Essays about: "other information of computer"
Showing result 1 - 5 of 392 essays containing the words other information of computer.
-
1. MONEY ON (THE) LINE : A Quantitative Study on the Effects of Different Types of Digital Government Services on Petty Corruption
University essay from Uppsala universitet/Statsvetenskapliga institutionenAbstract : Previous research indicates that improving digital government services may contribute to the reduction of corruption. This study seeks to deepen the knowledge of this suggested causal link in several ways. Firstly, it adds nuance by examining the effects of two distinct sub-types of digital government services on specifically petty corruption. READ MORE
-
2. An Empirical Survey of Bandits in an Industrial Recommender System Setting
University essay from Göteborgs universitet/Institutionen för data- och informationsteknikAbstract : In this thesis, the effects of incorporating unstructured data—images in the wild—in contextual multi-armed bandits are investigated, when used within a recommender system setting, which focuses on picture-based content suggestion. The idea is to employ image features, extracted by a pre-trained convolutional neural network, and study the resulting bandit behaviors when including respective excluding this information in the typical context creation, which normally relies on structured data sources—such as metadata. READ MORE
-
3. Analyzing the Influence of Synthetic andAugmented Data on Segmentation Model
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : The field of Artificial Intelligence (AI) has experienced unprecedented growth in recent years, thanks to the numerous applications related to speech recognition, natural language processing, and computer vision. However, one of the challenges facing AI is the requirement for large amounts of energy, time, and data to be effective and accurate. READ MORE
-
4. Cyber Threat Detection using Machine Learning on Graphs : Continuous-Time Temporal Graph Learning on Provenance Graphs
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Cyber attacks are ubiquitous and increasingly prevalent in industry, society, and governmental departments. They affect the economy, politics, and individuals. READ MORE
-
5. Segmentation of Neuronal Cells Using Simplistic Methods : A Comparison of the Mean Shift Algorithm and Otsu’s Method
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Information regarding specific neuronal characteristics, such as shape and distribution, is essential for quantifying the brain structure and modelling accurate computer simulations. To this end, it is important to perform cell segmentation; to isolate the cells in a given image from the surrounding tissue, so it can be further analysed. READ MORE