Results 21 to 30 of about 27,878 (280)

Symbolic Aggregate approXimation (SAX) under interval uncertainty

open access: yes2015 Annual Conference of the North American Fuzzy Information Processing Society (NAFIPS) held jointly with 2015 5th World Conference on Soft Computing (WConSC), 2015
In many practical situations, we monitor a system by continuously measuring the corresponding quantities, to make sure that any abnormal deviation is detected as early as possible. Often, we do not have readily available algorithms to detect abnormality, so we need to use machine learning techniques.
Stylios, Chrysostomos D.   +1 more
openaire   +2 more sources

Methods for preprocessing time and distance series data from personal monitoring devices

open access: yesMethodsX, 2020
There is a need to develop more advanced tools to improve guidance on physical exercise to reduce risk of adverse events and improve benefits of exercise.
Tomasz Wiktorski   +2 more
doaj   +1 more source

Automatically estimating iSAX parameters [PDF]

open access: yes, 2015
The Symbolic Aggregate Approximation (iSAX) is widely used in time series data mining. Its popularity arises from the fact that it largely reduces time series size, it is symbolic, allows lower bounding and is space efficient.
Azevedo, Paulo J.   +1 more
core   +1 more source

A Data-Driven Approach for Estimating the Effects of Station Closures in Metro Systems

open access: yesIEEE Access, 2020
To estimate the impact of station closures, a novel data-driven approach is developed. First, Symbolic Aggregate Approximation (SAX) is designed to classify stations with an anomaly in passenger flow volume.
Ming Yang   +4 more
doaj   +1 more source

An Improved Similarity Trajectory Method Based on Monitoring Data under Multiple Operating Conditions

open access: yesApplied Sciences, 2021
With the complexity of the task requirement, multiple operating conditions have gradually become the common scenario for equipment. However, the degradation trend of monitoring data cannot be accurately extracted in life prediction under multiple ...
Jiancheng Yin   +3 more
doaj   +1 more source

Heap Abstractions for Static Analysis [PDF]

open access: yes, 2015
Heap data is potentially unbounded and seemingly arbitrary. As a consequence, unlike stack and static memory, heap memory cannot be abstracted directly in terms of a fixed set of source variable names appearing in the program being analysed.
Kanvar, Vini, Khedker, Uday P.
core   +1 more source

A New Time Series Similarity Measurement Method Based on the Morphological Pattern and Symbolic Aggregate Approximation

open access: yesIEEE Access, 2019
Aiming at the problem that the traditional similarity measurement methods cannot effectively measure the similarity of the time series with the difference both in the trend and detail, this paper proposes a new time series similarity measurement method ...
Jiancheng Yin   +5 more
doaj   +1 more source

A Data Analytics-Based Energy Information System (EIS) Tool to Perform Meter-Level Anomaly Detection and Diagnosis in Buildings

open access: yesEnergies, 2021
Recently, the spread of smart metering infrastructures has enabled the easier collection of building-related data. It has been proven that a proper analysis of such data can bring significant benefits for the characterization of building performance and ...
Roberto Chiosa   +2 more
doaj   +1 more source

Configuration of Stable Evolutionary Strategy of Homo Sapiens and Evolutionary Risks of Technological Civilization (the Conceptual Model Essay) [PDF]

open access: yes, 2014
Stable evolutionary strategy of Homo sapiens (SESH) is built in accordance with the modular and hierarchical principle and consists of the same type of self-replicating elements, i.e. is a system of systems.
Cheshko, Valentin T.   +2 more
core   +3 more sources

Packer Detection for Multi-Layer Executables Using Entropy Analysis

open access: yesEntropy, 2017
Packing algorithms are broadly used to avoid anti-malware systems, and the proportion of packed malware has been growing rapidly. However, just a few studies have been conducted on detection various types of packing algorithms in a systemic way ...
Munkhbayar Bat-Erdene   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy