Essays about: "log in"
Showing result 21 - 25 of 686 essays containing the words log in.
-
21. The effect of covid-19 announcement on sustainable investment portfolios : Observation of the flight-to-quality phenomenon
University essay from Jönköping University/Internationella HandelshögskolanAbstract : The economic impact of the COVID-19 pandemic is still an ongoing topic, broadly analysed and discussed in many studies. Recent articles state that sustainable assets can offer return volatility resilience during demand shock events and, in some cases, provide higher returns than their unsustainable counterparts. READ MORE
-
22. Beståndsanpassad aptering: metodutveckling och utfallsprövning : effekter av varierande längdstyrning i egenskapsskilda beståndsgrupper
University essay from SLU/Department of Forest Biomaterials and Technology (from 131204)Abstract : Idag är tillgången till skogliga data mycket stor. En bidragande faktor till detta är insamlingen av data vid maskinell avverkning. Denna datamängd används i stor utsträckning för bland annat produktionsuppföljning men med viss bearbetning kan de användas för att digitalt återskapa den avverkade skogen. READ MORE
-
23. Exchange Rate Analysis Between the U.S. Dollar and the Japanese Yen
University essay from Uppsala universitet/Statistik, AI och data scienceAbstract : The exchange data between the U.S. Dollar and Japanese Yen are analyzed with three models called the Auto-Regressive Integrated Moving- Average (ARIMA) model, the Generalized Auto-Regressive Conditional Heteroscedastic (GARCH) model, and the Fractional Differencing model. READ MORE
-
24. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles
University essay from KTH/Hälsoinformatik och logistikAbstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE
-
25. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE