Sök:

Sökresultat:

2287 Uppsatser om Computer Network Attack - Sida 2 av 153

Konstruktion av en autonom vindstation

Construction of an autonomous wind station was a project with the goal of creating a product that could collect wind data from a sensor and then transfer this data to a server wirelessly over the GSM network. The device would be powered by batteries and solar cells and function fully without requiring external power supply. This required that a small computer was constructed and programmed to store and send data at predetermined cycle times and programming of a server that received the sent data. The project also required optimization of power consumption and dimensioning of solar cells and batteries based on this. The construction of this station demanded research both for the selection of hardware and programming software. The computer was based on a microcontroller and a GSM module that sent the data over the 2G network.

Efficient Frequency Grouping Algorithms for iDEN

This Master?s Thesis deals with a special problem that may be of importance when planning a frequency hopping mobile communication network. In normal cases the Frequency Assignment Problem is solved, in order to plan the use of frequencies in a network. The special case discussed in this thesis occurs when the network operator requires that the frequencies must be arranged into groups. In this case the Frequency Assignment Problem must be solved with respect to the groups, i.e.

Facebook och ansikte mot ansikte-kommunikation : En undersökning bland 100 ungdomar i Karlstads kommun om deras kommunikativa vanor

This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.

Återfall i kriminalitet : Klientens eller samhällets val

This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.

Urval och risk i informell finansiering av entreprenörsprojekt : En fallstudie av Firm Factory Network

This thesis discusses various approaches that venture capitalists have when evaluating investment prospects. The thesis is a case study of the business angel network Firm Factory Network. The empirical material is based on an extensive interview with Firm Factory CEO Daniel Kaplan. Our conclusion is that Firm Factory Network uses both informal and formal methods when they evaluate interesting prospects..

Ungdomar och datorn : Vilken roll spelar datorn i ungdomars liv?

How does the computer influence teenagers' lives. I interviewed five young people, and gave a questionnaire to another 47, about this.What I found was that they were aware of and handled well the risks with the Internet and the computer, but had problems with the computer taking too much of their time. They wanted more time for their families and outdoor activities. It was mainly the Internet that seemed to have an influence on the teenagers, not the computer as a machine. They told me that there was a rough climate on the Internet, partly because of the possibility of being anonymous.

Datorspel till nytta eller nöje? En intervjuundersökning utifrån folkbibliotekariers perspektiv

This Masters thesis concerns computer games in Swedish public libraries. We have investigated the opinions of public librarians concerning what they think about computer games, and to what extent they believe it should be a part of the public library. The method we have chosen is qualitative interviews. The theory we have used is a pedagogical literature strategy, which we have reformulated so that it fits our investigation. The results show that the interviewed public librarians think that the library should offer computer games for children and youths to use at the library, and that they should offer computer games for lending, to all the library users.

Matematisk begreppsbildning för elever med läs-och skrivsvårigheter

This essay deals with the subject of communication through Facebook. In this survey we studied 100 youths from Karlstad and their communication habits and behavior patterns on Facebook. The social network site Facebook has since its start in 2004 made a mark in modern communication. Today in 2010 the site has more than 500 million users. This paper wants to study what happens to other types of communication.

Inloggning : Lösenordskryptering och Brute force attack

This report is the result of a sub-project of a larger project to create a platform formathematical education. The sub-project focuses on authentication with associ-ated security, where security is emphasized. The project environment is Java EE 6where GlassFish 4.0 acts as the server. The project has been divided into threeparts; password encryption, Java EE authentication and brute force attack. Thepassword encryption part focuses on examining different hash functions executionspeed, the result shows that none of the examined hash algorithms is suitable fordirect use.

Från DOOM till Krakel Spektakels ABC - Datorspel och lekfulla datorprogram för barn och ungdom på svenska folkbibliotek

This thesis is an attempt to study computer games and playful computer programs for childrenand youth at Swedish public libraries. The main method used, is qualitative interviews.The main reason the libraries in the study offer computer games and playful computer programsto their users, is that every member of the society shall have opportunity to use newtechnology such as computers and computer programs. The users of this media are for themost part boys. The librarians in our study wish to have pedagogical games and programswithout violent themes at their libraries. Lending computer games and computer programs isnot of any priority for the libraries..

Kvinna Och Kropp. Två hinder vid en hjärtinfarkt

Purpose: To describe the gender impact on the situation of women at the onset of myocardial infarction and describe why women wait to contact medical caregivers when showing symptoms of myocardial infarction. Method: Literature review with a descriptive design. Articles was retrieved from PudMed and Cinahl. Findings: Women are affected more than men of the so-called atypical symptoms of a heart attack. This means that they can not always relate the symptoms to a heart attack.

Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup

Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks..

GPS-­baserad virtuell geografisk inhägnad för mobil enhet

The aim of this paper is to find an algorithm to establish and maintain a virtual enclosure around a mobile unit. The area may take any form and should be scalable up to and including national borders. The enclosure is managed on the mobile unit. The target system is Android. Smartphones, tablets and more recently, cameras is examples of mobile units. A modern mobile unit is part of a computer network.

Successiv avtalsbundenhet : En beskrivning av modellen och dess närvaro i svensk rättspraxis

Why has some cyber-attacks been more successful than others? There has been in the near past examples of cyber-attacks used with different purposes. How do we understand these chosen targets and what result the attack accomplished?Research has discussed similarities between aviation warfare and cyber warfare, and how the first could explain what is happening in cyber warfare now. There is also opposing opinions whether cyber warfare should be seen as a method to alone force a will on your opponent or if cyber warfare should mere be supporting other military means.

Hantering av QoS i Distribuerade MPEG-videosystem

With the advance in computer and network technologies, multimedia systems and Internet applications are becoming more popular. As broadband network is prevailing, more clients are able to watch streaming videos or to play multimedia data over the Internet in real-time. Consequently, there is an increasing demand in the Internet for streaming video systems. As the run-time environment of such applications tends to be dynamic, it is imperative to handle transient overloads effectively. The goal of this work is to develop an algorithm that would provide a robust and controlled behavior of the video system so that important data is delivered on time to the video clients.

<- Föregående sida 2 Nästa sida ->