Results 41 to 50 of about 2,419,123 (314)

Condition monitoring method for marine engine room equipment based on machine learning

open access: yesZhongguo Jianchuan Yanjiu, 2021
ObjectivesIn order to realize the intelligent condition monitoring of marine engine room equipment, machine learning algorithms are introduced and a condition monitoring method based on manifold learning and an isolation forest is proposed.MethodsAs ...
Ruihan WANG, Hui CHEN, Cong GUAN
doaj   +1 more source

In-Vehicle CAN Bus Tampering Attacks Detection for Connected and Autonomous Vehicles Using an Improved Isolation Forest Method

open access: yesIEEE transactions on intelligent transportation systems (Print), 2023
The development and applications of mobile communication technologies in intelligent autonomous transportation systems have led to an extraordinary rise in the mount of connected and autonomous vehicles (CAVs).
Xuting Duan   +5 more
semanticscholar   +1 more source

Evaluating the impact of Hymenoscyphus fraxineus in Trentino (Alps, Northern Italy): first investigations [PDF]

open access: yes, 2017
The spread of Hymenoscyphus fraxineus has been causing great concern regarding the survival of European ash (Fraxinus excelsior) throughout Europe since the 1990s.
Dal Maso, E   +4 more
core   +3 more sources

Quality control algorithm of wind speed monitoring data along high-speed railway

open access: yesFrontiers in Energy Research, 2023
For studying the traffic safety of the high-speed railway, this research considers high-quality second-level wind speed data as its basis. However, the quality of second-level wind speed data can be greatly lowered by disturbances during data collection ...
Yunfei Ye   +3 more
doaj   +1 more source

Identification of Spoofing Ships from Automatic Identification System Data via Trajectory Segmentation and Isolation Forest

open access: yesJournal of Marine Science and Engineering, 2023
Outliers of ship trajectory from the Automatic Identification System (AIS) onboard a ship will affect the accuracy of maritime situation awareness, especially for a regular ship trajectory mixed with a spoofing ship, which has an unauthorized Maritime ...
Hailin Zheng   +5 more
doaj   +1 more source

Functional Isolation Forest

open access: yes, 2019
For the purpose of monitoring the behavior of complex infrastructures (e.g. aircrafts, transport or energy networks), high-rate sensors are deployed to capture multivariate data, generally unlabeled, in quasi continuous-time to detect quickly the occurrence of anomalies that may jeopardize the smooth operation of the system of interest. The statistical
Staerman, Guillaume   +3 more
openaire   +2 more sources

Predators do not spill over from forest fragments to maize fields in a landscape mosaic in central Argentina [PDF]

open access: yes, 2017
South America is undergoing a rapid and large scale conversion of natural habitats to cultivated land. Ecosystem services (ESs) still remain important but their level and sustainability are not known.
Ferrante, Marco   +2 more
core   +1 more source

Evaluating the Performance of SVM, Isolation Forest, and DBSCAN for Anomaly Detection

open access: yesITM Web of Conferences
With the advancement of computer technologies, various data models and algorithms have been integrated into industrial processes, significantly improving the efficiency of anomaly detection in datasets while reducing time and energy consumption ...
Haowen Lu
semanticscholar   +1 more source

Extending Seqenv: a taxa-centric approach to environmental annotations of 16S rDNA sequences [PDF]

open access: yes, 2017
Understanding how the environment selects a given taxon and the diversity patterns that emerge as a result of environmental filtering can dramatically improve our ability to analyse any environment in depth as well as advancing our knowledge on how the ...
Hamonts, Kelly   +4 more
core   +3 more sources

A Heuristic Approach Using Template Miners for Error Prediction in Telecommunication Networks

open access: yesIEEE Access, 2022
With the appearance of large-scale systems, the size of the generated logs increased rapidly. Almost every software produces such files. Log files contain runtime information of the software, as well as indicate noteworthy events or suspicious behaviors ...
Peter Marjai   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy