Results 21 to 30 of about 91,231 (150)

Analysis of Network Security Data Using Wavelet Transforms

open access: yesJournal of Algorithms & Computational Technology, 2014
Data Analysis of Network Security is very important in intrusion detection and computer forensics. A lot of data mining methods to research it have been found, such as content-based queries and similarity searches to manage and use such data.
Sun Donghong   +4 more
doaj   +1 more source

Characterising anomalous transport in accretion disks from X-ray observations [PDF]

open access: yes, 2001
Whilst direct observations of internal transport in accretion disks are not yet possible, measurement of the energy emitted from accreting astrophysical systems can provide useful information on the physical mechanisms at work.
Adams   +30 more
core   +2 more sources

A titanium-nitride near-infrared kinetic inductance photon-counting detector and its anomalous electrodynamics [PDF]

open access: yes, 2012
We demonstrate single-photon counting at 1550 nm with titanium-nitride (TiN) microwave kinetic inductance detectors. Energy resolution of 0.4 eV and arrival-time resolution of 1.2 microseconds are achieved.
da Silva, F. C. S.   +12 more
core   +2 more sources

Can Anomalous Amplification be Attained Without Postselection? [PDF]

open access: yes, 2016
We present a parameter estimation technique based on performing joint measurements of a weak interaction away from the weak-value-amplification approximation.
Howell, John C.   +3 more
core   +3 more sources

Fractional Brownian motion with a reflecting wall [PDF]

open access: yes, 2018
Fractional Brownian motion, a stochastic process with long-time correlations between its increments, is a prototypical model for anomalous diffusion.
Vojta, Thomas, Wada, Alexander H. O.
core   +3 more sources

Sound Event Detection for Human Safety and Security in Noisy Environments

open access: yesIEEE Access, 2022
The objective of a sound event detector is to recognize anomalies in an audio clip and return their onset and offset. However, detecting sound events in noisy environments is a challenging task. This is due to the fact that in a real audio signal several
Michael Neri   +3 more
doaj   +1 more source

Resolving the ambiguous direction of arrival of weak meteor radar trail echoes [PDF]

open access: yesAtmospheric Measurement Techniques, 2021
Meteor phenomena cause ionized plasmas that can be roughly divided into two distinctly different regimes: a dense and transient plasma region co-moving with the ablating meteoroid and a trail of diffusing plasma left in the atmosphere and moving with the
D. Kastinen   +4 more
doaj   +1 more source

Dynamic mode decomposition of extreme events [PDF]

open access: yesNonlinear Processes in Geophysics
Most data-driven methods, among them Dynamic Mode Decomposition (DMD), focus on analysing and reconstructing the average behaviour of a system. However, the primary interest often lies in the anomalous behaviour, known as extreme events.
M. Ann, J. Behrens, J. Sillmann
doaj   +1 more source

Omnipresent coexistence of rogue waves in a nonlinear two-wave interference system and its explanation by modulation instability

open access: yesPhysical Review Research, 2021
We investigate the coexisting rogue wave dynamics associated with two fundamental-frequency optical waves interacting in a quadratic nonlinear medium.
Changchang Pan   +5 more
doaj   +1 more source

Detection of Abnormal Cardiac Response Patterns in Cardiac Tissue Using Deep Learning

open access: yesMathematics, 2022
This study reports a method for the detection of mechanical signaling anomalies in cardiac tissue through the use of deep learning and the design of two anomaly detectors.
Xavier Marimon   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy