• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2116
  • 1763
  • 5
  • 4
  • 3
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 3908
  • 3881
  • 3871
  • 3871
  • 3871
  • 3871
  • 1798
  • 1726
  • 1618
  • 1522
  • 1497
  • 1494
  • 678
  • 677
  • 241
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Standardiserade vårdförlopp : En fallstudie om individualiserade och standardiserade vårdkedjor i svensk hälso- och sjukvård / Standardised Cancer Care Pathway

van Horik, Max, Hiltunen, Markus January 2020 (has links)
No description available.
262

Validation and Ranking of Challenges in Digital Transformation towards Industry 4.0 : a multi-case study in Swedish manufacturing SMEs

Aminzoui, Abla, Knapp, Joacim January 2020 (has links)
No description available.
263

Fire detection in industrial environments

Zell, Otto, Pålsson, Joel January 2022 (has links)
Bränder är väldigt destruktiva, och när de bryter ut påverkar de allt runt omkring. Det bästa sättet att minimera skada från bränder är att upptäcka de tidigtinnan de brytit ut ordetnligt, detta handlar ofta om sekunder som gör skillnad.Denna rapport utforskar AI’s potential att detektera brand och minska tidendet tar att upptäcka den i industriella miljöer genom en bildström medobjektdetektering. Objektdetektering har gjort stora framsteg under de senaste6 åren. Dessa framsteg gör detta och andra liknande realtidobjektdetekteringsprojekt möjligt. Neurala nätverket som tränades i dettaprojekt överträffade ett brandlarm med 26 sekunder i realistiska miljöer.Fem dataset skapades och testades. Alla dessa tränades på YoloV4 modellen.Alla YOLO modeller är av typen konvolutionerande neuralt nätverk (CNN).Vikterna från träningen flyttades till en Nvidia Jetson Nano enhet och kördesmed hjälp av TensorRT tkDNN. En precision på 99.3 och Phi koefficient på0.924 uppnåddes och detta kan troligtvis förbättras med bättre data och ellerfler utvärderingsbilder. / Fires have destructive power when they break out and affect theirsurroundings on a devastatingly large scale. The best way to minimizedamage is to detect the fire as quickly as possible before it has a chance togrow. This project looks into the potential of AI to detect and recognize fireand reduce detection time using object detection on an image stream. Objectdetection has made giant leaps in speed and accuracy over the last six years.This progress has made this thesis and similar real-time object detectionprojects possible. The models brought forward in this project managed tooutperform a fire detector by 26 seconds in realistic scenarios.Five data sets were created and tested. All these were trained on the YOLOv4model. All Yolo models employ convolutional neural networks (CNN). Theweights were transferred and run on an Nvidia Jetson Nano through Tensor rtwith tkDNN. A precision of 99.3 and a Phi coefficient of 0.924 were achieved.
264

Konsekvenser av ny teknik på en sjukhusmottagning / Consequences of New Technology on a Hospital Reception

Dahl, Maria, Ekholm, Cecilia January 2013 (has links)
No description available.
265

Open Innovation Strategies: A Case Study of Ericsson

RALLIS, PARASKEVAS January 2013 (has links)
Open innovation is an approach to innovation that has steadily started to gain ground during the last few years, as a practice that can help companies to remain innovative.This practice allows ideas to move freely inside out and outside in of a company. This means that a company can use external ideas to enhance its internal R&D and it can also utilize internal ideas in new innovative ways. As a result developing costs are reduced, products reach the market faster and new perspectives for future growth are created. This thesis studies Ericsson and how that company uses open innovation, what processes it implements and what are the motives behind its open innovation moves. By studying a company that utilizes open innovation for many years now and is considered a pioneer in this field we can gain valuable insight on this fascinating phenomenon.
266

Urban Mobility among Lower Income Communities in Jakarta : A Study of the Bus Rapid Transit System

Wentzel, Lisa January 2010 (has links)
Urban planning research in developing countries has often focused on slum upgrading. Lately environmental issues have become increasingly important as well. Hence, transportation is an important field, as basis for the development of cities in developing countries, yet few studies on transport for the urban poor in developing countries have been conducted. Studies, which have been conducted, identify mobility as an important attribute for peoples employment opportunities, and, therefore, improving their living conditions. In Jakarta, transportation is, along with the battle against flooding and poverty, one of the most important issues for the future. This study explores the field of urban mobility in low-income communities in Jakarta, by looking at the newly implemented Bus Rapid Transit (BRT) system, through an explorative, descriptive and part explanatory approach. The BRT has been implemented to ease the chaotic traffic situation in Jakarta. But, in literature, BRT systems are argued to benefit the lower-income population as it provides cheap and fast transportation. The field study concludes that the BRT is used with restriction among the low-income residents, who were interviewed, due to several reasons. It infers that the BRT routes do not suite the travel patterns of the residents, besides, the fare including transfer costs becomes expensive. Consequently, the BRT has yet to make a significant impact on the low-income residents in Jakarta. / Minor Field Study (MFS)
267

In the Streets of Zanzibar : Constructions of Gender and Place

Gunnarsson, Ulrika January 2004 (has links)
This thesis studies the access and use of public spaces from a gender perspective, with Zanzibar Stone Town as a case study. The thesis brings together and discusses several theories that might explain the access and use of public spaces from a gender perspective; planning theory, theories about public space, theories about how places are gendered and Islam since the case study is carried out in a Muslim area. Moreover, the thesis takes a starting point in a feminist scholarship. The discussion shows that places and gender are constructed over and over again. Today, women are sub-ordinated men and have less access to public space, but this is a constructed fact. Since culture is not static, subordination of women can be changed into equality between women and men. However, the task is not simple and one might wonder whether spatial planners can do anything at all. This thesis argues that planners can put their piece to the jigsaw. They can facilitate a planning process that takes power relations into consideration and they can question the social and cultural constructions of gender and place. / QC 20110519
268

Etisk bedömning under risk : En kvantitativ studie kring gruppers och individers bedömning av ett etiskt hjälpdilemma

Tapper, Rebecca January 2022 (has links)
Att fatta etiska beslut kan innebära ett flertal svårigheter såsom motsägande målsättningar kring maximerande av effektivitet eller maximering av rättvisa. Denna kvantitativa enkätstudie syftade till att undersöka ifall grupper och individer skiljer sig åt vid etiska bedömningar under risk. Studien var uppbyggd kring ett fiktivt hjälpdilemma där två patienter behövde medicinsk hjälp. Studien bestod av två delar med två snarlika hjälpdilemman där åldern var största skillnaden (barn vs. vuxna). Den första delen jämförde gruppers kontra enskilda individers etiska bedömningar under risk. Del två jämförde individers etiska bedömning under risk beroende av barnpatienters ålder. Deltagarna i studien behövde först prioritera vilken patient som förstskulle få hjälp. I en uppföljningsfråga tillkom en riskfaktor, i form av att en av patienterna (den högst prioriterade) hade en låg sannolikhet att få en lyckad operation. Deltagarna skulle därefter bedöma hur stor sannolikhet för en lyckad operation den andra patienten behövde ha för att de skulle ge den patienten hjälp först. Totalt deltog 99st elever (ålder 18–19 år) från fem olika klasser i årskurs 3 på ekonomiprogrammet på en gymnasieskola i Västsverige. Resultatet visade en icke-signifikantskillnad avseende etisk bedömning under risk mellan individuella beslutsfattare och beslutsfattare i grupp. Det syns inte heller någon skillnad mellan etisk bedömning beroende på patienternas ålder (avseende bedömning mellan två barn). Som förväntat kunde man dock se en tydlig etisk grundprincip kring att patienter som är barn får hjälp innan patienter som är vuxna. / Ethical decision-making can come with several difficulties that include contradictory goals around maximizing efficiency or maximizing fairness. This quantitative survey study aimed to investigate whether an ethical judgement under risk differed between groups and individuals regarding a specific ethical aid-dilemma. The structure of the study was made around a fictitious aid-dilemma in which two patients required medical aid. The study consisted of two parts with two similar aid-dilemmas, where age was the main difference (children vs. adults). The first part compared groups and individuals’ ethical judgement under risk. Part two compared individuals’ ethical assessment under risk depending on the age of pediatric patients. First off, the participants of this study needed to prioritize which patient should receive medical aid first. In a follow-up question, a risk factor was added, in the form of that one of the patients (the highest priority) was given a low probability of having a successful surgery. The participants then needed to assess the likelihood of a successfuloperation on the second patient in order to prioritize them over the first patient. A total of 99 students (18-19 years old), from five different classes in year three (from the economics program at a college in Western Sweden), participated in this study. The results showed a non-significant difference between the ethical judgement under risk between individual decision-makers and group decision-makers. Neither could a difference between the ethical judgement depending on the patient's age (regarding assessment between two children) be seen, however, as predicted there was a clear ethical basic principle regarding patients age (children vs. adults) where the majority of participants would choose to help the child before the adult.
269

United Nations and the Yazidi : A Discourse Analysis on Arguments Around Intervention

Stone, Sarah January 2022 (has links)
Since 1948, the United Nations (UN) has been tasked with trying to prevent genocides yet when it comes to providing militaristic intervention, the UN fails to act. This thesis explored why the UN did not intervene militarily in the Yazidi genocide of 2014 through analyzing the arguments in source documents from the UN bodies of the Secretary-General, Human Rights Council, and Security Council. This research utilized the international relations theories of liberalism and realism and was conducted through the method of discourse analysis through using codes in MAXQDA. Primary sources of UN documents and secondary sources in the field of intervention research, Yazidi research, and documentary sources of the conflict were used to uncover the reason the UN did not authorize military intervention. Through using the theories of liberalism and realism, the sources showed that the UN bodies were conscious of the human suffering and prioritized sending humanitarian aid in the form of supplies, sending fact-finding missions to investigate the conflict, and supporting local and regional organizations over international military intervention. The reason for this is due to an emphasis on protecting human rights from the Human Rights Council and a protection of sovereignty and resources from the Security Council. These findings both support and add to previous literature on intervention and the Yazidi genocide, however, there needs to be more research done both on the interaction of UN bodies and the Yazidi genocide.
270

Simulering och analys av attacker riktade mot datalänklagret

Jemmo, Mohamad, Laresé, Kaler January 2022 (has links)
OSI-modellens lager möjliggör kommunikation mellan nätverksenheter, men de kan också öppnaupp för attacker, eftersom det är svårare att upptäcka attacker mellan lager än attacker som skerdirekt på det lagret [1]. En attack på ett lager kan därmed öppna upp för attacker på andra lager.Vanligen är OSI-modellens nätverkslager den svagaste länken, men även OSI-modellensdatalänklager (lager 2) kan vara den svagaste länken som kan orsaka större sårbarheter i nätverket.Tidigare studier [1, 2, 3] pekar på att det är relativt enkelt att genomföra attacker på lager 2 ochbetonar vikten av lager 2-säkerhet. Vidare uppmuntrar de till att implementera säkerhetsåtgärdersamt att simulera lager 2-attacker för att skapa en större förståelse för dessa attacker. Det härarbetet syftar till att öka medvetenheten om vikten av att skydda lager 2 med utgångspunkt i sjuattacker som enligt Pearson är de vanligaste [4]. Attackerna är: STP-attack, ARP spoofing, MACspoofing, MAC flooding, CDP/LLDP reconnaissance, VLAN hopping och DHCP spoofing. Iarbetet implementerades attackerna och dess motmedel, attackerna implementerades med hjälp avKali Linux och dess attackverktyg Yersinia, Dsniff (Macof), Macchanger, Ettercap ochanalysverktyget Wireshark. Det gjordes i syfte att kunna presentera konsekvenserna av dessaattacker och effekter av dess motmedel, påvisa vikten av att implementera säkerhetsåtgärder, ochatt skapa förståelse för allvaret i konsekvenserna av dessa attacker. Resultatet pekar på att det ärenkelt att manipulera ett oskyddat nätverk med attackverktygen och guiderna som användes, utanatt behöva förstå de bakomliggande processerna för attacker. Resultatet visade att angriparensenhet kunde snappa upp nätverkstrafik och skicka manipulerade paket till attackmålet. Vidarepekade de uppvisade effekterna av säkerhetsåtgärderna på att manipuleringen av nätverket kundeförhindras. Sammanhanget visar att implementationer av säkerhetsåtgärderna mot attackerna ärnödvändiga i ett oskyddat nätverk. / OSI seven-layers model enables the communication between network devices, but they can alsoopen up for other attacks, because it is more difficult to detect attacks that do not occur directly onthe same layer [1]. Thereby an attack on one layer can open up attacks on other layers. Typically,the OSI model's network layer is the weakest link, but the OSI model's data link layer (layer 2) canalso be the weakest link that can cause network vulnerabilities. Previous studies [1, 2, 3] indicatethat it is relatively easy to implement attacks on layer 2 and emphasize the importance of layer 2security. They encourage the implementation of security measures and the simulation of layer 2attacks to create the best understanding of these attacks. This work aims to raise awareness of theimportance of protecting layer 2 based on seven attacks that, according to Pearson, are the mostcommon [4]. The attacks are: STP attack, ARP spoofing, MAC spoofing, MAC flooding, CDP /LLDP reconnaissance, VLAN hopping and DHCP spoofing. In the work, the attacks and theirsecurity measures were implemented, the attacks were implemented by using Kali Linux and itsattack tools such as Yersinia, Dsniff (Macof), Macchanger, Ettercap and the analysis toolWireshark. The purpose of this was to be able to present the consequences of these attacks and theeffects of security measures, demonstrate the importance of implementing security measures, andcreate an understanding of the seriousness of the consequences of these attacks. The resultsindicate that it is easy to manipulate an unprotected network with the attack tools and guides thatare used, without having to understand the underlying processes of attacks. The results showedthat the attacker's device could intercept network traffic and send manipulated packets to the deviceto be attacked. Furthermore, the effects of the security measures indicated that the manipulation ofthe network could be prevented. The context shows that implementations of the security measuresagainst the attacks are necessary for an unprotected network.

Page generated in 0.1801 seconds