Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(anomaly behavior). Showing records 1 – 23 of 23 total matches.

Search Limiters

Last 2 Years | English Only

No search limiters apply to these results.

▼ Search Limiters


Universiteit Utrecht

1. Renckens, I.R. Automatic Detection of Suspicious Behaviour.

Degree: 2014, Universiteit Utrecht

 This thesis presents an implementation of an anomaly detection method that can be used for surveillance applications. The method is based on the perspective that… (more)

Subjects/Keywords: anomaly detection; suspicious behaviour; UaV; TNO; Clustering; Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Renckens, I. R. (2014). Automatic Detection of Suspicious Behaviour. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/298580

Chicago Manual of Style (16th Edition):

Renckens, I R. “Automatic Detection of Suspicious Behaviour.” 2014. Masters Thesis, Universiteit Utrecht. Accessed May 11, 2021. http://dspace.library.uu.nl:8080/handle/1874/298580.

MLA Handbook (7th Edition):

Renckens, I R. “Automatic Detection of Suspicious Behaviour.” 2014. Web. 11 May 2021.

Vancouver:

Renckens IR. Automatic Detection of Suspicious Behaviour. [Internet] [Masters thesis]. Universiteit Utrecht; 2014. [cited 2021 May 11]. Available from: http://dspace.library.uu.nl:8080/handle/1874/298580.

Council of Science Editors:

Renckens IR. Automatic Detection of Suspicious Behaviour. [Masters Thesis]. Universiteit Utrecht; 2014. Available from: http://dspace.library.uu.nl:8080/handle/1874/298580


NSYSU

2. Tsai, Wan-yi. Malicious Web Page Detection Based on Anomaly Behavior.

Degree: Master, Information Management, 2009, NSYSU

 Because of the convenience of the Internet, we rely closely on the Internet to do information searching and sharing, forum discussion, and online services. However,… (more)

Subjects/Keywords: drive-by download; malicious web page; anomaly behavior

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Tsai, W. (2009). Malicious Web Page Detection Based on Anomaly Behavior. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Tsai, Wan-yi. “Malicious Web Page Detection Based on Anomaly Behavior.” 2009. Thesis, NSYSU. Accessed May 11, 2021. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Tsai, Wan-yi. “Malicious Web Page Detection Based on Anomaly Behavior.” 2009. Web. 11 May 2021.

Vancouver:

Tsai W. Malicious Web Page Detection Based on Anomaly Behavior. [Internet] [Thesis]. NSYSU; 2009. [cited 2021 May 11]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Tsai W. Malicious Web Page Detection Based on Anomaly Behavior. [Thesis]. NSYSU; 2009. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0204109-163602

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

3. Madhu, Abheyraj Singh. Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics.

Degree: 2021, , Department of Computer Science

  Background: Apache Cassandra is a highly scalable distributed system that can handle large amounts of data through several nodes / virtual machines grouped together… (more)

Subjects/Keywords: Wait reports analysis; time-series anomaly detection; Apache Cassandra statistics; anomaly detection; behavior reporting tool; Computer Sciences; Datavetenskap (datalogi)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Madhu, A. S. (2021). Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics. (Thesis). , Department of Computer Science. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Madhu, Abheyraj Singh. “Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics.” 2021. Thesis, , Department of Computer Science. Accessed May 11, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Madhu, Abheyraj Singh. “Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics.” 2021. Web. 11 May 2021.

Vancouver:

Madhu AS. Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics. [Internet] [Thesis]. , Department of Computer Science; 2021. [cited 2021 May 11]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21145.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Madhu AS. Anomaly Detection in Wait Reports and its Relation with Apache Cassandra Statistics. [Thesis]. , Department of Computer Science; 2021. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21145

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kent State University

4. Adhikari, Ram Bahadur. Superconductivity and Magnetism in Selected Filled Skutterudites and Heavy Fermion Systems.

Degree: PhD, College of Arts and Sciences / Department of Physics, 2021, Kent State University

 Strongly correlated electron systems constitute a rich reservoir for interesting physical phenomena. The competition and interplay between the localized magnetic moments in partially filled <i>d</i>… (more)

Subjects/Keywords: Physics; Heavy Fermions, Filled Skutterudies, Schottky Anomaly, Quantum Criticality, Superconductivity, NFL behavior, Superconducting Energy Gap

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Adhikari, R. B. (2021). Superconductivity and Magnetism in Selected Filled Skutterudites and Heavy Fermion Systems. (Doctoral Dissertation). Kent State University. Retrieved from http://rave.ohiolink.edu/etdc/view?acc_num=kent16173874994732

Chicago Manual of Style (16th Edition):

Adhikari, Ram Bahadur. “Superconductivity and Magnetism in Selected Filled Skutterudites and Heavy Fermion Systems.” 2021. Doctoral Dissertation, Kent State University. Accessed May 11, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=kent16173874994732.

MLA Handbook (7th Edition):

Adhikari, Ram Bahadur. “Superconductivity and Magnetism in Selected Filled Skutterudites and Heavy Fermion Systems.” 2021. Web. 11 May 2021.

Vancouver:

Adhikari RB. Superconductivity and Magnetism in Selected Filled Skutterudites and Heavy Fermion Systems. [Internet] [Doctoral dissertation]. Kent State University; 2021. [cited 2021 May 11]. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent16173874994732.

Council of Science Editors:

Adhikari RB. Superconductivity and Magnetism in Selected Filled Skutterudites and Heavy Fermion Systems. [Doctoral Dissertation]. Kent State University; 2021. Available from: http://rave.ohiolink.edu/etdc/view?acc_num=kent16173874994732


University of Minnesota

5. Hedegaard, Brock Daniel. Modeling and monitoring the long-term behavior of post-tensioned concrete bridges.

Degree: PhD, Civil Engineering, 2014, University of Minnesota

 The time-dependent and temperature-dependent behavior of post-tensioned concrete bridges were investigated through a case study of the St. Anthony Falls Bridge, consisting of laboratory testing… (more)

Subjects/Keywords: Anomaly Detection; Bridges; Finite Element Modeling; Post-Tensioned Concrete; Structural Monitoring; Time-Dependent Behavior

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hedegaard, B. D. (2014). Modeling and monitoring the long-term behavior of post-tensioned concrete bridges. (Doctoral Dissertation). University of Minnesota. Retrieved from http://hdl.handle.net/11299/164953

Chicago Manual of Style (16th Edition):

Hedegaard, Brock Daniel. “Modeling and monitoring the long-term behavior of post-tensioned concrete bridges.” 2014. Doctoral Dissertation, University of Minnesota. Accessed May 11, 2021. http://hdl.handle.net/11299/164953.

MLA Handbook (7th Edition):

Hedegaard, Brock Daniel. “Modeling and monitoring the long-term behavior of post-tensioned concrete bridges.” 2014. Web. 11 May 2021.

Vancouver:

Hedegaard BD. Modeling and monitoring the long-term behavior of post-tensioned concrete bridges. [Internet] [Doctoral dissertation]. University of Minnesota; 2014. [cited 2021 May 11]. Available from: http://hdl.handle.net/11299/164953.

Council of Science Editors:

Hedegaard BD. Modeling and monitoring the long-term behavior of post-tensioned concrete bridges. [Doctoral Dissertation]. University of Minnesota; 2014. Available from: http://hdl.handle.net/11299/164953


University of Arizona

6. Satam, Pratik. An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks .

Degree: 2015, University of Arizona

 Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a larger network like the Internet via wireless communications. One… (more)

Subjects/Keywords: Intrusion Detection; Machine Learning; Network Security; Wi-Fi; Electrical & Computer Engineering; Anomaly Behavior Analysis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Satam, P. (2015). An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks . (Masters Thesis). University of Arizona. Retrieved from http://hdl.handle.net/10150/595654

Chicago Manual of Style (16th Edition):

Satam, Pratik. “An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks .” 2015. Masters Thesis, University of Arizona. Accessed May 11, 2021. http://hdl.handle.net/10150/595654.

MLA Handbook (7th Edition):

Satam, Pratik. “An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks .” 2015. Web. 11 May 2021.

Vancouver:

Satam P. An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks . [Internet] [Masters thesis]. University of Arizona; 2015. [cited 2021 May 11]. Available from: http://hdl.handle.net/10150/595654.

Council of Science Editors:

Satam P. An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks . [Masters Thesis]. University of Arizona; 2015. Available from: http://hdl.handle.net/10150/595654


Brno University of Technology

7. Petrovič, Lukáš. Analýza anomálií v uživatelském chování: User Behavior Anomaly Detection.

Degree: 2019, Brno University of Technology

 The aim of this work is to create an application that allows modeling of user behavior and subsequent search for anomalies in this behavior. An… (more)

Subjects/Keywords: Analýza chovania používateľa; Dolovanie dát; Detekcia anomálií; Strojové učenie; User Behavior Analysis; Data Mining; Anomaly detection; Machine learning

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Petrovič, L. (2019). Analýza anomálií v uživatelském chování: User Behavior Anomaly Detection. (Thesis). Brno University of Technology. Retrieved from http://hdl.handle.net/11012/180349

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Petrovič, Lukáš. “Analýza anomálií v uživatelském chování: User Behavior Anomaly Detection.” 2019. Thesis, Brno University of Technology. Accessed May 11, 2021. http://hdl.handle.net/11012/180349.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Petrovič, Lukáš. “Analýza anomálií v uživatelském chování: User Behavior Anomaly Detection.” 2019. Web. 11 May 2021.

Vancouver:

Petrovič L. Analýza anomálií v uživatelském chování: User Behavior Anomaly Detection. [Internet] [Thesis]. Brno University of Technology; 2019. [cited 2021 May 11]. Available from: http://hdl.handle.net/11012/180349.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Petrovič L. Analýza anomálií v uživatelském chování: User Behavior Anomaly Detection. [Thesis]. Brno University of Technology; 2019. Available from: http://hdl.handle.net/11012/180349

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Kennesaw State University

8. Karasek, Daniel. SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns.

Degree: MSCS, Computer Science, 2020, Kennesaw State University

  Network anomalies are correlated to activities that deviate from regular behavior patterns in a network, and they are undetectable until their actions are defined… (more)

Subjects/Keywords: data science; network security; deep learning; anomaly detection; machine learning; network behavior analysis; Artificial Intelligence and Robotics; Information Security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Karasek, D. (2020). SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns. (Thesis). Kennesaw State University. Retrieved from https://digitalcommons.kennesaw.edu/cs_etd/32

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Karasek, Daniel. “SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns.” 2020. Thesis, Kennesaw State University. Accessed May 11, 2021. https://digitalcommons.kennesaw.edu/cs_etd/32.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Karasek, Daniel. “SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns.” 2020. Web. 11 May 2021.

Vancouver:

Karasek D. SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns. [Internet] [Thesis]. Kennesaw State University; 2020. [cited 2021 May 11]. Available from: https://digitalcommons.kennesaw.edu/cs_etd/32.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Karasek D. SuperB: Superior Behavior-based Anomaly Detection Defining Authorized Users' Traffic Patterns. [Thesis]. Kennesaw State University; 2020. Available from: https://digitalcommons.kennesaw.edu/cs_etd/32

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Carnegie Mellon University

9. Lamba, Hemank. Modeling User Behavior on Socio-Technical Systems: Patterns and Anomalies.

Degree: Theses and Dissertations, 2020, Carnegie Mellon University

 How can we model user behavior on social media platforms and social networking websites? How can we use such models to characterize behavior on social… (more)

Subjects/Keywords: Computer Software; Pattern Recognition and Data Mining; data mining; user behavior modeling; computational social science; anomaly detection; social networks; social media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lamba, H. (2020). Modeling User Behavior on Socio-Technical Systems: Patterns and Anomalies. (Thesis). Carnegie Mellon University. Retrieved from http://hdl.handle.net/10.1184/r1/11591301.v1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lamba, Hemank. “Modeling User Behavior on Socio-Technical Systems: Patterns and Anomalies.” 2020. Thesis, Carnegie Mellon University. Accessed May 11, 2021. http://hdl.handle.net/10.1184/r1/11591301.v1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lamba, Hemank. “Modeling User Behavior on Socio-Technical Systems: Patterns and Anomalies.” 2020. Web. 11 May 2021.

Vancouver:

Lamba H. Modeling User Behavior on Socio-Technical Systems: Patterns and Anomalies. [Internet] [Thesis]. Carnegie Mellon University; 2020. [cited 2021 May 11]. Available from: http://hdl.handle.net/10.1184/r1/11591301.v1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lamba H. Modeling User Behavior on Socio-Technical Systems: Patterns and Anomalies. [Thesis]. Carnegie Mellon University; 2020. Available from: http://hdl.handle.net/10.1184/r1/11591301.v1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Indian Institute of Science

10. Biswas, Sovan. Motion Based Event Analysis.

Degree: MSc Engg, Faculty of Engineering, 2018, Indian Institute of Science

 Motion is an important cue in videos that captures the dynamics of moving objects. It helps in effective analysis of various event related tasks such… (more)

Subjects/Keywords: Video Classification; Anomaly Detection; Crowd Behavior Analysis; Crowd Flow Segmentation; Video Analysis; Motion Vectors; Human Action Recognition; Motion Based Event Analysis; Event Analysis; Anomaly Detection; Histogram Oriented Motion Vectors (HOMV); Crowd Flow Segmentation; H.264 Compressed Videos; Computer Science

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Biswas, S. (2018). Motion Based Event Analysis. (Masters Thesis). Indian Institute of Science. Retrieved from http://etd.iisc.ac.in/handle/2005/3502

Chicago Manual of Style (16th Edition):

Biswas, Sovan. “Motion Based Event Analysis.” 2018. Masters Thesis, Indian Institute of Science. Accessed May 11, 2021. http://etd.iisc.ac.in/handle/2005/3502.

MLA Handbook (7th Edition):

Biswas, Sovan. “Motion Based Event Analysis.” 2018. Web. 11 May 2021.

Vancouver:

Biswas S. Motion Based Event Analysis. [Internet] [Masters thesis]. Indian Institute of Science; 2018. [cited 2021 May 11]. Available from: http://etd.iisc.ac.in/handle/2005/3502.

Council of Science Editors:

Biswas S. Motion Based Event Analysis. [Masters Thesis]. Indian Institute of Science; 2018. Available from: http://etd.iisc.ac.in/handle/2005/3502


Northeastern University

11. Yolacan, Esra Negris. Learning from sequential data for anomaly detection.

Degree: PhD, Department of Electrical and Computer Engineering, 2014, Northeastern University

Anomaly detection has been used in a wide range of real world problems and has received significant attention in a number of research fields over… (more)

Subjects/Keywords: crowd anomaly detection; cyber security; data mining; intrusion detection; physical security; Computer Engineering; Anomaly detection (Computer security); Mathematical models; Computer networks; Security measures; Intrusion detection systems (Computer security); Collective behavior; Machine learning; Computer vision

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Yolacan, E. N. (2014). Learning from sequential data for anomaly detection. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/d20128355

Chicago Manual of Style (16th Edition):

Yolacan, Esra Negris. “Learning from sequential data for anomaly detection.” 2014. Doctoral Dissertation, Northeastern University. Accessed May 11, 2021. http://hdl.handle.net/2047/d20128355.

MLA Handbook (7th Edition):

Yolacan, Esra Negris. “Learning from sequential data for anomaly detection.” 2014. Web. 11 May 2021.

Vancouver:

Yolacan EN. Learning from sequential data for anomaly detection. [Internet] [Doctoral dissertation]. Northeastern University; 2014. [cited 2021 May 11]. Available from: http://hdl.handle.net/2047/d20128355.

Council of Science Editors:

Yolacan EN. Learning from sequential data for anomaly detection. [Doctoral Dissertation]. Northeastern University; 2014. Available from: http://hdl.handle.net/2047/d20128355


University of Central Florida

12. Zhou, Mian. Network Intrusion Detection: Monitoring, Simulation And Visualization.

Degree: 2005, University of Central Florida

 This dissertation presents our work on network intrusion detection and intrusion sim- ulation. The work in intrusion detection consists of two different network anomaly-based approaches.… (more)

Subjects/Keywords: Network intrusion detection; intrusion simulation; anomaly; frequency; behavior-based; Computer Sciences; Engineering

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Zhou, M. (2005). Network Intrusion Detection: Monitoring, Simulation And Visualization. (Doctoral Dissertation). University of Central Florida. Retrieved from https://stars.library.ucf.edu/etd/520

Chicago Manual of Style (16th Edition):

Zhou, Mian. “Network Intrusion Detection: Monitoring, Simulation And Visualization.” 2005. Doctoral Dissertation, University of Central Florida. Accessed May 11, 2021. https://stars.library.ucf.edu/etd/520.

MLA Handbook (7th Edition):

Zhou, Mian. “Network Intrusion Detection: Monitoring, Simulation And Visualization.” 2005. Web. 11 May 2021.

Vancouver:

Zhou M. Network Intrusion Detection: Monitoring, Simulation And Visualization. [Internet] [Doctoral dissertation]. University of Central Florida; 2005. [cited 2021 May 11]. Available from: https://stars.library.ucf.edu/etd/520.

Council of Science Editors:

Zhou M. Network Intrusion Detection: Monitoring, Simulation And Visualization. [Doctoral Dissertation]. University of Central Florida; 2005. Available from: https://stars.library.ucf.edu/etd/520


Northeastern University

13. Lehmann, Oliver. Low latency tracking and anomaly detection in pedestrian crowds from video data.

Degree: PhD, Department of Electrical and Computer Engineering, 2016, Northeastern University

 A low latency behavior analysis of human crowds is important for the prevention of crowd disasters. It is critical, in particular, in a security context… (more)

Subjects/Keywords: complex system modeling; crowd anomaly detection; crowd behavior model; crowd motion model; crowd simulation; video labeling; Image analysis; Mathematical models; Motion perception (Vision); Mathematical models; Pedestrian traffic flow; Mathematical models; Video surveillance; Human activity recognition; Collective behavior

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lehmann, O. (2016). Low latency tracking and anomaly detection in pedestrian crowds from video data. (Doctoral Dissertation). Northeastern University. Retrieved from http://hdl.handle.net/2047/D20200325

Chicago Manual of Style (16th Edition):

Lehmann, Oliver. “Low latency tracking and anomaly detection in pedestrian crowds from video data.” 2016. Doctoral Dissertation, Northeastern University. Accessed May 11, 2021. http://hdl.handle.net/2047/D20200325.

MLA Handbook (7th Edition):

Lehmann, Oliver. “Low latency tracking and anomaly detection in pedestrian crowds from video data.” 2016. Web. 11 May 2021.

Vancouver:

Lehmann O. Low latency tracking and anomaly detection in pedestrian crowds from video data. [Internet] [Doctoral dissertation]. Northeastern University; 2016. [cited 2021 May 11]. Available from: http://hdl.handle.net/2047/D20200325.

Council of Science Editors:

Lehmann O. Low latency tracking and anomaly detection in pedestrian crowds from video data. [Doctoral Dissertation]. Northeastern University; 2016. Available from: http://hdl.handle.net/2047/D20200325

14. Αντωνακάκη, Παναγιώτα. Εξαγωγή σημασιολογικής γνώσης από γεγονότα.

Degree: 2005, National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ)

This work reports on research conducted in the domain of semantic information extraction from events in video streams. The research focuses on exploring techniques used… (more)

Subjects/Keywords: Επεξεργασία ακολουθιών εικόνων; Αναγνώριση συμπεριφορών; Εντοπισμός γεγονότων; Εντοπισμός ανωμαλιών; Video processing; Behaviour recognition; Event detection; Anomaly detection

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Αντωνακάκη, . . (2005). Εξαγωγή σημασιολογικής γνώσης από γεγονότα. (Thesis). National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ). Retrieved from http://hdl.handle.net/10442/hedi/29136

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Αντωνακάκη, Παναγιώτα. “Εξαγωγή σημασιολογικής γνώσης από γεγονότα.” 2005. Thesis, National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ). Accessed May 11, 2021. http://hdl.handle.net/10442/hedi/29136.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Αντωνακάκη, Παναγιώτα. “Εξαγωγή σημασιολογικής γνώσης από γεγονότα.” 2005. Web. 11 May 2021.

Vancouver:

Αντωνακάκη . Εξαγωγή σημασιολογικής γνώσης από γεγονότα. [Internet] [Thesis]. National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ); 2005. [cited 2021 May 11]. Available from: http://hdl.handle.net/10442/hedi/29136.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Αντωνακάκη . Εξαγωγή σημασιολογικής γνώσης από γεγονότα. [Thesis]. National and Kapodistrian University of Athens; Εθνικό και Καποδιστριακό Πανεπιστήμιο Αθηνών (ΕΚΠΑ); 2005. Available from: http://hdl.handle.net/10442/hedi/29136

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. Satam, Pratik. A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols .

Degree: 2019, University of Arizona

 Over the last few decades, the Internet has grown from a network that connected two research Universities to a juggernaut that encompasses the whole world… (more)

Subjects/Keywords: Anomaly Behavior Analysis; DNS; HTML; IoT Security; Network Security; Wi-Fi

…45 Figure 3.4: Anomaly Behavior Analysis… …presents a methodology to design Anomaly Behavior based Intrusion Detection Systems (AB-IDS… …behavior. Designing and implementation of anomaly-based intrusion detection systems begins with… …harmful anomalies from the normal behavior. Anomaly based intrusion detection systems can be… …the semantics of the normal behavior of its target system, consequently allowing it to… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Satam, P. (2019). A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols . (Doctoral Dissertation). University of Arizona. Retrieved from http://hdl.handle.net/10150/632978

Chicago Manual of Style (16th Edition):

Satam, Pratik. “A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols .” 2019. Doctoral Dissertation, University of Arizona. Accessed May 11, 2021. http://hdl.handle.net/10150/632978.

MLA Handbook (7th Edition):

Satam, Pratik. “A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols .” 2019. Web. 11 May 2021.

Vancouver:

Satam P. A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols . [Internet] [Doctoral dissertation]. University of Arizona; 2019. [cited 2021 May 11]. Available from: http://hdl.handle.net/10150/632978.

Council of Science Editors:

Satam P. A Methodology to Design Intrusion Detection Systems (IDS) for IoT/Networking Protocols . [Doctoral Dissertation]. University of Arizona; 2019. Available from: http://hdl.handle.net/10150/632978


Pontifical Catholic University of Rio de Janeiro

16. IGOR OLIVEIRA VASCONCELOS. [en] A MOBILE AND ONLINE OUTLIER DETECTION OVER MULTIPLE DATA STREAMS: A COMPLEX EVENT PROCESSING APPROACH FOR DRIVING BEHAVIOR DETECTION.

Degree: 2017, Pontifical Catholic University of Rio de Janeiro

[pt] Dirigir é uma tarefa diária que permite uma locomoção mais rápida e mais confortável, no entanto, mais da metade dos acidentes fatais estão relacionados… (more)

Subjects/Keywords: [pt] DISPOSITIVOS MOVEIS; [en] MOBILE DEVICES; [pt] PROCESSAMENTO DE EVENTOS COMPLEXOS; [en] COMPLEX EVENT PROCESSING; [pt] DETECCAO ONLINE DE ANOMALIA; [en] ONLINE ANOMALY DETECTION; [pt] SENSORIAMENTO A BORDO DO VEICULO; [en] IN-VEHICLE SENSING; [pt] DETECCAO ONLINE DO COMPORTAMENTO DE CONDUCAO; [en] ONLINE DRIVING BEHAVIOR DETECTION

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

VASCONCELOS, I. O. (2017). [en] A MOBILE AND ONLINE OUTLIER DETECTION OVER MULTIPLE DATA STREAMS: A COMPLEX EVENT PROCESSING APPROACH FOR DRIVING BEHAVIOR DETECTION. (Thesis). Pontifical Catholic University of Rio de Janeiro. Retrieved from http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=30648

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

VASCONCELOS, IGOR OLIVEIRA. “[en] A MOBILE AND ONLINE OUTLIER DETECTION OVER MULTIPLE DATA STREAMS: A COMPLEX EVENT PROCESSING APPROACH FOR DRIVING BEHAVIOR DETECTION.” 2017. Thesis, Pontifical Catholic University of Rio de Janeiro. Accessed May 11, 2021. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=30648.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

VASCONCELOS, IGOR OLIVEIRA. “[en] A MOBILE AND ONLINE OUTLIER DETECTION OVER MULTIPLE DATA STREAMS: A COMPLEX EVENT PROCESSING APPROACH FOR DRIVING BEHAVIOR DETECTION.” 2017. Web. 11 May 2021.

Vancouver:

VASCONCELOS IO. [en] A MOBILE AND ONLINE OUTLIER DETECTION OVER MULTIPLE DATA STREAMS: A COMPLEX EVENT PROCESSING APPROACH FOR DRIVING BEHAVIOR DETECTION. [Internet] [Thesis]. Pontifical Catholic University of Rio de Janeiro; 2017. [cited 2021 May 11]. Available from: http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=30648.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

VASCONCELOS IO. [en] A MOBILE AND ONLINE OUTLIER DETECTION OVER MULTIPLE DATA STREAMS: A COMPLEX EVENT PROCESSING APPROACH FOR DRIVING BEHAVIOR DETECTION. [Thesis]. Pontifical Catholic University of Rio de Janeiro; 2017. Available from: http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=30648

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade Nova

17. Pelizzari, Andrea. Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications.

Degree: 2016, Universidade Nova

 Ship tracking systems allow Maritime Organizations that are concerned with the Safety at Sea to obtain information on the current location and route of merchant… (more)

Subjects/Keywords: Ship Tracking; Maritime Safety; Maritime Situational Awareness; Anomaly Detection; Ship Behavior Monitoring; Route Planning; Traffic Pattern Analysis; Genetic Algorithms; Long-Range Identification and Tracking (LRIT); Automatic Identification System (AIS); Satellite AIS (Sat-AIS)

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pelizzari, A. (2016). Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications. (Thesis). Universidade Nova. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/17346

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pelizzari, Andrea. “Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications.” 2016. Thesis, Universidade Nova. Accessed May 11, 2021. http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/17346.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pelizzari, Andrea. “Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications.” 2016. Web. 11 May 2021.

Vancouver:

Pelizzari A. Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications. [Internet] [Thesis]. Universidade Nova; 2016. [cited 2021 May 11]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/17346.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pelizzari A. Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications. [Thesis]. Universidade Nova; 2016. Available from: http://www.rcaap.pt/detail.jsp?id=oai:run.unl.pt:10362/17346

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Stockholm University

18. Levinsson, Jimmy. Behavioral Finance : Kan ökad medvetenhet om marknadspsykologi förbättra kvalitén vid aktiemarknadsanalys och investeringsbeslut?.

Degree: Stockholm Business School, 2010, Stockholm University

Den finansiella utbildningen präglas av klassisk finansteori som förutsätter att den finansiella marknaden prissätts rationellt. Det finns dock ett gap mellan klassisk finansteori och… (more)

Subjects/Keywords: Behavioral finance; investment decision; stock market analysis; anomaly; herd behavior; Marknadspsykologi; investeringsbeslut; aktiemarknadsanalys; anomali; flockbeteende

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Levinsson, J. (2010). Behavioral Finance : Kan ökad medvetenhet om marknadspsykologi förbättra kvalitén vid aktiemarknadsanalys och investeringsbeslut?. (Thesis). Stockholm University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-119703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Levinsson, Jimmy. “Behavioral Finance : Kan ökad medvetenhet om marknadspsykologi förbättra kvalitén vid aktiemarknadsanalys och investeringsbeslut?.” 2010. Thesis, Stockholm University. Accessed May 11, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-119703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Levinsson, Jimmy. “Behavioral Finance : Kan ökad medvetenhet om marknadspsykologi förbättra kvalitén vid aktiemarknadsanalys och investeringsbeslut?.” 2010. Web. 11 May 2021.

Vancouver:

Levinsson J. Behavioral Finance : Kan ökad medvetenhet om marknadspsykologi förbättra kvalitén vid aktiemarknadsanalys och investeringsbeslut?. [Internet] [Thesis]. Stockholm University; 2010. [cited 2021 May 11]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-119703.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Levinsson J. Behavioral Finance : Kan ökad medvetenhet om marknadspsykologi förbättra kvalitén vid aktiemarknadsanalys och investeringsbeslut?. [Thesis]. Stockholm University; 2010. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-119703

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

19. Abrahamsson, Isak. Värdeinvestering – en hållbar strategi för överavkastning? : Ett test av investeringsstrategin F_SCORE på värdeaktier med hög book-to-market kvot.

Degree: Business administration, 2018, University of Gävle

Syfte: Det huvudsakliga syftet är att testa om Piotroskis F_SCORE tillämpat på aktier med hög book-to-market kvot kan överavkasta marknadsportföljen samt, som en konsekvens… (more)

Subjects/Keywords: The efficient market hypothesis; value investing; value stocks; book-to- market ratio; fundamental analysis; anomaly; behavior finance; risk; F_SCORE; Effektiva marknadshypotesen; värdeportfölj; värdeaktie; book-to-market; fundamental analys; anomalier; beteendefinans; risk; F_SCORE; Economics and Business; Ekonomi och näringsliv

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abrahamsson, I. (2018). Värdeinvestering – en hållbar strategi för överavkastning? : Ett test av investeringsstrategin F_SCORE på värdeaktier med hög book-to-market kvot. (Thesis). University of Gävle. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-26119

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Abrahamsson, Isak. “Värdeinvestering – en hållbar strategi för överavkastning? : Ett test av investeringsstrategin F_SCORE på värdeaktier med hög book-to-market kvot.” 2018. Thesis, University of Gävle. Accessed May 11, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-26119.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Abrahamsson, Isak. “Värdeinvestering – en hållbar strategi för överavkastning? : Ett test av investeringsstrategin F_SCORE på värdeaktier med hög book-to-market kvot.” 2018. Web. 11 May 2021.

Vancouver:

Abrahamsson I. Värdeinvestering – en hållbar strategi för överavkastning? : Ett test av investeringsstrategin F_SCORE på värdeaktier med hög book-to-market kvot. [Internet] [Thesis]. University of Gävle; 2018. [cited 2021 May 11]. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-26119.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Abrahamsson I. Värdeinvestering – en hållbar strategi för överavkastning? : Ett test av investeringsstrategin F_SCORE på värdeaktier med hög book-to-market kvot. [Thesis]. University of Gävle; 2018. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-26119

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

20. Abed, Amr Sayed Omar. Securing Cloud Containers through Intrusion Detection and Remediation.

Degree: PhD, Computer Engineering, 2017, Virginia Tech

 Linux containers are gaining increasing traction in both individual and industrial use. As these containers get integrated into mission-critical systems, real-time detection of malicious cyber… (more)

Subjects/Keywords: Security in Cloud Computing; Deep Learning; Intrusion Detection; Container Security; Behavior Modeling; Anomaly Detection

…utilizes prior knowledge of the attack behavior to detect already known attacks. An anomaly-based… …28 Using Deep Learning for Anomaly Detection . . . . . . . . . . . . . . . . . . 28… …4.4.1 Anomaly Detection using Recurrent Neural Networks . . . . . . . . . 28 4.4.2 Anomaly… …Detection using Autoencoders . . . . . . . . . . . . . . . . . 29 5 Memory-based Behavior… …31 5.2 Parsing Data from Behavior Log Files… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Abed, A. S. O. (2017). Securing Cloud Containers through Intrusion Detection and Remediation. (Doctoral Dissertation). Virginia Tech. Retrieved from http://hdl.handle.net/10919/87730

Chicago Manual of Style (16th Edition):

Abed, Amr Sayed Omar. “Securing Cloud Containers through Intrusion Detection and Remediation.” 2017. Doctoral Dissertation, Virginia Tech. Accessed May 11, 2021. http://hdl.handle.net/10919/87730.

MLA Handbook (7th Edition):

Abed, Amr Sayed Omar. “Securing Cloud Containers through Intrusion Detection and Remediation.” 2017. Web. 11 May 2021.

Vancouver:

Abed ASO. Securing Cloud Containers through Intrusion Detection and Remediation. [Internet] [Doctoral dissertation]. Virginia Tech; 2017. [cited 2021 May 11]. Available from: http://hdl.handle.net/10919/87730.

Council of Science Editors:

Abed ASO. Securing Cloud Containers through Intrusion Detection and Remediation. [Doctoral Dissertation]. Virginia Tech; 2017. Available from: http://hdl.handle.net/10919/87730


Penn State University

21. GUPTA, SHALABH. Behavioral Pattern Identification for Structural Health Monitoring in Complex Systems .

Degree: 2008, Penn State University

 Estimation of structural damage and quantification of structural integrity are critical for safe and reliable operation of human-engineered complex systems, such as electromechanical, thermofluid, and… (more)

Subjects/Keywords: Life Extending Control; Flexible Mechanical Couplings; Pulse Combustors; Stochastic Behavior; Life Estimation; Thermodynamic Formalism; Complex Systems; Symbolic Dynamics; Signal Processing; Pattern Identification; Structural Health Monitoring; Fatigue Damage; Anomaly Detection; Fault Diagnosis and Prognosis

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

GUPTA, S. (2008). Behavioral Pattern Identification for Structural Health Monitoring in Complex Systems . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/7062

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

GUPTA, SHALABH. “Behavioral Pattern Identification for Structural Health Monitoring in Complex Systems .” 2008. Thesis, Penn State University. Accessed May 11, 2021. https://submit-etda.libraries.psu.edu/catalog/7062.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

GUPTA, SHALABH. “Behavioral Pattern Identification for Structural Health Monitoring in Complex Systems .” 2008. Web. 11 May 2021.

Vancouver:

GUPTA S. Behavioral Pattern Identification for Structural Health Monitoring in Complex Systems . [Internet] [Thesis]. Penn State University; 2008. [cited 2021 May 11]. Available from: https://submit-etda.libraries.psu.edu/catalog/7062.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

GUPTA S. Behavioral Pattern Identification for Structural Health Monitoring in Complex Systems . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/7062

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Hamid, Muhammad Raffay. A computational framework for unsupervised analysis of everyday human activities.

Degree: PhD, Computing, 2008, Georgia Tech

 In order to make computers proactive and assistive, we must enable them to perceive, learn, and predict what is happening in their surroundings. This presents… (more)

Subjects/Keywords: Computational perception; Activity recognition; Anomaly detection; Artificial intelligence; Behavior modeling; Scene understanding; Automatic data collection systems; Ubiquitous computing; Optical detectors; Human-computer interaction; Expert systems (Computer science); Computer vision

…101 Figure 29 Illustration of Anomaly Explanation - Five simulated activity sequences are… …shown to illustrate the different concepts introduced for anomaly explanation. α1 has low… …extraneous features in an anomaly, while α4 could be useful in explaining the features that were… …deficient in it. . . . . 103 Figure 30 Anomaly Explanation - explanations generated by the system… …Figure 31 Notion of anomaly - Detection of anomalous subsequences using match and reverse match… 

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Hamid, M. R. (2008). A computational framework for unsupervised analysis of everyday human activities. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/24765

Chicago Manual of Style (16th Edition):

Hamid, Muhammad Raffay. “A computational framework for unsupervised analysis of everyday human activities.” 2008. Doctoral Dissertation, Georgia Tech. Accessed May 11, 2021. http://hdl.handle.net/1853/24765.

MLA Handbook (7th Edition):

Hamid, Muhammad Raffay. “A computational framework for unsupervised analysis of everyday human activities.” 2008. Web. 11 May 2021.

Vancouver:

Hamid MR. A computational framework for unsupervised analysis of everyday human activities. [Internet] [Doctoral dissertation]. Georgia Tech; 2008. [cited 2021 May 11]. Available from: http://hdl.handle.net/1853/24765.

Council of Science Editors:

Hamid MR. A computational framework for unsupervised analysis of everyday human activities. [Doctoral Dissertation]. Georgia Tech; 2008. Available from: http://hdl.handle.net/1853/24765

23. Bartlett, Karen. MULTIDIMENSIONAL, WAVE-FUNCTION SUPERCONDUCTIVITY AND COSMOLOGY.pdf.

Degree: 2016, Figshare

    AThe Cooper pair state is responsible for superconductivity, as described in the BCS theory developed by John Bardeen, Leon Cooper, and John Schrieffer… (more)

Subjects/Keywords: Uncategorized; Neuroscience; Computer Engineering; Evolutionary Biology; Biological Engineering; Stellar Astronomy; Astrophysics; Applied Computer Science; Aerospace Engineering; Geometry; Computational Physics; Quantum Mechanics; Thermodynamics; Entropy; General Relativity; Special Relativity; Education; Solar System, Solar Physics, Planets and Exoplanets; Computer Software; Geodynamics; Magnetism and Palaeomagnetism; Cosmology and Extragalactic Astronomy; General Relativity and Gravitational Waves; High Energy Astrophysics; Cosmic Rays; Mesospheric, Ionospheric and Magnetospheric Physics; Space and Solar Physics; Electrical and Electronic Engineering not elsewhere classified; Biological Adaptation; Animal Behaviour; Topology; Applied Mathematics not elsewhere classified; Mathematical Physics not elsewhere classified; Atomic, Molecular, Nuclear, Particle and Plasma Physics not elsewhere classified; Electronic and Magnetic Properties of Condensed Matter; Superconductivity; Condensed Matter Physics not elsewhere classified; Medical Physics; Virtual Reality and Related Simulation; Artificial Intelligence and Image Processing not elsewhere classified; Medical Biotechnology not elsewhere classified; Data Communications; Wireless Communications; Computer Hardware not elsewhere classified; Nanoelectronics; Nanotechnology not elsewhere classified; Mortality; gravitation; strong nuclear force; weak nuclear force; ocean tides; Hubble constant; Poincare conjecture; magnetic dynamo theory; black holes; Newton; Einstein; Hawking; time; space-time travel; coronal mass ejection; mini ice age; Complex Number Plane; higher dimensions; binary digits; qubit; Mobius strip; figure-8 Klein bottle; E=mc^2; Beatles; instinct; death; life; immortality; dark energy; dark matter; antimatter; superconductivity; artificial intelligence; Cosmology; quantum mechanics; particle physics; American Association for Advancement of Science; Big Bang; cosmological Inflation; cosmological constant; Steady State; entanglement; computers; Maxwell; supersymmetry; Star Trek; Mars; Earth; Mercury; binary stars; negative absolute temperature; wave-particle duality; helium; expanding universe; redshift; blueshift; infinity; eternity; General Relativity; world peace; hypnosis; destiny; DVD; past; present; future; consciousness; Sun; Moon; Pioneer anomaly; Astronomical Unit; antigravity; magnetic fields; BICEP2; coronal heating; proton-proton chain; entropy; Sagan; simulation; nonlinearity; virtual particles; Meissner effect; Pauli exclusion principle; cosmic rays; quarks; gluons; Hidden Variables; topology; Unified Field; "retarded" waves; "advanced" waves; electromagnetism

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Bartlett, K. (2016). MULTIDIMENSIONAL, WAVE-FUNCTION SUPERCONDUCTIVITY AND COSMOLOGY.pdf. (Thesis). Figshare. Retrieved from http://hdl.handle.net/10.6084/m9.figshare.3472700.v1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Bartlett, Karen. “MULTIDIMENSIONAL, WAVE-FUNCTION SUPERCONDUCTIVITY AND COSMOLOGY.pdf.” 2016. Thesis, Figshare. Accessed May 11, 2021. http://hdl.handle.net/10.6084/m9.figshare.3472700.v1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Bartlett, Karen. “MULTIDIMENSIONAL, WAVE-FUNCTION SUPERCONDUCTIVITY AND COSMOLOGY.pdf.” 2016. Web. 11 May 2021.

Vancouver:

Bartlett K. MULTIDIMENSIONAL, WAVE-FUNCTION SUPERCONDUCTIVITY AND COSMOLOGY.pdf. [Internet] [Thesis]. Figshare; 2016. [cited 2021 May 11]. Available from: http://hdl.handle.net/10.6084/m9.figshare.3472700.v1.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Bartlett K. MULTIDIMENSIONAL, WAVE-FUNCTION SUPERCONDUCTIVITY AND COSMOLOGY.pdf. [Thesis]. Figshare; 2016. Available from: http://hdl.handle.net/10.6084/m9.figshare.3472700.v1

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

.