Essays about: "advanced networks"

Showing result 1 - 5 of 218 essays containing the words advanced networks.

  1. 1. A Comparative Analysis of Whisper and VoxRex on Swedish Speech Data

    University essay from Uppsala universitet/Statistiska institutionen

    Author : Max Fredriksson; Elise Ramsay Veljanovska; [2024]
    Keywords : ASR; Automatic Speech Recognition; Swedish Speech Recognition; Speech Recognition Models; Speech-to-Text; Whisper; VoxRex; Wav2Vec; Model Comparison; Transformer Models; Neural Networks; Machine Learning; WER; Word Error Rate; Transcription;

    Abstract : With the constant development of more advanced speech recognition models, the need to determine which models are better in specific areas and for specific purposes becomes increasingly crucial. Even more so for low-resource languages such as Swedish, dependent on the progress of models for the large international languages. READ MORE

  2. 2. Estimating Diffusion Tensor Distributions With Neural Networks

    University essay from Linköpings universitet/Algebra, geometri och diskret matematik; Linköpings universitet/Tekniska fakulteten

    Author : Rimaz Nismi; [2024]
    Keywords : Diffusion; Magnetic Resonance Imaging; MRI; Neural Networks; Optimal transport; Earth mover s distance; Sinkhorn distance;

    Abstract : Magnetic Resonance Imaging (MRI) is an essential healthcare technology, with diffusion MRI being a specialized technique. Diffusion MRI exploits the inherent diffusion of water molecules within the human body to produce a high-resolution tissue image. An MRI image contains information about a 3D volume in space, composed of 3D units called voxels. READ MORE

  3. 3. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Deepthy Prasad; Swathi Hampapura Sripada; [2023]
    Keywords : multivariate - time series; anomaly detection; neural networks; autoencoders; interpretability; counterfactuals;

    Abstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE

  4. 4. Integrating Waste Heat from Hydrogen Production Into District Heating

    University essay from Lunds universitet/Institutionen för energivetenskaper

    Author : Fawzi Kayali; [2023]
    Keywords : Hydrogen; Electrolysis; Waste Heat Recovery; Combined Heat and Power Plant; District Heating; Simulation; Sustainable Heating Systems; Technology and Engineering;

    Abstract : The aim of this research is to explore the feasibility of the integration of waste heat from electrolyzers within a Combined Heat and Power (CHP) plant and district heating (DH) network and suggest a practical setup for integration. With the escalating emphasis on the development of green hydrogen through electrolysis powered by renewable energy, a substantial amount of waste heat is generated, typically left unused. READ MORE

  5. 5. Literature review on trustworthiness of Signature-Based and Anomaly detection in Wireless Networks

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Josephine Spångberg; Vainius Mikelinskas; [2023]
    Keywords : Cyber threats; Malware; Cyber attacks; Signature Based Detection; Anomaly Detection; Cyber defense; Sophisticated attacks; Modern cyberattacks; malware detection in wireless network; IoT;

    Abstract : The internet has become an essential part of most people's daily lives in recent years, and as more devices connect to the internet, the risk of cyber threats increases dramatically. As malware becomes more sophisticated, traditional security prevention measures are becoming less effective at defending from cyber attacks. READ MORE