Sökresultat:
2444 Uppsatser om Single frequency network - Sida 23 av 163
Kan behandling av insomni förbättra komorbid ångest och depression?
This study investigated the efficacy of a multicomponent cognitive?behavioral intervention of insomnia, CBT-I, for patients suffering from an anxiety disorder and/or a major depressive episode together with comorbid insomnia. In particular, the aim of the study was to evaluate whether anxiety and depressive symptoms declined as a function oftreatment for insomnia. After rigorous diagnostic procedures, 8 patients were treated in a multiple baseline design. Patients experienced clinically significant reductions in insomnia-, (57 %) depressive- (75 %) and anxiety symptoms (40 %).
Förekomst av törskate (Cronartium flaccidum, Peridermium pini) på tall (Pinus sylvestris) i relation till markfuktighet och fältskikt : en studie om 2000-talets törskateepidemi i norra Sverige
Resin-top disease is a rust fungi that occurs both as a host alternating form, Cronartium flaccidum G. Winter., and as a non-host alternating form, Peridermium pini Pers. The host alternating form can use a variety of hosts but the most commonly used species in the boreal forest is Melampyrum sylvaticum. In Scandinavia the Resin-top disease infect Scots pine, Pinus sylvestris L. The fungus infects the needles through the stomata and then grows through the branch to the stem where it strangulates the vessels transporting water and nutrition to the treetop, which kills the top.
Testramverk för distribuerade system
When developing software that is meant to be distributed over several different computers and several different networks while still working together against a common goal there is a challenge in testing how updates within a single component will affect the system as a whole. Even if the performance of that specific component increases that is no guarantee for the increased performance of the entire system. Traditional methods of testing software becomes both hard and tedious when several different machines has to be involved for a single test and all of those machines has to be synchronized as well.This thesis has resulted in an exemplary application suite for testing distributed software. The thesis describes the method used for implementation as well as a description of the actual application suite that was developed. During the development several important factors and improvements for such a system was identified, which are described at the end of the thesis even though some of them never made it into the actual implementation.
Allt löser sig, bara vi finns på Facebook. : En kvantitativ studie om hur svenska Facebookanvändare i åldrarna 16-25 interagerar med företag på den sociala nätverkssajten.
Because social media is personal and reaches users directly, it has become an important means of communication for companies trying to reach out to their audience (Nygren & Wadbring, 2013). Especially the possibility of interactivity has been discussed as social media's big advantage. But how much two-way communication is actually possible on social media? This is a quantitative study that focuses on how Swedish Facebook users in the ages of 16-25 interact with companies on the social network. The aim was to contribute with increased information and knowledge about how the users mentioned above interact with the companies as well as how the users perceive the companies communication and presence on Facebook.
Nätverk i nätverk : en nätverksansats i den nya ekonomin
Society and technology develop together in interaction processes. Because of the development of information technology, the Industrial society has been left behind in favor of a society where information is the key production factor, i.e. the Information society. In the Information society, social functions and processes are organized in networks. These networks integrate geographically separate markets to parts of a complex global economic system.
Implementing a receiver in a fast data transfer system : A feasibility study
This report is an outcome of a master degree project at Linköpings University in co-operation with Micronic Laser Systems AB. The purpose with this master degree project was to investigate how to implement a receiver in a data transfer system. The system consists of several data channels, where every channel consists of three parts: driver, transmission lines and receiver. The driver send low amplitude differential signals via the transmission lines to the receiver that amplifies and converts it to a single-ended signal. The receiver has to be fast and be able to feed an output signal with high voltage swing.
Wildlife Detection Network
Traffic accidents where wild animals are involved represents between 60 and 80 percent of all reported accidents, depending on location in Sweden. In a country like Sweden, with a lot of forest, there is always risk of a collision with a wild animal. Imagine if you, as a road user, had the possibility to receive warnings when the risk of an accident according to statistics is extra high.Wildlife Detection Network is a wildlife warning system with an information service, which makes the whole concept unique. When an animal is approaching the road, it is registered by sensors, and warning lights along the road are lit to inform drivers of the potential danger. In conclusion, this is a direct warning to all drivers on the road where the system is placed.When an animal is registered by the sensors, information containing time, date, weather circumstances and coordinates are sent to a database.
Jämförelse av nätverksfilsystemsprotokoll i Windowsmiljö
Detta arbete handlar om nätverksfilsystemsprotokollen SMB/CIFS, SMB2 och NFSv3. Arbetet baseras på artikeln ?A New Network File System is Born: Comparison of SMB2, CIFS, and NFS? som skrivits av Steven M. French på IBM, Samba Team. I den artikeln saknas det prestandatester och därför känns det relevant att göra prestandatester för att få fram vilket protokoll som har högst hastighet med olika filstorlekar i Windowsmiljö.
Samverkan i BoDa-enheter : En kvalitativ studie kring personer med funktionsnedsättning
Title: Collaboration in BoDa-units. A qualitative study about collaboration regarding people with disabilities. The purpose of this thesis was to internally examine the cooperation between different professions in municipal BoDa-units. By doing a qualitative study using focus-group-interviews in three municipalities, we were able to examine the personnel?s experience of cooperation issues and opportunities in BoDa-units.
"Det är ett kluvet grattis!": en studie om unga mammors föräldraskap ur professionellas perspektiv.
The purpose of this study was to examine parenthood of young mothers from a professional point of view. The professionals work in a medium-sized city in Sweden and they represent different professions to give a broad perspective of the subject. The questions in the study were: What were the advantages of being a young mother of today and were there any problems with being a young mother, from the professionals perspective? What role did young mothers network and family play, from a professional point of view? From a professional point of view, how well did society handle young parenthood? How do the professionals handle the young mothers they met? Studies with reference to professionals' thoughts and expectations of young mothers were few, therefore the professionals were given a central position in this study. A qualitative method was chosen, for this study.
Computer Network Attack som olovligt våld : en fråga om association, effekt, aktör och mål
I Estland 2007 utbröt vad som kommit att kallas ?Cyberwar I?, vari ett stort antal centrala myndigheters, tillika finansiella institutioners servrar attackerades av massiva så kallade Computer Network Attacks (CNA), utfört av framförallt ryska aktörer. Estland protesterade högljutt, men frågan huruvida CNA är att beteckna som olovligt är allt annat än klar. Prövningen sker mot den folkrättsliga regimen Jus ad Bellum, och huruvida metoden uppfyller vissa centrala begrepp. Men hur skall denna regim appliceras CNA?De frågeställningar som avses besvaras är: hur kan CNA utgöra våld eller hot om våld i enlighet med FN-stadgans artikel 2(4) samt hur kan CNA utgöra väpnat angrepp i enlighet med FN-stadgans artikel 51? Detta avses göras genom en studie inbegripande flertalet folkrättsliga experters teorier på området CNA och våldsanvändning, samt applicering av desamma på en fallstudie av händelserna i Estland 2007.Sammanfattningsvis konstateras att flertalet variabler har bärighet i hur CNA kan uppfylla artiklarnas centrala begrepp, vari frågan om association, effekt, aktör och mål tydligast faller ut.
Kontorsanställdas psykiska välmående i relation till deras fysiska aktivitetsnivå
Background: There have been doping usage as far back as as ancient Greece and around the early 1900s started the doping we have today. In 2008 it was 22,000 men aged 15-54 years old who had any kind of experience with doping in Sweden. The problem of doping use are all over the world and to overcome this problem, we need to work across borders.Objectives: The purpose of this study is to investigate whether there is any connection between the use of supplements and attitude to doping. The study is based on the questions: is there any connection between the use of supplements and positive attitude to doping? is there any connection between the use of supplements/doping substances and high training frequency? and is there different use of supplement/doping substances between girls and boys?Method: A survey in form of a cross-sectional study and a waiting room survey was conducted with 63 respondents of whom 57,1% were women.
Ipad som pedagogiskt verktyg i förskolan : En studie om pedagogers och förskolebarns syn på ipad i verksamheten
I dagens samhälle har många kundföretag problem med datalagringen vilket beror på att behovet av att lagra data började öka kraftigt under 2000-talet och har fortsatt öka sedan dess. När kundföretagen började använda sig av virtualisering så expanderade även datastorleken. I samband med att datastorleken växte ville företagen att data inte skulle lagras lokalt utan att den skulle vara lagrad på en central plats som en serverhall och vara överskådlig.Studien utfördes på tre sätt, först undersöktes vilka datalagringslösningar som fanns och det skedde genom litteraturstudier. Därefter kontaktades företag som använde olika lösningar för datalagring. Nästa steg var att kontakta de leverantörer som kundföretag använde sig av och som levererade lösningarna.Under arbetets gång upptäcktes olika lösningar på problematiken med ett ökat datalagringsbehov.
Spöa, sparka, slå och strypa: Kriminellas våldsattityder avslöjas med implicita mätningar
Attitudes towards violence were assessed using both implicit (The Single Category Implicit Association Test; Karpinski & Steinman, 2006) and explicit measurements (a Feeling Thermometer). A group of criminals showed more positive explicit and implicit attitudes towards violence than a group of non-criminals. In addition, The Aggression Questionnaire (Buss & Perry, 1992) revealed significant differences in aggression between the groups; criminals' mean scores were higher on all four subscales (physical aggression, verbal aggression, anger and hostility). Furthermore, significant correlations were found between all the measures, including the implicit and explicit attitude measures. The findings support the validity of the SC-IAT as an implicit measure of violent attitudes.
IT-relaterade hot - professionella IT-tjänstemäns farhågor och möjligheter
The objective of this thesis was firstly to examine the possibilities of creating a universal tool for evaluating IT-security. When all the material was gathered we saw that we had strayed away from our subject and that our focus was on IT-threats and IT-professionals apprehensions and possibilities on the subject. The purpose of this thesis was there after to find and identify threats and counter measures in publications and later discuss these with IT-professionals. We found and identified several threats that the professionals encountered in their work. These threats ranged from techniques used by hackers to threats that can arise when the users on the network are poorly educated.