Essays about: "COMPUTER technique"
Showing result 16 - 20 of 348 essays containing the words COMPUTER technique.
-
16. A Transformer-Based Scoring Approach for Startup Success Prediction : Utilizing Deep Learning Architectures and Multivariate Time Series Classification to Predict Successful Companies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Transformer, an attention-based deep learning architecture, has shown promising capabilities in both Natural Language Processing and Computer Vision. Recently, it has also been applied to time series classification, which has traditionally used statistical methods or the Gated Recurrent Unit (GRU). READ MORE
-
17. Point clouds in the application of Bin Picking
University essay from Linköpings universitet/Statistik och maskininlärningAbstract : Automatic bin picking is a well-known problem in industrial automation and computer vision, where a robot picks an object from a bin and places it somewhere else. There is continuous ongoing research for many years to improve the contemporary solution. READ MORE
-
18. Improving Pith Detection and Automated Log Identification using AI
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : Tracking of tree logs from a harvesting site to its processing site is a legal requirement for timber-based industries. Wood log identification is an important task in the forestry industry and has traditionally relied on manual inspection by trained experts. READ MORE
-
19. A General Purpose Near Data Processing Architecture Optimized for Data-intensive Applications
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : In recent years, as Internet of Things (IoT) and machine learning technologies have advanced, there has been increasing interest in the study of energy-efficient and flexible architectures for embedded systems. To bridge the performance gap between microprocessors and memory systems, Near-Data Processing (NDP) was introduced. READ MORE
-
20. Visualization Of Cyber Threats : Visualization To Leading Operatives During Cybersecurity exercises
University essay from Uppsala universitet/Institutionen för samhällsbyggnad och industriell teknikAbstract : The increasing dependence on digital infrastructure leaves individuals, societies and even nations vulnerable in the case of a cyberattack. To prepare for threats and attacks, cyberattacks be simulated in environments called cyber ranges. CYBER RANGE AND TRAINING ENVIRONMENT (CRATE), Sweden's cyber range, is an example of such an environment. READ MORE