Essays about: "kernel methods"

Showing result 6 - 10 of 105 essays containing the words kernel methods.

  1. 6. Spatial downscaling of gridded soil moisture products using optical and thermal satellite data: the effects of using different vegetation indices

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Tómas Halldórsson Alexander; [2023]
    Keywords : Physical Geography and Ecosystem Analysis; Remote Sensing; Soil moisture; Downscaling; Vegetation index; Earth and Environmental Sciences;

    Abstract : Soil moisture (SM) plays an important role in the exchange of heat and water between the surface and atmosphere, impacting water and energy cycles and the climate. Satellite remote sensing offers a global-scale estimation of SM; however, the coarse resolutions of satellite SM products, typically ranging from 25-50 km, are unsuitable for regional analysis. READ MORE

  2. 7. Clustering on groups for human tracking with 3D LiDAR

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Simon Utterström; [2023]
    Keywords : Computer Vision; Computer Science; AI; Machine Learning; clustering; Kernel Density Clustering; tracking; LiDAR; 3D LiDAR; tracking; human; pedestrian; real time; Datavetenskap; Dataseende; clustering; SLR; CVC; KDEG; KDE; Kernel Density Clustering; HDBSCAN; DBSCAN; LiDAR; point cloud; tracking; human; pedestrian;

    Abstract : 3D LiDAR people detection and tracking applications rely on extracting individual people from the point cloud for reliable tracking. A recurring problem for these applications is under-segmentation caused by people standing close or interacting with each other, which in turn causes the system to lose tracking. READ MORE

  3. 8. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Henning; [2023]
    Keywords : Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE

  4. 9. Machine learning for detecting financial crime from transactional behaviour

    University essay from Uppsala universitet/Signaler och system

    Author : Markus Englund; [2023]
    Keywords : machine learning; deep learning; financial crime; time series; time series classification; XGBoost; maskininlärning; djupinlärning; finansiell brottslighet; tidsserier; klassificering av tidsserier; XGBoost;

    Abstract : Banks and other financial institutions are to a certain extent obligated to ensure that their services are not utilized for any type of financial crime. This thesis investigates the possibility of analyzing bank customers' transactional behaviour with machine learning to detect if they are involved in financial crime. READ MORE

  5. 10. Predicting resource usage on a Kubernetes platform using Machine Learning Methods

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Arvid Gördén; [2023]
    Keywords : Master thesis; Kubernetes; scaling; resource management; horizontal pod autoscaler; vertical scaling; machine learning; Masterarbete; Kubernetes; scaling; resurshantering; horisontell pod autoscaler; vertikal scaling; maskininlärning;

    Abstract : Cloud computing and containerization has been on the rise in recent years and have become important areas of research and development in the field of computer science. One of the challenges in distributed and cloud computing is to predict the resource utilization of the nodes that run the applications and services. READ MORE