期刊文献+
共找到17篇文章
< 1 >
每页显示 20 50 100
Graphs Isomorphic to Their Maximum Matching Graphs 被引量:4
1
作者 Yan LIU Gui Ying YAN 《Acta Mathematica Sinica,English Series》 SCIE CSCD 2009年第9期1507-1516,共10页
The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, ... The maximum matching graph M(G) of a graph G is a simple graph whose vertices are the maximum matchings of G and where two maximum matchings are adjacent in M(G) if they differ by exactly one edge. In this paper, we prove that if a graph is isomorphic to its maximum matching graph, then every block of the graph is an odd cycle. 展开更多
关键词 ISOMORPHIC maximum matching graph bipartite graph factor-critical graph
原文传递
THE CONNECTIVITY OF MAXIMUM MATCHING GRAPHS 被引量:1
2
作者 LIUYan WANGShiying 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2004年第1期33-38,共6页
The maximum matching graph of a graph has a vertex for each maximummatching and an edge for each pair of maximum matchings which differ by exactly oneedge. In this paper, we prove that the connectivity of maximum matc... The maximum matching graph of a graph has a vertex for each maximummatching and an edge for each pair of maximum matchings which differ by exactly oneedge. In this paper, we prove that the connectivity of maximum matching graph of abipartite graph is equal to its minimum degree. 展开更多
关键词 maximum matching graph CONNECTIVITY
原文传递
Matching spatial relation graphs using a constrained partial permutation strategy
3
作者 徐晓刚 孙正兴 刘文印 《Journal of Southeast University(English Edition)》 EI CAS 2003年第3期236-239,共4页
A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship amon... A constrained partial permutation strategy is proposed for matching spatial relation graph (SRG), which is used in our sketch input and recognition system Smart Sketchpad for representing the spatial relationship among the components of a graphic object. Using two kinds of matching constraints dynamically generated in the matching process, the proposed approach can prune most improper mappings between SRGs during the matching process. According to our theoretical analysis in this paper, the time complexity of our approach is O(n 2) in the best case, and O(n!) in the worst case, which occurs infrequently. The spatial complexity is always O(n) for all cases. Implemented in Smart Sketchpad, our proposed strategy is of good performance. 展开更多
关键词 spatial relation graph graph matching constrained partial permutation graphics recognition
下载PDF
Distance Between Two Vertices of Maximum Matching Graphs
4
作者 YanLiu 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2004年第4期641-646,共6页
The maximum matching graph of a graph has a vertex for each maximum matching and an edge for each pair of maximum matchings which differ by exactly one edge. In this paper, we obtain a lower bound of distance between ... The maximum matching graph of a graph has a vertex for each maximum matching and an edge for each pair of maximum matchings which differ by exactly one edge. In this paper, we obtain a lower bound of distance between two vertices of maximum matching graph, and give a necessary and sufficient condition that the bound can be reached. 展开更多
关键词 Maximum matching graph DISTANCE positive surplus
原文传递
Exact Graph Pattern Matching:Applications,Progress and Prospects
5
作者 孙国豪 余水 +1 位作者 方秀 陆金虎 《Journal of Donghua University(English Edition)》 CAS 2023年第2期216-224,共9页
Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given qu... Graph pattern matching(GPM)can be used to mine the key information in graphs.Exact GPM is one of the most commonly used methods among all the GPM-related methods,which aims to exactly find all subgraphs for a given query graph in a data graph.The exact GPM has been widely used in biological data analyses,social network analyses and other fields.In this paper,the applications of the exact GPM were first introduced,and the research progress of the exact GPM was summarized.Then,the related algorithms were introduced in detail,and the experiments on the state-of-the-art exact GPM algorithms were conducted to compare their performance.Based on the experimental results,the applicable scenarios of the algorithms were pointed out.New research opportunities in this area were proposed. 展开更多
关键词 graph pattern matching(GPM) exact matching subgraph isomorphism graph embedding subgraph matching
下载PDF
BIMATCHING DESIGNS
6
作者 LINCUIQIN KATHERINEHEINRICH 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 1994年第1期77-84,共8页
A collection of k-matchings of bipartite graph Kn,n with the property thatevery pair of independent edges lies in exactly λ of the k-matchings is called aBIMATCH(n,k,λ)-design. Existences and constructions for vario... A collection of k-matchings of bipartite graph Kn,n with the property thatevery pair of independent edges lies in exactly λ of the k-matchings is called aBIMATCH(n,k,λ)-design. Existences and constructions for various BIMATCH (n,k,λ)designs are given. 展开更多
关键词 Bipartite graph matching Block Design matching Design.
下载PDF
Resource allocation based on fairness and QoS provisioning for OFDMA-WLAN system 被引量:1
7
作者 鲍楠 夏玮玮 沈连丰 《Journal of Southeast University(English Edition)》 EI CAS 2014年第1期1-6,共6页
To satisfy different service requirements of multiple users in the orthogo nal frequency division multiple access wireless local area network OFDMA-WLAN system downlink transmission a resource allocation algorithm bas... To satisfy different service requirements of multiple users in the orthogo nal frequency division multiple access wireless local area network OFDMA-WLAN system downlink transmission a resource allocation algorithm based on fairness and quality of service QoS provisioning is proposed. Different QoS requirements are converted into different rate requirements to calculate the QoSs atisfaction level.The optimization object is revised as a fairness-driven resource optimization function to provide fairness. The complex resource allocation problem is divided into channel allocation and power assignment sub-problems. The sub-problems are solved by the bipartite graph matching and water-filling based method.Compared with other algorithms the proposed algorithm sacrifices less data rate for higher fairnes and QoS satisfaction.The sim ulation results show that the proposed algorithm is capableo fp rovi ding QoS and fairness and performs better in a tradeoff among QoS fairness and data rate. 展开更多
关键词 QOS quality of service satisfaction level fairness driven function b ipartite graph matching water-f i lling resource allocation
下载PDF
Multi-Target Track-Correlation Algorithm of the Graph-Matching-Based Sensor Network 被引量:1
8
作者 SHEN Yingchun WU Hanbao JIN Hai 《Wuhan University Journal of Natural Sciences》 CAS 2010年第6期495-499,共5页
For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is p... For the problem of track correlation failure under the influence of sensor system deviation in wireless sensor networks,a new track correlation method which is based on relative positional relation chart matching is proposed.This method approximately simulates the track correlation determination process using artificial data,and integrally matches the relative position relation between multiple targets in the common measuring space of various sensors in order to fulfill the purpose of multi-target track correlation.The simulation results show that this method has high correlation accuracy and robustness. 展开更多
关键词 wireless sensor network track correlation graph matching
原文传递
Inexact graph matching using a hierarchy of matching processes
9
作者 Paul Morrison Ju Jia Zou 《Computational Visual Media》 2015年第4期291-307,共17页
Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exp... Inexact graph matching algorithms have proved to be useful in many applications,such as character recognition,shape analysis,and image analysis. Inexact graph matching is,however,inherently an NP-hard problem with exponential computational complexity. Much of the previous research has focused on solving this problem using heuristics or estimations. Unfortunately,many of these techniques do not guarantee that an optimal solution will be found. It is the aim of the proposed algorithm to reduce the complexity of the inexact graph matching process,while still producing an optimal solution for a known application. This is achieved by greatly simplifying each individual matching process,and compensating for lost robustness by producing a hierarchy of matching processes. The creation of each matching process in the hierarchy is driven by an application-specific criterion that operates at the subgraph scale. To our knowledge,this problem has never before been approached in this manner. Results show that the proposed algorithm is faster than two existing methods based on graph edit operations.The proposed algorithm produces accurate results in terms of matching graphs,and shows promise for the application of shape matching. The proposed algorithm can easily be extended to produce a sub-optimal solution if required. 展开更多
关键词 graph matching inexact graph matching graph edit distance graph edit operations shape matching
原文传递
Fuzzy-Constrained Graph Pattern Matching in Medical Knowledge Graphs
10
作者 Lei Li Xun Du +1 位作者 Zan Zhang Zhenchao Tao 《Data Intelligence》 EI 2022年第3期599-619,共21页
The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM th... The research on graph pattern matching(GPM) has attracted a lot of attention. However, most of the research has focused on complex networks, and there are few researches on GPM in the medical field. Hence, with GPM this paper is to make a breast cancer-oriented diagnosis before the surgery. Technically, this paper has firstly made a new definition of GPM, aiming to explore the GPM in the medical field, especially in Medical Knowledge Graphs(MKGs). Then, in the specific matching process, this paper introduces fuzzy calculation, and proposes a multi-threaded bidirectional routing exploration(M-TBRE) algorithm based on depth first search and a two-way routing matching algorithm based on multi-threading. In addition, fuzzy constraints are introduced in the M-TBRE algorithm, which leads to the Fuzzy-M-TBRE algorithm. The experimental results on the two datasets show that compared with existing algorithms, our proposed algorithm is more efficient and effective. 展开更多
关键词 graph pattern matching Medical Knowledge graphs Fuzzy constraints Breast cancer Diagnostic classification
原文传递
The Characterization of p-factor-critical Graphs 被引量:1
11
作者 Shao-hui ZHAI Er-ling WEI Fu-ji ZHANG 《Acta Mathematicae Applicatae Sinica》 SCIE CSCD 2022年第1期154-158,共5页
A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of facto... A graph G is said to be p-factor-critical if G-u1-u2-···-up has a perfect matching for any u1,u2,···,up∈V(G).The concept of p-factor-critical is a generalization of the concepts of factor-critical and bicritical for p=1 and p=2,respectively.Heping Zhang and Fuji Zhang[Construction for bicritical graphs and k-extendable bipartite graphs,Discrete Math.,306(2006)1415–1423]gave a concise structure characterization of bicritical graphs.In this paper,we present the characterizations of p-factor-critical graphs and minimal p-factorcritical graphs for p≥2.As an application,we also obtain a class of graphs which are minimal p-factor-critical for p≥1. 展开更多
关键词 perfect matching p-factor-critical graph TRANSVERSAL
原文传递
Bin-scanning:Segmentation of X-ray CT volume of binned parts using Morse skeleton graph of distance transform
12
作者 Yuta Yamauchi Tatsuya Yatagawa +1 位作者 Yutaka Ohtake Hiromasa Suzuki 《Computational Visual Media》 SCIE EI CSCD 2023年第2期319-333,共15页
X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach... X-ray CT scanners,due to the transmissive nature of X-rays,have enabled the non-destructive evaluation of industrial products,even inside their bodies.In light of its effectiveness,this study introduces a new approach to accelerate the inspection of many mechanical parts with the same shape in a bin.The input to this problem is a volumetric image(i.e.,CT volume)of many parts obtained by a single CT scan.We need to segment the parts in the volume to inspect each of them;however,random postures and dense contacts of the parts prohibit part segmentation using traditional template matching.To address this problem,we convert both the scanned volumetric images of the template and the binned parts to simpler graph structures and solve a subgraph matching problem to segment the parts.We perform a distance transform to convert the CT volume into a distance field.Then,we construct a graph based on Morse theory,in which graph nodes are located at the extremum points of the distance field.The experimental evaluation demonstrates that our fully automatic approach can detect target parts appropriately,even for a heap of 50 parts.Moreover,the overall computation can be performed in approximately 30 min for a large CT volume of approximately 2000×2000×1000 voxels. 展开更多
关键词 X-ray computed tomography(CT) volume segmentation graph matching non-destructive inspection
原文传递
Matching user identities across social networks with limited profile data
13
作者 Ildar NURGALIEV Qiang QU +1 位作者 Seyed Mojtaba Hosseini BAMAKAN Muhammad MUZAMMAL 《Frontiers of Computer Science》 SCIE EI CSCD 2020年第6期171-184,共14页
Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and... Privacy preservation is a primary concern in social networks which employ a variety of privacy preservations mechanisms to preserve and protect sensitive user information including age,location,education,interests,and others.The task of matching user identities across different social networks is considered a challenging task.In this work,we propose an algorithm to reveal user identities as a set of linked accounts from different social networks using limited user profile data,i.e,user-name and friendship.Thus,we propose a framework,ExpandUIL,that includes three standalone al-gorithms based on(i)the percolation graph matching in Ex-pand FullName algorithm,(i)a supervised machine learning algorithm that works with the graph embedding,and(ii)a combination of the two,ExpandUserLinkage algorithm.The proposed framework as a set of algorithms is significant as,(i)it is based on the network topology and requires only name feature of the nodes,(i)it requires a considerably low initial seed,as low as one initial seed suffices,(ii)it is iterative and scalable with applicability to online incoming stream graphs,and(iv)it has an experimental proof of stability over a real ground-truth dataset.Experiments on real datasets,Instagram and VK social networks,show upto 75%recall for linked ac-counts with 96%accuracy using only one given seed pair. 展开更多
关键词 social networks user identity linkage graph structure learning maximum subgraph matching graph percolation
原文传递
Detecting slowly moving infrared targets using temporal filtering and association strategy 被引量:5
14
作者 Jing-li GAO Cheng-lin WEN +1 位作者 Zhe-jing BAO Mei-qin LIU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2016年第11期1176-1185,共10页
The special characteristics of slowly moving infrared targets, such as containing only a few pixels,shapeless edge, low signal-to-clutter ratio, and low speed, make their detection rather difficult, especially when im... The special characteristics of slowly moving infrared targets, such as containing only a few pixels,shapeless edge, low signal-to-clutter ratio, and low speed, make their detection rather difficult, especially when immersed in complex backgrounds. To cope with this problem, we propose an effective infrared target detection algorithm based on temporal target detection and association strategy. First, a temporal target detection model is developed to segment the interested targets. This model contains mainly three stages, i.e., temporal filtering,temporal target fusion, and cross-product filtering. Then a graph matching model is presented to associate the targets obtained at different times. The association relies on the motion characteristics and appearance of targets,and the association operation is performed many times to form continuous trajectories which can be used to help disambiguate targets from false alarms caused by random noise or clutter. Experimental results show that the proposed method can detect slowly moving infrared targets in complex backgrounds accurately and robustly, and has superior detection performance in comparison with several recent methods. 展开更多
关键词 Temporal target detection Slowly moving targets graph matching Target association
原文传递
Communicating Is Crowdsourcing: Wi-Fi Indoor Localization with CSI-Based Speed Estimation 被引量:1
15
作者 蒋志平 惠维 +6 位作者 李向阳 唐少杰 赵季中 韩劲松 赵鲲 王志 肖波 《Journal of Computer Science & Technology》 SCIE EI CSCD 2014年第4期589-604,共16页
Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. ... Numerous indoor localization techniques have been proposed recently to meet the intensive demand for location- based service (LBS). Among them, the most popular solutions are the Wi-Fi fingerprint-based approaches. The core challenge is to lower the cost of fingerprint site-survey. One of the trends is to collect the piecewise data from clients and establish the radio map in crowdsourcing manner. However the low participation rate blocks the practical use. In this work, we propose a passive crowdsourcing channel state information (CSI) based indoor localization scheme, C2IL. Despite a crowdsourcing based approach, our scheme is totally transparent to the client and the only requirement is to connect to our 802.11n access points (APs). C2IL is built upon an innovative method to accurately estimate the moving speed solely based on 802.11n CSI. Knowing the walking speed of a client and its surrounding APs, a graph matching algorithm is employed to extract the received signal strength (RSS) fingerprints and establish the fingerprint map. For localization phase, we design a trajectory clustering based localization algorithm to provide precise real-time indoor localization and tracking. We develop and deploy a practical working system of C2IL in a large office environment. Extensive evaluations indicate that the error of speed estimation is within 3%, and the localization error is within 2 m at 80% time in a very complex indoor environment. 展开更多
关键词 channel state information speed estimation fingerprint map graph matching indoor localization
原文传递
Heuristic multistep attack scenarios construction based on kill chain
16
作者 Cheng Jie Zhang Ru +4 位作者 Wei Jiahui Lu Chen Lü Zhishuai Lin Bingjie Xia Ang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2023年第5期61-71,共11页
Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based ... Network attacks evolved from single-step and simple attacks to complex multistep attacks.Current methods of multistep attack detection usually match multistep attacks from intrusion detection systems(IDS)alarms based on the correlation between attack steps.However,IDS has false negatives and false positives,which leads to incomplete or incorrect multistep attacks.Association based on simple similarity is difficult to obtain an accurate attack cluster,while association based on prior knowledge such as attack graphs is difficult to guarantee a complete attack knowledge base.To solve the above problems,a heuristic multistep attack scenarios construction method based on the kill chain(HMASCKC)model was proposed.The attack model graph can be obtained from dual data sources and heuristic multistep attack scenarios can be obtained through graph matching.The model graph of the attack and the predicted value of the next attack are obtained by calculating the matching value.And according to the purpose of the multistep attack,the kill chain model is used to define the initial multistep attack model,which is used as the initial graph for graph matching.Experimental results show that HMASCKC model can better fit the multistep attack behavior,the effect has some advantages over the longest common subsequence(LCS)algorithm,which can close to or match the prediction error of judge evaluation of attack intension(JEAN)system.The method can make multistep attack model matching for unknown attacks,so it has some advantages in practical application. 展开更多
关键词 multistep attack scenario kill chain graph matching attack prediction
原文传递
Codimensional matrix pairing perspective of BYY harmony learning:hierarchy of bilinear systems,joint decomposition of data-covariance,and applications of network biology
17
作者 Lei XU 《Frontiers of Electrical and Electronic Engineering in China》 CSCD 2011年第1期86-119,共34页
One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper ... One paper in a preceding issue of this journal has introduced the Bayesian Ying-Yang(BYY)harmony learning from a perspective of problem solving,parameter learning,and model selection.In a complementary role,the paper provides further insights from another perspective that a co-dimensional matrix pair(shortly co-dim matrix pair)forms a building unit and a hierarchy of such building units sets up the BYY system.The BYY harmony learning is re-examined via exploring the nature of a co-dim matrix pair,which leads to improved learning performance with refined model selection criteria and a modified mechanism that coordinates automatic model selection and sparse learning.Besides updating typical algorithms of factor analysis(FA),binary FA(BFA),binary matrix factorization(BMF),and nonnegative matrix factorization(NMF)to share such a mechanism,we are also led to(a)a new parametrization that embeds a de-noise nature to Gaussian mixture and local FA(LFA);(b)an alternative formulation of graph Laplacian based linear manifold learning;(c)a codecomposition of data and covariance for learning regularization and data integration;and(d)a co-dim matrix pair based generalization of temporal FA and state space model.Moreover,with help of a co-dim matrix pair in Hadamard product,we are led to a semi-supervised formation for regression analysis and a semi-blind learning formation for temporal FA and state space model.Furthermore,we address that these advances provide with new tools for network biology studies,including learning transcriptional regulatory,Protein-Protein Interaction network alignment,and network integration. 展开更多
关键词 Bayesian Ying-Yang(BYY)harmony learning automatic model selection bi-linear stochastic system co-dimensional matrix pair sparse learning denoise embedded Gaussian mixture de-noise embedded local factor analysis(LFA) bi-clustering manifold learning temporal factor analysis(TFA) semi-blind learning attributed graph matching generalized linear model(GLM) gene transcriptional regulatory network alignment network integration
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部