• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 3
  • 1
  • Tagged with
  • 20
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Geochronology and Trace Element Characteristics of Pyrite from Selected Carbonate Hosted Pb-Zn Ore Deposits

Hnatyshin, Danny Unknown Date
No description available.
12

Využití nástrojů projektového managementu v event managementu / The Use of Project Management Tools in Event Management

Sadílek, Tomáš January 2014 (has links)
The aim of this thesis is to determine possibilities and real use of project management tools in event management, in sphere built on project bases, but that is also very dynamic and changing even in realisation. The thesis focuses on software support for managing projects and project teams, that are applicable in event management. The research was made for the selection of optimal tool for realization of leasure time, public event Ladronkafest. Selection is based on multi-criteria decision evaluation process, that is implemented after consultation with professionals in event management. The chosen software was tested on some smaller event. During the test users realized some negatives about this program and decided not use it.
13

Architecting the deployment of cloud-hosted services for guaranteeing multitenancy isolation

Ochei, Laud Charles January 2017 (has links)
In recent years, software tools used for Global Software Development (GSD) processes (e.g., continuous integration, version control and bug tracking) are increasingly being deployed in the cloud to serve multiple users. Multitenancy is an important architectural property in cloud computing in which a single instance of an application is used to serve multiple users. There are two key challenges of implementing multitenancy: (i) ensuring isolation either between multiple tenants accessing the service or components designed (or integrated) with the service; and (ii) resolving trade-offs between varying degrees of isolation between tenants or components. The aim of this thesis is to investigate how to architect the deployment of cloud-hosted service while guaranteeing the required degree of multitenancy isolation. Existing approaches for architecting the deployment of cloud-hosted services to serve multiple users have paid little attention to evaluating the effect of the varying degrees of multitenancy isolation on the required performance, resource consumption and access privilege of tenants (or components). Approaches for isolating tenants (or components) are usually implemented at lower layers of the cloud stack and often apply to the entire system and not to individual tenants (or components). This thesis adopts a multimethod research strategy to providing a set of novel approaches for addressing these problems. Firstly, a taxonomy of deployment patterns and a general process, CLIP (CLoud-based Identification process for deployment Patterns) was developed for guiding architects in selecting applicable cloud deployment patterns (together with the supporting technologies) using the taxonomy for deploying services to the cloud. Secondly, an approach named COMITRE (COmponent-based approach to Multitenancy Isolation Through request RE-routing) was developed together with supporting algorithms and then applied to three case studies to empirically evaluate the varying degrees of isolation between tenants enabled by multitenancy patterns for three different cloud-hosted GSD processes, namely-continuous integration, version control, and bug tracking. After that, a synthesis of findings from the three case studies was carried out to provide an explanatory framework and new insights about varying degrees of multitenancy isolation. Thirdly, a model-based decision support system together with four variants of a metaheuristic solution was developed for solving the model to provide an optimal solution for deploying components of a cloud-hosted application with guarantees for multitenancy isolation. By creating and applying the taxonomy, it was learnt that most deployment patterns are related and can be implemented by combining with others, for example, in hybrid deployment scenarios to integrate data residing in multiple clouds. It has been argued that the shared component is better for reducing resource consumption while the dedicated component is better in avoiding performance interference. However, as the experimental results show, there are certain GSD processes where that might not necessarily be so, for example, in version control, where additional copies of the files are created in the repository, thus consuming more disk space. Over time, performance begins to degrade as more time is spent searching across many files on the disk. Extensive performance evaluation of the model-based decision support system showed that the optimal solutions obtained had low variability and percent deviation, and were produced with low computational effort when compared to a given target solution.
14

Implementation of Customer Relationship Management in the Cloud : The example of SMEs through a multiple case study analysis

Masset, Benjamin, Sekkat, Ismail January 2011 (has links)
Purpose: The aim of this thesis is to build a practical guide to get a clear understanding about the implementation process of Customer Relationship Management in the cloud within Small. It also describes the different concepts that are Customer Relationship Management, Cloud computing and CRM in the cloud, especially related to the SMEs, in order to have a great insight that gives the opportunity to implement successfully this paradigm.   Scientific method: The research lies in the interpretative field of inquiry. Abduction is used to combine empirical data with theoretical studies in orderto tryto investigate patterns that could give an understanding of the phenomena that is studied. Descriptive research approach using multiple-case study design is used.   Theoretical frame of references: The first part of the theoretical frame of references explores existing theories. This leads to CRM and Cloud Computing. The second part explores different means of analysing our problematic.   Empirical method: The chosen approach is qualitative. Interviews have been conducted for data collection. Documentsarehave beengathered and analysed to support the interviewguides. We also gathered a previous practical guide from Salesforce in order to compare our results.   Analysis: Analysing hosted CRM implementation of three SMEs using Salesforce, it describes the key facts that have to be taken into account to implement the Salesforce CRM solution.   Conclusion: The findings show how three companies can be analysed to draw conclusions about the implementation process. According to interviews, theories, documents from hosted CRM provider, some suggestions have been advised to avoid problems concerning the implementation in SMEs.
15

Patterns of distal alteration zonation around Antamina Cu-Zn skarn and Uchucchacua Ag-base metal vein deposits, Peru : mineralogical, chemical and isotopic evidence for fluid composition, and infiltration, and implications for mineral exploration

Escalante Aramburu, Abraham David 11 1900 (has links)
Intrusion-related, carbonate rock–hosted replacement deposits are an important source of global base metal production that includes: Cu-Zn skarn, Zn-Pb-Ag carbonate replacement and Ag-base metal deposits. These deposits are located in multiple geological settings and are commonly associated with low-grade Cu-Mo calc-alkaline porphyry districts. Visible alteration halos to these deposits range from ten to hundreds of metres around high temperature skarn deposits, being small to imperceptible around the distal relatively low temperature members of this clan. Patterns of visible and cryptic alteration are described and constrained in this study particularly around paleo-fluid flow zones at different distances and elevations from the ore centre. This was done in order to identify the large-scale zonation, mechanisms, and effects of fluid infiltration especially into the distal portions of these deposits. The main alteration tracers employed included mineralogy, major and trace element geochemistry, oxygen and carbon isotopes, and the fluorescent signature of calcite veins associated with the fluids conduits. Two areas were selected for this study: the large Cu-Zn Antamina skarn and the Ag-base metal Uchucchacua vein deposits in the Peruvian Central Andes as these deposits represent the end-members of the polymetallic carbonate rock-hosted deposits and hence, provide an excellent opportunity to examine the margins and upper sections of these hydrothermal systems. Geochronological analyses of intrusive dikes were used to establish the magmatic and hydrothermal evolution associated with mineralization, as well as the genetic linkage between proximal and distal portions of the mineralizing system at Antamina. Oxygen, carbon and strontium isotope data of vein minerals is also used to constrain the temperature of the fluids proximal and distal to the magmatic centre. Chemical data of fluorescent and non-fluorescent veins were used to determine the main activators of fluorescence and to constrain its relationship with mineralizing fluids. In summary, results of this research identify a large-scale zonation of visible and cryptic alteration around paleo-fluid flow zones demonstrating the linkage between Ag-base metal veins, replacement and skarn deposits. Anomalous halos determined throughout Antamina and Uchucchacua deposits may contribute to the development of a more systematic exploration methodology for these types of deposits.
16

Patterns of distal alteration zonation around Antamina Cu-Zn skarn and Uchucchacua Ag-base metal vein deposits, Peru : mineralogical, chemical and isotopic evidence for fluid composition, and infiltration, and implications for mineral exploration

Escalante Aramburu, Abraham David 11 1900 (has links)
Intrusion-related, carbonate rock–hosted replacement deposits are an important source of global base metal production that includes: Cu-Zn skarn, Zn-Pb-Ag carbonate replacement and Ag-base metal deposits. These deposits are located in multiple geological settings and are commonly associated with low-grade Cu-Mo calc-alkaline porphyry districts. Visible alteration halos to these deposits range from ten to hundreds of metres around high temperature skarn deposits, being small to imperceptible around the distal relatively low temperature members of this clan. Patterns of visible and cryptic alteration are described and constrained in this study particularly around paleo-fluid flow zones at different distances and elevations from the ore centre. This was done in order to identify the large-scale zonation, mechanisms, and effects of fluid infiltration especially into the distal portions of these deposits. The main alteration tracers employed included mineralogy, major and trace element geochemistry, oxygen and carbon isotopes, and the fluorescent signature of calcite veins associated with the fluids conduits. Two areas were selected for this study: the large Cu-Zn Antamina skarn and the Ag-base metal Uchucchacua vein deposits in the Peruvian Central Andes as these deposits represent the end-members of the polymetallic carbonate rock-hosted deposits and hence, provide an excellent opportunity to examine the margins and upper sections of these hydrothermal systems. Geochronological analyses of intrusive dikes were used to establish the magmatic and hydrothermal evolution associated with mineralization, as well as the genetic linkage between proximal and distal portions of the mineralizing system at Antamina. Oxygen, carbon and strontium isotope data of vein minerals is also used to constrain the temperature of the fluids proximal and distal to the magmatic centre. Chemical data of fluorescent and non-fluorescent veins were used to determine the main activators of fluorescence and to constrain its relationship with mineralizing fluids. In summary, results of this research identify a large-scale zonation of visible and cryptic alteration around paleo-fluid flow zones demonstrating the linkage between Ag-base metal veins, replacement and skarn deposits. Anomalous halos determined throughout Antamina and Uchucchacua deposits may contribute to the development of a more systematic exploration methodology for these types of deposits.
17

Patterns of distal alteration zonation around Antamina Cu-Zn skarn and Uchucchacua Ag-base metal vein deposits, Peru : mineralogical, chemical and isotopic evidence for fluid composition, and infiltration, and implications for mineral exploration

Escalante Aramburu, Abraham David 11 1900 (has links)
Intrusion-related, carbonate rock–hosted replacement deposits are an important source of global base metal production that includes: Cu-Zn skarn, Zn-Pb-Ag carbonate replacement and Ag-base metal deposits. These deposits are located in multiple geological settings and are commonly associated with low-grade Cu-Mo calc-alkaline porphyry districts. Visible alteration halos to these deposits range from ten to hundreds of metres around high temperature skarn deposits, being small to imperceptible around the distal relatively low temperature members of this clan. Patterns of visible and cryptic alteration are described and constrained in this study particularly around paleo-fluid flow zones at different distances and elevations from the ore centre. This was done in order to identify the large-scale zonation, mechanisms, and effects of fluid infiltration especially into the distal portions of these deposits. The main alteration tracers employed included mineralogy, major and trace element geochemistry, oxygen and carbon isotopes, and the fluorescent signature of calcite veins associated with the fluids conduits. Two areas were selected for this study: the large Cu-Zn Antamina skarn and the Ag-base metal Uchucchacua vein deposits in the Peruvian Central Andes as these deposits represent the end-members of the polymetallic carbonate rock-hosted deposits and hence, provide an excellent opportunity to examine the margins and upper sections of these hydrothermal systems. Geochronological analyses of intrusive dikes were used to establish the magmatic and hydrothermal evolution associated with mineralization, as well as the genetic linkage between proximal and distal portions of the mineralizing system at Antamina. Oxygen, carbon and strontium isotope data of vein minerals is also used to constrain the temperature of the fluids proximal and distal to the magmatic centre. Chemical data of fluorescent and non-fluorescent veins were used to determine the main activators of fluorescence and to constrain its relationship with mineralizing fluids. In summary, results of this research identify a large-scale zonation of visible and cryptic alteration around paleo-fluid flow zones demonstrating the linkage between Ag-base metal veins, replacement and skarn deposits. Anomalous halos determined throughout Antamina and Uchucchacua deposits may contribute to the development of a more systematic exploration methodology for these types of deposits. / Science, Faculty of / Earth, Ocean and Atmospheric Sciences, Department of / Graduate
18

Object Synchronization and Security for Mobile Communications Devices

Borison, Torbjorn January 2001 (has links)
The main objective of this master’s thesis project was to investigate and find solutions to the problem of how to combine the SyncML synchronisation specification with object security and thus protection of personal information, such as contacts and calendar entries in mobile devices. SyncML is a new synchronisation specification agreed upon by major device developers (Ericsson, Palm, Motorola, etc.) and the major synchronisation server developers (Starfish, Puma, fusionOne, etc.). It is independent of transport (HTTP, WSP, or OBEX) platform, operating system, and application and simplifies synchronisation of personal information between dissimilar SyncML supportive devices. SyncML compliant devices are fully capable of synchronising information with a third party operated Internet based server and a desktop computer. This allows us to access, up-date and maintain information independent of Intranets or geographical position. However, synchronising and storing confidential personal information on an third party operated Internet based server entails weaknesses in our personal information security. Even if transport and storage security are used, how secure is the server where this information is stored since this server has the highest probability of being attacked. Can we really trust that an employee or other person with valid appropriated administrators access to the storage facility with the appropriate knowledge, working together with the third party server operator, won’t try to access our stored information? To prevent this, the personal information’s confidentiality must be guaranteed before the information leaves the device. When synchronising and exchanging personal information, the information is often marked according to a specific format. The three de-facto standard PIM formats are: (1) vCard (contact information), (2) vCalendar, and (3) iCalendar (calendar and scheduling information). These formats divide the personal information into properties. Each property is assigned to contain a small piece of the personal information entry (e.g. a telephone number, an e-mail address, the time when the calendar event begins, etc.). Furthermore to preserve the interoperability between different devices given by SyncML, authorised recipients must automatically be able to reverse the encryption process and decrypt the encrypted property value. Therefore general cryptographic formats are used (e.g. CMS, PGP and the newly developed XML Encryption). They add information needed by the recipients (e.g. algorithm used, padding method used on the plain text, etc.), encrypt the plaintext into cipher text, and decrypt the cipher text into plain text given the correct key.
19

Modelování atmosférické cirkulace exoplanet / Modelling of exoplanetary atmospheric circulation

Novák, Jiří January 2014 (has links)
In this thesis we study the properties of exoplanetary atmospheres. The first part describes methods for searching exoplanets, statistics of discovered exoplanets and the sampling factors. The second part describes the properties of chosen planets and moons in the Solar system (Venus, Mars and Titan) and also possible properties of the exoplanetary atmospheres that are only briefly understood. The third part describes the atmospheric models which incorporate a full 3D model of the atmosphere, and a shallow- water model. We also show the results of exoplanetary atmospheric models published in the scientific journals. This part also describes the icosahedral geodetic grid that is advantageous for the global climatic models, and also discretisation on sphere and the application of the operators (gradient, divergence, vorticity) on geodetic grid. The last part is about creating program for global shallow water model in divergence-vorticity variables with forcing system with using icosahedral geodetic grid - we describe technical properties connected with model creating, parameters which the model uses during time integration, geographic system for results display and we show results for various kinds of extrasolar planets and planets in the Solar system. We used several numerical tests for testing model...
20

A 3G Convergence Strategy for Mobile Business Middleware Solutions : Applications and Implications

Hacklin, Fredrik August January 2001 (has links)
Mobile business solutions are one of the most attractive market segments of mobile information services. The third generation of mobile communication systems (3G) will be a significant step forward in the convergence of telecommunications and datacommunications industries. More specifically, the convergence of mobile technologies and the Internet allows compelling possibilities for future applications and solutions. However, most current mobile businesses and mobile application and solution providers are rather contributing to the process of convergence; many current ideas and solutions are based on the restrictions of existing mobile networks combined with Internet-based services. In the future, when mobile networks and the Internet have merged, it will no longer be possible to create revenue with these types of solutions. One concrete solution is the mobile middleware concept, bridging the mobile technologies and Internet world. This Master’s thesis studies the middleware concept for providing business applications in the light of 3G, making strategic recommendations to a provider of these kinds of services. A comprehensive discussion about the developments after 3G is introduced. Alternative solutions are presented and some strategic implications are introduced. The implications are motivated by an industry survey, carried out within this project. The topic of over-the-air data synchronization is discussed as an example for interim middleware. Mobile computing file system issues are seen as an interesting opportunity for business applications. The possibility of remote desktop screen access is studied, and measurements proving its feasability for hosted wireless application service provision are made. Emerging mobile Java technologies are discussed as an efficient platform for providing ubiquitous, device independent end-to-end solutions. As one of the recommended strategies, this thesis introduces the concept of hybrid thickness client applications as a feasible solution for migrating from current middleware solutions to an (uncertain) future of native, thick terminal applications, within a scope of two years. Based on this concept, a prototype for a 3G smartphone application was developed as an example. A set of possible strategic scenarios is presented and discussed. This thesis also discusses operator differentiation and business solutions in an all-IP based world. 3G networks and handset devices will introduce a large number of new applications and business opportunities, but such a change will also introduce new challenges and risks. The migration challenge is being illustrated in the case of Smartner, a mobile middleware solution provider focusing on business applications. As shown by this case, compared to current enabling solutions, a major shift in technologies is seen as needed, in order to maintain long-term success. / Mobila affärssystem bildar ett av de mest attraktiva marknadssegment inom mobila informationstjänster. Den tredje generationens mobila kommunikationssytem (3G) kommer att bli ett viktigt steg fram mot konvergensen mellan telekommunikationsoch datakommunikationsindustrin. Särskilt konvergensen som äger rum mellan mobila teknologier och Internet erbjuder utmanande möjligheter för framtida applikationer och lösningar. De flesta nuvarande företag och tjänster inom mobilbranschen kan dock snarast betraktas som ett bidrag till denna konvergens. Många av de nuvarande idéerna och lösningarna är nämligen baserade på avgränsningar och problem som uppstår vid kombination av mobila system med Internet-baserade tjänster. I framtiden, när mobila nät har vuxit ihop med Internet till en symbios, kommer det inte längre att vara möjligt att förtjäna på detta slag av lösningar. En konkret lösning är det mobila middleware-konceptet, som bildar en logisk koppling mellan mobila teknologier och Internet-världen. Detta examensarbete studerar middleware-konceptet från en 3G-orienterad synvinkel och framför strategiska råd för företag som erbjuder detta slag av tjänster. En detaljerad diskussion om utvecklingen efter 3G presenteras. Arbetet lägger fram alternativa lösningar och strategiska implikationer deriveras. Implikationerna är motiverade bl.a. av en intervjuunders ökning som utfördes i samband med detta arbete. Temat trådlös datasynkronisering diskuteras som ett exempel för provisorisk middleware. Mobila filsystem införs som en intressant möjlighet för affärsapplikationer. Diverse möjligheter för fjärrkontroll av en arbetsplatsstation studeras och mätningar bevisar deras genomförbarhet för trådlösa applikationstjänster. Framträdande mobila Java-teknologier analyseras och presenteras som ett efficient underlag för plattformoberoende end-to-end-lösningaröver lag. En av de rekommenderade strategierna är baserad på det hybrida klientkonceptet, vilket presenteras som en realistisk lösning förövergången från nuvarande middleware-system till en (osäker) framtid av nativa, tjocka terminalapplikationer. Den strategiska horisonten för detta är två år. Utgående från detta koncept utvecklades en prototyp som exempel för en sådan applikation. Arbetet definerar och diskuterar dessutom diverse strategiska scenarier. Slutligen nämns problematiken om operatörernas framtida differentieringsmöjligheter och rollen av affärssystem i en fullständigt IP-baserad värld. 3G nät och terminaler kommer att skapa ett stort antal nya användningar och affärsmöjligheter, men ändringen kommer också att medföra nya utmaningar och risker. Detta illustreras med hjälp av företaget Smartner som exempel för en leverant ör av mobila middleware-lösningar för affärsanvändningar. Som demonstrerat i detta fall, anses i jämförelse med nuvarande applikationslösningar en signifikant teknologisk reorientering vara nödvändig, för att bevara ett långvarigt perspektiv. / Langattomat yrityssovellukset ovat nykyään yksi kiinnostavimmista mobiilimarkkinoiden segmenteistä. Kolmannen sukupolven (3G) mobiilit viestintäjärjestelmät tulevat olemaan merkittävä askel kohti telekommunikaatioja dataliikennealojen yhdistymist ä (ns. konvergenssia). Itse asiassa mobiiliteknologian ja Internetin lähentyminen mahdollistaa entistä hyödyllisempien mobiilisovellusten ja -ratkaisuiden rakentamisen tulevaisuudessa. Tällä hetkellä useat mobiiliyritykset ja mobiilisovellusten tuottajat ovat kuitenkin osana tätä yhdistymisprosessia. Monet nykyiset ideat ja ratkaisut ottavat nimittäin lähtökohdakseen rajoitukset, joita nykyiset tietoliikenneverkot asettavat yhdistyessään Internet-pohjaisiin palveluihin. Tulevaisuudessa, kun mobiiliverkot ja Internet ovat yhdistyneet, ei ole enää mahdollista ansaita rahaa tällaisten perinteisten ratkaisuiden avulla. Yksi konkreettinen ratkaisumalli perustuu mobile middleware -käsitteeseen, joka liittää yhteen mobiiliteknologian ja Internetin. Tässä diplomityössä tutkitaan middleware- käsitettä yrityssovellusten tarjoamisessa erityisesti 3G-verkoissa, ja työssä esitellään strategisia suosituksia näiden sovelluspalveluiden tarjoajille. Työssä käyd ään perusteellisesti läpi kolmannen sukupolven jälkeistä kehitystä. Vaihtoehtoisia ratkaisuja esitellään, ja joitakin strategisia vaikutuksia tuodaan myös esille. Vaikutuksia perustellaan tuloksilla, joita tämän projektin osana tehty kysely paljasti. Tiedon langatonta synkronisointia tarkastellaan esimerkkinä tilapäisestä middlewaresta. Mobiileihin tiedostojärjestelmiin liittyvät asiat nähdään mielenkiintoisena mahdollisuutena yrityssovelluksille. Toimistojärjestelmien etäkäyttömahdollisuuksia on tutkittu ja niiden sopivuutta langattomaan sovellustarjontaan on mitattu. Kehittyviä mobiileja Java-teknologioita pidetään tehokkaana alustana, jonka avulla voidaan tarjota kaikkialla saatavilla olevia, päätelaiteriippumattomia ratkaisuja loppuasiakkaille. Yhtenä suositelluista strategioista tämä diplomityö esittelee yksinkertaisen päätelaitesovellusmallin, jonka avulla nykyisistä middleware-ratkaisuista voidaan siirtyä tulevaisuuden kehittyneempiin päätelaiteratkaisuihin kahden vuoden sisällä. Tähän konseptiin perustuen työssä on kehitetty esimerkki 3G-älypuhelimen sovelluksesta. Lisäksi esitellään ja arvioidaan mahdollisia strategisia skenaariovaihtoehtoja. Tämä diplomityö käsittelee myös operaattoreiden differointimahdollisuuksia ja yrityssovelluksia täysin IP-pohjaisissa verkoissa. 3G-verkot ja -päätelaitteet tuovat mukanaan laajan valikoiman uusia sovelluksia ja liiketoimintamahdollisuuksia, mutta tämä muutos merkitsee myös uusia haasteita ja riskejä. Tätä haastetta kuvataan tutkimuksen esimerkkiyrityksen Smartnerin tapauksessa, joka on yrityssovelluksiin fokusoitunut mobiilien middleware-ratkaisuiden tarjoaja. Tutkimus tuo esille, miten Smartnerin nykyiset sovellukset huomioon ottaen tarvitaan valtava teknologinen suunnanmuutos pitkäaikaisen perspektiivin säilyttämiseksi.

Page generated in 0.0666 seconds