Essays about: "EXAMPLES OF INFORMATION TECHNOLOGY"

Showing result 1 - 5 of 203 essays containing the words EXAMPLES OF INFORMATION TECHNOLOGY.

  1. 1. Improving Value Proposition by Structuring Product Information Flow

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Daniel Dahlström; Jacob Stark; [2023]
    Keywords : Value proposition; Business model innovation; Product information; Data structure; Management; Product lifecycle; Digitalization; Värdeerbjudande; Affärsmodellinnovation; Produktinformation; Datastruktur; Produktlivscykel; Digitalisering;

    Abstract : This thesis investigates the impact management of product information has on the well-studied concepts of value propositions and business model innovation. Previously, it was not sufficiently documented how this type of information influences these concepts. READ MORE

  2. 2. User-Centered Methods on Established Products : Developing a methodology to align already established products to a user-centered approach

    University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronik

    Author : Carla Roos Morales; [2023]
    Keywords : Usability; User Centered Design; Methodology; User Experience Research; Användbarhet; Användarcentrerad Design; Metodik; Undersökning av användarupplevelse;

    Abstract : With the increasing demand for usability, it is crucial for organizations to understand their users’ needs and align their products to a more user-centered approach. However, due to increasing demands for usability, many companies may find it difficult to hire new UX personnel to quickly fix their issues. READ MORE

  3. 3. Anomaly detection in surveillance camera data

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Viktoriia Semerenska; [2023]
    Keywords : Anomaly detection; Machine Learning; Supervised learning; Video Analytics; Artificial Intelligence;

    Abstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE

  4. 4. Cell Identification from Microscopy Images using Deep Learning on Automatically Labeled Data

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Fredrik Salomon-Sörensen; [2023]
    Keywords : Deep Learning; Cell Identification; Image Segmentation; Nuclei Segmentation; Convolutional Neural Networks; UNet; Image Analysis; Microscopy; Noisy Labels; Phase-Contrast; Automatic Labeling; Technology and Engineering;

    Abstract : In biology, cell counting provides a fundamental metric for live-cell experiments. Unfortunately, most researchers are constrained to using tedious and invasive methods for counting cells. Automatic identification of cells in microscopy images would therefore be a valuable tool for such researchers. READ MORE

  5. 5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Dingli Mao; [2023]
    Keywords : Threat Modeling; Security and Risk Analysis; Forensic Evidence; Domain Specific Language; hotmodellering; Säkerhet och riskanalys; Kriminaltekniska bevis; Domänspecifikt språk;

    Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE