Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (533)
  • Open Access

    ARTICLE

    Large-Scale KPI Anomaly Detection Based on Ensemble Learning and Clustering

    Ji Qian1, Fang Liu2,*, Donghui Li3, Xin Jin4, Feng Li4

    Journal of Cyber Security, Vol.2, No.4, pp. 157-166, 2020, DOI:10.32604/jcs.2020.011169 - 07 December 2020

    Abstract Anomaly detection using KPI (Key Performance Indicator) is critical for Internet-based services to maintain high service availability. However, given the velocity, volume, and diversified nature of monitoring data, it is difficult to obtain enough labelled data to build an accurate anomaly detection model for using supervised machine leaning methods. In this paper, we propose an automatic and generic transfer learning strategy: Detecting anomalies on a new KPI by using pretrained model on existing selected labelled KPI. Our approach, called KADT (KPI Anomaly Detection based on Transfer Learning), integrates KPI clustering and model pretrained techniques. KPI More >

  • Open Access

    ARTICLE

    Location Related Signals with Satellite Image Fusion Method Using Visual Image Integration Method

    G. Ravikanth1,∗, K. V. N. Sunitha2,†, B. Eswara Reddy3

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 385-393, 2020

    Abstract Investigations were performed on a group utilizing (General Purpose Unit) GPU and executions were evaluated for the utilization of the created parallel usages to process satellite pictures from satellite Landsat7.The usage on a realistic group gives execution change from 2 to 18 times. The nature of the considered techniques was assessed by relative dimensionless global error in synthesis (ERGAS) and Quality Without Reference (QNR) measurements. The outcomes demonstrate execution picks ups and holding of value with the bunch of GPU contrasted with the outcomes and different analysts for a CPU and single GPU. The errand… More >

  • Open Access

    ARTICLE

    A Frame Work for Categorise the Innumerable Vulnerable Nodes in Mobile Adhoc Network

    Gundala Swathi*

    Computer Systems Science and Engineering, Vol.35, No.5, pp. 335-345, 2020, DOI:10.32604/csse.2020.35.335

    Abstract Researches in wireless mobile ad hoc networks have an inherent challenge of vulnerable diagnosis due to the diverse behaviour pattern of the vulnerable nodes causing heterogeneous vtype1, vtype2, vtupe3 and vtype4 faults. This paper proposes a protocol for the diagnosis of vulnerability nodes with threephases of clustering, vulnerable detection and vulnerable fault classification in wireless networks. This protocol employs the technique of probabilistic neural network for classification of vulnerable nodes and detects vulnerable nodes through timeout mechanism and vtype3, vtype4, vtype1, vtype2 nodes through the method of analysis variance. Network simulator NS-2.3.35 is employed for More >

  • Open Access

    ARTICLE

    Weighted Particle Swarm Clustering Algorithm for Self-Organizing Maps

    Guorong Cui, Hao Li, Yachuan Zhang, Rongjing Bu, Yan Kang*, Jinyuan Li, Yang Hu

    Journal of Quantum Computing, Vol.2, No.2, pp. 85-95, 2020, DOI:10.32604/jqc.2020.09717 - 19 October 2020

    Abstract The traditional K-means clustering algorithm is difficult to determine the cluster number, which is sensitive to the initialization of the clustering center and easy to fall into local optimum. This paper proposes a clustering algorithm based on self-organizing mapping network and weight particle swarm optimization SOM&WPSO (Self-Organization Map and Weight Particle Swarm Optimization). Firstly, the algorithm takes the competitive learning mechanism of a self-organizing mapping network to divide the data samples into coarse clusters and obtain the clustering center. Then, the obtained clustering center is used as the initialization parameter of the weight particle swarm… More >

  • Open Access

    ARTICLE

    Hybridization of Fuzzy and Hard Semi-Supervised Clustering Algorithms Tuned with Ant Lion Optimizer Applied to Higgs Boson Search

    Soukaina Mjahed1,*, Khadija Bouzaachane1, Ahmad Taher Azar2,3, Salah El Hadaj1, Said Raghay1

    CMES-Computer Modeling in Engineering & Sciences, Vol.125, No.2, pp. 459-494, 2020, DOI:10.32604/cmes.2020.010791 - 12 October 2020

    Abstract This paper focuses on the unsupervised detection of the Higgs boson particle using the most informative features and variables which characterize the “Higgs machine learning challenge 2014” data set. This unsupervised detection goes in this paper analysis through 4 steps: (1) selection of the most informative features from the considered data; (2) definition of the number of clusters based on the elbow criterion. The experimental results showed that the optimal number of clusters that group the considered data in an unsupervised manner corresponds to 2 clusters; (3) proposition of a new approach for hybridization of… More >

  • Open Access

    ARTICLE

    The Application of Sparse Reconstruction Algorithm for Improving Background Dictionary in Visual Saliency Detection

    Lei Feng1,2, Haibin Li1,*, Yakun Gao1, Yakun Zhang1

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 831-839, 2020, DOI:10.32604/iasc.2020.010117

    Abstract In the paper, we apply the sparse reconstruction algorithm of improved background dictionary to saliency detection. Firstly, after super-pixel segmentation, two bottom features are extracted: the color information of LAB and the texture features of the image by Gabor filter. Secondly, the convex hull theory is used to remove object region in boundary region, and K-means clustering algorithm is used to continue to simplify the background dictionary. Finally, the saliency map is obtained by calculating the reconstruction error. Compared with the mainstream algorithms, the accuracy and efficiency of this algorithm are better than those of More >

  • Open Access

    ARTICLE

    Detection of the Spectrum Hole from N-number of Primary Users Using the Gencluster Algorithm

    U. Venkateshkumar1,*, S. Ramakrishnan2

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 817-830, 2020, DOI:10.32604/iasc.2020.010116

    Abstract A hybrid form of the genetic algorithm and the modified K-Means cluster algorithm forms as a Gencluster to detect a spectrum hole among n-number of primary users (PUs) is present in the cooperative spectrum sensing model. The fusion center (FC), applies the genetic algorithm to identify the best chromosome, which contains many PUs cluster centers and by applying the modified K-Means cluster algorithm identifies the cluster with the PU vacant spectrum showing high accuracy, and maximum probability of detection with minimum false alarm rates are achieved. The graphical representation of the performance metric of the More >

  • Open Access

    ARTICLE

    The Data Classification Query Optimization Method for English Online Examination System Based on Grid Image Analysis

    Kun Liu*

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 749-754, 2020, DOI:10.32604/iasc.2020.010109

    Abstract In the English network examination system, the big data distribution is highly coupled, the cost of data query is large, and the precision is not good. In order to improve the ability of the data classification and query in the English network examination system, a method of data classification and query in the English network examination system is proposed based on the grid region clustering and frequent itemset feature extraction of the association rules. Using the grid image analysis to improve the statistical analysis of the English performance analysis, the collection and storage structure analysis… More >

  • Open Access

    ARTICLE

    Reducing Operational Time Complexity of k-NN Algorithms Using Clustering in Wrist-Activity Recognition

    Sun-Taag Choe, We-Duke Cho*, Jai-Hoon Kim, and Ki-Hyung Kim

    Intelligent Automation & Soft Computing, Vol.26, No.4, pp. 679-691, 2020, DOI:10.32604/iasc.2020.010102

    Abstract Recent research on activity recognition in wearable devices has identified a key challenge: k-nearest neighbors (k-NN) algorithms have a high operational time complexity. Thus, these algorithms are difficult to utilize in embedded wearable devices. Herein, we propose a method for reducing this complexity. We apply a clustering algorithm for learning data and assign labels to each cluster according to the maximum likelihood. Experimental results show that the proposed method achieves effective operational levels for implementation in embedded devices; however, the accuracy is slightly lower than that of a traditional k-NN algorithm. Additionally, our method provides More >

  • Open Access

    ARTICLE

    Genetic separation of chalkiness by hybrid rice of Huanghuazhan and CS197

    LU GAN, XIAOSHU DENG, YAN LIU, ANCAI LUO, JIAO CHEN, JING XIANG, ZHENGWU ZHAO*

    BIOCELL, Vol.44, No.3, pp. 451-459, 2020, DOI:10.32604/biocell.2020.08007 - 22 September 2020

    Abstract The present study focused on the segregation of the percentage of grains with chalkiness (PGWC), using Huanghuazhan as the female parent and CS197 as the male parent to construct the hybrid rice F2 population. Molecular markers were used for genotype analysis among the extremely low and extremely high PGWC individuals from the F2 population. The results revealed that the genotypes of 10 extremely low PGWC individuals were 80.00% and 3.33%, which is identical to Huanghuazhan and CS197, respectively. The heterozygotes accounted for 16.67%. On the contrary, the genotypes of 10 extremely high PGWC individuals were 37.78%… More >

Displaying 451-460 on page 46 of 533. Per Page