Results 31 to 40 of about 352,249 (316)

BINet: Multi-perspective Business Process Anomaly Classification

open access: yes, 2019
In this paper, we introduce BINet, a neural network architecture for real-time multi-perspective anomaly detection in business process event logs.
Luettgen, Stefan   +3 more
core   +1 more source

Online Video Anomaly Detection

open access: yesSensors, 2023
With the popularity of video surveillance technology, people are paying more and more attention to how to detect abnormal states or events in videos in time. Therefore, real-time, automatic and accurate detection of abnormal events has become the main goal of video-based surveillance systems.
Yuxing Zhang   +3 more
openaire   +3 more sources

Anomaly Detection of Gas Turbine Hot Components Based on Deep Autoencoder and Support Vector Data Description

open access: yes发电技术, 2021
Anomaly detection of gas turbine hot components can ensure its operational safety and reliability. With the boom of artificial intelligence, data-driven fault diagnosis is becoming increasingly popular.
Mingliang BAI   +4 more
doaj   +1 more source

An Adaptive Policy-Based Anomaly Object Control System for Enhanced Cybersecurity

open access: yesIEEE Access
Anomaly detection research focuses on identifying rare patterns derived from daily occurrences. This study introduces an innovative anomaly–object control system that utilizes adaptive policies through anomaly detection algorithms.
Won Sakong, Wooju Kim
doaj   +1 more source

A steam turbine anomaly detection method based on O-DAE and SVDD

open access: yesZhejiang dianli, 2023
Anomaly detection in unlabeled and highly imbalanced monitoring data is one of the most urgent to be solved and challenging industry problems. The use of autoencoders for anomaly detection is becoming more and more popular due to the powerful high ...
XU Weimin   +5 more
doaj   +1 more source

Anomaly Detection in Cloud Components

open access: yes, 2020
Cloud platforms, under the hood, consist of a complex inter-connected stack of hardware and software components. Each of these components can fail which may lead to an outage.
Islam, Mohammad Saiful   +1 more
core   +1 more source

Automatic Hyperparameter Tuning Method for Local Outlier Factor, with Applications to Anomaly Detection

open access: yes, 2019
In recent years, there have been many practical applications of anomaly detection such as in predictive maintenance, detection of credit fraud, network intrusion, and system failure. The goal of anomaly detection is to identify in the test data anomalous
Chaudhuri, Arin   +2 more
core   +1 more source

Detecting network performance anomalies with contextual anomaly detection [PDF]

open access: yes2017 IEEE International Workshop on Measurement and Networking (M&N), 2017
Network performance anomalies can be defined as abnormal and significant variations in a network's traffic levels. Being able to detect anomalies is critical for both network operators and end users. However, the accurate detection without raising false alarms can become a challenging task when there is high variance in the traffic.
Dimopoulos, Giorgos   +3 more
openaire   +2 more sources

Evaluating the Utility of Paired Tumor and Germline Targeted DNA Sequencing for Pediatric Oncology Patients: A Single Institution Report

open access: yesPediatric Blood &Cancer, EarlyView.
ABSTRACT Objective To evaluate the diagnostic yield and utility of universal paired tumor–normal multigene panel sequencing in newly diagnosed pediatric solid and central nervous system (CNS) tumor patients and to compare the detection of germline pathogenic/likely pathogenic variants (PV/LPVs) against established clinical referral criteria for cancer ...
Natalie Waligorski   +9 more
wiley   +1 more source

Establishment and mapping of heterogeneous anomalies in network intrusion datasets

open access: yesConnection Science, 2022
Anomaly detection in the scope of network security aims to identify network instances for the unexpected and unique, with various security operations employing such techniques to facilitate effective threat detection.
Liam Riddell   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy