Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (33)
  • Open Access

    ARTICLE

    A Study on Outlier Detection and Feature Engineering Strategies in Machine Learning for Heart Disease Prediction

    Varada Rajkumar Kukkala1, Surapaneni Phani Praveen2, Naga Satya Koti Mani Kumar Tirumanadham3, Parvathaneni Naga Srinivasu4,5,*

    Computer Systems Science and Engineering, Vol.48, No.5, pp. 1085-1112, 2024, DOI:10.32604/csse.2024.053603 - 13 September 2024

    Abstract This paper investigates the application of machine learning to develop a response model to cardiovascular problems and the use of AdaBoost which incorporates an application of Outlier Detection methodologies namely; Z-Score incorporated with Grey Wolf Optimization (GWO) as well as Interquartile Range (IQR) coupled with Ant Colony Optimization (ACO). Using a performance index, it is shown that when compared with the Z-Score and GWO with AdaBoost, the IQR and ACO, with AdaBoost are not very accurate (89.0% vs. 86.0%) and less discriminative (Area Under the Curve (AUC) score of 93.0% vs. 91.0%). The Z-Score and GWO… More >

  • Open Access

    ARTICLE

    Research on Total Electric Field Prediction Method of Ultra-High Voltage Direct Current Transmission Line Based on Stacking Algorithm

    Yinkong Wei1,2, Mucong Wu1,2,*, Wei Wei3, Paulo R. F. Rocha4, Ziyi Cheng1,2, Weifang Yao5

    Computer Systems Science and Engineering, Vol.48, No.3, pp. 723-738, 2024, DOI:10.32604/csse.2023.036062 - 20 May 2024

    Abstract Ultra-high voltage (UHV) transmission lines are an important part of China’s power grid and are often surrounded by a complex electromagnetic environment. The ground total electric field is considered a main electromagnetic environment indicator of UHV transmission lines and is currently employed for reliable long-term operation of the power grid. Yet, the accurate prediction of the ground total electric field remains a technical challenge. In this work, we collected the total electric field data from the Ningdong-Zhejiang ±800 kV UHVDC transmission project, as of the Ling Shao line, and perform an outlier analysis of the More >

  • Open Access

    REVIEW

    An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces

    Sheetal Sharma1,2, Kamali Gupta1, Deepali Gupta1, Shalli Rani1,*, Gaurav Dhiman3,4,5,6,7,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.138, No.3, pp. 2029-2059, 2024, DOI:10.32604/cmes.2023.029997 - 15 December 2023

    Abstract The widespread adoption of the Internet of Things (IoT) has transformed various sectors globally, making them more intelligent and connected. However, this advancement comes with challenges related to the effectiveness of IoT devices. These devices, present in offices, homes, industries, and more, need constant monitoring to ensure their proper functionality. The success of smart systems relies on their seamless operation and ability to handle faults. Sensors, crucial components of these systems, gather data and contribute to their functionality. Therefore, sensor faults can compromise the system’s reliability and undermine the trustworthiness of smart environments. To address… More > Graphic Abstract

    An Insight Survey on Sensor Errors and Fault Detection Techniques in Smart Spaces

  • Open Access

    ARTICLE

    A New Privacy-Preserving Data Publishing Algorithm Utilizing Connectivity-Based Outlier Factor and Mondrian Techniques

    Burak Cem Kara1,2,*, Can Eyüpoğlu1

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1515-1535, 2023, DOI:10.32604/cmc.2023.040274 - 30 August 2023

    Abstract Developing a privacy-preserving data publishing algorithm that stops individuals from disclosing their identities while not ignoring data utility remains an important goal to achieve. Because finding the trade-off between data privacy and data utility is an NP-hard problem and also a current research area. When existing approaches are investigated, one of the most significant difficulties discovered is the presence of outlier data in the datasets. Outlier data has a negative impact on data utility. Furthermore, k-anonymity algorithms, which are commonly used in the literature, do not provide adequate protection against outlier data. In this study, a… More >

  • Open Access

    ARTICLE

    Improved HardNet and Stricter Outlier Filtering to Guide Reliable Matching

    Meng Xu1, Chen Shen2, Jun Zhang2, Zhipeng Wang3, Zhiwei Ruan2, Stefan Poslad1, Pengfei Xu2,*

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 4785-4803, 2023, DOI:10.32604/cmc.2023.034053 - 29 April 2023

    Abstract As the fundamental problem in the computer vision area, image matching has wide applications in pose estimation, 3D reconstruction, image retrieval, etc. Suffering from the influence of external factors, the process of image matching using classical local detectors, e.g., scale-invariant feature transform (SIFT), and the outlier filtering approaches, e.g., Random sample consensus (RANSAC), show high computation speed and pool robustness under changing illumination and viewpoints conditions, while image matching approaches with deep learning strategy (such as HardNet, OANet) display reliable achievements in large-scale datasets with challenging scenes. However, the past learning-based approaches are limited to… More >

  • Open Access

    ARTICLE

    Evolutionary Algorithm Based Feature Subset Selection for Students Academic Performance Analysis

    Ierin Babu1,*, R. MathuSoothana2, S. Kumar2

    Intelligent Automation & Soft Computing, Vol.36, No.3, pp. 3621-3636, 2023, DOI:10.32604/iasc.2023.033791 - 15 March 2023

    Abstract Educational Data Mining (EDM) is an emergent discipline that concentrates on the design of self-learning and adaptive approaches. Higher education institutions have started to utilize analytical tools to improve students’ grades and retention. Prediction of students’ performance is a difficult process owing to the massive quantity of educational data. Therefore, Artificial Intelligence (AI) techniques can be used for educational data mining in a big data environment. At the same time, in EDM, the feature selection process becomes necessary in creation of feature subsets. Since the feature selection performance affects the predictive performance of any model,… More >

  • Open Access

    ARTICLE

    Identification Method for Users-Transformer Relationship in Station Area Based on Local Selective Combination in Parallel Outlier Ensembles Algorithm

    Yunlong Ma1, Junwei Niu2,*, Bo Xu3, Xingtao Song2, Wei Huang2, Guoqiang Sun2

    Energy Engineering, Vol.120, No.3, pp. 681-700, 2023, DOI:10.32604/ee.2023.024719 - 03 January 2023

    Abstract In the power distribution system, the missing or incorrect file of users-transformer relationship (UTR) in low-voltage station area (LVSA) will affect the lean management of the LVSA, and the operation and maintenance of the distribution network. To effectively improve the lean management of LVSA, the paper proposes an identification method for the UTR based on Local Selective Combination in Parallel Outlier Ensembles algorithm (LSCP). Firstly, the voltage data is reconstructed based on the information entropy to highlight the differences in between. Then, the LSCP algorithm combines four base outlier detection algorithms, namely Isolation Forest (I-Forest),… More >

  • Open Access

    ARTICLE

    Copy Move Forgery Detection Using Novel Quadsort Moth Flame Light Gradient Boosting Machine

    R. Dhanya1,*, R. Kalaiselvi2

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 1577-1593, 2023, DOI:10.32604/csse.2023.031319 - 03 November 2022

    Abstract A severe problem in modern information systems is Digital media tampering along with fake information. Even though there is an enhancement in image development, image forgery, either by the photographer or via image manipulations, is also done in parallel. Numerous researches have been concentrated on how to identify such manipulated media or information manually along with automatically; thus conquering the complicated forgery methodologies with effortlessly obtainable technologically enhanced instruments. However, high complexity affects the developed methods. Presently, it is complicated to resolve the issue of the speed-accuracy trade-off. For tackling these challenges, this article put… More >

  • Open Access

    ARTICLE

    Automatic Detection of Outliers in Multi-Channel EMG Signals Using MFCC and SVM

    Muhammad Irfan1, Khalil Ullah2, Fazal Muhammad3,*, Salman Khan3, Faisal Althobiani4, Muhammad Usman5, Mohammed Alshareef4, Shadi Alghaffari4, Saifur Rahman1

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 169-181, 2023, DOI:10.32604/iasc.2023.032337 - 29 September 2022

    Abstract The automatic detection of noisy channels in surface Electromyogram (sEMG) signals, at the time of recording, is very critical in making a noise-free EMG dataset. If an EMG signal contaminated by high-level noise is recorded, then it will be useless and can’t be used for any healthcare application. In this research work, a new machine learning-based paradigm is proposed to automate the detection of low-level and high-level noises occurring in different channels of high density and multi-channel sEMG signals. A modified version of mel frequency cepstral coefficients (mMFCC) is proposed for the extraction of features… More >

  • Open Access

    ARTICLE

    An Integrated Multilayered Framework for IoT Security Intrusion Decisions

    Hassen Sallay*

    Intelligent Automation & Soft Computing, Vol.36, No.1, pp. 429-444, 2023, DOI:10.32604/iasc.2023.030791 - 29 September 2022

    Abstract Security breaches can seriously harm the Internet of Things (IoT) and Industrial IoT (IIoT) environments. The damage can exceed financial and material losses to threaten human lives. Overcoming these security risks is challenging given IoT ubiquity, complexity, and restricted resources. Security intrusion management is a cornerstone in fortifying the defensive security process. This paper presents an integrated multilayered framework facilitating the orchestration of the security intrusion management process and developing security decision support systems. The proposed framework incorporates four layers with four dedicated processing phases. This paper focuses mainly on the analytical layer. We present… More >

Displaying 1-10 on page 1 of 33. Per Page