Dissertations / Theses on the topic 'Näther'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Näther.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Köppen, Milan [Verfasser], Norbert [Akademischer Betreuer] Stock, and Christian [Gutachter] Näther. "Synthese und Eigenschaften neuer poröser Metall-organischer Gerüstverbindungen mit Bismut / Milan Köppen ; Gutachter: Christian Näther ; Betreuer: Norbert Stock." Kiel : Universitätsbibliothek Kiel, 2018. http://d-nb.info/1205735410/34.
Full textHalis, Selda [Verfasser], Norbert [Akademischer Betreuer] Stock, and Christian [Gutachter] Näther. "Neue aluminium- und galliumhaltige Komplexe und metallorganische Gerüstverbindungen : Synthese - Struktur - Eigenschaften / Selda Halis ; Gutachter: Christian Näther ; Betreuer: Norbert Stock." Kiel : Universitätsbibliothek Kiel, 2017. http://d-nb.info/1217251138/34.
Full textKöppen, Milan [Verfasser], Prof Dr Norbert [Akademischer Betreuer] Stock, and Prof Dr Christian [Gutachter] Näther. "Synthese und Eigenschaften neuer poröser Metall-organischer Gerüstverbindungen mit Bismut / Milan Köppen ; Gutachter: Prof. Dr. Christian Näther ; Betreuer: Prof. Dr. Norbert Stock." Kiel : Universitätsbibliothek Kiel, 2018. http://d-nb.info/1205735410/34.
Full textHerzigkeit, Benjamin [Verfasser], Felix [Akademischer Betreuer] Tuczek, and Christian [Gutachter] Näther. "Katalytische Modellsysteme der Tyrosinase: Synthetische und spektroskopische Studien an mono- und binuklearen Kupfer(I)-Komplexen / Benjamin Herzigkeit ; Gutachter: Christian Näther ; Betreuer: Felix Tuczek." Kiel : Universitätsbibliothek Kiel, 2019. http://d-nb.info/1234451395/34.
Full textWendt, Michael [Verfasser], Wolfgang [Akademischer Betreuer] Bensch, and Christian [Gutachter] Näther. "Synthese und Charakterisierung neuartiger Polyoxometallate : Löslichkeitsstudien, Transformationsreaktionen, in-situ Kristallisationskinetik sowie Integration von Heteroatomen und Übergangsmetallkomplexen / Michael Wendt ; Gutachter: Christian Näther ; Betreuer: Wolfgang Bensch." Kiel : Universitätsbibliothek Kiel, 2016. http://d-nb.info/1236287371/34.
Full textNäther, Astrid [Verfasser], Michael W. [Akademischer Betreuer] Friedrich, and Barbara [Akademischer Betreuer] Reinhold-Hurek. "Phylogenetische und funktionelle Diversität von Acidobacteria in Wald- und Grünlandböden unterschiedlicher Landnutzung / Astrid Näther. Gutachter: Michael W. Friedrich ; Barbara Reinhold-Hurek. Betreuer: Michael W. Friedrich." Bremen : Staats- und Universitätsbibliothek Bremen, 2011. http://d-nb.info/1071898302/34.
Full textFrischbier, Nico [Verfasser], Sven [Akademischer Betreuer] Wagner, and Wolfgang [Akademischer Betreuer] Näther. "Untersuchungen zur einzelbaumverursachten kleinräumigen Variabilität und regenhöhenbasierten Dynamik des Bestandesniederschlages am Beispiel zweier Buchen-Fichten-Mischbestände / Nico Frischbier. Gutachter: Sven Wagner ; Wolfgang Näther. Betreuer: Sven Wagner." Dresden : Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://d-nb.info/1067732691/34.
Full textKronlund, Martin, and Rasmus Cannerstad. "Spindeln i nätet : En kvalitativ studie av kommunikativa nätverk och begreppet strukturella hål." Thesis, Karlstads universitet, Institutionen för geografi, medier och kommunikation, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-26284.
Full textEdin, Karin, and Ulrika Sundqvist. "Entreprenöriella nätverk : om entreprenörer i organiserade nätverk." Thesis, University West, Department of Economics and Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-260.
Full textBorg, Josefin. "56 ljusa nätter : Bostäder anpassade till polarområdet." Thesis, KTH, Skolan för arkitektur och samhällsbyggnad (ABE), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-228488.
Full textKarlsson, Fredrik. "Trådlösa nätverk." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-518.
Full textThis report describes what wireless local area networks are and the use and configuration of them. These WLAN as they also are called can be used both in new installations and expansion of existing networks. Further on this report reveals security in this area. Security is incredible important in all networks not at least wireless because you don’t have to be in the environment physically to get the information, you only have to be in the coverage area that can be several hundred meters. It also takes up several different standards for wireless LANs. These are more or less topical and while this paper is written new standards are taking form so this really is under development.
The work has been done in co-operation with Koneo Rosenlund where most of this work has been performed. The products that were opted to work with were Linksys products within the 802.11g standard.
The reason for this inquiry was that Koneo had noticed and thought that wireless LANs is the future and because they wanted an environment to show old and new customers and use in their daily work.
I have found that the wireless LAN is an excellent option to the traditional LANs. They are cheap to install, easy to administrate and expand. If someone wants to change office there is no need to draw a new cable or change cables in a switch, just place the computer on the new desk and everything will work as it used to. For most users it’s ok in safety matters to use WLANs but for them with top secret documents or in a hospital where the radio waves can disturb other equipment then it’s a worse alternative.
I think that I fulfilled most of the goals we set up before I started this work. Some part have been fulfilled beyond our expectations and others have been more difficult to solve.
Bodén, Mattias, and Nandin Rakovic. "ChessCraft nätverk." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-46003.
Full textThis report is describing the process for the development of the networking part of the game called ChessCraft. This game is submitted to the largest game developing contest in Scandinavia that goes under the name of Swedish Game Awards.
Jakobsson, Niklas, and Andreas Lundberg. "Nätverk i nätverk : en nätverksansats i den nya ekonomin." Thesis, Linköping University, Department of Management and Economics, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-557.
Full textSociety and technology develop together in interaction processes. Because of the development of information technology, the Industrial society has been left behind in favor of a society where information is the key production factor, i.e. the Information society. In the Information society, social functions and processes are organized in networks. These networks integrate geographically separate markets to parts of a complex global economic system. Existing conditions in society are the foundation upon which economic models and theories are built. The Network Approach, developed by the IMP-Group in the early eighties, is one of many models based on the conditions that existed in the Industrial society. This thesis attempts to investigate the ability of the Network Approach to describe business networks in the Information society. The findings presented in the thesis are results from a study of the market for Internet based financial services.
Lamperud, Fanny, and Isabelle Kjerrman. "Nätverk och Rekrytering : Hur rekryterare definierar och bedömer nätverk." Thesis, Stockholms universitet, Sociologiska institutionen, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-98684.
Full textVirsand, Susanne. "Nätverk skola - näringsliv." Thesis, Malmö högskola, Lärarutbildningen (LUT), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-28282.
Full textNetwork school-industryA study how to make a working collaboration between school and industry
Viklund, Åsa. "Maktelitens nätverk : En kartläggning över formella och informella nätverk i Piteå." Thesis, Umeå University, Sociology, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-575.
Full textInom svensk samhällsvetenskap återfinns få elitstudier. Däremot har det varit vanligare i andra länder som USA, och i en känd studie av det amerikanska samhället hävdas att makten innehavs av en liten enhetlig grupp med starka inbördes band. I Sverige har en maktutredning genomförts där man har kartlagt de finmaskiga nätverk som sammanbinder regeringen med myndigheter, riksdagsutskott, politiska partier, intresseorganisationer, företag etc. Resultatet visar att maktutövning sker idag inte minst genom personliga och informella kontakter. Även en sociologisk undersökning av eliten i Katrineholm visar på liknande resultat, att de informella kontakterna är mycket viktiga när det gäller maktutövning. De formella beslutsordningarna fungerar mer som ett kvitto på att allt har gått rätt till. I Sverige är tiotusentals inflytelserika svenskar medlemmar i olika former av slutna nätverk som Rotary, Lions, Odd Fellow, Frimurare och andra ordenssällskap. Eftersom det är eliten i samhället som träffas i dessa slutna nätverk får de tillgång till ett helt oöverträffat kontaktnät, vilket förstärker deras makt och inflytande. Syftet med denna undersökning var att studera och kartlägga de informella och formella nätverken hos makteliten i Piteå. Studien baserar sig på nätverkskartor som åskådliggör maktelitens informella och formella förbindelser, samt sju semistrukturerade intervjuer med strategiskt valda representanter ur makteliten. Med hjälp av nätverksteorier har analyser och tolkningar av de olika relationernas mönster genomförts. Främst genom att studera graden av centralitet och densitet, förekomsten av olika catnets, samt om relationerna är svag eller stark i sin karaktär. Slutsatser som dragits är att Piteå består av en liten enhetlig grupp med starka inbördes band. Politiken och näringslivet är inte så uppdelat som man kan förvänta sig, utan flera personer som sitter med makt och inflytande har en fot i varje läger. Dessutom har de flesta av Piteås maktelit en gemensam organsiation som knyter dem samman; det slutna ordenssällskapet Merkur.
Honkanen, Laura, and Johanna Karlsson. "Nätverk – mervärde för sponsorer? : En kvalitativ studie av Uppsala Baskets Nätverk." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-144038.
Full textModig, Dennis. "Autentiseringsmetoder i trådlösa nätverk : Jämförelse av autentiseringsportaler i öppna trådlösa nätverk." Thesis, Högskolan i Skövde, Institutionen för kommunikation och information, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-4993.
Full textJohansson, Susanne. ""Näthat är normalt" : En kvalitativ intervjustudie om unga kvinnors erfarenheter av näthat." Thesis, Karlstads universitet, Institutionen för sociala och psykologiska studier, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-38859.
Full textIhlström, Pontus. "Vikten av säkra nätverk." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-5634.
Full textBärkås, Karina. "Nätverksoperativsystem för lokala nätverk." Thesis, University of Skövde, School of Humanities and Informatics, 1998. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-148.
Full textVal av nätverksoperativsystem är något som blivit viktigt att besluta i många företag och organisationer. Nätverken får fler och fler tjänster, många som ursprungligen utvecklades för Internet. Organisationerna och företagen måste hänga med i utvecklingen för att kunna få ett nätverk som är lätt att administrera och som är användarvänligt. Det finns ett flertal nätverksoperativsystem att välja på. De två vanligaste är Windows NT och Novell NetWare.
Denna rapport innehåller en undersökning av ett flertal faktorer som kan vara viktiga att ta hänsyn till vid val av nätverksoperativsystem. Faktorerna som tas upp är hanterbarhet, skalbarhet, prestanda, säkerhet, feltolerans, Internet verktyg, integrering, kompatibilitet och migrering. Undersökningen tar fram olikheter mellan NT och NetWare avseende faktorerna. Integrering har varit viktigt att undersöka för att kunna lösa problem med flera användarplattformar. Detta för att underlätta systemadministration och göra systemet mer användarvänligt. Metoden som använts för att få fram fakta är en litteraturstudie av böcker och aktuella datatidskrifter.
Morell, Alexander. "Säkerheten i trådlösa nätverk." Thesis, Jönköping University, JTH, Computer and Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-874.
Full textThe number of wireless networks has increased rapidly among both home users and companies in just a few years. That has brought a lot of good things with it, for example the possibility to connect wireless equipment to the network or Internet from an arbitrary position within range of the accesspoint. But since the transmissions take place through the air some new security risks appear. It’s difficult to restrict the signals to a specific space and thereby a lot easier for unauthorized to eavesdrop or disturb the signals compared to a traditional wired network. Furthermore the wireless network could be abused for illegal filesharing, or become a backdoor into the company network through some employee’s badly secured network at home.
A literary study was conducted to investigate the level of security within equipment for wireless communication. By way of introduction a retrospect of old security measures and standards are overviewed. Further on later developed technologies are reviewed and there flaws and possible remedies against new security threats are examined.
But even though technology has improved a lot in just a couple of years, and newly manufactured equipment certainly has the capability to maintain a sufficient level of security, this does not coincide with the reality. Both research reports and media appear to give another perspective of how things stand today.
This report will focus on the security awareness and knowledge among home users and companies to protect there wireless networks. The actual relationship between these security aspects are investigated through two different surveys. The first one concentrates on both home and business networks. As a result of gathering data and encryption methods for a large amount of wireless networks the survey could replay to some of the security questions. For example the ratio between encrypted and unencrypted networks. The survey was restricted to Jönköping and the examined areas were intentional chosen for separate company/industrial networks from home users.
The collected data points out insufficient security for about half of the home networks, however the companies have proven for much better protection. Since the number of business networks was significant fewer, the source of error could be greater. To investigate them further concerning their security measures and knowledge, another survey was conducted. A few handpicked companies were chosen for questioning about their wireless networks. The extra information could complement the first survey and hopefully give more correct conclusions.
On basis of the two surveys it’s possible to state large differences in protection measures depending on investigated areas. There is a strong connection between age, technical knowledge and risk awareness. But the fault should be divided on both individuals and ISP’s (Internet Service Providers), which delivers a large part of the wireless equipment used by home users nowadays.
Envik, Richard, Niclas Kullberg, and Martin Johansson. "Frekvensstörningari IEEE 802.11b nätverk." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-647.
Full textNilsson, Daniel, and Mikael Krafft. "Trådlöst nätverk : en attitydstudie." Thesis, University West, Department of Economics and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-648.
Full textPersson, Patrik. "Positionering i GSM-nätverk." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9619.
Full textMerparten av de kommersiella system för mobilkommunikation som finns och byggs i världen idag bygger fortfarande på GSM, antalet abbonnenter är över 2 miljarder. För att utöka funktionaliteten med mobila terminaler har det forskats på att införa positionering i GSM-nätverk. Tjänster som använder abbonnentens positionsinformation kallas Location Based Service och de ger möjlighet att utöka funktionaliteten och spara användaren av tjänsten arbete.
Rapporten beskriver olika tekniker för positionering och slutsatsen att CGI-TA är den teknik som positioneringen ska byggas på. Denna teknik finns tillgänglig hos de svenska operatörerna idag och för att kommunicera med dem används Mobile Location Protocol 3.0.0. Implementation av positioneringen realiserades i en J2EE-miljö i form av en WebLogic Server 8.1 med hjälp av Enterprise Java Beans och Java Connector Architecture. Prototypen verifierades med hjälp av en emulator till Ericsson Mobile Positioning System som klarar av att hantera Mobile Location Protocol 3.0.0.
Olsson, Anna, and Jennifer Thoresson. "Upphovsrättsproblem i virtuella nätverk." Thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-16606.
Full textProgram: Systemvetarutbildningen
Fundin, Bengtsson August, Hanna Müller, Niklas Pettersson, Rasmus Johns, Martin Byhlin, Martin Lundberg, Adam Nyberg, Olsson Niklas Erhard, and Jonatan Branting. "Simuleringsmiljö för mobila nätverk." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-129929.
Full textBranting, Jonatan, Martin Byhlin, Olsson Niklas Erhard, Bengtsson August Fundin, Rasmus Johns, Martin Lundberg, Hanna Müller, Adam Nyberg, and Niklas Pettersson. "Simuleringsmiljö för mobila nätverk." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-129816.
Full textPettersson, Jack, and Frida Jansson. "Problem med trådlösa nätverk." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-22306.
Full textThe goal with this research has been to answer the question; ”Why are there so many problems linked to wireless networks?”. This has been done by studying the relevant literature to then be able to conduct two self-written studies: one survey and three laboratory experiments. The theory has been taken primarily out of courses and material from Cisco. The survey has helped to determine the knowledge of the general computer-user in regards to wireless networks. The respondents level of knowledge showed, among other things, differences in the way they used their devices; those with less network-knowledge rarely, or never, accessed their routers web-interface. The most common problem that was selected in the survey was a slow wireless speed; experiencing difficulties when configuring a new wireless router proved to be the most unusual one. The experiments were completed through the use of two access points and two computer clients. They demonstrated, among other things, how channel overlap in wireless networks leads to a reduced data-rate, and also stressed the importance of choosing the right channel. Lastly, the work revealed that neither the consumer nor the industry can be solely blamed for the problems that appear in wireless networks. Both of them have separate things towork towards. The consumers should, to a higher extent, find out more about the equipment they use to avoid causing problems, not only for themselves but also for others. The industry could help by slowing down the development of new standards – and to not only focus on achieving higher throughput-rates.
Åkerlund, Joakim. "Design av robusta nätverk." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142436.
Full textThe proper functioning of Internet and computer networks i n today’s society is vital to many companies and the society as a whole. The focus of this project is an investigation of networks and an evaluation of which techniques can affect robustness to different degrees. Improving robustness will in many cases also increase cost, both counting the actual construction as well as during further operation. When a business’s goal is to increase profit it has to consider which techniques are worth the investment compared to what it would cost if something would indeed go wrong and thus causing problems that may not allow the business to fulfill its demands and losing profit because of that. The thesis work was done at the Swedish Post and Telecom Agency (PTS) and the focus was on their network. Following a background of the different techniques a set of real life tests were performed to validate that they actually work. To not narrow the focus on just PTS, a couple of scenarios are described of different sizes of businesses and how they have to overcome different problems and risks. Finally a conclusion is drawn from the results of the real-life tests and also reflections over the different techniques that are presented that could be applied in a general case.
Chiu, Chjun-chi, and Andrew Saka. "Kontakter inom sociala nätverk." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-136143.
Full textSocial networks have been receiving an increasingly significant role in our lives and societies. New ways for organizations and people to interact are constantly created and renewed because of social networks and Web 2.0 technologies. Companies are nowadays expected to have a presence in social media offering information or their services. The most successful of these social platforms are Facebook and Twitter. The success of these social platforms has contributed to several studies[1][2][3] being made; with the ambition to understand how people operate in the context of social networks. In this thesis a web application has been developed and competition has been executed within the Facebook platform to investigate how people behave within social networks, the hypothesis of this work is based upon investigating whether or not the archetypes connectors, salesmen and mavens can be identified within Facebook.
Karlsson, Jonas, and Richard Ingemannsen. "Säkerhet i trådlösa nätverk." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1502.
Full textjcsunset@hotmail.com richard.ingemannsen@swipnet.se
Leu, Andreas, and Daniel Rönning. "Gradientmetoder för artificiellaneurala nätverk." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-94320.
Full textWestin, Linnea, and Anna Marklund. "Socialt nätverk och mäns våld mot kvinnor : om betydelsen av våldsutsatta kvinnors sociala nätverk." Thesis, Umeå universitet, Institutionen för socialt arbete, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-166110.
Full textForsberg, Gunnel, and Gerd Lindgren. "Nätverk och skuggstrukturer i regionalpolitiken." Stockholms universitet, Kulturgeografiska institutionen, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-52638.
Full textSicking, Anders. "Informationssäkerhet inom trådlösa lokala nätverk." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96300.
Full textThis essay deals with aspects of information security within Wireless Local Area Networks. Wireless Local Area Networks predominately use radio as transferring technique. Thus, the information in these networks can more or less be taken right out of the air. It is therefore of utmost importance that wireless networks have adequate security to prevent unauthorized persons from accessing sensitive information. Security in wireless networks has been a problem for a long time, which this essay among other things illuminates. Its purpose is primarily to give the reader a glimpse of how wireless networks are built up and to give a short introduction to technical aspects within these types of networks. Furthermore, it gives the reader a short introduction into different threats and attacks existing against the wireless networks. Countermeasures to these threats and attacks in the form of cipher systems, firewalls, antennas etc. are thereafter described. Different threats and their possible solutions are then compiled into a model. This model can be used by companies and home-users who wish to assess the current security and risk levels of their network. The model does not encompass all solutions, butis intended to function as an easy to use guide. Results this essay show, are that implementation of security within wireless local networks is very complex and many factors must be considered before a security system is installed. One single solution is most often not what gives the best result. Instead, the best security results are usually achieved by combinations of security measures. Factors such as simplicity of use and costs influence the level of security a company can have. Small companies often have smaller resources and therefore need to compromise on the most advanced and sophisticated systems and focus on simpler and less expensive alternatives. The opposite is often the case for big businesses. However, there are always exceptions to this.
Lindfjord, Elinor. "Nätverk : En väg för kriskommunikation?" Thesis, Halmstad University, School of Social and Health Sciences (HOS), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1894.
Full textSyftet med denna studie är att se vilka informationskanaler yngre använder sig av i normalläge, för att kunna utröna om nätverk är en informationskanal gentemot yngre människor vid kris. Alla kommuner i Sverige har ett informationsansvar gentemot sina medborgare men det finns inga lagar som reglerar hur information skall ges. Det är alltså upp till varje enskild kommun att bestämma över vilka informationskanaler de skall använda sig av. Det är därför intressant att diskutera om nätverk som informationskanal förbättrar eller försämrar de demokratiska idealen utifrån myndigheternas informationsansvar och medborgarnas rätt till information vid en kris.
Mitt material består främst av litteratur, utredningar och studentuppsatser. Detta har kompletterats med åtta respondentintervjuer med yngre medborgare. Forskning gällande yngres medievanor och användandet av nätverk har även utgjort en central del i min studie.
Studien påvisar vissa mönster i yngre människors användande av informationskanaler. Yngre människor använder sig främst av TV och Internet för att inhämta information i normalläge. Det är alltså även dessa två kanaler som yngre människor använder för att inhämta information under en kris som till exempel Stormen Gudrun. Nätverkstänkandet kommer först när dessa två kanaler, TV och Internet, inte fungerar. Däremot inhämtar yngre människor information från såkallade interpersonella nätverk i allt större utsträckning. Med interpersonella nätverk menas att man får information från till exempel familj och vänner.
Storm, Fredrik, and Magnus Larsson. "Grundläggande säkerhet i Trådlösa Nätverk." Thesis, University of Gävle, Department of Mathematics, Natural and Computer Sciences, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-46.
Full textTrådlösa nätverk är något som växer och breder ut sig mer och mer i det moderna samhället. Allt fler personer har bärbara enheter som kan ansluta till dessa nät. Därför måste de nätverk som inte skall vara publika skyddas från obehöriga. Viktig information kan annars hamna i fel händer. I denna rapport kommer olika trådlösa nätverk och säkerhetslösningar till dessa att undersökas.
Genom att använda olika säkerhetslösningar så som kryptering med hjälp av t.ex . WPA och även tillämpar Pfleeger’s teorier om datasäkerhet så kan ett trådlöst nätverk vara förhållandevis säkert mot de flesta angripare.
Andersson, Martin, Marcus Olofsson, and Philippa Olofsson. "Utvärdering av Ronnums Herrgårds nätverk." Thesis, University West, Department of Informatics and Mathematics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-462.
Full textLindevall, Vivian, Diana Aguilar, and Olga Kullander. "Turistbyråernas organisation, omvärld och nätverk." Thesis, Södertörn University College, School of Business Studies, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-3860.
Full textUppsatsen är baserad på ett uppdrag som handlar om en undersökning av turistbyråernas verksamhet. Innan uppstart av ett företag är det viktigt att bestämma vilken typ av organisation som behövs. Organisationen i de olika driftformerna skiljer sig åt och påverkar i sin tur företagets omvärld och nätverk på olika sätt. Dessa begrepp har valts ut för att analysera deras betydelse för turistbyråer och om de på något sätt underlättar företagens drift och finansiering.
Sandelius, Johanna, and Emma Sundin. "Mötesindustrin : samarbete, nätverk och värdeskapande." Thesis, Södertörn University College, School of Business Studies, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-1528.
Full textBackground: The meeting industry has had undergone a extensive changes due to a number of factors. The globalization has meant that supply increases and congress organizers have more options to choose from. Development in communications, for instance internet, means that meetings can take place without a physical presence. Congress organizers as clients have also changes. Stockholm as position as a leading city to hold congresses in has also changed for the worse, in 2006 Stockholm dropped of the top-10 list. Stockholm is also more difficult to access than other European congress cities. Another factor for change is that Stockholm’s congress organizers working situation has changes in the meaning that networks are more common.
Purpose: The purpose of the paper is to analyze and evaluate Stockholm’s congress organizers working conditions for creating value through co-operation.
Methodology: The authors have chosen a qualitative research method and have performed one case study and one in-depth interview.
Conclusions: The study has reached the conclusion that value creation is the preferred working method for congress organizers.
Gustafsson, Marcus, and Mats Lundmark. "Piteåuppropet : Manligt nätverk mot kvinnovåld." Thesis, Umeå University, Basic training programme for Police Officers, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-27403.
Full textVi vill med denna rapport belysa vilka faktorer som avgör om en händelse får stor genomslagskraft i media och i samhällsdebatten. Grunden är det mord som drabbade en trebarnsmamma i Piteå och som fick männen i Piteå att organisera sig i en gemensam protest mot kvinnovåldet i samhället. Vi har sedan jämfört detta med andra kända händelser som också har fått stort utrymme i media och samhällsdebatten för att se om det går att utkristallisera några gemensamma nämnare med Piteåuppropet. För att få en annan aspekt på frågan så har vi även gjort litteraturstudier för att hitta teorier som kan förklara varför Piteåuppropet blev så stort och spriddes över hela landet.
Karlsteen, Joakim. "Fuskdetektion med artificiellt neuralt nätverk." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20527.
Full textDet finns övrigt digitalt material (t.ex. film-, bild- eller ljudfiler) eller modeller/artefakter tillhörande examensarbetet som ska skickas till arkivet.
Persson, Ragnvald. "NoSQL-databaser i socialt nätverk." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20692.
Full textThe purpose of the study is to deepen within NoSQL databases and investigate what tasks the different NoSQL groups fit best in a social network, such as Facebook and Twitter. The data is, for example, about the storage of personal data or social networking. There are four different types of NoSQL databases: column databases, graph databases, key value databases and document databases. The question is which NoSQL database should be chosen for a particular task in a given social network. When developing a social network that requires data storage, it is important to know what kind of database should be used for a certain type of task.In order to answer the questions, an investigation has been made of what previous research has reached. There has also been a practical study of all four NoSQL groups in an experiment with storing user information, messages and friends.
Ahlfors, Andreas. "Trådlösa nätverk, säkerhet och kryptering." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20083.
Full textThe use of wireless networks increases among both companies and individuals. For individuals it can be nice to get rid of the cables that fixed networks use and for companies the wireless network can be a complement to the fixed one in environments where you cannot or do not want to use that technique. It is a convenient way to connect to a network without having to be physically connected to it. The convenience however comes at a price as it is easier to tap wireless networks since the communicationpasses through the ether and there is a lack of physical protection such as buildings and locks that exists for traditional networks. In view of this it is important to secure the network in a proper way.In this paper, I have studied wireless networks; how they work, which threats that exist and what one can do in order to protect them. This includes the 802.11 standard for wireless networks and theTCP/IP model for data communication. Encryption, both symmetric and asymmetric, how they work, what they are used for and the differences between them is described. Different security threats against wireless networks and security solutions in the forms of WEP, WPA and WPA2 are also reviewed. In conclusion quantum cryptography, which is a method for transmitting a cryptographic key in a secure way by the help of physics, is described.
Miranda, Cortes Luis, and Mathias Karlsson. "Starcraft Resurshantering med Q-Nätverk." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-10455.
Full textArtificial intelligence is a field of computer science that tries to create intelligent systems or systems that simulate intelligence. Such systems are attractive to consumers because they can perform tasks that would otherwise have required human intervention.The gaming industry is helping to drive the development of AI forward as players continue to expect more immersive and lifelike experiences.Academically games are useful for the study of artificial intelligence because they are relatively simple. But even if the game is simpler than the reality, it is still a difficult task to create an artificial intelligence that can match a human opponent.A popular genre of games is strategy, examples of which are Age of Empire and StarCraft. This report examines a different approach to solve the problem of resource management for this type of game with the help of an artificial neural network to classify the game state. This has not been explored previously, and the goal is to find out whether this approach is feasible or not. To train the networks back-propagation is used in conjunction with Q-learning which makes learning unsupervised. So the authors’ research-question is: Can a Q network be used to manage the resource allocation for a cure in StarCraft Broodwar?To see how well the Q networks solve the problem an experiment was conducted with two different bots where one play StarCraft with the same opportunities a player would have and the other a simplified version. The experiment consists of collecting data from the bots training to see if they improve or not. As a control, two additional bots are used with a completely random policy.The results of the experiment were several graphs showing the bots performance in different ways but most importantly, the number of games won and the probability of winning. With the support of the result, it is not possible to see any real improvement in bot gameplay with 0.7% and 0.4% chance to win against the default AI. The results also show that one of the neural net bots performed much worse than the one with random actions.Moreover, the training turned out to be far too long. If the experiment had more time maybe it would have shown that the technology is possible, but still, only after an unreasonably long time, which would make it useless in practice. If this had been successful it would have meant that we might create better AI for the strategy games that adapts to the player and can generalize when faced with a situation that was not planned by the developers.But in this study the bots behavior remained more or less stochastic so the answer to the research- question is that it is not possible.
Eriksson, Steve. "Interaktiv visualisering av IP-nätverk." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68959.
Full textde, Laval johnny. "Trådlösa Nätverk : säkerhet och GPU." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1063.
Full textWireless networks are inherently vulnerable for eavesdropping since they use radio waves to communicate. Wireless networks are therefore protected by encryption. WEP was the first encryption standard that was widely used. Unfortunately WEP proved to have several serious vulnerabilities. WEP could be circumvented within few minutes. Therefore WPA was developed as a response to the weak WEP. Shortly thereafter WPA2 was released and are now being used in present. The only weakness with WPA2 is in the subset WPA2-PSK when weak passwords are being used. Software could easily go through large dictionaries to verify if a password could be recovered. But that is time consuming and therefore providing wireless networks limited protection. However a new area of use with advanced graphic cards has showed that it is providing a faster way of recovering passwords than the ordinary processor on the motherboard. That opens up for the larger use of dictionaries and the processing of words or combinations of words. That is what this study aims to shed light on. How the efficiency of the graphic cards have affected security in wireless networks from a corporate perspective of view.
Granstrand, Oscar, and Osman Ahmed. "Integration genom nätverk : Om hur nätverk mellan den offentliga och privata sektorn kan förbättra arbetskraftsintegrationen." Thesis, Linnéuniversitetet, Institutionen för organisation och entreprenörskap (OE), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-64862.
Full textEriksson, Stefan. "Föreläsningar på nätet." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13858.
Full textThis essay examines the use of recorded lectures and how students and teachers thought about it and how they are affected by the use of the technology. The survey was limited to Linnaeus University of Växjö. The survey conducted also provides information about how to improve a recorded lecture and what to do before, during and after a lecture.