With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have cho...With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the filtering stage to obtain more optimized query results because currently there is no uniform and efficient indexing mechanism that achieves good query results. In the traditional algorithm, the hash table for index storage is prone to "collision" problems, which decrease the index construction efficiency. Aiming at the problem of quick index entry, based on the construction of frequent subgraph indexes, a method of serialized storage optimization based on multiple hash tables is proposed. This method mainly uses the exploration sequence to make the keywords evenly distributed; it avoids conflicts of the stored procedure and performs a quick search of the index. The proposed algorithm mainly adopts the "filterverify" mechanism; in the filtering stage, the index is first established offline, and then the frequent subgraphs are found using the "contains logic" rule to obtain the candidate set. Experimental results show that this method can reduce the time and scale of candidate set generation and improve query efficiency.展开更多
图半监督学习(Graph based semi-supervised learning,GSL)方法需要花费大量时间构造一个近邻图,速度比较慢.本文提出了一种哈希图半监督学习(Hash graph based semi-supervised learning,HGSL)方法,该方法通过局部敏感的哈希函数进行...图半监督学习(Graph based semi-supervised learning,GSL)方法需要花费大量时间构造一个近邻图,速度比较慢.本文提出了一种哈希图半监督学习(Hash graph based semi-supervised learning,HGSL)方法,该方法通过局部敏感的哈希函数进行近邻搜索,可以有效降低图半监督学习方法所需的构图时间.图像分割实验表明,该方法一方面可以达到更好的分割效果,使分割准确率提高0.47%左右;另一方面可以大幅度减小分割时间,以一幅大小为300像素×800像素的图像为例,分割时间可减少为图半监督学习所需时间的28.5%左右.展开更多
An N ×n matrix on q symbols is called {w_1,...,w_t}-separating if for arbitrary t pairwise disjoint column sets C_1,..., C_t with |C_i|=w_i for 1 ≤i≤t, there exists a row f such that f(C_1),...,f(C_t) are also ...An N ×n matrix on q symbols is called {w_1,...,w_t}-separating if for arbitrary t pairwise disjoint column sets C_1,..., C_t with |C_i|=w_i for 1 ≤i≤t, there exists a row f such that f(C_1),...,f(C_t) are also pairwise disjoint, where f(C_i) denotes the collection of componentn of C_i restricted to row f. Given integers N, q and w_1,...,w_t, denote by C(N,q,{w_1,...,w_t}) the maximal a such that a corresponding matrix does exist.The determination of C(N,q,{w_1,...,w_t}) has received remarkable attention during the recent years. The main purpose of this paper is to introduce two novel methodologies to attack the upper bound of C(N, q, {w_1,...,w_t}).The first one is a combination of the famous graph removal lemma in extremal graph theory and a Johnson-type recursive inequality in coding theory, and the second onc is the probabilistic method. As a consequence, we obtain several intriguing upper bounds for some parameters of C(N,q,{w_1,...,w_t}), which significantly improve the previously known results.展开更多
基金supported by the State Grid Science and Technology Project (Title: Research on High Performance Analysis Technology of Power Grid GIS Topology Based on Graph Database, 5455HJ160005)
文摘With the development of information technology, the amount of power grid topology data has gradually increased. Therefore, accurate querying of this data has become particularly important. Several researchers have chosen different indexing methods in the filtering stage to obtain more optimized query results because currently there is no uniform and efficient indexing mechanism that achieves good query results. In the traditional algorithm, the hash table for index storage is prone to "collision" problems, which decrease the index construction efficiency. Aiming at the problem of quick index entry, based on the construction of frequent subgraph indexes, a method of serialized storage optimization based on multiple hash tables is proposed. This method mainly uses the exploration sequence to make the keywords evenly distributed; it avoids conflicts of the stored procedure and performs a quick search of the index. The proposed algorithm mainly adopts the "filterverify" mechanism; in the filtering stage, the index is first established offline, and then the frequent subgraphs are found using the "contains logic" rule to obtain the candidate set. Experimental results show that this method can reduce the time and scale of candidate set generation and improve query efficiency.
文摘图半监督学习(Graph based semi-supervised learning,GSL)方法需要花费大量时间构造一个近邻图,速度比较慢.本文提出了一种哈希图半监督学习(Hash graph based semi-supervised learning,HGSL)方法,该方法通过局部敏感的哈希函数进行近邻搜索,可以有效降低图半监督学习方法所需的构图时间.图像分割实验表明,该方法一方面可以达到更好的分割效果,使分割准确率提高0.47%左右;另一方面可以大幅度减小分割时间,以一幅大小为300像素×800像素的图像为例,分割时间可减少为图半监督学习所需时间的28.5%左右.
基金supported by National Natural Science Foundation of China (Grant Nos. 11431003 and 61571310)Beijing Scholars Program+3 种基金Beijing Hundreds of Leading Talents Training Project of Science and TechnologyBeijing Municipal Natural Science FoundationThe third author was supported by the Post-Doctoral Science Foundation of China(Grant No. 2018M632356)National Natural Science Foundation of China (Grant No. 11801392)
文摘An N ×n matrix on q symbols is called {w_1,...,w_t}-separating if for arbitrary t pairwise disjoint column sets C_1,..., C_t with |C_i|=w_i for 1 ≤i≤t, there exists a row f such that f(C_1),...,f(C_t) are also pairwise disjoint, where f(C_i) denotes the collection of componentn of C_i restricted to row f. Given integers N, q and w_1,...,w_t, denote by C(N,q,{w_1,...,w_t}) the maximal a such that a corresponding matrix does exist.The determination of C(N,q,{w_1,...,w_t}) has received remarkable attention during the recent years. The main purpose of this paper is to introduce two novel methodologies to attack the upper bound of C(N, q, {w_1,...,w_t}).The first one is a combination of the famous graph removal lemma in extremal graph theory and a Johnson-type recursive inequality in coding theory, and the second onc is the probabilistic method. As a consequence, we obtain several intriguing upper bounds for some parameters of C(N,q,{w_1,...,w_t}), which significantly improve the previously known results.