期刊文献+
共找到157篇文章
< 1 2 8 >
每页显示 20 50 100
Weighted Voting Ensemble Model Integrated with IoT for Detecting Security Threats in Satellite Systems and Aerial Vehicles
1
作者 Raed Alharthi 《Journal of Computer and Communications》 2025年第2期250-281,共32页
Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptibl... Small-drone technology has opened a range of new applications for aerial transportation. These drones leverage the Internet of Things (IoT) to offer cross-location services for navigation. However, they are susceptible to security and privacy threats due to hardware and architectural issues. Although small drones hold promise for expansion in both civil and defense sectors, they have safety, security, and privacy threats. Addressing these challenges is crucial to maintaining the security and uninterrupted operations of these drones. In this regard, this study investigates security, and preservation concerning both the drones and Internet of Drones (IoD), emphasizing the significance of creating drone networks that are secure and can robustly withstand interceptions and intrusions. The proposed framework incorporates a weighted voting ensemble model comprising three convolutional neural network (CNN) models to enhance intrusion detection within the network. The employed CNNs are customized 1D models optimized to obtain better performance. The output from these CNNs is voted using a weighted criterion using a 0.4, 0.3, and 0.3 ratio for three CNNs, respectively. Experiments involve using multiple benchmark datasets, achieving an impressive accuracy of up to 99.89% on drone data. The proposed model shows promising results concerning precision, recall, and F1 as indicated by their obtained values of 99.92%, 99.98%, and 99.97%, respectively. Furthermore, cross-validation and performance comparison with existing works is also carried out. Findings indicate that the proposed approach offers a prospective solution for detecting security threats for aerial systems and satellite systems with high accuracy. 展开更多
关键词 Intrusion Detection Cyber-Physical Systems Drone Security Weighted Ensemble voting Unmanned Vehicles Security Strategies
在线阅读 下载PDF
基于voting集成的智能电能表故障多分类方法
2
作者 肖宇 黄瑞 +3 位作者 刘谋海 刘小平 袁明 高云鹏 《电测与仪表》 北大核心 2024年第7期197-203,共7页
为提升智能电能表故障准确分类能力,助力维护人员迅速排除故障,提出基于投票法voting集成的智能电能表故障多分类方法。针对实际智能电能表故障数据进行编码预处理,基于皮尔逊系数法筛选智能电能表故障分类关键影响因素,结合合成少数类... 为提升智能电能表故障准确分类能力,助力维护人员迅速排除故障,提出基于投票法voting集成的智能电能表故障多分类方法。针对实际智能电能表故障数据进行编码预处理,基于皮尔逊系数法筛选智能电能表故障分类关键影响因素,结合合成少数类过采样技术(synthetic minority oversampling technique, SMOTE)算法解决数据类别不平衡问题,由此建立模型所需数据集,再通过投票法进行模型融合,结合粒子群PSO(particle swarm optimization)确定各基模型的权重,据此构建基于极限梯度提升树(extreme gradient boosting trees, XGBT)、K近邻(k-nearest neighbor, KNN)和朴素贝叶斯(naive bayes, NB)模型的智能电能表故障多分类方法。实测实验结果表明:所提出方法能有效实现智能电能表的故障快速准确分类,与现有方法相比,在智能电能表的故障分类精确率、召回率及F1-Score均有明显提升。 展开更多
关键词 智能电能表 故障分类 voting集成 粒子群寻优 多分类
在线阅读 下载PDF
Density Clustering Algorithm Based on KD-Tree and Voting Rules
3
作者 Hui Du Zhiyuan Hu +1 位作者 Depeng Lu Jingrui Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期3239-3259,共21页
Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets withuneven density. Additionally, they incur substantial computational costs when applied to high-dimensional... Traditional clustering algorithms often struggle to produce satisfactory results when dealing with datasets withuneven density. Additionally, they incur substantial computational costs when applied to high-dimensional datadue to calculating similarity matrices. To alleviate these issues, we employ the KD-Tree to partition the dataset andcompute the K-nearest neighbors (KNN) density for each point, thereby avoiding the computation of similaritymatrices. Moreover, we apply the rules of voting elections, treating each data point as a voter and casting a votefor the point with the highest density among its KNN. By utilizing the vote counts of each point, we develop thestrategy for classifying noise points and potential cluster centers, allowing the algorithm to identify clusters withuneven density and complex shapes. Additionally, we define the concept of “adhesive points” between two clustersto merge adjacent clusters that have similar densities. This process helps us identify the optimal number of clustersautomatically. Experimental results indicate that our algorithm not only improves the efficiency of clustering butalso increases its accuracy. 展开更多
关键词 Density peaks clustering KD-TREE K-nearest neighbors voting rules
在线阅读 下载PDF
Multi-Candidate Voting Model Based on Blockchain 被引量:3
4
作者 Dongliang Xu Wei Shi +1 位作者 Wensheng Zhai Zhihong Tian 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2021年第12期1891-1900,共10页
Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as i... Electronic voting has partially solved the problems of poor anonymity and low efficiency associated with traditional voting.However,the difficulties it introduces into the supervision of the vote counting,as well as its need for a concurrent guaranteed trusted third party,should not be overlooked.With the advent of blockchain technology in recent years,its features such as decentralization,anonymity,and non-tampering have made it a good candidate in solving the problems that electronic voting faces.In this study,we propose a multi-candidate voting model based on the blockchain technology.With the introduction of an asymmetric encryption and an anonymity-preserving voting algorithm,votes can be counted without relying on a third party,and the voting results can be displayed in real time in a manner that satisfies various levels of voting security and privacy requirements.Experimental results show that the proposed model solves the aforementioned problems of electronic voting without significant negative impact from an increasing number of voters or candidates. 展开更多
关键词 Blockchain multi-candidate voting model voting voting anonymity confusion algorithm
在线阅读 下载PDF
基于Tensor Voting的蚁蛉翅脉修补 被引量:9
5
作者 左西年 刘来福 +1 位作者 王心丽 沈佐锐 《北京师范大学学报(自然科学版)》 CAS CSCD 北大核心 2005年第2期135-138,共4页
针对蚁蛉模式识别中蚁蛉翅脉断裂问题,利用Tensor Voting技术修补其数字照片中断裂的翅脉;展示将其应用于蚁蛉模式识别前期处理,以获取主要翅脉尽量完整信息的算法;数值实验中采用3种蚁蛉翅的图像作为测试,收到了很好的结果.
关键词 蚁蛉 模式识别 TENSOR voting 翅脉修补
在线阅读 下载PDF
应用Voting Machine构建研究型、互动型的双语物理课堂的研究与实践 被引量:2
6
作者 张勇 恽瑛 +1 位作者 朱明 周雨青 《大学物理》 北大核心 2008年第2期54-57,共4页
高等教育"质量工程"的实施为高等学校本科教学提出了更新、更高的要求和挑战.本文报道了应用Voting Machine这一具有强大的互动和统计功能的教学设备在双语物理课堂上开展研究型、互动型教学的实践和研究成果.
关键词 voting MACHINE 双语物理 课堂教学模式
在线阅读 下载PDF
Superior vs. Inferior Voting Shares: Price Premium or Discount?
7
作者 Yan He Junbo Wang Chunchi Wu 《Journal of Modern Accounting and Auditing》 2016年第6期306-318,共13页
This paper analyzes the price difference between superior voting (SV) and inferior voting (IV) shares for three dual-class firms: Farmer Mac as a big price discount case, Fox as a price similarity case, and Heico... This paper analyzes the price difference between superior voting (SV) and inferior voting (IV) shares for three dual-class firms: Farmer Mac as a big price discount case, Fox as a price similarity case, and Heico as a big price premium case. We show that the price difference is mainly affected by the control benefit, while voting power and liquidity are also relevant factors. We suggest that the control benefit can be revealed by examining share accumulation and firm performance. 展开更多
关键词 superior voting (SV) inferior voting (IV) price premium price discount dual classes
在线阅读 下载PDF
Preventing Phishing Attack on Voting System Using Visual Cryptography
8
作者 Ahood Alotaibi Lama Alhubaidi +3 位作者 Alghala Alyami Leena Marghalani Bashayer Alharbi Naya Nagy 《Journal of Computer and Communications》 2022年第10期149-161,共13页
Phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techni... Phishing is one of the most common social engineering attacks that users over the internet fall for. An example is voting systems, and because such systems should be accurate and error free, phishing prevention techniques are crucial. Visual Cryptography (VC) is utilized for efficient voting system authentication to cast votes. VC is one of the most secure approaches for privacy protection as it ensures the confidentiality of the voting system. This paper discusses proposed phishing prevention methods and compares different proposed methods. 展开更多
关键词 Remote voting System (RVS) voting System (VS) SHARES Ballots AUTHENTICATION Visual Cryptography PHISHING CAPTCHA
在线阅读 下载PDF
物理课堂教学评价的一种先进工具———Voting Machine评价系统介绍 被引量:1
9
作者 黄义平 李晓芬 鲁增贤 《物理教学探讨(中学教学教研版)》 2007年第1期53-56,共4页
本文介绍美国俄亥俄州立大学研制的Voting Machine教学评价系统,详细论述了该教学评价系统的组成和安装、师生使用方法以及系统的理论依据。
关键词 教学评价 voting MACHINE 安装 理论 应用
在线阅读 下载PDF
Dynamic weighted voting for multiple classifier fusion:a generalized rough set method 被引量:9
10
作者 Sun Liang Han Chongzhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第3期487-494,共8页
To improve the performance of multiple classifier system, a knowledge discovery based dynamic weighted voting (KD-DWV) is proposed based on knowledge discovery. In the method, all base classifiers may be allowed to ... To improve the performance of multiple classifier system, a knowledge discovery based dynamic weighted voting (KD-DWV) is proposed based on knowledge discovery. In the method, all base classifiers may be allowed to operate in different measurement/feature spaces to make the most of diverse classification information. The weights assigned to each output of a base classifier are estimated by the separability of training sample sets in relevant feature space. For this purpose, some decision tables (DTs) are established in terms of the diverse feature sets. And then the uncertainty measures of the separability are induced, in the form of mass functions in Dempster-Shafer theory (DST), from each DTs based on generalized rough set model. From the mass functions, all the weights are calculated by a modified heuristic fusion function and assigned dynamically to each classifier varying with its output. The comparison experiment is performed on the hyperspectral remote sensing images. And the experimental results show that the performance of the classification can be improved by using the proposed method compared with the plurality voting (PV). 展开更多
关键词 multiple classifier fusion dynamic weighted voting generalized rough set hyperspectral.
在线阅读 下载PDF
Constrained voting extreme learning machine and its application 被引量:5
11
作者 MIN Mengcan CHEN Xiaofang XIE Yongfang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2021年第1期209-219,共11页
Extreme learning machine(ELM)has been proved to be an effective pattern classification and regression learning mechanism by researchers.However,its good performance is based on a large number of hidden layer nodes.Wit... Extreme learning machine(ELM)has been proved to be an effective pattern classification and regression learning mechanism by researchers.However,its good performance is based on a large number of hidden layer nodes.With the increase of the nodes in the hidden layers,the computation cost is greatly increased.In this paper,we propose a novel algorithm,named constrained voting extreme learning machine(CV-ELM).Compared with the traditional ELM,the CV-ELM determines the input weight and bias based on the differences of between-class samples.At the same time,to improve the accuracy of the proposed method,the voting selection is introduced.The proposed method is evaluated on public benchmark datasets.The experimental results show that the proposed algorithm is superior to the original ELM algorithm.Further,we apply the CV-ELM to the classification of superheat degree(SD)state in the aluminum electrolysis industry,and the recognition accuracy rate reaches87.4%,and the experimental results demonstrate that the proposed method is more robust than the existing state-of-the-art identification methods. 展开更多
关键词 extreme learning machine(ELM) majority voting ensemble method sample based learning superheat degree(SD)
在线阅读 下载PDF
Improved PBFT protocol based on phase voting and threshold signature 被引量:2
12
作者 Chen Liquan Hu Jie Gu Pengpeng 《Journal of Southeast University(English Edition)》 EI CAS 2022年第3期213-218,共6页
The communication complexity of the practical byzantine fault tolerance(PBFT)protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT(PV-PBFT).As most communicat... The communication complexity of the practical byzantine fault tolerance(PBFT)protocol is reduced with the threshold signature technique applied to the consensus process by phase voting PBFT(PV-PBFT).As most communication occurs between the primary node and replica nodes in PV-PVFT,consistency verification is accomplished through threshold signatures,multi-PV,and multiple consensus.The view replacement protocol introduces node weights to influence the election of a primary node,reducing the probability of the same node being elected primary multiple times.The experimental results of consensus algorithms show that compared to PBFT,the communication overhead of PV-PBFT decreases by approximately 90% with nearly one-time improvement in the throughput relative and approximately 2/3 consensus latency,lower than that of the scalable hierarchical byzantine fault tolerance.The communication complexity of the PBFT is O(N^(2)),whereas that of PV-PBFT is only O(N),which implies the significant improvement of the operational efficiency of the blockchain system. 展开更多
关键词 blockchain practical byzantine fault tolerance(PBFT) threshold signature phase voting
在线阅读 下载PDF
Anonymous voting for multi-dimensional CV quantum system 被引量:1
13
作者 施荣华 肖伊 +2 位作者 石金晶 郭迎 Moon-Ho Lee 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第6期78-84,共7页
We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security... We investigate the design of anonymous voting protocols,CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables(CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy.The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission,which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states.It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security,especially in large-scale votes. 展开更多
关键词 quantum cryptography anonymous voting quantum entangled state continuous variable
在线阅读 下载PDF
A Secure Anonymous Internet Electronic Voting Scheme Based on the Polynomial 被引量:1
14
作者 CAO Feng CAO Zhenfu 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1777-1780,共4页
In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not ne... In this paper, we use the polynomial function and Chaum's RSA (Rivest, Shamir, Adleman) blind signature scheme to construct a secure anonymous internet electronic voting scheme. In our scheme, each vote does not need to be revealed in the tallying phase. The ballot number of each candidate gets is counted by computing the degrees of two polynomials' greatest common divisor. Our scheme does not require a special voting channel and communication can occur entirely over the current internet. 展开更多
关键词 electronic voting blind signature RSA(Rivest Sharrtir Adleman) polynomial function
在线阅读 下载PDF
A random forest algorithm based on similarity measure and dynamic weighted voting 被引量:1
15
作者 ZHAO Shu-xu MA Qin-jing LIU Li-jiao 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2019年第3期277-284,共8页
The random forest model is universal and easy to understand, which is often used for classification and prediction. However, it uses non-selective integration and the majority rule to judge the final result, thus the ... The random forest model is universal and easy to understand, which is often used for classification and prediction. However, it uses non-selective integration and the majority rule to judge the final result, thus the difference between the decision trees in the model is ignored and the prediction accuracy of the model is reduced. Taking into consideration these defects, an improved random forest model based on confusion matrix (CM-RF)is proposed. The decision tree cluster is selectively constructed by the similarity measure in the process of constructing the model, and the result is output by using the dynamic weighted voting fusion method in the final voting session. Experiments show that the proposed CM-RF can reduce the impact of low-performance decision trees on the output result, thus improving the accuracy and generalization ability of random forest model. 展开更多
关键词 random forest confusion matrix similarity measure dynamic weighted voting
在线阅读 下载PDF
Ensemble Voting-Based Anomaly Detection for a Smart Grid Communication Infrastructure 被引量:1
16
作者 Hend Alshede Laila Nassef +1 位作者 Nahed Alowidi Etimad Fadel 《Intelligent Automation & Soft Computing》 SCIE 2023年第6期3257-3278,共22页
Advanced Metering Infrastructure(AMI)is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center.The massive amount of data ... Advanced Metering Infrastructure(AMI)is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center.The massive amount of data collected supports the real-time decision-making required for diverse applications.The communication infrastructure relies on different network types,including the Internet.This makes the infrastructure vulnerable to various attacks,which could compromise security or have devastating effects.However,traditional machine learning solutions cannot adapt to the increasing complexity and diversity of attacks.The objective of this paper is to develop an Anomaly Detection System(ADS)based on deep learning using the CIC-IDS2017 dataset.However,this dataset is highly imbalanced;thus,a two-step sampling technique:random under-sampling and the Synthetic Minority Oversampling Technique(SMOTE),is proposed to balance the dataset.The proposed system utilizes a multiple hidden layer Auto-encoder(AE)for feature extraction and dimensional reduction.In addition,an ensemble voting based on both Random Forest(RF)and Convolu-tional Neural Network(CNN)is developed to classify the multiclass attack cate-gories.The proposed system is evaluated and compared with six different state-of-the-art machine learning and deep learning algorithms:Random Forest(RF),Light Gradient Boosting Machine(LightGBM),eXtreme Gradient Boosting(XGboost),Convolutional Neural Network(CNN),Long Short-Term Memory(LSTM),and bidirectional LSTM(biLSTM).Experimental results show that the proposed model enhances the detection for each attack class compared with the other machine learning and deep learning models with overall accuracy(98.29%),precision(99%),recall(98%),F_(1) score(98%),and the UNDetection rate(UND)(8%). 展开更多
关键词 Advanced metering infrastructure smart grid cyberattack ensemble voting anomaly detection system CICIDS2017
在线阅读 下载PDF
Oscillatory Failure Detection for Flight Control System Using Voting and Comparing Monitors
17
作者 XUE Ying YAO Zhenqiang 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2019年第5期817-827,共11页
Oscillatory failure cases(OFC)detection in the fly-by-wire(FBW)flight control system for civil aircraft is addressed in this paper.First,OFC is ranked four levels:Handling quality,static load,global structure fatigue ... Oscillatory failure cases(OFC)detection in the fly-by-wire(FBW)flight control system for civil aircraft is addressed in this paper.First,OFC is ranked four levels:Handling quality,static load,global structure fatigue and local fatigue,according to their respect impact on aircraft.Second,we present voting and comparing monitors based on un-similarity redundancy commands to detect OFC.Third,the associated performances,the thresholds and the counters of the monitors are calculated by the high fidelity nonlinear aircraft models.Finally,the monitors of OFC are verified by the Iron Bird Platform with real parameters of the flight control system.The results show that our approach can detect OFC rapidly. 展开更多
关键词 OSCILLATORY failure FLY-BY-WIRE FLIGHT control system MONITOR voting
在线阅读 下载PDF
Novel traveling quantum anonymous voting scheme via GHZ states
18
作者 赵文浩 姜敏 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期97-102,共6页
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle... Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security. 展开更多
关键词 quantum anonymous voting quantum secure communication GHZ states verifiability PRIVACY
在线阅读 下载PDF
Maximizing Influence in Temporal Social Networks:A Node Feature-Aware Voting Algorithm
19
作者 Wenlong Zhu Yu Miao +2 位作者 Shuangshuang Yang Zuozheng Lian Lianhe Cui 《Computers, Materials & Continua》 SCIE EI 2023年第12期3095-3117,共23页
Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most exi... Influence Maximization(IM)aims to select a seed set of size k in a social network so that information can be spread most widely under a specific information propagation model through this set of nodes.However,most existing studies on the IM problem focus on static social network features,while neglecting the features of temporal social networks.To bridge this gap,we focus on node features reflected by their historical interaction behavior in temporal social networks,i.e.,interaction attributes and self-similarity,and incorporate them into the influence maximization algorithm and information propagation model.Firstly,we propose a node feature-aware voting algorithm,called ISVoteRank,for seed nodes selection.Specifically,before voting,the algorithm sets the initial voting ability of nodes in a personalized manner by combining their features.During the voting process,voting weights are set based on the interaction strength between nodes,allowing nodes to vote at different extents and subsequently weakening their voting ability accordingly.The process concludes by selecting the top k nodes with the highest voting scores as seeds,avoiding the inefficiency of iterative seed selection in traditional voting-based algorithms.Secondly,we extend the Independent Cascade(IC)model and propose the Dynamic Independent Cascade(DIC)model,which aims to capture the dynamic features in the information propagation process by combining node features.Finally,experiments demonstrate that the ISVoteRank algorithm has been improved in both effectiveness and efficiency compared to baseline methods,and the influence spread through the DIC model is improved compared to the IC model. 展开更多
关键词 Temporal social networks influence maximization voting strategy interactive properties SELF-SIMILARITY
在线阅读 下载PDF
A Two-Level Approach based on Integration of Bagging and Voting for Outlier Detection
20
作者 Alican Dogan Derya Birant 《Journal of Data and Information Science》 CSCD 2020年第2期111-135,共25页
Purpose:The main aim of this study is to build a robust novel approach that is able to detect outliers in the datasets accurately.To serve this purpose,a novel approach is introduced to determine the likelihood of an ... Purpose:The main aim of this study is to build a robust novel approach that is able to detect outliers in the datasets accurately.To serve this purpose,a novel approach is introduced to determine the likelihood of an object to be extremely different from the general behavior of the entire dataset.Design/methodology/approach:This paper proposes a novel two-level approach based on the integration of bagging and voting techniques for anomaly detection problems.The proposed approach,named Bagged and Voted Local Outlier Detection(BV-LOF),benefits from the Local Outlier Factor(LOF)as the base algorithm and improves its detection rate by using ensemble methods.Findings:Several experiments have been performed on ten benchmark outlier detection datasets to demonstrate the effectiveness of the BV-LOF method.According to the results,the BV-LOF approach significantly outperformed LOF on 9 datasets of 10 ones on average.Research limitations:In the BV-LOF approach,the base algorithm is applied to each subset data multiple times with different neighborhood sizes(k)in each case and with different ensemble sizes(T).In our study,we have chosen k and T value ranges as[1-100];however,these ranges can be changed according to the dataset handled and to the problem addressed.Practical implications:The proposed method can be applied to the datasets from different domains(i.e.health,finance,manufacturing,etc.)without requiring any prior information.Since the BV-LOF method includes two-level ensemble operations,it may lead to more computational time than single-level ensemble methods;however,this drawback can be overcome by parallelization and by using a proper data structure such as R*-tree or KD-tree.Originality/value:The proposed approach(BV-LOF)investigates multiple neighborhood sizes(k),which provides findings of instances with different local densities,and in this way,it provides more likelihood of outlier detection that LOF may neglect.It also brings many benefits such as easy implementation,improved capability,higher applicability,and interpretability. 展开更多
关键词 Outlier detection Local outlier factor Ensemble learning BAGGING voting
在线阅读 下载PDF
上一页 1 2 8 下一页 到第
使用帮助 返回顶部