Essays about: "Network Analyst"
Showing result 6 - 10 of 22 essays containing the words Network Analyst.
-
6. Deep and Machine Learning on Imaging Flow Cytometry
University essay from Uppsala universitet/Institutionen för farmaceutisk biovetenskapAbstract : Cell painting uses fluorescent agents to label the compositions or organelles of cells to evoke morphological profiling. Imaging flow cytometry (IFC) is a multi-channel imaging technique to acquire individual cell images, including the brightfield and multiple single fluorescence channels. READ MORE
-
7. Eco-route modelling using GIS : How to find the most sustainable route option
University essay from Umeå universitet/Institutionen för geografiAbstract : In a time when the concept of sustainability is gaining increasing attention among the public, as well as among stake holders and policy makers, informing people about what the most sustainable choice to make is, is crucial in leading people in the right direction. Travelling is an activity requiring a traveller to make multiple choices, with one of the choices being which route between two places to take. READ MORE
-
8. West, East or South, which Railway in Hudiksvall is Preferable? : A Predictive Study of Future Climate Scenarios from an Accessibility Perspective
University essay from Umeå universitet/Institutionen för geografiAbstract : An expansion of the railway, East Coast Line is essential in order to ensure transportation of passenger and goods back and forth to Northern Sweden. The preliminary studies of the planned expansion to a double track have identified vulnerabilities linked to how our climate changes. READ MORE
-
9. Deep Learning-Based Traffic Classification for Network Penetration Testing
University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)Abstract : With the increasing amount of computers in society, the need to test and evaluate security of these are crucial to prevent various cyberattacks. During a penetration test, a common methodology to follow is OSSTMM. Sometimes this method can not be followed in whole. READ MORE
-
10. Semi-automated hardening of networks based on security classifications
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Conducting risk assessments is a vital part of securing information systems. The task of conducting risk assessments is a time-consuming and costly task for organizations. Thus different security control frameworks have been created to assist in the process. READ MORE