Sök:

Sökresultat:

2472 Uppsatser om Computer-implemented inventions - Sida 9 av 165

ITS - Interaktivt textsystem

This report describes the creation of an interactive text system for storing, retrieval and publishing of texts, ITS.My task was to create a GUI together with a database capable of handling text, commenting of texts, references between texts, and the capability to associate images with texts.After enough texts have been inserted into the database, there shall be an ability to generate a report out of them.The report describes the methods used when the GUI was implemented, how the database was modelled and implemented, and how the security aspects where solved.The entire project is created with the help of Java, MySQL server, Connector/J and OpenSSL.Furthermore the functions of the GUI and the future of ITS is described..

Samband mellan trafikolyckor och väggeometri. En analys av kopplade olycks- och vägdata för större vägar i Region Väst

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Trafiksäkra vägar genom god vägutformning baserat på kunskap om det mänskliga beteendet - en utvärdering av metoden IST-Checklist 2005

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

Buss eller spårvagn? Framtida kollektivtrafikförsörjning av området mellan Kungssten, Frölunda torg och Saltholmen i Göteborg

Today more effective computer programs are in use, regarding design of geotechnicalconstructions. There is a risk that the theoretical background of the computerprograms, its limitations and the signification of the choice of soil parameter isforgotten when the computer programs become more user-friendly.This Master thesis deals with simulation and analysis regarding three computerprograms, FEM-design, with the addition Raft, Plaxis and BE-slab. Comparisons aremade for settlement and maximum moment in a concrete-plate. FEM-design is a threedimensional FEM-program, foremost created for design engineers. Plaxis is a twodimensional FEM-program, intended for geotechnical engineers while BE-Slab is aBoundary elements program in two dimensions that is mainly used by designengineers.

HAVECA-modellen - En metod för att fortlöpande säkra ett internt nätverk mot tredjepart

This thesis will address a problem concerning availability of information systems at an enterprise within the financial sector and its external suppliers, so called trusted third party. The information system resides on the internal network of the enterprise and must be available to both employees of the enterprise and the trusted third party simultaneously. This contradicts the company policy which disallows third parties access to the internal network. The HAVECA-model introduced in this thesis provides a framework of methods, each solving a sub problem identified in the model. The identified methods are hardening, verification, control and assurance, together supplying a method for continuously securing the internal network against a trusted third party.

En undersökning i datasäkerhet för hemanvändare - Är det nödvändigt att använda brandvägg?

The emphasize of this study is to evaluate security issues for home users having a personal computer connected to the Internet. It focus on the usage of advantages and disadvantages when using a firewall while connected to the Internet. The hypothesis is that it gives a better protection to install and use a firewall compared not to do so, due to security flaws in the operating system. The prediction was tested on a home user's personal computer. The testwork was divided into two major tests, each of them performed with, respectively without, a firewall. These major tests were divided into five smaller semi­ tests. The first semi­test without a firewall suffered from a virus or worm attack resulting in loss of data and log files.

Design av styrsystem till rotationsstol och utveckling av numerisk modell av otolitmembran

This master thesis is made of two parts. The first part concerns the method and results ofdesigning a motion control system for a piece of research-equipment called BIRGIT. Theequipment is made to be used for research on eyemovements. In the second part, a computermodel of a part of the balance organ in the inner-ear is developed. The work has been done atthe Bernadotte laboratory at S:t Erik Eye Hospital.The equipment the control system is made for is a so-called rotationchair.

Rackmonterad elektrolyscell

This report shows methods and workflow when exploring the potential to change Outotecs HCD Silver Electrolysis machine to a module type. It?s done as an attempt to lower the workshop and installation costs and to give customer a more accurate prize directly. To do this a concept was produced which was set to a stress test. Additional objectives were to investigate freight and installation procedures, pneumatic connections and to calculate the difference in cost.Once the concept, a reinforced type of the original frame, was chosen stress tests in computer simulations were made and appropriate alterations were made.

Företags investeringsutgifter för datorprogram : en inkomstskatterättslig analys

The legal situation of companies costs for investing in computer software in an income tax law perspective is described by a tax law guidance that generelly acount these costs according the principles of research and development. If there is any reason to classify the costs differently, it could mean that immediate deduction not will be allowed. For this reason it is important to establish what the legal situation would be in a more nuanced tax law classification. The tax law categories that will be analysed in the thesis are research and development, inventories, intangible assets, stocks and ongoing projects. The purpose of this thesis is mainly to give examples of what such an income tax law classification can look like.While dealing with the problems of classifying the costs some situations of competition will occure.

Bluetooth and security

Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns.

Internetbaserade insamling och behandling av data

AbstractAim of this project was to analyse signals and try to localize the position of source of sound. It is donewith three microphones which have 90 degrees angle to each other. Each microphone detects one partof the sound wave. The microphones are connected toan ADC which turns signals from analogue todigital shape. After that the three signals are transformed to a computer.

Med minskad komplexitet får ett system ökad användbarhet Fallstudie av användbarhet i ett affärssystem

One of our reasons is that we think the subject usability is interesting, is that we think it is an important. Usability is maybe the most important element when you develop or choose a system because it can save money for the companies and give the users a more delightful and better work environment. The aim of the investigation is to find out if the implementation of a web portal is a direction to reach higher usability in a complex system that consists of several different interacting applications. The objective of our investigation is to show if the implementation of a web portal is a direction to reach higher usability in a complex system that consists of several different interacting applications. In our case we will try to see if Karlshamns AB:s recently implemented web portal is more useful than their previous application (Movex with interacting programs) One thought with the report is to give the system developers a perspective of how the usability can be in-house made applications versus standard applications. Also companies that not have any computer- or department for development and which are thinking of get hold of, change, replace or complement their system and applications, may have some interest in our thesis. We have used a qualitative investigation method in our study to answer our hypothesis.

Säkerhetshot och lösningar för privatpersoner med bredband

As more and more people gain access to broadband in their properties, the security threats get bigger. A lot more people also have computers that they carry home from work where they store important information concerning the company. The information stored on theese computers can be very easy to retrieve if you have the will and the skill to do it. Very few people have any knowledge how to protect themselves from theese threats..

Tensor representation of 3D structures

This is a thesis written for a master's degree at the Computer Vision Laboratory, University of Linköping. An abstract outer product is defined and used as a bridge to reach 2:nd and 4:th order tensors. Some applications of these in geometric analysis of range data are discussed and illustrated. In idealized setups, simple geometric objects, like spheres or polygons, are successfully detected. Finally, the generalization to n:th order tensors for storing and analysing geometric information is discussed..

Automatisk mätning och detektering av röjande signaler

This master thesis has been performed at Sectra Communications AB in Linköping where they manufacture electronic encryption devices. In cryptology it is essential that an eavesdropper cannot find the plain text. To assure that a system is safe, all devices are thoroughly examined so that they don?t emit any secret information, so called Compromising Emanations (CE). This is done by comparing the secret signal with measured signals on the screen of an oscilloscope, a process that is very time consuming and furthermore, the risk of missing compromising emanations is high.

<- Föregående sida 9 Nästa sida ->