Essays about: "detection"

Showing result 21 - 25 of 4332 essays containing the word detection.

  1. 21. Exploring the Depth-Performance Trade-Off : Applying Torch Pruning to YOLOv8 Models for Semantic Segmentation Tasks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinchen Wang; [2024]
    Keywords : Deep Learning; Semantic segmentation; Network optimization; Network pruning; Torch Pruning; YOLOv8; Network Depth; Djup lärning; Semantisk segmentering; Nätverksoptimering; Nätverksbeskärning; Fackelbeskärning; YOLOv8; Nätverksdjup;

    Abstract : In order to comprehend the environments from different aspects, a large variety of computer vision methods are developed to detect objects, classify objects or even segment them semantically. Semantic segmentation is growing in significance due to its broad applications in fields such as robotics, environmental understanding for virtual or augmented reality, and autonomous driving. READ MORE

  2. 22. Temporary Halting of Wind Turbine Rotors toMitigate Effects on Birds

    University essay from Umeå universitet/Institutionen för ekologi, miljö och geovetenskap

    Author : Ola Hedberg; [2024]
    Keywords : Bird; mitigation; effect; wind farm; turbine; wind power; halting; collision; risk; birds; power; generation;

    Abstract : This study assesses the viability of temporarily halting wind turbine operations as amitigation measure to protect bird populations during migration periods. Conducted in thenorthern Baltic, it examines the migration patterns, timings, and altitudes of various birdspecies, aiming to identify the most critical times for implementing turbine stoppages. READ MORE

  3. 23. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE

  4. 24. Exploring adaptation of self-supervised representation learning to histopathology images for liver cancer detection

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Markus Jonsson; [2024]
    Keywords : Self-supervised learning; Representation learning; Computer vision;

    Abstract : This thesis explores adapting self-supervised representation learning to visual domains beyond natural scenes, focusing on medical imaging. The research addresses the central question: "How can self-supervised representation learning be specifically adapted for detecting liver cancer in histopathology images?" The study utilizes the PAIP 2019 dataset for liver cancer segmentation and employs a self-supervised approach based on the VICReg method. READ MORE

  5. 25. Analysis of Atmospheric Muon Bundles with IceCube

    University essay from Uppsala universitet/Högenergifysik

    Author : Anna Selina Neyer; [2024]
    Keywords : ;

    Abstract : This work is a preliminary study of the background of a search for dark, long-lived particles in the IceCube detector. The high flux of atmospheric muons in IceCube is considered background to the detector's primary science goal, which is to detect astrophysical neutrinos through the emission of Cherenkov radiation. READ MORE