Essays about: "Anomaly"

Showing result 16 - 20 of 502 essays containing the word Anomaly.

  1. 16. Few-Shot Learning for Quality Inspection

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jesper Palmér; Ahmad Alsalehy; [2023]
    Keywords : Few-Shot Learning; AI; Transformers; ViT Deviation; Vision Transformers;

    Abstract : The goal of this project is to find a suitable Few-Shot Learning (FSL) model that can be used in a fault detection system for use in an industrial setting. A dataset of Printed Circuit Board (PCB) images has been created to train different FSL models. READ MORE

  2. 17. A Geophysical Survey of Northern Utö

    University essay from Stockholms universitet/Institutionen för geologiska vetenskaper

    Author : Nicole Flanders; [2023]
    Keywords : ;

    Abstract : A geophysical investigation on the northern part of Utö was carried out between 2020 and 2021 to asses the extent of the iron ore (BIFs) and the iron bearing sulfides that have been surveyed and mined in the past. The survey using analog field equipment combined magnetometry, gravimetry, susceptibility, leveling, density, and thin-section microscopy. READ MORE

  3. 18. Comparing machine learning algorithms for detecting behavioural anomalies

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Fredrik Jansson; [2023]
    Keywords : Anomaly Detection; Machine Learning; Behavioural Anomalies;

    Abstract : Background. Attempted intrusions at companies, either from an insider threat orotherwise, is increasing in frequency. Most commonly used is static analysis and filters to stop specific attacks. READ MORE

  4. 19. Anomaly Detection for Condition Monitoring in Robot Systems

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Mingjie Huang; [2023]
    Keywords : ;

    Abstract : This thesis addresses the detection of wear patterns in robot joints as an indication of the increase in wear level or impending failures. The main challenges include identifying key wear features, developing efficient anomaly detection algorithms, ensuring generalization across different joints and operating conditions, and enabling real-time monitoring. READ MORE

  5. 20. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE