Essays about: "LSTM-Networks"

Showing result 1 - 5 of 31 essays containing the word LSTM-Networks.

  1. 1. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Deepthy Prasad; Swathi Hampapura Sripada; [2023]
    Keywords : multivariate - time series; anomaly detection; neural networks; autoencoders; interpretability; counterfactuals;

    Abstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE

  2. 2. Object Recognition in Satellite imagesusing improved ConvolutionalRecurrent Neural Network

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : TARUN NATTALA; [2023]
    Keywords : CRNN; CNN; RNN; Machine Learning and Satellite Image Recognition.;

    Abstract : Background:The background of this research lies in detecting the images from satellites. The recognition of images from satellites has become increasingly importantdue to the vast amount of data that can be obtained from satellites. This thesisaims to develop a method for the recognition of images from satellites using machinelearning techniques. READ MORE

  3. 3. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Shiwei Dong; [2023]
    Keywords : ;

    Abstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE

  4. 4. Exploration and Evaluation of RNN Models on Low-Resource Embedded Devices for Human Activity Recognition

    University essay from KTH/Mekatronik och inbyggda styrsystem

    Author : Helgi Hrafn Björnsson; Jón Kaldal; [2023]
    Keywords : Recurrent Neural Networks; Long Short-Term Memory Networks; Embedded Systems; Human Activity Recognition; Edge AI; TensorFlow Lite Micro; Recurrent Neural Networks; Long Short-Term Memory Networks; Innbyggda systyem; Mänsklig aktivitetsigenkänning; Edge AI; TensorFlow Lite Micro;

    Abstract : Human activity data is typically represented as time series data, and RNNs, often with LSTM cells, are commonly used for recognition in this field. However, RNNs and LSTM-RNNs are often too resource-intensive for real-time applications on resource constrained devices, making them unsuitable. READ MORE

  5. 5. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Oriol Closa; [2023]
    Keywords : ;

    Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE