A Method Supporting Monitoring And Repair Processes of Information Systems

Wielkość: px
Rozpocząć pokaz od strony:

Download "A Method Supporting Monitoring And Repair Processes of Information Systems"

Transkrypt

1 GDANSK UNIVERSITY OF TECHNOLOGY Faculty of Electronics, Telecommunications and Informatics Marek Kamiński A Method Supporting Monitoring And Repair Processes of Information Systems PhD Dissertation Supervisor: prof. dr hab. inż. Janusz Górski Faculty of Electronics, Telecommunications and Informatics Gdansk University of Technology Gdansk, 2011

2 Mojemu Bogu, Panu, Stworzycielowi i Zbawicielowi Jezusowi Chrystusowi Mojej Ukochanej Żonie Agnieszce Moim Drogim Rodzicom Marianowi i Zenobii Za wszystko co Wam zawdzięczam, za waszą miłośd i za waszą obecnośd Kocham Was, Jesteście Wszystkim co mam Dedykuję tę rozprawę dla Was To My God, Lord, Creator and Saviour Jesus Christ To My Beloved Wife Agnieszka To My Dear Parents Marian and Zenia For all I owe You, for Your love and Your presence I Love You, You Are Everything I have I dedicate this dissertation to You ii

3 Abstract This thesis proposes a new method of on-the-fly monitoring and repair of IT systems, called ARM. The method integrates monitoring processes (taking into account the already existing and used monitoring systems) with repair processes. A conceptual model of monitoring and repair was proposed and formally specified together with formal specifications of the repair mechanism and selected repair procedures. The formal specifications were expressed in Z notation. These specifications were subjected to analyses verifying their adequacy and consistency (the Z/EVES tool was applied for consistency checks). The specifications comprise an abstract definition of ARM which can be then used to drive implementation of the method in a chosen target environment. They were used to drive a prototype implementation of ARM in the industrial environment of Lufthansa Systems Poland company. The prototype was then used in a series of experiments and case studies targeting at assessment of effectiveness and efficiency of ARM. Effectiveness was demonstrated by implementing a set of genetic repair procedures and integrating the existing and widely used monitoring system NAGIOS. Efficiency was assessed by evaluating the gain resulting from using ARM in comparison with the situation were the repairs were conducted in a traditional way. The results from the experiments and case studies fully confirmed that ARM brings a considerable added value to the processes of monitoring and repair of industrial IT systems. Streszczenie W pracy zaproponowano nową metodę (ARM) zarządzania monitorowaniem i naprawą systemów IT, bez przerywania ciągłości ich funkcjonowania. Metoda ta integruje procesy monitorowania (uwzględniając już istniejące i stosowane rozwiązania) z procesami naprawy. Stworzono formalny model koncepcyjny opisujący dziedzinę monitorowania i naprawy oraz formalne specyfikacje mechanizmu napraw oraz wybranych procedur naprawczych. Do specyfikacji formalnych wykorzystano metodę Z. Specyfikacje te zostały poddane analizie pod kątem oceny ich adekwatności i spójności (wykorzystano tu narzędzie Z/EVES). Specyfikacje te stanowią abstrakcyjną definicję metody ARM, która może być wykorzystana do implementacji metody w wybranym środowisku docelowym. Wykorzystano je do wytworzenia prototypu wspierającego ARM, który został zrealizowany i poddany badaniom eksperymentalnym w firmie Lufthansa Systems Poland. Badania te miały na celu ocenę skuteczności i wydajności metody ARM. Skuteczność została potwierdzona przez implementację reprezentatywnego zestawu procedur naprawczych oraz integrację z przemysłowym systemem monitorowania NAGIOS. Wydajność oceniono poprzez ocenę poprawy czasu realizacji napraw przy wykorzystaniu metody ARM w stosunku do sytuacji, gdy nie była ona stosowana. Przeprowadzone badania w pełni potwierdziły przydatność metody ARM w warunkach przemysłowych. iii

4 Table of Contents CHAPTER 1. INTRODUCTION ROLE AND IMPORTANCE OF MONITORING AND REPAIR CURRENT STATE OF ART RATIONALE THESIS PROPOSITION SCOPE OF RESEARCH THESIS STRUCTURE... 4 CHAPTER 2. MONITORING AND REPAIR PROCESSES A MONITORING PROCESS Common view on the monitored reality Monitoring mechanisms A monitoring process model A REPAIR PROCESS A repair process model OVERVIEW OF PROBLEMS AND THEIR SOLUTIONS Problem 1: Wrong entries in scheduler table Problem 2: Backup failures preventing DBMS from working Problem 3: Failures during optimizing physical structures of production database Problem 4: Unacceptable delay in replication of time-critical data GENERIC SOLUTIONS TO PROBLEMS Solution to problem 1: Changing scheduler table Solution to problem 2: Bringing DBMS to working status Solution to problem 3: Optimizing unoptimized database structures Solution to problem 4: Forcing emergency replication of time-critical data SUMMARY CHAPTER 3. ARM A METHOD OF AUTOMATED REPAIR MANAGEMENT INTRODUCTION COMPONENTS OF THE METHOD RMM Repair Management Model RMF Repair Management Framework RMS Repair Management System ARM: STEPS OF THE METHOD FORMAL DEFINITION OF RMM Submodel of monitoring Submodel of repair Problem detectors DEFINITION OF RMF Repair library Interfacing steps to the calling repair procedure DEFINITION OF RMS Integrating the ideas SUMMARY CHAPTER 4. ARCHITECTURE OF RMS BASIC ASSUMPTIONS PREPARATION ACTIVITIES ARCHITECTURAL MODEL OF SYSTEM FUNCTIONING OF SYSTEM ARCHITECTURE OF REPAIR API TEMPLATE OF A TYPICAL REPAIR PROCEDURE SUMMARY CHAPTER 5. ASSESSMENT OF ARM THE APPROACH INTRODUCTION Scope of assessment Criteria of assessment CONSISTENCY CRITERIA iv

5 5.3 EFFECTIVENESS CRITERIA EFFICIENCY CRITERIA Sources of data Encountered problems Comparison rules Test environment SUMMARY CHAPTER 6. EXPERIMENTS AND CASE STUDIES INTRODUCTION CASE 1: CHANGING SCHEDULER TABLE Detailed description Unique features of the case Summary and results of experiments CASE 2: BRINGING DBMS TO WORKING STATUS Detailed description Unique features of the case Summary and results of experiments CASE 3: OPTIMIZING UNOPTIMIZED DATABASE STRUCTURES Detailed description Unique features of the case Summary and results of experiments CASE 4: FORCING EMERGENCY REPLICATION OF TIME-CRITICAL DATA Detailed description Unique features of the case Summary and results of experiments DISCUSSION OF OBTAINED EFFICIENCY GAIN SUMMARY CHAPTER 7. CONCLUSIONS INTRODUCTION RESULTS OF ASSESSMENT ORIGINAL CONTRIBUTION Contributions at the conceptual level Contributions at the realisation level BENEFITS AND LIMITATIONS FURTHER WORK AREAS REFERENCES APPENDIX A. EXTENDED ABSTRACT IN POLISH A.1 WPROWADZENIE A.2 PROCESY MONITOROWANIA I NAPRAWY A.3 TYPOWE PROBLEMY I ALGORYTMY ICH NAPRAWY A.4 ARM METODA ZAUTOMATYZOWANEGO ZARZĄDZANIA NAPRAWAMI A.5 ARCHITEKTURA SYSTEMU RMS A.6 OCENA METODY ARM A.7 EKSPERYMENTY I STUDIA PRZYPADKÓW A.8 PODSUMOWANIE APPENDIX B. THE Z NOTATION APPENDIX C. PROTOTYPE IMPLEMENTATION IN INDUSTRIAL ENVIRONMENT C.1 INTRODUCTION C.1.1 Unix philosophy C.1.2 Underlying protocol C.1.3 Implementation language C.2 PREDICATES C.2.1 Time restrictions elimination by delegation C.2.2 Introduced notation C.2.3 Developed mechanism C.3 MODEL OF RMS DATABASE v

6 C.3.1 ERD Entity Relationship Diagram C.3.2 Description C.4 COMPONENTS OF PROTOTYPE C.4.1 Database C.4.2 Main scripts C.4.3 Repository of repair procedures C.4.4 Repository of repair actions C.4.5 Repair API C.4.6 Configuration of system C.4.7 Log of system C.5 SUMMARY APPENDIX D. PERL SOURCE CODE EXEMPLARY REPAIR PROCEDURE APPENDIX E. SYMBOLS AND ABBREVIATIONS vi

7 List of Figures Figure 2.1 Solution to problem 1: Changing scheduler table Figure 2.2 Solution to problem 2: Bringing DBMS to working status Figure 2.3 Solution to problem 3: Optimizing unoptimized database structures Figure 2.4 Solution to problem 4: Forcing emergency replication of time-critical data Figure 3.1 Scope of ARM method Figure 3.2 Components of ARM method Figure 3.3 Exemplary containers tree Figure 4.1 Division Procedure-Action-Step Figure 4.2 Exemplary connections tree Figure 4.3 Architecture of RMS Figure 4.4 Architecture of Repair API Figure 6.1 Data flow related to case 1: Changing scheduler table Figure 6.2 Data flow related to case 2: Bringing DBMS to working status Figure 6.3 Data flow related to case 3: Optimizing unoptimized database structures Figure 6.4 Data flow related to case 4: Forcing emergency replication of time-critical data Rysunek A.1 Kontekst metody ARM Rysunek A.2 Komponenty metody ARM Figure C.1 Entity Relationship Diagram of RMS database Figure C.2 Implementation of RMS vii

8 List of Tables Table 4.1 Template of a typical repair procedure Table 6.1 Case 1: Summary and results of experiments Table 6.2 Case 2: Summary and results of experiments Table 6.3 Case 3: Summary and results of experiments Table 6.4 Case 4: Summary and results of experiments Table 6.5 Summary of quantitative results Table 7.1 Results of assessment of ARM Tabela A.1 Zestawienie zysków na wydajności Tabela A.2 Rezultat oceny metody ARM Table B.1 Elements of Z notation viii

9 Acknowledgements I would like to thank Professor Janusz Górski, my academic supervisor, for his invaluable support and advice. I would like to thank the people who supported the creation of this thesis and contributed to development and assessment of the software tool and to realization of the experiments: Olaf Jendryssek, Piotr Butkiewicz, Paweł Kudzia, and Helpdesk Team of the Lufthansa Systems Poland Company. Marek Kamiński ix

10 Chapter 1. Introduction 1.1 Role and importance of monitoring and repair The current world is characterized by a very fast and progressive informatization of almost all domains of our lives. Number of IT systems and new functionalities they provide increase dynamically. Almost every system requires a kind of supervision and control. It results from the fact that hundred percent faultless and reliable systems do not exist. Complex IT systems are built of components that interact with one another and utilize various kinds of resources. Problems in their functioning often stem from running the systems continuously and performing changes and updates on the fly. It includes underestimating essential parameters of the components or resources, errors introduced during maintenance and other factors. In many cases, the types of reoccurring problems are well recognized and procedures of solving such problems are known. Because detecting a problem is the starting point to undertake an attempt of solving it, the IT systems and their elements are subjected to monitoring. Monitoring involves taking periodical measurements of the state of a system or its elements and applying some correctness criteria to distinguish a faulty state. The task of monitoring can be conducted manually, if the number of monitored objects is small. When this number is high, the manual monitoring becomes impossible without bearing too high cost. This is why various monitoring systems and mechanisms, automating the task of monitoring, are being used. Many such systems were already proposed (see e.g. [Radič, Ńkiljan 2004] for an overview). In general, such systems allow to [Albrand 2005]: assess if the monitored system works according to its specification, achieving its business goals, assess if the QoS requirements (reliability, availability, performance, etc.) are met, make the processes of checking a state of the system parameters and comparing them to predefined patterns mode efficient, detect potential anomalies in functioning of the system or even predict the future ones, provide the up-to-date (real-time) information about the state of the monitored system. Solving a detected problem is called a repair. It involves corrective steps aimed to remove the symptoms and causes of a detected problem. These steps can be undertaken in either a manual or an automated manner. The need for monitoring the systems and the high costs of their repairs resulted in establishing the market of IT monitoring and repair services. These services are in the scope of so called helpdesk. They include remote monitoring and technical support and assistance in maintenance and running the IT system, 24 hours a day and 365 days a year. 1.2 Current state of art Numerous monitoring ideas, methods and systems have been developed over the last years. Great deal of them focus on monitoring the selective functional aspects of networks, hosts and applications. In addition, general purpose monitoring systems (see e.g. [Sakellariou, Zanikolas 2005]) that allow to monitor almost any parameter of an IT system have been proposed. In such systems the scope of monitoring can be controlled by parametrisation and/or extendability (plug-ins). The problem of automatic repairs is more complex and is still the area of active research. Repairs are more difficult to automate and often involve manual and time-consuming interventions of administrators of the monitored systems. Nevertheless, repairs of some selected classes of problems have been already successfully automated. These include: application exception handling (e.g. java exceptions), limiting time of operations (e.g. RPC timeouts), purposeful redundancy (e.g. hard disks mirroring or back-up elements), 2

11 retrying failed actions finite number of times. If some components of systems are adequately equipped with the above mechanisms, they become more resistant to problems. Another mechanism in use is event handlers. The handler involves execution of a remote command (commands). An event is an undesired monitoring result and the associated handler provides an adequate repair action [Barth 2008; Josephsen 2007; Turnbull 2006; ZabbixSIA 2008]. Some solutions [Bauer 2009; Strejcek 2009] focus on automation of administrative tasks and do not integrate with monitoring. Other approaches [Gerlan, Schmerl 2002; Gerlan et al. 2003; Gerlan et al. 2002] focus on describing the architecture to facilitate automated repair. Efforts were made to integrate NAGIOS Monitoring System [Barth 2008; Josephsen 2007; Turnbull 2006] with CFengine system (in particular, regarding network problems [Retkowski 2006]). Some other works show directions the monitoring and healing (repairing) can go in a longer perspective [Pervilä 2007]. 1.3 Rationale This thesis takes a pragmatic view and is underpinned by observations of industrial reality. They led to the conclusion that in many cases, interventions being conducted manually by administrators of the monitored systems are repeatable. As they are repeatable, the added value resulting from their automation increases. As they are triggered by unacceptable monitoring results, it makes sense to integrate them with the monitoring tasks. The current industrial situation taken as the starting point of this thesis can be characterized as follows: the systems needing monitoring and repair are already designed and running, they do not have healing-oriented architecture, their administrators may only use a narrow set of acceptable and proven, tools and solutions, the monitoring task has already been automated and implemented to a satisfactory level, it is hard and error prone to implement complex repairs using only a set of simple commands performed mainly manually. 1.4 Thesis proposition The main goal of this thesis is to propose a method allowing automated identification and solving of chosen classes of problems occurring in industrial IT systems. The thesis proposition is as follows: The proposed method provides effective and efficient support for the monitoring and repair processes. 1.5 Scope of research The scope of research includes: development of a general model providing for representation of monitored objects and their states, selection of representative classes of problems occurring in industrial IT systems, development of a language framework for specification of repair processes, using this framework to specify repairs solving chosen problems, development of a method of automated execution of repairs, development of an architecture integrating monitoring and repair processes, demonstrating the feasibility of the method and architecture by a prototype implementation, validation of the proposed solutions. 3

12 1.6 Thesis structure The chapters of the thesis are organized in the following way: Chapter Two provides an overview of the monitoring process. It lists and classifies the monitoring mechanisms used nowadays. Then it introduces a generic model of the monitoring process. It discusses the problems and solutions related to the repair of IT systems. In particular, it identifies repeatable elements of repairs as candidates for automation. Finally, it presents four classes of problems that are representative to the industrial practice and presents related solving strategies. Chapter Three introduces the ARM method a method aimed to automate executions of repeatable repairs. The method consists of three components, each of which is introduced in a separate section. The language used to describe the method is a formal notation Z [Potter et al. 1991]. Chapter Four proposes an architecture of RMS system which forms the base for implementing the ARM method. It explains the structure, functioning and some key elements of the architecture. Chapter Five focuses on validation of the ARM method and RMS system. It introduces objectives of the assessment, the scope of measurements and the assessment criteria. Chapter Six presents case studies corresponding to the problems described in chapter two. The case studies were conducted in an industrial environment and served as the source of data for the validation process defined in chapter five. Chapter Seven contains conclusions drawn from the research. This thesis is supplemented with five appendixes: Appendix A contains an extended abstract of this dissertation, written in Polish. Appendix B contains a short introduction to Z notation, necessary to understand ARM models. Appendix C describes a prototype implementation of RMS in an industrial environment. The chapter explains and justifies basic design decisions and the technical means used in implementation. Appendix D contains a source code of an exemplary repair procedure. Appendix E Symbols and abbreviations. 4

13 Chapter 2. Monitoring and repair processes 2.1 A monitoring process Monitoring is a general term and it can be defined as: systematic and purposeful observation [Bartle 2006] Monitoring can refer to different objects (e.g. monitoring of Members of Parliament [Kamiński 2005]). However, in this thesis the scope of monitoring is restricted to IT systems and various aspects of their functioning. The IT systems monitoring is primarily intended to identify what has gone, or is about to go, wrong. It can be defined as a combination of four activities [Sellens 2000]: data acquisition collecting or generating the data, data storage logging the data, data processing analysis, comparison, evaluation, data presentation reporting and exception alerting Common view on the monitored reality In practice, monitoring is often implemented by a helpdesk (call center). This call center is intended to provide users with assistance in solving technical issues [Blokdijk 2008a]. The world of IT systems monitored by a helpdesk can be generally characterized as follows: company providing the helpdesk service has many customers, the customers own IT systems that provide services needed by their business processes, the customers and their systems are geographically (and widely) distributed, the systems consist of various kinds of hardware and software resources, they are accessible via external and/or internal networks Monitoring mechanisms Numerous monitoring mechanisms and numerous monitoring systems are presently in use [Cottrell 2010]. There are monitoring systems that monitor separated, and often independent IT systems and their monitoring function is centralized [Radič, Ńkiljan 2004] we will call them traditional monitoring systems. Those systems collect (active monitoring) or receive (passive monitoring) the results in a designated central place, for further processing and analysis. Subsequent actions (e.g. actions related to presenting the processed information or informing proper persons) are undertaken based on the outcomes of the analyses. The limits of values of the monitored parameters are set by system operators (or default values are used instead). The monitoring system periodically generates reports providing the information on the state of monitored objects. The reports are presented in a comprehensible form on a central interface of the monitoring system. It is accessible to the authorised persons (for instance, via a web page). If a problem with a monitored object is being detected, the administrator of this object can see it (on the relevant web page) or is notified (for instance, via a SMS) and is obliged to undertake an action solving the problem [Barth 2008]. Some systems are capable to analyse the historical data to detect trends of monitored parameters. They can utilize sophisticated methods of artificial intelligence to predict future states of the systems [Savage 1999]. Detecting that a certain parameter is likely to exceed its critical value, the administrator may undertake a preventive action before the problem actually instantiates. Examples of traditional monitoring systems are: Nagios, Zenoss, Zabbix, Pandora, Big Brother, Big Sister, HP OpenView, NeDi [Aslett 2006; Jones 2004; Cacheda et al. 2007]. 5

14 In addition to traditional centralized systems a broad class of distributed monitoring systems exists. Those systems mainly aim to monitor grid or cluster structures [Ceccanti, Panzieri 2004; Hongbin et al. 2005]. In many cases they have a grid based architecture. They are equipped with specialized software to allow the users to share various kinds of resources (e.g. computational resources or disk resources). This provides for balancing usage of resources, for coordinating parallel work of all nodes, and for saving the results of processing in a shared storage. The advantage of a grid is its ability to consume computational power of temporarily unused machines (e.g. computational power of workstations left idle at night) [Mosorow 2007]. Well-known example of a computational grid system is SETI@home project. Distributed monitoring systems often provide additional functions, not directly related to monitoring. For instance, they may provide information on availability of grid resources. They register new grid nodes, along with services they provide, and they answer the queries related to the services [Byrom et al. 2004]. Distributed monitoring usually involves hierarchical filtering of the information. The nodes transfer gathered information upwards the hierarchy with possible filtering and aggregation [Groothuyse 2004; Cosnard et al. 1995]. The monitoring logic of such systems is also distributed. Examples of distributed monitoring systems include: Ganglia, Hawkeye, MonALISA, NWS (Network Weather Service), RGMA (Relational Grid Monitoring Architecture), GridRM, Merkury [Sakellariou, Zanikolas 2005] A monitoring process model After analysing common features of monitoring systems we propose the following definition of the monitoring task. Monitoring is a process of examining subsequent states of a group of objects against defined criteria and informing about detected anomalies. This definition abstracts from the physical nature of the monitored objects. It may be a remote machine (computer or network device) running an operating system, a service, or it may be any resource of the machine. Each monitored object assumes mutually exclusive states, and each state assumes a value from a specific domain. Some of these values indicate that the state is correct, while the other values tell us that the monitored object has encountered a problem that must be solved. We can assign priorities to the undesired states to distinguish between levels of their relevance. This classification of states is usually based on so called threshold values. Some of the undesired states can then be classified as CRITICAL, whereas others are interpreted as WARNINGS. To distinguish between the monitored objects we need some naming system. We represent such objects as variables assuming that the value of a variable represents the current state of the associated object. We also assume that the mechanism which binds variables with the real objects subjected to monitoring is available. With these assumptions, monitoring becomes a process of continuous checking (observing) values of multiple variables against the specific set of monitoring criteria. The monitored world is often structured hierarchically, and the monitored objects are the leaves (e.g. hosts storing replication hubs, storing replication channels, storing replication lines [Kamiński 2007c]) of the hierarchy. It is convenient, therefore, to use qualified names for the variables representing such objects, like for file names of a hard disk drive, the Internet names of the DNS protocol, or the MIB tree of the SNMP protocol. For example: eclipse.oracle.testdb.fs.usage represents usage of the main filesystem of machine eclipse, belonging to DBMS oracle, and identified by SID TESTDB, eclipse.cpu.temperature represents current temperature of main processor of the same machine, eclipse.cpu.usage represents usage of the central processor. Values of the variables representing monitored objects can change in time. A qualified name of a variable augmented by a timestamp indicates precisely a single measurement, informing where and when it was taken. Frequency of changes depends on the frequency of retrieving and processing data from the monitored objects and on the stability of their states. 6

15 Because sometimes the measurements (especially these indicating problems) carry extra information, it is convenient to allow optional details that can be passed together with the values of the monitored variables. Monitoring involves checking the monitoring criteria. These criteria can be formalized as predicates. Simple examples of such criteria are shown below: eclipse.oracle.${anydatabase}.fs.usage > 95% this predicate becomes true if any oracle database of machine eclipse is running out of space of its main filesystem, (${hostx}.cpu.temperature > 70ºC) AND (${hostx}.cpu.usage = 100%) this predicate becomes true if the main processor of any machine is overheating and it is 100% busy at the moment. In the above examples, the notation: ${...} indicates a part of the name of a variable that may be substituted by any valid string. Detecting that a given predicate becomes true tells us that the monitored objects associated with the corresponding variables have a problem, and the time and location where the problem occurs are precisely indicated. 2.2 A repair process Problems of IT systems reappear and therefore it is convenient to represent the corresponding repair actions as repair procedures that can be initiated if needed. Further in this dissertation, the repair procedures are referred to as procedures. A procedure describes a solution. A repair is an activity of using a procedure. To define repair actions as a procedure, we need to express them formally, precisely, and in a general manner. All unnecessary details should be abstracted away. Other details, like those pointing to the location of the problem and to its wider context (if needed), could be passed to the procedure as its input parameters A repair process model We propose the following model for describing repair procedures that drive repair processes Standard control flow instructions Standard flow control instructions [Daviduck]: loops iterations of a fragment of an algorithm, conditions decision points forks in an algorithm indicating the path it conditionally goes, sequences instructions executed in a consecutive manner, not changing a path of the flow control. In addition, as sequences, we distinguish: interactions with the outer world points where an algorithm sends output and receives input, calls of internal routines executions of procedures or functions being a part of an algorithm, calls of external routines executions of procedures or functions defined outside an algorithm External routines steps of repair The last group of the instructions distinguished above represents the smallest units of repair activities. They are the actual corrective steps. We assume they aim at fixing or changing those components of a monitored system that affected its state in an adverse way. They are routines that are external to main body of the repair procedure. They are distinguished because they are usually executed on machines owning broken components, being a subject of a particular repair. 7

16 Let us consider a simple example of a system including two filesystems, residing on different machines (A and B). To solve a particular problem we may need to enlarge the capacity of each filesystem. That is, we need two actions, an action enlarging the filesystem on the machine A, and an action doing the same on the machine B. The actions of the repair are, therefore, naturally distributed. The remaining part of the logic of the repair procedure can be considered as location-independent. This observation forms the cornerstone of the method presented in this dissertation: the repair procedures may be started and run centrally, connecting to the remote machines only when necessary. External routine is a well-known concept of programming languages. Conceptually we can consider it as a black box performing the required action in the required place. Further in this dissertation, the external routines are referred to as steps. 2.3 Overview of problems and their solutions In this section we present a range of typical problems encountered in industrial IT systems. Each problem is described in a general way and represents a broader class of problems that occur in practice Problem 1: Wrong entries in scheduler table Many operating systems offer scheduler programs which execute tasks regularly at certain times (e.g. at night or during weekends). Such tasks are commonly used to automate system maintenance and administration but they can also be used for other purposes, such as connecting to the Internet and downloading s. A well-known and a popular scheduler program, existing in many UNIX distributions, is called CRON [Peek, Powers 2002]. Definitions of the tasks and exact times of their planned executions are stored in the entries of so called scheduler table. In case of CRON it is called CRONTAB. Examples of unwanted events are: A particular scheduler table or its variations are deployed in enormous number of machines. It turns out that some of the planned tasks are totally wrong or have serious defects (it could be the result of previously introduced changes or other factors) Problem 2: Backup failures preventing DBMS from working Businesses and other organizations become increasingly reliant upon OLTP systems [DRJ]. Online and batch processing of databases requires full integrity and recoverability. It is ensured by using special files often called redo log files (Oracle DBMS [Whalen 2006]) or journal files (Ingres DBMS [Flower 2006]). The associated mechanism follows the idea that as transactions are processed, the DBMS writes log (or journal) records to the file recording the changes in a consistent format. In case of e.g. a hardware failure, a forward recovery utility is used to recover from the starting backup copy of the entire database. This means that at least two kinds of backups exist in current OLTP systems: A full backup a copy of the entire database at one point in time. It contains all data and relevant journal files. The full backup requires a large amount of storage space, but the database can be restored from this kind of backup relatively quickly. An incremental backup a backup that is still active, even when the users or batch processes are working. It records each change of data since the last full backup. The incremental backup requires a small amount of storage space, but more time is needed to restore the database from this kind of backup. After a failure of the media storing the current datafiles, full recovery of the database requires the last full backup of the database and the related incremental backup. Files belonging to full backups and to journal files usually reside on dedicated filesystems. As such filesystems have limited capacity, the stored files are moved to other storages (removed from the 8

17 filesystems) when they are no longer needed. Usually, old backups are removed, after newer ones are created. A problem occurs when the storage resource runs out of its free space. A common scenario leading to this problem is as follows: A procedure performing routine full backup of a production database referred to as checkpoint terminates abnormally due to random factors. As a consequence, the journal files supposed to reside in the journal-dedicated filesystem for a short period of time are not removed. This increases the probability of overflowing that filesystem. The journal-dedicated filesystem runs out of its free space indeed, preventing DBMS from creating new journal records. The DBMS stops (transactions suspend), preventing the users and batch processes from working. In addition, some other unwanted events enlarging only the problem may occur: Abnormal termination of checkpoint prevents it from removing corrupted files from the checkpoint-dedicated filesystem, which increases the probability of overflowing that filesystem. The DBMS archiver process creating new journal records terminates. The symptoms detected by a monitoring system, and indicating this kind of problem, include: 1) The journal-dedicated filesystem is 100% full. 2) The archiver process is down Problem 3: Failures during optimizing physical structures of production database Due to continuous changes, the OLTP database systems need a regular maintenance to provide for a good response time and other performance parameters. This goal is usually achieved in the following way: The scheduler table has the reference to the task optimizing physical structure of the production database of a customer. The task is executed regularly at times suitable for the customer. It produces a log file with information which database structures have been optimized successfully. The following factors indicate the condition of the OLTP database, concerning its performance: Database storage structures underlying tables stored in the database [García-Molina et al. 2000]. Indexes created for these tables. Collections of statistics, controlling for instance the behaviour of Query Optimizer Facilities. The process of optimizing the performance of the whole database focuses on improving those three factors for each database table [CA; Kaelin 2004; PostgreSQL 2008]. The problem occurs when the above mentioned log file contains errors Problem 4: Unacceptable delay in replication of time-critical data The value of some data is time dependent. Examples include data related to stock markets, flight planning, flight safety, medical treatment, and so on. In contemporary OLTP systems, time-critical data usually follow the following path: Time-critical data is inserted to a centralized or a distributed database. It is transported over the network to other databases using one of many replication techniques [Khadzynov, Maksymiuk 2006; McKinstry; HVR]. The consumer of the data detects their availability and starts using the data. Unwanted situation may happen when the replica fails. It is not certain that repairing the replica can be conducted fast enough to keep its downtime unnoticeable to the customer. Thus, it is necessary to 9

18 make sure that at least the time-critical data is available at the remote site to avoid an unacceptable delay. 2.4 Generic solutions to problems The following subsections present solutions to the four described problems. Common flowchart notation has been used to provide for precision and to reduce possible misunderstandings, omissions and ambiguities. It also makes the ground for converting human-executable tasks into machineexecutable code Solution to problem 1: Changing scheduler table The solution to this problem is very simple. The algorithm is shown in Figure 2.1: START Dump the original crontab file Apply changes Dump a new crontab file STOP Figure 2.1 Solution to problem 1: Changing scheduler table Solution to problem 2: Bringing DBMS to working status Typical solution to this problem involves at most eight steps (rectangles with a thin border line) and one internal routine (rectangle with a thick border line). The internal routine determines a strategy of solving the problem. If the algorithm cannot solve the problem, then it rolls performed changes back and stops. The algorithm is shown in Figure 2.2 (rhombi represent points where it waits for receiving input from the outer world): START Was it successful? No Make list of inactive journal files Find free disk space Move inactive journal files to temporary locations Yes Startup database archiver process Find solution Apply it Was it successful? Yes No What shall I do? Finish What shall I do? No Was it found? Remove broken checkpoints Rollback moving of inactive journal files Finish Yes Perform checkpoint Retry STOP Finish What shall I do? What shall I do? Finish Ask user for another solution Was it successful? No Ask user for the last resort solution Retrieve data from user Yes Remove temporary files STOP Figure 2.2 Solution to problem 2: Bringing DBMS to working status Solution to problem 3: Optimizing unoptimized database structures Typical solution to this problem involves one step (REEXECUTE THIS task) which is executed repeatedly with different parameters. Solving the problem usually requires conducting some auxiliary tasks, like suspending or unsuspending related replications, to prevent the problem from reoccurring. Those 10

19 tasks, despite being helpful, do not relate to the problem solution directly. The algorithm describing this solution is shown in Figure 2.3: START Create (for each unoptimized table) ordered list of tasks to reexecute Show unempty lists and their contents STOP Finish What shall I do? Maintain potentially interfering processes Find and show related replications Ask user to point chosen tables Reexecute all tasks for some of the tables Ask user to point some replications Ask user to point some replications Suspend them Unsuspend them Is there any TABLE without reexecuted tasks? No Are all lists empty? No Yes Yes Are any replications (suspended in this repair) still suspended? No No Has THIS table on its list any next TASK to reexecute? Yes Reexecute THIS task Yes Unsuspend them Remove task from the list Yes Was reexecution successful? STOP No Figure 2.3 Solution to problem 3: Optimizing unoptimized database structures Solution to problem 4: Forcing emergency replication of time-critical data An example solution involves watching the status of a replication. After time-critical data is inserted to a database being the replication source, the supervising process (commonly called watchdog ) starts. Its role is to intervene when the time-critical data is not available at the target databases. The algorithm describing this solution is shown in Figure 2.4: 11

20 START Prepare list of replication lines (SOURCE and TARGETS) and a current replication status Export the time-critical data from replication SOURCE to files Wait configured amount of time Prepare list of replication lines (SOURCE and TARGETS) and a current replication status Wait entered amount of time Remove from the list TARGETS having the data already Import the time-critical data to target #N Is the list empty? Yes No Import the time-critical data to target #2 Ask user how long Wait What shall I do? Finish STOP Import the time-critical data to target #1 Ask user to point targets Insert the data to targets immediately Figure 2.4 Solution to problem 4: Forcing emergency replication of time-critical data 2.5 Summary Problems detected during monitoring can be modelled by predicates defined over the set of the variables representing the monitored objects. This provides a base for the generic model of the monitoring process which abstracts from the physical nature of the monitored objects. The model provides for specification of the logical nature of the problem, precise identification of the object within the monitored (hierarchical) space and localization of the problem in time. In most cases repairs solving the problems are deterministic algorithms and therefore can be specified by conventional means, e.g. flowcharts. Expressing the solutions in a formal manner is a starting point to automate the process of repair. The algorithms involve human-machine interactions when a machine is unable to make a proper decision. The logic of generic elements of repairs (steps) may be delegated to a lower abstraction level. 12

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi SNMP Protocol The Simple Network Management Protocol (SNMP) is an application layer protocol that facilitates the exchange of management information between network devices. It is part of the Transmission

Bardziej szczegółowo

www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C, Part II If "Yes," complete Schedule C, Part

Bardziej szczegółowo

www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C, Part II If "Yes," complete Schedule C, Part

Bardziej szczegółowo

Proposal of thesis topic for mgr in. (MSE) programme in Telecommunications and Computer Science

Proposal of thesis topic for mgr in. (MSE) programme in Telecommunications and Computer Science Proposal of thesis topic for mgr in (MSE) programme 1 Topic: Monte Carlo Method used for a prognosis of a selected technological process 2 Supervisor: Dr in Małgorzata Langer 3 Auxiliary supervisor: 4

Bardziej szczegółowo

www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C, Part II If "Yes," complete Schedule C, Part

Bardziej szczegółowo

!850016! www.irs.gov/form8879eo. e-file www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C,

Bardziej szczegółowo

www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C, Part II If "Yes," complete Schedule C, Part

Bardziej szczegółowo

ARNOLD. EDUKACJA KULTURYSTY (POLSKA WERSJA JEZYKOWA) BY DOUGLAS KENT HALL

ARNOLD. EDUKACJA KULTURYSTY (POLSKA WERSJA JEZYKOWA) BY DOUGLAS KENT HALL Read Online and Download Ebook ARNOLD. EDUKACJA KULTURYSTY (POLSKA WERSJA JEZYKOWA) BY DOUGLAS KENT HALL DOWNLOAD EBOOK : ARNOLD. EDUKACJA KULTURYSTY (POLSKA WERSJA Click link bellow and free register

Bardziej szczegółowo

Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH

Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH Kierunek Elektronika i Telekomunikacja, Studia II stopnia Specjalność: Systemy wbudowane Metodyki projektowania i modelowania systemów Cyganek & Kasperek & Rajda 2013 Katedra Elektroniki AGH Zagadnienia

Bardziej szczegółowo

Realizacja systemów wbudowanych (embeded systems) w strukturach PSoC (Programmable System on Chip)

Realizacja systemów wbudowanych (embeded systems) w strukturach PSoC (Programmable System on Chip) Realizacja systemów wbudowanych (embeded systems) w strukturach PSoC (Programmable System on Chip) Embeded systems Architektura układów PSoC (Cypress) Możliwości bloków cyfrowych i analogowych Narzędzia

Bardziej szczegółowo

Zakopane, plan miasta: Skala ok. 1: = City map (Polish Edition)

Zakopane, plan miasta: Skala ok. 1: = City map (Polish Edition) Zakopane, plan miasta: Skala ok. 1:15 000 = City map (Polish Edition) Click here if your download doesn"t start automatically Zakopane, plan miasta: Skala ok. 1:15 000 = City map (Polish Edition) Zakopane,

Bardziej szczegółowo

SSW1.1, HFW Fry #20, Zeno #25 Benchmark: Qtr.1. Fry #65, Zeno #67. like

SSW1.1, HFW Fry #20, Zeno #25 Benchmark: Qtr.1. Fry #65, Zeno #67. like SSW1.1, HFW Fry #20, Zeno #25 Benchmark: Qtr.1 I SSW1.1, HFW Fry #65, Zeno #67 Benchmark: Qtr.1 like SSW1.2, HFW Fry #47, Zeno #59 Benchmark: Qtr.1 do SSW1.2, HFW Fry #5, Zeno #4 Benchmark: Qtr.1 to SSW1.2,

Bardziej szczegółowo

www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C, Part II If "Yes," complete Schedule C, Part

Bardziej szczegółowo

Installation of EuroCert software for qualified electronic signature

Installation of EuroCert software for qualified electronic signature Installation of EuroCert software for qualified electronic signature for Microsoft Windows systems Warsaw 28.08.2019 Content 1. Downloading and running the software for the e-signature... 3 a) Installer

Bardziej szczegółowo

SYNTEZA SCENARIUSZY EKSPLOATACJI I STEROWANIA

SYNTEZA SCENARIUSZY EKSPLOATACJI I STEROWANIA POLITECHNIKA POZNAŃSKA WYDZIAŁ BUDOWNICTWA I INŻYNIERII ŚRODOWISKA INSTYTUT INŻYNIERII ŚRODOWISKA ZAKŁAD ZAOPATRZENIA W WODĘ I OCHRONY ŚRODOWISKA mgr inż. Rafał BRODZIAK SYNTEZA SCENARIUSZY EKSPLOATACJI

Bardziej szczegółowo

Tychy, plan miasta: Skala 1: (Polish Edition)

Tychy, plan miasta: Skala 1: (Polish Edition) Tychy, plan miasta: Skala 1:20 000 (Polish Edition) Poland) Przedsiebiorstwo Geodezyjno-Kartograficzne (Katowice Click here if your download doesn"t start automatically Tychy, plan miasta: Skala 1:20 000

Bardziej szczegółowo

Strona główna > Produkty > Systemy regulacji > System regulacji EASYLAB - LABCONTROL > Program konfiguracyjny > Typ EasyConnect.

Strona główna > Produkty > Systemy regulacji > System regulacji EASYLAB - LABCONTROL > Program konfiguracyjny > Typ EasyConnect. Typ EasyConnect FOR THE COMMISSIONING AND DIAGNOSIS OF EASYLAB COMPONENTS, FSE, AND FMS Software for the configuration and diagnosis of controllers Type TCU3, adapter modules TAM, automatic sash device

Bardziej szczegółowo

Configuring and Testing Your Network

Configuring and Testing Your Network Configuring and Testing Your Network Network Fundamentals Chapter 11 Version 4.0 1 Konfigurowanie i testowanie Twojej sieci Podstawy sieci Rozdział 11 Version 4.0 2 Objectives Define the role of the Internetwork

Bardziej szczegółowo

Karpacz, plan miasta 1:10 000: Panorama Karkonoszy, mapa szlakow turystycznych (Polish Edition)

Karpacz, plan miasta 1:10 000: Panorama Karkonoszy, mapa szlakow turystycznych (Polish Edition) Karpacz, plan miasta 1:10 000: Panorama Karkonoszy, mapa szlakow turystycznych (Polish Edition) J Krupski Click here if your download doesn"t start automatically Karpacz, plan miasta 1:10 000: Panorama

Bardziej szczegółowo

archivist: Managing Data Analysis Results

archivist: Managing Data Analysis Results archivist: Managing Data Analysis Results https://github.com/pbiecek/archivist Marcin Kosiński 1,2, Przemysław Biecek 2 1 IT Research and Development Grupa Wirtualna Polska 2 Faculty of Mathematics, Informatics

Bardziej szczegółowo

European Crime Prevention Award (ECPA) Annex I - new version 2014

European Crime Prevention Award (ECPA) Annex I - new version 2014 European Crime Prevention Award (ECPA) Annex I - new version 2014 Załącznik nr 1 General information (Informacje ogólne) 1. Please specify your country. (Kraj pochodzenia:) 2. Is this your country s ECPA

Bardziej szczegółowo

www.irs.gov/form8879eo. e-file www.irs.gov/form990. If "Yes," complete Schedule A Schedule B, Schedule of Contributors If "Yes," complete Schedule C, Part I If "Yes," complete Schedule C, Part II If "Yes,"

Bardziej szczegółowo

Projekt: Mikro zaprogramowane na sukces!

Projekt: Mikro zaprogramowane na sukces! Projekt współfinansowany przez Unię Europejską w ramach Europejskiego Funduszu Społecznego Projekt: Mikro zaprogramowane na sukces! Opis autoryzowanych szkoleń Oracle planowanych do realizacji w ramach

Bardziej szczegółowo

Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition)

Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition) Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition) Piotr Maluskiewicz Click here if your download doesn"t start automatically Miedzy

Bardziej szczegółowo

Stargard Szczecinski i okolice (Polish Edition)

Stargard Szczecinski i okolice (Polish Edition) Stargard Szczecinski i okolice (Polish Edition) Janusz Leszek Jurkiewicz Click here if your download doesn"t start automatically Stargard Szczecinski i okolice (Polish Edition) Janusz Leszek Jurkiewicz

Bardziej szczegółowo

Fig 5 Spectrograms of the original signal (top) extracted shaft-related GAD components (middle) and

Fig 5 Spectrograms of the original signal (top) extracted shaft-related GAD components (middle) and Fig 4 Measured vibration signal (top). Blue original signal. Red component related to periodic excitation of resonances and noise. Green component related. Rotational speed profile used for experiment

Bardziej szczegółowo

Krytyczne czynniki sukcesu w zarządzaniu projektami

Krytyczne czynniki sukcesu w zarządzaniu projektami Seweryn SPAŁEK Krytyczne czynniki sukcesu w zarządzaniu projektami MONOGRAFIA Wydawnictwo Politechniki Śląskiej Gliwice 2004 SPIS TREŚCI WPROWADZENIE 5 1. ZARZĄDZANIE PROJEKTAMI W ORGANIZACJI 13 1.1. Zarządzanie

Bardziej szczegółowo

TTIC 31210: Advanced Natural Language Processing. Kevin Gimpel Spring Lecture 9: Inference in Structured Prediction

TTIC 31210: Advanced Natural Language Processing. Kevin Gimpel Spring Lecture 9: Inference in Structured Prediction TTIC 31210: Advanced Natural Language Processing Kevin Gimpel Spring 2019 Lecture 9: Inference in Structured Prediction 1 intro (1 lecture) Roadmap deep learning for NLP (5 lectures) structured prediction

Bardziej szczegółowo

ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS.

ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS. ERASMUS + : Trail of extinct and active volcanoes, earthquakes through Europe. SURVEY TO STUDENTS. Strona 1 1. Please give one answer. I am: Students involved in project 69% 18 Student not involved in

Bardziej szczegółowo

MaPlan Sp. z O.O. Click here if your download doesn"t start automatically

MaPlan Sp. z O.O. Click here if your download doesnt start automatically Mierzeja Wislana, mapa turystyczna 1:50 000: Mikoszewo, Jantar, Stegna, Sztutowo, Katy Rybackie, Przebrno, Krynica Morska, Piaski, Frombork =... = Carte touristique (Polish Edition) MaPlan Sp. z O.O Click

Bardziej szczegółowo

SubVersion. Piotr Mikulski. SubVersion. P. Mikulski. Co to jest subversion? Zalety SubVersion. Wady SubVersion. Inne różnice SubVersion i CVS

SubVersion. Piotr Mikulski. SubVersion. P. Mikulski. Co to jest subversion? Zalety SubVersion. Wady SubVersion. Inne różnice SubVersion i CVS Piotr Mikulski 2006 Subversion is a free/open-source version control system. That is, Subversion manages files and directories over time. A tree of files is placed into a central repository. The repository

Bardziej szczegółowo

PROJECT. Syllabus for course Negotiations. on the study program: Management

PROJECT. Syllabus for course Negotiations. on the study program: Management Poznań, 2012, September 20th Doctor Anna Scheibe adiunct in the Department of Economic Sciences PROJECT Syllabus for course Negotiations on the study program: Management I. General information 1. Name

Bardziej szczegółowo

Zmiany techniczne wprowadzone w wersji Comarch ERP Altum

Zmiany techniczne wprowadzone w wersji Comarch ERP Altum Zmiany techniczne wprowadzone w wersji 2018.2 Copyright 2016 COMARCH SA Wszelkie prawa zastrzeżone Nieautoryzowane rozpowszechnianie całości lub fragmentu niniejszej publikacji w jakiejkolwiek postaci

Bardziej szczegółowo

Network Services for Spatial Data in European Geo-Portals and their Compliance with ISO and OGC Standards

Network Services for Spatial Data in European Geo-Portals and their Compliance with ISO and OGC Standards INSPIRE Conference 2010 INSPIRE as a Framework for Cooperation Network Services for Spatial Data in European Geo-Portals and their Compliance with ISO and OGC Standards Elżbieta Bielecka Agnieszka Zwirowicz

Bardziej szczegółowo

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Robert Respondowski Click here if your download doesn"t start automatically Wojewodztwo Koszalinskie:

Bardziej szczegółowo

aforementioned device she also has to estimate the time when the patients need the infusion to be replaced and/or disconnected. Meanwhile, however, she must cope with many other tasks. If the department

Bardziej szczegółowo

Instrukcja obsługi User s manual

Instrukcja obsługi User s manual Instrukcja obsługi User s manual Konfigurator Lanberg Lanberg Configurator E-mail: support@lanberg.pl support@lanberg.eu www.lanberg.pl www.lanberg.eu Lanberg 2015-2018 WERSJA VERSION: 2018/11 Instrukcja

Bardziej szczegółowo

Helena Boguta, klasa 8W, rok szkolny 2018/2019

Helena Boguta, klasa 8W, rok szkolny 2018/2019 Poniższy zbiór zadań został wykonany w ramach projektu Mazowiecki program stypendialny dla uczniów szczególnie uzdolnionych - najlepsza inwestycja w człowieka w roku szkolnym 2018/2019. Składają się na

Bardziej szczegółowo

OPTYMALIZACJA PUBLICZNEGO TRANSPORTU ZBIOROWEGO W GMINIE ŚRODA WIELKOPOLSKA

OPTYMALIZACJA PUBLICZNEGO TRANSPORTU ZBIOROWEGO W GMINIE ŚRODA WIELKOPOLSKA Politechnika Poznańska Wydział Maszyn Roboczych i Transportu Inż. NATALIA LEMTIS OPTYMALIZACJA PUBLICZNEGO TRANSPORTU ZBIOROWEGO W GMINIE ŚRODA WIELKOPOLSKA Promotor: DR INŻ. MARCIN KICIŃSKI Poznań, 2016

Bardziej szczegółowo

WYDZIAŁ NAUK EKONOMICZNYCH. Studia II stopnia niestacjonarne Kierunek Międzynarodowe Stosunki Gospodarcze Specjalność INERNATIONAL LOGISTICS

WYDZIAŁ NAUK EKONOMICZNYCH. Studia II stopnia niestacjonarne Kierunek Międzynarodowe Stosunki Gospodarcze Specjalność INERNATIONAL LOGISTICS Studia II stopnia niestacjonarne Kierunek Międzynarodowe Stosunki Gospodarcze Specjalność INERNATIONAL LOGISTICS Description Master Studies in International Logistics is the four-semesters studies, dedicate

Bardziej szczegółowo

Jazz EB207S is a slim, compact and outstanding looking SATA to USB 2.0 HDD enclosure. The case is

Jazz EB207S is a slim, compact and outstanding looking SATA to USB 2.0 HDD enclosure. The case is 1. Introduction Jazz EB207S is a slim, compact and outstanding looking SATA to USB 2.0 HDD enclosure. The case is made of aluminum and steel mesh as one of the coolest enclosures available. It s also small

Bardziej szczegółowo

Unit of Social Gerontology, Institute of Labour and Social Studies ageing and its consequences for society

Unit of Social Gerontology, Institute of Labour and Social Studies ageing and its consequences for society Prof. Piotr Bledowski, Ph.D. Institute of Social Economy, Warsaw School of Economics local policy, social security, labour market Unit of Social Gerontology, Institute of Labour and Social Studies ageing

Bardziej szczegółowo

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Robert Respondowski Click here if your download doesn"t start automatically Wojewodztwo Koszalinskie:

Bardziej szczegółowo

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Robert Respondowski Click here if your download doesn"t start automatically Wojewodztwo Koszalinskie:

Bardziej szczegółowo

Hard-Margin Support Vector Machines

Hard-Margin Support Vector Machines Hard-Margin Support Vector Machines aaacaxicbzdlssnafiyn9vbjlepk3ay2gicupasvu4iblxuaw2hjmuwn7ddjjmxm1bkcg1/fjqsvt76fo9/gazqfvn8y+pjpozw5vx8zkpvtfxmlhcwl5zxyqrm2vrg5zw3vxmsoezi4ogkr6phieky5crvvjhriqvdom9l2xxftevuwcekj3lktmhghgniauiyutvrwxtvme34a77kbvg73gtygpjsrfati1+xc8c84bvraowbf+uwnipyehcvmkjrdx46vlykhkgykm3ujjdhcyzqkxy0chur6ax5cbg+1m4bbjptjcubuz4kuhvjoql93hkin5hxtav5x6yyqopnsyuneey5ni4keqrxbar5wqaxbik00icyo/iveiyqqvjo1u4fgzj/8f9x67bzmxnurjzmijtlybwfgcdjgfdtajwgcf2dwaj7ac3g1ho1n4814n7wwjgjmf/ys8fenfycuzq==

Bardziej szczegółowo

Presented by. Dr. Morten Middelfart, CTO

Presented by. Dr. Morten Middelfart, CTO Meeting Big Data challenges in Leadership with Human-Computer Synergy. Presented by Dr. Morten Middelfart, CTO Big Data Data that exists in such large amounts or in such unstructured form that it is difficult

Bardziej szczegółowo

What our clients think about us? A summary od survey results

What our clients think about us? A summary od survey results What our clients think about us? A summary od survey results customer satisfaction survey We conducted our audit in June 2015 This is the first survey about customer satisfaction Why? To get customer feedback

Bardziej szczegółowo

Raport bieżący: 44/2018 Data: g. 21:03 Skrócona nazwa emitenta: SERINUS ENERGY plc

Raport bieżący: 44/2018 Data: g. 21:03 Skrócona nazwa emitenta: SERINUS ENERGY plc Raport bieżący: 44/2018 Data: 2018-05-23 g. 21:03 Skrócona nazwa emitenta: SERINUS ENERGY plc Temat: Zawiadomienie o zmianie udziału w ogólnej liczbie głosów w Serinus Energy plc Podstawa prawna: Inne

Bardziej szczegółowo

Sargent Opens Sonairte Farmers' Market

Sargent Opens Sonairte Farmers' Market Sargent Opens Sonairte Farmers' Market 31 March, 2008 1V8VIZSV7EVKIRX8(1MRMWXIVSJ7XEXIEXXLI(ITEVXQIRXSJ%KVMGYPXYVI *MWLIVMIWERH*SSHTIVJSVQIHXLISJJMGMEPSTIRMRKSJXLI7SREMVXI*EVQIVW 1EVOIXMR0E]XS[R'S1IEXL

Bardziej szczegółowo

LEARNING AGREEMENT FOR STUDIES

LEARNING AGREEMENT FOR STUDIES LEARNING AGREEMENT FOR STUDIES The Student First and last name(s) Nationality E-mail Academic year 2014/2015 Study period 1 st semester 2 nd semester Study cycle Bachelor Master Doctoral Subject area,

Bardziej szczegółowo

Program szkolenia: Fundamenty testowania

Program szkolenia: Fundamenty testowania Program szkolenia: Fundamenty testowania Informacje ogólne Nazwa: Kod: Kategoria: Grupa docelowa: Czas trwania: Forma: Fundamenty testowania Testowanie-fun Testowanie testerzy, test managerowie 2 dni 50%

Bardziej szczegółowo

Best practices in business process automation

Best practices in business process automation Best practices in business process automation Piotr Ślęzak ForProgress Wrocław 11th October 2016 How can we help you? Consulting Realization Training www.forprogress.com.pl Expectations about automation

Bardziej szczegółowo

POLITECHNIKA WARSZAWSKA. Wydział Zarządzania ROZPRAWA DOKTORSKA. mgr Marcin Chrząścik

POLITECHNIKA WARSZAWSKA. Wydział Zarządzania ROZPRAWA DOKTORSKA. mgr Marcin Chrząścik POLITECHNIKA WARSZAWSKA Wydział Zarządzania ROZPRAWA DOKTORSKA mgr Marcin Chrząścik Model strategii promocji w zarządzaniu wizerunkiem regionu Warmii i Mazur Promotor dr hab. Jarosław S. Kardas, prof.

Bardziej szczegółowo

POLITYKA PRYWATNOŚCI / PRIVACY POLICY

POLITYKA PRYWATNOŚCI / PRIVACY POLICY POLITYKA PRYWATNOŚCI / PRIVACY POLICY TeleTrade DJ International Consulting Ltd Sierpień 2013 2011-2014 TeleTrade-DJ International Consulting Ltd. 1 Polityka Prywatności Privacy Policy Niniejsza Polityka

Bardziej szczegółowo

SWPS Uniwersytet Humanistycznospołeczny. Wydział Zamiejscowy we Wrocławiu. Karolina Horodyska

SWPS Uniwersytet Humanistycznospołeczny. Wydział Zamiejscowy we Wrocławiu. Karolina Horodyska SWPS Uniwersytet Humanistycznospołeczny Wydział Zamiejscowy we Wrocławiu Karolina Horodyska Warunki skutecznego promowania zdrowej diety i aktywności fizycznej: dobre praktyki w interwencjach psychospołecznych

Bardziej szczegółowo

OpenPoland.net API Documentation

OpenPoland.net API Documentation OpenPoland.net API Documentation Release 1.0 Michał Gryczka July 11, 2014 Contents 1 REST API tokens: 3 1.1 How to get a token............................................ 3 2 REST API : search for assets

Bardziej szczegółowo

Rozpoznawanie twarzy metodą PCA Michał Bereta 1. Testowanie statystycznej istotności różnic między jakością klasyfikatorów

Rozpoznawanie twarzy metodą PCA Michał Bereta   1. Testowanie statystycznej istotności różnic między jakością klasyfikatorów Rozpoznawanie twarzy metodą PCA Michał Bereta www.michalbereta.pl 1. Testowanie statystycznej istotności różnic między jakością klasyfikatorów Wiemy, że możemy porównywad klasyfikatory np. za pomocą kroswalidacji.

Bardziej szczegółowo

Machine Learning for Data Science (CS4786) Lecture11. Random Projections & Canonical Correlation Analysis

Machine Learning for Data Science (CS4786) Lecture11. Random Projections & Canonical Correlation Analysis Machine Learning for Data Science (CS4786) Lecture11 5 Random Projections & Canonical Correlation Analysis The Tall, THE FAT AND THE UGLY n X d The Tall, THE FAT AND THE UGLY d X > n X d n = n d d The

Bardziej szczegółowo

Pielgrzymka do Ojczyzny: Przemowienia i homilie Ojca Swietego Jana Pawla II (Jan Pawel II-- pierwszy Polak na Stolicy Piotrowej) (Polish Edition)

Pielgrzymka do Ojczyzny: Przemowienia i homilie Ojca Swietego Jana Pawla II (Jan Pawel II-- pierwszy Polak na Stolicy Piotrowej) (Polish Edition) Pielgrzymka do Ojczyzny: Przemowienia i homilie Ojca Swietego Jana Pawla II (Jan Pawel II-- pierwszy Polak na Stolicy Piotrowej) (Polish Edition) Click here if your download doesn"t start automatically

Bardziej szczegółowo

Patients price acceptance SELECTED FINDINGS

Patients price acceptance SELECTED FINDINGS Patients price acceptance SELECTED FINDINGS October 2015 Summary With growing economy and Poles benefiting from this growth, perception of prices changes - this is also true for pharmaceuticals It may

Bardziej szczegółowo

Aktualizacja Oprogramowania Firmowego (Fleszowanie) Microprocessor Firmware Upgrade (Firmware downloading)

Aktualizacja Oprogramowania Firmowego (Fleszowanie) Microprocessor Firmware Upgrade (Firmware downloading) Aktualizacja Oprogramowania Firmowego (Fleszowanie) Microprocessor Firmware Upgrade (Firmware downloading) ROGER sp.j. Gościszewo 59 82-416 Gościszewo Poland tel. 055 2720132 fax 055 2720133 www.roger.pl

Bardziej szczegółowo

PROJECT. Syllabus for course Global Marketing. on the study program: Management

PROJECT. Syllabus for course Global Marketing. on the study program: Management Poznań, 2012, September 20th Doctor Anna Scheibe adiunct in the Department of Economic Sciences PROJECT Syllabus for course Global Marketing on the study program: Management I. General information 1. Name

Bardziej szczegółowo

Analysis of Movie Profitability STAT 469 IN CLASS ANALYSIS #2

Analysis of Movie Profitability STAT 469 IN CLASS ANALYSIS #2 Analysis of Movie Profitability STAT 469 IN CLASS ANALYSIS #2 aaaklnictzzjb9tgfmcnadpg7oy0lxa9edva9kkapdarhyk2k7gourinlwsweyzikuyiigvyleiv/cv767fpf/5crc1xt9va5mx7w3m/ecuqw1kuztpx/rl3/70h73/w4cog9dhhn3z62d6jzy+yzj766txpoir9nzszisjynetqr+rvlfvyoozu5xbybpsxb1wahul8phczdt2v4zgchb7uecwphlyigrgkjcyiflfyci0kxnmr4z6kw0jsokvot8isntpa3gbknlcufiv/h+hh+eur4fomd417rvtfjoit5pfju6yxiab2fmwk0y/feuybobqk+axnke8xzjjhfyd8kkpl9zdoddkazd5j6bzpemjb64smjb6vb4xmehysu08lsrszopxftlzee130jcb0zjxy7r5wa2f1s2off2+dyatrughnrtpkuprlcpu55zlxpss/yqe2eamjkcf0jye8w8yas0paf6t0t2i9stmcua+inbi2rt01tz22tubbqwidypvgz6piynkpobirkxgu54ibzoti4pkw2i5ow9lnuaoabhuxfxqhvnrj6w15tb3furnbm+scyxobjhr5pmj5j/w5ix9wsa2tlwx9alpshlunzjgnrwvqbpwzjl9wes+ptyn+ypy/jgskavtl8j0hz1djdhzwtpjbbvpr1zj7jpg6ve7zxfngj75zee0vmp9qm2uvgu/9zdofq6r+g8l4xctvo+v+xdrfr8oxiwutycu0qgyf8icuyvp/sixfi9zxe11vp6mrjjovpmxm6acrtbia+wjr9bevlgjwlz5xd3rfna9g06qytaoofk8olxbxc7xby2evqjmmk6pjvvzxmpbnct6+036xp5vdbrnbdqph8brlfn/n/khnfumhf6z1v7h/80yieukkd5j0un82t9mynxzmk0s/bzn4tacdziszdhwrl8x5ako8qp1n1zn0k6w2em0km9zj1i4yt1pt3xiprw85jmc2m1ut2geum6y6es2fwx6c+wlrpykblopbuj5nnr2byygfy5opllv4+jmm7s6u+tvhywbnb0kv2lt5th4xipmiij+y1toiyo7bo0d+vzvovjkp6aoejsubhj3qrp3fjd/m23pay8h218ibvx3nicofvd1xi86+kh6nb/b+hgsjp5+qwpurzlir15np66vmdehh6tyazdm1k/5ejtuvurgcqux6yc+qw/sbsaj7lkt4x9qmtp7euk6zbdedyuzu6ptsu2eeu3rxcz06uf6g8wyuveznhkbzynajbb7r7cbmla+jbtrst0ow2v6ntkwv8svnwqnu5pa3oxfeexf93739p93chq/fv+jr8r0d9brhpcxr2w88bvqbr41j6wvrb+u5dzjpvx+veoaxwptzp/8cen+xbg==

Bardziej szczegółowo

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Robert Respondowski Click here if your download doesn"t start automatically Wojewodztwo Koszalinskie:

Bardziej szczegółowo

EXAMPLES OF CABRI GEOMETRE II APPLICATION IN GEOMETRIC SCIENTIFIC RESEARCH

EXAMPLES OF CABRI GEOMETRE II APPLICATION IN GEOMETRIC SCIENTIFIC RESEARCH Anna BŁACH Centre of Geometry and Engineering Graphics Silesian University of Technology in Gliwice EXAMPLES OF CABRI GEOMETRE II APPLICATION IN GEOMETRIC SCIENTIFIC RESEARCH Introduction Computer techniques

Bardziej szczegółowo

Katowice, plan miasta: Skala 1: = City map = Stadtplan (Polish Edition)

Katowice, plan miasta: Skala 1: = City map = Stadtplan (Polish Edition) Katowice, plan miasta: Skala 1:20 000 = City map = Stadtplan (Polish Edition) Polskie Przedsiebiorstwo Wydawnictw Kartograficznych im. Eugeniusza Romera Click here if your download doesn"t start automatically

Bardziej szczegółowo

Emilka szuka swojej gwiazdy / Emily Climbs (Emily, #2)

Emilka szuka swojej gwiazdy / Emily Climbs (Emily, #2) Emilka szuka swojej gwiazdy / Emily Climbs (Emily, #2) Click here if your download doesn"t start automatically Emilka szuka swojej gwiazdy / Emily Climbs (Emily, #2) Emilka szuka swojej gwiazdy / Emily

Bardziej szczegółowo

PROJECT. Syllabus for course Principles of Marketing. on the study program: Management

PROJECT. Syllabus for course Principles of Marketing. on the study program: Management Poznań, 2012, September 20th Doctor Anna Scheibe adiunct in the Department of Economic Sciences PROJECT Syllabus for course Principles of Marketing on the study program: Management I. General information

Bardziej szczegółowo

Linear Classification and Logistic Regression. Pascal Fua IC-CVLab

Linear Classification and Logistic Regression. Pascal Fua IC-CVLab Linear Classification and Logistic Regression Pascal Fua IC-CVLab 1 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

Bardziej szczegółowo

Testy jednostkowe - zastosowanie oprogramowania JUNIT 4.0 Zofia Kruczkiewicz

Testy jednostkowe - zastosowanie oprogramowania JUNIT 4.0  Zofia Kruczkiewicz Testy jednostkowe - zastosowanie oprogramowania JUNIT 4.0 http://www.junit.org/ Zofia Kruczkiewicz 1. Aby utworzyć test dla jednej klasy, należy kliknąć prawym przyciskiem myszy w oknie Projects na wybraną

Bardziej szczegółowo

AKADEMIA MORSKA W SZCZECINIE WYDZIAŁ MECHANICZNY ROZPRAWA DOKTORSKA. mgr inż. Piotr Smurawski

AKADEMIA MORSKA W SZCZECINIE WYDZIAŁ MECHANICZNY ROZPRAWA DOKTORSKA. mgr inż. Piotr Smurawski AKADEMIA MORSKA W SZCZECINIE WYDZIAŁ MECHANICZNY ROZPRAWA DOKTORSKA mgr inż. Piotr Smurawski ANALIZA CYKLU ŻYCIA SAMOCHODÓW OSOBOWYCH Z UWZGLĘDNIENIEM PROCESÓW OBSŁUGOWO-NAPRAWCZYCH Praca wykonana pod

Bardziej szczegółowo

deep learning for NLP (5 lectures)

deep learning for NLP (5 lectures) TTIC 31210: Advanced Natural Language Processing Kevin Gimpel Spring 2019 Lecture 6: Finish Transformers; Sequence- to- Sequence Modeling and AJenKon 1 Roadmap intro (1 lecture) deep learning for NLP (5

Bardziej szczegółowo

Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl. magda.szewczyk@slo-wroc.pl. Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to students

Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl. magda.szewczyk@slo-wroc.pl. Twoje konto Wyloguj. BIODIVERSITY OF RIVERS: Survey to students Ankiety Nowe funkcje! Pomoc magda.szewczyk@slo-wroc.pl Back Twoje konto Wyloguj magda.szewczyk@slo-wroc.pl BIODIVERSITY OF RIVERS: Survey to students Tworzenie ankiety Udostępnianie Analiza (55) Wyniki

Bardziej szczegółowo

Odnawialne źródła energii. Renewable Energy Resources. Energetics 1 st degree (1st degree / 2nd degree) General (general / practical)

Odnawialne źródła energii. Renewable Energy Resources. Energetics 1 st degree (1st degree / 2nd degree) General (general / practical) MODULE DESCRIPTION Module code Module name Odnawialne źródła energii Module name in English Renewable Energy Resources Valid from academic year 2012/201 MODULE PLACEMENT IN THE SYLLABUS Subject Level of

Bardziej szczegółowo

MS Visual Studio 2005 Team Suite - Performance Tool

MS Visual Studio 2005 Team Suite - Performance Tool MS Visual Studio 2005 Team Suite - Performance Tool przygotował: Krzysztof Jurczuk Politechnika Białostocka Wydział Informatyki Katedra Oprogramowania ul. Wiejska 45A 15-351 Białystok Streszczenie: Dokument

Bardziej szczegółowo

Updated Action Plan received from the competent authority on 4 May 2017

Updated Action Plan received from the competent authority on 4 May 2017 1 To ensure that the internal audits are subject to Response from the GVI: independent scrutiny as required by Article 4(6) of Regulation (EC) No 882/2004. We plan to have independent scrutiny of the Recommendation

Bardziej szczegółowo

PROGRAM STAŻU. Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o.

PROGRAM STAŻU. Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o. PROGRAM STAŻU Nazwa podmiotu oferującego staż / Company name IBM Global Services Delivery Centre Sp z o.o. Miejsce odbywania stażu / Legal address Muchoborska 8, 54-424 Wroclaw Stanowisko, obszar działania/

Bardziej szczegółowo

Ontology-based system of job offers analysis

Ontology-based system of job offers analysis Cracow University of Economics, Poland Ontology-based system of job offers analysis IT for Practice 2018 VSB-Technical University Ostrava, October, 17 th, 2018 Goal Goal of the research: design and implementation

Bardziej szczegółowo

PORTS AS LOGISTICS CENTERS FOR CONSTRUCTION AND OPERATION OF THE OFFSHORE WIND FARMS - CASE OF SASSNITZ

PORTS AS LOGISTICS CENTERS FOR CONSTRUCTION AND OPERATION OF THE OFFSHORE WIND FARMS - CASE OF SASSNITZ Part-financed by EU South Baltic Programme w w w. p t m e w. p l PROSPECTS OF THE OFFSHORE WIND ENERGY DEVELOPMENT IN POLAND - OFFSHORE WIND INDUSTRY IN THE COASTAL CITIES AND PORT AREAS PORTS AS LOGISTICS

Bardziej szczegółowo

Weronika Mysliwiec, klasa 8W, rok szkolny 2018/2019

Weronika Mysliwiec, klasa 8W, rok szkolny 2018/2019 Poniższy zbiór zadań został wykonany w ramach projektu Mazowiecki program stypendialny dla uczniów szczególnie uzdolnionych - najlepsza inwestycja w człowieka w roku szkolnym 2018/2019. Tresci zadań rozwiązanych

Bardziej szczegółowo

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition)

Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Wojewodztwo Koszalinskie: Obiekty i walory krajoznawcze (Inwentaryzacja krajoznawcza Polski) (Polish Edition) Robert Respondowski Click here if your download doesn"t start automatically Wojewodztwo Koszalinskie:

Bardziej szczegółowo

Poland) Wydawnictwo "Gea" (Warsaw. Click here if your download doesn"t start automatically

Poland) Wydawnictwo Gea (Warsaw. Click here if your download doesnt start automatically Suwalski Park Krajobrazowy i okolice 1:50 000, mapa turystyczno-krajoznawcza =: Suwalki Landscape Park, tourist map = Suwalki Naturpark,... narodowe i krajobrazowe) (Polish Edition) Click here if your

Bardziej szczegółowo

Blow-Up: Photographs in the Time of Tumult; Black and White Photography Festival Zakopane Warszawa 2002 / Powiekszenie: Fotografie w czasach zgielku

Blow-Up: Photographs in the Time of Tumult; Black and White Photography Festival Zakopane Warszawa 2002 / Powiekszenie: Fotografie w czasach zgielku Blow-Up: Photographs in the Time of Tumult; Black and White Photography Festival Zakopane Warszawa 2002 / Powiekszenie: Fotografie w czasach zgielku Juliusz and Maciej Zalewski eds. and A. D. Coleman et

Bardziej szczegółowo

Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition)

Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition) Miedzy legenda a historia: Szlakiem piastowskim z Poznania do Gniezna (Biblioteka Kroniki Wielkopolski) (Polish Edition) Piotr Maluskiewicz Click here if your download doesn"t start automatically Miedzy

Bardziej szczegółowo

DUAL SIMILARITY OF VOLTAGE TO CURRENT AND CURRENT TO VOLTAGE TRANSFER FUNCTION OF HYBRID ACTIVE TWO- PORTS WITH CONVERSION

DUAL SIMILARITY OF VOLTAGE TO CURRENT AND CURRENT TO VOLTAGE TRANSFER FUNCTION OF HYBRID ACTIVE TWO- PORTS WITH CONVERSION ELEKTRYKA 0 Zeszyt (9) Rok LX Andrzej KUKIEŁKA Politechnika Śląska w Gliwicach DUAL SIMILARITY OF VOLTAGE TO CURRENT AND CURRENT TO VOLTAGE TRANSFER FUNCTION OF HYBRID ACTIVE TWO- PORTS WITH CONVERSION

Bardziej szczegółowo

Streszczenie rozprawy doktorskiej

Streszczenie rozprawy doktorskiej Doskonalenie pomiaru zawartości wody w produktach spożywczych z wykorzystaniem metody wagosuszarkowej bazującej na promieniowaniu IR mgr Sławomir Janas Streszczenie rozprawy doktorskiej Promotor pracy:

Bardziej szczegółowo

SNP SNP Business Partner Data Checker. Prezentacja produktu

SNP SNP Business Partner Data Checker. Prezentacja produktu SNP SNP Business Partner Data Checker Prezentacja produktu Istota rozwiązania SNP SNP Business Partner Data Checker Celem produktu SNP SNP Business Partner Data Checker jest umożliwienie sprawdzania nazwy

Bardziej szczegółowo

Computer aided modelling of railway station traffic control systems 3

Computer aided modelling of railway station traffic control systems 3 Piotr Kawalec 1 Warsaw University of Technology Marcin Rżysko 2 Bombardier Transportation (Rail Engineering) Polska Sp. z o.o. Computer aided modelling of railway station traffic control systems 3 Introduction

Bardziej szczegółowo

Akademia Morska w Szczecinie. Wydział Mechaniczny

Akademia Morska w Szczecinie. Wydział Mechaniczny Akademia Morska w Szczecinie Wydział Mechaniczny ROZPRAWA DOKTORSKA mgr inż. Marcin Kołodziejski Analiza metody obsługiwania zarządzanego niezawodnością pędników azymutalnych platformy pływającej Promotor:

Bardziej szczegółowo

Evaluation of the main goal and specific objectives of the Human Capital Operational Programme

Evaluation of the main goal and specific objectives of the Human Capital Operational Programme Pracownia Naukowo-Edukacyjna Evaluation of the main goal and specific objectives of the Human Capital Operational Programme and the contribution by ESF funds towards the results achieved within specific

Bardziej szczegółowo

DELTIM Sp. z o.o. S.K.A ul. Rząsawska 30/38; Częstochowa. Bumper bar X-Lander X-Move

DELTIM Sp. z o.o. S.K.A ul. Rząsawska 30/38; Częstochowa. Bumper bar X-Lander X-Move Strona Page: 1 Zleceniodawca: Client: DELTIM Sp. z o.o. S.K.A ul. Rząsawska 30/38; 42-209 Częstochowa Przedmiot badania: Test item: Bumper bar X-Lander X-Move Producent / Klient zew.: Manufacturer / ext.

Bardziej szczegółowo

Latent Dirichlet Allocation Models and their Evaluation IT for Practice 2016

Latent Dirichlet Allocation Models and their Evaluation IT for Practice 2016 Latent Dirichlet Allocation Models and their Evaluation IT for Practice 2016 Paweł Lula Cracow University of Economics, Poland pawel.lula@uek.krakow.pl Latent Dirichlet Allocation (LDA) Documents Latent

Bardziej szczegółowo

QUANTITATIVE AND QUALITATIVE CHARACTERISTICS OF FINGERPRINT BIOMETRIC TEMPLATES

QUANTITATIVE AND QUALITATIVE CHARACTERISTICS OF FINGERPRINT BIOMETRIC TEMPLATES ZESZYTY NAUKOWE POLITECHNIKI ŚLĄSKIEJ 2014 Seria: ORGANIZACJA I ZARZĄDZANIE z. 74 Nr kol. 1921 Adrian KAPCZYŃSKI Politechnika Śląska Instytut Ekonomii i Informatyki QUANTITATIVE AND QUALITATIVE CHARACTERISTICS

Bardziej szczegółowo

Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application

Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application Gayane Vardoyan *, C. V. Hollot, Don Towsley* * College of Information and Computer Sciences, Department of Electrical

Bardziej szczegółowo

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Data Link Layer Network Fundamentals Chapter 7 Version 4.0 1 Warstwa Łącza danych modelu OSI Network Fundamentals Rozdział 7 Version 4.0 2 Objectives Explain the role of Data Link layer protocols in

Bardziej szczegółowo

TACHOGRAPH SIMULATOR DTCOSIM

TACHOGRAPH SIMULATOR DTCOSIM TACHOGRAPH SIMULATOR DTCOSIM Service Manual USB-KSIM interface General description The simulator is a device that is used as a replacement for tachograph in the vehicle where the tachograph is not mandatory,

Bardziej szczegółowo

Effective Governance of Education at the Local Level

Effective Governance of Education at the Local Level Effective Governance of Education at the Local Level Opening presentation at joint Polish Ministry OECD conference April 16, 2012, Warsaw Mirosław Sielatycki Ministry of National Education Doskonalenie

Bardziej szczegółowo

No matter how much you have, it matters how much you need

No matter how much you have, it matters how much you need CSR STRATEGY KANCELARIA FINANSOWA TRITUM GROUP SP. Z O.O. No matter how much you have, it matters how much you need Kancelaria Finansowa Tritum Group Sp. z o.o. was established in 2007 we build trust among

Bardziej szczegółowo

Machine Learning for Data Science (CS4786) Lecture 11. Spectral Embedding + Clustering

Machine Learning for Data Science (CS4786) Lecture 11. Spectral Embedding + Clustering Machine Learning for Data Science (CS4786) Lecture 11 Spectral Embedding + Clustering MOTIVATING EXAMPLE What can you say from this network? MOTIVATING EXAMPLE How about now? THOUGHT EXPERIMENT For each

Bardziej szczegółowo