
Sökresultat:
2133 Uppsatser om Computer security - Sida 17 av 143
Datormodellering av en värmelagrande betongväggs inverkan på det termiska klimatet i ett växthus
This report describes the building of a computer model that makes it possible to simulate the thermal climate in a greenhouse. The computer model is built on the physical theory of heat exchange that occur in a greenhouse, such as radiation and convective heat exchange. The model also includes the heat storage that is active in a greenhouse.The computer model is used to simulate the thermal climate in a greenhouse under three periods, winter, spring and summer. It also investigates which effect a concrete wall has on the thermal climate in a greenhouse. The purpose of putting a concrete wall in the greenhouse model is to investigate the possibility to store heat during the day and then use this heat when the temperature drops during the night.The result from the simulations shows that a concrete wall levels the big difference in temperature that normally occurs under a day in a greenhouse.
Digital Narrativitet: En analys av Zeldas utveckling som berättande medietext
For many people, a good game is synonymous with good graphics. One thing that is often forgotten, is that the graphics only makes up one part of the games. An aspect of the games that is far to often forgotten, is the game?s content and ability to tell stories. Through analyses of the games of the Zelda series, the development of content and storytelling aspects of computer- and video games, since the later half of the 1980:s and up till today, are examined..
EU som internationell aktör för demokratiska värderingar : EN beskrivande fallstudie av Ukrainas demokratiseringsprocess mellan åren 2004-2014
This study aims at examine what kind of interest the European Union (EU) have in promoting a democracy process in Eastern Europe. The study is a descriptive case study where the case Ukraine is used to draw general conclusions. The questions asked to pursue the aim are: why does the EU want to promote a democracy process in Ukraine, what kind of methods does the EU use and why is Russia trying to prevent the EU-Ukraine development and instead supporting a Russia-Ukraine development. In this study an analytical model is created and used to analyze EU:s way in promoting democracy in Ukraine. The analyze model consists of six steps used to describe the general promotion of a democracy process and it?s applied in the empirical analysis.
Elevers motivation : en enkätstudie i år 5 och 6
The aim of this essay is to get a deeper understanding of a teachers' profession and to get knowledge of how earlier experiences can influence you as a teacher. I have interviewed a female teacher, Pia to get this understanding. As a tool to get the teacher's whole story I used the life story method. In her profession she is influenced by her own importance of security as a child.Her own needs of security has given her an deeper understanding for pupils like herself during the childhood; insecure and afraid. Her understanding for all kinds of behavior among the children has increased by her own experiences.The story shows that Pia is frustrated by the fact that she can't control her own working time.
Integration av PLM och CAD i komplex produktutveckling : En utredning av Scanias framtida systemmiljö för produktdatahantering
In today's producing companies, there is a high demand on early integrated productdevelopment. One way to facilitate communication between departments and collaborationbetween people and thereby enable early sharing of product information within the companyis to use PLM, Product Lifecycle Management.The CAD environment at Scania is at the moment being upgraded from Catia v4 to Catiav5. In this stage it is important that also the interacting computer systems in Scania?s PLMenvironment are adjusted and in the future join the development. Scania has an idea of howthese systems will be developed as the transition from Catia v4 to Catia v5 is being carriedout.
Brandväggar för hemmakontor
Firewalls protect network traffic and decide witch traffic to send further and witch traffic will be blocked. All this depends on the rules in the firewall. The firewall is installed between the internal network and the Internet. It is difficult to find a firewall that can protect us against different threats. Firewalls have both advantages and disadvantages and all this make them vulnerable.
Utvärdering av digital flygbildstolkning & automatisk beståndsindelning för det praktiska skogsbruket :
To be able to plan different treatments, accurate data is required. The collection of data is often expensive and that?s why the aim is to lower the inventory costs without loosing the accuracy of the data. Holmen Skog has in its strive to lower the costs, decided to evaluate two different methods for forest delineation, computer aided forest delineation and digital stereo view. This study?s purpose is to evaluate these two methods in regard to usability for a beginner and how good the delineation gets.
Basmobilen
Today?s cell phones include more and more functionality, it is no longer
uncommon to be able to connect to the Internet or take photos with the cell
phone. In this thesis the question is if the cell phone users are interested in
this new functionality. Are there people who are interested in a cell phone
that in this thesis is called ?Basmobilen? (the entry level phone), which
include the following functions; phone call, SMS, phone book, calling lists,
clock and the possibility to change the call signal.
"Jag kände mig som en pilot" : ??????En studie om interaktionsstilarnas påverkan på spelupplevelsen
Today's technology offers a variety of opportunities to interact with the interactive systems. Human-Computer Interaction in the last decade is the area of research that has contributed the most to this development. But how is this interaction perceived? The user experience is something that is formed by the interaction between human and the computer interactive systems. The objective of this thesis is to investigate how the user experience differs depending on how one interacts with a game.
Undersökning & Utvinning av Smartphones : En djupgående analys av positionsdata
The ordinary phone of today is not the same as it was 10 years ago. We still use them tomake phone calls and to send text messages, but the ordinary phone of today has muchmore uses, it is essentially a computer. To put into context to 10 years ago, it is a verypowerful computer, capable of processing wide array of information and presenting it tothe user. Nearly every single device today has a wireless connection, which makes everyuser connectable and able to use online services and internet at any time and place.This gives the user the possibility to integrate his or hers everyday actions with socialmedia and different search functions. Being able to search the internet for persons,restaurants, public transportation and a lot more is very useful to most.
Cloud Computing - A Study of Performance and Security
Cloud Computing är det stora modeordet i IT-världen just nu. Det har blivit mer och mer populärt på senare år men frågor har uppstått om dess prestanda och säkerhet. Hur säkert är det egentligen och är det någon större skillnad i prestanda mellan en lokal server och en molnbaserad server? Detta examensarbete tar upp dessa frågor. En serie prestandatester kombinerat med en litteraturstudie genomfördes för att få fram ett resultatet för detta examensarbete.
Denna rapport kan komma att vara till nytta för de som har ett intresse av Cloud Computing men som saknar någon större kunskap om ämnet.
Närståendes upplevelser vid akut kritisk sjukdom
AbstractBackground: When an acute illness or trauma occurs, life becomes disorganised and shattered for the critically ill person and his/her family members. The family members are confronted with thoughts about life and death which can cause stress and anxiety. How the family members cope with the crisis is individual and depending on personality and earlier experiences. Aim: The purpose of this literary review was to illustrate the family members´ experiences when dealing with a critically ill family member. Method: A literary review was made based on fifteen qualitative and quantitative scientific articles and a literary book.
Partnerskapet: trygghet eller en illusion? : En intervjustudie med lesbiska kvinnor som ingått partnerskap
I have critically examined heteronormativity as it permeates our society and questioned ?identities? as designed and constructed, leading to certain identities being seen as normal, while others are regarded as abnormal.I have had a discussion with my informants about love, monogamy, amicable and relationships. Every couple has basically isolated themselves after they became a couple and they feel secure with one another. The partnership is very important for my informants, partly because they see the partnership as a legal and economical security. However, these aspects are not crucial to the decision that they chose to marry, for the main reason is love and the desire to take the relationship one step further.
En studie om ensamkommande barns situation
In this study the semi structured interview method was used to explore what kind of knowledge one In State Authority: The Migration Board, and three Non Governmental Organisations: Red Cross, Save the Children and ISS- International Social Service have about the situation for separated children. Another purpose in this study was to explore if people who are close to the children are working for the best of the children and if their cases were treated with legal security. The result shows that the children?s cases are not treated with legal security and some of the children suffer psychologically from separations from the families and other children need new families because they were maltreated. The result also shows that there are signs that separated children are discriminated compared to children with a Swedish background..
Design comparison between HiperLAN/2 and IEEE802.11a services
This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards.