Essays about: "face processing"

Showing result 6 - 10 of 102 essays containing the words face processing.

  1. 6. PERFORMANCE EVALUATION OF EXOSKELETONS WHILE PERFORMING DIFFERENT TASKS OF WORKERS

    University essay from Högskolan i Gävle/Elektronik

    Author : Muhammad Umer Sami; [2023]
    Keywords : Exoskeleton; Lower-back-muscle; Electromyography; SuitX; BackX;

    Abstract : Lifting weights, moving large, heavy objects, or maintaining same posture for extended periods of time exposes workers, mostly in the industrial sector, to pressure on their lower backs, which can have a significant negative impact and result in a variety of musculoskeletal problems and discomfort. The use of an exoskeleton can help to protect workers against lower back injuries of this kind. READ MORE

  2. 7. Evaluation and Implementation of Code Search using Transformers to Enhance Developer Productivity

    University essay from KTH/Skolan för industriell teknik och management (ITM)

    Author : Sara Fredrikson; Clara Månsson; [2023]
    Keywords : Transformers; Code Search; Developer Productivity; Natural Language Processing; Code Discoverability; Transformers; Kodsökning; Utvecklares Produktivitet; Språkteknologi; Kodupptäckbarhet;

    Abstract : With the rapid advancements in the field of Natural Language Processing and Artificial Intelligence, several aspects of its use cases and impact on productivity are largely unexplored. Many of the recent machine learning models are based on an architecture called Transformers that allows for faster computation and for more context to be preserved. READ MORE

  3. 8. BRIDGING THE GAP IN VULNERABILITY MANAGEMENT : A tool for centralized cyber threat intelligence gathering and analysis

    University essay from Luleå tekniska universitet/Datavetenskap

    Author : Panagiotis Vlachos; [2023]
    Keywords : Vulnerability management; Cyber threat intelligence; Common vulnerability scoring system; Exploit prediction scoring system;

    Abstract : A large number of organizations these days are offering some kind of digital services, relyon digital technologies for processing, storing, and sharing of information, are harvesting moderntechnologies to offer remote working arrangements and may face direct cybersecurity risks. Theseare some of the properties of a modern organization. READ MORE

  4. 9. Method of finding the minimum number of sources of indicators of compromise to cover the maximum set

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Kateryna Sydorenko; [2023]
    Keywords : Indicator of Compromise; Set Cover Problem; Maximum Coverage; Open Threat Exchange;

    Abstract : Background. With the increasing demand for cybersecurity, there is a growing interest in understanding cyber-attack surfaces and vectors. READ MORE

  5. 10. ElektroCHAT: A Knowledge Base-Driven Dialogue System for Electrical Engineering Students : A Proposal for Interactive Tutoring

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Fredrik Gölman; [2023]
    Keywords : Knowledge base; Knowledge graph; Dialogue system; Chatbot; Electrical engineering; Education; Kunskapsbas; Kunskapsgraf; Dialogsystem; Chatbot; Elektroteknik; Utbildning;

    Abstract : Universities worldwide face challenges both with students dropping out of educational programmes and repetitive questions directed toward teaching staff which both consume resources and result in delays. Recent progress in natural language processing (NLP) introduces the possibility of more sophisticated dialogue systems that could help alleviate the situation. READ MORE