Sök:

Sökresultat:

897 Uppsatser om Metaphor Identification Procedure - Sida 6 av 60

Facebook - en falsk utopi? : En studie av politisk polarisering på Facebook

Title: Facebook ? a false utopia?Authors: Anton Furuland & Dominic ChennayaPrincipal research question: Is the political polarization increasing on and through Facebook?Theoretical frame: Identification theory, selective exposure theory, spiral of silenceMethod/Material: Semi-structured interviews which provided our materialMain Results: Our research has shown a tendency for increased political polarization on Facebook.Number of pages: 58Course: Media and communication studies CDepartment: Department of informaticsUniversity: Uppsala UniversityPeriod: HT 2014Tutor: Amelie HössjerKeywords: Political polarization, Facebook, political debate, selective exposure, identification.

Från knackningar till blodspår - Analys av Marie Hermansons Mannen under trappan

This essay examines the differences and similarities, weaknesses and strengths of the two Cognitive Semantic theories Conceptual Metaphor Theory and Principled Polysemy Approach to Meaning Analysis. To illustrate the two theories, the Swedish verb-particle construction "gå upp" is examined and analyzed accordingly. The results showed differences in the number of polysemous meaning found. The methodological evaluation showed that the differences in the underlying ideas concerning meaning-construction behind these two theories make them incompatible..

Gryningsräder : Företagets rättigheter vid konkurrensrättsliga undersökningar och enligt artikel 6 och 8 i Europeiska konventionen om skydd för de mänskliga rättigheterna

The Commission can investigate infringements of the competition rules on its own initiativeor after a complaint from a third party when it suspects the existence of a cartel under Article81 or abuse of dominant position under Article 82. The EC Commission has extensiveinvestigatory powers under Regulation 1/2003 Articles 18 and 20. The visits by theCommission are made unannounced and that?s why they are popularly known as ?dawnraids?. The surprise arrival is essential in the fact-finding process because the Commissionlooks for information, which the undertaking subject would rather not give to the Commissionand takes measures to hide.The Commissions powers during a ?dawn raid? have been subjected to criticism.

Energi- och bullerlösningar för fastigheter i tågtrafiken

An environmental review has been carried out at FORIA AB, a transportation- and machine service company, to analyze the company?s environmental aspects from the transportation segment. This report describes the essential background and the methods of identifying and evaluate the environmental aspects. It also describes how the work with the environmental aspects often vary between different actors. The design of the ISO 14001 is intentionally broad in order to apply on all sorts of activities and organizations.

Rörlig eller fast bolåneränta : resonemangen hos låntagare

The purpose of this thesis is to describe property definition and special boundary demarcation and to analyze the differences between the two cadastral procedures. Property boundaries, especially unlawfully determined boundaries created through unofficial parcelling, can create conflicts between landowners and make it diffi-cult to know which land that a property contains of. It is possible to clarify the boundary conditions through a property definition or through a special boundary demarcation re-establish boundary marks.The methods used are: (1) A literature review to collect background information, (2) A case study to summarize court cases and (3) A questionnaire study to collect opinions from cadastral surveyors.The result is summarized in two comparisons. Firstly between restoration of landmark and special boundary demarcation (which replaced restoration of landmark in a legislative change in 2010), which demonstrated that the change in the law is considered positive because special boundary demarcation gives a legal effect on the boundaries. Secondly between property definition and special boundary demarcation which demonstrated that the two procedures are similar to each other.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Testprogram till hårdvara på en viktindikator

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Skanskas säkerhet på arbetsplatsen : Personlig skyddsutrustning

This degree projekt deals with Skanska´s safety at the construction site with focus on personal safety equipment. The purpose of this dissertation is to examine how the rules of personal safety equipment are applied and experienced at Skanska´s construction sites.In October 2004 Skanska started a projekt to make the construction sites more safe. With use of a questionnaire we have made a survey at different construction sites. 80 questionaires have been handed out to Skanska´s employees in the southeast region. While they were handed out we conrolled if the employees at Skanska´s construction sites used head protection, easy visible clothing, safety shoes and identification cards.The result of the survey shows how the rules are applied.

Bemanningskonsult idag - mittemellan två företag?

In the past decade there has been a considerable growth of contingent employment arrangements. In Sweden, the most common among these are the temporary-help service firms. The aim of this study is to investigate how the employees of temporary-help service firms experience their situation as employed by one company and working at another. We have used a qualitative approach to reach an increased understanding for the daily situation of the contingent worker. The essay is based on participant observations and semi-structured interviews with six contingent workers.

Avkodning av streckkoder i mobila enheter

The most common method for identifying merchandise in the commerce is by barcodes. Symbian OS is an advanced operating system aimed at cell phones and the most commonly used in smart phones. Opportunities to a full range of new services are given through barcode recognition in a Symbian OS based device. Therefore the purpose of this degree project was to create an application which would contribute to a future solution aimed at shopping where the cell phone constitutes a reader of items? identification numbers.

Finn fem fel? Trovärdighetsbedömningar och rättssäkerhet inom den svenska asylprocessen

The purpose of this essay is to outline the aspects of the rule of law that can be applied to credibility assessment in the asylum procedure, and more specifically what factors influence the assessment of credibility in practice. To evaluate this procedure, a multidisciplinary method has been used. Secondary data has been collected from previous academic research and from legal documents such as the Swedish Aliens Act. Since the area of study lacks a reflection on how credibility issues are dealt with in practice, primary research in the form of qualitative interviews has been conducted.Key findings suggest that the Swedish asylum system does offer a fairly inclusive refugee law and rights protection relating to the rule of law. However, the study also suggests that the decision maker's own subjectivity, lack of training relating to trauma and torture victims as well as a rigid system of regulations contribute to credibility assessments being arbitrary and discretionary, in violation of the rule of law..

Framtagning av ny lager layout hos Allied Motion Stockholm AB - En studie om effektivisering av lager och intern materialflöde

This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.

Tvärkraftsdimensionering av armerad betong : En utredning av beräkningsförfarandet

This report is about the shear force design of reinforced concrete according to Europe?s common dimension rules, Eurocode. The purpose is to describe the calculation procedure and the background to the formulas and expressions that occurs. Furthermore results from different calculation methods (hand calculations and computer calculations) will be compared to see how they differ.The goal with this is to go through the parts of Eurocode dealing with shear force and that this will lead to a clear review of these. You should also be able to see how results and the calculation procedure differ between different calculation methods.

<- Föregående sida 6 Nästa sida ->