Essays about: "Michał"
Showing result 1 - 5 of 56 essays containing the word Michał.
-
1. Postdevelopment Assistance Made Possible? A Qualitative Analysis of the ICLD’s International Training Programmes in Tanzania from the Local Stakeholders’ Perspective
University essay from Lunds universitet/Graduate SchoolAbstract : Development is a contentious concept, praised by some for enabling progress and criticised by others for perpetuating global power imbalances. Development assistance tends to strengthen the donor-recipient dependency, which, according to critics, primarily serves the interests of the Global North while neglecting the needs of the Global South. READ MORE
-
2. Redesign of a tribological pin-on-disc machine
University essay from KTH/Maskinkonstruktion (Inst.)Abstract : In contradistinction with road transport exhaust particulate matter (PM) emission, non-exhaust PM emission has not decreased substantially in recent years. One source of non-exhaust PM emission is studded tyre-pavement contact. READ MORE
-
3. Identifying success factors in mHealth for diabetes self-management
University essay from Lunds universitet/Institutionen för informatikAbstract : Diabetes if not managed properly may have severe health implications. Mobile applications that support its management have been developed, however, little research has examined their success. The aim of this mixed-methods study is to identify success factors of such applications from the users` perspective. READ MORE
-
4. Exploring a Two Higgs Doublet Model with a U(1) Family Symmetry and a Complex Singlet
University essay from Lunds universitet/Institutionen för astronomi och teoretisk fysik - Genomgår omorganisationAbstract : In this project a two Higgs doublet model with a complex singlet and an extra family symmetry providing a mechanism for suppression of flavor changing neutral currents is explored. The goal is to investigate the phenomenological consistency of the model using a custom software framework. READ MORE
-
5. Implementing Honeypots to Build Risk Profiles for IoT Devices in a Home-Based Environment
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Honeypots have been implemented in network security for years now, from the simplesystems where they could only mimic one vulnerable service and gather information aboutan intruder they have morphed in to advanced and complicated environments.Unfortunately, hackers have not left that untouched, and constantly try to detect honeypotsbefore being caught. READ MORE