Sökning: "exploits"

Visar resultat 6 - 10 av 201 uppsatser innehållade ordet exploits.

  1. 6. Automated Interpretation of Lung Ultrasound for COVID-19 and Tuberculosis diagnosis

    Master-uppsats, Lunds universitet/Matematik LTH

    Författare :Chloé Soormally; [2023]
    Nyckelord :Tuberculosis; COVID-19; Lung Ultrasound; Computer-aided detection CAD ; Deep learning; Technology and Engineering;

    Sammanfattning : BACKGROUND. Early and accurate detection of infectious respiratory diseases like COVID-19 and tuberculosis (TB) plays a crucial role in effective management and the reduction of preventable mortality. LÄS MER

  2. 7. S-MARL: An Algorithm for Single-To-Multi-Agent Reinforcement Learning : Case Study: Formula 1 Race Strategies

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Marinaro Davide; [2023]
    Nyckelord :Reinforcement Learning; Single-to-Multi-Agent; Learning Stability; Exploration-Exploitation trade-off; Race Strategy Optimization; Förstärkningsinlärning; Från en till flera agenter; Stabilitet vid inlärning; Utforskning-exploatering; Optimering av tävlingsstrategier;

    Sammanfattning : A Multi-Agent System is a group of autonomous, intelligent, interacting agents sharing an environment that they observe through sensors, and upon which they act with actuators. The behaviors of these agents can be either defined upfront by programmers or learned by trial-and-error resorting to Reinforcement Learning. LÄS MER

  3. 8. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Chunyu Zhuang; [2023]
    Nyckelord :Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Sammanfattning : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. LÄS MER

  4. 9. The granddaddy of underreaction events: Post-earnings announcement drift and information noisiness on the Swedish market

    D-uppsats, Handelshögskolan i Stockholm/Institutionen för redovisning och finansiering

    Författare :Sofia Berlin; Gustav Sandelin; [2023]
    Nyckelord :Post-earnings announcement drift; market efficiency; earnings surprises; information noisiness; stock price synchronicity;

    Sammanfattning : This paper aims to answer the question of whether there is an existence of post-earnings announcement drift on the Swedish stock market and to what extent it can be explained by information noisiness. A sample of publicly listed firms on the Swedish stock market from 2002 to 2019 is used and the research design includes four different approaches to estimating earnings surprises which is a crucial step in investigating PEAD. LÄS MER

  5. 10. The effects of large-scale nutrition Interventions on Early Childhood and Neonatal Outcomes: evidence from Brazil

    Master-uppsats, Lunds universitet/Nationalekonomiska institutionen

    Författare :Isabella Rego Monteiro; [2023]
    Nyckelord :nutrition; food insecurity; early childhood development; neonatal health; impact evaluation; Brazil; Latin America; Business and Economics;

    Sammanfattning : This study exploits the introduction of a new prioritization criteria for food security interventions to estimate the marginal impact of such programs. Findings indicate that, in municipalities assigned to receive nutrition policies more intensely, the number of children receiving micronutrient supplements was higher. LÄS MER