1000 resultados para 2ND-ORDER ASYMPTOTICS


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The bioassay, first order derivative UV spectrophotometry and chromatographic methods for assaying fluconazole capsules were compared. They have shown great advantages over the earlier published methods. Using the first order derivative, the UV spectrophotometry method does not suffer interference of excipients. Validation parameters such as linearity, precision, accuracy, limit of detection and limit of quantitation were determined. All methods were linear and reliable within acceptable limits for antibiotic pharmaceutical preparations being accurate, precise and reproducible. The application of each method as a routine analysis should be investigated considering cost, simplicity, equipment, solvents, speed, and application to large or small workloads.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this work, a spectrophotometric methodology was applied in order to determine epinephrine (EP), uric acid (UA), and acetaminophen (AC) in pharmaceutical formulations and spiked human serum, plasma, and urine by using a multivariate approach. Multivariate calibration methods such as partial least squares (PLS) methods and its derivates were used to obtain a model for simultaneous determination of EP, UA and AC with good figures of merit and mixture design was in the range of 1.8 - 35.3, 1.7 - 16.8, and 1.5 - 12.1 µg mL-1. The 2nd derivate PLS showed recoveries of 95.3 - 103.3, 93.3 - 104.0, and 94.0 - 105.5 µg mL-1 for EP, UA, and AC, respectively.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The objective of this thesis was to study the relationship between firstorder capabilities and online innovations. First-order capabilities can be divided into market and technology capabilities, and they play an important role in the production of innovations. The study was carried out in publishing industry, where many changes have taken place in the online environment during the last few years. In the empirical research, four companies were studied, two magazine publishers and two newspaper publishers. The analysis was done in two phases; first every case was analyzed alone and then the cases were compared in cross-case analysis. The most important finding was the positive impact of market capability to the production of online innovations. The study also increased understanding about the relationship between market and technology capabilities and online innovations in general.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis was made for a large forest industry company’s business segment. The purpose of the study was to improve the performance of the order-to-delivery process of the business segment. The study proceeded in three phases. The first phase was to define customer expectations in the market. The second phase was to analyse the performance and the operations of the order-to-delivery process, and to define any challenges or problems in serving the customers. The third and final phase was improving the performance of the order-to-delivery process, within the scope defined by the first two phases. The analysis showed that the delivery reliability is an essential but a challenging issue in the case company’s markets. On delivery reliability standpoint, the most challenging factors were the detected information flow distortions within the company as well as in the whole supply chain, and the lack of horizontal control over the multi-stage process.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis discusses adaption of new project management tool at ABB Oy Motors and Generators business unit, Synchronous Machines profit centre. Thesis studies project modeling in general and buries in the Gate Model used at ABB Synchronous Machines. It is essential to understand Gate Model because this new project management tool, called Project Master Document, is created on the base of the existing project model. Thesis also analyzes goals and structure of Project Master Document in order to ease implementation of this new tool. Project Master Document aims to improved customer order fulfillment by clearing order handover interface. Office process, especially responsibilities and target dates, become also clearer after Master Document implementation. The document is built to be frame for whole order fulfillment process including check points for each gate of project model and updated memos from all project meetings. Furthermore, project progress will be clearly stated by status markings and visualized with colors.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

For the paper mill profitability it is crucial to minimize overproduction and underproduction. Overproduction and underproduction both generate undesired costs and profit losses in paper mill production. This master’s thesis examines paper production order fulfillment subject from paper production level point of view. Research and development approach is selected due to clarification requirements in lately implemented manufacturing execution system. Manufacturing execution systems are generally expected to offer reliable and accurate information about mill production details. However, confusions are likely to occur after implementation of new manufacturing execution system. These confusions are usually harmful and become cumulatively more influential the longer they keep occurring. In this master’s thesis is presented actions to improve order fulfillment at paper mill production level. Central points of the improvement actions are a model for successful order fulfillment in paper mill production and manufacturing execution system catalogue configuration redesign. Improvement actions are implemented in Jokilaakso paper production plant and it is examined as a case study. In the end of this master’s thesis is presented performance measurements which demonstrate order fulfillment from case Jokilaakso.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Kandidaatintyön tavoitteena on tutkia engineer-to-order -toimitusketjun tyypillisiä tärkeimpiä kilpailutekijöitä sekä esittää esimerkkiratkaisu siitä, millaisella suorituskyvyn mittaristolla engineer-to-order toimitusketjua voidaan ohjata kohti tärkeimpien kilpailutekijöiden vahvistamista. Työssä luodaan katsaus ETO -ympäristön erityispiirteisiin ja esitetään tekijöitä, joita suorituskyvyn mittaamisessa tulisi huomioida tässä ympäristössä.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This study examines information security as a process (information securing) in terms of what it does, especially beyond its obvious role of protector. It investigates concepts related to ‘ontology of becoming’, and examines what it is that information securing produces. The research is theory driven and draws upon three fields: sociology (especially actor-network theory), philosophy (especially Gilles Deleuze and Félix Guattari’s concept of ‘machine’, ‘territory’ and ‘becoming’, and Michel Serres’s concept of ‘parasite’), and information systems science (the subject of information security). Social engineering (used here in the sense of breaking into systems through non-technical means) and software cracker groups (groups which remove copy protection systems from software) are analysed as examples of breaches of information security. Firstly, the study finds that information securing is always interruptive: every entity (regardless of whether or not it is malicious) that becomes connected to information security is interrupted. Furthermore, every entity changes, becomes different, as it makes a connection with information security (ontology of becoming). Moreover, information security organizes entities into different territories. However, the territories – the insides and outsides of information systems – are ontologically similar; the only difference is in the order of the territories, not in the ontological status of entities that inhabit the territories. In other words, malicious software is ontologically similar to benign software; they both are users in terms of a system. The difference is based on the order of the system and users: who uses the system and what the system is used for. Secondly, the research shows that information security is always external (in the terms of this study it is a ‘parasite’) to the information system that it protects. Information securing creates and maintains order while simultaneously disrupting the existing order of the system that it protects. For example, in terms of software itself, the implementation of a copy protection system is an entirely external addition. In fact, this parasitic addition makes software different. Thus, information security disrupts that which it is supposed to defend from disruption. Finally, it is asserted that, in its interruption, information security is a connector that creates passages; it connects users to systems while also creating its own threats. For example, copy protection systems invite crackers and information security policies entice social engineers to use and exploit information security techniques in a novel manner.