3,045 Result(s)
-
Article
Iterative missing value imputation based on feature importance
Many datasets suffer from missing values due to various reasons, which not only increases the processing difficulty of related tasks but also reduces the classification accuracy. To address this problem, the m...
-
Article
DQN-PACG: load regulation method based on DQN and multivariate prediction model
Demand response plays a pivotal role in modern smart grid systems, aiding in balancing energy consumption. However, the increasing energy demands of contemporary society have placed a significant burden on pow...
-
Article
LightCapsGNN: light capsule graph neural network for graph classification
Graph neural networks (GNNs) have achieved excellent performances in many graph-related tasks. However, they need appropriate pooling operations to deal with the graph classification tasks, and thus, they may ...
-
Article
Automating localized learning for cardinality estimation based on XGBoost
For cardinality estimation in DBMS, building multiple local models instead of one global model can usually improve estimation accuracy as well as reducing the effort to label large amounts of training data. Un...
-
Article
Graph neural architecture search with heterogeneous message-passing mechanisms
In recent years, neural network search has been utilized in designing effective heterogeneous graph neural networks (HGNN) and has achieved remarkable performance beyond manually designed networks. Generally, ...
-
Article
A hybrid storage blockchain-based query efficiency enhancement method for business environment evaluation
A favorable business environment plays a crucial role in facilitating the high-quality development of a modern economy. In order to enhance the credibility and efficiency of business environment evaluation, th...
-
Article
Open AccessOn data efficiency of univariate time series anomaly detection models
In machine learning (ML) problems, it is widely believed that more training samples lead to improved predictive accuracy but incur higher computational costs. Consequently, achieving better data efficiency, that ...
-
Article
Open AccessHypoxia within tumor microenvironment characterizes distinct genomic patterns and aids molecular subty** for guiding individualized immunotherapy
Assessing the hypoxic status within the tumor microenvironment (TME) is crucial for its significant clinical relevance in evaluating drug resistance and tailoring individualized strategies. In this study, we p...
-
Article
Multi-behavior-based graph contrastive learning recommendation
Graph-based collaborative filtering recommendations can more effectively explore the interaction information between users and items. However, its performance is still affected by the problems of data sparsity...
-
Article
Reasoning subevent relation over heterogeneous event graph
Subevent relation identification (SRI) is a challenging natural language processing task of great value for knowledge acquisition and reasoning. Given an event pair, previous work mainly defines SRI as a class...
-
Article
Open AccessA fuel consumption-based method for develo** local-specific CO2 emission rate database using open-source big data
Emission data collection has always been a significant burden and challenge for Chinese counties to develop a CO2 emission inventory. This paper proposed a fuel consumption-based method to develop a local-specifi...
-
Article
Open AccessSkyline query under multidimensional incomplete data based on classification tree
A method for skyline query of multidimensional incomplete data based on a classification tree has been proposed to address the problem of a large amount of useless data in existing skyline queries with multidi...
-
Article
Open AccessDEMFFA: a multi-strategy modified Fennec Fox algorithm with mixed improved differential evolutionary variation strategies
The Fennec Fox algorithm (FFA) is a new meta-heuristic algorithm that is primarily inspired by the Fennec fox's ability to dig and escape from wild predators. Compared with other classical algorithms, FFA show...
-
Article
RDAT: an efficient regularized decoupled adversarial training mechanism
Adversarial examples have exposed the inherent vulnerabilities of deep neural networks. Although adversarial training has emerged as the leading strategy for adversarial defenses, it is frequently hindered by ...
-
Article
Open AccessHigh-performance computing in healthcare: An automatic literature analysis perspective
The adoption of high-performance computing (HPC) in healthcare has gained significant attention in recent years, driving advancements in medical research and clinical practice. Exploring the literature on HPC ...
-
Article
Discriminative boundary generation for effective outlier detection
Outlier detection is often considered a challenge due to the inherent class imbalance in datasets, with the small number of available outliers that are insufficient to describe their overall distribution. This...
-
Article
Mining Top-K constrained cross-level high-utility itemsets over data streams
Cross-Level High-Utility Itemsets Mining (CLHUIM) aims to discover interesting relationships between hierarchy levels by introducing the taxonomy of items. To tackle this issue of the current CLHUIM algorithms...
-
Article
BotCL: a social bot detection model based on graph contrastive learning
The proliferation of social bots on social networks presents significant challenges to network security due to their malicious activities. While graph neural network models have shown promise in detecting soci...
-
Article
Open AccessDFA-Net: Dual multi-scale feature aggregation network for vessel segmentation in X-ray digital subtraction angiography
Even though deep learning is fascinated in fields of coronary vessel segmentation in X-ray angiography and achieves prominent progresses, most of those models probably bring high false and missed detections du...
-
Article
Enhancing trust and privacy in distributed networks: a comprehensive survey on blockchain-based federated learning
While centralized servers pose a risk of being a single point of failure, decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities. Mer...