Sök:

Sökresultat:

11880 Uppsatser om Electronic Data Interchange - Sida 31 av 792

Apputveckling : En studie av motsättningar mellan design- och användningspraktiker ur ett verksamhetsteoretiskt perspektiv

We live in a high tech era of electronic media, which is changing our lives (Giddens, 1999). Apps are examples of technologies that affect our lives. An interesting question in this context is what apps will have for significance; on one hand for the development of technology, and on other hand for humans? relation to technology. Since the development and change process are central issues in the science of education I will explore the development of applications.

Moulousqous Synthesizer

Vi har byggt ett digitalt musikinstrument, en synthesizer med samplebaserad trummaskin. Synthesizern och trummaskinen är mjukvarubaserad medan gränssnittet är hårdvarubaserat. Operativsystemet som används är Linux och synthesizermjukvaran är utvecklad i ljudprogrammeringsspråket Pure Data. Syftet med denna rapport är att kunna ge utomstående personer en inblick i hur detta arbete har gått till och hur resultatet blev..

Spam : den nya tidens onlinegissel

This thesis takes on a broader perspective of the modern age phenomenon we call spam. One of the aims of this thesis is to present and to compare the variety of methods used in the day-to-day fight against spam, as far they have evolved today, but also to present and discuss some alternative methods for suggested future use. The properties of a common e-mail spam are analyzed to show how the components that make up the structure in an e-mail can be used to classify spam. Furthermore I explain the naïve Bayesian classification methods, the signature-based method, the commonly used rule-based method and the challenge and response method and discuss these. The widespread use of blacklists is also explained and a close new variant to blacklisting, Turntide is presented and discussed.

Jag försöker vara i alla hyllor: Fokusgruppsintervjuer på en webbchatt om bibliotekariers roller

In this thesis, we are concerned with the many different professional roles that a public librarian, working at a small library, has. More specifically, the purpose is to find out which different roles that librarians believe they have, and which view they have upon those. Furthermore, we are exploring the tendencies that librarians discuss in relation to these professional roles. To pursue this goal, we have used the methodology of focus group interviews, with the unconventional twist that our interviews were done using web chats. This may have the advantage that the informants may present more honest views than when using ordinary interviews due to the anonymous character of chatting.

En riskanalys av ECDIS Simulatorerna vid Sjöfartshögskolan i Kalmar

Ombord på moderna fartyg finns möjligheten att navigera med enbart ECDIS. ECDIS är beroende av många olika delsystem för att kunna fungera optimalt.Failure Mode and Effect Anylysis (FMEA) är ett verktyg med vilket man kan undersöka ett specifikt system för att upptäcka eventuella konstruktionsfel och brister i produktionsdesignen. Detta examensarbete har med hjälp av en FMEA undersökt ECDIS simulatorerna vid Sjöfartshögskolan i Kalmar för att ta reda på hur ECDIS påverkas när ett eller flera av delsystemen kopplade till ECDIS fallerar. Syftet med denna undersökning har varit att upptäcka konstruktionsfel, brister och begränsningar i ECDIS systemet vid simulatorerna i Sjöfartshögskolan i Kalmar. Det kunde påvisas att ECDIS i vissa fall ej har avgett de larm som enligt tillverkaren skall varsko navigatören att ett delsystem har fallerat.

Diskkrypteringsprestanda i GNU/Linux

This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used.The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm.It is also discovered that the performance impact during data decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation.An important conclusion that  is  drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal..

Ägandeskap av data i molnet - En studie om företags attityder och resonemang kring ägandeskap när de placerar sin data i molntjänster

Cloud computing has become a very publicized and popular concept in recent years, both in business literature and research, where data ownership is the security aspect which has usually been ranked the highest of the disadvantages that can be identified with cloud services. Today there is a lack of research on information ownership from an informatics perspective, as it is most often discussed from a legal perspective.In our study we interviewed six different companies that use cloud services, on which attitudes and reasoning they had on their information ownership. We compared these attitudes with the attitudes we identified in business literature and research on the subject. In business literature we found four recurring themes which were very clear about how a company should govern information ownership.Overall the results of our interviews showed that there is widespread ignorance at the companies on how information ownership in the cloud is regulated between the company and the cloud provider. All companies expressed that they had not experienced any change in ownership when they placed their data in the cloud, and they expressed no major concerns about how the ownership was handled.

Big Data inom den svenska sjukvården : En studie om framtida hinder och möjligheter

Denna studie har genomförts med syftet att redogöra för vilka möjligheter och hinder som kan uppstå vid införandet av Big Data-baserade IT-lösningar inom den svenska hälso- och sjukvården. Studien bygger på en explorativ fallstudie med fokus på det svenska projektet 3R- Framtidens vårdinformation. Intervjuer har genomförts med personer som är insatta och kunniga i ämnet och därför kunnat bidra med en sammanfattad bild av vilka initiativ och ambitioner som finns i dagsläget. Studiens resultat visar att Big Data kan bidra med en mängd möjligheter till förbättrad sjukvård i Sverige. Resultatet visar på att möjligheten med att samla all information i en gemensam kärna, bidrar till bland annat förbättrad forskning, en förbättrad relation mellan vårdgivare och patienter, möjlighet att kunna utföra prediktiva analyser samt underlättar arbetet med diagnostisering av sjukdomar.

Digitizing the Parthenon using 3D Scanning : Managing Huge Datasets

Digitizing objects and environments from real world has become an important part of creating realistic computer graphics. Through the use of structured lighting and laser time-of-flight measurements the capturing of geometric models is now a common process. The result are visualizations where viewers gain new possibilities for both visual and intellectual experiences. This thesis presents the reconstruction of the Parthenon temple and its environment in Athens, Greece by using a 3D laser-scanning technique. In order to reconstruct a realistic model using 3D scanning techniques there are various phases in which the acquired datasets have to be processed.

Concept description genom klustring

Concept description är en data mining-uppgift som strävar efter en begriplig beskrivning av koncept och klasser, inte exakta prediceringar. Syftet med studien är att visa hur prototypbaserad klustring kan skapa förståelse för en datamängds underliggande domän, enligt concept description. Experiment har utförts med data från pokerdomänen. Datamängden samlades in från ett low-limit, shorthanded bord, hos en av de stora Internetsiterna för online pokerspel. De två experimenten utfördes med samma datamängd, men där uppsättningen attribut skiljde sig åt.

User Interface Design for Analysis of Sensor Systems

In the future network-based Swedish Defence (NBD), attaining information superiority will be of great importance. This will be achieved by a network of networks where decision-makers, information- and weapon-systems are linked together. As a part of the development of NBD, we have performed a study of user interface design for a future network-based tool package for analysis of sensor systems, referred to as the C2SR-system. This thesis was performed at Ericsson Microwave Systems AB, Sensor and Information Networks, during the autumn 2002. A pre-study concerning the requirements of usability, trustworthiness and functionality of a user interface for the C2SR-system was performed.

Kontrollerat och okontrollerat språk En litteraturstudie i informationsåtervinning i databaser.

This thesis deals with one of the main questions within information science: The question about controlled and uncontrolled vocabulary and which of the two that are most effective when it comes to retrieve relevant information from electronic databases. The method used here is literature studies. I have described and examined five empirical studies which has been done in purpose to compare the effectiveness in retrieval with controlled and uncontrolled vocabulary, in the way they are used in retrieval of information in databases. The studies I have examined have also used recall and precision as a value to measure the effectiveness of retrieval. The studies which I have chosen is also limited to deal only with studies that have been done in bibliographic databases.

CRM i företag: en fallstudie av Handelsbanken

För att företag ska överleva så måste de ta hand om sina befintliga kunder såväl som att attrahera nya. CRM eller Customer Relationship Management är en benämning på ett synsätt eller en strategi som används för att förbättra relationen till kunderna. När modern teknologi som Internet och e-mail används för att uppnå målen med CRM kallas det electronic Customer Relationship Management eller e-CRM. Syftet med vår studie har varit att undersöka hur företag använder CRM och e-CRM för att förbättra relationen till sina kunder. För att uppnå detta syfte har en fallstudie gjorts på Handelsbanken.

En konkurrensrättslig analys av ?reverse settlements? i läkemedelsbranschen

The aim of this study was to understand how evaluations are implemented and used in procured nursing homes for elderly. Our methodological approach consisted of a single-case study research. The case in this study was Växjö municipality. Three procured nursing homes for elderly were chosen in the municipality as examples of implementation and use of evaluation. The method for retrieving empirical data and the analyzing of it was based on triangulation.

Södertörns Högskola - en skola för B laget? : En diskursteoretisk analys

Södertörn University was built in the suburb of Stockholm to bring hope for students that aren?t used to study. Ever since the university was built there has been a debate on internet message boards such as Flashback and a discourse has developed in the recent five years. The public discourse has had a negative influence on how the university is perceived by the public. The purpose of this study is to analyze how this discourse has developed the image of the university and how it has evolved.

<- Föregående sida 31 Nästa sida ->