Essays about: "training control"

Showing result 21 - 25 of 403 essays containing the words training control.

  1. 21. SOGIE minority organisations in Africa and their relation to European donors

    University essay from Linnéuniversitetet/Institutionen för samhällsstudier (SS)

    Author : Evelina Magnusson; [2023]
    Keywords : LGBTQI ; LGBT; SOGIE; Africa; Donors;

    Abstract : The situation for sexual orientation, gender identity or expression (SOGIE) minority persons is difficult in many places and in much of Africa their lives are illegal in some form. This thesis focuses on how local organisations and European actors address this problem and what local actors believe could be done better to improve the situation for SOGIE minorities. READ MORE

  2. 22. Real-time adaptation of robotic knees using reinforcement control

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Leifur Daníel Sigurðarson; [2023]
    Keywords : Machine learning; deep reinforcement learning; transfer learning; medical device; prosthetic; prosthesis; controls; human-in-the-loop; Maskininlärning; djup förstärkningsinlärning; överföringsinlärning; medicinsk utrustning; protes; kontroller; människa-i-loopen;

    Abstract : Microprocessor-controlled knees (MPK’s) allow amputees to walk with increasing ease and safety as technology progresses. As an amputee is fitted with a new MPK, the knee’s internal parameters are tuned to the user’s preferred settings in a controlled environment. READ MORE

  3. 23. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  4. 24. Applying Machine Learning Techniques for Anomaly Detection in Wooden Plank Images

    University essay from Uppsala universitet/Avdelningen Vi3

    Author : Iza Smedberg; [2023]
    Keywords : Anomaly Detection; Machine Vision; Machine Learning; Neural Network;

    Abstract : Anomaly detection is an important first step of quality control in manufacturing processes. In wooden planks, anomalies such as broken knots and resin pockets can lower the quality of the final product. With the help of machine vision, inspections can be made faster, at higher accuracy, and at a lower cost. READ MORE

  5. 25. Inferring Gene regulatory networks using Graph Neural Networks

    University essay from KTH/Genteknologi

    Author : Sohta Makino; [2023]
    Keywords : Graph Attention Network; Gene regulatory Network; Transcription; Data Science; Machine learning; Genreglering; transkription; dataanalys; Inferens; maskininlärning;

    Abstract : Inom beräkningsbiologin är det snabbt på väg att bli allt vanligare att ta fram genetiska regleringsnätverk (GRN). På grund av storleken på de undersökta nätverken använder många forskare maskininlärning för att härleda GRN från genuttrycksdata, vanligtvis från RNA-seq. READ MORE