Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (197)
  • Open Access

    ARTICLE

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

    Feisha Hu1, Qi Wang1,*, Haijian Shao1,2, Shang Gao1, Hualong Yu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2405-2424, 2023, DOI:10.32604/cmes.2023.026732 - 09 March 2023

    Abstract Unmanned Aerial Vehicles (UAVs) are widely used and meet many demands in military and civilian fields. With the continuous enrichment and extensive expansion of application scenarios, the safety of UAVs is constantly being challenged. To address this challenge, we propose algorithms to detect anomalous data collected from drones to improve drone safety. We deployed a one-class kernel extreme learning machine (OCKELM) to detect anomalies in drone data. By default, OCKELM uses the radial basis (RBF) kernel function as the kernel function of the model. To improve the performance of OCKELM, we choose a Triangular Global More > Graphic Abstract

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

  • Open Access

    ARTICLE

    Quantum Computing Based Neural Networks for Anomaly Classification in Real-Time Surveillance Videos

    MD. Yasar Arafath1,*, A. Niranjil Kumar2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2489-2508, 2023, DOI:10.32604/csse.2023.035732 - 09 February 2023

    Abstract For intelligent surveillance videos, anomaly detection is extremely important. Deep learning algorithms have been popular for evaluating real-time surveillance recordings, like traffic accidents, and criminal or unlawful incidents such as suicide attempts. Nevertheless, Deep learning methods for classification, like convolutional neural networks, necessitate a lot of computing power. Quantum computing is a branch of technology that solves abnormal and complex problems using quantum mechanics. As a result, the focus of this research is on developing a hybrid quantum computing model which is based on deep learning. This research develops a Quantum Computing-based Convolutional Neural Network… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438 - 09 February 2023

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an… More >

  • Open Access

    ARTICLE

    Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 153-164, 2023, DOI:10.32604/csse.2023.034589 - 20 January 2023

    Abstract Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete… More >

  • Open Access

    ARTICLE

    Logformer: Cascaded Transformer for System Log Anomaly Detection

    Feilu Hang1, Wei Guo1, Hexiong Chen1, Linjiang Xie1, Chenghao Zhou2,*, Yao Liu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 517-529, 2023, DOI:10.32604/cmes.2023.025774 - 05 January 2023

    Abstract Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points. These logs are valuable for analyzing performance issues and understanding the status of the system. Anomaly detection plays an important role in service management and system maintenance, and guarantees the reliability and security of online systems. Logs are universal semi-structured data, which causes difficulties for traditional manual detection and pattern-matching algorithms. While some deep learning algorithms utilize neural networks to detect anomalies, these approaches have an over-reliance on manually designed features, resulting in the… More >

  • Open Access

    ARTICLE

    Data-Driven Approach for Condition Monitoring and Improving Power Output of Photovoltaic Systems

    Nebras M. Sobahi1,*, Ahteshamul Haque2, V S Bharath Kurukuru2, Md. Mottahir Alam1, Asif Irshad Khan3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5757-5776, 2023, DOI:10.32604/cmc.2022.028340 - 28 December 2022

    Abstract Increasing renewable energy targets globally has raised the requirement for the efficient and profitable operation of solar photovoltaic (PV) systems. In light of this requirement, this paper provides a path for evaluating the operating condition and improving the power output of the PV system in a grid integrated environment. To achieve this, different types of faults in grid-connected PV systems (GCPVs) and their impact on the energy loss associated with the electrical network are analyzed. A data-driven approach using neural networks (NNs) is proposed to achieve root cause analysis and localize the fault to the… More >

  • Open Access

    ARTICLE

    Explainable Anomaly Detection Using Vision Transformer Based SVDD

    Ji-Won Baek1, Kyungyong Chung2,*

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 6573-6586, 2023, DOI:10.32604/cmc.2023.035246 - 28 December 2022

    Abstract Explainable AI extracts a variety of patterns of data in the learning process and draws hidden information through the discovery of semantic relationships. It is possible to offer the explainable basis of decision-making for inference results. Through the causality of risk factors that have an ambiguous association in big medical data, it is possible to increase transparency and reliability of explainable decision-making that helps to diagnose disease status. In addition, the technique makes it possible to accurately predict disease risk for anomaly detection. Vision transformer for anomaly detection from image data makes classification through MLP.… More >

  • Open Access

    ARTICLE

    Identification of Anomaly Scenes in Videos Using Graph Neural Networks

    Khalid Masood1, Mahmoud M. Al-Sakhnini2,3, Waqas Nawaz4,*, Tauqeer Faiz5,6, Abdul Salam Mohammad7, Hamza Kashif8

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5417-5430, 2023, DOI:10.32604/cmc.2023.033590 - 28 December 2022

    Abstract Generally, conventional methods for anomaly detection rely on clustering, proximity, or classification. With the massive growth in surveillance videos, outliers or anomalies find ingenious ways to obscure themselves in the network and make conventional techniques inefficient. This research explores the structure of Graph neural networks (GNNs) that generalize deep learning frameworks to graph-structured data. Every node in the graph structure is labeled and anomalies, represented by unlabeled nodes, are predicted by performing random walks on the node-based graph structures. Due to their strong learning abilities, GNNs gained popularity in various domains such as natural language… More >

  • Open Access

    ARTICLE

    Performance Analysis of Hybrid RR Algorithm for Anomaly Detection in Streaming Data

    L. Amudha1,*, R. PushpaLakshmi2

    Computer Systems Science and Engineering, Vol.45, No.3, pp. 2299-2312, 2023, DOI:10.32604/csse.2023.031169 - 21 December 2022

    Abstract Automated live video stream analytics has been extensively researched in recent times. Most of the traditional methods for video anomaly detection is supervised and use a single classifier to identify an anomaly in a frame. We propose a 3-stage ensemble-based unsupervised deep reinforcement algorithm with an underlying Long Short Term Memory (LSTM) based Recurrent Neural Network (RNN). In the first stage, an ensemble of LSTM-RNNs are deployed to generate the anomaly score. The second stage uses the least square method for optimal anomaly score generation. The third stage adopts award-based reinforcement learning to update the… More >

  • Open Access

    ARTICLE

    Residual Attention Deep SVDD for COVID-19 Diagnosis Using CT Scans

    Akram Ali Alhadad1,2,*, Omar Tarawneh3, Reham R. Mostafa1, Hazem M. El-Bakry1

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 3333-3350, 2023, DOI:10.32604/cmc.2023.033413 - 31 October 2022

    Abstract COVID-19 is the common name of the disease caused by the novel coronavirus (2019-nCoV) that appeared in Wuhan, China in 2019. Discovering the infected people is the most important factor in the fight against the disease. The gold-standard test to diagnose COVID-19 is polymerase chain reaction (PCR), but it takes 5–6 h and, in the early stages of infection, may produce false-negative results. Examining Computed Tomography (CT) images to diagnose patients infected with COVID-19 has become an urgent necessity. In this study, we propose a residual attention deep support vector data description SVDD (RADSVDD) approach… More >

Displaying 101-110 on page 11 of 197. Per Page