Advanced search
Showing result 1 - 5 of 7 essays matching the above criteria.
-
1. Research of methods and algorithms of insider detection in a computer network using machine learning technologies
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background. Security Information and Event Management (SIEM) systems today are sophisticated sets of software packages combined with hardware platforms, which can perform real-time analysis on security events and can respond to them before potential damage due to the actions of intruders. READ MORE
-
2. A Deep Learning Application for Traffic Sign Recognition
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Traffic Sign Recognition (TSR) is particularly useful for novice driversand self-driving cars. Driver Assistance Systems(DAS) involves automatic trafficsign recognition. Efficient classification of the traffic signs is required in DAS andunmanned vehicles for safe navigation. READ MORE
-
3. A study of Neural Circuitry in Microdeletion Syndrome
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Abstract Introduction. The Brain is an amazingly complex piece of biological hardware, capable of massive information processing. It relies heavily on the delicate interactions between huge distributed networks to work properly. When these interactions are altered there can be any number of consequences. READ MORE
-
4. Semantic Segmentation of Urban Scene Images Using Recurrent Neural Networks
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: In Autonomous Driving Vehicles, the vehicle receives pixel-wise sensor data from RGB cameras, point-wise depth information from the cameras, and sensors data as input. The computer present inside the Autonomous Driving vehicle processes the input data and provides the desired output, such as steering angle, torque, and brake. READ MORE
-
5. Defining a Process for Statistical Analysis of Vulnerability Management using KPI
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : In todays connected society, with rapidly advancing technology, there is an interest in offering technical services in our day to day life. Since these services are used to handle sensitive information and money, there are demands for increased information security. Sometimes errors occur in these systems that risk the security for both parties. READ MORE