
Sökresultat:
597 Uppsatser om Identification scheme. - Sida 4 av 40
Att katalogisera en specialsamling med hjälp av TEI: En metodprövande studie utförd på Swedenborgsarkivet i Kungl. Vetenskapsakademien
In this thesis, the TEI (Text Encoding Initiative) encoding scheme is investigated as a system for storing metadata about manuscript material and 18th century first prints in the Swedenborg Archives at the Swedish Royal Academy of Sciences. The aim of the study is to test the functionality of TEI as a metadata system in cataloguing a special collection. Some criteria of functionality are formulated, and examples of encoded catalogue entries are described and analysed. It is demonstrated how descriptive metadata have been registered within the TEI header, while structural metadata have been recorded within the text element of the TEI file. On the whole, TEI is considered to be a functional tool that matches the present purposes.
Modellering, identifiering och reglering av skannern i ett laserbatymetrisystem
The purpose with this masters thesis was to model the scanner in a system for laser bathymetry. The model was then used to develop a controller for the scanner so a good search pattern was achieved. Two different types of models have been tested, a physical model and a Black Box model of Box Jenkins type. The physical model has been derived from Lagranges equations. Identification experiments have been used to compute the Black Box model and to find the unknown parameters in the physical model.
Facebook - en falsk utopi? : En studie av politisk polarisering på Facebook
Title: Facebook ? a false utopia?Authors: Anton Furuland & Dominic ChennayaPrincipal research question: Is the political polarization increasing on and through Facebook?Theoretical frame: Identification theory, selective exposure theory, spiral of silenceMethod/Material: Semi-structured interviews which provided our materialMain Results: Our research has shown a tendency for increased political polarization on Facebook.Number of pages: 58Course: Media and communication studies CDepartment: Department of informaticsUniversity: Uppsala UniversityPeriod: HT 2014Tutor: Amelie HössjerKeywords: Political polarization, Facebook, political debate, selective exposure, identification.
Klassifikation av litteratur om film och TV ? En komparativ studie av Klassifikationssystem för svenska bibliotek (SAB) och FIAF Classification scheme for literature on film and television
The aim of this thesis is to compare two different classification schemes with each other and see what the differences and similarities are when classifying literature concerning film and television. One of the schemes is of general kind, Klassifikationssystem för svenska bibliotek (SAB) and the other is a special system, FIAF Classification scheme for literature on film and television. The focus of the examination is on comparing the structure, contents and division of firstly the main classes and secondly on comparing the notation and the auxiliary tables in the schemes. The theoretical framework of the comparison is based upon theory of classification but the conclusions drawn are though mostly of a more subjective character. In addition to the comparison itself interviews have been made with four libraries, two with experiences of SAB and two with experiences of FIAF.
Förbränningslära för bubblandefluidbädd
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Windbelt
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Analys av säkerheten av RFID i inpasseringssystem
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Testprogram till hårdvara på en viktindikator
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Dell from a intellectual capital perspective (working title)
Purpose: We will understand and explain Dell?s value gap through an extended intellectual capital theory. This will be done by deriving the value to the different parts of the intellectual capital value scheme. We will also use value scheme to describe the ongoing strategy shift. Methodology: The qualitative method and an abductive reasoning have been employed during the progress.
Skanskas säkerhet på arbetsplatsen : Personlig skyddsutrustning
This degree projekt deals with Skanska´s safety at the construction site with focus on personal safety equipment. The purpose of this dissertation is to examine how the rules of personal safety equipment are applied and experienced at Skanska´s construction sites.In October 2004 Skanska started a projekt to make the construction sites more safe. With use of a questionnaire we have made a survey at different construction sites. 80 questionaires have been handed out to Skanska´s employees in the southeast region. While they were handed out we conrolled if the employees at Skanska´s construction sites used head protection, easy visible clothing, safety shoes and identification cards.The result of the survey shows how the rules are applied.
"Ta det som en man?" : En kvalitativ innehållsanalys med fokus på maskulinitetsdrag hos karaktärer i Svenska filminstitutets rekomendationer för Skolbio
This study is a qualitative content analysis which sets out to examine the representation of stereotypic masculine traits amongst the main characters in two films from The Swedish Institute of Film's (Svenska Filminstitutets) selection for ?School Cinema? (Skolbio). The study is operationalised through the use of a scheme, constructed by Lorraine Evans and Kimberly Davies for their study No sissy boys here, which maps stereotypical masculine and feminine traits and originates from Sandra Lipsitz Bems ?Sex Role Inventory?. The masculine traits in the scheme are: aggressive, competitive, argumentative, decisive, assertive, risk-taking, self-reliant and adventurous, and the feminine are: affectionate, emotionally expressive, impetuous, nurturing, panicky, passive, tender, and understanding.
An Investigation into a Grocery Store Loyalty Card and its Accompanying Promotional Benefits Effect on Service Loyalty
The purpose of this study is to investigate a loyalty card and its relation to accompanying promotional benefits, and their linkages to grocery retail service loyalty. Also, the aim sets out to find relationships between demographic variables and proneness towards the promotional benefits, the loyalty card, and loyalty. A quantitative approach has been assumed and empirical data has been collected through the use of questionnaires. The data has been analyzed through descriptive statistics, correlations, and regression analysis. An operationalization used to measure satisfaction of the loyalty card and attitudinal loyalty is also presented.
Bemanningskonsult idag - mittemellan två företag?
In the past decade there has been a considerable growth of contingent employment arrangements. In Sweden, the most common among these are the temporary-help service firms. The aim of this study is to investigate how the employees of temporary-help service firms experience their situation as employed by one company and working at another. We have used a qualitative approach to reach an increased understanding for the daily situation of the contingent worker. The essay is based on participant observations and semi-structured interviews with six contingent workers.
Ryssland, Kina och deras nationella klassifikationssystem : En komparativ analys av BBK och CLC med DDC
In this two years masters thesis in Library and Information Studies, the Russian Library-Bibliographical Classification (LBC/BBK) and the Chinese Library Classification (CLC) are analyzed with regard to their historical and ideological backgrounds and their respective evolutions. The structure of these classifications is compared with the Dewey Decimal Classification (DDC), as well as three chosen subjects (History, Politics and Religion). A qualitative comparative textual method is used.The study shows that these classification schemes, created at different times, different parts of the world, and different political systems, have different biases but give priority to the European before other foreign views. Otherwise, they often use a proximity principle. The CLC and the LBC were originally based on Marxist materialist principles but built in totally different ways.
Den svenska regeringens förvirrade klimatarbete
The aim of this study is to clarify the Swedish government?s purpose of participating in theEuropean Union Emission Trading Scheme. Taking as its departure point state-centricinternational political economy this study presents three plausible hypotheses on what thepurpose might be. Either it is to promote consumers interests, or to promote the Swedishnational climate goal ?Reduced impact on climate?, or to promote the profit of Swedishcompanies.