• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 27
  • 27
  • 10
  • 7
  • 6
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Matematické a statistické metody pro podporu vývoje softwarových aplikací / Mathematical and Statistical Methods as Support of the Development of Software Applications

Kulišťák, Martin January 2018 (has links)
This master´s thesis deals with rating of financial situation of selected company using financial analysis and statistical methods. The thesis is divided into theoretical part where I focus on economics indicators with time lines and regression analysis. The next part is analytics part, which uses the acquired theoretical knowledge. It also includes calculations for individual indicators. The third part summarizes achieved results, makes recommendations for the company and show created program for the purpose of this thesis and its next use by the company.
22

A Study Analyzing Five Instructional Methods for Teaching Software to Junior High Students

Bartholomew, Scott Ronald 20 June 2011 (has links) (PDF)
If you ask 5 different teachers what the best way to teach a new technology to a student is you will get 5 different answers. (Bork, 2001; Cheong, 2008; Egal, 2009; Howell, 2001) What is the best way to teach a new computer software application to a student? In the technological world we live in today the effective transfer of technological knowledge is paramount. With varying opinions even among the leaders of national technology teacher associations (Haynie, 2005) there is a large level of ambiguity in relation to best practices in technology teaching. This study evaluates five commonly used methods of software application instruction used in technology classrooms. Students and teachers were questioned regarding the effectiveness and frequency of use of each of the instructional methods. Students were also instructed using five commonly used methods of instruction. Student's work was graded and average grades for each method of instruction were obtained. Key findings include: 1 - Students perceive book learning to be the most effective method of instruction for themselves and for their classmates. 2 - Teachers perceived direct instruction as the most effective method of instruction and book learning as the least effective method of instruction. 3 - Although students reported book learning as the most effective method of instruction those receiving direct instruction received the highest grades.
23

Tvorba softwarové podpory metody CCPM v prostředí MS Project / Development of software support for CCPM method in MS Project

Herout, Jan January 2009 (has links)
Project management, to which the thesis "Development of software support for CCPM method in MS Project" aims, is a very important part of everyday life for most present companies. The project management has gone through rapid development, through the second half of last century, during which many new techniques and methods, for planning and managing projects, were developed. One of these methods was critical chain project management method (CCPM), developed by E. M. Goldratt in the mid 80th of last century. At the end of the 20th century the market began to be flooded by software applications which supported project management, thanks to the boom of information and communication technologies. Because the CCPM method is still too young, there is only a very little amount of products aimed at this method. Author of the thesis took as its main objective the development of a software application that would serve to support the project management by CCPM method, and will work as an extension to an existing, widely used product, MS Project. To achieve this objective, few secondary objectives have to be met. The first is to characterize methods for project management with a focus on the critical chain project management method, including the description of the advantages and disadvantages of this method. These objectives will be achieved with the help of literature search, supplemented by knowledge gained by studying the issue at the college. Another secondary objective is to find, analyze and compare existing software used for project management support with CCPM method. For the primary analysis the author mainly uses information supplied by developers of these products, for the deeper analysis is used a model project that examines the behavior of the application in standard situations. For product comparison is made a group of criteria, which can also serve for potential readers as the basis for decision of the choice of suitable application for their needs. The main objective of the work, the development of the application, is based on the requirements set on the basis of information obtained from literature and on the results from testing of existing applications. This application is considered to be the greatest benefit of the thesis. In the end of the thesis the newly developed application is compared with existing products, by testing on a model project and by evaluating with a group of criteria established for evaluation of existing products.
24

Softwarová aplikace pro posouzení vybraných ukazatelů / oftware Application for Assessment of Selected Indicators

Švestka, Milan January 2019 (has links)
The diploma thesis deals with the creation of software application for XYZ company, which is used to evaluate the situation of the company using selected financial indicators and statistical methods. The financial statements of the company for the period from 2011 to 2017 are used for evaluation. Based on the problems facing the company, measures will be proposed to improve the company‘s current situation.
25

Analýza informačních zdrojů pro rozvoj softwarových aplikací v prostředí grafického průmyslu / Analysis of Information Sources for Development of Software Application for Printing Industry

Urbánek, Matyáš January 2011 (has links)
Diploma work is targeted on analysis and description of information sources for software application and management information systems in printing industry. At first information needs and information overloading are shortly defined. Next are descripted concepts of printing industry, software for printing industry and relatives concepts of management information systems and workflow systems. In next chapter keywords for information retrieval was arranged in hierarchical tree structures. Core specialised journals and usefull information sources were found within information retrieval. In work are involved both deep web sources and surface web information sources. Found information object are descripted and cited by ISO 690. At the end of work are given categorised bibliographic lists and simple web page project for specialised information portal.
26

Satutory limitation of liability of internet service providers in decentralized peer to peer file sharing

Popoola, Olumuyiwa Oluwole 02 1900 (has links)
A study is done on the protection of sound recordings in the decentralized peer-to-peer (DP2P) file sharing in the United States, the United Kingdom and South Africa. This study reveals that because sound recordings have unique features different from other copyright works, the illegal sharing of sound recordings can ordinarily be filtered, identified, and detected by the Internet service providers (ISPs) before granting access to users and without infringing the users‟ right to privacy. However, the ISPs have failed in this regard, hence, they are strictly held liable under the contributory, vicarious and inducing infringements notwithstanding the statutory law which prohibits ISPs from monitoring, and intercepting their networks. In fact and law, the terms filtering, identifying and detecting on the one hand and monitoring and intercepting on the other hand are different in relation to sound recordings and as such ISPs are not prohibited from filtering, identifying and detecting illegal sound recordings on their networks, thus, ISPs are not protected under the limitation law as it is generally believed. However, several recommendations are made for reform, inter alia: a review of the limitation law to include the terms filtering, identifying and detecting in pursuance of the terms monitoring, and intercepting, if the intention of the legislators was meant to include the latter terms; protection of access right in digital sound recordings, protection of the neighbouring rights of ISPs in the digital world, imposing levies on all recording equipment, the insurability of sound recordings and ISPs‟ signals, and bandwidth. / Mercentile Law / LL. M. (Mercantile Law)
27

Statutory limitation of liability of internet service providers in decentralized peer to peer file sharing

Popoola, Olumuyiwa Oluwole 02 1900 (has links)
A study is done on the protection of sound recordings in the decentralized peer-to-peer (DP2P) file sharing in the United States, the United Kingdom and South Africa. This study reveals that because sound recordings have unique features different from other copyright works, the illegal sharing of sound recordings can ordinarily be filtered, identified, and detected by the Internet service providers (ISPs) before granting access to users and without infringing the users‟ right to privacy. However, the ISPs have failed in this regard, hence, they are strictly held liable under the contributory, vicarious and inducing infringements notwithstanding the statutory law which prohibits ISPs from monitoring, and intercepting their networks. In fact and law, the terms filtering, identifying and detecting on the one hand and monitoring and intercepting on the other hand are different in relation to sound recordings and as such ISPs are not prohibited from filtering, identifying and detecting illegal sound recordings on their networks, thus, ISPs are not protected under the limitation law as it is generally believed. However, several recommendations are made for reform, inter alia: a review of the limitation law to include the terms filtering, identifying and detecting in pursuance of the terms monitoring, and intercepting, if the intention of the legislators was meant to include the latter terms; protection of access right in digital sound recordings, protection of the neighbouring rights of ISPs in the digital world, imposing levies on all recording equipment, the insurability of sound recordings and ISPs‟ signals, and bandwidth. / Mercentile Law / LL. M. (Mercantile Law)

Page generated in 0.0975 seconds