Essays about: "Detection rule"

Showing result 11 - 15 of 51 essays containing the words Detection rule.

  1. 11. Automatic text placement on maps using deep learning keypoint detection models

    University essay from Lunds universitet/Institutionen för naturgeografi och ekosystemvetenskap

    Author : Azin Khosravi Khorashad; [2022]
    Keywords : machine learning; Stacked hourglass networks; attention mechanism; CNN; geomatics; Earth and Environmental Sciences;

    Abstract : Labeling the map is one of the most essential parts of the cartographic process that requires a huge time and energy. It is proven that the automation of map labeling is an NP-hard problem. There have been many research studies that tried to solve it such as rule-based methods, metaheuristics, and integer programming. READ MORE

  2. 12. Methods for network intrusion detection : Evaluating rule-based methods and machine learning models on the CIC-IDS2017 dataset

    University essay from Uppsala universitet/Institutionen för informatik och media

    Author : Henrik Lindstedt; [2022]
    Keywords : MLP; random forest; CIC-IDS2017; Snort; Intrusion Detection System;

    Abstract : Network intrusion detection is a task aimed to identify malicious network traffic. Malicious networktraffic is generated when a perpetrator attacks a network or internet-connected device with the intent todisrupt, steal or destroy a service or information. READ MORE

  3. 13. Interpretable Outlier Detection in Financial Data : Implementation of Isolation Forest and Model-Specific Feature Importance

    University essay from Uppsala universitet/Avdelningen för beräkningsvetenskap

    Author : Vilhelm Söderström; Kasper Knudsen; [2022]
    Keywords : Outlier Detection; Explainable artificial intelligence; XAI; Isolation Forest; MI-Local-DIFFI;

    Abstract : Market manipulation has increased in line with the number of active players in the financialmarkets. The most common methods for monitoring financial markets are rule-based systems,which are limited to previous knowledge of market manipulation. READ MORE

  4. 14. Increasing the Trustworthiness ofAI-based In-Vehicle IDS usingeXplainable AI

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Hampus Lundberg; [2022]
    Keywords : Intrusion Detection System; In-Vehicle Intrusion Detection System; Machine Learning; Deep Learning; Explainable Artificial Intelligence; Trustworthiness.;

    Abstract : An in-vehicle intrusion detection system (IV-IDS) is one of the protection mechanisms used to detect cyber attacks on electric or autonomous vehicles where anomaly-based IDS solution have better potential at detecting the attacks especially zero-day attacks. Generally, the IV-IDS generate false alarms (falsely detecting normal data as attacks) because of the difficulty to differentiate between normal and attack data. READ MORE

  5. 15. Coreference Resolution for Swedish

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Lisa Vällfors; [2022]
    Keywords : Natural language processing; Information extraction; Machine learning; Random forests; Coreference resolution; Språkteknologi; informationsextraktion; maskininlärning; beslutsträdsinlärning; koreferenslösning;

    Abstract : This report explores possible avenues for developing coreference resolution methods for Swedish. Coreference resolution is an important topic within natural language processing, as it is used as a preprocessing step in various information extraction tasks. READ MORE