Essays about: "network risk"

Showing result 6 - 10 of 540 essays containing the words network risk.

  1. 6. The Impact of Deep Neural Network Pruning on the Hyperparameter Performance Space: An Empirical Study

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Jonna Matthiesen; [2023-10-24]
    Keywords : Compression; Deep Learning; DNN; Hyperparameters; Optimization; Pruning; Hyperparameter Optimisation; Hyperparameter Tuning;

    Abstract : With the continued growth of deep learning models in terms of size and computational requirements, the need for efficient models for deployment on resource-constrained devices becomes crucial. Structured pruning has emerged as a proven method to speed up models and reduce computational requirements. READ MORE

  2. 7. Managing International Sourcing and Manufacturing in an Allegedly Stalled Globalization - A multiple case study exploring SMEs’ international sourcing and manufacturing and the trend of the world economy

    University essay from Göteborgs universitet/Graduate School

    Author : Elvira Tenggren; Isabella Asp; [2023-07-18]
    Keywords : SME; Sourcing; Manufacturing; Globalization; Regionalization; De-globalization; Reshoring; Network embeddedness; Efficiency-seeking; Security-seeking;

    Abstract : There have been significant events in recent years that have raised concerns about the trend of the world economy. Scholars believe these events have disrupted businesses, causing them to reconsider their GVCs, including supply chains and GPNs. READ MORE

  3. 8. Peers, Privacy & Pleasure: A mapping of how social norms influence consumers in their diffusion of a social media application with privacy implications, the case of TikTok

    University essay from Göteborgs universitet/Graduate School

    Author : Axel Fohlin; Carl Klittmar; [2023-07-03]
    Keywords : Social Norms; Injunctive Norms; Descriptive Norms; Personal Norms; Privacy Implication; Privacy Concern; Privacy Risk; Diffusion of Innovation; TikTok;

    Abstract : TikTok, the social media network where users can post and share user created content with one another, has fallen under examination of governments across the globe due to rising distress in regards to the privacy implications that the app may have. Understanding how TikTok reached such success even with an apparent privacy implication calls for a mapping of the social norms (Injunctive, Descriptive, Personal) and how they shaped consumer perceptions. READ MORE

  4. 9. Towards Sustainable Transport: A case study on modal shift for temperature-controlled goods between northern Norway and central Europe

    University essay from Göteborgs universitet/Graduate School

    Author : Love Kristoffersson; Etienne Skowronski; [2023-07-03]
    Keywords : road-rail transport; temperature-controlled goods; cross-border; modal shift; transportation network;

    Abstract : In line with the ambitious sustainability goals set by the European Union to reduce transport emissions, there is a growing interest for sustainable freight transport across Europe. Rail transportation has emerged as a preferred mode of choice for shippers and freight forwarders, given its sustainability advantage of transporting larger volumes on longer distances. READ MORE

  5. 10. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE