Large Scale Graph Matching(LSGM): Techniques, Tools, Applications and Challenges
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 4
Abstract
Large Scale Graph Matching (LSGM) is one of the fundamental problems in Graph theory and it has applications in many areas such as Computer Vision, Machine Learning, Pattern Recognition and Big Data Analytics (Data Science). Matching belongs to the combinatorial class of problems which refers to finding correspondence between the nodes of a graph or among set of graphs (subgraphs) either precisely or approximately. Precise Matching is also known as Exact Matching such as (sub)Graph Isomorphism and Approximate Matching is called Inexact Matching in which matching activity concerns with conceptual/semantic matching rather than focusing on structural details of graphs. In this article, a review of matching problem is presented i.e. Semantic Matching (conceptual), Syntactic Match-ing (structural) and Schematic Matching (Schema based). The aim is to present the current state of the art in Large Scale Graph Matching (LSGM), a systematic review of algorithms, tools and techniques along with the existing challenges of LSGM. Moreover, the potential application domains and related research activities are provided.
Authors and Affiliations
Azka Mahmood, Hina Farooq, Javed Ferzund
Main Stream Temperature Control System Based on Smith-PID Scheduling Network Control
This paper is concerned with the controller design problem for a class of networked main stream temperature control system with long random time delay and packet losses. To compensate the effect of time delay and packet...
ATM Security Using Fingerprint Biometric Identifer: An Investigative Study
The growth in electronic transactions has resulted in a greater demand for fast and accurate user identification and authentication. Access codes for buildings, banks accounts and computer systems often use persona...
An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
Security of data in a computer is needed to protect critical data and information from other parties. One way to protect data is to apply the science of cryptography to perform data encryption. There are wide variety of...
Image Transmission Model with Quality of Service and Energy Economy in Wireless Multimedia Sensor Network
The objective of this article is to present the efficiency of image compression in the Wireless Multimedia Sensor Network (WMSN), the method used in this work is based on the lifting scheme coupled with the SPIHT coding...
Quadrant Based WSN Routing Technique By Shifting Of Origin
A sensor is a miniaturized, low powered (basically battery powered), limited storage device which can sense the natural phenomenon or things and convert it into electrical energy or vice versa using transduction process....