
Sökresultat:
3128 Uppsatser om Computer technology - Sida 18 av 209
Trafiksäkra vägar genom god vägutformning baserat på kunskap om det mänskliga beteendet - en utvärdering av metoden IST-Checklist 2005
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
Förutsättningar att utforma stationsbatterier i vattenkraftverk med Li-jonteknik
In hydropower plants it is necessary to always have local power supply. Therefore, the plants are equipped with batteries as stationary back up power. Vattenfall Vattenkraft is using lead acid batteries but has been investigating alternatives to replace them. The aim of this study is to investigate the potential of using Li-ion technology as back up power.The study showed that Li-ion batteries have many qualities. The Li-ion technology will decrease the space and maintenance demand.
Implementering av Virtuellt Byggande i byggprocessen : Fallstudie av NCC Construction Sverige AB
Virtual Design and Construction (VDC) is the definition for using BIM in the construction process to simulate and analyse the building. Resulting use of the technology will according to proponents lead to fewer construction errors, a better understanding between stakeholders for the construction project, less communication problems and a smoother construction process. Although BIM has according to researchers a big potential, few companies have succeeded in broad and continues implementation. The study aims to identify the factors affecting the implementation. More precisely identify what factors influencing the decision to adopt VDC and potential barriers in the diffusion process. The empirical findings are based on a case study of NCC Construction Sweden.
Efficient Frequency Grouping Algorithms for iDEN
This Master?s Thesis deals with a special problem that may be of importance when planning a frequency hopping mobile communication network. In normal cases the Frequency Assignment Problem is solved, in order to plan the use of frequencies in a network. The special case discussed in this thesis occurs when the network operator requires that the frequencies must be arranged into groups. In this case the Frequency Assignment Problem must be solved with respect to the groups, i.e.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys
The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Internetbaserade insamling och behandling av data
AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.
VoIP Revolution - strategies to survive the future of telecom
This essay is a study of the market strategies and situations in the telephone business. Our problem was to examine the telecom companies´ strategies to stay competitive and cope with the new VoIP technology. We chose to do a qualitative study and four telephone interviews were made with Swedish and Dutch companies. We investigated three different categories of companies in the market; industry leaders, cable companies and broadband companies to get a broad view of the market. The theory chapter is based on different strategies that companies have to or can apply to get ahead, stay or survive in a hypercompetition.
Interaktiv Produktpresentation åt Abu Garcia
Detta projekt har producerats i samarbete med Abu Garcia i Svängsta, Blekinge.
Vårat projekt är en interaktiv produkt presentation gjord i flash med inslag av
3d, video och ljud. Våran tanke är att användaren ska kunna se hur en
Ambassadeur Record fiskerulle ser ut både på insidan och utsidan, hur den
fungerar och vad som gör den så unik.
Det finns också video filmer som beskriver tillverknings processen, och hur man
som förstagångs användare använder en Ambassadeur rulle.
Design och bakgrundsljud är anpassad så att den ska väcka en känsla av fiske
och fridfull utomhus miljö..
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..
Intranät En kommunikationskanal för alla?
Intranet is today a common technical groupware to communicate in many
organisations. People can interact through the Intranet and communicate within
the organization and get relevant information according to their workplace. It
can be difficult to get everybody to use the Intranet as an information- and
communication tool. This causes problems when people want to reach out with
information. With these thoughts we entered our work at Luftfartsverket at
Arlanda airport.
"Jaha, det gick ju bra den här gången också" : En kvalitativ undersökning av seniorers förhållande till e-handel
In this paper we have examined why seniors do not use e-business to the same extent as other age groups. Seniors belong to the age group that, according to statistics from Statistics Sweden (SCB) in 2011, utilizes e-business the least in relation to the number who use the internet. To understand how seniors reason and perceive the possibility to shop on the internet, we have conducted four interviews with people from 65 years and older. We have let the respondents answer questions regarding utility aspects, e-business interfaces, general shopping habits, risks, and whether or not they usually shop online. We also found out how seniors reason when they sell products and services.
C, C++, Java och Python - En prestandajämförelse mellan fyra programmeringsspråk
In today?s society computers are getting a much more important role. To get a
computer to work
as intended it has to be programmed. A computer program is written with
programming
languages.
There is an abundance of programming languages available today and there are
many
differences and similarities between them. The different languages have their
advantages and
their disadvantages where some of them are intended for fast performance, some
to be cheap
on memory usage, and some are developed to be easy to program on.
In our thesis we have chosen to compare four of todays most common languages,
C, C++, Java
and Python.