Spelling suggestions: "subject:"database"" "subject:"catabase""
1191 |
Tvorba znalostní databáze pro světelnou techniku s možností expertního zpracování dotazů / Creation of Knowledge Database for Lighting Technology with the Possibility of Expert Query ProcessingKrbal, Michal January 2014 (has links)
This presented thesis is focused on the complex description of creation the database system for the lighting. The important static and dynamic parameters of light sources and luminaires are listed in the first part of thesis. These parameters are complemented by the measured values and their relationships. The next chapters of thesis are focused to description of obtained parameters, structural design, historical and expected development of individual representatives of light sources. In the following sections are described current state of used data formats of luminaires and the possibilities for describing of light sources. The database systems are created as a result of this thesis. These databases are used for collecting, sorting, searching and sophisticate comparison of the parameters of light sources and luminaires.
|
1192 |
Mapping Carbon Storage and Potential Bioenergy Production in Södertälje Using High-resolution Biotope DatabaseÅkerström, Lisa January 2022 (has links)
Global warming is caused by the human induced increase of Greenhouse Gases (GHG) in the atmosphere. GHG emissions need to be reduced, and carbon dioxide (CO2) emissions from fossil sources ceased to mitigate global warming. Energy production and use is a main contributor to fossil sourced emissions in Europe. Sweden has a high part renewable power production but not completely, to have a 100% renewable power production by 2040 is a goal set by Swedish government. By 2045 Sweden also plans to have net zero emissions nationwide and afterwards negative emissions of CO2, to reduce global warming and reach the Paris agreement of maximum 1.5°C global warming level it is urgent and vital to create Carbon (C) sinks and to reach neutral and even negative emissions within the energy sector. Negative emissions can be reached in Combined Heat and Power plants (CHP) by Bio Carbon Capture and Storage (Bio-CCS). Demand on wood chips and bio-energy fuel is increasing on the European continent. A local source of biofuel might contribute to shorter transports, a local C-sink, security in supply and a way to meet both the increasing competition of fuel and the environmental political targets. Here we investigate the available land for local production of bioenergy forests in Södertälje and the amount of energy possible to produce from that. Using a detailed biotope database over the municipality, Biotopdatabasen, and a Geographical Information System (GIS) based approach 5 scenarios of potential land areal for planting of energy forests in the municipality have been analysed. Different criteria selections in biotopes, grasslands and historical crop fields, and land use, used or un-used, builds the scenarios; 1. All available grasslands, 1010 ha, 2. All available grasslands on earlier crop fields, 815 ha, 3. Unused available grassland on earlier crop field, 300 ha, 4. Available land on earlier crop fields, including forestry, 1715 ha, 5. Unused available land on earlier crop fields, 366 ha. Gross annual energy yields from energy forest in the scenarios were estimated to; 1. 46,2-65,1 GWh/y, 2. 37,3-52,5 GWh/y, 3. 13,7-19,3 GWh/y, 4. 78,4-110,5 GWh/y, 5. 16,7-23,6 GWh/y. The yield from all these scenarios will, in the expected gross normal yield scenario, match the energy produced today by fossil fuels in the local CHP and heating plant (0.64%, 2020) yields 0.69-3.96% of total energy produced. Scenarios 3 and 5 are considered likely scenarios but the effect on spreading pathways and thereby biodiversity needs to be assessed, using old crop fields lowers the risk of harming important biodiversity and possibly help restore C sink in soils.
|
1193 |
[en] AUTOMATIC COMBINATION AND SELECTION OF DATABASE TUNING ACTIONS / [pt] COMBINAÇÃO E SELEÇÃO AUTOMÁTICA DE AÇÕES DE SINTONIA FINARAFAEL PEREIRA DE OLIVEIRA 29 June 2020 (has links)
[pt] O processo de combinação de ações de sintonia fina não possui nem uma formulação precisa, nem uma abordagem formal para solucioná-lo. É necessário definir o que combinar dentre as múltiplas ações existentes e, uma vez escolhidas, como compor de maneira que as restrições sejam verificadas. Trata-se de um problema complexo e relevante na área de bancos de dados, tanto para soluções manuais pelo DBA como automáticas, por meio de softwares especializados. Isto ocorre pois os diferentes tipos de ações de
sintonia possuem estratégias distintas para alcançar o objetivo em comum. Esta tese propõe um método automático para geração e seleção de soluções combinadas de sintonia fina para bancos de dados relacionais. Discute-se como combinar soluções e respeitar as restrições tecnológicas e recursos
computacionais disponíveis. Por fim, apresenta-se uma implementação e avaliação utilizando três SGBDs de mercado relevantes, em que mostramos tanto a eficácia como a eficiência do método proposto. Os resultados mostraram que o método é capaz de produzir soluções combinadas válidas mais eficientes que soluções locais independentes. / [en] The process of combining database tuning actions has neither a precise formulation nor a formal approach to solving it. It is necessary to define what to combine among multiple existing operations and, once chosen, how to compose so that constraints can be verified. It is a complex and relevant problem in the database research area, both for the DBA manual solutions, and automatic ones using specialized software. It is important because the different types of tuning actions have different strategies to achieve a common goal. This thesis proposes an automated method for generating and selecting combined tuning solutions for relational databases. It discusses how to mix solutions and still respect both the technological constraints and available computational resources. Finally, we present an implementation and evaluation using three relevant market DBMSs, where we show both the effectiveness and the efficiency of the proposed method.
The results showed that the technique is capable of producing combined solutions that are more efficient than independent local solutions.
|
1194 |
Mapping out the Key Security Components in Relational Databases (MK-SCoRe) : Enhancing the Security of Relational Database Technology / Kartläggning av Nyckelkomponenter för Säkerhet i Relationsdatabaser (MK-SCoRe) : Förbättring av Säkerheten i RelationsdatabasteknikAlobaidi, Murtadha, Trabulsiah, Abdullah January 2024 (has links)
Relational database security has become an increasingly important issue for organizations worldwide in the current era of data-driven operations. The urgent need for an extensive knowledge of relational database security components in relational databases is addressed in this thesis. Database security is constantly improving, but there is still a lack of research that analyzes these important factors. Because of this gap, databases are not sufficiently secured from new cyber threats, which endangers its accessibility, confidentiality, and integrity. The problem that the thesis addresses is the lack of comprehensive research covering all key security components in relational databases which, presents a challenge for organizations seeking to comprehensively secure their database systems. The purpose of this thesis is to systematically map the key security components essential to relational databases. The goal is to assist organizations and Database professionals to secure their relational databases against diverse cyber threats. Using a qualitative and exploratory methodology, the research analyzes a wide range of literature on database security. The research offers a balanced and comprehensive perspective on the current security landscape in relational databases by integrating theoretical study with structured interviews. This method guarantees that all essential security components is fully investigated. The results of this thesis involve a detailed mapping of the key security components within relational databases, which are uniquely informed by a combination of academic research and empirical findings from structured interviews with Database security experts. This thesis analyzes these security components based on how well they address current security threats, how well they secure databases, and how well they can adapt to different organizational needs. / Säkerhet i relationsdatabaser har blivit en allt viktigare fråga för organisationer världen över i den nuvarande eran av datadriven verksamhet. I den här avhandlingen behandlas det akuta behovet av en omfattande kunskap om säkerhetskomponenter för relationsdatabaser i relationsdatabaser. Databassäkerheten förbättras ständigt, men det finns fortfarande en brist på forskning som analyserar dessa viktiga faktorer. På grund av denna brist är databaser inte tillräckligt skyddade mot nya cyberhot, vilket äventyrar deras tillgänglighet, konfidentialitet och integritet. Problemet som avhandlingen tar upp är bristen på omfattande forskning som täcker alla viktiga säkerhetskomponenter i relationsdatabaser, vilket utgör en utmaning för organisationer som vill säkra sina databassystem på ett heltäckande sätt. Syftet med denna avhandling är att systematiskt kartlägga de viktigaste säkerhetskomponenterna som är väsentliga för relationsdatabaser. Målet är att hjälpa organisationer och databasspecialister att säkra sina relationsdatabaser mot olika cyberhot. Med hjälp av en kvalitativ och explorativ metod analyseras ett brett spektrum av litteratur om databassäkerhet. Forskningen erbjuder ett balanserat och omfattande perspektiv på det nuvarande säkerhetslandskapet i relationsdatabaser genom att integrera teoretiska studier med strukturerade intervjuer. Denna metod garanterar att alla väsentliga säkerhetskomponenter undersöks fullständigt. Resultatet av denna avhandling innebär en detaljerad kartläggning av de viktigaste säkerhetskomponenterna inom relationsdatabaser, som är unikt informerade av en kombination av akademisk forskning och empiriska resultat från strukturerade intervjuer med databassäkerhetsexperter. Denna avhandling analyserar dessa säkerhetskomponenter utifrån hur väl de hanterar aktuella säkerhetshot, hur väl de säkrar databaser och hur väl de kan anpassas till olika organisatoriska behov.
|
1195 |
應用資料採礦技術於資料庫加值中的抽樣方法 / THE SAMPLING METHODS FOR VALUE-ADDED DATABASE IN DATA-MINING陳惠雯 Unknown Date (has links)
In the wake of growing database that has already become the trend of today’s business environment within the foreseeable future, reviewing quality information from mountains of data residing on corporations or organizations’ network such as sales figures, manufacturing statistics, financial data and experimental data is clearly costly, time consuming and definitely ineffective approach. Therefore we would need a sound and effective method in obtaining only portions of the data that are representative to the population and which allow us to build the reliable model based upon the sampled data. However, sometimes we have a situation where the database is of limited in size, under such circumstance, we initiate the idea which is relatively new to adding the attributes or values into the database to enhance the quality of the data Follow through such a procedure; it is obvious that implementing a good sampling method is an important groundwork leading us to reach final destination that is obtaining a reliable predictive model. And this is our research goal that is to get an effective and representative value-added sample of by means of sampling method for building an accuracy predictive model. The concept is pretty straightforward that is if we want to get good predictive samples then we need the correct sampling methods. The sampling methods under study are simple random sample, system sample, stratified sample and uniform design. The models used are the C5.0, logistic regression, and neural network for categorical predictive variable and stepwise regression for continuous predictive variable. The results are discussed in the conclusion section.
Keywords: Database、Data Mining、Sampling、Value-added database
|
1196 |
Metode transformacija šema baza podataka u obezbeđenju reinženjeringa informacionih sistema / Methods of Database Schema Transformations in Support of the Information System Reengineering ProcessAleksić Slavica 30 November 2013 (has links)
<p>Cilj istraživanja realizovanih u ovom radu, bio je je da se formalno opišu mogući pristupi transformacijama različitih opisa baza podataka iz jednog modela podataka u drugi i praktično provere kroz njihovu implementaciju u okviru jednog CASE alata, namenjenog projektovanju informacionih sistema i baza podataka. U skladu sa postavljenim ciljem definisan je metodološki pristup i softversko okruženje IIS*Ree koje omogućava visok nivo automatizacije procesa reinženjeringa informacionih sistema. Okruženje IIS*Ree, zasnovano na MDSD principima, kao krajnji rezultat generiše šemu baze podataka u izabranom ciljnom, konceptualnom ili implementacionom modelu podataka, kao i prototip aplikacije.</p> / <p>The goal of the research presented in this paper is to formally specify approaches to transformation of database specifications between different data models. The transformations are then to be implemented and tested using a CASE tool for modelling information systems and databases. Following this goal, a methodological approach is defined together with a software named IIS*Ree that provides a high level of automation of the information system reengineering process. The IIS*Ree software, developed in accordance to MDSD principles, generates database schemas specified in a target, conceptual or implementation data model, as well as application prototypes.</p>
|
1197 |
Databasskydd / Protection of databasesAxhamn, Johan January 2016 (has links)
The capacity to assemble, store, and make available information in databases is ever growing. This development has accelerated in recent decades, driven by the advent and increased use of digital networks. Already at an early stage, it led to demands for legal protection of databases. In most countries databases have been protected in national legislation based on copyright principles. However, this kind of protection has been regarded as insufficient. The reason for this is that copyright protection only covers the selection or arrangement of the contents of the database. By rearranging the contents, it is possible to avoid liability for copyright infringement. To address the specific needs of producers of databases, the then European community adopted a directive in 1996 on the legal protection of databases. The Directive aims to harmonise copyright protection for databases and to introduce a new, sui generis, right for the legal protection of databases. The sui generis right protects the investments in obtaining, verifying, and presenting the contents in a database. The sui generis right has been described in the literature as one of the most complex intellectual property rights ever established. Its complexity resides in the unclear relationship between the requirements for protection and the content and scope of protection. This dissertation describes, analyses, compares and systematises the legal protection for databases as provided for in the EU Database Directive – both in relation to copyright and sui generis protection, but also in relation to the intellectual property system in general and principles and rules on unfair competition. The study also describes and analyses the Directive as implemented into Swedish law. To do this, it makes use of relevant legal sources, with particular account taken of relevant sources of EU law such as the Directive itself, adjacent directives in the field of copyright and related rights, as well as unfair competition law and the case law and legal method developed by the Court of Justice of the European Union. The study also draws on underlying theories of intellectual property protection and unfair competition law, as well as arguments based on unjust enrichment and pure economic loss. The study establishes how the sui generis right serves as a legal hybrid between traditional intellectual property rights and protection against unfair competition. The structure of the right resembles traditional intellectual property rights, with requirements for protection, provisions on exclusive rights, exceptions and limitations and a term of protection. At the same time, the content and scope of protection provide measures similar to those countering unfair competition with aspects of protection against pure economic loss. The right protects against certain activities carried out in the market rather than providing protection for a traditional object of intellectual property law. When implementing the Directive, the Swedish legislator overlooked these aspects of the sui generis right, creating legal uncertainties when interpreting and applying the national legislation. The study concludes with a look forward and suggestions for future research.
|
1198 |
The future will be better tomorrow: a novel of apocalyptic sarcasmUnknown Date (has links)
The Future Will Be Better Tomorrow is a satirical post-apocalyptic novel that
examines the personal and social ironies that occur in a society that is unbalanced by
an unexplained apocalyptic event. Working with a combination of dark humor and the
terrifying realities of an apocalyptic event – in this case: a blackout – the novel aims to
challenge the machinery established by this particular subset of the science fiction genre. / Includes bibliography. / Thesis (M.F.A.)--Florida Atlantic University, 2014.. / FAU Electronic Theses and Dissertations Collection
|
1199 |
Retail 21: a new retail distribution concept for Hong Kong. / Retail twenty oneJanuary 1993 (has links)
by Chan Kin Hung, Chan Ping Cheung. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1993. / Includes bibliographical references (leaves 61-62). / ABSTRACT --- p.ii / TABLE OF CONTENTS --- p.iv / LIST OF ILLUSTRATIONS --- p.vi / LIST OF TABLES --- p.vii / ACKNOWLEDGEMENTS --- p.viii / CHAPTER / Chapter I. --- INTRODUCTION --- p.1 / Retail Industry in Hong Kong --- p.1 / Decision Process of a Consumer --- p.3 / In-house Purchase --- p.5 / Objectives and Scope of Study --- p.8 / Chapter II. --- METHODOLOGY --- p.10 / Chapter III. --- RETAIL 21 --- p.12 / The Shop --- p.12 / The Software --- p.14 / The Target Group of Customers --- p.15 / Retail 21 Summary --- p.16 / Chapter IV. --- DATA ANALYSIS AND INTERPRETATION --- p.19 / Survey on Shopping Habit --- p.19 / Retailer Interviews --- p.20 / Survey on Retail 21 Acceptability --- p.23 / Chapter V. --- SUMMARY OF KEY FINDINGS --- p.25 / Key Findings --- p.25 / Implications of Findings --- p.27 / Chapter VI. --- RECOMMENDATIONS --- p.30 / Product Objectives --- p.30 / Promotion Objectives --- p.32 / Price Objectives --- p.33 / Summary --- p.35 / Chapter VII. --- LIMITATIONS --- p.36 / Chapter VIII. --- CONCLUSION --- p.38 / APPENDICES / Chapter A. --- Questionnaire for Survey on Shopping Habit --- p.40 / Chapter B. --- Result of Survey on Shopping Habit / Chapter 1. --- Decision process for purchase --- p.42 / Chapter 2. --- Experience with mail order --- p.42 / Chapter 3. --- Products purchased through mail order --- p.43 / Chapter 4. --- Factors affecting acceptable information charge --- p.43 / Chapter C. --- Cover Letter for Interview Request --- p.45 / Chapter D. --- List of Interviews --- p.46 / Chapter E. --- List of Shops Contacted but Interview Could Not Be Arranged --- p.47 / Chapter F. --- Summary of Retailer Interviews --- p.48 / Chapter G. --- Questionnaire for Survey on Retail 21 Acceptability --- p.53 / Chapter H. --- Result of Survey on Retail 21 Acceptability --- p.54 / Chapter I. --- Operation of Retail 21 Prototype Software --- p.55 / Chapter J. --- Tables / Chapter 1. --- Hong Kong Population by Broad Area --- p.60 / Chapter 2. --- Hong Kong Population in New Towns --- p.60 / BIBLIOGRAPHY --- p.61
|
1200 |
Database marketing: a case study of a retail shop in Hong Kong.January 1998 (has links)
by Check Suk-Han & Lee Pak-Hang, Gordon. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 91-92). / ABSTRACT --- p.iii / TABLE OF CONTENTS --- p.v / LIST OF ILLUSTRATIONS --- p.vii / LIST OF TABLES --- p.ix / ACKNOWLEDGEMENT --- p.x / CHAPTER / Chapter I. --- INTRODUCTION --- p.1 / Objective --- p.3 / Approach --- p.4 / Chapter II. --- LITERATURE REVIEW --- p.6 / Database Marketing and the Loyalty Ladder --- p.7 / Building the Customer List --- p.11 / Segmentation of Customer list --- p.13 / Planning the Database --- p.21 / Using the Database --- p.25 / Managing the Database --- p.27 / Chapter IV. --- CASE STUDY --- p.29 / Background --- p.29 / Analysis --- p.30 / Designing the Database --- p.31 / Phase One - Building up the Customer List --- p.32 / Phrase Two - Enhancing the Database to Improve Customer Relationship --- p.38 / Phase Three- Analysis the Business --- p.41 / Impact to Current Business --- p.50 / Changes in business operation --- p.50 / Budget for Hardware/Software Requirement --- p.50 / Functional requirements --- p.51 / Managing the Database --- p.59 / Chapter V. --- THE CASE STUDY REVIEW --- p.62 / Facing Challenges --- p.64 / Fear of Change --- p.64 / Increased Workload --- p.64 / Limited Resources --- p.65 / Increased Costs --- p.65 / Lack of Skills --- p.65 / Difficult to Justify the Cost and Benefit --- p.66 / Changing Image --- p.66 / Recommendations to the Bookstore --- p.67 / Chapter VI. --- CONCLUSION --- p.68 / Limitations --- p.69 / Future Directions --- p.71 / APPENDIX --- p.73 / BIBLIOGRAPHY --- p.91
|
Page generated in 0.0326 seconds