Academic literature on the topic 'Graph-based assessment system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Graph-based assessment system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Graph-based assessment system"

1

Zougari, Soundous, Mariam Tanana, and Abdelouahid Lyhyaoui. "Graph based Hybrid Assessment System for Programming Assignments." International Journal of Computer Applications 178, no. 14 (2019): 56–60. http://dx.doi.org/10.5120/ijca2019918929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petnga, Leonard. "Graph‐based Assessment and Analysis of System Architecture Models." INCOSE International Symposium 29, no. 1 (2019): 922–36. http://dx.doi.org/10.1002/j.2334-5837.2019.00644.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Zizhao, Yiwen Chen, Xinyue Yang, Liping Sun, and Jichuan Kang. "Risk assessment for autonomous navigation system based on knowledge graph." Ocean Engineering 313 (December 2024): 119648. http://dx.doi.org/10.1016/j.oceaneng.2024.119648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Fu Chao, and Jia Dong Huang. "Power System Cascading Failure Risk Assessment Model Based on Graph Theory." Applied Mechanics and Materials 496-500 (January 2014): 2844–47. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2844.

Full text
Abstract:
In recent years, large-scale power blackouts occur frequently in power system, resulting in extremely serious economic losses and social impact [. Scholars from various countries have made various levels of analysis on the causes of widespread blackouts from different angles [2-.The results show that most of the fault are caused by the cascading failure, and the linkage and relevance between failures are typical of such events. Accordingly, to strengthen the analysis of cascading has important significances on preventing the occurrence of large-scale power blackouts.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jun, Chen Zhang, Xinyang Han, et al. "A knowledge graph-based method for intelligent risk assessment of power grid." Journal of Physics: Conference Series 2914, no. 1 (2024): 012016. https://doi.org/10.1088/1742-6596/2914/1/012016.

Full text
Abstract:
Abstract With the advancement of science and technology, the material resources that support people’s lives are becoming increasingly abundant, leading to increasingly complex accidents in the electricity system caused by factors such as Natech. Currently, a superficial security check problem exists in analyzing potential hazards in China. Moreover, the evaluation work becomes superficial, resulting in inaccurate identification results and making it difficult to ensure the long-term safety and stability of the power system. Based on these issues, this paper proposes a power system safety asses
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.

Full text
Abstract:
With the rapid development of the Internet, network attacks often occur, and network security is widely concerned. Searching for practical security risk assessment methods is a research hotspot in the field of network security. Network attack graph model is an active detection technology for the attack path. From the perspective of the attacker, it simulated the whole network attack scenario and then presented the dependency among the vulnerabilities in the target network in the way of directed graph. It is an effective tool for analyzing network vulnerability. This paper describes in detail t
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Jinwei, Yu Yang, Lu Zheng, Ruixia Cheng, and Shengnan Lin. "Network Security Situation Assessment Based on Attack Graph Techniques." Journal of Physics: Conference Series 2310, no. 1 (2022): 012071. http://dx.doi.org/10.1088/1742-6596/2310/1/012071.

Full text
Abstract:
Abstract Network security situation awareness (NSSA) can analyze current network status and predict trends. Intrusion detection systems are used as sources of security factor in situational awareness, and their accuracy affects the assessment of network security. The attack graph can filter out key nodes and enumerate possible attack paths, which has become the main method of risk assessment. Therefore, a network security situation assessment technology based on intrusion detection was proposed. The detection rate of the intrusion detection system was improved firstly, and then the attack grap
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Chenchen, Hongwei Wang, and Lin Wang. "Intelligent Technology Assessment of High-Speed Railway Based on Knowledge Graphs." Advances in Engineering Technology Research 9, no. 1 (2024): 396. http://dx.doi.org/10.56028/aetr.9.1.396.2024.

Full text
Abstract:
This paper introduces an intelligent technology assessment framework for high-speed railways based on a knowledge graph approach. We employ rule-based knowledge extraction algorithms and a Bert-BiLSTM-CRF model for entity extraction from technical texts. Subsequently, we establish relationships among various entities, constructing a knowledge graph specific to high-peed railways. The knowledge graph is stored in a Neo4j graph database in triple format. Furthermore, we establish a comprehensive evaluation metric system, integrating knowledge graph insights to assess the utility of enabling tech
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Lu, Tao Zhang, Yuanyuan Ma, et al. "A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems." Electronics 13, no. 13 (2024): 2628. http://dx.doi.org/10.3390/electronics13132628.

Full text
Abstract:
In today’s highly advanced information technology environment, modern network and communication technologies are widely used in monitoring and controlling power systems. These technologies have evolved significantly. They now form a high-performance digital system known as the cyber–physical power system. However, vulnerabilities in communication networks present growing threats to these systems. This paper seeks to enhance the accurate assessment of the security posture of cyber-physical power systems by inferring attackers’ intentions. A threat modeling approach based on Bayesian attack grap
APA, Harvard, Vancouver, ISO, and other styles
10

Grundspenkis, Janis, and Maija Strautmane. "Usage of Graph Patterns for Knowledge Assessment Based on Concept Maps." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (2009): 60–71. http://dx.doi.org/10.2478/v10143-009-0005-y.

Full text
Abstract:
Usage of Graph Patterns for Knowledge Assessment Based on Concept MapsThe paper discusses application of concepts maps (CMs) for knowledge assessment. CMs are graphs which nodes represent concepts and arcs represent relationships between them. CMs reveal learners' knowledge structure and allow assessing their knowledge level. Step-by-step construction and use of CMs is easy. However, mere comparison of expert constructed and learners' completed CMs forces students to construct their knowledge exactly in the same way as experts. At the same time it is known that individuals construct their know
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Graph-based assessment system"

1

Batmaz, Firat. "Semi-Automatic assessment of students' graph-based diagrams." Thesis, Loughborough University, 2011. https://dspace.lboro.ac.uk/2134/8431.

Full text
Abstract:
Diagrams are increasingly used in many design methods, and are being taught in a variety of contexts in higher education such as database conceptual design or software design in computer science. They are an important part of many assessments. Currently computer aided assessments are widely used for multiple choice questions. They lack the ability to assess a student's knowledge in a more comprehensive way, which is required for diagram-type student work. The aim of this research is to develop a semi-automatic assessment framework, which enables the use of computer to support the assessment pr
APA, Harvard, Vancouver, ISO, and other styles
2

Sammarco, John J. "A normal accident theory-based complexity assessment methodology for safety-related embedded computer systems." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3171.

Full text
Abstract:
Thesis (Ph. D.)--West Virginia University, 2003.<br>Title from document title page. Document formatted into pages; 1 v. (various pagings) : ill. (some col.). Vita. Includes abstract. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
3

Boudermine, Antoine. "A dynamic attack graphs based approach for impact assessment of vulnerabilities in complex computer systems." Electronic Thesis or Diss., Institut polytechnique de Paris, 2022. http://www.theses.fr/2022IPPAT046.

Full text
Abstract:
De nos jours, les réseaux informatiques sont utilisés dans de nombreux domaines et leur défaillance peut avoir un fort impact sur notre vie quotidienne. L'évaluation de leur sécurité est une nécessité pour réduire le risque de compromission par un attaquant. Néanmoins, les solutions proposées jusqu'à présent sont rarement adaptées à la grande complexité des systèmes informatiques modernes. Elles reposent souvent sur un travail humain trop important et les algorithmes utilisés ne sont pas assez performants. De plus, l'évolution du système dans le temps est rarement modélisée et n'est donc pas p
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Graph-based assessment system"

1

Ye, Hongbo, Kexiang Qian, Minghui Jin, Xiao Han, and Fei Xiao. "Risk Assessment Method of Power Monitoring System Vulnerability Based on Attack Graph." In Lecture Notes in Electrical Engineering. Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-8430-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bourezg, Abdrabbi, and Hamid Bentarzi. "Graph Theory Based Reliability Assessment Software Program for Complex Systems." In Springer Series in Reliability Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31375-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Koufos, Ioannis, Maria Christopoulou, George Xilouris, Michael-Alexandros Kourtis, Maria Souvalioti, and Panagiotis Trakadas. "Towards the Automation of Attack Graph-Based Risk Assessment with OSCAL." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-76459-2_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gutiérrez-Batista, Karel, Diego Rincon-Yanez, and Sabrina Senatore. "Human-Oriented Fuzzy-Based Assessments of Knowledge Graph Embeddings for Fake News Detection." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-73997-2_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cui, Ying, Yishi Liu, Yancong Li, and Zixuan Huang. "Risk Assessment of Security Assets for Networked Swarm Systems Based on Time Series Decomposition of Temporal Knowledge Graph." In Lecture Notes in Electrical Engineering. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-3336-1_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Villazon-Terrazas, Boris, Nuria Garcia-Santa, Beatriz San Miguel, et al. "Fujitsu HIKARI, a Healthcare Decision Support System based on Biomedical Knowledge." In Research Anthology on Decision Support Systems and Decision Management in Healthcare, Business, and Engineering. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-9023-2.ch028.

Full text
Abstract:
Fujitsu HIKARI is an artificial intelligence solution to assist clinicians in medical decision making, developed in the context of a joint collaboration project between Fujitsu Laboratories of Europe and Hospital Clínico San Carlos. This decision support system leverages on data analytics combined with healthcare semantic information to provide health estimations for patients, improving care quality and personalized treatment. Fujitsu HIKARI stands on the shoulders of biomedical knowledge, which includes (i) theoretical knowledge extracted from scientific literature, domain expert knowledge, and health standards; and (ii) empirical knowledge extracted from real patient electronic health records. The theoretical knowledge combines a theoretical knowledge graph (TKG) and a biomedical document repository (BDR). The empirical knowledge is encoded in an empirical knowledge graph (EKG). One of the main functionalities of Fujitsu HIKARI is the patient mental health risks assessment, which is based on the exploitation of its underlying Biomedical Knowledge.
APA, Harvard, Vancouver, ISO, and other styles
7

Jabari, Farkhondeh, Heresh Seyedia, Sajad Najafi Ravadanegh, and Behnam Mohammadi Ivatloo. "Stochastic Contingency Analysis Based on Voltage Stability Assessment in Islanded Power System Considering Load Uncertainty Using MCS and k-PEM." In Advances in Computer and Electrical Engineering. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9911-3.ch002.

Full text
Abstract:
Increased electricity demands and economic operation of large power systems in a deregulated environment with a limited investment in transmission expansion planning causes interconnected power grids to be operated closer to their stability limits. Meanwhile, the loads uncertainty will affect the static and dynamic stabilities. Therefore, if there is no emergency corrective control in time, occurrence of wide area contingency may lead to the catastrophic cascading outages. Studies show that many wide area blackouts which led to massive economic losses may have been prevented by a fast feasible controlled islanding decision making. This chapter introduces a novel computationally efficient approach for separating of bulk power system into several stable sections following a severe disturbance. The splitting strategy reduces the large initial search space to an interface boundary network considering coherency of synchronous generators and network graph simplification. Then, a novel islanding scenario generator algorithm denoted as BEM (Backward Elimination Method) based on PMEAs (Primary Maximum Expansion Areas) has been applied to generate all proper islanding solutions in the simplified network graph. The PPF (Probabilistic Power Flow) based on Newton-Raphson method and Q-V modal analysis has been used to evaluate the steady-state stability of created islands in each generated scenario. BICA (Binary Imperialistic Competitive Algorithm) has then been applied to minimize total load-generation mismatch considering integrity, voltage permitted range and steady-state voltage stability constraints. The best solution has then been applied to split the entire power network. A novel stochastic contingency analysis of islands based on PSVI (Probability of Static Voltage Instability) using MCS (Monte Carlo Simulation) and k-PEM (k-Point Estimate Method) have been proposed to identify the critical PQ buses and severe contingencies. In these approaches, the ITM (Inverse Transform Method) has been used to model uncertain loads with normal probability distribution function in optimal islanded power system. The robustness, effectiveness and capability of the proposed approaches have been validated on the New England 39-bus standard power system.
APA, Harvard, Vancouver, ISO, and other styles
8

Toropov, Andrey A., Alla P. Toropova, Emilio Benfenati, et al. "QSPR/QSAR Analyses by Means of the CORAL Software." In Quantitative Structure-Activity Relationships in Drug Design, Predictive Toxicology, and Risk Assessment. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8136-1.ch015.

Full text
Abstract:
In this chapter, the methodology of building up quantitative structure—property/activity relationships (QSPRs/QSARs)—by means of the CORAL software is described. The Monte Carlo method is the basis of this approach. Simplified Molecular Input-Line Entry System (SMILES) is used as the representation of the molecular structure. The conversion of SMILES into the molecular graph is available for QSPR/QSAR analysis using the CORAL software. The model for an endpoint is a mathematical function of the correlation weights for various features of the molecular structure. Hybrid models that are based on features extracted from both SMILES and a graph also can be built up by the CORAL software. The conceptually new ideas collected and revealed through the CORAL software are: (1) any QSPR/QSAR model is a random event; and (2) optimal descriptor can be a translator of eclectic information into an endpoint prediction.
APA, Harvard, Vancouver, ISO, and other styles
9

Sanctorum, Audrey, Jan Maushagen, Sara Sepehri, et al. "Knowledge Management in the Context of Toxicity Testing." In From Theory of Knowledge Management to Practice [Working Title]. IntechOpen, 2023. http://dx.doi.org/10.5772/intechopen.1002341.

Full text
Abstract:
The chapter presents the knowledge management system, developed in the context of an interdisciplinary project called TOXIN, for the toxicity testing domain to facilitate the safety assessment of new cosmetic ingredients. Tools have been developed to capture existing knowledge captured in Safety Evaluation Opinions documents issued by the Scientific Committee on Consumer Safety in a knowledge graph, to enrich this knowledge with knowledge from other sources, and to access this knowledge efficiently. Ontologies and semantic technology are used to build the toxicological knowledge graph and its tools. The developed knowledge management system is based on the processes for creating, maintaining, and exploiting knowledge graphs defined in the Abstract Reference Architecture. The chapter discusses the approach followed for developing the knowledge management system, and the tools developed to support the different processes of the Abstract Reference Architecture. These tools include end-user tools, as well as more advanced tools for information technology experts.
APA, Harvard, Vancouver, ISO, and other styles
10

Bansal, Garima. "Competency-Based Assessments in STEM Classrooms." In Fostering Science Teaching and Learning for the Fourth Industrial Revolution and Beyond. IGI Global, 2023. http://dx.doi.org/10.4018/978-1-6684-6932-3.ch003.

Full text
Abstract:
It has often been observed that what is assessed often becomes what is taught. To enable teachers to teach 21st century skills, it is crucial that school systems upskill their models of designing high-quality competency-based assessments. This chapter reports a competency-based formative assessment used to equip students with the skills required for successful survival in the 21st century. It reports a formative assessment task in which story writing is used to develop graph development skills among STEM students studying in middle grades in an Indian school classroom. The results indicate that competency-based assessments unravel student-held misconceptions which can be used by the teachers to provide appropriate formative feedback.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Graph-based assessment system"

1

Chen, Xin, Chuantao Yin, Hui Chen, Wenge Rong, Yuanxin Ouyang, and Yanmei Chai. "Course Recommendation System Based on Course Knowledge Graph Generated by Large Language Models." In 2024 IEEE International Conference on Teaching, Assessment and Learning for Engineering (TALE). IEEE, 2024. https://doi.org/10.1109/tale62452.2024.10834324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dong, Xin, Wenjuan Du, Qiang Fu, and Haifeng Wang. "Stability Assessment of Renewable Power System Subsynchronous Oscillation Based on Domain Adversarial Graph Convolutional Network." In 2024 3rd Asian Conference on Frontiers of Power and Energy (ACFPE). IEEE, 2024. https://doi.org/10.1109/acfpe63443.2024.10800863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deng, Xin, Rui Wang, Weihong Han, and Zhihong Tian. "Vulnerabilities are collaborating to compromise your system: A network risk assessment method based on cooperative game and attack graph." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shao, Chong, Xin He, Lili Ma, Hongsheng Wang, Chen Zhou, and Haiying Dong. "Transient Assessment of Power Systems Based on Graph Attention Networks." In 2024 IEEE 5th International Conference on Advanced Electrical and Energy Systems (AEES). IEEE, 2024. https://doi.org/10.1109/aees63781.2024.10872477.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Reddy M, Hareesh Kumar, and Vignesh V. "Graph Theoretic Approach Based Cyber Contingency Assessment of Smart Power Grids." In 2024 23rd National Power Systems Conference (NPSC). IEEE, 2024. https://doi.org/10.1109/npsc61626.2024.10987186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Avramenko, Vladimir, Igor Kotenko, Andrey Kozlenko, and Igor Saenko. "A Graph-Based Approach to Quantitative Assessment Information Security in Distributed Computing Systems." In 2025 IEEE Ural-Siberian Conference on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT). IEEE, 2025. https://doi.org/10.1109/usbereit65494.2025.11054113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Villani, Maria Luisa, Sonia Giovinazzi, and Maurizio Pollino. "A Knowledge Graph for GIS-Based Operational Resilience Assessment of Electricity Networks Against Climate Scenarios." In 2024 IEEE International Conference on Environment and Electrical Engineering and 2024 IEEE Industrial and Commercial Power Systems Europe (EEEIC / I&CPS Europe). IEEE, 2024. http://dx.doi.org/10.1109/eeeic/icpseurope61470.2024.10751512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiang, Xinfan, Yonggang Liu, Jinbo Wu, Zhuping Liu, Yuanxi Chen, and Chuangxin Guo. "Graph Convolutional Network Based Power System Risk Assessment." In 2023 IEEE 7th Conference on Energy Internet and Energy System Integration (EI2). IEEE, 2023. http://dx.doi.org/10.1109/ei259745.2023.10512548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yang, Xiaoming, Yifu Huang, Jiahao Wang, and Zhiguang Qin. "RFID system security assessment methodology based on attack graph model." In 2014 International Conference on Reliability, Maintainability and Safety (ICRMS). IEEE, 2014. http://dx.doi.org/10.1109/icrms.2014.7107386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Salamanis, Athanasios, Grigorios Christainas, Dionysios D. Kehagias, and Dimitrios Tzovaras. "A Graph-Based Reputation Assessment System for Online Review Communities." In 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT). IEEE, 2020. http://dx.doi.org/10.1109/wiiat50758.2020.00054.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Graph-based assessment system"

1

Morin, Shai, Gregory Walker, Linda Walling, and Asaph Aharoni. Identifying Arabidopsis thaliana Defense Genes to Phloem-feeding Insects. United States Department of Agriculture, 2013. http://dx.doi.org/10.32747/2013.7699836.bard.

Full text
Abstract:
The whitefly (Bemisia tabaci) is a serious agricultural pest that afflicts a wide variety of ornamental and vegetable crop species. To enable survival on a great diversity of host plants, whiteflies must have the ability to avoid or detoxify numerous different plant defensive chemicals. Such toxins include a group of insect-deterrent molecules called glucosinolates (GSs), which also provide the pungent taste of Brassica vegetables such as radish and cabbage. In our BARD grant, we used the whitefly B. tabaci and Arabidopsis (a Brassica plant model) defense mutants and transgenic lines, to gain
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!