Essays about: "trace model"
Showing result 1 - 5 of 105 essays containing the words trace model.
-
1. Fitting a photospheric prompt emission model to GRB data: The Kompaneets RMS approximation (KRA)
University essay from KTH/FysikAbstract : Gamma-ray bursts (GRBs) are some of the most energetic events in the universe. Shocks occurring below the photosphere are likely radiation mediated shocks (RMSs) and are suspected to shape the spectra. Due to computational costs of simulating RMSs, models had not been fitted to data and a faster model was needed. READ MORE
-
2. Magnetic field separation for current prediction in three-phase systems : Regression-based current prediction
University essay from Mälardalens universitet/Akademin för innovation, design och teknikAbstract : Current controls the motion of a manipulator. The manipulators at ABB are powered by a three-phase alternating current system where shunt resistors are utilised to measure the current to the motors. Magnetic field sensors are instead investigated to eliminate issues with power losses, the number of components and the cost of the shunt resistors. READ MORE
-
3. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE
-
4. Observability in Machine Learning based Intrusion Detection Systems for RPL-based IoT
University essay from Uppsala universitet/Institutionen för informationsteknologiAbstract : As IoT devices become more and more present in our daily lives, security in IoT networks has become a major concern. A promising approach for detecting attacks is the use of machine learning based Intrusion Detection Systems (IDSs). The attack studied in this thesis is the blackhole attack, an attack causing parts of the network to disconnect. READ MORE
-
5. Club Head Tracking : Visualizing the Golf Swing with Machine Learning
University essay from Uppsala universitet/Signaler och systemAbstract : During the broadcast of a golf tournament, a way to show the audience what a player's swing looks like would be to draw a trace following the movement of the club head. A computer vision model can be trained to identify the position of the club head in an image, but due to the high speed at which professional players swing their clubs coupled with the low frame rate of a typical broadcast camera, the club head is not discernible whatsoever in most frames. READ MORE