Search
Now showing items 1311-1320 of 21541
Anomalous current in diffusive ferromagnetic Josephson junctions
(American Physical Society, 2017)
We demonstrate that in diffusive superconductor/ferromagnet/superconductor (S/F/S) junctions a finite, anomalous Josephson current can flow even at zero phase difference between the S electrodes. The conditions for the ...
Anomalous Evolution of the Near-Side Jet Peak Shape in Pb-Pb Collisions at √sNN = 2.76 TeV
(American Physical Society, 2017)
The measurement of two-particle angular correlations is a powerful tool to study jet quenching in a pT region inaccessible by direct jet identification. In these measurements pseudorapidity (Δη) and azimuthal (Δφ) differences ...
Anomalous Surface Diffusion of Protons on Lipid Membranes
(Cell Press; Biophysical Society, 2014)
Abstract:
The cellular energy machinery depends crucially on the presence and properties
of protons at or in the vicinity of lipid membranes. To asses the energetics and
mobility of a proton near a membrane, we simulated ...
Anomaly Detection Algorithms for the Sleeping Cell Detection in LTE Networks
(IEEE, 2015)
The Sleeping Cell problem is a particular type of
cell degradation in Long-Term Evolution (LTE) networks. In
practice such cell outage leads to the lack of network service and
sometimes it can be revealed only after ...
Anomaly Detection and Classification of Household Electricity Data : A Time Window and Multilayer Hierarchical Network Approach
(Institute of Electrical and Electronics Engineers (IEEE), 2022)
With the increasing popularity of the smart grid, huge volumes of data are gathered from numerous sensors. How to classify, store, and analyze massive datasets to facilitate the development of the smart grid has recently ...
Anomaly detection approach to keystroke dynamics based user authentication
(IEEE, 2017)
Keystroke dynamics is one of the authentication mechanisms which uses natural typing pattern of a user for identification. In this work, we introduced Dependence Clustering based approach to user authentication using ...
Anomaly detection from network logs using diffusion maps
(Springer, 2011)
The goal of this study is to detect anomalous queries from network logs using a dimensionality reduction framework. The fequencies of 2-grams in queries are extracted to a feature matrix. Dimensionality reduction is done ...
Anomaly-free scale symmetry and gravity
(Elsevier BV, 2023)
In this Letter, we address the question of whether the conformal invariance can be considered as a global symmetry of a theory of fundamental interactions. To describe Nature, this theory must contain a mechanism of ...
Anonymity of the ‘Anyone’ : The Associative Depths of Open Intersubjectivity
(Routledge, 2019)
Husserl’s concept of “open intersubjectivity” expresses the peculiarity that the
environment appears as being there for “anyone”. The structurally implicated,
potential co-perceivers have been rendered anonymous, ...
Anonymization as homeomorphic data space transformation for privacy-preserving deep learning
(Elsevier, 2021)
Industry 4.0 is largely data-driven nowadays. Owners of the data, on the one hand, want to get added value from the data by using remote artificial intelligence tools as services, on the other hand, they concern on privacy ...