Sökresultat:
2518 Uppsatser om Sound technology - Sida 27 av 168
Skillnader mellan uppkopplad och uppkopplad : En jämförelsestudie mellan 1960- och 1990-talister
This paper aims to examine whether there are any substantial differences between a generation of users born during the 1960?s and younger generation born during the 1990?s regarding the use of digital technologies connected to the Internet. Based on Marc Prensky?s theories on people born before and after 1980 saying those born before are not as natural when it comes to using digital technologies. We used diaries as a qualitative method to gather data from 16 respondents.
Förbränningslära för bubblandefluidbädd
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Låt den rätte komma in - En studie om valet av vd i entreprenörsföretag
Entrepreneurship is said to be the missing link between knowledge and growth in the Swedish economy. New ventures run a high risk of failing and this holds true especially for technology ventures. Since company leaders have proven to exert an influence on organisations' survival possibilities, the selection of an appropriate CEO is important. The purpose of this study is to describe the importance of the CEO for ventures as well as to explain how knowledge and experience affect the opinion of who should be CEO. Using a qualitative case study research design including three life science companies, we show that there are three main factors crucial when selecting a CEO.
?Bring your own device? i svenska företag och organisationer
Most companies and organizations today depend on technology connected to the Internet. Schools and offices have therefore been providing computers, phones and other technology to the employees. The recent technological development and decline in prices for technology have contributed to making these products a part of everyday life for most people. This has made it very common for employees and students to bring their own devices into school and workplaces.The aim of this study is to define what "Bring your own device" means for Swedish companies and organizations and how it has been implemented in those. The aim is not mainly to generalize to all Swedish companies but create an understanding how the trend is used to provide a basis for continued research in this area.
SMS för personer med kognitiva och kommunikativa funktionsnedsättningar ? en intervjustudie av användares upplevelser
Current technology offers many possibilities for remotecommunication. Nevertheless, people with cognitive and communicativedisabilities have limited access to common communication technology like textmessaging via a mobile phone. This study is part of the project Text messagingwith picture symbols - a possibility for AAC users and people with cognitiveimpairments. Semi structured interviews were used to investigate three menand four women?s experiences of using Windows mobiles with adaptedfunctions for text messaging.
Det virtuella kontoret : En litteraturstudie i möjligheter och utmaningar med att använda 3D kollaborativa virtuella miljöer inom distribuerad systemutveckling
Distributed system development is a common occurrence in today?s technological and global world. Because the consequences of its geographically distributed nature it creates barriers between people that affects their communication and collaboration efforts in the distributed context. Despite a lot of technological breakthroughs over the last decades and the occurrence of video-conference applications and other tools for communication and collaboration, cultural and geographical issues have so far not yet been completely resolved. In this study I have made a literature study over distributed system development to form a set of central factors that affects the distributed development process.
Windbelt
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Implementering av 1D-DCT
IDCT (Inverse Discrete Cosine Transform) is a common algorithm being used with image and sound decompression. The algorithm is a Fourier related transform which can occur in many different types like, one-dimensional, two-dimensional, three-dimensional and many more.The goal with this thesis is to create a fast and low effect version of two-dimensional IDCT algorithm, where techniques as multiple-constant multiplication and subexpression sharing plus bit-serial and bit-parallel arithmetic are used.The result is a hardware implementation with power consumption at 19,56 mW..
Analys av säkerheten av RFID i inpasseringssystem
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Jämförelse av tjänstgöringsbestämmelser i BCL-D och EU-OPS : En fallstudie för West Air Sweden
För ett flygbolag är det viktigt att ha en effektiv planering av sina resurser. Att kunna utnyttja personal och flygplan på rätt sätt är en förutsättning för en fortsatt överlevnad på marknaden. Flygbolagens tjänstebestämmelser regleras idag enligt nuvarande BCL-D 1.15. Under våren 2004 har Luftfartsverket behandlat en remiss som utgör ett förslag på en eventuell förändring av dessa tjänstebestämmelser. Remissen är ett förslag som skall gälla det gemensamma regelverket EU-OPS.
Design och medveten närvaro : Ljusets förmåga till stressreducering och uppmuntran till medveten närvaro i förskolan.
The Swedish social insurance agency provides financial support for families and children, but also for people with work injury, illness and at old age. During 2012 they saw the amount of notifications of insurance increasing in Sweden, which is a development that cost our society a great deal of money. With the aim to pursue a sustainable development I have therefore devoted this project to wellness and stress management within preschool.The employees of preschool are often dealing with a lot of stress, due to the big groups of children that causes high noise and sound levels. The high noise and sound levels is a contributor to stress which additionally can damage the health and cause impaired hearing loss. About half of the people around their forties until the age of retirement have difficulties understanding speech in large groups.The purpose of this project has been to investigate the causes of negative stress for my target group, women between 30-60 years old who works in preschool.
Utvecklingen av mekatronikämnet på KTH : ? anställningsbarhet, forskning och innovation
This thesis examines history of the subject of mechatronics and innovation. The main reason tostudy mechatronics from a historical point of view is that it has never been done to a greater extent before. An overview is justified because various definitions have been used over the decades, but nowadays the subject has become more established. Focus in this thesis is mainly on development of the subject of mechatronics at Royal Institute of Technology in Stockholm. Innovation is the other aspect of this thesis.
Den Digitala teknikens påverkan på resebranschen och dess marknadsföring
The intention of this essay has been to investigate how the new digital technology has affected the tourism industry and marketing, as well as how travel agents and tour operators adapt to this. We also aimed to get a broader view of how the future might look like when it comes to marketing and virtual service landscapes. We decided to base our research according to these following four questions:? What affect travel agents? way of adoption to the technical development?? What purposes do the travel agents have for building up their virtual service landscape?? How much does the travel agents emphasize on digital marketing?? What can travel agents do to better adapt to the technological development in the future?We have chosen to use a qualitative research for this essay. The reason for choosing a qualitative research was to gain a wider understanding that would represent a big part of the changes of technology development.
Testprogram till hårdvara på en viktindikator
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Nätverk i nätverk : en nätverksansats i den nya ekonomin
Society and technology develop together in interaction processes. Because of the development of information technology, the Industrial society has been left behind in favor of a society where information is the key production factor, i.e. the Information society. In the Information society, social functions and processes are organized in networks. These networks integrate geographically separate markets to parts of a complex global economic system.