Showing 981 - 1,000 results of 1,037 for search 'mining methods detection', query time: 0.09s Refine Results
  1. 981
  2. 982

    Network Pseudohealth Information Recognition Model: An Integrated Architecture of Latent Dirichlet Allocation and Data Block Update by Jie Zhang, Pingping Sun, Feng Zhao, Qianru Guo, Yue Zou

    Published 2020-01-01
    “…The research results show that (1) the LDA model can deeply mine the semantic information of network pseudohealth information, obtain the features of document-topic distribution, and classify and train topic features as input variables; (2) the dataset partitioning method can effectively block data according to the text attributes and class labels of network pseudohealth information and can accurately classify and integrate the block data through the data block reintegration method; and (3) considering that the combination model has certain limitations on the detection of network pseudohealth information, the support vector machine (SVM) model can extract the granularity content of data blocks in pseudohealth information in real time, thus greatly improving the recognition performance of the combination model.…”
    Get full text
    Article
  3. 983
  4. 984
  5. 985

    Thyroid-stimulating hormone and thyroid hormone levels in association with occupational hazards in male coal miners by Yingshi DAI, Yingjun CHEN, Yingqi LUO, Yanhui LIU, Liuquan JIANG, Fan YANG, Gaisheng LIU, Qingsong CHEN

    Published 2025-04-01
    “…ObjectiveTo investigate the associations between occupational hazard exposure and thyroid-stimulating hormone (TSH) and thyroid hormone levels in male coal mine workers. MethodsA cross-sectional study design was adopted. …”
    Get full text
    Article
  6. 986

    Causal knowledge graph construction for enterprise innovation events in the digital economy and its application to strategic decision-making by Pengfei Wu, Bingtao Xu, Xuhan Zhang

    Published 2025-06-01
    “…Our method first extracts enterprise-related events using neural language models, then identifies causal links between events with a specialized classifier, and finally integrates these into a knowledge graph that can support strategic decision-making. …”
    Get full text
    Article
  7. 987
  8. 988
  9. 989

    The Roles of Transcrustal Magma- and Fluid-Conducting Faults in the Formation of Mineral Deposits by Farida Issatayeva, Auez Abetov, Gulzada Umirova, Aigerim Abdullina, Zhanibek Mustafin, Oleksii Karpenko

    Published 2025-05-01
    “…At hydrocarbon fields, they play extremely important roles in conductive and convective heat, as well as in mass transfer to the area of hydrocarbon generation, determining the relationship between the processes of lithogenesis and tectogenesis, and activating the generation of hydrocarbons from oil and gas source rock. Detection of TCMFCFs was carried out using MMSS (the method of microseismic sounding) and MTSM (the magnetotelluric sounding method), in combination with other geological and geophysical data. …”
    Get full text
    Article
  10. 990

    Associated minerals in chrysotile deposits and their potential health risks by Eric J. Chatfield

    Published 2025-05-01
    “…An asbestiform variety of the pyroxene diopside was detected in chrysotile from the Balangero mine in Italy. …”
    Get full text
    Article
  11. 991

    IFN-α-2b Reduces Postoperative Arthrofibrosis in Rats by Inhibiting Fibroblast Proliferation and Migration through STAT1/p21 Signaling Pathway by Zhendong Liu, Zhehao Fan, Rui Wang, Xiaolei Li, Hui Chen, Jingcheng Wang

    Published 2023-01-01
    “…The inhibitory effect of IFN-α-2b on fibroblast proliferation and migration in vitro was detected by cell counting kit-8 (CCK-8), immunofluorescence analysis, cell cycle test, EdU assay, wound healing test, and Transwell method, and the analysis results were verified by Western blotting method. …”
    Get full text
    Article
  12. 992
  13. 993
  14. 994

    Extra-aural disorders in patients with acoustic trauma who were in the zone of the antiterrorist operation. by T. A. Shidlovs’ka, L. G. Petruk

    Published 2015-11-01
    “…Diencephalic structures irritation was detected in 54,2%, stem-diencephalic - in 30,5% of cases. …”
    Get full text
    Article
  15. 995
  16. 996

    Comprehensive influence evaluation algorithm of complex network nodes based on global-local attributes by Weijin JIANG, Ying YANG, Tiantian LUO, Wenying ZHOU, En LI, Xiaowei ZHANG

    Published 2022-09-01
    “…Mining key nodes in the network plays a great role in the evolution of information dissemination, virus marketing, and public opinion control, etc.The identification of key nodes can effectively help to control network attacks, detect financial risks, suppress the spread of viruses diseases and rumors, and prevent terrorist attacks.In order to break through the limitations of existing node influence assessment methods with high algorithmic complexity and low accuracy, as well as one-sided perspective of assessing the intrinsic action mechanism of evaluation metrics, a comprehensive influence (CI) assessment algorithm for identifying critical nodes was proposed, which simultaneously processes the local and global topology of the network to perform node importance.The global attributes in the algorithm consider the information entropy of neighboring nodes and the shortest distance nodes between nodes to represent the local attributes of nodes, and the weight ratio of global and local attributes was adjusted by a parameter.By using the SIR (susceptible infected recovered) model and Kendall correlation coefficient as evaluation criteria, experimental analysis on real-world networks of different scales shows that the proposed method is superior to some well-known heuristic algorithms such as betweenness centrality (BC), closeness centrality (CC), gravity index centrality(GIC), and global structure model (GSM), and has better ranking monotonicity, more stable metric results, more adaptable to network topologies, and is applicable to most of the real networks with different structure of real networks.…”
    Get full text
    Article
  17. 997
  18. 998
  19. 999

    Alteration of Cytokine Profiles in Uranium Miners Exposed to Long-Term Low Dose Ionizing Radiation by Kun Li, YiShui Chen, XiaoLiang Li, ShuJie Lei, QingFeng Chen, JianXiang Liu, QuanFu Sun

    Published 2014-01-01
    “…The aim of the study is to estimate the immune function through cytokine profiles in sera of uranium mines. Methods. Antibody arrays were used to detect 50 cytokines in sera of uranium miners. …”
    Get full text
    Article
  20. 1000

    Microbial landscape of wounds in patients with combat trauma of extremities by Bubman L.I., Topolyanskaya S.V., Rachina S.A., Gladkih M.A., Usova T.V., Karpov V.V., Molochnikov A.Yu., Nechaev A.I., Khan S.O., Emomadov A.M., Zakharov N.S., Kharchenko E.I., Lytkina K.A., Marchenko I.P., Buriev I.M., Melkonyan G.G.

    Published 2024-12-01
    “…The wound samples were cultured on nutrient media and microorganisms were identified in accordance with standard methods and procedures. Results. According to the results of microbiological analysis of wound samples, the growth of microorganisms was detected in 91.5% of patients. …”
    Get full text
    Article