Sök:

Sökresultat:

1117 Uppsatser om Wireless router security - Sida 20 av 75

Upptäcka matematik utomhus : Vilket förhållningssätt till matematik utomhus har förskollärare som inspireras av olika pedagogiska inriktningar och hur beskriver förskollärarna att de arbetar med matematik utomhus?

This project investigated the current market regarding wireless net and the communication between the tools used for diagnostics/maintenance and an embedded system. Based on documentation obtained through interviews a demo system was created based on Bluetooth Low Energy (BLE) communication between an embedded system and an Android device.This report intends to describe the tools and methods used in the design of the demo system and the result of an analysis of the BLE communication.Bluetooth Low Energy is an exciting protocol with wide applicability within the industrial field. This project investigated the communicational possibilities between a Smartphone and a Raspberry Pi and based on the results that emerged the conclusion can be drawn that BLE is a protocol with many beneficial applications within industrial IT..

Multimedia i fickan : Vägen till inkludering?

One of the essential needs of human beings is to be involved in a social context. The intention of this study was to see if the opportunity to have an iPod Touch, could make it possible for students with literacy difficulties to participate in the regular classes and if the implementation of iPod Touch in the school setting would result in informal learning outside the school. In this case study two pupils with literacy difficulties have been using an iPod Touch in their daily school activity. The pupils as well as their teachers have been interviewed about their experiences of implementing iPod Touch as a tool in the regular classroom teatching. The results indicate that iPod Touch can help students to be in inclusive education and that they use the iPod Touch outside school.

Talutrymme i andraspråksundervisningen : En studie av hur talutrymmet kan fördelas i klassrumssituationer när det är tänkt att eleverna ska tala.

One of the essential needs of human beings is to be involved in a social context. The intention of this study was to see if the opportunity to have an iPod Touch, could make it possible for students with literacy difficulties to participate in the regular classes and if the implementation of iPod Touch in the school setting would result in informal learning outside the school. In this case study two pupils with literacy difficulties have been using an iPod Touch in their daily school activity. The pupils as well as their teachers have been interviewed about their experiences of implementing iPod Touch as a tool in the regular classroom teatching. The results indicate that iPod Touch can help students to be in inclusive education and that they use the iPod Touch outside school.

Gruppdynamik : en social gemenskap

The purpose of this work is to create more knowledge about the teacher's perceptions of group dynamics and its impact on school activities. How do teachers opportunities and obstacles in order to influence group dynamics among students. The questions I have answered is how the teachers see the importance of a functioning group dynamics in school, how teachers work with group dynamics and how teachers describe the opportunities and obstacles for effective group dynamics. The method I am using at work is a qualitative research method that involves obtaining the teachers' own thoughts, feelings and experiences around the right questions. I have interviewed three teachers in primary schools in the county of Stockholm to find out their particular approach.

Metoder för motverkande av bruteforce-attacker mot Wi-Fi Protected Setup

Konfigurationsprotokollet Wi-Fi protected setup (WPS) har vissa brister idess design gällande hur autentiseringen av den PIN-kod som används för attansluta en enhet till ett trådlöst nätverk är implementerad. Dessa brister kanutnyttjas av en attackerare för att utföra en bruteforce-attack som på enrelativt kort tid kan identifiera den korrekta koden. Detta arbete har tagit frammetoder för att motverka eller fördröja attacker mot WPS-protokollet sommed relativt enkla medel kan implementeras i befintliga nätverk. Genomutförda praktiska experiment där en fristående server upptäckt en attack ochgenomfört olika försvarsmetoder har de mekanismer som presenterats utvärderats.Slutsatsen är att den effektivaste metoden för att avbryta en bruteforce-attackmot protokollet är att automatiskt byta ut PIN-koden då en attack upptäcks..

Säkerhet och integritet i närfältskommunikation

Context. In today?s society we use smart cards in many areas, NFC is a smart card technology that allows contactless interaction between a reader and the tag, the tag is often in the form of a card. NFC can be used for various payment methods or as access card to a building which makes life easier. In previous studies, the technique has proven to be weak to attacks using an NFC reader connected to a computer.

Samverkan eller motverkan? En studie om myndighetssamverkans konsekvenser för rättssäkerheten och barnperspektivet

Children that are taken care of for institutional care by the social services are unprivileged as a group. When society takes over the parenting role, it forces local governments and other accountable authorities to guarantee these children satisfactory support and good care according to each child's needs. The aim of this thesis is to analyze and discuss problems with implementation in policy processes when authorities incorporate. From the normative standpoint of legal security and the United Nations Children's Convention, this thesis investigates the consequences of interaction between two Swedish supervisory authorities for the social services: Socialstyrelsen and länsstyrelserna. To fulfill the aim I will investigate the approach taken by the authorities and the work division between Socialstyrelsen and länsstyrelserna.

"Storebror" kommer till stan? En diskursanalytisk studie av debatten kring kameraövervakning av "Stråket" i Malmö

Social control in different forms has existed in all known societies. This control has taken different shapes and expressions. In older smaller communities there was a collective control among the citizens. In modern societies the state is trying to control the lives of the citizens. These control mechanisms can be seen as both freedom-reducing and freedom inducing depending on which concept of freedom one upholds.

Att anpassa tjänster till WAP

I takt med att antalet mobiltelefoner har ökat har även efterfrågan på fler tjänster för dessa ökat. Detta är en av anledningarna till att WAP-tekniken skapats och att den har fått så stor uppmärksamhet. WAP, Wireless Application Protocol, är ett kommunikationsprotokoll som gör det möjligt att utveckla tjänster för mobila klienter. Den har utvecklats genom ett samarbete mellan en mängd olika företag och är idag en öppen standard. För att kunna utnyttja den nya tekniken och anpassa nya tjänster bör man tänka på vissa faktorer såsom begränsningar gällande klienten, säkerhet och gränssnittet mot användaren.

Äldre personers upplevelser från att bo i eget hem till att flytta in på ett äldreboende.

Background:The concept of transition means a change in a person's life where he or she is forced to adapt. There are different phases in life that results in different adaptations. In this essay, transition is described as the physical and mental journey between the home and an elder care facility. The Aim was to describe elderly people's experiences of transition when moving from their previous home into an elder care facility. The Method used was a literature review.

Relationen mellan cyklister och fotgängare vid Södra Älvstranden, Göteborg En utvärdering av trafiken på cykelstråket Älvsborgsbron - Centrum

This paper describes a method for wireless energy transfer via near-field electromagnetic inductionthat is inexpensive, simple and can be applied to almost any type of system, regardless of size andenergy demands.The method uses a primary unit consisting of an oscillator, amplifier and inductive coil thattransfers energy to a secondary unit consisting of a coil, rectifier and voltage regulator. Two typesof oscillators and several amplifier designs were realized and evaluated together with a multitudeof flat coils of both monofilar and bifilar type.The results show that it is important to use an oscillator whose frequency is dependent on theinductance of the connected transmission coil, such as the Colpitts oscillator. This is preferable toan oscillator with a preset frequency, such as a Schmitt-trigger oscillator..

Utveckling och design av WiGID

The Center for Genomics and Bioinformatics (CGB) is an academic department at Karolinska Institute. Generally stated, the CGB department is committed to the generation and management of genetic information by approaches aiming at elucidating the connection between genes, protein and function.WiGID is a genome information database that is available through WAP (Wireless Application Protocol).Our version of WiGID is based on WML, PHP and PostgreSQL as a database server.One of the changes on the old WiGID application was the creation of a relational database with seven tables and one view, instead of the file that represented the database on the old version. We also changed the script language from python to PHP.The search engine ability has been extended with three new search alternatives for a user to choose from. Each choice leads to other, sometimes multiple choices.A GUI has been created for the administrator, to be able to insert information into the database.The structure of the search engine is primarily for narrowing down the search result on the phone display, thereby making the search efficient..

Det (väst-) europeiska samarbetet - från säkerhetsdilemma till stabil fred

In this essay the morphing of the interstate relations in the post-World War II Western Europe is taken in to consideration in discussing how these relations were stabilized and consolidated through community cooperation to achieve a state of stable peace. It concludes that the early 1900's of Western Europe comes close to being conditioned by Herz's security dilemma and then continues to analyze the development from this state to one of stable peace. In this analysis pivotal features of the ECSC, EEC and the EC are being scrutinized through the use of Boulding's Stable Peace theory and developments of the very same, in separate case studies, in order to account for the Communities? influence on the peace process.In doing this, conclusions are drawn that external pressures can be very effective in creating an incentive to move beyond an initial state of conflicting self-images and that a stabilizing process has got to provide a long term solution in order to sustain a trustful relationship. In order to provide this long term solution the community cooperations suggests that locking in through institutionalization, harmonization, and the creation of a state of irrevocable interdependence are highly effective..

Personuppgifteshantering och identifiering inom myndighet, skola och förtag

The authors of this thesis have studied the handling of personal information in various kinds of organizations, because the perception is that the knowledge in this area is weak relative to the weight of the subject.The purpose of this paper has been partly to shed light on how knowledge of this area in the organizations that we have visited during the study but also to answer questions about handling, knowledge and security, and identification of individuals in different systems. What kind of problems the processing of these data creates and why these problems occur.In the beginning of our study we understood the importance of using the correct identifier and therefore chose also to examine what the various identifiers used by the organizations and why they chose these particular identifiers.In the qualitative analysis, Datainspektionen´s general rules and advice has been used as a basis together with the laws applicable to the organizations to get a good picture of how management of personal information is in these organizations.What we have found in this paper is that knowledge about how personal data is handled and what laws and rules are saying is very much dependent on how central the information is to these organization's activities. The police use so many different types of records for their organization to function well and they have very good knowledge of laws and regulations. In contrast, schools that do not handle as much of personal data themselves nor have the same knowledge among staff and do not have enough resources to cope with keeping the same knowledge base as the police. This is something that applies to all types of handling, depending on how important the information is for the organization, the better the security and knowledge in handling the data is..

Gulliver Simulation - En systemarkitektur f or n atverkssimulering av

Nowadays, a lot of resources are spent on developing systems that will make it possible forvehicles to act autonomously, and make them more effective. One of the projects that isworking on this is the Gulliver Project. Gulliver has constructed a number of miniaturevehicles equipped with various sensors, to use as a physical testbed for autonomousdriving. One big disadvantage with this method is the long iteration time that occursduring the development and testing of a new software.This project has improved this process by developing a system architecture of a virtualtestbed where it is possible to simulate autonomus vehicles that communicates throughany type of wireless network. The testbed has made it possible to simulate autonomusvehicle systems that with a reasonable margin of error, acts like the system would actin a physical test.

<- Föregående sida 20 Nästa sida ->