Sök:

Sökresultat:

1392 Uppsatser om Extended sequential cascaded network - Sida 13 av 93

Acceptansgränsen för solceller i lågspänningsnät : Kan den ökas?

Microproduction, also called distributed generation, is something that has become more and more popular in the electric grid. Microproduction can however lead to unacceptable performance if several units are installed in the same low voltage network. It is therefore good to know a limit where the performance of the low voltage network becomes unacceptable based on given parameters. This limit is usually called hosting capacity.In this report the hosting capacity with respect to voltage and current have been studied in three low voltage networks which are located in Falu Elnäts concession area. This has been done by simulations in a GIS-program where critical times of the grid have been simulated.

Strategi och struktur i småbarns byggprocess : Vilka erfarenheter har småbarn av byggklossars form och balans?

I dagens samhälle har många kundföretag problem med datalagringen vilket beror på att behovet av att lagra data började öka kraftigt under 2000-talet och har fortsatt öka sedan dess. När kundföretagen började använda sig av virtualisering så expanderade även datastorleken. I samband med att datastorleken växte ville företagen att data inte skulle lagras lokalt utan att den skulle vara lagrad på en central plats som en serverhall och vara överskådlig.Studien utfördes på tre sätt, först undersöktes vilka datalagringslösningar som fanns och det skedde genom litteraturstudier. Därefter kontaktades företag som använde olika lösningar för datalagring. Nästa steg var att kontakta de leverantörer som kundföretag använde sig av och som levererade lösningarna.Under arbetets gång upptäcktes olika lösningar på problematiken med ett ökat datalagringsbehov.

Kan det vara hypertext? Ett försök att analysera en månglineär, flersekventiell pappersburen text som hypertext

The object of this thesis is to discuss the limits of the hypertext concept. The issue is whether the concept of hypertext necessarily depends on the conditions of the electronic media and www, or if the concept of hypertext more likely is founded on certain textual structures and strategies. In the light of contributions to hypertext theory during the 1990s, this thesis compares different views on hypertext, and concludes with an evaluation. The poem it the authors own translation of the original Danish title det, written in 1969 by the system-poet Inger Christensen, is the object of this case study. The poem is analysed with respect to its structural organisation and literary composition.

Observatörer för skattning av verktygspositionen hos en industrirobot : Design, simulering och experimentell verifiering

This thesis approaches the problem of estimating the arm angles of an industrial robot with flexibilities in joints and links. Due to cost-cutting efforts in the industrial robots industry, weaker components and more cost-effective structures have been introduced which in turn has led to problems with flexibilities, nonlinearities and friction. In order to handle these challenging dynamic problems and achieve high accuracy this study introduces state observers to estimate the tool position.The observers use measurements of the motor angles and an accelerometer and the different evaluated observers are based on an Extended Kalman Filter and a deterministic variant. They have been evaluated in experiments on an industrial robot with two degrees of freedom. The experimental verification shows that the state estimates can be highly accurate for medium frequency motions, ranging from 3-30Hz.

Hur min dyslexi påverkar mitt författarskap

The aim of this essay is to examine three separate Swedish public libraries and their respective websites on the grounds of the usability sciences. I firstly had to summarize the main properties of the usability-field in order to gain an extended knowledge of its purposes and possible usage for today?s library systems. I was then able to apply the extended knowledge in the examination of the three library websites and the purpose of determining whether or not they were designed according to the standards set by the usability-sciences.Usability is a rather new science that deals with the dissection and examination of computer-based systems, in order to find the key components that make systems user-friendlier. With user needs being the main focus of its research, usability tries to meet all the different needs of the modern user and construct systems that are less system-centered and more user-centered.

Allt löser sig, bara vi finns på Facebook. : En kvantitativ studie om hur svenska Facebookanvändare i åldrarna 16-25 interagerar med företag på den sociala nätverkssajten.

Because social media is personal and reaches users directly, it has become an important means of communication for companies trying to reach out to their audience (Nygren & Wadbring, 2013). Especially the possibility of interactivity has been discussed as social media's big advantage. But how much two-way communication is actually possible on social media? This is a quantitative study that focuses on how Swedish Facebook users in the ages of 16-25 interact with companies on the social network. The aim was to contribute with increased information and knowledge about how the users mentioned above interact with the companies as well as how the users perceive the companies communication and presence on Facebook.

Nätverk i nätverk : en nätverksansats i den nya ekonomin

Society and technology develop together in interaction processes. Because of the development of information technology, the Industrial society has been left behind in favor of a society where information is the key production factor, i.e. the Information society. In the Information society, social functions and processes are organized in networks. These networks integrate geographically separate markets to parts of a complex global economic system.

Wildlife Detection Network

Traffic accidents where wild animals are involved represents between 60 and 80 percent of all reported accidents, depending on location in Sweden. In a country like Sweden, with a lot of forest, there is always risk of a collision with a wild animal. Imagine if you, as a road user, had the possibility to receive warnings when the risk of an accident according to statistics is extra high.Wildlife Detection Network is a wildlife warning system with an information service, which makes the whole concept unique. When an animal is approaching the road, it is registered by sensors, and warning lights along the road are lit to inform drivers of the potential danger. In conclusion, this is a direct warning to all drivers on the road where the system is placed.When an animal is registered by the sensors, information containing time, date, weather circumstances and coordinates are sent to a database.

Jämförelse av nätverksfilsystemsprotokoll i Windowsmiljö

Detta arbete handlar om nätverksfilsystemsprotokollen SMB/CIFS, SMB2 och NFSv3. Arbetet baseras på artikeln ?A New Network File System is Born: Comparison of SMB2, CIFS, and NFS? som skrivits av Steven M. French på IBM, Samba Team. I den artikeln saknas det prestandatester och därför känns det relevant att göra prestandatester för att få fram vilket protokoll som har högst hastighet med olika filstorlekar i Windowsmiljö.

Marknadens värdering av redovisningskvalitet

The purpose of this thesis was to investigate whether accounting quality is a priced factor by investors. The event studied is the release of year-end result and the release of the annual report. To assess accounting quality a sample of 30 companies listed on the Stockholm Stock Exchange during 2003 to 2007 are studied. We assess accounting quality by the absolute size of discretionary accruals using the modified Jones model developed by Dechow et al. (1995).

Samverkan i BoDa-enheter : En kvalitativ studie kring personer med funktionsnedsättning

Title: Collaboration in BoDa-units. A qualitative study about collaboration regarding people with disabilities. The purpose of this thesis was to internally examine the cooperation between different professions in municipal BoDa-units. By doing a qualitative study using focus-group-interviews in three municipalities, we were able to examine the personnel?s experience of cooperation issues and opportunities in BoDa-units.

"Det är ett kluvet grattis!": en studie om unga mammors föräldraskap ur professionellas perspektiv.

The purpose of this study was to examine parenthood of young mothers from a professional point of view. The professionals work in a medium-sized city in Sweden and they represent different professions to give a broad perspective of the subject. The questions in the study were: What were the advantages of being a young mother of today and were there any problems with being a young mother, from the professionals perspective? What role did young mothers network and family play, from a professional point of view? From a professional point of view, how well did society handle young parenthood? How do the professionals handle the young mothers they met? Studies with reference to professionals' thoughts and expectations of young mothers were few, therefore the professionals were given a central position in this study. A qualitative method was chosen, for this study.

Computer Network Attack som olovligt våld : en fråga om association, effekt, aktör och mål

I Estland 2007 utbröt vad som kommit att kallas ?Cyberwar I?, vari ett stort antal centrala myndigheters, tillika finansiella institutioners servrar attackerades av massiva så kallade Computer Network Attacks (CNA), utfört av framförallt ryska aktörer. Estland protesterade högljutt, men frågan huruvida CNA är att beteckna som olovligt är allt annat än klar. Prövningen sker mot den folkrättsliga regimen Jus ad Bellum, och huruvida metoden uppfyller vissa centrala begrepp. Men hur skall denna regim appliceras CNA?De frågeställningar som avses besvaras är: hur kan CNA utgöra våld eller hot om våld i enlighet med FN-stadgans artikel 2(4) samt hur kan CNA utgöra väpnat angrepp i enlighet med FN-stadgans artikel 51? Detta avses göras genom en studie inbegripande flertalet folkrättsliga experters teorier på området CNA och våldsanvändning, samt applicering av desamma på en fallstudie av händelserna i Estland 2007.Sammanfattningsvis konstateras att flertalet variabler har bärighet i hur CNA kan uppfylla artiklarnas centrala begrepp, vari frågan om association, effekt, aktör och mål tydligast faller ut.

Ipad som pedagogiskt verktyg i förskolan : En studie om pedagogers och förskolebarns syn på ipad i verksamheten

I dagens samhälle har många kundföretag problem med datalagringen vilket beror på att behovet av att lagra data började öka kraftigt under 2000-talet och har fortsatt öka sedan dess. När kundföretagen började använda sig av virtualisering så expanderade även datastorleken. I samband med att datastorleken växte ville företagen att data inte skulle lagras lokalt utan att den skulle vara lagrad på en central plats som en serverhall och vara överskådlig.Studien utfördes på tre sätt, först undersöktes vilka datalagringslösningar som fanns och det skedde genom litteraturstudier. Därefter kontaktades företag som använde olika lösningar för datalagring. Nästa steg var att kontakta de leverantörer som kundföretag använde sig av och som levererade lösningarna.Under arbetets gång upptäcktes olika lösningar på problematiken med ett ökat datalagringsbehov.

IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter

The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.

<- Föregående sida 13 Nästa sida ->