Essays about: "Chaining"
Showing result 1 - 5 of 22 essays containing the word Chaining.
-
1. Bridging Language & Data : Optimizing Text-to-SQL Generation in Large Language Models
University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystemAbstract : This thesis explores text-to-SQL generation using Large Language Models within a financial context, aiming to assess the efficacy of current benchmarks and techniques. The central investigation revolves around the accuracy of the BIRD-Bench benchmark and the applicability of text-to-SQL models in real-world scenarios. READ MORE
-
2. Waste Analysis on a Production Line - A Case Study
University essay from Lunds universitet/Industriell ProduktionAbstract : This study aims to assist Swedish company Clemondo AB in reducing waste in production, where the goal is to determine where waste appears as well as make suggestions for potential improvements, which are presented as Key Performance Indices (KPIs) and minimized manufacturing costs. Citation chaining is used to retrieve extant literature, while other productions and process-related information are gathered through observations and discussions. READ MORE
-
3. Using Backward Chained Behavior Trees to Control Cooperative Minecraft Agents
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This report presents a strategy to control multiple collaborative intelligent agents acting in a complex, versatile environment. The proposed method utilizes back-chained behavior trees and 1-to-1 task distribution. The agents claim a task, which prevents other agents in the system to start working on the same task. READ MORE
-
4. Improving Behavior Trees that Use Reinforcement Learning with Control Barrier Functions : Modular, Learned, and Converging Control through Constraining a Learning Agent to Uphold Previously Achieved Sub Goals
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This thesis investigates combining learning action nodes in behavior trees with control barrier functions based on the extended active constraint conditions of the nodes and whether the approach improves the performance, in terms of training time and policy quality, compared to a purely learning-based approach. Behavior trees combine several behaviors, called action nodes, into one behavior by switching between them based on the current state. READ MORE
-
5. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE