Essays about: "One-Class Support Vector Machine"

Showing result 1 - 5 of 22 essays containing the words One-Class Support Vector Machine.

  1. 1. Audio Anomaly Detection in Cars

    University essay from Göteborgs universitet/Institutionen för matematiska vetenskaper

    Author : Asma Hussein; [2023-09-11]
    Keywords : Audio Anomaly detection; Outlier detection; Machine learning; Mel Frequency; Chroma;

    Abstract : Audio anomaly detection in the context of car driving is a crucial task for ensuring vehicle safety and identifying potential faults. This paper aims to investigate and compare different methods for unsupervised audio anomaly detection using a data set consisting of recorded audio data from fault injections and normal "no fault" driving. READ MORE

  2. 2. Industrial Machine Monitoring: Real-Time Anomalous Sound Event Detection on Low-Powered Devices

    University essay from Lunds universitet/Matematisk statistik

    Author : Alexander Magnusson; Anton Andersson; [2023]
    Keywords : Anomaly Detection; Sound Event Detection; MFCC; GMM; OCSVM; Mathematics and Statistics;

    Abstract : Traditionally fault detection in industrial machinery has been performed manually by experienced machine operators listening to the machines. However, it is desirable to automate this process to increase efficiency and improve the working environment of the operators. READ MORE

  3. 3. Automating Root Cause Analysis of Anomalies in Ericsson Wallet Platform using Machine Learning

    University essay from Blekinge Tekniska Högskola

    Author : Simron Padhi; Devi Priya Battina; [2023]
    Keywords : Anomaly detection; Isolation forest algorithm; K-means algorithm; Local Outlier Factor algorithm; One class Support Vector Machine;

    Abstract : Background: In this era of mobile wallet platforms, to ensure key requirements like high availability and performance, the company must have mechanisms in place to detect anomalies at any given point in time. Ericsson Wallet Platform(EWP), a mobile wallet platform, is facing the problem of manually analyzing all the logs and reports and taking comprehensive action decisions accordingly. READ MORE

  4. 4. Authentication Techniques Based on Physical Layer Attributes

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Xintai Liang; [2022]
    Keywords : Wireless security; Spoofing attacks; Physical layer authentication; Channel State Information; Machine learning; Trådlös säkerhet; Spoofing attack; Autentisering av fysiska lager; Kanaltill Stånds Information; Maskinin lärning;

    Abstract : Authentication is an indispensable part of information security. It serves to distinguish legitimate users from unauthorized ones. With the rapid growth of Internet of Things (IoT) devices, authentication of wireless communication is gathering more and more attention. READ MORE

  5. 5. Unsupervised Anomaly Detection on Time Series Data: An Implementation on Electricity Consumption Series

    University essay from KTH/Matematisk statistik

    Author : Amelia Lindroth Henriksson; [2021]
    Keywords : Unsupervised learning; machine learning; anomaly detection; time series; electricity consumption; synthetic anomalies; DBSCAN; LOF; iForest; OC-SVM; Oövervakad inlärning; maskininlärning; anomalidetektion; tidsserier; elförbrukning; syntetiska anomalier; DBSCAN; LOF; iForest; OC-SVM;

    Abstract : Digitization of the energy industry, introduction of smart grids and increasing regulation of electricity consumption metering have resulted in vast amounts of electricity data. This data presents a unique opportunity to understand the electricity usage and to make it more efficient, reducing electricity consumption and carbon emissions. READ MORE