Suggested Topics within your search.
Suggested Topics within your search.
-
541
Spatial-Temporal Semantic Feature Interaction Network for Semantic Change Detection in Remote Sensing Images
Published 2025-01-01“…Experimental results show that the proposed STS-FINet achieves better change detection performance than SOTA methods.…”
Get full text
Article -
542
Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection
Published 2024-11-01“…The method encourages the model to mine forgery features and learns generic and robust features not limited to a particular feature. …”
Get full text
Article -
543
-
544
Network intrusion detection based on relative mutual K-nearest neighbor density peak clustering
Published 2025-07-01“…The experimental results show that the proposed method performs exceptionally well in the clustering task and can effectively mine network intrusion information.…”
Get full text
Article -
545
PS-GCN: psycholinguistic graph and sentiment semantic fused graph convolutional networks for personality detection
Published 2024-12-01“…Additionally, a sentence group model captures combined features of related sentences, effectively utilising the text structure to mine sentimental features. Experimental results on multiple datasets demonstrate that the proposed method significantly improves the classification accuracy in personality detection tasks.…”
Get full text
Article -
546
Petrophysics Parameter Inversion and Its Application Based on the Transient Electromagnetic Method
Published 2025-06-01“…The transient electromagnetic (TEM) method is a widely used geophysical technique for detecting subsurface electrical structures. …”
Get full text
Article -
547
Induced eddy currents characteristics of coal gangue-based functional concrete in compression process
Published 2025-06-01Get full text
Article -
548
Analyzing customer churn behavior using datamining approach: hybrid support vector machine and logistic regression in retail chain
Published 2024-12-01“…For this purpose, the organization must have an efficient system to detect and analyze the factors influencing customer churn. …”
Get full text
Article -
549
Advancing coal fire detection model for large-scale areas based on RS indices and machine learning
Published 2025-06-01Get full text
Article -
550
BS-GAT: a network intrusion detection system based on graph neural network for edge computing
Published 2025-04-01“…Therefore, it is crucial to explore intelligent, automated, and resilient methods for network intrusion detection. Graph neural network-based techniques for network intrusion detection have been proposed by many scholars recently. …”
Get full text
Article -
551
Novel Adaptive Hidden Markov Model Utilizing Expectation–Maximization Algorithm for Advanced Pipeline Leak Detection
Published 2024-09-01“…Recently, there has been a growing trend in employing data mining techniques for detecting leaks. Among these methods is the Hidden Markov Model, which, despite good results with stationary data, becomes inefficient when a leak causes a drop in the pressure or flow, reducing its accuracy. …”
Get full text
Article -
552
Precision Marketing Method of E-Commerce Platform Based on Clustering Algorithm
Published 2021-01-01“…In user cluster analysis, users with the same or similar behavior characteristics are divided into the same group by iterative update clustering, and the core and larger user groups are detected. In this paper, we present the formulation and data mining of the correlation rules based on the clustering algorithm through the definition and procedure of the algorithm. …”
Get full text
Article -
553
Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning
Published 2025-07-01“…Abstract ARLClustering is an open-source R package for community detection in social networks. Unlike traditional methods that rely on structural properties such as modularity, degree centrality, and clustering coefficient, ARLClustering leverages association rule mining (ARM) to identify meaningful interaction patterns based on users’ friendship activity. …”
Get full text
Article -
554
Investigating methods for forensic analysis of social media data to support criminal investigations
Published 2025-06-01Get full text
Article -
555
Monitoring of the dynamics of antimicrobial resistance among wounded in the conditions of armed conflict
Published 2025-06-01“…Monitoring the sensitivity of microorganisms to antibacterial drugs in patients with various types of injuries caused by military events. Materials and methods. Bacteriological examination of biological material using Vitek-2 Biomerieux automated pathogen systems and classic, followed by determination of sensitivity using the disk-diffusion method. …”
Get full text
Article -
556
-
557
-
558
Nonlinear Determination Method for Self-Heating Initiative Temperature of Sulfide Ores
Published 2020-01-01“…The purpose of this article is to explore a new method to determine the self-heating initiative temperature of sulfide ores for preventing spontaneous combustion of sulfide ores. …”
Get full text
Article -
559
DAFDM: A Discerning Deep Learning Model for Active Fire Detection Based on Landsat-8 Imagery
Published 2025-01-01Get full text
Article -
560