Essays about: "Automated Traffic Analysis"
Showing result 1 - 5 of 33 essays containing the words Automated Traffic Analysis.
-
1. Performance analysis of the communication system of a drone prototype used for maintenance and cleaning
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Drones in today’s life are used in many sectors to automate various tasks. Delivering small items, capturing live events, and surveying dangerous areas are a few incredible operations of drones in today’s society. It can perform many tasks in human-restricted areas with less service time and cost. READ MORE
-
2. Automation of forest road inventory using computer vision and machine learning
University essay from Umeå universitet/Institutionen för fysikAbstract : There are around 300, 000 kilometer of gravel roads throughout the Swedish countryside, used every day by common people and companies. These roads face constant wear due to harsh weather as well as from heavy traffic, and thus, regular maintenance is required to keep up the road standard. READ MORE
-
3. Mitigating serverless cold starts through predicting computational resource demand : Predicting function invocations based on real-time user navigation
University essay from Jönköping University/JTH, Avdelningen för datateknik och informatikAbstract : Serverless functions have emerged as a prominent paradigm in software deployment, providing automated resource scaling, resulting in demand-based operational expenses. One of the most significant challenges associated with serverless functionsis the cold start delay, preventing organisations with latency-critical web applications from adopting a serverless technology. READ MORE
-
4. Anomaly detection in surveillance camera data
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : The importance of detecting anomalies in surveillance camera data cannot be overemphasized. With the increasing availability of surveillance cameras in public and private locations, the need for reliable and effective methods to detect anomalous behavior has become critical to public safety. READ MORE
-
5. Root Cause Analysis and Classification for Firewall Log Events Using NLP Methods
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Network log records are robust evidence for enterprises to make error diagnoses. The current method of Ericsson’s Networks team for troubleshooting is mainly by manual observation. However, as the system is getting vast and complex, the log messages show a growth trend. READ MORE