Essays about: "online algorithm"
Showing result 1 - 5 of 202 essays containing the words online algorithm.
-
1. Real-Time Certified MPC for a Nano Quadcopter
University essay from Linköpings universitet/Institutionen för systemteknikAbstract : There is a constant demand to use more advanced control methods in a wider field of applications. Model Predictive Control (MPC) is one such control method, based on recurrently solving an optimization problem for determining the optimal control signal. READ MORE
-
2. Credit Card Fraud Detection by Nearest Neighbor Algorithms
University essay from Göteborgs universitet/Institutionen för matematiska vetenskaperAbstract : As the usage of internet banking and online purchases have increased dramatically in today’s world, the risk of fraudulent activities and the number of fraud cases are increasing day by day. The most frequent type of bank fraud in recent years is credit card fraud which leads to huge financial losses on a global level. READ MORE
-
3. Biodiversity Monitoring Using Machine Learning for Animal Detection and Tracking
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As an important indicator of biodiversity and ecological environment in a region, the number and distribution of animals has been given more and more attention by agencies such as nature reserves, wetland parks, and animal protection supervision departments. To protect biodiversity, we need to be able to detect and track the movement of animals to understand which animals are visiting the space. READ MORE
-
4. Digital Front End Algorithms for Sub-Band Full Duplex
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Sub-band full duplex is a new communication scheme technology, where a single frequency band is partitioned into sub-bands for downlink (DL) and up-link(UL) transmissions, and both can take place simultaneously. The idea behind the sub-band full duplex development is to improve the throughput, and coverage and reduce the latency of the UL communication by allowing the UL reception during the DL transmission. READ MORE
-
5. Anomaly Detection for Network Traffic in a Resource Constrained Environment
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE