Essays about: "Detection rule"
Showing result 11 - 15 of 51 essays containing the words Detection rule.
-
11. Automatic text placement on maps using deep learning keypoint detection models
University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskapAbstract : Labeling the map is one of the most essential parts of the cartographic process that requires a huge time and energy. It is proven that the automation of map labeling is an NP-hard problem. There have been many research studies that tried to solve it such as rule-based methods, metaheuristics, and integer programming. READ MORE
-
12. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset
University essay from Uppsala universitet/Institutionen för informatik och mediaAbstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE
-
13. Interpretable Outlier Detection in Financial Data : Implementation of Isolation Forest and Model-Specific Feature Importance
University essay from Uppsala universitet/Avdelningen för beräkningsvetenskapAbstract : Market manipulation has increased in line with the number of active players in the financialmarkets. The most common methods for monitoring financial markets are rule-based systems,which are limited to previous knowledge of market manipulation. READ MORE
-
14. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI
University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologiAbstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE
-
15. Coreference Resolution for Swedish
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : This report explores possible avenues for developing coreference resolution methods for Swedish. Coreference resolution is an important topic within natural language processing, as it is used as a preprocessing step in various information extraction tasks. READ MORE