Essays about: "computer evaluation"
Showing result 1 - 5 of 704 essays containing the words computer evaluation.
-
1. Robust Object Recognition and Tracking with Drones
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The Skara Skyddsängel project explores an innovative method of providing illumination for cyclists along a 20km unlit bike lane using drones. Current GNSS approach performs generally well but further improvements are need for better robustness. Consequently, this thesis project is raised to seek a robust solution in the field of computer vision. READ MORE
-
2. Force Type ID, a Two-Factor-Authentication based on force sensitive keys and password
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : The conventional computer keyboard keys work as binary switch systems and have stayed the same since the invention of typewriters. With the accelerated progress in forcesensing technology, force-sensitive keyboards have become viable consumer products due to advancements in manufacturing. READ MORE
-
3. Exploring adaptation of self-supervised representation learning to histopathology images for liver cancer detection
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : This thesis explores adapting self-supervised representation learning to visual domains beyond natural scenes, focusing on medical imaging. The research addresses the central question: "How can self-supervised representation learning be specifically adapted for detecting liver cancer in histopathology images?" The study utilizes the PAIP 2019 dataset for liver cancer segmentation and employs a self-supervised approach based on the VICReg method. READ MORE
-
4. An Empirical Survey of Bandits in an Industrial Recommender System Setting
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : In this thesis, the effects of incorporating unstructured data—images in the wild—in contextual multi-armed bandits are investigated, when used within a recommender system setting, which focuses on picture-based content suggestion. The idea is to employ image features, extracted by a pre-trained convolutional neural network, and study the resulting bandit behaviors when including respective excluding this information in the typical context creation, which normally relies on structured data sources—such as metadata. READ MORE
-
5. OpenCourse: Gamification in Computer Science Education
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : Academic degrees in computer science suffer from the highest dropout rates among universities. As a result, there is a lack of technical professionals, which could threaten the digital infrastructure. READ MORE