Essays about: "detection methods"

Showing result 1 - 5 of 1457 essays containing the words detection methods.

  1. 1. Towards Automated Log Message Embeddings for Anomaly Detection

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Adrian Murphy; Daniel Larsson; [2024]
    Keywords : Technology and Engineering;

    Abstract : Log messages are implemented by developers to record important runtime information about a system. For that reason, system logs can provide insight into the state and health of a system and potentially be used to anticipate and discover errors. READ MORE

  2. 2. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Kimon Letzner; [2024]
    Keywords : Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Abstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE

  3. 3. Visualization and analysis of object states using diffusion models and PyTorch

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Christopher Nyberg; [2024]
    Keywords : ;

    Abstract : Artificial Intelligence (AI) is an extremely rapidly growing field in modern technology. As the applications of AI expand, the ability to accurately analyze and predict the condition of various objects through various models has profound implications across numerous industries. READ MORE

  4. 4. Android Malware Detection Using Machine Learning

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Rahul Sai Kesani; [2024]
    Keywords : Malware; Machine Learning; Random Forest; Sequential Neural Network.;

    Abstract : Background. The Android smartphone, with its wide range of uses and excellent performance, has attracted numerous users. Still, this domination of the Android platform also has motivated the attackers to develop malware. The traditional methodology which detects the malware based on the signature is unfit to discover unknown applications. READ MORE

  5. 5. Detecting Fraudulent User Behaviour : A Study of User Behaviour and Machine Learning in Fraud Detection

    University essay from Uppsala universitet/Analys och partiella differentialekvationer

    Author : Patrik Gerdelius; Sjönneby Hugo; [2024]
    Keywords : Fraud Detection; User Behaviour; Random Forest; PCA; SMOTE;

    Abstract : This study aims to create a Machine Learning model and investigate its performance of detecting fraudulent user behaviour on an e-commerce platform. The user data was analysed to identify and extract critical features distinguishing regular users from fraudulent users. READ MORE