Sökresultat:
1672 Uppsatser om Computer networks - Sida 2 av 112
Utvärdering av datorprogram för användning vid dagvattenutredningar
The main object of this diploma work thesis is about how computer programs can bea tool to use for work on stormwater investigations. The advantage of using acomputer program compared with calculations made by hand is evaluated anddiscussed. The computer programs that have been used for studies and a sequence oftesting of the possibilities are Autodesks Storm and Sanitary Analysis and DHIs MikeUrban.Focus on sustainable development now permeates the building industry. As a resultstormwater investigations have been conducted in an increasing extent the recentyears. Stormwater is water produced due to precipitation, such as rain and snowmelt.Stormwater investigations normally contain descriptions of existing land use, plannedland use and suggestions of measures and technical solutions for the future disposal ofstormwater.The initial part of the thesis consisted of literature studies on stormwater andstormwater investigations to understand the science.
Spelutveckling, problem och utmaningar
Detta arbete ämnar undersöka problem och utmaningar relaterade till design- och
produktion av ett tävlingsinriktat spel för gratis utgivning samt utforska
potentiella lösningar och designfilosofier genom att påbörja utveckling av ett
spel. Problem som uppstår, lösningar som tillämpas och val som görs
dokumenteras varpå resultat analyseras.
Undersökningen tar upp design av både spelmekaniska och grafiska element samt
produktionen av spelet och dess resurser, saker som är viktiga att tänka på och
några saker som kan gå fel..
Trådlösa nätverk
This report describes what wireless local area networks are and the use and configuration of them. These WLAN as they also are called can be used both in new installations and expansion of existing networks. Further on this report reveals security in this area. Security is incredible important in all networks not at least wireless because you don?t have to be in the environment physically to get the information, you only have to be in the coverage area that can be several hundred meters.
Från DOOM till Krakel Spektakels ABC - Datorspel och lekfulla datorprogram för barn och ungdom på svenska folkbibliotek
This thesis is an attempt to study computer games and playful computer programs for childrenand youth at Swedish public libraries. The main method used, is qualitative interviews.The main reason the libraries in the study offer computer games and playful computer programsto their users, is that every member of the society shall have opportunity to use newtechnology such as computers and computer programs. The users of this media are for themost part boys. The librarians in our study wish to have pedagogical games and programswithout violent themes at their libraries. Lending computer games and computer programs isnot of any priority for the libraries..
Marknadsföring, relationer och nätverk hos forskningsbibliotek - en beskrivning och analys
The major aim of the thesis is to describe the networks, relations and marketing of some university libraries and their customers in the year 2000. I illustrate how these issues interact and whether they have changed due to the recent development of technology and if so, how. The thesis is based on interviews with two directors of libraries and two librarians at two different libraries. A small survey with 16 questionnaires has also been performed in order to get a more general view on librarians' opinions in these questions. The thesis mainly shows that the networks in which the respondents take part primarily exist in the library sphere and towards the universities.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
Vad påverkar till motivation i skolan
The major aim of the thesis is to describe the networks, relations and marketing of some university libraries and their customers in the year 2000. I illustrate how these issues interact and whether they have changed due to the recent development of technology and if so, how. The thesis is based on interviews with two directors of libraries and two librarians at two different libraries. A small survey with 16 questionnaires has also been performed in order to get a more general view on librarians' opinions in these questions. The thesis mainly shows that the networks in which the respondents take part primarily exist in the library sphere and towards the universities.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Sociala nätverk och det ökade användandet : En studie om det har skett en normförskjutning av användandet samt hur det relaterar till traditionellt beroende
The internet has become an increasingly part of everyday life with digital artefacts like smartphones and tablets. We?re looking at the usage of social networks and how the usage relates to traditional addiction. We conducted a quantitative research where 84 poeple finished our web survey. Our research focused on addiction, time spent on social networks, normal and non-normal usage and general user patterns.
Personliga nätverk: en fallstudie om personliga nätverk inom musikindustrin
The purpose of this thesis was to illustrate the connection between personal networks and entrepreneurial business in the music industry. It also aims to examine how and why entrepreneurs in the music industry use personal networks in their entrepreneurial business activities. In order to explore the extent to which entrepreneurs in the music industry obtain support through personal networks, a case study was conducted based on interviews with entrepreneurs in various areas of the music industry. The study has shown that entrepreneurs in the music industry clearly see distinct advantages through the use of their personal networks, especially in terms of an enhanced supply of resources and through an increased amount of business opportunities. Personal networks have also shown to constitute a considerable amount of moral support for the entrepreneurs in the development process of the entrepreneurial business.
Bara, bara vara "vänner" : En explorativ studie av den professionella socialarbetarens användande av sociala medier inom socialtjänsten
The aim of this study was to enlighten social workers experiences of social networks direct influence in Swedish social services, and in which ways those influences are manifested. Some of the issues that are being explored in this study are: The separation of the private sphere and professional duties; boundaries and dual relationships that occurs inside social networks; the use of social networks as a control-instrument in authority exercise towards clients; and social networks arising impact on social work. The empirical material was collected with nine qualitative interviews with social workers stationed at different social service departments in a Swedish municipality. Also one qualitative e-survey was sent out to, and answered by four social workers with a managerial position in the same municipality.The results reveal that several informants have experienced different problematic situations involving clients within the social networks. This study shows that the informants are very restrictive with what information (text and pictures) they publish on their facebook-profiles, because of their position of authority and the awareness of the possibility of always being watched.
Pamiro
This report describes the work with creating a CMS (Content Manager System). A
CMS is a
web tool so you easy can publish materials on your web page. With a CM Scan you
can
without any knowledge of programming web pages create and maintain a web page.
This
will result in that you and your organisation save time and money. You can also
split the responsibility
for the webpage in different roles, but still keep the control.
We have chosen to create our CMS in a script language called php4 and with the
database
server MySQL, we have also used JavaScript a lot.
Quality of Service i IP-nätverk
The original promise behind the Internet Protocol was to deliver data from a sender to the receiver using a best-effort approach. This means that the protocol makes no guarantees except that it will try to deliver the data to the destination. If some problem occurs the packet may be discarded by the network without any notice. No guarantees are made regarding the time it takes to deliver the data, the rate at which data will be delivered or if data is delivered in the same order it was sent. The best-effort approach is arguably the reason behind the success of the Internet Protocol and is what makes IP scalable to networks the size of the Internet.
Utvärdering av den upplevda användbarheten hos CySeMoL och EAAT med hjälp av ramverk för ändamålet och ISO/IEC 25010:2011
This report describes a study aimed at uncovering flaws and finding potential improvements from when the modelling tool EAAT is used in conjunction with the modelling language CySeMoL. The study was performed by developing a framework and applying it on CySeMoL and EAAT in real life context networks.The framework was developed in order to increase the number of flaws uncovered as well as gather potential improvements to both EAAT and CySeMoL. The basis of the framework is a modified version of the Quality in use model from ISO/IEC 25010:2011 standard. Upon the characteristics and sub characteristics of this modified model different values for measuring usability where attached. The purpose of these values is to measure usability from the perspectives of both creating and interpreting models.
Basmobilen
Today?s cell phones include more and more functionality, it is no longer
uncommon to be able to connect to the Internet or take photos with the cell
phone. In this thesis the question is if the cell phone users are interested in
this new functionality. Are there people who are interested in a cell phone
that in this thesis is called ?Basmobilen? (the entry level phone), which
include the following functions; phone call, SMS, phone book, calling lists,
clock and the possibility to change the call signal.