Sök:

Sökresultat:

1096 Uppsatser om Wireless security - Sida 25 av 74

Produktspårning med RFID : Konceptutveckling och utvärdering

The aim of this thesis was to investigate the possibility of integrating an item tracking systemwith a monitoring system currently under development at Fifth Generation Technologies (P) Ltd.A literature study of RFID technology and the networks ZigBee and MiWi was done. Based onthe literature study a concept for a distributed system was developed.The concept is to have several RFID readers placed in the area where tracking is to be performedand allow them to communicate with each other through wireless communication. The RFIDreaders shall be able to form zones and filter the data that is forwarded from the zones to theservers and thus perform some of the work that the server would normally have to do. Theconcept has been evaluated by prototype development and testing. The prototype uses an ultrahigh frequency RFID reader and a MiWi network.The test indicated some limitations with the selected technologies.

Marin diplomati ur ett småstatsperspektiv. : Fallstudie svenska Ålandsexpeditionen 1918.

Abstract:The old established description gunboat diplomacy has in modern time changed to a broader and more nuanced definition called maritime diplomacy. But what is maritime diplomacy and how is it described? This essay analyses the theories from the Englishman James Cable and the American Edward Luttwak. Both Cable and Luttwak represent nations which have a global security interests and deploy their maritime forces worldwide. The foundation for their theories is power politics.

N?r staten talar om kris och krig : En analys av broschyren ?Om krisen eller kriget kommer? 1943-2024

This study examines how the Swedish state has communicated security, threats,and citizen responsibility to the population through different versions of thebrochures ?If Crisis or War Comes?. Drawing on securitization theory and UlrichBeck?s theory of the risk society, the study analyzes how threat perceptions, protected referent objects, and the role attributed to individuals have changed overtime. The analysis is based on a deductive qualitative content analysis of sixbrochures published in 1943, 1952, 1961, 1989, 2018, and 2024.The findings demonstrate a clear transformation in the construction of threats,shifting from a predominant focus on conventional military conflict during theSecond World War and the Cold War to a more diversified threat landscape in thetwenty-first century, including societal disruptions, propaganda, cyber threats,environmental risks, and pandemics.

Kortsiktig omsättning och avkastningar-En studie på enskilda aktier på Stockholmsbörsens A-lista

Vår studie bygger på artiklarna ?Fads, Martingales and Market efficiency? och ?Volume and Autocovariances in Short-Horizon Individual Security Returns? och är ett replikat av dessa.Studiens syfte är att undersöka förhållandet mellan förändringar i aktieomsättningen och veckoavkastningar för enskilda aktier på Stockholmsbörsen..

Modern statssuveränitet En analys av hur synen på statssuveränitet har förändrats med Bosnien-Hercegovina som exempel

The purpose of this study is to analyze how the parties (USA, Great Britain, UN and the European Union) legitimize their intervention in Bosnia-Herzegovina as seen from without the conceptions of sovereignty and intervention. USA and the UN have legitimized their intervention on security reasons. The American president, George W. Bush, claimed that democracies never engage in war with each other and that democracies were prosperous just because they were democracies. According to the president, that is why it is important to democratise the whole Balkan region to protect the international community from terrorism which grows in unstable and undemocratic states.

Homesupport for elderly people with psychiatric disabilities

This essay deals with the support and help offered to elderly people over 65 with mental disabilities out of personnel from a special support team. We have chosen to use the qualitative method to answer our questions. We have four semi-structured interviews with all staff from the support team we have been in contact with, three nurses/nursing assistants and project manager for the support team. We have recognized five themes and divided the text into six different categories and disciplines that answers and highlights the importance of meeting clients' needs, increase their independence and quality of life. Our theme is security, continuity, time, treatment and relations.

Självskadebeteende : En studie om identitet och självuppfattning

The purpose is to illustrate the phenomenon of self-harm from a social psychological and sociological perspective. The purpose is furthermore to examine the role social relationships play in the individuals´ self- imagine and what role does identification play for anyone who harm themselves? We want to examine in what way social relationships are important and how they function for individuals who harm themselves, both once they have started to harm themselves, and if the relationships in any part caused the cutting to begin with.Questions:How do individuals shape their identity based on self- harm? Which self-image do individuals have who self-harm? Is there anything in the person's previous social relationships that have caused them to begin to hurt themselves?Method:In this paper we have analyzed five autobiographies. We have used open coding from grounded theory as analytical method and subject positions based on discourse analysis.Theory:We have used the Cooley concepts looking glass self, Foucault's theory of power, Giddens' concept of ontological security and existential anxiety.Results and Analysis:We found six different categories that we thought were central. These were negative self-image, guilt, lack of family support, negative experiences of others' views, the protective identity as self- harmer and insecure social relationships in school.Conclusion:The self-harming is a very complex behavior.

BTIF - Bluetooth identifier framework: Ett ramverk för trådlös automatisk identifiering via bluetooth

Det finns idag goda möjligheter att beröringsfritt kontrollera elektroniska objekt. Ett exempel är belysning som aktiveras via rörelsesensorer.Enkla lösningar innehåller oftast sensorer för ljud, ljus eller rörelse vilka används för att aktivera ett styrobjekt, vanligen genom att slå på eller av en elektronisk strömbrytare kopplad till styrobjektet. Behövs det mer säkerhet och möjlighet att bevisa för styrobjektet vem individen är som försöker få styrobjektets uppmärksamhet behövs det mer än en enkel sensor. Det behövs en anpassning för att separera olika bluetoothenheter från varandra. Bluetooth är en teknik för att trådlöst skicka information mellan två enheter.

"Vill du ha mitt utförsäkrade liv?" : en studie om människors upplevelser efter att de utförsäkrats

The purpose of this thesis is to find out the reasons and perhaps some answers to the problem as we see it, the sickness benefit expiration of those who experience this. By this said we have also taken into account the different laws and adjustments in the long-term sickness benefit, but also major reformation of the security net in the Swedish society. The efficiency of the law on passive long-term sickness absence was added in July 2008, but was later in January 2010 supplemented. The purpose of this law wasn?t only to reduce the long-term sickness absence but also to reduce exclusion.

Sköra äldre patienters upplevelse av vistelsen på akutmottagningen

Background: The number of older people is increasing in Sweden. The elderly patient often requires a more complex type of care, than younger patients. The concept of frailty is often used to describe individuals who have a high biological age and a decreased physiologic reserve which could be associated with acute illness and an increased vulnerability. Emergency medical care today is not suitable for elderly patients and adaptions for these elderly patients and the demands this places on the health care is necessary. Mölndal Hospital emergency department has around 42 000 visitors per year, many of the clients have a high age.

Varför snokar ni? : En motivanalys av regeringens val att presentera propositionen för en anpassad försvarsunderrättelseverksamhet

Since the 9/11-attacks several nations have been confronted with a new international threat, its nature traces back to the political- and religious- radical movements of the 20th century Cold War. Ever since, various states have been under threat by terrorist organizations around the world due to mainly participating in worldwide counter-terrorist interventions created by western alliances. In Sweden, amongst other countries, the state took security-precautions that would imply total control of information throughout the territorial borders. The assigned proposition was accepted by the Swedish parliament in June 18th 2008, after this date wild spread criticism was still in effect ever since the Swedish government first publicly announced the proposition in May 8th 2007. This study emphasizes on understanding why the Swedish government chose to present this proposition to parliament, in order to complete this task the study will present the motives and the alleged threats that were the core of the proposition and its value-maximizing goal of creating a new surface for Swedish homeland security.

Ödesstund för Europa : Om de geopolitiska konsekvenserna av Europas beroende av rysk energi

This is a tale about energy and power. It describes the geographer Halford Mackinder?s geopolitical theories and compares them with current views outlined by Zbigniew Brzezinski and Michael T Klare, among others. With a critical approach it also provides a historical account of a Europe that stands in front of an energy struggle so severe that the current world order seems destined to fall. Oil and natural gas, has since the beginning of the 20th century, been used as a geopolitical tool in order to create dependence, control and even sometimes overthrow empires.

Undersökning och utformning av ett generellt datainsamlingssystem i LabVIEW

This report is the result of a diploma work made at IMT at US in Linköping. The purpose of this piece of work is to investigate the possibility to design a general program for data-acquisition using LabVIEW, suiting different hardwares and connections. Great importance has been attached to communication with serialport, using bluetooth, because different wireless PPG-instruments has been developed parallel to this project. These PPG-circuits uses this type of serialcommunication. Communication with USB, GPIB and analog connection has also been examined and analog communication has been tested practically.

Vårdanställdas efterlevnad av informationssäkerhetspolicys : faktorer som påverkar efterlevnaden

Informationssäkerhet är ett område som kommit att sättas alltmer i fokus hos organisationer. Tidigare har främst tekniska lösningar för att skydda viktig information fått uppmärksamhet, det är först på senare tid som informationssäkerhet har börjat uppfattas som ett komplext område som innefattar såväl tekniska, som organisatoriska och mänskliga faktorer. För att eftersträva en god informationssäkerhet inom organisationen bör ett grundligt arbete läggas på att utveckla informationssäkerhetspolicys och säkerhetsansvariga måste kontinuerligt utbilda och skapa medvetenhet hos anställda kring vilka hot som finns mot organisationen ifall informationssäkerhetsbestämmelser inte efterlevs.Huvudsyftet i föreliggande studie har varit att undersöka vilka faktorer som styr anställdas efterlevnad av informationssäkerhetspolicys. Ytterligare delsyfte har varit att undersöka hur den faktiska efterlevnaden av informationssäkerhetsbestämmelser avspeglar sig inom två vårdverksamheter i Landstinget i Östergötland. För att uppfylla studiens syfte har fallstudier genomförts där såväl observationer som intervjuer med personal legat till grund för datainsamlingen.Resultatet visar att säkerhetsmedvetandet och efterlevnaden av säkerhetsbestämmelser inom de undersökta organisationerna är tämligen god, men det finns skillnader i graden av efterlevnad.

Bemästra, bistå eller både och? : En kritisk studie av Provincial Reconstruction Teams roll och agerande i Afghanistan

The specific task of this thesis is to illustrate the complexity of a cooperation between civilian and military entities by examining Provincial Reconstruction Teams (PRTs) and their role as an actor among others in the field in a war-torn Afghanistan.By using counterinsurgency strategy as an analytical framework it has been possible to examine the civilian and military contexts closer. Underlying structures concerning the norms and interpretation of reality of the PRTs has been partly revealed. Studies of the PRTs as one significant bearers of "the comprehensive approach", which includes a holistic approach regarding the use of civilian and military capabilities, new conclusions can be drawn on whether a general civil-military approach can be a part of the solution for current and future conflicts. Based on the counterinsurgency strategy, the author has identified three themes as bearing and thus appears through the thesis as a foundation. These are Coordination, Development and Security.

<- Föregående sida 25 Nästa sida ->