首页 > 最新文献

Computing最新文献

英文 中文
LGAT: a light graph attention network focusing on message passing for semi-supervised node classification LGAT:侧重于信息传递的轻型图注意网络,用于半监督节点分类
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-16 DOI: 10.1007/s00607-024-01261-6

Abstract

Deep learning has shown superior performance in various applications. The emergence of graph convolution neural networks (GCNs) enables deep learning to learn the latent representation from graph-structured data with rich attributes. To be specific, the message passing mechanism of GCNs can aggregate and update messages through the topological relationship between nodes in a graph. The graph attention network (GAT) introduces the attention mechanism into GCNs when aggregating messages and achieves significant performance on the node classification task. However, focusing on each node in the neighborhood, GAT becomes extremely complex. In addition, although stacking network layers could obtain a wider receptive field, it also brings high time cost and leads to the difficulty of training. To handle this problem, this paper only divides the messages into two types, i.e. self message and neighborhood message. The neighborhood message comes from the neighborhood with(out) self-loop while the self message comes from the node itself. Then, we design a light attention mechanism that only focuses on two weights, one for the self message, and the other for the neighborhood message, to adaptively reveal the different contributions of messages from a node as well as its neighborhood. In addition, we also adopt linear propagation, a shallow and efficient method, to aggregate messages from distant neighbors and thus obtain a wider neighborhood receiving field. To verify the effectiveness of our proposed approach, extensive experiments have been conducted on the semi-supervised node classification task. Results show that our proposed approach achieves comparable or even better performance than the baseline methods with complicated GCN structures on the benchmark datasets. Specifically, the proposed light attention mechanism focusing on message passing exhibits a great efficiency improvement with the training time cost less than half of GAT.

摘要 深度学习在各种应用中表现出卓越的性能。图卷积神经网络(GCN)的出现使深度学习能够从具有丰富属性的图结构数据中学习潜在表示。具体来说,GCN 的消息传递机制可以通过图中节点之间的拓扑关系来聚合和更新消息。图注意力网络(GAT)在聚合信息时将注意力机制引入了 GCN,并在节点分类任务中取得了显著的性能。然而,由于关注邻域中的每个节点,GAT 变得异常复杂。此外,虽然堆叠网络层可以获得更宽的感受野,但也带来了高昂的时间成本和训练难度。为了解决这个问题,本文只将信息分为两类,即自身信息和邻域信息。邻域信息来自有(无)自循环的邻域,而自身信息则来自节点本身。然后,我们设计了一种轻关注机制,它只关注两个权重,一个是自身信息的权重,另一个是邻域信息的权重,从而自适应地揭示来自节点及其邻域的信息的不同贡献。此外,我们还采用了线性传播这种浅显而高效的方法来聚合来自远邻的信息,从而获得更广阔的邻域接收域。为了验证我们提出的方法的有效性,我们在半监督节点分类任务中进行了大量实验。结果表明,在基准数据集上,我们提出的方法取得了与具有复杂 GCN 结构的基准方法相当甚至更好的性能。具体来说,我们提出的轻关注机制以消息传递为重点,大大提高了效率,其训练时间成本不到 GAT 的一半。
{"title":"LGAT: a light graph attention network focusing on message passing for semi-supervised node classification","authors":"","doi":"10.1007/s00607-024-01261-6","DOIUrl":"https://doi.org/10.1007/s00607-024-01261-6","url":null,"abstract":"<h3>Abstract</h3> <p>Deep learning has shown superior performance in various applications. The emergence of graph convolution neural networks (GCNs) enables deep learning to learn the latent representation from graph-structured data with rich attributes. To be specific, the message passing mechanism of GCNs can aggregate and update messages through the topological relationship between nodes in a graph. The graph attention network (GAT) introduces the attention mechanism into GCNs when aggregating messages and achieves significant performance on the node classification task. However, focusing on each node in the neighborhood, GAT becomes extremely complex. In addition, although stacking network layers could obtain a wider receptive field, it also brings high time cost and leads to the difficulty of training. To handle this problem, this paper only divides the messages into two types, i.e. self message and neighborhood message. The neighborhood message comes from the neighborhood with(out) self-loop while the self message comes from the node itself. Then, we design a light attention mechanism that only focuses on two weights, one for the self message, and the other for the neighborhood message, to adaptively reveal the different contributions of messages from a node as well as its neighborhood. In addition, we also adopt linear propagation, a shallow and efficient method, to aggregate messages from distant neighbors and thus obtain a wider neighborhood receiving field. To verify the effectiveness of our proposed approach, extensive experiments have been conducted on the semi-supervised node classification task. Results show that our proposed approach achieves comparable or even better performance than the baseline methods with complicated GCN structures on the benchmark datasets. Specifically, the proposed light attention mechanism focusing on message passing exhibits a great efficiency improvement with the training time cost less than half of GAT.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"10 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge data distribution as a network Steiner tree estimation in edge computing 边缘计算中作为网络斯坦纳树估算的边缘数据分布
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-08 DOI: 10.1007/s00607-024-01259-0
Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu

Many modern day cloud hosted applications such as virtual reality, real time games require low latency data access and computation to improve response time. So it is essential to bring the computation and data storage edge servers closer to the user’s geographical location to improve response times and save bandwidth. In particulars, in online gaming and on demand video services, the required application data present at cloud servers need to be placed on the edge servers to provide low latency app-functionalities. The transfer of huge amount of data from cloud server to edge server incurs high cost and time penalties. Thus, we need an efficient way to solve edge data distribution (EDD) problem which distribute the application data to the edge servers that minimizes transfer cost. In this work, we provide a refined formulation of an optimal approach to solve the EDD problem using integer linear programming (ILP) technique. Due to the time complexity limitation of the ILP approach, we propose an O(k) approximation algorithm based on network Steiner tree estimation (EDD-NSTE) for estimating solutions to dense large-scale EDD problem. The proposed approach is analyzed to be 11/6 approximation which is better than the state-of-the-art 2 approximation EDD-A approach. The experimental evaluation through simulation using real world EUA data set demonstrate that the EDD-NSTE outperform state-of-the-art approach and other representative approaches.

虚拟现实、实时游戏等许多现代云托管应用需要低延迟的数据访问和计算,以提高响应速度。因此,必须让计算和数据存储边缘服务器更靠近用户的地理位置,以提高响应速度并节省带宽。特别是在在线游戏和视频点播服务中,云服务器上所需的应用数据需要放在边缘服务器上,以提供低延迟的应用功能。从云服务器向边缘服务器传输大量数据会产生高昂的成本和时间成本。因此,我们需要一种有效的方法来解决边缘数据分发(EDD)问题,将应用数据分发到边缘服务器,从而最大限度地降低传输成本。在这项工作中,我们利用整数线性规划(ILP)技术提供了一种解决 EDD 问题的最优方法的细化表述。由于 ILP 方法的时间复杂度限制,我们提出了一种基于网络斯泰纳树估计的 O(k) 近似算法(EDD-NSTE),用于估计密集大规模 EDD 问题的解决方案。经分析,所提方法的近似度为 11/6,优于最先进的 2 次近似 EDD-A 方法。通过使用真实世界的 EUA 数据集进行模拟实验评估,证明 EDD-NSTE 优于最先进的方法和其他具有代表性的方法。
{"title":"Edge data distribution as a network Steiner tree estimation in edge computing","authors":"Chinmaya Kumar Swain, Ravi Shankar, Aryabartta Sahu","doi":"10.1007/s00607-024-01259-0","DOIUrl":"https://doi.org/10.1007/s00607-024-01259-0","url":null,"abstract":"<p>Many modern day cloud hosted applications such as virtual reality, real time games require low latency data access and computation to improve response time. So it is essential to bring the computation and data storage edge servers closer to the user’s geographical location to improve response times and save bandwidth. In particulars, in online gaming and on demand video services, the required application data present at cloud servers need to be placed on the edge servers to provide low latency app-functionalities. The transfer of huge amount of data from cloud server to edge server incurs high cost and time penalties. Thus, we need an efficient way to solve edge data distribution (EDD) problem which distribute the application data to the edge servers that minimizes transfer cost. In this work, we provide a refined formulation of an optimal approach to solve the EDD problem using integer linear programming (ILP) technique. Due to the time complexity limitation of the ILP approach, we propose an O(k) approximation algorithm based on network Steiner tree estimation (EDD-NSTE) for estimating solutions to dense large-scale EDD problem. The proposed approach is analyzed to be 11/6 approximation which is better than the state-of-the-art 2 approximation EDD-A approach. The experimental evaluation through simulation using real world EUA data set demonstrate that the EDD-NSTE outperform state-of-the-art approach and other representative approaches.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"9 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving the SAT problem with the string multiset rewriting calculus 用字符串多集重写微积分解决 SAT 问题
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-06 DOI: 10.1007/s00607-024-01258-1

Abstract

In this paper, we develop computing machinery within the framework of the String Multiset Rewriting calculus (SMSR), as defined by Barbuti et al. [4], to solve the SAT problem in linear time regarding the number of variables of a given conjunctive normal form. This shows that SMSR can be considered a computational model capable of significantly reducing the time requirement of classical decision problems.

摘要 本文在 Barbuti 等人[4]定义的字符串多集重写微积分(SMSR)框架内开发了一种计算机制,可以在线性时间内求解关于给定连接正则表达式的变量数的 SAT 问题。这表明,SMSR 可以被视为一种计算模型,能够显著降低经典决策问题的时间要求。
{"title":"Solving the SAT problem with the string multiset rewriting calculus","authors":"","doi":"10.1007/s00607-024-01258-1","DOIUrl":"https://doi.org/10.1007/s00607-024-01258-1","url":null,"abstract":"<h3>Abstract</h3> <p>In this paper, we develop computing machinery within the framework of the String Multiset Rewriting calculus (SMSR), as defined by Barbuti et al. [<span>4</span>], to solve the SAT problem in linear time regarding the number of variables of a given conjunctive normal form. This shows that SMSR can be considered a computational model capable of significantly reducing the time requirement of classical decision problems. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"60 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV) 用于特设车辆互联网(IoV)的动态机会主义路由协议
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-05 DOI: 10.1007/s00607-023-01248-9

Abstract

Internet of Vehicles (IoV) aka V2X is a growing area of research that aims at information exchange between vehicles and all other related objects to develop intelligent transportation systems. IoVs are characterized by high mobility, high-speed internet, varying node density, and dynamic topology and aim to minimize and communicate situations like traffic congestion, accidents, etc. Discovering a routing path in a highly unstable network environment to ensure the successful delivery of packets with minimal overheads. Finding reliable routing links as against shortest path routing is a necessity in IoV networks. In this paper, a routing protocol coined as the dynamic opportunistic routing protocol for IoV (DORP-IoV) is presented. DORP-IoV is an on-demand position-based protocol that seeks the advantage of wireless broadcast advantage to select a hop close to the virtual line of sight between source and destination for communicating the information to the destination. Vehicle movement direction and vehicle density around the ideal hop location are also considered while selecting the next hop for information forwarding. Communicating the information through an optimal number of intermediate nodes is the novelty of the work which ensures better packet delivery with minimized delay and routing overheads. The performance of DORP-IoV is evaluated and results are compared with the performance of Weighted- Greedy Perimeter Coordinator Routing (W-GPCR), Greedy Perimeter Coordinator Routing, and Greedy Perimeter Stateless Routing for varying node density and network connections for various metrics. DORP-IoV shows an improved performance in the range of 8–12% for packet delivery with similar performance for average end-to-end delay compared to W-GPCR. The optimal hop selection mechanism in DORP-IoV reduces the number of hops by 10–30% compared to W-GPCR.

摘要 车联网(IoV)又称 V2X,是一个不断发展的研究领域,旨在实现车辆与所有其他相关物体之间的信息交换,以开发智能交通系统。IoVs 的特点是高流动性、高速互联网、不同的节点密度和动态拓扑结构,旨在最大限度地减少交通拥堵、事故等情况的发生并进行通信。在高度不稳定的网络环境中发现路由路径,确保以最小的开销成功发送数据包。与最短路径路由相比,寻找可靠的路由链接是物联网网络的必要条件。本文介绍了一种被称为物联网动态机会主义路由协议(DORP-IoV)的路由协议。DORP-IoV 是一种基于位置的按需协议,它利用无线广播优势,选择靠近源和目的地之间虚拟视线的一跳,将信息传送到目的地。在选择下一跳进行信息转发时,还要考虑理想跳点位置周围的车辆移动方向和车辆密度。通过最优数量的中间节点传递信息是这项工作的新颖之处,它确保了更好的数据包传递,同时最大限度地减少了延迟和路由开销。对 DORP-IoV 的性能进行了评估,并将评估结果与加权-贪婪周边协调器路由(W-GPCR)、贪婪周边协调器路由和贪婪周边无状态路由的性能进行了比较,后者适用于不同节点密度和网络连接的各种指标。与 W-GPCR 相比,DORP-IoV 的数据包传输性能提高了 8-12%,平均端到端延迟性能与 W-GPCR 相似。与 W-GPCR 相比,DORP-IoV 中的最优跳数选择机制减少了 10-30% 的跳数。
{"title":"Dynamic opportunistic routing protocol for ad-hoc Internet of Vehicles (IoV)","authors":"","doi":"10.1007/s00607-023-01248-9","DOIUrl":"https://doi.org/10.1007/s00607-023-01248-9","url":null,"abstract":"<h3>Abstract</h3> <p>Internet of Vehicles (IoV) aka V2X is a growing area of research that aims at information exchange between vehicles and all other related objects to develop intelligent transportation systems. IoVs are characterized by high mobility, high-speed internet, varying node density, and dynamic topology and aim to minimize and communicate situations like traffic congestion, accidents, etc. Discovering a routing path in a highly unstable network environment to ensure the successful delivery of packets with minimal overheads. Finding reliable routing links as against shortest path routing is a necessity in IoV networks. In this paper, a routing protocol coined as the dynamic opportunistic routing protocol for IoV (DORP-IoV) is presented. DORP-IoV is an on-demand position-based protocol that seeks the advantage of wireless broadcast advantage to select a hop close to the virtual line of sight between source and destination for communicating the information to the destination. Vehicle movement direction and vehicle density around the ideal hop location are also considered while selecting the next hop for information forwarding. Communicating the information through an optimal number of intermediate nodes is the novelty of the work which ensures better packet delivery with minimized delay and routing overheads. The performance of DORP-IoV is evaluated and results are compared with the performance of Weighted- Greedy Perimeter Coordinator Routing (W-GPCR), Greedy Perimeter Coordinator Routing, and Greedy Perimeter Stateless Routing for varying node density and network connections for various metrics. DORP-IoV shows an improved performance in the range of 8–12% for packet delivery with similar performance for average end-to-end delay compared to W-GPCR. The optimal hop selection mechanism in DORP-IoV reduces the number of hops by 10–30% compared to W-GPCR. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"19 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139761529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization 基于鲸鱼优化算法和哈里斯-霍克斯优化的物联网聚类和路由选择的新型能量感知方法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-03 DOI: 10.1007/s00607-023-01252-z
Ehsan Heidari

Smart objects in the Internet of Things (IoT) communicate with one another, gather information, and respond to users requests. In these systems, wireless sensors are used to collect data and monitor the environment at the lowest level. In IoT applications, wireless sensor networks play a pivotal role. Since IoT devices often use batteries, efficiency is important to them such that IoT-related standards and research efforts focus more on energy saving or conservation. In this paper, we have used two meta-heuristics algorithm for clustering and routing in IoT. We cluster the network using a clustering method called WOA-clustering based on the meta-heuristic Whale Optimization Algorithm (WOA) and select the optimal cluster heads. We then use a routing method called HHO-Routing based on the Harris Hawks Optimization (HHO) algorithm, a novel meta-heuristic algorithm, to route the cluster heads to BS. The use of the above methods results in reduced power consumption for reaching the base station (BS). Also, to prove the optimal performance of the proposed methods, these methods were simulated and compared with five different methods in a similar context. It was observed that the consumed energy, the number of survival cycles for the death of the first node, and the data transmission rate were improved. The proposed method is simulated in cooja simulator, and for a more accurate evaluation, we compare it with UCCGRA, PSO-SD, PUDCRP, EECRA, EEMRP algorithms. We see that the proposed method performs better than other methods in terms of energy consumption and network lifespan.

物联网(IoT)中的智能物体可以相互通信、收集信息并响应用户请求。在这些系统中,无线传感器用于收集数据和监控最底层的环境。在物联网应用中,无线传感器网络发挥着举足轻重的作用。由于物联网设备经常使用电池,因此效率对它们来说非常重要,因此物联网相关标准和研究工作更侧重于节能或节电。在本文中,我们使用了两种元启发式算法,用于物联网中的聚类和路由选择。我们基于元启发式鲸鱼优化算法(WOA),使用一种名为 WOA-clustering 的聚类方法对网络进行聚类,并选择最优簇头。然后,我们使用基于元启发式算法 Harris Hawks Optimization(HHO)的路由方法 HHO-Routing,将簇头路由到 BS。上述方法的使用降低了到达基站(BS)的功耗。此外,为了证明所提方法的最佳性能,还对这些方法进行了模拟,并与类似情况下的五种不同方法进行了比较。结果表明,所消耗的能量、第一个节点死亡时的存活周期数和数据传输速率都有所提高。我们在 cooja 模拟器中模拟了所提出的方法,并将其与 UCCGRA、PSO-SD、PUDCRP、EECRA 和 EEMRP 算法进行了比较,以获得更准确的评估。我们发现,在能量消耗和网络寿命方面,建议的方法比其他方法表现得更好。
{"title":"A novel energy-aware method for clustering and routing in IoT based on whale optimization algorithm & Harris Hawks optimization","authors":"Ehsan Heidari","doi":"10.1007/s00607-023-01252-z","DOIUrl":"https://doi.org/10.1007/s00607-023-01252-z","url":null,"abstract":"<p>Smart objects in the Internet of Things (IoT) communicate with one another, gather information, and respond to users requests. In these systems, wireless sensors are used to collect data and monitor the environment at the lowest level. In IoT applications, wireless sensor networks play a pivotal role. Since IoT devices often use batteries, efficiency is important to them such that IoT-related standards and research efforts focus more on energy saving or conservation. In this paper, we have used two meta-heuristics algorithm for clustering and routing in IoT. We cluster the network using a clustering method called WOA-clustering based on the meta-heuristic Whale Optimization Algorithm (WOA) and select the optimal cluster heads. We then use a routing method called HHO-Routing based on the Harris Hawks Optimization (HHO) algorithm, a novel meta-heuristic algorithm, to route the cluster heads to BS. The use of the above methods results in reduced power consumption for reaching the base station (BS). Also, to prove the optimal performance of the proposed methods, these methods were simulated and compared with five different methods in a similar context. It was observed that the consumed energy, the number of survival cycles for the death of the first node, and the data transmission rate were improved. The proposed method is simulated in cooja simulator, and for a more accurate evaluation, we compare it with UCCGRA, PSO-SD, PUDCRP, EECRA, EEMRP algorithms. We see that the proposed method performs better than other methods in terms of energy consumption and network lifespan.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"223 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139679379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A priority aware local mutual exclusion algorithm for flying ad hoc networks 飞行临时网络的优先级感知局部互斥算法
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-30 DOI: 10.1007/s00607-023-01250-1
Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam

In Flying Ad Hoc Networks (FANETs), the critical resource resides in an Unmanned Aerial Vehicle (UAV) and the user nodes within the UAV’s neighborhood defined by its transmission range can request for it. In Local Mutual Exclusion (LME), two nodes in the same neighborhood cannot execute the Critical Section (CS) simultaneously, but two non-neighboring nodes can be in the CS at the same time. This is a variation of traditional Mutual Exclusion (ME). The proposed Priority Aware - Request Collector Local Mutual Exclusion (PA-RCLME) algorithm ensures prioritized LME in such FANET structures. The proposed PA-RCLME algorithm is token-based and takes into account the priority of CS requests. It leverages a slow ageing technique to prevent starvation, to avoid a profusion of priority inversions, and to ensure the bounded waiting property of mutual exclusion algorithms. This algorithm introduces a neighborhood search technique that makes the token holder a secondary request collector, thereby reducing average request latency and increasing efficiency. The rapid movement of UAVs and other user nodes makes FANET topology highly dynamic and fault-prone. PA-RCLME algorithm handles it gracefully. Opportunistic Node Simulator (ONE) is used to simulate the algorithm and appropriate performance metrics have been recorded. A comparative analysis with the existing algorithm in the literature is also presented, and the proposed algorithm performs better.

在飞行 Ad Hoc 网络(FANET)中,关键资源位于无人飞行器(UAV)中,UAV 传输范围所定义的邻域内的用户节点可以请求获得关键资源。在本地互斥(LME)中,同一邻域内的两个节点不能同时执行关键部分(CS),但两个非邻域节点可以同时执行关键部分。这是传统互斥(ME)的一种变体。所提出的优先级感知-请求收集器本地互斥(PA-RCLME)算法可确保这种 FANET 结构中的优先级 LME。拟议的 PA-RCLME 算法基于令牌,并考虑了 CS 请求的优先级。它利用缓慢的老化技术来防止饥饿,避免大量优先级倒置,并确保互斥算法的有界等待属性。该算法引入了邻域搜索技术,使令牌持有者成为二级请求收集者,从而减少了平均请求延迟并提高了效率。无人机和其他用户节点的快速移动使得 FANET 拓扑高度动态且易出错。PA-RCLME 算法可从容应对。机会节点模拟器(ONE)用于模拟该算法,并记录了适当的性能指标。此外,还与文献中的现有算法进行了比较分析,结果表明所提出的算法性能更好。
{"title":"A priority aware local mutual exclusion algorithm for flying ad hoc networks","authors":"Guruprasad Kapilesh, Sridhar Dhanush, Venkatesan Poovazhaki Gokula Kannan, Viswasam Mary Anita Rajam","doi":"10.1007/s00607-023-01250-1","DOIUrl":"https://doi.org/10.1007/s00607-023-01250-1","url":null,"abstract":"<p>In Flying Ad Hoc Networks (FANETs), the critical resource resides in an Unmanned Aerial Vehicle (UAV) and the user nodes within the UAV’s neighborhood defined by its transmission range can request for it. In Local Mutual Exclusion (LME), two nodes in the same neighborhood cannot execute the Critical Section (CS) simultaneously, but two non-neighboring nodes can be in the CS at the same time. This is a variation of traditional Mutual Exclusion (ME). The proposed Priority Aware - Request Collector Local Mutual Exclusion (PA-RCLME) algorithm ensures prioritized LME in such FANET structures. The proposed PA-RCLME algorithm is token-based and takes into account the priority of CS requests. It leverages a slow ageing technique to prevent starvation, to avoid a profusion of priority inversions, and to ensure the bounded waiting property of mutual exclusion algorithms. This algorithm introduces a neighborhood search technique that makes the token holder a secondary request collector, thereby reducing average request latency and increasing efficiency. The rapid movement of UAVs and other user nodes makes FANET topology highly dynamic and fault-prone. PA-RCLME algorithm handles it gracefully. Opportunistic Node Simulator (ONE) is used to simulate the algorithm and appropriate performance metrics have been recorded. A comparative analysis with the existing algorithm in the literature is also presented, and the proposed algorithm performs better.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"40 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139647833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Community detection of weighted complex networks via transitive closure 通过传递闭包检测加权复杂网络的群落
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-29 DOI: 10.1007/s00607-023-01249-8
Ahmadi Hasan, Ahmad Kamal

The K-means algorithm has been successfully applied to many complex network analysis problems. However, this method is sensitive to how the first cluster centers are chosen. It is possible to minimize superfluous runs by choosing the first cluster center in advance because each run produces a unique set of results. To overcome this issue, an algorithm for Community Detection based on Transitive Closure (CoDTC) has been introduced. In this algorithm, the initial cluster center is provided by degree centrality and T-transitive closure. The algorithm initializes with the calculation of the similarity relation matrix. Then, to avoid the limitation of sparse problems in complex network analysis, we offer the idea of transitive closure on weighted networks to solve the sparsity issue. This notion is based on imposing a t-norm inequality on the connection weights and providing a method to compute them. Finally, based on T-transitive closure, new cluster centers are calculated iteratively to avoid random selection of cluster centers. In this paper, we demonstrate the efficacy of the CoDTC approach on a diverse range of real and artificial networks, encompassing both big and small communities.

K-means 算法已成功应用于许多复杂的网络分析问题。不过,这种方法对如何选择第一个聚类中心很敏感。由于每次运行都会产生一组唯一的结果,因此可以通过提前选择第一个聚类中心来尽量减少多余的运行。为了克服这个问题,我们引入了一种基于 Transitive Closure 的群落检测算法(CoDTC)。在该算法中,初始聚类中心由度中心性和 T 传递闭合提供。该算法通过计算相似性关系矩阵进行初始化。然后,为了避免复杂网络分析中稀疏问题的限制,我们提出了在加权网络上进行传递封闭的想法,以解决稀疏问题。这一概念基于对连接权重施加 t-norm 不等式,并提供了一种计算方法。最后,在 T 传递闭合的基础上,迭代计算新的聚类中心,以避免随机选择聚类中心。在本文中,我们展示了 CoDTC 方法在各种真实和人工网络中的有效性,包括大型和小型社区。
{"title":"Community detection of weighted complex networks via transitive closure","authors":"Ahmadi Hasan, Ahmad Kamal","doi":"10.1007/s00607-023-01249-8","DOIUrl":"https://doi.org/10.1007/s00607-023-01249-8","url":null,"abstract":"<p>The K-means algorithm has been successfully applied to many complex network analysis problems. However, this method is sensitive to how the first cluster centers are chosen. It is possible to minimize superfluous runs by choosing the first cluster center in advance because each run produces a unique set of results. To overcome this issue, an algorithm for Community Detection based on Transitive Closure (CoDTC) has been introduced. In this algorithm, the initial cluster center is provided by degree centrality and T-transitive closure. The algorithm initializes with the calculation of the similarity relation matrix. Then, to avoid the limitation of sparse problems in complex network analysis, we offer the idea of transitive closure on weighted networks to solve the sparsity issue. This notion is based on imposing a t-norm inequality on the connection weights and providing a method to compute them. Finally, based on T-transitive closure, new cluster centers are calculated iteratively to avoid random selection of cluster centers. In this paper, we demonstrate the efficacy of the CoDTC approach on a diverse range of real and artificial networks, encompassing both big and small communities.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"398 1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things TEDA:基于可信执行环境和区块链的物联网数据保护架构
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-26 DOI: 10.1007/s00607-023-01253-y

Abstract

With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84 (times ) and 1.07 (times ) than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94 (times ) and 0.90 (times ) than that of TEDA without SGX, which indicate TEDA has a good performance.

摘要 随着物联网(IoT)的普及,每秒钟都会产生大量数据。通过分析这些数据,攻击者可以发起各种攻击以谋取利益,如数据篡改、恶意数据注入、身份欺骗等。为了解决这些问题,本文提出了基于可信执行环境和区块链的数据保护架构(TEDA)。在 TEDA 中,不同物联网的边缘设备维护一个联盟区块链,与云端一起实现数据的安全读写操作和验证。此外,为了确保边缘设备本地数据处理的安全,并管理内部轻量级设备,设计了基于英特尔 SGX 的模块。此外,还引入了一种新的事务结构来保护用户的访问模式。实验结果表明,与不带SGX的TEDA相比,带SGX的TEDA写入和读取的空间占用率分别为0.84(次)和1.07(次);与不带SGX的TEDA相比,带SGX的TEDA写入和读取的时间占用率分别为0.94(次)和0.90(次),这表明TEDA具有良好的性能。
{"title":"TEDA: a trusted execution environment-and-blockchain-based data protection architecture for Internet of Things","authors":"","doi":"10.1007/s00607-023-01253-y","DOIUrl":"https://doi.org/10.1007/s00607-023-01253-y","url":null,"abstract":"<h3>Abstract</h3> <p>With the popularity of the Internet of Things (IoT), massive amounts of data are generated every second. By analyzing this data, attackers can launch kinds of attacks for their own profits, such as data tampering, malicious data injection, identity deception etc. To solve these problems, in this paper, we propose a Trusted Execution Environment-and-Blockchain-based data protection architecture (TEDA). In TEDA, edge devices in different IoTs maintain a consortium blockchain to achieve the secure read/write operations and verification of data together with cloud. Besides, to secure the local data processing in edge devices and manage internal light-weight devices, an Intel SGX-based module is designed. Furthermore, a new transaction structure is introduced to protect user’s access pattern. The experimental results show that the space occupancy rates of write and read of TEDA with SGX are 0.84<span> <span>(times )</span> </span> and 1.07<span> <span>(times )</span> </span> than that of TEDA without SGX, and the time occupancy rates of write and read of TEDA with SGX are 0.94<span> <span>(times )</span> </span> and 0.90<span> <span>(times )</span> </span> than that of TEDA without SGX, which indicate TEDA has a good performance. </p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"65 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139587204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion Mconvkgc:用于完成知识图谱的新型多通道卷积模型
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-25 DOI: 10.1007/s00607-023-01247-w
Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun

The incompleteness of the knowledge graph limits its applications to various downstream tasks. To this end, numerous influential knowledge graph embedding models have been presented and have made great achievements in the domain of knowledge graph completion. However, most of these models only pay attention to the extraction of latent knowledge or translational features, and cannot comprehensively capture the surface semantics, latent interactions, and translational characteristics of triples. In this paper, a novel multi-channel convolutional model, MConvKGC, is presented for knowledge graph completion, which has three feature extraction channels and employs them to simultaneously extract shallow semantics, latent interactions, and translational characteristics, respectively. In addition, MConvKGC adopts an asymmetric convolutional block to comprehensively extract the latent interactions from triples, and process the generated feature maps with various attention mechanisms to further learn local dependencies between entities and relations. The results of the conducted link prediction experiments on FB15k-237, WN18RR, and UMLS indicate that our proposed MConvKGC shows excellent performance and outperforms previous state-of-the-art KGE models in the majority of cases.

知识图谱的不完整性限制了它在各种下游任务中的应用。为此,人们提出了许多有影响力的知识图谱嵌入模型,并在知识图谱完备领域取得了巨大成就。然而,这些模型大多只关注潜在知识或平移特征的提取,无法全面捕捉三元组的表层语义、潜在交互和平移特征。本文针对知识图谱补全提出了一种新颖的多通道卷积模型 MConvKGC,它有三个特征提取通道,分别用于同时提取浅层语义、潜在交互和平移特征。此外,MConvKGC 还采用非对称卷积块全面提取三元组中的潜在交互,并利用各种注意机制处理生成的特征图,进一步学习实体和关系之间的局部依赖关系。在 FB15k-237、WN18RR 和 UMLS 上进行的链接预测实验结果表明,我们提出的 MConvKGC 表现出色,在大多数情况下都优于之前最先进的 KGE 模型。
{"title":"Mconvkgc: a novel multi-channel convolutional model for knowledge graph completion","authors":"Xiaochuan Sun, Qi Chen, Mingxiang Hao, Yingqi Li, Bo Sun","doi":"10.1007/s00607-023-01247-w","DOIUrl":"https://doi.org/10.1007/s00607-023-01247-w","url":null,"abstract":"<p>The incompleteness of the knowledge graph limits its applications to various downstream tasks. To this end, numerous influential knowledge graph embedding models have been presented and have made great achievements in the domain of knowledge graph completion. However, most of these models only pay attention to the extraction of latent knowledge or translational features, and cannot comprehensively capture the surface semantics, latent interactions, and translational characteristics of triples. In this paper, a novel multi-channel convolutional model, MConvKGC, is presented for knowledge graph completion, which has three feature extraction channels and employs them to simultaneously extract shallow semantics, latent interactions, and translational characteristics, respectively. In addition, MConvKGC adopts an asymmetric convolutional block to comprehensively extract the latent interactions from triples, and process the generated feature maps with various attention mechanisms to further learn local dependencies between entities and relations. The results of the conducted link prediction experiments on FB15k-237, WN18RR, and UMLS indicate that our proposed MConvKGC shows excellent performance and outperforms previous state-of-the-art KGE models in the majority of cases.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"3 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed mobile CEP for collaborative social computing 用于协作式社交计算的分布式移动 CEP
IF 3.7 3区 计算机科学 Q2 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-24 DOI: 10.1007/s00607-023-01254-x
Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás

Smartphones have become highly personalized interfaces between people and the technology ecosystem around them. In this sense, they play a key role for a technology shift from the current Internet of Things to a future human-centric paradigm of an Internet of People, automatically adapting smart things and services to the preferences and context of their users. In this paper, we propose the use of Complex Event Processing (CEP) engines deployed in the users’ smartphones granting them context-awareness capabilities in order to react to external stimulus, and enabling them to interact both with smart things and services in the surroundings of the users. With that purpose, we have designed a communication architecture that interconnects CEP engines running on smartphones, providing a framework for building applications for Mobile-based Collaborative Social Computing (MCSC). For that, we make use of previous works of the authors with Digital Avatars, a framework which promotes the use of smartphones for inferring and sharing a unique digital avatar or virtual profile of each user. The resulting framework, which we have called Collaborative CEP, allows to implement complex interactions among users, and between them and the IoT, a common need in Collaborative Social Computing applications. We provide a proof of concept based on the implementation of a Cops and Robbers game to test the expressiveness and correct functioning of the framework, and we evaluate its performance and efficiency.

智能手机已成为人与周围技术生态系统之间高度个性化的界面。从这个意义上说,智能手机在从当前的物联网向未来以人为本的人联网技术转变中扮演着关键角色,它能根据用户的喜好和环境自动调整智能设备和服务。在本文中,我们建议在用户的智能手机中部署复杂事件处理(CEP)引擎,赋予其情境感知能力,以便对外界刺激做出反应,并使其能够与用户周围的智能事物和服务进行交互。为此,我们设计了一种将智能手机上运行的 CEP 引擎相互连接起来的通信架构,为构建基于移动的协同社交计算(MCSC)应用提供了一个框架。为此,我们利用了作者以前在数字头像方面的工作成果,这是一个促进使用智能手机推断和共享每个用户的独特数字头像或虚拟个人资料的框架。我们将由此产生的框架称为 "协作式 CEP",它可以实现用户之间以及用户与物联网之间的复杂互动,而这正是协作式社交计算应用的共同需求。我们提供了一个基于 "警察与强盗 "游戏的概念验证,以测试该框架的表现力和正确运作,并对其性能和效率进行了评估。
{"title":"Distributed mobile CEP for collaborative social computing","authors":"Alejandro Pérez-Vereda, Carlos Canal, Ramón Hervás","doi":"10.1007/s00607-023-01254-x","DOIUrl":"https://doi.org/10.1007/s00607-023-01254-x","url":null,"abstract":"<p>Smartphones have become highly personalized interfaces between people and the technology ecosystem around them. In this sense, they play a key role for a technology shift from the current Internet of Things to a future human-centric paradigm of an Internet of People, automatically adapting smart things and services to the preferences and context of their users. In this paper, we propose the use of Complex Event Processing (CEP) engines deployed in the users’ smartphones granting them context-awareness capabilities in order to react to external stimulus, and enabling them to interact both with smart things and services in the surroundings of the users. With that purpose, we have designed a communication architecture that interconnects CEP engines running on smartphones, providing a framework for building applications for Mobile-based Collaborative Social Computing (MCSC). For that, we make use of previous works of the authors with Digital Avatars, a framework which promotes the use of smartphones for inferring and sharing a unique digital avatar or virtual profile of each user. The resulting framework, which we have called Collaborative CEP, allows to implement complex interactions among users, and between them and the IoT, a common need in Collaborative Social Computing applications. We provide a proof of concept based on the implementation of a Cops and Robbers game to test the expressiveness and correct functioning of the framework, and we evaluate its performance and efficiency.</p>","PeriodicalId":10718,"journal":{"name":"Computing","volume":"1 1","pages":""},"PeriodicalIF":3.7,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139552361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1