-
21
Domain-Specific Languages for Algorithmic Graph Processing: A Systematic Literature Review
Published 2025-07-01“…While graph query DSLs are now standardized, research on DSLs for algorithmic graph processing remains fragmented and lacks a cohesive framework. …”
Get full text
Article -
22
ALGORITHM FOR CONSTRUCTING TRIPLE IDENTITY GRAPH OF RING Z_n USING PYTHON
Published 2024-07-01“…Therefore, this study uses Python to construct the algorithm for In this research, some examples will be given and then be observed for new characteristics of the triple identity graph of ring such as the connectedness, the diameter, and the girth. …”
Get full text
Article -
23
Evaluating the Minimum Spanning Trees Using Prim's Algorithm with Undirected Neutrosophic Graphs
Published 2025-06-01“…This research paper presents an innovative approach for determining the minimum spanning tree (MST) in an undirected neutrosophic graph using Prim's Algorithm, which is extensively used in addressing network optimization problems. …”
Get full text
Article -
24
Optimization of social security patrol strategy based on graph theory and GGC algorithm
Published 2025-07-01“…Abstract To cope with complex dynamic patrol environments and maximize the benefits of regional social security patrols, this study abstracts patrol areas as a graph model and constructs a network diagram of the social security patrol area. …”
Get full text
Article -
25
Tourist attraction recommendation method combining graph attention network and clustering algorithm
Published 2025-07-01“…Research has shown that tourist attraction recommendation methods based on graph attention networks can accurately recommend attractions based on user interests. …”
Get full text
Article -
26
Analysis of Aftershocks from California and Synthetic Series by Using Visibility Graph Algorithm
Published 2025-02-01“…The use of the Visibility Graph Algorithm (VGA) has proven to be a valuable tool for analyzing both real and synthetic seismicity series. …”
Get full text
Article -
27
Edge connectivity of a neutrosophic graph
Published 2025-04-01“…The research underscores the importance of incorporating neutrosophic parameters into graph connectivity studies to better model and analyse systems characterized by uncertainty and partial knowledge.…”
Get full text
Article -
28
Research on fault diagnosis of CTCS on-board equipment based on knowledge graph
Published 2025-03-01Get full text
Article -
29
Wavelet transform algorithm of daily load graphs for choosing parameters of hybrid energy storage
Published 2020-12-01Get full text
Article -
30
Research and implementation of Turbo decoding SOVA algorithm
Published 2024-03-01Get full text
Article -
31
Recent Advances in Efficient Dynamic Graph Processing
Published 2025-05-01“…We summarize the computational complexity models for dynamic algorithm analysis, theoretically compare the efficiency of algorithms among different research topics. …”
Get full text
Article -
32
Research on Optimization of Large-Scale Heterogeneous Combat Network Based on Graph Embedding
Published 2025-01-01“…Currently, large-scale research on HCN suffers from significant time costs and poor convergence results. …”
Get full text
Article -
33
ALGORITHM FOR CONSTRUCTING THE TRIPLE UNIT GRAPH OF TYPE II OF RING Z_n USING PYTHON
Published 2024-07-01“…This paper focuses on the algorithm for constructing using Python. This research uses the literature study research method. …”
Get full text
Article -
34
Coverage optimization algorithm and implementation based on computational graph for mobile communication network and IoT service
Published 2019-06-01“…The research on the mobile communication network optimization for the Internet of things large connection and differential service quality has great significance.Mobile communication network optimization is a multi-parameter complex optimization problem with high computational cost function.In order to provide the basis for parallelization of operations,the calculation method of the coverage quality assessment of the mobile communication network based on the computational graph was introduced.Based on the calculation graph,the derivative calculation method of the coverage quality index was obtained,by back propagation to guide the optimization of the antenna parameters.The momentum method was used to accelerate the convergence speed of the optimization algorithm.The simulation results show that the algorithm is suitable for the coverage optimization in mobile communication network.…”
Get full text
Article -
35
Satellite Mission Instruction Sequence Generation Algorithm Using a Flexible Weighted Directed Graph
Published 2021-01-01“…A satellite mission instruction generation algorithm based on a flexible weighted directed graph has been proposed. …”
Get full text
Article -
36
Construction and Completion of the Knowledge Graph for Cow Estrus with the Association Rule Mining
Published 2025-05-01“…To uncover potential relationships within the graph, we applied and compared two association rule algorithms: FP-Growth and Apriori. …”
Get full text
Article -
37
Research on network attack analysis method based on attack graph of absorbing Markov chain
Published 2023-02-01“…Existing intrusion path studies based on attack graph lack consideration of factors other than basic network environment information when calculating the state transition probability.In order to analyze the security of target network comprehensively and reasonably, a network attack analysis method based on attack graph of absorbing Markov chain was proposed.Firstly, a state transition probability normalization algorithm based on vulnerability life cycle was proposed based on attack graph.Secondly, the attack graph was mapped to the absorbing Markov chain and the state transition probability matrix was given.Finally, the state transition probability matrix was calculated to comprehensively analyze the node threat degree, attack path length and expected impact of the target network.The results show that the proposed method can effectively analyze the expected influence of node threat degree, attack path length and vulnerability life cycle on the whole network, which is helpful for security research personnel to better understand the security state of the network.…”
Get full text
Article -
38
Adversarial attack and defense on graph neural networks: a survey
Published 2021-06-01Get full text
Article -
39
On Decision-Making Algorithms in Discrete Optimization Problems
Published 2023-10-01“…The most important task and area of application of research is to find the optimal set of edges to be completed in the graph of a communication network, which ensures a given stability in all communication directions. …”
Get full text
Article -
40
Research on the Construction of Event Evolutionary Graph for Urban Rail Transit Train Operation and Maintenance Safety
Published 2025-04-01“…With the continuous improvement of methodology and the deepening of empirical research, it is believed that this paradigm for extracting the theoretical graph of urban rail transit field will further promote the improvement of urban rail transit safety management level.…”
Get full text
Article