Results for 'anomaly detection'

977 found
Order:
  1.  34
    Anomaly detection based on one-class intelligent techniques over a control level plant.Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Dragan Simić, Juan-Albino Méndez-Pérez & José Luis Calvo-Rolle - 2020 - Logic Journal of the IGPL 28 (4):502-518.
    A large part of technological advances, especially in the field of industry, have been focused on the optimization of productive processes. However, the detection of anomalies has turned out to be a great challenge in fields like industry, medicine or stock markets. The present work addresses anomaly detection on a control level plant. We propose the application of different intelligent techniques, which allow to obtain one-class classifiers using real data taken from the correct plant operation. The performance (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  2.  15
    Anomaly Detection on Univariate Sensing Time Series Data for Smart Aquaculture Using Deep Learning.Visar Shehu & Aleksandar Petkovski - 2023 - Seeu Review 18 (1):1-16.
    Aquaculture plays a significant role in both economic development and food production. Maintaining an ecological environment with good water quality is essential to ensure the production efficiency and quality of aquaculture. Effective management of water quality can prevent abnormal conditions and contribute significantly to food security. Detecting anomalies in the aquaculture environment is crucial to ensure that the environment is maintained correctly to meet healthy and proper requirements for fish farming. This article focuses on the use of deep learning techniques (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  4
    Anomaly detection and facilitation AI to empower decentralized autonomous organizations for secure crypto-asset transactions.Yuichi Ikeda, Rafik Hadfi, Takayuki Ito & Akihiro Fujihara - forthcoming - AI and Society:1-12.
    This proposal introduces a novel decision-making framework to advance safe economic activities in cyberspace. We focus on identifying anomalies within crypto-asset trading, recognized as potential sources of criminal activity, severely undermining the credibility of such assets. Detecting and mitigating such anomalies holds significant societal implications, particularly in fostering trust within blockchain networks. We aim to bolster the “social trust” inherent to blockchain technology by facilitating informed economic activities in cyberspace. To achieve this, we propose integrating two artificial intelligence (AI) systems (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  4.  22
    novel method for anomaly detection using beta Hebbian learning and principal component analysis.Francisco Zayas-Gato, Álvaro Michelena, Héctor Quintián, Esteban Jove, José-Luis Casteleiro-Roca, Paulo Leitão & José Luis Calvo-Rolle - 2023 - Logic Journal of the IGPL 31 (2):390-399.
    In this research work a novel two-step system for anomaly detection is presented and tested over several real datasets. In the first step the novel Exploratory Projection Pursuit, Beta Hebbian Learning algorithm, is applied over each dataset, either to reduce the dimensionality of the original dataset or to face nonlinear datasets by generating a new subspace of the original dataset with lower, or even higher, dimensionality selecting the right activation function. Finally, in the second step Principal Component Analysis (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  5.  15
    Anomaly Detection of Highway Vehicle Trajectory under the Internet of Things Converged with 5G Technology.Ketao Deng - 2021 - Complexity 2021:1-12.
    The gradual increase in the density of highway vehicles and traffic flow makes the abnormal driving state of vehicles an indispensable tool for assisting traffic dispatch. Intelligent transportation systems can detect and track vehicles in real time, acquire characteristics such as vehicle traffic, vehicle speed, vehicle flow density, and vehicle trajectory, and further perform advanced tasks such as vehicle trajectory. The detection of abnormal vehicle trajectory is an important content of vehicle trajectory understanding. And the development of the Internet (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  49
    Healthcare and anomaly detection: using machine learning to predict anomalies in heart rate data.Edin Šabić, David Keeley, Bailey Henderson & Sara Nannemann - 2021 - AI and Society 36 (1):149-158.
    The application of machine learning algorithms to healthcare data can enhance patient care while also reducing healthcare worker cognitive load. These algorithms can be used to detect anomalous physiological readings, potentially leading to expedited emergency response or new knowledge about the development of a health condition. However, while there has been much research conducted in assessing the performance of anomaly detection algorithms on well-known public datasets, there is less conceptual comparison across unsupervised and supervised performance on physiological data. (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  31
    Unsupervised network traffic anomaly detection with deep autoencoders.Vibekananda Dutta, Marek Pawlicki, Rafał Kozik & Michał Choraś - 2022 - Logic Journal of the IGPL 30 (6):912-925.
    Contemporary Artificial Intelligence methods, especially their subset-deep learning, are finding their way to successful implementations in the detection and classification of intrusions at the network level. This paper presents an intrusion detection mechanism that leverages Deep AutoEncoder and several Deep Decoders for unsupervised classification. This work incorporates multiple network topology setups for comparative studies. The efficiency of the proposed topologies is validated on two established benchmark datasets: UNSW-NB15 and NetML-2020. The results of their analysis are discussed in terms (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  8.  13
    Novel adaptive approach for anomaly detection in nonlinear and time-varying industrial systems.Álvaro Michelena, Francisco Zayas-Gato, Esteban Jove, José-Luis Casteleiro-Roca, Héctor Quintián, Óscar Fontenla-Romero & José Luis Calvo-Rolle - forthcoming - Logic Journal of the IGPL.
    The present research describes a novel adaptive anomaly detection method to optimize the performance of nonlinear and time-varying systems. The proposal integrates a centroid-based approach with the real-time identification technique Recursive Least Squares. In order to find anomalies, the approach compares the present system dynamics with the average (centroid) of the dynamics found in earlier states for a given setpoint. The system labels the dynamics difference as an anomaly if it rises over a determinate threshold. To validate (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  24
    Recent Progress of Anomaly Detection.Xiaodan Xu, Huawen Liu & Minghai Yao - 2019 - Complexity 2019:1-11.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  10.  17
    Time series forecasting with model selection applied to anomaly detection in network traffic.Łukasz Saganowski & Tomasz Andrysiak - 2020 - Logic Journal of the IGPL 28 (4):531-545.
    In herein article an attempt of problem solution connected with anomaly detection in network traffic with the use of statistic models with long or short memory dependence was presented. In order to select the proper type of a model, the parameter describing memory on the basis of the Geweke and Porter-Hudak test was estimated. Bearing in mind that the value of statistic model depends directly on quality of data used for its creation, at the initial stage of the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11.  15
    Local and Deep Features Based Convolutional Neural Network Frameworks for Brain MRI Anomaly Detection.Sajad Einy, Hasan Saygin, Hemrah Hivehch & Yahya Dorostkar Navaei - 2022 - Complexity 2022:1-11.
    A brain tumor is an abnormal mass or growth of a cell that leads to certain death, and this is still a challenging task in clinical practice. Early and correct diagnosis of this type of cancer is very important for the treatment process. For this reason, this study aimed to develop computer-aided systems for the diagnosis of brain tumors. In this research, we proposed three different end-to-end deep learning approaches for analyzing effects of local and deep features for brain MRI (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  12.  80
    Epistemology and anomaly detection in astrobiology.Christopher Kempes & David Kinney - 2022 - Biology and Philosophy 37 (4):1-25.
    We examine the epistemological foundations of a leading technique in the search for evidence of life on exosolar planets. Specifically, we consider the “transit method” for spectroscopic analysis of exoplanet atmospheres, and the practice of treating anomalous chemical compositions of the atmospheres of exosolar planets as indicators of the potential presence of life. We propose a methodology for ranking the anomalousness of atmospheres that uses the mathematical apparatus of support vector machines, and which aims to be agnostic with respect to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  29
    On the combination of support vector machines and segmentation algorithms for anomaly detection: A petroleum industry comparative study.Luis Martí, Nayat Sanchez-Pi, José Manuel Molina López & Ana Cristina Bicharra Garcia - 2017 - Journal of Applied Logic 24:71-84.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  14.  29
    Proposal and comparison of network anomaly detection based on long-memory statistical models.Tomasz Andrysiak, Łukasz Saganowski, Michał Choraś & Rafał Kozik - 2016 - Logic Journal of the IGPL 24 (6):944-956.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15.  16
    Paternal Psychological Stress After Detection of Fetal Anomaly During Pregnancy. A Prospective Longitudinal Observational Study.Mona Bekkhus, Aurora Oftedal, Elizabeth Braithwaite, Guttorm Haugen & Anne Kaasen - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  40
    Conflict detection and social perception: bringing meta-reasoning and social cognition together.André Mata - 2019 - Thinking and Reasoning 26 (1):140-149.
    Research on implicit conflict detection suggests that people are sensitive to violations of logical principles. When they make reasoning errors, their epistemic radar presumably detects an anomaly....
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  17.  17
    Automatic detection of faults in industrial production of sandwich panels using Deep Learning techniques.Sebastian Lopez Florez, Alfonso González-Briones, Pablo Chamoso & Mohd Saberi Mohamad - forthcoming - Logic Journal of the IGPL.
    The use of technologies like artificial intelligence can drive productivity growth, efficiency and innovation. The goal of this study is to develop an anomaly detection method for locating flaws on the surface of sandwich panels using YOLOv5. The proposed algorithm extracts information locally from an image through a prediction system that creates bounding boxes and determines whether the sandwich panel surface contains flaws. It attempts to reject or accept a product based on quality levels specified in the standard. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  14
    Using AI to detect panic buying and improve products distribution amid pandemic.Yossiri Adulyasak, Omar Benomar, Ahmed Chaouachi, Maxime C. Cohen & Warut Khern-Am-Nuai - 2024 - AI and Society 39 (4):2099-2128.
    The COVID-19 pandemic has triggered panic-buying behavior around the globe. As a result, many essential supplies were consistently out-of-stock at common point-of-sale locations. Even though most retailers were aware of this problem, they were caught off guard and are still lacking the technical capabilities to address this issue. The primary objective of this paper is to develop a framework that can systematically alleviate this issue by leveraging AI models and techniques. We exploit both internal and external data sources and show (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  19.  21
    UTTAMA: An Intrusion Detection System Based on Feature Clustering and Feature Transformation.Arun Nagaraja, B. Uma & Rajesh Kumar Gunupudi - 2020 - Foundations of Science 25 (4):1049-1075.
    Detecting Intrusions and anomalies is becoming much more challenging with new attacks popping out over a period of time. Achieving better accuracies by applying benchmark classifier algorithms used for identifying intrusions and anomalies have several hidden data mining challenges. Although neglected by many research findings, one of the most important and biggest challenges is the similarity or membership computation. Another challenge that cannot be simply neglected is the number of features that attributes to dimensionality. This research aims to come up (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  87
    The Pioneer Anomaly as Acceleration of the Clocks.Antonio F. Rañada - 2004 - Foundations of Physics 34 (12):1955-1971.
    This work proposes an explanation of the Pioneer anomaly, the unmodelled and as yet unexplained blueshift detected in the microwave signal of the Pioneer 10 and other spaceships by Anderson et al. in 1998. What they observed is similar to the effect that would have either (i) an anomalous acceleration a P the ship towards the Sun, or (ii) an acceleration of the clocks a t =a P /c. The second alternative is investigated here, with a phenomenological model in (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  21.  30
    Self-organizing Maps versus Growing Neural Gas in Detecting Anomalies in Data Centres.M. Zapater, D. Fraga, P. Malagon, Z. Bankovic & J. M. Moya - 2015 - Logic Journal of the IGPL 23 (3):495-505.
  22. The anomaly called psi: Recent research and criticism.K. Ramakrishna Rao & John Palmer - 1987 - Behavioral and Brain Sciences 10 (4):539-51.
    Over the past hundred years, a number of scientific investigators claim to have adduced experimental evidence for phenomena information” seems to behave like a weak signal that has to compete for the information-processing resources of the organism, a reduction of ongoing sensorimotor activity may facilitate ESP detection. Such a meaningful convergence of results suggests that psi phenomena may represent a unitary, coherent process whose nature and compatibility with current physical theory have yet to be determined. The theoretical implications and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   55 citations  
  23. Feyerabend and Popper on Theory Proliferation and Anomaly Import: On the Compatibility of Theoretical Pluralism and Critical Rationalism.Karim Bschir - 2015 - Hopos: The Journal of the International Society for the History of Philosophy of Science 5 (1):24-55.
    A fundamental tenet of Paul Feyerabend’s pluralistic view of science has it that theory proliferation, that is, the availability of theoretical alternatives, is of crucial importance for the detection of anomalies in established theories. Paul Hoyningen-Huene calls this the Anomaly Importation Thesis, according to which anomalies are imported, as it were, into well-established theories from competing alternatives. This article pursues two major objectives: (a) to work out the systematic details of Feyerabend’s ideas on theory proliferation and anomaly (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   14 citations  
  24.  32
    One-Class-Based Intelligent Classifier for Detecting Anomalous Situations During the Anesthetic Process.Alberto Leira, Esteban Jove, Jose M. Gonzalez-Cava, José-Luis Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Santiago Torres Álvarez, Svetlana Simić, Juan-Albino Méndez-Pérez & José Luis Calvo-Rolle - 2022 - Logic Journal of the IGPL 30 (2):326-341.
    Closed-loop administration of propofol for the control of hypnosis in anesthesia has evidenced an outperformance when comparing it with manual administration in terms of drug consumption and post-operative recovery of patients. Unlike other systems, the success of this strategy lies on the availability of a feedback variable capable of quantifying the current hypnotic state of the patient. However, the appearance of anomalies during the anesthetic process may result in inaccurate actions of the automatic controller. These anomalies may come from the (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  36
    Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol.Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García & Carmen Benavides - 2019 - Complexity 2019:1-11.
    The large number of sensors and actuators that make up the Internet of Things obliges these systems to use diverse technologies and protocols. This means that IoT networks are more heterogeneous than traditional networks. This gives rise to new challenges in cybersecurity to protect these systems and devices which are characterized by being connected continuously to the Internet. Intrusion detection systems are used to protect IoT systems from the various anomalies and attacks at the network level. Intrusion Detection (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  26.  24
    Modeling of attack detection system based on hybridization of binary classifiers.Beley O. I. & Kolesnyk K. K. - 2020 - Artificial Intelligence Scientific Journal 25 (3):14-25.
    The study considers the development of methods for detecting anomalous network connections based on hybridization of computational intelligence methods. An analysis of approaches to detecting anomalies and abuses in computer networks. In the framework of this analysis, a classification of methods for detecting network attacks is proposed. The main results are reduced to the construction of multi-class models that increase the efficiency of the attack detection system, and can be used to build systems for classifying network parameters during the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  27.  58
    (1 other version)CUBISM: Belief, anomaly and social constructs.Yorick Wilks, Micah Clark, Tomas By, Adam Dalton & Ian Perera - 2014 - Interaction Studies 15 (3):388-403.
    We introduce the CUBISM system for the analysis and deep understanding of multi-participant dialogues. CUBISM brings together two typically separate forms of discourse analysis: semantic analysis and sociolinguistic analysis. In the paper proper, we describe and illustrate major components of the CUBISM system, and discuss the challenge posed by the system’s ultimate purpose, which is to automatically detect anomalous changes in participants’ expressed or implied beliefs about the world and each other, including shifts toward or away from cultural and community (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  28. Reinterpreting Relativity: Using the Equivalence Principle to Explain Away Cosmological Anomalies.Marcus Arvan - manuscript
    According to the standard interpretation of Einstein’s field equations, gravity consists of mass-energy curving spacetime, and an additional physical force or entity—denoted by Λ (the ‘cosmological constant’)—is responsible for the Universe’s metric-expansion. Although General Relativity’s direct predictions have been systematically confirmed, the dominant cosmological model thought to follow from it—the ΛCDM (Lambda cold dark matter) model of the Universe’s history and composition—faces considerable challenges, including various observational anomalies and experimental failures to detect dark matter, dark energy, or inflation-field candidates. This (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  29. The relationship between the neural computations for speech and music perception is context-dependent: an activation likelihood estimate study.Arianna LaCroix, Alvaro F. Diaz & Corianne Rogalsky - 2015 - Frontiers in Psychology 6:144900.
    The relationship between the neurobiology of speech and music has been investigated for more than a century. There remains no widespread agreement regarding how (or to what extent) music perception utilizes the neural circuitry that is engaged in speech processing, particularly at the cortical level. Prominent models such as Patel’s Shared Syntactic Integration Resource Hypothesis (SSIRH) and Koelsch’s neurocognitive model of music perception suggest a high degree of overlap, particularly in the frontal lobe, but also perhaps more distinct representations in (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  30.  9
    Blockchain self-update smart contract for supply chain traceability with data validation.Cristian Valencia-Payan, David Griol & Juan Carlos Corrales - forthcoming - Logic Journal of the IGPL.
    A sustainable supply chain management strategy reduces risks and meets environmental, economic and social objectives by integrating environmental and financial practices. In an ever-changing environment, supply chains have become vulnerable at many levels. In a global supply chain, carefully tracing a product is of great importance to avoid future problems. This paper describes a self-updating smart contract, which includes data validation, for tracing global supply chains using blockchains. Our proposal uses a machine learning model to detect anomalies on traceable data, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  13
    Advances in Artificial Intelligence: From Theory to Practice: 30th International Conference on Industrial Engineering and Other Applications of Applied Intelligent Systems, Iea/Aie 2017, Arras, France, June 27-30, 2017, Proceedings, Part I.Salem Benferhat, Karim Tabia & Moonis Ali (eds.) - 2017 - Springer Verlag.
    The two-volume set LNCS 10350 and 10351 constitutes the thoroughly refereed proceedings of the 30th International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2017, held in Arras, France, in June 2017. The 70 revised full papers presented together with 45 short papers and 3 invited talks were carefully reviewed and selected from 180 submissions. They are organized in topical sections: constraints, planning, and optimization; data mining and machine learning; sensors, signal processing, and data fusion; recommender (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  32.  58
    Smart City and IoT Data Collection Leveraging Generative AI.Eric Garcia - manuscript
    The rapid urbanization of modern cities necessitates innovative approaches to data collection and integration for smarter urban management. With the Internet of Things (IoT) at the core of these advancements, the ability to efficiently gather, analyze, and utilize data becomes paramount. Generative Artificial Intelligence (AI) is revolutionizing data collection by enabling intelligent synthesis, anomaly detection, and real-time decision-making across interconnected systems. This paper explores how generative AI enhances IoT-driven data collection in smart cities, focusing on applications in transportation, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33.  28
    A Two-Layer Architecture for Failure Prediction Based on High-Dimension Monitoring Sequences.Xue Wang, Fan Liu, Yixin Feng & Jiabao Zhao - 2021 - Complexity 2021:1-9.
    In recent years, the distributed architecture has been widely adopted by security companies with the rapid expansion of their business. A distributed system is comprised of many computing nodes of different components which are connected by high-speed communication networks. With the increasing functionality and complexity of the systems, failures of nodes are inevitable which may result in considerable loss. In order to identify anomalies of the possible failures and enable DevOps engineers to operate in advance, this paper proposes a two-layer (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  47
    Frontiers of Artificial Intelligence, Ethics, and Multidisciplinary Applications: 1st International Conference on Frontiers of AI, Ethics, and Multidisciplinary Applications (FAIEMA), Greece, 2023.Mina Farmanbar, Maria Tzamtzi, Ajit Kumar Verma & Antorweep Chakravorty (eds.) - 2024 - Springer Nature Singapore.
    This groundbreaking proceedings volume explores the integration of Artificial Intelligence (AI) across key domains—healthcare, finance, education, robotics, industrial and other engineering applications —unveiling its transformative potential and practical implications. With a multidisciplinary lens, it transcends technical aspects, fostering a comprehensive understanding while bridging theory and practice. Approaching the subject matter with depth, the book combines theoretical foundations with real-world case studies, empowering researchers, professionals, and enthusiasts with the knowledge and tools to effectively harness AI. Encompassing diverse AI topics—machine learning, natural (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  35. Developmental Dynamic Dysphasia: Are Bilateral Brain Abnormalities a Signature of Inefficient Neural Plasticity?Marcelo L. Berthier, Guadalupe Dávila, María José Torres-Prioris, Ignacio Moreno-Torres, Jordi Clarimón, Oriol Dols-Icardo, María J. Postigo, Victoria Fernández, Lisa Edelkraut, Lorena Moreno-Campos, Diana Molina-Sánchez, Paloma Solo de Zaldivar & Diana López-Barroso - 2020 - Frontiers in Human Neuroscience 14:478142.
    The acquisition and evolution of speech production, discourse and communication can be negatively impacted by brain malformations. We describe, for the first time, a case of developmental dynamic dysphasia (DDD) in a right-handed adolescent boy (subject D) with cortical malformations involving language-eloquent regions (inferior frontal gyrus) in both the left and the right hemispheres. Language evaluation revealed a markedly reduced verbal output affecting phonemic and semantic fluency, phrase and sentence generation and verbal communication in everyday life. Auditory comprehension, repetition, naming, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  36. Missing experimental challenges to the Standard Model of particle physics.Slobodan Perovic - 2011 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 42 (1):32-42.
    The success of particle detection in high energy physics colliders critically depends on the criteria for selecting a small number of interactions from an overwhelming number that occur in the detector. It also depends on the selection of the exact data to be analyzed and the techniques of analysis. The introduction of automation into the detection process has traded the direct involvement of the physicist at each stage of selection and analysis for the efficient handling of vast amounts (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  37.  70
    Behavior of a magnetic dipole freely floating on water surface.M. A. & H. Kh - manuscript
    In this paper, the authors have detected a new effect in the area of geomagnetism, related to the behavior of a magnetic dipole freely floating on water surface. An experiment is described in the present paper in which a magnetic dipole fixed upon a float placed on non- magnetized water surface undergoes displacement along with reorientation caused by fine structure of the earth's magnetic field. This fact can probably be explained by secular decrease of the earth's major dipole moment. Further, (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  38.  22
    Preserving women’s reproductive autonomy while promoting the rights of people with disabilities?: the case of Heidi Crowter and Maire Lea-Wilson in the light of NIPT debates in England, France and Germany.Adeline Perrot & Ruth Horn - 2023 - Journal of Medical Ethics 49 (7):471-473.
    On July 2021, the UK High Court of Justice heard the Case CO/2066/2020 on the application of Heidi Crowter who lives with Down’s syndrome, and Máire Lea-Wilson whose son Aidan has Down’s syndrome. Crowter and Lea-Wilson, with the support of the disability rights campaign, ‘Don’t Screen Us Out’, have been taking legal action against the Secretary of State for Health and Social Care (the UK Government) for a review of the 1967 Abortion Act: the removal of section 1(1)(d) making termination (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  50
    Prenatal Screening: Current Practice, New Developments, Ethical Challenges.Antina Jong, Idit Maya & Jan M. M. Lith - 2014 - Bioethics 29 (1):1-8.
    Prenatal screening pathways, as nowadays offered in most Western countries consist of similar tests. First, a risk-assessment test for major aneuploides is offered to pregnant women. In case of an increased risk, invasive diagnostic tests, entailing a miscarriage risk, are offered. For decades, only conventional karyotyping was used for final diagnosis. Moreover, several foetal ultrasound scans are offered to detect major congenital anomalies, but the same scans also provide relevant information for optimal support of the pregnancy and the delivery. Recent (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  40.  13
    A hybrid machine learning system to impute and classify a component-based robot.Nuño Basurto, Ángel Arroyo, Carlos Cambra & Álvaro Herrero - 2023 - Logic Journal of the IGPL 31 (2):338-351.
    In the field of cybernetic systems and more specifically in robotics, one of the fundamental objectives is the detection of anomalies in order to minimize loss of time. Following this idea, this paper proposes the implementation of a Hybrid Intelligent System in four steps to impute the missing values, by combining clustering and regression techniques, followed by balancing and classification tasks. This system applies regression models to each one of the clusters built on the instances of data set. Subsequently, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  41.  27
    Analyzing Horizontal Transfer of Transposable Elements on a Large Scale: Challenges and Prospects.Jean Peccoud, Richard Cordaux & Clément Gilbert - 2018 - Bioessays 40 (2):1700177.
    Whoever compares the genomes of distantly related species might find aberrantly high sequence similarity at certain loci. Such anomaly can only be explained by genetic material being transferred through other means than reproduction, that is, a horizontal transfer. Between multicellular organisms, the transferred material will likely turn out to be a transposable element. Because TEs can move between loci and invade chromosomes by replicating themselves, HT of TEs profoundly impacts genome evolution. Yet, very few studies have quantified HTT at (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  66
    Glossary of color science.Alex Byrne & David R. Hilbert - 1997 - In Alex Byrne & David R. Hilbert (eds.), Readings on Color, Volume 2: The Science of Color. MIT Press.
    Anomaloscope An instrument used for detecting anomalies of color vision. The test subject adjusts the ratio of two monochromatic lights to form a match with a third monochromatic light. The most common form of this procedure involves a Rayleigh match: a match between a mixture of monochromatic green and red lights, and a monochromatic yellow light. Normal subjects will choose a matching ratio of red to green light that falls within a fairly narrow range of values. Subjects with anomalous color (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   5 citations  
  43. The cortical microstructural basis of lateralized cognition: a review.Steven A. Chance - 2014 - Frontiers in Psychology 5:82475.
    The presence of asymmetry in the human cerebral hemispheres is detectable at both the macroscopic and microscopic scales. The horizontal expansion of cortical surface during development (within individual brains), and across evolutionary time (between species), is largely due to the proliferation and spacing of the microscopic vertical columns of cells that form the cortex. In the asymmetric planum temporale (PT), minicolumn width asymmetry is associated with surface area asymmetry. Although the human minicolumn asymmetry is not large, it is estimated to (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  44.  33
    Ethics Commentary.Tamra Lysaght - 2013 - Asian Bioethics Review 5 (3):283-288.
    In lieu of an abstract, here is a brief excerpt of the content:Ethics CommentaryTamra Lysaght, Senior Research FellowThe case scenario reflects the dilemmas frequently faced by researchers who discover incidental findings in the course of their studies. Indeed, the literature suggests that the prevalence of incidental findings in neuroimaging research is common,1 and a recent meta-analysis found that such findings increase significantly with age.2 Thus, given the age of the study population and increased likelihood of co-morbidities, it is puzzling that (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  45.  36
    Ethical aspects of genetic disease and genetic counselling.R. West - 1988 - Journal of Medical Ethics 14 (4):194-197.
    With the reduction in diseases due to nutritional deficiencies and infection, disorders which are wholly or partly genetic are becoming relatively more important in all branches of modern medicine. Genetic counselling has developed in recent years from just explaining to an individual or a couple the risk of them producing a handicapped child, to the possibility in many cases of better diagnosis and active intervention to reduce the risks. At the same time antenatal screening programmes have been introduced to detect (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  46.  17
    Unusual Atmospheric Phenomena Observed Near Channel Islands, UK, 23 April 2007.Jean-Francois Baure, David Clarke, Paul Fuller & Martin Shough - 2010 - Journal of Scientific Exploration 22 (3).
    Unusual atmospheric phenomena (UAPs) were observed in daylight by multiple observers on board two civil aircraft in widely separated locations. We summarise results of an investigation based on radio communications reporting events in real time to Air Traffic Control (ATC), ATC radar and weather radar recordings, Civil Aviation Authority (CAA) documents, witness interviews and statements, and other sources. We describe attempts to explain the phenomena with the help of expert specialist advisers and professional resources in the fields of meteorology, atmospheric (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  23
    Activity Monitoring Process based on Model-Driven Engineering – Application to Ambient Assisted Living.Philippe Lenca, Julie Soulas & Jacques Simonin - 2015 - Journal of Intelligent Systems 24 (3):371-382.
    The supervisor of the activities of a system user should benefit from the knowledge contained in the event logs of the user. They allow the monitoring of the sequential and parallel user activities. To make event logs more accessible to the supervisor, we suggest a process mining approach, including first the design of an understanding model of the activities of a system user. The model design is based on the relationships between the event logs and the activities of a system (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  48.  20
    Émile Meyerson and mass conservation in chemical reactions: a priori expectations versus experimental tests.Roberto de Andrade Martins - 2019 - Foundations of Chemistry 21 (1):109-124.
    In his celebrated historic-epistemological work Identité et réalité, Émile Meyerson claimed that the scientific conservation principles were first suggested and accepted for philosophical reasons, and only afterwards were submitted to experimental tests. One of the instances he discussed in his book is the principle of mass conservation in chemical reactions. Meyerson pointed out that several authors, from Antiquity to Kant, accepted the idea of quantitative conservation of matter; and Lavoisier himself was strongly influenced by a priori ideas, using this principle (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  49.  23
    ERP Evidence for the Rapid Assignment of an (Appropriate) Antecedent to PRO.Josep Demestre & José E. García‐Albea - 2007 - Cognitive Science 31 (2):343-354.
    Event‐related brain potentials were recorded while subjects listened to sentences containing a controlled infinitival complement. Subject and object control items were used, both with 2 potential antecedents in the upper clause. Half of the sentences had a gender agreement violation between the null subject of the infinitival complement and an adjective predicated of it. The rapid detection of this anomaly would indicate that the parser had established the coreference relation between the null subject and an antecedent, and that (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  32
    Automated medical diagnosis with fuzzy stochastic models: Monitoring chronic diseases.Laurent Jeanpierre & François Charpillet - 2004 - Acta Biotheoretica 52 (4):291-311.
    As the world population ages, the patients per physician ratio keeps on increasing. This is even more important in the domain of chronic pathologies where people are usually monitored for years and need regular consultations.To address this problem, we propose an automated system to monitor a patient population, detecting anomalies in instantaneous data and in their temporal evolution, so that it could alert physicians. By handling the population of healthy patients autonomously and by drawing the physicians' attention to the patients–at-risk, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
1 — 50 / 977