• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 474
  • 197
  • 186
  • 87
  • 50
  • 33
  • 10
  • 8
  • 8
  • 8
  • 7
  • 5
  • 5
  • 4
  • 4
  • Tagged with
  • 1310
  • 161
  • 138
  • 113
  • 104
  • 103
  • 99
  • 98
  • 96
  • 93
  • 81
  • 79
  • 78
  • 77
  • 73
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Analysing Complex Oil Well Problems through Case-Based Reasoning

Abdollahi, Jafar January 2007 (has links)
<p>The history of oil well engineering applications has revealed that the frequent operational problems are still common in oil well practice. Well blowouts, stuck pipes, well leakages are examples of the repeated problems in the oil well engineering industry. The main reason why these unwanted problems are unavoidable can be the complexity and uncertainties of the oil well processes. Unforeseen problems happen again and again, because they are not fully predictable, which could be due to lack of sufficient data or improper modelling to simulate the real conditions in the process. Traditional mathematical models have not been able to totally eliminate unwanted oil well problems because of the many involved simplifications, uncertainties, and incomplete information. This research work proposes a new approach and breakthrough for overcoming these challenges. The main objective of this study is merging two scientific fields; artificial intelligence and petroleum engineering in order to implement a new methodology.</p><p>Case-Based Reasoning (CBR) and Model-Based Reasoning (MBR), two branches of the artificial intelligence science, are applied for solving complex oil well problems. There are many CBR and MBR modelling tools which are generally used for different applications for implementing and demonstrating CBR and MBR methodologies; however, in this study, the Creek system which combines CBR and MBR has been utilized as a framework. One specific challenging task related to oil well engineering has been selected to exemplify and examine the methodology. To select a correct candidate for this application was a challenging step by itself. After testing many different issues in the oil well engineering, a well integrity issue has been chosen for the context. Thus, 18 leaking wells, production and injection wells, from three different oil fields have been analysed in depth. Then, they have been encoded and stored as cases in an ontology model given the name Wellogy.</p><p>The challenges related to well integrity issues are a growing concern. Many oil wells have been reported with annulus gas leaks (called internal leaks) on the Norwegian Continental Shelf (NCS) area. Interventions to repair the leaking wells or closing and abandoning wells have led to: high operating cost, low overall oil recovery, and in some cases unsafe operation. The reasons why leakages occur can be different, and finding the causes is a very complex task. For gas lift and gas injection wells the integrity of the well is often compromised. As the pressure of the hydrocarbon reserves decreases, particularly in mature fields, the need for boosting increases. Gas is injected into the well either to lift the oil in the production well or to maintain pressure in the reservoir from the injection well. The challenge is that this gas can lead to breakdown of the well integrity and cause leakages. However, as there are many types of leakages that can occur and due to their complexity it can be hard to find the cause or causal relationships. For this purpose, a new methodology, the Creek tool, which combines CBR and MBR is applied to investigate the reasons for the leakages. Creek is basically a CBR system, but it also includes MBR methods.</p><p>In addition to the well integrity cases, two complex cases (knowledge-rich cases) within oil well engineering have also been studied and analysed through the research work which is part of the PhD. The goal here is to show how the knowledge stored in two cases can be extracted for the CBR application.</p><p>A model comprising general knowledge (well-known rules and theories) and specific knowledge (stored in cases) has been developed. The results of the Wellogy model show that the CBR methodology can automate reasoning in addition to human reasoning through solving complex and repeated oil well problems. Moreover, the methodology showed that the valuable knowledge gained through the solved cases can be sustained and whenever it is needed, it can be retrieved and reused. The model has been verified for unsolved cases by evaluating case-matching results. The model gives elaborated explanations of the unsolved cases through the building of causal relationships. The model also facilitates knowledge acquisition and learning curves through its growing case base.</p><p>The study showed that building a CBR model is a rather time-consuming process due to four reasons:</p><p>1. Finding appropriate cases for the CBR application is not straightforward</p><p>2. Challenges related to constructing cases when transforming reported information to symbolic entities</p><p>3. Lack of defined criteria for amount of information (number of findings) for cases</p><p>4. Incomplete data and information to fully describe problems of the cases at the knowledge level</p><p>In this study only 12 solved cases (knowledge-rich cases) have been built in the Wellogy model. More cases (typically hundreds for knowledge-lean cases and around 50 for knowledge-rich cases) would be required to have a robust and efficient CBR model. As the CBR methodology is a new approach for solving complex oil well problems (research and development phase), additional research work is necessary for both areas, i.e. developing CBR frameworks (user interfaces) and building CBR models (core of CBR). Feasibility studies should be performed for implemented CBR models in order to use them in real oil field operations. So far, the existing Wellogy model has showed some benefits in terms of; representing the knowledge of leaking well cases in the form of an ontology, retrieving solved cases, and reusing pervious cases.</p>
342

Grounds for Group-Differentiated Citizenship Rights : The Case of Ethiopian Ethnic Federalism

Daka, Getahun Dana January 2009 (has links)
<p> </p><p><em>The universal citizenship rights can not protect the interests of national minorities by systematically excluding them from social, economic and political life. It does this by denying national minorities access to their own societal cultures-a choice enabling background conditions. In order to enable meaningful choice, such cultures needs to be developing. The societal cultures of national minorities will, instead of being a living and developing ones, be condemned to an ever-increasing marginalization if the state follows a hands off approach to ethnicity. Thus the state must give a positive support to national minorities to help them develop their cultures in their own homeland. This can be done by drawing the boundary of the state in such a way that the ethnic minority can constitute a local majority to form a nation, and thus can be entitled to group-differentiated citizenship rights. This inevitably creates mutual-indifference among various nations, and seems to threaten the territorial integrity of the state. But as far as the multinational federation is the result of voluntary union of nations, though the social tie among these nations is weaker than the one found in a nation-state, it can nonetheless be enduring.</em></p><p>                              </p>
343

Professional Integrity and the Dilemma in Physician-Assisted Suicide (PAS)

Echewodo, Christian Chidi January 2004 (has links)
<p>There is no stronger or more enduring prohibition in medicine than the rule against the killing of patients by doctors. This prohibition is rooted in some medical codes and principles. Out standing among the principles surrounding these prohibitions are the principles of beneficence and non-maleficience. The contents of these principles in a way mark the professional integrity of the physician. But the modern approach to health care services pulls a demand for the respect of the individual right of self-determination. This demand is now glaring in almost all the practices pertaining to health care services. In end of life decisions, this modern demand is found much in practices like physician- assisted suicide and euthanasia. It demands that the physician ought to respect the wish and choice of the patient, and so, must assist the patient in bringing about his or her death when requested. In such manner, this views the principle of autonomy as absolute and should not be overridden in any circumstance.</p><p>However, the physician on his part is part of the medical profession that has integrity to protect. This integrity in medical profession which demands that the physician works only towards the health care of the patient and to what reduces diseases and deaths often go contrary to this respect for individual autonomy. Thus faced with such requests by patients, the physician always sees his integrity in conflict with his demand to respect the autonomous choice of the patient and so has a dilemma in responding to such requests. This is the focus of this work,"Professional Integrity and the Dilemma in Physician- Assisted Suicide"</p><p>However, the centre of my argument in this work is not merely though necessary to develop general arguments for or against the general justification of PAS, but to critically view the role played by the physicians in assisting the death of their patients as it comes in conflict with the medical obligation and integrity. Is it morally right, out rightly wrong or in certain situation permissible that physicians respond positively to the request of the patients for PAS? This is the overarching moral problem in the morality of physician- assisted suicide, and this work will consider this in line with the main problem in the work “the dilemma of professional physicians in the assistance of suicide.</p>
344

Forensic Computing from a Computer Security perspective / Forensisk granskning av datorer ur ett datasäkerhetsperspektiv

Lázaro, Pablo García-Crovetto January 2004 (has links)
<p>This work contains a brief study about Forensic Computing problems done from a Computer Security perspective. </p><p>Based on the description and investigation methods of Forensic Computing, a list of common difficulties that forensic examiners have to deal with has been created. After making an analysis about each difficulty in the Forensic Computing field, it can be said that the main reasons are related to the legal restrictions and an incorrect security management. </p><p>Using a Computer Security perspective for analysing why the incorrect security management generates problems in the forensic computing field, we have made a risk analysis of a possible distribution for a correct security management. Later, based on own results, a list on priorities in prevention methods in t he Forensic Computing field has been created. </p><p>Finally it can be said that the difficulties in the Forensic Computing field could be avoided by creating awareness among users about the importance of taking prevention methods for protecting data and consequently for decreasing the number of e-crimes.</p>
345

Säkerhet och integritet i webbapplikationer : En orientering över säker utveckling / Security and Integrity in Web Applications : An orientation of safe development

Nordlander, Mikael, Martinsson, Fredrik January 2010 (has links)
<p>The use of Web applications is a growing area. While the possibilities and functionalities are increasing, so is the complexity of them, together with the threats against them because the complexity also opens up the application to vulnerabilities. It is therefore important for developers to know how a web application can be developed with security in mind.</p><p>This study’s intention has been to create an introductory documentation of what kind of techniques that exists which can produce higher security, which methods there can be within the development process and what to think about when programming secure web applications. In this paper we have investigated how theoretical manuals in the IT security department handles that area, and interviewed two developers from two different companies to see how they use security in their web applications.</p><p>The study has an exploratory technical perspective and does not explain how to practically use and interconnecting different security-enhancing technologies, but is more suppose to give a first glance at what is available and sow a seed for those interested to continue reading further about the subject. The results of the study was generated through comparison of the theoretical material with the empirical material, to then conclude the most prominent points of what are different and similar between those materials.</p><p>During the study some key points has been revealed for development: Responsibility for safety in the application lies, in the cases we looked at, with the developers to describe the technical possibilities and hence vulnerabilities when the client usually does not possess the same technical skills for that. The customer was, as the cases we studied, often not so proactive on safety and does not value it very high (if it was not a security-critical business such as being involved with defense technology). Because the customer in such cases didn’t put security as high priority, there existed a lack of motivation to spend extra money to combat threats that were not considered significant. In cases where extra recourses were spent on security, a measurement was developed that security should not cost more than the value of what it protects else the cost is unjustified. Finally it is noted that it is technically difficult to protect against human errors that can disarm the security, for example a simple or misplaced password.</p>
346

Restoring Consistency after Network Partitions

Asplund, Mikael January 2007 (has links)
<p>The software industry is facing a great challenge. While systems get more complex and distributed across the world, users are becoming more dependent on their availability. As systems increase in size and complexity so does the risk that some part will fail. Unfortunately, it has proven hard to tackle faults in distributed systems without a rigorous approach. Therefore, it is crucial that the scientific community can provide answers to how distributed computer systems can continue functioning despite faults.</p><p>Our contribution in this thesis is regarding a special class of faults which occurs whennetwork links fail in such a way that parts of the network become isolated, such faults are termed network partitions. We consider the problem of how systems that have integrity constraints on data can continue operating in presence of a network partition. Such a system must act optimistically while the network is split and then perform a some kind of reconciliation to restore consistency afterwards.</p><p>We have formally described four reconciliation algorithms and proven them correct. The novelty of these algorithms lies in the fact that they can restore consistency after network partitions in a system with integrity constraints and that one of the protocols allows the system to provide service during the reconciliation. We have implemented and evaluated the algorithms using simulation and as part of a partition-tolerant CORBA middleware. The results indicate that it pays off to act optimistically and that it is worthwhile to provide service during reconciliation.</p>
347

Projekt N10 : Projektsrapport

Simeon, Nika January 2007 (has links)
<p>DUE TO COPYRIGHT-RESTRICTIONS THIS PAPER IS NOT AVAILABLE FOR DOWNLOAD!</p><p>The thesis describes a system which communicates in real time with data loggers. The system has been streamlined and integrated with existing application so that each user can get a graphical presentation in real time on what has been sent to and from the units. The user interface and communication has been designed to be robust, user friendly, secure and offer functionality that yields the users of the system added value. The system is flexible from the design perspective and is low maintenance.</p>
348

Bemötande av äldre inom vården : En litteraturstudie

Jansson, Tomas, Olsson, Peter January 2009 (has links)
<p>Syfte med litteraturstudien var att beskriva bemötande av äldre människor inom vården utifrån de äldre vårdtagarnas, vårdgivarnas, observatörernas/anhörigas perspektiv. I en av dessa tre perspektiv representerade anhöriga tillsammans med observatörerna ett gemensamt perspektiv. En litteraturstudie gjordes och sexton vetenskapliga artiklar granskades och analyserades. Joyce Travelbee’s omsorgsteori (Interaktionsteori) var den teoretiska referensramen för studien. Resultatet visade att vårdgivarnas tillvaratagande av den äldre vårdtagarens autonomi bidrog påtagligt till upplevelsen av bemötandet, vårdtagarna uttryckte denna aspekt tydligast. Personalbrist var ett inbyggt fel i organisationen som påverkade bemötande. Alla tre perspektiv uttryckte detta problem tydligt. Vårdgivarnas egen förmåga att organisera och prioritera var av betydelse för upplevelsen av bemötande. Bemötandet påverkades när den äldre vårdtagarens önskemål nedprioriterades för rutiner. Nivån på vårdgivarnas empatiska förmåga påverkade upplevelsen av bemötandets kvalitet på olika sätt. Vården upplevdes som trygg när vårdgivare hade hög empatisk förmåga. Sammanfattningsvis var upplevelsen av bemötande att det var en förmåga till lyhördhet och en vilja att kommunicera, utförandet av dessa var i sin tur beroende av tid, personliga värderingar och invant beteende.</p>
349

Rätt person till rätt plats : En studie om hur personal rekryteras till behandlande organisationer i Örebro

Landberg, Lillmari, Bandgren, Malin January 2008 (has links)
<p>Known to be one of the most important resources, but also one of the most difficult ones to obtain, the workforce constitutes (consistence) the core of any organization. To find the right person for a particular position is not a trivial task. The recruitment of new staff members is important for any organization in general, but for treating organizations in particular. In order to provide the best service for its clients, it is, for a treating organization, vital to recruit nothing but highly qualified personnel. A well educated workforce can more easily stick to the treatment program and thus maintain treatment integrity. The purpose of this study is to examine how the recruitment process is executed by three treating organizations situated in the municipality of Örebro. Moreover the purpose is to evaluate the process in terms of strengths and weaknesses with the objective of pinpointing parts in the recruitment process in need of improvment. A theoretical framework capturing definitions and theories; treatment conditions, organization theory and the recruitment process. In order to answer the research questions, according to the study’s purpose, a qualitative method was adopted. The data sample ecompassed six personers: two managers and four group officers. The results in brief: The recruitment process of “Ungdoms- och familjeenheten” (the study’s delimit of treating organizations) in the municipality of Örebro has strengths as well as weaknesses. The major strength is the recruiter’s unanimous understanding for the importance of hiring a workforce holding a suitable education fulfilling all requirements. The major weakness is the recruitment process’s lack of a common structure (also read as action plan or policy). This might be due to the fact that recruiters rely on previous experiences.</p>
350

Anonymiteten i dagens kameraövervakade stad

Gustafsson, Camilla January 2007 (has links)
<p>Syftet är att ta reda på vad som menas med anonymitet i dagens kameraövervakade stad. Dentraditionella uppfattningen är att stadens karaktär är anonymitet och syftet är att ta reda på huranonymiteten ser ut idag när stadsmedborgarna är kameraövervakade. Studien är en begreppsutredning av anonymitet, och dess relaterade begrepp trygghet.Huvudsakligen används Simmels teori om storstaden och Foucaults teori om övervakning,men också teoretikerna Jane Jacobs och Mike Davis och deras syn på trygghet i staden så välsom en del andra källor. Jag kopplar Simmel och Foucault till anonymitetet och trygghet,tillämpat på dagens stad. Slutsatserna är att dagens stadsmänniska är både anonym och inte, beroende på hur man serdet. De som syns i kamerans blick är de som begår brott, medan de andra fortfarande äranonyma. Gällande tryggheten kan den uppnås genom ett levande folkliv. Det handlar om attmänniskor ska våga sig ut i staden och inte stänga in sig på grund av sin rädsla. Blir stadenöde så försvinner dess traditionella karaktär, det vill säga möjligheten till möten mellan olikamänniskor. Uppsatsen är uppdelad i fyra kapitel, varav det första är inledande, sedan följer enpresentation av de centrala teorierna. Det tredje kapitlet är ägnat åt att utveckla trygghetensoch tillitens begreppsmässiga mening i relation till samtida kameraövervakade städer. Detslutliga kapitlet drar slutsatsen att det inte finns någon inneboende spänning mellankameraövervakning och trygghet, men samtidigt finns det ingen garanti att en ökning avkameraövervakning kommer att resultera i ökad offentlig trygghet.</p>

Page generated in 0.0736 seconds