Search alternatives:
pattern » patterns (Expand Search)
Showing 41 - 60 results of 2,064 for search 'network evaluation pattern', query time: 0.17s Refine Results
  1. 41
  2. 42

    Auto-Probabilistic Mining Method for Siamese Neural Network Training by Arseniy Mokin, Alexander Sheshkus, Vladimir L. Arlazarov

    Published 2025-04-01
    “…These findings highlight the potential effectiveness of the developed loss function and mining method in addressing a wide range of pattern recognition challenges.…”
    Get full text
    Article
  3. 43

    Mitigating the Concurrent Interference of Electrode Shift and Loosening in Myoelectric Pattern Recognition Using Siamese Autoencoder Network by Ge Gao, Xu Zhang, Xiang Chen, Zhang Chen

    Published 2024-01-01
    “…A Siamese auto-encoder network (SAEN) was established to learn robust feature representations against random occurrences of both electrode shift and loosening. …”
    Get full text
    Article
  4. 44

    Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation by Pilar Schummer, Alberto del Rio, Javier Serrano, David Jimenez, Guillermo Sánchez, Álvaro Llorente

    Published 2024-12-01
    “…<b>Background:</b> In the last decade, numerous methods have been proposed to define and detect outliers, particularly in complex environments like networks, where anomalies significantly deviate from normal patterns. …”
    Get full text
    Article
  5. 45
  6. 46

    Analysis of the Construction and Evolution of Ecological Security Patterns in Karst Areas by FU Li, PENG Shuangyun, GONG Luping, HUANG Bangmei, MA Dongling, ZHU Ziyi

    Published 2025-04-01
    “…[Methods] Based on the evaluation of ecosystem service importance and ecological sensitivity, in combination with methods such as MSPA, MCR, and the gravity model, the ecological security pattern of the Pearl River source region from 1990 to 2020 was constructed, and its spatial-temporal evolution characteristics were analyzed. …”
    Get full text
    Article
  7. 47
  8. 48
  9. 49

    Deep Time Series Intelligent Framework for Power Data Asset Evaluation by Lihong Ge, Xin Li, Li Wang, Jian Wei, Bo Huang

    Published 2025-01-01
    “…These data have both long-term and short-term patterns, and traditional evaluation methods such as autoregressive models or Gaussian processes may be difficult to fully capture their characteristics, resulting in evaluation bias. …”
    Get full text
    Article
  10. 50
  11. 51
  12. 52

    Recognizing Mixing Patterns of Urban Agglomeration Based on Complex Network Assortativity Coefficient: A Case Study in China by Kaiqi Zhang, Lujin Jia, Sheng Xu

    Published 2025-02-01
    “…Based on multi-source data (Baidu index data, investment data of listed companies, high-speed rail operation data, and highway network data) from 2017 to 2019 across seven national-level urban agglomerations, this study introduces complex network assortativity coefficients to analyze the mechanisms of urban relationship formation from two dimensions, structural features and socioeconomic attributes, to evaluate how these features shape urban agglomeration networks and reveal the distribution of network assortativity coefficients across urban agglomerations to classify diverse developmental patterns. …”
    Get full text
    Article
  13. 53
  14. 54

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&amp;CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&amp;CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  15. 55
  16. 56

    Network analysis of cognitive function, glycemic–lipid profiles, and hepatic–renal function in individuals with diverse drinking patterns by Shuqi Xu, Shuqi Xu, Shuqi Xu, Shuqi Xu, Ranran Zhao, Ranran Zhao, Ranran Zhao, Jincheng Wang, Jincheng Wang, Jincheng Wang, Xue Yang, Xue Yang, Xue Yang, Lan Wang, Lan Wang, Lan Wang, Cuixia An, Cuixia An, Cuixia An, Xueyi Wang, Xueyi Wang, Xueyi Wang, Ran Wang, Ran Wang, Ran Wang

    Published 2025-07-01
    “…The node DSCT ranked highly in terms of betweenness centrality.ConclusionCorrelations may exist among cognitive function, glycemic and lipid profiles, and hepatic–renal function in individuals with varying alcohol consumption patterns. Lipid and liver function indicators were identified as the most central factors in the network model. …”
    Get full text
    Article
  17. 57

    Drilling Rate of Penetration Prediction Based on CBT-LSTM Neural Network by Kai Bai, Siyi Jin, Zhaoshuo Zhang, Shengsheng Dai

    Published 2024-10-01
    “…To address these issues, this study proposes an improved LSTM neural network model for ROP prediction (CBT-LSTM). This model integrates the capability of a two-dimensional convolutional neural network (2D-CNN) for multi-feature extraction, the advantages of bidirectional long short-term memory networks (BiLSTM) for processing bidirectional temporal information, and the dynamic weight adjustment of the time pattern attention mechanism (TPA) for extracting crucial information in BiLSTM, effectively capturing key features in temporal data. …”
    Get full text
    Article
  18. 58
  19. 59

    A Research on Black-box Evaluation Methods for Quantum Key Distribution Networks by DAI Hua, SUN Xin, MAO Yining, LI Yixuan, LÜ Yuxiang, WANG Hongyan, YU Xiaosong

    Published 2025-06-01
    “…【Conclusion】The paper identifies potential network security threats by setting dynamic thresholds and evaluates network security from multiple dimensions. …”
    Get full text
    Article
  20. 60

    Longitudinal evaluation of common and unique brain-networks in variants of primary progressive aphasia by Rajan Kashyap, Rose Dawn Bharath, Changsong Zhou, Kyrana Tsapkini, John E. Desmond, SH Annabel Chen, Kaviraja Udupa, PT Sivakumar, Sagarika Bhattacharjee

    Published 2025-08-01
    “…Since the subset of these subjects was scanned at the 6th and 12th months, the longitudinal changes in the rsfMRI networks were evaluated at each interval. Network features were correlated with clinical behaviours, and the longitudinal impact of the changes in these networks on behaviours was evaluated over the 12-month period. …”
    Get full text
    Article