Essays about: "gabor"
Showing result 1 - 5 of 21 essays containing the word gabor.
-
1. Mitigating the effects of vendor lock-in in edge cloud environments with open-source technologies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cloud computing has been in the center of attention recently. Its popularity has increased significantly. More and more companies decide to use a cloud for running their applications. However, this introduces certain problems, such as vendor lock-in. READ MORE
-
2. Compare Accuracy of Alternative Methods for Sound Classification on Environmental Sounds of Similar Characteristics
University essay from Stockholms universitet/Statistiska institutionenAbstract : Artificial neural networks have in the last decade been a vital tool in image recognition, signal processing and speech recognition. Because of these networks' ability to be highly flexible, they suit a vast amount of different data. This flexible attribute is very sought for within the field of environmental sound classification. READ MORE
-
3. Exploring Megaproject Governance with Regard to Collaboration : The case of the International Space Station
University essay from KTH/Fastigheter och byggandeAbstract : Our society is more dependent on global problem-solving than ever before. Megaprojects are one way of solving this challenge. Even though some of them are supposed to give answers to the direst problems of our time, our knowledge about them is paradoxically poor that leads to economic losses. READ MORE
-
4. Incorporating Orthogonal Moments in CNNs
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : Convolutional neural networks (CNNs) can accurately classify objects in images using convolutional layers that extract features from images. Features from images can also be extracted using image moments, such as Gabor and Zernike moments. READ MORE
-
5. Investigating Traditional Software Testing Methods for use with the Meta Attack Language
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Threat modelling of systems is an emerging field within computer security. With the introduction of the Meta Attack Language (MAL) by KTH researchers, the need for being able to test and verify the correctness of such modelling techniques has once again become apparent. READ MORE