Sök:

Sökresultat:

1870 Uppsatser om Computer trust - Sida 12 av 125

Tvärkraftsdimensionering av armerad betong : En utredning av beräkningsförfarandet

This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.

"När katten är borta..." : En studie kring pedagogiskt ledarskap på distans

AbstractTitle: When the cat is away? A study of pedagogical leadership at a distanceLevel: Final assignment for Degree of Master of science (one year) in Educational ManagementAuthor: Evelyn JoelssonSupervisor: Ulla SebrantDate: 2013 mayLeadership is a subject that has been discussed for many generations. Today?s leadership is something completely different than what has been practiced before, in the more hierarchical companies, when leadership was something you were born to do and the workers had no choice but to follow. In the globalised world that we live in today there are demands of a different kind than before and physical distance between leaders and their followers gets more and more common.

Buss eller spårvagn? Framtida kollektivtrafikförsörjning av området mellan Kungssten, Frölunda torg och Saltholmen i Göteborg

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Samband mellan trafikolyckor och väggeometri. En analys av kopplade olycks- och vägdata för större vägar i Region Väst

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Trafiksäkra vägar genom god vägutformning baserat på kunskap om det mänskliga beteendet - en utvärdering av metoden IST-Checklist 2005

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Att vara partner eller kontrollant. En studie av Sidas uppföljningskrav:

External forces have significant impact on organisations. This study analyzes the implications of one type of external forces in aid-focused NGOs through two qualitative case studies where it is investigated if Sida?s reporting requirements have the intended effects: learning and control using a theoretical framework where it is recognised that the requirements may also result in dysfunctional behaviour: decoupling and colonisation. The study shows that when the demands are the result of institutional pressure rather than an ambition to generate learning and control, the demands tend to be unrealistic and the NGOs therefore decouple the formal fulfilment of the demands from the actual activities. It is argued that a partnership, which incorporates trust and dialogue, is a prerequisite, not only for learning, but also control.

Att vara partner eller kontrollant. En studie av Sidas uppföljningskrav

External forces have significant impact on organisations. This study analyzes the implications of one type of external forces in aid-focused NGOs through two qualitative case studies where it is investigated if Sida?s reporting requirements have the intended effects: learning and control using a theoretical framework where it is recognised that the requirements may also result in dysfunctional behaviour: decoupling and colonisation. The study shows that when the demands are the result of institutional pressure rather than an ambition to generate learning and control, the demands tend to be unrealistic and the NGOs therefore decouple the formal fulfilment of the demands from the actual activities. It is argued that a partnership, which incorporates trust and dialogue, is a prerequisite, not only for learning, but also control.

Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys

The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.

Hur skiljer sig investeringsbeteendet mellan män och kvinnor : en kvantitativ jämförande studie om skillnader i investeringsbeteende mellan män och kvinnor

In this paper the authors are trying to understand what separates men from women when they save and invest their money. But also what factors that influence them in their decisions. To investigate how men and women actually act when investing their money the authors construct a survey. The authors also turn to the Swedish banks for information on how they think there customers are behaving. The authors find that men are more risk- taking than women and therefore invest more in products with higher risk, for example shares.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Internetbaserade insamling och behandling av data

AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Förtroende för E-handeln : Förtroendeskapande

Syftet med studien är att undersöka hur företag arbetar med att skapa och bevara kundförtroende över internet. För att besvara syftet undersöker vi hur företag som bedriver e-handel arbetar med att skapa och bevara kundförtroende. Undersökningen utgår ifrån relevant litteratur och framförallt två modeller som tillsammans bildar en teoretisk referensram. Denna referensram används som modell och grund för en kvalitativ undersökning. Den kvalitativa undersökningen grundar sig i sex djupgående intervjuer baserade på personliga möten och telefonintervjuer.

<- Föregående sida 12 Nästa sida ->