Essays about: "Anomaly detection"
Showing result 16 - 20 of 332 essays containing the words Anomaly detection.
-
16. The Application of Multivariate Statistical Process Control during Industrial Hot Isostatic Pressing Sintering Processes : A Case study at Seco Tools AB
University essay from Luleå tekniska universitet/Institutionen för ekonomi, teknik, konst och samhälleAbstract : This Master's thesis focuses on improving the understanding and monitoring of the Hot Isostatic Pressing (HIP) sintering process used by Seco Tools AB to manufacture cemented carbides for cutting tools. While essential for producing cutting tools with superior hardness and toughness the HIP sintering process introduces a complex relationship between the selected process parameters and the achieved materials properties. READ MORE
-
17. Finding Anomalous Energy ConsumersUsing Time Series Clustering in the Swedish Energy Market
University essay from Umeå universitet/Institutionen för datavetenskapAbstract : Improving the energy efficiency of buildings is important for many reasons. There is a large body of data detailing the hourly energy consumption of buildings. This work studies a large data set from the Swedish energy market. READ MORE
-
18. AI/ML Development for RAN Applications : Deep Learning in Log Event Prediction
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Since many log tracing application and diagnostic commands are now available on nodes at base station, event log can easily be collected, parsed and structured for network performance analysis. In order to improve In Service Performance of customer network, a sequential machine learning model can be trained, test, and deployed on each node to learn from the past events to predict future crashes or a failure. READ MORE
-
19. Unauthorised Session Detection with RNN-LSTM Models and Topological Data Analysis
University essay from KTH/Matematik (Avd.)Abstract : This thesis explores the possibility of using session-based customers data from Svenska Handelsbanken AB to detect fraudulent sessions. Tools within Topological Data Analysis are employed to analyse customers behavior and examine topological properties such as homology and stable rank at the individual level. READ MORE
-
20. Anomaly Detection in the EtherCAT Network of a Power Station : Improving a Graph Convolutional Neural Network Framework
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In this thesis, an anomaly detection framework is assessed and fine-tuned to detect and explain anomalies in a power station, where EtherCAT, an Industrial Control System, is employed for monitoring. The chosen framework is based on a previously published Graph Neural Network (GNN) model, utilizing attention mechanisms to capture complex relationships between diverse measurements within the EtherCAT system. READ MORE