当前位置:网站首页>Introduction to some representations, neighbors and degrees of Graphs
Introduction to some representations, neighbors and degrees of Graphs
2022-06-30 04:45:00 【Icy Hunter】
List of articles
Preface
Recently, we need to learn graph neural network , The ultimate goal is to use R-GAT, But it can't be achieved overnight , It should not be difficult to copy the code and run it , But if you can understand the code , Modify the code , You may still need to understand the corresponding model theory . Let's start with the representation of the graph …
The picture below is b From the station video , Because it is really clear from the picture
https://www.bilibili.com/video/BV1U44y1K7yP?p=2&vd_source=f57738ab6bbbbd5fe07aae2e1fa1280f
The representation of the figure
adjacency matrix
Adjacency matrix is a basic graphical representation . Suppose the number of nodes in a graph is N, Then generate a N*N Matrix . The value in the matrix is the relationship between the nodes in the corresponding position, which is generally used as A Express .
If the node i And nodes j Right link , Then the corresponding position of the adjacency matrix is assigned 1 that will do
Undirected graph ( There is no direction on the side , That is, do not distinguish 1->2 and 2->1):
Directed graph :
Weighted digraph :
The values in the matrix can be expressed by weight 
Adjacency list method
Adjacency lists are very friendly to sparse large graphs
There is no direction, no right :
A directed power chart :
Edge set method
The tuple of the head and tail nodes to represent a set of edges
Directed graph :
Undirected graph :
A directed power chart :
Neighbor sum degree
The neighbor of a node refers to the node on the same side and at the other end of the node .
The degree of a node refers to the number of its neighbors
Undirected graph :
Directed graph :
The neighbors of a directed graph are divided into the former and the latter , Degrees can be divided into in degrees and out degrees .
A former stepneighbor : The head node to which the target node is connected when it is the tail node .
Successor neighbor : When the target node is the head node , The tail node connected to it .
Read in : Number of previous neighbors
The degree of : Number of subsequent neighbors
边栏推荐
- Difference between TCP three handshakes and four waves and tcp/udp
- Connect to the database and run node JS running database shows that the database is missing
- Threejs realizes the simulation of river, surface flow, pipe flow and sea surface
- Issue SSL certificate with IP address
- Keywords implements and @override
- Detailed explanation of cookies and sessions
- Static keyword
- 【Paper】2019_ Consensus Control of Multiple AUVs Recovery System Under Switching Topologies and Time D
- [fpga] implementation of IIC read / write EEPROM
- What is SQL injection and how to avoid it?
猜你喜欢
![Tea mall system based on SSM framework [project source code + database script + report]](/img/d9/0a46c0da9839a7186bd3a9ae55f0a5.png)
Tea mall system based on SSM framework [project source code + database script + report]

Learning about signals

Dual domain SSL certificate

Five methods to clear floating and their advantages and disadvantages

【Paper】2017_ Research on coordinated control method of underwater vehicle formation marine survey

BeanFactory创建流程

Redis implements SMS login function (I) traditional session login
![[UAV] kinematic analysis from single propeller to four rotor UAV](/img/32/1a88b102f832ffbbc1a7e57798260a.jpg)
[UAV] kinematic analysis from single propeller to four rotor UAV

Connect to the database and run node JS running database shows that the database is missing

Junior students summarize JS advanced interview questions
随机推荐
[FPGA] IIC读写EEPROM 的实现
Meet in Bangkok for a romantic trip on Valentine's Day
The most comprehensive summary notes of redis foundation + advanced project in history
[learn FPGA programming from scratch -52]: high level chapter - FPGA development based on IP core - basic framework for IP core use (taking PLL as an example)
Method of applying for code signing certificate by enterprise
Window10 jar double click to run without response
为什么win10开热点后电脑没有网络?
What to do when the alicloud SSL certificate expires
Websocket implementation principle
The difference between get and post requests
System programming summary
Threadlocal
输入输出及中断技术——微机第六章学习笔记
Connect to the database and run node JS running database shows that the database is missing
Efficiency test of adding and querying ArrayList and LinkedList
Singapore must visit these scenic spots during the Spring Festival
圆心科技,很焦虑?
Webots notes day 2
【Paper】2013_ An efficient model predictive control scheme for an unmanned quadrotor helicopter
One interview question a day - the underlying implementation of synchronize and the lock upgrade process