
Sökresultat:
2914 Uppsatser om Meeting Technology - Sida 23 av 195
Lean Sex Sigma hos Sandvik Materials Technology
Bakgrunden till examensarbetet är att det existerar ett behov inom Sandvik Materials Technology att komma tillrätta med problemen avseende dålig leveransprecision och antalet reklamationer genom ett förbättringsprogram som kan angripa alla bekymren inom företaget. Företaget har i dagsläget inlett ett internt förbättringsprogram kallat Lyftet Ledtid, med övergripande syfte att sänka ledtiderna i processerna för att minska kapitalbindningen samt uppnå bättre kvalitet. Andra företag har implementerat förbättringsprogrammet Sex Sigma och en undersökning av dess lämplighet för Sandvik Materials Technology bör ske. Arbetet syftar till att undersöka förbättringsprogrammet Sex Sigmas utrymme inom det interna förbättringsprogrammet Lyftet Ledtid. Det bör även ange hur en eventuell implementering kan ske.
Överföring av och beräkning med timmätta värden ? från MT2000 till Xpower
New technology makes it possible to remotely measure all consumers in a power network onan hourly basis and store the values in a database.This thesis work describes the conversion process between automatic meter reading systemMActor and calculation software Xpower.Then the possible differences between calculations of power networks using load curves incombination with a yearly estimate of consumption and calculations using hourly measuredvalues is examined.The result of the comparison shows that, for the power network under inspection, nosignificant difference could be noticed. This does not mean that calculations using hourlymeasured values would be unnecessary. I believe that in a near future calculations using hourmeasurements will be the primary choice for many power companies to whom technology isavailable.Also some basic calculations of fundamental power network parameters, such as power factorand loses, are presented using hourly measured distribution transformers in combinations withits hourly measured loads.The report is written in Swedish.
Fra?n vilja till genomfo?rande - Fo?ra?ndringar i arbetet med va?ld i na?ra relationer inom en stadsdelsfo?rvaltning
The aim of the study was to examine prerequisites for the changes that are taking place within working with Intimate Partner Violence in Va?stra Hisingen (a municipal district in Gothenburg, Sweden). My research questions concerned incentives for the new features, their practical consequences and prerequisites for implementation. The study has been performed by three focus group interviews with different parts of the organization represented. The work material has then been analyzed using Implementation Theory, Human Service Organization Theory and theories on breaking up.
Virtuell community i mobilen - Kriterier som ligger till grund för en framgångsrik virtuell community i mobilen
Sociala nätverk tar stor plats på Internet genom virtuella communities. Användare har en större möjlighet att nå dem via mobila lösningar och därmed göra dem till mobila communities. Kriterierna som ligger till grund för framgång för virtuella communitiesvill vi applicera på mobila communities. För att undersöka dessa kriterier, och bakomliggande faktorer, har vi valt att titta på ?tidigt bruk? användning av en mobil community, Facebooks mobila portal med hjälp av Technology Acceptance Model (TAM).
Skillnader mellan uppkopplad och uppkopplad : En jämförelsestudie mellan 1960- och 1990-talister
This paper aims to examine whether there are any substantial differences between a generation of users born during the 1960?s and younger generation born during the 1990?s regarding the use of digital technologies connected to the Internet. Based on Marc Prensky?s theories on people born before and after 1980 saying those born before are not as natural when it comes to using digital technologies. We used diaries as a qualitative method to gather data from 16 respondents.
Förbränningslära för bubblandefluidbädd
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Klimat & Patriarkat : Genusgeografi i Huddinge
The essay deals with gender aspects on climate change adaption. The aspects consist of the fact that women in Sweden drive cars less than men, and that women in the developing world are more affected by natural disasters arising from global warming. This study was carried out in the municipality of Huddinge, a suburb to Stockholm, by interviewing one Agenda 21 coordinator, one planner and one student in genderstudies. I also attended a meeting in the Committee for built environment in the Huddinge Municipality, to ask the politicians questions and observe gender structures during the meeting. The results also consist of a search for gender-related words in the documents used in the essay.The results are analysed using ecofeminsim, a theory that connects woman subordination and environmental destruction.
Låt den rätte komma in - En studie om valet av vd i entreprenörsföretag
Entrepreneurship is said to be the missing link between knowledge and growth in the Swedish economy. New ventures run a high risk of failing and this holds true especially for technology ventures. Since company leaders have proven to exert an influence on organisations' survival possibilities, the selection of an appropriate CEO is important. The purpose of this study is to describe the importance of the CEO for ventures as well as to explain how knowledge and experience affect the opinion of who should be CEO. Using a qualitative case study research design including three life science companies, we show that there are three main factors crucial when selecting a CEO.
?Bring your own device? i svenska företag och organisationer
Most companies and organizations today depend on technology connected to the Internet. Schools and offices have therefore been providing computers, phones and other technology to the employees. The recent technological development and decline in prices for technology have contributed to making these products a part of everyday life for most people. This has made it very common for employees and students to bring their own devices into school and workplaces.The aim of this study is to define what "Bring your own device" means for Swedish companies and organizations and how it has been implemented in those. The aim is not mainly to generalize to all Swedish companies but create an understanding how the trend is used to provide a basis for continued research in this area.
SMS för personer med kognitiva och kommunikativa funktionsnedsättningar ? en intervjustudie av användares upplevelser
Current technology offers many possibilities for remotecommunication. Nevertheless, people with cognitive and communicativedisabilities have limited access to common communication technology like textmessaging via a mobile phone. This study is part of the project Text messagingwith picture symbols - a possibility for AAC users and people with cognitiveimpairments. Semi structured interviews were used to investigate three menand four women?s experiences of using Windows mobiles with adaptedfunctions for text messaging.
Det virtuella kontoret : En litteraturstudie i möjligheter och utmaningar med att använda 3D kollaborativa virtuella miljöer inom distribuerad systemutveckling
Distributed system development is a common occurrence in today?s technological and global world. Because the consequences of its geographically distributed nature it creates barriers between people that affects their communication and collaboration efforts in the distributed context. Despite a lot of technological breakthroughs over the last decades and the occurrence of video-conference applications and other tools for communication and collaboration, cultural and geographical issues have so far not yet been completely resolved. In this study I have made a literature study over distributed system development to form a set of central factors that affects the distributed development process.
Windbelt
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Kvinnlig könsstympning eller omskärelse. En litteraturstudie om sjuksköterskors behov av kulturella kunskaper i mötet med omskurna eller könsstympade kvinnor.
Sweden, being a multicultural society, has an increased need for transcultural care. The purpose of this literature review is to provide, through Madeleine Leinger's Culture Care-theory and her Sunrise model, a greater knowledge to nurses and to other professions within the health care units in meeting with circumcised or genitally mutilated girls or women. The result is based upon two scientific dissertations and nine scientific studies. It emerged mainly the etic (outsider) perspective. To underline the emic (insider) perspective, pure literature and fiction have been used.
Analys av säkerheten av RFID i inpasseringssystem
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Aktiv bullerdämpning i ventilationssystem
Active headsets have been on the market for years and now it is time for
something else to enter the stage. The technology of active noise reduction can
for exmple also be used in ventilation systems for reducing ventilation noise.
An active control system principally consists of four important components,
namely the downstream error microphone, the upstream detection or reference
microphone, the digital signal processor (DSP) and a loudspeaker.
The upstream reference microphone listen to the primary ventilation noise and
sends it to the DSP which makes a phase shift to the signal and sends it to the
loudspeaker. The loudspeaker sends out the opposite waveform of the incoming
one and reduce the primary ventilation noise.