Rozprawy doktorskie na temat „END TO END SECURED”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „END TO END SECURED”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Petagna, Fabio. "Secure End-to-End Communications in Mobile Networks". Doctoral thesis, Universita degli studi di Salerno, 2011. http://hdl.handle.net/10556/1524.
Pełny tekst źródłaCellular communication has become an important part of our daily life. Besides using cell phones for voice communication, we are now able to access the Internet, conduct monetary transactions, send voice, video and text messages and new services continue to be added. The frequencies over which voice is transmitted are public, so voice encryption is necessary to avoid interception of the signal over the air. But once the signal reaches the operators Base Station (BS), it will be transmitted to the receiver over a wired or wireless mean. In either case, no protection is de ned. This does not seem a problem, but this is not true. Along the path across operator network, voice is at risk. It will only be encrypted again, with a di erent key, from the BS to the receiver if the receiver is herself a mobile user. Moreover, voice encryption is not mandatory. The choice whether or not to accept an unprotected communication is up to the network. When adopted, the same encryption algorithm is used for sending SMS messages between mobile telephones and base stations and for encrypting of calls. Unfortunately, vulnerabilities in this encryption systems were already revealed more than 10 years ago and more continue to be discovered. Currently the most popular communication technologies are the GSM and the UMTS. The UMTS is in use as a successor to GSM. Along with mobile phone services, It provides rapid data communication. The security algo- rithms in UMTS di ers from GSM in two important ways: encryption and mutual authentication. Although security standards have been improved, the end- to-end security is not provided... [edited by Author]
IX n.s.
Tahir, Ruhma. "An ICMetric based framework for secure end-to-end communication". Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22281/.
Pełny tekst źródłaVogt, Christian. "Efficient and Secure End-to-End Mobility Support in IPv6". [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007211.
Pełny tekst źródłaNemati, Hamed. "Secure System Virtualization : End-to-End Verification of Memory Isolation". Doctoral thesis, KTH, Teoretisk datalogi, TCS, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213030.
Pełny tekst źródłaQC 20170831
PROSPER
HASPOC
Schmidt, Dawin. "A Security and Privacy Audit of KakaoTalk’s End-to-End Encryption". Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-196360.
Pełny tekst źródłaEnd-to-end kryptering är en allt mer vanligt förekommande funktionalitet bland populära mobila chatttjänster (händanefter appar) med miljontals användare. Under de två senaste åren har många ledande chattappar, bland annat LINE, KakaoTalk, Viber, Facebook Messenger, och WhatsApp, börjat använda end-to-end kryptering. Dock så är de flesta av dessa appar closed-source och det finns begränsad, eller ingen, fristående granskning av systemdesignen för deras end-to-end kryptering. Dessa implementationer kan innebära en stor risk då proprietära chattappar kan använda sig av kryptografiska algoritmer som inte följer best practice för säkerhet eller kryptografi. Vidare så kan statliga myndigheter tvinga de som tillhandahåller chattappar att använda lättdekrypterad export-grade kryptografi för sina produkter. Lägg till det att de flesta vanliga appar har många ytor som kan attackeras, till följd av all funktionalitet de erbjuder. Som ett resultat av detta finns en risk för mjukvarubrister som kan utnyttjas av en hackare för att inkräkta på en användares end-to-end integritet. Ytterligare ett problem är att trots att det är closed-source mjukvara så marknadsför ofta appleverantörerna sina appar som att vara är så säkra att inte ens leverantörerna själva kan dekryptera användarnas meddelanden. Det som hävdas i marknadsföringen riskerar vara missledande eftersom de flesta användarna inte har den tekniska kunskap som krävs för att kunna verifiera att det som hävdas är sant. I den här Master-uppsatsen använder vi KakaoTalk – den mest populära chattappen i Sydkorea – som en fallstudie för att granska och bedömma säkerhetens- och integritets-aspekterna hos deras valbara “Secure Chat” med end-to-end krypteringsfunktionalitet. Vi granskar även KakaoTalk’s användarvillkor för att kunna verifiera påståenden som att “[. . . ] Kakao’s server is unable to decrypt the encryption [. . . ]” från ett tekniskt perspektiv. Det huvudsakliga syftet med denna studien är att belysa hur olika brister i en produkt sammantagna kan skapa en risk för allvarliga vektorattacker mot end-to-end integriteten även fast det finns flera skyddslager. Mer specifikt visar vi hur en central katalogserver för public-keys gör end-to-end krypteringssystemet sårbart mot välkända operator-site man-in-the-middle-attacker. Trots att denna naiva typ av attack kan verka uppenbar, argumenterar vi för att (KakaoTalk) användare borde veta om styrkorna och svagheterna med en särskild systemdesign för att kunna göra ett informerat val för om de ska lita på säkerheten hos en chattapplikation eller inte.
Vogt, Christian [Verfasser]. "Efficient and Secure End-to-End Mobility Support in IPv6 / Christian Vogt". Aachen : Shaker, 2007. http://d-nb.info/1164340271/34.
Pełny tekst źródłaUnurkhaan, Esbold. "Secure end-to-end transport over SCTP a new security extension for SCTP /". [S.l. : s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=975686569.
Pełny tekst źródłaKühner, Holger [Verfasser], i H. [Akademischer Betreuer] Hartenstein. "Performance of End-to-End Secure Data Sharing / Holger Kühner ; Betreuer: H. Hartenstein". Karlsruhe : KIT-Bibliothek, 2017. http://d-nb.info/1132997763/34.
Pełny tekst źródłaChan, Siu Ping. "End-to-end streaming protocols with QoS control for secure IP multimedia communications /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202004%20CHAN.
Pełny tekst źródłaIncludes bibliographical references (leaves 167-175). Also available in electronic version. Access restricted to campus users.
Seggelmann, Robin [Verfasser], Erwin P. [Akademischer Betreuer] Rathgeb i Bruno [Akademischer Betreuer] Müller-Clostermann. "SCTP : Strategies to Secure End-To-End Communication / Robin Seggelmann. Gutachter: Bruno Müller-Clostermann. Betreuer: Erwin P. Rathgeb". Duisburg, 2013. http://d-nb.info/1030475571/34.
Pełny tekst źródłaGhorbanzadeh, Mohammad. "Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments". Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/64390.
Pełny tekst źródłaPh. D.
Cohn-Gordon, Katriel. "On secure messaging". Thesis, University of Oxford, 2018. http://ora.ox.ac.uk/objects/uuid:a6da6196-f216-4d57-9035-72903006197c.
Pełny tekst źródłaBurgon, Benjamin W. "Pwm: A Secure Webmail System Designed for Easy Adoption". BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/3896.
Pełny tekst źródłaSong, Yuanzheng. "Browser-Based Manual Encryption". BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4235.
Pełny tekst źródłaMonson, Tyler Jay. "Usable Secure Email Through Short-Lived Keys". BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6568.
Pełny tekst źródłaVaziripour, Elham. "Usable Security and Privacy for Secure Messaging Applications". BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/8830.
Pełny tekst źródłaRuoti, Scott. "Usable, Secure Content-Based Encryption on the Web". BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6083.
Pełny tekst źródłaParrish, William J. Tovar Daniel R. "Tactical wireless networking in coalition environments : implementing an IEEE 802.20 wireless end-user network utilizing FLASH-OFDM to provide a secure mobile extension to existing WAN /". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FParrish.pdf.
Pełny tekst źródłaThesis Advisor(s): Alex Bordetsky. Includes bibliographical references (p. 113-115). Also available online.
Tovar, Daniel R. "Tactical wireless networking in coalition environments implementing an IEEE 802.20 wireless end-user network utilizing FLASH-OFDM to provide a secure mobile extension to existing WAN". Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/2077.
Pełny tekst źródłaPearce, Michael Bruce. "Development and evaluation of a secure web gateway with messaging functionality : utilizing existing ICAP and open-source tools to notify and protect end users from Internet security threats". Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5457.
Pełny tekst źródłaLi, Jizhizi. "End-to-end Animal Matting". Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/22897.
Pełny tekst źródłaRangarajan, Vinod K. (Vinod Kashyap) 1975. "End-to-end connectivity across firewalls". Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/47623.
Pełny tekst źródłaIncludes bibliographical references (leaves 53-54).
by Vinod K. Rangarajan.
S.B.and M.Eng.
Chan, William. "End-to-End Speech Recognition Models". Research Showcase @ CMU, 2016. http://repository.cmu.edu/dissertations/723.
Pełny tekst źródłaLe, BeEm V. "Distributed and end-to-end testing". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLe.pdf.
Pełny tekst źródłaThesis Advisor: Huynh, Thomas V. Second Reader: Barrera, Raymond. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: distributed, End-to-End, combat systems, C4I Systems, pay-per-test, Goal Programming (GP), Distributed Engineering Plant (DEP), E2E Lab, PMW, PEO C4I, NAVSEA, SPAWAR. Includes bibliographical references (p. 53-54). Also available in print.
Chaudry, Kashif, i Elma Karadza. "End-to-End Application Billing in 3G". Thesis, Linköping University, Department of Science and Technology, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1654.
Pełny tekst źródłaWe have 3G on the doorstep but nothing seems to attract ordinary people to this technology. To attract the mass market the telecom industry must show something beyond high bit rates. They must show how ordinary people can take advantage of this new technology. This is done by showing the possibilities of the new technology and by demonstrating applications that it will handle. The telecom industry must convince the telecom operators to invest in this technology and the only thing that matters to them is how much revenue they can make by adopting the upcoming technology.
To convince the operators industry must show how the operators can charge for the new types of applications that will be introduced soon. This is the main reason why this Master's Thesis has been conducted. The purpose of this thesis is to provide a demonstration to Ericsson's 3G lab in Katrineholm in the form of an IP application with a billing solution. This thesis describes the migration from 1G to 3G and examines existing and future billing strategies as well.
The IP application is an application that uses progressive streaming in order to stream multimedia content to a PDA connected to a 3G phone. This application is platform independent because it is placed on leading Web servers, Apache and IIS.
The billing application consists of a number of steps. The first step is logging, which is performed by the Web server on which the streaming application is placed. The second step, processing and billing, is performed in the BGw, which is Ericsson's mediation tool, and the SQL server.The third step is displaying the bill, which is done by using ASP to create an active HTML page.
Holmström, Maria. "End-to-end monitoring of mobile services". Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1671.
Pełny tekst źródłaThe growing market of mobile services through SMS, MMS, WAP and soon also for 3G protocols, requires efficient test methods to ensure that the customers get what they are paying for and in a reasonable time. Preferably, these tests should be done automatically and come as close to real conditions as possible. It would be valuable to be able to make tests from end to end, i.e. requesting and receiving the mobile services on a real mobile phone and combine that with a system that controls and evaluates the tests.
This thesis presents a solution to how the part of an end-to-end monitoring system for mobile services that runs on a mobile phone can be designed and implemented. The phone is made to interpret commands from a control process on a remote server and turn them into mobile service requests in a proper format (e.g. SMS or MMS). When it receives the reply from a mobile service provider, it forwards the relevant result information to the control process.
The monitoring system is based on Symbian OS, an operating system developed to suit handheld devices like mobile phones. The current implementation supports tests for SMS and MMS services.
The system is to be used by mobile operators or other providers of mobile services, which want to test and monitor their services.
Lazar, Mihai. "Empirical modeling of end-to-end jitter". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0019/MQ58472.pdf.
Pełny tekst źródłaBrown, Ian. "End-to-end security in active networks". Thesis, University College London (University of London), 2001. http://discovery.ucl.ac.uk/3882/.
Pełny tekst źródłaMaaz, Khan. "EVASIVE INTERNET PROTOCOL: END TO END PERFORMANCE". Case Western Reserve University School of Graduate Studies / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=case1308179859.
Pełny tekst źródłaZhang, Da. "End to end testing using integrated tools". The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1338300180.
Pełny tekst źródłaKayayurt, Barış Tuğlular Tuğkan. "End-to-end security for mobile devices/". [s.l.]: [s.n.], 2004. http://library.iyte.edu.tr/tezler/master/bilgisayaryazilimi/T000492.pdf.
Pełny tekst źródłaLowden, Mia Rochelle Ahmed Shawn. "Genesis of end-to-end chromosome fusions". Chapel Hill, N.C. : University of North Carolina at Chapel Hill, 2008. http://dc.lib.unc.edu/u?/etd,2227.
Pełny tekst źródłaTitle from electronic title page (viewed Jun. 26, 2009). "... in partial fulfillment of requirements for the degree of Doctor of Philosophy in the Department of Biology." Discipline: Biology; Department/School: Biology.
Wigington, Curtis Michael. "End-to-End Full-Page Handwriting Recognition". BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/7099.
Pełny tekst źródłaGuerrero, Santander Cesar. "End-to-end available bandwidth estimation and monitoring". [Tampa, Fla.] : University of South Florida, 2009. http://digital.lib.usf.edu/?e14.2863.
Pełny tekst źródłaAgarwala, Sandip. "System Support for End-to-End Performance Management". Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16171.
Pełny tekst źródłaØztarman, Jo Mehmet Sollihagen. "End-to-End Data Protection of SMS Messages". Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-15075.
Pełny tekst źródłaJin, Zhiqun, i Shijie Zhu. "END-TO-END TIMING ANALYSIS OF TASK-CHAINS". Thesis, Mälardalens högskola, Inbyggda system, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-36694.
Pełny tekst źródłaZhiqun, Jin, i Zhu Shijie. "End-to-end Timing Analysis of Task-Chains". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-36751.
Pełny tekst źródłaStrigér, Amanda. "End-to-End Trainable Chatbot for Restaurant Recommendations". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213982.
Pełny tekst źródłaChatbotar kan användas för att automatisera enkla uppgifter, som att hitta en restaurang och boka ett bord. Att skapa ett sådant konversationssystem kan dock vara svårt, tidskrävande, och kräva mycket domänkunskap. I denna uppsats undersöks om det är möjligt att använda ett neuralt nätverk för att skapa en chatbot som kan lära sig att automatisera en tjänst som hjälper användaren hitta en restaurang och boka ett bord. För att undersöka detta implementerades en så kallad ``sequence-to-sequence''-modell som sedan tränades på domänspecifik dialogdata. Systemets styrkor och svagheter utvärderades och dess förmåga att generera korrekta svar jämfördes med flera andra modeller. Vår relativt enkla modell uppnådde liknande resultat som den mest avancerade av de andra modellerna. Resultaten visar modellens styrkor, men påvisar även signifikanta brister. Dessa brister gör att systemet, i sig självt, inte kan användas för att skapa en chatbot som kan hjälpa en användare att hitta en passande restaurang. Utvärderingen har dock bidragit med en grundlig undersökning av vilka fel som görs, vilket kan underlätta framtida arbete inom området.
Kanuparthy, Partha V. "End-to-end inference of internet performance problems". Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45938.
Pełny tekst źródłaCosta, M. "End-to-end containment of internet worm epidemics". Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.598013.
Pełny tekst źródłaMauthe, Andreas Ulrich. "End-to-end support for multimedia multipeer communications". Thesis, Lancaster University, 1998. http://eprints.lancs.ac.uk/11590/.
Pełny tekst źródłaAmini, Alexander Andre. "Robust end-to-end learning for autonomous vehicles". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/118031.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 59-64).
Deep learning has been successfully applied to "end-to-end" learning of the autonomous driving task, where a deep neural network learns to predict steering control commands from camera data input. While these works support reactionary control, the representation learned is not usable for higher-level decision making required for autonomous navigation. This thesis tackles the problem of learning a representation to predict a continuous control probability distribution, and thus steering control options and bounds for those options, which can be used for autonomous navigation. Each mode in the learned distribution encodes a possible macro-action that the system could execute at that instant, and the covariances of the modes place bounds on safe steering control values. Our approach has the added advantage of being trained solely on unlabeled data collected from inexpensive cameras. In addition to uncertainty estimates computed directly by our model, we add robustness by developing a novel stochastic dropout sampling technique for estimating the inherent confidence of the model's output. We install the relevant processing hardware pipeline on-board a full-scale autonomous vehicle and integrate our learning algorithms for real-time control inference. Finally, we evaluate our models on a challenging dataset containing a wide variety of driving conditions, and show that the algorithms developed as part of this thesis are capable of successfully controlling the vehicle on real roads and even under a parallel autonomy paradigm wherein control is shared between human and robot.
by Alexander Andre Amini.
S.M.
Andersen, David G. (David Godbe) 1975. "Improving end-to-end availability using overlay networks". Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/30159.
Pełny tekst źródłaIncludes bibliographical references (p. 139-150).
The end-to-end availability of Internet services is between two and three orders of magnitude worse than other important engineered systems, including the US airline system, the 911 emergency response system, and the US public telephone system. This dissertation explores three systems designed to mask Internet failures, and, through a study of three years of data collected on a 31-site testbed, why these failures happen and how effectively they can be masked. A core aspect of many of the failures that interrupt end-to-end communication is that they fall outside the expected domain of well-behaved network failures. Many traditional techniques cope with link and router failures; as a result, the remaining failures are those caused by software and hardware bugs, misconfiguration, malice, or the inability of current routing systems to cope with persistent congestion.The effects of these failures are exacerbated because Internet services depend upon the proper functioning of many components-wide-area routing, access links, the domain name system, and the servers themselves-and a failure in any of them can prove disastrous to the proper functioning of the service. This dissertation describes three complementary systems to increase Internet availability in the face of such failures. Each system builds upon the idea of an overlay network, a network created dynamically between a group of cooperating Internet hosts. The first two systems, Resilient Overlay Networks (RON) and Multi-homed Overlay Networks (MONET) determine whether the Internet path between two hosts is working on an end-to-end basis. Both systems exploit the considerable redundancy available in the underlying Internet to find failure-disjoint paths between nodes, and forward traffic along a working path. RON is able to avoid 50% of the Internet outages that interrupt communication between a small group of communicating nodes.MONET is more aggressive, combining an overlay network of Web proxies with explicitly engineered redundant links to the Internet to also mask client access link failures. Eighteen months of measurements from a six-site deployment of MONET show that it increases a client's ability to access working Web sites by nearly an order of magnitude. Where RON and MONET combat accidental failures, the Mayday system guards against denial- of-service attacks by surrounding a vulnerable Internet server with a ring of filtering routers. Mayday then uses a set of overlay nodes to act as mediators between the service and its clients, permitting only properly authenticated traffic to reach the server.
by David Godbe Andersen.
Ph.D.
Rodittis, Kathy, i Alan Cooke. "Next Generation End to End Avionics Bus Monitoring". International Foundation for Telemetering, 2013. http://hdl.handle.net/10150/579512.
Pełny tekst źródłaWith the advent of networked based data acquisition systems comes the opportunity to acquire, transmit and store potentially very large volumes of data. Despite this, and the increased size of the data acquisition networks, the use of tightly integrated hardware, and setup and analysis software enable the FTI engineer to save time and increase productivity. This paper outlines how the use of innovative bus packetizer technology and the close integration of FTI software can simplify this process. The paper describes how packetizer technology is used to acquire data from avionics buses, and how it packages this data in a format that is optimized for network based systems. The paper further describes how software can simplify the process of configuring avionics bus monitors in addition to automating and optimizing the transport of data from various nodes in the acquisition network for transmission to either network recorders or via a telemetry link.
Moodie, Myron L., Maria S. Araujo, Thomas B. Grace, William A. Malatesta i Ben A. Abbott. "iNET Standards Validation: End-to-End Performance Assessment". International Foundation for Telemetering, 2010. http://hdl.handle.net/10150/604282.
Pełny tekst źródłaThe integrated Network-Enhanced Telemetry (iNET) project has developed standards for network-based telemetry systems. While these standards are based largely on the existing body of commercial networking protocols, the Telemetry Network System (TmNS) has more stringent performance requirements in the areas of latency, throughput, operation over constrained links, and quality of service (QoS) than typical networked applications. A variety of initial evaluations were undertaken to exercise the interfaces of the current standards and determine real-world performance. The core end-to-end performance initial evaluations focus collectively on the movement of telemetry data through the TmNS. These initial evaluations addressed two areas: end-to-end data delivery and parametric data extraction. This paper presents the approach taken by these ongoing efforts and provides initial results. The latest results will be presented at ITC 2010.
del, Castillo Iglesias Daniel. "End-to-end Learning for Singing-Language Identification". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277837.
Pełny tekst źródłaSång-språkidentifiering (SLID) består av att identifiera språket av de sjung- ade texterna direkt från en viss musikinspelning. Denna uppgift är av sär- skilt intresse för musikströmmande företag som drar nytta av applikationer för musiklokalisering. Däremot, är språk en komplex semantisk kvalitet av musikinspelningar, vilket gör upptäckten och utnyttjandet av dess karakteris- tiska funktioner extremt utmanande. Under de senaste åren har de flesta MIR- forskningsinsatser riktats mot problem som inte är relaterade till språk, och de flesta av framstegen med metoder för språkidentifiering förblir långt ifrån musikaliska applikationer. Detta arbete undersöker SLID-problemet, dess ut- maningar och begränsningar, med syftet att hitta en ny lösning som effektivt ut- nyttjar kraften hos djupa inlärningsarkitekturer och en relativt storskalig privat datasats. Som en del av datasatsförbehandlingen föreslås en ny metod för att identifiera högnivåstrukturen av låtar. Som klassificeringsmodell utbildas och utvärderas ett Temporal Convolutional Network (TCN) på musikinspelningar som hör till sju av de mest framstående språk på den globala musikmarkna- den. Även om resultaten visar mycket lägre prestation med avseende på den nuvarande bästa-möjliga-teknik, realiseras en grundlig diskussion med syftet att utforska begränsningarna för SLID, orsakerna till dålig prestation identi- fieras och den nuvarande kunskapen om SLID problemet utökas. Framtida förbättringar och arbetslinjer a gränsas med avseende att stimulera ytterligare forskning mot denna riktning.
Olsson, Anton, i Felix Rosberg. "Domain Transfer for End-to-end Reinforcement Learning". Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-43042.
Pełny tekst źródłaIbrahim, Ahmed Sobhy Elnady. "End-To-End Text Detection Using Deep Learning". Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/81277.
Pełny tekst źródłaPh. D.
Pritchard, Adaleigh Elizabeth. "Modeling End-to-End Annealing of Intermediate Filaments". The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397743583.
Pełny tekst źródła