Essays about: "UCI"
Showing result 1 - 5 of 12 essays containing the word UCI.
-
1. COMPARATIVE ANALYSIS OF MACHINE LEARNING LOAD FORECASTING TECHNIQUES
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Load forecasting plays a critical role in energy management, and power systems, enabling efficient resource allocation, improved grid stability, and effective energy planning and distribution. Without accurate very short term load forecasting, utility management companies face uncertain load patterns, unrealistic prices, and poor infrastructure planning. READ MORE
-
2. Non-Bayesian Out-of-Distribution Detection Applied to CNN Architectures for Human Activity Recognition
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Human Activity Recognition (HAR) field studies the application of artificial intelligence methods for the identification of activities performed by people. Many applications of HAR in healthcare and sports require the safety-critical performance of the predictive models. READ MORE
-
3. Credit Scoring using Machine Learning Approaches
University essay from Mälardalens universitet/Akademin för utbildning, kultur och kommunikationAbstract : This project will explore machine learning approaches that are used in creditscoring. In this study we consider consumer credit scoring instead of corporatecredit scoring and our focus is on methods that are currently used in practiceby banks such as logistic regression and decision trees and also compare theirperformance against machine learning approaches such as support vector machines (SVM), neural networks and random forests. READ MORE
-
4. Optimization of Physical Uplink Resource Allocation in 5G Cellular Network using Monte Carlo Tree Search
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Physical Uplink Control Channel (PUCCH), which is mainly used to transmit Uplink Control Information (UCI), is a key component to enable the 5G NR system. Compared to LTE, NR specifies a more flexible PUCCH structure to support various applications and use cases. READ MORE
-
5. Comparison of Machine Learning Algorithms for Anomaly Detection in Train’s Real-Time Ethernet using an Intrusion Detection System
University essay fromAbstract : Background: The train communication network is vulnerable to intrusion assaultsbecause of the openness of the ethernet communication protocol. Therefore, an intru-sion detection system must be incorporated into the train communication network. READ MORE