Suggested Topics within your search.
Suggested Topics within your search.
-
521
Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Published 2022-12-01“…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
Get full text
Article -
522
LMGD: Log-Metric Combined Microservice Anomaly Detection Through Graph-Based Deep Learning
Published 2024-01-01“…First, we propose a time-aware LSTM prediction neural network to improve the accuracy of service dependency mining. Secondly, based on the service dependency graph, we propose an anomaly detection method based on log-metric fusion, which can more accurately describe the running status of microservices, thereby improving the accuracy of anomaly detection. …”
Get full text
Article -
523
Research on anomaly detection algorithm based on sparse variational autoencoder using spike and slab prior
Published 2022-12-01“…Anomaly detection remains to be an essential and extensive research branch in data mining due to its widespread use in a wide range of applications.It helps researchers to obtain vital information and make better decisions about data by detecting abnormal data.Considering that sparse coding can get more powerful features and improve the performance of other tasks, an anomaly detection model based on sparse variational autoencoder was proposed.Firstly, the discrete mixed modelspike and slab distribution was used as the prior of variational autoencoder, simulated the sparsity of the space where the hidden variables were located, and obtained the sparse representation of data characteristics.Secondly, combined with the deep support vector network, the feature space was compressed, and the optimal hypersphere was found to discriminate normal data and abnormal data.And then, the abnormal fraction of the data was measured by the Euclidean distance from the data feature to the center of the hypersphere, and then the abnormal detection was carried out.Finally, the algorithm was evaluated on the benchmark datasets MNIST and Fashion-MNIST, and the experimental results show that the proposed algorithm achieves better effects than the state-of-the-art methods.…”
Get full text
Article -
524
Dual Branch Encoding Feature Aggregation for Cloud and Cloud Shadow Detection of Remote Sensing Image
Published 2025-06-01Get full text
Article -
525
-
526
Multi-label classification for image tamper detection based on Swin-T segmentation network in the spatial domain
Published 2025-04-01“…Furthermore, they only support a single image tampering type. Our method introduces three key innovations: (1) A spatial perception module that combines the spatial rich model (SRM) with constrained convolution, enabling focused detection of tampering traces while suppressing interference from image content; (2) A hierarchical feature learning architecture that integrates Swin Transformer with UperNet for effective multi-scale tampering pattern recognition; and (3) A comprehensive optimization strategy including auxiliary supervision, self-supervised learning, and hard example mining, which significantly improves model convergence and detection accuracy. …”
Get full text
Article -
527
Machine learning techniques in ultrasonics-based defect detection and material characterization: A comprehensive review
Published 2025-06-01“…Among the various NDE techniques, ultrasonic methods are widely regarded as the most effective for damage detection and material characterization due to their high sensitivity and versatility. …”
Get full text
Article -
528
MEP-YOLOv5s: Small-Target Detection Model for Unmanned Aerial Vehicle-Captured Images
Published 2025-05-01Get full text
Article -
529
Comparison of Manhattan and Chebyshev Distance Metrics in Quantum-Based K-Medoids Clustering
Published 2025-07-01“…Clustering is a technique in data mining used to identify patterns that can support decision-making processes. …”
Get full text
Article -
530
A study on the technology of enhancing gas permeability and gas drainage by sectional hydraulic fracturing in directional long boreholes: a case study of the no. 8 coal seam in bao...
Published 2025-05-01“…By adopting the drag-type staged fracturing process with double-packers and a single-slip, and combining it with methods such as the analysis of pump injection stress curve stages, gas extraction concentration analysis, and in-hole transient electromagnetic detection, the laws of fracture propagation and the mechanism of permeability modification are revealed. …”
Get full text
Article -
531
Enhanced Cloud Detection Using a Unified Multimodal Data Fusion Approach in Remote Images
Published 2025-04-01Get full text
Article -
532
Improved Denclue Outlier Detection Algorithm With Differential Privacy and Attribute Fuzzy Priority Relation Ordering
Published 2023-01-01“…Outlier detection is an important method in data mining. Although Denclue algorithm is particularly good at finding clusters of arbitrary shape and detecting outliers, it does not protect the user’s privacy well in the operation process. …”
Get full text
Article -
533
Reliable identification method of intrusion personnel in front of underground moving equipment
Published 2025-08-01“…A reliable registration method of infrared and visible dual-modal images is designed and proposed to solve the problem of reliable identification of intruders in front of the moving equipment in underground coal mines. …”
Get full text
Article -
534
Human Action Recognition Method Based on Multi-channel Fusion
Published 2025-01-01“…In healthcare, real-time action recognition enhances patient care, detects potential falls, and assists elderly individuals. …”
Get full text
Article -
535
Research on the problem of landmines and explosive remnants of war worldwide and methods of demining
Published 2024-11-01“…Additionally, it explores the most effective method for mine removal, and mechanical demining, providing a detailed overview of the operation and characteristics associated with this approach. …”
Get full text
Article -
536
Hyperspectral Detection of Metal Element Concentration in Vegetation Canopies: A Case Study of Fe and Mo
Published 2024-12-01“…Remote and proximal sensing has proven to be highly effective in pinpointing surface-exposed alteration minerals and detecting potential mining sites in previously unproductive areas. …”
Get full text
Article -
537
Enhancing Malware Analysis Using Data Visualization Through Shared Code and Attribute Analysis
Published 2025-01-01Get full text
Article -
538
Joint Tomek Links (JTL): An Innovative Approach to Noise Reduction for Enhanced Classification Performance
Published 2025-01-01“…Mathematical methods are crucial in tackling this obstacle, particularly in optimizing noise detection and data preprocessing. …”
Get full text
Article -
539
A real-world pharmacovigilance study of efgartigimod alfa in the FDA adverse event reporting system database
Published 2025-04-01“…Disproportionality analysis was used in data mining to quantify efgartigimod alfa-related AE signals.ResultsA total of 3,040 reports with efgartigimod alfa as the primary suspect and 12,487 AEs were retrieved from FAERS. …”
Get full text
Article -
540
Prospects of Improving the Vibroacoustic Method for Locating Buried Non-Metallic Pipelines
Published 2025-06-01Get full text
Article