![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Characteristics and Controlling Factors of Fluid Interlayer Crossflow through Fractures in Coal Measure Gas Reservoirs: Implication for Enhancing Production
Against the backdrop of implementing integrated hydraulic fracturing on coal measure gas (CMG) reservoirs, fluids can flow through interlayer fractures during drainage stage, resulting in fluid interlayer cros...
-
Article
Experimental Investigation of Reservoir Fluid Interlayer Crossflow Through Fracture During the Drainage Stage of Coal Measure Gas Well
Coal measure gas (CMG) development is effective to increase gas production of coalbed methane wells. However, the reservoir fluid migration law during CMG development is different from that of single-layer dev...
-
Chapter and Conference Paper
Event Relation Extraction Using Type-Guided Attentive Graph Convolutional Networks
Event relation extraction is a fundamental task in text mining, which has wide applications in event-centric natural language processing. However, most of the existing approaches can hardly model complicated c...
-
Article
A novel dense retrieval framework for long document retrieval
-
Chapter and Conference Paper
A Novel Protein Interface Prediction Framework via Hybrid Attention Mechanism
Protein interface prediction is fundamental to understand the hidden principles of many living activities. Although many approaches to the task of protein interface prediction have been proposed, most of exist...
-
Chapter and Conference Paper
SBRNE: An Improved Unified Framework for Social and Behavior Recommendations with Network Embedding
Recent years have witnessed the fast growing and ubiquity of social media which has significantly changed the social manner and information sharing in our daily life. Given a user, social (i.e. friend) recommenda...
-
Article
Open AccessThe diversity of hydrogen-producing bacteria and methanogens within an in situ coal seam
Biogenic and biogenic-thermogenic coalbed methane (CBM) are important energy reserves for unconventional natural gas. Thus, to investigate biogenic gas formation mechanisms, a series of fresh coal samples from...
-
Article
Open AccessErratum to: A novel procedure on next generation sequencing data analysis using text mining algorithm
-
Article
Open AccessA novel procedure on next generation sequencing data analysis using text mining algorithm
Next-generation sequencing (NGS) technologies have provided researchers with vast possibilities in various biological and biomedical research areas. Efficient data mining strategies are in high demand for larg...
-
Article
Open AccessText mining for identifying topics in the literatures about adolescent substance use and depression
Both adolescent substance use and adolescent depression are major public health problems, and have the tendency to co-occur. Thousands of articles on adolescent substance use or depression have been published....
-
Article
Open AccessA heuristic approach to determine an appropriate number of topics in topic modeling
Topic modelling is an active research field in machine learning. While mainly used to build models from unstructured textual data, it offers an effective means of data mining where samples represent documents,...
-
Chapter and Conference Paper
Semi-supervised Microblog Clustering Method via Dual Constraints
In this paper, we present a semi-supervised clustering method for microblog in which both word-level and microblog (document)-level constraints are automatically generated totally based on statistical informat...
-
Article
Open AccessTopic modeling for cluster analysis of large biological and medical datasets
The big data moniker is nowhere better deserved than to describe the ever-increasing prodigiousness and complexity of biological and medical datasets. New methods are needed to generate and test hypotheses, fo...
-
Chapter and Conference Paper
A DBN-Based Classifying Approach to Discover the Internet Water Army
The Internet water army (IWA) usually refers to hidden paid posters and collusive spammers, which has already generated big threats for cyber security. Many researchers begin to study how to effectively identi...
-
Article
Open AccessData mining tools for Salmonella characterization: application to gel-based fingerprinting analysis
Pulsed field gel electrophoresis (PFGE) is currently the most widely and routinely used method by the Centers for Disease Control and Prevention (CDC) and state health labs in the United States for Salmonella sur...
-
Article
A nonnegative matrix factorization framework for semi-supervised document clustering with dual constraints
In this paper, we propose a new semi-supervised co-clustering algorithm Orthogonal Semi-Supervised Nonnegative Matrix Factorization (OSS-NMF) for document clustering. In this new approach, the clustering proce...
-
Article
Effective semi-supervised document clustering via active learning with instance-level constraints
Semi-supervised document clustering, which takes into account limited supervised data to group unlabeled documents into clusters, has received significant interest recently. Because of getting supervised data ...
-
Chapter and Conference Paper
Automatic Image Annotation and Retrieval Using Hybrid Approach
We firstly propose continuous probabilistic latent semantic analysis (PLSA) to model continuous quantity. In addition, corresponding Expectation-Maximization (EM) algorithm is derived to determine the model pa...
-
Chapter and Conference Paper
A Novel Model for Semantic Learning and Retrieval of Images
In this paper, we firstly propose an extended probabilistic latent semantic analysis (PLSA) to model continuous quantity. In addition, corresponding EM algorithm is derived to determine the parameters. Then, w...
-
Article
CHSMST: a clustering algorithm based on hyper surface and minimum spanning tree
As data mining having attracted a significant amount of research attention, many clustering algorithms have been proposed in the past decades. However, most of existing clustering methods have high computation...