Essays about: "duplication"
Showing result 1 - 5 of 52 essays containing the word duplication.
-
1. MANGO - Generating 2D-Magnetic Field Maps From Normal-Conducting Magnets Of Experimental Areas
University essay from KTH/FysikAbstract : This thesis discusses the development of MANGO, a tool created to model normal-conducting magnets which were installed in the 1970s in the experimental areas at CERN, and store their analysis. MANGO formulates an answer to two problems faced by the physicists of the Beam Department when they model a beam line: first, how to produce new magnetic field maps and, second, how to easily access existing ones? It contains a multi-use package that offers an automated process to produce magnetic field maps from finite-element models of magnets. READ MORE
-
2. Managing Multiple Project Management Information Systems : A Case Study of a Swedish Manufacturing Company
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Project Management Information Systems (PMIS) play a critical role in supporting project outcome. However, little attention has been paid to the impact of having multiple PMIS while governing projects within organizations. This thesis explores the effects of the presence of multiple PMIS at a large manufacturing organization. READ MORE
-
3. Gonadal hypoplasia in Swedish Mountain cattle and other native Swedish cattle breeds
University essay from SLU/Dept. of Animal Breeding and GeneticsAbstract : The Swedish Mountain cattle and several related breeds show the phenotype of colour-sidedness. The genetic reasons for this phenotype are a translocation and duplication from chr6 to chr29 (known as Cs29) including the KIT gene and an additional translocation with part of the Cs29 translocation from chr29 back to chr6 (Cs6). READ MORE
-
4. Combining MAL-based DSMLs for multi-domain cyber threat modelling
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Meta Attack Language (MAL) is a meta language used to define domain-specific modelling languages (DSMLs) for cyber threat modelling. These modelling languages define the objects and properties of a specific domain (say, a cloud service) which can then model real-life systems built in that domain (say, a website hosted in that cloud service). READ MORE
-
5. Minimal Deformation Methods for Loop Closure
University essay from Lunds universitet/Matematik LTHAbstract : This thesis proposes a method for how to find duplicated 3D points in a single Structure from Motion point cloud. Together with related articles, this forms a possible solution to the loop closure problem. The proposed method works by first selecting candidate pairs of 3D points by comparing BRIEF descriptors of all points. READ MORE