Advanced search

Showing result 1 - 5 of 371 essays matching the above criteria.

  1. 1. Implementation of Level of Development for BIM Collaboration in Timber Building Subsystems Design: A Case Study of I-Joist Construction Elements

    University essay from Luleå tekniska universitet/Institutionen för samhällsbyggnad och naturresurser

    Author : Isabell Gustafsson; [2024]
    Keywords : BIM; I-Joist; LOD; Level of Development; Timber Building Subsystems;

    Abstract : Due to time, cost, and environmental challenges, wood has become a more common building material even for more complex buildings. Implementing the concept of Level of Development (LOD) on timber structures could provide a tool for BIM collaboration that may save cost and time, and in the early stages mediate wood as an available building material. READ MORE

  2. 2. State Machine Model-To-Code Transformation In C

    University essay from Uppsala universitet/Signaler och system

    Author : Jonathan Carlgren; Per William Oskarsson; [2023]
    Keywords : State Machine; Model To Code; C; UML; ElementTree; XMI; Programming; Python; Benchmark;

    Abstract : A state machine model can turn a complex behavioural system into a more accessible graphical model, and can improve the way people work with system design by making it easier to communicate and understand the system. The clear structure of a state machine model enables automatic generation of well structured, and consequently readable, and maintainable code. READ MORE

  3. 3. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  4. 4. Potential Futures of Social Media : A Speculative Design Approach to Instagram

    University essay from Malmö universitet/Institutionen för konst, kultur och kommunikation (K3)

    Author : Viggo Hasselquist; [2023]
    Keywords : Interaction design; Speculative design; Social media; Instagram; User experience; User habits;

    Abstract : Instagram has around two billion registered users at the time of writing. This puts a lot of responsibility on interaction designers as they implement changes to the user experience. READ MORE

  5. 5. Solutions for presence detection in an intercom door station

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Anton Bengtsson; Måns Andreasson; [2023]
    Keywords : presence detection; sensor technology; PIR; ultrasonic; radar; intercom; Technology and Engineering;

    Abstract : In this work, different solutions for human presence detection in a door intercom device are examined. The study was conducted at a company in Lund, Sweden. READ MORE