Essays about: "artificiellt neuronnät"
Showing result 1 - 5 of 18 essays containing the words artificiellt neuronnät.
-
1. Learning Based Road Estimation
University essay from Lunds universitet/Matematik LTHAbstract : The interest in autonomous driving has vastly increased, leading to a surge in research and development efforts over the past decades. This technology could enhance road safety, alleviate traffic congestion, and yield numerous environmental and economic benefits. READ MORE
-
2. A machine learning approach leveraging technical- and sentiment analysis to forecast price movements in major crypto currencies
University essay from KTH/Matematik (Avd.)Abstract : This paper uses a back-propagating neural network (BPN) to predict the price movements of major crypto currencies, leveraging technical factors as well as measurements of collective sentiment derived from the micro-blogging network Twitter. Our dataset consists of daily, hourly and minutely price levels for Bitcoin, Ether and Litecoin along with 8 popular technical indicators, as well as all tweets with the currencies' cash tags during respective time periods. READ MORE
-
3. Machine Learning-Based Data-Driven Traffic Flow Estimation from Mobile Data
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Comprehensive information on traffic flow is essential for vehicular emission monitoring and traffic control. However, such information is not observable everywhere and anytime on the road because of high installation costs and malfunctions of stationary sensors. READ MORE
-
4. Water Anomaly Detection Using Federated Machine Learning
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : With the rapid increase of Internet of Things-devices(IoT), demand for new machine learning algorithms and modelshas risen. The focus of this project is implementing a federatedlearning (FL) algorithm to detect anomalies in measurementsmade by a water monitoring IoT-sensor. READ MORE
-
5. Applying Generative Adversarial Networks for the Generation of Adversarial Attacks Against Continuous Authentication
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cybersecurity has been a hot topic over the past decades with lots of approaches being proposed to secure our private information. One of the emerging approaches in security is continuous authentication, in which the computer system is authenticating the user by monitoring the user behavior during the login session. READ MORE