Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Background: Anomaly detection is a critical aspect of data analysis, demanding rigorous methodologies to ensure accuracy and reliability. In this paper, we present an anomaly detection algorithm specifically engineered for detecting... more
    • by 
    •   2  
      MathematicsAnomaly Detection
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceReal Time Operating SystemArtificial Neural Network
Conventional dimensionality reduction methods like Multidimensional Scaling (MDS) are sensitive to the presence of orthogonal outliers, leading to significant defects in the embedding. We introduce a robust MDS method, called DeCOr-MDS... more
    • by 
    •   8  
      Computer ScienceMultidimensional ScalingAnomaly DetectionDimensionality Reduction
    • by 
We present a tool for Interactive Visual Exploration of Latent Space (IVELS) for model selection. Evaluating generative models of discrete sequences from a continuous latent space is a challenging problem, since their optimization... more
    • by 
    • Computer Science
Dear Colleagues, The integration of machine learning (ML) with image and signal processing has revolutionized various fields by enhancing researchers’ ability to analyse and interpret complex data. ML algorithms can extract meaningful... more
    • by 
    •   14  
      Artificial IntelligenceImage ProcessingMedical ImagingMachine Learning
How to cite this article Wijaya WM, Nakamura Y. 2023. Loitering behavior detection by spatiotemporal characteristics quantification based on the dynamic features of Automatic Identification System (AIS) messages. PeerJ Comput. Sci.... more
    • by 
    •   2  
      Big Data / Analytics / Data MiningAutomatic Identification System (AIS)
    • by 
    •   13  
      Computer ScienceAnomaly DetectionComputer NetworkIEEE
    • by 
    •   9  
      Computer ScienceData MiningAnomaly DetectionProbabilistic Logic
    • by 
    •   3  
      Computer ScienceSoftwareEngenharia de Produção
    • by 
    •   3  
      Computer ScienceSoftwareEngenharia de Produção
    • by 
    •   3  
      Computer ScienceAnomaly DetectionTroubleshooting
In this paper, we aimed to help bridge the gap between human fluid intelligence-the ability to solve novel tasks without prior training-and the performance of deep neural networks, which typically require extensive prior training. An... more
    • by 
    • Machine Learning
    • by 
    •   10  
      Information SystemsComputer ScienceDistributed ComputingData Mining
    • by 
    •   7  
      Chemical EngineeringChemistryAnomaly DetectionDistillation
    • by 
    •   8  
      MathematicsComputer ScienceArtificial IntelligenceData Mining
Artificial intelligence and machine learning are widely used and have significant benefits in various areas of knowledge, including healthcare. However, there is an important barrier to disseminating machine learning among healthcare... more
    • by 
    •   20  
      Artificial IntelligenceMachine LearningOccupational HealthClassification (Machine Learning)
    • by 
    •   4  
      Computer ScienceAnomaly DetectionDecision TreeAtlantis
    • by 
    •   12  
      Computer ScienceArtificial IntelligenceData MiningAnomaly Detection
In an era where organizations increasingly rely on intricate software applications, cloud services, and interconnected networks, the significance of analyses cannot be overstated. These tools serve as vigilant custodians of digital... more
    • by 
    •   4  
      PerformancePotential Fields GeophysicsAnomaly DetectionLogic Analyzer
Production monitoring in real-time is a very important problem in smart manufacturing. It helps enterprises to timely detect abnormalities in the production process and then guarantee the product quality and reduce waste. In this paper,... more
    • by 
    •   9  
      Computer ScienceTransfer LearningAnomaly DetectionOne class Classification
    • by 
    •   10  
      Mechanical EngineeringComputer ScienceData MiningFuzzy Logic
    • by 
    •   9  
      EngineeringComputer ScienceTechnologyFuzzy Logic
The rapid development of the Internet and the wide spread of its applications has affected many aspects of our life. However, this development also makes the cyberspace more vulnerable to various attacks. Thus, detecting and preventing... more
    • by 
    •   5  
      Computer ScienceArtificial IntelligenceThe InternetAnomaly Detection
In the rapidly evolving field of software development, the need for efficient and effective testing methods is paramount. Traditional test automation has been a cornerstone in achieving reliable software delivery, but it is not without... more
    • by 
    •   8  
      Software EngineeringMachine LearningSoftware TestingSoftware Development
    • by 
    •   7  
      MathematicsComputer ScienceArtificial IntelligenceAnomaly Detection
    • by 
    •   9  
      Computer ScienceComputer SecurityAnomaly DetectionJava Card
This paper was written to test the EMH(Efficient Market Hypothesis),created by Eugene Fama, on the current stock market. EMH is a famous hypothesis that states the stock price reflects all available information in the market, thus not... more
    • by 
    •   2  
      Financial EconomicsApplied Statistics
    • by 
    •   4  
      Computer ScienceAnomaly DetectionMathematical SciencesOutlier
    • by 
    •   4  
      Computer ScienceAnomaly DetectionMathematical SciencesOutlier
    • by 
    •   3  
      Computer ScienceInternet of ThingsAnomaly Detection
    • by 
    •   3  
      Computer ScienceData MiningAnomaly Detection
    • by 
    •   5  
      Computer ScienceAnomaly DetectionSoftwareComputer Vision and Pattern Recognition
In the budding cyber security threats, Botnet represent the extremely critical threats being encountered by several organizations recently. Botnets are used to carry out many cybercrimes reported in the recent news. Although significantly... more
    • by 
    • by 
    •   2  
      Computer ScienceAnomaly Detection
Anomaly detection is very important for system monitoring and security since successful execution of these engineering tasks depends on access to validated data. The localization of the variable causing the fault is very essential.... more
    • by 
    •   9  
      EngineeringComputer ScienceMultivariate StatisticsData Mining
The use of surveillance cameras is a common solution that addresses the need to provide security and manage urban traffic that arises due to the increasing population in cities. As the number of surveillance cameras rises, video streams... more
    • by 
    •   5  
      Transfer LearningAnomaly DetectionFine-TuningDeep Learning
    • by 
    •   10  
      Environmental EngineeringCivil EngineeringHydrogeologyComputer Science
    • by 
    •   14  
      Information SystemsComputer ScienceDistributed ComputingArtificial Intelligence
    • by 
    •   9  
      Computer ScienceArtificial IntelligenceMachine LearningComputer Security
    • by 
    •   7  
      Computer ScienceAnomaly DetectionReal TimeHigh Speed
    • by 
    •   7  
      Computer ScienceDistributed ComputingData MiningAnomaly Detection
    • by 
    •   5  
      Computer ScienceReal Time ComputingAnomaly DetectionIntrusion Detection System
    • by 
    •   6  
      Computer ScienceAnomaly DetectionData ScienceNovelty Detection
    • by 
    •   3  
      Anomaly DetectionMutationRepresentation Politics
    • by 
    •   7  
      Computer ScienceArtificial IntelligenceAnomaly DetectionGrasp
Purpose Surgical workflow recognition is a crucial and challenging problem when building a computer-assisted surgery system. Current techniques focus on utilizing a convolutional neural network and a recurrent neural network (CNN–RNN) to... more
    • by 
    •   7  
      Computer ScienceArtificial IntelligenceWorkflowMedicine
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceAnomaly DetectionEncoder
    • by 
    •   4  
      Computer ScienceArtificial IntelligenceAnomaly DetectionEncoder
    • by 
    •   5  
      MathematicsAlgorithmAnomaly DetectionAut