Showing 541 - 560 results of 1,037 for search 'mining methods detection', query time: 0.12s Refine Results
  1. 541

    Spatial-Temporal Semantic Feature Interaction Network for Semantic Change Detection in Remote Sensing Images by Yuhang Zhang, Wuxia Zhang, Songtao Ding, Siyuan Wu, Xiaoqiang Lu

    Published 2025-01-01
    “…Experimental results show that the proposed STS-FINet achieves better change detection performance than SOTA methods.…”
    Get full text
    Article
  2. 542

    Mf-net: multi-feature fusion network based on two-stream extraction and multi-scale enhancement for face forgery detection by Hanxian Duan, Qian Jiang, Xin Jin, Michal Wozniak, Yi Zhao, Liwen Wu, Shaowen Yao, Wei Zhou

    Published 2024-11-01
    “…The method encourages the model to mine forgery features and learns generic and robust features not limited to a particular feature. …”
    Get full text
    Article
  3. 543
  4. 544

    Network intrusion detection based on relative mutual K-nearest neighbor density peak clustering by Chunhua Ren, Changyuan Wang, Yang Yu, Wanan Yang, Ruiqi Guo

    Published 2025-07-01
    “…The experimental results show that the proposed method performs exceptionally well in the clustering task and can effectively mine network intrusion information.…”
    Get full text
    Article
  5. 545

    PS-GCN: psycholinguistic graph and sentiment semantic fused graph convolutional networks for personality detection by Wenjuan Liu, Zhengyan Sun, Subo Wei, Shunxiang Zhang, Guangli Zhu, Lei Chen

    Published 2024-12-01
    “…Additionally, a sentence group model captures combined features of related sentences, effectively utilising the text structure to mine sentimental features. Experimental results on multiple datasets demonstrate that the proposed method significantly improves the classification accuracy in personality detection tasks.…”
    Get full text
    Article
  6. 546

    Petrophysics Parameter Inversion and Its Application Based on the Transient Electromagnetic Method by Xiaozhen Teng, Jianhua Yue, Kailiang Lu, Danyang Xi, Herui Zhang, Kua Wang

    Published 2025-06-01
    “…The transient electromagnetic (TEM) method is a widely used geophysical technique for detecting subsurface electrical structures. …”
    Get full text
    Article
  7. 547
  8. 548

    Analyzing customer churn behavior using datamining approach: hybrid support vector machine and logistic regression in retail chain by Mohammad Barzegar, Aliakbar Hasani

    Published 2024-12-01
    “…For this purpose, the organization must have an efficient system to detect and analyze the factors influencing customer churn. …”
    Get full text
    Article
  9. 549
  10. 550

    BS-GAT: a network intrusion detection system based on graph neural network for edge computing by Yalu Wang, Zhijie Han, Ying Du, Jie Li, Xin He

    Published 2025-04-01
    “…Therefore, it is crucial to explore intelligent, automated, and resilient methods for network intrusion detection. Graph neural network-based techniques for network intrusion detection have been proposed by many scholars recently. …”
    Get full text
    Article
  11. 551

    Novel Adaptive Hidden Markov Model Utilizing Expectation–Maximization Algorithm for Advanced Pipeline Leak Detection by Omid Zadehbagheri, Mohammad Reza Salehizadeh, Seyed Vahid Naghavi, Mazda Moattari, Behzad Moshiri

    Published 2024-09-01
    “…Recently, there has been a growing trend in employing data mining techniques for detecting leaks. Among these methods is the Hidden Markov Model, which, despite good results with stationary data, becomes inefficient when a leak causes a drop in the pressure or flow, reducing its accuracy. …”
    Get full text
    Article
  12. 552

    Precision Marketing Method of E-Commerce Platform Based on Clustering Algorithm by Bei Zhang, Luquan Wang, Yuanyuan Li

    Published 2021-01-01
    “…In user cluster analysis, users with the same or similar behavior characteristics are divided into the same group by iterative update clustering, and the core and larger user groups are detected. In this paper, we present the formulation and data mining of the correlation rules based on the clustering algorithm through the definition and procedure of the algorithm. …”
    Get full text
    Article
  13. 553

    Arlclustering: an R package for community detection in social networks based on user interaction and association rule learning by Mohamed El-Moussaoui, Mohamed Hanine, Ali Kartit, Tarik Agouti

    Published 2025-07-01
    “…Abstract ARLClustering is an open-source R package for community detection in social networks. Unlike traditional methods that rely on structural properties such as modularity, degree centrality, and clustering coefficient, ARLClustering leverages association rule mining (ARM) to identify meaningful interaction patterns based on users’ friendship activity. …”
    Get full text
    Article
  14. 554
  15. 555

    Monitoring of the dynamics of antimicrobial resistance among wounded in the conditions of armed conflict by L. K. Sorokoumova, A. A. Kozhokaru, S. Yu. Yaremin, О. І. Zhorniak

    Published 2025-06-01
    “…Monitoring the sensitivity of microorganisms to antibacterial drugs in patients with various types of injuries caused by military events. Materials and methods. Bacteriological examination of biological material using Vitek-2 Biomerieux automated pathogen systems and classic, followed by determination of sensitivity using the disk-diffusion method. …”
    Get full text
    Article
  16. 556
  17. 557
  18. 558

    Nonlinear Determination Method for Self-Heating Initiative Temperature of Sulfide Ores by Huimin Jin, Wei Pan, Xue Shen, Shuangyi Cheng

    Published 2020-01-01
    “…The purpose of this article is to explore a new method to determine the self-heating initiative temperature of sulfide ores for preventing spontaneous combustion of sulfide ores. …”
    Get full text
    Article
  19. 559
  20. 560