5 resultados para Cartographic updating
em Dalarna University College Electronic Archive
Resumo:
The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network. Vulnerability tests were conducted sequentially, when data from the survey was needed to continue the scan.A survey of the network was done and data in the form of operating system, among other things, were collected in the tables. A number of systems were selected from the tables and were scanned with Nessus. The result was a table across the network and a table of found vulnerabilities. The table of vulnerabilities has helped the organization to prevent these vulnerabilities by updating the affected computers. Also a wireless network with WEP encryption, which is insecure, has been detected and decrypted.
Resumo:
Over the years so many academic literatures has revealed that increased number of firms have seen internationalization as a means to gain and sustain competitive advantage and even increase economic of scale, and this has led many western companies to emerging markets. In this paper we discovered that among the pool of Swedish firms, only the MNEs have seen Nigerian market attractive to internationalize to, but just a few of the Swedish SMEs has expanded to the Nigerian market. This research was conducted by doing a qualitative study with the use of phenomenological research approach, during our investigation on the functions of intermediaries in Swedish SMEs internationalization to Nigeria market.Furthermore, we were able to understand the importance and functions of the different marketing intermediaries’ in Swedish SMEs internationalization to Nigeria market. These intermediaries equip the Swedish firms with the required objective knowledge of the Nigerian market, updating them with recent development of the opportunities and threats involved in the Nigerian marketing environment, and linking these Swedish firms to the required government departments, distributors, agent/broker, customers, middle men etc, thereby impacting them with the experiential knowledge. Moreover, it is important for firms to have objective or pre-market knowledge of a particular market before entering that market, but this knowledge is regarded as non-helpful knowledge to firms. But the experiential knowledge is acquired over time in the market, which is regarded as the helpful knowledge. It is evident that the intermediaries equip these firms with both objective and experiential knowledge.Although the opportunities in some emerging markets are very attractive, but the threats in these markets are other factors firms also put into consideration before internationalizing to these markets. This is why thorough market research has to be done so that firms can create effective marketing strategies when they want to expand their marketing activities to emerging markets. Despite the risk and uncertainties involved in doing business in foreign countries, still yet companies selling global products do not have any choice than to internationalize their marketing operations.
Resumo:
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. There are many transmission media to transfer the data to destination like e-mails; at the same time it is may be easier to modify and misuse the valuable information through hacking. So, in order to transfer the data securely to the destination without any modifications, there are many approaches like cryptography and steganography. This paper deals with the image steganography as well as with the different security issues, general overview of cryptography, steganography and digital watermarking approaches. The problem of copyright violation of multimedia data has increased due to the enormous growth of computer networks that provides fast and error free transmission of any unauthorized duplicate and possibly manipulated copy of multimedia information. In order to be effective for copyright protection, digital watermark must be robust which are difficult to remove from the object in which they are embedded despite a variety of possible attacks. The message to be send safe and secure, we use watermarking. We use invisible watermarking to embed the message using LSB (Least Significant Bit) steganographic technique. The standard LSB technique embed the message in every pixel, but my contribution for this proposed watermarking, works with the hint for embedding the message only on the image edges alone. If the hacker knows that the system uses LSB technique also, it cannot decrypt correct message. To make my system robust and secure, we added cryptography algorithm as Vigenere square. Whereas the message is transmitted in cipher text and its added advantage to the proposed system. The standard Vigenere square algorithm works with either lower case or upper case. The proposed cryptography algorithm is Vigenere square with extension of numbers also. We can keep the crypto key with combination of characters and numbers. So by using these modifications and updating in this existing algorithm and combination of cryptography and steganography method we develop a secure and strong watermarking method. Performance of this watermarking scheme has been analyzed by evaluating the robustness of the algorithm with PSNR (Peak Signal to Noise Ratio) and MSE (Mean Square Error) against the quality of the image for large amount of data. While coming to see results of the proposed encryption, higher value of 89dB of PSNR with small value of MSE is 0.0017. Then it seems the proposed watermarking system is secure and robust for hiding secure information in any digital system, because this system collect the properties of both steganography and cryptography sciences.
Resumo:
Bakgrund: Många patienter har behov av palliativ vård innan de avlider. I Sverige finns idag flera olika alternativ för specialiserad palliativ vård. Dessa räcker dock inte till för att vårda alla palliativa patienter vilket leder till att sjuksköterskor som arbetar på somatiska vårdavdelningar på sjukhus ofta möter dessa patienter. Syfte: Att beskriva sjuksköterskors upplevelser av att ge palliativ vård till patienter som vårdas på somatiska vårdavdelningar. Metod: Studien genomfördes som en litteraturöversikt där 15 artiklar ingick i resultatet. Datainsamling har gjorts i databaserna Cinahl, PubMed och Web of Science. Resultat: Sjuksköterskor upplevde att kommunikationen vid vård av palliativa patienter var svår på flera sätt. Rädsla att bemöta existentiella frågor, tidsbrist och en dysfunktionell kommunikation mellan vårdpersonal upplevdes som svårigheter för sjuksköterskorna. Detta ledde till att sjuksköterskor upplevde ett stort behov av utbildning och kompetensutveckling. Slutsats: Ett stort utbildningsbehov finns hos sjuksköterskor då de upplever många svårigheter i att vårda palliativt. För att kunna utveckla denna vårdform på somatiska avdelningar behövs mer utbildning och forskning inom området.
Resumo:
This thesis presents a system to recognise and classify road and traffic signs for the purpose of developing an inventory of them which could assist the highway engineers’ tasks of updating and maintaining them. It uses images taken by a camera from a moving vehicle. The system is based on three major stages: colour segmentation, recognition, and classification. Four colour segmentation algorithms are developed and tested. They are a shadow and highlight invariant, a dynamic threshold, a modification of de la Escalera’s algorithm and a Fuzzy colour segmentation algorithm. All algorithms are tested using hundreds of images and the shadow-highlight invariant algorithm is eventually chosen as the best performer. This is because it is immune to shadows and highlights. It is also robust as it was tested in different lighting conditions, weather conditions, and times of the day. Approximately 97% successful segmentation rate was achieved using this algorithm.Recognition of traffic signs is carried out using a fuzzy shape recogniser. Based on four shape measures - the rectangularity, triangularity, ellipticity, and octagonality, fuzzy rules were developed to determine the shape of the sign. Among these shape measures octangonality has been introduced in this research. The final decision of the recogniser is based on the combination of both the colour and shape of the sign. The recogniser was tested in a variety of testing conditions giving an overall performance of approximately 88%.Classification was undertaken using a Support Vector Machine (SVM) classifier. The classification is carried out in two stages: rim’s shape classification followed by the classification of interior of the sign. The classifier was trained and tested using binary images in addition to five different types of moments which are Geometric moments, Zernike moments, Legendre moments, Orthogonal Fourier-Mellin Moments, and Binary Haar features. The performance of the SVM was tested using different features, kernels, SVM types, SVM parameters, and moment’s orders. The average classification rate achieved is about 97%. Binary images show the best testing results followed by Legendre moments. Linear kernel gives the best testing results followed by RBF. C-SVM shows very good performance, but ?-SVM gives better results in some case.