Results 251 to 260 of about 2,595,863 (278)
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Energy-based anomaly detection for mixed data
Knowledge and Information Systems, 2018Anomalies are those deviating significantly from the norm. Thus, anomaly detection amounts to finding data points located far away from their neighbors, i.e., those lying in low-density regions. Classic anomaly detection methods are largely designed for single data type such as continuous or discrete.
Kien Do, Truyen Tran, Svetha Venkatesh
openaire +3 more sources
International Journal of Geometric Methods in Modern Physics, 2012
There are many examples of quantum anomalies of continuous and discrete classical symmetries. Examples come from chiral anomalies in the Standard Model and gravitational anomalies in string theories. They occur when classical symmetries do not preserve the domains of quantum operators like the Hamiltonian.
A. P. Balachandran+2 more
openaire +2 more sources
There are many examples of quantum anomalies of continuous and discrete classical symmetries. Examples come from chiral anomalies in the Standard Model and gravitational anomalies in string theories. They occur when classical symmetries do not preserve the domains of quantum operators like the Hamiltonian.
A. P. Balachandran+2 more
openaire +2 more sources
IEEE Transactions on Geoscience and Remote Sensing, 2023
Hyperspectral image (HSI) anomaly detection (AD) generally considers background pixels as low-rank distribution and anomaly pixels as sparse distribution.
Tan Guo+5 more
semanticscholar +1 more source
Hyperspectral image (HSI) anomaly detection (AD) generally considers background pixels as low-rank distribution and anomaly pixels as sparse distribution.
Tan Guo+5 more
semanticscholar +1 more source
Right‐sided non‐recurrent laryngeal nerve without any vascular anomaly: an anatomical trap
ANZ journal of surgery, 2021 Hypothesis ideation with SRB. Design of study. Performed preliminary experiments with SRB: evaluating Kp-Bt community growth under various glucose conditions in batch culture. Built the mathematical model used in this study (Figure 2).
M. Z. Soe+4 more
semanticscholar +1 more source
Anomaly Monitoring of Nonstationary Processes With Continuous and Two-Valued Variables
IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023With the increasing complexity and scale of modern industrial processes, there widely exist two-valued variables (TVs), such as status monitoring and numerical range variables.
Min Wang, Donghua Zhou, Maoyin Chen
semanticscholar +1 more source
Anomaly Detection for Mixed Packet Sequences
2020 IEEE 45th LCN Symposium on Emerging Topics in Networking (LCN Symposium), 2020One-Dimensional Convolutional Neural Networks (1-DCNNs) have shown an admirable success in Natural Language Processing (NLP). Inspired by the capabilities of such approaches to overcome challenges related to sequence order, we present a 1-DCNN-based Intrusion Detection System (IDS) for attack detection in network traffic.
Tanja Zseby+2 more
openaire +2 more sources
IEEE Geoscience and Remote Sensing Letters, 2022
Nowadays, many anomaly detection (AD) methods still have shortcomings in using the spatial information of hyperspectral images (HSIs), which leads to the inability to separate the background and anomalies well.
Shou Feng+3 more
semanticscholar +1 more source
Nowadays, many anomaly detection (AD) methods still have shortcomings in using the spatial information of hyperspectral images (HSIs), which leads to the inability to separate the background and anomalies well.
Shou Feng+3 more
semanticscholar +1 more source
Collie eye anomaly in a mixed‐breed dog
Veterinary Ophthalmology, 2005AbstractA 5‐year‐old, mixed‐breed dog was presented for tetraparesis. Neurologic alterations included a decreased menace response in both eyes. Therefore, an ophthalmic examination was requested. The dog was visual, but menace response, dazzle and pupillary light reflexes were reduced bilaterally.
RAMPAZZO, ANTONELLA+4 more
openaire +4 more sources
AutoSec@CODASPY, 2019
The control of vehicles can be taken over by injecting malicious controller area network (CAN) messages. To detect malicious messages, anomaly-detection systems based on intervals or payloads of CAN messages have been proposed.
Takuma Koyama+5 more
semanticscholar +1 more source
The control of vehicles can be taken over by injecting malicious controller area network (CAN) messages. To detect malicious messages, anomaly-detection systems based on intervals or payloads of CAN messages have been proposed.
Takuma Koyama+5 more
semanticscholar +1 more source