Essays about: "förtroende."

Showing result 11 - 15 of 319 essays containing the word förtroende..

  1. 11. Geographic polarization and clustering of partisan voting: A local-level analysis of Stockholm Municipality

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Jonas Almén; [2023]
    Keywords : Geography; GIS; Spatial Analysis; Spatial Autocorrelation; MAUP; Electoral Geography; Political Polarization; Geographic Polarization; Stockholm Municipality; Earth and Environmental Sciences;

    Abstract : In the last decade, the topic of political polarization has become a growing concern within academic and public debate. Many highlight the linkage between increased political polarization and democratic problems such as political tribalism and uncivil activism. It is also argued to be a global phenomenon. READ MORE

  2. 12. Explainable AI for Multi-Agent Control Problem

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Hanna Prokopova; [2023]
    Keywords : ;

    Abstract : This report presents research on the application of policy explanation techniques in the context of coordinated reinforcement learning (CRL) for mobile network optimization. The goal was to improve the interpretability and comprehensibility of decision-making processes in multi-agent environments, with a particular focus on the Remote Antenna Tilt (RET) problem. READ MORE

  3. 13. Influencer Whitelisting & Dark Posts : A Cross-generational Study on Consumers’ Perception and Trust in Social Media Advertisement

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sofia Zangrande; [2023]
    Keywords : Influencer marketing; influencer whitelisting; dark posts; social media marketing; influencers; consumer perception; message trustworthiness; millennials; gen-z; gen-x; influencer; marknadsföring; sociala medier; konsumenternas uppfattning; meddelandets trovärdighet;

    Abstract : This paper investigates the perception of dark posts in influencer whitelisting (IWL) and their impact on consumers’ trust compared to other forms of sponsored content on social media. The study employed a mixed-methods approach involving a survey with open-ended questions to gather data from participants across different generational cohorts - GenZ, Millennials and Gen-X. READ MORE

  4. 14. Continuous Integration for Embedded Software with Modular Firmware Architecture

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fabian Segatz; [2023]
    Keywords : Continuous integration; Embedded software development; Modular firmware architecture; Jenkins; Software quality; Kontinuerlig integration; Inbyggd programvaruutveckling; Modulär fastvara arkitektur; Jenkins; Programvarukvalitet;

    Abstract : Continuous Integration (CI) techniques are widely adopted in web and application development but have received limited attention in the embedded software domain. This thesis investigates the application of CI techniques in embedded software development through a case study at Cobolt AB, a company specializing in optoelectronics. READ MORE

  5. 15. Diverse Double-Compiling to Harden Cryptocurrency Software

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Niklas Rosencrantz; [2023]
    Keywords : Trusting trust; Compiler security; Software Supply Chain; Trojan Horse; Cryptocurrency; Datasäkerhet; kompilator; datavirus; kryptovaluta; Trojansk häst;

    Abstract : A trusting trust attack is a special case of a software supply-chain attack. The project in this report, named diverse double-compiling for cryptocurrency (DDC4CC), demonstrates and explains a defense for cryptocurrency software against trusting trust attacks. READ MORE