Essays about: "log in"

Showing result 21 - 25 of 686 essays containing the words log in.

  1. 21. The effect of covid-19 announcement on sustainable investment portfolios : Observation of the flight-to-quality phenomenon

    University essay from Jönköping University/Internationella Handelshögskolan

    Author : Vladislovas Urbonavicius; Iulia Chirita; [2023]
    Keywords : Sustainable investment portfolio; ESG; Covid-19; Flight-to-quality; Market Shock; Cryptocurrency; Proof-of-stake; proof-of-work.;

    Abstract : The economic impact of the COVID-19 pandemic is still an ongoing topic, broadly analysed and discussed in many studies. Recent articles state that sustainable assets can offer return volatility resilience during demand shock events and, in some cases, provide higher returns than their unsustainable counterparts. READ MORE

  2. 22. Beståndsanpassad aptering: metodutveckling och utfallsprövning : effekter av varierande längdstyrning i egenskapsskilda beståndsgrupper

    University essay from SLU/Department of Forest Biomaterials and Technology (from 131204)

    Author : William Svederberg; [2023]
    Keywords : beståndsanpassad aptering; maskininlärning; produktionsstyrning;

    Abstract : Idag är tillgången till skogliga data mycket stor. En bidragande faktor till detta är insamlingen av data vid maskinell avverkning. Denna datamängd används i stor utsträckning för bland annat produktionsuppföljning men med viss bearbetning kan de användas för att digitalt återskapa den avverkade skogen. READ MORE

  3. 23. Exchange Rate Analysis Between the U.S. Dollar and the Japanese Yen

    University essay from Uppsala universitet/Statistik, AI och data science

    Author : Yuta Sakiyama; [2023]
    Keywords : ;

    Abstract : The exchange data between the U.S. Dollar and Japanese Yen are analyzed with three models called the Auto-Regressive Integrated Moving- Average (ARIMA) model, the Generalized Auto-Regressive Conditional Heteroscedastic (GARCH) model, and the Fractional Differencing model. READ MORE

  4. 24. Securing Sensitive Data in the Cloud: A New Era of Security Through Zero Trust Principles

    University essay from KTH/Hälsoinformatik och logistik

    Author : Thomas Yacob; [2023]
    Keywords : Zero Trust; GitLab; Docker; Keycloak; GPG keys; sensitive data; firewalls;

    Abstract : The goal of this report is to examine how traditional security systems are structured and see their shortcomings, and from there propose how a new system can be built to secure sensitive data. The proposed approach is a new architecture called Zero Trust, which means implementing security at the design of the system and providing minimal access to users to perform their tasks. READ MORE

  5. 25. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Ekblom; Jacob Karlén; [2023]
    Keywords : process mining; workflow mining; data mining; radiology; PACS;

    Abstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE