Spelling suggestions: "subject:"[een] BROKER"" "subject:"[enn] BROKER""
121 |
Network protocol for distribution and handling of data from JAS 39 Gripen / Nätverksprotokoll för distribuering och hantering av data från JAS 39 GripenKarlsson, Jonathan January 2015 (has links)
On board the aircraft JAS 39 Gripen a measuring system, Data Acquisition System (DAS), is sending sensor data to a server on the ground. In this master thesis, a unified API for distribution and handling of the sensor data is designed and implemented. The work has been carried out at Saab Aeronautics, Linköping during, 2014. During flights with the aircraft the engineers at Saab need to monitor different sensors in the aircraft, including the exact commands of the pilots. All that data is serialized and sent via radio link to a server at Saab. The current data distribution solution includes several clients that need to connect to the server. Each client has its own connection protocol, making the system complex and difficult to maintain. An API is needed in order to make the clients connect in a unified manner. This would also enable future clients to implement the API and start receiving sensor data from the server. The research conducted in the thesis project was centered on the different choices that exist for designing such an API. The question that needed answering was; how can an existing complex system can be replaced by a publish-subscribe system and what the benefits would be in terms of latency and flexibility of the system? The design would have to be flexible enough to support multiple clients. The investigated research question was answered with a design utilizing ZMQ, pthreads and a design pattern. The result is a flexible system that was sufficiently fast for the requirements set at Saab and open to future extensions. The thesis work also included designing a unified API with requirements on latency and functionality. The resulting API was designed using the publish-subscribe design pattern, the network library Zero Message Queue (ZMQ) and the threading library pthreads. The resulting system supports multiple coexisting servers and clients that request sensor data. A new feature is that the clients can start sending calculations performed on samples to other clients. To demonstrate that the solution provides a unified framework, two existing clients and the server were developed with the proposed API. To test the latency requirements, tests were performed in the control room at Saab.
|
122 |
Evaluation and Implementation of Machine Learning Methods for an Optimized Web Service Selection in a Future Service MarketKarg, Philipp January 2014 (has links)
In future service markets a selection of functionally equal services is omnipresent. The evolving challenge, finding the best-fit service, requires a distinction between the non-functional service characteristics (e.g., response time, price, availability). Service providers commonly capture those quality characteristics in so-called Service Level Agreements (SLAs). However, a service selection based on SLAs is inadequate, because the static SLAs generally do not consider the dynamic service behaviors and quality changes in a service-oriented environment. Furthermore, the profit-oriented service providers tend to embellish their SLAs by flexibly handling their correctness. Within the SOC (Service Oriented Computing) research project of the Karlsruhe University of Applied Sciences and the Linnaeus University of Sweden, a service broker framework for an optimized web service selection is introduced. Instead of relying on the providers’ quality assertions, a distributed knowledge is developed by automatically monitoring and measuring the service quality during each service consumption. The broker aims at optimizing the service selection based on the past real service performances and the defined quality preferences of a unique consumer.This thesis work concerns the design, implementation and evaluation of appropriate machine learning methods with focus on the broker’s best-fit web service selection. Within the time-critical service optimization the performance and scalability of the broker’s machine learning plays an important role. Therefore, high- performance algorithms for predicting the future non-functional service characteristics within a continuous machine learning process were implemented. The introduced so-called foreground-/background-model enables to separate the real-time request for a best-fit service selection from the time-consuming machine learning. The best-fit services for certain consumer call contexts (e.g., call location and time, quality preferences) are continuously pre-determined within the asynchronous background-model. Through this any performance issues within the critical path from the service request up to the best-fit service recommendation are eliminated. For evaluating the implemented best-fit service selection a sophisticated test data scenario with real-world characteristics was created showing services with different volatile performances, cyclic performance behaviors and performance changes in the course of time. Besides the significantly improved performance, the new implementation achieved an overall high selection accuracy. It was possible to determine in 70% of all service optimizations the actual best-fit service and in 94% of all service optimizations the actual two best-fit services.
|
123 |
Interoperability and Negotiation of Security Policies / Interopérabilité et négociation des politiques de sécuritéLi, Yanhuang 24 November 2016 (has links)
Suite au développement des technologies de l'information, et en particulier au déploiement d'infrastructures telles que le Cloud Computing, de plus en plus d'applications et plateformes coopèrent en échangeant des données et des services. Cette tendance renforce l'importance de la gestion de la sécurité. Afin d'assurer la sécurité des données et de l'interaction de service une politique de sécurité doit être appliquée. Dans cette thèse, nous nous intéressons aux politiques de contrôle d'accès. Ce type de politique spécifie les privilèges de l'utilisation des ressources et est implémentée par différents modèles selon différents scénarios. Notre objectif ici est d'aider le client du service à bien exprimer ses exigences de sécurité et à choisir les fournisseurs de services qui peuvent la déployer. La première partie de cette thèse est dédiée à la sélection des fournisseurs de service. Dans le cas où les politiques de sécurité du fournisseur sont accessibles au client, nous proposons une méthode pour mesurer la similarité entre les politiques de sécurité. Dans le cas où les politiques de sécurité ne sont pas accessibles au client ou ne sont pas explicitement spécifiées, nous proposons un cadre à base de règles permettant la dérivation à partir des exigences de sécurité aux politiques de sécurité concrètes. La seconde partie de la thèse porte sur la négociation de politiques de sécurité. Nous étudions le processus permettant aux parties en négociation de parvenir à un accord par une série d'échanges d'offres et de contre-offres. Lorsque le résultat de la négociation est positif, un contrat incluant la politique de sécurité acceptée par les parties est généré. / Security policy provides a way to define the constraints on behavior of the members belonging to a system, organization or other entities. With the development of IT technology such as Grid Computing and Cloud Computing, more and more applications and platforms exchange their data and services for cooperating. Toward this trend, security becomes an important issue and security policy has to be applied in order to ensure the safety of data and service interaction. In this thesis, we deal with one type of security policy: access control policy. Access control policy protects the privileges of resource's utilization and there exist different policy models for various scenarios. Our goal is to ensure that the service customer well expresses her security requirements and chooses the service providers that fit these requirements.The first part of this dissertation is dedicated to service provider selection. In case that the security policies of the service provider are accessible to the service customer, we provide a method for measuring the similarity between security policies. Another case is that security policies are not accessible to the service customer or not specified explicitly. Our solution is proposing a policy-based framework which enables the derivation from attribute-based security requirements to concrete security policies. The second part of the dissertation focuses on the security policy negotiation. We investigate the process of reaching agreement through bargaining process in which negotiators exchange their offers and counter offers step by step. The positive result of the negotiation generates a policy contract.
|
124 |
Hardware Architecture of an XML/XPath Broker/Router for Content-Based Publish/Subscribe Data Dissemination SystemsEl-Hassan, Fadi January 2014 (has links)
The dissemination of various types of data faces ongoing challenges with the growing
need of accessing manifold information. Since the interest in content is what drives
data networks, some new technologies and thoughts attempt to cope with these challenges
by developing content-based rather than address-based architectures. The Publish/
Subscribe paradigm can be a promising approach toward content-based data dissemination,
especially that it provides total decoupling between publishers and subscribers.
However, in content-based publish/subscribe systems, subscriptions are expressive and
the information is often delivered based on the matched expressive content - which may
not deeply alleviate considerable performance challenges.
This dissertation explores a hardware solution for disseminating data in content-based
publish/subscribe systems. This solution consists of an efficient hardware architecture
of an XML/XPath broker that can route information based on content to either other
XML/XPath brokers or to ultimate users. A network of such brokers represent an overlay
structure for XML content-based publish/subscribe data dissemination systems. Each
broker can simultaneously process many XPath subscriptions, efficiently parse XML
publications, and subsequently forward notifications that result from high-performance
matching processes. In the core of the broker architecture, locates an XML parser that
utilizes a novel Skeleton CAM-Based XML Parsing (SCBXP) technique in addition to an
XPath processor and a high-performance matching engine. Moreover, the broker employs
effective mechanisms for content-based routing, so as subscriptions, publications, and
notifications are routed through the network based on content.
The inherent reconfigurability feature of the broker’s hardware provides the system
architecture with the capability of residing in any FPGA device of moderate logic density.
Furthermore, such a system-on-chip architecture is upgradable, if any future hardware
add-ons are needed. However, the current architecture is mature and can effectively be
implemented on an ASIC device.
Finally, this thesis presents and analyzes the experiments conducted on an FPGA
prototype implementation of the proposed broker/router. The experiments tackle tests
for the SCBXP alone and for two phases of development of the whole broker. The
corresponding results indicate the high performance that the involved parsing, storing,
matching, and routing processes can achieve.
|
125 |
Strategická analýza podniku / Strategic Analysis of an EnterpriseBláhová, Eliška January 2008 (has links)
The aim of this thesis is to implement strategic analysis of a particular company (Patria Direct, a.s.) using the internal and external analysis to determine the current position of the company on the market and propose recommendations for its possible future direction.
|
126 |
Etablering av svenska fastighetsverksamheter i främmande kulturer : En studie om svenska fastighetsföretag i SpanienColoma Johansson, Josefin, Westin, Linnéa January 2020 (has links)
Background: At all times people have traded with each other but, over time, cross-border trade has evolved and more companies have chosen to internationalize. Some companies are content to act in their original market, while others choose to expand by establishments in foreign markets. To do that, the company needs to choose an entry strategy where all strategies involve both commitment and risk, but also more control and a larger potential profit. Spain is a major growth opportunity as it is the fifth largest economy in Europe. Spain has a great attractiveness for foreign investors and is the gateway to North Africa and Latin America. Purpose: The purpose of this study is to contribute with a better understanding of Swedish real estate companies and their strategic choices when establishing in markets outside of Sweden, in this case Spain, and how eventual obstacles and difficulties can be handled. Method: A qualitative method with semi-structured interviews was conducted to answer the research questions. Theory: In this essay nine theories are used; Market concentration or market diversification?, Networks, International experience, Marketing managers' soft skills, Global market entry plan, Competition's impact on strategy choice, Culture, Franchising as a Market Entry Strategy and Trial and error. All of these theories will be used as the basis for the empirical data, analysis and conclusions, which will help to us answer the research questions. Conclusion: Useful strategies for entering the Spanish market are the franchise method, networking, taking over already started companies, testing their way through trial and error theory and by taking help from aid companies/associations. In order to cope with a foreign establishment in the Spanish market, it is advantageous to have experience of the market, the language, the business culture, the social culture and the corporate law. You will need access to a notary and good communication within the company. It is also relevant to take assistance from lawyers and accountants to facilitate and reduce risks in the daily work. / Bakgrund: I alla tider har människor på ett eller annat sätt handlat med varandra, men med tiden har handeln över gränserna utvecklats och allt fler företag har valt att internationalisera sig. Vissa företag nöjer sig med att agera på sin ursprungliga marknad medan andra väljer att expandera genom att etablera sig på främmande marknader. För att kunna göra det behöver företaget välja inträdesstrategi där alla strategier medför både engagemang, risker men även mer kontroll och en större potentiell vinst. Spanien är en stor tillväxtmöjlighet då de är den femte största ekonomin i Europa. Spanien har en stor attraktionskraft för utländska investerare och är porten till både Nordafrika och Latinamerika. Syfte: Undersökningens syfte är att bidra med ökad förståelse gällande svenska fastighetsföretags strategiska val vid etablering på marknader utanför Sverige, i detta fall Spanien, samt hur eventuella hinder och svårigheter kan hanteras. Metod: En kvalitativ metod med semistrukturerade intervjuer användes för att komma fram till svar på forskningsfrågorna. Teori: I denna uppsats används nio teorier; Marknadskoncentration eller marknadsdiversifiering? Nätverk, Internationell erfarenhet, Marknadschefers soft-skills, Global marknadsinträdesplan, Konkurrensens påverkan av strategival, Kultur, Franchising som marknadsinträdesstrategi och Trial and error. Alla dessa teorier kommer att ligga till grund för empiriinsamlingen, analysen samt slutsatserna, som sedan hjälper oss att besvara forskningsfrågorna. Slutsatser: Användbara strategier vid etablering på den spanska marknaden är franchisemetoden, nätverkande, överta redan uppstartade företag, testa sig fram genom trial and error-teorin samt genom att ta hjälp av hjälpföretag/föreningar. För att klara av en utlandsetablering in på den spanska marknaden är det fördelaktigt att ha erfarenheter om marknaden, språket, affärskulturen, samhällskulturen och företagsjuridiken. Du behöver ha tillgång till en notarie och ha god kommunikation inom företaget. Det är även relevant att ta hjälp av jurister, revisorer och advokater för att underlätta och minska risker i det dagliga arbetet.
|
127 |
Design for Addressing Data Privacy Issues in Legacy Enterprise Application IntegrationMeddeoda Gedara, Kavindra Kulathilake January 2019 (has links)
Electronic message transfer is the key element in enterprise application integration (EAI) and the privacy of data transferred must be protected by the systems involved in the message transfer from origin to the destination. The recent data privacy regulation such as GDPR (General Data Protection Regulation) has enforced the organizations to ensure the privacy of the personal data handled with obligations to provide visibility and control over to the data owner. Privacy concerns with relevant to sensitive data embedded and transferred through business-to-business (B2B) middleware platforms in enterprise architecture are mostly at risk with the legacy nature of the products and the complexity of system integrations. This poses a great threat and challenge to organizations processing sensitive data over the interconnected systems in complying with regulatory requirements. This research proposes a solution design to address the data privacy issues related to personal data handled in an enterprise application integration framework. Where electronic messages used to transfer personally identifiable information (PII). The proposal consisting of a design called “Safety Locker” to issue unique tokens related to encrypted PII elements stored in a persistence data storage based on Apache Ignite. While adding REST API interfaces to access the application functionality such as tokenization, de-tokenization, token management and accessing audit logs. The safety locker can run as a standalone application allowing clients to access its functionality remotely utilizing hypertext transfer protocol (HTTP). The design allows the data controllers to ensure the privacy of PII by embedding tokens generated from the application within the electronic messages transferred through interconnected systems. The solution design is evaluated through a proof of concept implementation, which can be adapted, enhanced to apply in EAI implementations.
|
128 |
Uvedení nové realitní kanceláře na trh / The introduction of the real estate intermediary on the marketHolman, Pavel January 2012 (has links)
Diploma thesis deals with problems of new real estate agency when entering the market. The aim is to create a draft business plan for new real estate reality called Pernikové reality s.r.o., characterize the work of a real estate broker and describe the real estate market in which the real estate agency will work.
|
129 |
Institucionální rámec realitní činnosti / Institutional Framework of the Real Estate ActivityKselíková, Tereza January 2015 (has links)
Presented diploma thesis deals with concepts from the real estate practice and people, who are employed in this practice. The thesis provides a look at contracts used in the real estate practice and their changes according to the passing of the new Civil code. The thesis is mapping changes in the real estate business as a follow-up to the passing ot the new cadastral act. Focus is also put on new definitions of some terms related to the real estate branch, as the new Civil code stipulates. The thesis studies present level of education of real estate brokers and possibilities of further education in this branch. Within the scope of the diploma thesis a questionnaire has been elaborated, which mapps fundamental issues of the real estate business. The questionnaire is also focused on prepared bill about providing of services of the real estate brokers.
|
130 |
Det låga förtroende för mäklarkåren – vad beror det på och hur kan det förbättras? / The confidence in real estate brokers – why so low and how can it be improved?Badéa, Isabelle January 2015 (has links)
The factors behind the increasingly low confidence for the real estate broker in spite of longer education and higher admission requirements are of both internal and external character. By internal factors, I refer to real estate broker's attitude towards customers and underestimation of customers' expectations as well as too much focus on high commission. By external factors with a tremendeous impact on this branch, I mean economic cycles, political and financial decisions taken by different authorities. This study is meant to make us understand, how real estate agents should act to create a stronger confidence towards their clients and change this negative image that has been created. In order to make this study more anchored to reality I have interviewed common peolple, some of them with experience from own real estate deals, some of them without any experinece at all. This situation of low confidence for the real estate brokers has come to the attention of many Swedish authorities who have set up guidelines and recommendations in order to change this negative trend on the market. / Faktorerna som ligger bakom det alltmer låga förtroendet för mäklarkåren trots längre utbildningar och högre intagningskrav är både interna och externa. Med interna faktorer menar jag fastighetsmäklarnas attityd gentemot kunderna samt underskattning av kundernas förväntningar och för mycket fokusering på hög provision. Med externa faktorer som också påverkat denna bransch menar jag konjunkturcyklar samt politiska och finansiella beslut. I denna studie kommer vi att undersöka, med hjälp av intervjuer med människor som både har och inte har erfarenhet av denna bransch, hur en fastighetsmäklare skall agera för att skapa ett starkare förtroende för sina kunder och ändra denna negativa bild som skapats. Situationen om det låga förtroendet har uppmärksammats av myndigheter och bland dessa Fastighetsmäklarnämnden som har satt upp riktlinjer och rekommendationer för att ändra denna negativa trend på marknaden.
|
Page generated in 0.0471 seconds