• No results found

[PDF] Top 20 Real-Time Anomaly Detection from Edge to HPC-Cloud

Has 10000 "Real-Time Anomaly Detection from Edge to HPC-Cloud" found on our website. Below are the top 20 most common "Real-Time Anomaly Detection from Edge to HPC-Cloud".

Real-Time Anomaly Detection from Edge to HPC-Cloud

Real-Time Anomaly Detection from Edge to HPC-Cloud

... We use Yolo_v3 as base model for car detection as it gives good accuracy and inference time. Pretrained models do not detect racing cars well as lacking of publicly available datasets.[r] ... See full document

29

Real-Time Anomaly Detection from Edge to HPC-Cloud

Real-Time Anomaly Detection from Edge to HPC-Cloud

... Anomaly Detection Engine • involves high performance batch and streaming data processing frameworks • detects anomalies from preprocessed data pipeline... • Performance metrics for singl[r] ... See full document

32

Big Data Processing Issues taking care of Application Requirements, Hardware, HPC, Grid (distributed), Edge and Cloud Computing

Big Data Processing Issues taking care of Application Requirements, Hardware, HPC, Grid (distributed), Edge and Cloud Computing

... • HPC Clouds or Next-Generation Commodity Systems will be a dominant force • Merge Cloud HPC and support of Edge computing • Federated Clouds running in multiple giant datacenters offeri[r] ... See full document

25

Anomaly detection for resilience in cloud computing infrastructures

Anomaly detection for resilience in cloud computing infrastructures

... selected from raw data for pre-processing which include, memory commit, byte count and packet count which is fed into detector for ...values. From detection point of view this is good because ... See full document

205

Machine Tools Anomaly Detection Through Nearly Real-Time Data Analysis

Machine Tools Anomaly Detection Through Nearly Real-Time Data Analysis

... collected from the working machine is sent to the cloud and stored there as shown in (c) at a pace of one record per ...the cloud can be accessed via an API (e), and retrieved on demand through a ... See full document

15

Increasing Anomaly Detection Accuracy in Cloud Networks

Increasing Anomaly Detection Accuracy in Cloud Networks

... Intrusion Detection Systems under signature based techniques that employ Deep Packet Inspection on network ...learned from these studies they do not develop an overall online detection strategy that ... See full document

6

FPGA Implementation of Real Time Video Edge Detection by Using Different Filter

FPGA Implementation of Real Time Video Edge Detection by Using Different Filter

... neighboring edge contrast technique, moving articles are extricated by the distinctions among a few constant ...the time interim between two pictures is very short, light changes have little impact on ... See full document

6

Adaptive Control of Traffic Signalling System (ACTSS)

Adaptive Control of Traffic Signalling System (ACTSS)

... Rashishet, et. al. [7], proposed a system that captures images of the traffic using a camera mounted on a motor, so that a single camera can take the image of the roads and a series of image processing steps are ... See full document

6

Intrusion Detection using Deep Learning Technique: A Review

Intrusion Detection using Deep Learning Technique: A Review

... [JR13]; due to the limitation above, SVM cannot be used for IDS domain without a variant in SVM framework to address the mentioned limitations. For solving the features selections of SVM, [E+10] made use of Principal ... See full document

10

Real Time Traffic Management System using Cloud Infrastructure with Edge Clustering Mechanism

Real Time Traffic Management System using Cloud Infrastructure with Edge Clustering Mechanism

... IV.CURRENT TRENDS IN TRAFFIC MONITORING The system takes into account the organisational change in the transport administration implemented at the beginning of 2010, the national strategy for intelligent transport, and ... See full document

5

An Algorithm for Gravity Anomaly Inversion in HPC

An Algorithm for Gravity Anomaly Inversion in HPC

... the anomaly of a vertical prismatic body; with 1, 8 and 16 parallel cores; for geosection arrays with step 400m, 200m and 100m (corresponding to 11, 21 and 41 linear nodes) and density steps ... See full document

9

Design and Implementation of Real Time Video Image Edge Detection System Using MyRIO

Design and Implementation of Real Time Video Image Edge Detection System Using MyRIO

... proposes real time video image canny edge detection using NI myRIO embedded design device was created to do real-world ...of time debugging code syntax or developing user ... See full document

8

Battling Against Intrusion and Behavior Based Healing System on Real Time Traffic Using Ourmon and Wireshark Neeraj Shukla, Anjali Vishwakarma

Battling Against Intrusion and Behavior Based Healing System on Real Time Traffic Using Ourmon and Wireshark Neeraj Shukla, Anjali Vishwakarma

... the anomaly based system is still tolerable even though expected behavior is identified as anomalous while false negative is intolerable because they allow attack to go undetected ...motivation, anomaly ... See full document

5

High Performance Cloud Computing

High Performance Cloud Computing

... EC2 HPC instances to that of NASA’s Pleiades supercomputer ...two real appli-cations of PARATEC and ...That Cloud computing helps research and academic organizations, government agencies, and ... See full document

10

A Low-Complexity Model-Free Approach for Real-Time Cardiac Anomaly Detection Based on Singular Spectrum Analysis and Nonparametric Control Charts

A Low-Complexity Model-Free Approach for Real-Time Cardiac Anomaly Detection Based on Singular Spectrum Analysis and Nonparametric Control Charts

... Figure 2. Comparison of MZ (left) and l-SSA-CPD (right). The computational burden of l-SSA-CPD is greatly reduced compared to MZ by relying on the reference subspace obtained from an initial, non-sliding ... See full document

19

Components and Rationale of a Big Data Toolkit Spanning HPC, Grid, Edge and Cloud Computing

Components and Rationale of a Big Data Toolkit Spanning HPC, Grid, Edge and Cloud Computing

... execution time on varying number of nodes with 20 processes in each node with 1 million points and 64000 ...computation time is high and communication time is low as illustrated in 10 million ... See full document

54

Anomaly behaviour detection based on the meta-Morisita index for large scale spatio-temporal data set

Anomaly behaviour detection based on the meta-Morisita index for large scale spatio-temporal data set

... derived from this study provide insights about the location, time, inten- sity of the taxi drivers in Beijing and twitter users in Milan, which is helpful for mining behaviour pattern and surveillance for ... See full document

28

Network Intrusion Detection System (NIDS) using Machine Learning Perspective

Network Intrusion Detection System (NIDS) using Machine Learning Perspective

... The Anomaly based technique complements the Signature based technique and helps in identifying the different novel ...the detection accuracy while avoiding the false positive alert. From the result ... See full document

6

Spatio temporal Texture Modelling for Real time Crowd Anomaly Detection

Spatio temporal Texture Modelling for Real time Crowd Anomaly Detection

... its real-time performance and the IBC has been considered as one of the most accurate method for anomaly ...The anomaly events have been defined as some cars or bicycles quickly go through ... See full document

20

Use of Decision Trees and Attributional Rules in Incremental Learning of an Intrusion Detection Model

Use of Decision Trees and Attributional Rules in Incremental Learning of an Intrusion Detection Model

... intrusion detection systems (IDS) is how IDS can adapt itself to detect new attacks without getting corrupted or forgetting previously learned information: the so-called stability-plasticity dilemma ...intrusion ... See full document

9

Show all 10000 documents...