Essays about: "Specified research question"

Showing result 1 - 5 of 34 essays containing the words Specified research question.

  1. 1. Unveiling Socioeconomic Disparities in Finnish ICT Sector Sustainability Reporting : A Thematic Analysis of the Digital Divide in Sustainable Development Discourse

    University essay from Linnéuniversitetet/Institutionen för kulturvetenskaper (KV)

    Author : Maria Frostbark; [2023]
    Keywords : sustainable development; digital divide; corporate responsibility; information and communication technology;

    Abstract : This research analyzes Finnish information and communication technology companies' sustainability principles with an emphasis on themes related to social sustainability. A broader focus is given to researching how class, education level, and low-income-related perspectives have been taken into account. READ MORE

  2. 2. Automatic overcurrent and leakage current sensing in multiple channel NMES systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Malin Otter; Bashar Jamal Pati; [2023]
    Keywords : Neuromuscular Electrical Stimulation; Current monitoring; Overcurrent sensing; Leakage current sensing; Embedded systems; Instrumentation amplifier; Neuromuskulär elektrisk stimulering; Strömmätning; Överström detektering; Läckström detektering; Inbyggda system; Instrumentförstärkare;

    Abstract : This report presents the development, implementation, and testing of a current monitor system that is specifically developed for testing a neuromuscular electrical stimulation system (NMES). The NMES system, developed by KTH and its academic and industrial partners Karolinska institute and Matrix Muscle Support, incorporates advanced features aimed at preventing cardiovascular diseases. READ MORE

  3. 3. Testing for verification and validation of an onboard orbit determination system exploiting GNSS : A nanosatellite application for HERMES-SP

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Clara Nermark; [2023]
    Keywords : Onboard orbit determination system; GNSS; nanosatellite; testing; verification and validation; Ombord banbestämning; GNSS; nanosatellit; testning; verifikation och validering;

    Abstract : When developing products for space, including nanosatellites, the verification and validation process is a mandatory part of any project conducted within the European space industry. Within such a process, testing is a method for verification and validation. READ MORE

  4. 4. The Relationship Between Vertical Integration and Risk. A Statistical Analysis of Changes in Vertical Integration within Industries Affected by the Global Semiconductor Shortage

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Dorotea Brsakoska; Annika Ebert; Bohdan Pavlov; [2022]
    Keywords : vertical integration; systemic risk; MNCs; semiconductor-reliant industries; semiconductor shortage; TCE; Business and Economics;

    Abstract : Succeeding a brief discussion of what vertical integration (VI) is, its interaction with risk and uncertainty, and the context of this study, namely the COVID-19 pandemic and its simultaneous semiconductor shortages, the purpose of this paper is outlined to fill a research gap regarding an empirically supported relationship between vertical integration and systemic risk. The aim and contribution here is subsequently twofold: to examine whether one can predict strategic trends and behavior among multinational companies when it comes to value chain ownership and control decisions in response to abnormal levels of systemic risk, and, to more generally statistically prove or disprove the seeming theoretical consensus that vertical integration can be a key risk-reduction strategy for various reasons, something that will be detailed and explored more closely in an extensive literature review. READ MORE

  5. 5. Masquerader Detection via 2fa Honeytokens

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Anton Wiklund; [2021]
    Keywords : Cyber security deception; two-factor authentication 2fa ; honeytoken; misinformation; intrusion detection;

    Abstract : Detection of insider threats is vital within cybersecurity. Techniques for detection include honeytokens, which most often are resources that, through deception, seek to expose intruders. One kind of insider that is detectable via honeytokens is the masquerader. READ MORE