Showing 21 - 40 results of 292 for search 'Node presentation learning', query time: 0.12s Refine Results
  1. 21

    Automatic dependent surveillance-broadcast (ADS-B) anomalous messages and attack type detection: deep learning-based architecture by Waqas Ahmed, Ammar Masood, Jawad Manzoor, Sedat Akleylek

    Published 2025-06-01
    “…This research makes several key contributions to address these challenges. First, it presents a comprehensive review of state-of-the-art machine learning and deep learning techniques, critically analyzing existing methodologies for ADS-B intrusion detection. …”
    Get full text
    Article
  2. 22

    An inductive learning-based method for predicting drug-gene interactions using a multi-relational drug-disease-gene graph by Jian He, Yanling Wu, Linxi Yuan, Jiangguo Qiu, Menglong Li, Xuemei Pu, Yanzhi Guo

    Published 2025-08-01
    “…To realize inductive learning, this study generated an innovative idea of transforming known node vectors derived from the DDG graph into representations of unseen nodes using node similarities as weights, enabling inductive predictions for the unseen DGIs. …”
    Get full text
    Article
  3. 23

    Noise Impact Analysis of School Environments Based on the Deployment of IoT Sensor Nodes by Georgios Dimitriou, Fotios Gioulekas

    Published 2025-06-01
    “…This work presents an on-field noise analysis during the class breaks in Greek school units (a high school and a senior high school) based on the design and deployment of low-cost IoT sensor nodes and IoT platforms. …”
    Get full text
    Article
  4. 24

    Directional migration of recirculating lymphocytes through lymph nodes via random walks. by Niclas Thomas, Lenka Matejovicova, Wichat Srikusalanukul, John Shawe-Taylor, Benny Chain

    Published 2012-01-01
    “…We complement the empirical machine learning based approach by modelling lymphocyte passage through the lymph node insilico. …”
    Get full text
    Article
  5. 25
  6. 26

    Power transmission system’s fault location, detection, and classification: Pay close attention to transmission nodes by Chiagoziem C. Ukwuoma, Dongsheng Cai, Olusola Bamisile, Ejiyi J. Chukwuebuka, Ekong Favour, Gyarteng S.A. Emmanuel, Acen Caroline, Sabirin F. Abdi

    Published 2024-02-01
    “…This study, therefore, presents a fault localization, detection, and classification model for transmission systems that concentrate on the key distribution nodes. …”
    Get full text
    Article
  7. 27

    Game Strategies for Data Transfer Infrastructures Against ML-Profile Exploits by Nageswara S. V. Rao, Chris Y. T. Ma, Fei He

    Published 2024-01-01
    “…Data transfer infrastructures composed of Data Transfer Nodes (DTN) are critical to meeting distributed computing and storage demands of clouds, data repositories, and complexes of supercomputers and instruments. …”
    Get full text
    Article
  8. 28

    Wearable device for axillary lymph node screening in breast cancer based on infrared thermography and artificial intelligence by Xiaoying Zhong, Jinqiu Deng, Ping Lu, Zhichao Zuo, Yu Zhao, Yidong Zhou, Xuefei Wang

    Published 2025-06-01
    “…Abstract Background Breast cancer (BC) is the most prevalent cancer among women worldwide, and patients with metastasis to axillary lymph nodes (ALN) experience significantly lower survival rates. …”
    Get full text
    Article
  9. 29

    Prediction of Post-Diagnostic Decisions for Tested Hand Grenades’ Fuzes Using Decision Trees by Dariusz AMPUŁA

    Published 2021-06-01
    “…A sheet with risk assessment and standard error for the learning sample and the v-fold cross-check were presented. …”
    Get full text
    Article
  10. 30

    Weirdnodes: centrality based anomaly detection on temporal networks for the anti-financial crime domain by Salvatore Vilella, Arthur Capozzi, Marco Fornasiero, Dario Moncalvo, Valeria Ricci, Silvia Ronchiadin, Giancarlo Ruffo

    Published 2025-04-01
    “…Unlike many existing approaches that rely on rule-based algorithms or general machine learning models, WeirdNodes harnesses the evolving structure and relationships within financial transaction networks. …”
    Get full text
    Article
  11. 31

    Federated Learning Enhanced MLP–LSTM Modeling in an Integrated Deep Learning Pipeline for Stock Market Prediction by Jayaraman Kumarappan, Elakkiya Rajasekar, Subramaniyaswamy Vairavasundaram, Ketan Kotecha, Ambarish Kulkarni

    Published 2024-10-01
    “…Abstract In this study, the research presents the Federated Learning Enhanced Multi-Layer Perceptron (Fed-MLP) Long Short-Term Memory that is suggested by the research. …”
    Get full text
    Article
  12. 32
  13. 33

    Anomaly Detection and Localization via Graph Learning by Olabode Amusan, Di Wu

    Published 2025-03-01
    “…Phasor measurement units (PMUs) are being installed at an unprecedented rate on power systems, offering unique situation awareness capability. This paper presents a graph learning-based method for detecting and locating anomalies using PMU data. …”
    Get full text
    Article
  14. 34

    Deep graph representation learning: methods, applications, and challenges by ZHANG Xulong, QU Xiaoyang, XIAO Chunguang, WANG Jianzong

    Published 2025-01-01
    “…This paper presents a comprehensive survey of graph representation learning methods, categorizing them into traditional graph embedding methods and Graph Neural Network (GNN) based approaches. …”
    Get full text
    Article
  15. 35

    The Literal Translation Hypothesis in ESP Teaching/Learning Environments by Pedro A. Fuertes-Olivera, Carmen Piqué-Noguera

    Published 2015-11-01
    “…Within this framework, this paper presents evidence that the literal translation hypothesis is possible in ESP; it offers the results of a pilot study that sheds light on how this hypothesis may work, and also discusses its usability in the context of ESP learning. …”
    Get full text
    Article
  16. 36

    Travel route recommendation with a trajectory learning model by Xiangping Wu, Zheng Zhang, Wangjun Wan

    Published 2024-11-01
    “…However, capturing the latent patterns in complex trajectory data for accurate route planning presents a significant challenge. Existing route recommendation methods commonly face two major problems: first, inadequate integration of multi-source data, which fails to fully consider the potential factors affecting route choice; and second, limited capability to capture road network characteristics, which restricts the effective application of node features and negatively impacts recommendation accuracy. …”
    Get full text
    Article
  17. 37

    Data Poison Detection Schemes for Distributed Machine Learning by Yijin Chen, Yuming Mao, Haoyang Liang, Shui Yu, Yunkai Wei, Supeng Leng

    Published 2020-01-01
    “…Distributed machine learning (DML) can realize massive dataset training when no single node can work out the accurate results within an acceptable time. …”
    Get full text
    Article
  18. 38

    PLGNN: graph neural networks via adaptive feature perturbation and high-way links by Meixia He, Peican Zhu, Yang Liu, Keke Tang

    Published 2025-05-01
    “…Specifically, the Accuracy improved by an average of 2.6% on five node classification datasets, and an average of 2.1% on five graph classification datasets.…”
    Get full text
    Article
  19. 39

    Q-Learning Enabled Green Communication in Internet of Things by Mukesh Kumar, Sushil Kumar, Ankita Jaiswal, Pankaj Kumar Kashyap

    Published 2022-03-01
    “…To alleviate the problem of stochastic link quality as channel gain reinforcement based Q-learning energy balanced routing is presented in this paper. …”
    Get full text
    Article
  20. 40

    Detecting susceptible communities and individuals in hospital contact networks: a model based on social network analysis by Yixuan Yang, Sony Peng, Sophort Siet, Sadriddinov Ilkhomjon, Phonexay Vilakone, Seok-Hoon Kim, Doo-Soon Park

    Published 2023-12-01
    “…The goal of our work is to identify susceptible communities with patients and healthcare workers, and analyse the independent contact networks of various roles to determine the high-influence nodes within the hospital contact network. If these high-influence nodes are part of the susceptible community, they should be the focus of observation to prevent the spread of the virus. …”
    Get full text
    Article