scholarly journals Evaluating the SEVIRI Fire Thermal Anomaly Detection Algorithm across the Central African Republic Using the MODIS Active Fire Product

2014 ◽  
Vol 6 (3) ◽  
pp. 1890-1917 ◽  
Author(s):  
Patrick Freeborn ◽  
Martin Wooster ◽  
Gareth Roberts ◽  
Weidong Xu
2021 ◽  
Vol 12 (1) ◽  
Author(s):  
A. Lagain ◽  
G. K. Benedix ◽  
K. Servis ◽  
D. Baratoux ◽  
L. S. Doucet ◽  
...  

AbstractThe only martian rock samples on Earth are meteorites ejected from the surface of Mars by asteroid impacts. The locations and geological contexts of the launch sites are currently unknown. Determining the impact locations is essential to unravel the relations between the evolution of the martian interior and its surface. Here we adapt a Crater Detection Algorithm that compile a database of 90 million impact craters, allowing to determine the potential launch position of these meteorites through the observation of secondary crater fields. We show that Tooting and 09-000015 craters, both located in the Tharsis volcanic province, are the most likely source of the depleted shergottites ejected 1.1 million year ago. This implies that a major thermal anomaly deeply rooted in the mantle under Tharsis was active over most of the geological history of the planet, and has sampled a depleted mantle, that has retained until recently geochemical signatures of Mars’ early history.


2022 ◽  
Vol 2022 ◽  
pp. 1-14
Author(s):  
Yadi Wang ◽  
Wangyang Yu ◽  
Peng Teng ◽  
Guanjun Liu ◽  
Dongming Xiang

With the development of smart devices and mobile communication technologies, e-commerce has spread over all aspects of life. Abnormal transaction detection is important in e-commerce since abnormal transactions can result in large losses. Additionally, integrating data flow and control flow is important in the research of process modeling and data analysis since it plays an important role in the correctness and security of business processes. This paper proposes a novel method of detecting abnormal transactions via an integration model of data and control flows. Our model, called Extended Data Petri net (DPNE), integrates the data interaction and behavior of the whole process from the user logging into the e-commerce platform to the end of the payment, which also covers the mobile transaction process. We analyse the structure of the model, design the anomaly detection algorithm of relevant data, and illustrate the rationality and effectiveness of the whole system model. Through a case study, it is proved that each part of the system can respond well, and the system can judge each activity of every mobile transaction. Finally, the anomaly detection results are obtained by some comprehensive analysis.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiong Yang ◽  
Yuling Chen ◽  
Xiaobin Qian ◽  
Tao Li ◽  
Xiao Lv

The distributed deployment of wireless sensor networks (WSNs) makes the network more convenient, but it also causes more hidden security hazards that are difficult to be solved. For example, the unprotected deployment of sensors makes distributed anomaly detection systems for WSNs more vulnerable to internal attacks, and the limited computing resources of WSNs hinder the construction of a trusted environment. In recent years, the widely observed blockchain technology has shown the potential to strengthen the security of the Internet of Things. Therefore, we propose a blockchain-based ensemble anomaly detection (BCEAD), which stores the model of a typical anomaly detection algorithm (isolated forest) in the blockchain for distributed anomaly detection in WSNs. By constructing a suitable block structure and consensus mechanism, the global model for detection can iteratively update to enhance detection performance. Moreover, the blockchain guarantees the trust environment of the network, making the detection algorithm resistant to internal attacks. Finally, compared with similar schemes, in terms of performance, cost, etc., the results prove that BCEAD performs better.


Sign in / Sign up

Export Citation Format

Share Document