Essays about: "IT decision"

Showing result 11 - 15 of 4778 essays containing the words IT decision.

  1. 11. Local History Awareness : And its Influence on Young People in a Post-Communist Region

    University essay from Linnéuniversitetet/Institutionen för kulturvetenskaper (KV)

    Author : Marwan M. Hassan; [2024]
    Keywords : local history; place attachment; regional affiliation; regional pride; civic engagement; social trust; regional identity; mobile learning; mobile website; post-communist communities; retrospective qualitative interviews; Eberswalde; East Germany;

    Abstract : This project explores the impact of a mobile website (MWS) designed to enhance knowledge and interest in local history among residents of Eberswalde as a sample for an Eastern German post-communist city. It aims to strengthen the sense of regional identity and attachment, potentially affecting their decision to remain in or leave the region. READ MORE

  2. 12. A Call for Action: Placing Emergency on the Agenda : A Study on Irish Public Opinion and the Climate Emergency Declaration

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Magdalena Vestin; [2024]
    Keywords : ;

    Abstract : This study researches how public attitudes can affect policy, which is done by examining if climate change issues can be placed onto the agenda by actors outside of the policy process. The study centers on Ireland as the first nation to declare a climate emergency, with the UK taking the role of control group due to them not having made such a declaration. READ MORE

  3. 13. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  4. 14. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  5. 15. A Comparative Analysis of Whisper and VoxRex on Swedish Speech Data

    University essay from Uppsala universitet/Statistiska institutionen

    Author : Max Fredriksson; Elise Ramsay Veljanovska; [2024]
    Keywords : ASR; Automatic Speech Recognition; Swedish Speech Recognition; Speech Recognition Models; Speech-to-Text; Whisper; VoxRex; Wav2Vec; Model Comparison; Transformer Models; Neural Networks; Machine Learning; WER; Word Error Rate; Transcription;

    Abstract : With the constant development of more advanced speech recognition models, the need to determine which models are better in specific areas and for specific purposes becomes increasingly crucial. Even more so for low-resource languages such as Swedish, dependent on the progress of models for the large international languages. READ MORE