Sök:

Sökresultat:

18008 Uppsatser om Information operations - Sida 46 av 1201

Ett hindutempels verksamhet och funktion i diaspora : En etnografisk studie om ett swaminaryantempel i Mellansverige

 This essay has been investigate a Hindu swaminarayantempel in central Sweden, its activities and function from a diaspora perspective. Also to investigate the relationship between Hindu diaspora groups and in relation to South Asia. An ethnographic method was used.The result of this study shows that the key activities temple provides the puja. Pujan is the most frequent activity in the investigated Temple. The temple also provides other activities that often are linked to anniversaries and celebrations of festive calendar, such as Diwali or gods' birthdays.The investigated temple has a similar function as other diaspora groups.

Nekande tvångsmakt i Operation Unified Protector

There are several competing views on how to best utilize air power. Following his quantitative study of air power, Robert Pape developed a theory which focuses on undermining the target state's military strategy. According to Pape it is possible to explain the outcome as a result of military vulnerability. This essay seeks to determine if Pape's theory can predict the outcome of Operation Unified Protector. By using a mixed methods approach on four hypotheses, it will be determined if the operation was a successful case of coercion, if NATO acted according to Pape's model and whether this achieved the desired effects or not. The results reveal that the theory could not successfully predict the outcome of the conflict.

Visualisering av anläggningsinformation för underhåll

This project has created a web-application for the service technicians at the paper plant Gruvön. The project was outsourced to the IT-company Sogeti.The application visualizes information about reparation-work of the equipment at the paper plant. The displayed information is work-orders, the status of the work-orders and errors. It is also possible to see the costs and hours spent on reparation-work.. The work-orders and related information is stored in a relational database.The application is created mainly for web-browsers in mobile-phones and tablets.

Virtuella doftspår på webbplatser

Människan är nyfiken och vill finna ny information på webbplatser. Detta kan underlättas med hjälp av virtuella doftspår som användaren följer. Denna rapport är en fördjupning i hur människan går tillväga för att följa virtuella doftspår och hur man som designer ska använda sig av detta när man utvecklar en webbplats. Genom teorierna information foraging och användbarhet har en användbarhetsmodell och en operationalisering tagits fram för att underlätta detta. Tillsammans med datainsamling genom intervjuer och metoderna heuristisk utvärdering och high fidelity har studien visat att när man skapar ett gränssnitt för användare behövs information foraging som bestämmer eller lämnar förslag på hur virtuella doftspår påverkar användaren..

Diskkrypteringsprestanda i GNU/Linux

This thesis compares the impact on disk performance in a GNU/Linux  environmentwith three encryption algorithms: AES,  Serpent and Twofish in three different implementations: DM-crypt, Loop-AES and Truecrypt. For all three algorithms a key length of 256 bits is used.The thesis shows that the least performance impact during data encryption, and thus file writing, is reached by using AES or Twofish encryption implemented in DM-crypt or TrueCrypt. The thesis shows that some data operations with a sufficiently low processor utilization barely affects disk performance at all if encrypted using the optimal implementation and algorithm.It is also discovered that the performance impact during data decryption, or file reading, can be minimized by using the most efficient implementation and algorithm. The best results are met with the AES or Twofish cipher, regardless of implementation.An important conclusion that  is  drawn is that it is hard to determine a superior encryption solution for all purposes. However, by reviewing and examining the collected data from all aspects of disk performance the AES implementation in TrueCrypt is, with small marginals, determined to be the most optimal..

Proxyserver för passiv informationssökning

In today?s society the average person is flooded by information from everywhere. This is in particular the case when using the Internet; consider for a moment the fact that a decent search engine at this moment scans 8 058 million homepages. For a user that repeatedly comes back to the same site, the case is often that they know what they are looking for. The problem is to isolate the important information from all the other information embedding it.We would like to state that we have found one possible solution to this problem, where the user himself can define what information he is looking for at a specific server, then scan the server when visiting it with his browser.

NBF- Förmågan att se på andra sidan kullen eller ?Kejsarens nya kläder"

So- called ?Network Based Defense? (NBD) was introduced in Sweden in connection with the transformation of the Swedish Armed Forces in 1999. NBD is based on the U.S. variant Network Centric Warfare (NCW), which in turn is derived from research on the concept of Revolution in Military Affairs (RMA). In Sweden the concept was introduced and included not only the Armed Forces but was intended to also support the Swedish civilian agencies in order to create networks and hence share the available information and thus more effective crisis management and to provide more "bang for the buck." In developing the concept of NBD the Swedish Armed Forces used both economic and human resources, in the form of research, new technologies, new organization and new methods.Between year 2004 and 2006 the Armed Forces once again entered the process of reorganization.

Animal welfare in Ethiopia: handling of cattle during transport and operations at Kera Abattoir, Addis Abeba

The main objective of this study was to evaluate animal welfare situation in Ethiopia during slaughter and to investigate chain activities between animal markets and Kera abattoir in Addis Abeba. In total, 442 animals were observed within 52 groups of cattle; both ox and calves with different breeds. The study was divided into four different sets of data collection; behavioural observations, recording of slaughter process, observation during transport and interview. During the behavioural observations, an ethogram was used with 46 behaviours observed, categorised into 5 different groups. The data was calculated using Excel and SAS. The results indicated that a significant correlation (p-value.

Derivativ talan och Corporate Governance. En komparativ studie ur ett rättsekonomiskt perspektiv

The world is getting smaller. Global markets, political processes and communication technology bring people together. Even though many of these processes are dynamic and constructive, they have also resulted in a need for better and more effective ways of international conflict resolution. This thesis investigates central issues connected to the concept of humanitarian interventions in relation to current and future legislation of the European Union. The overall question is whether the rapid globalization process has resulted in a change of international law towards more liberal view where authorization of the security council is not always needed? And, if there has actually been such a liberalization, how does that affect the legal possibilities for the European Union to carry out armed operations without the consent of the global community?The conclusion of the thesis is that international law has been modified mainly in two aspects: First, the concept of sovereignty is no longer seen merely as a right of the nation, but also as a responsibility.

Utvärdering av en beslutsåterkopplad kanalestimator för tredje generationens mobiltelefonisystem

This Masters thesis work describes a comparison between two different methods for estimation of the down channel (base station to mobile subscriber) in Wide-band Code Division Multiple Access (WCDMA). The first estimation method, Optimal Feed-forward Channel Estimation (OFCE), is a conventional method that bases the estimates on data that is known to both sender and receiver, so called pilots. The second method, Decision Directed Channel Estimation (DDCE), is an elaboration of OFCE. It also uses user data for estimation. Simulations show that DDCE, in comparison to OFCE, does not attain an improvement in signal-to-noise-ratio (SNR) for high bit error rates (BER). An improvement is only seen when the BER becomes much lower than what is common in real situations. In conclusion DDCE is complicated, involves many mathematical operations and gives insignificant improvement of SNR when BER takes common values. It is legitimate to question if it is possible to use the method in a real mobile phone system..

Det virtuella studielandskapet -ett projekt vid Linköpings Universitetsbibliotek

The aim of the thesis is to investigate to what extent the pedagogy process has been affected by the close collaboration between librarians and teachers when it comes to education on the information search process. The thesis shows that the librarian is seen as an acting intermediate for information, and is regarded as a part of the learning process. The issues covered comprise of how students, teachers and librarians perceive that the students becomes information literate, how they perceive that the subject fields are covered, and how information has been transmitted, and how all this has been affected by the fact that the librarian is actually less available in person. Also, the following questions are discussed; how do librarians, teachers and students interact through the homepages of the course and "the landscape of studying"? And in what respect have the old library halls changed into that, which is available 24 hours a day, with different kinds of meeting opportunities where the search of information has been integrated with group projects? The foundation of this study is built on an evaluation of a project comprising of virtual study environment at the University of Linköping.

Verifieringsinformation : En kvalitativ studie

Den här rapporten handlar om hur en optimal nivå på verifieringsinformation i kontrakt skall uppnås. När kontrakten skrivs finns begränsad information framme. Det finns kundkrav men systemkonstruktionen är inte fastställd. Radarsystem är väldigt komplexa produkter vilket leder till att det är många år mellan kontrakt och slutleverans. Under tiden utvecklas ny teknik som kan leda till att konstruktionen behöver ändras.

Privacy Policy : Att skapa förtroende för en uppkopplad värld

Förtroende har sitt ursprung i trygghet och säkerhet. För att lämna ifrån sig personlig information krävs att man känner förtroende och således även trygghet och säkerhet. Tillgång till personlig information är en viktig konkurrensfördel för ett företag. Samtidigt utgör den personliga informationen ett problem eftersom många kunder känner en oro att lämna ifrån sig denna. Oron beror på osäkerhet om vad som kan hända med den information man lämnar, denna oro kan i sin tur leda till brist på förtroende.

Tidskriftsrummet och integration: en kvalitativ undersökning av tidningsläsandet hos några individer av första generationens invandrare

The purpose of this master?s thesis is to find out in which ways a group of first generation immigrants use Swedish papers and magazines in a public library and which information needs this group has about Swedish society. One important aspect in this essay is integration of immigrants in the Swedish society as a possible effect of newspaper reading. The method used in this study is qualitative. Data is generated through semi-structured interviews.

Telecom City : Co-Opetition and Communication within a regional growth cluster

Vår uppsats undersöker, om hur möjligheterna för utbyte av information samt samarbete mellan Telecom Citymedlemmarna kan förbättras, med ändamålet att stärka deras konkurrenskraft gentemot externa konkurrenter..

<- Föregående sida 46 Nästa sida ->