Showing 521 - 540 results of 2,983 for search '"anomaly detection"', query time: 0.17s Refine Results
  1. 521

    Time Series Anomaly Detection using Prediction-Reconstruction Mixture Errors by Wong, Lawrence C.

    Published 2022
    “…Anomaly detection on time series data is increasingly common across various industrial domains that require monitoring metrics to prevent potential accidents and economic losses. …”
    Get full text
    Thesis
  2. 522

    Applications of AI on Resource-ConstrainedHardware with a focus on Anomaly Detection by Ziegler, Travis

    Published 2023
    “…This thesis makes contributions to the field by (1) benchmarking common AI inference engines to identify trade-offs between them, (2) developing a framework that can assist neural-architecture searches to discover more efficient models, (3) proposing model conversion techniques that enable online-learning on MCUs, resulting in improved real-world accuracy, (4) creating a novel visual anomaly detector for MCUs, and (5) collecting a new dataset for anomaly detection benchmarks. The task of visual anomaly detection is to discern between known "Good" objects and objects that are slightly damaged or have imperfects. …”
    Get full text
    Thesis
  3. 523

    Modeling Control Signals for Reconstruction-based Time Series Anomaly Detection by Song, Grace Y.

    Published 2024
    “…Automated time series anomaly detection methods can provide insights while reducing the load placed on human experts in a variety of settings. …”
    Get full text
    Thesis
  4. 524
  5. 525
  6. 526
  7. 527
  8. 528

    Applying graph neural network to multivariate time series anomaly detection by Mao, Yiyun

    Published 2024
    “…Motivated by the need to explore advanced anomaly detection techniques, this study investigates the performance of graph neural network-based anomaly detection models on multivariate time series data. …”
    Get full text
    Final Year Project (FYP)
  9. 529
  10. 530

    Analysis of machine learning application in campus network traffic anomaly detection by Li, Rongrong

    Published 2024
    “…The machine algorithms have higher accuracy than other algorithms in network data flow anomaly detection. This study has important reference value for campus network security research and verifies the important role of machine learning algorithms in detecting anomalies in campus network traffic.…”
    Get full text
    Journal Article
  11. 531
  12. 532

    Data-driven phase extraction for anomaly detection of repetitive human movements by Jatesiktat, Prayook

    Published 2019
    “…This standardization allows the principal component analysis reconstruction to be applied for anomaly detection. The whole modelling workflow not only works on a gold-standard marker-based motion capture system, but it is also compatible with our motion capture system which integrates a Kinect sensor with wrist-worn inertial measurement units (IMU). …”
    Get full text
    Get full text
    Thesis-Doctor of Philosophy
  13. 533
  14. 534

    Early warning systems for malaria outbreaks in Thailand: an anomaly detection approach by Srimokla, O, Pan-ngum, W, Khamsiriwatchara, A, Padungtod, C, Tipmontree, R, Choosri, N, Saralamba, S

    Published 2024
    “…In this study, an anomaly detection system is introduced as an early warning mechanism for potential malaria outbreaks in countries like Thailand.…”
    Journal article
  15. 535

    Anomaly detection through spatio-temporal context modeling in crowded scenes by Lu, T., Wu, L., Ma, X., Shivakumara, P., Tan, C.L.

    Published 2014
    “…The proposed framework essentially turns the anomaly detection process into two parts, namely, motion pattern representation and crowded context modeling. …”
    Get full text
    Conference or Workshop Item
  16. 536

    Machine learning-based anomaly detection in NFV: a comprehensive survey by Sehar Zehra, Ummay Faseeha, Hassan Jamil Syed, Fahad Samad, Ashraf Osman Ibrahim Elsayed, Anas W. Abulfaraj, Wamda Nagmeldin

    Published 2023
    “…It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. …”
    Get full text
    Get full text
    Article
  17. 537

    Host-based packet header anomaly detection using statistical analysis by Yassin, Warusia, Udzir, Nur Izura, Abdullah, Azizol, Abdullah @ Selimun, Mohd Taufik, Muda, Zaiton, Zulzalil, Hazura

    Published 2013
    “…The exposure of network packets to frequent cyber attacks has increased the need for designing statistical-based anomaly detection recently. Conceptually, the statistical based anomaly detection attracts researcher's attention, but technically, the low attack detection rates remains an open challenges. …”
    Get full text
    Conference or Workshop Item
  18. 538
  19. 539

    An anti virus scheme using digital signature and anomaly detection techniques by Subramaniam, Suresh Babu

    Published 2003
    “…The scheme comprises two layers of protection, where the first layer implements digital signature technique while the second layer implements anomaly detection technique. In the scheme, newly downloaded files that have been digitally signed using SHA-l and RSA algorithms are verified at the first layer. …”
    Get full text
    Thesis
  20. 540

    CICIDS-2017 dataset feature analysis with information gain for anomaly detection by Kurniabudi, Kurniabudi, Stiawan, Deris, Darmawijoyo, Darmawijoyo, Idris, Mohd. Yazid, Bamhdi, Alwi M., Budiarto, Rahmat

    Published 2020
    “…The objective of this study is to analyze relevant and significant features of huge network traffic to be used to improve the accuracy of traffic anomaly detection and to decrease its execution time. Information Gain is the most feature selection technique used in Intrusion Detection System (IDS) research. …”
    Get full text
    Article