Essays about: "Data security"

Showing result 11 - 15 of 1808 essays containing the words Data security.

  1. 11. Groundwater Modelling in southeast Cambodia - Facing irrigation and groundwater level changes during a pandemic

    University essay from Lunds universitet/Avdelningen för Teknisk vattenresurslära

    Author : Svea Bertolatus; [2024]
    Keywords : Cambodia; GMS Modflow; Groundwater modelling; irrigation; Mekong; Prey Veng; Svay Rieng; Technology and Engineering; Earth and Environmental Sciences;

    Abstract : In the Mekong region, sustainable water resource management is a significant challenge for all countries involved. In Cambodia, where rice production is crucial for household food security and export, groundwater is increasingly used for irrigation during the dry season, leading to higher rice yields. READ MORE

  2. 12. Classifying femur fractures using federated learning

    University essay from Linköpings universitet/Statistik och maskininlärning

    Author : Hong Zhang; [2024]
    Keywords : Atypical femur fracture; Federated Learning; Neural Network; Classification;

    Abstract : The rarity and subtle radiographic features of atypical femoral fractures (AFF) make it difficult to distinguish radiologically from normal femoral fractures (NFF). Compared with NFF, AFF has subtle radiological features and is associated with the long-term use of bisphosphonates for the treatment of osteoporosis. READ MORE

  3. 13. Linking for Peace. An affordance perspective of LinkedIn as an instrument for peace professionals to advance constructive conflict resolution and transformative efforts

    University essay from Institutionen för tillämpad informationsteknologi

    Author : Jasmine Traore; [2023-11-22]
    Keywords : Affordances; Human Computer Interaction HCI ; Peace and Conflict Research;

    Abstract : Has LinkedIn become the platform for a global community of practice for peace professionals? Does it have the potential to be? An inductive approach to Reflexive Thematic Analysis (RTA) following Braun and Clarke’s six-phase methodology was used as an analytic instrument on empirical data from 13 semi-structured interviews with professionals in peace mediation, using the theoretical lens of affordances. The participants in the study were found to use LinkedIn to create and sustain meaningful connections globally and across sectors, learn from empirical knowledge, stories and insights from others and explore economic opportunities. READ MORE

  4. 14. Ensuring the Security of PyPI Packages

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : David Shakoori Gustafsson; [2023-10-23]
    Keywords : Computer science; Security; Python; PyPI; Typosquatting;

    Abstract : Developers often use open-source code libraries in order to achieve desired functionalities without needing to re-implement existing code. Python developers are no exceptions here, and frequently use the Python Package Index, PyPI, to download the specific code packages they want to use. READ MORE

  5. 15. A Case Study: Human Rights Violations in Gaza: A qualitative analysis of the UN’s responsibility under the principle of R2P to combat the violations of articles 3 & 13 of the UDHR in Gaza

    University essay from Göteborgs universitet/Institutionen för globala studier

    Author : Sara Aziz; [2023-10-18]
    Keywords : ;

    Abstract : This case study examines how the United Nations (UN) is responsible, in accordance with the concept of the Responsibility To Protect (R2P), for combating the violations of articles 3 and 13 of the Universal Declaration of Human Rights (UDHR) in Gaza. These articles entail the right to life, liberty and security of person (article 3) and the right to freedom of movement and residence (article 13). READ MORE