Comparative analysis of system logs and streaming data anomaly detection algorithms
Comparison of several common approaches to the analysis of system logs and streaming data generated en masse by the company's IT infrastructure. Characteristics of model-based anomaly search algorithms and hierarchical temporary memory algorithms.
Подобные документы
Robots and controllers: interfaces, operating system. Binary, analog, position sensor. Kinematics, driving program. Balancing robots: simulation, double inverted pendulum. Micro mouse contest. Maze exploration algorithms. Real-time image processing.
учебное пособие, добавлен 25.11.2013On relevance of technical analysis. Pattern recognition. Technical indicators. Data processing. Feature extraction. Kolmogorov-Smirnov test. Algorithm and software. Model configuration. Clustering performance on simulated data, brutе force algorithm.
учебное пособие, добавлен 26.08.2016- 53. The analysis of the problems formation of reports on working curriculum in the automated system ASPG
The functional elements of reports preparation on working curriculum, its formation and data validation. Identification of problems in these process. The proposals for the improvement of re-engineering stages. Solution validation in the automated system.
реферат, добавлен 20.03.2016 Analysis of information technology monitoring and correction of the functional state of students in the process learning created based on developed models, complex criteria classification of constituent states models, algorithms normalized estimates.
статья, добавлен 23.06.2016Analysis of the model for creating irregular 3D objects. Structural model of a compact reverse engineering system. The possibilities of formalizing and automating the creation of complex 3D objects. Mathematical model of digitization of complex objects.
статья, добавлен 03.02.2019Information system research in historic perspective. Research scope on digital transformation. Depicting countries for software trade comparison analysis. Digital transformation conditions in Russia. Japanese school in information system research field.
диссертация, добавлен 01.09.2018The choice of technologies for application development as an stage. The importance of the correct selection of a combination of technologies in ensuring comfortable work in the future at all stages of the program's existence. Scalable technology stack.
статья, добавлен 11.07.2022Понятие термина Data Mining, его история возникновения. Понятие искусственного интеллекта. Сравнение статистики, машинного обучения и Data Mining. Развитие технологии баз данных начиная с 1960-х г. Data Mining как часть рынка информационных технологий.
реферат, добавлен 14.01.2015Types of knowledge-based systems. Logic, rules and representation. The use of registered names, trademarks in engineering. Expert systems, neural networks, genetic algorithms, case-based reasoning systems and methodologies of intelligent agents.
книга, добавлен 04.10.2014Joint fingerprinting and decryption of broadcast messages. An estimation attack on content-based video fingerprinting. Statistics- and spatiality-based feature distance measure for error resilient image authentication. Analysis based on quartic equation.
курс лекций, добавлен 08.03.2014The impact of the used modeling language for the result of the synthesis models. Generating artificial logs events according to the BPMN 2.0, their implementation in the form of a program that extends the software platform Process Mining Framework (ProM).
курсовая работа, добавлен 30.08.2016- 62. Big Data
Определение термина "Big Data" и его применение в работе с информацией огромного объема и разнообразного состава. Определение основных источников получения компаниями информации. Методики анализа массивов данных и технологии Big Data в разных отраслях.
курсовая работа, добавлен 28.09.2015 Analysis procedure synthesis, analysis and architectural and structural construction computing subsystem as part of the information management system security. The criticality of architectural elements and functions of management information system.
статья, добавлен 14.01.2017Features of testing on the usability, functionality and acceptability of an interactive system. Some approaches, based on expert evaluation: review, query techniques, analytic and model-based methods. Principles of choosing ways of measurements.
презентация, добавлен 28.12.2013Familiarity with the basic principles of cryptographic protection of information. Cryptography as a set of methods for data transformation, aimed at, it is to make the data useless to the enemy. Analysis of the cryptographic algorithm with the public key.
книга, добавлен 08.03.2014Investigation of a person's ability to work with information. Study of the neural executive mechanisms of the brain. Creation of a multicomponent model of short-term memory of Russian students, the development of their creative and intellectual abilities.
статья, добавлен 07.04.2021Text description of the main processes running in the dealer. Overview of Incadea enterprise software solutions at the global automotive retail market. Analysis of the information system correspondence to existed business-processes in the company.
реферат, добавлен 20.03.2016The problem of reliability of air navigation system operator. The definition of the operator's reliability by the means of the chosen model. The choice of a system in accordance with the requirements of recovery operator efficiency after failure.
статья, добавлен 22.12.2016Pattern discovery in biosequences. Social network mining from the web. Discovering spatio-textual association rules in document images. Discovery of latent patterns with hierarchical bayesian mixed-membership models and the issue of model choice.
книга, добавлен 19.03.2014General characteristics of the comparator model of text correspondence and objective situations described by them. Acquaintance with the most important tasks of the theory of intelligence. Analysis of functional and target models of intellectual activity.
статья, добавлен 11.10.2018Задачи Data Mining: описательные и предсказательные, классификации и регрессии, поиска ассоциативных правил, кластеризации. Практическое применение Data Mining. Особенности нечеткой логики, виды физической неопределенности. Процесс обнаружения знаний.
презентация, добавлен 27.04.2023Analysis of the influence of information processes on the development of the state. The use of computer technology in the banking sector. Development of an automated terminal monitoring system and a database management system. Thin client functions.
статья, добавлен 26.01.2021Analysis of trends in search of directions and priorities for processing electronic documents on the Internet. Technical principles of building an information retrieval system and use of the linguistic processor and neural networks for solving problems.
статья, добавлен 20.01.2017Feature models for the study of cyber-physical systems in the field of industrial production. Description of the installation of equipment and software environment. Analysis of the current approach for modeling of distributed software and semantic data.
статья, добавлен 23.02.2016A practical guide to using encryption technology to ensure confidentiality, security and integrity of your most valuable assets - its data. The analysis of the basic fundamentals of cryptography and its techniques for dealing with electronic security.
книга, добавлен 08.03.2014