Do you have a portable HDD lying around ? Many people do and since now-a-days we rely a lot on “cloud”, they are seldom used.
Well, if you are like me, you would love to have a home server for a one-time charge of ~$70–80.
What you need ?
- Internet connection
- Access to your router
- HDD with a USB
- Raspberry pi ( worked on 3b) with formatted micro SD card.
- domain name (optional)
- Ethernet cable (optional)
- pi case (optional)
Step 1 : Setup a local SFTP server with Raspberry PI and HDD.
Survey of anomaly detection techniques covers this topic quite extensively. In this post, I have tried to cover topics discussed in this paper in these condensed notes —
Types of anomalies -
Point anomaly problem and collective anomaly problem can be transformed to contextual anomalies when contextual variables are considered.
Supervised, semi-supervised and unsupervised techniques for anomaly detection.Outputs of anomaly detection models is either scores or labels.
Some applications of anomaly detection described in the paper are -
Intrusion Detection Notion — This problem find abnormal behavior in…
Recommendation systems describe the techniques used to predict ratings and opinions in which a user might have a propensity to express. As an example, think of the recommended content shown to users on Netflix or perhaps the products a user may want to purchase from Amazon. Recommendation systems are ubiquitous in the digital world. Users encounter these systems as they see ‘Suggested Friends’ on Facebook, ‘Suggested Videos’ on YouTube, or ‘Other Jobs for you’ on LinkedIn.
There are two approaches through which recommendation system are designed:
1. Content-based filtering
2. Collaborative filtering
Techniques which selectively make use of both approaches…