Results 31 to 40 of about 91,231 (150)

Outlier detection techniques for wireless sensor networks: A survey [PDF]

open access: yes, 2010
In the field of wireless sensor networks, those measurements that significantly deviate from the normal pattern of sensed data are considered as outliers.
Havinga, Paul   +2 more
core   +4 more sources

Investigating the time dynamics of geoelectrical signals measured in two seismotectonic environments in the Mediterranean region: the Southern Apennine chain (Southern Italy) and the Hellenic arc (Crete Island, Greece)

open access: yesAnnals of Geophysics, 2000
In this paper we explore the time dynamics of geoelectrical signals measured in two seismic active areas in the Mediterranean region: the Southern Apennine chain (Italy) and the Hellenic arc (Crete Island, Greece).
F. Vallianatos   +3 more
doaj   +1 more source

An Investigation into Healthcare-Data Patterns

open access: yesFuture Internet, 2019
Visualising complex data facilitates a more comprehensive stage for conveying knowledge. Within the medical data domain, there is an increasing requirement for valuable and accurate information.
Aaron Boddy   +5 more
doaj   +1 more source

Single particle tracking in systems showing anomalous diffusion: the role of weak ergodicity breaking

open access: yes, 2010
Anomalous diffusion has been widely observed by single particle tracking microscopy in complex systems such as biological cells. The resulting time series are usually evaluated in terms of time averages.
Abad. S. B. Yuste   +101 more
core   +1 more source

Analysis of the Impact of Anomalous Noise Events on Road Traffic Noise Levels Computation from Urban and Suburban WASNs in real operation

open access: yes, 2020
Among the different sources of environmental noise, Road Traffic Noise (RTN) has become the main acoustic pollutant in urban and suburban areas in recent years negatively affecting the quality of life of their citizens. In order to address this problem, the European authorities require their member states to fulfil the European Environmental Noise ...
Alias, Francesc   +3 more
openaire   +1 more source

Unsupervised Anomaly Detection and Localization Based on Deep Spatiotemporal Translation Network

open access: yesIEEE Access, 2020
Anomaly detection is of great significance for intelligent surveillance videos. Current works typically struggle with object detection and localization problems due to crowded and complex scenes.
Thittaporn Ganokratanaa   +2 more
doaj   +1 more source

ANOMALOUS NOISE EVENTS CONSIDERATIONS FOR THE COMPUTATION OF ROAD TRAFFIC NOISE LEVELS: THE DYNAMAP'S MILAN CASE STUDY

open access: yes24th International Conference on Sound and Vibration 2017, London Calling
Dynamic noise maps are computed to represent the noise levels generated by road traffic in realtime to determine the population exposure to environmental noise. To this aim, a network ofacoustic sensors can be deployed in representative street locations to capture and process rawacoustic data before estimating the equivalent noise levels (Leq) of ...
Orga, F   +6 more
openaire   +4 more sources

Entropic Approach to the Detection of Crucial Events

open access: yesEntropy, 2019
In this paper, we establish a clear distinction between two processes yielding anomalous diffusion and 1 / f noise. The first process is called Stationary Fractional Brownian Motion (SFBM) and is characterized by the use of stationary correlation
Garland Culbreth   +2 more
doaj   +1 more source

A Review of Machine Learning and Deep Learning Techniques for Anomaly Detection in IoT Data

open access: yesApplied Sciences, 2021
Anomaly detection has gained considerable attention in the past couple of years. Emerging technologies, such as the Internet of Things (IoT), are known to be among the most critical sources of data streams that produce massive amounts of data ...
Redhwan Al-amri   +5 more
doaj   +1 more source

Deep Predictive Coding Neural Network for RF Anomaly Detection in Wireless Networks

open access: yes, 2018
Intrusion detection has become one of the most critical tasks in a wireless network to prevent service outages that can take long to fix. The sheer variety of anomalous events necessitates adopting cognitive anomaly detection methods instead of the ...
Jauhar, Ahmad   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy