Filter options

Publication Date
From
to
Subjects
Journals
Article Types
Countries / Territories
Open Access May 13, 2025

Geochemistry distributions and statistics analysis of REE in stream sediments from the watershed west of Mambaka (Adamawa Plateau, Cameroun)

Abstract The Mambaka watershed is extends between latitudes 1 3°45'E and 14°15'E and longitudes 7°16'N and 6°45'N. The geology, various tectonic and structural events that have affected the Adamawa Plateau in Cameroon make it rich in multi-substance mining. The objective of this study is to map rare earth (REE) geochemical anomalies in the sediments of the watershed streams west of Mambaka, and to trace [...] Read more.
The Mambaka watershed is extends between latitudes 1 3°45'E and 14°15'E and longitudes 7°16'N and 6°45'N. The geology, various tectonic and structural events that have affected the Adamawa Plateau in Cameroon make it rich in multi-substance mining. The objective of this study is to map rare earth (REE) geochemical anomalies in the sediments of the watershed streams west of Mambaka, and to trace their origins and geochemical processes. Predictive maps from inverse distance interpolations (IDW), factor analysis (F1) or principal component analysis (PCA) and hierarchical bottom-up classification maps provided a better understanding of the central tendency, distribution and dispersion of REE in the samples and in the study area, based on standard deviation and variance values that generated two factors F1 (Ho-Tm-Er-Yb-Lu-Dy-Tb-Gd-Eu-Sm) and F2 (Pr-Nd-Ce-La-Sm) representing 92.44% of the total cumulative variance. The ratios Ce/Ce* > 0.78 and Eu/Eu* > 1 demonstrate positive anomalies in Ce and Eu, and clear differentiation. The normalized concentrations used to calculate fractionation ratios show that the values for LaN/YbN (0.58 to 1.34), LaN/SmN (0.61 to 0.88) and LaN/LuN (0.62 to 1.43) suggest higher fractionation in SS09 and lower fractionation in SS01. Similarly, the ratios La/Lu (61.71 to 143.46), La/Yb (9.00 to 20.72), La/Sm (4.02 to 5.83) and La/ Lu (61.71 to 143.46) confirm these higher ratios in SS09 and lower in SS01. The REE in the study area comes from hydrothermal processes based on high lineament densities at sampling points in igneous rocks with a mean ∑REE value of between 174-219 ppm.
Figures
PreviousNext
Article
Open Access January 10, 2025

Artificial Immune Systems: A Bio-Inspired Paradigm for Computational Intelligence

Abstract Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and immune memory. These systems have demonstrated significant potential in addressing complex challenges across optimization, anomaly detection, and adaptive system control. This paper provides a [...] Read more.
Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and immune memory. These systems have demonstrated significant potential in addressing complex challenges across optimization, anomaly detection, and adaptive system control. This paper provides a comprehensive exploration of AIS applications in domains such as cybersecurity, resource allocation, and autonomous systems, highlighting the growing importance of hybrid AIS models. Recent advancements, including integrations with machine learning, quantum computing, and bioinformatics, are discussed as solutions to scalability, high-dimensional data processing, and efficiency challenges. Core algorithms, such as the Negative Selection Algorithm (NSA) and Clonal Selection Algorithm (CSA), are examined, along with limitations in interpretability and compatibility with emerging AI paradigms. The paper concludes by proposing future research directions, emphasizing scalable hybrid frameworks, quantum-inspired approaches, and real-time adaptive systems, underscoring AIS's transformative potential across diverse computational fields.
Figures
PreviousNext
Article
Open Access October 29, 2022

Neural Networks for Enhancing Rail Safety and Security: Real-Time Monitoring and Incident Prediction

Abstract The growth in demand for rail transportation systems within cities, together with high-speed and long-distance transportation running on a rail network, raises the issues of both rail safety and security. If an accident or an attack occurs, its consequences can be extremely severe. To mitigate the impact of these events, the real-time monitoring of a rail system is required. In that case, the [...] Read more.
The growth in demand for rail transportation systems within cities, together with high-speed and long-distance transportation running on a rail network, raises the issues of both rail safety and security. If an accident or an attack occurs, its consequences can be extremely severe. To mitigate the impact of these events, the real-time monitoring of a rail system is required. In that case, the improvements in monitoring can be achieved using artificial intelligence algorithms such as neural networks. Neural networks have been used to achieve real-time incident identification in monitoring the track quality in terms of classifying the graphical outputs of an ultrasonic system working with the rails and track bed, to predict incidents on the rail infrastructure due to transmission channels becoming blocked, and also to attempt scheduling preemptive and preventative maintenance. In terms of forecasting incidents and accidents on board the trains, neural networks have been used to model passenger behavior and optimize responses during a train station evacuation. In tackling the incidents and accidents occurring on rail transport, we contribute with two methodologies to detect anomalies in real-time and identify the level of security risk: at the maintenance level with personnel operating along the railways, and onboard passenger trains. These methodologies were evaluated on real-world datasets and shown to be able to achieve a high accuracy in the results. The results generated from these case studies also reveal the potential for network-wide applications, which could enhance security and safety on railway networks by offering the possibility of better managing network disruptions and more rapidly identifying security issues. The speed and coverage of the information generated through the implementation of these methodologies have implications in utilizing prediction for decision support and enhancing safety and security on board the rail network.
Figures
PreviousNext
Review Article
Open Access December 29, 2020

A Deep Learning Architectures for Enhancing Cyber Security Protocols in Big Data Integrated ERP Systems

Abstract Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectures of variational autoencoder, sparse autoencoder, and deep belief network for detecting anomalies, fraud, and preventing cybersecurity attacks. These cybersecurity issues occur in finance, human [...] Read more.
Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectures of variational autoencoder, sparse autoencoder, and deep belief network for detecting anomalies, fraud, and preventing cybersecurity attacks. These cybersecurity issues occur in finance, human resources, supply chain, and marketing in the big data integrated ERP systems or cloud-based ERP systems. The main objectives of this creative research work are to identify the vulnerabilities in various ERP systems, databases, and the interconnected domains; to introduce a conceptual cybersecurity network model that incorporates variational autoencoders, sparse autoencoders, and deep belief networks; to evaluate the performance of the proposed cybersecurity model by employing the appropriate parameters with real-time and synthetic databases and simulated scenarios; and to validate the model performance by comparing it with traditional algorithms. A big data platform with an integrated business management system is known as an integrated ERP system, which plays an instrumental role in conducting business for various organizations in society. In recent times, as uncertainty and disparity increase, the cyber ecosystem becomes more complex, volatile, dynamic, and unpredictable. In particular, the number of cyber-attacks is increasing at an alarming rate; the resultant security breaches have a disruptive and disturbing effect on businesses around the world, with a loss of billions of dollars. To combat these threats, it is essential to develop a conceptual cybersecurity network model to secure systems by functioning as a mutually supporting and strengthening network model rather than working in isolation. In this dynamic and fluid environment, introducing a deep learning approach helps to support and prevent fraud and other illicit activities related to human resources and the supply chain, among others. Some cybersecurity vulnerabilities include, for example, database vulnerabilities, service level vulnerabilities, and system vulnerabilities, among others. The proposed methodology focuses only on database vulnerabilities, with the main aim of detecting and mitigating new potential vulnerabilities in other dependent domains as a future initiative.
Figures
PreviousNext
Review Article
Open Access December 27, 2021

Digital Signal Processing Challenges in Financial Messaging Systems: Case Studies in High-Volume SWIFT Flows

Abstract Digital signal processing played a central role in two practical studies addressing challenging problems related to high-volume SWIFT financial messaging flows conveyed by the interconnected banking network. Technical methods and results are summarized here for each study, with the links to fundamental concepts underlying the work shown in parentheses. The first addresses real-time fraud [...] Read more.
Digital signal processing played a central role in two practical studies addressing challenging problems related to high-volume SWIFT financial messaging flows conveyed by the interconnected banking network. Technical methods and results are summarized here for each study, with the links to fundamental concepts underlying the work shown in parentheses. The first addresses real-time fraud detection, integrating pattern recognition and anomaly scoring procedures into a latency conscious processing system. The second focuses on minimizing delay without degrading detection accuracy, balancing speed and fidelity in filter design and control. Together, they demonstrate the potential for applying a DSP perspective to broad classes of problems encountered in processing financial messaging data. The first study extends work on a signal representation of financial messaging data streams and the associated noise characteristics by developing a vocabulary that translates real-world fraud patterns into DSP operations. Examination of the resulting choice of signal features, combined with considerations of detection speed, form the basis for details about implementing the pattern-recognition and anomaly-scoring tasks within a streaming-processing architecture.
Figures
PreviousNext
Review Article
Open Access December 20, 2024

AI for Time Series and Anomaly Detection

Abstract Time series data are increasingly prevalent across domains such as finance, healthcare, manufacturing, and IoT, making accurate forecasting and anomaly detection critical for decision-making and system reliability. Traditional statistical methods (e.g., ARIMA, Holt-Winters) often fail to capture complex temporal dependencies and high-dimensional interactions inherent in modern time series. Recent [...] Read more.
Time series data are increasingly prevalent across domains such as finance, healthcare, manufacturing, and IoT, making accurate forecasting and anomaly detection critical for decision-making and system reliability. Traditional statistical methods (e.g., ARIMA, Holt-Winters) often fail to capture complex temporal dependencies and high-dimensional interactions inherent in modern time series. Recent advances in artificial intelligence particularly deep learning architectures such as recurrent neural networks (RNNs), convolutional neural networks (CNNs), temporal convolutional networks (TCNs), graph neural networks (GNNs) and Transformers have demonstrated marked improvements in modeling both univariate and multivariate series, as well as in detecting anomalies that deviate from learned norms (Darban, Webb, Pan, Aggarwal, & Salehi, 2022; Chiranjeevi, Ramya, Balaji, Shashank, & Reddy, 2024) [1,2]. Moreover, ensemble techniques and hybrid signal-processing + deep-learning pipelines show enhanced sensitivity and adaptability in real-world anomaly detection scenarios (Iqbal, Amin, Alsubaei, & Alzahrani, 2024) [3]. In this work, we provide a unified survey and comparative analysis of AI-driven time series forecasting and anomaly detection methods, highlight key industrial application domains, evaluate performance trade-offs (e.g., accuracy vs. latency, supervised vs. unsupervised learning), and discuss emerging challenges including interpretability, data drift, real-time deployment on edge devices, and integration of causal reasoning. Our findings suggest that while AI approaches significantly outperform classical techniques in many settings, careful consideration of data characteristics, evaluation metrics and deployment environment remains essential for effective adoption.
Article

Query parameters

Keyword:  Anomaly

View options

Citations of

Views of

Downloads of