Essays about: "logging companies"

Showing result 1 - 5 of 43 essays containing the words logging companies.

  1. 1. ML implementation for analyzing and estimating product prices

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Abel Getachew Kenea; Gabriel Fagerslett; [2024]
    Keywords : Machine Learning; ML; Regression; Deep Learning; Artificial Neural Network; ANN; TensorFlow; ScikitLearn; CUDA; cuDNN; Estimation; Prediction; AI; Artificial Intelligence; Price Tracking; Price Logging; Price Estimation; Supervised Learning; Random Forest; Decision Trees; Batch Learning; Hyperparameter Tuning; Linear Regression; Multiple Linear Regression; Maskininlärning; Djup lärning; Artificiellt Neuralt Nätverk; Regression; TensorFlow; SciktLearn; ML; ANN; Estimation; Uppskattning; CUDA; cuDNN; AI; Artificiell Intelligens; pris loggning; pris estimation; prisspårning; Batchinlärning; Hyperparameterjustering; Linjär Regression; Multipel Linjär Regression; Supervised Learning; Random Forest; Decision Trees;

    Abstract : Efficient price management is crucial for companies with many different products to keep track of, leading to the common practice of price logging. Today, these prices are often adjusted manually, but setting prices manually can be labor-intensive and prone to human error. READ MORE

  2. 2. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  3. 3. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Ekblom; Jacob Karlén; [2023]
    Keywords : process mining; workflow mining; data mining; radiology; PACS;

    Abstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE

  4. 4. Hur användbara är apparna Arboreal och Trestima för en virkesköpare vid skogsinventering?

    University essay from SLU/School for Forest Management

    Author : Viktor Berg; [2023]
    Keywords : skogsbruk; utveckling; digitalisering;

    Abstract : Ett aktiebolags viktigaste uppgift är att ge hög avkastning till sina aktieägare. Skogsbolagen har som mål att maximera värdeutnyttjande av sin skogsråvara. För att få en uppfattning om rotstående lager måste skogsbolagen inventera sitt skogsinnehav och kontrakterade avverkningsrätter. READ MORE

  5. 5. The Iterative Development Method : Its aspects and effect on innovation within new product development

    University essay from Uppsala universitet/Industriell teknik

    Author : Karl Jörgen Blakstad; Oskar Tingsborg; [2023]
    Keywords : Iterative development; Innovation; Product development; Project management; Action research;

    Abstract : An industrial product development project can be extensive and put a significant financial strain on the company that executes it, especially if the developed product underperforms. For startup companies this becomes considerably noticeable since they often have limited resources with respect to capital and personnel. READ MORE