Essays about: "Application of a computer"
Showing result 1 - 5 of 742 essays containing the words Application of a computer.
-
1. Vertical movement asymmetries in 3-year-old SWB horses and their associations with scores in Young Horse Tests
University essay from SLU/Dept. of Anatomy, Physiology and BiochemistryAbstract : To improve equine performance and welfare, many attempts have been made to investigate associations between performance, longevity, orthopaedic health, conformation and talent. Causal relationships between these qualities supported by strong scientific evidence are lacking. READ MORE
-
2. Mutual Enhancement of Environment Recognition and Semantic Segmentation in Indoor Environment
University essay fromAbstract : Background:The dynamic field of computer vision and artificial intelligence has continually evolved, pushing the boundaries in areas like semantic segmentation andenvironmental recognition, pivotal for indoor scene analysis. This research investigates the integration of these two technologies, examining their synergy and implicayions for enhancing indoor scene understanding. READ MORE
-
3. The State of Live Facial Puppetry in Online Entertainment
University essay from Linköpings universitet/Medie- och Informationsteknik; Linköpings universitet/Tekniska fakultetenAbstract : Avatars are used more and more in online communication, in both games and socialmedia. At the same time technology for facial puppetry, where expressions of the user aretransferred to the avatar, has developed rapidly. READ MORE
-
4. An Empirical Survey of Bandits in an Industrial Recommender System Setting
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : In this thesis, the effects of incorporating unstructured data—images in the wild—in contextual multi-armed bandits are investigated, when used within a recommender system setting, which focuses on picture-based content suggestion. The idea is to employ image features, extracted by a pre-trained convolutional neural network, and study the resulting bandit behaviors when including respective excluding this information in the typical context creation, which normally relies on structured data sources—such as metadata. READ MORE
-
5. Streamlining the Process of Surveying Cybersecurity Vulnerabilities in OT
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Operational Technology, OT, is the backbone of the 21st-century society since it eases access for managing critical infrastructure like water, transportation, and energy supply. Therefore, the security of such systems is of utmost importance. READ MORE