-
41
-
42
-
43
Recognizing Mixing Patterns of Urban Agglomeration Based on Complex Network Assortativity Coefficient: A Case Study in China
Published 2025-02-01“…Based on multi-source data (Baidu index data, investment data of listed companies, high-speed rail operation data, and highway network data) from 2017 to 2019 across seven national-level urban agglomerations, this study introduces complex network assortativity coefficients to analyze the mechanisms of urban relationship formation from two dimensions, structural features and socioeconomic attributes, to evaluate how these features shape urban agglomeration networks and reveal the distribution of network assortativity coefficients across urban agglomerations to classify diverse developmental patterns. …”
Get full text
Article -
44
-
45
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
46
Array inspired wideband and high gain antenna with enhanced pattern diversity for 5G mm wave networks
Published 2025-07-01Get full text
Article -
47
Network analysis of cognitive function, glycemic–lipid profiles, and hepatic–renal function in individuals with diverse drinking patterns
Published 2025-07-01“…The node DSCT ranked highly in terms of betweenness centrality.ConclusionCorrelations may exist among cognitive function, glycemic and lipid profiles, and hepatic–renal function in individuals with varying alcohol consumption patterns. Lipid and liver function indicators were identified as the most central factors in the network model. …”
Get full text
Article -
48
Histopathological Image Analysis Using Machine Learning to Evaluate Cisplatin and Exosome Effects on Ovarian Tissue in Cancer Patients
Published 2025-02-01“…A set of 177 Local Binary Pattern (LBP) features were extracted from histopathological images, followed by feature selection using Lasso regression. …”
Get full text
Article -
49
Efficient Classification and Rapid Processing of Big Data in Power Distribution Networks
Published 2024-01-01Get full text
Article -
50
-
51
Supply and demand flow patterns and optimization of food ecosystem services in China’s Yangtze River Delta
Published 2025-02-01Get full text
Article -
52
Machine learning technique for the identification of two-phase (oil-water) flow patterns through pipelines
Published 2025-07-01“…This study develops a robust machine learning model based on artificial neural networks to classify six flow patterns in oil-water two-phase flow within horizontal pipelines, a key aspect for ensuring operational efficiency, integrity, and cost-effective design in the oil and gas industry. …”
Get full text
Article -
53
-
54
VA-Creator—A Virtual Appliance Creator based on adaptive Neural Networks to generate synthetic power consumption patterns
Published 2024-12-01“…These VAs synthesize power consumption patterns (PCPs) based on Neural Networks (NNs) which adapt their architecture to the training data structure to simplify the creation of new VAs. …”
Get full text
Article -
55
Diel and Annual Patterns of Vocal Activity of Three Neotropical Wetland Birds Revealed via BirdNET
Published 2025-04-01Get full text
Article -
56
Analysis of traffic patterns between Karkh and Rusafa
Published 2025-01-01“…Rapid and radical changes in urban activities lead to changes in spatial travel patterns. Recently, users of the road network in Baghdad have faced difficulty in mobility between Karkh and Rusafa due to the congestion of bridges connecting the east of the city to the west across the Tigris River during peak hours. …”
Get full text
Article -
57
-
58
Tensor Network Methods for Hyperparameter Optimization and Compression of Convolutional Neural Networks
Published 2025-02-01Get full text
Article -
59
Dietary patterns derived by Gaussian graphical models and metabolic profiles among overweight and obese individuals
Published 2025-04-01“…Identifying dietary networks provides valuable insights into the complex interactions between food groups within typical dietary patterns. …”
Get full text
Article -
60
Unsupervised post-training learning in spiking neural networks
Published 2025-05-01Get full text
Article