Search alternatives:
evolution » evaluation (Expand Search)
Showing 81 - 100 results of 492 for search 'features network evolution', query time: 0.08s Refine Results
  1. 81
  2. 82

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  3. 83

    Overview of detection techniques for malicious social bots by Rong LIU, Bo CHEN, Ling YU, Ya-shang LIU, Si-yuan CHEN

    Published 2017-11-01
    “…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
    Get full text
    Article
  4. 84

    Comparison and Analysis of Network Construction Methods for Seismicity Based on Complex Networks by Xuan He, Syed Bilal Hussain Shah, Bo Wei, Zheng Liu

    Published 2021-01-01
    “…By using the same dataset from the Southern California Seismic Network, three networks are constructed. They all present the scale-free, small-world properties, a strength-degree correlation, and an assortative mixing feature. …”
    Get full text
    Article
  5. 85
  6. 86
  7. 87

    Research on Multi-Step Prediction of Pipeline Corrosion Rate Based on Adaptive MTGNN Spatio-Temporal Correlation Analysis by Mingyang Sun, Shiwei Qin

    Published 2025-05-01
    “…In order to comprehensively investigate the spatio-temporal dynamics of corrosion evolution under complex pipeline environments and improve the corrosion rate prediction accuracy, a novel framework for corrosion rate prediction based on adaptive multivariate time series graph neural network (MTGNN) multi-feature spatio-temporal correlation analysis is proposed. …”
    Get full text
    Article
  8. 88

    ANALYSIS OF ECONOMIC THOUGHT IN THE CONTEXT OF PREREQUISITES FOR THE DEVELOPMENT OF CLUSTER FORMATIONS IN THE WORKS OF FOREIGN SCIENTISTS by Anastasiia O. Vasylchenko, Olena V. Dymchenko

    Published 2021-06-01
    “…The authors present the evolution of the formation and development of the cluster approach in Economics in Western Economic Thought, give the author’s definition of the concept of “cluster” and describe the common features characteristic of clusters, provide reasoned conclusions.…”
    Get full text
    Article
  9. 89

    Neuro-Evolution of Augmenting Topologies for Dynamic Scheduling of Flexible Job Shop Problem by Jian Huang, Yarong Chen, Jabir Mumtaz, Liuyan Zhong

    Published 2024-09-01
    “…Employing the entropy weight method, a fitness function for multiobjective optimization is formulated, facilitating the enhancement of the neural network’s structural and nodal parameters through genetic algorithms. …”
    Get full text
    Article
  10. 90

    Predicting the Evolution of Lung Squamous Cell Carcinoma In Situ Using Computational Pathology by Alon Vigdorovits, Gheorghe-Emilian Olteanu, Ovidiu Tica, Andrei Pascalau, Monica Boros, Ovidiu Pop

    Published 2025-04-01
    “…We used this dataset to train two models: a pathomics-based ridge classifier trained on 80 principal components derived from almost 2000 extracted features and a deep convolutional neural network with a modified ResNet18 architecture. …”
    Get full text
    Article
  11. 91

    Infant Type Ia Supernovae from the KMTNet. I. Multicolor Evolution and Populations by Yuan Qi Ni, Dae-Sik Moon, Maria R. Drout, Youngdae Lee, Patrick Sandoval, Jeehye Shin, Hong Soo Park, Sang Chul Kim, Kyuseok Oh

    Published 2025-01-01
    “…We conduct a systematic analysis of the early multiband light curves and colors of 19 Type Ia supernovae (SNe) from the Korea Microlensing Telescope Network SN Program, including 16 previously unpublished events. …”
    Get full text
    Article
  12. 92
  13. 93
  14. 94

    Multiple-Feature Construction for Image Segmentation Based on Genetic Programming by David Herrera-Sánchez, José-Antonio Fuentes-Tomás, Héctor-Gabriel Acosta-Mesa, Efrén Mezura-Montes, José-Luis Morales-Reyes

    Published 2025-05-01
    “…Genetic programming is used to automatically create and construct pipelines to extract meaningful features for segmentation tasks. Additionally, a co-evolution strategy is proposed within the evolution process to increase diversity without affecting segmentation performance. …”
    Get full text
    Article
  15. 95
  16. 96
  17. 97

    Evolution characteristics of microstructure during continuous drawing deformation of Cu-20Ag alloy by Hanjiang Wu, Tao Huang, Kexing Song, Yanjun Zhou, Shaolin Li, Yanmin Zhang, Xiaowen Peng, Yunxiao Hua

    Published 2025-09-01
    “…The results show that the as-cast Cu-20Ag alloy rod exhibits a continuous eutectic network structure. As the wire diameter decreases, this network-like grain structure gradually transforms into fibrous grains. …”
    Get full text
    Article
  18. 98

    Policy Evolution of Government Procurement of Public Services in China: A Text-Mining Perspective by Dongdan Zhu, Yuting Zhang, Zhengnan Lu

    Published 2023-01-01
    “…Results show that the development of the GPPS policy in China presents a point-to-face change feature, manifested in the evolution logic of “government purchase—government procurement of public service—all-round supporting policy.” …”
    Get full text
    Article
  19. 99
  20. 100