Architectural System Model

Størrelse: px
Starte visningen fra side:

Download "Architectural System Model"

Transkript

1 System Models

2 Architectural System Model An architectural model of a distributed system is concerned with the placement of its parts and relationships between them. Examples Client-server Peer-to-peer The client-server system can be modified by: Partition of data or replication at cooperating servers Caching of data by proxy servers or clients Use of mobile code Support of addition/removal of mobile devices

3 Architectural System Model Interaction Model Deals with performance and the difficulty to set time limits (e.g., in message delivery). Failure Model (gives a precise specification of the faults of the processes and the links -> reliable communication correct processes) Security Model Possible threats (for processes, links)

4 Architectural Models Architecture is the structure of a system in terms of separately specified components. It abstracts the functions of the individual components. It considers the placement of the components across the computer network. Considers the interrelationships between the components. Classification of processes: Servers, clients, peers Identifies responsibilities, helps to assess their workloads, determines the impact of failures in each of them.

5 Software Layers Software architecture refers to services offered and requested between processes located in the same or different computers. Service layers Distributed service One or more server processes Client processes Platform -> the lowest level hardware and software layers Examples: Intel x86/windows, Intel x86/solaris, PowerPC/MAC OS, Intel x86/linux Middleware A layer of software which masks heterogeneity and provides a convenient programming model to application programmers. Provides useful building blocks: Remote method invocation, communication between a group of processes, notification of events, partitioning, placement and retrieval of data objects, replication, transmission of multimedia data in real time

6 Software and hardware service layers in distributed systems Applications, services Middleware Operating system Computer and network hardware Platform

7 Middleware Examples Remote procedure calling packages Sun RPC Group Communication Systems ISIS CORBA JAVA RMI Middleware Limitations Some aspects of the dependability of systems require support at the application level. Transfer of large electronic mail messages (or files) from the mail host of the sender to that of the recipient. Using TCP may not be enough since there may occur some major network interruption. The service should provide additional levels of fault tolerance (e.g., a record of progress, etc.) Correct behavior depends upon checks, error-correction mechanisms and security measures at many levels, some of which require access to data within the application s address space.

8 Clients invoke individual servers Client invocation invocation Server result Server result Client Key: Process: Computer:

9 A distributed application based on peer processes Peer 2 Peer 1 Application Application Sharable objects Peer 3 Application Peer 4 Application Peers 5... N

10 Variations Use of multiple servers and caches to increase performance and resilience Use of mobile code and mobile agents User s need for low-cost computers with limited hardware resources that are simple to manage Requirement to add and remove mobile devices in a convenient manner

11 A service provided by multiple servers Client Client Service Server Server Server -Partition the set of objects and distribute them between themselves - maintain replicated copies - Web (1 st approach) -SUN Network Information Service (replication of password file at each site)

12 Web proxy server Client Proxy server Web server Client Web server A cache is a store of recently used data objects that is closer to the objects themselves. Web proxy servers provide a shared cache of web resources for the client machines at a site or across several sites. Increase availability Increase performance Reduce the load on the wide-area network and web server

13 Mobile Code - Web applets a) client request results in the downloading of applet code Client Applet code Web server b) client interacts with the applet Client Applet Web server - Good interactive response

14 Mobile Agents A mobile agent is a running program that travels from one computer to another in a network carrying out a task on someone s behalf. collecting information A mobile agent may make many invocations to local resources at each site it visits (e.g., access to individual database entries). Might be used to: install software on the computers of an organization compare the prices of products of vendors Negative aspects mobile agents are a potential security threat to the resources they can be themselves vulnerable (they may not be able to complete their tasks if they are refused access to the information needed) Other means by which the tasks can be performed remote invocations -> Web crawlers

15 Mobile Devices and Spontaneous Interoperation Mobile devices are hardware computing components that move between physical locations and thus networks, carrying software components with them. Mobile clients and systems may co-exist on mobile devices Bus that moves around on a world tour WiFi connectivity when available Lower-bandwidth wide-area telecommunications connectivity elsewhere. Mobile transparency Variable connectivity Spontaneous interoperation (variation of client-server: associations between devices are routinely created and destroyed)

16 Design Requirements for Distributed Architectures Performance Issues Responsiveness The speed of a remote invocation depends on: The load and performance of the server and network Delays in all the software components (client and server operation systems and middleware, code of the process that implements the service) Transfer of data is slow Throughput Rate at which computational work is done Perform work for all users Balancing of Computational Loads Applets remove load from the server Use several computers to host a single service

17 Design Requirements for Distributed Architectures Quality of Service Reliability (the ability of a system to perform and maintain its function in routine circumstances, as well as hostile and unexpected circumstances. Security Performance Adaptability (the ability of a system to adapt itself efficiently and fast to changed circumstances) Resource Availability Some applications handle time-critical data streams of data that are required to be processed or transferred from one process to another at a fixed rate.

18 Design Requirements for Distributed Architectures Caching and Replication Cached copies of resources should be kept up-to-date when the resource at a server is updated. A variety of cache-coherency protocols are used to suit different applications. Web Caching Protocol Web browsers and proxy servers cache responses to client requests from web servers The cache-consistency protocol can provide browsers with fresh copies of the resources held by the web server, but for performance reasons the freshness condition can be relaxed. A browser or proxy can validate a datum with the server. Web servers assign approximate expiry times to their resources The expiry time of the resource and the current time at the server are attached to the response.

19 Design Requirements for Distributed Architectures Dependability Issues Dependable applications should continue to function correctly in the presence of faults in hardware, software and networks. Attributes Availability readiness for correct service Reliability is achieved through redundancy the provision of multiple resources so that the system and application software can reconfigure to continue to perform its tasks in the presence of faults. Replication Multiple computers multiple communication paths Several replicas of a data item Retransmission of messages, etc. Safety absence of incorrect consequences Integrity absence of improper system alteration Maintainability ability to undergo modifications and repairs

20 Fundamental Models A model contains only the essential ingredients needed to understand and reason about some aspects of a system s behavior. A system model has to address the following: What are the main entities in the system? How do they interact? What are the characteristics that affect their individual and collective behavior? Purpose Make explicit all the relevant assumptions about the system we are modeling Make generalizations concerning what is possible or impossible, given those assumptions. General purpose algorithms Desirable properties Interaction Communication takes place with delays Maintaining the same notion of time across all nodes of a distributed system is difficilt. Failure

21 Interaction Model The behavior and state of distributed systems can be described by a distributed algorithm A definition of the steps to be taken by each of the processes, including the transmission of messages between them. Messages are transmitted to transfer information between processes and to coordinate their activity. The computing rates of processes and the timing of the transmission of messages cannot in general be predicted. Each process has its own state, consisting of the set of data that it can access and update (i.e., its local variables).

22 Processes and Channels process p send m process q receive Outgoing message buffer Communication channel Incoming message buffe

23 Formal Model of Message-Passing Systems There are n processes in the system: p 0,.., p n-1 Each process is modeled as a state machine. The state of each process is comprised by its local variables and a set of arrays. For instance, for p 0, the state contains six arrays: inbuf 0 [1],, inbuf 0 [3]: contain messages that have been sent to p 0 by p 1, p 2 and p 3, respectively, but p 0 has not yet processed. outbuf 0 [1],, outbuf 0 [3]: messages that have been sent by p 0 to p 1, p 2, and p 3, respectively, but have not yet been delivered to them.

24 Formal Model of Message-Passing Systems The state of process p i excluding the outbuf i [l] components, comprises the accessible state of p i. Each process has an initial state in which all inbuf arrays are empty. At each step of a process, all messages stored in the inbuf arrays of the process are processed, the state of the process changes and a message to each other neighboring process can be sent. A configuration is a vector C = (q 0,.., q n-1 ) where q i represents the state of p i. The states of the outbuf variables in a configuration represent the messages that are in transit on the communication channels. In an initial configuration all processes are in initial states.

25 Formal Model of Message-Passing Systems Computation event, comp(i) Represents a computation step of process p i in which p i s transition function is applied to its current accessible state. Delivery Event, del(i,j,m) Represents the delivery of message m from processor p i to processor p j. The behavior of a system over time is modeled as an execution, which is a sequence of configurations alternating with events. This sequence must satisfy a variety of conditions. Safety conditions Hold in every finite prefix of the execution (states that nothing bad has happened yet) Liveness conditions Hold a certain number of times (states that eventually something good must happen)

26 Performance of Communication Channel Latency The delay between the start of a message s transmission from one process and the beginning of its receipt by another. Bandwidth Total amount of information that can be transmitted over it in a given time. The latency includes: Time taken for the first of a string of bits transmitted through the network to reach its destination + delay in accessing the network + time taken by the OS communication services at both sender and receiver Jitter The variation in the time taken to deliver a series of messages.

27 Computer Clocks and Timing Events Local clocks Clock drifts from perfect time and their drift rates differ from one another Clock Drift Rate: the relative amount that a computer clock differs from a perfect reference clock. Even if clocks are set at the same time initially, they would eventually vary unless corrections are applied periodically.

28 Interaction (Timing) Models (Partially-Fully) Synchronous Systems There is a fixed upper bound on the time for messages to be delivered (communication is synchronous). There is a fixed upper bound Φ on the rate at which one processor s clock can run faster than another s (processors are synchronous). If Φ=1 and =1, we talk about a fully synchronous system. Then, The sequence of alternating configurations and events can be partitioned into disjoint rounds. A round consists of a deliver event for every message in an outbuf variable, until all outbuf variables are empty, followed by one computation event for every processor. Asynchronous Systems There is no fixed upper bound on how long it takes for a message to be delivered or how much time elapses between consecutive steps of a processor. Clock drift rates may be also arbitrary.

29 Real-Time Ordering of Events X send 1 m 1 receive 4 receive Y 2 receive send 3 m 2 receive Physical time Z receive receive send A m 3 m 1 m 2 receive receive receive t 1 t 2 t 3 A receives the messages in the wrong order! Relative order in which events take place in a system, there are relationships between events in distributed systems (causality) Logical clock, logical timestamp

30 Omission and arbitrary failures Class of failure Affects Description Fail-stop Process Process halts and remains halted. Other processes may detect this state. Crash Process Process halts and remains halted. Other processes may not be able to detect this state. Omission Channel A message inserted in an outgoing message buffer never arrives at the other end s incoming message buffer. Send-omission Process A process completes a send,but the message is not put in its outgoing message buffer. Receive-omissionProcess A message is put in a process s incoming message Arbitrary (Byzantine) Process or channel buffer, but that process does not receive it. Process/channel exhibits arbitrary behaviour: it may send/transmit arbitrary messages at arbitrary times, commit omissions; a process may stop or take an incorrect step.

31 Timing failures Class of Failure Affects Description Clock Process Process s local clock exceeds the bounds on its rate of drift from real time. Performance Process Process exceeds the bounds on the interval between two steps. Performance Channel A message s transmission takes longer than the stated bound.

32 Masking Failures Reliability of one-toone Communication A service masks a failure, either by hiding it all together or by converting it into a more acceptable type of failure. Checksums are used to mask corrupting messages -> a corrupted message is handled as a missing message Message omission failures can be hidden by re-transmitting messages. The term reliable communication is defined in terms of validity and integrity as follows: Validity: any message in the outgoing buffer is eventually delivered to the incoming message buffer Integrity: the message received is identical to one sent, and no messages are delivered twice.

33 Communication

34 Layered Protocols Layers, interfaces, and protocols in the OSI model. 2-1

35 Layered Protocols International Standards Organization (ISO) Developed a reference model that clearly identifies the various levels involved, gives them standard names, and points out which level should do which job. Open systems Interconnection Reference Model Protocols: rules determining how an open system can communicate with another open system. Connection-oriented protocols: Before exchanging data the sender and receiver first explicitly establish a connection, and possibly negotiate the protocol they will use Connectionless protocols: No setup in advance is needed. Dropping a letter in a mailbox

36 Layered Protocols A typical message as it appears on the network. 2-2

37 Layered Protocols Physical Layer Undertakes the actual transmission of the message. How many volts to use for 0 and 1? How many bits per second can be sent? Can transmission take place in both directions simultaneously? Size and shape of the network connector Number of pins and meanings of each Data Link Layer Provide mechanisms to detect and correct errors during the bit transmission Bits are grouped into units called frames. A special bit pattern is placed at the beginning and at the end of each frame to mark it. A checksum is computed by adding up all the bytes in the frame in a certain way. Frames are assigned sequence numbers

38 Data Link Layer 2-3 Discussion between a receiver and a sender in the data link layer.

39 Layered Protocols Network Layer The choosing of the best path from the sender to the receiver is called routing. Routing is the major task of the network layer. Example of Connectionless protocol: IP No connection setup. Each IP packet is routed to its destination independently of all others. No internal path is selected and remembered. Example of Connection-oriented protocol ATM Virtual Channels A unidirectional connection from the source to the destination is established. A collection of virtual channels between two hosts comprise a virtual path.

40 Transport Protocols Delivers messages without loss. Each message is broken into pieces called packets A sequence number is assigned to each packet Transport Layer Header Which packets have been sent Which have been received How many more the receiver has room to accept Which should be retransmitted

41 TCP & Client-Server TCP (TCP for Transactions, T/TCP) a) Normal 2-4 operation of TCP. b) Transactional TCP.

42 Higher Level Protocols Session Layer Provides dialog control, to keep track of which party is currently talking Provides synchronization facilities Insert checkpoints into long transfers, so that in the event of a crash, it is necessary to go back only to the last checkpoint Presentation Layer Is concerned with the meaning of the bits It is possible to define records such a name, address, amount of money, and other valuable info that might be contained in a message, and have the sender notify the receiver that a message contains a particular record in a certain format. Makes communication easier between machines with different internal representations

43 Application Protocols Contains a collection of standard network applications, like , file transfer, terminal emulation, etc. FTP FTP protocol versus ftp program HTTP (HyperText Transfer Protocol) Remotely manage and handle the transfer of Web pages Web browsers and web servers JAVA RMI

44 Middleware Protocols Middleware is an application. However, it often contains many general-purpose protocols that warrant their own layers. Various ways to establish authentication Distributed commit protocols Atomicity: in a group of processes, either all processes carry out a particular operation, or that operation is not carried out at all. Transactions Fault-tolerant applications Distributed Locking Reliable multicast services

45 Middleware Protocols 2-5

46 Conventional Procedure Call C call count = read(fd,buf,nbytes) Call by value Call by reference Call by copy/restore a) Parameter passing in a local procedure call: the stack before the call to read b) The stack while the called procedure is active

47 RPC versus Calling a System Call - Read data from a file Local file The programmer calls read The read routine is extracted from the library by the linker It is a short procedure that calls a system call The read procedure is a kind of interface between the user code and the local OS. Remote file The programmer calls read the read routine is extracted from the library by the linker (it is now called client stub) it packs the parameters into a message and requests that message to be sent to the server The read procedure is again a kind of interface. The work hidden under it is however different. When the message arrives at the server, the OS passes it up to a server stub. The server stub unpacks the parameters and calls the server procedure in the usual way.

48 Client and Server Stubs Principle of RPC between a client and server program.

49 Steps of a Remote Procedure Call 1. Client procedure calls client stub in normal way 2. Client stub builds message, calls local OS 3. Client's OS sends message to remote OS 4. Remote OS gives message to server stub 5. Server stub unpacks parameters, calls server 6. Server does work, returns result to the stub 7. Server stub packs it in message, calls local OS 8. Server's OS sends message to client's OS 9. Client's OS gives message to client stub 10. Stub unpacks result, returns to client

50 Passing Value Parameters (1) Steps involved in doing remote computation through RPC 2-8 Packing parameters into a message is called parameter marshalling.

51 Passing Value Parameters (2) Each machine has its own representation for numbers, characters, and other data items. IBM mainframes use the EBCDIC character code, whereas IBM PCs use ASCII Intel Pentium numbers their bytes from right to left (little endian), Sun SPARC number them the other way (big endian). a) Original message on the Pentium b) The message after receipt on the SPARC c) The message after being inverted. The little numbers in boxes indicate the address of each byte

52 Passing Reference Parameters How are pointers or in general references passed? With the greatest of difficulties if at all. Possible Solutions Forbid pointers Copy the object pointed to by the pointer into the message and send it to the server The server copies it at some place in its memory space, and calls the routine passing a pointer to it. When the routine ends, the server copies back the object s value into one parameter of the message and sends the message to the client. If the stubs know whether the object is an input or output parameter to the server, one of the two copies can be avoided. The above approach does not work with complex objects (i.e, dynamic arbitrary data structures).

53 Parameter Specification and Stub Generation a) A procedure b) The corresponding message: A character is placed in the rightmost byte of a word A float is transmitted as a whole word An array as a group of words equal to the array length, preceded by a word giving the length.

54 Parameter Specification and Stub Generation The caller and the callee agree on: The format of the messages The representation of simple data structures integers are represented in two s complement, characters in 16- bit Unicode, floats in IEEE standard #754 format, etc. Stubs for the same RPC protocol but different procedures generally differ only in their interface to the applications. An interface consists of a collection of procedures that can be called by a client, and which are implemented by a server. Interfaces are often specified by means of an Interface Definition Language (IDL), then compiled into a client stub and a server stub, along with the appropriate compile-time or run-time interfaces.

55 Doors A door is a generic name for a procedure in the address space of a server process that can be called by processes co-located with the server. Benefit : they allow the use of a single mechanism (namely procedure calls) for communication in a distributed system. The principle of using doors as the Inter Process Communication (IPC) mechanism.

56 Asynchronous RPC (1) 2-12 a) The interconnection between client and server in a traditional RPC b) The interaction using asynchronous RPC

57 Asynchronous RPC (2) 2-13 A client and server interacting through two asynchronous RPCs Combining two asynchronous RPCs is referred as a deferred synchronous RPC.

58 Writing a Client and a Server 2-14 The steps in writing a client and a server in DCE RPC.

59 Binding a Client to a Server Client-to-server binding in DCE. 2-15

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1

Project Step 7. Behavioral modeling of a dual ported register set. 1/8/ L11 Project Step 5 Copyright Joanne DeGroat, ECE, OSU 1 Project Step 7 Behavioral modeling of a dual ported register set. Copyright 2006 - Joanne DeGroat, ECE, OSU 1 The register set Register set specifications 16 dual ported registers each with 16- bit words

Læs mere

CHAPTER 8: USING OBJECTS

CHAPTER 8: USING OBJECTS Ruby: Philosophy & Implementation CHAPTER 8: USING OBJECTS Introduction to Computer Science Using Ruby Ruby is the latest in the family of Object Oriented Programming Languages As such, its designer studied

Læs mere

RoE timestamp and presentation time in past

RoE timestamp and presentation time in past RoE timestamp and presentation time in past Jouni Korhonen Broadcom Ltd. 5/26/2016 9 June 2016 IEEE 1904 Access Networks Working Group, Hørsholm, Denmark 1 Background RoE 2:24:6 timestamp was recently

Læs mere

Privat-, statslig- eller regional institution m.v. Andet Added Bekaempelsesudfoerende: string No Label: Bekæmpelsesudførende

Privat-, statslig- eller regional institution m.v. Andet Added Bekaempelsesudfoerende: string No Label: Bekæmpelsesudførende Changes for Rottedatabasen Web Service The coming version of Rottedatabasen Web Service will have several changes some of them breaking for the exposed methods. These changes and the business logic behind

Læs mere

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1

IBM Network Station Manager. esuite 1.5 / NSM Integration. IBM Network Computer Division. tdc - 02/08/99 lotusnsm.prz Page 1 IBM Network Station Manager esuite 1.5 / NSM Integration IBM Network Computer Division tdc - 02/08/99 lotusnsm.prz Page 1 New esuite Settings in NSM The Lotus esuite Workplace administration option is

Læs mere

Black Jack --- Review. Spring 2012

Black Jack --- Review. Spring 2012 Black Jack --- Review Spring 2012 Simulation Simulation can solve real-world problems by modeling realworld processes to provide otherwise unobtainable information. Computer simulation is used to predict

Læs mere

Portal Registration. Check Junk Mail for activation . 1 Click the hyperlink to take you back to the portal to confirm your registration

Portal Registration. Check Junk Mail for activation  . 1 Click the hyperlink to take you back to the portal to confirm your registration Portal Registration Step 1 Provide the necessary information to create your user. Note: First Name, Last Name and Email have to match exactly to your profile in the Membership system. Step 2 Click on the

Læs mere

ECE 551: Digital System * Design & Synthesis Lecture Set 5

ECE 551: Digital System * Design & Synthesis Lecture Set 5 ECE 551: Digital System * Design & Synthesis Lecture Set 5 5.1: Verilog Behavioral Model for Finite State Machines (FSMs) 5.2: Verilog Simulation I/O and 2001 Standard (In Separate File) 3/4/2003 1 ECE

Læs mere

Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances.

Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances. System Model Resource types R 1 1, R 2 2,..., R m CPU cycles, memory space, files, I/O devices Each resource type R i has W i instances. Each process utilizes a resource as follows: request use e.g., request

Læs mere

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU

PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU PARALLELIZATION OF ATTILA SIMULATOR WITH OPENMP MIGUEL ÁNGEL MARTÍNEZ DEL AMOR MINIPROJECT OF TDT24 NTNU OUTLINE INEFFICIENCY OF ATTILA WAYS TO PARALLELIZE LOW COMPATIBILITY IN THE COMPILATION A SOLUTION

Læs mere

How Long Is an Hour? Family Note HOME LINK 8 2

How Long Is an Hour? Family Note HOME LINK 8 2 8 2 How Long Is an Hour? The concept of passing time is difficult for young children. Hours, minutes, and seconds are confusing; children usually do not have a good sense of how long each time interval

Læs mere

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index

DET KONGELIGE BIBLIOTEK NATIONALBIBLIOTEK OG KØBENHAVNS UNIVERSITETS- BIBLIOTEK. Index DET KONGELIGE Index Download driver... 2 Find the Windows 7 version.... 2 Download the Windows Vista driver.... 4 Extract driver... 5 Windows Vista installation of a printer.... 7 Side 1 af 12 DET KONGELIGE

Læs mere

Constant Terminal Voltage. Industry Workshop 1 st November 2013

Constant Terminal Voltage. Industry Workshop 1 st November 2013 Constant Terminal Voltage Industry Workshop 1 st November 2013 Covering; Reactive Power & Voltage Requirements for Synchronous Generators and how the requirements are delivered Other countries - A different

Læs mere

Unitel EDI MT940 June 2010. Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004)

Unitel EDI MT940 June 2010. Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004) Unitel EDI MT940 June 2010 Based on: SWIFT Standards - Category 9 MT940 Customer Statement Message (January 2004) Contents 1. Introduction...3 2. General...3 3. Description of the MT940 message...3 3.1.

Læs mere

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov.

Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov. På dansk/in Danish: Aarhus d. 10. januar 2013/ the 10 th of January 2013 Kære alle Chefer i MUS-regi! Vores mange brugere på musskema.dk er rigtig gode til at komme med kvalificerede ønsker og behov. Og

Læs mere

PMDK PC-Side Basic Function Reference (Version 1.0)

PMDK PC-Side Basic Function Reference (Version 1.0) PMDK PC-Side Basic Function Reference (Version 1.0) http://www.icpdas.com PMDK PC-Side Basic Function Reference V 1.0 1 Warranty All products manufactured by ICPDAS Inc. are warranted against defective

Læs mere

SOFTWARE PROCESSES. Dorte, Ida, Janne, Nikolaj, Alexander og Erla

SOFTWARE PROCESSES. Dorte, Ida, Janne, Nikolaj, Alexander og Erla SOFTWARE PROCESSES Dorte, Ida, Janne, Nikolaj, Alexander og Erla Hvad er en software proces? Et struktureret sæt af AKTIVITETER, hvis mål er udvikling af software. En software proces model er en abstrakt

Læs mere

Aktivering af Survey funktionalitet

Aktivering af Survey funktionalitet Surveys i REDCap REDCap gør det muligt at eksponere ét eller flere instrumenter som et survey (spørgeskema) som derefter kan udfyldes direkte af patienten eller forsøgspersonen over internettet. Dette

Læs mere

Vina Nguyen HSSP July 13, 2008

Vina Nguyen HSSP July 13, 2008 Vina Nguyen HSSP July 13, 2008 1 What does it mean if sets A, B, C are a partition of set D? 2 How do you calculate P(A B) using the formula for conditional probability? 3 What is the difference between

Læs mere

Skriftlig Eksamen Kombinatorik, Sandsynlighed og Randomiserede Algoritmer (DM528)

Skriftlig Eksamen Kombinatorik, Sandsynlighed og Randomiserede Algoritmer (DM528) Skriftlig Eksamen Kombinatorik, Sandsynlighed og Randomiserede Algoritmer (DM58) Institut for Matematik og Datalogi Syddansk Universitet, Odense Torsdag den 1. januar 01 kl. 9 13 Alle sædvanlige hjælpemidler

Læs mere

On the complexity of drawing trees nicely: corrigendum

On the complexity of drawing trees nicely: corrigendum Acta Informatica 40, 603 607 (2004) Digital Object Identifier (DOI) 10.1007/s00236-004-0138-y On the complexity of drawing trees nicely: corrigendum Thorsten Akkerman, Christoph Buchheim, Michael Jünger,

Læs mere

Help / Hjælp

Help / Hjælp Home page Lisa & Petur www.lisapetur.dk Help / Hjælp Help / Hjælp General The purpose of our Homepage is to allow external access to pictures and videos taken/made by the Gunnarsson family. The Association

Læs mere

Applications. Computational Linguistics: Jordan Boyd-Graber University of Maryland RL FOR MACHINE TRANSLATION. Slides adapted from Phillip Koehn

Applications. Computational Linguistics: Jordan Boyd-Graber University of Maryland RL FOR MACHINE TRANSLATION. Slides adapted from Phillip Koehn Applications Slides adapted from Phillip Koehn Computational Linguistics: Jordan Boyd-Graber University of Maryland RL FOR MACHINE TRANSLATION Computational Linguistics: Jordan Boyd-Graber UMD Applications

Læs mere

UNISONIC TECHNOLOGIES CO.,

UNISONIC TECHNOLOGIES CO., UNISONIC TECHNOLOGIES CO., 3 TERMINAL 1A NEGATIVE VOLTAGE REGULATOR DESCRIPTION 1 TO-263 The UTC series of three-terminal negative regulators are available in TO-263 package and with several fixed output

Læs mere

Basic statistics for experimental medical researchers

Basic statistics for experimental medical researchers Basic statistics for experimental medical researchers Sample size calculations September 15th 2016 Christian Pipper Department of public health (IFSV) Faculty of Health and Medicinal Science (SUND) E-mail:

Læs mere

Brug sømbrættet til at lave sjove figurer. Lav fx: Få de andre til at gætte, hvad du har lavet. Use the nail board to make funny shapes.

Brug sømbrættet til at lave sjove figurer. Lav fx: Få de andre til at gætte, hvad du har lavet. Use the nail board to make funny shapes. Brug sømbrættet til at lave sjove figurer. Lav f: Et dannebrogsflag Et hus med tag, vinduer og dør En fugl En bil En blomst Få de andre til at gætte, hvad du har lavet. Use the nail board to make funn

Læs mere

Basic Design Flow. Logic Design Logic synthesis Logic optimization Technology mapping Physical design. Floorplanning Placement Fabrication

Basic Design Flow. Logic Design Logic synthesis Logic optimization Technology mapping Physical design. Floorplanning Placement Fabrication Basic Design Flow System design System/Architectural Design Instruction set for processor Hardware/software partition Memory, cache Logic design Logic Design Logic synthesis Logic optimization Technology

Læs mere

IPTV Box (MAG250/254) Bruger Manual

IPTV Box (MAG250/254) Bruger Manual IPTV Box (MAG250/254) Bruger Manual Når din STB (Set top Box) starter op, bliver der vist en pop up boks på skærmen, hvor du kan åbne EPG ved at trykke på F2 (Nogle bokse kan fortælle at den har brug for

Læs mere

Clear aim to ensure safety of all people involved in optical links project Scope

Clear aim to ensure safety of all people involved in optical links project Scope Laser Safety Outline Clear aim to ensure safety of all people involved in optical links project Scope Hazard classification of CMS Tracker readout link system Requirements Note: Safety requirements here

Læs mere

Maskindirektivet og Remote Access. Arbejdstilsynet Dau konference 2015 Arbejdsmiljøfagligt Center Erik Lund Lauridsen

Maskindirektivet og Remote Access. Arbejdstilsynet Dau konference 2015 Arbejdsmiljøfagligt Center Erik Lund Lauridsen Maskindirektivet og Remote Access Arbejdstilsynet Dau konference 2015 Arbejdsmiljøfagligt Center Erik Lund Lauridsen ell@at.dk Marts 2015 1 MD - Personsikkerhed og Remoten Hvad er spillepladen for personsikkerhed

Læs mere

Must I be a registered company in Denmark? That is not required. Both Danish and foreign companies can trade at Gaspoint Nordic.

Must I be a registered company in Denmark? That is not required. Both Danish and foreign companies can trade at Gaspoint Nordic. General Questions What kind of information do you need before I can start trading? Please visit our webpage www.gaspointnordic.com under the heading How to become a participant Is it possible to trade

Læs mere

Linear Programming ١ C H A P T E R 2

Linear Programming ١ C H A P T E R 2 Linear Programming ١ C H A P T E R 2 Problem Formulation Problem formulation or modeling is the process of translating a verbal statement of a problem into a mathematical statement. The Guidelines of formulation

Læs mere

Software 1 with Java. Recitation No. 7 (Servlets, Inheritance)

Software 1 with Java. Recitation No. 7 (Servlets, Inheritance) Software 1 with Java Recitation No. 7 (Servlets, Inheritance) Servlets Java modules that run on a Web server to answer client requests For example: Processing data submitted by a browser Providing dynamic

Læs mere

Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling

Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling Teknologispredning i sundhedsvæsenet DK ITEK: Sundhedsteknologi som grundlag for samarbejde og forretningsudvikling 6.5.2009 Jacob Schaumburg-Müller jacobs@microsoft.com Direktør, politik og strategi Microsoft

Læs mere

Sortering fra A-Z. Henrik Dorf Chefkonsulent SAS Institute

Sortering fra A-Z. Henrik Dorf Chefkonsulent SAS Institute Sortering fra A-Z Henrik Dorf Chefkonsulent SAS Institute Hvorfor ikke sortering fra A-Å? Det er for svært Hvorfor ikke sortering fra A-Å? Hvorfor ikke sortering fra A-Å? Hvorfor ikke sortering fra A-Å?

Læs mere

QUICK START Updated:

QUICK START Updated: QUICK START Updated: 24.08.2018 For at komme hurtigt og godt igang med dine nye Webstech produkter, anbefales at du downloader den senest opdaterede QuickStart fra vores hjemmeside: In order to get started

Læs mere

MSE PRESENTATION 2. Presented by Srunokshi.Kaniyur.Prema. Neelakantan Major Professor Dr. Torben Amtoft

MSE PRESENTATION 2. Presented by Srunokshi.Kaniyur.Prema. Neelakantan Major Professor Dr. Torben Amtoft CAPABILITY CONTROL LIST MSE PRESENTATION 2 Presented by Srunokshi.Kaniyur.Prema. Neelakantan Major Professor Dr. Torben Amtoft PRESENTATION OUTLINE Action items from phase 1 presentation tti Architecture

Læs mere

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September 2005. Casebaseret eksamen. www.jysk.dk og www.jysk.com.

Engelsk. Niveau C. De Merkantile Erhvervsuddannelser September 2005. Casebaseret eksamen. www.jysk.dk og www.jysk.com. 052430_EngelskC 08/09/05 13:29 Side 1 De Merkantile Erhvervsuddannelser September 2005 Side 1 af 4 sider Casebaseret eksamen Engelsk Niveau C www.jysk.dk og www.jysk.com Indhold: Opgave 1 Presentation

Læs mere

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1)

Fejlbeskeder i SMDB. Business Rules Fejlbesked Kommentar. Validate Business Rules. Request- ValidateRequestRegist ration (Rules :1) Fejlbeskeder i SMDB Validate Business Rules Request- ValidateRequestRegist ration (Rules :1) Business Rules Fejlbesked Kommentar the municipality must have no more than one Kontaktforløb at a time Fejl

Læs mere

QUICK START Updated: 18. Febr. 2014

QUICK START Updated: 18. Febr. 2014 QUICK START Updated: 18. Febr. 2014 For at komme hurtigt og godt igang med dine nye Webstech produkter, anbefales at du downloader den senest opdaterede QuickStart fra vores hjemmeside: In order to get

Læs mere

Den nye Eurocode EC Geotenikerdagen Morten S. Rasmussen

Den nye Eurocode EC Geotenikerdagen Morten S. Rasmussen Den nye Eurocode EC1997-1 Geotenikerdagen Morten S. Rasmussen UDFORDRINGER VED EC 1997-1 HVAD SKAL VI RUNDE - OPBYGNINGEN AF DE NYE EUROCODES - DE STØRSTE UDFORDRINGER - ER DER NOGET POSITIVT? 2 OPBYGNING

Læs mere

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen. og

Engelsk. Niveau D. De Merkantile Erhvervsuddannelser September Casebaseret eksamen.  og 052431_EngelskD 08/09/05 13:29 Side 1 De Merkantile Erhvervsuddannelser September 2005 Side 1 af 4 sider Casebaseret eksamen Engelsk Niveau D www.jysk.dk og www.jysk.com Indhold: Opgave 1 Presentation

Læs mere

Boligsøgning / Search for accommodation!

Boligsøgning / Search for accommodation! Boligsøgning / Search for accommodation! For at guide dig frem til den rigtige vejledning, skal du lige svare på et par spørgsmål: To make sure you are using the correct guide for applying you must answer

Læs mere

User guide - For testing SFTP and HTTP/S data communication

User guide - For testing SFTP and HTTP/S data communication User guide - For testing SFTP and HTTP/S data communication with Nets Danmark A/S P. 1-9 Index General information... 3 Introduction... 3 Rights... 3 Limitations... 3 Prerequisites... 3 Preparations...

Læs mere

Shooting tethered med Canon EOS-D i Capture One Pro. Shooting tethered i Capture One Pro 6.4 & 7.0 på MAC OS-X 10.7.5 & 10.8

Shooting tethered med Canon EOS-D i Capture One Pro. Shooting tethered i Capture One Pro 6.4 & 7.0 på MAC OS-X 10.7.5 & 10.8 Shooting tethered med Canon EOS-D i Capture One Pro Shooting tethered i Capture One Pro 6.4 & 7.0 på MAC OS-X 10.7.5 & 10.8 For Canon EOS-D ejere der fotograferer Shooting tethered med EOS-Utility eller

Læs mere

Aggregation based on road topologies for large scale VRPs

Aggregation based on road topologies for large scale VRPs Aggregation based on road topologies for large scale VRPs Eivind Nilssen, SINTEF Oslo, June 12-14 2008 1 Outline Motivation and background Aggregation Some results Conclusion 2 Motivation Companies with

Læs mere

Serverteknologi I Project task list

Serverteknologi I Project task list Dato: 31. marts 2016 Skrevet af John Have Jensen & Anders Dahl Valgreen Introduktion Velkommen til faget ServerTeknologi I. Denne uge er planlagt som en projektuge hvor du selv eller din gruppe skal opbygget

Læs mere

WIFI koder til Miljøagenturet: Brugernavn: AIACE course Kodeord: TsEG2pVL EU LOGIN KURSUS 21. AUGUST FORMIDDAG:

WIFI koder til Miljøagenturet: Brugernavn: AIACE course Kodeord: TsEG2pVL EU LOGIN KURSUS 21. AUGUST FORMIDDAG: WIFI koder til Miljøagenturet: Brugernavn: AIACE course Kodeord: TsEG2pVL EU LOGIN KURSUS 21. AUGUST 2019 - FORMIDDAG: EU Login er EU s NemID. Det er blot adgangsnøglen til en række EU-applikationer. Vælg

Læs mere

Sign variation, the Grassmannian, and total positivity

Sign variation, the Grassmannian, and total positivity Sign variation, the Grassmannian, and total positivity arxiv:1503.05622 Slides available at math.berkeley.edu/~skarp Steven N. Karp, UC Berkeley FPSAC 2015 KAIST, Daejeon Steven N. Karp (UC Berkeley) Sign

Læs mere

The GAssist Pittsburgh Learning Classifier System. Dr. J. Bacardit, N. Krasnogor G53BIO - Bioinformatics

The GAssist Pittsburgh Learning Classifier System. Dr. J. Bacardit, N. Krasnogor G53BIO - Bioinformatics The GAssist Pittsburgh Learning Classifier System Dr. J. Bacardit, N. Krasnogor G53BIO - Outline bioinformatics Summary and future directions Objectives of GAssist GAssist [Bacardit, 04] is a Pittsburgh

Læs mere

Differential Evolution (DE) "Biologically-inspired computing", T. Krink, EVALife Group, Univ. of Aarhus, Denmark

Differential Evolution (DE) Biologically-inspired computing, T. Krink, EVALife Group, Univ. of Aarhus, Denmark Differential Evolution (DE) Differential Evolution (DE) (Storn and Price, 199) Step 1 - Initialize and evaluate Generate a random start population and evaluate the individuals x 2 search space x 1 Differential

Læs mere

Terese B. Thomsen 1.semester Formidling, projektarbejde og webdesign ITU DMD d. 02/11-2012

Terese B. Thomsen 1.semester Formidling, projektarbejde og webdesign ITU DMD d. 02/11-2012 Server side Programming Wedesign Forelæsning #8 Recap PHP 1. Development Concept Design Coding Testing 2. Social Media Sharing, Images, Videos, Location etc Integrates with your websites 3. Widgets extend

Læs mere

Application form for access to data and biological samples Ref. no

Application form for access to data and biological samples Ref. no Application form for access to data and biological samples Ref. 2016-02 Project title: Applicant: Other partners taking part in the project Names and work addresses: "Skilsmisse og selvvurderet mentalt

Læs mere

DANSK INSTALLATIONSVEJLEDNING VLMT500 ADVARSEL!

DANSK INSTALLATIONSVEJLEDNING VLMT500 ADVARSEL! DANSK INSTALLATIONSVEJLEDNING VLMT500 Udpakningsinstruktioner Åben indpakningen forsigtigt og læg indholdet på et stykke pap eller en anden beskyttende overflade for at undgå beskadigelse. Kontroller at

Læs mere

The River Underground, Additional Work

The River Underground, Additional Work 39 (104) The River Underground, Additional Work The River Underground Crosswords Across 1 Another word for "hard to cope with", "unendurable", "insufferable" (10) 5 Another word for "think", "believe",

Læs mere

Distribuerte Objekter. Våren 2010 Professor II Eric Jul F

Distribuerte Objekter. Våren 2010 Professor II Eric Jul F Distribuerte Objekter Våren 2010 Professor II Eric Jul F5 2010-04-26 Velkommen Eric Jul, Professor II, til daglig: Bell Labs, Dublin, Ireland Tor Ivar Johansen, hjelpelærer Deltagelse I Forelæsningerne

Læs mere

Sikkerhedsvejledning

Sikkerhedsvejledning 11-01-2018 2 Sikkerhedsvejledning VIGTIGT! Venligst læs disse instruktioner inden sengen samles og tages i brug Tjek at alle dele og komponenter er til stede som angivet i vejledningen Fjern alle beslagsdele

Læs mere

Hvor er mine runde hjørner?

Hvor er mine runde hjørner? Hvor er mine runde hjørner? Ofte møder vi fortvivlelse blandt kunder, når de ser deres nye flotte site i deres browser og indser, at det ser anderledes ud, i forhold til det design, de godkendte i starten

Læs mere

GUIDE TIL BREVSKRIVNING

GUIDE TIL BREVSKRIVNING GUIDE TIL BREVSKRIVNING APPELBREVE Formålet med at skrive et appelbrev er at få modtageren til at overholde menneskerettighederne. Det er en god idé at lægge vægt på modtagerens forpligtelser over for

Læs mere

Business Rules Fejlbesked Kommentar

Business Rules Fejlbesked Kommentar Fejlbeskeder i SMDB Validate Business Request- ValidateRequestRegi stration ( :1) Business Fejlbesked Kommentar the municipality must have no more than one Kontaktforløb at a time Fejl 1: Anmodning En

Læs mere

how to save excel as pdf

how to save excel as pdf 1 how to save excel as pdf This guide will show you how to save your Excel workbook as PDF files. Before you do so, you may want to copy several sheets from several documents into one document. To do so,

Læs mere

Byg din informationsarkitektur ud fra en velafprøvet forståelsesramme The Open Group Architecture Framework (TOGAF)

Byg din informationsarkitektur ud fra en velafprøvet forståelsesramme The Open Group Architecture Framework (TOGAF) Byg din informationsarkitektur ud fra en velafprøvet forståelsesramme The Open Group Framework (TOGAF) Otto Madsen Director of Enterprise Agenda TOGAF og informationsarkitektur på 30 min 1. Introduktion

Læs mere

For nogle statuskoder vil der komme en klar tekst besked, mens der for andre vil komme en fire cifret kode, som angivet i afsnit 2

For nogle statuskoder vil der komme en klar tekst besked, mens der for andre vil komme en fire cifret kode, som angivet i afsnit 2 1 Statuskoder i forbindelse med en transaktion I forbindelse med en transaktion, vil Sagem Solo terminalen vise en statuskode/statusbesked i ekspedientterminalens display. Endvidere vil der blive udskrevet

Læs mere

Nyhedsmail, december 2013 (scroll down for English version)

Nyhedsmail, december 2013 (scroll down for English version) Nyhedsmail, december 2013 (scroll down for English version) Kære Omdeler Julen venter rundt om hjørnet. Og netop julen er årsagen til, at NORDJYSKE Distributions mange omdelere har ekstra travlt med at

Læs mere

ATEX direktivet. Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet.

ATEX direktivet. Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet. ATEX direktivet Vedligeholdelse af ATEX certifikater mv. Steen Christensen stec@teknologisk.dk www.atexdirektivet.dk tlf: 7220 2693 Vedligeholdelse af Certifikater / tekniske dossier / overensstemmelseserklæringen.

Læs mere

The X Factor. Målgruppe. Læringsmål. Introduktion til læreren klasse & ungdomsuddannelser Engelskundervisningen

The X Factor. Målgruppe. Læringsmål. Introduktion til læreren klasse & ungdomsuddannelser Engelskundervisningen The X Factor Målgruppe 7-10 klasse & ungdomsuddannelser Engelskundervisningen Læringsmål Eleven kan give sammenhængende fremstillinger på basis af indhentede informationer Eleven har viden om at søge og

Læs mere

Skriftlig Eksamen Beregnelighed (DM517)

Skriftlig Eksamen Beregnelighed (DM517) Skriftlig Eksamen Beregnelighed (DM517) Institut for Matematik & Datalogi Syddansk Universitet Mandag den 7 Januar 2008, kl. 9 13 Alle sædvanlige hjælpemidler (lærebøger, notater etc.) samt brug af lommeregner

Læs mere

Status på det trådløse netværk

Status på det trådløse netværk Status på det trådløse netværk Der er stadig problemer med det trådløse netværk, se status her: http://driftstatus.sdu.dk/?f=&antal=200&driftid=1671#1671 IT-service arbejder stadig med at løse problemerne

Læs mere

Bilag 8. TDC technical requirements for approval of splitterfilters and inline filters intended for shared access (ADSL or VDSL over POTS).

Bilag 8. TDC technical requirements for approval of splitterfilters and inline filters intended for shared access (ADSL or VDSL over POTS). Bilag 8. TDC technical requirements for approval of splitters and inline s intended for shared access (ADSL or VDSL over POTS). Dette bilag udgør bilag 8 til det mellem parterne tiltrådte Produkttillæg

Læs mere

Wander TDEV Measurements for Inexpensive Oscillator

Wander TDEV Measurements for Inexpensive Oscillator Wander TDEV Measurements for Inexpensive Oscillator Lee Cosart Symmetricom Lcosart@symmetricom.com Geoffrey M. Garner SAMSUNG Electronics (Consultant) gmgarner@comcast.net IEEE 802.1 AVB TG 2009.11.02

Læs mere

WINDCHILL THE NEXT STEPS

WINDCHILL THE NEXT STEPS WINDCHILL THE NEXT STEPS PTC/user, 4. marts 2015 Jens Christian Jensen, Econocap Agenda Windchill the next steps Bliv opdateret og inspireret til at se hvor Windchill kan hjælpe dig med andet end blot

Læs mere

User Manual for LTC IGNOU

User Manual for LTC IGNOU User Manual for LTC IGNOU 1 LTC (Leave Travel Concession) Navigation: Portal Launch HCM Application Self Service LTC Self Service 1. LTC Advance/Intimation Navigation: Launch HCM Application Self Service

Læs mere

2a. Conceptual Modeling Methods

2a. Conceptual Modeling Methods ICT Enhanced Buildings Potentials IKT og Videnrepræsentationer - ICT and Knowledge Representations. 2a. Conceptual Modeling Methods Cand. Scient. Bygningsinformatik. Semester 2, 2010. CONTENT Conceptual

Læs mere

Niels Christian Juul

Niels Christian Juul Roskilde Universitetscenter, Datalogisk Afdeling E-mail: ncjuul@acm.org Distribuerede systemer Niels Christian Juul Mandag den 11. Februar 2002 Copyright 2002, Niels Christian Juul 1 Mål Efter i dag skal

Læs mere

Trolling Master Bornholm 2016 Nyhedsbrev nr. 3

Trolling Master Bornholm 2016 Nyhedsbrev nr. 3 Trolling Master Bornholm 2016 Nyhedsbrev nr. 3 English version further down Den første dag i Bornholmerlaks konkurrencen Formanden for Bornholms Trollingklub, Anders Schou Jensen (og meddomer i TMB) fik

Læs mere

Fejlbeskeder i Stofmisbrugsdatabasen (SMDB)

Fejlbeskeder i Stofmisbrugsdatabasen (SMDB) Fejlbeskeder i Stofmisbrugsdatabasen (SMDB) Oversigt over fejlbeskeder (efter fejlnummer) ved indberetning til SMDB via webløsning og via webservices (hvor der dog kan være yderligere typer fejlbeskeder).

Læs mere

Handling Sporadic Tasks in Off- Line Scheduled Distributed Real Time Systems

Handling Sporadic Tasks in Off- Line Scheduled Distributed Real Time Systems Handling Sporadic Tasks in Off- Line Scheduled Distributed Real Time Systems Damir Isović & Gerhard Fohler Department of Computer Engineering Mälardalen University, Sweden Presented by : Aseem Lalani Outline

Læs mere

A multimodel data assimilation framework for hydrology

A multimodel data assimilation framework for hydrology A multimodel data assimilation framework for hydrology Antoine Thiboult, François Anctil Université Laval June 27 th 2017 What is Data Assimilation? Use observations to improve simulation 2 of 8 What is

Læs mere

Læs venligst Beboer information om projekt vandskade - sikring i 2015/2016

Læs venligst Beboer information om projekt vandskade - sikring i 2015/2016 Læs venligst Beboer information om projekt vandskade - sikring i 2015/2016 Vi er nødsaget til at få adgang til din lejlighed!! Hvis Kridahl (VVS firma) har bedt om adgang til din/jeres lejlighed og nøgler,

Læs mere

Skriftlig Eksamen Beregnelighed (DM517)

Skriftlig Eksamen Beregnelighed (DM517) Skriftlig Eksamen Beregnelighed (DM517) Institut for Matematik & Datalogi Syddansk Universitet Mandag den 31 Oktober 2011, kl. 9 13 Alle sædvanlige hjælpemidler (lærebøger, notater etc.) samt brug af lommeregner

Læs mere

Design til digitale kommunikationsplatforme-f2013

Design til digitale kommunikationsplatforme-f2013 E-travellbook Design til digitale kommunikationsplatforme-f2013 ITU 22.05.2013 Dreamers Lana Grunwald - svetlana.grunwald@gmail.com Iya Murash-Millo - iyam@itu.dk Hiwa Mansurbeg - hiwm@itu.dk Jørgen K.

Læs mere

what is this all about? Introduction three-phase diode bridge rectifier input voltages input voltages, waveforms normalization of voltages voltages?

what is this all about? Introduction three-phase diode bridge rectifier input voltages input voltages, waveforms normalization of voltages voltages? what is this all about? v A Introduction three-phase diode bridge rectifier D1 D D D4 D5 D6 i OUT + v OUT v B i 1 i i + + + v 1 v v input voltages input voltages, waveforms v 1 = V m cos ω 0 t v = V m

Læs mere

DSB s egen rejse med ny DSB App. Rubathas Thirumathyam Principal Architect Mobile

DSB s egen rejse med ny DSB App. Rubathas Thirumathyam Principal Architect Mobile DSB s egen rejse med ny DSB App Rubathas Thirumathyam Principal Architect Mobile Marts 2018 AGENDA 1. Ny App? Ny Silo? 2. Kunden => Kunderne i centrum 1 Ny app? Ny silo? 3 Mødetitel Velkommen til Danske

Læs mere

Special VFR. - ved flyvning til mindre flyveplads uden tårnkontrol som ligger indenfor en kontrolzone

Special VFR. - ved flyvning til mindre flyveplads uden tårnkontrol som ligger indenfor en kontrolzone Special VFR - ved flyvning til mindre flyveplads uden tårnkontrol som ligger indenfor en kontrolzone SERA.5005 Visual flight rules (a) Except when operating as a special VFR flight, VFR flights shall be

Læs mere

Userguide. NN Markedsdata. for. Microsoft Dynamics CRM 2011. v. 1.0

Userguide. NN Markedsdata. for. Microsoft Dynamics CRM 2011. v. 1.0 Userguide NN Markedsdata for Microsoft Dynamics CRM 2011 v. 1.0 NN Markedsdata www. Introduction Navne & Numre Web Services for Microsoft Dynamics CRM hereafter termed NN-DynCRM enable integration to Microsoft

Læs mere

Engineering of Chemical Register Machines

Engineering of Chemical Register Machines Prague International Workshop on Membrane Computing 2008 R. Fassler, T. Hinze, T. Lenser and P. Dittrich {raf,hinze,thlenser,dittrich}@minet.uni-jena.de 2. June 2008 Outline 1 Motivation Goal Realization

Læs mere

Bookingmuligheder for professionelle brugere i Dansehallerne 2015-16

Bookingmuligheder for professionelle brugere i Dansehallerne 2015-16 Bookingmuligheder for professionelle brugere i Dansehallerne 2015-16 Modtager man økonomisk støtte til et danseprojekt, har en premieredato og er professionel bruger af Dansehallerne har man mulighed for

Læs mere

Exercise 6.14 Linearly independent vectors are also affinely independent.

Exercise 6.14 Linearly independent vectors are also affinely independent. Affine sets Linear Inequality Systems Definition 6.12 The vectors v 1, v 2,..., v k are affinely independent if v 2 v 1,..., v k v 1 is linearly independent; affinely dependent, otherwise. We first check

Læs mere

MultiProgrammer Manual

MultiProgrammer Manual MultiProgrammer Manual MultiProgrammeren bruges til at læse og skrive værdier til ModBus register i LS Controls frekvensomformer E 1045. Dansk Version side 2 til 4 The MultiProgrammer is used for the writing

Læs mere

Small Autonomous Devices in civil Engineering. Uses and requirements. By Peter H. Møller Rambøll

Small Autonomous Devices in civil Engineering. Uses and requirements. By Peter H. Møller Rambøll Small Autonomous Devices in civil Engineering Uses and requirements By Peter H. Møller Rambøll BACKGROUND My Background 20+ years within evaluation of condition and renovation of concrete structures Last

Læs mere

Outline CS 4387/5387 SOFTWARE V&V LECTURE 7 INTEGRATION TESTING. Integration Testing. Integrating OO Applications. Definition Strategies 6/20/2018

Outline CS 4387/5387 SOFTWARE V&V LECTURE 7 INTEGRATION TESTING. Integration Testing. Integrating OO Applications. Definition Strategies 6/20/2018 1 CS 4387/5387 SOFTWARE V&V LECTURE 7 INTEGRATION TESTING Outline 2 Integration Testing Definition Strategies Big bang Top-down Bottom-up Sandwich Integrating OO Applications 1 Integration ing 3 Done between

Læs mere

Molio specifications, development and challenges. ICIS DA 2019 Portland, Kim Streuli, Molio,

Molio specifications, development and challenges. ICIS DA 2019 Portland, Kim Streuli, Molio, Molio specifications, development and challenges ICIS DA 2019 Portland, Kim Streuli, Molio, 2019-06-04 Introduction The current structure is challenged by different factors. These are for example : Complex

Læs mere

Skriftlig Eksamen Diskret matematik med anvendelser (DM72)

Skriftlig Eksamen Diskret matematik med anvendelser (DM72) Skriftlig Eksamen Diskret matematik med anvendelser (DM72) Institut for Matematik & Datalogi Syddansk Universitet, Odense Onsdag den 18. januar 2006 Alle sædvanlige hjælpemidler (lærebøger, notater etc.),

Læs mere

Det Teknisk-Naturvidenskabelige Fakultet Første Studieår AALBORG UNIVERSITET Arkitektur Og Design MATEMATIK OG FORM

Det Teknisk-Naturvidenskabelige Fakultet Første Studieår AALBORG UNIVERSITET Arkitektur Og Design MATEMATIK OG FORM Det Teknisk-Naturvidenskabelige Fakultet Første Studieår AALBORG UNIVERSITET Arkitektur Og Design MATEMATIK OG FORM 27 April 2012 - Lecture 4 (in English) Vector operations in Grasshopper Group 1 8:15-9:15

Læs mere

3C03 Concurrency: Model-based Design

3C03 Concurrency: Model-based Design 3C03 Concurrency: Model-based Design Wolfgang Emmerich 1 Outline Role of Modelling in System Development Refining Models into Designs FSP Actions and Operations FSP Processes and Threads FSP Processes

Læs mere

South Baileygate Retail Park Pontefract

South Baileygate Retail Park Pontefract Key Details : available June 2016 has a primary shopping catchment of 77,000 (source: PMA), extending to 186,000 within 10km (source: FOCUS) 86,000 sq ft of retail including Aldi, B&M, Poundstretcher,

Læs mere

Freefly B-Række Regler

Freefly B-Række Regler Freefly B-Række Regler Freefly B-Rækken er skabt til at imødekomme både nye og erfarende freeflyere, og præsentere dem for konkurrence elementet. Der konkurreres efter FAI regler, men der forekommer dog

Læs mere

MATHIC, SINGULAR & XMALLOC

MATHIC, SINGULAR & XMALLOC MATHIC, SINGULAR & XMALLOC Christian Eder POLSYS Team, UPMC, Paris, France June 11, 2013 1 / 17 1 SINGULAR Signature-based Gröbner Basis algorithms Restructuring SINGULAR 2 XMALLOC 3 MATHIC Overall structure

Læs mere

Mandara. PebbleCreek. Tradition Series. 1,884 sq. ft robson.com. Exterior Design A. Exterior Design B.

Mandara. PebbleCreek. Tradition Series. 1,884 sq. ft robson.com. Exterior Design A. Exterior Design B. Mandara 1,884 sq. ft. Tradition Series Exterior Design A Exterior Design B Exterior Design C Exterior Design D 623.935.6700 robson.com Tradition OPTIONS Series Exterior Design A w/opt. Golf Cart Garage

Læs mere

The server successfully processed the request and is not returning any content.

The server successfully processed the request and is not returning any content. Fejlkoder Denne side indeholder en liste af fejlkoder, beskeder og beskrivelser, som du som anvender vil møde på Selvbetjeningen. Se den fulde dokumentation for Fejlkoder og beskeder. Http Status codes

Læs mere