To see the other types of publications on this topic, follow the link: Graph-based assessment system.

Journal articles on the topic 'Graph-based assessment system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Graph-based assessment system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zougari, Soundous, Mariam Tanana, and Abdelouahid Lyhyaoui. "Graph based Hybrid Assessment System for Programming Assignments." International Journal of Computer Applications 178, no. 14 (2019): 56–60. http://dx.doi.org/10.5120/ijca2019918929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Petnga, Leonard. "Graph‐based Assessment and Analysis of System Architecture Models." INCOSE International Symposium 29, no. 1 (2019): 922–36. http://dx.doi.org/10.1002/j.2334-5837.2019.00644.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zhang, Zizhao, Yiwen Chen, Xinyue Yang, Liping Sun, and Jichuan Kang. "Risk assessment for autonomous navigation system based on knowledge graph." Ocean Engineering 313 (December 2024): 119648. http://dx.doi.org/10.1016/j.oceaneng.2024.119648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Fu Chao, and Jia Dong Huang. "Power System Cascading Failure Risk Assessment Model Based on Graph Theory." Applied Mechanics and Materials 496-500 (January 2014): 2844–47. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2844.

Full text
Abstract:
In recent years, large-scale power blackouts occur frequently in power system, resulting in extremely serious economic losses and social impact [. Scholars from various countries have made various levels of analysis on the causes of widespread blackouts from different angles [2-.The results show that most of the fault are caused by the cascading failure, and the linkage and relevance between failures are typical of such events. Accordingly, to strengthen the analysis of cascading has important significances on preventing the occurrence of large-scale power blackouts.
APA, Harvard, Vancouver, ISO, and other styles
5

Zhang, Jun, Chen Zhang, Xinyang Han, et al. "A knowledge graph-based method for intelligent risk assessment of power grid." Journal of Physics: Conference Series 2914, no. 1 (2024): 012016. https://doi.org/10.1088/1742-6596/2914/1/012016.

Full text
Abstract:
Abstract With the advancement of science and technology, the material resources that support people’s lives are becoming increasingly abundant, leading to increasingly complex accidents in the electricity system caused by factors such as Natech. Currently, a superficial security check problem exists in analyzing potential hazards in China. Moreover, the evaluation work becomes superficial, resulting in inaccurate identification results and making it difficult to ensure the long-term safety and stability of the power system. Based on these issues, this paper proposes a power system safety asses
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.

Full text
Abstract:
With the rapid development of the Internet, network attacks often occur, and network security is widely concerned. Searching for practical security risk assessment methods is a research hotspot in the field of network security. Network attack graph model is an active detection technology for the attack path. From the perspective of the attacker, it simulated the whole network attack scenario and then presented the dependency among the vulnerabilities in the target network in the way of directed graph. It is an effective tool for analyzing network vulnerability. This paper describes in detail t
APA, Harvard, Vancouver, ISO, and other styles
7

Yang, Jinwei, Yu Yang, Lu Zheng, Ruixia Cheng, and Shengnan Lin. "Network Security Situation Assessment Based on Attack Graph Techniques." Journal of Physics: Conference Series 2310, no. 1 (2022): 012071. http://dx.doi.org/10.1088/1742-6596/2310/1/012071.

Full text
Abstract:
Abstract Network security situation awareness (NSSA) can analyze current network status and predict trends. Intrusion detection systems are used as sources of security factor in situational awareness, and their accuracy affects the assessment of network security. The attack graph can filter out key nodes and enumerate possible attack paths, which has become the main method of risk assessment. Therefore, a network security situation assessment technology based on intrusion detection was proposed. The detection rate of the intrusion detection system was improved firstly, and then the attack grap
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Chenchen, Hongwei Wang, and Lin Wang. "Intelligent Technology Assessment of High-Speed Railway Based on Knowledge Graphs." Advances in Engineering Technology Research 9, no. 1 (2024): 396. http://dx.doi.org/10.56028/aetr.9.1.396.2024.

Full text
Abstract:
This paper introduces an intelligent technology assessment framework for high-speed railways based on a knowledge graph approach. We employ rule-based knowledge extraction algorithms and a Bert-BiLSTM-CRF model for entity extraction from technical texts. Subsequently, we establish relationships among various entities, constructing a knowledge graph specific to high-peed railways. The knowledge graph is stored in a Neo4j graph database in triple format. Furthermore, we establish a comprehensive evaluation metric system, integrating knowledge graph insights to assess the utility of enabling tech
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Lu, Tao Zhang, Yuanyuan Ma, et al. "A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems." Electronics 13, no. 13 (2024): 2628. http://dx.doi.org/10.3390/electronics13132628.

Full text
Abstract:
In today’s highly advanced information technology environment, modern network and communication technologies are widely used in monitoring and controlling power systems. These technologies have evolved significantly. They now form a high-performance digital system known as the cyber–physical power system. However, vulnerabilities in communication networks present growing threats to these systems. This paper seeks to enhance the accurate assessment of the security posture of cyber-physical power systems by inferring attackers’ intentions. A threat modeling approach based on Bayesian attack grap
APA, Harvard, Vancouver, ISO, and other styles
10

Grundspenkis, Janis, and Maija Strautmane. "Usage of Graph Patterns for Knowledge Assessment Based on Concept Maps." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (2009): 60–71. http://dx.doi.org/10.2478/v10143-009-0005-y.

Full text
Abstract:
Usage of Graph Patterns for Knowledge Assessment Based on Concept MapsThe paper discusses application of concepts maps (CMs) for knowledge assessment. CMs are graphs which nodes represent concepts and arcs represent relationships between them. CMs reveal learners' knowledge structure and allow assessing their knowledge level. Step-by-step construction and use of CMs is easy. However, mere comparison of expert constructed and learners' completed CMs forces students to construct their knowledge exactly in the same way as experts. At the same time it is known that individuals construct their know
APA, Harvard, Vancouver, ISO, and other styles
11

Wang, Qingwen, Tenglong Yu, Hongliang Chu, et al. "Research on Graph Multi-Attention Neural Network for Power System Transient Stability Assessment." Journal of Physics: Conference Series 2868, no. 1 (2024): 012012. http://dx.doi.org/10.1088/1742-6596/2868/1/012012.

Full text
Abstract:
Abstract Diagnosing the stability of power grids based on artificial intelligence technology is a research trend. The existing artificial intelligence stability analysis methods rely on a large number of fault case data, while the graph neural network method ignores the correlation characteristics of nodes themselves and the correlation of long-distance nodes. In order to solve the problems, the graph multi-attention neural network (GMANN) was proposed. The self-attention, which characterizes the correlation between different state quantities of a single node, is proposed, firstly. Then, long-
APA, Harvard, Vancouver, ISO, and other styles
12

Sun, Fuxiong, Juntao Pi, Jin Lv, and Tian Cao. "Network Security Risk Assessment System Based on Attack Graph and Markov Chain." Journal of Physics: Conference Series 910 (October 2017): 012005. http://dx.doi.org/10.1088/1742-6596/910/1/012005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Soundous, Zougari, Tanana Mariam, and Lyhyaoui Abdelouahid. "Validity of a graph-based automatic assessment system for programming assignments: human versus automatic grading." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2867–75. https://doi.org/10.11591/ijece.v12i3.pp2867-2875.

Full text
Abstract:
Programming is a very complex and challenging subject to teach and learn. A strategy guaranteed to deliver proven results has been intensive and continual training. However, this strategy holds an extra workload for the teachers with huge numbers of programming assignments to evaluate in a fair and timely manner. Furthermore, under the current coronavirus (COVID-19) distance teaching circumstances, regular assessment is a fundamental feedback mechanism. It ensures that students engage in learning as well as determines the extent to which they reached the expected learning goals, in this new le
APA, Harvard, Vancouver, ISO, and other styles
14

Oksiiuk, Oleksandr, Larysa Myrutenko, and Yanina Shestak. "PRACTICAL INTRODUCTION OF INFORMATION SYSTEMS BASED ON ASSESSMENT OF EXTERNAL INFLUENCES." Information systems and technologies security, no. 1 (1) (2019): 27–35. http://dx.doi.org/10.17721/ists.2019.1.27-35.

Full text
Abstract:
The article highlighted the advantage of information systems in front of centralized systems in terms of ensuring the security of network infrastructure, data transmitted, and procedures used in the software environment of the complex. It was pointed out the technical simplicity of the methods of expansion of information systems and, accordingly, their scalability. A multilevel energy balance scheme and computing resources of the information system infrastructure, based on the optimization of the task graph, have been developed. The methods of estimating the optimization of the graph of tasks,
APA, Harvard, Vancouver, ISO, and other styles
15

Zhou, Yongzhang, Qianlong Zhang, Wenjie Shen, et al. "Construction and applications of knowledge graph of porphyry copper deposits." Earth sciences and subsoil use 44, no. 3 (2021): 204–18. http://dx.doi.org/10.21285/2686-9993-2021-44-3-204-218.

Full text
Abstract:
A knowledge graph is becoming popular due to its ability to describe the real world by using a graph language that can be understood by both humans and machines using computer technologies. A case study to construct the knowledge graph of porphyry copper deposits is presented in this paper. First of all, the raw text data is collected and integrated from selected porphyry copper deposits and porphyry-skarn copper deposits in the Qinzhou Bay – Hangzhou Bay metallogenic belt, South China. Second, the text's entities, relations, and attributes are labeled and extracted with reference to the conce
APA, Harvard, Vancouver, ISO, and other styles
16

Strautmane, Maija. "Usage of graph patterns for concept map extension." Applied Computer Systems 13, no. 1 (2012): 37–43. http://dx.doi.org/10.2478/v10312-012-0005-3.

Full text
Abstract:
Abstract In concept map-based assessment an expert’s concept map can be expanded using graph patterns to add hidden and inverse relations. This helps to avoid forcing a learner to use certain structures and names. Graph patterns are subgraphs that describe combinations of concept map elements, from which extra relations can be inferred. In this paper an enriched set of graph patterns is described along with their respective IF...THEN rules which can be used for automated knowledge assessment. Some of them are already implemented in the intelligent and adaptive knowledge assessment system IKAS.
APA, Harvard, Vancouver, ISO, and other styles
17

Zhao, Zhiyao, Xuanhao Li, Xiaoyu Cui, and Xin Zhang. "Fault Coupling Analysis and Reliability Assessment of Actuation System Based on Bond Graph Model." Applied Sciences 13, no. 13 (2023): 7462. http://dx.doi.org/10.3390/app13137462.

Full text
Abstract:
In this paper, a new degradation model of the more electrical aircraft (MEA) actuation system is proposed. The bond graph model is used to build the dissimilar redundancy actuation system model, taking into account the degradation behavior (wear, fatigue, aging) of components in the system operation and the fault coupling phenomenon caused by the accumulation of dissipated energy in space and time, and a fault coupling degradation model of the actuation system is established with clear mechanism support. Through the fault mechanism analysis, various fault types are injected into the bond graph
APA, Harvard, Vancouver, ISO, and other styles
18

Yang, Li, Kai Zou, and Yuxuan Zou. "Graph-based two-level indicator system construction method for smart city information security risk assessment." Electronic Research Archive 32, no. 8 (2024): 5139–56. http://dx.doi.org/10.3934/era.2024237.

Full text
Abstract:
<p>The rapid development of urban informatization has led to a deep integration of advanced information technology into urban life. Many decision-makers are starting to alleviate the adverse effects of this informatization process through risk assessment. However, existing methods cannot effectively analyze internal and hierarchical relationships because of the excessive number of indicators. Thus, it is necessary to construct an indicator's dependency graph and conduct a comprehensive hierarchical analysis to solve this problem. In this study, we proposed a graph-based two-level indicat
APA, Harvard, Vancouver, ISO, and other styles
19

Yasir, Nof, Ying Huang, and Di Wu. "Influence Graph-Based Method for Sustainable Energy Systems." Sustainability 17, no. 12 (2025): 5666. https://doi.org/10.3390/su17125666.

Full text
Abstract:
To reduce carbon emissions from fossil fuel generators in sustainable energy systems, an option is increasing the integration of gas-fired generators into the power system. The increasing reliance on natural gas for electricity generation has strengthened the interdependence between the electric power network and the natural gas infrastructure within the Integrated Power and Gas System (IPGS). This strengthened interdependence increases the risk that disruptions originating in one system may propagate to the other, potentially leading to extensive cascading failures throughout the IPGS. Ensuri
APA, Harvard, Vancouver, ISO, and other styles
20

Su, Yinsheng, Mengxuan Guo, Haicheng Yao, et al. "Power System Small-signal Stability Assessment Model Based on Residual Graph Convolutional Networks." Journal of Physics: Conference Series 2095, no. 1 (2021): 012011. http://dx.doi.org/10.1088/1742-6596/2095/1/012011.

Full text
Abstract:
Abstract Small-signal stability (SSA) is important to power system security. A data-driven approach is established for rapid prediction of the power system oscillation characteristics. The key of the approach is the Graph Convolution Networks (GCN) with residual mechanism, which works to aggregate features from high-dimension steady-state operation information and is denoted as ResGCN (RESidual GCN) in the paper. The residual mechanism helps to overcome the network degradation phenomenon. Both the oscillation frequency and damping ratio of multiple modes can be predicted by the proposed model.
APA, Harvard, Vancouver, ISO, and other styles
21

Keister, Drew M., Daniel Larson, Julie Dostal, and Jay Baglia. "The Radar Graph: the Development of an Educational Tool to Demonstrate Resident Competency." Journal of Graduate Medical Education 4, no. 2 (2012): 220–26. http://dx.doi.org/10.4300/jgme-d-11-00163.1.

Full text
Abstract:
Abstract Background Despite the movement toward competency-based assessment by accrediting bodies in recent years, there is no consensus on how to best assess medical competence. Direct observation is a useful tool. At the same time, a comprehensive assessment system based on direct observation has been difficult to develop. Intervention We developed a system that translates data obtained from checklists of observed behaviors completed during educational activities, including direct observation of clinical care, into a graphic tool (the “radar graph”) usable for both formative and summative as
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Zhang, Ren Yafeng, Yu Meiyun, Liu Jun, and Luo Yanyan. "Research on Assembly Technology of Active Magnetic Bearing system Based on Graph Theory." MATEC Web of Conferences 213 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201821301001.

Full text
Abstract:
Active magnetic bearing system is a typical geometric constraint system which is combined with each part by certain assembly constraint relations. Graph theory is used to build the assembly model in the progress of assembly design. Trough the graph to express this system, it is not only clear and intuitive, and the algorithm is stable and high efficiency. Modeling active magnetic bearing assembly system is achieved by hierarchical model of data structure, which leads to accelerate the assessment of system configuration program and save a lot of time for designers.
APA, Harvard, Vancouver, ISO, and other styles
23

Zougari, Soundous, Mariam Tanana, and Abdelouahid Lyhyaoui. "Validity of a graph-based automatic assessment system for programming assignments: human versus automatic grading." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2867. http://dx.doi.org/10.11591/ijece.v12i3.pp2867-2875.

Full text
Abstract:
<span>Programming is a very complex and challenging subject to teach and learn. A strategy guaranteed to deliver proven results has been intensive and continual training. However, this strategy holds an extra workload for the teachers with huge numbers of programming assignments to evaluate in a fair and timely manner. Furthermore, under the current COVID-19 distance teaching circumstances, regular assessment is a fundamental feedback mechanism. It ensures that students engage in learning as well as determines the extent to which they reached the expected learning goals, in this new lear
APA, Harvard, Vancouver, ISO, and other styles
24

Gangjun, GONG, ZHANG Peng, ZHOU Bo, et al. "Network Security Risk Assessment of CPS System in Distribution Network Based on Attack Graph." Journal of Physics: Conference Series 1750 (January 2021): 012078. http://dx.doi.org/10.1088/1742-6596/1750/1/012078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Li, Yun Zhi. "Vulnerability Assessment of Information System Based on Weighted Directional Graph and Complex Network Technology." Applied Mechanics and Materials 644-650 (September 2014): 2920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2920.

Full text
Abstract:
Assessment model of the vulnerability for information system is improved by using Bayesian equilibrium algorithm. The mathematical evaluation model of combined complex network information systems is established through the combination of weighted directional algorithm, and the algorithmic routine of network vulnerability assessment is designed. In order to verify the validity and reliability of the model and the algorithm, the test platform of complex network is built, and the vulnerability of network is detected with the weighted directional method, which has got the probability distribution
APA, Harvard, Vancouver, ISO, and other styles
26

Huang, Jiyu, Lin Guan, Yinsheng Su, Haicheng Yao, Mengxuan Guo, and Zhi Zhong. "Recurrent Graph Convolutional Network-Based Multi-Task Transient Stability Assessment Framework in Power System." IEEE Access 8 (2020): 93283–96. http://dx.doi.org/10.1109/access.2020.2991263.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Zhang, Dan, Yuan Yang, Bingjie Shen, Tao Wang, and Min Cheng. "Transient Stability Assessment in Power Systems: A Spatiotemporal Graph Convolutional Network Approach with Graph Simplification." Energies 17, no. 20 (2024): 5095. http://dx.doi.org/10.3390/en17205095.

Full text
Abstract:
Accurate and fast transient stability assessment (TSA) of power systems is crucial for safe operation. However, deep learning-based methods require long training and fail to simultaneously extract the spatiotemporal characteristics of the transient process in power systems, limiting their performance in prediction. This paper proposes a novel TSA method based on a spatiotemporal graph convolutional network with graph simplification. First, based on the topology and node information entropy of power grids, as well as the power flow of each node, the input characteristic matrix is compressed to
APA, Harvard, Vancouver, ISO, and other styles
28

Cui, Yimin, Junmei Li, Wei Zhao, and Cheng Luan. "Research on Network Security Quantitative Model Based on Probabilistic Attack Graph." ITM Web of Conferences 24 (2019): 02003. http://dx.doi.org/10.1051/itmconf/20192402003.

Full text
Abstract:
In order to identify the threat of computer network security and evaluate its fragility comprehensively, the related factors of network security are studied, and the methods based on attack graph are improved. Based on the attribute attack graph, the probabilistic attack graph model is generated by adding various factors which affect network security. The model uses security equipment performance data, common vulnerability scoring system data and etc. to calculate priori probability, finally obtains the network security index, and carries on the exploratory analysis. The experimental results s
APA, Harvard, Vancouver, ISO, and other styles
29

Kotsyuba, I. Yu, and E. O. Volodikova. "IT ARCHITECTURE SOLUTIONS FOR INDUSTRY BASED COOPERATIONS INTEGRATION SUPPORT." Applied Mathematics and Control Sciences, no. 3 (December 15, 2022): 91–107. http://dx.doi.org/10.15593/2499-9873/2022.03.05.

Full text
Abstract:
The current research provides solution for the process of legal cooperation between enterprises of participants according to the technological and delivery principle information support. As a solution, it is proposed to design a single information space based on existing information systems using microservice architecture technologies. This article discusses the main problems of supporting the integration process of intra-industry cooperation, provides a model for the integral assessment of the industry cooperation effectiveness based on the method of Saaty hierarchies and expert assessments,
APA, Harvard, Vancouver, ISO, and other styles
30

Banasiak, Robert, Mateusz Bujnowicz, and Anna Fabijańska. "Study on Quality Assessment Methods for Enhanced Resolution Graph-Based Reconstructed Images in 3D Capacitance Tomography." Applied Sciences 14, no. 22 (2024): 10222. http://dx.doi.org/10.3390/app142210222.

Full text
Abstract:
This paper proposes a novel approach to assessing the quality of 3D Electrical Capacitance Tomography (ECT) images. Such images are typically represented as irregular graphs. Thus, image quality metrics typically used with raster images do not straightforwardly apply to them. However, given the recent advancements in Graph Convolutional Neural Networks (GCNs) for improving ECT image reconstruction, reliable Quality Assessment methods are essential for comparing the performance of different GCN models. To address this need, this paper applied some existing image quality and similarity assessmen
APA, Harvard, Vancouver, ISO, and other styles
31

Hariguna, Taqwa, Eka Purnama Harahap, and Salsabila Salsabila. "Implementation of Business Intelligence Using Highlights in the YII Framework based Attendance Assessment System." Aptisi Transactions On Technopreneurship (ATT) 1, no. 2 (2019): 109–16. http://dx.doi.org/10.34306/att.v1i2.32.

Full text
Abstract:
Attendance information conducted by students can now be easily accessed by a supervisor. However, there are 3 (three) difficulties faced by supervisors, one of which is presenting information with tables requiring considerable time and very high accuracy to measure the comparison of information contained within it. In order to facilitate the supervisor in recording and measuring attendance of student tutoring students handled, the Attendance Rating system will present information in the form of graphics using Highchart. Presentation of information in the form of a graph on Attendance Assessmen
APA, Harvard, Vancouver, ISO, and other styles
32

Hariguna, Taqwa, Eka Purnama Harahap, and Salsabila Salsabila. "Implementation of Business Intelligence Using Highlights in the YII Framework based Attendance Assessment System." Aptisi Transactions On Technopreneurship (ATT) 1, no. 2 (2019): 109–16. http://dx.doi.org/10.34306/att.v1i2.67.

Full text
Abstract:
Attendance information conducted by students can now be easily accessed by a supervisor. However, there are 3 (three) difficulties faced by supervisors, one of which is presenting information with tables requiring considerable time and very high accuracy to measure the comparison of information contained within it. In order to facilitate the supervisor in recording and measuring attendance of student tutoring students handled, the Attendance Rating system will present information in the form of graphics using Highchart. Presentation of information in the form of a graph on Attendance Assessmen
APA, Harvard, Vancouver, ISO, and other styles
33

Wang, Kangkang, Wei Wei, Tannan Xiao, Shaowei Huang, Bo Zhou, and Han Diao. "Power system preventive control aided by a graph neural network-based transient security assessment surrogate." Energy Reports 8 (November 2022): 943–51. http://dx.doi.org/10.1016/j.egyr.2022.10.271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

HUANG, JHEN-LI, CHIEN-MING CHEN, TUN-WEN PAI, MIN-HUI LIU, and CHAO-HUNG WANG. "DIRECTED ACYCLIC GRAPH-BASED PATIENT EDUCATION SYSTEM FOR CARDIOVASCULAR PATIENTS IN TAIWAN." Journal of Mechanics in Medicine and Biology 16, no. 01 (2016): 1640011. http://dx.doi.org/10.1142/s021951941640011x.

Full text
Abstract:
Background: Cardiovascular disease is the leading global cause of death and the number of patients is expected to grow yearly. Pertinent patient education materials provide adequate medical information to cardiovascular patients to change their behaviors, improve their health status, and reduce medical costs. However, systematic and patient-oriented education materials for cardiovascular disease are currently not available to the public, especially in Chinese. Methods: A directed acyclic graph (DAG) database structure is proposed for storing all created low-demand medical illustrations and vid
APA, Harvard, Vancouver, ISO, and other styles
35

Arosio, Marcello, Mario L. V. Martina, and Rui Figueiredo. "The whole is greater than the sum of its parts: a holistic graph-based assessment approach for natural hazard risk of complex systems." Natural Hazards and Earth System Sciences 20, no. 2 (2020): 521–47. http://dx.doi.org/10.5194/nhess-20-521-2020.

Full text
Abstract:
Abstract. Assessing the risk of complex systems to natural hazards is an important but challenging problem. In today's intricate socio-technological world, characterized by strong urbanization and technological trends, the connections and interdependencies between exposed elements are crucial. These complex relationships call for a paradigm shift in collective risk assessments, from a reductionist approach to a holistic one. Most commonly, the risk of a system is estimated through a reductionist approach, based on the sum of the risk evaluated individually at each of its elements. In contrast,
APA, Harvard, Vancouver, ISO, and other styles
36

Villazon-Terrazas, Boris, Nuria Garcia-Santa, Beatriz San Miguel, et al. "Fujitsu HIKARI, a Healthcare Decision Support System based on Biomedical Knowledge." International Journal of Privacy and Health Information Management 6, no. 2 (2018): 26–49. http://dx.doi.org/10.4018/ijphim.2018070103.

Full text
Abstract:
Fujitsu HIKARI is an artificial intelligence solution to assist clinicians in medical decision making, developed in the context of a joint collaboration project between Fujitsu Laboratories of Europe and Hospital Clínico San Carlos. This decision support system leverages on data analytics combined with healthcare semantic information to provide health estimations for patients, improving care quality and personalized treatment. Fujitsu HIKARI stands on the shoulders of biomedical knowledge, which includes (i) theoretical knowledge extracted from scientific literature, domain expert knowledge, a
APA, Harvard, Vancouver, ISO, and other styles
37

Sandeep Kadiyala. "Graph-Based Learning: A Paradigm Shift in Financial Analytics." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3223–32. https://doi.org/10.32628/cseit25112901.

Full text
Abstract:
Graph-based learning represents a paradigm shift in financial analytics by leveraging the inherently interconnected nature of financial ecosystems to extract deeper insights and enable more effective decision-making. This article models financial data as networks of entities connected by meaningful relationships, preserving crucial structural information that traditional tabular and time-series methods often fail to capture. Graph-based learning has demonstrated transformative potential across the financial industry landscape, from detecting sophisticated fraud schemes to optimizing investment
APA, Harvard, Vancouver, ISO, and other styles
38

Han, Xingjian, and Yu Tian. "Storage and Query of Drug Knowledge Graphs Using Distributed Graph Databases: A Case Study." Bioengineering 12, no. 2 (2025): 115. https://doi.org/10.3390/bioengineering12020115.

Full text
Abstract:
Background: Distributed graph databases are a promising method for storing and conducting complex pathway queries on large-scale drug knowledge graphs to support drug research. However, there is a research gap in evaluating drug knowledge graphs’ storage and query performance based on distributed graph databases. This study evaluates the feasibility and performance of distributed graph databases in managing large-scale drug knowledge graphs. Methods: First, a drug knowledge graph storage and query system is designed based on the Nebula Graph database. Second, the system’s writing and query per
APA, Harvard, Vancouver, ISO, and other styles
39

Ma, Xinyue, Yandong Hu, and Min Li. "Design of assessment algorithm and model for Chinese spoken language teaching based on natural language processing and knowledge graph." Theoretical and Natural Science 36, no. 1 (2024): 20–26. http://dx.doi.org/10.54254/2753-8818/36/20240506.

Full text
Abstract:
The background of the research field on the design of assessment algorithms and models for Chinese spoken language teaching based on natural language processing and knowledge graph mainly involves two aspects: one is the growing global demand for learning Chinese, and the other is the potential application of advanced computing technology in language learning. The significance of this research lies in providing a more scientific and systematic assessment method for Chinese teaching through this system, and, on a macro level, paving the way for the future development of language learning techno
APA, Harvard, Vancouver, ISO, and other styles
40

Elwert, Michael, Manuel Ramsaier, Boris Eisenbart, Ralf Stetter, Markus Till, and Stephan Rudolph. "Digital Function Modeling in Graph-Based Design Languages." Applied Sciences 12, no. 11 (2022): 5301. http://dx.doi.org/10.3390/app12115301.

Full text
Abstract:
The main focus of this paper is the integration of an integrated function modeling (IFM) framework in an engineering framework based on graph-based design languages (GBDLs). Over the last decade, GBDLs have received increasing attention as they offer a promising approach for addressing several important challenges in engineering, such as the frequent and time-consuming transfer of data between different computer aided engineering (CAE) tools. This absorbs significant amounts of manual labor in engineering design projects. GBDLs create digital system models at a meta level, encompassing all rel
APA, Harvard, Vancouver, ISO, and other styles
41

Аверьянов, В. С., and И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH." Южно-Сибирский научный вестник, no. 1(41) (February 28, 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.

Full text
Abstract:
Динамичное развитие IT– отрасли, повышение автоматизации и технологичности бизнес - процессов, рост числа организаций внедряющих облачную инфраструктуру, а также повсеместная цифровизация, создает благоприятную среду для масштабирования хакерских атак в сфере кибербезопасности. При этом векторами целевых атак являются: социальная инженерия, неквалифицированные пользователи цифровых сервисов, эксплуатация уязвимостей основных систем и сопутствующей инфраструктуры. Вопросы своевременного реагирования, локализации и выявления киберинцидентов являются насущными, требующими временных и финансовых з
APA, Harvard, Vancouver, ISO, and other styles
42

Su, Yinsheng, Jiyu Huang, Haicheng Yao, Lin Guan, Mengxuan Guo, and Zhi Zhong. "Multi-task Transient Contingency Screening with Temporal Graph Convolutional Network in Power Systems." Journal of Physics: Conference Series 2095, no. 1 (2021): 012027. http://dx.doi.org/10.1088/1742-6596/2095/1/012027.

Full text
Abstract:
Abstract Rapid transient stability assessment (TSA) is an essential requirement for power system security. In real-world applications, transient contingency screening (TCS) applies TSA approaches to address the pre-defined contingency sets under online operation conditions. TSA by time domain simulation (TDS) is time-consuming, hence we propose a high-speed temporal graph convolutional network (TGCN) that achieves TSA decisions such that a large-scale contingency set can be scanned quickly with enough precision. Based on multi-graph inputs to reflect the transient process, the TGCN utilizes th
APA, Harvard, Vancouver, ISO, and other styles
43

Zhou, Ying, Zhiyong Zhang, Kejing Zhao, and Zhongya Zhang. "A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph." Computers and Electrical Engineering 119 (October 2024): 109482. http://dx.doi.org/10.1016/j.compeleceng.2024.109482.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Yang, Jeongeun, Jongeun Baek, Shakila Shojaei, Hyojin Bae, and Juhong Park. "Risk Detection through Firearm Recognition Using Deep Learning-Based Object-Human Heterogeneous Graph Extraction." Journal of the Korea Institute of Military Science and Technology 27, no. 6 (2024): 684–92. https://doi.org/10.9766/kimst.2024.27.6.684.

Full text
Abstract:
Effective border security is crucial in managing and mitigating firearm-related threats. While prior research has focused on firearm detection, it lacks contextual analysis. This paper advances firearm-related incident assessment by integrating pose estimation to improve gun violence detection. Our novel approach extracts body and firearm pose graphs and employs Graph Attention Networks(GAT) for graph analysis to accurately identify gun violence incidents. By recognizing associated actions, our system provides greater situational awareness beyond mere firearm detection. Utilizing Graph-LSTM, w
APA, Harvard, Vancouver, ISO, and other styles
45

Huang, Jiyu, Lin Guan, Yinsheng Su, et al. "Generator-Level Transient Stability Assessment in Power System Based on Graph Deep Learning with Sparse Hybrid Pooling." Electronics 14, no. 6 (2025): 1180. https://doi.org/10.3390/electronics14061180.

Full text
Abstract:
Aimed at increasingly challenging operation conditions in modern power systems, online pre-fault transient stability assessment (TSA) acts as a significant tool to detect latent stability risks and provide abundant generator-level information for preventive controls. Distinguished from “system-level” to describe terms concerning the whole system, here “generator-level” describes those concerning a generator. Due to poor topology-related expressive power, existing deep learning-based TSA methods can hardly predict generator-level stability indexes, unless they adopt the generator dynamics durin
APA, Harvard, Vancouver, ISO, and other styles
46

Strübing, A., and A. Winter. "Model-based Assessment of Data Availability in Health Information Systems." Methods of Information in Medicine 47, no. 05 (2008): 417–24. http://dx.doi.org/10.3414/me9123.

Full text
Abstract:
Summary Objectives: To introduce a formal definition of data availability as a contribution to trustworthiness of health information systems and to automatically detect respective weaknesses and propose solutions. Method: Specifying an ontology, based on enterprise functions and application systems of (health) information systems and closely linked to the Three-Layer Graph-Based Meta Model (3LGM2). Deriving appropriate measures and algorithms. Results: A formal definition for data availability is introduced and elucidated by an example. This concept is used e.g. to disclose missing communicati
APA, Harvard, Vancouver, ISO, and other styles
47

Li, Haonan, and Yitong Zhou. "An Intelligent Hand-Assisted Diagnosis System Based on Information Fusion." Sensors 24, no. 14 (2024): 4745. http://dx.doi.org/10.3390/s24144745.

Full text
Abstract:
This research proposes an innovative, intelligent hand-assisted diagnostic system aiming to achieve a comprehensive assessment of hand function through information fusion technology. Based on the single-vision algorithm we designed, the system can perceive and analyze the morphology and motion posture of the patient’s hands in real time. This visual perception can provide an objective data foundation and capture the continuous changes in the patient’s hand movement, thereby providing more detailed information for the assessment and providing a scientific basis for subsequent treatment plans. B
APA, Harvard, Vancouver, ISO, and other styles
48

Sufi, Fahim. "A GPT-Based Approach for Cyber Threat Assessment." AI 6, no. 5 (2025): 99. https://doi.org/10.3390/ai6050099.

Full text
Abstract:
Background: The increasing prevalence of cyber threats in industrial cyber–physical systems (ICPSs) necessitates advanced solutions for threat detection and analysis. This research proposes a novel GPT-based framework for assessing cyber threats, leveraging artificial intelligence to process and analyze large-scale cyber event data. Methods: The framework integrates multiple components, including data ingestion, preprocessing, feature extraction, and analysis modules such as knowledge graph construction, clustering, and anomaly detection. It utilizes a hybrid methodology combining spectral res
APA, Harvard, Vancouver, ISO, and other styles
49

Chen, Chao, Yanyun Lu, Bo Wu, and Linhai Lu. "Digital Twin-Based and Knowledge Graph-Enhanced Emergency Response in Urban Infrastructure Construction." Applied Sciences 15, no. 11 (2025): 6009. https://doi.org/10.3390/app15116009.

Full text
Abstract:
Urban infrastructure construction poses significant risks to surrounding the infrastructure due to ground settlement, structural disturbances, and underground utility disruptions. Traditional risk assessment methods often rely on static models and experience-based decision-making, limiting their ability to adapt to dynamic construction conditions. This study proposes an integrated framework combining digital twin and knowledge graph technologies to enhance real-time risk assessment and emergency response in tunnel construction. The digital twin continuously integrates real-time monitoring data
APA, Harvard, Vancouver, ISO, and other styles
50

Anohina, Alla, Marks Vilkelis, and Romans Lukasenko. "Incremental Improvement of the Evaluation Algorithm in the Concept Map Based Knowledge Assessment System." International Journal of Computers Communications & Control 4, no. 1 (2009): 6. http://dx.doi.org/10.15837/ijccc.2009.1.2409.

Full text
Abstract:
The paper is devoted to the knowledge assessment system that has been developed at the Department of Systems Theory and Design of Riga Technical University for the last four years. The system is based on concept maps that allow displaying the knowledge structure of a particular learner in the form of a graph. Teacher’s created concept maps serve as a standard against which learner’s concept maps are compared. However, it is not correct to compare teacher’s and learners’ concept maps by examining the exact equivalence of relationships in both maps, because people construct knowledge in differen
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!