Results 61 to 70 of about 98,857 (165)

Anomaly detection using unsupervised machine learning algorithms: A simulation study

open access: yesScientific African
This study presents a comprehensive evaluation of five prominent unsupervised machine learning anomaly detection algorithms: One-Class Support Vector Machine (One-Class SVM), One-Class SVM with Stochastic Gradient Descent (SGD), Isolation Forest (iForest)
Edmund Fosu Agyemang
doaj   +1 more source

Outlier Ensemble Based on Isolation Forest: The CBOEA Approach

open access: yesFoundations of Computing and Decision Sciences
Outliers are instances that deviate from the norm. In certain fields, their detection is crucial since they are often indicators of interesting events such as system faults and deliberate human actions.
Chaabouni Ali, Boujelben Mohamed Ayman
doaj   +1 more source

A big data based flow anomaly detection mechanism of electric power information network

open access: yesDianxin kexue, 2017
With the construction of smart grid, the electric power information network and its business system get rapid development. The early flow anomaly detection and warning are significant to the safety of network. Due to the lack of efficient measuring means
Honghong JIANG   +5 more
doaj   +2 more sources

Parallel reservoir computing based signal outlier detection and recovery method for structural health monitoring

open access: yesDevelopments in the Built Environment
The presence of outliers in signals collected by structural health monitoring systems, caused by sensor failure, equipment malfunction, or transmission interruption, can lead to misjudgments of a structure's working status and damage degree.
Yan-Ke Tan   +3 more
doaj   +1 more source

Software defined network and graph neural network-based anomaly detection scheme for high speed networks

open access: yesCyber Security and Applications
In recent years, the proliferation of Software-Defined Networking (SDN) has revolutionized network management and operation. However, with SDN’s increased connectivity and dynamic nature, security threats like Denial-of-Service (DoS) attacks have also ...
Archan Dadhania   +6 more
doaj   +1 more source

Research on Inconsistency Evaluation of Retired Battery Systems in Real-World Vehicles

open access: yesBatteries
Inconsistency is a key factor triggering safety problems in battery packs. The inconsistency evaluation of retired batteries is of great significance to ensure the safe and stable operation of batteries during subsequent gradual use. This paper summaries
Jiegang Wang   +5 more
doaj   +1 more source

A Fine-Scale and Highly Reliable Ground and Canopy Top Extraction Method Using ICESat-2 Data

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
The ice, cloud, and land elevation satellite-2 (ICESat-2) is equipped with an advanced topographic laser altimeter system (ATLAS) that obtains small spots and high-density photon data.
Jingxin Chang   +3 more
doaj   +1 more source

A Novel Approach Utilizing Bagging, Histogram Gradient Boosting, and Advanced Feature Selection for Predicting the Onset of Cardiovascular Diseases

open access: yesMathematics
Cardiovascular diseases (CVDs) rank among the leading global causes of mortality, underscoring the necessity for early detection and effective management.
Norma Latif Fitriyani   +7 more
doaj   +1 more source

Identifying Tampered Radio-Frequency Transmissions in LoRa Networks Using Machine Learning

open access: yesSensors
Long-range networks, renowned for their long-range, low-power communication capabilities, form the backbone of many Internet of Things systems, enabling efficient and reliable data transmission.
Nurettin Selcuk Senol   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy