Xem 1-19 trên 19 kết quả Anomaly Detection
  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Network Anomaly Detection Based on Wavelet Analysis

    pdf16p dauphong16 20-02-2012 31 4   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Clusters versus GPUs for Parallel Target and Anomaly Detection in Hyperspectral Images

    pdf18p sting07 17-02-2012 18 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article An Adaptive Approach to Granular Real-Time Anomaly Detection

    pdf13p dauphong16 20-02-2012 19 3   Download

  • A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing includes about Agile Defense and Adaptability, Adaptability for Increased Resilience, Adaptive Computing Research Problems, Distributed Service Monitoring for Anomaly Detection and Adaptability, Anomaly Detection.

    ppt22p cocacola_17 11-12-2015 6 1   Download

  • The thesis majors at: Camera surveillance systems and related works; the hand – off camera techniques in surveillance camera systems with multiple cameras; the anomaly detection techniques in video surveillance.

    pdf27p change00 04-05-2016 9 0   Download

  • The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of a practical application and results obtained for existing networks as well as results of experiments confirming efficacy of a synergistic analysis of anomaly detection and signature detection, and application of interesting solutions, such as an analysis of the anomalies of user behaviors and many others.

    pdf334p bi_bi1 13-07-2012 42 7   Download

  • What are anomalies/outliers? The set of data points that are considerably different than the remainder of the data Variants of Anomaly/Outlier Detection Problems Given a database D, find all the data points x  D with anomaly scores greater than some threshold t Given a database D, find all the data points x  D having the top-n largest anomaly scores f(x) Given a database D, containing mostly normal (but unlabeled) data points, and a test point x, compute the anomaly score of x with respect to D Applications: Credit card fraud detection, telecommunication fraud detection, netwo...

    ppt25p trinh02 18-01-2013 24 4   Download

  • Network Security: Chapter 9 - Intruders presents about Intrusion Techniques, Password Guessing, Password Capture, Intrusion Detection, Approaches to Intrusion Detection, Audit Records, Statistical Anomaly Detection, Audit Record Analysis.

    pdf25p cocacola_17 09-12-2015 6 1   Download

  • The second chapter discusses how DNA bisulfite treatment together with high-throughput sequencing allows determining the DNA methylation on a whole genome scale at single cytosine resolution and introduces software for analysis of bisulfite sequencing data. The third chapter presents analysis of GC3-rich genes that have more methylation targets.

    pdf142p yeutinh98 22-09-2012 14 4   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: Research Article Detecting Distributed Network Traffic Anomaly with Network-Wide Correlation Analysis

    pdf11p dauphong16 20-02-2012 23 3   Download

  • As the Internet grows and routing complexity increases, network-level instabilities are becoming more and more common. End-to-end communications are especially susceptible to service disruptions, while diagnosing and mitigating these disruptions are extremely challenging. In this dissertation, we design and build systems for diagnosing routing anomalies and improving robustness of end-to-end communications. The rst piece of this work describes PlanetSeer, a novel distributed system for diagnosing routing anomalies.

    pdf132p bin_pham 05-02-2013 12 3   Download

  • Tuyển tập báo cáo các nghiên cứu khoa học quốc tế ngành hóa học dành cho các bạn yêu hóa học tham khảo đề tài: A Statistical Detection of an Anomaly from a Few Noisy Tomographic Projections

    pdf14p dauphong20 11-03-2012 14 2   Download

  • A major problem of existing anomaly intrusion detection approaches is that they tend to produce excessive false alarms. One reason for this is that the normal and abnormal behaviour of a monitored object can overlap or be very close to each other, which makes it difficult to define a clear boundary between the two.

    pdf11p tuanlocmuido 13-12-2012 18 2   Download

  • 5 Machine Tool Monitoring and Control 5.1 5.2 5.3 Kourosh Danai University of Massachusetts, Amherst Introduction Process Monitoring Tool Wear Estimation • Tool Breakage Detection • Chatter Detection Process Control Control for Process Regulation • Control for Process Optimization 5.4 Conclusion 5.1 Introduction Machine tool monitoring and control are essential for automated manufacturing. Monitoring is necessary for detection of a process anomaly to prevent machine damage by stopping the process, or to remove the anomaly by adjusting the process inputs (feeds and speeds).

    pdf10p medinova 28-10-2010 57 16   Download

  • Machine tool monitoring and control are essential for automated manufacturing. Monitoring is necessary for detection of a process anomaly to prevent machine damage by stopping the process, or to remove the anomaly by adjusting the process inputs (feeds and speeds). A process anomaly may be gradual such as tool/wheel wear, may be abrupt such as tool breakage, or preventable such as excessive vibration/chatter

    pdf10p phuphong 10-12-2009 63 11   Download

  • SmartEvent provides centralized, real-time event correlation of log data from Check Point perimeter, internal, and Web security gateways-as well as third-party security devices-automatically prioritizing security events for decisive, intelligent action. By automating the aggregation and correlation of raw log data, SmartEvent not only minimizes the amount of data that needs to be reviewed but also isolates and prioritizes the real security threats.

    pdf82p hoangtumayman 26-09-2011 33 7   Download

  • Rubella (See also Chap. 186) Rubella virus is a known teratogen; first-trimester rubella carries a high risk of fetal anomalies, though the risk decreases significantly later in pregnancy. Congenital rubella may be diagnosed by percutaneous umbilical blood sampling with the detection of IgM antibodies in fetal blood. All pregnant women should be screened for their immune status to rubella. Indeed, all women of childbearing age, regardless of pregnancy status, should have their immune status for rubella verified and be immunized if necessary.

    pdf6p ongxaemnumber1 26-11-2010 33 3   Download

  • After studying this chapter you should be able to: Define privilege audits, describe how usage audits can protect security, list the methodologies used for monitoring to detect security-related anomalies, describe the different monitoring tools.

    ppt46p kiepnaybinhyen_02 25-12-2015 7 2   Download

  • Today, the ultrasonic signal is being used for predicting material behavior, characterizing (detecting internal anomalies in) a variety of engineering structures, as well as for inspecting human body parts like tumors, bones, and unborn fetuses. Because of the ever-increasing popularity of the ultrasonic techniques in a wide range of applications, this technology has received a lot of attention from the research community. This book presents some new developments in ultrasonic research for material and structure inspection. Application areas cover both engineering and biological materials....

    pdf408p thix1minh 16-10-2012 22 1   Download

Đồng bộ tài khoản