首页 > 最新文献

Int. J. Found. Comput. Sci.最新文献

英文 中文
Locating Number of Biswapped Networks 定位双瓦网络个数
Pub Date : 2022-08-11 DOI: 10.1142/s0129054122420096
M. Nadeem, Waqar Ali, H. M. A. Siddiqui
A biswapped network is an interconnection network in multiprocessor systems. These are networks of devices or processors and connections of these devices or processors. Here network can be expressed in the form of a graph. Devices or processors represent vertices, and the connection of devices or processors represents edges. The subset of the nodes set is called the resolving set if all the representations or codes are different w.r.t. this subset gives the information about the complete network. The minimum cardinality of the resolving set is called the locating number. In this article, we find the locating number of biswapped interconnection networks. In this paper, We compute the exact values of locating numbers for biswapped networks generated by different families of underlying basis networks like path, cycle, power of path, and complete. We have also given the bounds of locating number of any biswapped network generated by any underlying basis network that consists of its clusters.
双交换网络是多处理机系统中的一种互连网络。这些是由设备或处理器组成的网络以及这些设备或处理器之间的连接。在这里,网络可以用图的形式表示。设备或处理器表示顶点,设备或处理器的连接表示边。如果所有的表示或代码都是不同的,那么节点集的子集称为解析集,这个子集给出了关于整个网络的信息。解析集的最小基数称为定位数。在本文中,我们找到了双波互连网络的定位数量。本文计算了由路径、循环、路径功率和完备等不同基网络族生成的双波网络的定位数的精确值。我们还给出了由其簇组成的任意底层基网络生成的任意双波网络的定位数的界。
{"title":"Locating Number of Biswapped Networks","authors":"M. Nadeem, Waqar Ali, H. M. A. Siddiqui","doi":"10.1142/s0129054122420096","DOIUrl":"https://doi.org/10.1142/s0129054122420096","url":null,"abstract":"A biswapped network is an interconnection network in multiprocessor systems. These are networks of devices or processors and connections of these devices or processors. Here network can be expressed in the form of a graph. Devices or processors represent vertices, and the connection of devices or processors represents edges. The subset of the nodes set is called the resolving set if all the representations or codes are different w.r.t. this subset gives the information about the complete network. The minimum cardinality of the resolving set is called the locating number. In this article, we find the locating number of biswapped interconnection networks. In this paper, We compute the exact values of locating numbers for biswapped networks generated by different families of underlying basis networks like path, cycle, power of path, and complete. We have also given the bounds of locating number of any biswapped network generated by any underlying basis network that consists of its clusters.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130767314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Isolated Rupture in Composite Networks 复合网络中的孤立破裂
Pub Date : 2022-07-28 DOI: 10.1142/s0129054122500204
H. Yildirim, Zeynep Nihan Berberler
Computer networks are prone to targeted attacks and random failures. Robustness is a measure of an ability of a network to continue functioning when part of the network is either naturally damaged or targeted for attack. The study of network robustness is a critical tool in the characterization and understanding of complex interconnected systems. There are several proposed graph metrics that predicates network resilience against such attacks. Isolated rupture degree is a novel graph-theoretic concept defined as a measure of network vulnerability. Isolated rupture degree is argued as an appropriate measure for modelling the robustness of network topologies in the face of possible node destruction. In this paper, the relationships between isolated rupture degree and some other graph parameters such as connectivity, covering number, minimum vertex degree are established. The isolated rupture degrees of [Formula: see text]-free graphs, middle graphs, corona graphs of a middle graph and a complete graph [Formula: see text] on two vertices are evaluated, then compared and the more stable graph types are reported. A sharp upper bound for the isolated rupture degree of middle graphs is established.
计算机网络容易受到有针对性的攻击和随机故障。鲁棒性是衡量网络在部分网络自然损坏或成为攻击目标时继续运行的能力。网络鲁棒性的研究是表征和理解复杂互联系统的关键工具。有几个建议的图形度量来预测网络对此类攻击的弹性。孤立破裂度是一个新的图论概念,是对网络脆弱性的度量。孤立破裂度被认为是在面对可能的节点破坏时建模网络拓扑鲁棒性的适当度量。建立了孤立破裂度与图的连通性、覆盖数、最小顶点度等参数之间的关系。对[公式:见文]自由图、中间图、中间图的电晕图和完全图[公式:见文]在两个顶点上的孤立破裂程度进行了评价,然后进行比较,并报告了更稳定的图类型。建立了中间图的孤立破裂度的尖锐上界。
{"title":"Isolated Rupture in Composite Networks","authors":"H. Yildirim, Zeynep Nihan Berberler","doi":"10.1142/s0129054122500204","DOIUrl":"https://doi.org/10.1142/s0129054122500204","url":null,"abstract":"Computer networks are prone to targeted attacks and random failures. Robustness is a measure of an ability of a network to continue functioning when part of the network is either naturally damaged or targeted for attack. The study of network robustness is a critical tool in the characterization and understanding of complex interconnected systems. There are several proposed graph metrics that predicates network resilience against such attacks. Isolated rupture degree is a novel graph-theoretic concept defined as a measure of network vulnerability. Isolated rupture degree is argued as an appropriate measure for modelling the robustness of network topologies in the face of possible node destruction. In this paper, the relationships between isolated rupture degree and some other graph parameters such as connectivity, covering number, minimum vertex degree are established. The isolated rupture degrees of [Formula: see text]-free graphs, middle graphs, corona graphs of a middle graph and a complete graph [Formula: see text] on two vertices are evaluated, then compared and the more stable graph types are reported. A sharp upper bound for the isolated rupture degree of middle graphs is established.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"111 3S 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133704641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Bipartization Problem with Applications to Via Minimization in VLSI Design 图二分问题及其在VLSI设计中的应用
Pub Date : 2022-07-22 DOI: 10.1142/s0129054122500198
Lan Lin, Yixun Lin
The bipartization problem for a graph [Formula: see text] asks for finding a subset [Formula: see text] of [Formula: see text] such that the induced subgraph [Formula: see text] is bipartite and [Formula: see text] is maximized. This problem has significant applications in the via minimization of VLSI design. The problem has been proved NP-complete and the fixed parameter solvability has been known in the literature. This paper presents several polynomial-time algorithms for special graph families, such as split graphs, co-bipartite graphs, chordal graphs, and permutation graphs.
图[公式:见文]的两部分问题要求找到[公式:见文]的一个子集[公式:见文],使得诱导子图[公式:见文]是二部的,并且[公式:见文]是最大化的。该问题在超大规模集成电路设计中具有重要的应用价值。该问题已被证明是np完全的,并且已知其定参数可解性。本文提出了几种特殊图族的多项式时间算法,如分割图、协二部图、弦图和置换图。
{"title":"Graph Bipartization Problem with Applications to Via Minimization in VLSI Design","authors":"Lan Lin, Yixun Lin","doi":"10.1142/s0129054122500198","DOIUrl":"https://doi.org/10.1142/s0129054122500198","url":null,"abstract":"The bipartization problem for a graph [Formula: see text] asks for finding a subset [Formula: see text] of [Formula: see text] such that the induced subgraph [Formula: see text] is bipartite and [Formula: see text] is maximized. This problem has significant applications in the via minimization of VLSI design. The problem has been proved NP-complete and the fixed parameter solvability has been known in the literature. This paper presents several polynomial-time algorithms for special graph families, such as split graphs, co-bipartite graphs, chordal graphs, and permutation graphs.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134535229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Vulnerability of Some Transformation Networks 部分转换网络的脆弱性分析
Pub Date : 2022-07-18 DOI: 10.1142/s0129054122500162
V. Aytaç, T. Turacı
In several different applications and contexts, networks are essential frameworks and appear.Vulnerability value is a measure of the network’s durability in the face of damage that may lead to a reduction or complete loss of the network’s particular functionality. The domination number and it’s types can be used network vulnerability parameters. Recently, the disjunctive total domination number has been defined by Henning and Naicker. In this paper, the disjunctive total domination numbers of the transformation graph [Formula: see text] when [Formula: see text] of some graphs [Formula: see text] have been obtained. Furthermore, some new general results have been given for the parameter mentioned above.
在许多不同的应用程序和环境中,网络是必不可少的框架。脆弱性值是衡量网络在面对可能导致网络特定功能减少或完全丧失的损害时的耐久性。支配数及其类型可用于网络漏洞参数。最近,析取总支配数被Henning和Naicker定义。本文得到了某些图[公式:见文]的[公式:见文]的[图]的[析取总支配数]。此外,还对上述参数给出了一些新的一般性结果。
{"title":"Analysis of Vulnerability of Some Transformation Networks","authors":"V. Aytaç, T. Turacı","doi":"10.1142/s0129054122500162","DOIUrl":"https://doi.org/10.1142/s0129054122500162","url":null,"abstract":"In several different applications and contexts, networks are essential frameworks and appear.Vulnerability value is a measure of the network’s durability in the face of damage that may lead to a reduction or complete loss of the network’s particular functionality. The domination number and it’s types can be used network vulnerability parameters. Recently, the disjunctive total domination number has been defined by Henning and Naicker. In this paper, the disjunctive total domination numbers of the transformation graph [Formula: see text] when [Formula: see text] of some graphs [Formula: see text] have been obtained. Furthermore, some new general results have been given for the parameter mentioned above.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Dynamic Obstacle Avoidance Algorithm for Basketball Robot Based on Multi-Sensor Data Fusion Technology 基于多传感器数据融合技术的篮球机器人模糊动态避障算法
Pub Date : 2022-07-04 DOI: 10.1142/s0129054122420084
Feng Shi, X. Hu
This paper uses multi-sensor data fusion technology to design and develop a multi-sensor based basketball robot’s target recognition and positioning system in an unknown environment. We establish the movement model of the basketball robot, and combine the hardware configuration of the basketball robot, analyse the methods of speed control, position control, and direction control, propose a fuzzy obstacle avoidance strategy in the basketball robot movement process, and simulate the obstacle avoidance strategy. The simulation results show that the proposed fuzzy obstacle avoidance strategy is effective. Carry out the experiment of basketball robot target calibration, build the basketball robot monitoring system, and realize data transmission and real-time image processing. Experiments show that the basketball robot can achieve target recognition and positioning tasks in an unknown environment (obstacle comparison rules). It proves the effectiveness and robustness of the proposed following algorithm. It illustrates the effectiveness of the system designed in this paper.
本文利用多传感器数据融合技术,设计开发了一种基于多传感器的未知环境下篮球机器人目标识别定位系统。建立了篮球机器人的运动模型,结合篮球机器人的硬件配置,分析了速度控制、位置控制和方向控制的方法,提出了篮球机器人运动过程中的模糊避障策略,并对避障策略进行了仿真。仿真结果表明,所提出的模糊避障策略是有效的。开展篮球机器人目标标定实验,搭建篮球机器人监控系统,实现数据传输和实时图像处理。实验表明,该篮球机器人能够在未知环境(障碍比较规则)下完成目标识别和定位任务。验证了该算法的有效性和鲁棒性。验证了本文所设计的系统的有效性。
{"title":"Fuzzy Dynamic Obstacle Avoidance Algorithm for Basketball Robot Based on Multi-Sensor Data Fusion Technology","authors":"Feng Shi, X. Hu","doi":"10.1142/s0129054122420084","DOIUrl":"https://doi.org/10.1142/s0129054122420084","url":null,"abstract":"This paper uses multi-sensor data fusion technology to design and develop a multi-sensor based basketball robot’s target recognition and positioning system in an unknown environment. We establish the movement model of the basketball robot, and combine the hardware configuration of the basketball robot, analyse the methods of speed control, position control, and direction control, propose a fuzzy obstacle avoidance strategy in the basketball robot movement process, and simulate the obstacle avoidance strategy. The simulation results show that the proposed fuzzy obstacle avoidance strategy is effective. Carry out the experiment of basketball robot target calibration, build the basketball robot monitoring system, and realize data transmission and real-time image processing. Experiments show that the basketball robot can achieve target recognition and positioning tasks in an unknown environment (obstacle comparison rules). It proves the effectiveness and robustness of the proposed following algorithm. It illustrates the effectiveness of the system designed in this paper.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125015066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedded Edge-Connectivity Reliability Evaluation of Augmented Hypercube Interconnection Networks 增强超立方体互联网络的嵌入式边缘连接可靠性评估
Pub Date : 2022-06-30 DOI: 10.1142/s0129054122500150
Mingzu Zhang, Hongxi Liu, Pingping Li
In the contemporary world, to meet the increasing need to deal with massive data, the interconnection networks for large-scale parallel and distributed systems need to expand for stronger scalability requirements. Let [Formula: see text] be a recursive [Formula: see text]-dimensional network. Since the presence of faulty links or processors may disconnect the entire network, one hopes that every remaining processor lies in an undamaged lower-dimensional subnetwork. Under this circumstance, in 2012, Yang and Wang first proposed the conception of [Formula: see text]-embedded edge-connectivity [Formula: see text] of [Formula: see text], which is defined as the minimum number of links whose removal results in several disconnected components, and each processor is contained in an [Formula: see text]-dimensional subnetwork [Formula: see text]. The augmented cube, denoted by [Formula: see text], proposed by Choudum and Sunitha, is a momentous variant of the hypercube as an interconnection topology of parallel computing. It retains many favorable properties of the hypercube and possesses several embedded properties that the hypercube and other variations do not have. For [Formula: see text] and [Formula: see text], this paper determines [Formula: see text]-embedded edge-connectivity of [Formula: see text]-dimensional augmented cube, [Formula: see text], and shows exact values [Formula: see text], where [Formula: see text] if [Formula: see text], and [Formula: see text] otherwise. The parameters can provide more accurate measurements for the reliability and fault-tolerance of the corresponding systems.
当今世界,为了满足日益增长的海量数据处理需求,大规模并行和分布式系统的互联网络需要进行扩展,以满足更强的可扩展性要求。设[公式:见文]是一个递归的[公式:见文]维网络。由于故障链路或处理器的存在可能会断开整个网络,因此人们希望每个剩余的处理器都位于未损坏的低维子网中。在这种情况下,2012年,Yang和Wang首次提出了[公式:见文]的[公式:见文]-嵌入式边缘连通性[公式:见文]的概念,将其定义为链路的最小数量,这些链路的移除导致多个组件断开,每个处理器都包含在一个[公式:见文]维子网络[公式:见文]中。由Choudum和Sunitha提出的增广立方体,用[公式:见文本]表示,是超立方体作为并行计算互连拓扑的重要变体。它保留了超立方体的许多有利特性,并具有超立方体和其他变体所不具备的一些嵌入特性。对于[公式:见文]和[公式:见文],本文确定了[公式:见文]维增广立方体[公式:见文]的[公式:见文]嵌入边连通性[公式:见文],并给出了精确值[公式:见文],其中[公式:见文]如果[公式:见文],则[公式:见文],否则为[公式:见文]。这些参数可以为相应系统的可靠性和容错性提供更精确的测量。
{"title":"Embedded Edge-Connectivity Reliability Evaluation of Augmented Hypercube Interconnection Networks","authors":"Mingzu Zhang, Hongxi Liu, Pingping Li","doi":"10.1142/s0129054122500150","DOIUrl":"https://doi.org/10.1142/s0129054122500150","url":null,"abstract":"In the contemporary world, to meet the increasing need to deal with massive data, the interconnection networks for large-scale parallel and distributed systems need to expand for stronger scalability requirements. Let [Formula: see text] be a recursive [Formula: see text]-dimensional network. Since the presence of faulty links or processors may disconnect the entire network, one hopes that every remaining processor lies in an undamaged lower-dimensional subnetwork. Under this circumstance, in 2012, Yang and Wang first proposed the conception of [Formula: see text]-embedded edge-connectivity [Formula: see text] of [Formula: see text], which is defined as the minimum number of links whose removal results in several disconnected components, and each processor is contained in an [Formula: see text]-dimensional subnetwork [Formula: see text]. The augmented cube, denoted by [Formula: see text], proposed by Choudum and Sunitha, is a momentous variant of the hypercube as an interconnection topology of parallel computing. It retains many favorable properties of the hypercube and possesses several embedded properties that the hypercube and other variations do not have. For [Formula: see text] and [Formula: see text], this paper determines [Formula: see text]-embedded edge-connectivity of [Formula: see text]-dimensional augmented cube, [Formula: see text], and shows exact values [Formula: see text], where [Formula: see text] if [Formula: see text], and [Formula: see text] otherwise. The parameters can provide more accurate measurements for the reliability and fault-tolerance of the corresponding systems.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"53 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123878100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Modelling and Computational Analysis of Covid-19 Epidemic in Erbil Kurdistan Using Modified Lagrange Interpolating Polynomial 基于修正拉格朗日插值多项式的库尔德斯坦新冠肺炎疫情数学建模与计算分析
Pub Date : 2022-06-11 DOI: 10.1142/s0129054122420023
Salisu Ibrahim
In 2020 world commonly faced a kind of epidemic virus, which is known as COVID-19 and it was the reason of many people’s death in the world that leads to hard economic situation all over the country, also Iraq was part of the infected country most especially Erbil. Data was collected for the months of July, August, and September regarding the test, positive, recovery, and dead results for covid-19 cases in Erbil, Iraq. Based on the obtained data’s, new modified Lagrange Interpolating polynomial method was derived and proof. The modified Lagrange interpolation polynomial method is very important tool for analyzing, predicting, forecasting, and interpolating high-order polynomials. Moreover, we model, predict, and investigate the test, positive, recovery, and dead results for covid-19 cases in Erbil, Iraq within certain period of time. Our results are well validated and supported by MATLAB.
2020年,世界普遍面临一种被称为COVID-19的流行病病毒,这是世界上许多人死亡的原因,导致全国经济困难,伊拉克也是受感染国家的一部分,尤其是埃尔比勒。收集了伊拉克埃尔比勒7月、8月和9月covid-19病例检测、阳性、康复和死亡结果的数据。在此基础上,推导并证明了一种新的改进拉格朗日插值多项式方法。修正拉格朗日插值多项式法是分析、预测、预测和插值高阶多项式的重要工具。此外,我们对伊拉克埃尔比勒在一定时间内的covid-19病例的检测、阳性、康复和死亡结果进行了建模、预测和调查。我们的结果得到了MATLAB的验证和支持。
{"title":"Mathematical Modelling and Computational Analysis of Covid-19 Epidemic in Erbil Kurdistan Using Modified Lagrange Interpolating Polynomial","authors":"Salisu Ibrahim","doi":"10.1142/s0129054122420023","DOIUrl":"https://doi.org/10.1142/s0129054122420023","url":null,"abstract":"In 2020 world commonly faced a kind of epidemic virus, which is known as COVID-19 and it was the reason of many people’s death in the world that leads to hard economic situation all over the country, also Iraq was part of the infected country most especially Erbil. Data was collected for the months of July, August, and September regarding the test, positive, recovery, and dead results for covid-19 cases in Erbil, Iraq. Based on the obtained data’s, new modified Lagrange Interpolating polynomial method was derived and proof. The modified Lagrange interpolation polynomial method is very important tool for analyzing, predicting, forecasting, and interpolating high-order polynomials. Moreover, we model, predict, and investigate the test, positive, recovery, and dead results for covid-19 cases in Erbil, Iraq within certain period of time. Our results are well validated and supported by MATLAB.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Additional Closeness of Cycle Graphs 循环图的附加闭合性
Pub Date : 2022-06-10 DOI: 10.1142/s0129054122500149
C. Dangalchev
The additional closeness is a very important characteristic of graphs. It measures the maximal closeness of a graph after adding a new link and it is an indication of the growth potential of graphs’ closeness. Most of the time calculating the additional closeness requires solving nontrivial optimization problems. In this article, the additional closenesses of cycles, gear, and some other graphs are calculated. Bounds for additional closeness of graphs are discussed.
附加的接近性是图的一个非常重要的特征。它衡量一个图在增加一个新链接后的最大接近度,是图的接近度增长潜力的指示。大多数情况下,计算额外的接近度需要解决非平凡的优化问题。在本文中,计算了周期、齿轮和其他一些图的附加接近度。讨论了图的附加接近度的边界。
{"title":"Additional Closeness of Cycle Graphs","authors":"C. Dangalchev","doi":"10.1142/s0129054122500149","DOIUrl":"https://doi.org/10.1142/s0129054122500149","url":null,"abstract":"The additional closeness is a very important characteristic of graphs. It measures the maximal closeness of a graph after adding a new link and it is an indication of the growth potential of graphs’ closeness. Most of the time calculating the additional closeness requires solving nontrivial optimization problems. In this article, the additional closenesses of cycles, gear, and some other graphs are calculated. Bounds for additional closeness of graphs are discussed.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115511749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fuzzy Clustering-Based Financial Data Mining System Analysis and Design 基于模糊聚类的金融数据挖掘系统分析与设计
Pub Date : 2022-06-10 DOI: 10.1142/s0129054122420060
Kun Li, Yanjun Chen
This paper is based on fuzzy clustering algorithm on financial data, design of financial data mining system and analysis of financial data, analysis of financial data on the financial decision-making mechanism, from financial data how to enhance the information base of the forecast, financial data how to improve the pertinence of decision-making, financial data how to build a new competitive advantage, financial data how to promote the dynamic decision-making of four, through the analysis of data in financial decision-making specific implementation cases, focusing on the real-life problems faced by the management and the effect of financial data platform to solve problems; finally, through this paper, we hope to provide reference and reference for other similar enterprises to apply financial data for financial decision-making. This paper first describes the theory of financial data, analyzes the mechanism of financial data and financial decision-making, how financial data enhance the information base of forecasting, how financial data improve the pertinence of decision-making, how financial data build a new competitive advantage, how financial data promote dynamic decision-making four dimensions to summarize.
本文基于模糊聚类算法对财务数据进行挖掘,设计财务数据挖掘系统并对财务数据进行分析,分析财务数据对财务决策的作用机制,从财务数据如何增强信息库的预测性、财务数据如何提高决策的针对性、财务数据如何构建新的竞争优势、财务数据如何促进决策的动态性四个方面进行研究。通过分析数据在财务决策中的具体实施案例,重点分析现实生活中所面临的管理问题和财务数据平台解决问题的效果;最后,希望通过本文为其他类似企业运用财务数据进行财务决策提供借鉴和参考。本文首先阐述了财务数据的理论,分析了财务数据与财务决策的机制,财务数据如何增强预测的信息库,财务数据如何提高决策的针对性,财务数据如何构建新的竞争优势,财务数据如何促进动态决策四个维度进行了总结。
{"title":"Fuzzy Clustering-Based Financial Data Mining System Analysis and Design","authors":"Kun Li, Yanjun Chen","doi":"10.1142/s0129054122420060","DOIUrl":"https://doi.org/10.1142/s0129054122420060","url":null,"abstract":"This paper is based on fuzzy clustering algorithm on financial data, design of financial data mining system and analysis of financial data, analysis of financial data on the financial decision-making mechanism, from financial data how to enhance the information base of the forecast, financial data how to improve the pertinence of decision-making, financial data how to build a new competitive advantage, financial data how to promote the dynamic decision-making of four, through the analysis of data in financial decision-making specific implementation cases, focusing on the real-life problems faced by the management and the effect of financial data platform to solve problems; finally, through this paper, we hope to provide reference and reference for other similar enterprises to apply financial data for financial decision-making. This paper first describes the theory of financial data, analyzes the mechanism of financial data and financial decision-making, how financial data enhance the information base of forecasting, how financial data improve the pertinence of decision-making, how financial data build a new competitive advantage, how financial data promote dynamic decision-making four dimensions to summarize.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Securing Smart City Services in Cyber-Physical Systems Using the Computation Annealed Selection Process 利用计算退火选择过程保护网络物理系统中的智慧城市服务
Pub Date : 2022-06-10 DOI: 10.1142/s0129054122420035
Aldosary Saad, Abdullah Alharbi
Cyber-physical systems in a smart city environment offer secure computations in addition to robust resources and secure information exchanges. From the security aspect, the selection of legitimate computing resources is considered the most trustworthy measure for preserving user and data privacy. However, the outlier information results in false computations and time-consuming privacy measures for smart city users. This article introduces the Computation Annealed Selection Process (CASP) for combating outlier information in cyber-physical system networks. This process is assimilated with different infrastructure units in the smart city in an adaptable fashion. The adaptive measure administers information and user privacy through mutual time-key-based authentication. Information privacy is endured until the smart city provider provides a valid service interval. W2The service interval is evaluated for its consistency in maintaining the privacy and is validated using decision-tree learning. The decision tree performs interval classification and key assignment recommendations. Based on the decisions, the privacy is either prolonged or withdrawn for the information exchanged between the users and service providers. This process is repeated until the end of the service interval, identifying the outlier information in legitimate intervals. The proposed process improves detection, legitimacy rate, interval time, and interval rate by 7.57%, 10.4%, 13.15%, and 7.59%, respectively.
智慧城市环境中的网络物理系统除了提供可靠的资源和安全的信息交换外,还提供安全的计算。从安全角度来看,选择合法的计算资源被认为是保护用户和数据隐私的最可靠措施。然而,这些离群信息会导致智能城市用户的错误计算和耗时的隐私措施。本文介绍了计算退火选择过程(CASP)在网络物理系统网络中处理离群信息的方法。这个过程以一种适应性强的方式与智慧城市的不同基础设施单元相融合。该自适应措施通过基于时间密钥的相互认证来管理信息和用户隐私。在智慧城市提供商提供有效的服务间隔之前,信息隐私将被保留。w2评估服务间隔在维护隐私方面的一致性,并使用决策树学习进行验证。决策树执行区间分类和键分配建议。根据这些决定,用户和服务提供者之间交换的信息的隐私被延长或撤销。此过程一直重复,直到服务间隔结束,在合法间隔内识别离群信息。该方法将检出率、正确率、间隔时间和间隔率分别提高了7.57%、10.4%、13.15%和7.59%。
{"title":"Securing Smart City Services in Cyber-Physical Systems Using the Computation Annealed Selection Process","authors":"Aldosary Saad, Abdullah Alharbi","doi":"10.1142/s0129054122420035","DOIUrl":"https://doi.org/10.1142/s0129054122420035","url":null,"abstract":"Cyber-physical systems in a smart city environment offer secure computations in addition to robust resources and secure information exchanges. From the security aspect, the selection of legitimate computing resources is considered the most trustworthy measure for preserving user and data privacy. However, the outlier information results in false computations and time-consuming privacy measures for smart city users. This article introduces the Computation Annealed Selection Process (CASP) for combating outlier information in cyber-physical system networks. This process is assimilated with different infrastructure units in the smart city in an adaptable fashion. The adaptive measure administers information and user privacy through mutual time-key-based authentication. Information privacy is endured until the smart city provider provides a valid service interval. W2The service interval is evaluated for its consistency in maintaining the privacy and is validated using decision-tree learning. The decision tree performs interval classification and key assignment recommendations. Based on the decisions, the privacy is either prolonged or withdrawn for the information exchanged between the users and service providers. This process is repeated until the end of the service interval, identifying the outlier information in legitimate intervals. The proposed process improves detection, legitimacy rate, interval time, and interval rate by 7.57%, 10.4%, 13.15%, and 7.59%, respectively.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125181526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Found. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1