Essays about: "LSTM-Networks"
Showing result 1 - 5 of 31 essays containing the word LSTM-Networks.
-
1. Neural Network-based Anomaly Detection Models and Interpretability Methods for Multivariate Time Series Data
University essay from Stockholms universitet/Institutionen för data- och systemvetenskapAbstract : Anomaly detection plays a crucial role in various domains, such as transportation, cybersecurity, and industrial monitoring, where the timely identification of unusual patterns or outliers is of utmost importance. Traditional statistical techniques have limitations in handling complex and highdimensional data, which motivates the use of deep learning approaches. READ MORE
-
2. Object Recognition in Satellite imagesusing improved ConvolutionalRecurrent Neural Network
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background:The background of this research lies in detecting the images from satellites. The recognition of images from satellites has become increasingly importantdue to the vast amount of data that can be obtained from satellites. This thesisaims to develop a method for the recognition of images from satellites using machinelearning techniques. READ MORE
-
3. Preserving Privacy in Cloud Services by Using an Explainable Deep-Learning Model for Anomaly Detection
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : As cloud services become increasingly popular, ensuring their privacy and security has become a significant concern for users. Cloud computing involves Data Service Outsourcing and Computation Outsourcing, which require additional security considerations compared to traditional computing. READ MORE
-
4. Exploration and Evaluation of RNN Models on Low-Resource Embedded Devices for Human Activity Recognition
University essay from KTH/Mekatronik och inbyggda styrsystemAbstract : Human activity data is typically represented as time series data, and RNNs, often with LSTM cells, are commonly used for recognition in this field. However, RNNs and LSTM-RNNs are often too resource-intensive for real-time applications on resource constrained devices, making them unsuitable. READ MORE
-
5. LSTM-attack on polyalphabetic cyphers with known plaintext : Case study on the Hagelin C-38 and Siemens and Halske T52
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Polyalphabetic cyphers have been used for centuries and well into the 1970s to transmit all kinds of messages. Since then, computers and modern cryptography have taken over making bruteforce attacks unfeasible when designed properly. READ MORE