Essays about: "profiling system"
Showing result 11 - 15 of 61 essays containing the words profiling system.
-
11. A Cloud-based Business Process Automation Platform for Customer Interaction : Research, development, integration, deployment and test of a Business Process Automation platform to manage company customer relations through the cloud.
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Customer relationship management is a crucial point of many businesses, and is often characterized by repetitive and monotonous actions carried out by operators. The evolution of technology, in this regard, is leading to a highly multi-channel scenario, where the entire history of interactions between the company and the customer is fragmented across different services and communication tools. READ MORE
-
12. Creating a streamlinedmanual fluorescent stainingmethod for neuroscience
University essay from Blekinge Tekniska Högskola/Institutionen för maskinteknikAbstract : This thesis will conduct an attempt of simplifying the currently used stainingmethod of the protein profiling group at The Karolinska Institute led by Jan Mulder. By utilizing iterative product development several prototypes were created to first fit the criteria’s specified and secondly best retain and evenly spread a solution across the tissue sections. READ MORE
-
13. Creating a Customizable Component Based ETL Solution for the Consumer
University essay from KTH/Hälsoinformatik och logistikAbstract : In today's society, an enormous amount of data is created that is stored in various databases. Since the data is in many cases stored in different databases, there is a demand from organizations with a lot of data to be able to merge separated data and get an extraction of this resource. READ MORE
-
14. Social Media Bot Detection
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Social media platforms have revolutionized how people interact with each other and how people gain information. However, social media platforms such as Twitter and Facebook quickly became the platform for public manipulation and spreading or amplifying political or ideological misinformation. READ MORE
-
15. Board and Chip Diversity in Deep Learning Side-Channel Attacks : On ATtiny85 Implementations Featuring Encryption and Communication
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : Hardware security is an increasingly relevant topic because more and more systems and products are equipped with embedded microcontrollers. One type of threat against hardware security is attacks against encryption implementations in embedded hardware. READ MORE