Essays about: "traffic models"

Showing result 1 - 5 of 315 essays containing the words traffic models.

  1. 1. A Deep Learning Based Approach to Object Recognition from LiDAR Data Along Swedish Railroads

    University essay from KTH/Fastigheter och byggande

    Author : Egil Morast; [2022]
    Keywords : Deep learning; DGCNN; LiDAR; Object recognition; Railroad; Automatisation; Sweden; Point cloud; Djupinlärning; DGCNN; LiDAR; Objektigenkänning; Järnväg; Automatisering; Sverige; Punktmoln;

    Abstract : Malfunction in the overhead contact line system is a common cause of disturbances in the train traffic in Sweden. Due to the preventive methods being inefficient, the Swedish Transport Administration has stated the need to develop the railroad maintenance services and has identified Artificial Intelligence (AI) as an important tool for this undertaking. READ MORE

  2. 2. Learning with Synthetically Blocked Images for Sensor Blockage Detection

    University essay from Linköpings universitet/Datorseende

    Author : Hoang Tran; [2022]
    Keywords : Machine learning; deep learning; neural networks; synthetic data; sensor blockage; domain adaptation;

    Abstract : With the increasing demand for labeled data in machine learning for visual perception tasks, the interest in using synthetically generated data has grown. Due to the existence of a domain gap between synthetic and real data, strategies in domain adaptation are necessary to achieve high performance with models trained on synthetic or mixed data. READ MORE

  3. 3. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Henrik Lindstedt; [2022]
    Keywords : MLP; random forest; CIC-IDS2017; Snort; Intrusion Detection System;

    Abstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE

  4. 4. Detection of performance anomalies through Process Mining

    University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)

    Author : Carmine Marra; [2022]
    Keywords : Process mining; Conformance Checking; performance anomalies; ERTMS ETCS; Railway system; complex computer systems.;

    Abstract : Anomaly detection in computer systems operating within complex environments,such as cyber-physical systems (CPS), has become increasingly popularduring these last years due to useful insights this process can provide aboutcomputer systems’ health conditions against known reference nominal states.As performance anomalies lead degraded service delivery, and, eventually,system-wide failures, promptly detecting such anomalies may trigger timelyrecovery responses. READ MORE

  5. 5. D-band Power Amplifiers in Vertical InGaAs Nanowire MOSFET Technology for 100 Gbps Wireless Communication

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Patrik Blomberg; Ludvig Pile; [2022]
    Keywords : D-band; Power Amplifier; Pseudo-differential common source; Stacked; Vertical InGaAs nanowire; MOSFET; Technology and Engineering;

    Abstract : Two different topologies of power amplifiers (PAs) are designed in the frequency range 130-174.8 GHz for use in backhaul transmitters. These are the pseudo-differential common source (PDCS) and the single-ended stacked amplifier topologies. READ MORE