Essays about: "large-scale network"

Showing result 1 - 5 of 195 essays containing the words large-scale network.

  1. 1. Image Quality Assessment Pipeline and Semi-Automated Annotation method for Synthetic Data

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Liam Le Tran; Edina Dedovic; [2023-10-24]
    Keywords : Facial Expression Recognition; FACS; Action Units; styleGAN2-ada; synthetic data; Image Quality Assessment; Multi-stage Pre-training; Pipeline Processing; Semi-automated Human Annotation;

    Abstract : Predicting human emotions through facial expression, particularly in relation to medication field such as clinical trial settings, has garnered scientific interest in recent years due to significant understanding of the impact of treatment on emotions and social functioning. This thesis aims to improve performance of a FER model using large scale of synthetic data. READ MORE

  2. 2. Energy in the Transportation System - A comparison of charging infrastructure scenarios

    University essay from Lunds universitet/Industriell elektroteknik och automation

    Author : Judith Lai Jakobsson; [2023]
    Keywords : Charging infrastructure; road transport electrification; battery capacity need; electric vehicles; Technology and Engineering;

    Abstract : A functioning charging infrastructure is crucial for achieving full-scale national electrification within the transport sector. The system is likely to consist of different charging technologies, all with the main objective of providing efficient energy replenishment services. READ MORE

  3. 3. Profile Based Access Control Model Using JSON Web Tokens

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Mustafa Albayati; Aslan Murjan; [2023]
    Keywords : access control; profiles; IoT; device; OpenIDC; Technology and Engineering;

    Abstract : Currently at Axis, a local role-based access control system is used in devices, which forces the user credentials to be directly installed on the individual devices and the limited selection of roles does not allow for fine-grained access rights. This creates an administrative nightmare in a large scale network and leads to elevated privileges. READ MORE

  4. 4. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakub Reha; [2023]
    Keywords : Graph neural networks; Temporal graphs; Benchmark datasets; Anomaly detection; Heterogeneous graphs; Provenance graphs; Grafiska neurala nätverk; temporala grafer; benchmark-datauppsättningar; anomalidetektering; heterogena grafer; härkomstgrafer;

    Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE

  5. 5. Punctuation Restoration as Post-processing Step for Swedish Language Automatic Speech Recognition

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Ishika Gupta; [2023]
    Keywords : Transformer; BERT; KB-BERT; NLP; punctuation restoration; deep learning; neural networks;

    Abstract : This thesis focuses on the Swedish language, where punctuation restoration, especially as a postprocessing step for the output of Automatic Speech Recognition (ASR) applications, needs furtherresearch. I have collaborated with NewsMachine AB, a company that provides large-scale mediamonitoring services for its clients, for which it employs ASR technology to convert spoken contentinto text. READ MORE