Essays about: "Detection rule"

Showing result 1 - 5 of 51 essays containing the words Detection rule.

  1. 1. Exploring the Depth-Performance Trade-Off : Applying Torch Pruning to YOLOv8 Models for Semantic Segmentation Tasks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinchen Wang; [2024]
    Keywords : Deep Learning; Semantic segmentation; Network optimization; Network pruning; Torch Pruning; YOLOv8; Network Depth; Djup lärning; Semantisk segmentering; Nätverksoptimering; Nätverksbeskärning; Fackelbeskärning; YOLOv8; Nätverksdjup;

    Abstract : In order to comprehend the environments from different aspects, a large variety of computer vision methods are developed to detect objects, classify objects or even segment them semantically. Semantic segmentation is growing in significance due to its broad applications in fields such as robotics, environmental understanding for virtual or augmented reality, and autonomous driving. READ MORE

  2. 2. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  3. 3. Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

    University essay from Mittuniversitetet/Institutionen för data- och elektroteknik (2023-)

    Author : Peter Stegeby; [2023]
    Keywords : Intrusion detection; HIDS; NIDS; Signature-based; Linux; Windows; Sniffing packets; Upptäcka intrång; HIDS; NIDS; Signatur-baserad; Linux; Windows; Paketsniffing.;

    Abstract : Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. READ MORE

  4. 4. A Rule-based approach for detection of spatial object relations in images

    University essay from Högskolan i Halmstad/Centrum för forskning om tillämpade intelligenta system (CAISR)

    Author : Wahaj Afzal; [2023]
    Keywords : Spatial relations; Deep learning; Computer vision; Artificial intelligence.;

    Abstract : Deep learning and Computer vision are becoming a part of everyday objects and machines. Involvement of artificial intelligence in human’s daily life open doors to new opportunities and research. READ MORE

  5. 5. Flood Simulation in the Colombian Andean Region Using UAV-based LiDAR : Minor Field Study in Colombia

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Simon Höglund; Linus Rodin; [2023]
    Keywords : UAV; Unmanned aerial vehicle; LiDAR; Light detection and ranging; UAV-based LiDAR; UAV photogrammetry; Aerial photogrammetry; Flooding Colombia; UN Sustainability Development Goals; UAV; Obemannade flygfordon; LiDAR; Ljus- och avståndsdetektion; UAV-baserad LiDAR; UAV-fotogrammetri; Flygfotogrammetri; Översvämning Colombia; FN; hållbarhetsutvecklingsmål;

    Abstract : Flooding is a worldwide problem that every year causes substantial damage for the environment and stakeholders nearby, and this impact relates to several of the United Nations Sustainable Development Goals. Colombia is specially prone to flooding as 17% of its surface area is at risk of extreme flooding. READ MORE