
Sökresultat:
521 Uppsatser om Networks - Sida 12 av 35
Inlärning i Emotional Behavior Networks : Online Unsupervised Reinforcement Learning i kontinuerliga domäner
The largest project at the AICG lab at Linköping University, Cognitive models for virtual characters, focuses on creating an agent architecture for intelligent, virtual characters. The goal is to create an agent that acts naturally and gives a realistic user experience. The purpose of this thesis is to develop and implement an appropriate learning model that fits the existing agent architecture using an agile project methodology. The model developed can be seen as an online unsupervised reinforcement learning model that enhances experiences through reward. The model is based on Maes model where new effects are created depending on whether the agent is fulfilling its goals or not.The model we have developed is based on constant monitoring of the system.
Webb-tv ? en konkurrent eller ett komplement till linjär tv? : En studie av hur SVT och TV4 ser på sin webb-tv
The linear televison have dominated the supply of moving pictures, but this is about to change with the possibility to consume it via the Internet.I n this thesis we have studied how the two Swedish tv-network companies, SVT and TV4 are working with their web TV and if their online services have affected the linear TV. To limit the size of the study we chose two network companies that provide the most popular tv channels and web services in Sweden. To gather data from these two companies we conducted qualitative interviews with people at the Networks. We came to the conclusion that SVT and TV4 doesn't find that their web TV services (called SVT Play and TV4 Play) are competing with the linear TV. They rather regard them as assets to broaden their services.
Pamiro
This report describes the work with creating a CMS (Content Manager System). A
CMS is a
web tool so you easy can publish materials on your web page. With a CM Scan you
can
without any knowledge of programming web pages create and maintain a web page.
This
will result in that you and your organisation save time and money. You can also
split the responsibility
for the webpage in different roles, but still keep the control.
We have chosen to create our CMS in a script language called php4 and with the
database
server MySQL, we have also used JavaScript a lot.
Going Real-Time in no time? : ? en kvantitativ och kvalitativ studie i hur Sveriges största annonsörer använder sociala medier och Real-Time Marketing.
Background: Our daily lives and personal interactions are increasingly featuring social media and social Networks in particular. Topics regarding social media, its impact on society at large ? both on corporate as well as individual behavior ? has been the focus of many research papers. Personal use of social Networks are regularly being mapped out by researchers aiming at clarifying concepts such as engagement, trust and interactivity, and mapped by companies seeking to maximize return on investment concerning their marketing efforts. The aim of our study is (i) to map how companies and/or organizations operating on the Swedish market use their company?s pages on the social media as a way of communicating with their followers and audience, as well as (ii) identifying whether ?Real-Time Marketing?, in our own definition, is used or not.Methods: The research methods used included both quantitative and qualitative content analysis.
Elektroniska signaturer- säker identifiering?
Problem:I dag finns det ett stort behov av säkra identifierings metoder på
Internet. Traditionellt sätt är en handskriven namnteckning en form av
identifiering och vad som behövs är en elektronisk motsvarighet.
Hypotes: "Elektroniska signaturer leder till ökad integritet och säkerhet vid
identifiering på Internet"
Syfte: Målet och syftet med denna uppsats är att studera och analysera huruvida
elektroniska signaturer kommer att bidra till ökad integritet och säkerhet vid
identifiering på Internet.
Slutsats:Genom att jämföra praktiska erfarenheter (fallstudie) och
teoretiska kriterier kunde vi analysera oss fram till att vår hypotes är sann.
Hur hanterar institutioner en miljö med blandade Operativsystem?
The purpose of this thesis is to investigate if there are environments that use
some kind of central authentication system within institutions/schools. The
hypothesis is that an institution not using a form of central authentication
service has more need for maintenance and as such is considered a higher cost
for the organization.
The gathering of data has been done through interviews with technical personal
at Blekinge Tekniska Högskola and Linköpings Universitet. Based on the
technical background of the authors, and the system limited to discussing
Windows and UNIX operating systems, a discussion and analysis of the systems
working today has been done, with emphasize on the hypothesis..
Scalable Services over DAB and DVB-T from a Receiver Point of View
TV and radio services have always been distributed over analogue broadcasting Networks and been received on a TV -set or a radio receiver. Today this situation is changing due to digitalization and convergence between broadcasting, telecommunications and data communications. Other terminals, such as a PC, can also receive TV and radio services. Digital TV and radio can offer additional services such as e-commerce, electronic program guides and content synchronized to the TV and radio shows. If these services are to be received by several receiving terminals with different properties, the services must be adapted to the terminals.
Framtidsvisioner i sex mellanstora svenska kommuner
Denna uppsats belyser vilka frågor som lyftes fram för några kommuners framtidsarbete, vilka aktörerna var i de policyskapande processerna samt visar varför dessa framtidsvisioner fördes upp på dagordningen på 1990-talet. Metoden för studien är en jämförande, kvalitativ fåfallsstudie av kommunernas framtidsprogram. De utvalda kommunerna är Gävle, Halmstad, Karlskrona, Karlstad, Kristianstad och Luleå. Uppsatsens analysbegrepp är Policy Windows och Policy Networks. Dessa innefattas i en korporativ och elitistisk statsteori.
Så designar du användarvänliga interna kommunikationsnätverk
Companys usually have intern communication platforms where employees can gather information and communicate with eachother. These Networks are not public which leads to less resources spent on development. If this network is also used as a work tool may inadequate usability decrease work effeciency. Thats why we, by using known design principles, evaluated an already existing network of this kind along with interviews and think out loud tasks for users. Four users had to do some tasks while they explained how they went through step by step to solve those. This report culminates into a couple of guidelines which can be used to create a user friendly network. The problems that prevented users to feel in control when working resulted in the following guidelines: Create shortcuts of frequently used functions.
CU2 - Design av ett PDA-baserat diskussionverktyg med ljud/bildkommunikation
I detta arbete framlägger vi ett designförslag på hur ett diskussionsverktyg
som stödjer ljud- och bildkommunikation kan se ut. Ett förslag som förbättrar
och förenklar den distanskommunikation som idag sker med hjälp av
mobiltelefoner, videokonferenssystem samt webbkameror anslutna till
persondatorer. Den design vi föreslår möjliggör för mobila användare att
visuellt föra flerpartssamtal med hjälp av PDA:er. Vårt designförslag har fått
arbetsnamnet CU2 (see you too) och är tänkt att fungera i tredje och/eller
fjärde generationens mobila nät.
Vi har valt att genomföra vårt magisterarbete på företaget A Brand New World i
Kista, Stockholm. Företaget utvecklar och säljer system inom mobilt Internet..
"Follow me, and I follow back" : En kvalitativ studie om unga killars upplevelser av sin twitteranvändning
Online social Networks are a natural part of the lives of today?s western youth. Media and information literacy is a central part of research in Library and Information science and until now there has always been more focus on these subjects in a learning context rather than in an every day life context.The aim of this study is to further examine how adolescent boys value and trust the information they receive via Twitter in their personal lives, and how this effects their view of their environment. The study was done with a qualitative method, where we conducted interviews with six boys who were all born in 1997. The results showed that they knew how to react critically to information on Twitter.
67,44 miljoner skäl till demokrati : En studie av processerna i EU-finansierade projekt
In a global context the traditional democratic process is facing new challenges. Scholars are talking about a transition from government to governance, where local and regional Networks as well as international collaboration are an important part in how regional policy is produced and implemented. In this paper the processes in regional projects funded by the European Union are considered, and related to the traditional democratic process. The study has been fulfilled through informant interviews with representatives from four EU-projects. The interviews are supplemented by a qualitative text analysis of current statutes.
Bibliometrisk kartläggning av det idrottspsykologiska fältet
Objectives: The aim in this thesis has been to generate information relevant for strategic positioning and future evaluations within the scientific field of sport and exercise psychology. This has been done by request, and in collaboration with The Group of Sport and Exercise Psychology at the Institution of Psychology at the University of Umeå.Research questions: (1) How does the cognitive structure within the field of sport and exercise psychology take shape with respect to research topics in current sport-psychological research, i.e. the research front? (2) How does the social structure within the field of sport and exercise psychology take shape with respect to formal scientific collaboration?Data: 879 articles published between 2008-2011 were used in this study. The population of articles were collected from a set of 5 core journals: International Journal of Sport Psychology, Journal of Applied Sport Psychology, Journal of Sport and Exercise Psychology, The Sport Psychologist, Psychology of Sport and Exercise.
Bloggbilder : unga tjejers syn på foto på nätet
Blogpics ? young girls views on photography online Young people create new forms of social interaction on the internet, and in Sweden, especially young girls, have become very active bloggers. Girls write, publish pictures and build Networks with, mostly, other girls. This new phenonomen has been described in Swedish media partly as a problem, where adults are worried that the information the young girls publish about themselves is too personal, and can be used for the wrong purposes. It has also been suggested that the content of young girls blogs has little value, beeing mostly narcissitic, superficial and obsessed with fashion and shopping. The purpose of this paper has been to investigate how young girls reflect upon their photographic communication on the internet. The idea has been to ask the girls themselves about their own experiences, to get a more complete picture of them as internet users, to investigate their communication strategies and solutions when it comes to net integrity and to talk about how they create gender and identity online..
Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup
Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks..