{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T17:40:00Z","timestamp":1764956400439,"version":"3.46.0"},"reference-count":35,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,11,6]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>One of the key factors driving a country\u2019s economic development and ensuring the sustainability of its industries is the constant availability of electricity. This is normally provided by the national grid. However, the power supply is not always stable in developing countries where new businesses, including the telecommunications industry, are constantly emerging. Therefore, they must rely on generators to ensure their full functionality. These generators rely on fuel to function, and consumption is usually high if not properly monitored. Monitoring is usually done by a (non-expert) human. This can sometimes be a tedious process, as some companies have reported excessively high consumption rates. For anomaly detection in power generating plants, the studies by Mulongo et al. and Atemkeng and Jimoh used the same dataset to train a multilayer perceptron (MLP) and generative adversarial networks (GANs), respectively, achieving an accuracy of 96.1% with MLP and 98.9% with GAN. Through comparative analysis and the use of ensemble learning techniques, we found that ensemble learning models outperform both MLP and GAN as proposed by Mulongo et al. and Atemkeng and Jimoh using the same dataset. Furthermore, we investigated the potential of autoencoders to outperform MLPs, GANs, and ensemble learning models. To this end, we have introduced a label-assisted autoencoder approach for detecting anomalies in power-generating plants. This model includes a labelling assistance module that adjusts the thresholds. Our results indicate that the label-assisted autoencoder outperforms the MLP. However, GANs and all ensemble learning models outperformed the label-assisted autoencoder. Nevertheless, the use of a label-assisted autoencoder offers a distinct advantage in categorizing anomalies based on their severity, a capability not present in ensemble learning models and GANs.<\/jats:p>","DOI":"10.1515\/jisys-2023-0283","type":"journal-article","created":{"date-parts":[[2024,11,8]],"date-time":"2024-11-08T12:51:11Z","timestamp":1731070271000},"source":"Crossref","is-referenced-by-count":0,"title":["Ensemble learning and deep learning-based defect detection in power generation plants"],"prefix":"10.1515","volume":"33","author":[{"given":"Marcellin","family":"Atemkeng","sequence":"first","affiliation":[{"name":"Department of Mathematics, Rhodes University , P.O. Box 94 , 6139 Makhanda , South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Victor","family":"Osanyindoro","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, African Institute for Mathematical Sciences , P.O. Box 608 , Limbe , Cameroon"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rockefeller","family":"Rockefeller","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, African Institute for Mathematical Sciences , P.O. Box 608 , Limbe , Cameroon"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sisipho","family":"Hamlomo","sequence":"additional","affiliation":[{"name":"Department of Statistics, Rhodes University , P.O. Box 94 , 6139 Makhanda , South Africa"},{"name":"Department of Mathematics, Rhodes University , P.O. Box 94 , 6139 Makhanda , South Africa"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jecinta","family":"Mulongo","sequence":"additional","affiliation":[{"name":"Department of Mathematical Sciences, African Institute for Mathematical Sciences , P.O. Box 608 , Limbe , Cameroon"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Theophilus","family":"Ansah-Narh","sequence":"additional","affiliation":[{"name":"Ghana Space Science and Technology Institute, Ghana Atomic Energy Commission , P.O. Box 80 , Accra , Ghana"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Franklin","family":"Tchakount\u00e9","sequence":"additional","affiliation":[{"name":"Department of SFTI, School of Chemical Engineering and Mineral Industries, University of Ngaound\u00e9r\u00e9 , P.O. Box 454 , Ngaound\u00e9r\u00e9 , Cameroon"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arnaud Nguembang","family":"Fadja","sequence":"additional","affiliation":[{"name":"Dipartimento di Matematica e Informatica, University of Ferrara , Via Saragat 1 , I-44122 Ferrara , Italy"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"374","published-online":{"date-parts":[[2024,11,6]]},"reference":[{"key":"2025120517251280448_j_jisys-2023-0283_ref_001","doi-asserted-by":"crossref","unstructured":"Humar I, Ge X, Xiang L, Jo M, Chen M, Zhang J. Rethinking energy efficiency models of cellular networks with embodied energy. IEEE Network. 2011;25(2):40\u20139.","DOI":"10.1109\/MNET.2011.5730527"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_002","doi-asserted-by":"crossref","unstructured":"Lorincz J, Bule I. Renewable energy sources for power supply of base station sites. Int J Business Data Commun Network (IJBDCN). 2013;9(3):53\u201374.","DOI":"10.4018\/jbdcn.2013070104"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_003","doi-asserted-by":"crossref","unstructured":"Ayang A, Ngohe-Ekam PS, Videme B, Temga J. Power consumption: base stations of telecommunication in sahel zone of cameroon: typology based on the power consumption model and energy savings. J Energy. 2016;2016(1):3161060.","DOI":"10.1155\/2016\/3161060"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_004","doi-asserted-by":"crossref","unstructured":"Espadafor FJ, Villanueva JB, Garciiia MT. Analysis of a diesel generator crankshaft failure. Eng Failure Anal. 2009;16(7):2333\u201341.","DOI":"10.1016\/j.engfailanal.2009.03.019"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_005","doi-asserted-by":"crossref","unstructured":"Mulongo J, Atemkeng M, Ansah-Narh T, Rockefeller R, Nguegnang GM, Garuti MA. Anomaly detection in power generation plants using machine learning and neural networks. Appl Artif Intel. 2020;34(1):64\u201379.","DOI":"10.1080\/08839514.2019.1691839"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_006","doi-asserted-by":"crossref","unstructured":"Jinggang W, Ligai K, Meixia D, Jin Z, Xiaoxia G. Feasibility analysis using natural source cooling the IDC plant. In: 2009 Chinese Control and Decision Conference. IEEE; 2009. p. 2579\u201384.","DOI":"10.1109\/CCDC.2009.5191830"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_007","unstructured":"Goodfellow I, Bengio Y, Courville A. Deep learning. Cambridge, Massachusetts, USA: MIT Press; 2016."},{"key":"2025120517251280448_j_jisys-2023-0283_ref_008","doi-asserted-by":"crossref","unstructured":"Atemkeng M, Jimoh TA. Anomaly detection in power generation plants with generative adversarial networks. In: 2023 International Conference on Electrical, Computer and Energy Technologies (ICECET). IEEE; 2023. p. 1\u20136.","DOI":"10.1109\/ICECET58911.2023.10389251"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_009","doi-asserted-by":"crossref","unstructured":"Aggarwal CC. An introduction to outlier analysis. In: Outlier analysis. Springer International Publishing; 2017. p. 1\u201334.","DOI":"10.1007\/978-3-319-54765-7_1"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_010","doi-asserted-by":"crossref","unstructured":"Demestichas K, Alexakis T, Peppes N, Adamopoulou E. Comparative analysis of machine learning-based approaches for anomaly detection in vehicular data. Vehicles. 2021;3(2):171\u201386.","DOI":"10.3390\/vehicles3020011"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_011","doi-asserted-by":"crossref","unstructured":"Hayes MA, Capretz MA. Contextual anomaly detection framework for big sensor data. J Big Data. 2015;2(1):1\u201322.","DOI":"10.1186\/s40537-014-0011-y"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_012","doi-asserted-by":"crossref","unstructured":"Fahim M, Sillitti A. Anomaly detection, analysis and prediction techniques in iot environment: A systematic literature review. IEEE Access. 2019;7:81664\u201381.","DOI":"10.1109\/ACCESS.2019.2921912"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_013","doi-asserted-by":"crossref","unstructured":"Trinh HD, Zeydan E, Giupponi L, Dini P. Detecting mobile traffic anomalies through physical control channel fingerprinting: A deep semi-supervised approach. IEEE Access. 2019;7:152187\u2013201.","DOI":"10.1109\/ACCESS.2019.2947742"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_014","doi-asserted-by":"crossref","unstructured":"Omar S, Ngadi A, Jebur HH. Machine learning techniques for anomaly detection: an overview. Int J Comput Appl. 2013;79(2):33\u201341.","DOI":"10.5120\/13715-1478"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_015","doi-asserted-by":"crossref","unstructured":"Vishwanathan S, Murty MN. SSVM: a simple SVM algorithm. In: Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN\u201902 (Cat. No. 02CH37290). vol. 3. IEEE; 2002. p. 2393\u20138.","DOI":"10.1109\/IJCNN.2002.1007516"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_016","doi-asserted-by":"crossref","unstructured":"Peterson LE. K-nearest neighbor. Scholarpedia. 2009;4(2):1883.","DOI":"10.4249\/scholarpedia.1883"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_017","doi-asserted-by":"crossref","unstructured":"Nick TG, Campbell KM. Logistic regression. In: Ambrosius WT, editor. Topics in Biostatistics. Methods in Molecular Biology\u2122. Vol 404. Humana Press; 2007. p. 273\u2013301. 10.1007\/978-1-59745-530-5_14.","DOI":"10.1007\/978-1-59745-530-5_14"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_018","unstructured":"Ruck DW, Rogers SK, Kabrisky M. Feature selection using a multilayer perceptron. J Neural Netw Comput. 1990;2(2):40\u20138."},{"key":"2025120517251280448_j_jisys-2023-0283_ref_019","doi-asserted-by":"crossref","unstructured":"Bhattacharyya S, Jha S, Tharakunnel K, Westland JC. Data mining for credit card fraud: A comparative study. Decision Support Syst. 2011;50:602\u201313.","DOI":"10.1016\/j.dss.2010.08.008"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_020","doi-asserted-by":"crossref","unstructured":"Hasan M, Islam MM, Zarif MII, Hashem M. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches. Internet Things. 2019;7:100059.","DOI":"10.1016\/j.iot.2019.100059"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_021","doi-asserted-by":"crossref","unstructured":"Said Elsayed M, Le-Khac NA, Dev S, Jurcut AD. Network anomaly detection using LSTM based autoencoder. In: Proceedings of the 16th ACM Symposium on QoS and Security for Wireless and Mobile Networks; 2020. p. 37\u201345.","DOI":"10.1145\/3416013.3426457"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_022","doi-asserted-by":"crossref","unstructured":"Hawkins S, He H, Williams G, Baxter R. Outlier detection using replicator neural networks. In: International Conference on Data Warehousing and Knowledge Discovery. Springer; 2002. p. 170\u201380.","DOI":"10.1007\/3-540-46145-0_17"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_023","doi-asserted-by":"crossref","unstructured":"Zhang J, Zhang H, Ding S, Zhang X. Power consumption predicting and anomaly detection based on transformer and K-means. Front Energy Res. 2021;9:681.","DOI":"10.3389\/fenrg.2021.779587"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_024","unstructured":"M\u00fcnz G, Li S, Carle G. Traffic anomaly detection using k-means clustering. In: GI\/ITG Workshop MMBnet. vol. 7; 2007. p. 9."},{"key":"2025120517251280448_j_jisys-2023-0283_ref_025","doi-asserted-by":"crossref","unstructured":"Rodriguez-Galiano V, Sanchez-Castillo M, Chica-Olmo M, Chica-Rivas M. Machine learning predictive models for mineral prospectivity: An evaluation of neural networks, random forest, regression trees and support vector machines. Ore Geol Rev. 2015;71:804\u201318.","DOI":"10.1016\/j.oregeorev.2015.01.001"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_026","doi-asserted-by":"crossref","unstructured":"Freund Y, Schapire RE. A decision-theoretic generalization of on-line learning and an application to boosting. J Comput Syst Sci. 1997;55(1):119\u201339.","DOI":"10.1006\/jcss.1997.1504"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_027","unstructured":"Freund Y, Schapire RE. Experiments with a new boosting algorithm. In: Machine Learning: Proceedings of the Thirteenth International Conference, 1996. vol. 96. Citeseer; 1996. p. 148\u201356."},{"key":"2025120517251280448_j_jisys-2023-0283_ref_028","doi-asserted-by":"crossref","unstructured":"Chen T, Guestrin C. Xgboost: A scalable tree boosting system. In: Proceedings of the 22nd ACm Sigkdd International Conference on Knowledge Discovery and Data Mining; 2016. p. 785\u201394.","DOI":"10.1145\/2939672.2939785"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_029","doi-asserted-by":"crossref","unstructured":"Hancock JT, Khoshgoftaar TM. CatBoost for big data: an interdisciplinary review. J Big Data. 2020;7(1):94.","DOI":"10.1186\/s40537-020-00369-8"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_030","unstructured":"Prokhorenkova L, Gusev G, Vorobev A, Dorogush AV, Gulin A. CatBoost: unbiased boosting with categorical features. Advances in neural information processing systems. 2018. p. 31."},{"key":"2025120517251280448_j_jisys-2023-0283_ref_031","unstructured":"Ke G, Meng Q, Finley T, Wang T, Chen W, Ma W, et al. Lightgbm: A highly efficient gradient boosting decision tree. 31st Conference on Neural Information Processing Systems, NIPS; 2017. p. 30."},{"key":"2025120517251280448_j_jisys-2023-0283_ref_032","doi-asserted-by":"crossref","unstructured":"Hastie T, Rosset S, Zhu J, Zou H. Multi-class AdaBoost. Stat Interface. 2009;2(3):349\u201360.","DOI":"10.4310\/SII.2009.v2.n3.a8"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_033","doi-asserted-by":"crossref","unstructured":"R\u00e4tsch G, Onoda T, M\u00fcller KR. Soft margins for AdaBoost. Machine Learn. 2001;42:287\u2013320.","DOI":"10.1023\/A:1007618119488"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_034","doi-asserted-by":"crossref","unstructured":"Zhai J, Zhang S, Chen J, He Q. Autoencoder and its various variants. In: 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC). IEEE; 2018. p. 415\u20139.","DOI":"10.1109\/SMC.2018.00080"},{"key":"2025120517251280448_j_jisys-2023-0283_ref_035","doi-asserted-by":"crossref","unstructured":"Muh E, Amara S, Tabet F. Sustainable energy policies in Cameroon: A holistic overview. Renew Sustainable Energy Rev. 2018;82:3420\u20139.","DOI":"10.1016\/j.rser.2017.10.049"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2023-0283\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2023-0283\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T17:35:56Z","timestamp":1764956156000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2023-0283\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,4,20]]},"published-print":{"date-parts":[[2024,4,20]]}},"alternative-id":["10.1515\/jisys-2023-0283"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2023-0283","relation":{},"ISSN":["2191-026X"],"issn-type":[{"type":"electronic","value":"2191-026X"}],"subject":[],"published":{"date-parts":[[2024,1,1]]},"article-number":"20230283"}}