Results 51 to 60 of about 19,864 (168)
Applied Research of Outlier Mining Technology in Anomaly Detection [PDF]
随着Internet覆盖范围的不断扩大、计算机与网络技术研究的不断深入,网络安全作为一个无法回避的问题呈现在人们面前。如何保障信息安全、防范网络入侵已经成为人们最为关心的问题。入侵检测技术作为一种主动的网络信息安全保障措施,可以有效地弥补传统安全防护技术的不足,已经成为网络安全领域的研究热点。 我们所研究的内容主要集中在基于无监督的异常检测技术的研究上。本文首先阐述了入侵检测系统定义、理论、分类和模型等,然后分析了各种入侵检测方法的优缺点;结合当前一些基于数据挖掘的入侵检测的研究成果 ...
吴楠楠
core
ABSTRACT Objective To critically review the literature and synthesize evidence on the incremental yield of prenatal exome sequencing (PES) in fetuses with an apparently normal phenotype with a normal G‐banded karyotype or chromosomal microarray (CMA).
A. Sotiriadis +5 more
wiley +1 more source
Heart rate variability in horses with and without severe equine asthma
Abstract Background Equine asthma in severe form (severe equine asthma [sEA]) shares remarkable similarities with human asthma. Human studies detected changes in the autonomic nervous system function in asthmatic patients based on heart rate variability (HRV) analysis. Study design Observational study. Objectives To investigate the relationship between
Zsófia Nyerges‐Bohák +5 more
wiley +1 more source
Intrusion Detection Technology Based on Outlier Mining [PDF]
基于孤立点挖掘,探讨了异常检测的可行性,将孤立点挖掘方法应用到入侵检测中,采用编码映射方法对符号型数据进行处理,利用主成分分析对编码映射后扩展的属性进行降维。仿真实验验证了该方法的可行性。This paper discusses feasibility of anomaly detection based on outlier mining, presents an anomaly detection method by using an outlier detection method based ...
史亮, 吴楠楠, 姜青山, 黄斌
core
Cross-View Negative-Free Contrastive Learning for Graph Anomaly Detection with High-Order Structure Augmentation [PDF]
Graph anomaly detection has practical applications in various fields, such as cyber security, financial evaluation and medical care. Recently, contrastive-based and generative-based detection frameworks have achieved remarkable performance improvements ...
JIN Hu, HU Jingtao, WANG Siwei, ZHU En, LUO Lei, DUAN Jingcan
core +1 more source
ABSTRACT Objective To assess whether premenopausal women diagnosed with deep or ovarian endometriosis on transvaginal sonography (TVS) were more likely to suffer from dyspareunia and pelvic pain symptoms, and have a lower quality of life, compared to women without sonographically diagnosed deep or ovarian endometriosis.
P. Chaggar +5 more
wiley +1 more source
ABSTRACT Objective Although artificial intelligence (AI) is increasingly being applied to ultrasound imaging in gynecology, efforts to synthesize the available evidence have been inadequate. The aim of this systematic review was to summarize and evaluate the literature on the role of AI applied to ultrasound imaging in benign gynecological disorders ...
F. Moro +8 more
wiley +1 more source
目的探讨肿瘤异常蛋白(TAP)检测系统在早期妇科恶性肿瘤筛查中的应用价值。方法选择早期妇科恶性肿瘤疑似患者126例,经术后病理学检查包括恶性肿瘤56例,非恶性肿瘤70例,所有患者术前均行超声与TAP检测;同期选择正常女性体检人群50例,作为对照,观察TAP检测与超声诊断早期妇科恶性肿瘤的灵敏度、特异度、阳性预测值、阴性预测值及约登指数。结果 1恶性肿瘤患者TA P检测阳性率为89.29%,高于非恶性肿瘤患者与正常人群的14.29%、4%,比较差异有统计学意义 ...
王义霞 +4 more
doaj
Routine 36‐week scan: diagnosis and outcome of abnormal fetal presentation
ABSTRACT Objectives First, to report the incidence of non‐cephalic presentation at a routine 36‐week ultrasound scan, the uptake and success of external cephalic version (ECV) and the incidence of spontaneous rotation from non‐cephalic to cephalic presentation.
M. Fitiri +5 more
wiley +1 more source
Hair fragility (trichorrhexis nodosa) in alopecic Pomeranian dogs
Background – Alopecia associated with hair cycle arrest (HCA, Alopecia X) is well‐recognised in Pomeranian dogs. The authors are unaware of reports of hair fragility in affected dogs. Hypothesis/Objectives – Following the observation of frequent hair shaft abnormalities in alopecic Pomeranians, we hypothesised that hair fragility events would be more ...
Erin Brennan +6 more
wiley +1 more source

