Essays about: "BACKGROUND OF STUDY in COMPUTER network"

Showing result 1 - 5 of 16 essays containing the words BACKGROUND OF STUDY in COMPUTER network.

  1. 1. Automated Interpretation of Lung Ultrasound for COVID-19 and Tuberculosis diagnosis

    University essay from Lunds universitet/Matematik LTH

    Author : Chloé Soormally; [2023]
    Keywords : Tuberculosis; COVID-19; Lung Ultrasound; Computer-aided detection CAD ; Deep learning; Technology and Engineering;

    Abstract : BACKGROUND. Early and accurate detection of infectious respiratory diseases like COVID-19 and tuberculosis (TB) plays a crucial role in effective management and the reduction of preventable mortality. READ MORE

  2. 2. RGB-D Deep Learning keypoints and descriptors extraction Network for feature-based Visual Odometry systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Federico Bennasciutti; [2022]
    Keywords : DeepLearning; Visual Odometry; Computer Vision; RGB-D Camera; Feature Extraction; Interest Point Extraction; Djupinlärning; Visuell Odometri; Datorseende; RGB-D-kamera; Nyckelpunkter; Detektion;

    Abstract : Feature extractors in Visual Odometry pipelines rarely exploit depth signals, even though depth sensors and RGB-D cameras are commonly used in later stages of Visual Odometry systems. Nonetheless, depth sensors from RGB-D cameras function even with no external light and can provide feature extractors with additional structural information otherwise invisible in RGB images. READ MORE

  3. 3. Research of methods and algorithms of insider detection in a computer network using machine learning technologies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Dmitrii Pelevin; [2021]
    Keywords : IPS; IDS; UBA; NoSQL; Information Security;

    Abstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE

  4. 4. Early-stage entrepreneurs on LinkedIn - a tool for legitimacy?

    University essay from Lunds universitet/Företagsekonomiska institutionen

    Author : Jacqueline Rohde Mohr; Nicholas Kelly; [2021]
    Keywords : Early-stage Entrepreneurship; Legitimacy; Impression Management; Legitimacy as a Property; LinkedIn; Business and Economics;

    Abstract : In line with the development of modern communication technology, computer-mediated-communication is playing a crucial role in how people interact and communicate. One forum in which such interaction can be conducted is the online professional social network LinkedIn. READ MORE

  5. 5. Multi-camera Computer Vision for Object Tracking: A comparative study

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Eric Turesson; [2021]
    Keywords : Multi-target multi-camera tracking; tracking; re-identification and image enhancement;

    Abstract : Background: Video surveillance is a growing area where it can help with deterring crime, support investigation or to help gather statistics. These are just some areas where video surveillance can aid society. However, there is an improvement that could increase the efficiency of video surveillance by introducing tracking. READ MORE