-
41
Embedding and classifying test execution traces using neural networks
Published 2022-06-01Get full text
Article -
42
Auto-Probabilistic Mining Method for Siamese Neural Network Training
Published 2025-04-01“…These findings highlight the potential effectiveness of the developed loss function and mining method in addressing a wide range of pattern recognition challenges.…”
Get full text
Article -
43
Mitigating the Concurrent Interference of Electrode Shift and Loosening in Myoelectric Pattern Recognition Using Siamese Autoencoder Network
Published 2024-01-01“…A Siamese auto-encoder network (SAEN) was established to learn robust feature representations against random occurrences of both electrode shift and loosening. …”
Get full text
Article -
44
Machine Learning-Based Network Anomaly Detection: Design, Implementation, and Evaluation
Published 2024-12-01“…<b>Background:</b> In the last decade, numerous methods have been proposed to define and detect outliers, particularly in complex environments like networks, where anomalies significantly deviate from normal patterns. …”
Get full text
Article -
45
Study on Satisfaction Evaluation of Ecotourism Through Advanced Network Text Mining
Published 2024-01-01Get full text
Article -
46
Analysis of the Construction and Evolution of Ecological Security Patterns in Karst Areas
Published 2025-04-01“…[Methods] Based on the evaluation of ecosystem service importance and ecological sensitivity, in combination with methods such as MSPA, MCR, and the gravity model, the ecological security pattern of the Pearl River source region from 1990 to 2020 was constructed, and its spatial-temporal evolution characteristics were analyzed. …”
Get full text
Article -
47
Mapping the scientific structure of organization and management of enterprises using complex networks
Published 2022-01-01Get full text
Article -
48
Identifying Barong Tagalog Textile Using Convolutional Neural Network and Support Vector Machine with Structural Pattern Segmentation
Published 2025-04-01“…To identify structural patterns in textile classification, machine learning was used. …”
Get full text
Article -
49
Deep Time Series Intelligent Framework for Power Data Asset Evaluation
Published 2025-01-01“…These data have both long-term and short-term patterns, and traditional evaluation methods such as autoregressive models or Gaussian processes may be difficult to fully capture their characteristics, resulting in evaluation bias. …”
Get full text
Article -
50
-
51
-
52
Recognizing Mixing Patterns of Urban Agglomeration Based on Complex Network Assortativity Coefficient: A Case Study in China
Published 2025-02-01“…Based on multi-source data (Baidu index data, investment data of listed companies, high-speed rail operation data, and highway network data) from 2017 to 2019 across seven national-level urban agglomerations, this study introduces complex network assortativity coefficients to analyze the mechanisms of urban relationship formation from two dimensions, structural features and socioeconomic attributes, to evaluate how these features shape urban agglomeration networks and reveal the distribution of network assortativity coefficients across urban agglomerations to classify diverse developmental patterns. …”
Get full text
Article -
53
-
54
Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network
Published 2023-08-01“…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&amp;CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&amp;CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
Get full text
Article -
55
Array inspired wideband and high gain antenna with enhanced pattern diversity for 5G mm wave networks
Published 2025-07-01Get full text
Article -
56
Network analysis of cognitive function, glycemic–lipid profiles, and hepatic–renal function in individuals with diverse drinking patterns
Published 2025-07-01“…The node DSCT ranked highly in terms of betweenness centrality.ConclusionCorrelations may exist among cognitive function, glycemic and lipid profiles, and hepatic–renal function in individuals with varying alcohol consumption patterns. Lipid and liver function indicators were identified as the most central factors in the network model. …”
Get full text
Article -
57
Drilling Rate of Penetration Prediction Based on CBT-LSTM Neural Network
Published 2024-10-01“…To address these issues, this study proposes an improved LSTM neural network model for ROP prediction (CBT-LSTM). This model integrates the capability of a two-dimensional convolutional neural network (2D-CNN) for multi-feature extraction, the advantages of bidirectional long short-term memory networks (BiLSTM) for processing bidirectional temporal information, and the dynamic weight adjustment of the time pattern attention mechanism (TPA) for extracting crucial information in BiLSTM, effectively capturing key features in temporal data. …”
Get full text
Article -
58
-
59
A Research on Black-box Evaluation Methods for Quantum Key Distribution Networks
Published 2025-06-01“…【Conclusion】The paper identifies potential network security threats by setting dynamic thresholds and evaluates network security from multiple dimensions. …”
Get full text
Article -
60
Longitudinal evaluation of common and unique brain-networks in variants of primary progressive aphasia
Published 2025-08-01“…Since the subset of these subjects was scanned at the 6th and 12th months, the longitudinal changes in the rsfMRI networks were evaluated at each interval. Network features were correlated with clinical behaviours, and the longitudinal impact of the changes in these networks on behaviours was evaluated over the 12-month period. …”
Get full text
Article