Essays about: "Chaining"

Showing result 1 - 5 of 22 essays containing the word Chaining.

  1. 1. Bridging Language & Data : Optimizing Text-to-SQL Generation in Large Language Models

    University essay from Linköpings universitet/Artificiell intelligens och integrerade datorsystem

    Author : Niklas Wretblad; Fredrik Gordh Riseby; [2024]
    Keywords : Chaining; Classification; Data Quality; Few-Shot Learning; Large Language Model; Machine Learning; Noise; Prompt; Prompt Engineering; SQL; Structured Query Language; Text-to-SQL; Zero-Shot Learning; Noise Identification;

    Abstract : This thesis explores text-to-SQL generation using Large Language Models within a financial context, aiming to assess the efficacy of current benchmarks and techniques. The central investigation revolves around the accuracy of the BIRD-Bench benchmark and the applicability of text-to-SQL models in real-world scenarios. READ MORE

  2. 2. Waste Analysis on a Production Line - A Case Study

    University essay from Lunds universitet/Industriell Produktion

    Author : Sanna Treptow; Déspina Karida; [2023]
    Keywords : Sustainable manufacturing systems; Sustainable production; Lean production; Just in Time Production JiT ; Kanban; Waste; Environmental Value Stream Mapping EVSM ; Production Performance Matrix PPM ; Key Performance Index KPI ; Technology and Engineering;

    Abstract : This study aims to assist Swedish company Clemondo AB in reducing waste in production, where the goal is to determine where waste appears as well as make suggestions for potential improvements, which are presented as Key Performance Indices (KPIs) and minimized manufacturing costs. Citation chaining is used to retrieve extant literature, while other productions and process-related information are gathered through observations and discussions. READ MORE

  3. 3. Using Backward Chained Behavior Trees to Control Cooperative Minecraft Agents

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Justin Salér; [2023]
    Keywords : Behavior-Based Systems; Multi-Agent Systems; Behavior Trees; Minecraft; Beteendebaserade system; multiagentssystem; beteendeträd; Minecraft;

    Abstract : This report presents a strategy to control multiple collaborative intelligent agents acting in a complex, versatile environment. The proposed method utilizes back-chained behavior trees and 1-to-1 task distribution. The agents claim a task, which prevents other agents in the system to start working on the same task. READ MORE

  4. 4. Improving Behavior Trees that Use Reinforcement Learning with Control Barrier Functions : Modular, Learned, and Converging Control through Constraining a Learning Agent to Uphold Previously Achieved Sub Goals

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jannik Wagner; [2023]
    Keywords : Behavior Trees; Reinforcement Learning; Control Barrier Functions; Robotics; Artificial Intelligence; Verhaltensbäume; Verstärkendes Lernen; Kontrollbarrierefunktionen; Robotik; Künstliche Intelligenz; Beteendeträd; Förstärkningsinlärning; Kontrollbarriärfunktioner; Robotik; Artificiell Intelligens;

    Abstract : This thesis investigates combining learning action nodes in behavior trees with control barrier functions based on the extended active constraint conditions of the nodes and whether the approach improves the performance, in terms of training time and policy quality, compared to a purely learning-based approach. Behavior trees combine several behaviors, called action nodes, into one behavior by switching between them based on the current state. READ MORE

  5. 5. Characterization of cipher suite selection, downgrading, and other weaknesses observed in the wild

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Edvin Kjell; Sebastian Frisenfelt; [2021]
    Keywords : TLS; HTTPS; HSTS; cipher suites; vulnerabilities;

    Abstract : The importance of security on the web is growing every day. How domains handle and prioritize their level of security is varying. Tradeoffs between security and convenience have to be made to uphold a website's public image. This thesis uses a subset of domains from the Alexa Top 1M list. READ MORE