Advanced search

Showing result 1 - 5 of 694 essays matching the above criteria.

  1. 1. Explaining Gender-Based Political Funding: A quantitative cross-national analysis of the impact of electoral, political, and cultural factors on political funding

    University essay from Uppsala universitet/Statsvetenskapliga institutionen

    Author : Saba Muneer; [2024]
    Keywords : gender targeted public funding; gender quotas; cross national; gender and politics; political; electoral; cultural; regression analysis;

    Abstract : Despite global progress on gender equality, women continue to be underrepresented in politics. One widely debated policy measure aimed at tackling this issue is gendered public funding – which has been adopted in more than 30 countries worldwide yet remains understudied in the literature on gender and politics. READ MORE

  2. 2. Queering the Normal? : An intersectional study of gender identities and roles in the Late Iron Age cemeteries at Lovö, Sweden

    University essay from Uppsala universitet/Institutionen för arkeologi och antik historia

    Author : Leticia Tate; [2024]
    Keywords : Archaeology; Gender Studies; Queer Theory; Cemeteries; Burials; Iron Age; Scandinavia; Grave Goods; Intersectionality; Lovö; Identity; Arkeologi; genusvetenskap; queerteori; kyrkogårdar; begravningar; järnåldern; Skandinavien; gravgods; intersektionalitet; Lovö; identitet;

    Abstract : The purpose of this thesis is to analyse the relationship between grave goods and the identity of buried individuals. The interpretation of sex and gender, as well as gendered grave goods in Late Iron Age Scandinavia, is of a particular focus. READ MORE

  3. 3. Bridging Language & Data : Optimizing Text-to-SQL Generation in Large Language Models

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : Niklas Wretblad; Fredrik Gordh Riseby; [2024]
    Keywords : Chaining; Classification; Data Quality; Few-Shot Learning; Large Language Model; Machine Learning; Noise; Prompt; Prompt Engineering; SQL; Structured Query Language; Text-to-SQL; Zero-Shot Learning; Noise Identification;

    Abstract : This thesis explores text-to-SQL generation using Large Language Models within a financial context, aiming to assess the efficacy of current benchmarks and techniques. The central investigation revolves around the accuracy of the BIRD-Bench benchmark and the applicability of text-to-SQL models in real-world scenarios. READ MORE

  4. 4. Headfirst into shallow water - Wetland restoration and its contribution to the Habitats Directive

    University essay from Uppsala universitet/Växtekologi och evolution; Uppsala universitet/Institutionen för biologisk grundutbildning

    Author : Elin Brandt Korall; [2024]
    Keywords : Wetlands; GIS; Restoration; Rewetting; Ecology; LONA; Habitats Directive; Natura 2000; Nature conservation; Våtmarker; GIS; Geografiska informationssystem; Restaurering; Återvätning; LONA; Art- och Habitatsdirektivet; Natura 2000; Naturvård;

    Abstract : Located in the borderland between aquatic and terrestrial environments, the wetlands cover a wide spectrum of habitats and enable living standards for a great variety of organisms. Although important habitats, a great extent of the original wetlands have disappeared in Europe and Sweden due to anthropogenic disturbances. READ MORE

  5. 5. Time-based Key for Coverless Audio Steganography: A Proposed Behavioral Method to Increase Capacity

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : John Alanko Öberg; Carl Svensson; [2023]
    Keywords : Coverless audio steganography; information hiding; covert communication; effective capacity; behavioral; Täcklös ljudsteganografi; informationsdöljning; hemlig kommunikation; effektiv kapacitet; beteendemässig;

    Abstract : Background. Coverless steganography is a relatively unexplored area of steganography where the message is not embedded into a cover media. Instead the message is derived from one or several properties already existing in the carrier media. This renders steganalysis methods used for traditional steganography useless. READ MORE