Sökning: "digital collection"
Visar resultat 6 - 10 av 214 avhandlingar innehållade orden digital collection.
6. Value Network Transformation : Digital Service Innovation in the Vehicle Industry
Sammanfattning : Advancement in digital technology is rapidly changing the contemporary landscape of business and associated networks for manufacturing firms. Many traditional physical products are now being embedded with digital components, providing them digital capability to become digitized products. LÄS MER
7. Designs for Learning in an Extended Digital Environment : Case Studies of Social Interaction in the Social Science Classroom
Sammanfattning : This thesis studies designs for learning in the extended digital interface in the Social Science classroom. The aim is to describe and analyse how pupils interact, make meaning and learn while deploying digital learning resources. Together with the thesis a multimodal design theoretical perspective on learning has developed: Designs for Learning. LÄS MER
8. Digital Technologies for Enabling Smart Production : Examining the Aspects of Selection and Integration
Sammanfattning : With the development towards Industry 5.0, manufacturing companies are developing towards smart production. In smart production, data is used as a resource to interconnect different elements in the production system to learn and adapt to changing production conditions. LÄS MER
9. Mapping the Landscape of Digital Game-Based Learning in Swedish Compulsory and Upper Secondary Schools : Opportunities and Challenges for Teachers
Sammanfattning : Interest in the use of digital games in education has been increasing over the past few decades. Advocates argue that digital games are powerful learning tools with the potential to support increased motivational, cognitive, behavioural, affective, physiological and social outcomes. However, empirical evidence for their effectiveness is mixed. LÄS MER
10. On Adapting Data Collection to Intrusion Detection
Sammanfattning : Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and attacks from external penetrators. They can also detect both known and previously unknown attacks. These capabilities make them valuableassets in the protection of computer systems and networks. LÄS MER