Results 11 to 20 of about 22,484,217 (350)

Graph-based representation for identifying individual travel activities with spatiotemporal trajectories and POI data

open access: yesScientific Reports, 2022
Individual daily travel activities (e.g., work, eating) are identified with various machine learning models (e.g., Bayesian Network, Random Forest) for understanding people’s frequent travel purposes.
Xinyi Liu   +3 more
doaj   +1 more source

A Scheme for Quickly Simulating Extraterrestrial Solar Radiation over Complex Terrain on a Large Spatial-Temporal Span—A Case Study over the Entirety of China

open access: yesRemote Sensing, 2022
Extraterrestrial solar radiation (ESR) is the essential basic background for solar radiation, which determines the occurrence of the weather and atmospheric phenomena.
Siwei Lin   +4 more
doaj   +1 more source

Semi-Supervised Learning Based on Generative Adversarial Network and Its Applied to Lithology Recognition

open access: yesIEEE Access, 2019
Lithology recognition is an essential part of reservoir parameter prediction. Compared to conventional algorithms, deep learning that needs a large amount of training data as support can extract features automatically.
Guohe Li   +4 more
doaj   +1 more source

Web + Data Mining = Web Mining [PDF]

open access: yesHMD Praxis der Wirtschaftsinformatik, 2009
Dieser Beitrag gibt eine kurze Beschreibung, was unter dem Begriff Web Mining zu verstehen ist und wie Webdaten mit gangigen Data-Mining-Techniken kombiniert werden konnen, um das Web besser als Informationsquelle nutzbar zu machen. Des Weiteren wird ein Uberblick uber die gangigen Hauptachsen gegeben, entlang derer die meisten aktuellen Entwicklungen ...
openaire   +1 more source

Learning Data Mining [PDF]

open access: yes2018 IEEE 5th International Conference on Data Science and Advanced Analytics (DSAA), 2018
In the last decade the usage and study of data mining and machine learning algorithms have received an increasing attention from several and heterogeneous fields of research. Learning how and why a certain algorithm returns a particular result, and understanding which are the main problems connected to its execution is a hot topic in the education of ...
Guidotti R., Monreale A., Rinzivillo S.
openaire   +3 more sources

Crowd counting via Multi-Scale Adversarial Convolutional Neural Networks

open access: yesJournal of Intelligent Systems, 2020
The purpose of crowd counting is to estimate the number of pedestrians in crowd images. Crowd counting or density estimation is an extremely challenging task in computer vision, due to large scale variations and dense scene.
Zhu Liping   +4 more
doaj   +1 more source

Mining Views: Database Views for Data Mining [PDF]

open access: yes2008 IEEE 24th International Conference on Data Engineering, 2008
We present a system towards the integration of data mining into relational databases. To this end, a relational database model is proposed, based on the so called virtual mining views. We show that several types of patterns and models over the data, such as itemsets, association rules and decision trees, can be represented and queried using a unifying ...
Blockeel, Hendrik   +4 more
openaire   +6 more sources

Immersive cultural heritage digital documentation and information service for historical figure metaverse: a case of Zhu Xi, Song Dynasty, China

open access: yesHeritage Science, 2022
Cultural heritage is closely linked with individual historical figures, who become a key focus for cultural tourism. Confucianism laid the foundation for much of Chinese civilization, and Confucius and Mencius have been studied extensively and have been ...
Zhanling Fan   +2 more
doaj   +1 more source

Prediction of Inbound and Outbound Passenger Flow in Urban Rail Transit Based on Spatio-Temporal Attention Residual Network

open access: yesApplied Sciences, 2023
Passenger flow prediction is a critical approach to ensure the effective functioning of urban rail transit. However, there are few studies that combine multiple influencing factors for short-term passenger flow prediction.
Jun Yang   +5 more
doaj   +1 more source

Privacy Preserving Data Mining

open access: yesAdvances in Information Security, 2015
Recent interest in data collection and monitoring using data mining for security and business-related applications has raised privacy. Privacy Preserving Data Mining (PPDM) techniques require data modification to disinfect them from sensitive information
J. Vaidya, Yu Zhu, C. Clifton
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy