The Faculty of Mathematics and Natural Sciences: Search
Now showing items 281-290 of 349
Constructive Approximation and Learning by Greedy Algorithms
(2018-09-06)
This thesis develops several kernel-based greedy algorithms for different machine learning problems and analyzes their theoretical and empirical properties. Greedy approaches have been extensively used in the past for ...
Articulated Human Pose Estimation in Unconstrained Images and Videos
(2018-12-12)
The understanding of the articulated human body pose is of great interest in many scenarios. While humans have an unmatched ability to effortlessly extract and interpret such information in any unconstrained environment, ...
Performance Analysis of Bearings-only Tracking Problems for Maneuvering Target and Heterogeneous Sensor Applications
(2018-12-11)
State estimation, i.e. determining the trajectory, of a maneuvering target from noisy measurements collected by a single or multiple passive sensors (e.g. passive sonar and radar) has wide civil and military applications, ......
Conceptualization of Computational Modeling Approaches and Interpretation of the Role of Neuroimaging Indices in Pathomechanisms for Pre-Clinical Detection of Alzheimer Disease
(2018-12-13)
With swift advancements in next-generation sequencing technologies alongside the voluminous growth of biological data, a diversity of various data resources such as databases and web services have been created to facilitate ...
Nonlinear Filtering based on Log-homotopy Particle Flow: Methodological Clarification and Numerical Evaluation
(2018-10-12)
The state estimation of dynamical systems based on measurements is an ubiquitous problem. This is relevant in applications like robotics, industrial manufacturing, computer vision, target tracking etc. Recursive Bayesian ...
Formalization and Detection of Host-Based Code Injection Attacks in the Context of Malware
(2018-10-31)
The Host-Based Code Injection Attack (HBCIAs) is a technique that malicious software utilizes in order to avoid detection or steal sensitive information. In a nutshell, this is a local attack where code is injected across ...
Scalable Algorithms for Parallel Tree-based Adaptive Mesh Refinement with General Element Types
(2018-12-12)
In this thesis, we develop, discuss and implement algorithms for scalable parallel tree-based adaptive mesh refinement (AMR) using space-filling curves (SFCs). We create an AMR software that works independently of the used ...
Example-Based Urban Modeling
(2018-09-26)
The manual modeling of virtual cities or suburban regions is an extremely time-consuming task, which expects expert knowledge of different fields. Existing modeling tool-sets have a steep learning curve and may need special ...
Robust Speech Recognition for German and Dialectal Broadcast Programmes
(2018-10-25)
Audio mining systems automatically analyse large amounts of heterogeneous media files such as television and radio programmes so that the analysed audio content can be efficiently searched for spoken words. Typically audio ...
Light Propagation in Digital Material Structures
(2019-03-26)
Light takes many paths throughout the physical environment, defined by a multitude of interactions with matter, before reaching an imaging sensor or the human eye and thus forming the visual perception of the world. ...