Sök:

Sökresultat:

179 Uppsatser om Amplification attack - Sida 2 av 12

Kompetensutveckling och lärande på Samhall i Dorotea

Samhall arbetar aktivt mot målsättningen att varje år få fem procent av sina anställda att göra övergångar till andra anställningar utanför sin verksamhet och på Samhall i Dorotea har det arbetet varit framgångsrikt. Syftet med detta examensarbete var att undersöka vilka psykologiska faktorer som har legat till grund för att Samhall i Dorotea har lyckats bra med att slussa ut anställda till andra verksamheter med fokus på vilka förutsättningar för lärande och kompetensutveckling det finns i organisationen samt vilken motivations¬potential arbetsuppgifterna har. På Samhall i Dorotea har ett projekt i ökad arbetsväxling och kompetens genomförts, Attack 2005, och en analys av vilken betydelse Attack 2005 har haft för verksamheten har även gjorts. Arbetets teoretiska utgångspunkt utgörs av Ellströms (1992) teori om faktorer i organisationen som påverkar lärande och utveckling samt Hackman och Oldhams (1980) Job Characteristics Model. Intervjuer med nuvarande och tidigare anställda på Samhall i Dorotea har genomförts och resultaten visar att det positiva arbetsklimatet och ett välfungerande samarbete i arbetsgrupperna är två betydande framgångsfaktorer.

Överraskning ? Tidlös eller totalt omkastad?

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

Revisorers perspektiv på implementeringen av ett nytt regelverk : ? fallet komponentavskrivningar enligt regelverket K3

This essay deals with the principle of surprise warfare and its development as well as the adaptation of military action that had to be made to surprise the opponent in the modern era.The concept of surprise is divided into its components in order to clarify what is required to implement a surprising maneuver, to understand the complex concept and form a theoretical framework for gathering facts in the case study.Development and adaption are demonstrated by a comparative case study where Pearl Harbor illustrates an example of historical surprise and Operation Desert Storm illustrates a modern surprise. The product will then be analyzed in order to detect the development and how military conduct is forced to adapt in order to carry out a surprising maneuver. The results shows that the military action of performing a surprise attack has had a major development and is now carried out in a different stage of the attack..

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Begomovirus susceptibility in wild Nicaraguan tomato populations

Tomato production is a common and important agricultural activity in Nicaragua. During the last decades tomato producers have suffered great yield losses due to begomoviruses (family Geminiviridae). The genome of begomoviruses generally consists of two circular ssDNA components, DNA-A and DNA-B. Tomato yellow leaf curl virus (TYLCV) is an example of a begomovirus with only one component. An approach to manage the virus epidemics has been to breed a cultivar with begomovirus resistance genes, which have been transferred from wild tomato.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Lyftkraftsberäkning för vingprofiler: Virvelpanelmetoden

The problem presented in this report is that of finding a method to calculate the lift force from a single-element airfoil of arbitrary shape. A number of restrictions are used in order to simplify calculations while retaining reasonable accuracy. The problem is solved for the two-dimensional case only and no finite-wing effects are taken into account. Furthermore, inviscid and incompressible flow is assumed. The method used to solve the problem is the vortex panel method, with vortex singularities distributed over simplified airfoil geometry.

Utrikespolitik och krig : En fallstudie om USA:s invasion av Irak utifrån neoklassisk realism

In this essay i argue that there are three different variables that may be able to control the outcome of certain foreign policy choices. These three variables are External Threats, government division and public opinion. The Essay also tries to identify former president Bush motives behind the 2003 Iraqi War. It is partly argued that the three variables had a certain amount of influence on Bush decision making process. But the main focus lies on the motives behind the attack.

Pearl Harbor, 1941 : En teoriprövande fallstudie av Japans flygstridskrafter under anfallet mot Pearl Harbor

Den 7 december 1941 genomförde japanska flygstridskrafter ett massivt bombanfall mot Pearl Harbor. Intentionen med anfallet var att slå ut den amerikanska Stillahavsflottan och därmed erhålla större inflytanade i Stillahavsområdet. Anfallen riktades huvudsakligen mot amerikanska fartyg som låg vid Pearl Harbors hamn men även flygfält i dess närområde drabbades hårt av den japanska offensiven.Syftet med detta arbete är att, med utgångpunkt från John. A Warden III centrala teorier; tyngdpunkter, fienden som ett system och parallell attack, analysera Japans agerande under attacken mot Pearl Harbor för att därigenom urskilja i vilken utsträckning dessa teorier kan tillämpas på de japanska flygstridskrafterna vid anfallet. Undersökningen syftar även till att utröna om de utvalda teorierna är applicerbara på taktisk nivå.

Modellering av delvis kända objekt med hjälp av bilder

Today many different types of lock systems are used all over the world. Passwords, finger prints and magnetic strips are a few examples. When the key is a three dimensional object, lika a physical metal key, the security depends, in a high degree, on that you can?t copy the object without access to it. One approach to copying the object is photographing the object, and from these photographs create a copy.

En retorisk provokation : Om förolämpningar, satir och karikatyrer

When is it acceptable to make fun of religion, and when does it become disrespectful? On January 7, 2015, the headquarters of the French satirical news paper Charlie Hebdo was subjected to a terrorist attack that claimed the lives of 12 staff members, due to the publishing of caricatures picturing the prophet Muhammed. The reactions that followed the attack circled around two perspectives; the importance of freedom of expression and the obligation to show respect for certain institutions and traditions in society. How come the caricatures can elicit such completely different reactions? This is the question that this thesis uses as a starting point for the examination of the subject caricatures and satire.

<- Föregående sida 2 Nästa sida ->