Essays about: "Scenarion"

Showing result 16 - 20 of 294 essays containing the word Scenarion.

  1. 16. Microgrid in George Washington, Cuba

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Mimmi Fröjdh; Sofia Sjöberg; [2023]
    Keywords : Cuba; microgrid; energy systems modelling; renewable energy; optimization; Kuba; microgrid; energisystemmodellering; förnybar energi; optimering;

    Abstract : Cuba has vast natural resources for domestic renewable energy generation, but their energy mix is heavily dominated by fossil fuels. This contributes to a high dependence on expensive oil imports and has led to significant generation shortfalls, which in turn has resulted in extensive power outages and serious fuel crises. READ MORE

  2. 17. Detecting IT System Intrusions Using Hidden Markov Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Agaton Domberg; Axel Tardell; [2023]
    Keywords : ;

    Abstract : In today's day and age, the use and implementation of cyber security software isof the utmost importance. Aiming to dive into the basic algorithms behind these softwareprograms, this paper highlights one of the different approaches that keep us safe online. READ MORE

  3. 18. Using Backward Chained Behavior Trees to Control Cooperative Minecraft Agents

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Justin Salér; [2023]
    Keywords : Behavior-Based Systems; Multi-Agent Systems; Behavior Trees; Minecraft; Beteendebaserade system; multiagentssystem; beteendeträd; Minecraft;

    Abstract : This report presents a strategy to control multiple collaborative intelligent agents acting in a complex, versatile environment. The proposed method utilizes back-chained behavior trees and 1-to-1 task distribution. The agents claim a task, which prevents other agents in the system to start working on the same task. READ MORE

  4. 19. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  5. 20. Exploring Normalizing Flow Modifications for Improved Model Expressivity

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Marcel Juschak; [2023]
    Keywords : Normalizing Flows; Motion Synthesis; Invertible Neural Networks; Glow; MoGlow; Maximum Likelihood Estimation; Generative models; normaliserande flöden; rörelsesyntes; inverterbara neurala nätverk; Glow; MoGlow; maximum likelihood-skattning generativa modeller;

    Abstract : Normalizing flows represent a class of generative models that exhibit a number of attractive properties, but do not always achieve state-of-the-art performance when it comes to perceived naturalness of generated samples. To improve the quality of generated samples, this thesis examines methods to enhance the expressivity of discrete-time normalizing flow models and thus their ability to capture different aspects of the data. READ MORE