Sök:

Sökresultat:

2287 Uppsatser om Computer Network Attack - Sida 8 av 153

Studie av glasfasader för kommersiella byggnader

Den klassiska approachen till navigering innefattar att agenten håller en intern representativ modell av omgivningen. Denna approach har emellertid många nackdelar, speciellt för dynamiska miljöer. En modernare approach är att förlita sig på den faktiska omgivningen istället för en modell av denna. Detta arbete presenterar en undersökning av navigeringsproblemet och hur väl det löses av agenter vars kontrollmekanismer utgörs artificiella neurala nätverk. Tillförlitligheten hos de två neurala arkitekturerna Extended sequential cascaded network och Self-organized recurrent network bestäms genom experiment.

POLIS, POLIS, REGISTERKRIS : ? en retorisk analys av polisens kriskommunikation i samband med "registerskandalen"

AbstractTitel: Ur elden in i askan. En kvalitativ studie om det sociala nätverkets betydelse för ensamkommande barnKeywords: unaccompanied refugee children, social network, risk and resilience, social work.Authors: Karin Bodå och Leila Silva The main purpose of this study is to illuminate and describe the importance of having a social network for unaccompanied refugee children in Sweden. Using qualitative interviews this study looks at their possibilities to create a social network in Sweden and how their network helps them to solve problems. Knowledge of this subject is important for social workers, in order to be able to encourage and help unaccompanied refugee children to build a social network. The base for our analysis is attachment theory, coping theory, social network theory, KASAM theory, risk and resilience theory, system theory are used to give deeper insight into experiences of four unaccompanied refugee boys.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Ur elden in i askan : En kvalitativ studie om det sociala nätverkets betydelse för ensamkommande barn

AbstractTitel: Ur elden in i askan. En kvalitativ studie om det sociala nätverkets betydelse för ensamkommande barnKeywords: unaccompanied refugee children, social network, risk and resilience, social work.Authors: Karin Bodå och Leila Silva The main purpose of this study is to illuminate and describe the importance of having a social network for unaccompanied refugee children in Sweden. Using qualitative interviews this study looks at their possibilities to create a social network in Sweden and how their network helps them to solve problems. Knowledge of this subject is important for social workers, in order to be able to encourage and help unaccompanied refugee children to build a social network. The base for our analysis is attachment theory, coping theory, social network theory, KASAM theory, risk and resilience theory, system theory are used to give deeper insight into experiences of four unaccompanied refugee boys.

Dataspel, en naturlig del av folkbibliotek? ? En fallstudie på Helsingborgs stadsbibliotek

This paper aims to investigate how Helsingborg?s city library?s visi-tors feel about computer games being available for lending and in which way computer gamers see Helsingborg?s city library as a resource. This was examined first with a study of 100 of the library?s visitors and then with five interviews with computer gamers and an interview with the librarian responsible for purchasing games.The study showed that most visitors were neutral to having games at the library and of the ones that were not neutral many more were positive than negative. Of the five gamers who were inter-viewed, there were several who had borrowed games in the past.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Nätverksdemokrati -vad bör, är, kan den vara

The main objective of the essay is to define the meaning of the termgovernance network on the basis of democratic values ? both normative andimperial - with the aim to analyse the prospects to develop an effective anddemocratic governance. Democratic values as well as civil participation,enlightenment, responsibility and approachability are discussed, but also moreeffectivness orientated values.It is clear from the presentation how normative and democracy models putdifferent values in focus, with the consequence that other values are played downor pushed aside. Compared to imperial research in partnership ? by definition atype of network arrangement - and with a starting point in democracy andefficiency, the networks are discussed as political formation.In what sense can the actual existing network arrangements meet and fulfil thedefined political values? As no straight forward answer exists, there is an ongoingconflict between the political demand for slowness and the effectiveness demandfor flexibility and mobility..

Skammens Kompass : Skam - Social förmåga - Personlighet

Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).

Vikten av säkra nätverk

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.

Datorspel - en lek eller sport? : En studie om hur tre svenska dagstidningar framställer e-sport och datorspel 2000-2013

This essay examines how three big Swedish newspapers depicts e-sports and computer gaming and how the depiction change during 2000-2013. The study will also examine whether e-sports is being portrayed as competitive sport. The purpose is to investigate which attitudes that can be identified towards computer gaming and its culture in major newspapers such as Aftonbladet, Dagens Nyheter and Svenska Dagbladet and how these attitudes eventually changed over time. The sources that will be used in both the quantitative and qualitative analysis are based on web articles, mainly because the paper editions does not provide much, if any, information about computer gaming and e-sports and also because of the convenience of being able to quickly find articles to study. Results indicate that computer gaming is being depicted in a clear negative fashion during 2000-2006, and that the depiction of e-sports is somewhat positive but not as glorifying as for the years 2007-2013. During this period, there is a apparent tendency of e-sports being introduced to readers who are unfamiliar with the gaming culture. As for the attitudes towards computer gaming, the depiction is still somewhat negative, mainly because the debate about computer games and violence was revived because of several acts of violence in shape of school massacres and mass murder.

De autistiska barnens dataprogram - hur bör de vara?

This report presents a study of the basic criteria for computer programmes that may be consideredadequate for aiding children with autism in their education and upbringing. I have based thisstudy on descriptions, opinions and proposals from people who deal with treatment and/orother issues concerning children with autism, as well as relevant literature.The study has been carried out in a major Swedish metropolitan municipality. The intervieweeswere civil servants from this municipality and representing different institutional endeavourson the issue of autism.I used a combination of both quantitative and qualitative techniques, as there was need for bothstandardization and qualitative variation. The main aim of the study was to seek suggestionson how computer programmes should be. That is, if they are to be considered appropriate föraiding children with autism develop their personality.The general conclusion of this study is that computer programmes, that may be consideredappropriate for the above mentioned purpose, should have certain characteristics of whichpedagogic usefulness and user suitability are of primary importance..

En kvalitativ studie om före detta kriminellas upplevelser av stöd och hjälp.

The aim of this study was to examine former criminals? experiences of help and support of importance to leave a criminal life style. The study consists of six interviews with former criminals and earlier studies on the subject. These studies show that relapse in crime are most common among those who are socially excluded from society. They also show that important factors to end a life in criminality are for example a supportive social network.

Lyftkraftsberäkning för vingprofiler: Virvelpanelmetoden

The problem presented in this report is that of finding a method to calculate the lift force from a single-element airfoil of arbitrary shape. A number of restrictions are used in order to simplify calculations while retaining reasonable accuracy. The problem is solved for the two-dimensional case only and no finite-wing effects are taken into account. Furthermore, inviscid and incompressible flow is assumed. The method used to solve the problem is the vortex panel method, with vortex singularities distributed over simplified airfoil geometry.

<- Föregående sida 8 Nästa sida ->