Sök:

Sökresultat:

2133 Uppsatser om Computer security - Sida 16 av 143

Samband mellan trafikolyckor och väggeometri. En analys av kopplade olycks- och vägdata för större vägar i Region Väst

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Buss eller spårvagn? Framtida kollektivtrafikförsörjning av området mellan Kungssten, Frölunda torg och Saltholmen i Göteborg

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys

The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.

Förändrad syn på svensk militär alliansfrihet? : En studie om svensk neutralitetspolitik mellan 1990-2008

Abstract: The purpose of this study is to examine how the Swedish policy of neutrality has changed between the years 1990-2008. The research method used for this essay has been comparative case study, which strives to answer four research questions. Two of these questions are: Which specific occurrences have been fundamental in changing the Swedish policy of neutrality? How have the Swedish policy of neutrality and the policy of non-alignment changed between the years 1990-2008? The theoretical frame work of this study consists of Europeanization as a comprehensive theoretical perspective. In order to explain the Swedish act regarding the policy of neutrality, Logic of Consequences and Logic of appropriateness are used.

Internetbaserade insamling och behandling av data

AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.

Med Säkerhetsrådets resolution 1325 (2000) som utgångspunkt : En komparativ studie av två handlingsplaner

Security Council resolution 1325 (2000) is about women, peace and security. Since the resolution was adopted several countries has made their own National Action Plan for implementation of the resolution.Sweden and Denmark are two of these countries. Resolution 1325 is one of the documents that each countries armed force has to relate to in international work.These countries can get to work together in international operations within the framework of the Nordic Defense Cooperation, NORDEFCO. This study is done by looking at similarities and differences in the action plans and whether they can be an obstacle for the countries to cooperate in an international operation.In this paper a comparative analysis of Sweden and Denmark's plans for the Security Council resolution 1325 will be done. The comparison is made based on the clauses of the resolution relating to the member states actions.In this paper, a qualitative text analysis to be carried out with sections of Resolution 1325 as a model for the comparison..

Säkerhetsmedvetenhet hos hemanvändare

IT utgör en stor del av majoriteten av folks vardagliga liv. Smartphones och surfplattor har om möjligt ytterligare ökat vår användning av tekniska enheter och prylar på en daglig basis. Arbetet tas med hem i en större grad med hjälp av laptops, VPN och molnmöjligheter. Mail kan tas emot i princip var och närsomhelst på dygnet. Men hur bra är säkerheten? På arbetsplatsen hanteras mycket av IT-säkerheten och ansvaret för den ofta av erfarna och dedikerade anställda, men hur ser det ut hemma där användaren själv har ansvaret för sin IT-säkerhet?I denna studie analyseras och identifieras risker och problem vid hantering av olika aktiviteter relaterade till IT-säkerhet i hemmet.

Behovsanpassad bevakning

The market for security is one filled with great opportunities. The security services companies are numerous and diverse, the Swedish market is dominated by two large companies: Securitas Bevakning AB and Falck Security AB. In this study we have focused on the bigger of the two, Securitas. This report describes and analysis the security service branch and its surroundings in an involved manner. The target group of the result is mainly people within the security branch.

Tensor representation of 3D structures

This is a thesis written for a master's degree at the Computer Vision Laboratory, University of Linköping. An abstract outer product is defined and used as a bridge to reach 2:nd and 4:th order tensors. Some applications of these in geometric analysis of range data are discussed and illustrated. In idealized setups, simple geometric objects, like spheres or polygons, are successfully detected. Finally, the generalization to n:th order tensors for storing and analysing geometric information is discussed..

Intranät En kommunikationskanal för alla?

Intranet is today a common technical groupware to communicate in many organisations. People can interact through the Intranet and communicate within the organization and get relevant information according to their workplace. It can be difficult to get everybody to use the Intranet as an information- and communication tool. This causes problems when people want to reach out with information. With these thoughts we entered our work at Luftfartsverket at Arlanda airport.

C, C++, Java och Python - En prestandajämförelse mellan fyra programmeringsspråk

In today?s society computers are getting a much more important role. To get a computer to work as intended it has to be programmed. A computer program is written with programming languages. There is an abundance of programming languages available today and there are many differences and similarities between them. The different languages have their advantages and their disadvantages where some of them are intended for fast performance, some to be cheap on memory usage, and some are developed to be easy to program on. In our thesis we have chosen to compare four of todays most common languages, C, C++, Java and Python.

Demokratins vara eller inte vara i Sydöstra Asien : En fallstudie av Vietnams förutsättningar för demokratisering.

This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use  and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.

Solidaritet möter säkerhet - Vad 'immigranterna' får representera i immigrationspolitisk diskurs

This essay concerns the notion of how immigration politics, defined as a political discursive structure that explains and justifies how and why the movement of people into a state's territory is restricted and controlled, has come to present its purpose not as solidarity with the 'immigrants' wanting to enter the state but as a protective measure for the state's citizens. By using discourse theory combined with theories from the International Relations field I attempt to explain why and how such a discourse positions 'immigrants' as a threat to the state.First, I concentrate on why an immigration politics discourse would position 'immigrants' as a threat. I argue that in order for people to construct their identity, the 'outside' what they "are not" has to be repressed. In the same way, the state has to dislocate the "outside" and create threats to uphold its supremacy. These boundaries are set to create a feeling of predictability and security, and ultimately they are a way of making peoples' "world" coherent.

Nulägesanalys och verifiering av autentiseringsmetoder : En studie på ett konsultbolag i nätverksbranschen

This report is written for a consultant networking company with the purpose to review the development ofthe company's remote connections from a user friendly and security perspective.This includes an investigation of the possibilities to consolidate existing authentication methods foraccessing customers. The problem lies in the amount of methods being used. Through case study wefound that smart cards, SMS-service, software and hardware tokens exist.The only method feasible from a security perspective is smart cards. Since the method is not commonlyused by the company's customers a standardization of it would be counterproductive.Also, the purpose of this report is to investigate how the ongoing internal development of the remoteconnection will affect the company's clients. Within this framework we have also verified a designsuggestion.We interpret, after the completion of the case study, that the internal development of the remoteconnection is marginally affected by legal perspectives.

Godshantering med Scania Interactor

This thesis is about making a support for barcode readers and RFID readers on a computermounted in heavy vehicles. The computer has several applications designed for heavyvehicles such as an order handling application. The goal was to suggest an architecture toimplement a support for the readers. The architecture should be independent of whichmanufacturer who has made the reader hardware that was connected to the computer.At first a theoretically study was made around RFID technology and standards for thetransport and supply sector. Then the architecture was developed and a demo implementationwas made.The conclusion of this thesis is to implement support for barcode readers with a wedgeapplication.

<- Föregående sida 16 Nästa sida ->