Essays about: "MS Computer"

Showing result 11 - 15 of 35 essays containing the words MS Computer.

  1. 11. Image Captioning On General Data And Fashion Data : An Attribute-Image-Combined Attention-Based Network for Image Captioning on Mutli-Object Images and Single-Object Images

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Guoyun Tu; [2020]
    Keywords : Image captioning; fashion data; attention based; text attributes; Bildtexter; modedata; uppmärksamhetsbaserat; textattribut;

    Abstract : Image captioning is a crucial field across computer vision and natural language processing. It could be widely applied to high-volume web images, such as conveying image content to visually impaired users. Many methods are adopted in this area such as attention-based methods, semantic-concept based models. READ MORE

  2. 12. Machine vision for automation of earth-moving machines : Transfer learning experiments with YOLOv3

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Carl Borngrund; [2019]
    Keywords : Machine learning; Machine vision; YOLOv3; You only look once; Computer vision; Real time object detection; Object detection;

    Abstract : This master thesis investigates the possibility to create a machine vision solution for the automation of earth-moving machines. This research was done as without some type of vision system it will not be possible to create a fully autonomous earth moving machine that can safely be used around humans or other machines. READ MORE

  3. 13. Threatening Measures, at Face Value : Electrophysiology Indicating Confounds of the Facial Width-to-Height Ratio

    University essay from Högskolan i Skövde/Institutionen för biovetenskap

    Author : Carl Lindersson; [2019]
    Keywords : threat perception; evolutionary cues; fWHR; LPP; overgeneralisation hypothesis;

    Abstract : Previous studies support that the relative width of the upper face (facial width-to-height ratio; fWHR) has evolved to signal threat, but these studies rely greatly on subjective facial ratings and measurements prone to confounds. The present study objectively quantifies threat perception to the magnitude of the observers’ electrophysiological reaction, specifically the event-related potential (ERP) called the late positive potential (LPP), and investigate if brow height and jaw width could have confounded previous fWHR studies. READ MORE

  4. 14. The modernization of a DOS-basedtime critical solar cell LBICmeasurement system.

    University essay from Karlstads universitet

    Author : Gunnar Hjern; [2019]
    Keywords : Pascal programming language; Linux; operating system; real-time; PREEMPT_RT patch; Free Pascal compiler; Lazarus; multi-threading; computer controlled measurements; false color map; refactoring; software modernization; adaptation layer; MS-DOS; GPIB; IEEE-488; silicon solar cell; quantum efficiency; LBIC; electron recombination; serial communication; micro-controller; ISR; incremental encoder; lock-in amplifier; trans-impedance amplifier; triggered measurement;

    Abstract : LBIC is a technique for scanning the local quantum efficiency of solar cells. This kind of measurements needs a highly specialized, and time critical controlling software. In 1996 the client, professor Markus Rinio, constructed an LBIC system, and wrote the controlling software as a Turbo-Pascal 7.0 application, running under the MS-DOS 6. READ MORE

  5. 15. Permissioned Blockchains and Distributed Databases : A Performance Study

    University essay from Linköpings universitet/Programvara och system

    Author : Sara Bergman; [2018]
    Keywords : Blockchain; Hyperledger Fabric; Permissioned blockchain; Distributed Database; Cassandra; Latency; Distributed Systems;

    Abstract : Blockchain technology is a booming new field in both computer science and economicsand other use cases than cryptocurrencies are on the rise. Permissioned blockchains are oneinstance of the blockchain technique. In a permissioned blockchain the nodes which validatesnew transactions are trusted. READ MORE