Sökning: "kernel methods"

Visar resultat 6 - 10 av 112 uppsatser innehållade orden kernel methods.

  1. 6. Spatial downscaling of gridded soil moisture products using optical and thermal satellite data: the effects of using different vegetation indices

    Master-uppsats, Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Författare :Tómas Halldórsson Alexander; [2023]
    Nyckelord :Physical Geography and Ecosystem Analysis; Remote Sensing; Soil moisture; Downscaling; Vegetation index; Earth and Environmental Sciences;

    Sammanfattning : Soil moisture (SM) plays an important role in the exchange of heat and water between the surface and atmosphere, impacting water and energy cycles and the climate. Satellite remote sensing offers a global-scale estimation of SM; however, the coarse resolutions of satellite SM products, typically ranging from 25-50 km, are unsuitable for regional analysis. LÄS MER

  2. 7. Clustering on groups for human tracking with 3D LiDAR

    Master-uppsats, Umeå universitet/Institutionen för datavetenskap

    Författare :Simon Utterström; [2023]
    Nyckelord :Computer Vision; Computer Science; AI; Machine Learning; clustering; Kernel Density Clustering; tracking; LiDAR; 3D LiDAR; tracking; human; pedestrian; real time; Datavetenskap; Dataseende; clustering; SLR; CVC; KDEG; KDE; Kernel Density Clustering; HDBSCAN; DBSCAN; LiDAR; point cloud; tracking; human; pedestrian;

    Sammanfattning : 3D LiDAR people detection and tracking applications rely on extracting individual people from the point cloud for reliable tracking. A recurring problem for these applications is under-segmentation caused by people standing close or interacting with each other, which in turn causes the system to lose tracking. LÄS MER

  3. 8. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Johan Henning; [2023]
    Nyckelord :Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Sammanfattning : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. LÄS MER

  4. 9. Machine learning for detecting financial crime from transactional behaviour

    Uppsats för yrkesexamina på avancerad nivå, Uppsala universitet/Signaler och system

    Författare :Markus Englund; [2023]
    Nyckelord :machine learning; deep learning; financial crime; time series; time series classification; XGBoost; maskininlärning; djupinlärning; finansiell brottslighet; tidsserier; klassificering av tidsserier; XGBoost;

    Sammanfattning : Banks and other financial institutions are to a certain extent obligated to ensure that their services are not utilized for any type of financial crime. This thesis investigates the possibility of analyzing bank customers' transactional behaviour with machine learning to detect if they are involved in financial crime. LÄS MER

  5. 10. Predicting resource usage on a Kubernetes platform using Machine Learning Methods

    Master-uppsats, Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Författare :Arvid Gördén; [2023]
    Nyckelord :Master thesis; Kubernetes; scaling; resource management; horizontal pod autoscaler; vertical scaling; machine learning; Masterarbete; Kubernetes; scaling; resurshantering; horisontell pod autoscaler; vertikal scaling; maskininlärning;

    Sammanfattning : Cloud computing and containerization has been on the rise in recent years and have become important areas of research and development in the field of computer science. One of the challenges in distributed and cloud computing is to predict the resource utilization of the nodes that run the applications and services. LÄS MER