For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackgr...For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackground.In this work,the local density is measured by its spectral neighbors through a certain radius which is obtained by calculating the mean median of the distance matrix.Further,a two-step segmentation strategy is designed.The first segmentation step divides the original background into two subsets,a large subset composed by background pixels and a small subset containing both background pixels and anomalies.The second segmentation step employing Otsu method with an aim to obtain a discrimination threshold is conducted on the small subset.Then the pixels whose local densities are lower than the threshold are removed.Finally,to validate the effectiveness of the proposed method,it combines Reed-Xiaoli detector and collaborative-representation-based detector to detect anomalies.Experiments are conducted on two real hyperspectral datasets.Results show that the proposed method achieves better detection performance.展开更多
Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic fire...Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic firewalls.Many intrusion detection methods are processed through machine learning.Previous literature has shown that the performance of an intrusion detection method based on hybrid learning or integration approach is superior to that of single learning technology.However,almost no studies focus on how additional representative and concise features can be extracted to process effective intrusion detection among massive and complicated data.In this paper,a new hybrid learning method is proposed on the basis of features such as density,cluster centers,and nearest neighbors(DCNN).In this algorithm,data is represented by the local density of each sample point and the sum of distances from each sample point to cluster centers and to its nearest neighbor.k-NN classifier is adopted to classify the new feature vectors.Our experiment shows that DCNN,which combines K-means,clustering-based density,and k-NN classifier,is effective in intrusion detection.展开更多
Anomaly detection is an important method for intrusion detection.In recent years,unsupervised methods have been widely researched because they do not require labeling.For example,a nonlinear autoencoder can use recons...Anomaly detection is an important method for intrusion detection.In recent years,unsupervised methods have been widely researched because they do not require labeling.For example,a nonlinear autoencoder can use reconstruction errors to attain the discrimination threshold.This method is not effective when the model complexity is high or the data contains noise.The method for detecting the density of compressed features in a hidden layer can be used to reduce the influence of noise on the selection of the threshold because the density of abnormal data in hidden layers is smaller than normal data.However,compressed features may lose some of the high-dimensional distribution information of the original data.In this paper,we present an efficient anomaly detection framework for unsupervised anomaly detection,which includes network data capturing,processing,feature extraction,and anomaly detection.We employ a deep autoencoder to obtain compressed features and multi-layer reconstruction errors,and feeds them the same to the Gaussian mixture model to estimate the density.The proposed approach is trained and tested on multiple current intrusion detection datasets and real network scenes,and performance indicators,namely accuracy,recall,and F1-score,are better than other autoencoder models.展开更多
With the development of global position system(GPS),wireless technology and location aware services,it is possible to collect a large quantity of trajectory data.In the field of data mining for moving objects,the pr...With the development of global position system(GPS),wireless technology and location aware services,it is possible to collect a large quantity of trajectory data.In the field of data mining for moving objects,the problem of anomaly detection is a hot topic.Based on the development of anomalous trajectory detection of moving objects,this paper introduces the classical trajectory outlier detection(TRAOD) algorithm,and then proposes a density-based trajectory outlier detection(DBTOD) algorithm,which compensates the disadvantages of the TRAOD algorithm that it is unable to detect anomalous defects when the trajectory is local and dense.The results of employing the proposed algorithm to Elk1993 and Deer1995 datasets are also presented,which show the effectiveness of the algorithm.展开更多
The timely and accurately detection of abnormal aircraft trajectory is critical to improving flight safety.However,the existing anomaly detection methods based on machine learning cannot well characterize the features...The timely and accurately detection of abnormal aircraft trajectory is critical to improving flight safety.However,the existing anomaly detection methods based on machine learning cannot well characterize the features of aircraft trajectories.Low anomaly detection accuracy still exists due to the high-dimensionality,heterogeneity and temporality of flight trajectory data.To this end,this paper proposes an abnormal trajectory detection method based on the deep mixture density network(DMDN)to detect flights with unusual data patterns and evaluate flight trajectory safety.The technique consists of two components:Utilization of the deep long short-term memory(LSTM)network to encode features of flight trajectories effectively,and parameterization of the statistical properties of flight trajectory using the Gaussian mixture model(GMM).Experiment results on Guangzhou Baiyun International Airport terminal airspace show that the proposed method can effectively capture the statistical patterns of aircraft trajectories.The model can detect abnormal flights with elevated risks and its performance is superior to two mainstream methods.The proposed model can be used as an assistant decision-making tool for air traffic controllers.展开更多
Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical ...Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical methods for anomalous cell detection cannot adapt to the evolution of networks, and data mining becomes the mainstream. In this paper, we propose a novel kernel density-based local outlier factor(KLOF) to assign a degree of being an outlier to each object. Firstly, the notion of KLOF is introduced, which captures exactly the relative degree of isolation. Then, by analyzing its properties, including the tightness of upper and lower bounds, sensitivity of density perturbation, we find that KLOF is much greater than 1 for outliers. Lastly, KLOFis applied on a real-world dataset to detect anomalous cells with abnormal key performance indicators(KPIs) to verify its reliability. The experiment shows that KLOF can find outliers efficiently. It can be a guideline for the operators to perform faster and more efficient trouble shooting.展开更多
Outlier detection is an important task in data mining. In fact, it is difficult to find the clustering centers in some sophisticated multidimensional datasets and to measure the deviation degree of each potential outl...Outlier detection is an important task in data mining. In fact, it is difficult to find the clustering centers in some sophisticated multidimensional datasets and to measure the deviation degree of each potential outlier. In this work, an effective outlier detection method based on multi-dimensional clustering and local density(ODBMCLD) is proposed. ODBMCLD firstly identifies the center objects by the local density peak of data objects, and clusters the whole dataset based on the center objects. Then, outlier objects belonging to different clusters will be marked as candidates of abnormal data. Finally, the top N points among these abnormal candidates are chosen as final anomaly objects with high outlier factors. The feasibility and effectiveness of the method are verified by experiments.展开更多
Grazing incidence optics (GIO) is the most important compound in an x-ray detection system; it is used to concentrate the x-ray photons from outer space. A nested planar GIO for x-ray concentration is designed and d...Grazing incidence optics (GIO) is the most important compound in an x-ray detection system; it is used to concentrate the x-ray photons from outer space. A nested planar GIO for x-ray concentration is designed and developed by authors in this paper; planar segments are used as the reflection mirror instead of curved segments because of the simple process and low cost. After the complex assembling process with a special metal supporter, a final circle light spot of φ 12 mm was obtained in the visible light testing experiment of GIO; the effective area of 1710.51 mm^2@ 1 keV and 530 mm^2@8 keV is obtained in the x-ray testing experiment with the GIO-SDD combination, which is supposed to be a concentrating detector in xray detection systems.展开更多
The Five-hundred-meter Aperture Spherical radio Telescope(FAST) will make contributions to studies of Galactic and extragalactic masers. This telescope, with construction finished and now undergoing commissioning, has...The Five-hundred-meter Aperture Spherical radio Telescope(FAST) will make contributions to studies of Galactic and extragalactic masers. This telescope, with construction finished and now undergoing commissioning, has an innovative design that leads to the highest sensitivity of any single dish radio telescope in the world. FAST's potential for OH megamaser research is discussed, including the sky density of masers detectable in surveys. The scientific impact expected from FAST maser studies is also discussed.展开更多
Overlapping community detection in a network is a challenging issue which attracts lots of attention in recent years.A notion of hesitant node(HN) is proposed. An HN contacts with multiple communities while the comm...Overlapping community detection in a network is a challenging issue which attracts lots of attention in recent years.A notion of hesitant node(HN) is proposed. An HN contacts with multiple communities while the communications are not strong or even accidental, thus the HN holds an implicit community structure.However, HNs are not rare in the real world network. It is important to identify them because they can be efficient hubs which form the overlapping portions of communities or simple attached nodes to some communities. Current approaches have difficulties in identifying and clustering HNs. A density-based rough set model(DBRSM) is proposed by combining the virtue of densitybased algorithms and rough set models. It incorporates the macro perspective of the community structure of the whole network and the micro perspective of the local information held by HNs, which would facilitate the further "growth" of HNs in community. We offer a theoretical support for this model from the point of strength of the trust path. The experiments on the real-world and synthetic datasets show the practical significance of analyzing and clustering the HNs based on DBRSM. Besides, the clustering based on DBRSM promotes the modularity optimization.展开更多
Objective The purpose of this study was to evaluate the distribution of vascular endothelial growth factor (VEGF) and CD105-microvessel density (MVD)in invasive breast carcinomas. We also aimed to analyze the rela...Objective The purpose of this study was to evaluate the distribution of vascular endothelial growth factor (VEGF) and CD105-microvessel density (MVD)in invasive breast carcinomas. We also aimed to analyze the relationship between VEGF and MVD expression with other standard prognostic parameters associated with invasive breast cancer, such as size, grade, stage of the cancer, metastases, and tumor recurrence. Methods immunohistochemistry via the Ultra SensitiveTM S-P method was used to detect VEGF and MVD expression in 128 cases of invasive breast carcinoma. Specimens were evaluated for CD105 expression. Positively stained microvessels were counted in dense vascular loci under 400x magnification, MVD in the peripheral area adjacent to the lesion and in the central, area within the lesion in invasive breast carcinomas and benign leisions groups were also assessed. Fifty cases of benign breast disease tissue were selected as the control group. Results Results showed that 64.1% of invasive breast cancer samples were VEGF-positive, higher than in benign breast disease tissue (22.0%, P 〈 0.05). There was a positive correlation between VEGF overexpression and histological grade, lymph node metastasis, and distant metastasis of invasive breast cancer. VEGF expression was not related to age or size of the tumor (P 〉 0.05). MVD of the peripheral area adjacent to the lesion was significantly higher than those central area within the lesion in both invasive breast cancer and benignbreast disease groups (P 〈 0.01 for each group). There were significant differences in the mean CD105-MVD, between invasive breast tumors with a histological grade of Ⅰ or Ⅱ and grade Ⅲ; between tumors with lymph node or distant metastasis; and between patients with or without recurrence (P 〈 0.05). However, there was no difference in the mean MVD between the two age groups (≤ 50 years vs. 〉 50 years) or the two tumor diameter groups (〈 2 cm vs. 〉 2 cm), P 〉 0.05. Conclusion Overexpression of VEGF and MVD may be important biological.markers for invasion and lymph node and distant metastases of invasive breast cancer. Combined detection of the two tumor markers could provide better prognostic monitoring for disease recurrence and metastasis, as well as aid with clinical staging of breast tumors. Prediction of the risk for metastasis and recurrence, as well as recurrence patterns based on VEGF and MVD post-surgery, could aid design of better follow-up regimens and appropriate treatment strategies for breast cancer patients.展开更多
There is a large amount of information in the network data that we canexploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of netw...There is a large amount of information in the network data that we canexploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of network data is usually paired with clustering algorithms to solve the community detection problem.Meanwhile, there is always an unpredictable distribution of class clusters outputby graph representation learning. Therefore, we propose an improved densitypeak clustering algorithm (ILDPC) for the community detection problem, whichimproves the local density mechanism in the original algorithm and can betteraccommodate class clusters of different shapes. And we study the communitydetection in network data. The algorithm is paired with the benchmark modelGraph sample and aggregate (GraphSAGE) to show the adaptability of ILDPCfor community detection. The plotted decision diagram shows that the ILDPCalgorithm is more discriminative in selecting density peak points compared tothe original algorithm. Finally, the performance of K-means and other clusteringalgorithms on this benchmark model is compared, and the algorithm is proved tobe more suitable for community detection in sparse networks with the benchmarkmodel on the evaluation criterion F1-score. The sensitivity of the parameters ofthe ILDPC algorithm to the low-dimensional vector set output by the benchmarkmodel GraphSAGE is also analyzed.展开更多
A primary study on Processing in X - ray inspection of spot weld for aluminum alloy spot welding,in- cluding for background simulation,acquisition of ideal binary image, and extraction and identifi- cation of defec...A primary study on Processing in X - ray inspection of spot weld for aluminum alloy spot welding,in- cluding for background simulation,acquisition of ideal binary image, and extraction and identifi- cation of defect features was presented.展开更多
The paper puts forward a new method of density-based anomaly data mining, the method is used to design the engine of network intrusion detection system (NIDS), thus a new NIDS is constructed based on the engine. The N...The paper puts forward a new method of density-based anomaly data mining, the method is used to design the engine of network intrusion detection system (NIDS), thus a new NIDS is constructed based on the engine. The NIDS can find new unknown intrusion behaviors, which are used to updated the intrusion rule-base, based on which intrusion detections can be carried out online by the BM pattern match algorithm. Finally all modules of the NIDS are described by formalized language.展开更多
基金Projects(61405041,61571145)supported by the National Natural Science Foundation of ChinaProject(ZD201216)supported by the Key Program of Heilongjiang Natural Science Foundation,China+1 种基金Project(RC2013XK009003)supported by Program Excellent Academic Leaders of Harbin,ChinaProject(HEUCF1508)supported by the Fundamental Research Funds for the Central Universities,China
文摘For anomaly detection,anomalies existing in the background will affect the detection performance.Accordingly,a background refinement method based on the local density is proposed to remove the anomalies from thebackground.In this work,the local density is measured by its spectral neighbors through a certain radius which is obtained by calculating the mean median of the distance matrix.Further,a two-step segmentation strategy is designed.The first segmentation step divides the original background into two subsets,a large subset composed by background pixels and a small subset containing both background pixels and anomalies.The second segmentation step employing Otsu method with an aim to obtain a discrimination threshold is conducted on the small subset.Then the pixels whose local densities are lower than the threshold are removed.Finally,to validate the effectiveness of the proposed method,it combines Reed-Xiaoli detector and collaborative-representation-based detector to detect anomalies.Experiments are conducted on two real hyperspectral datasets.Results show that the proposed method achieves better detection performance.
文摘Intrusion detection aims to detect intrusion behavior and serves as a complement to firewalls.It can detect attack types of malicious network communications and computer usage that cannot be detected by idiomatic firewalls.Many intrusion detection methods are processed through machine learning.Previous literature has shown that the performance of an intrusion detection method based on hybrid learning or integration approach is superior to that of single learning technology.However,almost no studies focus on how additional representative and concise features can be extracted to process effective intrusion detection among massive and complicated data.In this paper,a new hybrid learning method is proposed on the basis of features such as density,cluster centers,and nearest neighbors(DCNN).In this algorithm,data is represented by the local density of each sample point and the sum of distances from each sample point to cluster centers and to its nearest neighbor.k-NN classifier is adopted to classify the new feature vectors.Our experiment shows that DCNN,which combines K-means,clustering-based density,and k-NN classifier,is effective in intrusion detection.
基金This work is supported by the Introducing Program of Dongguan for Leading Talents in Innovation and Entrepreneur(Dongren Han[2018],No.738).
文摘Anomaly detection is an important method for intrusion detection.In recent years,unsupervised methods have been widely researched because they do not require labeling.For example,a nonlinear autoencoder can use reconstruction errors to attain the discrimination threshold.This method is not effective when the model complexity is high or the data contains noise.The method for detecting the density of compressed features in a hidden layer can be used to reduce the influence of noise on the selection of the threshold because the density of abnormal data in hidden layers is smaller than normal data.However,compressed features may lose some of the high-dimensional distribution information of the original data.In this paper,we present an efficient anomaly detection framework for unsupervised anomaly detection,which includes network data capturing,processing,feature extraction,and anomaly detection.We employ a deep autoencoder to obtain compressed features and multi-layer reconstruction errors,and feeds them the same to the Gaussian mixture model to estimate the density.The proposed approach is trained and tested on multiple current intrusion detection datasets and real network scenes,and performance indicators,namely accuracy,recall,and F1-score,are better than other autoencoder models.
基金supported by the Aeronautical Science Foundation of China(20111052010)the Jiangsu Graduates Innovation Project (CXZZ120163)+1 种基金the "333" Project of Jiangsu Provincethe Qing Lan Project of Jiangsu Province
文摘With the development of global position system(GPS),wireless technology and location aware services,it is possible to collect a large quantity of trajectory data.In the field of data mining for moving objects,the problem of anomaly detection is a hot topic.Based on the development of anomalous trajectory detection of moving objects,this paper introduces the classical trajectory outlier detection(TRAOD) algorithm,and then proposes a density-based trajectory outlier detection(DBTOD) algorithm,which compensates the disadvantages of the TRAOD algorithm that it is unable to detect anomalous defects when the trajectory is local and dense.The results of employing the proposed algorithm to Elk1993 and Deer1995 datasets are also presented,which show the effectiveness of the algorithm.
基金supported in part by the National Natural Science Foundation of China(Nos.62076126,52075031)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX19_0013)。
文摘The timely and accurately detection of abnormal aircraft trajectory is critical to improving flight safety.However,the existing anomaly detection methods based on machine learning cannot well characterize the features of aircraft trajectories.Low anomaly detection accuracy still exists due to the high-dimensionality,heterogeneity and temporality of flight trajectory data.To this end,this paper proposes an abnormal trajectory detection method based on the deep mixture density network(DMDN)to detect flights with unusual data patterns and evaluate flight trajectory safety.The technique consists of two components:Utilization of the deep long short-term memory(LSTM)network to encode features of flight trajectories effectively,and parameterization of the statistical properties of flight trajectory using the Gaussian mixture model(GMM).Experiment results on Guangzhou Baiyun International Airport terminal airspace show that the proposed method can effectively capture the statistical patterns of aircraft trajectories.The model can detect abnormal flights with elevated risks and its performance is superior to two mainstream methods.The proposed model can be used as an assistant decision-making tool for air traffic controllers.
基金supported by the National Basic Research Program of China (973 Program: 2013CB329004)
文摘Since data services are penetrating into our daily life rapidly, the mobile network becomes more complicated, and the amount of data transmission is more and more increasing. In this case, the traditional statistical methods for anomalous cell detection cannot adapt to the evolution of networks, and data mining becomes the mainstream. In this paper, we propose a novel kernel density-based local outlier factor(KLOF) to assign a degree of being an outlier to each object. Firstly, the notion of KLOF is introduced, which captures exactly the relative degree of isolation. Then, by analyzing its properties, including the tightness of upper and lower bounds, sensitivity of density perturbation, we find that KLOF is much greater than 1 for outliers. Lastly, KLOFis applied on a real-world dataset to detect anomalous cells with abnormal key performance indicators(KPIs) to verify its reliability. The experiment shows that KLOF can find outliers efficiently. It can be a guideline for the operators to perform faster and more efficient trouble shooting.
基金Project(61362021)supported by the National Natural Science Foundation of ChinaProject(2016GXNSFAA380149)supported by Natural Science Foundation of Guangxi Province,China+1 种基金Projects(2016YJCXB02,2017YJCX34)supported by Innovation Project of GUET Graduate Education,ChinaProject(2011KF11)supported by the Key Laboratory of Cognitive Radio and Information Processing,Ministry of Education,China
文摘Outlier detection is an important task in data mining. In fact, it is difficult to find the clustering centers in some sophisticated multidimensional datasets and to measure the deviation degree of each potential outlier. In this work, an effective outlier detection method based on multi-dimensional clustering and local density(ODBMCLD) is proposed. ODBMCLD firstly identifies the center objects by the local density peak of data objects, and clusters the whole dataset based on the center objects. Then, outlier objects belonging to different clusters will be marked as candidates of abnormal data. Finally, the top N points among these abnormal candidates are chosen as final anomaly objects with high outlier factors. The feasibility and effectiveness of the method are verified by experiments.
基金supported by the National Natural Science Foundation of China(Grant No.61471357)the State Key Laboratory of Geo-Information Engineering Foundation(Grant No.SKLGIE2014-M-2-1)
文摘Grazing incidence optics (GIO) is the most important compound in an x-ray detection system; it is used to concentrate the x-ray photons from outer space. A nested planar GIO for x-ray concentration is designed and developed by authors in this paper; planar segments are used as the reflection mirror instead of curved segments because of the simple process and low cost. After the complex assembling process with a special metal supporter, a final circle light spot of φ 12 mm was obtained in the visible light testing experiment of GIO; the effective area of 1710.51 mm^2@ 1 keV and 530 mm^2@8 keV is obtained in the x-ray testing experiment with the GIO-SDD combination, which is supposed to be a concentrating detector in xray detection systems.
基金supported by the China Ministry of Science and Technology under the National Basic Research Program of China (973 program, 2012CB821800)the National Natural Science Foundation of China (Nos. 11473007, 11373038 and 11590782)supported by the Strategic Priority Research Program (No. XDB09000000) from the Chinese Academy of Sciences
文摘The Five-hundred-meter Aperture Spherical radio Telescope(FAST) will make contributions to studies of Galactic and extragalactic masers. This telescope, with construction finished and now undergoing commissioning, has an innovative design that leads to the highest sensitivity of any single dish radio telescope in the world. FAST's potential for OH megamaser research is discussed, including the sky density of masers detectable in surveys. The scientific impact expected from FAST maser studies is also discussed.
基金supported by the National Natural Science Foundation of China(71271018)
文摘Overlapping community detection in a network is a challenging issue which attracts lots of attention in recent years.A notion of hesitant node(HN) is proposed. An HN contacts with multiple communities while the communications are not strong or even accidental, thus the HN holds an implicit community structure.However, HNs are not rare in the real world network. It is important to identify them because they can be efficient hubs which form the overlapping portions of communities or simple attached nodes to some communities. Current approaches have difficulties in identifying and clustering HNs. A density-based rough set model(DBRSM) is proposed by combining the virtue of densitybased algorithms and rough set models. It incorporates the macro perspective of the community structure of the whole network and the micro perspective of the local information held by HNs, which would facilitate the further "growth" of HNs in community. We offer a theoretical support for this model from the point of strength of the trust path. The experiments on the real-world and synthetic datasets show the practical significance of analyzing and clustering the HNs based on DBRSM. Besides, the clustering based on DBRSM promotes the modularity optimization.
基金Supported by grants from the Medicine and Health Care Science and Technology Development Plan Projects Foundation of Shandong Province(No.2014WS0282,2014WSA11003)the Application Technology Research and Development Project Foundation in Rizhao City(No.2014SZSH002)the Scientific Research Projects of Jining Medical College(No.JY2013KJ051)
文摘Objective The purpose of this study was to evaluate the distribution of vascular endothelial growth factor (VEGF) and CD105-microvessel density (MVD)in invasive breast carcinomas. We also aimed to analyze the relationship between VEGF and MVD expression with other standard prognostic parameters associated with invasive breast cancer, such as size, grade, stage of the cancer, metastases, and tumor recurrence. Methods immunohistochemistry via the Ultra SensitiveTM S-P method was used to detect VEGF and MVD expression in 128 cases of invasive breast carcinoma. Specimens were evaluated for CD105 expression. Positively stained microvessels were counted in dense vascular loci under 400x magnification, MVD in the peripheral area adjacent to the lesion and in the central, area within the lesion in invasive breast carcinomas and benign leisions groups were also assessed. Fifty cases of benign breast disease tissue were selected as the control group. Results Results showed that 64.1% of invasive breast cancer samples were VEGF-positive, higher than in benign breast disease tissue (22.0%, P 〈 0.05). There was a positive correlation between VEGF overexpression and histological grade, lymph node metastasis, and distant metastasis of invasive breast cancer. VEGF expression was not related to age or size of the tumor (P 〉 0.05). MVD of the peripheral area adjacent to the lesion was significantly higher than those central area within the lesion in both invasive breast cancer and benignbreast disease groups (P 〈 0.01 for each group). There were significant differences in the mean CD105-MVD, between invasive breast tumors with a histological grade of Ⅰ or Ⅱ and grade Ⅲ; between tumors with lymph node or distant metastasis; and between patients with or without recurrence (P 〈 0.05). However, there was no difference in the mean MVD between the two age groups (≤ 50 years vs. 〉 50 years) or the two tumor diameter groups (〈 2 cm vs. 〉 2 cm), P 〉 0.05. Conclusion Overexpression of VEGF and MVD may be important biological.markers for invasion and lymph node and distant metastases of invasive breast cancer. Combined detection of the two tumor markers could provide better prognostic monitoring for disease recurrence and metastasis, as well as aid with clinical staging of breast tumors. Prediction of the risk for metastasis and recurrence, as well as recurrence patterns based on VEGF and MVD post-surgery, could aid design of better follow-up regimens and appropriate treatment strategies for breast cancer patients.
基金The National Natural Science Foundation of China(No.61762031)The Science and Technology Major Project of Guangxi Province(NO.AA19046004)The Natural Science Foundation of Guangxi(No.2021JJA170130).
文摘There is a large amount of information in the network data that we canexploit. It is difficult for classical community detection algorithms to handle network data with sparse topology. Representation learning of network data is usually paired with clustering algorithms to solve the community detection problem.Meanwhile, there is always an unpredictable distribution of class clusters outputby graph representation learning. Therefore, we propose an improved densitypeak clustering algorithm (ILDPC) for the community detection problem, whichimproves the local density mechanism in the original algorithm and can betteraccommodate class clusters of different shapes. And we study the communitydetection in network data. The algorithm is paired with the benchmark modelGraph sample and aggregate (GraphSAGE) to show the adaptability of ILDPCfor community detection. The plotted decision diagram shows that the ILDPCalgorithm is more discriminative in selecting density peak points compared tothe original algorithm. Finally, the performance of K-means and other clusteringalgorithms on this benchmark model is compared, and the algorithm is proved tobe more suitable for community detection in sparse networks with the benchmarkmodel on the evaluation criterion F1-score. The sensitivity of the parameters ofthe ILDPC algorithm to the low-dimensional vector set output by the benchmarkmodel GraphSAGE is also analyzed.
文摘A primary study on Processing in X - ray inspection of spot weld for aluminum alloy spot welding,in- cluding for background simulation,acquisition of ideal binary image, and extraction and identifi- cation of defect features was presented.
基金Funded by Shaanxi Natural Science Foundation(2002G07)
文摘The paper puts forward a new method of density-based anomaly data mining, the method is used to design the engine of network intrusion detection system (NIDS), thus a new NIDS is constructed based on the engine. The NIDS can find new unknown intrusion behaviors, which are used to updated the intrusion rule-base, based on which intrusion detections can be carried out online by the BM pattern match algorithm. Finally all modules of the NIDS are described by formalized language.