Results 91 to 100 of about 1,011,259 (278)

Generation of Gray Codes Through the Rough Identity–Summand Graph of Filters of A Rough bi–Heyting Algebra

open access: yesInternational Journal of Applied Mathematics and Computer Science
This paper introduces the concept of filters in a rough bi-Heyting algebra. The rough bi-Heyting algebra defined through the rough semiring offers interesting properties.
Praba Bashyam   +1 more
doaj   +1 more source

Self-paced Consensus Clustering with Bipartite Graph

open access: yesInternational Joint Conference on Artificial Intelligence, 2020
Consensus clustering provides a framework to ensemble multiple clustering results to obtain a consensus and robust result. Most existing consensus clustering methods usually apply all data to ensemble learning, whereas ignoring the side effects caused by
Peng Zhou, Liang Du, Xuejun Li
semanticscholar   +1 more source

A amostragem estratificada aprimora a compreensão das redes entre morcegos e frutos na Mata Atlântica meridional

open access: yesOikos, EarlyView.
Few studies have sought to understand the vertical patterns of bat–fruit systems, and therefore, it is not possible to evaluate whether interpretations based on data collected from a single stratum adequately represent the interaction patterns of this system. In this context, we evaluated the dissimilarity in the assemblage of frugivorous bats, plants,
Karolaine Porto Supi   +3 more
wiley   +1 more source

Some Properties of Regular Line Graphs

open access: yesمجلة علوم ذي قار, 2019
In this paper, the concept of regular line graph has been introduced. The maximum number of vertices with different degrees in the regular line graphs has also been studied.
Akram Attar
doaj   +4 more sources

Sidorenko's conjecture for blow-ups

open access: yesDiscrete Analysis, 2021
Sidorenko's conjecture for blow-ups, Discrete Analysis 2021:2, 13 pp. Let $G$ be a bipartite graph with finite vertex sets $X$ and $Y$. If $G$ has density $\alpha$, then the average degree of the vertices in $X$ is $\alpha|Y|$, so the mean-square degree
David Conlon, Joonkyung Lee
doaj   +1 more source

Groups having complete bipartite divisor graphs for their conjugacy class sizes [PDF]

open access: yes, 2013
Given a finite group G, the bipartite divisor graph for its conjugacy class sizes is the bipartite graph with bipartition consisting of the set of conjugacy class sizes of G-Z (where Z denotes the centre of G) and the set of prime numbers that divide ...
Hafezieh, Roghayeh, Spiga, Pablo
core  

Detecting social‐ecological fit in Natura 2000 governance and management: Evidence from LIFE projects focused on forest protected habitat types

open access: yesPeople and Nature, EarlyView.
Abstract Protected areas represent complex social‐ecological systems that require governance and management approaches that valorise and enhance positive relationships between people and nature. This study analyses the alignment between social and ecological systems to detect the social‐ecological fit of projects focused on biodiversity conservation ...
Elena Andriollo   +4 more
wiley   +1 more source

Using random walks to generate associations between objects.

open access: yesPLoS ONE, 2014
Measuring similarities between objects based on their attributes has been an important problem in many disciplines. Object-attribute associations can be depicted as links on a bipartite graph.
Muhammed A Yildirim, Michele Coscia
doaj   +1 more source

Adaptive Bipartite Consensus of Second-Order Multi-Agent Systems With Bounded Disturbances

open access: yesIEEE Access, 2020
This paper investigates distributed adaptive bipartite consensus for second-order multi-agent systems (MASs) with bounded disturbances under a signed graph. Based on adaptive variable structure control strategies, an adaptive bipartite consensus protocol
Haichuan Xu   +3 more
doaj   +1 more source

EnsemFDet: An Ensemble Approach to Fraud Detection based on Bipartite Graph [PDF]

open access: yesIEEE International Conference on Data Engineering, 2019
Fraud detection is extremely critical for e-commerce business platforms. Utilizing graph structure data and identifying unexpected dense subgraphs as suspicious is a category of commonly used fraud detection methods.
Yuxiang Ren   +4 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy