Graph matching is a comparison process of two objects represented as graphs through finding a correspondence between vertices and edges. This process allows defining a similarity degree (or dissimilarity) between the graphs. Generally, graph matching is used for extracting, finding and retrieving any information or sub-information that can be represented by graphs. In this paper, a new consistency rule is proposed to tackle with various problems of graph matching. After, using the proposed rule as a necessary and sufficient condition for the graph isomorphism, we generalize it for subgraph isomorphism, homomorphism and for an example of inexact graph matching. To determine whether there is a matching or not, a backtracking algorithm called CRGI2 is presented who checks the consistency rule by exploring the overall search space. The tree-search is consolidated with a tree pruning technique that eliminates the unfruitful branches as early as possible. Experimental results show that our algorithm is efficient and applicable for a real case application in the information retrieval field. On the efficiency side, due to the ability of the proposed rule to eliminate as early as possible the incorrect solutions, our algorithm outperforms the existing algorithms in the literature. For the application side, the algorithm has been successfully tested for querying a real dataset that contains a large set of e-mail messages.
Publications
Some Consistency Rules for Graph Matching. SN Computer Science [Internet]. 2022;3 (2) :1-16. Publisher's VersionAbstract
.
Security limitations of Shamir’s secret sharing. Journal of Discrete Mathematical Sciences and Cryptography [Internet]. 2022 :1-13. Publisher's VersionAbstract
.
Towards Intelligent Road Traffic Management Over a Weighted Large Graphs Hybrid Meta-Heuristic-Based Approach. Journal of Cases on Information Technology (JCIT) [Internet]. 2022;24 (3) :1-18. Publisher's VersionAbstract
.
A parallel content-based image retrieval system using spark and tachyon frameworks. Journal of King Saud University - Computer and Information Sciences [Internet]. 2021;33 (2) :141-149. Publisher's VersionAbstract
.
A Reliable Behavioral Model: Optimizing Energy Consumption and Object Clustering Quality by Naïve Robots. International Journal of Swarm Intelligence Research (IJSIR) [Internet]. 2021;12 (4). Publisher's VersionAbstract
.
A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in FogIoT Healthcare Environment. The International Arab Journal of Information Technology [Internet]. 2021;18 (2). Publisher's VersionAbstract
.
Web-Based Learning Under Tacit Mining of Various Data Sources. International Journal of Emerging Technologies in Learning [Internet]. 2021;16 (16). Publisher's VersionAbstract
.
Adoption of social robots as pedagogical aids for efficient learning of second language vocabulary to children. Journal of e-Learning and Knowledge Society [Internet]. 2021;17 (3) :119-126. Publisher's VersionAbstract
.
A hierarchical formal method for performance evaluation of WSNs protocol. Computing [Internet]. 2021;103 (6) :1183-1208. Publisher's VersionAbstract
.
Performance evaluation of ODMAC protocol for WSNs powered by ambient energy. International Journal of Simulation and Process Modelling [Internet]. 2021;17 (1) :67-78. Publisher's VersionAbstract
.
A Multi-Population Genetic Algorithm for Adaptive QoS-Aware Service Composition in Fog-IoT Healthcare Environment. Int. Arab. J. Inf. Technol [Internet]. 2021;18 :464-475. Publisher's VersionAbstract
.
DS-kNN: An Intrusion Detection System Based on a Distance Sum-Based K-Nearest Neighbors. International Journal of Information Security and Privacy (IJISP) [Internet]. 2021;15 (2) :131-144. Publisher's VersionAbstract
.
A Discrete Crow Search Algorithm for Mining Quantitative Association Rules. International Journal of Swarm Intelligence Research (IJSIR) [Internet]. 2021;12 (4) :101-124. Publisher's VersionAbstract
.
A Personalized Recommendation for Web API Discovery in Social Web of Things. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY [Internet]. 2021;18 (3 A) :438-445. Publisher's VersionAbstract
.
A Different Encryption System Based on the Integer Factorization Problem. Malaysian Journal of Computing and Applied Mathematics [Internet]. 2020;3 (1) :50-54. Publisher's VersionAbstract
.