Sök:

Sökresultat:

1117 Uppsatser om Wireless router security - Sida 2 av 75

Konstruktion av CNC-Router

AASS (Applied Autonomous Sensor Systems, Centrum för Tillämpade Autonoma Sensorsystem) arbetar med forskning inom autonoma system. Deras stora användningsområden är utveckling av automatiska system till fordonsindustrin samt system till äldrevården.AASS, har ett önskemål om en enklare modell av en CNC fräs för enklare fräsning till bland annat prototyptillverkning. Fokus ska ligga på kostnaden då precisionen inte är av största intresse.Uppdraget innebär att ta fram en konstruktion av en cnc- router med tre axlar med ett arbetsrum på 600x450x150mm. Maskinen ska kunna skära i mjuka material som trä, plaster men även mjukare aluminium.Resultatet är en tre axlig cnc- router som drivs av tre stycken stepmotorer som är kopplade till respektive kulskruv. Cnc routern har ett arbetsrum på cirka 600x450x150mm.

Webbsäkerhet och vanliga brister - kunskapsläget bland utvecklare

This bachelor thesis looks at developers knowledge about web security both regarding their own view on their knowledge and their actual knowledge about vulnerabilities and how you mitigate against them. Web developers knowledge regarding web security are becoming more and more important as more applications and services moves to the web and more and more items become connected to the internet. We are doing this by conducting a survey among developers that are currently studying in the field or are working in the field to get a grip on how the knowledge is regarding the most common security concepts. What we saw was that the result varies between the different concepts and many lack much of the knowledge in web security that is getting increasingly more important to have..

Vatten som säkerhetsfråga : Med FN:s konstruktion av vattenfrågan som utgångspunkt

ABSTRACTThe aim of this study is to analyse if the UN today constructs the water issue as a security issue and to argue about in which way the organization in that case does so alternatively why it can be said that the UN doesn?t construct the water issue as a security issue.In order to reach this purpose the following questions will be answered:?Does the UN construct the water issue as a security issue today?-If yes, in which way?-If no, why can it be said that the organisation doesn?t?The methods used are qualitative literature studies of policy documents on water from the UN. The focus is to analyze the ideas about water and to apply my theory on the concept of security, which is Barry Buzan?s framework on security, to these ideas.The main results showed that the UN strongly constructs the water issue as an environmental security issue for environments and species and in relatively strong terms also constructs it as an environmental security issue for civilisations. In rare cases the organisation constructs it as a societal security issue, but the UN doesn?t construct the water issue as a military, political or economic security issue..

Design comparison between HiperLAN/2 and IEEE802.11a services

This paper is a study and comparison between the two Wireless LAN (WLAN) standards HiperLAN/2 and IEEE 802.11a. WLANs are used instead or together with ordinary LANs to increase mobility in for example an office. HiperLAN/2 is an European standard developed by ETSI and the IEEEs standard is American. A WLAN-card consists roughly of a Medium Access Control (MAC), Physichal layer (PHY) and an antenna. The antenna is the same for the different standards.

Nord Stream - Vägen till säkerhet?

Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security.

En Survey av NFC och NFC-Protokoll med Fokus på Säkerhetsaspekterna

Near Field Communication (NFC) is a short range wireless communication technology that enables data exchange between devices. NFC is used in many different areas, from subway tickets to authentication systems. This paper presents possible security threats to Near Field Communication and documented attacks that have been used to target various NFC protocols. Weaknesses in different NFC protocols will be presented and suggestions on how to counter certain weaknesses will be discussed. This survey will be valuable for companies interested in protecting their data when using or planning to use NFC systems..

Mobilt internet för skogsbruket med CDMA2000 i450 MHz - bandet :

Improved wireless datacommunication with the forest machines might be the next big step in the logging process. The use for wireless communicationsystems within the forestry is among other things to report the production from the forest machines, to supply the machine opera-tors with the right information and for safety. CDMA2000/ 450 is a third generation mobilecommunicationsystem which could replace the old NMT- 450 and for comparatively low costs. The reason for the low costs is that you only have to use the old NMT- 450 masts and supply them with new equipment. In the test of CDMA2000/450, that has taken place in northern Uppland, two kind of files have been sent.

Fjärrvärmesystem

This is a report written for an examination project C-level, on the subject of energy. The examination project is a product of the FVB Sweden AB (district heating bureau). It started with a meeting with Stefan Jonsson FVB Sweden AB, were he explained the content of the project, and from this a presentation of the problem was made. The problem that needed to be solved was how they could control the valves in the system to provide heating to everyone in the system. The valves are often oversized so the pump in the heating plant would have to be enormous to be able to provide enough flow to be sufficient, if everyone in the system had there valves fully opened. I came up with two solutions to the problem, one was a wireless network that could keep track of the valves and the other solution was an extra sensor that was placed on the radiator.

Trygghet och trygghetsskapande i arbetslivet

In this paper we examine what security is to the individual and how the individual creates and maintains security in their work. The purpose of this paper is to study how the creating of security in working life is performed. We conduct six semi-structured qualitative interviews with permanent employees in the private sector and we encode our material using thematic analysis. We analyze our material and illustrate our problem area on the basis of Anthony Giddens's theory of ontological security and give examples of how security and creating of security is performed at the empirical field with previous studies in the research area. Our survey shows that security for the individual at work seems to be about having continuity in everyday life, financial stability, a permanent employment, a challenging and fun job and a family in good health and good living.

"Jag tycker nog att jag bor på Araby, det är nog alla andra som tycker att jag inte gör det." : - En kvalitativ studie om hur distinktioner påverkar tryggheten

This thesis suggests an explanation for how it is possible for individuals living in an unsafe neighborhood to expressa highlevel of security. Araby is the district in Växjö municipality withthe highest level of insecurity. Within the district, there is acategory of individuals in security-measurements showing a high degree of security. Inhabitants living in house in Araby also seem to show a higher level of security than inhabitants in the same accommodation in other neighborhoods in the municipality.The study's purpose is to understand how individuals belonging to an unsafe neighborhood can experience a high degree of security.Qualitative data were collected from an observation in Araby and from interviews with individuals living in house in the district.Previous research has shown that security in the surrounding area depends on several factors, such as disorders, the degree of social control and personal opinions. Thestudy shows how a distinction to places and people in the district can explain the degree of security.

Synen på Säkerhet och Immigration : Finns det ett samband?

The aim of this study is to explore howEuropean changes in the view on securityrelates to the view on immigration and viceversa. The answer to that question is basedupon collected data from three separatetime periods; the 1950s, 1970s and 1990s.These time periods are seen as importanthistoric decades when political changes,assumed to have affected the views onsecurity and immigration, have occurred.According to certain criteria each timeperiod has been labelled in terms ofnarrowed/widened view on security as wellas restrictive/open view on immigration.The hypothesis of the study is that, whencompared, a constant pattern can be seenbetween the historical labels of eachphenomenon, where a narrow view onsecurity goes hand in hand with an openview on immigration and similarly a widesecurity view relates to a restrictive viewon immigration.The conclusion of the study gives supportto the hypothesis. During all three periodsstudied a restrictive view on immigrationrelates to a wider view on security while anopen view on immigration relates to anarrower view on security. Thisrelationship goes both ways..

Internationell fred och säkerhet ur ett genusperspektiv: En diskursiv studie av Säkerhetsrådets resolutioner för kvinnor, fred och säkerhet

The Security Council?s resolution 1325 addressed the major negative impact that armed conflict has on women and children. This in turn complicates the Council?s work on maintaining international peace and security. The resolution therefore highlights women?s rights as participants in peace- and conflict processes.

När Arktis isar smälter tinar världen upp? : En kvalitativ analys av det vidgade säkerhetsbegreppet i den svenska strategin för den arktiska regionen

This study is called When the ice of the Arctic melts is the world defrosting? and written by Rebecca Fröling.The purpose of the study is to investigate how the concept ?security? is used in the Swedish arctic strategy and why the concept is described in that way. The debate of the concept ?security? has been going on for years, but the debate is still present today. What we put in to the concept is operative for how we regard and discuss security and security politics.To analyze the strategy I used two theories, one with a traditional approach and one with a critical approach to security: Realism and Copenhagen School.The method that has been applied to the study is qualitative content analysis, to be able to analyze the text on the depth.

Livsmedelssäkerhet, konflikt och hållbar fred - en teoriutvecklande studie om matens makt

In our world, more than two billion people are living under insecure food conditions and more than eight hundred million people are estimated to be starving. The majority of these people live in developing counties which are poor and often subject of civil war. The past fifty years the main subject of security analysis has been the sovereign and rational state and the threats have been viewed in terms of military and weapons of mass destruction. This has come to change over the last decades and security as a concept has broadened, which better represents the reality of today. Within this broader conceptualization of security the main referent of security is the individual, rather than the state, and threats are not only analyzed from a military point of view, but also seen as threats against human rights and freedoms.

Säker grannupptäck i IPv6

The IPv6 protocol offers with some new functions, one of them is auto configuration. With auto configuration it is possible for nodes, i.e. hosts and routers, for automatically associated with IPv6 addresses without manual configuration. Auto configuration it is another protocol as it uses Neighbor Discovery protocol (ND) messages (ND is mandatory in the IPv6 stack). The main purpose of ND is that nodes can discover other nodes on the local link, perform address resolution, check that addresses are unique, and check the reachability with active nodes.There are exactly the same vulnerabilities of IPv6 as IPv4 and is now exception, ND if not properly secured.

<- Föregående sida 2 Nästa sida ->