X
Search Filters
Format Format
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
anomalies (8) 8
outliers (8) 8
algorithms (7) 7
data analysis (7) 7
outlier/anomaly detection (4) 4
accuracy (2) 2
anomaly detection (2) 2
big data (2) 2
clustering (2) 2
[ info.info-db ] computer science [cs]/databases [cs.db] (1) 1
approximation (1) 1
artificial intelligence (1) 1
auto-regressive model (1) 1
autoregressive models (1) 1
aviris (1) 1
bayesian analysis (1) 1
bayesian inference (1) 1
bridge inspection (1) 1
change detection (1) 1
choice (1) 1
clutter (1) 1
collaboration (1) 1
computer science (1) 1
computer science, artificial intelligence (1) 1
computer science, information systems (1) 1
computer simulation (1) 1
confidence (1) 1
damage assessment (1) 1
damage detection (1) 1
data collection (1) 1
data integration (1) 1
data management (1) 1
datennetz (1) 1
density (1) 1
density biased sampling (1) 1
entropy (1) 1
extreme values (1) 1
false alarms (1) 1
feasibility studies (1) 1
feature extraction (1) 1
forests (1) 1
identification methods (1) 1
k-means (1) 1
kernel learning (1) 1
kernels (1) 1
large scale (1) 1
locality-sensitive hashing (1) 1
localization (1) 1
mac (1) 1
measurement methods (1) 1
ml-ocelm (1) 1
model accuracy (1) 1
nachweisverfahren (1) 1
networks (1) 1
neural networks (1) 1
neurosciences (1) 1
oc-elm (1) 1
one-class classification (1) 1
outlier (1) 1
outlier analysis (1) 1
pattern recognition (1) 1
preprocessing (1) 1
probes (1) 1
property damage (1) 1
random processes (1) 1
rare events (1) 1
real bridge (1) 1
real-time systems (1) 1
redundancy (1) 1
regression (1) 1
representations (1) 1
rescue operations (1) 1
retailing (1) 1
sales (1) 1
sensors (1) 1
smartphone (1) 1
spectra (1) 1
statistical inference (1) 1
stichprobe (1) 1
support (1) 1
surveillance (1) 1
surveillance system (1) 1
telecommunications (1) 1
trajectory analysis (1) 1
truss bridges (1) 1
unsupervised learning (1) 1
vibration monitoring (1) 1
water distribution (1) 1
water engineering (1) 1
water supply systems (1) 1
weight (1) 1
wi-fi (1) 1
wind farms (1) 1
wind power (1) 1
wind power generation (1) 1
wind speed (1) 1
wireless communication (1) 1
wireless sensor networks (1) 1
モデル (1) 1
信頼 (1) 1
more...
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2018, Volume 11234, pp. 269 - 284
Conference Proceeding
Neural Networks, ISSN 0893-6080, 07/2019, Volume 115, pp. 11 - 22
One-class classification has been found attractive in many applications for its effectiveness in anomaly or outlier detection... 
OC-ELM | ML-OCELM | Outlier/anomaly detection | One-class classification | Kernel learning | REGRESSION | SUPPORT | CHOICE | APPROXIMATION | OUTLIERS | NEUROSCIENCES | COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE | Neural networks | Artificial intelligence | Algorithms
Journal Article
Zairyō, ISSN 0514-5163, 2018, Volume 67, Issue 2, pp. 143 - 150
This study proposes an anomaly detection method for bridges using Bayesian inference, aiming at efficient inspection based on vibration monitoring... 
Vibration monitoring | Auto-regressive model | Real bridge | Bayesian inference | Anomaly detection | Outlier analysis | Damage assessment | Truss bridges | Damage detection | Autoregressive models | Change detection | Feasibility studies | Property damage | Bridge inspection | Statistical inference | Bayesian analysis | Anomalies
Journal Article
Guang zi xue bao = Acta photonica sinica, ISSN 1004-4213, 01/2019, Issue 1, p. 161
An adaptive-kernel collaborative representation method based on spatial-spectral joint clustering for hyperspectral anomaly detection is proposed,which is well used to solve the abnormal interference... 
Aviris (spectrometer) | Data analysis | Computer simulation | Redundancy | Spectra | Clustering | Clutter | Kernels | Algorithms | Outliers (statistics) | Collaboration | Measurement methods | Representations | Anomalies
Journal Article
Dian gong ji shu xue bao, ISSN 1000-6753, 01/2018, Volume 33, p. 205
.... Adaptive detection method for a small number of abnormal wind speed values. For the random variability of wind speed sequences, the DBM prediction method is used to mine the potential characteristics of abnormal wind speed values... 
Data analysis | Preprocessing | Identification methods | Random processes | Model accuracy | Accuracy | Algorithms | Wind speed | Outliers (statistics) | Wind farms | Data collection | Wind power generation | Wind power | Anomalies
Journal Article
Jisuanji Xitong Yingyong = Computer Systems and Applications, ISSN 1003-3254, 01/2017, Issue 7
.... This paper proposes an improved three stage outlier detection algorithm based on angle, which is mainly to detect the results after data integration, and effectively solve the problem of a large... 
Rescue operations | Data analysis | Algorithms | Outliers (statistics) | Data integration | Anomalies
Journal Article
Jilin Daxue Xuebao. Xinxi Kexue Ban = Journal of Jilin University. Information Science Edition, ISSN 1671-5896, 01/2017, Issue 5, p. 544
i Fores( isolation Forest) algorithm has a low detection ability for local outlier detection,and the detection time of LOF... 
Data analysis | Forests | Algorithms | Outliers (statistics) | False alarms | Extreme values | Anomalies
Journal Article
Jisuanji Gongcheng / Computer Engineering, ISSN 1000-3428, 08/2015, Volume 41, Issue 8, pp. 132 - 139
In order to further improve the accuracy of measuring outlier degree of data samples in Network Anomaly Detection(NAD... 
Networks | Accuracy | Data analysis | Algorithms | Confidence | Outliers (statistics) | Entropy | Anomalies
Journal Article
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2013, Volume 8140, pp. 249 - 264
Conference Proceeding
2020, Volume 19, Issue 3, 16
Human identification and monitoring are critical in many applications, such as surveillance, evacuation planning. Human identification and monitoring are not... 
localization | trajectory analysis | Surveillance system | wi-fi | smartphone | MAC | Wireless communication | Wireless sensor networks | Surveillance | Real-time systems | Sensors | Probes | outlier/anomaly detection | outlier | COMPUTER SCIENCE, INFORMATION SYSTEMS | anomaly detection | TELECOMMUNICATIONS
Magazine Article
Xiaoxing Weixing Jisuanji Xitong = Journal of Chinese Computer Systems, ISSN 1000-1220, 01/2019, Issue 1, p. 64
... their competitiveness.At present,most outlier detection can only mine the comparable data. However,sales data are affected by season,holiday and other factors and then lose... 
Data analysis | Sales | Data management | Outliers (statistics) | Big Data | Retailing | Weight | Anomalies
Journal Article
Yunnan da xue hsüen bao. Zi ran ke xue ban, ISSN 0258-7971, 01/2018, Issue 5, p. 879
.... Compared with existing anomaly detection schemes,the proposed fusion algorithm in this paper had gotten more intact and accurate results. 
Data analysis | Algorithms | Outliers (statistics) | Water engineering | Feature extraction | Water supply systems | Water distribution | Pattern recognition | Clustering | Density | Anomalies
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.