Sök:

Sökresultat:

10919 Uppsatser om Computer-based alarm - Sida 13 av 728

Implementation av en renderare för Agency9

The visual complexity in real-time applications, like computer games, is increasing with customer demands on vissual apperance. This trend is supported by even better graphics cards from the hardvare industry. This must be taken into consideration when the architecture of a new graphics engine is to be designed. The engines renderer is responsible of generating a picture of scene data. The renderer must cope with increasingly more complex scenes, and must be able to render them depending on available hardvare capasity.

Framtagning av ny lager layout hos Allied Motion Stockholm AB - En studie om effektivisering av lager och intern materialflöde

This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.

Dom kallar det Lean? En studie om Lean i sjukvården och dess påverkan på den professionelle läkarens medicinska beslutsfattande

The purpose of this media scientific study is to contribute to a better understanding about how blind people?s empowerment and participation may affect their role in the digital society.Earlier international studies in this area have shown that blind people not only need more knowledge then the seeing population about the computer, but also about the technology behind their tools for using Internet. The results from these studies have also shown that Internet increases the blind people?s independents and that those who use Internet feel more involved in the society.A qualitative method was chosen to study the three most common categories from the earlier studies: knowledge of technology, empowerment and participation. Are there differences in the results compared to our study in Sweden 2014?Interviews with eight blind, experienced computer users have shown that knowledge of technology is essential for their use of Internet and that the Internet increases their empowerment and their participation.

Tvärkraftsdimensionering av armerad betong : En utredning av beräkningsförfarandet

This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.

Statusbedömning och förbättringsförslag för startkedjemaskineri, startkedja och linspel för stränggjutningsmaskin

The main goal with the master thesis has been to do a status evaluation of the chain machinery with its start chain and wire to secure the production on a short basis due to that a reconstruction is not planned at this time. An evaluation of the condition of the start chain and the rollers in the chain depository has been done. An offer has been requested for a new start chain and the evaluation of the start chains may be a basis for the decision taking. The production has been able to go on, although it has arisen some problems which have been difficult to find the causes for. There is no gathered ?picture? of the machinery status and a mapping of each machinery has been compiled of comprehensive logs.

Samband mellan trafikolyckor och väggeometri. En analys av kopplade olycks- och vägdata för större vägar i Region Väst

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Trafiksäkra vägar genom god vägutformning baserat på kunskap om det mänskliga beteendet - en utvärdering av metoden IST-Checklist 2005

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Buss eller spårvagn? Framtida kollektivtrafikförsörjning av området mellan Kungssten, Frölunda torg och Saltholmen i Göteborg

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Larmpaneler på fartygsbryggor : En studie av larmpanelers användarvänlighet och problematik

Denna studie ska påvisa den problematik som ett fartygsbefäl kan känna och uppleva när ett larm signalerar på en fartygsbrygga. Syftet är att beskriva problemen samt ta vara på befälens egna erfarenheter utav larmpaneler ombord på fartygens bryggor, samt vad man skulle kunna göra för att minimera problemen. Vi har valt i denna studie att göra en kvalitativ undersökning med hjälp av enkäter samt intervjuer. På detta sätt kan vi fånga upp fartygsbefälens egna erfarenheter och de känslor som de beskriver. Resultatet har visat sig att det finns problem med lokaliseringen av larm för de oerfarna samt att de dessutom kan tappa sin uppmärksamhet med navigationen av det egna fartyget.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys

The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Internetbaserade insamling och behandling av data

AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

<- Föregående sida 13 Nästa sida ->