Essays about: "Komplexa problem"

Showing result 21 - 25 of 366 essays containing the words Komplexa problem.

  1. 21. Rotor temperature estimation in Induction Motors with Supervised Machine Learning

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Christopher Gauffin; [2023]
    Keywords : Induction motors; Supervised Machine learning; Power converters; Parameter estimation; Embedded systems; Induktionsmotorer; Övervakad maskininlärning; Strömkonverterare; Parameterestimering; Inbyggda system;

    Abstract : The electrification of the automotive industry and artificial intelligence are both growing rapidly and can be greatly beneficial for a more sustainable future when combined. Induction machines exhibit many complex relationships between physical and electromagnetic properties that must be calculated in order to produce the correct quantities of torque and speed commanded by the driver. READ MORE

  2. 22. Introducing GA-SSNN: A Method for Optimizing Stochastic Spiking Neural Networks : Scaling the Edge User Allocation Constraint Satisfaction Problem with Enhanced Energy and Time Efficiency

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Nathan Allard; [2023]
    Keywords : ;

    Abstract : As progress within Von Neumann-based computer architecture is being limited by the physical limits of transistor size, neuromorphic comuting has emerged as a promising area of research. Neuromorphic hardware tends to be substantially more power efficient by imitating the aspects of computations in networks of neurons in the brain. READ MORE

  3. 23. HackerGraph : Creating a knowledge graph for security assessment of AWS systems

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Alexios Stournaras; [2023]
    Keywords : Cloud security; Knowledge graph; Attack graph; Vulnerability ssessment; Attack paths; Vulnerable-by-design systems; Cloudgoat; Molnsäkerhet; Kunskapsgraf; Attackgraf; Sårbarhetsanalysis; Sårbara miljöer; Cloudgoat;

    Abstract : With the rapid adoption of cloud technologies, organizations have benefited from improved scalability, cost efficiency, and flexibility. However, this shift towards cloud computing has raised concerns about the safety and security of sensitive data and applications. READ MORE

  4. 24. KARTAL: Web Application Vulnerability Hunting Using Large Language Models : Novel method for detecting logical vulnerabilities in web applications with finetuned Large Language Models

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sinan Sakaoglu; [2023]
    Keywords : Broken Access Control; Vulnerability; Large Language Models; Web Application; API; Detection; Scanner; DAST; Application Security; Brutet åtkomstkontroll; Sårbarhet; Stora språkmodeller; Webbapplikation; API; Upptäckt; Skanner; DAST; Applikationssäkerhet;

    Abstract : Broken Access Control is the most serious web application security risk as published by Open Worldwide Application Security Project (OWASP). This category has highly complex vulnerabilities such as Broken Object Level Authorization (BOLA) and Exposure of Sensitive Information. READ MORE

  5. 25. Multi-factor approximation : An analysis and comparison ofMichael Pykhtin's paper “Multifactor adjustment”

    University essay from Umeå universitet/Institutionen för matematik och matematisk statistik

    Author : Michael Zanetti; Philip Güzel; [2023]
    Keywords : Credit risk; Value at Risk; Expected Shortfall; Monte Carlo simulation; Advanced Internal Rantings-Based models; Kreditrisk; Value at Risk; Expected Shortfall; Monte Carlo simulation; Advanced Internal Rantings-Based-modeller;

    Abstract : The need to account for potential losses in rare events is of utmost importance for corporations operating in the financial sector. Common measurements for potential losses are Value at Risk and Expected Shortfall. These are measures of which the computation typically requires immense Monte Carlo simulations. READ MORE