Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (75)
  • Open Access

    ARTICLE

    Analysis of Social Media Impact on Stock Price Movements Using Machine Learning Anomaly Detection

    Richard Cruz1, Johnson Kinyua1,*, Charles Mutigwe2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3405-3423, 2023, DOI:10.32604/iasc.2023.035906

    Abstract The massive increase in the volume of data generated by individuals on social media microblog platforms such as Twitter and Reddit every day offers researchers unique opportunities to analyze financial markets from new perspectives. The meme stock mania of 2021 brought together stock traders and investors that were also active on social media. This mania was in good part driven by retail investors’ discussions on investment strategies that occurred on social media platforms such as Reddit during the COVID-19 lockdowns. The stock trades by these retail investors were then executed using services like Robinhood. In this paper, machine learning models… More >

  • Open Access

    ARTICLE

    Ensemble Voting-Based Anomaly Detection for a Smart Grid Communication Infrastructure

    Hend Alshede1,2,*, Laila Nassef1, Nahed Alowidi1, Etimad Fadel1

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3257-3278, 2023, DOI:10.32604/iasc.2023.035874

    Abstract Advanced Metering Infrastructure (AMI) is the metering network of the smart grid that enables bidirectional communications between each consumer’s premises and the provider’s control center. The massive amount of data collected supports the real-time decision-making required for diverse applications. The communication infrastructure relies on different network types, including the Internet. This makes the infrastructure vulnerable to various attacks, which could compromise security or have devastating effects. However, traditional machine learning solutions cannot adapt to the increasing complexity and diversity of attacks. The objective of this paper is to develop an Anomaly Detection System (ADS) based on deep learning using the… More >

  • Open Access

    ARTICLE

    Segmentation Based Real Time Anomaly Detection and Tracking Model for Pedestrian Walkways

    B. Sophia1,*, D. Chitra2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 2491-2504, 2023, DOI:10.32604/iasc.2023.029799

    Abstract Presently, video surveillance is commonly employed to ensure security in public places such as traffic signals, malls, railway stations, etc. A major challenge in video surveillance is the identification of anomalies that exist in it such as crimes, thefts, and so on. Besides, the anomaly detection in pedestrian walkways has gained significant attention among the computer vision communities to enhance pedestrian safety. The recent advances of Deep Learning (DL) models have received considerable attention in different processes such as object detection, image classification, etc. In this aspect, this article designs a new Panoptic Feature Pyramid Network based Anomaly Detection and… More >

  • Open Access

    ARTICLE

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

    Feisha Hu1, Qi Wang1,*, Haijian Shao1,2, Shang Gao1, Hualong Yu1

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2405-2424, 2023, DOI:10.32604/cmes.2023.026732

    Abstract Unmanned Aerial Vehicles (UAVs) are widely used and meet many demands in military and civilian fields. With the continuous enrichment and extensive expansion of application scenarios, the safety of UAVs is constantly being challenged. To address this challenge, we propose algorithms to detect anomalous data collected from drones to improve drone safety. We deployed a one-class kernel extreme learning machine (OCKELM) to detect anomalies in drone data. By default, OCKELM uses the radial basis (RBF) kernel function as the kernel function of the model. To improve the performance of OCKELM, we choose a Triangular Global Alignment Kernel (TGAK) instead of… More > Graphic Abstract

    Anomaly Detection of UAV State Data Based on Single-Class Triangular Global Alignment Kernel Extreme Learning Machine

  • Open Access

    ARTICLE

    Quantum Computing Based Neural Networks for Anomaly Classification in Real-Time Surveillance Videos

    MD. Yasar Arafath1,*, A. Niranjil Kumar2

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2489-2508, 2023, DOI:10.32604/csse.2023.035732

    Abstract For intelligent surveillance videos, anomaly detection is extremely important. Deep learning algorithms have been popular for evaluating real-time surveillance recordings, like traffic accidents, and criminal or unlawful incidents such as suicide attempts. Nevertheless, Deep learning methods for classification, like convolutional neural networks, necessitate a lot of computing power. Quantum computing is a branch of technology that solves abnormal and complex problems using quantum mechanics. As a result, the focus of this research is on developing a hybrid quantum computing model which is based on deep learning. This research develops a Quantum Computing-based Convolutional Neural Network (QC-CNN) to extract features and… More >

  • Open Access

    ARTICLE

    Aquila Optimization with Machine Learning-Based Anomaly Detection Technique in Cyber-Physical Systems

    A. Ramachandran1,*, K. Gayathri2, Ahmed Alkhayyat3, Rami Q. Malik4

    Computer Systems Science and Engineering, Vol.46, No.2, pp. 2177-2194, 2023, DOI:10.32604/csse.2023.034438

    Abstract Cyber-physical system (CPS) is a concept that integrates every computer-driven system interacting closely with its physical environment. Internet-of-things (IoT) is a union of devices and technologies that provide universal interconnection mechanisms between the physical and digital worlds. Since the complexity level of the CPS increases, an adversary attack becomes possible in several ways. Assuring security is a vital aspect of the CPS environment. Due to the massive surge in the data size, the design of anomaly detection techniques becomes a challenging issue, and domain-specific knowledge can be applied to resolve it. This article develops an Aquila Optimizer with Parameter Tuned… More >

  • Open Access

    ARTICLE

    An Adaptive BWO Algorithm with RSA for Anomaly Detection in VANETs

    Y. Sarada Devi*, M. Roopa

    Journal of Cyber Security, Vol.4, No.3, pp. 153-167, 2022, DOI:10.32604/jcs.2022.033436

    Abstract Vehicular ad hoc networks (VANETs) are designed in accordance with the ad hoc mobile networks (MANETs), i.e., impulsive formation of a wireless network for V2V (vehicle-to-vehicle) communication. Each vehicle is preserved as a node which remains as share of network. All the vehicle in the network is made to be under communication in a VANET because of which all the vehicles in the range can be made connected to a to a unit & a wide network can be established with a huge range. Healthier traffic management, vehicle-to-vehicle communication and provision of road information can be done in VANETs. There… More >

  • Open Access

    ARTICLE

    Anomaly Detection Based on Discrete Wavelet Transformation for Insider Threat Classification

    Dong-Wook Kim1, Gun-Yoon Shin1, Myung-Mook Han2,*

    Computer Systems Science and Engineering, Vol.46, No.1, pp. 153-164, 2023, DOI:10.32604/csse.2023.034589

    Abstract Unlike external attacks, insider threats arise from legitimate users who belong to the organization. These individuals may be a potential threat for hostile behavior depending on their motives. For insider detection, many intrusion detection systems learn and prevent known scenarios, but because malicious behavior has similar patterns to normal behavior, in reality, these systems can be evaded. Furthermore, because insider threats share a feature space similar to normal behavior, identifying them by detecting anomalies has limitations. This study proposes an improved anomaly detection methodology for insider threats that occur in cybersecurity in which a discrete wavelet transformation technique is applied… More >

  • Open Access

    ARTICLE

    Logformer: Cascaded Transformer for System Log Anomaly Detection

    Feilu Hang1, Wei Guo1, Hexiong Chen1, Linjiang Xie1, Chenghao Zhou2,*, Yao Liu2

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.1, pp. 517-529, 2023, DOI:10.32604/cmes.2023.025774

    Abstract Modern large-scale enterprise systems produce large volumes of logs that record detailed system runtime status and key events at key points. These logs are valuable for analyzing performance issues and understanding the status of the system. Anomaly detection plays an important role in service management and system maintenance, and guarantees the reliability and security of online systems. Logs are universal semi-structured data, which causes difficulties for traditional manual detection and pattern-matching algorithms. While some deep learning algorithms utilize neural networks to detect anomalies, these approaches have an over-reliance on manually designed features, resulting in the effectiveness of anomaly detection depending… More >

  • Open Access

    ARTICLE

    Data-Driven Approach for Condition Monitoring and Improving Power Output of Photovoltaic Systems

    Nebras M. Sobahi1,*, Ahteshamul Haque2, V S Bharath Kurukuru2, Md. Mottahir Alam1, Asif Irshad Khan3

    CMC-Computers, Materials & Continua, Vol.74, No.3, pp. 5757-5776, 2023, DOI:10.32604/cmc.2022.028340

    Abstract Increasing renewable energy targets globally has raised the requirement for the efficient and profitable operation of solar photovoltaic (PV) systems. In light of this requirement, this paper provides a path for evaluating the operating condition and improving the power output of the PV system in a grid integrated environment. To achieve this, different types of faults in grid-connected PV systems (GCPVs) and their impact on the energy loss associated with the electrical network are analyzed. A data-driven approach using neural networks (NNs) is proposed to achieve root cause analysis and localize the fault to the component level in the system.… More >

Displaying 1-10 on page 1 of 75. Per Page  

Share Link

WeChat scan