Results 21 to 30 of about 307,816 (329)

Predictive anomaly detection for marine diesel engine based on echo state network and autoencoder

open access: yesEnergy Reports, 2022
Marine diesel engine with high thermal efficiency and good economy has become the main power of ships. Anomaly detection is an important method to improve the operation reliability of marine diesel engine.
Chong Qu   +3 more
doaj   +1 more source

G2D: Generate to Detect Anomaly [PDF]

open access: yes2021 IEEE Winter Conference on Applications of Computer Vision (WACV), 2021
In this paper, we propose a novel method for irregularity detection. Previous researches solve this problem as a One-Class Classification (OCC) task where they train a reference model on all of the available samples. Then, they consider a test sample as an anomaly if it has a diversion from the reference model.
Pourreza, Masoud   +5 more
openaire   +5 more sources

Improvement in detection of presence in forbidden locations in video anomaly using optical flow map [PDF]

open access: yesهوش محاسباتی در مهندسی برق, 2023
Anomaly detection has been in researchers’ scope of study for a long time. The wide variety of anomaly detection use cases ranges from quality control in production lines to providing security in public places.
Mohammad Rahimpour   +3 more
doaj   +1 more source

Detecting Semantic Anomalies

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2020
We critically appraise the recent interest in out-of-distribution (OOD) detection and question the practical relevance of existing benchmarks. While the currently prevalent trend is to consider different datasets as OOD, we argue that out-distributions of practical interest are ones where the distinction is semantic in nature for a specified context ...
Faruk Ahmed, Aaron Courville
openaire   +4 more sources

Anomaly detection in video sequences: A benchmark and computational model

open access: yesIET Image Processing, 2021
Anomaly detection has attracted considerable search attention. However, existing anomaly detection databases encounter two major problems. Firstly, they are limited in scale.
Boyang Wan   +4 more
doaj   +1 more source

Anomaly detection with density estimation [PDF]

open access: yesPhysical Review D, 2020
28 pages, 11 figures, v2: appendix on optimality, minor modifications, journal ...
Benjamin Philip Nachman   +3 more
openaire   +5 more sources

Imposters anomaly detection

open access: yesJournal of Fundamental and Applied Sciences, 2021
Over the last two decades the world of cyber security has grown immensely, but despite the state-of-the-art security detection systems and intrusion detection systems (IDSs), unwanted malicious users still find their way around these security measures and gain access to secure systems.
A. Ikram, A Tazerouti
openaire   +3 more sources

Toward Practical Crowdsourcing-Based Road Anomaly Detection With Scale-Invariant Feature

open access: yesIEEE Access, 2019
Road anomaly detection with crowdsourced sensor data has become an increasingly important field of research over the last few years. Traditional ways for road anomaly detection are either threshold-based detection techniques or feature-based detection ...
Yuanyi Chen   +3 more
doaj   +1 more source

Pose‐driven human activity anomaly detection in a CCTV‐like environment

open access: yesIET Image Processing, 2023
Human activity anomaly detection plays a crucial role in the next generation of surveillance and assisted living systems. Most anomaly detection algorithms are generative models and learn features from raw images.
Yuxing Yang   +2 more
doaj   +1 more source

A Survey on Explainable Anomaly Detection

open access: yesACM Transactions on Knowledge Discovery from Data, 2023
In the past two decades, most research on anomaly detection has focused on improving the accuracy of the detection, while largely ignoring the explainability of the corresponding methods and thus leaving the explanation of outcomes to practitioners. As anomaly detection algorithms are increasingly used in safety-critical domains, providing explanations
Zhong Li   +2 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy