Sökresultat:
2179 Uppsatser om Computer training - Sida 14 av 146
Framtagning av ny lager layout hos Allied Motion Stockholm AB - En studie om effektivisering av lager och intern materialflöde
This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.
En trygg bas i förskolan : En essä om två olika inskolningsmodeller ur ett anknytningsperspektiv
In our essay we examine the different introduction models that are practiced in preschool. The central question is if the different models have any importance (or consequences) for the children?s connection in preschool. In the two different cases we will present, one based upon preparatory training that was applied during the 1990s and another that is currently used today.The purpose with this essay was to get a deeper understanding for the child?s attachment to preschool and for how we, as educators should act during the preparatory training to create a secure foundation for the child.
CIRKUS I GRUNDSKOLA OCH GRUNDSÄRSKOLA - samspel, omgivningsfaktorer och relevanta krav i en träningssituation
This study looked at two groups of adolescents aged 12-17 years who had participated in circus training. One group had some form of disability while the other had none. The study was carried out as a qualitative study with observations, interviews and a questionnaire used as methods of gathering data. A small part of the study was quantitative and an observation chart was used. The purpose was to examine the importance of teamwork, environmental factors and the necessary requirements during a learning situation.
Tvärkraftsdimensionering av armerad betong : En utredning av beräkningsförfarandet
This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.
Samband mellan trafikolyckor och väggeometri. En analys av kopplade olycks- och vägdata för större vägar i Region Väst
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
Trafiksäkra vägar genom god vägutformning baserat på kunskap om det mänskliga beteendet - en utvärdering av metoden IST-Checklist 2005
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
Buss eller spårvagn? Framtida kollektivtrafikförsörjning av området mellan Kungssten, Frölunda torg och Saltholmen i Göteborg
Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.
HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart
This thesis will address a problem concerning availability of information
systems at an enterprise within the financial sector and its external
suppliers, so called trusted third party. The information system resides on the
internal network of the enterprise and must be available to both employees of
the enterprise and the trusted third party simultaneously. This contradicts the
company policy which
disallows third parties access to the internal network. The HAVECA-model
introduced in this thesis provides a framework of methods, each solving a sub
problem identified in the model. The identified methods are hardening,
verification, control and assurance, together supplying a method for
continuously securing the internal network against a trusted third party.
En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?
The emphasize of this study is to evaluate security issues for home users
having a personal computer connected to the Internet. It focus on the usage of
advantages and disadvantages when using a firewall while connected to the
Internet.
The hypothesis is that it gives a better protection to install and use a
firewall compared not to do so, due to security flaws in the operating system.
The prediction was tested on a home user's personal computer. The testwork was
divided into two major tests, each of them performed with, respectively
without, a firewall. These major tests were divided into five smaller semi
tests. The first semitest without a firewall suffered from a virus or worm
attack resulting in loss of data and log files.
Aspirantutbildningsprogram
Because of the currently large recruitment needs within the Swedish nuclear powerindustry, it is necessary to recruit trainers from other recruitment groups than that ofexperienced operators at nuclear power plants. The foundation for a trainingprogram regarding these recruitment groups, here called ?aspirants?, has in this thesisbeen prepared. It contains a suggestion for main topics in the program. It also includesdiscussion on the balance between forms of education and a concrete example ofhow a lesson could be performed.These suggestions has been developed through analysis of interviews and surveyresponses from student groups most suited for the propositioned trainee program,and individuals with service as a trainer or closely linked to training activities withinthe industry.The analysis suggests that the candidates gets, besides the opportunity to practice asoperating staff before the theoretical training begins, a training program, tightly boundto the power plant with multiple instances of practice and the chance of going intothe power plant and see how things that are being raised in theory, look in real life.The practice, in addition to helping to create an understanding of the plant, it will facilitate networking with the operations staff to build a relationship and trust.Candidates should have plenty of opportunity to educate and see both other aspirantsand experienced trainers train.
Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys
The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.
Bluetooth and security
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth
och några allmänt tillgängliga attack verktyg.
Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens
läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta
avstånd. Därför har man valt att implementera det i kommunikationsenheter som
mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert
Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in
i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och
implementationer av dessa, som finns.
Internetbaserade insamling och behandling av data
AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.
Samverkan : mötet mellan förälder och pedagog där kommunikationssvårigheter råder
This study, written in the form of an essay starts with the visualized narrative of a preschool preparatory training experience. The narrative illustrates a troubled conjunction between teacher and parent. The troubled conjunction concerns how long the preschool preparatory training should be. The objective of this study is to explore my own actions and with the outset of my professional role assess and learn what happens in this meeting.My question formulations are: How can I relate to parents with other expectations then mine? What kind of dialog can I hold with the parents?I closely monitor my experiences and my practical knowledge, objectively and meticulously.
Säkerhetshot och lösningar för privatpersoner med bredband
As more and more people gain access to broadband in their properties, the
security threats get bigger. A lot more people also have computers that they
carry home from work where they store important information concerning the
company. The information stored on theese computers can be very easy to
retrieve if you have the will and the skill to do it. Very few people have any
knowledge how to protect themselves from theese threats..