نتایج جستجو برای: graph based
تعداد نتایج: 3070292 فیلتر نتایج به سال:
Text coherence evaluation becomes a vital and lovely task in Natural Language Processing subfields, such as text summarization, question answering, text generation and machine translation. Existing methods like entity-based and graph-based models are engaging with nouns and noun phrases change role in sequential sentences within short part of a text. They even have limitations in global coheren...
The first and second Zagreb indices of a graph are equal, respectively, to the sum of squares of the vertex degrees, and the sum of the products of the degrees of pairs of adjacent vertices. We now consider analogous graph invariants, based on the second degrees of vertices (number of their second neighbors), called leap Zagreb indices. A number of their basic properties is established.
let $d_{n,m}=big[frac{2n+1-sqrt{17+8(m-n)}}{2}big]$ and $e_{n,m}$ be the graph obtained from a path $p_{d_{n,m}+1}=v_0v_1 cdots v_{d_{n,m}}$ by joining each vertex of $k_{n-d_{n,m}-1}$ to $v_{d_{n,m}}$ and $v_{d_{n,m}-1}$, and by joining $m-n+1-{n-d_{n,m}choose 2}$ vertices of $k_{n-d_{n,m}-1}$ to $v_{d_{n,m}-2}$. zhang, liu and zhou [on the maximal eccentric connectivity ind...
the order graph of a group $g$, denoted by $gamma^*(g)$, is a graph whose vertices are subgroups of $g$ and two distinct vertices $h$ and $k$ are adjacent if and only if $|h|big{|}|k|$ or $|k|big{|}|h|$. in this paper, we study the connectivity and diameter of this graph. also we give a relation between the order graph and prime graph of a group.
let f, g and h be non-empty graphs. the notation f → (g,h) means that if any edge of f is colored by red or blue, then either the red subgraph of f con- tains a graph g or the blue subgraph of f contains a graph h. a graph f (without isolated vertices) is called a ramsey (g,h)−minimal if f → (g,h) and for every e ∈ e(f), (f − e) 9 (g,h). the set of all ramsey (g,h)−minimal graphs is denoted by ...
in this paper, we first collect the earlier results about some graph operations and then wepresent applications of these results in working with chemical graphs.
Privacy threat modeling should be done frequently throughout development and production to able quickly mitigate threats. Yet, it can also a very time-consuming activity. In this paper, we use an enhanced code property graph partly automate the privacy process: It automatically generates data flow diagram from source which exhibits properties of flows, analyzed semi-automatically via queries. W...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید