To see the other types of publications on this topic, follow the link: Anomaly patterns.

Dissertations / Theses on the topic 'Anomaly patterns'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 33 dissertations / theses for your research on the topic 'Anomaly patterns.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chung, Chi-hang, and 鍾志恆. "Teleconnection of global precipitation anomaly with climate patterns." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hdl.handle.net/10722/195968.

Full text
Abstract:
Atmospheric oscillations, which mostly associate with climate patterns, have great influences on global climate variables, and they usually lead to extreme climate conditions and events, which cause lots of adverse impacts on our socioeconomic statuses. This study aims to identify the influence of climate patterns on the global precipitation anomaly. Four major climate patterns are investigated, and they are El Niño/La Niña–Southern Oscillation (ENSO), Indian Ocean Dipole (IOD), Arctic Oscillation (AO) and Antarctic Oscillation (AAO). This study adopts the NINO3.4, DMI, AO index and AAO index
APA, Harvard, Vancouver, ISO, and other styles
2

Vural, Gurkan. "Anomaly Detection From Personal Usage Patterns In Web Applications." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607973/index.pdf.

Full text
Abstract:
The anomaly detection task is to recognize the presence of an unusual (and potentially hazardous) state within the behaviors or activities of a computer user, system, or network with respect to some model of normal behavior which may be either hard-coded or learned from observation. An anomaly detection agent faces many learning problems including learning from streams of temporal data, learning from instances of a single class, and adaptation to a dynamically changing concept. The domain is complicated by considerations of the trusted insider problem (recognizing the difference between innocu
APA, Harvard, Vancouver, ISO, and other styles
3

Åkerström, Paul Linus Martin. "RETURN PATTERNS PROXIMAL TO CENTRAL BANK RATE DECISION ANNOUNCEMENTS : OMX 30 excess return and monetary policy announcements." Thesis, Stockholms universitet, Finansiering, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-105824.

Full text
Abstract:
In this study, it is determined that excess returns on the OMX 30 are confirmed to rise in anticipation of monetary policy decisions made by the central banks of Sweden and The United States of America. Those findings were manifested at a greater magnitude on the first day prior to the announcements and on a statistically significant level one day prior to monetary policy decisions from the Federal Open Market Committee. Moreover, excess returns beyond the average rate were found to be substantially higher on the first and third day prior monetary policy decisions from the Swedish Central bank
APA, Harvard, Vancouver, ISO, and other styles
4

Pal, Aritra. "Improving Service Level of Free-Floating Bike Sharing Systems." Scholar Commons, 2017. https://scholarcommons.usf.edu/etd/7433.

Full text
Abstract:
Bike Sharing is a sustainable mode of urban mobility, not only for regular commuters but also for casual users and tourists. Free-floating bike sharing (FFBS) is an innovative bike sharing model, which saves on start-up cost, prevents bike theft, and offers significant opportunities for smart management by tracking bikes in real-time with built-in GPS. Efficient management of a FFBS requires: 1) analyzing its mobility patterns and spatio-temporal imbalance of supply and demand of bikes, 2) developing strategies to mitigate such imbalances, and 3) understanding the causes of
APA, Harvard, Vancouver, ISO, and other styles
5

Costa, Gabriel de Barros Paranhos da. "Detecção de anomalias utilizando métodos paramétricos e múltiplos classificadores." Universidade de São Paulo, 2014. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-20112014-105415/.

Full text
Abstract:
Anomalias ou outliers são exemplos ou grupo de exemplos que apresentam comportamento diferente do esperado. Na prática,esses exemplos podem representar doenças em um indivíduo ou em uma população, além de outros eventos como fraudes em operações bancárias e falhas em sistemas. Diversas técnicas existentes buscam identificar essas anomalias, incluindo adaptações de métodos de classificação e métodos estatísticos. Os principais desafios são o desbalanceamento do número de exemplos em cada uma das classes e a definição do comportamento normal associada à formalização de um modelo para esse compo
APA, Harvard, Vancouver, ISO, and other styles
6

Rahman, Anisur. "Rare sequential pattern mining of critical infrastructure control logs for anomaly detection." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/132077/1/__qut.edu.au_Documents_StaffHome_staffgroupW%24_wu75_Documents_ePrints_Anisur_Rahman_Thesis_Redacted.pdf.

Full text
Abstract:
Supervisory Control and Data Acquisition (SCADA) systems are used to drive much of a nation's critical infrastructure, which by definition is essential for the nation's citizens' way of life. They are connected to the computer networks and internet systems to operate, control and monitor their operations. This connectivity enables these SCADA systems to be exposed to cyber-attacks. This thesis detects anomalies or cyber-attacks on SCADA systems. It analyses SCADA control logs to find abnormal process activities which are treated as anomalies. A novel rare sequential pattern mining approach is
APA, Harvard, Vancouver, ISO, and other styles
7

Losik, Len, Sheila Wahl, and Lewis Owen. "Predicting Failures and Estimating Duration of Remaining Service Life from Satellite Telemetry." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/611451.

Full text
Abstract:
International Telemetering Conference Proceedings / October 28-31, 1996 / Town and Country Hotel and Convention Center, San Diego, California<br>This paper addresses research completed for predicting hardware failures and estimating remaining service life for satellite components using a Failure Prediction Process (FPP). It is a joint paper, presenting initial research completed at the University of California, Berkeley, Center for Extreme Ultraviolet (EUV) Astrophysics using telemetry from the EUV EXPLORER (EUVE) satellite and statistical computation analysis completed by Lockheed Martin. Thi
APA, Harvard, Vancouver, ISO, and other styles
8

Jakkula, Vikramaditya Reddy. "Enhancing smart home resident activity prediction and anomaly detection using temporal relations." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Thesis/Fall2007/v_jakkula_102207.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McAbee, Ashley S. M. "Traffic pattern detection using the Hough transformation for anomaly detection to improve maritime domain awareness." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/38977.

Full text
Abstract:
Approved for public release; distribution is unlimited.<br>Techniques for anomaly detection in the maritime domain by extracting traffic patterns from ship position data to generate atlases of expected ocean travel are developed in this thesis. An archive of historical data is used to develop a traffic density grid. The Hough transformation is used to extract linear patterns of elevated density from the traffic density grid, which can be considered the highways of the oceans. These highways collectively create an atlas that is used to define geographical regions of expected ship locations. Shi
APA, Harvard, Vancouver, ISO, and other styles
10

Spasic, Nemanja. "Anomaly Detection and Prediction of Human Actions in a Video Surveillance Environment." Thesis, University of Cape Town, 2007. http://pubs.cs.uct.ac.za/archive/00000449/.

Full text
Abstract:
World wide focus has over the years been shifting towards security issues, not in least due to recent world wide terrorist activities. Several researchers have proposed state of the art surveillance systems to help with some of the security issues with varying success. Recent studies have suggested that the ability of these surveillance systems to learn common environmental behaviour patterns as wells as to detect and predict unusual, or anomalous, activities based on those learnt patterns are possible improvements to those systems. In addition, some of these surveillance systems are still run
APA, Harvard, Vancouver, ISO, and other styles
11

Billi, Matteo. "Joint temperature and polarisation analyses of the lack of power anomaly in the CMB anisotropy pattern." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/16205/.

Full text
Abstract:
La Radiazione Cosmica di Fondo (CMB) è la radiazione emessa nell’Universo primordiale dopo la ricombinazione di elettroni e protoni in idrogeno neutro. Le osservazioni della CMB negli ultimi 30 anni hanno fortemente contribuito alla nascita della cosmologia di precisione, e all’affermazione di un modello cosmologico standard, denonimato ΛCDM, i cui parametri sono stimati con un’incertezza dell’ordine del percento o addirittura inferiore. Ciò nonostante ci sono caratteristiche non ben comprese osservate alle grandi scali angolari della mappa in temperatura di CMB, note come anomalie. Una di que
APA, Harvard, Vancouver, ISO, and other styles
12

Štoffa, Imrich. "Vyhledávání podobností v síťových bezpečnostních hlášeních." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417298.

Full text
Abstract:
Network monitoring systems generate a high number of alerts reporting on anomalies and suspicious activity of IP addresses. From a huge number of alerts, only a small fraction is high priority and relevant from human evaluation. The rest is likely to be neglected. Assume that by analyzing large sums of these low priority alerts we can discover valuable information, namely, coordinated IP addresses and type of alerts likely to be correlated. This knowledge improves situational awareness in the field of network monitoring and reflects the requirement of security analysts. They need to have at th
APA, Harvard, Vancouver, ISO, and other styles
13

Cheng, Guangchun. "Video Analytics with Spatio-Temporal Characteristics of Activities." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc799541/.

Full text
Abstract:
As video capturing devices become more ubiquitous from surveillance cameras to smart phones, the demand of automated video analysis is increasing as never before. One obstacle in this process is to efficiently locate where a human operator’s attention should be, and another is to determine the specific types of activities or actions without ambiguity. It is the special interest of this dissertation to locate spatial and temporal regions of interest in videos and to develop a better action representation for video-based activity analysis. This dissertation follows the scheme of “locating then r
APA, Harvard, Vancouver, ISO, and other styles
14

Nilsson, Felix. "Joint Human-Machine Exploration of Industrial Time Series Using the Matrix Profile." Thesis, Högskolan i Halmstad, CAISR Centrum för tillämpade intelligenta system (IS-lab), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-44717.

Full text
Abstract:
Technological advancements and widespread adaptation of new technology in industry have made industrial time series data more available than ever before. This trend is expected to continue, especially with the introduction of Industry 4.0, where the goal is to connect everything on the industry floor to the cloud and the Industrial Internet of Things. With this development grows the need for versatile methods for mining industrial time series data. Time series motif discovery is a sub-set of data mining and is about finding interesting patterns in time series data. The state of the art in time
APA, Harvard, Vancouver, ISO, and other styles
15

Vacinova, Jitka. "Etudes structurales des oxydes de platine par les méthodes de diffusion anomale et de D. A. F. S." Université Joseph Fourier (Grenoble), 1995. http://www.theses.fr/1995GRE10185.

Full text
Abstract:
Nous avons entrepris les etudes structurales de deux systemes d'oxydes de platine: ba/pt/o et bi/pb/pt/o par diffraction electronique et par diffraction des rayons x. Nous avons developpe les techniques experimentales de diffraction anomalous fine structure (dafs) et de diffraction anomale afin de les appliquer aux etudes de materiaux sous forme de monocristaux ou sous forme de poudres. Pour les mesures de dafs nous avons propose deux procedures experimentales differentes: le mode de diffraction multi-monochromatique et le mode de diffraction dispersive. L'information selective des diffuseurs
APA, Harvard, Vancouver, ISO, and other styles
16

Beulig, Sebastian [Verfasser], Felix [Akademischer Betreuer] Huber, and Helmut [Akademischer Betreuer] Mayer. "Real-time anomaly and pattern recognition in high-resolution optical satellite imagery for future on-board image processing on Earth observation satellites / Sebastian Beulig. Universität der Bundeswehr München, Fakultät für Luft- und Raumfahrttechnik. Gutachter: Felix Huber ; Helmut Mayer. Betreuer: Felix Huber." Neubiberg : Universitätsbibliothek der Universität der Bundeswehr München, 2014. http://d-nb.info/1069132292/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Rook, Jayson Carr. "Detecting Anomalous Behavior in Radar Data." Miami University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=miami1622205414960438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Butterworth, Mary Michele. "Felinus Domus: A Veterinary Hospital for Cats in Old Town Alexandria, Virginia." Thesis, Virginia Tech, 2004. http://hdl.handle.net/10919/34535.

Full text
Abstract:
Throughout time man has discovered that the human form, in all its harmonious proportion, can be used as a guide, gauge and tool to design and build structures. However, the human figure has not been the only organic form used to create architecture. Many animals create dwellings that synchronize with not only their own unique physical characteristics and survival instincts, but with their aesthetic preferences as well. It is logical that a design should respond to its surroundings, program and most importantly, its inhabitants. This thesis design is for two specific occupants: the cat and the
APA, Harvard, Vancouver, ISO, and other styles
19

Alwan, Azzam. "Vieillissement du système cardio-vasculaire – Etude de l’activité des peptides d’élastine." Thesis, Troyes, 2018. http://www.theses.fr/2018TROY0034.

Full text
Abstract:
Ce travail vise à proposer une méthodologie statistique pour étudier les peptides produits par la dégradation des protéines d'élastine artérielle. Les approches biologiques indiquent que certains de ces peptides peuvent être considérés comme des signaux moléculaires et peuvent influencer l'évolution des pathologies vasculaires. De plus, des expériences montrent que les propriétés biologiques des peptides sont liées à leurs structures 3D. Dans ce contexte, l'objectif de nos travaux consiste à analyser les structures 3D de ces peptides pour identifier les conformations liées à leurs activités bi
APA, Harvard, Vancouver, ISO, and other styles
20

Bouindour, Samir. "Apprentissage profond appliqué à la détection d'événements anormaux dans les flux vidéos." Electronic Thesis or Diss., Troyes, 2019. http://www.theses.fr/2019TROY0036.

Full text
Abstract:
L'utilisation des caméras de surveillance s'est considérablement accru ces dernières années. Cette prolifération pose un problème sociétal de premier ordre, celui de l’exploitation des flux générés. Actuellement, ces données sont en majorité analysées par des opérateurs humains. Cependant, de nombreuses études remettent en cause la pertinence de cette approche. Il est chronophage et laborieux pour un opérateur de visionner des vidéos de surveillance durant de longues périodes. Compte tenu des progrès réalisés récemment dans le domaine de la vision par ordinateur, notamment par l'intermédiaire
APA, Harvard, Vancouver, ISO, and other styles
21

Mani, Meenakshi. "Quantitative Analysis of Open Curves in Brain Imaging: Applications to White Matter Fibers and Sulci." Phd thesis, Université Rennes 1, 2011. http://tel.archives-ouvertes.fr/tel-00851505.

Full text
Abstract:
Il y a dans le cerveau humain environ 100 sillons corticaux, et plus de 100 milliards de faisceaux de matière blanche. Si le nombre, la configuration et la fonction de ces deux structures anatomiques diffèrent, elles possèdent toutefois une propriété géométrique commune: ce sont des courbes ouvertes continues. Cette thèse se propose d'étudier comment les caractéristiques des courbes ouvertes peuvent être exploitées afin d'analyser quantitativement les sillons corticaux et les faisceaux de matière blanche. Les quatre caractéristiques d'une courbe ouverte-forme, taille, orientation et position-
APA, Harvard, Vancouver, ISO, and other styles
22

Yang, Yi-Hsiang, and 楊逸翔. "User Behavior Anomaly Detection via System Usage and Active Process Patterns." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/ry9jw7.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊工程系<br>100<br>Cloud computing is a hot topic in the global IT industry, which is considered as the main part of the network and computing service providers in recent years. Some security issues will be more threatening in cloud computing, such as account theft and insider threat. In a cloud service, the attacker can steal all the data of the account owner. We proposed a framework to utilize anomaly detection techniques for pro ling user's behavior via two feature sets, and the user's pro le is used for detecting all the suspicious behaviors. The rst feature set is extracte
APA, Harvard, Vancouver, ISO, and other styles
23

Fernandes, Letícia Maria Sousa. "Learning Human Behaviour Patterns by Trajectory and Activity Recognition." Master's thesis, 2019. http://hdl.handle.net/10362/87075.

Full text
Abstract:
The world’s population is ageing, increasing the awareness of neurological and behavioural impairments that may arise from the human ageing. These impairments can be manifested by cognitive conditions or mobility reduction. These conditions are difficult to be detected on time, relying only on the periodic medical appointments. Therefore, there is a lack of routine screening which demands the development of solutions to better assist and monitor human behaviour. The available technologies to monitor human behaviour are limited to indoors and require the installation of sensors around the
APA, Harvard, Vancouver, ISO, and other styles
24

"A nonparametric pattern recognition approach to anomaly detection." Tulane University, 1992.

Find full text
Abstract:
A model for an anomaly detection system is developed which characterizes the behavior of user processes in an operating system in order to recognize abnormal activity which might indicate an intrusion or other threat to system security. Nonparametric pattern recognition techniques are used to characterize behavior, reducing the data associated with each image execution by a user to a vector in the resource usage space. Patterns of resource usage are identified and incorporated into profiles which serve as baselines for comparison in order to detect anomalies A metric is provided for assessing
APA, Harvard, Vancouver, ISO, and other styles
25

Chen, Pei-Chen, and 陳佩志. "Maritime Vessels Trajectory Pattern Analysis and Anomaly Detection." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/pe7497.

Full text
Abstract:
碩士<br>國立臺灣大學<br>地理環境資源學研究所<br>106<br>Currently, the Coast Guard Administration of the Executive Yuan carries out maritime surveillance tasks by analyzing and judging the abnormality of the ship&apos;&apos;s movement behavior through the experience of the monitoring personnel. In the face of the continuous generation and increase of many ship movement trajectory data, the task of monitoring personnel performing marine traffic monitoring is even more onerous. On the other hand, for relatively few abnormal movements, the more difficult it is to detect and judge through human resources. However, w
APA, Harvard, Vancouver, ISO, and other styles
26

CHANG, KAI-DI, and 張凱迪. "Transaction pattern based anomaly detection algorithm for IP Multimedia Subsystem." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/37165204759433782703.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>資訊工程研究所碩士班<br>97<br>IP Multimedia Subsystem (IMS) plays an important role in the progress made towards migration to Next Generation Networks (NGN). The key concept of NGN is encouraging the provision of many packet-switched multimedia services to users through the interactions between UMTS-based cellular networks and computer networks (such as the Internet). In this capacity, the basis for communication between devices or terminals is expected to be the Internet Protocol (IP). Based on the ALL-IP network architecture, at least an IP address is assigned to equipments. This bring
APA, Harvard, Vancouver, ISO, and other styles
27

Chia-ChunChang and 張家駿. "Anomaly Detection on Cloud Application Based on Service Pattern Statistics." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/69393344219094432767.

Full text
Abstract:
碩士<br>國立成功大學<br>電腦與通信工程研究所<br>104<br>In recent years, flourishing internet, booming cloud computing technology and increasing popularity of mobile technology have already change our life, people can access data, internet and cloud resources flexible without either time, space or place limitation. As a result, internet and cloud computing technology have become popular issue now, for example, network security, cloud security and web performance. Our research mainly discussed how to inspect the web performance and web security with log on server. The issue that either protocol disorder or lost f
APA, Harvard, Vancouver, ISO, and other styles
28

Rasool, Raihan Ur. "CyberPulse: A Security Framework for Software-Defined Networks." Thesis, 2020. https://vuir.vu.edu.au/42172/.

Full text
Abstract:
Software-Defined Networking (SDN) technology provides a new perspective in traditional network management by separating infrastructure plane from the control plane which facilitates a higher level of programmability and management. While centralized control provides lucrative benefits, the control channel becomes a bottleneck and home to numerous attacks. We conduct a detailed study and find that crossfire Link Flooding Attacks (LFA) are one of the most lethal attacks for SDN due to the utilization of low-rate traffic and persistent attacking nature. LFAs can be launched by the malicious adver
APA, Harvard, Vancouver, ISO, and other styles
29

Gomes, André Daniel Dinis. "Anomaly Detection in Managed Connectivity M2M." Master's thesis, 2021. http://hdl.handle.net/10316/95541.

Full text
Abstract:
Dissertação de Mestrado em Engenharia Informática apresentada à Faculdade de Ciências e Tecnologia<br>Considerando o contexto das telecomunicações, soluções Machine-To-Machine (M2M) servem de suporte para comunicações entre dispositivos na rede móvel (p.e., smartphones, contadores de luz, entre outros smart devices), permitindo a gestão da sua conectividade e serviços associados. Muitas empresas e seus negócios estão dependentes do normal funcionamento deste tipo de equipamentos e qualquer interrupção ou indisponibilidade de serviços pode implicar custos adicionais ou quebras na infra-estrutur
APA, Harvard, Vancouver, ISO, and other styles
30

Kuo-Chuan, WU, and 伍國權. "An Invesitigation of the Relationship Between Security Return Seasonal Anomaly and Institutional Investor''s Trading Pattern." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/87874045311286724871.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>企業管理研究所<br>86<br>The research in terms of seasonal anomalies in staock prices has been receiving extensive attention in the past fifty years. For instance,the most well-known seasonal anomaly is the Day-of-the-Week effect advanced by Cross(1973). French(1980),Gibbons and Hess(1981),Lakonishok and Levi(1982),Keim and Stambaugh(1984),and Smirlock and Starks(1986).Facing this seasonal anomaly, different hypotheses related to the market microstructure cuch as settlemtnt effect, bid-ask spread biases,and the negative information release conjecture have been advanced. However,Si
APA, Harvard, Vancouver, ISO, and other styles
31

Antonella, Mensi. "Advanced random forest approaches for outlier detection." Doctoral thesis, 2022. http://hdl.handle.net/11562/1067504.

Full text
Abstract:
Outlier Detection (OD) is a Pattern Recognition task which consists of finding those patterns in a set of data which are likely to have been generated by a different mechanism than the one underlying the rest of the data. The importance of OD is visible in everyday life. Indeed, fast, and accurate detection of outliers is crucial: for example, in the electrocardiogram of a patient, an abnormality in the heart rhythm can cause severe health problems. Due to the high number of fields in which OD is needed, several approaches have been designed. Among them, Random Forest-based techniques have rai
APA, Harvard, Vancouver, ISO, and other styles
32

Pelizzari, Andrea. "Genetic algorithm for shipping route estimation with long-range tracking data : automatic reconstruction of shipping routes based on the historical ship positions for maritime safety applications." Master's thesis, 2016. http://hdl.handle.net/10362/17346.

Full text
Abstract:
Project Work presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence<br>Ship tracking systems allow Maritime Organizations that are concerned with the Safety at Sea to obtain information on the current location and route of merchant vessels. Thanks to Space technology in recent years the geographical coverage of the ship tracking platforms has increased significantly, from radar based near-shore traffic monitoring towards a worldwide picture of the maritime traffic situation. The long-range
APA, Harvard, Vancouver, ISO, and other styles
33

Sun, Le. "Data stream mining in medical sensor-cloud." Thesis, 2016. https://vuir.vu.edu.au/31032/.

Full text
Abstract:
Data stream mining has been studied in diverse application domains. In recent years, a population aging is stressing the national and international health care systems. Along with the advent of hundreds and thousands of health monitoring sensors, the traditional wireless sensor networks and anomaly detection techniques cannot handle huge amounts of information. Sensor-cloud makes the processing and storage of big sensor data much easier. Sensor-cloud is an extension of Cloud by connecting the Wireless Sensor Networks (WSNs) and the cloud through sensor and cloud gateways, which consiste
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!