Showing 41 - 60 results of 2,064 for search 'network evaluation patterns', query time: 0.18s Refine Results
  1. 41

    Analysis of the Construction and Evolution of Ecological Security Patterns in Karst Areas by FU Li, PENG Shuangyun, GONG Luping, HUANG Bangmei, MA Dongling, ZHU Ziyi

    Published 2025-04-01
    “…[Methods] Based on the evaluation of ecosystem service importance and ecological sensitivity, in combination with methods such as MSPA, MCR, and the gravity model, the ecological security pattern of the Pearl River source region from 1990 to 2020 was constructed, and its spatial-temporal evolution characteristics were analyzed. …”
    Get full text
    Article
  2. 42

    Deep Time Series Intelligent Framework for Power Data Asset Evaluation by Lihong Ge, Xin Li, Li Wang, Jian Wei, Bo Huang

    Published 2025-01-01
    “…These data have both long-term and short-term patterns, and traditional evaluation methods such as autoregressive models or Gaussian processes may be difficult to fully capture their characteristics, resulting in evaluation bias. …”
    Get full text
    Article
  3. 43

    Identifying Barong Tagalog Textile Using Convolutional Neural Network and Support Vector Machine with Structural Pattern Segmentation by Jeff B. Totesora, Edward C. Torralba, Cyrel O. Manlises

    Published 2025-04-01
    “…Especially convolutional neural networks (CNNs) and support vector machines (SVMs) were used. …”
    Get full text
    Article
  4. 44
  5. 45
  6. 46

    Recognizing Mixing Patterns of Urban Agglomeration Based on Complex Network Assortativity Coefficient: A Case Study in China by Kaiqi Zhang, Lujin Jia, Sheng Xu

    Published 2025-02-01
    “…Based on multi-source data (Baidu index data, investment data of listed companies, high-speed rail operation data, and highway network data) from 2017 to 2019 across seven national-level urban agglomerations, this study introduces complex network assortativity coefficients to analyze the mechanisms of urban relationship formation from two dimensions, structural features and socioeconomic attributes, to evaluate how these features shape urban agglomeration networks and reveal the distribution of network assortativity coefficients across urban agglomerations to classify diverse developmental patterns. …”
    Get full text
    Article
  7. 47
  8. 48

    Predicting correlation relationships of entities between attack patterns and techniques based on word embedding and graph convolutional network by Weicheng QIU, Xiuzhen CHEN, Yinghua MA, Jin MA, Zhihong ZHOU

    Published 2023-08-01
    “…Threat analysis relies on knowledge bases that contain a large number of security entities.The scope and impact of security threats and risks are evaluated by modeling threat sources, attack capabilities, attack motivations, and threat paths, taking into consideration the vulnerability of assets in the system and the security measures implemented.However, the lack of entity relations between these knowledge bases hinders the security event tracking and attack path generation.To complement entity relations between CAPEC and ATT&CK techniques and enrich threat paths, an entity correlation prediction method called WGS was proposed, in which entity descriptions were analyzed based on word embedding and a graph convolution network.A Word2Vec model was trained in the proposed method for security domain to extract domain-specific semantic features and a GCN model to capture the co-occurrence between words and sentences in entity descriptions.The relationship between entities was predicted by a Siamese network that combines these two features.The inclusion of external semantic information helped address the few-shot learning problem caused by limited entity relations in the existing knowledge base.Additionally, dynamic negative sampling and regularization was applied in model training.Experiments conducted on CAPEC and ATT&CK database provided by MITRE demonstrate that WGS effectively separates related entity pairs from irrelevant ones in the sample space and accurately predicts new entity relations.The proposed method achieves higher prediction accuracy in few-shot learning and requires shorter training time and less computing resources compared to the Bert-based text similarity prediction models.It proves that word embedding and graph convolutional network based entity relation prediction method can extract new entity correlation relationships between attack patterns and techniques.This helps to abstract attack techniques and tactics from low-level vulnerabilities and weaknesses in security threat analysis.…”
    Get full text
    Article
  9. 49
  10. 50

    Network analysis of cognitive function, glycemic–lipid profiles, and hepatic–renal function in individuals with diverse drinking patterns by Shuqi Xu, Shuqi Xu, Shuqi Xu, Shuqi Xu, Ranran Zhao, Ranran Zhao, Ranran Zhao, Jincheng Wang, Jincheng Wang, Jincheng Wang, Xue Yang, Xue Yang, Xue Yang, Lan Wang, Lan Wang, Lan Wang, Cuixia An, Cuixia An, Cuixia An, Xueyi Wang, Xueyi Wang, Xueyi Wang, Ran Wang, Ran Wang, Ran Wang

    Published 2025-07-01
    “…The node DSCT ranked highly in terms of betweenness centrality.ConclusionCorrelations may exist among cognitive function, glycemic and lipid profiles, and hepatic–renal function in individuals with varying alcohol consumption patterns. Lipid and liver function indicators were identified as the most central factors in the network model. …”
    Get full text
    Article
  11. 51

    A Research on Black-box Evaluation Methods for Quantum Key Distribution Networks by DAI Hua, SUN Xin, MAO Yining, LI Yixuan, LÜ Yuxiang, WANG Hongyan, YU Xiaosong

    Published 2025-06-01
    “…【Conclusion】The paper identifies potential network security threats by setting dynamic thresholds and evaluates network security from multiple dimensions. …”
    Get full text
    Article
  12. 52

    Longitudinal evaluation of common and unique brain-networks in variants of primary progressive aphasia by Rajan Kashyap, Rose Dawn Bharath, Changsong Zhou, Kyrana Tsapkini, John E. Desmond, SH Annabel Chen, Kaviraja Udupa, PT Sivakumar, Sagarika Bhattacharjee

    Published 2025-08-01
    “…Since the subset of these subjects was scanned at the 6th and 12th months, the longitudinal changes in the rsfMRI networks were evaluated at each interval. Network features were correlated with clinical behaviours, and the longitudinal impact of the changes in these networks on behaviours was evaluated over the 12-month period. …”
    Get full text
    Article
  13. 53
  14. 54
  15. 55

    Expressing the Author's Position in the English-Language Network Film Review by I. V. Kononova, T. A. Klepikova, E. A. Klenova

    Published 2021-12-01
    “…Research methodology is based on the approaches to classification of modus and evaluation types developed by N.D. Arutyunova. The methodology of describing the author's position in evaluative genres is proposed, which boils down to the following steps: identifying the leading linguistic means of self-nomination; displaying main genre-typical patterns of subject modality (modus types); describing evaluation semantics specificity and linguistic means of dominant evaluative meanings verbalization. …”
    Get full text
    Article
  16. 56
  17. 57

    Evaluating the spatiotemporal dynamics and structural resilience of the global titanium industrial chain: Insights from trade network analysis by Wei Chen, Xiquan Zhao, Hu Yu

    Published 2025-06-01
    “…To this end, this paper constructs global trade networks of titanium ore, titanium dioxide, titanium sponge, and titanium products and utilizes various network analysis methods to deeply investigate the spatiotemporal evolution of global titanium trade patterns, the topology of the trade network, and the resilience characteristics. …”
    Get full text
    Article
  18. 58
  19. 59
  20. 60

    VA-Creator—A Virtual Appliance Creator based on adaptive Neural Networks to generate synthetic power consumption patterns by Michael Meiser, Benjamin Duppe, Ingo Zinnikus, Alexander Anisimov

    Published 2024-12-01
    “…These VAs synthesize power consumption patterns (PCPs) based on Neural Networks (NNs) which adapt their architecture to the training data structure to simplify the creation of new VAs. …”
    Get full text
    Article