Sökning: "hyper real"

Visar resultat 1 - 5 av 33 uppsatser innehållade orden hyper real.

  1. 1. Accuracy and Robustness of State of the Art Deepfake Detection Models

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Tobias Carlsson; Oskar Strömberg; [2023]
    Nyckelord :;

    Sammanfattning : With the evolution of artificial intelligence a lot of people have started getting worried about the potential dangers of deepfake images and videos, such as spreading fake videos of influential people. Several solutions to this problem have been proposed with some of the most efficient being convolutional neural networks for face detection in order to differentiate real images from deepfake images generated with a generative adversarial network. LÄS MER

  2. 2. Evaluating Marketing Initiatives using Explainable Machine Learning : An Alternative to Attribution Models

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :João Ferreira; [2023]
    Nyckelord :Explainable Machine Learning; Attribution models; Marketing Automation; Search Engine Optimization; A B testing; Definierad maskininlärning; Attributionsmodeller; Automatisering av marknadsföring; Optimering av sökmotor; A B-tester;

    Sammanfattning : Since its inception, Marketing has always needed more clearly defined incrementality, i.e., a measurement of advertisement effectiveness. Nowadays, Marketing is an evergrowing business; within it, Digital Marketing is taking the spotlight. LÄS MER

  3. 3. An Investigation of Slow HTTP DoS attacks on Intrusion Detection Systems

    Master-uppsats, Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Författare :Venkata Sai Bala Ratan Murali Puvvada; Hemanth Kandala; [2023]
    Nyckelord :Intrusion Detection Systems; Slow HTTP DoS Attacks; Snort; Suricata; Rule sets.;

    Sammanfattning : Network Security Monitoring (NSM) is one of the standard methods used for protecting networks from attackers, and it has four phases: Monitoring, Detection, Forensics/Diagnosis, and Response/Recovery. One of the technologies frequently used for monitoring and detecting malicious traffic in the network is Intrusion Detection Systems (IDS). LÄS MER

  4. 4. “If it was just about cool powers, people could just be New Age” : En kvalitativ jämförande intervjustudie av Temple of the jedi Order och Force Academy

    Uppsats för yrkesexamina på avancerad nivå, Södertörns högskola/Institutionen för historia och samtidsstudier

    Författare :Axel Jäglund Dieserud; [2023]
    Nyckelord :Jediism; Star Wars; Hyper-real religion; New Age; Post secularity;

    Sammanfattning : Jediism is a new religious phenomenon where fictitious material is used as religious source material. The phenomenon is called hyper-real religion because the fictitious source material being used in the real world makes it ‘hyper-real’. This study explored Jediism and its usage of Star Wars as a religious source material. LÄS MER

  5. 5. Supervision : Object motion interpretation using hyperdimensional computing based on object detection run on the edge

    Uppsats för yrkesexamina på avancerad nivå, Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Författare :Albin Andersson Svensson; [2022]
    Nyckelord :Machine learning; Object detection; Motion Interpretation; Hyperdimensional Computing; Vector Symbolic Architecture;

    Sammanfattning : This thesis demonstrates a technique for developing efficient applications interpreting spacial deep learning output using Hyper Dimensional Computing (HDC), also known as Vector Symbolic Architecture (VSA). As a part of the application demonstration, a novel preprocessing technique for motion using state machines and spacial semantic pointers will be explained. LÄS MER