Advanced search

Showing result 1 - 5 of 78 essays matching the above criteria.

  1. 1. An Empirical Survey of Bandits in an Industrial Recommender System Setting

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : Tobias Schwarz; Johan Brandby; [2023-09-21]
    Keywords : computer science; industrial application; machine learning; reinforcement learning; multi-armed bandits; MAB; contextual multi-armed bandits; survey; batch learning;

    Abstract : In this thesis, the effects of incorporating unstructured data—images in the wild—in contextual multi-armed bandits are investigated, when used within a recommender system setting, which focuses on picture-based content suggestion. The idea is to employ image features, extracted by a pre-trained convolutional neural network, and study the resulting bandit behaviors when including respective excluding this information in the typical context creation, which normally relies on structured data sources—such as metadata. READ MORE

  2. 2. Digital Front End Algorithms for Sub-Band Full Duplex

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Midhat Rizvi; Khaled Al-Khateeb; [2023]
    Keywords : Adjacent Channel Leakage Ratio; Bit Error Rate; Clipping and Filtering; Crest Factor Reduction; Digital front end; Digital Pre-Distortion Error Vector Magnitude; Frequency Division Duplex; Power Amplifier; Peak to Average Power Ratio; Peak Cancellation Crest Factor Reduction; Sub Band Full Duplex; Self-Interference Cancellation; Signal-to-Interference Noise Ratio; Signal-to-Noise Ratio; Turbo Clipping; Time Division Duplex; Technology and Engineering;

    Abstract : Sub-band full duplex is a new communication scheme technology, where a single frequency band is partitioned into sub-bands for downlink (DL) and up-link(UL) transmissions, and both can take place simultaneously. The idea behind the sub-band full duplex development is to improve the throughput, and coverage and reduce the latency of the UL communication by allowing the UL reception during the DL transmission. READ MORE

  3. 3. Anomaly Detection for Network Traffic in a Resource Constrained Environment

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Pontus Lidholm; Gaia Ingletto; [2023]
    Keywords : Network Traffic; Anomaly Detection; Embedded Systems; Machine Learning; Random Forest;

    Abstract : Networks connected to the internet are under a constant threat of attacks. To protect against such threats, new techniques utilising already connected hardware have in this thesis been proven to be a viable solution. READ MORE

  4. 4. Counterfeit product grouping - a cluster ensemble approach

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jency Raj; Ramu Satheesh; [2023]
    Keywords : Machine Learning; Deeplearning; Image analysis; Data science;

    Abstract : he need for the development and use of efficient and reliable Anticounterfeit techniques in the manufacturing industry and online trading has recently increased tremendously. Flooding counterfeit products in the international market have several adverse social and economic impacts globally. READ MORE

  5. 5. Human Factors Involved in Explainability of Autonomous Driving : Master’s Thesis

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Abriansyah Arisoni; [2023]
    Keywords : Autonomous Driving; Human-Robot Interaction; Explainable Artificial Intelligence Autonomous Driving; Human-Robot Interaction; Explainable Artificial Intelligence; Autonom Körning; Interaktion Mellan Människa och Robot; Förklarlig Artificiell Intelligens Autonom Körning; Interaktion Mellan Människa ochRobot; Förklarlig Artificiell Intelligens;

    Abstract : Autonomous Car (AC) has been more common in recent years. Despite the rapid development of the driving part of the AC, researchers still need to improve the overall experience of the AC's passengers and boost their willingness to adopt the technology. READ MORE