Essays about: "EXAMPLES OF INFORMATION TECHNOLOGY"
Showing result 1 - 5 of 203 essays containing the words EXAMPLES OF INFORMATION TECHNOLOGY.
-
1. Improving Value Proposition by Structuring Product Information Flow
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : This thesis investigates the impact management of product information has on the well-studied concepts of value propositions and business model innovation. Previously, it was not sufficiently documented how this type of information influences these concepts. READ MORE
-
2. User-Centered Methods on Established Products : Developing a methodology to align already established products to a user-centered approach
University essay from Umeå universitet/Institutionen för tillämpad fysik och elektronikAbstract : With the increasing demand for usability, it is crucial for organizations to understand their users’ needs and align their products to a more user-centered approach. However, due to increasing demands for usability, many companies may find it difficult to hire new UX personnel to quickly fix their issues. READ MORE
-
3. Anomaly detection in surveillance camera data
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE
-
4. Cell Identification from Microscopy Images using Deep Learning on Automatically Labeled Data
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In biology, cell counting provides a fundamental metric for live-cell experiments. Unfortunately, most researchers are constrained to using tedious and invasive methods for counting cells. Automatic identification of cells in microscopy images would therefore be a valuable tool for such researchers. READ MORE
-
5. Collecting Cyber Traces : Adding Forensic Evidence In Threat Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : There is a rising concern about cyber security as both industry and individuals depend increasingly on the Internet. Threat modeling and attack simulations are the main approaches for the security analyst to examine the universal reliability of Information Technology infrastructures. READ MORE