Essays about: "training strategy"
Showing result 1 - 5 of 232 essays containing the words training strategy.
-
1. Gamification for technology-enhanced mineral value chain teaching and learning: serious gaming for geometallurgy concept
University essay from Luleå tekniska universitet/Institutionen för samhällsbyggnad och naturresurserAbstract : The concept of gamification is being increasingly explored and applied to offer new teaching or training tools to teachers, students or employees. The field of geology and geometallurgy wasn’t particularly discussed in the topic of gamification. READ MORE
-
2. Classifying femur fractures using federated learning
University essay from Linköpings universitet/Statistik och maskininlärningAbstract : The rarity and subtle radiographic features of atypical femoral fractures (AFF) make it difficult to distinguish radiologically from normal femoral fractures (NFF). Compared with NFF, AFF has subtle radiological features and is associated with the long-term use of bisphosphonates for the treatment of osteoporosis. READ MORE
-
3. DIFFERENTIAL OUTCOME TRAINING AND HUMANOID ROBOT FEEDBACK ON A VISUOSPATIAL GAMIFIED TASK: An experimental study investigating learning, affective social engagement cues and cognitive learning strategies
University essay from Institutionen för tillämpad informationsteknologiAbstract : By combining Differential Outcome Training (DOT), the usage of unique stimulus-response pairings, and feedback from a humanoid simulated robot (SDK) this study aims to improve learning performance of subjects on a visuospatial gamified memory task. This is achieved by using the SDK as an interface for an algorithm that provides audiovisual, reinforcing feedback promoting engangement in a new dyadic setup for a gamified task. READ MORE
-
4. Recognizing and Defending Against Phishing Attacks in Large Organizations
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : As technology keeps integrating further into our personal and professional lives, digital security is a growing concern for our individual and public safety. Email phishing is the most common attack vector, often utilized by malicious actors to trick victims into taking irresponsible actions that benefit the attackers. READ MORE
-
5. Active learning for text classification in cyber security
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the domain of cyber security, machine learning promises advanced threat detection. However, the volume of available unlabeled data poses challenges for efficient data management. This study investigates the potential for active learning, a subset of interactive machine learning, to reduce the effort required for manual data labelling. READ MORE