Advanced search

Showing result 1 - 5 of 20 essays matching the above criteria.

  1. 1. En kritisk granskning av cykelnätet i Malmös innerstad utifrån ett brukarperspektiv

    University essay from SLU/Dept. of Landscape Architecture, Planning and Management (from 130101)

    Author : Klara Norén; [2023]
    Keywords : cykling; cykel; cykelolyckor; trafikplanering; trafiksäkerhet; mobilitet;

    Abstract : Uppsatsen utreder brister i Malmös cykelnät från ett brukarperspektiv genom en personlig cykling av alla redovisade cykelvägar i centrala Malmö. Undersökningen redovisas genom kartläggning av bristerna, redovisning av de olika vägtyper som cykelvägarna utgörs av samt en noggrannare granskning av de så kallade pendelstråken och dess kvaliteter. READ MORE

  2. 2. Product Solutions for Occupational Health and Safety Risks – A Digital Tool

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Julia Gårdestam; Sarah Nordh; [2023]
    Keywords : Work Environment; Risk Assessment; Product Proposal; Manual Handling; Digital Tool.; Arbetsmiljö; Riskbedömning; Produktförslag; Manuell hantering; Digitalt verktyg.;

    Abstract : Today, there are clearly defined directives and laws that regulate the work environment in Sweden, but despite this, there are still deficiencies in the work environment for companies. Physical work has a particularly high risk of developing occupational injuries, with heavy lifting being one of the contributing factors. READ MORE

  3. 3. Automatic Detection of Security Deficiencies and Refactoring Advises for Microservices

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Burak Ünver; [2023]
    Keywords : Microservices; Security; Kubernetes; Security Scanning Tools;

    Abstract : The microservice architecture enables organizationsto shorten development cycles and deliver cloud-native applicationsrapidly. However, it also brings security concerns thatneed to be addressed by developers. Therefore, security testingin microservices becomes even more critical. READ MORE

  4. 4. Identification of Child Maltreatment : A Systematic Literature Review on Professionals' Identification of Child Maltreatment and the Influencing Factors that Affect their Ability to Act.

    University essay from Jönköping University/HLK, CHILD

    Author : Jenny Karlsson; [2023]
    Keywords : Child maltreatment; child abuse; child neglect; professionals; identifying; child security; Barn; misshandel; försummelse; yrkesverksamma; identifiering; skyddsnät;

    Abstract : Several organizations actively work for children's rights to a safe and secure upbringing (WHO, 2022b; UNICEF, 2021). Despite this, over 1 billion children were exposed to physical, sexual, or psychological/emotional harm in 2021 (WHO, 2022c). READ MORE

  5. 5. Analysis of 5G Edge Computing solutions and APIs from an E2E perspective addressing the developer experience

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jitendra Manocha; [2021]
    Keywords : Edge Computing; MEC; 5G; Latency; URLLC; APIs; Network Exposure Function; ETSI MEC ISG; 3GPP SA6; Hyper-scale; OSBA; Open Service Broker API; Edge Computing; MEC; 5G; Latency; URLLC; APIs; Network Exposure Function; ETSI MEC ISG; 3GPP SA6; Web skala; Hyper-scale; OSBA; Open Service Broker API;

    Abstract : Edge Computing is considered one of the key capabilities in next generation (5G) networks, which will enable inundation of latency, throughput, and data sensitive edge-native applications. Edge application developers require infrastructure at the edge to host the application workload and network connectivity procedures to connect the application users to the nearest edge where the application workload is hosted. READ MORE