|
|
|
Bayram Veli Salur and Cumhur Ekinci
We examine whether investor sentiment can explain anomalies such as size and book-to-market in the US stock market. Differently from the literature, we test combination portfolios (portfolios formed on more than one factor such as size, book-to-market ra...
ver más
|
|
|
|
|
|
|
Ruiqing Wang, Jinlei Feng, Wu Zhang, Bo Liu, Tao Wang, Chenlu Zhang, Shaoxiang Xu, Lifu Zhang, Guanpeng Zuo, Yixi Lv, Zhe Zheng, Yu Hong and Xiuqi Wang
This paper proposes a data anomaly detection and correction algorithm for the tea plantation IoT system based on deep learning, aiming at the multi-cause and multi-feature characteristics of abnormal data. The algorithm is based on the Z-score standardiz...
ver más
|
|
|
|
|
|
|
Abrar Alamr and Abdelmonim Artoli
Anomaly detection is one of the basic issues in data processing that addresses different problems in healthcare sensory data. Technology has made it easier to collect large and highly variant time series data; however, complex predictive analysis models ...
ver más
|
|
|
|
|
|
|
Huating Xu, Zhiyong Wu, Hai He, Ruifang Chen and Xiaotao Wu
Droughts can lead to drought disasters, which have become one of the main natural disasters affecting the development of social economies and ecological environments around the world. Timely and effective drought process simulation and prediction based o...
ver más
|
|
|
|
|
|
|
Osamah AlKhazali, Hooi Hooi Lean and Taisier Zoubi
This paper examines whether small Islamic firms? returns stochastically dominate (outperform) the returns of large Islamic firms using Ascending and Descending Stochastic Dominance (ASD and DSD) approaches. In other words, we investigate the size anomaly...
ver más
|
|
|
|
|
|
|
Milad Memarzadeh, Ata Akbari Asanjan and Bryan Matthews
Identifying safety anomalies and vulnerabilities in the aviation domain is a very expensive and time-consuming task. Currently, it is accomplished via manual forensic reviews by subject matter experts (SMEs). However, with the increase in the amount of d...
ver más
|
|
|
|
|
|
|
Jingyi Chang, Yuanyuan Li and Hailong Lu
Pyrites are widely distributed in marine sediments, the morphology of which is applied as a proxy to infer the redox conditions of bottom water, and identify diagenetic stages and hydrocarbon leakage activities. In this review, the methods used for the m...
ver más
|
|
|
|
|
|
|
Farzin Piltan, Cheol-Hong Kim and Jong-Myon Kim
Bearings cause the most breakdowns in induction motors, which can result in significant economic losses. If faults in the bearings are not detected in time, they can cause the whole system to fail. System failures can lead to unexpected breakdowns, threa...
ver más
|
|
|
|
|
|
|
Huanghuang Jin, Hong Wang and Zhihong Zhuang
Since submarines are mostly made of ferromagnetic materials, anti-submarine warfare aircraft detect submarines using all kinds of magnetometers. In order to make the submarine magnetically silent, it is usually equipped with degaussing coils to neutraliz...
ver más
|
|
|
|
|
|
|
D.E. Savitsky,M.E. Dunaev,K.S. Zaytsev
Pág. 70 - 76
The purpose of this work is to study methods for detecting anomalies in the processing of data streams in distributed streams in real time. To do this, the authors carried out a modification of the K-Means algorithm, called K-Means in real time, and carr...
ver más
|
|
|
|