Buscar
Mostrando ítems 21-30 de 2776
CONDUCTIVE GEOPHYSICAL ANOMALIES ASSOCIATED WITH PETROLEUM HYDROCARBON BIODEGRADATION PROCESS IN A NON-SATURATED ZONE
(Helmholtz Centre Environmental Research-ufz, 2008-01-01)
Geophysical surveys using eletroresistivity methods and hidrochemical analyses were applied aiming the characterization of geoelectrical signatures in hydrocarbon contaminated sites located in an industrial site in Sao ...
Minor Anomalies: Can They Predict Specific Major Defects? A Study Based on 23 Major and 14 Minor Anomalies in Over 25,000 Newborns with Birth Defects
(Thieme Medical Publ Inc, 2013-06)
Background Minor anomalies (mAs) are morphological features with little clinical relevance that have been mentioned as possible predictors of major defects (MDs). Objectives To identify the preferential associations between ...
Theoretical relationship between maximum value of the post-sunset drift velocity and peak-to-valley ratio of anomaly TEC
(American Geophysical Union, 2004-02-11)
Theoretical study of electron density distribution in the nighttime equatorial ionosphere shows that linear relationships with statistically significant correlation coefficients exist between the maximum value of the ...
Geographic clusters of congenital anomalies in Argentina
(Springer, 2016-08)
Geographical clusters are defined as the occurrence of an unusual number of cases higher than expected in a given geographical area in a certain period of time. The aim of this study was to identify potential geographical ...
ConvGRU-CNN: Spatiotemporal Deep Learning for Real-World Anomaly Detection in Video Surveillance System
Video surveillance for real-world anomaly detection and prevention using deep learning is an important and difficult research area. It is imperative to detect and prevent anomalies to develop a nonviolent society. Realworld ...
A model for anomaly classification in intrusion detection systems
(2015-09-21)
Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and ...
Anomaly based Intrusion Detection using Modified Fuzzy Clustering
This paper presents a network anomaly detection method based on fuzzy clustering. Computer security has become an increasingly vital field in computer science in response to the proliferation of private sensitive information. ...
Manifold learning-based clustering approach applied to anomaly detection in surveillance videos
(2020-01-01)
The huge increase in the amount of multimedia data available and the pressing need for organizing them in different categories, especially in scenarios where there are no labels available, makes data clustering an essential ...