The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A supply of minerals is critical to socioeconomic development. However, such a supply also induces negative impacts on environment and ecology, e.g., leading to dust emission and deposition. An ultra-low-grade magnetite has been exploited as a new iron type since 2001 in China. In this paper, two Landsat images were used for monitoring foliar dust in Changhe River Mining Area, China. First, models...
Automatic data collection (ADC) systems are becoming increasingly common in transit systems throughout the world. Although these ADC systems are often designed to support specific fairly narrow functions, the resulting data can have wide-ranging application, well beyond their design purpose. Relative to traditional manual survey, transportation planners only need to dig existed database to get both...
Malicious intrusion is the behavior that threats a large number of computers; therefore, recent research has focused on devising new techniques to detect and control internet intrusion with high efficiency and low cost. Unfortunately some anomaly detection system (ADS) over machine learning may get some false alarms if the results of machine learning cannot cover all the normal or abnormal data. In...
The pulse wave contains many of hemodynamic information, so obtain cardiovascular blood flow parameters by detecting the pulse wave is an important role in examination, treatment and guardianship process of the cardiovascular disease. Recently, most of the pulse wave acquisition and analysis require human intervention. The operators decide when to stop the acquisition by observing and determining...
Recent attacks demonstrated that network intrusions have become a major threat to Internet. Systems are employed to detect internet anomaly play a vital role in Internet security. To solve this problem, a technique called frequent episode rules (FERs) base on data mining has been introduced into anomaly detection system (ADS). These episode rules are used to distinguish anomalous sequences of TCP,...
Malware has posted a great risk to the privacy of users and data. Unfortunately, current anomaly detection is both coarse-grained and ineffective to detect them, because some behaviors can only be triggered in specific circumstances, moreover, it is difficult to analyze and evaluate compromised data. In this paper, we address the two problems via taint-based analysis. First, we precisely characterize...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.