Results 81 to 90 of about 5,201 (163)

Detection of High-level PM<SUB>2.5</SUB> Occurrences Applying Local Outlier Factor (LOF) Algorithm

open access: yesJournal of Korean Society for Atmospheric Environment, 2021
Yongchan Lee, Yongbum Kwon, Heekwan Lee
openaire   +1 more source

Trust-Based Fusion of Untrustworthy Information in Crowdsourcing Applications

open access: yes, 2013
In this paper, we address the problem of fusing untrustworthy reports provided from a crowd of observers, while simultaneously learning the trustworthiness of individuals.
Jennings, N. R.   +2 more
core  

An Automated Geographical Information System-Based Spatial Machine Learning Method for Leak Detection in Water Distribution Networks (WDNs) Using Monitoring Sensors

open access: yesApplied Sciences
Pipe leakage in water distribution networks (WDNs) has been an emerging concern for water utilities worldwide due to its public health and economic significance. Not only does it cause significant water losses, but it also deteriorates the quality of the
Doha Elshazly   +5 more
doaj   +1 more source

Adaptive threshold based outlier detection on IoT sensor data: A node-level perspective

open access: yesAlexandria Engineering Journal
The accuracy and reliability of IoT-based sensor networks depend on validating sensed data, including detecting outliers at the node level. This study proposes an online outlier detection approach using Multiple Linear Regression-based adaptive ...
M. Veera Brahmam, S. Gopikrishnan
doaj   +1 more source

Toll Fraud Detection of VoIP Service Networks in Ubiquitous Computing Environments

open access: yesInternational Journal of Distributed Sensor Networks, 2015
Voice over Internet Protocol (VoIP) is an emerging communication service that has advanced in ubiquitous computing environments. Although VoIP is inexpensive and offers additional services, there has been little provision for attacks at the weak points ...
Kyung-Il Kim   +3 more
doaj   +1 more source

Outlier Ensemble Based on Isolation Forest: The CBOEA Approach

open access: yesFoundations of Computing and Decision Sciences
Outliers are instances that deviate from the norm. In certain fields, their detection is crucial since they are often indicators of interesting events such as system faults and deliberate human actions.
Chaabouni Ali, Boujelben Mohamed Ayman
doaj   +1 more source

How to Evaluate the Quality of Unsupervised Anomaly Detection Algorithms?

open access: yes, 2016
When sufficient labeled data are available, classical criteria based on Receiver Operating Characteristic (ROC) or Precision-Recall (PR) curves can be used to compare the performance of un-supervised anomaly detection algorithms.
Goix, Nicolas
core  

Big Data Cleaning Based on Improved CLOF and Random Forest for Distribution Networks

open access: yesCSEE Journal of Power and Energy Systems
In order to improve the data quality, the big data cleaning method for distribution networks is studied in this paper. First, the Local Outlier Factor (LOF) algorithm based on DBSCAN clustering is used to detect outliers.
Jie Liu   +4 more
doaj   +1 more source

Search for anomalous quartic gauge couplings in the process $\mu^+\mu^-\to \bar{\nu}\nu\gamma\gamma$ with a nested local outlier factor

open access: yesSciPost Physics Core
In recent years, with the increasing luminosities of colliders, handling the growing amount of data has become a major challenge for future new physics (NP) phenomenological research.
Ke-Xin Chen, Yu-Chen Guo, Ji-Chong Yang
doaj   +1 more source

A big data based flow anomaly detection mechanism of electric power information network

open access: yesDianxin kexue, 2017
With the construction of smart grid, the electric power information network and its business system get rapid development. The early flow anomaly detection and warning are significant to the safety of network. Due to the lack of efficient measuring means
Honghong JIANG   +5 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy