Showing 161 - 180 results of 603 for search 'help graph', query time: 0.09s Refine Results
  1. 161

    Unknown attack detection model based on network behavior analysis by Yi-han YU, Yu FU, Xiao-ping WU

    Published 2016-06-01
    “…As for the intranet security threats of the increasing number of unknown attacks,an unknown attack detection model based on network behavior analysis was proposed.With the help of the information resources within the intranet,firstly,the information resources of the intranet were collected,then the risk factors of abnormal behav-ior of the internet information node were analyzed,finally,the information node and the information resources ac-quisition path as the key element were used to construct the detection model of the directed graph.By verifying,the model can achieve the desired detection results.…”
    Get full text
    Article
  2. 162

    Static-analysis-based event input generation approach for Android application by Yi-lin YE, Zhen-ji ZHOU, Zheng HONG, Hui-ying YAN, Li-fa WU

    Published 2017-06-01
    “…A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were extracted.Furthermore,an event input algorithm was designed to automatically generate event inputs according to Android application runtime.The experimental results show that the proposed method can achieve higher coverage of permission methods and basic components,which can cover more security-related execution paths and help to collect more security-related runtime behaviors during the process of dynamic analysis.…”
    Get full text
    Article
  3. 163

    Wireless secure enhancement with cooperative jamming by Li-juan ZHANG, Zhi-hong LIU, Hong-bo ZHANG, Yong ZENG, Jian-feng MA

    Published 2017-02-01
    “…Secrecy capacity of intrinsically secure communication graph (iS-Graph) can be increased by reducing the signal quality of eavesdroppers with adding controlled interferences.The transmission of secret messages over wireless channels in which the legitimate nodes were aided by cooperative jamming was studied,and a secure communication graph with jamming,jS-Graph was proposed.First,the security properties of jS-Graph was characterized.Then,jamming strategies to confuse eavesdroppers were proposed.To tackle the nearby eavesdropper problem,a two-stage cooperative jamming strategy to jam the eavesdroppers near the source or the destination was applied.The results demonstrate that,with the aid of cooperative jamming the secure communication graph can lead to secrecy gains.These results help to clarify how the presence of eavesdroppers and the cooperative jamming can influence secure connectivity in wireless networks.…”
    Get full text
    Article
  4. 164

    A Machine Learning Approach for the Prediction of Thermostable β-Glucosidases by Diego Mariano

    Published 2025-04-01
    “…In this study, I used graph-based structural signatures to represent three-dimensional structures of β-glucosidase enzymes extracted from thermophilic organisms. …”
    Get full text
    Article
  5. 165

    A GNN-Based False Data Detection Scheme for Smart Grids by Junhong Qiu, Xinxin Zhang, Tao Wang, Huiying Hou, Siyuan Wang, Tiejun Yang

    Published 2025-03-01
    “…Based on spatial temporal graph neural networks (STGNNs), anomaly detection technology has been presented to detect anomaly data in smart grids with good performance. …”
    Get full text
    Article
  6. 166

    A Knowledge-Driven Approach to Automate Job Hazard Analysis Process by Sonali Pandithawatta, Raufdeen Rameezdeen, Seungjun Ahn, Christopher W. K. Chow, Nima Gorjian

    Published 2024-12-01
    “…The data were imported to the JHAKG from an incident database using rule-based natural language processing (NLP) which helped to extract implicit information not evident in the traditional JHA document. …”
    Get full text
    Article
  7. 167

    Recursive GNNs for Learning Precoding Policies With Size-Generalizability by Jia Guo, Chenyang Yang

    Published 2024-01-01
    “…Graph neural networks (GNNs) have been shown promising in optimizing power allocation and link scheduling with good size generalizability and low training complexity. …”
    Get full text
    Article
  8. 168

    Study of the Efficacy of Neural Mobilizations to Improve Sensory and Functional Responses of Lower Extremities in Older Adults with Diabetic Peripheral Neuropathy Using Plithogenic... by Lisbeth J. Reales-Chacón, María E. Lucena de Ustáriz, Francisco J. Ustáriz-Fajardo, Andrea C. Peñafiel Luna, Gabriela J. Bonilla-Ayala, Pablo Djabayan-Djibeyan, José L. Erazo-Parra, Mónica A.Valdiviezo-Maygua

    Published 2024-12-01
    “…It is due to such complexity that we selected the Plithogenic n- SuperHyperGraph as a tool to represent the collected data, which were processed with the help of the multi-way log-linear model for contingency tables. …”
    Get full text
    Article
  9. 169

    Survival Prediction of Esophageal Cancer Using 3D CT Imaging: A Context-Aware Approach With Non-Local Feature Aggregation and Graph-Based Spatial Interaction by Fuce Guo, Chen Huang, Shengmei Lin, Yongmei Dai, Qianshun Chen, Shu Zhang, Xunyu XU

    Published 2025-01-01
    “…In the current study, we aimed to develop an effective EC survival risk prediction using only 3D computed tomography (CT) images.The proposed model consists of two essential components: 1) non-local feature aggregation module(NFAM) that integrates visual features from tumor and lymph nodes at both local and global scales, 2) graph-based spatial interaction module(GSIM) that explores the latent contextual interactions between tumors and lymph nodes.The experimental results demonstrate that our model achieves superior performance compared to state-of-the-art survival prediction methods, emphasizing its robust predictive capability. …”
    Get full text
    Article
  10. 170

    Spatial Proximity Relations-Driven Semantic Representation for Geospatial Entity Categories by Yongbin Tan, Hong Wang, Rongfeng Cai, Lingling Gao, Zhonghai Yu, Xin Li

    Published 2025-06-01
    “…Unsupervised representation learning can train deep learning models to formally express the semantic connotations of objects in the case of unlabeled data, which can effectively realize the expression of the semantics of geospatial entity categories in application scenarios lacking expert knowledge and help achieve the deep fusion of geospatial data. …”
    Get full text
    Article
  11. 171

    Sentimentally enhanced conversation recommender system by Fengjin Liu, Qiong Cao, Xianying Huang, Huaiyu Liu

    Published 2025-01-01
    “…First, we construct a comprehensive and highly optimized knowledge graph, termed MAKG, which provides a rich and complete set of entities to help the model capture user preferences more holistically. …”
    Get full text
    Article
  12. 172

    Robust multi-view locality preserving regression embedding by Ling Jing, Yi Li, Hongjie Zhang

    Published 2024-12-01
    “…Feature extraction research has witnessed significant advancements in recent decades, particularly with single-view graph embedding (GE) methods that demonstrate clear advantages by incorporating structural information. …”
    Get full text
    Article
  13. 173

    Investigating Similarities Across Decentralized Finance (DeFi) Services by Junliang Luo, Stefan Kitzler, Pietro Saggese

    Published 2025-03-01
    “… We explore the adoption of graph representation learning (GRL) algorithms to investigate similarities across services offered by Decentralized Finance (DeFi) protocols. …”
    Get full text
    Article
  14. 174

    NEOntometrics - A Public Endpoint for Calculating Ontology Metrics by Reiz, Achim, Sandkuhl, Kurt

    Published 2024-12-01
    “…Ontologies are the cornerstone of the semantic web and knowledge graphs. They are available from various sources, come in many shapes and sizes, and differ widely in attributes like expressivity, degree of interconnection, or the number of individuals. …”
    Get full text
    Article
  15. 175

    Fast Decision Making of Point Cloud Video Geometry CU Partition Based on Occupied Pixels by Fengqin Wang, Juanjuan Jia, Qiuwen Zhang

    Published 2025-01-01
    “…The video-based point cloud compression Standard (V-PCC) uses file-based projection technology to map point cloud data in three-dimensional space to two-dimensional space, creating geometric graphs and attribute graphs, then, with the help of the currently very mature two-dimensional video image coding technologies, such as high-efficiency video coding (HEVC), Versatile Video Coding (VVC), etc., these generated images are encoded and processed. …”
    Get full text
    Article
  16. 176

    3D molecular structural modeling and characterization of indium phosphide via irregularity topological indices by Muhammad Salman, Asad Ullah, Shahid Zaman, Emad E. Mahmoud, Melaku Berhe Belay

    Published 2024-05-01
    “…The topological characterization of 3D molecular structures can be performed via graph theory. In graph theory, the connections between atoms are represented as edges and the atoms themselves are represented as nodes. …”
    Get full text
    Article
  17. 177

    Unlocking insights: integrated text mining and interpretive structural modeling for enhanced user review analysis by Na Li, Yu-Tao Liu, Zhan Chen

    Published 2024-12-01
    “…The fusion of text mining and systematic analysis helps users to locate products quickly and precisely from the huge review information. …”
    Get full text
    Article
  18. 178

    TAD-Net: An approach for real-time action detection based on temporal convolution network and graph convolution network in digital twin shop-floor [version 1; peer review: 2 approv... by Liang Fu, Yunfeng Xie, Tingyu Liu, Yifeng Sun, Qing Hong

    Published 2021-12-01
    “…Background: Intelligent monitoring of human action in production is an important step to help standardize production processes and construct a digital twin shop-floor rapidly. …”
    Get full text
    Article
  19. 179

    A community partitioning algorithm based on network enhancement by Junjie Hu, Zhanquan Wang, Jiequan Chen, Yonghui Dai

    Published 2021-01-01
    “…However, the existing community discovery algorithms are not effective in dealing with complex network which always contains fuzzy community structure. With the help of graph convolution, the proposed algorithm defines the connectivity between any nodes in a network and constructs the symmetric doubly stochastic matrix. …”
    Get full text
    Article
  20. 180

    Network Visualization of Cooperative Games by Carlos I. Pérez-Sechi, Javier Castro, Daniel Gómez, Daniel Martín, Rosa Espínola, Inmaculada Gutiérrez

    Published 2025-03-01
    “…By representing interactions through a graph, this study deepens the understanding of player relationships and synergies. …”
    Get full text
    Article