Essays about: "LOF"

Showing result 1 - 5 of 11 essays containing the word LOF.

  1. 1. Audio Anomaly Detection in Cars

    University essay from Göteborgs universitet/Institutionen för matematiska vetenskaper

    Author : Asma Hussein; [2023-09-11]
    Keywords : Audio Anomaly detection; Outlier detection; Machine learning; Mel Frequency; Chroma;

    Abstract : Audio anomaly detection in the context of car driving is a crucial task for ensuring vehicle safety and identifying potential faults. This paper aims to investigate and compare different methods for unsupervised audio anomaly detection using a data set consisting of recorded audio data from fault injections and normal "no fault" driving. READ MORE

  2. 2. Exogenous Fault Detection in Aerial Swarms of UAVs

    University essay from KTH/Matematik (Avd.)

    Author : Maja Westberg; [2023]
    Keywords : Exogenous Fault Detection; Local Outlier Factor; Aerial Swarm; Unmanned Aerial Vehicle; Behavioral Feature Vector; Outlier Detection; Cluster Analysis; Exogen Feldetektering; Local Outlier Factor; Drönarsvärm; Obemannad Drönare; Beteendevektor; Avvikelse-Analys; Kluster-Analys;

    Abstract : In this thesis, the main focus is to formulate and test a suitable model forexogenous fault detection in swarms containing unmanned aerial vehicles(UAVs), which are aerial autonomous systems. FOI Swedish DefenseResearch Agency provided the thesis project and research question. READ MORE

  3. 3. W2R: an ensemble Anomaly detection model inspired by language models for web application firewalls security

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Zelong Wang; Athira AnilKumar; [2023]
    Keywords : web application firewall; anomaly detection; word2vec; BERT; dimension reduction; ensemble model;

    Abstract : Nowadays, web application attacks have increased tremendously due to the large number of users and applications. Thus, industries are paying more attention to using Web application Firewalls and improving their security which acts as a shield between the app and the internet by filtering and monitoring the HTTP traffic. READ MORE

  4. 4. Market Entry Through Networks : A Case Study of a Swedish SME

    University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälle

    Author : Samuel Björkqvist; André Jonsson; [2023]
    Keywords : Centrality; Central Nodes; Intermediaries; Legitimacy; Liabilities of Foreignness LoF ; Liabilities of Outsidership LoO ; Social Network Theory SNT ; Trust;

    Abstract : Purpose – This study aims to look into how foreignness and outsidership affect the market entry of a SME and the individual firm's ability to access the correct network as well as look at which support structures are available for the individual firms entering into a new market. Theory/Design & Research Questions – By looking through the lens of Social Network theory, aspects of trust, legitimacy, nodes, foreignness and outsidership, this study has looked into the journey of a large hamburger chain in Sweden that has successfully entered into different markets outside of Sweden. READ MORE

  5. 5. Detection of software incidents from large log material with the use of unsupervised machine learning

    University essay from Göteborgs universitet/Institutionen för data- och informationsteknik

    Author : DIMITRIOS ANASTASIADIS; JAKUB LENART; [2022-06-20]
    Keywords : binary classification; log; anomaly detection; machine learning; Local Outlier Factor; Isolation Forest; PCA; LSTM-Autoencoder;

    Abstract : Computer systems generate log files, which contain information on the various operations performed by these systems. This information can support the process of error/failure detection and debugging. Therefore, anomalies can be spotted in the system through its produced log material. READ MORE