Essays about: "implementation result"

Showing result 1 - 5 of 2038 essays containing the words implementation result.

  1. 1. ML implementation for analyzing and estimating product prices

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Abel Getachew Kenea; Gabriel Fagerslett; [2024]
    Keywords : Machine Learning; ML; Regression; Deep Learning; Artificial Neural Network; ANN; TensorFlow; ScikitLearn; CUDA; cuDNN; Estimation; Prediction; AI; Artificial Intelligence; Price Tracking; Price Logging; Price Estimation; Supervised Learning; Random Forest; Decision Trees; Batch Learning; Hyperparameter Tuning; Linear Regression; Multiple Linear Regression; Maskininlärning; Djup lärning; Artificiellt Neuralt Nätverk; Regression; TensorFlow; SciktLearn; ML; ANN; Estimation; Uppskattning; CUDA; cuDNN; AI; Artificiell Intelligens; pris loggning; pris estimation; prisspårning; Batchinlärning; Hyperparameterjustering; Linjär Regression; Multipel Linjär Regression; Supervised Learning; Random Forest; Decision Trees;

    Abstract : Efficient price management is crucial for companies with many different products to keep track of, leading to the common practice of price logging. Today, these prices are often adjusted manually, but setting prices manually can be labor-intensive and prone to human error. READ MORE

  2. 2. Behavioural response in pigs at gas stunning in foam

    University essay from SLU/Dept. of Animal Environment and Health

    Author : Madeleine Persson; [2024]
    Keywords : stunning methods; slaughter; animal welfare; carbon dioxide; high-expansion foam; nitrogen; argon;

    Abstract : There are several stunning methods used for the commercial slaughter of pigs. The two most common are electric stunning and stunning with carbon dioxide gas. It has been shown that there are several problems related to animal welfare in the stunning methods used today in commercial slaughter. READ MORE

  3. 3. Global Framework Agreements - A solution to fill the vacuum of global labour law?

    University essay from Lunds universitet/Institutionen för handelsrätt

    Author : Anna Larsson; Hanna Engblom; [2024]
    Keywords : Globalisation; Global framework agreements; International framework agreements; Multinational enterprises; Global union federations; Global supply chain; Law and Political Science;

    Abstract : The phenomenon of global framework agreements has emerged through the difficulties of regulating the global labour market where the multinational enterprises' operations have been driven by an economic agenda and profit. The challenges of creating transnational legislation have brought social actors, such as the United Nations and the International Labour Organisation, to initiate self-regulatory instruments. READ MORE

  4. 4. Implementation of an action library : Implementation of a Manipulation Action library for UR3e Robot Arm

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Fredrik Lundborg; [2024]
    Keywords : Robotics; Dynamic Movement Primitives; Action Library;

    Abstract : This thesis aims to parameterize and generalize functions for robotic use. The goal is to simplify the usage of robot arms. This thesis explores robot functionalities within the theme of simple cooking tasks. The functions explored are cutting objects, stirring bowls and pick and place. READ MORE

  5. 5. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE