Essays about: "literature review of an online proposed system"

Found 5 essays containing the words literature review of an online proposed system.

  1. 1. Unsupervised Online Anomaly Detection in Multivariate Time-Series

    University essay from Uppsala universitet/Datorteknik

    Author : Ludvig Segerholm; [2023]
    Keywords : unsupervised; online; anomaly detection; explainable ai; machine learning; mahalanobis distance;

    Abstract : This research aims to identify a method for unsupervised online anomaly detection in multivariate time series in dynamic systems in general and on the case study of Devwards IoT-system in particular. A requirement of the solution is its explainability, online learning and low computational expense. READ MORE

  2. 2. Software Architecture and Framework for Programmable Automation Controller: A Systematic Literature Review and A Case Study

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Hao Chen; Luyang Xu; [2018]
    Keywords : PAC; ICS; Automation control; software architecture;

    Abstract : Background. PAC controller is a strengthened version of PLC controller. Its function is very similar, but its essence and construction are different. PLC and PAC have many successful applications in the field of industrial automation control. READ MORE

  3. 3. Homomorphic Encryption: Working and Analytical Assessment : DGHV, HElib, Paillier, FHEW and HE in cloud security

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Srinivas Divya Papisetty; [2017]
    Keywords : Homomorphic encryption; Homomorphic Encryption Schemes; Cloud security; Cryptography;

    Abstract : Context: Secrecy has kept researchers spanning over centuries engaged in the creation of data protection techniques. With the growing rate of data breach and intervention of adversaries in confidential data storage and communication, efficient data protection has found to be a challenge. READ MORE

  4. 4. A Framework for Security Requirements Elicitation

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Gibrail Islam; Murtaza Ali Qureshi; [2012]
    Keywords : Security Requirement Elicitation Framework; Security Requirement Engineering; Software Security ;

    Abstract : Context: Security considerations are typically incorporated in the later stages of development as an afterthought. Security in software system is put under the category of non-functional requirements by the researchers. READ MORE

  5. 5. An Integration of policy and reputation based trust mechanisms

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Muhammad Yasir Siddiqui; Alam Gir; [2011]
    Keywords : Semantic web trust management; Integrated trust mechanism; Policy based trust mechanism; Reputation based trust mechanism;

    Abstract : Context: Due to popularization of internet and e-commerce, more and more people getting involved in online shopping market. A large number of companies have been transferred to the internet where online customers have been increased due to easy access. The online business facilitates people to communicate without knowing each other. READ MORE