期刊文献+
共找到22篇文章
< 1 2 >
每页显示 20 50 100
Mineralization-related geochemical anomalies derived from stream sediment geochemical data using multifractal analysis in Pangxidong area of Qinzhou-Hangzhou tectonic joint belt, Guangdong Province, China 被引量:5
1
作者 张焱 周永章 +8 位作者 王林峰 王正海 何俊国 安燕飞 李红中 曾长育 梁锦 吕文超 高乐 《Journal of Central South University》 SCIE EI CAS 2013年第1期184-192,共9页
Distinguishing geochemical anomalies from background is a basic task in exploratory geochemistry. The derivation of geochemical anomalies from stream sediment geochemical data and the decomposition of these anomalies ... Distinguishing geochemical anomalies from background is a basic task in exploratory geochemistry. The derivation of geochemical anomalies from stream sediment geochemical data and the decomposition of these anomalies into their component patterns were described. A set of stream sediment geochemical data was obtained for 1 880 km 2 of the Pangxidong area, which is in the southern part of the recently recognized Qinzhou-Hangzhou joint tectonic belt. This belt crosses southern China and tends to the northwest (NE) direction. The total number of collected samples was 7 236, and the concentrations of Ag, Au, Cu, As, Pb and Zn were measured for each sample. The spatial combination distribution law of geochemical elements and principal component analysis (PCA) were used to construct combination models for the identification of combinations of geochemical anomalies. Spectrum-area (S-A) fractal modeling was used to strengthen weak anomalies and separate them from the background. Composite anomaly modeling was combined with fractal filtering techniques to process and analyze the geochemical data. The raster maps of Au, Ag, Cu, As, Pb and Zn were obtained by the multifractal inverse distance weighted (MIDW) method. PCA was used to combine the Au, Ag, Cu, As, Pb, and Zn concentration values. The S-A fractal method was used to decompose the first component pattern achieved by the PCA. The results show that combination anomalies from a combination of variables coincide with the known mineralization of the study area. Although the combination anomalies cannot reflect local anomalies closely enough, high-anomaly areas indicate good sites for further exploration for unknown deposits. On this basis, anomaly and background separation from combination anomalies using fractal filtering techniques can provide guidance for later work. 展开更多
关键词 geochemical anomalies fractal modeling principal component analysis Qinzhou-Hangzhou joint tectonic belt streamsediments
在线阅读 下载PDF
ANALYSIS ON SHORT-TERM PRECURSORY ANOMALIES AND SEQUENCE CHARACTERISTIC OF NINGLANG EARTHQUAKE 1998
2
作者 Mu Yayuan 《地学前缘》 EI CAS CSCD 2000年第S1期439-439,共1页
From Octobet 1998 to January 1999,5 earthquakes ( M s≥5) occurred between Ninglang and Yanyuan counties (27°07′~27°12′N,100°40′~101°00′E area).They were situated in 140km southwest of the Xi... From Octobet 1998 to January 1999,5 earthquakes ( M s≥5) occurred between Ninglang and Yanyuan counties (27°07′~27°12′N,100°40′~101°00′E area).They were situated in 140km southwest of the Xichang.Among them,the largest one is M s 6 2 on November 19,1998.Based on small seismic data by the seismic remote sensing station of Xichang and the seismological station of Muli,and regional observation data,passing through careful observation and scientific analyses,we had made better forecasts before the earthquakes.That results obvious social benefits.By processing data of precursory earthquakes,such as,original observation data of total geomagnetic intensity from the station of Xichang,pressure capacitance stressometer and quartz horizaontal pendulum tiltmeter from the Xiaomiao station of Xichang,we summarized the sequence characteristics of the series earthquakes.The information about short\|term anomaly of gruond strain,total geomagnetic intensity and ground tilt before the earthquake is emphatically explained. 展开更多
关键词 Ninglang EARTHQUAKE PRECURSOR seismic SWARM ground TILT short\|term anomalies
在线阅读 下载PDF
Approach based on wavelet analysis for detecting and amending anomalies in dataset 被引量:1
3
作者 彭小奇 宋彦坡 +1 位作者 唐英 张建智 《Journal of Central South University of Technology》 EI 2006年第5期491-495,共5页
It is difficult to detect the anomalies whose matching relationship among some data attributes is very different from others’ in a dataset. Aiming at this problem, an approach based on wavelet analysis for detecting ... It is difficult to detect the anomalies whose matching relationship among some data attributes is very different from others’ in a dataset. Aiming at this problem, an approach based on wavelet analysis for detecting and amending anomalous samples was proposed. Taking full advantage of wavelet analysis’ properties of multi-resolution and local analysis, this approach is able to detect and amend anomalous samples effectively. To realize the rapid numeric computation of wavelet translation for a discrete sequence, a modified algorithm based on Newton-Cores formula was also proposed. The experimental result shows that the approach is feasible with good result and good practicality. 展开更多
关键词 data preprocessing wavelet analysis anomaly detecting data mining
在线阅读 下载PDF
Deep learning-based method for detecting anomalies in electromagnetic environment situation
4
作者 Wei-lin Hu Lun-wen Wang +2 位作者 Chuang Peng Ran-gang Zhu Meng-bo Zhang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第8期231-241,共11页
The anomaly detection of electromagnetic environment situation(EMES) has essential reference value for electromagnetic equipment behavior cognition and battlefield threat assessment.In this paper,we proposed a deep le... The anomaly detection of electromagnetic environment situation(EMES) has essential reference value for electromagnetic equipment behavior cognition and battlefield threat assessment.In this paper,we proposed a deep learning-based method for detecting anomalies in EMES to address the problem of relatively low efficiency of electromagnetic environment situation anomaly detection(EMES-AD).Firstly,the convolutional kernel extracts the static features of different regions of the EMES.Secondly,the dynamic features of the region are obtained by using a recurrent neural network(LSTM).Thirdly,the Spatio-temporal features of the region are recovered by using a de-convolutional network and then fused to predict the EMES.The structural similarity algorithm(SSIM) is used to determine whether it is anomalous.We developed the detection framework,de-signed the network parameters,simulated the data sets containing different anomalous types of EMES,and carried out the detection experiments.The experimental results show that the proposed method is effective. 展开更多
关键词 Electromagnetic environment situation(EMES) Anomaly detection(AD) Regional features integration LSTM CNN
在线阅读 下载PDF
Real-Time Smart Meter Abnormality Detection Framework via End-to-End Self-Supervised Time-Series Contrastive Learning with Anomaly Synthesis
5
作者 WANG Yixin LIANG Gaoqi +1 位作者 BI Jichao ZHAO Junhua 《南方电网技术》 北大核心 2025年第7期62-71,89,共11页
The rapid integration of Internet of Things(IoT)technologies is reshaping the global energy landscape by deploying smart meters that enable high-resolution consumption monitoring,two-way communication,and advanced met... The rapid integration of Internet of Things(IoT)technologies is reshaping the global energy landscape by deploying smart meters that enable high-resolution consumption monitoring,two-way communication,and advanced metering infrastructure services.However,this digital transformation also exposes power system to evolving threats,ranging from cyber intrusions and electricity theft to device malfunctions,and the unpredictable nature of these anomalies,coupled with the scarcity of labeled fault data,makes realtime detection exceptionally challenging.To address these difficulties,a real-time decision support framework is presented for smart meter anomality detection that leverages rolling time windows and two self-supervised contrastive learning modules.The first module synthesizes diverse negative samples to overcome the lack of labeled anomalies,while the second captures intrinsic temporal patterns for enhanced contextual discrimination.The end-to-end framework continuously updates its model with rolling updated meter data to deliver timely identification of emerging abnormal behaviors in evolving grids.Extensive evaluations on eight publicly available smart meter datasets over seven diverse abnormal patterns testing demonstrate the effectiveness of the proposed full framework,achieving average recall and F1 score of more than 0.85. 展开更多
关键词 abnormality detection cyber-physical security anomaly synthesis contrastive learning time-series
在线阅读 下载PDF
Anomaly Detection Method Using Feature Reconstruction Based Knowledge Distillation
6
作者 ZHU Xin-yu SI Zhan-jun ZHANG Ying-xue 《印刷与数字媒体技术研究》 CAS 北大核心 2024年第4期115-124,236,共11页
In recent years,anomaly detection has attracted much attention in industrial production.As traditional anomaly detection methods usually rely on direct comparison of samples,they often ignore the intrinsic relationshi... In recent years,anomaly detection has attracted much attention in industrial production.As traditional anomaly detection methods usually rely on direct comparison of samples,they often ignore the intrinsic relationship between samples,resulting in poor accuracy in recognizing anomalous samples.To address this problem,a knowledge distillation anomaly detection method based on feature reconstruction was proposed in this study.Knowledge distillation was performed after inverting the structure of the teacher-student network to avoid the teacher-student network sharing the same inputs and similar structure.Representability was improved by using feature splicing to unify features at different levels,and the merged features were processed and reconstructed using an improved Transformer.The experimental results show that the proposed method achieves better performance on the MVTec dataset,verifying its effectiveness and feasibility in anomaly detection tasks.This study provides a new idea to improve the accuracy and efficiency of anomaly detection. 展开更多
关键词 Feature Reconstruction Anomaly Detection Distillation Mechanism Industrial Production
在线阅读 下载PDF
ENSO事件次表层海温的两个模态及其对大气环流的影响 被引量:1
7
作者 陈永利 唐晓晖 +1 位作者 王凡 赵永平 《海洋与湖沼》 CAS CSCD 北大核心 2020年第4期851-860,共10页
利用SODA海洋同化资料和NCEP再分析大气资料,分析了热带太平洋次表层海温异常(subsurfaceoceantemperatureanomaly,SOTA)与厄尔尼诺与南方涛动(ElNi?o-SouthernOscillation,ENSO)循环的联系,及SOTA对大气环流的影响。回顾传统ENSO研究,... 利用SODA海洋同化资料和NCEP再分析大气资料,分析了热带太平洋次表层海温异常(subsurfaceoceantemperatureanomaly,SOTA)与厄尔尼诺与南方涛动(ElNi?o-SouthernOscillation,ENSO)循环的联系,及SOTA对大气环流的影响。回顾传统ENSO研究,指出存在的问题,提出了ENSO影响大气研究的新思路,得到以下结果:(1)以SOTA为基本资料的研究发现, ENSO事件有两个模态,主要出现在冬季的第一模态对冬季及夏季亚洲-北太平洋-北美地区上空中高纬大气环流有重要影响,主要出现在夏季的第二模态对该地区上空夏季热带和副热带大气系统有重要作用。(2)ENSO事件通过与ENSO相联系的热带太平洋海面温度异常(ENSO-relatedseasurface temperatureanomaly,RSSTA)对大气的异常热通量输送,强迫Walker环流和Hadley环流变化,导致热带和北太平洋及周边地区上空大气环流异常,进而影响相关地区冬季和夏季的气候。(3)海表面温度异常(seasurfacetemperatureanomaly,SSTA)包含RSSTA和大气异常导致的海温变化(sea temperature anomaly caused by atmospheric anomaly, STA)两部分, RSSTA是ENSO事件过程中海洋内部热动力结构调整导致的海面温度变化,在海洋对大气的热输送过程中,它随ENSO事件演变不断更新;STA是大气受RSSTA海洋异常加热后导致的大气环流异常对海面温度的影响,在海洋浅表层STA对RSSTA有重大影响。本文最后讨论了ENSO事件期间热带海洋对大气热输送过程,指出ENSO事件通过海洋内部热动力结构调整产生RSSTA,它直接对大气异常加热,导致大气环流和气候异常,局地海气之间负反馈过程产生STA,反过来抑制RSSTA。结果还指出,人们常用的SSTA变率实际上主要由秋冬季节RSSTA主导,丢失了春夏季ENSO信息,用SSTA研究ENSO事件存在局限性,这也可能是ENSO事件春季预报障碍的原因之一。 展开更多
关键词 ENSO事件两个模态 海表面温度异常(sea surface temperature anomaly SSTA) 次表层海温异常(subsurface ocean temperature anomaly SOTA) 大气环流异常 海气热通量边界过程
在线阅读 下载PDF
Crustal Tomography Under the Median Tectonic Line in Southwest Japan Using P and PmP data
8
作者 Sandeep Gupta Dapeng Zhao +2 位作者 M.Ikeda S.Ueki S.S.Rai 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期67-67,共1页
The Median Tectonic Line(MTL)is the largest active fault system on the Japan Islands and underlies many densely populated areas.To understand the seismotectonics and to reduce seismic hazard in the MTL region,we deter... The Median Tectonic Line(MTL)is the largest active fault system on the Japan Islands and underlies many densely populated areas.To understand the seismotectonics and to reduce seismic hazard in the MTL region,we determined a detailed 3-D crustal structure under the region using a large number of arrival times of the first P-waves and Moho-reflected waves(PmP).Results of detailed resolution tests show that the addition of PmP data can significantly improve the resolution of the lower crustal structure and the entire crustal structure can be imaged better than that by using P-wave data alone.The 展开更多
关键词 MEDIAN TECTONIC line(MTL) seismic TOMOGRAPHY hazard mitigation low-velocity anomalies fluids
在线阅读 下载PDF
Intrusion detection based on system calls and homogeneous Markov chains 被引量:8
9
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Li Wenfa 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第3期598-605,共8页
A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain ... A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems. 展开更多
关键词 intrusion detection Markov chain anomaly detection system call.
在线阅读 下载PDF
A background refinement method based on local density for hyperspectral anomaly detection 被引量:5
10
作者 ZHAO Chun-hui WANG Xin-peng +1 位作者 YAO Xi-feng TIAN Ming-hua 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第1期84-94,共11页
For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackgr... For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackground.In this work,the local density is measured by its spectral neighbors through a certain radius which is obtained by calculating the mean median of the distance matrix.Further,a two-step segmentation strategy is designed.The first segmentation step divides the original background into two subsets,a large subset composed by background pixels and a small subset containing both background pixels and anomalies.The second segmentation step employing Otsu method with an aim to obtain a discrimination threshold is conducted on the small subset.Then the pixels whose local densities are lower than the threshold are removed.Finally,to validate the effectiveness of the proposed method,it combines Reed-Xiaoli detector and collaborative-representation-based detector to detect anomalies.Experiments are conducted on two real hyperspectral datasets.Results show that the proposed method achieves better detection performance. 展开更多
关键词 hyperspectral imagery anomaly detection background refinement the local density
在线阅读 下载PDF
Calculation and application of full-wave airborne transient electromagnetic data in electromagnetic detection 被引量:3
11
作者 JI Yan-ju ZHU Yu +2 位作者 YU Ming-mei LI Dong-sheng GUAN Shan-shan 《Journal of Central South University》 SCIE EI CAS CSCD 2019年第4期1011-1020,共10页
Airborne electromagnetic transient method enjoys the advantages of high-efficiency and the high resolution of electromagnetic anomalies,especially suitable for mining detection around goaf areas and deep exploration o... Airborne electromagnetic transient method enjoys the advantages of high-efficiency and the high resolution of electromagnetic anomalies,especially suitable for mining detection around goaf areas and deep exploration of minerals.In this paper,we calculated the full-wave airborne transient electromagnetic data,according to the result of numerical research,the advantage of switch-off time response in electromagnetic detection was proofed via experiments.Firstly,based on the full-wave airborne transient electromagnetic system developed by Jilin University(JLU-ATEMI),we proposed a method to compute the full-waveform electromagnetic(EM)data of 3D model using the FDTD approach and convolution algorithm,and verify the calculation by the response of homogenous half-space.Then,through comparison of switch-off-time response and off-time response,we studied the effect of ramp time on anomaly detection.Finally,we arranged two experimental electromagnetic detection,the results indicated that the switch-off-time response can reveal the shallow target more effectively,and the full-waveform airborne electromagnetic system is an effective technique for shallow target detection. 展开更多
关键词 airborne electromagnetic transient method full-waveform FDTD approach convolution algorithm anomaly detection
在线阅读 下载PDF
Detecting network intrusions by data mining and variable-length sequence pattern matching 被引量:2
12
作者 Tian Xinguang Duan Miyi +1 位作者 Sun Chunlai Liu Xin 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第2期405-411,共7页
Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux... Anomaly detection has been an active research topic in the field of network intrusion detection for many years. A novel method is presented for anomaly detection based on system calls into the kernels of Unix or Linux systems. The method uses the data mining technique to model the normal behavior of a privileged program and uses a variable-length pattern matching algorithm to perform the comparison of the current behavior and historic normal behavior, which is more suitable for this problem than the fixed-length pattern matching algorithm proposed by Forrest et al. At the detection stage, the particularity of the audit data is taken into account, and two alternative schemes could be used to distinguish between normalities and intrusions. The method gives attention to both computational efficiency and detection accuracy and is especially applicable for on-line detection. The performance of the method is evaluated using the typical testing data set, and the results show that it is significantly better than the anomaly detection method based on hidden Markov models proposed by Yan et al. and the method based on fixed-length patterns proposed by Forrest and Hofmeyr. The novel method has been applied to practical hosted-based intrusion detection systems and achieved high detection performance. 展开更多
关键词 intrusion detection anomaly detection system call data mining variable-length pattern
在线阅读 下载PDF
An anomaly detection method for spacecraft solar arrays based on the ILS-SVM model 被引量:4
13
作者 WANG Yu ZHANG Tao +1 位作者 HUI Jianjiang LIU Yajie 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2023年第2期515-529,共15页
Solar arrays are important and indispensable parts of spacecraft and provide energy support for spacecraft to operate in orbit and complete on-orbit missions.When a spacecraft is in orbit,because the solar array is ex... Solar arrays are important and indispensable parts of spacecraft and provide energy support for spacecraft to operate in orbit and complete on-orbit missions.When a spacecraft is in orbit,because the solar array is exposed to the harsh space environment,with increasing working time,the performance of its internal electronic components gradually degrade until abnormal damage occurs.This damage makes solar array power generation unable to fully meet the energy demand of a spacecraft.Therefore,timely and accurate detection of solar array anomalies is of great significance for the on-orbit operation and maintenance management of spacecraft.In this paper,we propose an anomaly detection method for spacecraft solar arrays based on the integrated least squares support vector machine(ILS-SVM)model:it selects correlated telemetry data from spacecraft solar arrays to form a training set and extracts n groups of training subsets from this set,then gets n corresponding least squares support vector machine(LS-SVM)submodels by training on these training subsets,respectively;after that,the ILS-SVM model is obtained by integrating these submodels through a weighting operation to increase the prediction accuracy and so on;finally,based on the obtained ILS-SVM model,a parameterfree and unsupervised anomaly determination method is proposed to detect the health status of solar arrays.We use the telemetry data set from a satellite in orbit to carry out experimental verification and find that the proposed method can diagnose solar array anomalies in time and can capture the signs before a solar array anomaly occurs,which reflects the applicability of the method. 展开更多
关键词 spacecraft solar array anomaly detection integrated least squares support vector machine(ILS-SVM) induced ordered weighted average(IOWA)operator integrated model
在线阅读 下载PDF
Novel design concepts for network intrusion systems based on dendritic cells processes 被引量:2
14
作者 RICHARD M R 谭冠政 +1 位作者 ONGALO P N F CHERUIYOT W 《Journal of Central South University》 SCIE EI CAS 2013年第8期2175-2185,共11页
An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are presented. Computationally, this ability is shown to provide a feature reduction mechanism... An abstraction and an investigation to the worth of dendritic cells (DCs) ability to collect, process and present antigens are presented. Computationally, this ability is shown to provide a feature reduction mechanism that could be used to reduce the complexity of a search space, a mechanism for development of highly specialized detector sets as well as a selective mechanism used in directing subsets of detectors to be activated when certain danger signals are present. It is shown that DCs, primed by different danger signals, provide a basis for different anomaly detection pathways. Different antigen-peptides are developed based on different danger signals present, and these peptides are presented to different adaptive layer detectors that correspond to the given danger signal. Experiments are then undertaken that compare current approaches, where a full antigen structure and the whole repertoire of detectors are used, with the proposed approach. Experiment results indicate that such an approach is feasible and can help reduce the complexity of the problem by significant levels. It also improves the efficiency of the system, given that only a subset of detectors are involved during the detection process. Having several different sets of detectors increases the robustness of the resulting system. Detectors developed based on peptides are also highly discriminative, which reduces the false positives rates, making the approach feasible for a real time environment. 展开更多
关键词 artificial immune systems network intrusion detection anomaly detection feature reduction negative selectionalgorithm danger model
在线阅读 下载PDF
Range anomaly suppression based on neighborhood pixels detection in ladar range images 被引量:2
15
作者 Mingbo Zhao Jun He +1 位作者 Zaiqi Lu Qiang Fu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第1期68-75,共8页
Research on the range anomaly suppression algorithm in laser radar (ladar) range images is significant in the application and development of ladar. But most of existing algorithms cannot protect the edge and linear ... Research on the range anomaly suppression algorithm in laser radar (ladar) range images is significant in the application and development of ladar. But most of existing algorithms cannot protect the edge and linear target well while suppressing the range anomaly. Aiming at this problem, the differences among the edge, linear target, and range anomaly are analyzed and a novel algo- rithm based on neighborhood pixels detection is proposed. Firstly, the range differences between current pixel and its neighborhood pixels are calculated. Then, the number of neighborhood pixels is detected by the range difference threshold. Finally, whether the current pixel is a range anomaly is distinguished by the neighbor- hood pixel number threshold. Experimental results show that the new algorithm not only has a better range anomaly suppression performance and higher efficiency, but also protects the edge and linear target preferably compared with other algorithms. 展开更多
关键词 image processing range anomaly suppression neigh-borhood p xe s detection linear target laser radar (ladar).
在线阅读 下载PDF
A method for extracting anomaly map of Au and As using combination of U-statistic and Euclidean distance methods in Susanvar district,Iran
16
作者 Seyyed Saeed Ghannadpour Ardeshir Hezarkhani Mostafa Sharifzadeh 《Journal of Central South University》 SCIE EI CAS CSCD 2017年第11期2693-2704,共12页
Quantitative descriptions of geochemical patterns and providing geochemical anomaly map are important in applied geochemistry. Several statistical methodologies are presented in order to identify and separate geochemi... Quantitative descriptions of geochemical patterns and providing geochemical anomaly map are important in applied geochemistry. Several statistical methodologies are presented in order to identify and separate geochemical anomalies. The U-statistic method is one of the most important structural methods and is a kind of weighted mean that surrounding points of samples are considered in U value determination. However, it is able to separate the different anomalies based on only one variable. The main aim of the presented study is development of this method in a multivariate mode. For this purpose, U-statistic method should be combined with a multivariate method which devotes a new value to each sample based on several variables. Therefore, at the first step, the optimum p is calculated in p-norm distance and then U-statistic method is applied on p-norm distance values of the samples because p-norm distance is calculated based on several variables. This method is a combination of efficient U-statistic method and p-norm distance and is used for the first time in this research. Results show that p-norm distance of p=2(Euclidean distance) in the case of a fact that Au and As can be considered optimized p-norm distance with the lowest error. The samples indicated by the combination of these methods as anomalous are more regular, less dispersed and more accurate than using just the U-statistic or other nonstructural methods such as Mahalanobis distance. Also it was observed that the combination results are closely associated with the defined Au ore indication within the studied area. Finally, univariate and bivariate geochemical anomaly maps are provided for Au and As, which have been respectively prepared using U-statistic and its combination with Euclidean distance method. 展开更多
关键词 mineral ANOMALY Susanvar DISTRICT U-STATISTIC METHOD Euclidean distance BIVARIATE ANOMALY MAP
在线阅读 下载PDF
外刊题录
17
《石油地球物理勘探》 EI CSCD 北大核心 1991年第5期671-671,共1页
关键词 STRIKE gravity ANOMALY RESISTIVITY inversion PRIDE terrain wavelet BOREHOLE Israel
在线阅读 下载PDF
FOREWORD
18
作者 President of Ocean University of Qingdao Professor Guan Huashi 《中国海洋大学学报(自然科学版)》 CAS CSCD 1993年第S2期6-7,共2页
It has been confirmed that climatic anomaly influenced human life and production andeven causes disasters. With the economic activity developing in the world,the influence isbecoming more and more greater.Scientists h... It has been confirmed that climatic anomaly influenced human life and production andeven causes disasters. With the economic activity developing in the world,the influence isbecoming more and more greater.Scientists have long been devoting themselves to the studyof the cause of climatic anomaly. Now they distinctly attribute the cause to the ocean,where life originated from.Numerous observatons have confirmed that El Nino,known 展开更多
关键词 CLIMATIC ANOMALY OCEAN distinctly originated WCRP FOREWORD themselves floods EARLIER
在线阅读 下载PDF
外刊题录
19
《石油地球物理勘探》 EI CSCD 北大核心 1991年第3期406-407,共2页
关键词 migration interpretation shallow FILLING gravity BOREHOLE ANOMALY WAVEFRONT inversion MAGNETIZATION
在线阅读 下载PDF
Nature of the Crust Below the Achankovil Shear Zone,India Based on Gravity Data
20
作者 Niraj Kumar A.P.Singh B.Singh 《地学前缘》 EI CAS CSCD 北大核心 2009年第S1期200-201,共2页
Evolutionary history of continents and supercontinents, and their implications on solid earth processes, require an understanding of the growth of the continental crust through time and space.Suture zones are the remn... Evolutionary history of continents and supercontinents, and their implications on solid earth processes, require an understanding of the growth of the continental crust through time and space.Suture zones are the remnant regions inherited by Proterozoic tectonics between amalgamated terranes and the long-lived shear systems are commonly assumed to represent such boundaries.One such often debated is the 展开更多
关键词 SOUTHERN GRANULITE TERRANE Achankovil shear zone TERRANE boundary gravity ANOMALY intracratonic litho-tectonic feature
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部