Results 71 to 80 of about 225,629 (280)

Fast Outlier Detection Using a Grid-Based Algorithm. [PDF]

open access: yesPLoS ONE, 2016
As one of data mining techniques, outlier detection aims to discover outlying observations that deviate substantially from the reminder of the data. Recently, the Local Outlier Factor (LOF) algorithm has been successfully applied to outlier detection ...
Jihwan Lee, Nam-Wook Cho
doaj   +1 more source

Towards Real-Time Detection and Tracking of Spatio-Temporal Features: Blob-Filaments in Fusion Plasma

open access: yes, 2016
A novel algorithm and implementation of real-time identification and tracking of blob-filaments in fusion reactor data is presented. Similar spatio-temporal features are important in many other applications, for example, ignition kernels in combustion ...
Chang, Cs   +7 more
core   +1 more source

Normal‐Appearing White Matter Injury Mediates Chronic Deep Venous Hypoxia and Disease Progression in Multiple Sclerosis

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Objective To explore how cerebral hypoxia and Normal‐Appearing White Matter (NAWM) integrity affect MS lesion burden and clinical course. Methods Seventy‐nine MS patients, including 13 clinically isolated syndrome (CIS) patients and 66 relapsing–remitting multiple sclerosis (RRMS) patients, and 44 healthy controls (HCs) were recruited from ...
Xinli Wang   +8 more
wiley   +1 more source

Onboard Robust Visual Tracking for UAVs Using a Reliable Global-Local Object Model

open access: yesSensors, 2016
In this paper, we present a novel onboard robust visual algorithm for long-term arbitrary 2D and 3D object tracking using a reliable global-local object model for unmanned aerial vehicle (UAV) applications, e.g., autonomous tracking and chasing a moving ...
Changhong Fu   +3 more
doaj   +1 more source

Crowdsourced correlation clustering with relative distance comparisons

open access: yes, 2017
Crowdsourced, or human computation based clustering algorithms usually rely on relative distance comparisons, as these are easier to elicit from human workers than absolute distance information.
Ukkonen, Antti
core   +1 more source

Characterization of Defect Distribution in an Additively Manufactured AlSi10Mg as a Function of Processing Parameters and Correlations with Extreme Value Statistics

open access: yesAdvanced Engineering Materials, EarlyView.
Predicting extreme defects in additive manufacturing remains a key challenge limiting its structural reliability. This study proposes a statistical framework that integrates Extreme Value Theory with advanced process indicators to explore defect–process relationships and improve the estimation of critical defect sizes. The approach provides a basis for
Muhammad Muteeb Butt   +8 more
wiley   +1 more source

Detection of subtle white matter lesions in MRI through texture feature extraction and boundary delineation using an embedded clustering strategy

open access: yesScientific Reports, 2022
White matter lesions (WML) underlie multiple brain disorders, and automatic WML segmentation is crucial to evaluate the natural disease course and effectiveness of clinical interventions, including drug discovery.
Kokhaur Ong   +9 more
doaj   +1 more source

An Outlier Detection Algorithm Based on Local Density Feedback Outlier Factor

open access: yes
Abstract Neighborhood similarity assumes that adjacent objects should exhibit similar characteristics. To address the issue that previous density-based algorithms neglected neighborhood similarity and global information, resulting in low accuracy for outlier detection, we propose an outlier detection algorithm based on local density feedback ...
Zhongping Zhang   +3 more
openaire   +1 more source

A Workflow to Accelerate Microstructure‐Sensitive Fatigue Life Predictions

open access: yesAdvanced Engineering Materials, EarlyView.
This study introduces a workflow to accelerate predictions of microstructure‐sensitive fatigue life. Results from frameworks with varying levels of simplification are benchmarked against published reference results. The analysis reveals a trade‐off between accuracy and model complexity, offering researchers a practical guide for selecting the optimal ...
Luca Loiodice   +2 more
wiley   +1 more source

Local outlier factor use for the network flow anomaly detection

open access: yesSecurity and Communication Networks, 2015
AbstractInternet users and computer networks constantly suffer from increasing number of cyberattacks. During the process of seeking how to reduce the risk and possible consequences of the attacks, it is very important to identify the attacks at the initial stage of their realization.
Nerijus Paulauskas   +1 more
openaire   +1 more source

Home - About - Disclaimer - Privacy