Sökresultat:
9072 Uppsatser om System identification - Sida 4 av 605
Designlösningar i ett affärssystem ur ett kognitionsvetenskapligt förhållningssätt
The purpose of this thesis was to examine if there where fallacies in the design solutions for the business system IFS Applications from a user perspective, and if so, correct these from a cognitive science approach.Data collection consisted of three main portions. These where; workshop, individual interviews and observations. The collected data was analyzed and resulted in identification of two main areas in the application that where found lacking.The result of the study showed that the usability for processing large amounts of data and the lack of customization where the main flaws in the application. Two low fidelity prototypes where created with the purpose of rectifying the underlying flawed design solutions that where identified from the collected data..
Förbränningslära för bubblandefluidbädd
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Windbelt
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Analys av säkerheten av RFID i inpasseringssystem
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Testprogram till hårdvara på en viktindikator
Radio Frequency Identification, RFID, is a convenient way to enable contactless identification which does not require any physical nor optical contact. As with any radio-based communication the signal can be intercepted, thus making the technology vulnerable to several kinds of attacks. Interception of communication is not the only threat. Since RFID tags might contain personal information or information that will grant the owner access to secure areas, skimming and spoofing attacks are also major threats against this technology. In this thesis report, the perspective of an adversary is portrayed in an RFID-enabled environment by presenting where RFID is used and how it could be abused.
Skanskas säkerhet på arbetsplatsen : Personlig skyddsutrustning
This degree projekt deals with Skanska´s safety at the construction site with focus on personal safety equipment. The purpose of this dissertation is to examine how the rules of personal safety equipment are applied and experienced at Skanska´s construction sites.In October 2004 Skanska started a projekt to make the construction sites more safe. With use of a questionnaire we have made a survey at different construction sites. 80 questionaires have been handed out to Skanska´s employees in the southeast region. While they were handed out we conrolled if the employees at Skanska´s construction sites used head protection, easy visible clothing, safety shoes and identification cards.The result of the survey shows how the rules are applied.
Gage R&R studie på mätutrustning för förpackningsavstånd
The aim of the thesis is to analyse and understand resolution, repeatability and reproducibility of the measurement system for package distance. The measurement system for package distance is already in use, no Gage R&R has been performed on the system and before spreading use of the system the quality of the system has to be understood and approved.
Bemanningskonsult idag - mittemellan två företag?
In the past decade there has been a considerable growth of contingent employment arrangements. In Sweden, the most common among these are the temporary-help service firms. The aim of this study is to investigate how the employees of temporary-help service firms experience their situation as employed by one company and working at another. We have used a qualitative approach to reach an increased understanding for the daily situation of the contingent worker. The essay is based on participant observations and semi-structured interviews with six contingent workers.
Säkrare träning med rätt redskap.Utveckling av avlastande redskap vid knäböj iSmithmaskin.
The purpose of this thesis was to examine if there where fallacies in the design solutions for the business system IFS Applications from a user perspective, and if so, correct these from a cognitive science approach.Data collection consisted of three main portions. These where; workshop, individual interviews and observations. The collected data was analyzed and resulted in identification of two main areas in the application that where found lacking.The result of the study showed that the usability for processing large amounts of data and the lack of customization where the main flaws in the application. Two low fidelity prototypes where created with the purpose of rectifying the underlying flawed design solutions that where identified from the collected data..
System Monitor : Ett felsökningssystem för Paperline
When an error occurs in an IT system that is vital for the production of a major industry, the consequences can be great. To quickly identify and correct errors is important as a stop in a system can lead to a break in production, which is costly for the industry. Our task in this thesis has been to develop a system for ÅF that facilitates the debugging process of the system Paperline. The system's target audience is ÅF-call personnel that provides support for Paperline 24 hours a day if something goes wrong. The system consists of a Windows service, a database and a web application and is developed mainly with the techniques C#.NET, MVC 5, Google Charts, Javascript, HTML, CSS, and Entity Framework.
Tolkningen av L-system i realtid på grafikkortet
Arbetet undersöker grafikkortets lämplighet att tolka L-system i realtid. L-system är ett strängomskrivningssystem som beskriver strukturen hos botaniska former. Lsystem tolkas med hjälp av sköldpaddstolkningen för att få en geometrisk tolkning. För att utvärdera om grafikkortet är lämpat att tolka L-system i realtid har två system implementerats. Det ena systemet tolkar L-system på processorn och det andra systemet tolkar L-system på grafikkortet.
Visualisering inom Operativt Inköp
Visualization plays a key role in the concept of Lean. Lean was developed in Japan as a business philosophy in order to lead to an activity, where only steps that contribute to customer value of the final product are being performed. By defining the customer value and establish visualized standards, it is possible to see when situations differ from the standard. Then it?s possible to lead the process back on track.
Inre motstånd : En okänd fiende på vägen tillbaka från utanförskapet?
Inner resistanceThe aim of this study was to investigate the existence of an internal resistance to a work-related change in people who are long-term sick, and if this is related to an identification as ?long-term sick?. A second purpose to the study was to research in which way this internal resistance to a work-related change manifests and point to possible solutions. A qualitative study was conducted with interviews of experts and people on sick leave to illuminate the subject. The main result was divided into interviewed groups.
Car Lock Improved by Configurable Key
When a car owner want to lock or unlock his or her car today, it?s preferable done by using aremote control. The system is really comfortable when the car owner is using the remote.A problem arises if a thief gets the remote.The thief doesn?t have to know where the car is parked, an approximate estimation where thecar is parked is enough.For instance, it?s enough to know which car park the car is parked in. If the thief knows that,he/she can repeatedly activate the remote control while looking for a car indicating with lightsand sounds.Because of the fact that a car usually indicates that it has been unlocked by making a shortsound indication, there will be no problem finding the car.The purpose with this project is to make a prototype which makes it harder for a thief to findthe car.
Analys, design och implementering av Orbit ones dokumenthanteringssystem
This report describes the development of a system for controlling documents. The report starts with a problem description which the company wants an intranet-based solution for. The report then continues to describe the development phase for the different parts of the system which results in a complete system. The company that wanted this system is called Orbit One and is located in Ronneby, Sweden. They have had a problem with old documents circulating in different versions and in different binders.