Sökresultat:
725 Uppsatser om Pattern attack - Sida 3 av 49
Windbelt
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Det delade klassrummet : Det sociala rummets betydelse för särskiljande
We have, after three years of studying at Södertörns University Collage, experienced that there is great division in the classroom between students of foreign origin and ethnically Swedish students. How the students choose to place themselves in the classroom form a pattern on the basis of students? outer shells. The aim of this study is to understand what impact the student?s social orders has on the position they choose in the classroom.
Operatörsoberoende SMS-leverans med designmönstret Bridge
When different type of programs are developed one wants to make these
adjustable to future changes and requirements. It must be done a good design of
the program from the beginning to make it possible to continue development of
it without having to redo big parts of it to high costs. In the area of object
orientation there are design pattern, which can be used to design systems that
can be adjusted to new changes in an easier way. I have in this thesis chosen
to take a closer look at how to design a program that sends SMS to cell phones
through a system of an operator. One requirement on the program is that it has
to be possible to change what operator to send though in an easy way.
Analys av säkerheten av RFID i inpasseringssystem
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Testprogram till hårdvara på en viktindikator
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Skammens Kompass : Skam - Social förmåga - Personlighet
Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).
Skammens Kompass : Skam - Social förmåga - Personlighet
Affektens händelseförlopp är automatisk och är den biologiska delen av en känsla, som till exempel rädsla och skam. De positiva affekterna innehåller ett metabudskap av ?fortsätt?, de negativa affekterna ett metabudskap av att ?ändra på någonting?. Affekten skam sätter igång olika försvarsmekanismer, som är till för att reducera denna negativa kraft. De försvarsmekanismer som studien diskuterar är Nathanson´s teoretiska konstruktion som konceptuellt kan liknas vid en kompass (the Compass of Shame).
Tuftade ljudabsorbenter ? väggpaneler för rumsliga och akustiska egenskaper
It is a well-known fact that textiles and carpets have benign sound-absorbing properties. It is desirable to have quantified values of these properties ? especially for architects and interior designers. They often need to be able to giveaccount for the acoustic properties of their designs at a relatively early stage and sometimes have strict acoustic classifications imposed upon them by their contractor. A product with documented acoustic properties would aid when prescribing interior elements.The purpose of this thesis is to develop a wall-mounted panel in hand-tufted material ? aesthetically pleasing and versatile but also having documented and quantified acoustic properties.
Lyftkraftsberäkning för vingprofiler: Virvelpanelmetoden
The problem presented in this report is that of finding a method to calculate the lift force from a single-element airfoil of arbitrary shape. A number of restrictions are used in order to simplify calculations while retaining reasonable accuracy. The problem is solved for the two-dimensional case only and no finite-wing effects are taken into account. Furthermore, inviscid and incompressible flow is assumed. The method used to solve the problem is the vortex panel method, with vortex singularities distributed over simplified airfoil geometry.
Operatörsoberoende SMS-leverans med designmönstret Bridge
When different type of programs are developed one wants to make these adjustable to future changes and requirements. It must be done a good design of the program from the beginning to make it possible to continue development of it without having to redo big parts of it to high costs. In the area of object orientation there are design pattern, which can be used to design systems that can be adjusted to new changes in an easier way. I have in this thesis chosen to take a closer look at how to design a program that sends SMS to cell phones through a system of an operator. One requirement on the program is that it has to be possible to change what operator to send though in an easy way.
Omega System Kalibrering: Strål X-Separation mätning och kalibrering
Micronic Laser Systems AB produces and develops machines for the photo mask production market. One of their products is the Omega machine which exposes photo masks using 5 laser beams simultaneously. It is important that the distance between the each laser beam, the x-separation, is the same. The x-separation is today measured by exposing a photo mask with a certain pattern and thereafter measured with a metrology system. This takes to much time and it is desired to find a faster method to measure the x-separation without loosing precision.The task for this master thesis is to improve an existing measurement method which uses a calibration mask.
Utrikespolitik och krig : En fallstudie om USA:s invasion av Irak utifrån neoklassisk realism
In this essay i argue that there are three different variables that may be able to control the outcome of certain foreign policy choices. These three variables are External Threats, government division and public opinion. The Essay also tries to identify former president Bush motives behind the 2003 Iraqi War. It is partly argued that the three variables had a certain amount of influence on Bush decision making process. But the main focus lies on the motives behind the attack.
Påverkar suggors grymtande under digivningen smågrisarnas tillväxt? :
The pig is unique in the way that it gives birth to a large number of newborns in
each litter. Because of this the sow has developed a special behaviour during
suckling to ensure that not only a part of the litter gets all the milk. Milk is only
available during milk letdown. The piglets have to massage the udder for a long
time before letdown and the more piglets at the udder the sooner the milk comes.
The sow has developed a special grunting pattern to let the piglets know when she
is ready for suckling and to signal milk letdown.
Our aim with this study was to investigate if sows have individual grunting
patterns repeated over time. We also wanted to know if sows with a more distinct
grunting pattern have better growth in their litters.
Pearl Harbor, 1941 : En teoriprövande fallstudie av Japans flygstridskrafter under anfallet mot Pearl Harbor
Den 7 december 1941 genomförde japanska flygstridskrafter ett massivt bombanfall mot Pearl Harbor. Intentionen med anfallet var att slå ut den amerikanska Stillahavsflottan och därmed erhålla större inflytanade i Stillahavsområdet. Anfallen riktades huvudsakligen mot amerikanska fartyg som låg vid Pearl Harbors hamn men även flygfält i dess närområde drabbades hårt av den japanska offensiven.Syftet med detta arbete är att, med utgångpunkt från John. A Warden III centrala teorier; tyngdpunkter, fienden som ett system och parallell attack, analysera Japans agerande under attacken mot Pearl Harbor för att därigenom urskilja i vilken utsträckning dessa teorier kan tillämpas på de japanska flygstridskrafterna vid anfallet. Undersökningen syftar även till att utröna om de utvalda teorierna är applicerbara på taktisk nivå.
Modellering av delvis kända objekt med hjälp av bilder
Today many different types of lock systems are used all over the world. Passwords, finger prints and magnetic strips are a few examples. When the key is a three dimensional object, lika a physical metal key, the security depends, in a high degree, on that you can?t copy the object without access to it. One approach to copying the object is photographing the object, and from these photographs create a copy.