搜索资源列表
nk2
- 半监督异常行为监测pdf,提出新的基于半监督学习的行为建模与异常检测方法,采用基于动态时间归整的归一化距离来建立相似矩阵-Semi-supervised monitoring abnormal behavior pdf, propose a new semi-supervised Learning based on behavior modeling and anomaly detection methods, based on Dynamic Time Warping of the norma
Project_Template2
- ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS
214123
- 2009年—A Comparison Study of Dual Window-Based Anomaly Detection Algorithms for Hyperspectral Imagery.pdf
zhinengdianzishuye-sheji-
- 利用单片机设计并制作一个智能化的液体点滴速度监测与控制装置。该装置由水滴速度测试系统、水速控制系统、气泡空液阻塞检测系统,电源异常检测系统,显示滴速装置、故障处理系统,报警系统等系统组成。应用光透射原理监测滴速,利用控制步进电动机的转速来控制点滴速度,利用红外二极管监测液面高度,利用压力传感器检测导管堵塞,利用超声传感器气泡。点滴速度可用键盘来设定同时在水到达警戒线以下时能发出报警信号。-The use of single-chip design and production of an int
2005-Kernel-RX-AlgorithmA
- 非线性核RX算法(KRX算法)来完成异常目标检测,不仅有效地利用了高光谱图像波段间的高阶统计特性和非线性信息,而且避免了对高维数据的特征提取,从而降低了算法的复杂度.-Nonlinear nuclear RX algorithm (KRX algorithm) to complete anomaly detection, not only the effective use of higher-order statistical characteristics of hyperspectral
30934-30685-1-PB
- The title of my paper is An overview of anomaly based intrusion detection systems .-The title of my paper is An overview of anomaly based intrusion detection systems .
som-wave
- Anomaly Detection using Self-Organizing Map and Wavelets in Wireless Sensor Networks-Anomaly Detection using Self-Organizing Map and Wavelets in Wireless Sensor Networks
web-malware
- Vulnerability detection tools are frequently considered the silver-bullet for detecting vulnerabilities in web services. However, research shows that the effectiveness of most of those tools is very low and that using the wrong tool may lead