Sökresultat:
1508 Uppsatser om Computer simulation - Sida 12 av 101
Modellering av rotationssystem
This master thesis was conducted during the spring of 2014 at Atlas Copco Rock Drills AB in Örebro. The purpose of the thesis was to develop a simulation model of the rotation system for a hydraulic rock drill. In the future, the model will be used to investigate the phenomena called ?jerky rotation?. In order to validate the simulation model a test bench was designed and tests were made.
IKT verktyg ? befrielse eller belastning? : Elever i behov av särskilt stöd och deras uppfattningar om IKT verktyg i lärandet.
The aim of this study was to describe and analyse the perceptions that ten 12-15 yearold pupils with special educational need, who had been assigned a personal computer, have about Information and Communication Technology (ICT) in the learning process. Data was collected by personal interviews and observations. Sociocultural perspective and phenomenographic research approach were used as theoretical and methodological frameworks in analyzing and understanding the result. The major conclusions were that most respondents perceived the computer as beneficial assistive technology for learning, but some felt singled out by having a computer to assist in learning. Students had various opportunities to succeed in using their tool depending on e.g.
Lärarperspektiv på språkutveckling i gymnasiet
According to the curriculum the teachers have a responsibility to adjust the activities in the classroom in order to suit the pupils and to give them the means of assistance the pupils need to be successful in their learning. The teachers should also stimulate the interest to learn and support the pupils? self esteem. One of the problems a dyslectic pupil faces is an often weak self esteem. Another is the weak phonological awareness which makes it hard to fully understand the context and to recognize different phonemes when writing.
Har dagens gymnasieelever nytta av sina datakunskaper på högskolenivå. : Får dagens elever arbete på sina gymnasiebetyg inom de nya Data/IT programmen
The purpose is to analyze if the students have any use of their computer education at a senior high school level or if there is a demand for them to proceed studying. Does the students background have any importance or is it their own motivation that makes the student advance to higher education.In this report we ask ourselves the question, if the students have any use of the knowledge gained at senior high school in computer studies at a higher level. Do the students have any chance for employment based on their senior high school grades in computer studies after graduation? Do the schools that follow the senior high school guidelines within programming and databases give these students an advantage towards those that have not received the same fundamental education?The method used for the survey is a group questionnaire. The questionnaire was distributed at one and the same time and then collected to examine the results. The survey results showed that students who seek work based only on their senior high school grades, received only a temporary position for different lengths of time.
Analys av instyrning och rolldynamik
When driving hard and cornering on a circuit good control of a car?s roll is desired, so the car reaches steady state quickly but yet in a controlled fashion. This control is mainly given by the combination of the cars springs, shock absorbers and anti-roll bars.The aim of this report is to investigate, analyze and measure a Porsche Boxster?s turn in behaviour and roll dynamics as well as with the aid of simulation results give suggestions for improvement of the previous mentioned combination.Two different simulations were made, one based on a simpler model that was based on an evolved version of the bicycle model in Matlab and one was more advanced model in the simulation software rFactor. Measurements of the real car was made using a GPS-based measurement system.
Sjukvårdsrådgivningen i Karlshamn, Blekinge Län, - Från utredning till verklighet, om processen att införskaffa ett system
This Batchelor?s Thesis concerns 20 points at the MDA-program (People,
Computers and Work) at Blekinge Institute of Technology in Ronneby, Sweden. 10
points concerns Computer Science and 10 points Human Work Science.
The thesis is about the process of starting a new department of
Blekingesjukhuset [Blekinge Hospital] in Karlshamn, Blekinge called
Sjukvårdsrådgivningen [Health Care Advice Bureau]. The thesis starts with a
description of the ethnographical methods used, followed by the process of
establishing the department.
In this new department, the nurses are using a computer based system called
Teleråd, developed by TietoEnator. The thesis takes up the issues of how the
department uses this system today and concerns what ?user-friendliness? is.
Implementation av en renderare för Agency9
The visual complexity in real-time applications, like computer games, is increasing with customer demands on vissual apperance. This trend is supported by even better graphics cards from the hardvare industry. This must be taken into consideration when the architecture of a new graphics engine is to be designed. The engines renderer is responsible of generating a picture of scene data. The renderer must cope with increasingly more complex scenes, and must be able to render them depending on available hardvare capasity.
Framtagning av ny lager layout hos Allied Motion Stockholm AB - En studie om effektivisering av lager och intern materialflöde
This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.
Analys, modellering och återskapande av fordonsdynamiska rörelser i tåg
The purpose of this thesis was to analyse, model and finally generate dynamic vehicular motions in a train. The objective with the analysis was to find important motions for a realistic train experience. The motions from the analysis were then weighted against possibilities for generation in a motion platform.A dynamic motion model was created to model the selected motions. The model was implemented in a simulation environment, more specifically MATLAB/Simulink. The simulation environment was used to simulate the model and to generate outputs to control a motion platform.
Tvärkraftsdimensionering av armerad betong : En utredning av beräkningsförfarandet
This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys
The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Internetbaserade insamling och behandling av data
AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.