Search for dissertations about: "log"
Showing result 1 - 5 of 366 swedish dissertations containing the word log.
-
1. Old-Growth Forests in the High Coast Region in Sweden and Active Management in Forest Set-Asides
Abstract : In today´s intensively managed landscape, very few forests with old-growth characteristics and little human impact exist. One of the rare exceptions is pine forests on rocky soils, a forest type which has probably escaped extensive human use because of its low productivity. READ MORE
-
2. Scalable Queries over Log Database Collections
Abstract : In industrial settings, machines such as trucks, hydraulic pumps, etc. are widely distributed at different geographic locations where sensors on machines produce large volumes of data. The data produced is stored locally in autonomous databases called log databases. READ MORE
-
3. Evaluation of regression methods for log-normal data - linear models for environmental exposure and biomarker outcomes
Abstract : The identification and quantification of associations between variables is often of interest in occupational and environmental research, and regression analysis is commonly used to assess these associations. While exposures and biological data often have a positive skewness and can be approximated with the log-normal distribution, much of the inference in regression analysis is based on the normal distribution. READ MORE
-
4. Linear statistics of random matrices and log-gases
Abstract : This thesis is concerned with point processes arising in Random Matrix Theory. It is a compilation thesis: it consists of an introduction and three research papers.In Paper A and Paper B, we study random matrices from the classical compact groups, namely orthogonal, unitary, and symplectic matrices distributed according to Haar measure. READ MORE
-
5. Aspects of Adapting Data Collection to Intrusion Detection
Abstract : The focus of this thesis is on data collection and in particular data collection for intrusion detection purposes. Data collection is the first, and possibly most important activity in the overall intrusion detection process. The result of the detection can never be better than the data on which the detection is based. READ MORE