期刊文献+
共找到12篇文章
< 1 >
每页显示 20 50 100
Exact Graph Pattern Matching:Applications,Progress and Prospects
1
作者 孙国豪 余水 +1 位作者 方秀 陆金虎 《Journal of Donghua University(English Edition)》 CAS 2023年第2期216-224,共9页
Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given qu... Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given query graph in a data graph.The exact GPM has been widely used in biological data analyses,social network analyses and other fields.In this paper,the applications of the exact GPM were first introduced,and the research progress of the exact GPM was summarized.Then,the related algorithms were introduced in detail,and the experiments on the state-of-the-art exact GPM algorithms were conducted to compare their performance.Based on the experimental results,the applicable scenarios of the algorithms were pointed out.New research opportunities in this area were proposed. 展开更多
关键词 graph pattern matching(GPM) exact matching subgraph isomorphism graph embedding subgraph matching
下载PDF
Inexact graph matching using a hierarchy of matching processes
2
作者 Paul Morrison Ju Jia Zou 《Computational Visual Media》 2015年第4期291-307,共17页
Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exp... Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exponential computational complexity. Much of the previous research has focused on solving this problem using heuristics or estimations. Unfortunately,many of these techniques do not guarantee that an optimal solution will be found. It is the aim of the proposed algorithm to reduce the complexity of the inexact graph matching process,while still producing an optimal solution for a known application. This is achieved by greatly simplifying each individual matching process,and compensating for lost robustness by producing a hierarchy of matching processes. The creation of each matching process in the hierarchy is driven by an application-specific criterion that operates at the subgraph scale. To our knowledge,this problem has never before been approached in this manner. Results show that the proposed algorithm is faster than two existing methods based on graph edit operations.The proposed algorithm produces accurate results in terms of matching graphs,and shows promise for the application of shape matching. The proposed algorithm can easily be extended to produce a sub-optimal solution if required. 展开更多
关键词 graph matching inexact graph matching graph edit distance graph edit operations shape matching
原文传递
Multi-Target Track-Correlation Algorithm of the Graph-Matching-Based Sensor Network 被引量:1
3
作者 SHEN Yingchun WU Hanbao JIN Hai 《Wuhan University Journal of Natural Sciences》 CAS 2010年第6期495-499,共5页
For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is p... For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is proposed.This method approximately simulates the track correlation determination process using artificial data,and integrally matches the relative position relation between multiple targets in the common measuring space of various sensors in order to fulfill the purpose of multi-target track correlation.The simulation results show that this method has high correlation accuracy and robustness. 展开更多
关键词 wireless sensor network track correlation graph matching
原文传递
Bin-scanning:Segmentation of X-ray CT volume of binned parts using Morse skeleton graph of distance transform
4
作者 Yuta Yamauchi Tatsuya Yatagawa +1 位作者 Yutaka Ohtake Hiromasa Suzuki 《Computational Visual Media》 SCIE EI CSCD 2023年第2期319-333,共15页
X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach... X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach to accelerate the inspection of many mechanical parts with the same shape in a bin.The input to this problem is a volumetric image(i.e.,CT volume)of many parts obtained by a single CT scan.We need to segment the parts in the volume to inspect each of them;however,random postures and dense contacts of the parts prohibit part segmentation using traditional template matching.To address this problem,we convert both the scanned volumetric images of the template and the binned parts to simpler graph structures and solve a subgraph matching problem to segment the parts.We perform a distance transform to convert the CT volume into a distance field.Then,we construct a graph based on Morse theory,in which graph nodes are located at the extremum points of the distance field.The experimental evaluation demonstrates that our fully automatic approach can detect target parts appropriately,even for a heap of 50 parts.Moreover,the overall computation can be performed in approximately 30 min for a large CT volume of approximately 2000×2000×1000 voxels. 展开更多
关键词 X-ray computed tomography(CT) volume segmentation graph matching non-destructive inspection
原文传递
Graphs Isomorphic to Their Maximum Matching Graphs 被引量:4
5
作者 Yan LIU Gui Ying YAN 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第9期1507-1516,共10页
The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, ... The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, we prove that if a graph is isomorphic to its maximum matching graph, then every block of the graph is an odd cycle. 展开更多
关键词 ISOMORPHIC maximum matching graph bipartite graph factor-critical graph
原文传递
Distance Between Two Vertices of Maximum Matching Graphs
6
作者 YanLiu 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2004年第4期641-646,共6页
关键词 Maximum matching graph DISTANCE positive surplus
原文传递
Fuzzy-Constrained Graph Pattern Matching in Medical Knowledge Graphs
7
作者 Lei Li Xun Du +1 位作者 Zan Zhang Zhenchao Tao 《Data Intelligence》 EI 2022年第3期599-619,共21页
The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM th... The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM this paper is to make a breast cancer-oriented diagnosis before the surgery. Technically, this paper has firstly made a new definition of GPM, aiming to explore the GPM in the medical field, especially in Medical Knowledge Graphs(MKGs). Then, in the specific matching process, this paper introduces fuzzy calculation, and proposes a multi-threaded bidirectional routing exploration(M-TBRE) algorithm based on depth first search and a two-way routing matching algorithm based on multi-threading. In addition, fuzzy constraints are introduced in the M-TBRE algorithm, which leads to the Fuzzy-M-TBRE algorithm. The experimental results on the two datasets show that compared with existing algorithms, our proposed algorithm is more efficient and effective. 展开更多
关键词 graph pattern matching Medical Knowledge graphs Fuzzy constraints Breast cancer Diagnostic classification
原文传递
Matching user identities across social networks with limited profile data
8
作者 Ildar NURGALIEV Qiang QU +1 位作者 Seyed Mojtaba Hosseini BAMAKAN Muhammad MUZAMMAL 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第6期171-184,共14页
Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and... Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and others.The task of matching user identities across different social networks is considered a challenging task.In this work,we propose an algorithm to reveal user identities as a set of linked accounts from different social networks using limited user profile data,i.e,user-name and friendship.Thus,we propose a framework,ExpandUIL,that includes three standalone al-gorithms based on(i)the percolation graph matching in Ex-pand FullName algorithm,(i)a supervised machine learning algorithm that works with the graph embedding,and(ii)a combination of the two,ExpandUserLinkage algorithm.The proposed framework as a set of algorithms is significant as,(i)it is based on the network topology and requires only name feature of the nodes,(i)it requires a considerably low initial seed,as low as one initial seed suffices,(ii)it is iterative and scalable with applicability to online incoming stream graphs,and(iv)it has an experimental proof of stability over a real ground-truth dataset.Experiments on real datasets,Instagram and VK social networks,show upto 75%recall for linked ac-counts with 96%accuracy using only one given seed pair. 展开更多
关键词 social networks user identity linkage graph structure learning maximum subgraph matching graph percolation
原文传递
The Characterization of p-factor-critical Graphs 被引量:1
9
作者 Shao-hui ZHAI Er-ling WEI Fu-ji ZHANG 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2022年第1期154-158,共5页
A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of facto... A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of factor-critical and bicritical for p=1 and p=2,respectively.Heping Zhang and Fuji Zhang[Construction for bicritical graphs and k-extendable bipartite graphs,Discrete Math.,306(2006)1415–1423]gave a concise structure characterization of bicritical graphs.In this paper,we present the characterizations of p-factor-critical graphs and minimal p-factorcritical graphs for p≥2.As an application,we also obtain a class of graphs which are minimal p-factor-critical for p≥1. 展开更多
关键词 perfect matching p-factor-critical graph TRANSVERSAL
原文传递
Heuristic multistep attack scenarios construction based on kill chain
10
作者 Cheng Jie Zhang Ru +4 位作者 Wei Jiahui Lu Chen Lü Zhishuai Lin Bingjie Xia Ang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第5期61-71,共11页
Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based ... Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based on the correlation between attack steps.However,IDS has false negatives and false positives,which leads to incomplete or incorrect multistep attacks.Association based on simple similarity is difficult to obtain an accurate attack cluster,while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base.To solve the above problems,a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC)model was proposed.The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching.The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value.And according to the purpose of the multistep attack,the kill chain model is used to define the initial multistep attack model,which is used as the initial graph for graph matching.Experimental results show that HMASCKC model can better fit the multistep attack behavior,the effect has some advantages over the longest common subsequence(LCS)algorithm,which can close to or match the prediction error of judge evaluation of attack intension(JEAN)system.The method can make multistep attack model matching for unknown attacks,so it has some advantages in practical application. 展开更多
关键词 multistep attack scenario kill chain graph matching attack prediction
原文传递
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation 被引量:1
11
作者 蒋志平 惠维 +6 位作者 李向阳 唐少杰 赵季中 韩劲松 赵鲲 王志 肖波 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期589-604,共16页
Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. ... Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. The core challenge is to lower the cost of fingerprint site-survey. One of the trends is to collect the piecewise data from clients and establish the radio map in crowdsourcing manner. However the low participation rate blocks the practical use. In this work, we propose a passive crowdsourcing channel state information (CSI) based indoor localization scheme, C2IL. Despite a crowdsourcing based approach, our scheme is totally transparent to the client and the only requirement is to connect to our 802.11n access points (APs). C2IL is built upon an innovative method to accurately estimate the moving speed solely based on 802.11n CSI. Knowing the walking speed of a client and its surrounding APs, a graph matching algorithm is employed to extract the received signal strength (RSS) fingerprints and establish the fingerprint map. For localization phase, we design a trajectory clustering based localization algorithm to provide precise real-time indoor localization and tracking. We develop and deploy a practical working system of C2IL in a large office environment. Extensive evaluations indicate that the error of speed estimation is within 3%, and the localization error is within 2 m at 80% time in a very complex indoor environment. 展开更多
关键词 channel state information speed estimation fingerprint map graph matching indoor localization
原文传递
Codimensional matrix pairing perspective of BYY harmony learning:hierarchy of bilinear systems,joint decomposition of data-covariance,and applications of network biology
12
作者 Lei XU 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2011年第1期86-119,共34页
One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper ... One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper provides further insights from another perspective that a co-dimensional matrix pair(shortly co-dim matrix pair)forms a building unit and a hierarchy of such building units sets up the BYY system.The BYY harmony learning is re-examined via exploring the nature of a co-dim matrix pair,which leads to improved learning performance with refined model selection criteria and a modified mechanism that coordinates automatic model selection and sparse learning.Besides updating typical algorithms of factor analysis(FA),binary FA(BFA),binary matrix factorization(BMF),and nonnegative matrix factorization(NMF)to share such a mechanism,we are also led to(a)a new parametrization that embeds a de-noise nature to Gaussian mixture and local FA(LFA);(b)an alternative formulation of graph Laplacian based linear manifold learning;(c)a codecomposition of data and covariance for learning regularization and data integration;and(d)a co-dim matrix pair based generalization of temporal FA and state space model.Moreover,with help of a co-dim matrix pair in Hadamard product,we are led to a semi-supervised formation for regression analysis and a semi-blind learning formation for temporal FA and state space model.Furthermore,we address that these advances provide with new tools for network biology studies,including learning transcriptional regulatory,Protein-Protein Interaction network alignment,and network integration. 展开更多
关键词 Bayesian Ying-Yang(BYY)harmony learning automatic model selection bi-linear stochastic system co-dimensional matrix pair sparse learning denoise embedded Gaussian mixture de-noise embedded local factor analysis(LFA) bi-clustering manifold learning temporal factor analysis(TFA) semi-blind learning attributed graph matching generalized linear model(GLM) gene transcriptional regulatory network alignment network integration
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部