HTM Algorithm Detail (image) Krause Taylor Associates Share Print E-Mail Caption A) This is a block diagram outline of the primary steps used to create an anomaly detection system based on HTM. B) This shows a breakdown of the core algorithm components within an HTM system. Credit Numenta Inc. Usage Restrictions Credit to Numenta Inc. Share Print E-Mail Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system.