Sök:

Sökresultat:

11757 Uppsatser om Dataöverföring - Sida 21 av 784

Battle of the Produce

Thesis Purpose: The purpose of our thesis is to explore different plausible scenarios concerning the future of the Swedish produce industry with regards to branding. Methodology: In order for us to answer the research question and fulfill its purpose, we have utilized a qualitative approach combined with of both an inductive and deductive theoretical approach. Our study is both explorative and speculative. Theoretical Perspective: The theoretical framework of our research is based upon Porters Five Forces and Competitive Advantage combined with Kapferers Brand Identity Prism and his ideas on Brand Innovation. Additionally, we have utilized the Game Theory.

Tempus Custode : En GPS-tidrapporteringsapplikation

This paper describes Tempus Custode, a smartphone application with which the user may register working hours and travel time during the work day. The application communicates with a database via a server. The data stored in the database may be manipulated using an administrator tool, mainly for the composition of time reports. In this way, the user?s task of time reporting his day is greatly simplified.The application is able to automatically discriminate between work time and travel time, as it continuously fetches positioning data from the smartphone GPS receiver.

Utveckling av .Net Applikation hos Banverket Data

Examensarbetet är utfört på uppdrag av Banverket Data i Borlänge. Syftet med arbetet var att ta fram en kravspecifikation för en telefonkatalogs applikation för deras intranät samt utveckla denna i .Net mot ett befintligt mellanlager. Arbetet med utvecklingen har följt Banverket Datas egen metod för systemutveckling och arbetet med förstudierna har använt kvalitativ och kvantitativ metod. Dessutom beskriver rapporten även kravspecifikationer mer ingående..

Den svenska guldgruvan - befolkningsregistren : Teknikens betydelse för utveckling av forskningsinfrastrukturen kring de svenska befolkningsregistren

In this paper we examine the possibilities to develop the population based research in Sweden by using technological advancements. The problem that exists with population based research today is that there is a contrast between conducting important research on one side and preserving the individuals? integrity on the other. To examine this problem we are studying two projects that are active in this area. The two projects are SIMSAM (Swedish Initiative for research on Microdata in the Social and Medical Sciences) and DDB (Demografiska databasen).

Samband mellan laserdata och fältdata

To make it easier for forestry planning the forest owners needs data which describe characteristics of the forest. Such data you usually get from some type of inventory. A relatively new technology which probably is getting more important in the future, is laser scanning because of lower costs. But because the laser technology is relatively new you need to compare it with conventional inventory technologies to get better understanding of the possibilities the laser technology gives. This work intends to estimate field measured characteristics of the forest from laser data with help of regression analysis and then see which of the field measured properties that best could be estimated and which laser variables that gave the best results. This study shows that heights has the best estimates, but biomass, diameter and volume also gives good estimates.

En Survey av NFC och NFC-Protokoll med Fokus på Säkerhetsaspekterna

Near Field Communication (NFC) is a short range wireless communication technology that enables data exchange between devices. NFC is used in many different areas, from subway tickets to authentication systems. This paper presents possible security threats to Near Field Communication and documented attacks that have been used to target various NFC protocols. Weaknesses in different NFC protocols will be presented and suggestions on how to counter certain weaknesses will be discussed. This survey will be valuable for companies interested in protecting their data when using or planning to use NFC systems..

Möjligheter och begränsningar i molnet

Idag väljer många företag och kommuner att placera data i molnet istället för på en lokal server, detta medför nya problem som tidigare inte varit aktuella. Datainspektionen har påpekat brister i hur två kommuner använder molntjänster för att lagra personlig data då de ställer sig tveksamma till molnleverantörernas hantering av data samt insynen till molnleverantörerena. I detta arbete kommer det undersökas hur den svenska personuppgiftslagen fungerar när data läggs ut i en molntjänst. Resultatet av uppsatsen kommer även visa på de olika säkerhetshoten som finns i molnet och se vad säkerhetsexperter säger för att ta reda på om kommuner och företag är medvetna om och uppmärksammar samma hot. För att ta reda på detta har intervjuer genomförts med en svensk molnleverantör, företag som utvecklar tjänster mot molnet, privatpersoner som nyttjar molnet och experter inom säkerhet från Blekinge Tekniska Högskola, BTH. Resultatet av studien visar att det är svårt att se om en amerikansk leverantör uppfyller de svenska lagarna för personuppgifter, det visar också att det är teoretiskt möjligt att anlita en svensk leverantör och uppfylla lagen. Det har även visat sig att den största oron gällande molnet är bristen på kontroll av data..

Incidentrapportering ? ett resultat av säkerhetsklimatet?

Studien genomfördes hösten 2013 på ett logistikföretag i Sverige, med syfte att studera sä-kerhetsklimatets potentiella påverkan på medarbetarnas förhållningssätt till incidentrapporte-ring. Utifrån teorier om säkerhetsklimat skapades en enkät, innehållande ett urval frågor från samtliga av de sju säkerhetsklimatsdimensioner, som det nordiska frågeformuläret NO-SACQ-50 (Kines et al., 2011) innehåller. Dessa kompletterades med frågor som fokuserade på uppfattningen av incidentrapportering. Resultaten visar att säkerhetsklimatet påverkar uppfattningen av incidentrapportering, som chefer och medarbetare delar. Ju bättre klimatet är desto större blir benägenheten att ha en positiv uppfattning av incidentrapporteringen, även när man tar personlighetsdraget CFC (Consideration of Future Consequences) i beak-tande.

Tillgänglighetsstrategi för kommunala planerare : Ett arbetssätt för att identifiera och planera åtgärder av enkelt avhjälpta hinder

There are many barriers and obstacles that need to be removed to make the urban environment more accessible for people with disabilities. There are currently no adequate tools for urban planners to assess and address these obstacles. Geographical Information Systems (GIS) provide powerful methods for the visualization and analysis of spatial data, including the kind of data important in studies of accessibility. This study suggests a method urban planners can use to identify accessibility obstacles and to propose future actions to fix them.A literature review was conducted to find out what has been done and what is new regarding the accessibility issues. Different methods were evaluated which in turn led to the construction of a multi-step analytical strategy.

Quantification of sleep in dairy cows in three different stages of lactation

The aim of this project was to quantify the total sleep time in modern dairy cows during24-hour periods and to investigate whether the total amount of sleep as well as timespent in different sleep stages varies between the dry period, early- and peak lactation.The distribution of sleep time between night and day was also examined. Furthermore,correlations between sleep and lying time, fluctuations in body temperature and heartbeat were included in the aim. Eight dairy cows of the Swedish Red breed were used inthis study, which was carried out between June and September 2010. In order toquantify sleep non-invasive electrophysiological recordings were performed.Simultaneously with collecting sleep data, body position and body temperature werealso recorded. No heart rate data was obtained due to difficulties of maintainingelectrodes for heart beat measurements attached to the skin.

Uterummet i undervisningen : en läromedelsanalys inom biologi

This paper describes Tempus Custode, a smartphone application with which the user may register working hours and travel time during the work day. The application communicates with a database via a server. The data stored in the database may be manipulated using an administrator tool, mainly for the composition of time reports. In this way, the user?s task of time reporting his day is greatly simplified.The application is able to automatically discriminate between work time and travel time, as it continuously fetches positioning data from the smartphone GPS receiver.

Moulousqous Synthesizer

Vi har byggt ett digitalt musikinstrument, en synthesizer med samplebaserad trummaskin. Synthesizern och trummaskinen är mjukvarubaserad medan gränssnittet är hårdvarubaserat. Operativsystemet som används är Linux och synthesizermjukvaran är utvecklad i ljudprogrammeringsspråket Pure Data. Syftet med denna rapport är att kunna ge utomstående personer en inblick i hur detta arbete har gått till och hur resultatet blev..

Dendroklimatologisk analys av lokalklimat vid Grövelsjön i Dalafjällen

Climate on earth is getting warmer, which effects earth?s energy balance and so forth the ocean and atmospheric circulation.  In many sub-polar regions on the northern hemisphere changes due to warming of the climate can be observed. Some examples that already have been observed are shifts in tree line, towards higher altitudes and latitudes, increased ablation of Swedish glaciers and melting of the permafrost on the Siberian tundra. In Sweden climate change scenarios tell us that it will become warmer and that a higher amount of precipitation in form of rain will be an effect from this. To study climate changes in Sweden, transition zones are useful in order to observe changes in distribution of species and animal populations.

Diskkrypteringsprestanda i GNU/Linux

This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used.The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm.It is also discovered that the performance impact during data decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation.An important conclusion that  is  drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal..

Ägandeskap av data i molnet - En studie om företags attityder och resonemang kring ägandeskap när de placerar sin data i molntjänster

Cloud computing has become a very publicized and popular concept in recent years, both in business literature and research, where data ownership is the security aspect which has usually been ranked the highest of the disadvantages that can be identified with cloud services. Today there is a lack of research on information ownership from an informatics perspective, as it is most often discussed from a legal perspective.In our study we interviewed six different companies that use cloud services, on which attitudes and reasoning they had on their information ownership. We compared these attitudes with the attitudes we identified in business literature and research on the subject. In business literature we found four recurring themes which were very clear about how a company should govern information ownership.Overall the results of our interviews showed that there is widespread ignorance at the companies on how information ownership in the cloud is regulated between the company and the cloud provider. All companies expressed that they had not experienced any change in ownership when they placed their data in the cloud, and they expressed no major concerns about how the ownership was handled.

<- Föregående sida 21 Nästa sida ->