Essays about: "central extensions."

Showing result 1 - 5 of 15 essays containing the words central extensions..

  1. 1. Diffusion-based Vocoding for Real-Time Text-To-Speech

    University essay from Lunds universitet/Matematisk statistik

    Author : Lukas Gardberg; [2023]
    Keywords : Diffusion; Vocoding; Text-to-Speech; Machine Learning; Mathematics and Statistics;

    Abstract : The emergence of machine learning based text-to-speech systems have made fully automated customer service voice calls, spoken personal assistants, and the creation of synthetic voices seem well within reach. However, there are still many technical challenges with creating such a system which can generate audio quickly and of high enough quality. READ MORE

  2. 2. Comparing decentralized learning to Federated Learning when training Deep Neural Networks under churn

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Vikström; [2021]
    Keywords : Peer- to- Peer; Decentralized Machine Learning; Federated Learning; Gossip Learning; Long Short- Term Memory; Convolutional Neural Network; Peer- to- peer; Decentraliserad Maskininlärning; Federated learning; Gossip learning; Lång korttidsminne;

    Abstract : Decentralized Machine Learning could address some problematic facets with Federated Learning. There is no central server acting as an arbiter of whom or what may benefit from Machine Learning models created by the vast amount of data becoming available in recent years. READ MORE

  3. 3. The Performance of Post-Quantum Key Encapsulation Mechanisms : A Study on Consumer, Cloud and Mainframe Hardware

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Alex Gustafsson; Carl Stensson; [2021]
    Keywords : Public-Key Cryptography; Benchmark; x86; IBM Z; z15; Asymmetrisk Kryptering; Prestandatest; x86; IBM Z; z15;

    Abstract : Background. People use the Internet for communication, work, online banking and more. Public-key cryptography enables this use to be secure by providing confidentiality and trust online. Though these algorithms may be secure from attacks from classical computers, future quantum computers may break them using Shor’s algorithm. READ MORE

  4. 4. Reflection Seismic Survey for Characterising Historical Tailings and Deep Targeting at the Blötberget Mine, Central Sweden

    University essay from Uppsala universitet/Institutionen för geovetenskaper

    Author : EMMANUEL ALOFE; [2021]
    Keywords : reflection seismic; exploration; tailings; sustainability; circularity; tomography; reflektion seismisk; prospektering; gruvavfall; hållbarhet; cirkularitet; tomografi;

    Abstract : Iron has been an essential element to human development and iron-oxide deposits are known to host minerals that are labelled as critical raw materials (CRMs), especially in the EU. Therefore, ensuring a sustainable supply of CRMs require access to both primary and secondary sources of their host deposits such as iron oxides. READ MORE

  5. 5. State- and Parameter Estimation for Spacecraft with Flexible Appendages using Unscented Kalman Filters

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Andrea Mosquera Alonso; [2019]
    Keywords : Estimation; flexibility; flexible spacecraft; spacecraft; kalman filter; unscented Kalman filter; spacecraft dynamics; flexible dynamics;

    Abstract : The problem of system identification for dynamic effects on spacecraft has become increasingly relevant with the surge of agile spacecraft, which must perform large amplitude maneuvers at high rates. Precise knowledge of the state of the spacecraft, as well as of the parameters characterizing its motion, is vital for the design of control algorithms enabling stabilization and pointing accuracy. READ MORE