نتایج جستجو برای: local outlier factor
تعداد نتایج: 1352534 فیلتر نتایج به سال:
A spatial outlier is a spatial referenced object whose non-spatial attribute values are significantly different from those of other spatially referenced objects in its spatial neighborhood. It represents locations that are significantly different from their neighborhoods even though they may not be significantly different from the entire population. Here we adopt this definition to spatio-tempo...
Understanding adaptive genetic variation and its relation to environmental factors are important for understanding how plants adapt to climate change and for managing genetic resources. Genome scans for the loci exhibiting either notably high or low levels of population differentiation (outlier loci) provide one means of identifying genomic regions possibly associated with convergent or diverge...
This paper presents an application of a local density based outlier detection method in compliance in the context of public health service management. Public health systems have consumed a significant portion of many governments’ expenditure. Thus, it is important to ensure the money is spent appropriately. In this research, we studied the potentials of applying an outlier detection method to m...
By analyzing an oblique ionogram several characteristics, such as LOF, MOF, FMUF, FHLOF, FLLOF, and 2FMOF, can be found. These characteristics are important both for ionospheric studies and for terrestrial communication purposes, as they give information about the sky wave communication conditions in the High Frequency (HF) radio spectrum. A RCS-5B sweeping HF receiver for oblique sounding was ...
In the existing ellipse fitting algorithms, Lissajous figure is used to solve demodulation error caused by non-ideal 3×3 couplers. However, influence of circuit noise and phase on are not fully considered in studies. this work, an method based local outlier factor (LOF) algorithm proposed, which can effectively eliminate points noises. The proposed proves achieve accurate signals numerical simu...
The network intrusion is becoming a big threat for a lot of companies, organization and so on. Recent intrusions are becoming more clever and difficult to detect. Many of today’s intrusion detection systems are based on signature-based. They have good performance for known attacks, but theoretically they are not able to detect unknown attacks. On the other hand, an anomaly detection system can ...
Virtual machines (VM) offer simple and practical mechanisms to address many of the manageability problems of leveraging heterogeneous computing resources. VM live migration is an important feature of virtualization in cloud computing: it allows administrators to transparently tune the performance of the computing infrastructure. However, VM live migration may open the door to security threats. ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید