首页 > 最新文献

Computing最新文献

英文 中文
Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles 往返算法(BaF):一种用于无人飞行器几何路径规划的新贪婪算法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-07-01 DOI: 10.1007/s00607-024-01309-7
Selcuk Aslan

The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has a direct relationship with the planned path. However, planning a path for a UAV or UCAV system requires solving a challenging problem optimally by considering the different objectives about the enemy threats protecting the battlefield, fuel consumption or battery usage and kinematic constraints on the turning maneuvers. Because of the increasing demands to the UAV systems and game-changing roles played by them, developing new and versatile path planning algorithms become more critical and urgent. In this study, a greedy algorithm named as the Back-and-Forth (BaF) was designed and introduced for solving the path planning problem. The BaF algorithm gets its name from the main strategy where a heuristic approach is responsible to generate two predecessor paths, one of which is calculated from the start point to the target point, while the other is calculated in the reverse direction, and combines the generated paths for utilizing their advantageous line segments when obtaining more safe, short and maneuverable path candidates. The performance of the BaF was investigated over three battlefield scenarios and twelve test cases belonging to them. Moreover, the BaF was integrated into the workflow of a well-known meta-heuristic, artificial bee colony (ABC) algorithm, and detailed experiments were also carried out for evaluating the possible contribution of the BaF on the path planning capabilities of another technique. The results of the experiments showed that the BaF algorithm is able to plan at least promising or generally better paths with the exact consistency than other tested meta-heuristic techniques and runs nine or more times faster as validated through the comparison between the BaF and ABC algorithms. The results of the experiments further proved that the integration of the BaF boosts the performance of the ABC and helps it to outperform all of fifteen competitors for nine of twelve test cases.

无人驾驶飞行器(UAV)或其军事专业飞行器--无人战斗飞行器(UCAV)的自主任务成功与否与规划的路径有直接关系。然而,无人飞行器或无人战斗飞行器系统的路径规划需要考虑保护战场的敌方威胁、燃料消耗或电池使用以及转弯动作的运动学约束等不同目标,从而优化解决一个具有挑战性的问题。由于对无人机系统的要求越来越高,无人机系统的作用也在不断改变,因此开发新的多功能路径规划算法变得更加重要和紧迫。本研究设计并引入了一种名为 "来回"(BaF)的贪婪算法来解决路径规划问题。BaF 算法的名称来源于其主要策略,即采用启发式方法生成两条前置路径,其中一条是从起点到目标点的计算路径,另一条是反方向的计算路径,并将生成的路径进行组合,以利用其有利线段获得更安全、更短、更机动的候选路径。在三个战场场景和 12 个测试案例中对 BaF 的性能进行了研究。此外,还将 BaF 集成到了一种著名的元启发式算法--人工蜂群(ABC)算法的工作流程中,并进行了详细的实验,以评估 BaF 对另一种技术的路径规划能力可能做出的贡献。实验结果表明,与其他测试过的元启发式技术相比,BaF 算法至少能规划出有希望的路径,甚至一般情况下能规划出更好的路径,而且与其他元启发式技术相比,BaF 算法的运行速度要快 9 倍或更多,这一点通过 BaF 算法和 ABC 算法之间的比较得到了验证。实验结果进一步证明,BaF 的集成提高了 ABC 的性能,并帮助其在 12 个测试案例中的 9 个案例中超越了所有 15 个竞争对手。
{"title":"Back-and-Forth (BaF): a new greedy algorithm for geometric path planning of unmanned aerial vehicles","authors":"Selcuk Aslan","doi":"10.1007/s00607-024-01309-7","DOIUrl":"https://doi.org/10.1007/s00607-024-01309-7","url":null,"abstract":"<p>The autonomous task success of an unmanned aerial vehiclel (UAV) or its military specialization called the unmanned combat aerial vehicle (UCAV) has a direct relationship with the planned path. However, planning a path for a UAV or UCAV system requires solving a challenging problem optimally by considering the different objectives about the enemy threats protecting the battlefield, fuel consumption or battery usage and kinematic constraints on the turning maneuvers. Because of the increasing demands to the UAV systems and game-changing roles played by them, developing new and versatile path planning algorithms become more critical and urgent. In this study, a greedy algorithm named as the Back-and-Forth (BaF) was designed and introduced for solving the path planning problem. The BaF algorithm gets its name from the main strategy where a heuristic approach is responsible to generate two predecessor paths, one of which is calculated from the start point to the target point, while the other is calculated in the reverse direction, and combines the generated paths for utilizing their advantageous line segments when obtaining more safe, short and maneuverable path candidates. The performance of the BaF was investigated over three battlefield scenarios and twelve test cases belonging to them. Moreover, the BaF was integrated into the workflow of a well-known meta-heuristic, artificial bee colony (ABC) algorithm, and detailed experiments were also carried out for evaluating the possible contribution of the BaF on the path planning capabilities of another technique. The results of the experiments showed that the BaF algorithm is able to plan at least promising or generally better paths with the exact consistency than other tested meta-heuristic techniques and runs nine or more times faster as validated through the comparison between the BaF and ABC algorithms. The results of the experiments further proved that the integration of the BaF boosts the performance of the ABC and helps it to outperform all of fifteen competitors for nine of twelve test cases.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor 启用人工智能:使用毫米波 (mmWave) 传感器进行基于物联网的新型假币检测
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-27 DOI: 10.1007/s00607-024-01300-2
Fahim Niaz, Jian Zhang, Muhammad Khalid, Kashif Naseer Qureshi, Yang Zheng, Muhammad Younas, Naveed Imran

In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of various materials and objects. This paper introduces a novel IoT-based fake currency detection using millimeter wave (mmWave) that leverages machine and deep learning algorithms for the detection of fake and genuine currency based on their distinct sensor reflections. To gather these reflections or signatures from different currency notes, we utilize multiple receiving (RX) antennae of the radar sensor module. Our proposed framework encompasses three different approaches for genuine and fake currency detection, Convolutional Neural Network (CNN), k-nearest Neighbor (k-NN), and Transfer Learning Technique (TLT). After extensive experiments, the proposed framework exhibits impressive accuracy and obtained classification accuracy of 96%, 94%, and 98% for CNN, k-NN, and TLT in distinguishing 10 different currency notes using radar signals.

近年来,毫米波传感器发挥了至关重要的作用,尤其是在对各种材料和物体进行无创和无处不在的分析方面。本文介绍了一种新颖的基于物联网的毫米波(mmWave)假币检测方法,该方法利用机器和深度学习算法,根据不同传感器的反射来检测假币和真币。为了收集不同纸币的反射或特征,我们利用了雷达传感器模块的多个接收(RX)天线。我们提出的框架包括三种不同的真假货币检测方法:卷积神经网络(CNN)、k-近邻(k-NN)和迁移学习技术(TLT)。经过大量实验,所提出的框架表现出令人印象深刻的准确性,在使用雷达信号区分 10 种不同纸币时,CNN、k-NN 和 TLT 的分类准确率分别达到 96%、94% 和 98%。
{"title":"AI enabled: a novel IoT-based fake currency detection using millimeter wave (mmWave) sensor","authors":"Fahim Niaz, Jian Zhang, Muhammad Khalid, Kashif Naseer Qureshi, Yang Zheng, Muhammad Younas, Naveed Imran","doi":"10.1007/s00607-024-01300-2","DOIUrl":"https://doi.org/10.1007/s00607-024-01300-2","url":null,"abstract":"<p>In recent years, the significance of millimeter wave sensors has achieved a paramount role, especially in the non-invasive and ubiquitous analysis of various materials and objects. This paper introduces a novel IoT-based fake currency detection using millimeter wave (mmWave) that leverages machine and deep learning algorithms for the detection of fake and genuine currency based on their distinct sensor reflections. To gather these reflections or signatures from different currency notes, we utilize multiple receiving (<i>RX</i>) antennae of the radar sensor module. Our proposed framework encompasses three different approaches for genuine and fake currency detection, Convolutional Neural Network (CNN), k-nearest Neighbor (k-NN), and Transfer Learning Technique (TLT). After extensive experiments, the proposed framework exhibits impressive accuracy and obtained classification accuracy of 96%, 94%, and 98% for CNN, k-NN, and TLT in distinguishing 10 different currency notes using radar signals.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141532438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge-driven Docker registry: facilitating XR application deployment 边缘驱动的 Docker 注册表:促进 XR 应用部署
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-24 DOI: 10.1007/s00607-024-01310-0
Antonios Makris, Evangelos Psomakelis, Ioannis Korontanis, Theodoros Theodoropoulos, Ioannis Kontopoulos, Maria Pateraki, Christos Diou, Konstantinos Tserpes

In recent years, containerization is becoming more and more popular for deploying applications and services and it has significantly contributed to the expansion of edge computing. The demand for effective and scalable container image management, however, increases as the number of containers deployed grows. One solution is to use a localized Docker registry at the edge, where the images are stored closer to the deployment site. This approach can considerably reduce the latency and bandwidth required to download images from a central registry. In addition, it acts as a proactive caching mechanism by optimizing the download delays and the network traffic. In this paper, we introduce an edge-enabled storage framework that incorporates a localized Docker registry. This framework aims to streamline the storage and distribution of container images, providing improved control, scalability, and optimized capabilities for edge deployment. Four demanding XR applications are employed as use cases to experiment with the proposed solution.

近年来,容器化在部署应用程序和服务方面越来越流行,并极大地促进了边缘计算的扩展。然而,随着部署容器数量的增加,对有效且可扩展的容器映像管理的需求也随之增加。一种解决方案是在边缘使用本地化的 Docker 注册表,将映像存储在离部署站点更近的地方。这种方法可以大大减少从中央注册中心下载映像所需的延迟和带宽。此外,它还能优化下载延迟和网络流量,起到主动缓存机制的作用。在本文中,我们介绍了一种结合了本地化 Docker 注册表的边缘存储框架。该框架旨在简化容器映像的存储和分发,为边缘部署提供更好的控制、可扩展性和优化功能。我们采用了四个要求苛刻的 XR 应用程序作为用例,对所提出的解决方案进行实验。
{"title":"Edge-driven Docker registry: facilitating XR application deployment","authors":"Antonios Makris, Evangelos Psomakelis, Ioannis Korontanis, Theodoros Theodoropoulos, Ioannis Kontopoulos, Maria Pateraki, Christos Diou, Konstantinos Tserpes","doi":"10.1007/s00607-024-01310-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01310-0","url":null,"abstract":"<p>In recent years, containerization is becoming more and more popular for deploying applications and services and it has significantly contributed to the expansion of edge computing. The demand for effective and scalable container image management, however, increases as the number of containers deployed grows. One solution is to use a localized Docker registry at the edge, where the images are stored closer to the deployment site. This approach can considerably reduce the latency and bandwidth required to download images from a central registry. In addition, it acts as a proactive caching mechanism by optimizing the download delays and the network traffic. In this paper, we introduce an edge-enabled storage framework that incorporates a localized Docker registry. This framework aims to streamline the storage and distribution of container images, providing improved control, scalability, and optimized capabilities for edge deployment. Four demanding XR applications are employed as use cases to experiment with the proposed solution.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review 无线体域网络动态网络流量下的通信效率和可靠性 MAC 方法:综述
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-20 DOI: 10.1007/s00607-024-01307-9
Jorge Herculano, Willians Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio de Sá, Flávio Assis, Raimundo Macêdo, Sérgio Gorender

Wireless Body Area Networks (WBANs) are wireless sensor networks that monitor the physiological and contextual data of the human body. Nodes in a WBAN communicate using short-range and low-power transmissions to minimize any impact on the human body’s health and mobility. These transmissions thus become subject to failures caused by radiofrequency interference or body mobility. Additionally, WBAN applications typically have timing constraints and carry dynamic traffic, which can change depending on the physiological conditions of the human body. Several approaches for the Medium Access Control (MAC) sublayer have been proposed to improve the reliability and efficiency of the WBANs. This paper proposes and uses a systematic literature review (SLR) method to identify, classify, and statistically analyze the published works with MAC approaches for WBAN efficiency and reliability under dynamic network traffic, radiofrequency interference, and body mobility. In particular, we extend a traditional SLR method by adding a new step to select publications based on qualitative parameters. As a result, we identify the challenges and proposed solutions, highlight advantages and disadvantages, and suggest future works.

无线体感区域网络(WBAN)是一种监测人体生理和环境数据的无线传感器网络。WBAN 中的节点使用短距离和低功耗传输进行通信,以尽量减少对人体健康和移动性的影响。因此,这些传输会因射频干扰或人体移动性而出现故障。此外,WBAN 应用通常有时间限制,并携带动态流量,这些流量会随着人体生理状况的变化而变化。为了提高无线局域网的可靠性和效率,人们提出了几种介质访问控制(MAC)子层的方法。本文提出并使用系统文献综述(SLR)方法来识别、分类和统计分析已发表的有关在动态网络流量、射频干扰和人体移动性条件下提高无线局域网效率和可靠性的 MAC 方法的著作。特别是,我们扩展了传统的 SLR 方法,增加了一个新步骤,根据定性参数选择出版物。因此,我们确定了面临的挑战和建议的解决方案,强调了优缺点,并对未来的工作提出了建议。
{"title":"MAC approaches to communication efficiency and reliability under dynamic network traffic in wireless body area networks: a review","authors":"Jorge Herculano, Willians Pereira, Marcelo Guimarães, Reinaldo Cotrim, Alirio de Sá, Flávio Assis, Raimundo Macêdo, Sérgio Gorender","doi":"10.1007/s00607-024-01307-9","DOIUrl":"https://doi.org/10.1007/s00607-024-01307-9","url":null,"abstract":"<p>Wireless Body Area Networks (WBANs) are wireless sensor networks that monitor the physiological and contextual data of the human body. Nodes in a WBAN communicate using short-range and low-power transmissions to minimize any impact on the human body’s health and mobility. These transmissions thus become subject to failures caused by radiofrequency interference or body mobility. Additionally, WBAN applications typically have timing constraints and carry dynamic traffic, which can change depending on the physiological conditions of the human body. Several approaches for the Medium Access Control (MAC) sublayer have been proposed to improve the reliability and efficiency of the WBANs. This paper proposes and uses a systematic literature review (SLR) method to identify, classify, and statistically analyze the published works with MAC approaches for WBAN efficiency and reliability under dynamic network traffic, radiofrequency interference, and body mobility. In particular, we extend a traditional SLR method by adding a new step to select publications based on qualitative parameters. As a result, we identify the challenges and proposed solutions, highlight advantages and disadvantages, and suggest future works.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture 面向云微服务架构灾难生存能力的能源感知动态响应和高效整合策略
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-17 DOI: 10.1007/s00607-024-01305-x
Iure Fé, Tuan Anh Nguyen, Mario Di Mauro, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae Woo Lee, Francisco Airton Silva

Computer system resilience refers to the ability of a computer system to continue functioning even in the face of unexpected events or disruptions. These disruptions can be caused by a variety of factors, such as hardware failures, software glitches, cyber attacks, or even natural disasters. Modern computational environments need applications that can recover quickly from major disruptions while also being environmentally sustainable. Balancing system resilience with energy efficiency is challenging, as efforts to improve one can harm the other. This paper presents a method to enhance disaster survivability in microservice architectures, particularly those using Kubernetes in cloud-based environments, focusing on optimizing electrical energy use. Aiming to save energy, our work adopt the consolidation strategy that means grouping multiple microservices on a single host. Our aproach uses a widely adopted analytical model, the Generalized Stochastic Petri Net (GSPN). GSPN are a powerful modeling technique that is widely used in various fields, including engineering, computer science, and operations research. One of the primary advantages of GSPN is its ability to model complex systems with a high degree of accuracy. Additionally, GSPN allows for the modeling of both logical and stochastic behavior, making it ideal for systems that involve a combination of both. Our GSPN models compute a number of metrics such as: recovery time, system availability, reliability, Mean Time to Failure, and the configuration of cloud-based microservices. We compared our approach against others focusing on survivability or efficiency. Our approach aligns with Recovery Time Objectives during sudden disasters and offers the fastest recovery, requiring 9% less warning time to fully recover in cases of disaster with alert when compared to strategies with similar electrical consumption. It also saves about 27% energy compared to low consolidation strategies and 5% against high consolidation under static conditions.

计算机系统恢复能力是指计算机系统在面对突发事件或中断时仍能继续运行的能力。这些中断可能由多种因素造成,如硬件故障、软件故障、网络攻击甚至自然灾害。现代计算环境需要既能从重大中断中快速恢复,又具有环境可持续性的应用程序。在系统恢复能力和能源效率之间取得平衡具有挑战性,因为改善其中一个方面的努力可能会损害另一个方面。本文介绍了一种提高微服务架构(尤其是在基于云的环境中使用 Kubernetes 的微服务架构)灾难生存能力的方法,重点是优化电能使用。为了节约能源,我们的工作采用了整合策略,即在单个主机上组合多个微服务。我们的方法采用了一种广泛采用的分析模型--广义随机 Petri 网(GSPN)。GSPN 是一种强大的建模技术,广泛应用于工程、计算机科学和运筹学等多个领域。GSPN 的主要优势之一是能够对复杂系统进行高精度建模。此外,GSPN 还能对逻辑行为和随机行为进行建模,因此非常适合涉及逻辑行为和随机行为的系统。我们的 GSPN 模型可以计算一系列指标,例如:恢复时间、系统可用性、可靠性、平均故障时间以及基于云的微服务的配置。我们将我们的方法与其他专注于生存性或效率的方法进行了比较。我们的方法符合突发性灾难期间的恢复时间目标,并能提供最快的恢复速度,与耗电量相似的策略相比,在有警报的灾难情况下,完全恢复所需的预警时间减少了 9%。在静态条件下,与低整合策略相比,它还能节省约 27% 的能源,与高整合策略相比,能节省 5% 的能源。
{"title":"Energy-aware dynamic response and efficient consolidation strategies for disaster survivability of cloud microservices architecture","authors":"Iure Fé, Tuan Anh Nguyen, Mario Di Mauro, Fabio Postiglione, Alex Ramos, André Soares, Eunmi Choi, Dugki Min, Jae Woo Lee, Francisco Airton Silva","doi":"10.1007/s00607-024-01305-x","DOIUrl":"https://doi.org/10.1007/s00607-024-01305-x","url":null,"abstract":"<p>Computer system resilience refers to the ability of a computer system to continue functioning even in the face of unexpected events or disruptions. These disruptions can be caused by a variety of factors, such as hardware failures, software glitches, cyber attacks, or even natural disasters. Modern computational environments need applications that can recover quickly from major disruptions while also being environmentally sustainable. Balancing system resilience with energy efficiency is challenging, as efforts to improve one can harm the other. This paper presents a method to enhance disaster survivability in microservice architectures, particularly those using Kubernetes in cloud-based environments, focusing on optimizing electrical energy use. Aiming to save energy, our work adopt the consolidation strategy that means grouping multiple microservices on a single host. Our aproach uses a widely adopted analytical model, the Generalized Stochastic Petri Net (GSPN). GSPN are a powerful modeling technique that is widely used in various fields, including engineering, computer science, and operations research. One of the primary advantages of GSPN is its ability to model complex systems with a high degree of accuracy. Additionally, GSPN allows for the modeling of both logical and stochastic behavior, making it ideal for systems that involve a combination of both. Our GSPN models compute a number of metrics such as: recovery time, system availability, reliability, Mean Time to Failure, and the configuration of cloud-based microservices. We compared our approach against others focusing on survivability or efficiency. Our approach aligns with Recovery Time Objectives during sudden disasters and offers the fastest recovery, requiring 9% less warning time to fully recover in cases of disaster with alert when compared to strategies with similar electrical consumption. It also saves about 27% energy compared to low consolidation strategies and 5% against high consolidation under static conditions.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Business process discovery as a service with event log privacy and access control over discovered models 将业务流程发现作为一项服务,对发现的模型进行事件日志隐私和访问控制
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-15 DOI: 10.1007/s00607-024-01299-6
Hector A. de la Fuente-Anaya, H. Marin-Castro, Miguel Morales-Sandoval, Jose Juan Garcia-Hernandez
{"title":"Business process discovery as a service with event log privacy and access control over discovered models","authors":"Hector A. de la Fuente-Anaya, H. Marin-Castro, Miguel Morales-Sandoval, Jose Juan Garcia-Hernandez","doi":"10.1007/s00607-024-01299-6","DOIUrl":"https://doi.org/10.1007/s00607-024-01299-6","url":null,"abstract":"","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141336149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability and performance of resource efficiency in dynamic optimization scheduling using multi-agent microservice cloud-fog on IoT applications 在物联网应用中使用多代理微服务云雾进行动态优化调度的可靠性和资源效率性能
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-14 DOI: 10.1007/s00607-024-01301-1
Ragi Krishnan, Selvam Durairaj
{"title":"Reliability and performance of resource efficiency in dynamic optimization scheduling using multi-agent microservice cloud-fog on IoT applications","authors":"Ragi Krishnan, Selvam Durairaj","doi":"10.1007/s00607-024-01301-1","DOIUrl":"https://doi.org/10.1007/s00607-024-01301-1","url":null,"abstract":"","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141339482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Indexing spatiotemporal trajectory data streams on key-value storage 在键值存储上索引时空轨迹数据流
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-10 DOI: 10.1007/s00607-024-01304-y
Xiaofei Zhao, Kam-yiu Lam, Tei-Wei Kuo
{"title":"Indexing spatiotemporal trajectory data streams on key-value storage","authors":"Xiaofei Zhao, Kam-yiu Lam, Tei-Wei Kuo","doi":"10.1007/s00607-024-01304-y","DOIUrl":"https://doi.org/10.1007/s00607-024-01304-y","url":null,"abstract":"","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141362348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks Quickcent:无标度网络谐波中心性估算的快速节俭启发式方法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-06-08 DOI: 10.1007/s00607-024-01303-z
Francisco Plana, Andrés Abeliuk, Jorge Pérez

We present a simple and quick method to approximate network centrality indexes. Our approach, called QuickCent, is inspired by so-called fast and frugal heuristics, which are heuristics initially proposed to model some human decision and inference processes. The centrality index that we estimate is the harmonic centrality, which is a measure based on shortest-path distances, so infeasible to compute on large networks. We compare QuickCent with known machine learning algorithms on synthetic network datasets, and some empirical networks. Our experiments show that QuickCent can make estimates that are competitive in accuracy with the best alternative methods tested, either on synthetic scale-free networks or empirical networks. QuickCent has the feature of achieving low error variance estimates, even with a small training set. Moreover, QuickCent is comparable in efficiency—accuracy and time cost—to more complex methods. We discuss and provide some insight into how QuickCent exploits the fact that in some networks, such as those generated by preferential attachment, local density measures such as the in-degree, can be a good proxy for the size of the network region to which a node has access, opening up the possibility of approximating expensive indices based on size such as the harmonic centrality. This same fact may explain some evidence we provide that QuickCent would have a superior performance on empirical information networks, such as citations or the internet. Our initial results show that simple heuristics are a promising line of research in the context of network measure estimations.

我们提出了一种近似网络中心性指数的简单快速方法。我们的方法被称为 QuickCent,其灵感来源于所谓的快速和节俭启发式方法,这些启发式方法最初是为了模拟某些人类决策和推理过程而提出的。我们估算的中心性指数是谐波中心性,它是一种基于最短路径距离的度量,因此在大型网络中计算并不可行。我们在合成网络数据集和一些经验网络上将 QuickCent 与已知的机器学习算法进行了比较。实验结果表明,无论是在合成无标度网络还是在经验网络上,QuickCent 的估计值在准确性上都能与测试过的最佳替代方法相媲美。QuickCent 具有误差方差估计值低的特点,即使训练集很小。此外,QuickCent 在效率--准确性和时间成本方面与更复杂的方法不相上下。我们讨论了 QuickCent 如何利用以下事实并提出了一些见解:在某些网络中,例如由优先附着产生的网络,内度等局部密度度量可以很好地代表节点所能访问的网络区域的大小,从而为基于大小的近似昂贵指数(如谐波中心性)提供了可能性。同样的事实也可以解释我们所提供的一些证据,即 QuickCent 在经验信息网络(如引用或互联网)中具有更优越的性能。我们的初步结果表明,在网络度量估计方面,简单的启发式方法是一个很有前途的研究方向。
{"title":"Quickcent: a fast and frugal heuristic for harmonic centrality estimation on scale-free networks","authors":"Francisco Plana, Andrés Abeliuk, Jorge Pérez","doi":"10.1007/s00607-024-01303-z","DOIUrl":"https://doi.org/10.1007/s00607-024-01303-z","url":null,"abstract":"<p>We present a simple and quick method to approximate network centrality indexes. Our approach, called <i>QuickCent</i>, is inspired by so-called <i>fast and frugal</i> heuristics, which are heuristics initially proposed to model some human decision and inference processes. The centrality index that we estimate is the <i>harmonic</i> centrality, which is a measure based on shortest-path distances, so infeasible to compute on large networks. We compare <i>QuickCent</i> with known machine learning algorithms on synthetic network datasets, and some empirical networks. Our experiments show that <i>QuickCent</i> can make estimates that are competitive in accuracy with the best alternative methods tested, either on synthetic scale-free networks or empirical networks. QuickCent has the feature of achieving low error variance estimates, even with a small training set. Moreover, <i>QuickCent</i> is comparable in efficiency—accuracy and time cost—to more complex methods. We discuss and provide some insight into how QuickCent exploits the fact that in some networks, such as those generated by preferential attachment, local density measures such as the in-degree, can be a good proxy for the size of the network region to which a node has access, opening up the possibility of approximating expensive indices based on size such as the harmonic centrality. This same fact may explain some evidence we provide that QuickCent would have a superior performance on empirical information networks, such as citations or the internet. Our initial results show that simple heuristics are a promising line of research in the context of network measure estimations.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141509768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An association rule mining-oriented approach for prioritizing functional requirements 以关联规则挖掘为导向的功能需求优先排序方法
IF 3.7 3区 计算机科学 Q1 Mathematics Pub Date : 2024-05-31 DOI: 10.1007/s00607-024-01296-9
Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang

Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained development environment. To deal with this situation, a requirements prioritization (RP) process can help determine the sequence for the user requirements to be implemented. However, existing RP techniques are suffered from some major challenges such as lack of automation, excessive effort, and reliance on stakeholders’ involvement to initiate the process. This study intends to propose an automated requirements prioritization approach called association rule mining-oriented (ARMO) to address these challenges. The automation process of the ARMO approach incorporates activities to first pre-process the requirements description and extract features. The features are then examined and analyzed through the applied rule mining technique to prioritize the requirements automatically and efficiently without the involvement of stakeholders. In this work, an evaluation model was further developed to assess the effectiveness of the proposed ARMO approach. To validate the efficacy of ARMO approach, a case study was conducted on real-world software projects grounded on the accuracy, precision, recall, and f1-score measures. The promising experimental results demonstrate the ability of the proposed approach to prioritize user requirements. The proposed approach can successfully prioritize user requirements automatically without requiring a significant amount of effort and stakeholders’ involvement to initiate the RP process.

软件需求对确保软件产品的成功起着至关重要的作用。然而,要实现所有用户需求仍是一项具有挑战性的任务,尤其是在资源有限的开发环境中。为了应对这种情况,需求优先级排序(RP)流程可以帮助确定用户需求的实施顺序。然而,现有的需求优先级排序(RP)技术面临着一些主要挑战,如缺乏自动化、工作量过大以及依赖利益相关者的参与来启动流程等。本研究打算提出一种称为面向关联规则挖掘(ARMO)的自动化需求优先级排序方法来应对这些挑战。ARMO 方法的自动化流程包括首先预处理需求描述和提取特征的活动。然后,通过应用规则挖掘技术对这些特征进行检查和分析,从而在没有利益相关者参与的情况下自动、高效地确定需求的优先级。在这项工作中,进一步开发了一个评估模型,以评估所提出的 ARMO 方法的有效性。为了验证 ARMO 方法的有效性,基于准确度、精确度、召回率和 f1 分数等指标,对真实世界的软件项目进行了案例研究。令人鼓舞的实验结果证明了所提出的方法有能力对用户需求进行优先排序。建议的方法可以成功地自动排列用户需求的优先级,而不需要大量的努力和利益相关者的参与来启动 RP 流程。
{"title":"An association rule mining-oriented approach for prioritizing functional requirements","authors":"Habib Un Nisa, Saif Ur Rehman Khan, Shahid Hussain, Wen-Li Wang","doi":"10.1007/s00607-024-01296-9","DOIUrl":"https://doi.org/10.1007/s00607-024-01296-9","url":null,"abstract":"<p>Software requirements play a vital role in ensuring a software product’s success. However, it remains a challenging task to implement all of the user requirements, especially in a resource-constrained development environment. To deal with this situation, a requirements prioritization (RP) process can help determine the sequence for the user requirements to be implemented. However, existing RP techniques are suffered from some major challenges such as lack of automation, excessive effort, and reliance on stakeholders’ involvement to initiate the process. This study intends to propose an automated requirements prioritization approach called association rule mining-oriented (ARMO) to address these challenges. The automation process of the ARMO approach incorporates activities to first pre-process the requirements description and extract features. The features are then examined and analyzed through the applied rule mining technique to prioritize the requirements automatically and efficiently without the involvement of stakeholders. In this work, an evaluation model was further developed to assess the effectiveness of the proposed ARMO approach. To validate the efficacy of ARMO approach, a case study was conducted on real-world software projects grounded on the accuracy, precision, recall, and f1-score measures. The promising experimental results demonstrate the ability of the proposed approach to prioritize user requirements. The proposed approach can successfully prioritize user requirements automatically without requiring a significant amount of effort and stakeholders’ involvement to initiate the RP process.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":null,"pages":null},"PeriodicalIF":3.7,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141189452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1