Journal articles on the topic 'Graph-based assessment system'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Graph-based assessment system.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Zougari, Soundous, Mariam Tanana, and Abdelouahid Lyhyaoui. "Graph based Hybrid Assessment System for Programming Assignments." International Journal of Computer Applications 178, no. 14 (2019): 56–60. http://dx.doi.org/10.5120/ijca2019918929.
Full textPetnga, Leonard. "Graph‐based Assessment and Analysis of System Architecture Models." INCOSE International Symposium 29, no. 1 (2019): 922–36. http://dx.doi.org/10.1002/j.2334-5837.2019.00644.x.
Full textZhang, Zizhao, Yiwen Chen, Xinyue Yang, Liping Sun, and Jichuan Kang. "Risk assessment for autonomous navigation system based on knowledge graph." Ocean Engineering 313 (December 2024): 119648. http://dx.doi.org/10.1016/j.oceaneng.2024.119648.
Full textZhang, Fu Chao, and Jia Dong Huang. "Power System Cascading Failure Risk Assessment Model Based on Graph Theory." Applied Mechanics and Materials 496-500 (January 2014): 2844–47. http://dx.doi.org/10.4028/www.scientific.net/amm.496-500.2844.
Full textZhang, Jun, Chen Zhang, Xinyang Han, et al. "A knowledge graph-based method for intelligent risk assessment of power grid." Journal of Physics: Conference Series 2914, no. 1 (2024): 012016. https://doi.org/10.1088/1742-6596/2914/1/012016.
Full textLi, Yunpeng, and Xi Li. "Research on Multi-Target Network Security Assessment with Attack Graph Expert System Model." Scientific Programming 2021 (May 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/9921731.
Full textYang, Jinwei, Yu Yang, Lu Zheng, Ruixia Cheng, and Shengnan Lin. "Network Security Situation Assessment Based on Attack Graph Techniques." Journal of Physics: Conference Series 2310, no. 1 (2022): 012071. http://dx.doi.org/10.1088/1742-6596/2310/1/012071.
Full textLiu, Chenchen, Hongwei Wang, and Lin Wang. "Intelligent Technology Assessment of High-Speed Railway Based on Knowledge Graphs." Advances in Engineering Technology Research 9, no. 1 (2024): 396. http://dx.doi.org/10.56028/aetr.9.1.396.2024.
Full textChen, Lu, Tao Zhang, Yuanyuan Ma, et al. "A Bayesian-Attack-Graph-Based Security Assessment Method for Power Systems." Electronics 13, no. 13 (2024): 2628. http://dx.doi.org/10.3390/electronics13132628.
Full textGrundspenkis, Janis, and Maija Strautmane. "Usage of Graph Patterns for Knowledge Assessment Based on Concept Maps." Scientific Journal of Riga Technical University. Computer Sciences 38, no. 38 (2009): 60–71. http://dx.doi.org/10.2478/v10143-009-0005-y.
Full textWang, Qingwen, Tenglong Yu, Hongliang Chu, et al. "Research on Graph Multi-Attention Neural Network for Power System Transient Stability Assessment." Journal of Physics: Conference Series 2868, no. 1 (2024): 012012. http://dx.doi.org/10.1088/1742-6596/2868/1/012012.
Full textSun, Fuxiong, Juntao Pi, Jin Lv, and Tian Cao. "Network Security Risk Assessment System Based on Attack Graph and Markov Chain." Journal of Physics: Conference Series 910 (October 2017): 012005. http://dx.doi.org/10.1088/1742-6596/910/1/012005.
Full textSoundous, Zougari, Tanana Mariam, and Lyhyaoui Abdelouahid. "Validity of a graph-based automatic assessment system for programming assignments: human versus automatic grading." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2867–75. https://doi.org/10.11591/ijece.v12i3.pp2867-2875.
Full textOksiiuk, Oleksandr, Larysa Myrutenko, and Yanina Shestak. "PRACTICAL INTRODUCTION OF INFORMATION SYSTEMS BASED ON ASSESSMENT OF EXTERNAL INFLUENCES." Information systems and technologies security, no. 1 (1) (2019): 27–35. http://dx.doi.org/10.17721/ists.2019.1.27-35.
Full textZhou, Yongzhang, Qianlong Zhang, Wenjie Shen, et al. "Construction and applications of knowledge graph of porphyry copper deposits." Earth sciences and subsoil use 44, no. 3 (2021): 204–18. http://dx.doi.org/10.21285/2686-9993-2021-44-3-204-218.
Full textStrautmane, Maija. "Usage of graph patterns for concept map extension." Applied Computer Systems 13, no. 1 (2012): 37–43. http://dx.doi.org/10.2478/v10312-012-0005-3.
Full textZhao, Zhiyao, Xuanhao Li, Xiaoyu Cui, and Xin Zhang. "Fault Coupling Analysis and Reliability Assessment of Actuation System Based on Bond Graph Model." Applied Sciences 13, no. 13 (2023): 7462. http://dx.doi.org/10.3390/app13137462.
Full textYang, Li, Kai Zou, and Yuxuan Zou. "Graph-based two-level indicator system construction method for smart city information security risk assessment." Electronic Research Archive 32, no. 8 (2024): 5139–56. http://dx.doi.org/10.3934/era.2024237.
Full textYasir, Nof, Ying Huang, and Di Wu. "Influence Graph-Based Method for Sustainable Energy Systems." Sustainability 17, no. 12 (2025): 5666. https://doi.org/10.3390/su17125666.
Full textSu, Yinsheng, Mengxuan Guo, Haicheng Yao, et al. "Power System Small-signal Stability Assessment Model Based on Residual Graph Convolutional Networks." Journal of Physics: Conference Series 2095, no. 1 (2021): 012011. http://dx.doi.org/10.1088/1742-6596/2095/1/012011.
Full textKeister, Drew M., Daniel Larson, Julie Dostal, and Jay Baglia. "The Radar Graph: the Development of an Educational Tool to Demonstrate Resident Competency." Journal of Graduate Medical Education 4, no. 2 (2012): 220–26. http://dx.doi.org/10.4300/jgme-d-11-00163.1.
Full textLi, Zhang, Ren Yafeng, Yu Meiyun, Liu Jun, and Luo Yanyan. "Research on Assembly Technology of Active Magnetic Bearing system Based on Graph Theory." MATEC Web of Conferences 213 (2018): 01001. http://dx.doi.org/10.1051/matecconf/201821301001.
Full textZougari, Soundous, Mariam Tanana, and Abdelouahid Lyhyaoui. "Validity of a graph-based automatic assessment system for programming assignments: human versus automatic grading." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 2867. http://dx.doi.org/10.11591/ijece.v12i3.pp2867-2875.
Full textGangjun, GONG, ZHANG Peng, ZHOU Bo, et al. "Network Security Risk Assessment of CPS System in Distribution Network Based on Attack Graph." Journal of Physics: Conference Series 1750 (January 2021): 012078. http://dx.doi.org/10.1088/1742-6596/1750/1/012078.
Full textLi, Yun Zhi. "Vulnerability Assessment of Information System Based on Weighted Directional Graph and Complex Network Technology." Applied Mechanics and Materials 644-650 (September 2014): 2920–24. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2920.
Full textHuang, Jiyu, Lin Guan, Yinsheng Su, Haicheng Yao, Mengxuan Guo, and Zhi Zhong. "Recurrent Graph Convolutional Network-Based Multi-Task Transient Stability Assessment Framework in Power System." IEEE Access 8 (2020): 93283–96. http://dx.doi.org/10.1109/access.2020.2991263.
Full textZhang, Dan, Yuan Yang, Bingjie Shen, Tao Wang, and Min Cheng. "Transient Stability Assessment in Power Systems: A Spatiotemporal Graph Convolutional Network Approach with Graph Simplification." Energies 17, no. 20 (2024): 5095. http://dx.doi.org/10.3390/en17205095.
Full textCui, Yimin, Junmei Li, Wei Zhao, and Cheng Luan. "Research on Network Security Quantitative Model Based on Probabilistic Attack Graph." ITM Web of Conferences 24 (2019): 02003. http://dx.doi.org/10.1051/itmconf/20192402003.
Full textKotsyuba, I. Yu, and E. O. Volodikova. "IT ARCHITECTURE SOLUTIONS FOR INDUSTRY BASED COOPERATIONS INTEGRATION SUPPORT." Applied Mathematics and Control Sciences, no. 3 (December 15, 2022): 91–107. http://dx.doi.org/10.15593/2499-9873/2022.03.05.
Full textBanasiak, Robert, Mateusz Bujnowicz, and Anna Fabijańska. "Study on Quality Assessment Methods for Enhanced Resolution Graph-Based Reconstructed Images in 3D Capacitance Tomography." Applied Sciences 14, no. 22 (2024): 10222. http://dx.doi.org/10.3390/app142210222.
Full textHariguna, Taqwa, Eka Purnama Harahap, and Salsabila Salsabila. "Implementation of Business Intelligence Using Highlights in the YII Framework based Attendance Assessment System." Aptisi Transactions On Technopreneurship (ATT) 1, no. 2 (2019): 109–16. http://dx.doi.org/10.34306/att.v1i2.32.
Full textHariguna, Taqwa, Eka Purnama Harahap, and Salsabila Salsabila. "Implementation of Business Intelligence Using Highlights in the YII Framework based Attendance Assessment System." Aptisi Transactions On Technopreneurship (ATT) 1, no. 2 (2019): 109–16. http://dx.doi.org/10.34306/att.v1i2.67.
Full textWang, Kangkang, Wei Wei, Tannan Xiao, Shaowei Huang, Bo Zhou, and Han Diao. "Power system preventive control aided by a graph neural network-based transient security assessment surrogate." Energy Reports 8 (November 2022): 943–51. http://dx.doi.org/10.1016/j.egyr.2022.10.271.
Full textHUANG, JHEN-LI, CHIEN-MING CHEN, TUN-WEN PAI, MIN-HUI LIU, and CHAO-HUNG WANG. "DIRECTED ACYCLIC GRAPH-BASED PATIENT EDUCATION SYSTEM FOR CARDIOVASCULAR PATIENTS IN TAIWAN." Journal of Mechanics in Medicine and Biology 16, no. 01 (2016): 1640011. http://dx.doi.org/10.1142/s021951941640011x.
Full textArosio, Marcello, Mario L. V. Martina, and Rui Figueiredo. "The whole is greater than the sum of its parts: a holistic graph-based assessment approach for natural hazard risk of complex systems." Natural Hazards and Earth System Sciences 20, no. 2 (2020): 521–47. http://dx.doi.org/10.5194/nhess-20-521-2020.
Full textVillazon-Terrazas, Boris, Nuria Garcia-Santa, Beatriz San Miguel, et al. "Fujitsu HIKARI, a Healthcare Decision Support System based on Biomedical Knowledge." International Journal of Privacy and Health Information Management 6, no. 2 (2018): 26–49. http://dx.doi.org/10.4018/ijphim.2018070103.
Full textSandeep Kadiyala. "Graph-Based Learning: A Paradigm Shift in Financial Analytics." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 3223–32. https://doi.org/10.32628/cseit25112901.
Full textHan, Xingjian, and Yu Tian. "Storage and Query of Drug Knowledge Graphs Using Distributed Graph Databases: A Case Study." Bioengineering 12, no. 2 (2025): 115. https://doi.org/10.3390/bioengineering12020115.
Full textMa, Xinyue, Yandong Hu, and Min Li. "Design of assessment algorithm and model for Chinese spoken language teaching based on natural language processing and knowledge graph." Theoretical and Natural Science 36, no. 1 (2024): 20–26. http://dx.doi.org/10.54254/2753-8818/36/20240506.
Full textElwert, Michael, Manuel Ramsaier, Boris Eisenbart, Ralf Stetter, Markus Till, and Stephan Rudolph. "Digital Function Modeling in Graph-Based Design Languages." Applied Sciences 12, no. 11 (2022): 5301. http://dx.doi.org/10.3390/app12115301.
Full textАверьянов, В. С., and И. Н. Карцан. "ASSESSMENT OF THE SECURITY OF CYBER-PHYSICAL SYSTEMS BASED ON A GENERAL GRAPH." Южно-Сибирский научный вестник, no. 1(41) (February 28, 2022): 30–35. http://dx.doi.org/10.25699/sssb.2022.41.1.013.
Full textSu, Yinsheng, Jiyu Huang, Haicheng Yao, Lin Guan, Mengxuan Guo, and Zhi Zhong. "Multi-task Transient Contingency Screening with Temporal Graph Convolutional Network in Power Systems." Journal of Physics: Conference Series 2095, no. 1 (2021): 012027. http://dx.doi.org/10.1088/1742-6596/2095/1/012027.
Full textZhou, Ying, Zhiyong Zhang, Kejing Zhao, and Zhongya Zhang. "A novel dynamic vulnerability assessment method for Industrial Control System based on vulnerability correlation attack graph." Computers and Electrical Engineering 119 (October 2024): 109482. http://dx.doi.org/10.1016/j.compeleceng.2024.109482.
Full textYang, Jeongeun, Jongeun Baek, Shakila Shojaei, Hyojin Bae, and Juhong Park. "Risk Detection through Firearm Recognition Using Deep Learning-Based Object-Human Heterogeneous Graph Extraction." Journal of the Korea Institute of Military Science and Technology 27, no. 6 (2024): 684–92. https://doi.org/10.9766/kimst.2024.27.6.684.
Full textHuang, Jiyu, Lin Guan, Yinsheng Su, et al. "Generator-Level Transient Stability Assessment in Power System Based on Graph Deep Learning with Sparse Hybrid Pooling." Electronics 14, no. 6 (2025): 1180. https://doi.org/10.3390/electronics14061180.
Full textStrübing, A., and A. Winter. "Model-based Assessment of Data Availability in Health Information Systems." Methods of Information in Medicine 47, no. 05 (2008): 417–24. http://dx.doi.org/10.3414/me9123.
Full textLi, Haonan, and Yitong Zhou. "An Intelligent Hand-Assisted Diagnosis System Based on Information Fusion." Sensors 24, no. 14 (2024): 4745. http://dx.doi.org/10.3390/s24144745.
Full textSufi, Fahim. "A GPT-Based Approach for Cyber Threat Assessment." AI 6, no. 5 (2025): 99. https://doi.org/10.3390/ai6050099.
Full textChen, Chao, Yanyun Lu, Bo Wu, and Linhai Lu. "Digital Twin-Based and Knowledge Graph-Enhanced Emergency Response in Urban Infrastructure Construction." Applied Sciences 15, no. 11 (2025): 6009. https://doi.org/10.3390/app15116009.
Full textAnohina, Alla, Marks Vilkelis, and Romans Lukasenko. "Incremental Improvement of the Evaluation Algorithm in the Concept Map Based Knowledge Assessment System." International Journal of Computers Communications & Control 4, no. 1 (2009): 6. http://dx.doi.org/10.15837/ijccc.2009.1.2409.
Full text