Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (20)
  • Open Access

    ARTICLE

    Using Outlier Detection to Identify Grey-Sheep Users in Recommender Systems: A Comparative Study

    Yong Zheng*

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 4315-4328, 2025, DOI:10.32604/cmc.2025.063498 - 19 May 2025

    Abstract A recommender system is a tool designed to suggest relevant items to users based on their preferences and behaviors. Collaborative filtering, a popular technique within recommender systems, predicts user interests by analyzing patterns in interactions and similarities between users, leveraging past behavior data to make personalized recommendations. Despite its popularity, collaborative filtering faces notable challenges, and one of them is the issue of grey-sheep users who have unusual tastes in the system. Surprisingly, existing research has not extensively explored outlier detection techniques to address the grey-sheep problem. To fill this research gap, this study conducts… More >

  • Open Access

    ARTICLE

    TRLLD: Load Level Detection Algorithm Based on Threshold Recognition for Load Time Series

    Qingqing Song1,*, Shaoliang Xia1, Zhen Wu2

    CMC-Computers, Materials & Continua, Vol.83, No.2, pp. 2619-2642, 2025, DOI:10.32604/cmc.2025.062526 - 16 April 2025

    Abstract Load time series analysis is critical for resource management and optimization decisions, especially automated analysis techniques. Existing research has insufficiently interpreted the overall characteristics of samples, leading to significant differences in load level detection conclusions for samples with different characteristics (trend, seasonality, cyclicality). Achieving automated, feature-adaptive, and quantifiable analysis methods remains a challenge. This paper proposes a Threshold Recognition-based Load Level Detection Algorithm (TRLLD), which effectively identifies different load level regions in samples of arbitrary size and distribution type based on sample characteristics. By utilizing distribution density uniformity, the algorithm classifies data points and ultimately… More >

  • Open Access

    ARTICLE

    A Study on Outlier Detection and Feature Engineering Strategies in Machine Learning for Heart Disease Prediction

    Varada Rajkumar Kukkala1, Surapaneni Phani Praveen2, Naga Satya Koti Mani Kumar Tirumanadham3, Parvathaneni Naga Srinivasu4,5,*

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1085-1112, 2024, DOI:10.32604/csse.2024.053603 - 13 September 2024

    Abstract This paper investigates the application of machine learning to develop a response model to cardiovascular problems and the use of AdaBoost which incorporates an application of Outlier Detection methodologies namely; Z-Score incorporated with Grey Wolf Optimization (GWO) as well as Interquartile Range (IQR) coupled with Ant Colony Optimization (ACO). Using a performance index, it is shown that when compared with the Z-Score and GWO with AdaBoost, the IQR and ACO, with AdaBoost are not very accurate (89.0% vs. 86.0%) and less discriminative (Area Under the Curve (AUC) score of 93.0% vs. 91.0%). The Z-Score and GWO… More >

  • Open Access

    ARTICLE

    Evolutionary Algorithm Based Feature Subset Selection for Students Academic Performance Analysis

    Ierin Babu1,*, R. MathuSoothana2, S. Kumar2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3621-3636, 2023, DOI:10.32604/iasc.2023.033791 - 15 March 2023

    Abstract Educational Data Mining (EDM) is an emergent discipline that concentrates on the design of self-learning and adaptive approaches. Higher education institutions have started to utilize analytical tools to improve students’ grades and retention. Prediction of students’ performance is a difficult process owing to the massive quantity of educational data. Therefore, Artificial Intelligence (AI) techniques can be used for educational data mining in a big data environment. At the same time, in EDM, the feature selection process becomes necessary in creation of feature subsets. Since the feature selection performance affects the predictive performance of any model,… More >

  • Open Access

    ARTICLE

    Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine

    R. Dhanya1,*, R. Kalaiselvi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1577-1593, 2023, DOI:10.32604/csse.2023.031319 - 03 November 2022

    Abstract A severe problem in modern information systems is Digital media tampering along with fake information. Even though there is an enhancement in image development, image forgery, either by the photographer or via image manipulations, is also done in parallel. Numerous researches have been concentrated on how to identify such manipulated media or information manually along with automatically; thus conquering the complicated forgery methodologies with effortlessly obtainable technologically enhanced instruments. However, high complexity affects the developed methods. Presently, it is complicated to resolve the issue of the speed-accuracy trade-off. For tackling these challenges, this article put… More >

  • Open Access

    ARTICLE

    An Integrated Multilayered Framework for IoT Security Intrusion Decisions

    Hassen Sallay*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 429-444, 2023, DOI:10.32604/iasc.2023.030791 - 29 September 2022

    Abstract Security breaches can seriously harm the Internet of Things (IoT) and Industrial IoT (IIoT) environments. The damage can exceed financial and material losses to threaten human lives. Overcoming these security risks is challenging given IoT ubiquity, complexity, and restricted resources. Security intrusion management is a cornerstone in fortifying the defensive security process. This paper presents an integrated multilayered framework facilitating the orchestration of the security intrusion management process and developing security decision support systems. The proposed framework incorporates four layers with four dedicated processing phases. This paper focuses mainly on the analytical layer. We present… More >

  • Open Access

    ARTICLE

    A Novel Outlier Detection with Feature Selection Enabled Streaming Data Classification

    R. Rajakumar1,*, S. Sathiya Devi2

    Intelligent Automation & Soft Computing, Vol.35, No.2, pp. 2101-2116, 2023, DOI:10.32604/iasc.2023.028889 - 19 July 2022

    Abstract Due to the advancements in information technologies, massive quantity of data is being produced by social media, smartphones, and sensor devices. The investigation of data stream by the use of machine learning (ML) approaches to address regression, prediction, and classification problems have received considerable interest. At the same time, the detection of anomalies or outliers and feature selection (FS) processes becomes important. This study develops an outlier detection with feature selection technique for streaming data classification, named ODFST-SDC technique. Initially, streaming data is pre-processed in two ways namely categorical encoding and null value removal. In… More >

  • Open Access

    ARTICLE

    Outlier Detection and Forecasting for Bridge Health Monitoring Based on Time Series Intervention Analysis

    Bing Qu*, Ping Liao, Yaolong Huang

    Structural Durability & Health Monitoring, Vol.16, No.4, pp. 323-341, 2022, DOI:10.32604/sdhm.2022.021446 - 03 January 2023

    Abstract The method of time series analysis, applied by establishing appropriate mathematical models for bridge health monitoring data and making forecasts of structural future behavior, stands out as a novel and viable research direction for bridge state assessment. However, outliers inevitably exist in the monitoring data due to various interventions, which reduce the precision of model fitting and affect the forecasting results. Therefore, the identification of outliers is crucial for the accurate interpretation of the monitoring data. In this study, a time series model combined with outlier information for bridge health monitoring is established using intervention… More >

  • Open Access

    ARTICLE

    Wavelet Based Detection of Outliers in Volatility Time Series Models

    Khudhayr A. Rashedi1,2,*, Mohd Tahir Ismail1, Abdeslam Serroukh3, S. Al wadi4

    CMC-Computers, Materials & Continua, Vol.72, No.2, pp. 3835-3847, 2022, DOI:10.32604/cmc.2022.026476 - 29 March 2022

    Abstract We introduce a new wavelet based procedure for detecting outliers in financial discrete time series. The procedure focuses on the analysis of residuals obtained from a model fit, and applied to the Generalized Autoregressive Conditional Heteroskedasticity (GARCH) like model, but not limited to these models. We apply the Maximal-Overlap Discrete Wavelet Transform (MODWT) to the residuals and compare their wavelet coefficients against quantile thresholds to detect outliers. Our methodology has several advantages over existing methods that make use of the standard Discrete Wavelet Transform (DWT). The series sample size does not need to be a More >

  • Open Access

    ARTICLE

    A Hybrid Deep Learning-Based Unsupervised Anomaly Detection in High Dimensional Data

    Amgad Muneer1,2,*, Shakirah Mohd Taib1,2, Suliman Mohamed Fati3, Abdullateef O. Balogun1, Izzatdin Abdul Aziz1,2

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 5363-5381, 2022, DOI:10.32604/cmc.2022.021113 - 11 October 2021

    Abstract Anomaly detection in high dimensional data is a critical research issue with serious implication in the real-world problems. Many issues in this field still unsolved, so several modern anomaly detection methods struggle to maintain adequate accuracy due to the highly descriptive nature of big data. Such a phenomenon is referred to as the “curse of dimensionality” that affects traditional techniques in terms of both accuracy and performance. Thus, this research proposed a hybrid model based on Deep Autoencoder Neural Network (DANN) with five layers to reduce the difference between the input and output. The proposed… More >

Displaying 1-10 on page 1 of 20. Per Page