Results 41 to 50 of about 22,816,084 (277)

Machine Learning [PDF]

open access: yes
Predicting credit ...
Introduction to Data Mining
core   +1 more source

A comprehensive evaluation of module detection methods for gene expression data

open access: yesNature Communications, 2018
Modules composed of groups of genes with similar expression profiles tend to be functionally related and co-regulated. Here, Saelens et al evaluate the performance of 42 computational methods and provide practical guidelines for module detection in gene ...
Wouter Saelens   +2 more
doaj   +1 more source

Big Graph Mining: Frameworks and Techniques [PDF]

open access: yes, 2016
Big graph mining is an important research area and it has attracted considerable attention. It allows to process, analyze, and extract meaningful information from large amounts of graph data. Big graph mining has been highly motivated not only by the tremendously increasing size of graphs but also by its huge number of applications.
arxiv   +1 more source

Deductive data mining.

open access: yesPsychological Methods, 2019
Data mining methods offer a powerful tool for psychologists to capture complex relations such as interaction and nonlinear effects without prior specification. However, interpreting and integrating information from data mining models can be challenging.
Maxwell Hong   +2 more
openaire   +4 more sources

Incremental Road Network Update Method with Trajectory Data and UAV Remote Sensing Imagery

open access: yesISPRS International Journal of Geo-Information, 2022
GPS trajectory and remote sensing data are crucial for updating urban road networks because they contain critical spatial and temporal information.
Jianxin Qin   +4 more
doaj   +1 more source

Partial Selfish Mining for More Profits [PDF]

open access: yesarXiv, 2022
Mining attacks aim to gain an unfair share of extra rewards in the blockchain mining. Selfish mining can preserve discovered blocks and strategically release them, wasting honest miners' computing resources and getting higher profits. Previous mining attacks either conceal the mined whole blocks (hiding or discarding), or release them completely in a ...
arxiv  

A machine-learning-based hardware-Trojan detection approach for chips in the Internet of Things

open access: yesInternational Journal of Distributed Sensor Networks, 2019
With the development of the Internet of Things, smart devices are widely used. Hardware security is one key issue in the security of the Internet of Things.
Chen Dong   +3 more
doaj   +1 more source

Driving Stress Detection Using Multimodal Convolutional Neural Networks with Nonlinear Representation of Short-Term Physiological Signals

open access: yesSensors, 2021
Mental stress can lead to traffic accidents by reducing a driver’s concentration or increasing fatigue while driving. In recent years, demand for methods to detect drivers’ stress in advance to prevent dangerous situations increased.
Jaewon Lee, Hyeonjeong Lee, Miyoung Shin
doaj   +1 more source

Spatiotemporal Data Mining: A Survey [PDF]

open access: yesarXiv, 2022
Spatiotemporal data mining aims to discover interesting, useful but non-trivial patterns in big spatial and spatiotemporal data. They are used in various application domains such as public safety, ecology, epidemiology, earth science, etc. This problem is challenging because of the high societal cost of spurious patterns and exorbitant computational ...
arxiv  

A Bayesian network approach to the study of historical epidemiological databases: modelling meningitis outbreaks in the Niger

open access: yesBulletin of the World Health Organization, 2012
OBJECTIVE: To develop a tool for evaluating the risk that an outbreak of meningitis will occur in a particular district of the Niger after outbreaks have been reported in other, specified districts of the country.
A Beresniak   +6 more
doaj   +1 more source

Home - About - Disclaimer - Privacy