-
461
Racial and Ethnic Disparities in Dietary Intake and Quality Among United States Veterans
Published 2024-10-01Get full text
Article -
462
Explaining neural networks for detection of tropical cyclones and atmospheric rivers in gridded atmospheric simulation data
Published 2025-02-01“…For ARs, relevant patterns include elongated bands of high TMQ and eastward winds. …”
Get full text
Article -
463
Integration of Artificial Neural Network Regression and Principal Component Analysis for Indoor Visible Light Positioning
Published 2025-02-01“…Leveraging machine learning techniques, particularly regression-based artificial neural networks (ANNs), offer a promising alternative. ANNs excel at modeling the intricate relationships within data, making them well-suited for handling the complex dynamics of indoor lighting environments. …”
Get full text
Article -
464
vBerlinV2N: Recreating a Cellular Network Measurement Campaign With Simulations
Published 2025-01-01“…System-level simulations play a crucial role in evaluating the behaviors of cellular networks, yet most studies rely on synthetic simulation scenarios rather than reproducing realistic network deployments. …”
Get full text
Article -
465
Resilience evolution and optimization strategies of ecological networks in the Three Gorges Reservoir Area: A scenario-based simulation approach
Published 2025-12-01“…This study focuses on the Three Gorges Reservoir Area (TGRA), addressing human-land relationship conflicts by constructing an EN system and analyzing its spatiotemporal evolution from 2001 to 2023. To evaluate network resilience, this study employs node attack simulation methods, we dynamically assessed EN resilience through four functional and structural indicators. …”
Get full text
Article -
466
Reinforced liquid state machines—new training strategies for spiking neural networks based on reinforcements
Published 2025-05-01“…While traditional Liquid State Machines often employ unsupervised approaches, we introduce strict feedback to improve network performance by not only reinforcing correct predictions but also penalizing wrong ones.ResultsStrict feedback is compared to another strategy known as forgiving feedback, excluding punishment, using evaluations on the Spiking Heidelberg data. …”
Get full text
Article -
467
Integrated deep network model with multi-head twofold attention for drug–target interaction prediction
Published 2025-06-01“…This model leverages convolutional and recurrent neural networks to extract both local and sequential features from drug molecular structures and target protein sequences. …”
Get full text
Article -
468
Real-Time Financial Fraud Detection Using Adaptive Graph Neural Networks and Federated Learning
Published 2025-03-01“…In this research, we introduce a real-time fraud detection framework that combines Adaptive Graph Neural Networks (GNNs) and Federated Learning (FL) to overcome these limitations. …”
Get full text
Article -
469
Supervised Anomaly Detection in Univariate Time-Series Using 1D Convolutional Siamese Networks
Published 2025-01-01“…The model uses a contrastive loss function to compare input sequences and adjusts network weights iteratively during training to recognize intricate patterns. …”
Get full text
Article -
470
Application of a Stochastic Model for Water Demand Assessment under Water Scarcity and Intermittent Networks
Published 2024-09-01“…The analysis was conducted using a short-term water demand forecast model that reproduces periodic patterns observed at an annual, weekly and daily level to evaluate the adaptation response of users concerning the scarcity of water resources through a comparison between the real pattern of the network and the pattern of local tanks.…”
Get full text
Article -
471
Enhanced Network Traffic Classification Using Bayesian-Optimized Logistic Regression and Random Forest Algorithm
Published 2025-01-01“…Compared to other machine learning algorithms, the proposed models demonstrate superior performance in balancing accuracy, computational efficiency, and detection speed, making them ideal for real-time network security applications. This approach’s flexibility to adapt to various network conditions and datasets ensures consistent optimal performance as traffic patterns change.…”
Get full text
Article -
472
Improving Performance of the Convolutional Neural Networks for Electricity Theft Detection by using Cheetah Optimization Algorithm
Published 2022-12-01“…Extensive research studies have been done to detect electricity theft by analyzing customer consumption patterns. Today, one of the most widely used methods is convolutional neural networks (CNNs). …”
Get full text
Article -
473
Comparative study on carbon emission spatial network and carbon emission reduction collaboration in urban agglomerations
Published 2025-05-01“…Mismatches exist between collaboration patterns and emission networks: central cities dominate cooperation, while peripheral cities lack initiative; intensity polarization and provincial-level mini-clubs prevail. …”
Get full text
Article -
474
Fractional Transfer Entropy Networks: Short- and Long-Memory Perspectives on Global Stock Market Interactions
Published 2025-01-01“…These findings demonstrate that FTE uncovers nuanced dynamics overlooked by methods focusing solely on either current events or deep-rooted patterns. Although the method relies on price returns and does not differentiate specific shock types, it offers a versatile tool for investors, policymakers, and researchers to gauge financial stability, evaluate contagion risk, and better understand how ephemeral signals and historical legacies jointly govern global market connectivity.…”
Get full text
Article -
475
ChaMTeC: CHAnnel Mixing and TEmporal Convolution Network for Time-Series Anomaly Detection
Published 2025-05-01“…This paper introduces ChaMTeC (CHAnnel Mixing and TEmporal Convolution Network), a novel deep learning framework designed for time-series anomaly detection. …”
Get full text
Article -
476
Intrusion Alert Analysis Method for Power Information Communication Networks Based on Data Processing Units
Published 2025-06-01“…Finally, the suffix tree models attack activities, capturing key behavioral paths of high-severity alerts and identifying attacker patterns. Experimental evaluations on the CPTC-2017 and CPTC-2018 datasets validate the proposed method’s effectiveness in reducing alert redundancy, extracting critical attack behaviors, and constructing attack activity sequences. …”
Get full text
Article -
477
COVID-19 Disruption Strategy for Redesigning Global Supply Chain Network across TPP Countries
Published 2021-12-01“…This enables us to model and evaluate simultaneous considerations of supplier disruption, customs duty, and TPP in redesigning a global supply chain network. …”
Get full text
Article -
478
HFFC: A High-Fan-Out and Flexible-Cluster Optical Network Architecture for Data Centers
Published 2023-01-01“…The performance of the HFFC architecture is evaluated by simulation using synthetic traffic patterns. …”
Get full text
Article -
479
Optimizing Fractional-Order Convolutional Neural Networks for Groove Classification in Music Using Differential Evolution
Published 2024-10-01“…This study presents a differential evolution (DE)-based optimization approach for fractional-order convolutional neural networks (FOCNNs) aimed at enhancing the accuracy of groove classification in music. …”
Get full text
Article -
480
Deep learning based predictive models for real time accident prevention in autonomous vehicle networks
Published 2025-07-01“…The use of autonomous vehicle (AV) networks is a potentially useful solution since they make it possible to react in real time to probable collisions. …”
Get full text
Article