Essays about: "language modelling"

Showing result 11 - 15 of 161 essays containing the words language modelling.

  1. 11. Variability Management in Robotic Systems: A Variability-Modelling Language That Implements Variation Points Based On Binding Time and Binding Mode

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : JUDE GYIMAH; [2022-02-02]
    Keywords : Variability Management; Service Robots; Robotics Software Engineering; Domain-Specific Languages; Feature Reconfiguration;

    Abstract : Technological advancements have led to a growing demand for efficient solutions that minimise risk and maximise efficiency when it comes to performing tasks in nondeterministic environments. In the wake of the current pandemic, humanity has been affected by labor shortages, logistic challenges, unexpected strain on supply systems and product shortages caused by safety regulations and health complications. READ MORE

  2. 12. Few-shot Question Generation with Prompt-based Learning

    University essay from Uppsala universitet/Institutionen för lingvistik och filologi

    Author : Yongchao Wu; [2022]
    Keywords : Nautral Lanugage Processing; Question Generation; Neural Networks; Prompt-based Learning; Language Models;

    Abstract : Question generation (QG), which automatically generates good-quality questions from a piece of text, is capable of lowering the cost of the manual composition of questions. Recently Question generation has attracted increasing interest for its ability to supply a large number of questions for developing conversation systems and educational applications, as well as corpus development for natural language processing (NLP) research tasks, such as question answering and reading comprehension. READ MORE

  3. 13. Integrating Trust-Based Adaptive Security Framework with Risk Mitigation to enhance SaaS User Identity and Access Control based on User Behavior

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Johnson Akpotor Scott; [2022]
    Keywords : Risk Assessment; Security countermeasure; Risk Management; Risk Mitigation; Adaptive Security Controls; Threats; Risk; Vulnerabilities; User Behavior Trust Degree; User Behavior Risk Rating; Policy Decision Point; Policy Enforcement Point; User Behavior Trust Model; Adaptive Security Architecture; SaaS; Public Cloud.;

    Abstract : In recent years, the emerging trends in cloud computing technologies have given rise to different computing services through the Internet. Organizations across the globe have seized this opportunity as a critical business driver for computing resource access and utilities that will indeed support significant business operations. READ MORE

  4. 14. A systematic mapping study of mapping modelling languages

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Marija Popovic; Amila Cizmic; [2022]
    Keywords : mapping; mapping model; mapping metamodel; mapping language;

    Abstract : Context - Various research teams, as well as individual researchers, have investigated mapping modelling languages. However, systematic studies that provide a structured overview of this research on this topic have not been conducted. It is noticeable that this leaves a big gap in the context of a modelling language. READ MORE

  5. 15. Modelling Cyber Security of Networks as a Reinforcement Learning Problem using Graphs : An Application of Reinforcement Learning to the Meta Attack Language

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sandor Berglund; [2022]
    Keywords : Attack graphs; reinforcement learning; graph neural networks; Meta Attack Language; MAL; deepQ-learning DQN ; Attackgrafer; förstärningsinlärning; artificiella neuronnät; grafneuronnät; djup Qinlärning; Meta Attack Language; MAL;

    Abstract : ICT systems are part of the vital infrastructure in today’s society. These systems are under constant threat and efforts are continually being put forth by cyber security experts to protect them. By applying modern AI methods, can these efforts both be improved and alleviated of the cost of expert work. READ MORE