Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (53)

Search Parameters:
Keywords = k-partite graph

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 1630 KiB  
Article
NNG-Based Secure Approximate k-Nearest Neighbor Query for Large Language Models
by Heng Zhou, Yuchao Wang, Yi Qiao and Jin Huang
Mathematics 2025, 13(13), 2199; https://doi.org/10.3390/math13132199 - 5 Jul 2025
Viewed by 202
Abstract
Large language models (LLMs) have driven transformative progress in artificial intelligence, yet critical challenges persist in data management and privacy protection during model deployment and training. The approximate nearest neighbor (ANN) search, a core operation in LLMs, faces inherent trade-offs between efficiency and [...] Read more.
Large language models (LLMs) have driven transformative progress in artificial intelligence, yet critical challenges persist in data management and privacy protection during model deployment and training. The approximate nearest neighbor (ANN) search, a core operation in LLMs, faces inherent trade-offs between efficiency and security when implemented through conventional locality-sensitive hashing (LSH)-based secure ANN (SANN) methods, which often compromise either query accuracy due to false positives. To address these limitations, this paper proposes a novel secure ANN scheme based on nearest neighbor graph (NNG-SANN), which is designed to ensure the security of approximate k-nearest neighbor queries for vector data commonly used in LLMs. Specifically, a secure indexing structure and subset partitioning method are proposed based on LSH and NNG. The approach utilizes neighborhood information stored in the NNG to supplement subset data, significantly reducing the impact of false positive points generated by LSH on query results, thereby effectively improving query accuracy. To ensure data privacy, we incorporate a symmetric encryption algorithm that encrypts the data subsets obtained through greedy partitioning before storing them on the server, providing robust security guarantees. Furthermore, we construct a secure index table that enables complete candidate set retrieval through a single query, ensuring our solution completes the search process in one interaction while minimizing communication costs. Comprehensive experiments conducted on two datasets of different scales demonstrate that our proposed method outperforms existing state-of-the-art algorithms in terms of both query accuracy and security, effectively meeting the precision and security requirements for nearest neighbor queries in LLMs. Full article
(This article belongs to the Special Issue Privacy-Preserving Machine Learning in Large Language Models (LLMs))
Show Figures

Figure 1

16 pages, 298 KiB  
Article
On the Coalition Number of the dth Power of the n-Cycle
by Qinglin Jia, Wenwei Zhao, Zhengyuan Jiang and Yongqiang Zhao
Mathematics 2025, 13(11), 1822; https://doi.org/10.3390/math13111822 - 29 May 2025
Viewed by 266
Abstract
A coalition in a graph G consists of two disjoint sets of vertices V1 and V2, neither of which is a dominating set but whose union V1V2 is a dominating set. A coalition partition in a [...] Read more.
A coalition in a graph G consists of two disjoint sets of vertices V1 and V2, neither of which is a dominating set but whose union V1V2 is a dominating set. A coalition partition in a graph G is a vertex partition π={V1,V2,,Vk} such that every set Viπ is not a dominating set but forms a coalition with another set Vjπ which is not a dominating set. The coalition number C(G) equals the maximum k of a coalition partition of G. In this paper, we study the coalition number of the dth power of the n-cycle Cnd, where n3 and d2. We show that C(Cnd)=d2+3d+2 for n=2d2+4d+2 or n2d2+5d+3, and also provide some bounds of C(Cnd) for the other cases. As a special case, we obtain the exact value of the coalition number of Cn2. Full article
Show Figures

Figure 1

10 pages, 222 KiB  
Article
Maximum Colored Cuts in Edge-Colored Complete k-Partite Graphs and Complete Graphs
by Huawen Ma
Symmetry 2025, 17(5), 790; https://doi.org/10.3390/sym17050790 - 20 May 2025
Viewed by 305
Abstract
The Maximum Colored Cut problem aims to seek a bipartition of the vertex set of a graph, maximizing the number of colors in the crossing edges. It is a classical Max-Cut problem if the host graph is rainbow. Let [...] Read more.
The Maximum Colored Cut problem aims to seek a bipartition of the vertex set of a graph, maximizing the number of colors in the crossing edges. It is a classical Max-Cut problem if the host graph is rainbow. Let mcc(G) denote the maximum number of colors in a cut of an edge-colored graph G. Let Ck be a cycle of length k; we say G is PC-Ck-free if G contains no properly colored Ck. We say G is a p-edge-colored graph if there exist p colors in G. In this paper, we first show that if G is a PC-C3-free p-edge-colored complete 4-partite graph, then mcc(G)=p. Let k3 be an integer. Then, we show that if G is a PC-C4-free p-edge-colored complete k-partite graph, then mcc(G)min{p1,15p/16}. Finally, for a p-edge-colored complete graph G, we prove that mcc(G)p1 if G is PC-C4-free, and mcc(G)min{p6,7p/8} if G is PC-C5-free and p7. Full article
(This article belongs to the Special Issue Advances in Graph Theory Ⅱ)
19 pages, 2626 KiB  
Article
GTSDC: A Graph Theory Subspace-Based Analytical Algorithm for User Behavior
by Jianping Li, Yubo Tan, Jing Wang, Junwei Yu and Qiuyuan Hu
Electronics 2025, 14(10), 2049; https://doi.org/10.3390/electronics14102049 - 18 May 2025
Viewed by 426
Abstract
The exponential growth of multi-modal behavioral data in campus networks poses significant challenges for clustering analysis, including high dimensionality, redundancy, and attribute heterogeneity, which lead to degraded accuracy in existing methods. To address these issues, this study proposes a graph-theoretic subspace deep clustering [...] Read more.
The exponential growth of multi-modal behavioral data in campus networks poses significant challenges for clustering analysis, including high dimensionality, redundancy, and attribute heterogeneity, which lead to degraded accuracy in existing methods. To address these issues, this study proposes a graph-theoretic subspace deep clustering framework that synergizes a deep sparse auto-encoder (DSAE) with a method of graph partitioning based on normalized cut. First, a four-layer DSAE is designed to extract discriminative features while enforcing sparsity constraints, effectively reducing data dimensionality and mitigating noise. Second, the refined subspace representations are transformed into a similarity graph, where normalized cut optimization partitions users into coherent behavioral clusters by balancing intra-cluster cohesion and inter-cluster separation. Experimental validation on three datasets—USER_DATA, MNIST, and COIL20—demonstrates the superiority of GTSDC. It achieves 91% accuracy on USER_DATA, outperforming traditional algorithms (e.g., CLIQUE, K-means) by 120% and advanced methods (e.g., deep subspace clustering) by 15%. The proposed framework not only enhances network resource allocation through behavior-aware analytics but also lays the groundwork for personalized educational services. This work bridges the gap between graph theory and deep learning, offering a scalable solution for high-dimensional behavioral pattern recognition. In simple terms, this new algorithm can more accurately analyze user behavior in campus networks. It helps universities better allocate network resources, such as ensuring smooth online classes, and can also provide personalized educational services to students according to their behavior patterns. Full article
(This article belongs to the Special Issue Application of Big Data Mining and Analysis)
Show Figures

Figure 1

18 pages, 3210 KiB  
Article
GraphDBSCAN: Optimized DBSCAN for Noise-Resistant Community Detection in Graph Clustering
by Danial Ahmadzadeh, Mehrdad Jalali, Reza Ghaemi and Maryam Kheirabadi
Future Internet 2025, 17(4), 150; https://doi.org/10.3390/fi17040150 - 28 Mar 2025
Cited by 1 | Viewed by 674
Abstract
Community detection in complex networks remains a significant challenge due to noise, outliers, and the dependency on predefined clustering parameters. This study introduces GraphDBSCAN, an adaptive community detection framework that integrates an optimized density-based clustering method with an enhanced graph partitioning approach. The [...] Read more.
Community detection in complex networks remains a significant challenge due to noise, outliers, and the dependency on predefined clustering parameters. This study introduces GraphDBSCAN, an adaptive community detection framework that integrates an optimized density-based clustering method with an enhanced graph partitioning approach. The proposed method refines clustering accuracy through three key innovations: (1) a K-nearest neighbor (KNN)-based strategy for automatic parameter tuning in density-based clustering, eliminating the need for manual selection; (2) a proximity-based feature extraction technique that enhances node representations while preserving network topology; and (3) an improved edge removal strategy in graph partitioning, incorporating additional centrality measures to refine community structures. GraphDBSCAN is evaluated on real-world and synthetic datasets, demonstrating improvements in modularity, noise reduction, and clustering robustness. Compared to existing methods, GraphDBSCAN consistently enhances structural coherence, reduces sensitivity to outliers, and improves community separation without requiring fixed parameter assumptions. The proposed method offers a scalable, data-driven approach to community detection, making it suitable for large-scale and heterogeneous networks. Full article
(This article belongs to the Topic Social Computing and Social Network Analysis)
Show Figures

Figure 1

21 pages, 508 KiB  
Article
On Zero-Divisor Graphs of Zn When n Is Square-Free
by Kholood Alnefaie, Nanggom Gammi, Saifur Rahman and Shakir Ali
Axioms 2025, 14(3), 180; https://doi.org/10.3390/axioms14030180 - 28 Feb 2025
Viewed by 1110
Abstract
In this article, some properties of the zero-divisor graph Γ(Zn) are investigated when n is a square-free positive integer. It is shown that the zero-divisor graph Γ(Zn) of ring Zn is a [...] Read more.
In this article, some properties of the zero-divisor graph Γ(Zn) are investigated when n is a square-free positive integer. It is shown that the zero-divisor graph Γ(Zn) of ring Zn is a (2k2)-partite graph when the prime decomposition of n contains k distinct square-free primes using the method of congruence relation. We present some examples, accompanied by graphic representations, to achieve the desired results. It is also obtained that the zero-divisor graph Γ(Zn) is Eulerian if n is a square-free odd integer. Since Zn is a semisimple ring when n is square-free, the results can be generalized to characterize semisimple rings and modules, as well as rings satisfying Artinian and Noetherian conditions through the properties of their zero-divisor graphs. We endeavored to show that Γ(R) is a partite graph with a certain condition on n and also that Γ(R) is a complete graph when n=p2 for a prime p as part of a corollary. To prove these results, we employed the assistance of several theoretic congruence relations that grabbed our attention, making the investigation more interesting. Full article
(This article belongs to the Section Algebra and Number Theory)
Show Figures

Figure 1

12 pages, 3503 KiB  
Proceeding Paper
One-Node One-Edge Dimension-Balanced Hamiltonian Problem on Toroidal Mesh Graph
by Yancy Yu-Chen Chang and Justie Su-Tzu Juan
Eng. Proc. 2025, 89(1), 17; https://doi.org/10.3390/engproc2025089017 - 23 Feb 2025
Viewed by 240
Abstract
Given a graph G = (V, E), the edge set can be partitioned into k dimensions, for a positive integer k. The set of all i-dimensional edges of G is a subset of E(G) denoted [...] Read more.
Given a graph G = (V, E), the edge set can be partitioned into k dimensions, for a positive integer k. The set of all i-dimensional edges of G is a subset of E(G) denoted by Ei. A Hamiltonian cycle C on G contains all vertices on G. Let Ei(C) = E(C) ∩ Ei. For any 1 ≤ ik, C is called a dimension-balanced Hamiltonian cycle (DBH, for short) on G if ||Ei(C)| − |Ej(C)|| ≤ 1 for all 1 ≤ i < jk. The dimension-balanced cycle problem is generated with the 3-D scanning problem. Graph G is called p-node q-edge dimension-balanced Hamiltonian (p-node q-edge DBH) if it has a DBH after removing any p nodes and any q edges. G is called h-fault dimension-balanced Hamiltonian (h-fault DBH, for short) if it remains Hamiltonian after removing any h node and/or edges. The design for the network-on-chip (NoC) problem is important. One of the most famous NoC is the toroidal mesh graph Tm,n. The DBC problem on toroidal mesh graph Tm,n is appropriate for designing simple algorithms with low communication costs and avoiding congestion. Recently, the problem of a one-fault DBH on Tm,n has been studied. This paper solves the one-node one-edge DBH problem in the two-fault DBH problem on Tm,n. Full article
Show Figures

Figure 1

17 pages, 319 KiB  
Article
Asymptotics of Riemann Sums for Uniform Partitions of Intervals of Integration
by Marcin Adam, Jakub Jan Ludew, Michał Różański, Adrian Smuda and Roman Wituła
Symmetry 2025, 17(2), 226; https://doi.org/10.3390/sym17020226 - 4 Feb 2025
Viewed by 652
Abstract
Our goal is to prove the Euler–Maclaurin summation formula using only the Taylor formula. Furthermore, the Euler–Maclaurin summation formula will be considered for the case of functions of the class C2k([a,b]). A stronger [...] Read more.
Our goal is to prove the Euler–Maclaurin summation formula using only the Taylor formula. Furthermore, the Euler–Maclaurin summation formula will be considered for the case of functions of the class C2k([a,b]). A stronger version of the estimation of the rest for functions of class Cn([a,b]) is given. We will also present the application of the obtained Euler–Maclaurin summation formulas to determine the asymptotics of Riemann sums for uniform partitions of intervals of integration. This paper also introduces the concepts of the asymptotic smoothing of the graph of a given function, as well as the asymptotic uniform distribution of the positive and negative values of the given function (generalizing the concept of the symmetric distribution of these values with respect to the x-axis, as in the case of the Peano–Jordan measure). Full article
(This article belongs to the Special Issue Symmetry in Numerical Analysis and Applied Mathematics)
14 pages, 9481 KiB  
Article
The One-Fault Dimension-Balanced Hamiltonian Problem in Toroidal Mesh Graphs
by Justie Su-Tzu Juan, Hao-Cheng Ciou and Meng-Jyun Lin
Symmetry 2025, 17(1), 93; https://doi.org/10.3390/sym17010093 - 9 Jan 2025
Cited by 1 | Viewed by 628
Abstract
Finding a Hamiltonian cycle in a graph G = (V, E) is a well-known problem. The challenge of finding a Hamiltonian cycle that avoids these faults when faulty vertices or edges are present has been extensively studied. When the edge [...] Read more.
Finding a Hamiltonian cycle in a graph G = (V, E) is a well-known problem. The challenge of finding a Hamiltonian cycle that avoids these faults when faulty vertices or edges are present has been extensively studied. When the edge set of G is partitioned into k dimensions, the problem of dimension-balanced Hamiltonian cycles arises, where the Hamiltonian cycle uses approximately the same number of edges from each dimension (differing by at most one). This paper studies whether a dimension-balanced Hamiltonian cycle (DBH) exists in toroidal mesh graphs Tm,n when a single vertex or edge is faulty, called the one-fault DBH problem. We establish that Tm,n is one-fault DBH, except in the following cases: (1) both m and n are even; (2) one of m and n is 3, while the other satisfies mod 4 = 3 and is greater than 6; (3) one of m and n is odd, while the other satisfies mod 4 = 2. Additionally, this paper resolves a conjecture from prior literature, thereby providing a complete solution to the DBP problem on Tm,n. Full article
(This article belongs to the Section Mathematics)
Show Figures

Figure 1

20 pages, 3184 KiB  
Article
GATv2EPI: Predicting Enhancer–Promoter Interactions with a Dynamic Graph Attention Network
by Tianjiao Zhang, Xingjie Zhao, Hao Sun, Bo Gao and Xiaoqi Liu
Genes 2024, 15(12), 1511; https://doi.org/10.3390/genes15121511 - 25 Nov 2024
Cited by 1 | Viewed by 1399
Abstract
Background: The enhancer–promoter interaction (EPI) is a critical component of gene regulatory networks, playing a significant role in understanding the complexity of gene expression. Traditional EPI prediction methods focus on one-to-one interactions, neglecting more complex one-to-many and many-to-many patterns. To address this gap, [...] Read more.
Background: The enhancer–promoter interaction (EPI) is a critical component of gene regulatory networks, playing a significant role in understanding the complexity of gene expression. Traditional EPI prediction methods focus on one-to-one interactions, neglecting more complex one-to-many and many-to-many patterns. To address this gap, we utilize graph neural networks to comprehensively explore all interaction patterns between enhancers and promoters, capturing complex regulatory relationships for more accurate predictions. Methods: In this study, we introduce a novel EPI prediction framework, GATv2EPI, based on dynamic graph attention neural networks. GATv2EPI leverages epigenetic information from enhancers, promoters, and their surrounding regions and organizes interactions into a network to comprehensively explore complex EPI regulatory patterns, including one-to-one, one-to-many, and many-to-many relationships. To avoid overfitting and ensure diverse data representation, we implemented a connectivity-based sampling method for dataset partitioning, which constructs graphs for each chromosome and assigns entire connected subgraphs to training or test sets, thereby preventing information leakage and ensuring comprehensive chromosomal representation. Results: In experiments conducted on four cell lines—NHEK, IMR90, HMEC, and K562—GATv2EPI demonstrated superior EPI recognition accuracy compared to existing similar methods, with a training time improvement of 95.29% over TransEPI. Conclusions: GATv2EPI enhances EPI prediction accuracy by capturing complex topological structure information from gene regulatory networks through graph neural networks. Additionally, our results emphasize the importance of epigenetic features surrounding enhancers and promoters in EPI prediction. Full article
(This article belongs to the Special Issue Advances and Applications of Machine Learning in Biomedical Genomics)
Show Figures

Graphical abstract

16 pages, 1080 KiB  
Article
Fuzzy Coalition Graphs: A Framework for Understanding Cooperative Dominance in Uncertain Networks
by Yongsheng Rao, Srinath Ponnusamy, Sundareswaran Raman, Aysha Khan and Jana Shafi
Mathematics 2024, 12(22), 3614; https://doi.org/10.3390/math12223614 - 19 Nov 2024
Viewed by 806
Abstract
In a fuzzy graph G, a fuzzy coalition is formed by two disjoint vertex sets V1 and V2, neither of which is a strongly dominating set, but the union V1V2 forms a strongly dominating set. [...] Read more.
In a fuzzy graph G, a fuzzy coalition is formed by two disjoint vertex sets V1 and V2, neither of which is a strongly dominating set, but the union V1V2 forms a strongly dominating set. A fuzzy coalition partition of G is defined as Π={V1,V2,,Vk}, where each set Vi either forms a singleton strongly dominating set or is not a strongly dominating set but forms a fuzzy coalition with another non-strongly dominating set in Π. A fuzzy graph with such a fuzzy coalition partition Π is called a fuzzy coalition graph, denoted as FG(G,Π). The vertex set of the fuzzy coalition graph consists of {V1,V2,,Vk}, corresponding one-to-one with the sets of Π, and the two vertices are adjacent in FG(G,Π) if and only if Vi and Vj are fuzzy coalition partners in Π. This study demonstrates how fuzzy coalition graphs can model and optimize cybersecurity collaborations across critical infrastructures in smart cities, ensuring comprehensive protection against cyber threats. This study concludes that fuzzy coalition graphs offer a robust framework for optimizing collaboration and decision-making in interconnected systems like smart cities. Full article
Show Figures

Figure 1

28 pages, 4809 KiB  
Article
Insurance Analytics with Clustering Techniques
by Charlotte Jamotton, Donatien Hainaut and Thomas Hames
Risks 2024, 12(9), 141; https://doi.org/10.3390/risks12090141 - 5 Sep 2024
Viewed by 2387
Abstract
The K-means algorithm and its variants are well-known clustering techniques. In actuarial applications, these partitioning methods can identify clusters of policies with similar attributes. The resulting partitions provide an actuarial framework for creating maps of dominant risks and unsupervised pricing grids. This research [...] Read more.
The K-means algorithm and its variants are well-known clustering techniques. In actuarial applications, these partitioning methods can identify clusters of policies with similar attributes. The resulting partitions provide an actuarial framework for creating maps of dominant risks and unsupervised pricing grids. This research article aims to adapt well-established clustering methods to complex insurance datasets containing both categorical and numerical variables. To achieve this, we propose a novel approach based on Burt distance. We begin by reviewing the K-means algorithm to establish the foundation for our Burt distance-based framework. Next, we extend the scope of application of the mini-batch and fuzzy K-means variants to heterogeneous insurance data. Additionally, we adapt spectral clustering, a technique based on graph theory that accommodates non-convex cluster shapes. To mitigate the computational complexity associated with spectral clustering’s O(n3) runtime, we introduce a data reduction method for large-scale datasets using our Burt distance-based approach. Full article
Show Figures

Figure 1

20 pages, 1007 KiB  
Article
HitSim: An Efficient Algorithm for Single-Source and Top-k SimRank Computation
by Jing Bai, Junfeng Zhou, Shuotong Chen, Ming Du, Ziyang Chen and Mengtao Min
Information 2024, 15(6), 348; https://doi.org/10.3390/info15060348 - 12 Jun 2024
Viewed by 1187
Abstract
SimRank is a widely used metric for evaluating vertex similarity based on graph topology, with diverse applications such as large-scale graph mining and natural language processing. The objective of the single-source and top-k SimRank query problem is to retrieve the kvertices with [...] Read more.
SimRank is a widely used metric for evaluating vertex similarity based on graph topology, with diverse applications such as large-scale graph mining and natural language processing. The objective of the single-source and top-k SimRank query problem is to retrieve the kvertices with the largest SimRank to the source vertex. However, existing algorithms suffer from inefficiency as they require computing SimRank for all vertices to retrieve the top-k results. To address this issue, we propose an algorithm named HitSimthat utilizes a branch and bound strategy for the single-source and top-k query. HitSim initially partitions vertices into distinct sets based on their shortest-meeting lengths to the source vertex. Subsequently, it computes an upper bound of SimRank for each set. If the upper bound of a set is no larger than the minimum value of the current top-k results, HitSim efficiently batch-prunes the unpromising vertices within the set. However, in scenarios where the graph becomes dense, certain sets with large upper bounds may contain numerous vertices with small SimRank, leading to redundant overhead when processing these vertices. To address this issue, we propose an optimized algorithm named HitSim-OPT that computes the upper bound of SimRank for each vertex instead of each set, resulting in a fine-grained and efficient pruning process. The experimental results conducted on six real-world datasets demonstrate the performance of our algorithms in efficiently addressing the single-source and top-k query problem. Full article
Show Figures

Figure 1

7 pages, 231 KiB  
Article
On Fall-Colorable Graphs
by Shaojun Wang, Fei Wen, Guoxing Wang and Zepeng Li
Mathematics 2024, 12(7), 1105; https://doi.org/10.3390/math12071105 - 7 Apr 2024
Viewed by 1083
Abstract
A fall k-coloring of a graph G is a proper k-coloring of G such that each vertex has at least one neighbor in each of the other color classes. A graph G which has a fall k-coloring is equivalent to [...] Read more.
A fall k-coloring of a graph G is a proper k-coloring of G such that each vertex has at least one neighbor in each of the other color classes. A graph G which has a fall k-coloring is equivalent to having a partition of the vertex set V(G) in k independent dominating sets. In this paper, we first prove that for any fall k-colorable graph G with order n, the number of edges of G is at least (n(k1)+r(kr))/2, where rn(modk) and 0rk1, and the bound is tight. Then, we obtain that if G is k-colorable (k2) and the minimum degree of G is at least k2k1n, then G is fall k-colorable and this condition of minimum degree is the best possible. Moreover, we give a simple proof for an NP-hard result of determining whether a graph is fall k-colorable, where k3. Finally, we show that there exist an infinite family of fall k-colorable planar graphs for k{5,6}. Full article
Show Figures

Figure 1

18 pages, 1090 KiB  
Article
Multiple Extended Target Tracking Algorithm Based on Spatio-Temporal Correlation
by Wei Zhang, Chen Lin, Tingting Liu and Lu Gan
Appl. Sci. 2024, 14(6), 2367; https://doi.org/10.3390/app14062367 - 11 Mar 2024
Cited by 2 | Viewed by 1309
Abstract
In the clutter environment, the measurement of a set of multiple extended targets, with an unknown number of targets, poses challenges in partitioning, and the computational cost is high. In particular, the multiple extended target tracking method, based on distance partition, has obvious [...] Read more.
In the clutter environment, the measurement of a set of multiple extended targets, with an unknown number of targets, poses challenges in partitioning, and the computational cost is high. In particular, the multiple extended target tracking method, based on distance partition, has obvious potential estimation errors when the extended targets intersect. This paper proposes a partition algorithm, based on spatio-temporal correlation, which considers the correlation between adjacent moments of the extended target and uses this prior information to divide the measurement set into a survival target measurement set and a born target measurement set for the first time. Then, the survival target measurement set is clustered by the K-means++ algorithm, and the extended target tracking is transformed into point target tracking. The born target measurement undergoes preprocessing by the DBSCAN clustering algorithm, and then uses the directed graph with shared nearest neighbors (SNN) dividing the measurement set. The method proposed in this paper significantly reduces the number of partitions and the computational time. The effectiveness of the algorithm is demonstrated through experimental simulations. Full article
(This article belongs to the Special Issue Recent Progress in Radar Target Detection and Localization)
Show Figures

Figure 1

Back to TopTop