Dissertations / Theses on the topic 'Shard key'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 32 dissertations / theses for your research on the topic 'Shard key.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Даценко, Сергій Олександрович. "Програмні засоби підвищення продуктивності роботи СУБД MongoDB." Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26713.
Full textActuality of theme. To date, MongoDB is a database, often used in the development of systems focused on the processing of poorly structured data. One reason for this is the ability to use horizontal scaling (shading) and data distribution settings, which greatly affects the performance of the system as a whole. Therefore, various strategies for data splitting in the cluster were developed, such as: a burning house strategy, hot spots strategy, and so on. These strategies have their own applications, their advantages and disadvantages, but the general disadvantage of these strategies is the uneven distribution of data in the presence of so-called "jumbo chunk", which in turn affects the performance of the system. The object of the study is the distribution of data between servers in the MongoDB cluster. The subject of the study is software tools to improve the performance of the MongoDB database, which are designed to configure the distribution of data in accordance with the permissible percentage loads of nodes of the cluster, taking into account the influence of "jumbo chunks". The purpose of the work: to increase the productivity of the DBMS MongoDB. Scientific novelty: 1. A data-sharing approach is proposed that incorporates the ideas of existing approaches and, unlike existing approaches, takes into account the possibility of having "jumbo chunks" when distributing data. 2. A comparative analysis of the proposed approach with existing ones is made, it is determined in what situations it is necessary to use this approach of approach, its advantages and disadvantages in comparison with existing approaches of data distribution. The practical value of the results obtained in the work is that the proposed approach provides the possibility of adjusting the distribution of data in accordance with the permissible percentages of nodes of the cluster, taking into account the influence of "jumbo chunks". In addition, the software developed in the work can be used to implement automated data distribution with the specified settings. Test work. The proposed approach was presented and discussed at the scientific conference of undergraduates and postgraduates "Applied Mathematics and Computing", PMK-2018 (Kyiv, November 14-16, 2018) and at the V International Scientific and Technical Internet Conference "Modern Methods, Information, software and technical support of control systems for organizational, technical and technological complexes", held on November 22, 2018 at the National University of Food Technologies. Structure and scope of work. The master's thesis consists of an introduction, four chapters and conclusions. The introduction gives a general description of the work, assesses the current state of the problem, substantiates the relevance of the research direction, formulates the purpose and objectives of the research, shows the scientific novelty of the results obtained. The first chapter examines the existing approaches to data distribution, their features, disadvantages and advantages, and discusses different implementations. The second chapter proposes a data-sharing approach that addresses the problem identified. The third chapter, algorithmic features of implementation of the developed software tools for implementation of the proposed approach are presented. The fourth chapter presents the results of testing the proposed approach. The conclusions are the results of the work. The master's dissertation is presented on 80 sheets, contains a link to the list of used literary sources.
Актуальность темы. На сегодняшний день MongoDB является СУБД, которая часто используется при разработке систем, ориентированных на обработку слабо структурированных данных. Одной из причин этого является возможность использования горизонтального масштабирования (шардингу) и настройки распределения данных, что в значительной мере влияет на производительность работы системы в целом. Поэтому были разработаны различные стратегии распределения данных в кластере, такие как: стратегия горящего дома, стратегия горячих точек и тому подобное. Данные стратегии имеют свои области применения, свои преимущества и недостатки, но общим недостатком данных стратегий является неравномерное распределение данных при наличии так называемых «джамбо-чанков», что в свою очередь влияет на производительность работы системы. Объектом исследования является распределение данных между серверами в кластере MongoDB. Предметом исследования являются программные средства для повышения производительности работы СУБД MongoDB, которые предназначены для настройки распределения данных в соответствии с допустимых процентных нагрузок узлов кластера, учитывая влияние «джамбо-чанков». Цель работы: повышение производительности работы СУБД MongoDB. Научная новизна: 1. Предложен подход распределения данных, который включает в себя идеи существующих подходов и, в отличие от существующих подходов, при распределении данных учитывает возможность наличия «джамбо-чанков». 2. Выполнен сравнительный анализ предложенного подхода с существующими, определено в каких именно ситуациях нужно использовать данный подход, его преимущества и недостатки по сравнению с существующими подходами распределения данных. Практическая ценность полученных в работе результатов заключается в том, что предложенный подход предоставляет возможность настройки распределения данных в соответствии с допустимыми процентных нагрузками узлов кластера, учитывая влияние «джамбо-чанков». Кроме того разработанные в работе программные средства могут быть использованы для реализации автоматизированного распределения данных с заданными настройками. Апробация работы. Предложенный подход был представлен и обсужден на научной конференции магистрантов и аспирантов «Прикладная математика и компьютинг» ПМК-2018 (Киев, 14 - 16 ноября 2018) и на V Международной научно-технической Internet-конференции «Современные методы, информационное, программное и техническое обеспечение систем управления организационно-техническими и технологическими комплексами», которая проводилась 22 ноября 2018 в Национальном университете пищевых технологий. Структура и объем работы. Магистерская диссертация состоит из введения, четырех глав и выводов. Во введении представлена общая характеристика работы, произведена оценка современного состояния проблемы, обоснована актуальность направления исследований, сформулированы цели и задачи исследований, показано научную новизну полученных результатов. В первой главе рассмотрены существующие подходы распределения данных, их особенности, недостатки и преимущества, рассмотрены различные реализации. Во втором разделе предложено подход распределения данных который будет решать обнаруженную проблему. В третьем разделе приведены алгоритмические особенности реализации разработанных программных средств для реализации предложенного подхода. В четвертом разделе представлены результаты тестирования предложенного подхода. В выводах представлены результаты проведенной работы. Магистерская диссертация представлена на 80 листах, содержит ссылки на список использованных литературных источников.
Yan, Weiwei. "Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677.
Full textTomescu, Nicolescu Ioan Alin. "How to keep a secret and share a public key (using polynomial commitments)." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128298.
Full textThesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020
Cataloged from PDF of thesis.
Includes bibliographical references (pages 155-171).
Despite 40+ years of amazing progress, cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys public. For example, public-key encryption is secure only if each user (1) keeps his secret key out of the hands of the adversary and (2) correctly distributes his public key to all other users. This thesis seeks to address these two fundamental problems. First, we introduce communication-efficient, fully-untrusted append-only logs, which can be used to correctly distribute public keys. Our constructions have logarithmic-sized proofs for the two key operations in append-only logs: looking up public keys and verifying the log remained append-only. In contrast, previous logs either have linear-sized proofs or need extra trust assumptions. Our logs can also be used to secure software distribution and, we hope, to increase transparency in any institution that wants to do so. Second, we speed up threshold cryptosystems, which protect secret keys by splitting them up across many users. We introduce threshold signatures, verifiable secret sharing and distributed key generation protocols that can scale to millions of users. Our protocols drastically reduce execution time, anywhere from 2x to 4500x, depending on the scale. For example, at large scales, we reduce time from tens of hours to tens of seconds. At the core of most of our contributions lie new techniques for computing evaluation proofs in constant-sized polynomial commitments. Specifically, we show how to decrease the time to compute n proofs for a degree-bound n polynomial from O(n²) to O(n log n), at the cost of increasing proof size from O(1) to O(log n). Our techniques could be of independent interest, as they give rise to other cryptographic schemes, such as Vector Commitments (VCs).
by Ioan Alin Tomescu Nicolescu.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Ehsan, ul Haque Muhammad. "Persistence and Node FailureRecovery in Strongly Consistent Key-Value Datastore." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121281.
Full textMunjid, Achmad. "Building a Shared Home: Investigating the Intellectual Legacy of the Key Thinkers of Inter-Religious Dialogue in Indonesia." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/290756.
Full textPh.D.
How does inter-religious dialogue in Indonesia transform and being transformed by the New Order authoritarian regime in the creation of a strong civil society and a religiously plural and democratic country? By discussing the politicization of religion and mobilization of religious communities by the New Order regime to fight against the Communists in the wake of the 1965 tragedy as the background, this dissertation seeks to analyze the anatomy of inter-religious relations in the country, including its historical roots, pivotal events, enduring issues and consequential development in the later period. The discussion is placed in a wider theoretical context on the role of religion in public life. Based on the analysis of topical biography, academic works, media reports and other reliable unpublished documents as the main sources, the dissertation investigates the intellectual legacy of four selected key thinkers in the field of inter-religious dialogue. It critically discusses the complex interplay between religion and politics in particular relation to such issues as religious pluralism, religious tolerance, exclusivism, human rights, freedom of religion, legal discrimination, and minority-majority relations. It highlights why and how the contesting discourse within a particular religious community about other group, between different religious communities, especially the Muslims and the Christians, as well as between religious communities and the regime move toward certain direction in particular context and then move towards the opposite direction in other context. Despite the wide spread conflict towards the end of the New Order regime and during the 2000s, the dissertation proved that inter-religious relations in Indonesia in general developed from antagonism to more dialogical relations over the period. The four selected key thinkers of inter-religious dialogue and their intellectual legacy demonstrated how religion could make fundamental contribution in the creation of democracy in a religiously plural society.
Temple University--Theses
Sontheimer, Christoph, and Benjamin Czubacki. "Shark Repellents : Predicting the Takeover-Likelihood by Means of Pre-emptive Anti-Takeover Provisions & Key Performance Indicators." Thesis, Umeå universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-157457.
Full textWarr, Dartanian Warr. "THE PROFESSIONAL DEVELOPMENT MINDSET:A KEY INGREDIENT IN THE DEVELOPMENT OF LEADERS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case15227478737613.
Full textSmith, Henry Mike. "A project to train a key leader group in the concept of shared ministry in Calvary Baptist Church, Meridian, Mississippi." Theological Research Exchange Network (TREN), 1991. http://www.tren.com.
Full textChakravarthy, Chinna Narayana Swamy Thrilok. "Combinational Watermarking for Medical Images." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5833.
Full textSchirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.
Full textWireless On-board diagnostics functionality, which is a future outlook to vehicle system
parameter analysis, enables measurements and controlling without the limitation of a physical
connector. Today every vehicle must by law provide the possibility to analyze engine and
emission related parameters (OBD II). The wireless connection requires a high security level
to prevent unauthorized communication establishment with the truck’s bus system. The aim
of the project is to make a survey of the available security mechanisms and to find the most
promising solutions. Furthermore, several usage scenarios and access right levels are
specified and a risk analysis of the whole system is made. The greatest challenge is the
specification and implementation of a proper key-exchange mechanism between the analyzing
device and the truck’s bus system, which is therefore carried out with the highest possible
level of awareness. Consequently several different concepts have been formulated based on
the different usage scenarios.
Vaníčková, Lucie. "Účetní servisní centra a hodnocení jejich výkonnosti." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-125066.
Full textDe, Morny Charl. "The role of management support and shared understanding of 20 keys for continuous improvement: an employee perspective." Thesis, University of the Western Cape, 2014. http://hdl.handle.net/11394/3899.
Full textThis study aimed to assess employee’s responses with regard to the implementation of a new workplace improvement programme. The purpose of this research was to focus on the understanding that could be gained about employee’s responses to organisational change using qualitative research
Bharath, Tati. "A framework to implement delegation in offline PACS : A strategy to restrict user’s path." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851.
Full textŠteinhüblová, Katarína. "Využití controllingu v centru sdílených služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-377975.
Full textCoulombel, Sylvain. "Exploration of NoSQL technologies for managing hotel reservations." Thesis, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-113602.
Full textThis thesis is submitted in the framework of a double degree between Compiègne University Of Technology (UTC) and Linköping University (LiU)
Lin, Jen-Chiun, and 林振群. "Secure and Efficient Group Key Management with Shared Key Derivation." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/30305954463165170460.
Full text臺灣大學
電機工程學研究所
96
In many network applications, including distance learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. A new key-tree-based group key management protocol with shared key derivation is proposed to securely and efficiently manage the group key. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The key derivation function can be easily constructed with secure hash functions, secure pseudo-random number generators, or one-way trapdoor functions. When the key derivation function and the key encryption function are secure, it is computationally infeasible for malicious users to collude to compute a key which is not granted by the protocol, and both backward group key secrecy and forward group key secrecy are guaranteed. The protocol reduces the computation and communication costs of group key rekeying, outperforms the other comparable protocols from our analysis and simulation, and is particularly efficient with binary key trees and asynchronous rekeying. With minor modification, the rekeying delay and the key size of the protocol can be tuned to meet different system needs.
Lin, Jen-Chiun. "Secure and Efficient Group Key Management with Shared Key Derivation." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1401200813591400.
Full textBrahmadevula, Kiran Kumar Pendse Ravindra. "Pre-shared key distribution protocol (PDP)." Diss., 2005. http://il.proquest.com/products_umi/dissertations.
Full text"December 2005." Title from PDF title page (viewed on April 22, 2007). Thesis adviser: Ravi Pendse. UMI Number: AAT 1436548 Includes bibliographic references (leaves 58-61).
Van, der Linde Tjaart Nicholaas. "Key success factors for the management of shared services." Thesis, 2012. http://hdl.handle.net/10210/5664.
Full textMoving from a traditional organisation to a shared services business unit through the shared services evolutionary continuum, and eventually to an independent business model requires a significant investment in technology, infrastructure, planning and time. Once committed, the process is as rigorous as planning and implementing a new business venture (Van Denburgh & Cagna, 2000). From the basic shared services model through to the independent business model, and during each other phase, the shared services business unit needs to be managed. The shared services business unit executive finds himself in the position of managing a business unit that: Is service orientated. Operates in an evolutionary process. Operates in a changing environment. Runs on business principles. Is an income generating business unit in its own right. Crosses national and international borders. Considers communication between business units as an ongoing process. Is customer and process-focused. Continuously improves and benchmarks business processes against the best. The leadership challenge is now to practise these business processes in a shared services environment, to make them successful and efficient and to add value to the organisation (Gunn, Carberry, Frigo & Behrens, 1993).
Chien, Shao-Yin, and 簡韶瑩. "A Public-Key Encryption Scheme for a Shared Message." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/15063827167127299125.
Full text國立交通大學
資訊科學與工程研究所
97
This paper proposed a public key encryption scheme for a shared message. The message is shared among storage servers such that the message can be encrypted into a ciphertext without leaking any information even if a given threshold of storage servers cooperate. This is especially suitable for the applications, for example, distributed storage systems. We present a non-interactive public key encryption scheme on a shared message and prove that it is semantically secure against malicious adversaries, under the Decisional Diffe-Hellman assumption. This is the first public key encryption performed on a shared plaintext. Our scheme is ecient and practical for large scale systems.
LIN, HSIU-CHIH, and 林秀織. "Directors’ and Supervisors’ Share Collateralization and Key Audit Matters." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/27z5cm.
Full text輔仁大學
會計學系碩士班
106
This study aims to examine the relation between the key audit matters and Directors’ Share Collateralization. The sample firms include Taiwan listed firms disclosing the key audit matters during 2016-2017. The empirical results show that there is a significant-positive correlation between the pledged shareholding ratio of the directors and supervisors and the key auditing matters comprehensive index. This means that the higher the pledged shareholding rate of the directors and supervisors, the higher the extent of disclosure of key audit matters in the new audit report. This study also conducts a number of sensitivity tests, including replacing the key auditing matters comprehensive index the item counts of key audit matters with the item counts and word counts of key audit matters, and electronic and non-electronic industry subsample tests. The empirical results of these sensitivity tests are similar to the main test.
Brahmadevula, Kiran Kumar. "Pre-shared key distribution protocol (PDP)-- FULL TEXT IS NOT AVAILABLE." Thesis, 2005. http://hdl.handle.net/10057/770.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
"December 2005."
FANG, SZU-YU, and 方思予. "Study of Electric Scooters Shared Service’s Key Factors and Big Data Analysis." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/78r8c6.
Full text國立中正大學
會計與資訊科技研究所
106
With the advent of the new economic era, the application of big data analysis has gradually become the trend of the times. In the new economy, the sharing service, which has been flourished development with the recent economic depression, has received the most attention. Although coordinating with current information technology and data analysis technology, the scope of the sharing service has been extended to the food, clothing, housing, traveling, education and music levels to bring a new and convenient lifestyle to the public, there is still lack of understanding of the shared service operating. Therefore, the problems that may be faced have not been comprehensively considered, there are many successful shared service operating cases, also many failure cases. At the same time, existing laws and related regulations are gradually difficult to cope with such different operating models, so this study is expected to explore the meaning of shared services. The connotation of the service operation mode, combined with the sharing service plan of electric scooters that the researchers participated in, proposed the electric scooters shared service’s key factors, and used big data analysis as an auxiliary mechanism for the operation of the project and spread to other fields. This study follows the concept of action research, participates in the electric scooters’ sharing service plan of National Chung Cheng University, and proposes a practical improvement policy based on this, or obtains a solution to the problem. First of all, through the literature to explore the meaning of the shared service model, and then focus on the electric scooters, further summarize the key factors of the sharing service model of electric scooters’. In the form of Delphi expert questionnaire, invite industry, official, and academic experts put forward their views and verified the 7 facets and 29 key factors of electric scooters’ sharing service model. The construction of this model not only enhances academic value, but also provides direction for the plan, so that it can be referenced and improved operational content. In addition, this study also analyzes the data obtained from the trial operation. Besides the user's immediate feedback in the communication software group and the satisfaction questionnaire issued, the data analysis of various types of digital data is also carried out to explore the problems and operational status that cannot be directly observed on the surface. By summarizing the problems faced, we will revalidate the importance of the proposed key factors and assist in the future formal operations.
Chen, Ying-Cun, and 陳映存. "Wiretap Channel with Shared Secret Key and Side Information at the Transmitter." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/45jx2b.
Full textHUNG, LI-FEN, and 洪麗芬. "A Study of Key Factors on Applying Share Start Teaching Method in Elementary School." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/3g9u2u.
Full text育達科技大學
資訊管理所
107
Twelve-year compulsory education proposes the vision of curriculum: “success of all children: talent development and lifelong learning”. Based on educational concepts “spontaneity, interaction and common good”, it leads to student-based, human management and teacher-diversity instructional strategies. In traditional education, students lose the competence of active learning, direct expression and independent thinking. Finally, with Sharestart instruction in flipped classroom, it results in positive outcomes on students’ “self-learning, thinking and expression” abilities. The key factors of Sharestart instruction not only change teachers’ instructional methods, but also inspire teachers in instructional practices to lead to teaching benefits for both teachers and students. This study aims to explore factors of Sharestart instruction introduced in elementary education. First, it reviews literatures, generalizes experts’ and scholars’ opinions, develops expert questionnaire by Delphi Method and invites present teachers of elementary schools to fill in the questionnaires. It conducts evaluation and analysis by Analytic Hierarchy Process and calculates weights and overall ranking of the key factors. According to research findings, among 4 major criteria, “teacher factor” is the indicator with the most effect. The second is “students’ psychological factor” and “learning capacity” and the last is “instructional method”; among 17 secondary criteria, “learning motivation”, “professional growth” and “confidence” are the most significant factors. The indicators of this study can serve as reference for teachers to implement Sharestart instruction. Keywords: flipped classroom, Sharestart instruction, Delphi Method, Analytic Hierarchy Process
Li, Kuan-Yi, and 李冠毅. "The study of Key Words advertisement related to industy market share form Google Trends analysis." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/71009233170144914894.
Full text樹德科技大學
資訊管理系碩士班
99
Due to the rapid development of the Internet today, any message can be fast and a lot of the Internet and related electronic products in circulation, making the search engine will not only become the world''s major consumer product information collection methods, has become the industry for advertising and marketing an important channel. This study aimed to the Internet for searching keyword marketing is analyzed, and Taiwan''s automobile industry, for example. Study architecture there is involvement of advertising, advertising awareness, search intentions, long tail ... and other research and analysis the correlation between the effect and impact. Of keywords and the correlation between sales; In addition, the intent of advertising involvement and the correlation between search and advertising is in between the media involved in the search intent will have a relevant impact between the results. Study information for the purchase of keyword advertising based automobile industry in Taiwan. The results will be available to later follow-up to promote the use of advertising keyword advertising keyword advertisers to think about the production direction.
Mogale, Nakampe Joseph. "‘Integration’ as a key concept in organization development : the case of Gauteng Shared Services Centre." Thesis, 2011. http://hdl.handle.net/10500/4197.
Full textPublic Administration
M.A. (Public Administration)
Lee, Lin Wen-Ling, and 李林玟伶. "A Study on the Key Influence Factors in the Shared Consumption of Boutique Products : Using Birkin Bags as an Example." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/keazj6.
Full text東方設計大學
文化創意設計研究所
107
Originating from Europe and the US, sharing economy has given rise to new consumption behaviors of sharing bicycles, cars, and many kinds of goods and services in daily life. Sharing economy has enabled people to enjoy higher living quality at lower costs with products and services they could not afford before. Sharing economy can also help to fulfill the fullest use of products/services and, consequently, reduce waste of resources. With sharing economy, the traditional concept of “exclusive ownership” over goods is being overthrown while the concept and values of shared consumption are being gradually accepted by society. The shared consumption of valuable goods such as boutique products has also emerged as a new industry. However, unlike the automobile or housing industries, it is not supported by a mature supply chain; therefore, it is more likely to have problems of disputes over product damage, compensation, and other issues. Customer complaints are one of the major impediments of the development of this new industry. Considering the growing popularity of sharing economy around the world and the potential benefits of shared consumption of boutique products, this study is conducted using the Delphi method and the analytical hierarchy process (AHP) to explore the key influence factors in the development of shared consumption of boutique products by focusing on the Birkin bags as an example. Hopefully, the findings of this study can help to provide references for the industry and also for the diverse development of green consumption.
YI, CHANG-CHI, and 易常騏. "A Study of Key Competencies Developments with Share-Start Approach to National Defense Education in A Senior High School Taoyuan City." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ckt325.
Full text萬能科技大學
資訊管理研究所在職專班
106
This study is to discuss the developments of key competencies with Share-Start approach to national defense education in a senior high school. The research method uses the pre- and post-test control group design method in the quasi-experimental design to carry out the experiment. In order to compare the Share-Start and narrative teaching methods, the subjects are divided into experimental group and control group. The participants in this study were two classes of students coming from first-year senior high school, who took “defense mobilization” in the national defense education curriculum. The experiment time lasted nine weeks with one lesson in a fifty-minute lecture per week. The Exam Questions for The National Defense Education and The Learning Effectiveness Scale of the National Defense Education Key Competencies are the quantitative research tools with statistical software for quantitative analysis. Two separate teaching approaches in terms of students’ performances in key competencies, namely, the creative and critical thinking, problem solving, teamwork, and communication skills are discussed and compared. The feedback questionnaires are collected for further qualitative analysis of the research purpose. The findings are listed as follows. 1. The stastical analysis of the post-test results has shown that after the two teaching methods have been adopted in comparison, there is a significant difference between the experimental group and the control group, who were homogenous in terms of their academic performance in national defense education in the beginning. Share Start is more effective in improving students’ learning performance than Didactic Teaching. 2. The stastical analysis also demonstrates that compared with the control group, students from the experimental group perform better with respect to creative and critical thinking, problem solving, teamwork, and communication skills, listed in the key competencies, whereas prior to the experiment, the two groups of students showed smiliar level proficiency of the aboved abilities. This indicates that Share Start is an effective approach in boosting students’ aformentioned key competencies. 3. The analysis of the feedback questionnaires shows that students prefer Share Start to Didactic Teaching, and during the learning process, Share Start enables them to reach concensus more easily and helps them learn how to embrace different opinions with understanding and respect. The research results are summarized into specific recommendations for the teaching of the national defense education and the development of students’ key competencies. Keywords:Share Start, Key Competencies, National Defense Education.
Chan, Tung-Loug, and 詹東龍. "The Study of Key Customer Management and Organization Change of Original Development Pharmaceutical Company–A case Study of Merck Sharp & Dohme Corporation,Taiwan Branch." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/20780800089101460353.
Full text國立中山大學
企業管理學系研究所
97
In today’s ever-changing, competitive business environment, professional managers are challenged with the aims of attracting target markets, establishing relationships, increasing competitiveness, and achieving objectives. The business must continually add value, create a long-term competitive advantage, and satisfy customer needs in order to maintain a position of leadership in the market. In opening Merck Sharp Dohme at a time when medical organizations are undergoing such global change, one must consider the relationship between the aim of the organization and the clients’ needs. In 2007, the “Key Customer Unit” was established, a new marketing approach (New Strategic Selling) was adopted, and the competitiveness of the organization was enhanced, a new method of managing the client base was created, which assisted the company in reaching its global objectives. This research paper used explorative research methods adopting qualitative and quantitative means of analysis, as well as on the spot investigation into internal operations of the “Key Customer Unit” of the Taiwanese branch of an American pharmaceutical factory. Through the implementation of KAM and CRM, research was conducted into the operation of the “Key Customer Unit”. Discussions were carried out into my degree of satisfaction with the achievement of company objectives. Discussions also touched upon my satisfaction with current policies, the operation of the “Key Customer Unit”, the results and cohesiveness of the “Key Customer Unit”, staff qualities, on the job competence as well as limitations. Conclusions of the thesis are listed below: 1. Solving on-the-spot problems for the “Key Customer Unit” as well as providing a platform for long-term cooperation. 2. The importance of the operation and cohesiveness of the “Key Customer Unit”, creating a plan for clients, and servicing clients. 3. Members dealing with the “Key Customer Unit” demonstrated experience, confidence, logic, and the ability to execute, delegate, and communicate effectively. 4. The ability to coordinate was the skill most valued by clients and staff. 5. Key reasons behind success of the “Key Customer Unit” was, choosing the right staff, systematic thought, professional management on the part of the client manager, coordination of resources, marketing activities, coordinating the duration of the client plan, as well as complete dedication to the task at hand. 5 key points developed from the conclusion: 1.The execution of MERCK’s 5 Ring policy aims at building motivation for the “Key Customer Unit” 2.Finding the right person to carry out the right steps is the cornerstone of success behind the “Key Customer Unit”. 3.The driving force behind the success of managing the “Key Customer Unit” is the Client Manager. 4.Opportune spending and proper use of resources is the most impressive result when managing the “Key Customer Unit”. 5.The key point to adding value to your “Key Customer Unit” is separation of customer teams to increase internal competitiveness.
Zaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications." Thesis, 2010. http://hdl.handle.net/10012/5532.
Full textWilson, Preethy. "Inter-device authentication protocol for the Internet of Things." Thesis, 2017. http://hdl.handle.net/1828/8139.
Full textGraduate
0544
0984
0537
pwilson1@uvic.ca