Дисертації з теми "Shard key"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Shard key.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-32 дисертацій для дослідження на тему "Shard key".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Даценко, Сергій Олександрович. "Програмні засоби підвищення продуктивності роботи СУБД MongoDB". Master's thesis, Київ, 2018. https://ela.kpi.ua/handle/123456789/26713.

Повний текст джерела
Анотація:
Актуальність теми. На сьогоднішній день MongoDB є СУБД, що часто використовується при розробці систем, орієнтованих на обробку слабко структурованих даних. Однією з причин цього є можливість використання горизонтального масштабування (шардингу) та налаштування розподілу даних, що значною мірою впливає на продуктивність роботи системи в цілому. Тому були розроблені різні стратегії розподілу даних в кластері, такі як: стратегія палаючого будинку, стратегія гарячих точок тощо. Дані стратегії мають свої сфери застосування, свої переваги та недоліки, але загальним недоліком даних стратегій є нерівномірний розподіл даних при наявності так званих «джамбо-чанків», що в свою чергу впливає на продуктивність роботи системи. Об’єктом дослідження є розподіл даних між серверами в кластері MongoDB. Предметом дослідження є програмні засоби для підвищення продуктивності роботи СУБД MongoDB, які призначені для налаштування розподілу даних відповідно до допустимих відсоткових навантажень вузлів кластера, враховуючи вплив «джамбо-чанків». Мета роботи: підвищення продуктивності роботи СУБД MongoDB. Наукова новизна: 1. Запропоновано підхід розподілу даних, який включає в себе ідеї існуючих підходів та, на відміну від існуючих підходів, при розподілі даних враховує можливість наявності «джамбо-чанків». 2. Виконано порівняльний аналіз запропонованого підходу з існуючими, визначено в яких саме ситуаціях потрібно використовувати даний підхід, його переваги та недоліки порівняно з існуючими підходами розподілу даних. Практична цінність отриманих в роботі результатів полягає в тому, що запропонований підхід надає можливість налаштування розподілу даних відповідно до допустимих відсоткових навантажень вузлів кластера, враховуючи вплив «джамбо-чанків». Крім того розроблені в роботі програмні засоби можуть бути використані для реалізації автоматизованого розподілу даних з заданими налаштуваннями. Апробація роботи. Запропонований підхід був представлений та обговорений на науковій конференції магістрантів та аспірантів «Прикладна математика та комп‘ютинг» ПМК-2018 (Київ, 14 - 16 листопада 2018 р.) та на V Міжнародній науково-технічній Internet-конференції «Сучасні методи, інформаційне, програмне та технічне забезпечення систем керування організаційно-технічними та технологічними комплексами», яка проводилась 22 листопада 2018 р. у Національному університеті харчових технологій. Структура та обсяг роботи. Магістерська дисертація складається з вступу, чотирьох розділів та висновків. У вступі подано загальну характеристику роботи, зроблено оцінку сучасного стану проблеми, обґрунтовано актуальність напрямку досліджень, сформульовано мету і задачі досліджень, показано наукову новизну отриманих результатів. У першому розділі розглянуто існуючі підходи розподілу даних, їхні особливості, недоліки та переваги, розглянуто різні реалізації. У другому розділі запропоновано підхід розподілу даних який буде вирішувати виявлену проблему. У третьому розділі наведені алгоритмічні особливості реалізації розроблених програмних засобів для реалізації запропонованого підходу. У четвертому розділі представлено результати тестування запропонованого підходу. У висновках представлені результати проведеної роботи. Магістерська дисертація представлена на 80 аркушах, містить посилання на список використаних літературних джерел.
Actuality of theme. To date, MongoDB is a database, often used in the development of systems focused on the processing of poorly structured data. One reason for this is the ability to use horizontal scaling (shading) and data distribution settings, which greatly affects the performance of the system as a whole. Therefore, various strategies for data splitting in the cluster were developed, such as: a burning house strategy, hot spots strategy, and so on. These strategies have their own applications, their advantages and disadvantages, but the general disadvantage of these strategies is the uneven distribution of data in the presence of so-called "jumbo chunk", which in turn affects the performance of the system. The object of the study is the distribution of data between servers in the MongoDB cluster. The subject of the study is software tools to improve the performance of the MongoDB database, which are designed to configure the distribution of data in accordance with the permissible percentage loads of nodes of the cluster, taking into account the influence of "jumbo chunks". The purpose of the work: to increase the productivity of the DBMS MongoDB. Scientific novelty: 1. A data-sharing approach is proposed that incorporates the ideas of existing approaches and, unlike existing approaches, takes into account the possibility of having "jumbo chunks" when distributing data. 2. A comparative analysis of the proposed approach with existing ones is made, it is determined in what situations it is necessary to use this approach of approach, its advantages and disadvantages in comparison with existing approaches of data distribution. The practical value of the results obtained in the work is that the proposed approach provides the possibility of adjusting the distribution of data in accordance with the permissible percentages of nodes of the cluster, taking into account the influence of "jumbo chunks". In addition, the software developed in the work can be used to implement automated data distribution with the specified settings. Test work. The proposed approach was presented and discussed at the scientific conference of undergraduates and postgraduates "Applied Mathematics and Computing", PMK-2018 (Kyiv, November 14-16, 2018) and at the V International Scientific and Technical Internet Conference "Modern Methods, Information, software and technical support of control systems for organizational, technical and technological complexes", held on November 22, 2018 at the National University of Food Technologies. Structure and scope of work. The master's thesis consists of an introduction, four chapters and conclusions. The introduction gives a general description of the work, assesses the current state of the problem, substantiates the relevance of the research direction, formulates the purpose and objectives of the research, shows the scientific novelty of the results obtained. The first chapter examines the existing approaches to data distribution, their features, disadvantages and advantages, and discusses different implementations. The second chapter proposes a data-sharing approach that addresses the problem identified. The third chapter, algorithmic features of implementation of the developed software tools for implementation of the proposed approach are presented. The fourth chapter presents the results of testing the proposed approach. The conclusions are the results of the work. The master's dissertation is presented on 80 sheets, contains a link to the list of used literary sources.
Актуальность темы. На сегодняшний день MongoDB является СУБД, которая часто используется при разработке систем, ориентированных на обработку слабо структурированных данных. Одной из причин этого является возможность использования горизонтального масштабирования (шардингу) и настройки распределения данных, что в значительной мере влияет на производительность работы системы в целом. Поэтому были разработаны различные стратегии распределения данных в кластере, такие как: стратегия горящего дома, стратегия горячих точек и тому подобное. Данные стратегии имеют свои области применения, свои преимущества и недостатки, но общим недостатком данных стратегий является неравномерное распределение данных при наличии так называемых «джамбо-чанков», что в свою очередь влияет на производительность работы системы. Объектом исследования является распределение данных между серверами в кластере MongoDB. Предметом исследования являются программные средства для повышения производительности работы СУБД MongoDB, которые предназначены для настройки распределения данных в соответствии с допустимых процентных нагрузок узлов кластера, учитывая влияние «джамбо-чанков». Цель работы: повышение производительности работы СУБД MongoDB. Научная новизна: 1. Предложен подход распределения данных, который включает в себя идеи существующих подходов и, в отличие от существующих подходов, при распределении данных учитывает возможность наличия «джамбо-чанков». 2. Выполнен сравнительный анализ предложенного подхода с существующими, определено в каких именно ситуациях нужно использовать данный подход, его преимущества и недостатки по сравнению с существующими подходами распределения данных. Практическая ценность полученных в работе результатов заключается в том, что предложенный подход предоставляет возможность настройки распределения данных в соответствии с допустимыми процентных нагрузками узлов кластера, учитывая влияние «джамбо-чанков». Кроме того разработанные в работе программные средства могут быть использованы для реализации автоматизированного распределения данных с заданными настройками. Апробация работы. Предложенный подход был представлен и обсужден на научной конференции магистрантов и аспирантов «Прикладная математика и компьютинг» ПМК-2018 (Киев, 14 - 16 ноября 2018) и на V Международной научно-технической Internet-конференции «Современные методы, информационное, программное и техническое обеспечение систем управления организационно-техническими и технологическими комплексами», которая проводилась 22 ноября 2018 в Национальном университете пищевых технологий. Структура и объем работы. Магистерская диссертация состоит из введения, четырех глав и выводов. Во введении представлена общая характеристика работы, произведена оценка современного состояния проблемы, обоснована актуальность направления исследований, сформулированы цели и задачи исследований, показано научную новизну полученных результатов. В первой главе рассмотрены существующие подходы распределения данных, их особенности, недостатки и преимущества, рассмотрены различные реализации. Во втором разделе предложено подход распределения данных который будет решать обнаруженную проблему. В третьем разделе приведены алгоритмические особенности реализации разработанных программных средств для реализации предложенного подхода. В четвертом разделе представлены результаты тестирования предложенного подхода. В выводах представлены результаты проведенной работы. Магистерская диссертация представлена на 80 листах, содержит ссылки на список использованных литературных источников.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Yan, Weiwei. "Software-hardware Cooperative Embedded Verification System Fusing Fingerprint Verification and Shared-key Authentication." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-66677.

Повний текст джерела
Анотація:
In order to protect the security of the commercial information, personnel information, military information, governmental information on the Internet, the claimed identity should be authenticated. Now there are three main security authentication methods: first: using user PIN, such as password; second: using physical key, such as USBKey; third: using biological authentication technology, such as fingerprint, iris, voice and palm prints, etc. Because of the uniqueness, invariance, and ubiquity properties of biometric authentication, biometric authentication is becoming popular, especially fingerprint recognition. However, when the fingerprint recognition information is transported on the public channel, it may be attacked, such as the fingerprint information is stolen. So a cryptology mechanism is needed to protect the fingerprint recognition information. In the field of embedded security authentication system, the traditional hardware implementation mechanism, such as ASIC, can satisfy requires of functions and performances, but it is not configurable, flexible, and easy to expand; the traditional software implementation mechanism, such as general purpose processor, is flexible, but the cost and the power consumption are higher than hardware implementation. In order to take the advantages of biometrics, cryptology, hardware implementation, and software implementation, a hardware-software cooperating embedded authentication system based on shared-key authentication and fingerprint verification is proposed. First, this system authenticates the identities of client and server by shared-key authentication, creates the current encrypt key and hash key, and then authenticates the identity of them via fingerprint recognition. During fingerprint recognition, the information of fingerprint is not needed to transmit over the public channel, so the security of fingerprint is increased. Theoretic analysis and experiments show that, this system reach very high authentication rate and security. This system can resist replay attack, server template attack, device template attack, effectively.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Tomescu, Nicolescu Ioan Alin. "How to keep a secret and share a public key (using polynomial commitments)." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/128298.

Повний текст джерела
Анотація:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2020
Cataloged from PDF of thesis.
Includes bibliographical references (pages 155-171).
Despite 40+ years of amazing progress, cryptography is constantly plagued by two simple problems: keeping secret keys secret and making public keys public. For example, public-key encryption is secure only if each user (1) keeps his secret key out of the hands of the adversary and (2) correctly distributes his public key to all other users. This thesis seeks to address these two fundamental problems. First, we introduce communication-efficient, fully-untrusted append-only logs, which can be used to correctly distribute public keys. Our constructions have logarithmic-sized proofs for the two key operations in append-only logs: looking up public keys and verifying the log remained append-only. In contrast, previous logs either have linear-sized proofs or need extra trust assumptions. Our logs can also be used to secure software distribution and, we hope, to increase transparency in any institution that wants to do so. Second, we speed up threshold cryptosystems, which protect secret keys by splitting them up across many users. We introduce threshold signatures, verifiable secret sharing and distributed key generation protocols that can scale to millions of users. Our protocols drastically reduce execution time, anywhere from 2x to 4500x, depending on the scale. For example, at large scales, we reduce time from tens of hours to tens of seconds. At the core of most of our contributions lie new techniques for computing evaluation proofs in constant-sized polynomial commitments. Specifically, we show how to decrease the time to compute n proofs for a degree-bound n polynomial from O(n²) to O(n log n), at the cost of increasing proof size from O(1) to O(log n). Our techniques could be of independent interest, as they give rise to other cryptographic schemes, such as Vector Commitments (VCs).
by Ioan Alin Tomescu Nicolescu.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Ehsan, ul Haque Muhammad. "Persistence and Node FailureRecovery in Strongly Consistent Key-Value Datastore." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-121281.

Повний текст джерела
Анотація:
Consistency preservation of replicated data is a critical aspect for distributed databaseswhich are strongly consistent. Further, in fail-recovery model each process also needs todeal with the management of stable storage and amnesia [1]. CATS is a key/value datastore which combines the Distributed Hash Table (DHT) like scalability and selforganization and also provides atomic consistency of the replicated items. However beingan in memory data store with consistency and partition tolerance (CP), it suffers frompermanent unavailability in the event of majority failure. The goals of this thesis were twofold (i) to implement disk persistent storage in CATS,which would allow the records and state of the nodes to be persisted on disk and (ii) todesign nodes failure recovery-algorithm for CATS which enable the system to run with theassumption of a Fail Recovery model without violating consistency. For disk persistent storage two existing key/value databases LevelDB [2] and BerkleyDB[3] are used. LevelDB is an implementation of log structured merged trees [4] where asBerkleyDB is an implementation of log structured B+ trees [5]. Both have been used as anunderlying local storage for nodes and throughput and latency of the system with each isdiscussed. A technique to improve the performance by allowing concurrent operations onthe nodes is also discussed. The nodes failure-recovery algorithm is designed with a goalto allow the nodes to crash and then recover without violating consistency and also toreinstate availability once the majority of nodes recover. The recovery algorithm is based onpersisting the state variables of Paxos [6] acceptor and proposer and consistent groupmemberships. For fault-tolerance and recovery, processes also need to copy records from the replicationgroup. This becomes problematic when the number of records and the amount of data ishuge. For this problem a technique for transferring key/value records in bulk is alsodescribed, and its effect on the latency and throughput of the system is discussed.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Munjid, Achmad. "Building a Shared Home: Investigating the Intellectual Legacy of the Key Thinkers of Inter-Religious Dialogue in Indonesia." Diss., Temple University Libraries, 2014. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/290756.

Повний текст джерела
Анотація:
Religion
Ph.D.
How does inter-religious dialogue in Indonesia transform and being transformed by the New Order authoritarian regime in the creation of a strong civil society and a religiously plural and democratic country? By discussing the politicization of religion and mobilization of religious communities by the New Order regime to fight against the Communists in the wake of the 1965 tragedy as the background, this dissertation seeks to analyze the anatomy of inter-religious relations in the country, including its historical roots, pivotal events, enduring issues and consequential development in the later period. The discussion is placed in a wider theoretical context on the role of religion in public life. Based on the analysis of topical biography, academic works, media reports and other reliable unpublished documents as the main sources, the dissertation investigates the intellectual legacy of four selected key thinkers in the field of inter-religious dialogue. It critically discusses the complex interplay between religion and politics in particular relation to such issues as religious pluralism, religious tolerance, exclusivism, human rights, freedom of religion, legal discrimination, and minority-majority relations. It highlights why and how the contesting discourse within a particular religious community about other group, between different religious communities, especially the Muslims and the Christians, as well as between religious communities and the regime move toward certain direction in particular context and then move towards the opposite direction in other context. Despite the wide spread conflict towards the end of the New Order regime and during the 2000s, the dissertation proved that inter-religious relations in Indonesia in general developed from antagonism to more dialogical relations over the period. The four selected key thinkers of inter-religious dialogue and their intellectual legacy demonstrated how religion could make fundamental contribution in the creation of democracy in a religiously plural society.
Temple University--Theses
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Sontheimer, Christoph, and Benjamin Czubacki. "Shark Repellents : Predicting the Takeover-Likelihood by Means of Pre-emptive Anti-Takeover Provisions & Key Performance Indicators." Thesis, Umeå universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-157457.

Повний текст джерела
Анотація:
This study is concerned with public companies (listed on the stock exchange) which are threatened by an unwanted takeover-attempt. Particularly, the investigation is centered around opportunities for such companies to defend themselves against hostile takeovers. Therefore, this study covers defense strategies, the so-called anti-takeover provisions (ATPs) or shark repellents. More specifically, pre-emptive ATPs were analyzed in order to determine whether they are effective measures for a takeover-target to avoid being acquired. This question is widely discussed by existing literature that is concerned with the overall topic of mergers & acquisitions, whereby findings of prior researchers often are contradicting or inconclusive. Moreover, there is a lack of literature examining the case of takeover-attempts which are characterized by a hostile deal-attitude specifically. As the adoption of pre-emptive ATPs does have its pitfalls, we aimed to find implications for the management of publicly traded companies concerning the question if they should deploy pre-emptive ATPs or not.   We analyzed hostile takeover-events which took place within the timeframe of 2003-2018, whereby target-companies where located all over the world. As done by other researchers before, the level of resistance against takeovers has been measured by forming an index (in this study denoted by G-Index*), which accounts for the number of pre-emptive ATPs adopted by the takeover-target. That index was used subsequently to test, if companies with a low/high level of resistance against takeovers were more/less likely to be acquired. As not only the resistance against takeovers is an influencing factor on the outcome of a takeover-event, we also measured the impact of performance- and contextual factors. Those comprise key performance indicators (KPIs) for efficiency and profitability, as well as the context factors region and industry. That measurement has been carried out using the binary logistic regression, whereby all mentioned aspects were included in one model to form a representative model of takeover-events. This model was used to examine the individual impacts of all variables on the one hand, and for predicting the takeover-likelihood for each company on the other hand. Subsequently, the predicted takeover-likelihood was tested via the Pearson correlation with the number of pre-emptive ATPs adopted by the public companies.   By using the binary regression, we found that a higher level of managerial resistance against takeovers is decreasing the probability for a company to be acquired. High resistance against takeovers, measured by a high number of pre-emptive anti-takeover provisions adopted, does have a statistically significant negative effect on the takeover-likelihood. Moreover, another key finding is that a company which is more efficient than the average of its industry, is more likely to be acquired. High efficiency (measured by gross profit margin) does have a statistically significant positive effect on the takeover-likelihood. By using the Pearson correlation, we found a statistically significant relation between the number of pre-emptive ATPs adopted and the predicted takeover-likelihood. The predicted takeover-likelihood correlates negatively with the number of pre-emptive ATPs.   These results show that pre-emptive ATPs can be an effective measure against hostile takeovers.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Warr, Dartanian Warr. "THE PROFESSIONAL DEVELOPMENT MINDSET:A KEY INGREDIENT IN THE DEVELOPMENT OF LEADERS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=case15227478737613.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Smith, Henry Mike. "A project to train a key leader group in the concept of shared ministry in Calvary Baptist Church, Meridian, Mississippi." Theological Research Exchange Network (TREN), 1991. http://www.tren.com.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Chakravarthy, Chinna Narayana Swamy Thrilok. "Combinational Watermarking for Medical Images." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5833.

Повний текст джерела
Анотація:
Digitization of medical data has become a very important part of the modern healthcare system. Data can be transmitted easily at any time to anywhere in the world using Internet to get the best diagnosis possible for a patient. This digitized medical data must be protected at all times to preserve the doctor-patient confidentiality. Watermarking can be used as an effective tool to achieve this. In this research project, image watermarking is performed both in the spatial domain and the frequency domain to embed a shared image with medical image data and the patient data which would include the patient identification number. For the proposed system, Structural Similarity (SSIM) is used as an index to measure the quality of the watermarking process instead of Peak Signal to Noise Ratio (PSNR) since SSIM takes into account the visual perception of the images compared to PSNR which uses the intensity levels to measure the quality of the watermarking process. The system response under ideal conditions as well as under the influence of noise were measured and the results were analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Schirninger, Rene, and Stefan Zeppetzauer. "Wireless On-Board Diagnostics." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-193.

Повний текст джерела
Анотація:

Wireless On-board diagnostics functionality, which is a future outlook to vehicle system

parameter analysis, enables measurements and controlling without the limitation of a physical

connector. Today every vehicle must by law provide the possibility to analyze engine and

emission related parameters (OBD II). The wireless connection requires a high security level

to prevent unauthorized communication establishment with the truck’s bus system. The aim

of the project is to make a survey of the available security mechanisms and to find the most

promising solutions. Furthermore, several usage scenarios and access right levels are

specified and a risk analysis of the whole system is made. The greatest challenge is the

specification and implementation of a proper key-exchange mechanism between the analyzing

device and the truck’s bus system, which is therefore carried out with the highest possible

level of awareness. Consequently several different concepts have been formulated based on

the different usage scenarios.

Стилі APA, Harvard, Vancouver, ISO та ін.
11

Vaníčková, Lucie. "Účetní servisní centra a hodnocení jejich výkonnosti." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-125066.

Повний текст джерела
Анотація:
This diploma thesis focuses on the area of outsourcing and shared services centers. It includes general characteristics of outsourcing. It deals in addition with definition and description of koncept shared services, its history, advantages, disadvantages, comparison with similar organization models and strategic aspects of this concept. Part of thesis focuses on audit in area of shared services center. This thesis deals with issues of performance management of accounting shared services centers in areas of accounts payable and accounts receivable in the USA, Czech Republic and Slovakia. The practical part of this thesis is established on mentioned theoretical themes. There is described and evaluated situation in specific accounting shared services center in the Czech Republic from view of performance and maturity of shared services center.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

De, Morny Charl. "The role of management support and shared understanding of 20 keys for continuous improvement: an employee perspective." Thesis, University of the Western Cape, 2014. http://hdl.handle.net/11394/3899.

Повний текст джерела
Анотація:
Magister Commercii - MCom
This study aimed to assess employee’s responses with regard to the implementation of a new workplace improvement programme. The purpose of this research was to focus on the understanding that could be gained about employee’s responses to organisational change using qualitative research
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Bharath, Tati. "A framework to implement delegation in offline PACS : A strategy to restrict user’s path." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127851.

Повний текст джерела
Анотація:
Physical access control systems (PACS) deal with the security of the availability of resources. They work as an alternative to traditional manual security access control. Access control has two variants, the logical which deals with computer environments and the physical which deals with the physical entry into a property or warehouses. However, offline physical access control systems cannot enforce the user’s path making it unsuitable for use in classified areas, such as places where the public is restricted. Therefore, offline PACS need a framework that can delegate the authority to enforce the user’s path. This is satisfactorily met in the presented research with a new design of offline PACS that has the capability to implement delegation. This framework allows the locks to dynamically write and read access policies onto and from a smart card. It works by means of a construct called “Path Array” and communication among different entities occurs via a chain of trust formed with the use of pre-shared keys.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Šteinhüblová, Katarína. "Využití controllingu v centru sdílených služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-377975.

Повний текст джерела
Анотація:
The master thesis deals with the status of management control system in shared services center of analyzed company in cooperation with controlling department of the local branch office in Slovakia. Theoretical part of the theses focuses on the theoretical basis for the analytical part, concerning the theory of controlling, centers of shared services in general and the transfer of controlling activities to them. The analytical part includes the analysis of current state of the controlling activities transfer and the cooperation between local controllers and controllers in shared services center. In the final part of the thesis are proposed recommendations and suggestions for possible improvements of management control system as a subsystem of management in the company.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Coulombel, Sylvain. "Exploration of NoSQL technologies for managing hotel reservations." Thesis, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-113602.

Повний текст джерела
Анотація:
During this project NoSQL technologies for Hotel IT have been evaluated. It has been determined that among NoSQL technologies, document database fits the best this use-case. Couchbase and MongoDB, the two main documents stores have been evaluated, their similarities and differences have been highlighted. This reveals that document-oriented features were more developed in MongoDB than Couchbase, this has a direct impact on search of reservations functionality. However Couchbase offers a better way to replicate data across two remote data centers. As one of the goals was to provide a powerful search functionality, it has been decided to use MongoDB as a database for this project. A proof of concept has been developed, it enables to search reservations by property code, guest name, check-in date and check-out date using a REST/JSON interface and confirms that MongoDB could work for storing hotel reservations in terms of functionality. Then different experiments have been conducted on this system such as throughput and response time using specific hotel reservation search query and data set. The results we got reached our targets. We also performed a scalability test, using MongoDB sharding functionalities to distribute data across several machines (shards) using different strategies (shard keys) so as to provide configuration recommendations. Our main finding was that it was not necessary to always distribute the database. Then if "sharding" is needed, distributing the data according to the property code will make the database go faster, because queries will be sent directly to the good machine(s) in the cluster and thus avoid "scatter-gather" query. Finally some search optimizations have been proposed, and in particular how an advanced search by names could be implemented with MongoDB.

This thesis is submitted in the framework of a double degree between Compiègne University Of Technology (UTC) and Linköping University (LiU)

Стилі APA, Harvard, Vancouver, ISO та ін.
16

Lin, Jen-Chiun, and 林振群. "Secure and Efficient Group Key Management with Shared Key Derivation." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/30305954463165170460.

Повний текст джерела
Анотація:
博士
臺灣大學
電機工程學研究所
96
In many network applications, including distance learning, audio webcasting, video streaming, and online gaming, often a source has to send data to many receivers. IP multicasts and application-layer multicasts provide efficient and scalable one-to-many or many-to-many communications. A common secret key, the group key, shared by multiple users can be used to secure the information transmitted in the multicast communication channel. A new key-tree-based group key management protocol with shared key derivation is proposed to securely and efficiently manage the group key. With shared key derivation, new keys derivable by members themselves do not have to be encrypted or delivered by the server, and the performance of synchronous and asynchronous rekeying operations, including single join, single leave, and batch update, is thus improved. The key derivation function can be easily constructed with secure hash functions, secure pseudo-random number generators, or one-way trapdoor functions. When the key derivation function and the key encryption function are secure, it is computationally infeasible for malicious users to collude to compute a key which is not granted by the protocol, and both backward group key secrecy and forward group key secrecy are guaranteed. The protocol reduces the computation and communication costs of group key rekeying, outperforms the other comparable protocols from our analysis and simulation, and is particularly efficient with binary key trees and asynchronous rekeying. With minor modification, the rekeying delay and the key size of the protocol can be tuned to meet different system needs.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Lin, Jen-Chiun. "Secure and Efficient Group Key Management with Shared Key Derivation." 2008. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-1401200813591400.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Brahmadevula, Kiran Kumar Pendse Ravindra. "Pre-shared key distribution protocol (PDP)." Diss., 2005. http://il.proquest.com/products_umi/dissertations.

Повний текст джерела
Анотація:
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
"December 2005." Title from PDF title page (viewed on April 22, 2007). Thesis adviser: Ravi Pendse. UMI Number: AAT 1436548 Includes bibliographic references (leaves 58-61).
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Van, der Linde Tjaart Nicholaas. "Key success factors for the management of shared services." Thesis, 2012. http://hdl.handle.net/10210/5664.

Повний текст джерела
Анотація:
M.Comm.
Moving from a traditional organisation to a shared services business unit through the shared services evolutionary continuum, and eventually to an independent business model requires a significant investment in technology, infrastructure, planning and time. Once committed, the process is as rigorous as planning and implementing a new business venture (Van Denburgh & Cagna, 2000). From the basic shared services model through to the independent business model, and during each other phase, the shared services business unit needs to be managed. The shared services business unit executive finds himself in the position of managing a business unit that: Is service orientated. Operates in an evolutionary process. Operates in a changing environment. Runs on business principles. Is an income generating business unit in its own right. Crosses national and international borders. Considers communication between business units as an ongoing process. Is customer and process-focused. Continuously improves and benchmarks business processes against the best. The leadership challenge is now to practise these business processes in a shared services environment, to make them successful and efficient and to add value to the organisation (Gunn, Carberry, Frigo & Behrens, 1993).
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Chien, Shao-Yin, and 簡韶瑩. "A Public-Key Encryption Scheme for a Shared Message." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/15063827167127299125.

Повний текст джерела
Анотація:
碩士
國立交通大學
資訊科學與工程研究所
97
This paper proposed a public key encryption scheme for a shared message. The message is shared among storage servers such that the message can be encrypted into a ciphertext without leaking any information even if a given threshold of storage servers cooperate. This is especially suitable for the applications, for example, distributed storage systems. We present a non-interactive public key encryption scheme on a shared message and prove that it is semantically secure against malicious adversaries, under the Decisional Diffe-Hellman assumption. This is the first public key encryption performed on a shared plaintext. Our scheme is ecient and practical for large scale systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

LIN, HSIU-CHIH, and 林秀織. "Directors’ and Supervisors’ Share Collateralization and Key Audit Matters." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/27z5cm.

Повний текст джерела
Анотація:
碩士
輔仁大學
會計學系碩士班
106
This study aims to examine the relation between the key audit matters and Directors’ Share Collateralization. The sample firms include Taiwan listed firms disclosing the key audit matters during 2016-2017. The empirical results show that there is a significant-positive correlation between the pledged shareholding ratio of the directors and supervisors and the key auditing matters comprehensive index. This means that the higher the pledged shareholding rate of the directors and supervisors, the higher the extent of disclosure of key audit matters in the new audit report. This study also conducts a number of sensitivity tests, including replacing the key auditing matters comprehensive index the item counts of key audit matters with the item counts and word counts of key audit matters, and electronic and non-electronic industry subsample tests. The empirical results of these sensitivity tests are similar to the main test.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Brahmadevula, Kiran Kumar. "Pre-shared key distribution protocol (PDP)-- FULL TEXT IS NOT AVAILABLE." Thesis, 2005. http://hdl.handle.net/10057/770.

Повний текст джерела
Анотація:
The proposed Pre-Shared Key Distribution Protocol (PDP) will distribute the IKE pre-shared key for IPSec between PDSN and HA in the 3GPP2 mobile networks. IPSec is used to provide security and integrity service between PDSN and HA. IKE is used for key exchange for the IPSec protocol. IKE can be configured to run either in pre-shared key mode or certificate mode to authenticate the identity of peers. There is a need for dynamic pre-shared key distribution protocol due to complexity and interoperability problems of IKE in certificate mode. Also the Public Key Infrastructure (PKI) required for the certificate mode is not available widely. Static pre-shared keys are not flexible to configure and easy to manage. The proposed key distribution protocol provides similar flexibility as certificates and is not prone to the interoperability and complexity problems inherent in PKI. The PDP protocol will eliminate the communication overhead and the number of packets dropped due to the expiration of the pre-shared keys. Also, it reduces the computation over head of pre shared key calculation as it is calculated only when needed. (Abstract shortened by UMI.)
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
"December 2005."
Стилі APA, Harvard, Vancouver, ISO та ін.
23

FANG, SZU-YU, and 方思予. "Study of Electric Scooters Shared Service’s Key Factors and Big Data Analysis." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/78r8c6.

Повний текст джерела
Анотація:
碩士
國立中正大學
會計與資訊科技研究所
106
With the advent of the new economic era, the application of big data analysis has gradually become the trend of the times. In the new economy, the sharing service, which has been flourished development with the recent economic depression, has received the most attention. Although coordinating with current information technology and data analysis technology, the scope of the sharing service has been extended to the food, clothing, housing, traveling, education and music levels to bring a new and convenient lifestyle to the public, there is still lack of understanding of the shared service operating. Therefore, the problems that may be faced have not been comprehensively considered, there are many successful shared service operating cases, also many failure cases. At the same time, existing laws and related regulations are gradually difficult to cope with such different operating models, so this study is expected to explore the meaning of shared services. The connotation of the service operation mode, combined with the sharing service plan of electric scooters that the researchers participated in, proposed the electric scooters shared service’s key factors, and used big data analysis as an auxiliary mechanism for the operation of the project and spread to other fields. This study follows the concept of action research, participates in the electric scooters’ sharing service plan of National Chung Cheng University, and proposes a practical improvement policy based on this, or obtains a solution to the problem. First of all, through the literature to explore the meaning of the shared service model, and then focus on the electric scooters, further summarize the key factors of the sharing service model of electric scooters’. In the form of Delphi expert questionnaire, invite industry, official, and academic experts put forward their views and verified the 7 facets and 29 key factors of electric scooters’ sharing service model. The construction of this model not only enhances academic value, but also provides direction for the plan, so that it can be referenced and improved operational content. In addition, this study also analyzes the data obtained from the trial operation. Besides the user's immediate feedback in the communication software group and the satisfaction questionnaire issued, the data analysis of various types of digital data is also carried out to explore the problems and operational status that cannot be directly observed on the surface. By summarizing the problems faced, we will revalidate the importance of the proposed key factors and assist in the future formal operations.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Chen, Ying-Cun, and 陳映存. "Wiretap Channel with Shared Secret Key and Side Information at the Transmitter." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/45jx2b.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
25

HUNG, LI-FEN, and 洪麗芬. "A Study of Key Factors on Applying Share Start Teaching Method in Elementary School." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/3g9u2u.

Повний текст джерела
Анотація:
碩士
育達科技大學
資訊管理所
107
Twelve-year compulsory education proposes the vision of curriculum: “success of all children: talent development and lifelong learning”. Based on educational concepts “spontaneity, interaction and common good”, it leads to student-based, human management and teacher-diversity instructional strategies. In traditional education, students lose the competence of active learning, direct expression and independent thinking. Finally, with Sharestart instruction in flipped classroom, it results in positive outcomes on students’ “self-learning, thinking and expression” abilities. The key factors of Sharestart instruction not only change teachers’ instructional methods, but also inspire teachers in instructional practices to lead to teaching benefits for both teachers and students. This study aims to explore factors of Sharestart instruction introduced in elementary education. First, it reviews literatures, generalizes experts’ and scholars’ opinions, develops expert questionnaire by Delphi Method and invites present teachers of elementary schools to fill in the questionnaires. It conducts evaluation and analysis by Analytic Hierarchy Process and calculates weights and overall ranking of the key factors. According to research findings, among 4 major criteria, “teacher factor” is the indicator with the most effect. The second is “students’ psychological factor” and “learning capacity” and the last is “instructional method”; among 17 secondary criteria, “learning motivation”, “professional growth” and “confidence” are the most significant factors. The indicators of this study can serve as reference for teachers to implement Sharestart instruction. Keywords: flipped classroom, Sharestart instruction, Delphi Method, Analytic Hierarchy Process
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Li, Kuan-Yi, and 李冠毅. "The study of Key Words advertisement related to industy market share form Google Trends analysis." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/71009233170144914894.

Повний текст джерела
Анотація:
碩士
樹德科技大學
資訊管理系碩士班
99
Due to the rapid development of the Internet today, any message can be fast and a lot of the Internet and related electronic products in circulation, making the search engine will not only become the world''s major consumer product information collection methods, has become the industry for advertising and marketing an important channel. This study aimed to the Internet for searching keyword marketing is analyzed, and Taiwan''s automobile industry, for example. Study architecture there is involvement of advertising, advertising awareness, search intentions, long tail ... and other research and analysis the correlation between the effect and impact. Of keywords and the correlation between sales; In addition, the intent of advertising involvement and the correlation between search and advertising is in between the media involved in the search intent will have a relevant impact between the results. Study information for the purchase of keyword advertising based automobile industry in Taiwan. The results will be available to later follow-up to promote the use of advertising keyword advertising keyword advertisers to think about the production direction.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Mogale, Nakampe Joseph. "‘Integration’ as a key concept in organization development : the case of Gauteng Shared Services Centre." Thesis, 2011. http://hdl.handle.net/10500/4197.

Повний текст джерела
Анотація:
Perceived failures of previous service delivery models within the Gauteng Provincial Departments dictates for experimentation with new working and improved models. Gauteng Shared Service Centre was established to improve efficiencies and effectiveness and service delivery to all citizens in the province. This study conceptualizes and analyses integration of Gauteng Shared Service Centre Organisation Development functions. Specialisation within the component seems to create problems both for the component internally and its client externally which may have a spill-over effect to service delivery to the provincial citizens. The General Systems Theory is utilized to facilitate the analysis of the Organisation Development component from a system’s perspective. This component of the GSSC, like any system exits for the achievement of a specific objective. Working together among system components is crucial for efficiencies. Integration is crucial in coordinating all specialist tasks of the component for improved service delivery to clients.
Public Administration
M.A. (Public Administration)
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Lee, Lin Wen-Ling, and 李林玟伶. "A Study on the Key Influence Factors in the Shared Consumption of Boutique Products : Using Birkin Bags as an Example." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/keazj6.

Повний текст джерела
Анотація:
碩士
東方設計大學
文化創意設計研究所
107
Originating from Europe and the US, sharing economy has given rise to new consumption behaviors of sharing bicycles, cars, and many kinds of goods and services in daily life. Sharing economy has enabled people to enjoy higher living quality at lower costs with products and services they could not afford before. Sharing economy can also help to fulfill the fullest use of products/services and, consequently, reduce waste of resources. With sharing economy, the traditional concept of “exclusive ownership” over goods is being overthrown while the concept and values of shared consumption are being gradually accepted by society. The shared consumption of valuable goods such as boutique products has also emerged as a new industry. However, unlike the automobile or housing industries, it is not supported by a mature supply chain; therefore, it is more likely to have problems of disputes over product damage, compensation, and other issues. Customer complaints are one of the major impediments of the development of this new industry. Considering the growing popularity of sharing economy around the world and the potential benefits of shared consumption of boutique products, this study is conducted using the Delphi method and the analytical hierarchy process (AHP) to explore the key influence factors in the development of shared consumption of boutique products by focusing on the Birkin bags as an example. Hopefully, the findings of this study can help to provide references for the industry and also for the diverse development of green consumption.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

YI, CHANG-CHI, and 易常騏. "A Study of Key Competencies Developments with Share-Start Approach to National Defense Education in A Senior High School Taoyuan City." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ckt325.

Повний текст джерела
Анотація:
碩士
萬能科技大學
資訊管理研究所在職專班
106
This study is to discuss the developments of key competencies with Share-Start approach to national defense education in a senior high school. The research method uses the pre- and post-test control group design method in the quasi-experimental design to carry out the experiment. In order to compare the Share-Start and narrative teaching methods, the subjects are divided into experimental group and control group. The participants in this study were two classes of students coming from first-year senior high school, who took “defense mobilization” in the national defense education curriculum. The experiment time lasted nine weeks with one lesson in a fifty-minute lecture per week. The Exam Questions for The National Defense Education and The Learning Effectiveness Scale of the National Defense Education Key Competencies are the quantitative research tools with statistical software for quantitative analysis. Two separate teaching approaches in terms of students’ performances in key competencies, namely, the creative and critical thinking, problem solving, teamwork, and communication skills are discussed and compared. The feedback questionnaires are collected for further qualitative analysis of the research purpose. The findings are listed as follows. 1. The stastical analysis of the post-test results has shown that after the two teaching methods have been adopted in comparison, there is a significant difference between the experimental group and the control group, who were homogenous in terms of their academic performance in national defense education in the beginning. Share Start is more effective in improving students’ learning performance than Didactic Teaching. 2. The stastical analysis also demonstrates that compared with the control group, students from the experimental group perform better with respect to creative and critical thinking, problem solving, teamwork, and communication skills, listed in the key competencies, whereas prior to the experiment, the two groups of students showed smiliar level proficiency of the aboved abilities. This indicates that Share Start is an effective approach in boosting students’ aformentioned key competencies. 3. The analysis of the feedback questionnaires shows that students prefer Share Start to Didactic Teaching, and during the learning process, Share Start enables them to reach concensus more easily and helps them learn how to embrace different opinions with understanding and respect. The research results are summarized into specific recommendations for the teaching of the national defense education and the development of students’ key competencies. Keywords:Share Start, Key Competencies, National Defense Education.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Chan, Tung-Loug, and 詹東龍. "The Study of Key Customer Management and Organization Change of Original Development Pharmaceutical Company–A case Study of Merck Sharp & Dohme Corporation,Taiwan Branch." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/20780800089101460353.

Повний текст джерела
Анотація:
碩士
國立中山大學
企業管理學系研究所
97
In today’s ever-changing, competitive business environment, professional managers are challenged with the aims of attracting target markets, establishing relationships, increasing competitiveness, and achieving objectives. The business must continually add value, create a long-term competitive advantage, and satisfy customer needs in order to maintain a position of leadership in the market. In opening Merck Sharp Dohme at a time when medical organizations are undergoing such global change, one must consider the relationship between the aim of the organization and the clients’ needs. In 2007, the “Key Customer Unit” was established, a new marketing approach (New Strategic Selling) was adopted, and the competitiveness of the organization was enhanced, a new method of managing the client base was created, which assisted the company in reaching its global objectives. This research paper used explorative research methods adopting qualitative and quantitative means of analysis, as well as on the spot investigation into internal operations of the “Key Customer Unit” of the Taiwanese branch of an American pharmaceutical factory. Through the implementation of KAM and CRM, research was conducted into the operation of the “Key Customer Unit”. Discussions were carried out into my degree of satisfaction with the achievement of company objectives. Discussions also touched upon my satisfaction with current policies, the operation of the “Key Customer Unit”, the results and cohesiveness of the “Key Customer Unit”, staff qualities, on the job competence as well as limitations. Conclusions of the thesis are listed below: 1. Solving on-the-spot problems for the “Key Customer Unit” as well as providing a platform for long-term cooperation. 2. The importance of the operation and cohesiveness of the “Key Customer Unit”, creating a plan for clients, and servicing clients. 3. Members dealing with the “Key Customer Unit” demonstrated experience, confidence, logic, and the ability to execute, delegate, and communicate effectively. 4. The ability to coordinate was the skill most valued by clients and staff. 5. Key reasons behind success of the “Key Customer Unit” was, choosing the right staff, systematic thought, professional management on the part of the client manager, coordination of resources, marketing activities, coordinating the duration of the client plan, as well as complete dedication to the task at hand. 5 key points developed from the conclusion: 1.The execution of MERCK’s 5 Ring policy aims at building motivation for the “Key Customer Unit” 2.Finding the right person to carry out the right steps is the cornerstone of success behind the “Key Customer Unit”. 3.The driving force behind the success of managing the “Key Customer Unit” is the Client Manager. 4.Opportune spending and proper use of resources is the most impressive result when managing the “Key Customer Unit”. 5.The key point to adding value to your “Key Customer Unit” is separation of customer teams to increase internal competitiveness.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Zaverucha, Gregory. "Hash Families and Cover-Free Families with Cryptographic Applications." Thesis, 2010. http://hdl.handle.net/10012/5532.

Повний текст джерела
Анотація:
This thesis is focused on hash families and cover-free families and their application to problems in cryptography. We present new necessary conditions for generalized separating hash families, and provide new explicit constructions. We then consider three cryptographic applications of hash families and cover-free families. We provide a stronger de nition of anonymity in the context of shared symmetric key primitives and give a new scheme with improved anonymity properties. Second, we observe that nding the invalid signatures in a set of digital signatures that fails batch veri cation is a group testing problem, then apply and compare many group testing algorithms to solve this problem e ciently. In particular, we apply group testing algorithms based on cover-free families. Finally, we construct a one-time signature scheme based on cover-free families with short signatures.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Wilson, Preethy. "Inter-device authentication protocol for the Internet of Things." Thesis, 2017. http://hdl.handle.net/1828/8139.

Повний текст джерела
Анотація:
The Internet of things (IoT) recently blossomed remarkably and has been transforming the everyday physical entities around us into an ecosystem of information that will enrich our lives in unimaginable ways. Authentication is one of the primary goals of security in the IoT and acts as the main gateway to a secure system which transmits confidential and/or private data.This thesis focuses on a Device-to-Device Mutual Authentication Protocol, designed for the smart home network, which is an essential component of communication in the Internet of Things(IoT). The protocol has been developed based on asymmetric cryptography to authenticate the devices in the network and for the devices to agree on a shared secret session key. In order to ensure the security of a communications session between the devices, the session keys are changed frequently - ideally after every communication session. The proposed scheme has been programmed in HLPSL, simulated and its efficiency verified using the SPAN/ AVISPA tool. When SPAN substantiates the protocol simulation and the attacker simulation, the back-ends of the AVISPA tool verifies the safety and security of the proposed authentication protocol. The thesis also evaluates the protocol's security against the attacks successful against protocols proposed by other researchers.
Graduate
0544
0984
0537
pwilson1@uvic.ca
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії