Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (123)
  • Open Access

    ARTICLE

    Unsupervised Log Anomaly Detection Method Based on Multi-Feature

    Shiming He1, Tuo Deng1, Bowen Chen1, R. Simon Sherratt2, Jin Wang1,*

    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 517-541, 2023, DOI:10.32604/cmc.2023.037392

    Abstract Log anomaly detection is an important paradigm for system troubleshooting. Existing log anomaly detection based on Long Short-Term Memory (LSTM) networks is time-consuming to handle long sequences. Transformer model is introduced to promote efficiency. However, most existing Transformer-based log anomaly detection methods convert unstructured log messages into structured templates by log parsing, which introduces parsing errors. They only extract simple semantic feature, which ignores other features, and are generally supervised, relying on the amount of labeled data. To overcome the limitations of existing methods, this paper proposes a novel unsupervised log anomaly detection method based on multi-feature (UMFLog). UMFLog includes… More >

  • Open Access

    ARTICLE

    Statistical Time Series Forecasting Models for Pandemic Prediction

    Ahmed ElShafee1, Walid El-Shafai2,3, Abeer D. Algarni4,*, Naglaa F. Soliman4, Moustafa H. Aly5

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 349-374, 2023, DOI:10.32604/csse.2023.037408

    Abstract COVID-19 has significantly impacted the growth prediction of a pandemic, and it is critical in determining how to battle and track the disease progression. In this case, COVID-19 data is a time-series dataset that can be projected using different methodologies. Thus, this work aims to gauge the spread of the outbreak severity over time. Furthermore, data analytics and Machine Learning (ML) techniques are employed to gain a broader understanding of virus infections. We have simulated, adjusted, and fitted several statistical time-series forecasting models, linear ML models, and nonlinear ML models. Examples of these models are Logistic Regression, Lasso, Ridge, ElasticNet,… More >

  • Open Access

    ARTICLE

    Statistical Data Mining with Slime Mould Optimization for Intelligent Rainfall Classification

    Ramya Nemani1, G. Jose Moses2, Fayadh Alenezi3, K. Vijaya Kumar4, Seifedine Kadry5,6,7,*, Jungeun Kim8, Keejun Han9

    Computer Systems Science and Engineering, Vol.47, No.1, pp. 919-935, 2023, DOI:10.32604/csse.2023.034213

    Abstract Statistics are most crucial than ever due to the accessibility of huge counts of data from several domains such as finance, medicine, science, engineering, and so on. Statistical data mining (SDM) is an interdisciplinary domain that examines huge existing databases to discover patterns and connections from the data. It varies in classical statistics on the size of datasets and on the detail that the data could not primarily be gathered based on some experimental strategy but conversely for other resolves. Thus, this paper introduces an effective statistical Data Mining for Intelligent Rainfall Prediction using Slime Mould Optimization with Deep Learning… More >

  • Open Access

    ARTICLE

    Iris Recognition Based on Multilevel Thresholding Technique and Modified Fuzzy c-Means Algorithm

    Slim Ben Chaabane1,2,*, Rafika Harrabi1,2, Anas Bushnag1, Hassene Seddik2

    Journal on Artificial Intelligence, Vol.4, No.4, pp. 201-214, 2022, DOI:10.32604/jai.2022.032850

    Abstract Biometrics represents the technology for measuring the characteristics of the human body. Biometric authentication currently allows for secure, easy, and fast access by recognizing a person based on facial, voice, and fingerprint traits. Iris authentication is one of the essential biometric methods for identifying a person. This authentication type has become popular in research and practical applications. Unlike the face and hands, the iris is an internal organ, protected and therefore less likely to be damaged. However, the number of helpful information collected from the iris is much greater than the other biometric human organs. This work proposes a new… More >

  • Open Access

    ARTICLE

    An Efficient Three-Party Authenticated Key Exchange Procedure Using Chebyshev Chaotic Maps with Client Anonymity

    Akshaykumar Meshram1,2, Monia Hadj Alouane-Turki3, N. M. Wazalwar2, Chandrashekhar Meshram4,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5337-5353, 2023, DOI:10.32604/cmc.2023.037324

    Abstract Internet of Things (IoT) applications can be found in various industry areas, including critical infrastructure and healthcare, and IoT is one of several technological developments. As a result, tens of billions or possibly hundreds of billions of devices will be linked together. These smart devices will be able to gather data, process it, and even come to decisions on their own. Security is the most essential thing in these situations. In IoT infrastructure, authenticated key exchange systems are crucial for preserving client and data privacy and guaranteeing the security of data-in-transit (e.g., via client identification and provision of secure communication).… More >

  • Open Access

    ARTICLE

    Metaheuristic Optimization with Deep Learning Enabled Smart Grid Stability Prediction

    Afrah Al-Bossly*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 6395-6408, 2023, DOI:10.32604/cmc.2023.028433

    Abstract Due to the drastic increase in global population as well as economy, electricity demand becomes considerably high. The recently developed smart grid (SG) technology has the ability to minimize power loss at the time of power distribution. Machine learning (ML) and deep learning (DL) models can be effectually developed for the design of SG stability techniques. This article introduces a new Social Spider Optimization with Deep Learning Enabled Statistical Analysis for Smart Grid Stability (SSODLSA-SGS) prediction model. Primarily, class imbalance data handling process is performed using Synthetic minority oversampling technique (SMOTE) technique. The SSODLSA-SGS model involves two stages of pre-processing… More >

  • Open Access

    ARTICLE

    An Auxiliary Monitoring Method for Well Killing Based on Statistical Data

    Shuang Liang1,*, Fangyu Luo2, Huihui Yu3, Jian Gao1, Xiaolin Shu1

    FDMP-Fluid Dynamics & Materials Processing, Vol.19, No.8, pp. 2109-2118, 2023, DOI:10.32604/fdmp.2023.025342

    Abstract In the present study, a large set of data related to well killing is considered. Through a complete exploration of the whole process leading to well-killing, various factors affecting such a process are screened and sorted, and a correlation model is built accordingly in order to introduce an auxiliary method for well-killing monitoring based on statistical information. The available data show obvious differences due to the diverse control parameters related to different well-killing methods. Nevertheless, it is shown that a precise three-fold relationship exists between the reservoir parameters, the elapsed time and the effectiveness of the considered well-killing strategy. The… More >

  • Open Access

    ARTICLE

    Spectral Analysis and Validation of Parietal Signals for Different Arm Movements

    Umashankar Ganesan1,*, A. Vimala Juliet2, R. Amala Jenith Joshi3

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2849-2863, 2023, DOI:10.32604/iasc.2023.033759

    Abstract Brain signal analysis plays a significant role in attaining data related to motor activities. The parietal region of the brain plays a vital role in muscular movements. This approach aims to demonstrate a unique technique to identify an ideal region of the human brain that generates signals responsible for muscular movements; perform statistical analysis to provide an absolute characterization of the signal and validate the obtained results using a prototype arm. This can enhance the practical implementation of these frequency extractions for future neuro-prosthetic applications and the characterization of neurological diseases like Parkinson’s disease (PD). To play out this handling… More >

  • Open Access

    ARTICLE

    On a Novel Extended Lomax Distribution with Asymmetric Properties and Its Statistical Applications

    Aisha Fayomi1, Christophe Chesneau2,*, Farrukh Jamal3, Ali Algarni1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2371-2403, 2023, DOI:10.32604/cmes.2023.027000

    Abstract In this article, we highlight a new three-parameter heavy-tailed lifetime distribution that aims to extend the modeling possibilities of the Lomax distribution. It is called the extended Lomax distribution. The considered distribution naturally appears as the distribution of a transformation of a random variable following the logweighted power distribution recently introduced for percentage or proportion data analysis purposes. As a result, its cumulative distribution has the same functional basis as that of the Lomax distribution, but with a novel special logarithmic term depending on several parameters. The modulation of this logarithmic term reveals new types of asymetrical shapes, implying a… More >

  • Open Access

    EDITORIAL

    Introduction to the Special Issue on New Trends in Statistical Computing and Data Science

    Christophe Chesneau1,*, Hassan Doosti2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.2, pp. 981-983, 2023, DOI:10.32604/cmes.2023.028283

    Abstract This article has no abstract. More >

Displaying 11-20 on page 2 of 123. Per Page