
Sökresultat:
2405 Uppsatser om Computer aided software engineering - Sida 28 av 161
Utveckling av kompatibilitetsdatabas
This report explains the need to develop a configuration manager that handles transmission equipment which exists in the Swedish Defence telecommunications network. The configuration module will display the configurations and compatibility among the equipment and their software which are all part of the network.Also included in this report are tools, methods and results for the development of a prototype for the configuration manager. The prototype consists fundamentally of a database assisted by a user friendly website.The transmission equipment handles a lot of important transmission of information and is in the hands of a department of SAAB, OFGCA, by orders from the Swedish Defence Materiel Administration (FMV). Within the work included in this order exists a continuous update of both software and hardware which the equipment consists of. Therefore it?s highly important that there is a monitoring of which of the software and hardware is compatible with one another, ensuring that the functions of the system work properly.The consistent updating has resulted in compatibility issues between components and because of this, a need for a configuration manager has arisen..
Artificiell insemination av får
AbstractThe purpose of this bachelor thesis is to describe the use of artificial insemination (AI) in sheep and discuss the possibilities for AI in Sweden. Male and female fertility, heat detection, semen handling and insemination techniques in sheep are described. Advantages and disadvantages of AI are discussed. In order to achieve genetic progress it is important with well planned and implemented breeding programs. The Swedish Sheep Recording Scheme and computer software from Elitlamm are the basis for sheep breeding in Sweden.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Att blunda för annonser. En studie av konsumenters och annonsfinansierade företags uppfattningar om annonsblockering på webben
The majority of free content on the internet is financed by online advertising. A requirement for thismodel to work is that the visitors see the ads. The emergence of ad-blocking software has shifted thepower from the advertiser?s choice of publishing ads to the consumer?s choice of viewing ads. Weexamine the consumers? opinions regarding the use of ad-blocking software and compare them to theopinions of companies using online advertisement.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Internetbaserade insamling och behandling av data
AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.
Utveckling av dataanalysprogram för Opcon Powerbox
Opcon Powerbox is a product developed by Opcon together with the underlying company SRM (Svenska Rotor Maskiner) where surplus heat from the industry is used through an Organic Rankine Cycle (ORC)?process to produce electricity. An ORC-process is a thermodynamic circle process in which a refrigerant is used as the working fluid. The refrigerant makes it possible for the circle process to operate at lower temperatures than the conventional Rankine process.In this master?s thesis a data analysis software for the Opcon Powerbox has been developed in which measurement data is retrieved and handled from the Opcon Powerbox.
BarnABC
This project is a learning CD-ROM production aimed at first-time parents. It is
using both sound and images, moving as well as non-moving. The purpose of the
production is to be an interesting alternative to traditional books. We have
been looking at similar productions like drivers license educational CD-ROMs
and encyclopedias for inspiration and ideas on how to proceed. In order to give
the content some dynamics, we've also added the element of 3D-animated
sequences.
The application is supposed to be run as a simple executable file with flash
embedded.
KBE I PRODUKTUTVECKLING PÅ SCANIA : En undersökning av potentialen i CATIA Knowledgeware
Övergången från CATIA V4 till CATIA V5 innebär nya möjligheter för konstruktörerna på Scania att arbeta med Knowledge Based Engineering, KBE, för att effektivisera och kvalitets-säkra sitt arbete. Då CATIA V5 är en ny plattform som innehåller verktyg med samlingsnamnet knowledgware, för att bygga in kunskap i modeller ville Scania undersöka potentialen i att arbeta med KBE, och hur detta skulle kunna ske på Scania. Vid traditionell produktutveckling tas en helt ny artikel fram vid behov och ofta innebär detta att arbete som tidigare utförts, görs om igen. Syftet med arbetet är därför att undersöka huruvida KBE i CATIA V5 kan erbjuda möjligheter att återanvända kunskap från tidigare arbete och samtidigt kvalitetssäkra denna, samt utreda vilka knowledgewarelicenser som i så fall kan vara lämpliga för Scania.För att göra detta har en litteraturstudie genomförts för att undersöka vad som har gjorts inom området, och även en intervjustudie har utförts inom R&D på Scania. Vidare har sakkunniga på Linköpings Universitet och Tekniska Högskolan i Jönköping intervjuats.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Nonvisual Society
The exclusion of visually impaired from the information flow presented to us through signs was what led me into this project. With a growing amount of information being presented to us on signs and digital information surface the need of communicating this information in a way that could be read by visually impaired is evident. Looking into different ways of communication, my goal was to create something that filled the need of the visually impaired without branding them as disabled. Having a close relative with bad eyesight is became evident on how much it limited her in her everyday life, not being able to navigate herself without the support of her husband. Through interviews with her and others with varying diagnoses I reached an insight in their situation. To my surprise they still favored a visual form of communication before an auditory or tactile form, because it?s easy to survey and quick to interpret.
Det handlar om att ge och ta : fyra lärarperspektiv
This study deals with integration between core subjects and character subjects on the upper secondary schools Electrical Engineering Programme. The purpose is to investigate how four teachers define subject integration, which the advantages and disadvantages are according to them and what the purpose is whit integrate the core subjects and the character subjects.The finding in this study highlighted that between themselves the teachers had different definitions of subject integration. In order to start up with a integrated working model the teachers had to come up whit a mutual definition of subject integration..
Är handdatorer säkra nog för hälso- och sjukvården?
The aim of this report is to discuss computer security in handheld computers and to find out the appropriate security level that must be implemented to be able to use handheld computers within the Swedish healthcare system. Most healthcare centers are using some kind of electronic journals for their patient´s data today, but there are still a number of clinics that are usingthe old paper-system. On a few places in Sweden the use of handheld computers at the clinics has already started, but in the United States the use of handheld computers in the medical area is already widespread and from this we can see a lot of different situations where it is useful and effective to work with handheld computers. The security demands on patient´s journals are high and regulated in both Swedish law and regulations from the National Swedish Board of Health and Welfare. The law does not have any substantial demands, but states that there should be an adequate security level based on the nature of the information and the costs.
Insatsens akustik och dess påverkan på hörapparatens förstärkning
The earmould acoustics affect the amplification that the hearing aid is programmed to give to its user. It is therefore important that the choices made for the earmould are correctly done. One choice is regarding the shape of the soundbore that affects the frequency response of the hearing aid above a certain cut-off frequency. The purpose of this project was to measure the frequency response when altering the shape of the soundbore in the earmould. Additionally, the aim was to examine how the frequency response is affected when the shape of the soundbore is not set or is not possible to set in the software when programming the hearing aid.