Essays about: "input kategorisering"

Found 3 essays containing the words input kategorisering.

  1. 1. Conditional Generative Flow for Street Scene Generation

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Moein Sorkhei; [2020]
    Keywords : ;

    Abstract : Generative modeling is a major branch of machine learning attributed to designing models that can learn how data are generated and hence are able to synthesize novel data. With the recent advancements in deep learning, generative models have been improved significantly and successfully applied in a variety of domains, including computer vision, video generation, audio generation, and even in medical applications. READ MORE

  2. 2. Intent classification through conversational interfaces : Classification within a small domain

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sasa Lekic; Kasper Liu; [2019]
    Keywords : Intent classification; input categorisation; conversational interfaces; SVM; Word2Vec; BERT; small domain; Avsiktsklassificering; input kategorisering; conversational interfaces; SVM; Word2Vec; BERT; begränsad domän;

    Abstract : Natural language processing and Machine learning are subjects undergoing intense study nowadays. These fields are continually spreading, and are more interrelated than ever before. A case in point is text classification which is an instance of Machine learning(ML) application in Natural Language processing(NLP). READ MORE

  3. 3. A Framework for Security Requirements : Security Requirements Categorization and Misuse Cases

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Helen Yeshiwas Bogale; Zohaib Ahmed; [2011]
    Keywords : Misuse Case; Security Requirements; Categorization; Elicitation; Specification;

    Abstract : Context: Security Requirements engineering is necessary to achieve secure software systems. Many techniques and approaches have been proposed to elicit security requirements in the initial phases of development. READ MORE