Sök:

Sökresultat:

2190 Uppsatser om Stealth technology - Sida 16 av 146

Teknologi, Pedagogik och Ämne : En policystudie om hur nationella mål för IT i skolan transformeras till kommunala IT-strategier

Today there is a large consensus about the importance of Swedish schools providingconditions enabling students to develop the ability to manage and learn through information technologies (IT). The goal of this study was to describe and examine how national education goals for the use of IT transformed into municipal IT-strategies for the school. A content analysis was conducted of thirty-eight municipal IT-strategies collected from Swedish municipal websites on the Internet. The content in the municipal IT-strategies was compared with the content in both the Swedish education act and the national curriculum. The results showed that the content in the Swedish education act and the national curriculum in fact was translated into municipal IT strategies, but that the range of strategies concerning technology, pedagogy and content in relation to IT was broad.

System med "Pop-up"-munstycken för helikopterplattform på korvett.

Denna slutrapport är resultatet av ett samarbete mellan Kockums AB / Karlskronavarvet och Blekinge Tekniska Högskola (Institutionen för maskinteknik). Det av Kockums initierade projektet har benämnts till ?System med ?Pop-up?-munstycken för helikopterplattform på korvett?. Uppdraget har bestått i att utprova och verifiera ett befintligt munstycke, vars primära funktion är släckning av petroliumbränder (helikopterolycka) på ett stelthfartygs helikopterplattform. Munstyckets sekundära funktion består i att vattenbegjuta (sk. wash-down) stelthfartyget, för att minska dess IR-signatur och för användning vid NBC-sanering (Nuclear, Biological and Chemical).

Lean Sex Sigma hos Sandvik Materials Technology

Bakgrunden till examensarbetet är att det existerar ett behov inom Sandvik Materials Technology att komma tillrätta med problemen avseende dålig leveransprecision och antalet reklamationer genom ett förbättringsprogram som kan angripa alla bekymren inom företaget. Företaget har i dagsläget inlett ett internt förbättringsprogram kallat Lyftet Ledtid, med övergripande syfte att sänka ledtiderna i processerna för att minska kapitalbindningen samt uppnå bättre kvalitet. Andra företag har implementerat förbättringsprogrammet Sex Sigma och en undersökning av dess lämplighet för Sandvik Materials Technology bör ske. Arbetet syftar till att undersöka förbättringsprogrammet Sex Sigmas utrymme inom det interna förbättringsprogrammet Lyftet Ledtid. Det bör även ange hur en eventuell implementering kan ske.

Överföring av och beräkning med timmätta värden ? från MT2000 till Xpower

New technology makes it possible to remotely measure all consumers in a power network onan hourly basis and store the values in a database.This thesis work describes the conversion process between automatic meter reading systemMActor and calculation software Xpower.Then the possible differences between calculations of power networks using load curves incombination with a yearly estimate of consumption and calculations using hourly measuredvalues is examined.The result of the comparison shows that, for the power network under inspection, nosignificant difference could be noticed. This does not mean that calculations using hourlymeasured values would be unnecessary. I believe that in a near future calculations using hourmeasurements will be the primary choice for many power companies to whom technology isavailable.Also some basic calculations of fundamental power network parameters, such as power factorand loses, are presented using hourly measured distribution transformers in combinations withits hourly measured loads.The report is written in Swedish.

Virtuell community i mobilen - Kriterier som ligger till grund för en framgångsrik virtuell community i mobilen

Sociala nätverk tar stor plats på Internet genom virtuella communities. Användare har en större möjlighet att nå dem via mobila lösningar och därmed göra dem till mobila communities. Kriterierna som ligger till grund för framgång för virtuella communitiesvill vi applicera på mobila communities. För att undersöka dessa kriterier, och bakomliggande faktorer, har vi valt att titta på ?tidigt bruk? användning av en mobil community, Facebooks mobila portal med hjälp av Technology Acceptance Model (TAM).

Skillnader mellan uppkopplad och uppkopplad : En jämförelsestudie mellan 1960- och 1990-talister

This paper aims to examine whether there are any substantial differences between a generation of users born during the 1960?s and younger generation born during the 1990?s regarding the use of digital technologies connected to the Internet. Based on Marc Prensky?s theories on people born before and after 1980 saying those born before are not as natural when it comes to using digital technologies. We used diaries as a qualitative method to gather data from 16 respondents.

Förbränningslära för bubblandefluidbädd

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Låt den rätte komma in - En studie om valet av vd i entreprenörsföretag

Entrepreneurship is said to be the missing link between knowledge and growth in the Swedish economy. New ventures run a high risk of failing and this holds true especially for technology ventures. Since company leaders have proven to exert an influence on organisations' survival possibilities, the selection of an appropriate CEO is important. The purpose of this study is to describe the importance of the CEO for ventures as well as to explain how knowledge and experience affect the opinion of who should be CEO. Using a qualitative case study research design including three life science companies, we show that there are three main factors crucial when selecting a CEO.

?Bring your own device? i svenska företag och organisationer

Most companies and organizations today depend on technology connected to the Internet. Schools and offices have therefore been providing computers, phones and other technology to the employees. The recent technological development and decline in prices for technology have contributed to making these products a part of everyday life for most people. This has made it very common for employees and students to bring their own devices into school and workplaces.The aim of this study is to define what "Bring your own device" means for Swedish companies and organizations and how it has been implemented in those. The aim is not mainly to generalize to all Swedish companies but create an understanding how the trend is used to provide a basis for continued research in this area.

SMS för personer med kognitiva och kommunikativa funktionsnedsättningar ? en intervjustudie av användares upplevelser

Current technology offers many possibilities for remotecommunication. Nevertheless, people with cognitive and communicativedisabilities have limited access to common communication technology like textmessaging via a mobile phone. This study is part of the project Text messagingwith picture symbols - a possibility for AAC users and people with cognitiveimpairments. Semi structured interviews were used to investigate three menand four women?s experiences of using Windows mobiles with adaptedfunctions for text messaging.

Det virtuella kontoret : En litteraturstudie i möjligheter och utmaningar med att använda 3D kollaborativa virtuella miljöer inom distribuerad systemutveckling

Distributed system development is a common occurrence in today?s technological and global world. Because the consequences of its geographically distributed nature it creates barriers between people that affects their communication and collaboration efforts in the distributed context. Despite a lot of technological breakthroughs over the last decades and the occurrence of video-conference applications and other tools for communication and collaboration, cultural and geographical issues have so far not yet been completely resolved. In this study I have made a literature study over distributed system development to form a set of central factors that affects the distributed development process.

Windbelt

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Analys av säkerheten av RFID i inpasseringssystem

Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report,  the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.

Aktiv bullerdämpning i ventilationssystem

Active headsets have been on the market for years and now it is time for something else to enter the stage. The technology of active noise reduction can for exmple also be used in ventilation systems for reducing ventilation noise. An active control system principally consists of four important components, namely the downstream error microphone, the upstream detection or reference microphone, the digital signal processor (DSP) and a loudspeaker. The upstream reference microphone listen to the primary ventilation noise and sends it to the DSP which makes a phase shift to the signal and sends it to the loudspeaker. The loudspeaker sends out the opposite waveform of the incoming one and reduce the primary ventilation noise.

Jämförelse av tjänstgöringsbestämmelser i BCL-D och EU-OPS : En fallstudie för West Air Sweden

För ett flygbolag är det viktigt att ha en effektiv planering av sina resurser. Att kunna utnyttja personal och flygplan på rätt sätt är en förutsättning för en fortsatt överlevnad på marknaden. Flygbolagens tjänstebestämmelser regleras idag enligt nuvarande BCL-D 1.15. Under våren 2004 har Luftfartsverket behandlat en remiss som utgör ett förslag på en eventuell förändring av dessa tjänstebestämmelser. Remissen är ett förslag som skall gälla det gemensamma regelverket EU-OPS.

<- Föregående sida 16 Nästa sida ->