Essays about: "thesis on detection"

Showing result 11 - 15 of 1737 essays containing the words thesis on detection.

  1. 11. Data Augmentation for Object Detection using Deep Reinforcement Learning

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Axel Andersson; Nils Hallerfelt; [2024]
    Keywords : Technology and Engineering;

    Abstract : Data augmentation is a concept which is used to improve machine learning models for computer vision tasks. It is usually done by firstly, defining a set of functions which transforms images and secondly, applying a random selection of these functions on the images. READ MORE

  2. 12. Exploring the Depth-Performance Trade-Off : Applying Torch Pruning to YOLOv8 Models for Semantic Segmentation Tasks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xinchen Wang; [2024]
    Keywords : Deep Learning; Semantic segmentation; Network optimization; Network pruning; Torch Pruning; YOLOv8; Network Depth; Djup lärning; Semantisk segmentering; Nätverksoptimering; Nätverksbeskärning; Fackelbeskärning; YOLOv8; Nätverksdjup;

    Abstract : In order to comprehend the environments from different aspects, a large variety of computer vision methods are developed to detect objects, classify objects or even segment them semantically. Semantic segmentation is growing in significance due to its broad applications in fields such as robotics, environmental understanding for virtual or augmented reality, and autonomous driving. READ MORE

  3. 13. Exploring the Dynamics of Software Bill of Materials (SBOMs) and Security Integration in Open Source Projects

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Anvesh Ambala; [2024]
    Keywords : Supply chain; SBOM; Software Bill of Materials; US Executive Order May 2021; Open-Source Software; Vulnerability; cyber security.;

    Abstract : Background.The rapid expansion of open-source software has introduced significant security challenges, particularly concerning supply chain attacks. Software supply chain attacks, such as the NotPetya attack, have underscored the critical need for robust security measures. READ MORE

  4. 14. Exploring adaptation of self-supervised representation learning to histopathology images for liver cancer detection

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Markus Jonsson; [2024]
    Keywords : Self-supervised learning; Representation learning; Computer vision;

    Abstract : This thesis explores adapting self-supervised representation learning to visual domains beyond natural scenes, focusing on medical imaging. The research addresses the central question: "How can self-supervised representation learning be specifically adapted for detecting liver cancer in histopathology images?" The study utilizes the PAIP 2019 dataset for liver cancer segmentation and employs a self-supervised approach based on the VICReg method. READ MORE

  5. 15. Log Frequency Analysis for Anomaly Detection in Cloud Environments

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Prathyusha Bendapudi; [2024]
    Keywords : Log Analysis; Log Frequency Patterns; anomaly detection; machine learning; cloud environments;

    Abstract : Background: Log analysis has been proven to be highly beneficial in monitoring system behaviour, detecting errors and anomalies, and predicting future trends in systems and applications. However, with continuous evolution of these systems and applications, the amount of log data generated on a timely basis is increasing rapidly. READ MORE