IET Communications最新文献

筛选
英文 中文
A Novel Hybrid Approach for Intrusion Detection Using Neuro-Fuzzy, SVM, and PSO 基于神经模糊、支持向量机和粒子群的入侵检测混合方法
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2025-08-06 DOI: 10.1049/cmu2.70071
Soodeh Hosseini, Fahime Lotfi, Hossein Seilani
{"title":"A Novel Hybrid Approach for Intrusion Detection Using Neuro-Fuzzy, SVM, and PSO","authors":"Soodeh Hosseini,&nbsp;Fahime Lotfi,&nbsp;Hossein Seilani","doi":"10.1049/cmu2.70071","DOIUrl":"https://doi.org/10.1049/cmu2.70071","url":null,"abstract":"<p>This paper presents a novel method for optimising intrusion detection systems (IDS) by using two powerful techniques, namely ‘Principal component analysis (PCA)’ and ‘Particle swarm optimisation (PSO).’ Furthermore, the proposed approach is implemented on two categories of classifiers, Neuro-Fuzzy and support vector machines (SVM), which function on four widely used intrusion detection system datasets: CAIDA, DARPA, NSLKDD, and ISCX2012. Performance results are analysed individually based on a set of established evaluation criteria. Furthermore, the PSO algorithm is applied in search of the best combination of the outputs from the Neuro-Fuzzy and the SVM models, resulting in better attack detection accuracy with reduced false alarm rates. Another benefit of using PCA in the proposed method is that it considerably reduces the dimensions of the data by computing the principal components. This offers several advantages, such as reduced model complexity, training and execution time, memory usage, and model overfitting prevention. By focusing on the major components, PCA reduces noise in data to a certain extent, leading to increased classification accuracy and robustness. It also improves model interpretability by highlighting the key components. The application of PSO to find the most optimal parameters leads to the optimisation of the Neuro-Fuzzy and SVM models' parameters. The results achieved support that the proposed method for output combination in both Neuro-Fuzzy and SVM categories significantly enhances the accuracy of attack detection while reducing the false alarm rate.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144782625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CID-RPL: Clone ID Attack Detection Using Deep Neural Network for RPL-Based IoT Networks CID-RPL:基于深度神经网络的基于rpl的物联网克隆ID攻击检测
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2025-08-06 DOI: 10.1049/cmu2.70067
Fatima Al-Quayed, Sana Rauf Awan, Noshina Tariq, Mamoona Humayun, Thanaa S Alnusairi, Tayyab Rehman
{"title":"CID-RPL: Clone ID Attack Detection Using Deep Neural Network for RPL-Based IoT Networks","authors":"Fatima Al-Quayed,&nbsp;Sana Rauf Awan,&nbsp;Noshina Tariq,&nbsp;Mamoona Humayun,&nbsp;Thanaa S Alnusairi,&nbsp;Tayyab Rehman","doi":"10.1049/cmu2.70067","DOIUrl":"https://doi.org/10.1049/cmu2.70067","url":null,"abstract":"<p>The proliferation of the Internet of Things (IoT) has reshaped industries based on seamless connectivity. However, it has also brought about immense security challenges, especially in the communication protocol of routing protocol for low-power and lossy networks (RPL). One of these security threats vital to the RPL-based IoT networks includes the Clone ID attack on malicious nodes when they clone the identity of legitimate nodes to access their sensitive data without authorization. Detecting Clone ID attacks in RPL-based IoT networks is complex because network traffic data has high dimensions and substantial data imbalances while facing limited resources in these environments. The unmanaged control message system and insufficient identity authentication methods within the RPL protocol directly expose networks to state-of-the-art cyber security threats. This paper proposes a new edge layer-based deep neural network (DNN) approach to detect Clone ID attacks from IoT sensor networks by network traffic pattern analysis. The proposed method is based on deep data features to distinguish legitimate nodes from cloned nodes and improve the overall security, resilience, and operational efficiency of RPL-based IoT networks. To check the efficiency of our proposed method, we designed a synthetic dataset called CID-RPL. The CID-RPL dataset consists of 25 attributes and 2,131,328 samples. The experimental results are best to describe that our proposed approach outperformed the previously designed methods by offering an accuracy improvement of 5.06%, precision improvement of 7.60%, recall increment of 7.0%, and F1 score enhancement of 11.0%. Similarly, residual energy at the network level increased by 32.84%, which infers that the lifetime of the network will be extended and its energy efficiency increased under attack situations. Thus, the results testify to the effectiveness of the DL-based solution proposed herein to detect Clone ID attacks in dynamic and evolving network environments.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70067","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144782626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noncoherent Reflecting Modulation for Reconfigurable Intelligent Surface-Based Communications 面向可重构智能地面通信的非相干反射调制
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2025-08-05 DOI: 10.1049/cmu2.70068
Hongliang Zou, Lidan Fang, Lu Qi, Lina Guo, Hongyan Chen
{"title":"Noncoherent Reflecting Modulation for Reconfigurable Intelligent Surface-Based Communications","authors":"Hongliang Zou,&nbsp;Lidan Fang,&nbsp;Lu Qi,&nbsp;Lina Guo,&nbsp;Hongyan Chen","doi":"10.1049/cmu2.70068","DOIUrl":"https://doi.org/10.1049/cmu2.70068","url":null,"abstract":"<p>Reconfigurable intelligent surface (RIS)-based communication has emerged as a novel concept that can transform signal in a cost-effective and energy-efficient manner. However, the RIS system is confronted with the following several problems. First, the substantial number of reflecting elements complicates the estimating of channel state information (CSI). Second, passive RIS systems merely reflect signals to the receiver. The enhancements in bit error rate (BER) performance are insufficient. Third, the existing RIS systems only consider the influence of noise at the receiver. Nevertheless, in reality, the signal is affected by noise on both RIS and receiver. To address these limitations, a noncoherent reflecting modulation (NRM) system is designed in this paper. In the NRM system, the active RIS is adopted. It modifies not only the phase but also the amplitude, which significantly enhances the BER performance. Energy signals and differential techniques are employed, allowing the system to function without any CSI at the transmitter, RIS, or receiver. The simulation results demonstrate that NRM exhibits a 9 dB improvement in BER performance and exhibits superior noise resistance compared to the existing differential RIS system. The upper bound of the average symbol error probability is derived. Extensive simulations validate the superiority of the NRM scheme in scenarios such as 6G.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70068","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144773740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAVs-Assisted Low-Bit Quantized CF-mMIMO Systems With MmWave Communications Under MRC Detection MRC检测下无人机辅助毫米波通信低比特量化CF-mMIMO系统
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2025-08-04 DOI: 10.1049/cmu2.70069
Sogol Moshirvaziri, Jamshid Abouei
{"title":"UAVs-Assisted Low-Bit Quantized CF-mMIMO Systems With MmWave Communications Under MRC Detection","authors":"Sogol Moshirvaziri,&nbsp;Jamshid Abouei","doi":"10.1049/cmu2.70069","DOIUrl":"https://doi.org/10.1049/cmu2.70069","url":null,"abstract":"<p>The cell-free massive multiple input multiple output (CF-mMIMO) approach, due to its high coverage and the ability to attenuate the large-scale fading impacts in wireless communications, has drawn a lot of attention. Additionally, because of their movement ability, low power, and low-cost employed infrastructures, unmanned aerial vehicles (UAVs) are considered a promising technology to provide service on demand in various applications, deployed as either base stations (BSs) or user equipment (UEs). This paper considers a UAV-equipped CF-mMIMO wireless network, assuming millimetre-wave (mmWave) connections between UAV-BSs and ground users. Leveraging the additive quantisation noise model (AQNM), closed-form expressions for the uplink data rate and energy efficiency (EE) under maximum ratio combining (MRC) detection are obtained. The impacts of effective parameters, including the UAV's altitude, the number of antennas, and the resolution of analogue-to-digital converters (ADCs), on system performance are investigated. Simulation results demonstrate that EE can be optimised for these factors to achieve the maximum value. In addition, the optimal number of quantisation bits to maximise EE is based on the number of antennas and the height of the UAVs. Comparing analytical results with accurate ones shows the accuracy of our approximations due to the same trend of variations.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144767816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Instantaneous Extraction of Frequency Components of the FM Signals by Time Domain Processing and Its Applications 时域处理瞬时提取调频信号频率成分及其应用
IF 1.6 4区 计算机科学
IET Communications Pub Date : 2025-07-30 DOI: 10.1049/cmu2.70070
Roza Banitalebi Dehkordi, Mohsen Mivehchy
{"title":"Instantaneous Extraction of Frequency Components of the FM Signals by Time Domain Processing and Its Applications","authors":"Roza Banitalebi Dehkordi,&nbsp;Mohsen Mivehchy","doi":"10.1049/cmu2.70070","DOIUrl":"https://doi.org/10.1049/cmu2.70070","url":null,"abstract":"<p>This paper investigates the momentary extraction of a part of the frequency components of the signal resulting from the frequency modulation process. Based on this analysis, a new method for extracting frequency information is proposed. The changes of the instantaneous periods of the FM signal are investigated, and a simple method to determine the instantaneous frequency of the signal in the time domain is proposed. The proposed method was evaluated through simulations and compared against conventional FM demodulation techniques. In similar SNR, the relative error power of the proposed method is approximately 2 dB less than other conventional types of FM demodulators.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70070","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144725397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Stream Signal Separation Based on Asynchronous Control Meta-Surface Antenna 基于异步控制元表面天线的多流信号分离
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-07-25 DOI: 10.1049/cmu2.70062
Yuze Guo, Liang Jin, Yangming Lou, Xiaoming Xu, Qinlong Li, Boming Li, Shuaiyin Wang
{"title":"Multi-Stream Signal Separation Based on Asynchronous Control Meta-Surface Antenna","authors":"Yuze Guo,&nbsp;Liang Jin,&nbsp;Yangming Lou,&nbsp;Xiaoming Xu,&nbsp;Qinlong Li,&nbsp;Boming Li,&nbsp;Shuaiyin Wang","doi":"10.1049/cmu2.70062","DOIUrl":"https://doi.org/10.1049/cmu2.70062","url":null,"abstract":"<p>The real-time reconfigurable characteristics of meta-surface antennas can be used to separate multi-stream signals under the condition of single radio frequency (RF). However, with the increase of the symbol rate and the number of antenna arrays in the future, it will face the problem that the state switch rate of the electromagnetic unit is not enough to reach the upper limit of array effective degrees of freedom (DOF) of the meta-surface antenna. To solve this problem, a theory of asynchronous control meta-surface antenna is proposed in this paper. By designing the starting time of different element state switching, different electromagnetic element states are staggered to improve the array effective DOF of the meta-surface antenna. Then, an electromagnetic unit state design algorithm of asynchronous control meta-surface antenna based on the minimum condition number of equivalent channel matrix is proposed. We improve the sparrow search algorithm to solve the condition number minimization problem in order to obtain the better multi-stream signal separation performance. The simulation results show that compared with the synchronous control meta-surface antenna, theory proposed in this paper can improve the effective DOF of array under the condition of limited switch rate, and can effectively reduce the receiving bit error rate and improve spectral efficiency when separating multi-stream signals.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70062","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144695814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Neural Network-Based Task Offloading and Resource Allocation for Scalable Vehicular Networks 基于图神经网络的可扩展车辆网络任务卸载与资源分配
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-07-23 DOI: 10.1049/cmu2.70064
Menghan Shao, Rongqing Zhang, Liuqing Yang
{"title":"Graph Neural Network-Based Task Offloading and Resource Allocation for Scalable Vehicular Networks","authors":"Menghan Shao,&nbsp;Rongqing Zhang,&nbsp;Liuqing Yang","doi":"10.1049/cmu2.70064","DOIUrl":"https://doi.org/10.1049/cmu2.70064","url":null,"abstract":"<p>Intelligent vehicles require extensive data processing to enhance safety and improve driver comfort. With limited onboard computing resources, these vehicles often offload tasks to nearby vehicles or servers for auxiliary processing to meet real-time response requirements. However, the complexity and highly dynamic nature of the vehicular environment render the design of effective offloading strategies. While existing approaches can adapt to changes in environmental parameters within vehicular networks, they are fundamentally limited by their inability to process variable-dimensional environmental information and make decisions that scale with network size. Traditional methods typically rely on fixed-size input representations and static computational frameworks, which are inherently unsuitable for the dynamic and scalable nature of real-world vehicular networks that require adaptive responses to varying network sizes. As a result, existing alternatives lack feasibility to highly dynamic real-world vehicle networks that require adaptive responses to varying network sizes. To alleviate this limitation, we develop an original approach to address the task offloading and resource allocation problem with a scalable size, via a framework based on a graph neural network (GNN). Leveraging its neighbour aggregation mechanism, GNN effectively adapts to varying-scale topologies in dynamic vehicular networks, ensuring robust performance regardless of network size. To evaluate our proposed approach, we conducted extensive simulations to analyse its performance. The experimental results demonstrate that our method provides a more scalable and real-time capable solution, surpassing existing approaches by seamlessly handling dynamic network size variations.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70064","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144681589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal DBS Placement in IoT Networks to Minimize Power Consumption Using Grasshopper Optimization Algorithm 使用Grasshopper优化算法在物联网网络中优化DBS放置以最小化功耗
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-07-18 DOI: 10.1049/cmu2.70059
Ahmed Qabel Fahem, Javad Musevi Niya
{"title":"Optimal DBS Placement in IoT Networks to Minimize Power Consumption Using Grasshopper Optimization Algorithm","authors":"Ahmed Qabel Fahem,&nbsp;Javad Musevi Niya","doi":"10.1049/cmu2.70059","DOIUrl":"https://doi.org/10.1049/cmu2.70059","url":null,"abstract":"<p>One of the basic challenges that the sixth-generation (6G) telecommunication is facing is the possibility of wide coverage to users in diverse geographical environments. Due to environmental events and unforeseen events such as problems with ground base stations, sometimes the services of these ground stations are disrupted, and as a result, to serve users and cover them, a drone base station (DBS) must be used. But the cost of creating the infrastructure for DBS is very high, and it should be possible to provide the maximum coverage for users with the least number of DBS. Therefore, the location of DBS is very important. Also, in order to provide services to users with the best quality, DBSs should be placed optimally in such a way that power consumption is minimized. In this research, we have presented a scheme based on the grasshopper optimization algorithm (GOA) for the optimal location of DBSs in IoT networks. Specifically, we conducted a performance analysis of one distinct scenario. Employing various intelligence strategies, the proposed method has been very successful in the optimal location of DBSs compared to other methods, and it has performed better in terms of power consumption.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144647302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multilevel Optimised Algorithm for UWB Positioning in Indoor Environment 室内环境下超宽带定位的多级优化算法
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-07-10 DOI: 10.1049/cmu2.70061
Deshu Guo, Aihua Zhang, Haowen Xia
{"title":"A Multilevel Optimised Algorithm for UWB Positioning in Indoor Environment","authors":"Deshu Guo,&nbsp;Aihua Zhang,&nbsp;Haowen Xia","doi":"10.1049/cmu2.70061","DOIUrl":"https://doi.org/10.1049/cmu2.70061","url":null,"abstract":"<p>The proliferation of the Internet of Things has precipitated an escalating demand for indoor positioning and navigation systems that exhibit a confluence of heightened precision and economic viability. However, non-line-of-sight has an impact on the accuracy of ultra-wideband indoor location. To address this issue, we proposed a multilevel optimised algorithm based on particle filter and Bayesian unscented Kalman filter (PF-BUKF) to approach the nonlinear state and then achieve accurate three-dimensional position estimation. This approach comprises two stages. Firstly, the PF is utilised to determine the tag's coordinate's state vector and covariance as the initial optimised values. Then, the results are employed as the prior information for BUKF in order to anticipate the state of tag. The process of two steps utilises discrete points to approach the true state, which enhances the robustness and accuracy of the positioning system. Furthermore, we investigated the effect of time step size on the precision of positioning. Experimental results reveal a substantial improvement over traditional positioning methods, with mean absolute error and root mean square error values of 8.84 and 2.70 cm, respectively, as opposed to 19.02 and 8.45 cm using conventional algorithms in a nonlinear system.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70061","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144589906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distance-Based Unsupervised Local Outlier Detection: Based Values Analysis to Improve Outlier Detection Using Machine Learning 基于距离的无监督局部离群点检测:基于值分析的机器学习改进离群点检测
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-07-04 DOI: 10.1049/cmu2.70060
Atul Kumar Gupta, Rahul Kumar, Jhankar Moolchandani, Vikas Thada, Mohd Asif Shah, Anoop Kumar Tiwari
{"title":"Distance-Based Unsupervised Local Outlier Detection: Based Values Analysis to Improve Outlier Detection Using Machine Learning","authors":"Atul Kumar Gupta,&nbsp;Rahul Kumar,&nbsp;Jhankar Moolchandani,&nbsp;Vikas Thada,&nbsp;Mohd Asif Shah,&nbsp;Anoop Kumar Tiwari","doi":"10.1049/cmu2.70060","DOIUrl":"https://doi.org/10.1049/cmu2.70060","url":null,"abstract":"<p>Machine learning faces challenges in detecting outliers, especially in high-dimensional datasets. Effective data quality is crucial for better results, and many algorithms identify outliers by analysing outlying aspects of data objects and objects within the dataset. The proposed Advanced Distance-Based Unsupervised Local Outlier Detection (DU-LOD) method improves this process by continuously evaluating and identifying outliers using unsupervised learning and distance-based calculations. DU-LOD identifies outliers by comparing differences between data objects and their neighbours, making it the first method to combine unsupervised local outlier detection with nearest cluster point identification. Experimental analysis through accuracy performance of 96.12%, detection rate performance of 41.89%, precision of 56.12%, and recall of 1.79% proves that our model performs best over the various parameters compared with other existing algorithms. Therefore, measures such as area under the ROC curve (AUC), precision and recall are more appropriate in such a scenario.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.70060","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144551005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信