نتایج جستجو برای: graph methods

تعداد نتایج: 2044873  

One solution to process and analysis of massive graphs is summarization. Generating a high quality summary is the main challenge of graph summarization. In the aims of generating a summary with a better quality for a given attributed graph, both structural and attribute similarities must be considered. There are two measures named density and entropy to evaluate the quality of structural and at...

Journal: :آب و خاک 0
حسن احمدی طیبه مصباح زاده

abstract in this research sand drifts potential using sand rose graph software and fryberger velocity classes’ method investigated. thus wind data between 1985 and 2005 from meteorological stations of jask and kerman were analyzed to examine sand drift potential. sand drift potential amount of kerman station was 412.6 using sand rose graph and 401.09 using fryberger,s method. sand drift potenti...

This study presents a comparative analysis of redesigned models of organizational processes by making use of social network concepts. After doing re-engineering of organizational processes which had been conducted in the headquarters of Mazandaran Province Education Department, different methods were used which included the alpha algorithm, alpha⁺, genetics and heuristics. Every one of these me...

Journal: :Annals of Mathematics and Artificial Intelligence 2022

Abstract As the number of graph-level embedding techniques increases at an unprecedented speed, questions arise about their behavior and performance when training data undergo perturbations. This is case external entity maliciously alters to invalidate embedding. paper explores effects such attacks on some graph datasets by applying different techniques. The main attack strategy involves manipu...

Journal: :IEEE Transactions on Information Forensics and Security 2023

Online social networks (OSNs) are threatened by Sybil attacks, which create fake accounts (also called Sybils) on OSNs and use them for various malicious activities. Therefore, detection is a fundamental task OSN security. Most existing methods based the graph structure of OSNs, have been proposed recently. However, although almost all compared experimentally in terms performance noise robustne...

Journal: :Proceedings of the ... AAAI Conference on Artificial Intelligence 2022

Many well-established anomaly detection methods use the distance of a sample to those in its local neighbourhood: so-called `local outlier methods', such as LOF and DBSCAN. They are popular for their simple principles strong performance on unstructured, feature-based data that is commonplace many practical applications. However, they cannot learn adapt particular set due lack trainable paramete...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه پیام نور - دانشگاه پیام نور استان تهران - دانشکده علوم اجتماعی و اقتصادی 1389

abstract nowadays, the science of decision making has been paid to more attention due to the complexity of the problems of suppliers selection. as known, one of the efficient tools in economic and human resources development is the extension of communication networks in developing countries. so, the proper selection of suppliers of tc equipments is of concern very much. in this study, a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید