Essays about: "• Clustering Models thesis"

Showing result 6 - 10 of 137 essays containing the words • Clustering Models thesis.

  1. 6. Customer churn prediction in a slow fashion e-commerce context : An analysis of the effect of static data in customer churn prediction

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Luca Colasanti; [2023]
    Keywords : Survival Analysis; Time To Event prediction; Churn retention; Machine Learning; Deep Learning; Customer Clustering; E-commerce; Analisi di sopravvivenza; Previsione del tempo a evento; Ritenzione dall’abbandono dei clienti; Apprendimento automatico; Apprendimento profondo; Segmentazione della clientela; Commercio elettronico; Överlevnadsanalys; Tid till händelseförutsägelse; Churn Prediction; Maskininlärning; Djuplärning; Kundkluster; E-handel;

    Abstract : Survival analysis is a subfield of statistics where the goal is to analyse and model the data where the outcome is the time until the occurrence of an event of interest. Because of the intrinsic temporal nature of the analysis, the employment of more recently developed sequential models (Recurrent Neural Network (RNN) and Long Short Term Memory (LSTM)) has been paired with the use of dynamic temporal features, in contrast with the past reliance on static ones. READ MORE

  2. 7. Condition Monitoring Of Machine Components From Drive Data Using Semi-Supervised Anomaly Detection Methods

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Tim Leon WyWiol; [2023]
    Keywords : ;

    Abstract : The mission of the machine manufacturer is to gain insights from machine data to increase their machines' efficiency and sustainability. Continuously monitoring the machine data with machine learning helps to detect emerging mechanical problems and prevents unexpected failures. READ MORE

  3. 8. Hidden Markov Models for Intrusion Detection Under Background Activity

    University essay from KTH/Matematisk statistik

    Author : Robert Siridol-Kjellberg; [2023]
    Keywords : Hidden Markov models; Cyber security; Intrusion detection; Clustering; Background subtraction; Dolda Markovmodeller; Cybersäkerhet; Dataintrång; Klustring; Bakgrundssubtraktion;

    Abstract : Detecting a malicious hacker intruding on a network system can be difficult. This challenge is made even more complex by the network activity generated by normal users and by the fact that it is impossible to know the hacker’s exact actions. READ MORE

  4. 9. Evaluating Process Mining Techniques on PACS Command Usage Data : Exploring common process mining techniques and evaluating their applicability on PACS event log data for domain-specific workflow analysis

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Axel Ekblom; Jacob Karlén; [2023]
    Keywords : process mining; workflow mining; data mining; radiology; PACS;

    Abstract : Many software companies today collect command usage data by monitoring and logging user interactions within their applications. This is not always utilised to its full potential, but with the use of state-of-the-art process mining techniques, this command usage log data can be used to gain insights about the users' workflows. READ MORE

  5. 10. Identification of Fibers in Micro-CT Images of Paperboard Using Deep Learning

    University essay from Lunds universitet/Hållfasthetslära; Lunds universitet/Institutionen för byggvetenskaper

    Author : David Rydgård; [2023]
    Keywords : Fiber networks; Paperboard mechanics; Deep learning; Tomography; Image analysis; Technology and Engineering;

    Abstract : This master thesis project explores the possibility of using deep learning to segment individual fibers in three-dimensional tomography images of paperboard fiber networks. We test a method which has previously been used to segment fibers in images of glass fiber reinforced polymers. READ MORE