Essays about: "feature selection thesis"
Showing result 1 - 5 of 158 essays containing the words feature selection thesis.
-
1. Feature Selection for Microarray Data via Stochastic Approximation
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : This thesis explores the challenge of feature selection (FS) in machine learning, which involves reducing the dimensionality of data. The selection of a relevant subset of features from a larger pool has demonstrated its effectiveness in enhancing the performance of various machine learning algorithms. READ MORE
-
2. Improvement of anautomatic networkdrawing algorithm in thecontext of utility networks
University essay from KTH/Skolan för industriell teknik och management (ITM)Abstract : The European Union’s ambitious climate targets necessitate substantial reductions in greenhouse gas emissions, particularly within the heating and cooling sector, which accounts for a significant portion of energy consumption. District Heating and Cooling (DHC) systems emerge as a key solution for decarbonizing this sector by enabling high efficiency heat production and the integration of renewable and carbon-neutral energy sources. READ MORE
-
3. Evaluating and extending the feature model process: a case study
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : The development of software product lines (SPLs) has revolutionized software engineering by enabling efficient creation of diverse software systems through the selection of feature combinations. Feature models serve as a critical tool in the context of SPLs. READ MORE
-
4. Handling Third-Party Component Licenses:A Case Study in a Swedish Company : How well do existing license management tools detect potentially unsafe third-party component licenses?
University essay from Högskolan Dalarna/InformatikAbstract : Modern software development relies heavily on third-party components, which are pre-built software modules developed by other organisations and can be either open-source or commercial. These components serve as building blocks for developers to create complex applications more efficiently. READ MORE
-
5. Evaluating intrusion detection points in an end-to-end solution
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Evaluating all intrusion detection points in an end-to-end cyber-physical system can be challenging. This master thesis focuses on evaluating the security of the most exposed part of such systems, Radio Frequency Identification (RFID) communication. READ MORE