Tesi sul tema "Business protocol"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-46 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Business protocol".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol". Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.
Testo completoEslamichalandar, Maryam. "Web Service Composition Compatibility : adaptation in the presence of Business Protocol Evolution". Thesis, Paris, CNAM, 2013. http://www.theses.fr/2013CNAM0998/document.
Testo completoThe advent of Web service technologies in the paradigm of Service oriented architecture (SOA) enables dynamic and flexible interoperation of distributed business processes within and across organization boundaries. One of the challenges in working with heterogeneous and autonomous Web services is the need to ensure their interoperability and compatibility. The typical approach for enabling incompatible services to interact is service adaptation. The need for adaptation in Web services comes from the heterogeneity at the levels of service interface and business protocol. The service interface incompatibilities include service signature mismatches (e.g., message and operation name, number; the type of input/output message parameters of operations; and the parameter value constraint). The mismatches at the business protocol (or service behavior) level arise from the order constraints that services impose on messages exchanges (e.g., deadlock where both partner services are mutually waiting to receive some message from the other, and unspecified reception in which one service sends a message while the partner is not expecting it). In service interaction through adaptation, an adapter mediates the interactions between two services with potentially different interfaces and business protocols such that the interoperability is achieved, i.e., adapter compensates for the differences between their interfaces by data mappings, and between their business protocols by rearranging the messages exchanges or generating a missing message. In this dissertation, we focus on how to cope with the dynamic evolution of business protocol P of a given service (i.e., P is changed to P') that is adapted by an adapter in the context of service interaction. Web service specifications constantly evolve. For variety of reasons, service providers may change their business protocols. Therefore, it is important to understand the potential impacts of the changes arising from the evolution of service business protocol on the adapter.We present an approach to automatically detect the effects of business protocols evolution on the adapter and, if possible, to suggest fixes to update the specification of adapter on-the-fly. Besides, we propose a technique to verify the correctness of new adapter which is dynamically re-configured. Finally, we describe a prototype tool where experimentations show the benefits of proposed approach in terms of time and cost compared to the static methods aiming for complete regeneration of adapter or manual inspection and adaption of the adapter with respect to changes in the business protocols
Pelánová, Pavla. "Obchodní a diplomatický protokol Francie". Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-193029.
Testo completoMorrison, Charles Michael. "An investigation of network efficiency and control protocol issues for a configurable collaboration support system". Diss., The University of Arizona, 1992. http://hdl.handle.net/10150/185931.
Testo completoTycová, Tereza. "Specifika obchodního jednání v Číně". Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-206682.
Testo completoTreleaven, James Burris. "A protocol study of a complexity model of information acquisition from graphs and tables". Case Western Reserve University School of Graduate Studies / OhioLINK, 1990. http://rave.ohiolink.edu/etdc/view?acc_num=case1059052459.
Testo completoSchmidt, Robert. "What's Really Keeping the US from Joining the Kyoto Protocol. A Game Theoretic Empirical Analysis". Honors in the Major Thesis, University of Central Florida, 2006. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/994.
Testo completoBachelors
Business Administration
Business Economics
Echaiz, Moreno Daniel. "El protocolo familiar. La contractualización en las familias empresarias para la gestión de las empresas familiares". Instituto de Investigaciones Jurídicas de la UNAM, 2014. http://hdl.handle.net/10757/316346.
Testo completoThe family enterprises are a world phenomenon of great transcendency for the hight number of them, nevertheless they meet overwhelmed by the problem of the generational transition that, in many occasions, it marks the beginning of the end of the family enterprise
Kozlova, Tatjana, e Olga Tytarenko. "To buy and what to buy? : the study of consumer behaviour on the Internet". Thesis, Gotland University, Department of Business Administration, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-139.
Testo completoThe process that consumers go through while buying something is called consumer buying process and has been studied for a long time. Three stages of the Five-Stage Model (Kotler, 2006) provide a starting point for analysis in this paper and the reason of using this model is to make collected data more structured and easier for understanding. The purpose of this paper is to describe and analyze costumer buying process online.The method for data collection applied in this study is called “think-aloud” that means participants are verbalizing their screen activity and thoughts during the process of observation. The results of this research show that consumer buying process online is a complex process that is influenced by the amount and intensity of information received during the process as well as consumer knowledge and experience on the area of problem. The sequence of the stages proposed by the research model can vary depending on the preferences of consumer and readiness to make a decision.
Rana, Chirag N. "Enabling One-Phase Commit (1PC) Protocol for Web Service Atomic Transaction (WS-AT)". UNF Digital Commons, 2014. http://digitalcommons.unf.edu/etd/498.
Testo completoSmith, Curtis. "The Role of Feedforward-Enabled Predictive Analytics in Changing Mental Models". Diss., Temple University Libraries, 2018. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/492421.
Testo completoD.B.A.
One of the key determinants of an organization’s success is its ability to adapt to marketplace change. Given this reality, how do organizations survive or even thrive in today’s dynamic markets? The answer to this question is highly related to the adaptability of one of the organization’s key resource: its employees. Indeed, the central component of an organization’s success will depend on its ability to drive changes in the mental models of individual employees. Moreover, a critical facilitator of that will be the development of decision support tools that support change of those mental models. In response to this need there has been a tremendous growth in business analytic decision support tools, estimated to reach almost $200 billion in sales by 2019. The premise of this research is that these decision support tools are ill-suited to support true mental model change because they have focused on a feedback-enabled view and generally lack a predictive (feedforward-enabled) view of the likely outcomes of the decision. The purpose of this research is to study how changes in mental models can be facilitated through this feedforward mechanisms within the DSS tool. This research used a mixed method approach, leveraging the strengths of quantitative and qualitative research methodologies, to study this research question. The research showed that the feedforward-enabled DSS tool did create more mental model change and alignment (versus an ideal solution) compared to the control. The feedforward enabled tool also produced better alignment than the feedback-enabled decision support tool. In fact, the feedback-enabled decision support was shown to result in a poorer alignment with the ideal solution. This paper concludes by suggesting five areas for future research.
Temple University--Theses
Schoenfeld, Tara McKenzie. "Risky business: a regional comparison of the levels of risk and service needs of sexually offending youth". Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/3097.
Testo completoBabikian, Arziv, e Alexander Fagrell. "Identifying incentives & discouragements to understand how a Scope 3 boundary could be set : A case study on a metal processing company". Thesis, Luleå tekniska universitet, Institutionen för ekonomi, teknik och samhälle, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85266.
Testo completoGerard, Scott Neal. "Designing, Verifying, and Evolving Commitment-based Protocols for Business". Thesis, North Carolina State University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3575895.
Testo completoBusinesses today are facing increasing pressure to interoperate across multiple business partners. We address the design, verification, and evolution of business services in open environments. We approach the problem as an application of multiagent system concepts and techniques using protocols and commitments. We present an approach to the design and hierarchical composition of protocols that treats protocols as first-class entities, and explicitly addresses role-specific responsibilities and accountabilities. We propose a definition of protocol refinement between a putative subprotocol and a putative superprotocol. To address the evolution of protocol requirements, we describe an interaction architecture and a library of automated, interaction refactorings. We demonstrate these approaches via realistic applications from the insurance, manufacturing, healthcare, and software development domains.
Musaraj, Kreshnik. "Extraction automatique de protocoles de communication pour la composition de services Web". Thesis, Lyon 1, 2010. http://www.theses.fr/2010LYO10288/document.
Testo completoBusiness process management, service-oriented architectures and their reverse engineering heavily rely on the fundamental endeavor of mining business process models and Web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. Our preliminary study shows that : (i) a minority of interaction data is recorded by process and service-aware architectures, (ii) a limited number of methods achieve model extraction without knowledge of either positive process and protocol instances or the information to infer them, and (iii) the existing approaches rely on restrictive assumptions that only a fraction of real-world Web services satisfy. Enabling the extraction of these interaction models from activity logs based on realistic hypothesis necessitates: (i) approaches that make abstraction of the business context in order to allow their extended and generic usage, and (ii) tools for assessing the mining result through implementation of the process and service life-cycle. Moreover, since interaction logs are often incomplete, uncertain and contain errors, then mining approaches proposed in this work need to be capable of handling these imperfections properly. We propose a set of mathematical models that encompass the different aspects of process and protocol mining. The extraction approaches that we present, issued from linear algebra, allow us to extract the business protocol while merging the classic process mining stages. On the other hand, our protocol representation based on time series of flow density variations makes it possible to recover the temporal order of execution of events and messages in the process. In addition, we propose the concept of proper timeouts to refer to timed transitions, and provide a method for extracting them despite their property of being invisible in logs. In the end, we present a multitask framework aimed at supporting all the steps of the process workflow and business protocol life-cycle from design to optimization.The approaches presented in this manuscript have been implemented in prototype tools, and experimentally validated on scalable datasets and real-world process and web service models.The discovered business protocols, can thus be used to perform a multitude of tasks in an organization or enterprise
Matsson, Erik, Gustav Dahllöf e Julius Nilsson. "Business to Business - Electronic Invoice Processing : A report on the challenges, solutions and outcomes for companies switching from manual to electronic invoice handling". Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-26793.
Testo completoModimogale, Lloyd. "ICT and SMEs’ competitiveness in South Africa : how SMEs could use ICT to become competitive in South Africa". Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/27585.
Testo completoDissertation (MIT)--University of Pretoria, 2008.
Informatics
unrestricted
Tuminas, Paulius. "Verslo B2B transakcijų realizavimas panaudojant BTP protokolą". Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080716_100515-15941.
Testo completoThis work aim is to create information systems (IS), which can implement B2B transaction by using the Business Transaction Protocol (BTP). IS has only 50 years history, but without IS we can’t imagine modern business company. Now computers are usable in most leading edge areas and theirs needs and power always grows. We use its in distance learning, organizing distance work (work-net), expeditiously developing electronic business, appointing a lot off attention to modernize medicine, new possibilities for electronic libraries. This work can be used in all mentioned regions implementing data exchange among computers regardless their actions in business. Many companies store data in database or data centers, so if we want to realize exchange data among computer – our programmers have to avail a lot of energy and workforce to realize exchange from remote systems or databases, especially, if some services and data are in different databases. This work can realize data exchange simplification, which executes data exchange from unlimited numbers of business companies. It uses well-known BTP protocol from OASIS consortium to exchange data. All needed data we get from business participants using standard SQL queries. Thus people which are asking for data – in this work we can offer to get data from different databases platforms. To access system in different programming languages, data are implemented into standard SOAP1.1 protocol - where they will be transported in XML document... [to full text]
Hayashida, Marchinares Augusto Enrique. "Business intelligence bajo plataforma IP versión 6 y su influencia en la gestión empresarial". Bachelor's thesis, Universidad Nacional Mayor de San Marcos, 2009. https://hdl.handle.net/20.500.12672/2380.
Testo completoDeterminar el grado de influencia que el Business Intelligence bajo plataforma IP versión6 ejerce en la Gestión empresarial. Además de realizar un analisis de IPv6 sobre redes inalámbricas y su desempeño con las aplicaciones que permiten el acceso a la información. Comparativos entre los protocolos IPv4 y/o IPv6. En base a estos estudios, se proponen una serie de recomendaciones para el modelado de aplicaciones, mismas que ayudan a obtener un mejor desempeño de ellas sobre las redes alámbricas e inalámbricas. Su enfoque está enmarcado en la importancia de la consecución, análisis y difusión de la información para producir inteligencia que ayude a las empresas en la toma de mejores decisiones, aunado a todo ello el avance tecnológico y la revolución de la redes de hoy y ello se obtiene con el aporte del Ipv6.
Determinar el grado de influencia que el Business Intelligence bajo plataforma IP versión6 ejerce en la Gestión empresarial. Además de realizar un analisis de IPv6 sobre redes inalámbricas y su desempeño con las aplicaciones que permiten el acceso a la información. Comparativos entre los protocolos IPv4 y/o IPv6. En base a estos estudios, se proponen una serie de recomendaciones para el modelado de aplicaciones, mismas que ayudan a obtener un mejor desempeño de ellas sobre las redes alámbricas e inalámbricas. Su enfoque está enmarcado en la importancia de la consecución, análisis y difusión de la información para producir inteligencia que ayude a las empresas en la toma de mejores decisiones, aunado a todo ello el avance tecnológico y la revolución de la redes de hoy y ello se obtiene con el aporte del Ipv6.
Tesis
Elabd, Emad. "Compliance of Web services over a high level specification". Thesis, Lyon 1, 2011. http://www.theses.fr/2011LYO10122/document.
Testo completoCurrently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
Du, Rong. "Secure electronic tendering". Queensland University of Technology, 2007. http://eprints.qut.edu.au/16606/.
Testo completoLaclau, Marie. "Jeux répétés en réseaux et communication". Phd thesis, HEC, 2012. http://pastel.archives-ouvertes.fr/pastel-00741919.
Testo completoPittendrigh, Alistair. "The potential impact of greenhouse gas emissions constraints on the Southern African primary aluminium business". Thesis, Stellenbosch : Stellenbosch University, 2006. http://hdl.handle.net/10019.1/50666.
Testo completoENGLISH ABSTRACT: The Kyoto protocol was signed early in 2005 whereby Annexure 1 industrialised countries committed to reducing their greenhouse gas (GHG) emissions. South Africa signed the Protocol. however being a developing country it has no GHG emissions reduction target for the first commitment period until 2012. Primary aluminium is a GHG intensive global commodity to which Southem Africa contributes significantly. This dissertation aims to investigate how the profitability of the Southern African primary aluminium sector may be affected by Kyoto Protocol GHG restrictions even though the smelters are situated in non-Annexure 1 countries. A Delphi-type survey is conducted to gather opinions on identified pressures and drivers that could affect the industry. The survey respondents indicate that the greatest impact will occur from internal pressures from holding companies. Further pressure will originate from external sources namely government, Non Governmental Organisations, shareholders and investors. Direct manufacturing costs are not expected to increase as a result of the Protocol. Rather. industry changes are expected to be the result of internal and external pressures. Opportunities for Clean Development Mechanism (COM) projects are rated as highly importance and are strongly recommended. Various strategies are identified and presented in a matrix to compare the effect of each on the various identified pressures and drivers. From the matrix it is observed that the majority of the selected strategies have a profound impact on the internal and external pressures. From this research report it is recommended that a cooperative proactive strategy be followed . focusing initially on low cost GHG emissions reduction projects and rigorously pursuing COM projects.
AFRIKAANSE OPSOMMING: Die Kyoto Protokol, waardeur Anneks 1 geindustraliseerde lande hul daartoe verbind het om hul kweekhuis gas (GHG) emissies te verminder, is vroeg in 2005 onderteken. Suidelike Afrika het die Protokol onderteken, maar weens sy status as ontwikkelende land, het dit geen GHG emissieverminderingsdoelwit vir die eerste verpligtingsfase tot en met 2012 nie. Primere aluminium is 'n GHG intensiewe globale kommoditeit waartoe Suidelike Afrika 'n groot bydrae lewer. Hierdie tesis poog om ondersoek in te stel na die impak van Protokol GHG beperkings op die winsgewendheid van die Suidelike Afrika primere aluminium sektor, ten spyle daarvan dat die smelters in nie-Annex 1 lande gelee is. 'n Delphi-tipe opname was geloods om opinies in te win oor geidentifiseerde drukpunte en drywers wat 'n impak kon he op die industrie. Die respondente het aangedui dat die grootste impak sal kom van interne druk van beheermaatskappye. Addisionele druk sal afkomstig wees van eksteme bronne soos die regering, Nie-regerings organisasies (NGO's), aandeelhouers en beleggers. Daar word nie verwag dat die direkte vervaardigingskoste sal eskaleer as gevolg van die Protokol nie. Daar word eerder verwag dat veranderinge in die industrie die gevolg sal wees van interne en eksterne druk. Geleenthede vir skoon-ontwikkelings meganisme (COM) projekte is geweldig belangrik en word sterk aanbeveel. Verskeie strategiee word geidentifiseer en voorgele in 'n matriks om sodoende 'n vergelyking te tref tussen die effek wat elk het op die onderskeie drukpunte en drywers. Uit die matriks kan afgelei word dat die meerderheid strategiee 'n diepgaande invloed het op die inteme en eksterne drukpunte. Hierdie navorsingsverslag beveel aan dat 'n samewerkende proaktiewe strategie gevolg word, wat aanvanklik sal fokus op lae-koste GHG emissieverminderingsprojekte, asook die nougesette najaag van CDM projekte.
Ponge, Julien Nicolas Computer Science & Engineering Faculty of Engineering UNSW. "Model based analysis of time-aware web services interactions". Publisher:University of New South Wales. Computer Science & Engineering, 2009. http://handle.unsw.edu.au/1959.4/43525.
Testo completoDobias, Ondrej. "Dolování procesů jako služba". Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-319183.
Testo completoBotshinda, Amelia. "Implementeringen av koldioxidsnåla och klimatpositiva benchmarks samt ESG-relaterad transparens i BMR : en kritisk granskning av kommissionens föreslagna ändringar av Benchmarkförordningen och dess förenlighet med de åsyftade ändamålen". Thesis, Linköpings universitet, Filosofiska fakulteten, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-165454.
Testo completoAlzahrani, Naif Saeed. "A Secure Anti-Counterfeiting System using Near Field Communication, Public Key Cryptography, Blockchain, and Bayesian Games". PDXScholar, 2019. https://pdxscholar.library.pdx.edu/open_access_etds/5038.
Testo completoBanaszewski, Roni Fabio. "Modelo multiagentes baseado em um protocolo de leilões simultâneos para aplicação no problema de planejamento de transferências de produtos no segmento downstream do sistema logístico brasileiro de petróleo". Universidade Tecnológica Federal do Paraná, 2014. http://repositorio.utfpr.edu.br/jspui/handle/1/822.
Testo completoO segmento downstream da cadeia de suprimentos da indústria brasileira de petróleo é composta por bases de produção (e.g. refinarias), armazenamento (e.g. terminais) e consumo (e.g. mercados consumidores) e modais de transportes (e.g. oleodutos, navios, caminhões e trens). O planejamento da transferência de derivados de petróleo nesta rede multimodal é um problema complexo e atualmente é realizado para um horizonte de três meses com base na experiência de profissionais e sem auxílio de um sistema computacional de apoio à decisão. Basicamente, o problema pode ser visto como uma negociação para alocação de recursos disponíveis (tais como derivados de petróleo, tanques e modais de transporte) pelas diferentes bases envolvidas que necessitam enviar ou receber derivados de petróleo. Na literatura, alguns problemas semelhantes, porém mais voltados para o planejamento de redes formadas por um único tipo de modal de transporte, têm sido tratados por diferentes abordagens, com predominância da programação matemática. Estes trabalhos ilustram a difícil tarefa de modelar grandes problemas por meio desta abordagem. Geralmente, tais trabalhos consideram apenas um curto horizonte de planejamento ou apenas uma parte do problema original, tal como uma parte da rede petrolífera brasileira, gerando limitações importantes para os modelos desenvolvidos. Devido às características do problema em estudo, o qual envolve toda a rede de transporte e apresenta perfil de negociação entre as diferentes entidades envolvidas, surge o interesse da utilização do paradigma de sistemas multiagente. O paradigma de agentes tem sido aplicado a problemas de diferentes contextos, particularmente em problemas de gerenciamento de cadeias de suprimentos devido à sua correspondência natural com a realidade e, em geral, em problemas que envolvem a competição por recursos por meio de mecanismos de negociação com base em leilões. Este trabalho apresenta um novo protocolo de negociação baseado em leilões e aplicação deste protocolo em forma de um modelo multiagente na resolução do problema de planejamento em questão. Os agentes que formam a solução representam principalmente os locais de produção, armazenamento, consumo e os modais de transporte na rede petrolífera brasileira. O objetivo destes agentes é manter um nível de estoque diário factível de cada produto em cada local por meio de transferências de produtos pela rede petrolífera brasileira com preferível redução do custo de transporte. Por fim, este trabalho apresenta a satisfação destes objetivos por meio de experimentos em cenários fictícios e reais da rede brasileira de petróleo.
The Brazilian oil supply chain is composed by oil refineries, consumer markets, terminals for intermediary storage and several transportation modals, such as pipelines, ships, trucks and trains. The transportation planning of oil products in this multimodal network is a complex problem that is currently performed manually based on expertise, for a period of three months, due to the lack of a software system to cover the problem complexity. Such problem involves the negotiation of available resources such as oil products, tanks and transportation modals between different sources and consumption points. Similar problems, but more directed to the planning of single modes of transportation, have been treated by different approaches, mainly mathematical programming. Such works illustrate the difficult task of modeling large problems with this mechanism. Generally, they consider a short horizon planning or only part of the original problem, such as a part of the network, rendering important limitations to the models developed. Due to the characteristics of the problem in study where the full network needs to be considered and there exists negotiation amongst the different entities involved, the usage of multi-agent models seems to be worth to explore. Such models have been applied in different contexts such as to supply chain problems due its natural correspondence with the reality. Furthermore, in problems involving competition for resources, multi-agents negotiation mechanisms based on auctions are commonly applied. Thus, this thesis presents one auction-based solution formed by the cooperation among agents for them to achieve their goals. The agents involved in the auctions represent mainly the production, storage and consumption locations. Their goal is to maintain a daily suitable inventory level for each product by means of transportation through the multimodal network at a low transport cost. Finally, this paper presents the satisfaction of these objectives through experiments on real and fictional scenarios of Brazilian oil network.
De, Klerk W. A. (Willem Abraham). "An investigation into the trading in emissions credits as a free market mechanism to curb global warming". Thesis, Stellenbosch : Stellenbosch University, 2002. http://hdl.handle.net/10019.1/49717.
Testo completoENGLISH ABSTRACT: One of the most topical and widely discussed factors which could lead to the ultimate end of life on earth is global warming and its devastating effects. Several current trends clearly demonstrate that global warming is directly impacting on rising sea levels, the melting of icecaps and other significant worldwide climatic changes. These climatic changes will have a profound effect on the economy of the world as well as having health and social consequences for humans on earth. It has also become evident that mankind has played a significant role in causing global warming through its excessive burning of fossil fuels and its deforestation activities. Mainstream economists have increasingly realised that the prime cause of environmental problems is the absence of markets and more specifically, the absence of private ownership, which provide the foundation for markets. This occurrence has also been described in the literature as the tragedy of the commons. Mankind has come to a point in its history whereby it is in great danger of causing its own annihilation through the destruction of its natural environment. As a result of this, world leaders and many industrialists have realised that it is essential that the world must do something to preserve the natural environment. This was the rationale behind the Kyoto Protocol. In Kyoto 38 industrial states undertook to reduce their total emissions of six important greenhouse gases by at least 5 percent by the period 2012 at the latest. It was agreed in Kyoto that the system to be used to curb global warming should be based on free market principles that would focus on limiting the tragedy of the commons. On this basis it was agreed that the international trade in greenhouse gas emission allowances might fulfil an important role in providing countries and companies with the capabilities to achieve part of their reduction obligations. The Kyoto mechanism was therefore designed on the basis of emissions trading, but also had an equity objective with respect to developing countries. Supporters of the trading scheme are of the opinion that this market will guarantee that certain emission targets are met. In principle, the international trade in emission credits offers several advantages in terms of a flexible and cost-efficient realisation of the reduction obligations undertaken at Kyoto. Supporters of emissions trading are also of the opinion that trading in these gases also has economic and technological benefits. The answer to global warming might be as simple as buy low, sell high conventions. Now greenhouse-gas emissions are becoming a commodity that can be bought and sold on a worldwide scale, just like gold or soybeans. It is expected that the trading in greenhouse-gas emission rights will ultimately constitute the largest commodities market in the world. An international market for greenhouse gas emission allowances is already developing. However, rules governing such transactions are not fully worked out yet. The 178-nation Kyoto Protocol on global warming may provide a start, despite the US's refusal to support the treaty. It will be the aim of this thesis to provide understanding in terms of the functioning of emissions trading schemes and therefore the Kyoto mechanism as a solution to this problem of global warming. It will also be an important objective of this thesis to provide insight into the issues applicable to climatic change and the Kyoto mechanism.
AFRIKAANSE OPSOMMING: Atmosfeerverwarming is wêreldwyd een van die mees bespreekte kwessies. Die nadelige effek van atmosfeerverwarming as gevolg van die toenemende kweekhuiseffek, het die potensiaal om tot die uiteindelike uitwissing van lewe op aarde te lei. Verskeie tendense dui daarop dat atmosfeerverwarming 'n direkte impak op stygende seevlakke, die ontvriesing van die pakys by die pole en ander noemenswaardige klimaatsversteuringe het. Indien iets drasties nie gedoen word om atmosfeer verhitting te keer nie, sal klimaatsversteuringe 'n geweldig nadelige effek op die wêreld ekonomie te weeg bring, asook 'n nadelige effek op gesondheids- en sosiale toestande tot gevolg hê. Dit het duidelik geword dat die aktiwiteite van die mensdom, hoofsaaklik verbranding van fossielbrandstowwe en ontbossing, te blameer is vir atmosfeerverwarming. Ekonome wêreldwyd het toenemend besef dat die hoofrede vir omgewingsprobleme, soos atmosfeerverwarming, toegeskryf kan word aan die afwesigheid van markte en meer spesifiek die afwesigheid van privaatbesit, wat in effek die basis van die vrye mark vorm. Hierdie gebeurtenis word in die ekonomiese literatuur beskryf as die "tragedie van die gemene goedere" . Wêreldpolitici en industriële leiers het besef dat die mens by 'n punt in sy geskiedenis gekom het waar hy moontlik sy eie uitwissing kan bewerkstellig en dat iets drasties gedoen moet word om die natuurlike omgewing te beskerm om sodoende volhoubare ekonomiese groei te verseker. Hierdie besef het gelei tot die totstandkoming van die Kyoto Protokol waar 38 nywerheidslande ooreengekom het om voor die jaar 2012 hul totale nasionale emissies van die ses belangrikste kweekhuisgasse met ten minste 5 persent tot onder hul 1990 emissievlakke te verminder. Daar was in Kyoto ooreengekom dat die stelsel wat gebruik moet word om die Kyoto doelwitte te bereik sterk vryemark eienskappe moet besit asook meganismes om regverdigheid en gelykheid tussen lande in terme van kweekhuisgasbeperkings te verseker. Die Kyoto meganismes is ontwerp met sterk vryemark eienskappe, wat basies 'n stelsel is waarvolgens lugbesoedelingsregte verhandel kan word. Hierdie verhandeling van besoedelingsregte kan toegepas word om kweekhuis gasse te verminder. Die Kyoto meganismes en dus lugbesoedelingsverhandeling verskaf buigbaarheid aan besighede en lande om hul onderskeie besoedelingsbeperkingsdoelwitte op die mees koste effektiewe manier te bereik. Die antwoord op atmosfeer verwarming kan dalk so eenvoudig wees soos koop laag en verkoop hoog. Kweekhuisgasse is besig om net soos graan of goud 'n kommoditeit te raak. Daar word verwag dat die verhandeling in kweekhuis gas besoedelingsregte uiteindelik sal groei tot die grootste kommoditeitsmark ter wêreld. Ondersteuners van die Kyoto meganismes is van mening dat kweekhuisgas verhandeling ook ekonomiese en tegnologiese voordele inhou. Dit is 'n oogmerk van die Kyoto meganismes om die verskuiwing van tegnologie tussen ontwikkelde en ontwikkelende lande asook volhoubare groei te verseker. 'n Grysmark vir kweekhuisgas regte is reeds internasionaal, voor die beplande instelling van die Kyoto meganismes, aan die ontwikkel. Die reëls en regulasies vir die Kyoto meganismes is nog nie gefinaliseer nie. Dit en die onwilligheid van die VSA om die Protokol te onderteken, belemmer die vroegtydige implementering van die Kyoto meganismes en die effektiwiteit van die stelsel. Dit is die doelwit van die werkstuk om die leser bekend te maak met die funksionering van emissieverhandeling as 'n vryemark stelsel om omgewingsprobleme soos atmosfeerverwarming te verminder. Die werkstuk beoog ook om die kwessies betrokke by klimaatsverandering en die Kyoto meganismes aan die leser te verduidelik.
Harder, Benjamin. "Voice over IP 2.0: an analysis of limits and potential of IP2IP telecommunication". reponame:Repositório Institucional do FGV, 2012. http://hdl.handle.net/10438/9712.
Testo completoApproved for entry into archive by Eliene Soares da Silva (eliene.silva@fgv.br) on 2012-04-25T15:52:36Z (GMT) No. of bitstreams: 1 120423 Master Thesis FGV.pdf: 3697873 bytes, checksum: f3ccbecacf430eaee0f0606f9daa9f36 (MD5)
Made available in DSpace on 2012-04-25T15:54:46Z (GMT). No. of bitstreams: 1 120423 Master Thesis FGV.pdf: 3697873 bytes, checksum: f3ccbecacf430eaee0f0606f9daa9f36 (MD5) Previous issue date: 2012-04-23
Internet Telephony (VoIP) is changing the telecommunication industry. Oftentimes free, VoIP is becoming more and more popular amongst users. Large software companies have entered the market and heavily invest into it. In 2011, for instance, Microsoft bought Skype for 8.5bn USD. This trend increasingly impacts the incumbent telecommunication operators. They see their main source of revenue – classic telephony – under siege and disappear. The thesis at hand develops a most-likely scenario in order to determine how VoIP is evolving further and it predicts, based on a ten-year forecast, the impact it will have on the players in the telecommunication industry.The paper presents a model combining Rogers’ diffusion and Christensen’s innovation research. The model has the goal of explaining the past evolution of VoIP and to isolate the factors that determine the further diffusion of the innovation. Interviews with industry experts serve to assess how the identified factors are evolving.Two propositions are offered. First, VoIP operators are becoming more important in international, corporate, and mobile telephony. End-to-end VoIP (IP2IP) will exhibit strong growth rates and increasingly cannibalize the telephony revenues of the classic operators. Second, fix-net telephony in SMEs and at home will continue to be dominated by the incumbents. Yet, as prices for telephony fall towards zero also they will implement IP2IP in order to save costs. By 2022, up to 90% of the calls will be IP2IP. The author recommends the incumbents and VoIP operators to proactively face the change, to rethink their business strategies, and to even be open for cooperation.
白啟昌. "A Study of Internet Protocol Television Business Model". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/37090987028007832759.
Testo completo國立政治大學
經營管理碩士學程(EMBA)
96
The study topics included: Communication, Broadcasting, Television marketing status, Trends, Evolution, Architecture, Theorey, Regulations, and Research from worldwide IPTV related technologies; we hope to got current worldwide business model and provide our own innovation ideas from EMBA program and implement to future living environment to every family and persons. Study area targeted on IPTV’s background, definition and value chain and discuss with Taiwan’s policy for Dihgital content, M-Taiwan project, Chunghwa Telecom MOD( Multimedia On Demand) project, Cable TV, WebTV and related applications in current market and take actions for analysis and find out the weakness, strenth and chellange of market current status; this study will be generate key successful factors and discover in future oppoprtunities.
Rocha, Filipe Muller. "Interlusa & the family protocol". Master's thesis, 2017. http://hdl.handle.net/10362/28303.
Testo completoSai, Ying. "Transparent safe settlement protocol and I-ticket booth user verification mechanism for electronic commerce". 2002. http://www.lib.utexas.edu/etd/r/d/2002/saiy022/saiy022.pdf#page=4.
Testo completoAlvarez, Charles Conceicao, e 安查爾. "New Business Model on IP (Web) based Network - Voice over Internet Protocol (VoIP) Technology (Telecommunications Industry)". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/24714424707511802749.
Testo completoJEON, SUNG-HO, e 全成浩. "Benefits and Risks of Using Voice over Internet Protocol (VoIP) in Taiwan Business: An Exploratory Study". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/36881265238365350767.
Testo completo銘傳大學
企業管理學系碩士班
99
ABSTRACT This research thesis was presented as groundwork, an analytical data to promote convenience of internet phone users as well as revitalization of internet phone service by understanding the service quality and device preference that internet users prefer. A total of 620 survey studies were handed out to accompany the research with direct approach method for higher percentage of collection. The major purpose of this study is twofold: Firstly, to understand the current state of VoIP adoption and use within Taiwanese business. Secondly, we will discuss our analysis on both the different benefits expected for subscribers of various characteristics as well as their risk and satisfaction levels. In Taiwan the top 3 VoIP service providers by number of subscribers are (in order): “PChome Internet''s Skype", "Microsoft MSN" and "Yahoo! Messenger". In general, the most popular use of VoIP services includes sending text messages as well as voice chat and video chat with other users. For VoIP phone call services, over 24.8% was for international calls. In the enterprise, 40% of enterprise subscribers respond to having used VoIP over the last 3 years. Most respondents agreed that with the added convenience of VoIP service comes certain risks, with the top concerns being reliability (internet connections are often subject to sudden disconnection) and sometimes lower voice quality (highly dependent on environment). However, subscribers generally agree that the benefits of using VoIP outweigh the common risks, the foremost benefit being cheaper costs. Still, even with significant cost savings, many respondents expressed dissatisfaction with the current charge rates of service providers. When analyzing the subscriber base by certain characteristics, we have found that among Taiwanese business subscribers, benefit and risk recognition was noticeably more pronounced in females compared to males. In contrast, satisfaction level was generally more recognized among males than females. With regards to the different service providers, the satisfaction level of Microsoft MSN subscribers was generally lower than with other subscribers. Accordingly, the results from this research and their interpretation must be expropriated with certain considerations including research limitations and restrictions. It is suggested that additional in-depth research with improved conditions should be carried out in the future. What’s more, there’s a need to review VoIP receptivity that must be conducted systematically in a wider spectrum, while measures for the promotion and growth of VoIP service in Taiwanese business through development and sale of additional service must be presented.
Yu, Min-Chieh. "A secure mobile agent e-commerce protocol". Thesis, 2015. http://hdl.handle.net/1805/10117.
Testo completoThere are many advantages of mobile agent such as delegation of tasks, asynchronous processing, adaptable service in interfaces, and code shipping. Mobile agents can be utilized in many areas such as electronic commerce, information retrieval, network management, etc. The main problem with mobile agents is security. The three basic security design goals of a system are confidentiality, integrity, and availability. The goal of this thesis concerns the property of secure purchasing by mobile agents. First present Jalal's anonymous authentication protocol. Next, we construct our single mobile agent protocol based on Jalal's authentication technique. Also, we add some addition cryptography techniques to make the data more secure during its migration. Lastly, we build a multiple mobile agent protocol based on the single mobile agent protocol. Here, the multiple mobile agents are capable to make the decision and purchase the item for user.
Ryu, Seung Hwan Computer Science & Engineering Faculty of Engineering UNSW. "A framework for managing the evolving web service protocols in service-oriented architectures". 2007. http://handle.unsw.edu.au/1959.4/40566.
Testo completoDuduka, Jacint. "Towards a simulation interoperability framework between an agent-based simulator and a BPMN engine using REST protocol". Master's thesis, 2020. http://hdl.handle.net/10400.2/10381.
Testo completoThe current paradigm of a business process model is that it is a representation of a sequence of tasks that act upon some data input, to produce an output, aiming the production of a new service or product to be delivered from a producer to a customer. Although this is a valid way of thinking, it neglects to consider in enough detail the influence of some phenomenon on inputs, e.g. human behaviour, communication, social interactions, the organisational culture which can have a significant effect on the output delivered by a business process. As the dynamics of these phenomena are non-linear, they can be interpreted as a complex system. This holistic way of thinking about business processes opens the doors to the possibility of combining different simulation methods to model different aspects that influence a process. A BPMN engine and an agent-based simulation (ABS) engine are chosen to serve the basis of our framework. In its conception, we not only consider the technical aspects of the framework but also delve into exploring its management and organizational dimensions, with the intent of facilitating its adoption in enterprises, as a tool to support decision support systems. We analyse how accurate the simulation results can be when using these two tools as well as what considerations need to be considered within organizations.
Wagle, Leena V. "Incorporating business policies into business protocols". 2005. http://www.lib.ncsu.edu/theses/available/etd-08162005-125546/unrestricted/etd.pdf.
Testo completoRajagopalan, Koushik N. "Tools for business protocols". 2010. http://www.lib.ncsu.edu/resolver/1840.16/6005.
Testo completoSantos, Inês Maria Testa. "Bermanne - when there is no room for all". Master's thesis, 2020. http://hdl.handle.net/10362/107294.
Testo completoXavier, Ana Lúcia Teixeira Marques. "Relatório de estágio realizado no Sport Lisboa e Benfica: o protocolo empresarial no Sport Lisboa e Benfica". Master's thesis, 2018. http://hdl.handle.net/10400.5/20042.
Testo completoThe necessity of the Protocol in a sports club obliged to a knowledge of a set of precepts that have to be reached in events, not only in protocol ceremonies, but also in the simple day to day. Courtesy norms, codes of conduct and acts of good education and common sense, facilitate the life in society in any space. In this curricular internship report, developed in the Department of Commercial and Marketing Management: Innovation and Business Development: Protocol of Sport Lisboa e Benfica, are addressed the: characterization of the institution, purposes and internship processes, framework of professional practice of a conceptual nature, institutional and legal context of the institution, history and facilities of the club, characteristics of the institution, accomplishment of the professional practice where the activities developed by the protocol are described, comparison between several sports institutions, and, finally, findings where protocol SWOT analysis is verified, difficulties experienced, analysis of the effects and consequences of the intervention performed, establishment of future perspectives and suggestions to propose. In these pages, it is possible to verify that the Sport Lisboa e Benfica extended to the maximum the work actions of the master, allowing the monitoring in functions within the Commercial and Marketing Department, not only in the Protocol, but also in the Events.
Chuang, Ping-Jang, e 莊評彰. "A Study of Electronic Transaction Protocols for International Business". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/68380388317226031098.
Testo completo朝陽科技大學
資訊管理系碩士班
95
There''s still room for improving the use of stamped signature and the lack of well designed trading model in the trading protocols made and designed in business transnational electronic commerce. For example, the sizes of stamped signatures, that send in business transnational electronic commerce, would be increased by the number of businesses been send. It would lead to the transactional security problems such as, making the size of stamped signature being too long for verification and making the stamped signature cannot fully reveal the sequence of the senders. This study will discuss these problems and will make some suggestions in improving the security of trading protocols and the efficiency of verifying stamped signature. With the higher acceptance in doing transnational business over the Internet, it shall bring brokers to smoothly go through the trading model in combining or splitting orders with either the buyer party or the selling party in transnational electronic commerce. However, current trading protocol can’t fully offer these transactions. It would lead cash flow and material flow to non-Internet electronic information transmission model and would lower the continuity of trading, due to the transfer among operating systems from the defects of the current trading protocol. Therefore, the main purpose of this study is to refining a trading protocol for combining and splitting orders to reduce the trading risks and toimprove the trading convenience.
Mallya, Ashok Ullal. "Modeling and enacting business processes via commitment protocols among agents". 2005. http://www.lib.ncsu.edu/theses/available/etd-11212005-133937/unrestricted/etd.pdf.
Testo completoCheng, Zhengang. "Verifying commitment based business protocols and their compositions: model checking using promela and spin". 2006. http://www.lib.ncsu.edu/theses/available/etd-08092006-005135/unrestricted/etd.pdf.
Testo completoPech, Varguez José Luis. "Cohérence et cohésion de l'équipe de direction dans la petite et moyenne entreprise : Le cas des hôtels familiaux au Yucatan". Phd thesis, 2003. http://pastel.archives-ouvertes.fr/pastel-00918649.
Testo completo