Results 21 to 30 of about 91,231 (150)
Analysis of Network Security Data Using Wavelet Transforms
Data Analysis of Network Security is very important in intrusion detection and computer forensics. A lot of data mining methods to research it have been found, such as content-based queries and similarity searches to manage and use such data.
Sun Donghong +4 more
doaj +1 more source
Characterising anomalous transport in accretion disks from X-ray observations [PDF]
Whilst direct observations of internal transport in accretion disks are not yet possible, measurement of the energy emitted from accreting astrophysical systems can provide useful information on the physical mechanisms at work.
Adams +30 more
core +2 more sources
A titanium-nitride near-infrared kinetic inductance photon-counting detector and its anomalous electrodynamics [PDF]
We demonstrate single-photon counting at 1550 nm with titanium-nitride (TiN) microwave kinetic inductance detectors. Energy resolution of 0.4 eV and arrival-time resolution of 1.2 microseconds are achieved.
da Silva, F. C. S. +12 more
core +2 more sources
Can Anomalous Amplification be Attained Without Postselection? [PDF]
We present a parameter estimation technique based on performing joint measurements of a weak interaction away from the weak-value-amplification approximation.
Howell, John C. +3 more
core +3 more sources
Fractional Brownian motion with a reflecting wall [PDF]
Fractional Brownian motion, a stochastic process with long-time correlations between its increments, is a prototypical model for anomalous diffusion.
Vojta, Thomas, Wada, Alexander H. O.
core +3 more sources
Sound Event Detection for Human Safety and Security in Noisy Environments
The objective of a sound event detector is to recognize anomalies in an audio clip and return their onset and offset. However, detecting sound events in noisy environments is a challenging task. This is due to the fact that in a real audio signal several
Michael Neri +3 more
doaj +1 more source
Resolving the ambiguous direction of arrival of weak meteor radar trail echoes [PDF]
Meteor phenomena cause ionized plasmas that can be roughly divided into two distinctly different regimes: a dense and transient plasma region co-moving with the ablating meteoroid and a trail of diffusing plasma left in the atmosphere and moving with the
D. Kastinen +4 more
doaj +1 more source
Dynamic mode decomposition of extreme events [PDF]
Most data-driven methods, among them Dynamic Mode Decomposition (DMD), focus on analysing and reconstructing the average behaviour of a system. However, the primary interest often lies in the anomalous behaviour, known as extreme events.
M. Ann, J. Behrens, J. Sillmann
doaj +1 more source
We investigate the coexisting rogue wave dynamics associated with two fundamental-frequency optical waves interacting in a quadratic nonlinear medium.
Changchang Pan +5 more
doaj +1 more source
Detection of Abnormal Cardiac Response Patterns in Cardiac Tissue Using Deep Learning
This study reports a method for the detection of mechanical signaling anomalies in cardiac tissue through the use of deep learning and the design of two anomaly detectors.
Xavier Marimon +4 more
doaj +1 more source

