and 1 individual site for each bank. In phase two, semi-structured interviews (N = 40) were used to explore bank clients' perceptions of IB, and their responses used to inform a survey, delivered online and through bank branches, of IB users' (N = 651) and non-users' (N = 409) attitudes and behaviours in relation to IB. Results showed that bank managers attempted to attract and support clients throughout the DMP, and this was reflected in website content. However, support was constrained by some erroneous assumptions about clients, and the regulatory environment. Obstacles to IB use included psychological, marketing, educational, technical, cultural and linguistic barriers. IB non-users' intention to try IB was influenced by Trust and Subjective Norms, while users' intention to continue was influenced by perceived Relative Advantage and Compatibility, Ease of Use, Self-Efficacy, Resource Facilitating Conditions and Website Characteristics. Attitudes to IB also differed by clients' gender, age, income, education and Internet experience. Implications are drawn for technology adoption and e-marketing theory, and recommendations are made to government, the central bank and commercial banks to enhance the functionality and attractiveness of IB.
APA, Harvard, Vancouver, ISO, and other styles
17

Eddleton, Jeannine E. "Chemical demonstrations : a compendium of resources in print and on the Internet /." Thesis, This resource online, 1996. http://scholar.lib.vt.edu/theses/available/etd-11182008-063122/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Xiaoling. "Analysis of internet image search performance." HKBU Institutional Repository, 2011. https://repository.hkbu.edu.hk/etd_ra/1295.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

С, С. Нікіпорець, М. Гадайчук Н, and S. Nykyporets N. M. S. "USE OF INTERNET RESOURSES FOR FOREIGN LANGUAGE LEARNING." Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/24836.

Full text
Abstract:
The article deals with the issues of using internet resources in a modern high technical school.
В статті розглядаються питання релевантного використання інтернет-ресурсів в процесі викладання іноземних мов в технічному виші.
APA, Harvard, Vancouver, ISO, and other styles
20

Lucas, Honey. "Patterns of influence : a qualitative model of users' interactions with World Wide Web medical resources." Thesis, University of Sheffield, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366158.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Saleh, Malik F. "The Construction and Validation of a Resource Cover Page as an Instrument for Cataloging Internet Resources in the Semantic Web." NSUWorks, 2006. http://nsuworks.nova.edu/gscis_etd/818.

Full text
Abstract:
The implementation of the Semantic Web has a problem, namely, that the Semantic Web ignores the different types of already-existing resources in the current implementation of the Web. The semi-structured nature of the Web makes it quite difficult to retrieve information relevant to specific users' needs. As a result, today's Web and the next-generation Semantic Web are not interoperable. The goal of this dissertation was to make the already-existing resources in the current implementation of the Web more meaningful to the Semantic Web without taking-away the openness of the Web. A framework was introduced that created a catalog of Internet resources that allows multi-access points to different resources and allows agents to discover the sought-after knowledge. These lookup fields were implemented in this Internet cataloging framework. This catalog was established to help computer-to-computer communication and information retrieval in general. The framework contributed to research in two ways: First, a prototype was created that can be used as a source for searching on the Internet. Second, the framework implemented the latest technologies of the Semantic Web to create the prototype.
APA, Harvard, Vancouver, ISO, and other styles
22

Rathinasabapathy, G., and L. Rajendran. "Web-based Digital Resources for Small Animal Medicine Professionals." e-Science World, 2009. http://hdl.handle.net/10150/299578.

Full text
Abstract:
The Internet which is also known as ‘Information Superhighway’, ‘Global Information Infrastructure’, ‘Cyberspace’, ‘Hyperspace’ etc., connects millions of computers in a web and makes almost immediate communication possible, irrespective of the location of its users. The Internet provides huge resources that are useful for veterinary and animal science professionals and the amount of accessible veterinary medicine information is increasing rapidly. Ideally, this could provide a formidable opportunity for Veterinarians to exchange and process veterinary medicine information with colleagues around the world from their desktop. Though the Internet offers virtually unlimited amount of information related to small animal medicine and surgery and provides a number of tools to access, it is useful in at least three aspects related to veterinary medicine and surgery viz., communication, education and research. This paper attempts to profile such important digital knowledge resources useful for small animal veterinary medicine professionals.
APA, Harvard, Vancouver, ISO, and other styles
23

Furey, Douglas John. "A learning resources teacher's guide to the production of Internet multimedia curriculum units." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ36122.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Poland, Roger Hugh Carol. "The development and evaluation of Internet based resources for ecological and environmental education." Thesis, University of Exeter, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Huber, Steffen. "Goal-based Workflow Adaptation for Role-based Resources in the Internet of Things." Sächsische Landesbibliothek – Staats - und Universitätsbibliothek Dresden (SLUB), 2017. https://tud.qucosa.de/id/qucosa%3A31630.

Full text
Abstract:
In recent years, the Internet of Things (IoT) has increasingly received attention from the Business Process Management (BPM) community. The integration of sensors and actuators into Process-Aware Information Systems (PAIS) enables the collection of real-time data about physical properties and the direct manipulation of real-world objects. In a broader sense, IoT-aware workflows provide means for context-aware workflow execution involving virtual and physical entities. However, IoT-aware workflow management imposes new requirements on workflow modeling and execution that are outside the scope of current modeling languages and workflow management systems. Things in the IoT may vanish, appear or stay unknown during workflow execution, which renders their allocation as workflow resources infeasible at design time. Besides, capabilities of Things are often intended to be available only in a particular real-world context at runtime, e.g., a service robot inside a smart home should only operate at full speed, if there are no residents in direct proximity. Such contextual restrictions for the dynamic exposure of resource capabilities are not considered by current approaches in IoT resource management that use services for exposing device functionalities. With this work, we aim at providing the modeling and runtime support for defining such restrictions on workflow resources at design time and enabling the dynamic and context-sensitive runtime allocation of Things as workflow resources. To achieve this goal, we propose contributions to the fields of resource management, i.e., resource perspective, and workflow management in the Internet of Things (IoT), divided into the user perspective representing the workflow modeling phase and the workflow perspective representing the runtime resource allocation phase. In the resource perspective, we propose an ontology for the modeling of Things, Roles, capabilities, physical entities, and their context-sensitive interrelations. The concept of Role is used to define non-exclusive subsets of capabilities of Things. A Thing can play a certain Role only under certain contextual restrictions defined by Semantic Web Rule Language (SWRL) rules. At runtime, the existing relations between the individuals of the ontology represent the current state of interactions between the physical and the cyber world. Through the dynamic activation and deactivation of Roles at runtime, the behavior of a Thing can be adapted to the current physical context. In the user perspective, we allow workflow modelers to define the goal of a workflow activity either by using semantic queries or by specifying high-level goals from a Tropos goal model. The goal-based modeling of workflow activities provides the most flexibility regarding the resource allocation as several leaf goals may fulfill the user specified activity goal. Furthermore, the goal model can include additional Quality of Service (QoS) parameters and the positive or negative contribution of goals towards these parameters. The workflow perspective includes the Semantic Access Layer (SAL) middleware to enable the transformation of activity goals into semantic queries as well as their execution on the ontology for role-based Things. The SAL enables the discovery of fitting Things, their allocation as workflow resources, the invocation of referenced IoT services, and the continuous monitoring of the allocated Things as part of the ontology. We show the feasibility and added value of this work in relation to related approaches by evaluation within several application scenarios in a smart home setting. We compare the fulfillment of quantified criteria for IoT-aware workflow management based on requirements extracted from related research. The evaluation shows, that our approach enables an increase in the context-aware modeling of Things as workflow resources, in the query support for workflow resource allocation, and in the modeling support of activities using Things as workflow resources.:1 Introduction 15 1.1 Background 17 1.2 Motivation 17 1.3 Aim and Objective 19 1.3.1 Research Questions and Scope 19 1.3.2 Research Goals 20 1.4 Contribution 20 1.5 Outline 21 2 Background for Workflows in the IoT 23 2.1 Resource Perspective 24 2.1.1 Internet of Things 24 2.1.2 Context and Role Modeling 27 2.2 User Perspective 37 2.2.1 Goal Modeling 38 2.2.2 Tropos Goal Modeling Language 38 2.3 Workflow Perspective 39 2.3.1 Workflow Concepts 39 2.3.2 Workflow Modeling 40 2.3.3 Internet of Things-aware Workflow Management 43 2.4 Summary 44 3 Requirements Analysis and Approach 45 3.1 Requirements 45 3.1.1 IoT Resource Perspective 46 3.1.2 Workflow Resource Perspective 50 3.1.3 Relation to Research Questions 51 3.2 State of the Art Analysis 53 3.2.1 Fulfillment Criteria 54 3.2.2 IoT-aware workflow management 56 3.3 Discussion 65 3.4 Approach 70 3.4.1 Contribution to IoT-aware workflow management 71 3.5 Summary 73 4 Concept for Adaptive Workflow Activities in the IoT 75 4.1 Resource Perspective 75 4.1.1 Role-based Things 75 4.1.2 Semantic Modeling Concepts 79 4.1.3 SWRL Modeling Concepts 81 4.2 User Perspective 81 4.2.1 Semantic Queries in Workflow Activites 81 4.2.2 Goals for Workflow Activites 81 4.2.3 Mapping from Goals to Semantic Queries 82 4.3 Workflow Perspective 83 4.3.1 Workflow metamodel Extensions 83 4.3.2 Middleware for Dynamic Resource Discovery and Allocation 85 4.4 Summary 86 5 Modeling Adaptive Workflow Activities in the IoT 87 5.1 Resource Perspective 87 5.1.1 Role-based Modeling of Context-sensitive Things 87 5.1.2 Ontology Classes 90 5.1.3 Ontology Object properties 93 5.1.4 Ontology Data properties 99 5.1.5 DL-safe SWRL Rules 100 5.2 Discussion of Role Modeling Features 101 5.3 Example Application Scenario Modeling 102 5.3.1 Resource Perspective 102 5.3.2 User Perspective 105 5.3.3 Workflow Perspective 109 5.4 Summary 113 6 Architecture for Adaptive Workflow Activities in the IoT 115 6.1 Overview of the System Architecture 115 6.2 Specification of System Components 117 6.2.1 Resource Perspective 118 6.2.2 User Perspective 118 6.2.3 Workflow Perspective 118 6.3 Summary 123 7 Implementation of Adaptive Workflow Activities in the IoT 125 7.1 Resource Perspective 125 7.2 Workflow Perspective 125 7.2.1 PROtEUS 125 7.2.2 Semantic Access Layer 127 7.3 User Perspective 128 7.4 Summary 128 8 Evaluation 129 8.1 Goal and Evaluation Approach 129 8.1.1 Definition of Test Cases 130 8.2 Scenario Evaluation 134 8.2.1 Ambient Assisted Living Setting 135 8.2.2 Resource Perspective 135 8.2.3 User Perspective 137 8.2.4 Workflow Perspective 138 8.2.5 Execution of Test Cases 139 8.2.6 Discussion of Results 146 8.3 Performance Evaluation 148 8.3.1 Experimental Setup 148 8.3.2 Discussion of Results 151 8.4 Summary 152 9 Discussion 153 9.1 Comparison of Solution to Research Questions 153 9.2 Extendability of the Solutions 155 9.3 Limitations 156 10 Summary and Future Work 157 10.1 Summary of the Thesis 157 10.2 Future Work 159 Appendix 161 Example Semantic Context Model for IoT-Things 171 T-Box of Ontology for Role-based Things in the IoT 178 A-Box for Example Scenario Model 201 A-Box for Extended Example Scenario Model 210
APA, Harvard, Vancouver, ISO, and other styles
26

Song, Haitao. "Information management in the travel industry: The role and impact of the Internet." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=init_6662_1178282746.

Full text
Abstract:

In this information age, the Internet has found a role in various industries such as transportation, advertising, etc. The travel industry, in which communication between travellers and travel service providers is a very important component, has as much potential as any other industry to make full use of this new medium. Already, most travel agencies and travel service providers promote their products and services using web sites. Searching for information online is now seen by many people as a way to save time and cost, especially in their travel activities. In order to fully deploy the Internet within the travel industry, understanding the use of the Internet in tourism is critical. This research sets out initially to examine the role and the impact of the Internet in the whole of the travel industry. But in order to define an achievable scope of work and because of its importance in South Africa at this time, tourism within the travel industry was chosen as the focus of the work.

APA, Harvard, Vancouver, ISO, and other styles
27

Sukontapatipak, Songkwun. "International students' reliance on home-country related internet use." CSUSB ScholarWorks, 2005. https://scholarworks.lib.csusb.edu/etd-project/2899.

Full text
Abstract:
The present study draws on uses and gratifications and media system dependency perspectives for examining factors related to Internet usage behaviors of international students and their motives to use their home-country Internet resources.
APA, Harvard, Vancouver, ISO, and other styles
28

Krüger, Janine. "Valuation of internet-based businesses." Thesis, Nelson Mandela Metropolitan University, 2013. http://hdl.handle.net/10948/d1008187.

Full text
Abstract:
This study investigates the valuation of Internet-based businesses. In particular the influence of the implementation of an e-business strategy on the value of a business by focussing on its financial performance, will be determined. Although the valuation of businesses in general has been researched extensively, research on the valuation of Internet-based businesses produced contradictory findings. No consensus could be reached regarding the most appropriate valuation approach to be used. Some research findings indicated that the discounted cash flow approach was the most appropriate while others stipulated that a new valuation approach should be developed. Many authors state that the move to include an e-business strategy is natural, and that businesses cannot afford not to include some form of e-business strategy. Previous research has also shown that by including an e-business strategy, it is possible to improve efficiency of the business and ultimately increase profitability. However, there was no emphasis on how the e-business strategy will influence the business valuation. In order to establish whether an e-business strategy will create value for a business, an empirical investigation was undertaken.
APA, Harvard, Vancouver, ISO, and other styles
29

Medvedieva, Svitlana, and С. О. Медведєва. "Studying English via the Internet." Thesis, Рівненський державний гуманітарний університет, 2013. http://ir.lib.vntu.edu.ua//handle/123456789/24470.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Akram, Gazala. "Information provision in ADHD : evaluation of internet resources and the needs of school teachers." Thesis, University of Strathclyde, 2010. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=14344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Wenrich, John Richard. "Content Management on the Internet: A look at K-12 schools access to resources." Diss., Virginia Tech, 1998. http://hdl.handle.net/10919/30755.

Full text
Abstract:
The Internet presents a new phenomenon to educators and students in the K-12 environment. It's ease of use and ready access to material provides an overwhelming resource for use in the K-12 classroom. This study looked at content management of Internet resources in the K-12 school environment. Content management is defined as the methods of organizing access to the information available on the Internet allowing the teacher to effectively use resources in a classroom setting. Teachers have managed the material, or content, that they present to students for over a decade. Now that resources available on the Internet are also open to K-12 students, teachers must be aware of the need to manage Internet content, just as they would do for any other content being used in their classroom. This study looked at middle school students in 6th and 7th grades. An experimental design was used to determine if K-12 access to Internet resources provides a higher degree of results when students are presented with managed resources, or when students have open access to Internet resources. Analysis of the results of the study show that there is a significant difference in both the amount and the quality of material that was identified by the group with managed access to Internet content.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
32

Ascenuik, Catrina. "Exploration of Newcomers’ Access to Internet Literacy." Thesis, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20498.

Full text
Abstract:
The purpose of this study was two fold: (1) to examine how the distribution of resources within and outside an Enhanced Language Training Program (ELT) affected a group of newcomers’ access to Internet literacy development; and (2) to discuss ensuing pedagogical and curricular implications for the ELT Program. The relationship between the distribution of resources and a group of newcomers’ access to Internet literacy development was studied through a hybrid of two frameworks: van Dijk’s (2005) digital divide and Warschauer’s (2004) social inclusion. The key findings were that the distribution of resources affected access four ways: (1) resources affected multiple types of access, (2) the effect of resource distribution on access was both cumulative and successive, (3) distribution of resources could either facilitate or impede access, and (4) Internet literacy development could potentially increase or decrease the resources. The findings resulted in implications for the ELT program and teaching.
APA, Harvard, Vancouver, ISO, and other styles
33

Howard, Robert Glenn. "Passages divinely lit : revelatory vernacular rhetoric on the Internet." Thesis, view abstract or download file of text, 2001. http://wwwlib.umi.com/cr/uoregon/fullcit?p3024516.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2001.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 270-299). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
34

Jonarv, Hultgren Susanne, and Philip Tennevall. "Saving resources through smart farming : An IoT experiment study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17968.

Full text
Abstract:
Context: Smart farming, agritech, is growing in popularity and is starting to develop rapidly with some already existing technology that is implemented in agriculture for both industrial and private use. Objectives: The goal of this thesis is to investigate the benefits and issues with implementing technology in agriculture, agritech. In this thesis the investigation and research is performed by conduction a literature study and an experiment. Realization: A prototype was created to monitor the soil moisture level and calculating the average soil moisture value, then water the plants when needed. This was then compared to a manually watered pot to investigate if agritech could reduce the water usage when maintaining plants. Results: The result of the experiment indicates that it is possible to improve the use of resources such as human labor, time spent on maintaining the plants and water usage. Conclusions: The conclusion of this thesis is with the help of agritech, human workers can spend more time on other tasks and maintain the technology implemented. Instead of observing the plants to see if they need watering and watering them manually. Water usage may also be minimized with the help of sensors that make sure the plants only get watered when needed by constantly checking the soil moisture level.
APA, Harvard, Vancouver, ISO, and other styles
35

Abdelghani, Wafa. "A multi-dimensional trust-model for dynamic, scalable and resources-efficient trust-management in social internet of things." Thesis, Toulouse 3, 2020. http://www.theses.fr/2020TOU30231.

Full text
Abstract:
L'internet des Objets (IoT) est un paradigme qui a rendu les objets du quotidien, intelligents en leur offrant la possibilité de se connecter à Internet, de communiquer et d'interagir. L'intégration de la composante sociale dans l'IoT a donné naissance à l'Internet des Objets Social (SIoT), qui a permis de surmonter diverse problématiques telles que l'interopérabilité et la découverte de ressources. Dans ce type d'environnement, les participants rivalisent afin d'offrir une variété de services attrayants. Certains d'entre eux ont recours à des comportements malveillants afin de propager des services de mauvaise qualité. Ils lancent des attaques, dites de confiance, et brisent les fonctionnalités de base du système. Plusieurs travaux de la littérature ont abordé ce problème et ont proposé différents modèles de confiance. La majorité d'entre eux ont tenté de réappliquer des modèles de confiance conçus pour les réseaux sociaux ou les réseaux pair-à-pair. Malgré les similitudes entre ces types de réseaux, les réseaux SIoT présentent des particularités spécifiques. Dans les SIoT, nous avons différents types d'entités qui collaborent, à savoir des humains, des dispositifs et des services. Les dispositifs peuvent présenter des capacités de calcul et de stockage très limitées et leur nombre peut atteindre des millions. Le réseau qui en résulte est complexe et très dynamique et les répercussions des attaques de confiance peuvent être plus importantes. Nous proposons un nouveau modèle de confiance, multidimensionnel, dynamique et scalable, spécifiquement conçu pour les environnements SIoT. Nous proposons, en premier lieu, des facteurs permettant de décrire le comportement des trois types de nœuds impliqués dans les réseaux SIoT et de quantifier le degré de confiance selon les trois dimensions de confiance résultantes. Nous proposons, ensuite, une méthode d'agrégation basée sur l'apprentissage automatique et l'apprentissage profond qui permet d'une part d'agréger les facteurs proposés pour obtenir un score de confiance permettant de classer les nœuds, mais aussi de détecter les types d'attaques de confiance et de les contrer. Nous proposons, ensuite, une méthode de propagation hybride qui permet de diffuser les valeurs de confiance dans le réseau, tout en remédiant aux inconvénients des méthodes centralisée et distribuée. Cette méthode permet d'une part d'assurer la scalabilité et le dynamisme et d'autre part, de minimiser la consommation des ressources. Les expérimentations appliquées sur des de données synthétiques nous ont permis de valider le modèle proposé
The Internet of Things (IoT) is a paradigm that has made everyday objects intelligent by giving them the ability to connect to the Internet, communicate and interact. The integration of the social component in the IoT has given rise to the Social Internet of Things (SIoT), which has overcome various issues such as interoperability, navigability and resource/service discovery. In this type of environment, participants compete to offer a variety of attractive services. Some of them resort to malicious behavior to propagate poor quality services. They launch so-called Trust-Attacks (TA) and break the basic functionality of the system. Several works in the literature have addressed this problem and have proposed different trust-models. Most of them have attempted to adapt and reapply trust models designed for traditional social networks or peer-to-peer networks. Despite the similarities between these types of networks, SIoT ones have specific particularities. In SIoT, there are different types of entities that collaborate: humans, devices, and services. Devices can have very limited computing and storage capacities, and their number can be as high as a few million. The resulting network is complex and highly dynamic, and the impact of Trust-Attacks can be more compromising. In this work, we propose a Multidimensional, Dynamic, Resources-efficient and Scalable trust-model that is specifically designed for SIoT environments. We, first, propose features to describe the behavior of the three types of nodes involved in SIoT networks and to quantify the degree of trust according to the three resulting Trust-Dimensions. We propose, secondly, an aggregation method based on Supervised Machine-Learning and Deep Learning that allows, on the one hand, to aggregate the proposed features to obtain a trust score allowing to rank the nodes, but also to detect the different types of Trust-Attacks and to counter them. We then propose a hybrid propagation method that allows spreading trust values in the network, while overcoming the drawbacks of centralized and distributed methods. The proposed method ensures scalability and dynamism on the one hand, and minimizes resource consumption (computing and storage), on the other. Experiments applied to synthetic data have enabled us to validate the resilience and performance of the proposed model
APA, Harvard, Vancouver, ISO, and other styles
36

Hau, Jeffrey. "Numerical methods for the efficient and scalable discovery of semantically-described resources on the internet." Thesis, Imperial College London, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.582553.

Full text
Abstract:
With the advance of the Semantic Web, both the Web and Grid communities have embraced the concept of enriching distributed resources with machine-understandable semantic metadata. Semantic resource discovery is one of the emerging research areas that leverages resource metadata to reason about compatibility and functionality. Resource compatibility can be derived by reasoning about their types and relations. The OWL language semantics provides a formal model for description logic reasoning. However, under many usage scenarios the logical inference approach is often too restrictive. Many similar resources that are potentially useful are eliminated in the matching process, due to their logical non equivalence. In this thesis we propose two efficient numerical methods for calculating the similarity of OWL-described resources. By viewing OWL descriptions as RDF graphs, we base our first similarity measure on the graph edit distance technique developed for inexact graph matching. The similarity of two graphs is derived from the total cost of the edit operations. The second method transform semantic descriptions into distance constraints based on their relational structures. By deriving resource coordinates from the distance constraints, the distances between resources become a natural similarity measure. Numerical similarity measure provides a useful lightweight method to exploit the available semantic metadata. As increasing number of resources becomes publicly available on the Internet, the computationally intensive process of logical reasoning often cannot be used to achieve a satisfactory result within a reasonable timeframe. We demonstrate the use of the similarity measures as an alternative and potentially complimentary technique to the logical reasoning method.
APA, Harvard, Vancouver, ISO, and other styles
37

Wu, Jun-deh. "Repression, Civic Engagement, Internet Use, and Dissident Collective Action: the Interaction Between Motives and Resources." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc115186/.

Full text
Abstract:
This dissertation investigates three questions: First, what conditions make dissident collective action such as protest, revolt, rebellion, or civil war more likely to happen in a country? Second, what conditions make citizens more likely to join in dissident collective action? Third, does Internet use play a role in dissident collective action, and if so, why? I argue that motives and resources are necessary rather than sufficient conditions for dissident collective action. I develop an analytical framework integrating motives and resources. Specifically, I theorize that state repression is an important motive, and that civil society is critical in providing resources. Four statistical analyses are conducted to test the hypotheses. Using aggregate level data on countries over time, I find that civil war is more likely to occur in countries where both state repression and civil society are strong. Moreover, the effect of civil society on civil war onset increases as the repression level rises. at the individual level using 2008 Latin American Public Opinion Project surveys from 23 Latin American and Caribbean countries, I find individuals more likely to join in protest when they experience both more repression and greater civic engagement. Moreover, civic engagement’s effect on protest participation increases as people experience more repression. I further find that Internet use constitutes a kind of civic engagement and has effects similar to voluntary group involvement. the effect of Internet use on protest participation decreases as a person’s civic engagement increases. Finally, an individual is more likely to join in protest when experiencing more repression and using the Internet more frequently. Moreover, the effect of Internet use on protest participation increases as a person experiences more repression.
APA, Harvard, Vancouver, ISO, and other styles
38

Васильєв, Володимир Іванович, Владимир Иванович Васильев, and Volodymyr Ivanovych Vasyliev. "Використання програмних засобів та інтернет ресурсів в самостійній роботі студентів." Thesis, Видавництво СумДУ, 2004. http://essuir.sumdu.edu.ua/handle/123456789/23691.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Кутова, О. В., and М. В. Шевельов. "Повышение эффективности хозяйственной деятельности торгового предприятия с помощью интеренет-ресурсов." Thesis, Видавництво СумДУ, 2010. http://essuir.sumdu.edu.ua/handle/123456789/4605.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Ілляшенко, Сергій Миколайович, Сергей Николаевич Ильяшенко, and Serhii Mykolaiovych Illiashenko. "Застосування інтернет-ресурсів у підготовці фахівців з УІД." Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/29476.

Full text
Abstract:
Підготовка фахівців, які дозволять реалізувати відносні конкурентні переваги держави і окремих підприємств та установ, зайняти гідне місце на світовому ринку, зокрема, проводиться за магістерською програмою "Управління інноваційною діяльністю" ("УІД"). При цитуванні документа, використовуйте посилання http://essuir.sumdu.edu.ua/handle/123456789/29476
APA, Harvard, Vancouver, ISO, and other styles
41

Richter, John Peter Frank. "An investigation into the design and implementation of an internet-scale network simulator." Thesis, Rhodes University, 2009. http://hdl.handle.net/10962/d1004840.

Full text
Abstract:
Simulation is a complex task with many research applications - chiey as a research tool, to test and evaluate hypothetical scenarios. Though many simulations execute similar operations and utilise similar data, there are few simulation frameworks or toolkits that allow researchers to rapidly develop their concepts. Those that are available to researchers are limited in scope, or use old technology that is no longer useful to modern researchers. As a result of this, many researchers build their own simulations without a framework, wasting time and resources on a system that could already cater for the majority of their simulation's requirements. In this work, a system is proposed for the creation of a scalable, dynamic-resolution network simulation framework that provides scalable scope for researchers, using modern technologies and languages. This framework should allow researchers to rapidly develop a broad range of semantically-rich simulations, without the necessity of superor grid-computers or clusters. Design and implementation are discussed and alternative network simulations are compared to the proposed framework. A series of simulations, focusing on malware, is run on an implementation of this framework, and the results are compared to expectations for the outcomes of those simulations. In conclusion, a critical review of the simulator is made, considering any extensions or shortcomings that need to be addressed.
APA, Harvard, Vancouver, ISO, and other styles
42

Asher, James Wayne. "Integration of the Internet in career exploration in education." CSUSB ScholarWorks, 2001. https://scholarworks.lib.csusb.edu/etd-project/1919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Kwok, Ki-wa Joyce. "Hong Kong international telecommunications : strategic issues /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1883727X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Pleis, Letitia Meier. "Investment decisions: Influence of an Internet stock message board." Thesis, University of North Texas, 2007. https://digital.library.unt.edu/ark:/67531/metadc5130/.

Full text
Abstract:
The Internet provides many sources of financial information that investors can use to help with investment decisions and in interpreting companies' accounting information. One source of information is Internet stock message boards such as those at Yahoo! Finance. This source allows for anonymous postings and information exchange. Despite the possibility of the information being incorrect many individuals visit these message boards. The purpose of this study is to investigate Internet stock message boards and address the primary question: From an individual investor perspective, do message boards, which contain accounting information, influence investment decisions? The question is addressed using psychology rumor literature and attitude theories. Message board postings are a type of rumor, since not all the information is verified and is usually intended to persuade a belief or influence a decision. Further, the messages may influence an investor by causing a change in attitude about the investment. Using an experiment, message board influence on an investment decision and attitude was tested. The results indicated that individuals that received negative message board postings did have a significantly higher change in investment amount as compared to a control group that did not receive any message postings. The positive message board group and the control group were not significantly different in their amount of investment change. The results of the study also show that message board postings influenced attitude, those that received negative (positive) postings had a negative (positive) attitude about the investment. It was further found that those with a negative (positive) attitude decreased (increased) their investment. Finally, contrary to expectations, investment experience did not lead to an individual being less influenced by message board postings. This study contributes to the accounting literature by investigating an additional source of Internet financial reporting that may or may not contain correct information. The SEC is concerned over the manipulative opportunities that are available within these message boards and many investors are exploring these new sources of information instead of relying on traditional accounting information. This study finds that negative postings have an influence on investment decision and possibly should be investigated as manipulative techniques.
APA, Harvard, Vancouver, ISO, and other styles
45

Yang, Weilai. "Pricing Network Resources for Differentiated Service Networks." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5227.

Full text
Abstract:
We developed a price-based resource allocation scheme for Differentiated Service (DiffServ) data networks. The DiffServ framework was proposed to provide multiple QoS classes over IP networks. Since the provider supports multiple service classes, we need a differentiated pricing scheme, as supposed to the flat-rate scheme employed by the Internet service providers of today. Charging efficiently is a big issue. The utility of a client correlates to the amount of bandwidth allocated. One difficulty we face is that determining the appropriate amount of bandwidth to provision and allocate is problematic due to different time scales, multiple QoS classes and the unpredictable nature of users. To approach this problem, we designed a pricing strategy for Admission Control and bandwidth assignment. Despite the variety of existing pricing strategies, the common theme is that the appropriate pricing policy rewards users for behaving in ways to improve the overall utilization and performance of the network. Among existing schemes, we chose auction because it is scalable, and efficiently and fairly shares resources. Our pricing model takes the system's availability and each customer's requirements as inputs and outputs the set of clients who are admitted into the network and their allocated resource. Each client proposes a desired bandwidth and a price that they are willing to pay for it. The service provider collects this information and produces parameters for each class of service they provide. This information is used to decide which customers to admit. We proposed an optimal solution to the problem of maximizing the provider's revenue for the special case where there is only one bottleneck link in the network. Then for the generalized network, we resort to a simple but effective heuristic method. We validate both the optimal solution and the heuristic algorithm with simulations driven by a real traffic scenario. Finally, we allow customers to bid on the duration for which the service is needed. Then we study the performance of those heuristic algorithms in this new setting and propose possible improvements.
APA, Harvard, Vancouver, ISO, and other styles
46

Glavas, Charmaine R. "An examination of the critical resources and internet capabilities for leveraging global performance in international entrepreneurial firms." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/69112/1/Charmaine_Glavas_Thesis.pdf.

Full text
Abstract:
This PhD research investigates the critical resources and Internet capabilities utilized by firms for leveraging global performance in entrepreneurial firms. Firm resources have been identified as important firm assets, which contribute to the firm's competitive global position. The Internet is a critical resource for a new generation of small and medium sized enterprise (SME) in pursuing international opportunities. By facilitating international business, the Internet has the ability to increase the quality and speed of communications, lower transaction costs, and facilitate the development of networks. Despite the increasing numbers of firms utilizing the Internet to pursue international opportunities, limited research remains. Adopting multiple case study methodology and structural equation modelling, the research identified the firm-level resources, which coincide with capabilities in a model predicting how international performance in firms is achieved.
APA, Harvard, Vancouver, ISO, and other styles
47

Stewart, Anna Rose. "Gender, faith, and storytelling : an ethnography of the charismatic Internet." Thesis, University of Sussex, 2013. http://sro.sussex.ac.uk/id/eprint/45226/.

Full text
Abstract:
Although early predictions that an emerging 'cyberspace' could exist in separation from offline life have been largely discarded, anthropological studies of the internet have continued to find notions of 'virtual reality' relevant as individuals use these technologies to fulfil the "pledges they have already made" (Boellstorff, 2008; Miller & Slater, 2001: 19) about their own selfhood and their place in the world. There are parallels between this concept of 'virtual reality' and the on-going spiritual labour of Charismatic Christians in the UK, who seek in the context of a secularising nation to maintain a sense of presence in the “coming Kingdom” of God. The everyday production of this expanded spiritual context depends to a large extend on verbal genres that are highly gendered. For women, declarations of faith are often tied to domestic settings, personal narratives, and the unspoken testimony of daily life (e.g. Lawless, 1988; Griffith, 1997). The technologies of the internet, whose emerging genres challenge boundaries between personal and social, public and private, can cast a greater illumination on this inward-focused labour. This doctoral thesis is based on ethnographic research in four Charismatic Evangelical congregations and examination of the online practices of churchgoers. I have found that the use of the internet by Charismatic Christian women fits with wider religious preoccupations and patterns of ritual practice. Words posted through Facebook, blogs, Twitter, and other online platforms come to resemble in their form as well as their content Christian narratives of a life with meaning.
APA, Harvard, Vancouver, ISO, and other styles
48

Chen, Xi. "Internet Resources on Chinese Studies in East Asian Libraries of US, an Analysis of Links, Content and Organization." Thesis, School of Information and Library Science, 2006. http://hdl.handle.net/1901/313.

Full text
Abstract:
This paper aims to explore the current status of Internet Resources on Chinese studies among East Asian Libraries in the US. The author examined Internet Resources on Chinese Studies at the websites of 35 libraries by collecting data on the number of unique links, the kinds of websites included, the arrangement and classification of resources, the content and commonalities of the most frequently cited websites. Lists of link popularity are also complied to illustrate the current status of Internet Resources on Chinese Studies. Finally, a number of recommendations are proposed for further research.
APA, Harvard, Vancouver, ISO, and other styles
49

Sing, Min Yvonne Monica. "The development of a model for organising educational resources on an Intranet." Thesis, Port Elizabeth Technikon, 2003. http://hdl.handle.net/10948/221.

Full text
Abstract:
The twenty-first century has found education at the crossroads of change. There are burgeoning challenges facing the modern educator. To rise to the importuning, educators find themselves turning to Information Technology for the answers. The technologies utilised in attempts to overcome the challenges often include the Internet and electronic educational resources. Although the Internet is not unduly called the Information Highway, it is also fraught with misleading and incorrect information. Educators’ arduous searches result in few good and useable resources. Thus, to store, organise and efficiently retrieve the discovered resources is a matter of time-saving. The aim of the study was to develop a method to organise and retrieve educational resources in an efficient and personalised manner. In order to do this, an exploration into pedagogy and educational paradigms was undertaken. The current educational paradigm, constructivism, proposes that each learner is an individual with unique learning and personal needs. To develop a new model, the current models need to be understood. The current solutions for the organising of educational resources are realised as several software packages, also called e-learning packages. A list of criteria that describes the essential requirements for organising educational resources was established. These criteria were based upon the pedagogical principles prescribed by educators and the practical technological frameworks necessary to fulfil the needs of the teaching/learning situation. These criteria were utilised to critique and explore the available solutions. It was found that although the available e-learning packages fulfil a need within their genre, it does not meet with the core requirements of constructivism. The resource base model seeks to address these needs by focussing on the educational aspects of resource delivery over an Intranet. For the purposes of storing, organising and delivering the resources, a database had to be established. This database had to have numerous qualities, including the ability to search and retrieve resources with great efficiency. Retrieving data in an efficient manner is the forte of the star schema, while the storing and organising of data is the strength of a normalised schema. It is not standard practice to utilise both types of schemas within the same database. A star schema is usually reserved for data warehouses because of its data retrieval abilities. It is customary to utilise a normalised schema for operational databases. The resource base model, however, needs both the storage facilities of an operational database and the efficient query facilities of a data warehouse. The resource base model, therefore, melds both schemas into one database with interlinking tables. This database forms the foundation (or the back-end) of the resource base. The resource base model utilises web browsers as its user interface (or front-end). The results of the study on the pedagogy, the current e-learning solutions and the resource base were written up within this dissertation. The contribution that this dissertation makes is the development of a technique to efficiently store, organise and retrieve educational resources in such a manner that both the requirements of constructivism and outcomes-based education are fulfilled. To this end, a list of technological and pedagogical criteria on which to critique a resource delivery technique has been developed. This dissertation also elaborates on the schema designs chosen for the resource base, namely the normalised schema and the star schema. From this schema, a prototype has been developed. The prototype’s function was two-fold. The first function is to determine the feasibility of the technique. Secondly, to determine the success of the technique in fulfilling the needs expressed in the list of criteria
APA, Harvard, Vancouver, ISO, and other styles
50

Nalder, Glenda Lyle. "Realising the virtual : the Internet as a space for transformatory art practice." Thesis, Queensland University of Technology, 2002.

Find full text
Abstract:
The use of computer-networked storage and telecommunication dissemination modes has intensified the tele-visual effects of electronic media to those of globally-networked tele-matics (communicating and 'databanking' at a distance), associated with the trans-national information economy. In parallel with this transition, artists seeking positive social change have shifted orientation from 'work' to 'media', evolving a new genre of Internet-based New Media Arts practice known as 'netArt' - a form of critical engagement in the mode of information. However, any argument for the transformatory potential of this new art form is contingent upon a new conceptualisation of cultural agency: one that is able to overcome the limitations of postmodern theory, and to deal with the social complexity arising from the shift in concentration of relations of power from the level of the nation-state to the 'global' order.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography