Showing 1 - 10 results of 10 for search '"graph algorithm"', query time: 0.04s Refine Results
  1. 1

    Research on incremental deployment mechanism of network modality for polymorphic network environment by Jiong LI, Yuxiang HU, Pengshuai CUI, Le TIAN, Yongji DONG

    Published 2023-06-01
    “…Polymorphic networks support diverse network requirements and can coexist, evolve, and change on a unified physical or logical infrastructure in the form of network modality.They can maximize the innovation vitality of network technology driven by new applications.The evolution and development of modality require the incremental deployment of modality to meet the needs of convenience and privacy protection in the multi-user deployment process.However, the deployment of current network functions still uses the one-by-one deployment method, resulting in high complexity of the deployment of new modality, and mutual exposure of processing logic between different users.To address these issues, an incremental deployment mechanism for polymorphic network environments was proposed.Firstly, an incremental deployment mechanism for network modality was designed.Then, the incremental deployment of modality was abstracted as a graph merging problem based on this mechanism, and an adjacency list-based merge parsing graph algorithm was designed.The simulation results indicate that the proposed mechanism can achieve fast and correct merging of network modality, support incremental modality deployment, and greatly reduce the application deployment and service provision threshold of new network systems.…”
    Get full text
    Article
  2. 2

    A Novel Carbon Price Fluctuation Trend Prediction Method Based on Complex Network and Classification Algorithm by Hua Xu, Minggang Wang

    Published 2021-01-01
    “…In order to promote the accuracy of the forecasting model, this paper proposes the idea of integrating network topology information into carbon price data; that is, carbon price data are mapped into a complex network through a visibility graph algorithm, and the network topology information is extracted. …”
    Get full text
    Article
  3. 3

    A robust encrypted traffic identification scheme based on graph neural network by LI Mengxiang, PENG Chuang, WANG Hao, HUANG Chaoming, TAN Xiaobin

    Published 2024-06-01
    “…Compared with the latest ProGraph algorithm, the accuracy is improved by 7.3%, and the experimental results verify the effectiveness of the proposed method.…”
    Get full text
    Article
  4. 4

    A novel solar radiation forecasting model based on time series imaging and bidirectional long short‐term memory network by Zhaoshuang He, Xue Zhang, Min Li, Shaoquan Wang, Gongwei Xiao

    Published 2024-11-01
    “…First, inspired by the computer vision algorithm, the recursive graph algorithm is used to transform the one‐dimensional time series into two‐dimensional images, and then convolutional neural network is used to extract the features from the images, thus, the deeper features in the original solar radiation data can be mined. …”
    Get full text
    Article
  5. 5

    Novel Applications of Intuitionistic Fuzzy Digraphs in Decision Support Systems by Muhammad Akram, Ather Ashraf, Mansoor Sarwar

    Published 2014-01-01
    “…Many problems of practical interest can be modeled and solved by using graph algorithms. In general, graph theory has a wide range of applications in diverse fields. …”
    Get full text
    Article
  6. 6

    Novel Concepts in Bipolar Fuzzy Graphs with Applications by Chang Wan, Fei Deng, Shitao Li, S. Omidbakhsh Amiri, A. A. Talebi, H. Rashmanlou

    Published 2022-01-01
    “…Many problems of practical interest can be modeled and solved by using bipolar graph algorithms. Bipolar fuzzy graph (BFG), belonging to fuzzy graphs (FGs) family, has good capabilities when facing with problems that cannot be expressed by FGs. …”
    Get full text
    Article
  7. 7

    Research progress of abnormal user detection technology in social network by Qiang QU, Hongtao YU, Ruiyang HUANG

    Published 2018-03-01
    “…In social networks,the problem of anomalous users detection is one of the key problems in network security research.The anomalous users conduct false comments,cyberbullying or cyberattacks by creating multiple vests,which seriously threaten the information security of normal users and the credit system of social networks ,so a large number of researchers conducted in-depth study of the issue.The research results of the issue in recent years were reviewed and an overall structure was summarized.The data collection layer introduces the data acquisition methods and related data sets,and the feature presentation layer expounds attribute features,content features,network features,activity features and auxiliary features.The algorithm selection layer introduces supervised algorithms,unsupervised algorithms and graph algorithms.The result evaluation layer elaborates the method of data annotation method and index.Finally,the future research direction in this field was looked forward.…”
    Get full text
    Article
  8. 8

    An improved geometric algorithm for indoor localization by Junhua Yang, Yong Li, Wei Cheng

    Published 2018-03-01
    “…Geometric method is one of the most widely used spatial graph algorithms to locate object in an indoor environment, but it does not achieve good results when it is applied to a limited amount of valid data, especially when using the trilateration method. …”
    Get full text
    Article
  9. 9

    Dynamic Automated Search of Shunting Routes within Mesoscopic Rail-Traffic Simulators by Antonin Kavička, Pavel Krýže

    Published 2021-01-01
    “…Many simulation tools require the basic and alternative permissible track routes to be manually specified before starting the simulations, which is a relatively tedious and time-consuming process. Classical graph algorithms cannot be applied to solve the problem of automatic calculation of the routes because they are unable to take into account the length of the object being moved or recognise changes in the direction of its movement. …”
    Get full text
    Article
  10. 10

    Detecting anomalies in graph networks on digital markets. by Agata Skorupka

    Published 2024-01-01
    “…It compares different graph algorithms to extract feature sets for anomaly detection models. …”
    Get full text
    Article