Sök:

Sökresultat:

1164 Uppsatser om Behavior Cards - Sida 1 av 78

Behavior Cards - ett programmeringsverktyg för barn

This thesis presents the work of developing and testing a programming tool specially designed for children. The purpose of this tool is to make children capable of creating visual simulations and games that consist of actors interacting in a virtual world. The name of the programming tool is Behavior Cards, which comes from the fact that actors are programmed by giving them cards representing different kinds of behaviors. Behaviors are to some extent pre-programmed and can include general events specifying how the actors should act in different situations, in contrast to specifying every possible situation that can occur. The idea is that Behavior Cards should be easier to use than a more traditional text based programming tool, but it should also be expressive within the domain of visual games.

Off with their heads - en uppdatering av kortlekens symbolik, hierarkier och formspråk

This project was a collaboration with Kajsa Bergström. The projected was to develop the French/English deck of cards. We replaced the knight, queen and king with the numbers 11, 12 and 13. We worked with separate aesthetics and solutions after making that common change. I worked on an idea on how to make the cards look slim, by adapting a handcrafted look, full of details.

En studie av zero knowledge-identifikationsprotokoll för smarta kort

Zero knowledge protocols is a lesser known type of protocol that can be used for identification. These protocols are especially designed not to reveal any information during an identification process that can be misused later on, neither by the one who should be convinced of the identity of the user, nor by anyone else that is eavesdropping. Many of these protocols are also especially designed for implementation in smart cards. The more common type of card with a magnetic stripe has during the last few years become more susceptible to attacks since they are easily copied. Smart cards combined with a secure identification protocol has been predicted to be the solution to this problem.

Smarta Kort : En del av en intelligent IT-lösning i hälso- och sjukvården?

Background: IT-security is included in the concept of information security, which considers all the security of handling information within an organisation. Good IT-security is about finding the right level of measurement, however, it is hard to implemement new IT-solutions in an organisation, particularly within the health care field, where sensitive information are handled daily. Lately the Swedish government, together with county- and city council, understand the importance of IT and health care. Carelink, an organisation of interest, is working actively for the presumption of benefit by using IT within the health care field. During spring 2006 the Swedish government introduced a national IT-strategy.

Självskadebeteende- två unga mäns berättelser

This essay is focused on the phenomena of self-injurious behavior of two young men. The purpose of the essay is to enlighten their experiences of their earlier self-injurious behavior, and to further enlighten which factors they believe have been contributed to the origin and the ending of the behavior. The research questions the essay raises are: Which factors has contributed to the origin of the self-injurious behavior? Which functions did the self-injurious behavior have for the young men? What made the two young men quit their self-injurious behavior? The essay is qualitative and do not imply to generalize the results and it is made from interviews with respondents and earlier research on self-injurious behavior. The results show that there are differences in the factors that origin of the self-injurious behavior between the respondents.

Anbudskalkyl mer användbar i byggprocessen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Grafisk profilering och identitetsskapande

This degree project has been done in parallel to the advertising agency Hera in Uppsala, and containsthe creating of a logotype and graphic profile for Aircall, a new big chain of shops dealing with telecommunication.Aircall was found 1 February 2004, when three smaller companies became one. Thisnew company were in need of a common brand and a uniform profile. The created graphic profile hasbeen applied to visiting cards, letterhead, envelopes, letter cards, bags, cars and advertisement. Thegraphic profile has also been used when designing the shop interior end exterior. Research has beendone on competitors graphic profiles and advertisement.

Nulägesanalys och verifiering av autentiseringsmetoder : En studie på ett konsultbolag i nätverksbranschen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Yngre pensionärers informationsbeteende i vardagslivet och på internetkurs.

The aim of this study is to examine the information behavior of younger seniors with a special focus on the Internet. Using a qualitative method consisting of a case study, including observations, diaries, questionnaires, and information diaries, we were able to compare the information behavior of the seniors in their use of the Internet, with the information behavior in their everyday life. The result of the study shows that the respondents led very active lives and used many different information sources in everyday life. They did not only seek information, but also assimilated it, often with a purpose to mediate it to other people. The motives behind the information use in everyday life were mainly connected to their life situations.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Lekens betydelse för social kompetens : Tre förskollärares erfarenheter

ABSTRACTOur work deals with antisocial behavior among elementary school students between 7 and 16years in the school environment. The aim of our study was to examine how school personnelare experiencing antisocial behavior among students from a gender perspective. We were alsointerested to find out what the school's staff has of the experience of the differences andsimilarities between girls 'and boys' antisocial behavior. We used gender theory, when weanalyzed our individual responses to interview questions. We made six qualitative interviewswith low-and high school teachers, assistant principals, counselors and special educationteachers training in Kalmar County.

Utomhuspedagogik : En komparativ studie mellan teori och verklighet

ABSTRACTOur work deals with antisocial behavior among elementary school students between 7 and 16years in the school environment. The aim of our study was to examine how school personnelare experiencing antisocial behavior among students from a gender perspective. We were alsointerested to find out what the school's staff has of the experience of the differences andsimilarities between girls 'and boys' antisocial behavior. We used gender theory, when weanalyzed our individual responses to interview questions. We made six qualitative interviewswith low-and high school teachers, assistant principals, counselors and special educationteachers training in Kalmar County.

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Beteendebubblan : En studie om navigationsbeteende på internet med fokus på korta navigationstillfällen

The purpose of this paper is to explore web use and web navigation behavior. This paper presents findings from qualitative research based on interviews and diarie studies. The basis of this study is Eli Parisers work about ?the filter bubble?. As personalization systems shape our experience of the web, based on who we are, our bubble of knowledge and information becomes smaller.

Gärningsmannaprofilering : Ett fungerande verktyg eller påhittad filmglamour?

Some children develop externalizing and internalizing behavior problems at an early age. Previous research has often treated these children as a homogeneous group, the purpose of this study is to show that this group of children is in fact heterogeneous. Data from theSOFIAstudy was used and preschool pedagogues were informants. The sample contained 2121 boys and girls between 3-5 years. Groups of children with the behavior problems and the risk factors AD/HD symptoms, fearlessness and callous-unemotional traits were created.

1 Nästa sida ->