Results 81 to 90 of about 5,201 (163)
Detection of High-level PM<SUB>2.5</SUB> Occurrences Applying Local Outlier Factor (LOF) Algorithm
Yongchan Lee, Yongbum Kwon, Heekwan Lee
openaire +1 more source
Trust-Based Fusion of Untrustworthy Information in Crowdsourcing Applications
In this paper, we address the problem of fusing untrustworthy reports provided from a crowd of observers, while simultaneously learning the trustworthiness of individuals.
Jennings, N. R. +2 more
core
Pipe leakage in water distribution networks (WDNs) has been an emerging concern for water utilities worldwide due to its public health and economic significance. Not only does it cause significant water losses, but it also deteriorates the quality of the
Doha Elshazly +5 more
doaj +1 more source
Adaptive threshold based outlier detection on IoT sensor data: A node-level perspective
The accuracy and reliability of IoT-based sensor networks depend on validating sensed data, including detecting outliers at the node level. This study proposes an online outlier detection approach using Multiple Linear Regression-based adaptive ...
M. Veera Brahmam, S. Gopikrishnan
doaj +1 more source
Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments
Voice over Internet Protocol (VoIP) is an emerging communication service that has advanced in ubiquitous computing environments. Although VoIP is inexpensive and offers additional services, there has been little provision for attacks at the weak points ...
Kyung-Il Kim +3 more
doaj +1 more source
Outlier Ensemble Based on Isolation Forest: The CBOEA Approach
Outliers are instances that deviate from the norm. In certain fields, their detection is crucial since they are often indicators of interesting events such as system faults and deliberate human actions.
Chaabouni Ali, Boujelben Mohamed Ayman
doaj +1 more source
How to Evaluate the Quality of Unsupervised Anomaly Detection Algorithms?
When sufficient labeled data are available, classical criteria based on Receiver Operating Characteristic (ROC) or Precision-Recall (PR) curves can be used to compare the performance of un-supervised anomaly detection algorithms.
Goix, Nicolas
core
Big Data Cleaning Based on Improved CLOF and Random Forest for Distribution Networks
In order to improve the data quality, the big data cleaning method for distribution networks is studied in this paper. First, the Local Outlier Factor (LOF) algorithm based on DBSCAN clustering is used to detect outliers.
Jie Liu +4 more
doaj +1 more source
In recent years, with the increasing luminosities of colliders, handling the growing amount of data has become a major challenge for future new physics (NP) phenomenological research.
Ke-Xin Chen, Yu-Chen Guo, Ji-Chong Yang
doaj +1 more source
A big data based flow anomaly detection mechanism of electric power information network
With the construction of smart grid, the electric power information network and its business system get rapid development. The early flow anomaly detection and warning are significant to the safety of network. Due to the lack of efficient measuring means
Honghong JIANG +5 more
doaj +2 more sources

