Essays about: "hidden information"
Showing result 1 - 5 of 222 essays containing the words hidden information.
-
1. Named Entity Recognition for Detecting Trends in Biomedical Literature
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : The number of publications in the biomedical field increases exponentially, which makes the task of keeping up with current research more and more difficult. However, rapid advances in the field of Natural Language Processing (NLP) offer possible solutions to this problem. READ MORE
-
2. Mind The Gap Between Your Intelligence And Choice Architecture
University essay from Göteborgs universitet/Graduate SchoolAbstract : Digital footprints of online behaviour are now possible to gather through the use of cookies. As a result, consumer activities once considered private are now monitored and used by online businesses and marketers, providing them with information about who we are, what we think, and what we like. READ MORE
-
3. Navigating the Risks of Dark Data : An Investigation into Personal Safety
University essay from Linnéuniversitetet/Institutionen för informatik (IK)Abstract : With the exponential proliferation of data, there has been a surge in data generation fromdiverse sources, including social media platforms, websites, mobile devices, and sensors.However, not all data is readily visible or accessible to the public, leading to the emergence ofthe concept known as "dark data. READ MORE
-
4. Digital Wars: #GuacamayaLeaks and the rise of hacktivism in technopolitics : A netnography to understand the complexity of digital communication processes.
University essay from Jönköping University/HLK, Communication, Culture and Diversity (CCD); Jönköping University/HLK, Medie- och kommunikationsvetenskap; Jönköping University/Sustainability Education Research (SER)Abstract : This master thesis explores the dynamics of information flows between the hacktivist group Guacamaya, media outlets and social media users. The study aims to understand the role of various social actors within the digital space such as media outlets, journalists, bots, and trolls, in shaping public opinion and the overall effectiveness of the group's communication activities. READ MORE
-
5. Intrusion Detection in IT Infrastructures using Hidden Markov Models
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the past decades, cloud based services have developed rapidly. And as a result, cybercrimehas increased in sophistication as well as frequency. It therefore becomes vital to have solidprotection against such attacks, especially for infrastructures containing sensitive information. READ MORE