Results 121 to 130 of about 101,745 (269)

Partial Matching of Large Scale Process Plant Models Using Random Walk on Graphs

open access: yesIEEE Access, 2020
3D process plant models(PPMs) in the process industry normally consists of thousands of components. And, there are many similar local structures in the PPM.
Weiwei Mao   +4 more
doaj   +1 more source

Generic root counts and flatness in tropical geometry

open access: yesJournal of the London Mathematical Society, Volume 111, Issue 5, May 2025.
Abstract We use tropical and nonarchimedean geometry to study the generic number of solutions of families of polynomial equations over a parameter space Y$Y$. In particular, we are interested in the choices of parameters for which the generic root count is attained.
Paul Alexander Helminck, Yue Ren
wiley   +1 more source

The Temperley–Lieb tower and the Weyl algebra

open access: yesJournal of the London Mathematical Society, Volume 111, Issue 5, May 2025.
Abstract We define a monoidal category W${\mathbf {W}}$ and a closely related 2‐category 2Weyl${\mathbf {2Weyl}}$ using diagrammatic methods. We show that 2Weyl${\mathbf {2Weyl}}$ acts on the category TL:=⨁nTLn−mod$\mathbf {TL}:=\bigoplus _n \operatorname{TL}_n\mathrm{-mod}$ of modules over Temperley–Lieb algebras, with its generating 1‐morphisms ...
Matthew Harper, Peter Samuelson
wiley   +1 more source

A Multi‐Task Self‐Supervised Strategy for Predicting Molecular Properties and FGFR1 Inhibitors

open access: yesAdvanced Science, Volume 12, Issue 13, April 3, 2025.
The overview of MTSSMol during pretraining. Initially, data augmentation techniques are applied to the raw input data to create various enhanced versions. These images are then fed into GNNs to extract latent features. Finally, the augmented data is utilized for two learning tasks. b.
Xin Yang   +6 more
wiley   +1 more source

A Selectivity based approach to Continuous Pattern Detection in Streaming Graphs [PDF]

open access: yes, 2015
Cyber security is one of the most significant technical challenges in current times. Detecting adversarial activities, prevention of theft of intellectual properties and customer data is a high priority for corporations and government agencies around the
Agarwal, Khushbu   +4 more
core  

FSM-BC-BSP: Frequent Subgraph Mining Algorithm Based on BC-BSP

open access: yesApplied Sciences
As graph models become increasingly prevalent in the processing of scientific data, the exploration of effective methods for the mining of meaningful patterns from large-scale graphs has garnered significant research attention. This paper delves into the
Fangling Leng   +4 more
doaj   +1 more source

Explainable Neural Subgraph Matching With Learnable Multi-Hop Attention

open access: yesIEEE Access
Subgraph matching is a challenging problem with a wide range of applications in drug discovery, social network analysis, biochemistry, and cognitive science.
Duc Q. Nguyen   +5 more
doaj   +1 more source

A Relational view of subgraph isomorphism

open access: yes, 1999
This paper presents a novel approach to the problem of finding all subgraph isomorphisms of a (pattern) graph into another (target) graph. A relational formulation of the problem, combined with a representation of relations and graphs by Boolean functions, allows to handle the combinatorial explosion in the case of small pattern graphs and ...
Cortadella, Jordi   +1 more
openaire   +1 more source

Fuzzy graphs and their applications in finding the best route, dominant node and influence index in a network under the hesitant bipolar-valued fuzzy environment

open access: yesComplex & Intelligent Systems
This paper introduces the concept of hesitant bipolar-valued fuzzy graph (HBVFG), which captures the two opposing perspectives, namely the positive and negative opinions.
Jambi Ratna Raja   +7 more
doaj   +1 more source

Systematic benchmark of substructure search in molecular graphs - From Ullmann to VF2

open access: yesJournal of Cheminformatics, 2012
Background Searching for substructures in molecules belongs to the most elementary tasks in cheminformatics and is nowadays part of virtually every cheminformatics software.
Ehrlich Hans-Christian, Rarey Matthias
doaj   +1 more source

Home - About - Disclaimer - Privacy