首页 > 最新文献

Int. J. Found. Comput. Sci.最新文献

英文 中文
Multilayer Stacked Probabilistic Belief Network-Based Brain Tumor Segmentation and Classification 基于多层堆叠概率信念网络的脑肿瘤分割与分类
Pub Date : 2022-05-31 DOI: 10.1142/s0129054122420047
S. Raghavendra, A. Harshavardhan, S. Neelakandan, R. Partheepan, Ranjan Walia, V. Chandra Shekhar Rao
One of the deadliest diseases in the world is brain cancer. Children and adults are also susceptible to this malignancy. It also has the poorest rate of survival and comes in a variety of shapes, textures, and sizes, depending on where it is found. Bad things will happen if the tumour brain is misclassified. As a reason, early detection of the right kind and grade of tumour is critical in determining the best treatment strategy. Brain tumours may be identified by looking at magnetic resonance imaging (MRI) pictures of the patient’s brain. The manual method becomes time-consuming and may lead to human mistakes due to the huge quantities of data and the different kinds of brain tumours. As a result, a computer-assisted diagnostic (CAD) system is needed. Image categorization methods have advanced significantly in recent years, particularly deep learning networks, which have achieved success in this field. In this case, we used a multilayer stacked probabilistic belief network to accurately classify brain tumors. Here the MRI brain images are Pre-processed using the Hybrid Butter worth Anisotropic filter and contrast Blow up Histogram Equalization. Followed by pre-processing, the denoised image can be segmented by using the bounding box U-NET segmentation methodology. Then after segmenting the target, the specialized features regarding the tumor can be extracted using the In-depth atom embedding method. Then they obtained can reduce feature dimensionality by using the Backward feature eliminating green wing optimization. The extracted features can be given as input for the classification process. A Multilayer stacked probabilistic belief network is then used to classify the tumour as malignant or benign. The suggested system’s efficacy was tested on the BraTS dataset, which yielded a high level of accuracy. Subjective comparison study is also performed out among the suggested technique and certain state-of-the-art methods, according to the work presented. Experiments show that the proposed system outperforms current methods in terms of assisting radiologists in identifying the size, shape, and location of tumors in the human brain.
脑癌是世界上最致命的疾病之一。儿童和成人也易患这种恶性肿瘤。它的存活率也是最低的,形状、质地和大小也各不相同,这取决于它被发现的地方。如果肿瘤大脑被错误分类,就会发生不好的事情。因此,早期发现正确的肿瘤种类和级别对于确定最佳治疗策略至关重要。脑肿瘤可以通过观察患者大脑的磁共振成像(MRI)图像来识别。由于数据量巨大,脑肿瘤种类繁多,人工方法不仅耗时,而且可能导致人为错误。因此,需要计算机辅助诊断(CAD)系统。近年来,图像分类方法取得了显著进展,特别是深度学习网络,在该领域取得了成功。在这种情况下,我们使用多层堆叠概率信念网络来准确分类脑肿瘤。在这里,使用混合黄油各向异性滤波器和对比度放大直方图均衡化对MRI脑图像进行预处理。然后进行预处理,利用边界框U-NET分割方法对去噪后的图像进行分割。在对目标进行分割后,利用深度原子嵌入法提取肿瘤的特征。然后利用后向特征消绿翼优化得到可以降维的特征。提取的特征可以作为分类过程的输入。然后使用多层堆叠概率信念网络对肿瘤进行恶性或良性分类。在BraTS数据集上测试了建议系统的有效性,产生了高水平的准确性。根据所提出的工作,还对所建议的技术和某些最先进的方法进行了主观比较研究。实验表明,该系统在协助放射科医生识别人类大脑中肿瘤的大小、形状和位置方面优于当前的方法。
{"title":"Multilayer Stacked Probabilistic Belief Network-Based Brain Tumor Segmentation and Classification","authors":"S. Raghavendra, A. Harshavardhan, S. Neelakandan, R. Partheepan, Ranjan Walia, V. Chandra Shekhar Rao","doi":"10.1142/s0129054122420047","DOIUrl":"https://doi.org/10.1142/s0129054122420047","url":null,"abstract":"One of the deadliest diseases in the world is brain cancer. Children and adults are also susceptible to this malignancy. It also has the poorest rate of survival and comes in a variety of shapes, textures, and sizes, depending on where it is found. Bad things will happen if the tumour brain is misclassified. As a reason, early detection of the right kind and grade of tumour is critical in determining the best treatment strategy. Brain tumours may be identified by looking at magnetic resonance imaging (MRI) pictures of the patient’s brain. The manual method becomes time-consuming and may lead to human mistakes due to the huge quantities of data and the different kinds of brain tumours. As a result, a computer-assisted diagnostic (CAD) system is needed. Image categorization methods have advanced significantly in recent years, particularly deep learning networks, which have achieved success in this field. In this case, we used a multilayer stacked probabilistic belief network to accurately classify brain tumors. Here the MRI brain images are Pre-processed using the Hybrid Butter worth Anisotropic filter and contrast Blow up Histogram Equalization. Followed by pre-processing, the denoised image can be segmented by using the bounding box U-NET segmentation methodology. Then after segmenting the target, the specialized features regarding the tumor can be extracted using the In-depth atom embedding method. Then they obtained can reduce feature dimensionality by using the Backward feature eliminating green wing optimization. The extracted features can be given as input for the classification process. A Multilayer stacked probabilistic belief network is then used to classify the tumour as malignant or benign. The suggested system’s efficacy was tested on the BraTS dataset, which yielded a high level of accuracy. Subjective comparison study is also performed out among the suggested technique and certain state-of-the-art methods, according to the work presented. Experiments show that the proposed system outperforms current methods in terms of assisting radiologists in identifying the size, shape, and location of tumors in the human brain.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124780527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Management and Monitoring of Multi-Behavior Recommendation Systems Using Graph Convolutional Neural Networks 基于图卷积神经网络的多行为推荐系统管理与监控
Pub Date : 2022-05-28 DOI: 10.1142/s0129054122420059
Changwei Liu, Kexin Wang, Aman Wu
Different recommendation algorithms, which often use only a single type of user-item engagement, are plagued by imbalanced datasets and cold start problems. Multi-behavior recommendations, which takes advantage of a variety of customer interaction including click and favorites, can be a good option. Early attempts at multi-behavior suggestion tried to consider the varying levels of effect each behavior has on the target behavior. They also disregard the meanings of behaviors, which are implicit in multi-behavior information. Because of these two flaws, the information isn’t being completely utilized to improve suggestion performance on the specific behavior. In this paper, we take a novel response to the situation by creating a unified network to capture multi-behavior information and displaying the MBGCNNN model (Multi-Behavior Graph Convolutional Neural Network). MBGCNN may effectively overcome the constraints of prior studies by learning behavior intensity via the user-item dissemination level and collecting behavior interpretation via the items dissemination level. Practical derives from various data sets back up our model’s order to leverage multi-behavior data. On real methods, our approach beats the average background by 25.02 percent and 6.51 percent, respectively. Additional research on cold-start consumers supports the viability of our suggested approach.
不同的推荐算法通常只使用单一类型的用户-项目参与,受到数据集不平衡和冷启动问题的困扰。多行为推荐是一个不错的选择,它利用了包括点击和收藏在内的各种客户互动。多行为建议的早期尝试试图考虑每个行为对目标行为的不同程度的影响。他们也忽视了行为的意义,而这些意义是隐含在多行为信息中的。由于这两个缺陷,这些信息并没有完全被用来提高对特定行为的建议绩效。在本文中,我们通过创建一个统一的网络来捕获多行为信息并显示mbgcnn模型(多行为图卷积神经网络)来对这种情况做出新的响应。MBGCNN通过用户-物品传播层学习行为强度,通过物品传播层收集行为解释,可以有效克服前人研究的局限性。实际来源于各种数据集备份我们的模型的顺序,以利用多行为数据。在实际方法中,我们的方法分别比平均背景高出25.02%和6.51%。对冷启动消费者的进一步研究支持了我们建议的方法的可行性。
{"title":"Management and Monitoring of Multi-Behavior Recommendation Systems Using Graph Convolutional Neural Networks","authors":"Changwei Liu, Kexin Wang, Aman Wu","doi":"10.1142/s0129054122420059","DOIUrl":"https://doi.org/10.1142/s0129054122420059","url":null,"abstract":"Different recommendation algorithms, which often use only a single type of user-item engagement, are plagued by imbalanced datasets and cold start problems. Multi-behavior recommendations, which takes advantage of a variety of customer interaction including click and favorites, can be a good option. Early attempts at multi-behavior suggestion tried to consider the varying levels of effect each behavior has on the target behavior. They also disregard the meanings of behaviors, which are implicit in multi-behavior information. Because of these two flaws, the information isn’t being completely utilized to improve suggestion performance on the specific behavior. In this paper, we take a novel response to the situation by creating a unified network to capture multi-behavior information and displaying the MBGCNNN model (Multi-Behavior Graph Convolutional Neural Network). MBGCNN may effectively overcome the constraints of prior studies by learning behavior intensity via the user-item dissemination level and collecting behavior interpretation via the items dissemination level. Practical derives from various data sets back up our model’s order to leverage multi-behavior data. On real methods, our approach beats the average background by 25.02 percent and 6.51 percent, respectively. Additional research on cold-start consumers supports the viability of our suggested approach.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125068647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Component (Edge) Connectivity of Round Matching Composition Networks 圆匹配组合网络的组件(边缘)连通性
Pub Date : 2022-05-28 DOI: 10.1142/s0129054122500125
Xiaoqing Liu, Shuming Zhou, Hong Zhang, Baohua Niu
The vertex (edge) connectivity has been regularly used to measure the fault tolerance and reliability of interconnection networks, while it has defects in the assumption that all neighbors of one node will fail concurrently. To overcome this deficiency, some new generalizations of traditional connectivity have been suggested to quantize the size or the number of the connected components of the survival graph. The [Formula: see text]-component (edge) connectivity, one generalization of vertex (edge) connectivity, has been proposed to characterize the vulnerability of multiprocessor systems based on the number of components of the survival graph. In this paper, we determine the [Formula: see text]-component (edge) connectivity of a family of networks, called the round matching composition networks [Formula: see text], which are a class of networks composed of [Formula: see text] ([Formula: see text]) clusters with the same order, linked by [Formula: see text] perfect matchings. By exploring the combinatorial properties and fault-tolerance of [Formula: see text], we establish the [Formula: see text]-component (edge) connectivity [Formula: see text] for [Formula: see text] and [Formula: see text], [Formula: see text] and [Formula: see text] for [Formula: see text].
顶点(边)连通性通常被用来衡量互连网络的容错性和可靠性,但它在假设一个节点的所有邻居同时发生故障时存在缺陷。为了克服这一缺陷,人们提出了一些传统连通性的新推广,以量化生存图的连接组件的大小或数量。[公式:见文本]-组件(边)连通性,顶点(边)连通性的一种推广,已经提出了基于生存图的组件数量来表征多处理器系统的脆弱性。在本文中,我们确定了一类网络的[公式:见文]-组件(边)连通性,称为圆匹配组合网络[公式:见文],它是一类由[公式:见文]([公式:见文])具有相同顺序的聚类组成的网络,由[公式:见文]完美匹配连接。通过探索[公式:见文]的组合特性和容错性,我们建立了[公式:见文]与[公式:见文]、[公式:见文]、[公式:见文]、[公式:见文]和[公式:见文]的[公式:见文]-组件(边)连通性[公式:见文]。
{"title":"The Component (Edge) Connectivity of Round Matching Composition Networks","authors":"Xiaoqing Liu, Shuming Zhou, Hong Zhang, Baohua Niu","doi":"10.1142/s0129054122500125","DOIUrl":"https://doi.org/10.1142/s0129054122500125","url":null,"abstract":"The vertex (edge) connectivity has been regularly used to measure the fault tolerance and reliability of interconnection networks, while it has defects in the assumption that all neighbors of one node will fail concurrently. To overcome this deficiency, some new generalizations of traditional connectivity have been suggested to quantize the size or the number of the connected components of the survival graph. The [Formula: see text]-component (edge) connectivity, one generalization of vertex (edge) connectivity, has been proposed to characterize the vulnerability of multiprocessor systems based on the number of components of the survival graph. In this paper, we determine the [Formula: see text]-component (edge) connectivity of a family of networks, called the round matching composition networks [Formula: see text], which are a class of networks composed of [Formula: see text] ([Formula: see text]) clusters with the same order, linked by [Formula: see text] perfect matchings. By exploring the combinatorial properties and fault-tolerance of [Formula: see text], we establish the [Formula: see text]-component (edge) connectivity [Formula: see text] for [Formula: see text] and [Formula: see text], [Formula: see text] and [Formula: see text] for [Formula: see text].","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finite Approximations and Similarity of Languages 语言的有限近似和相似性
Pub Date : 2022-05-28 DOI: 10.1142/s0129054122500113
B. Rovan, A. Varga
A new framework to measure distances (similarity) between formal languages and between grammars based on distances between words is introduced. It is based on approximating languages by their finite subsets and using monotone sequences of such finite approximations to define an infinite language in the limit. Distances between finite languages are defined and extended to distances between monotone sequences of finite languages leading to distances between infinite languages. The framework captures several distances studied in the literature. Context-free grammars with energy are introduced to enable finite approximations emphasizing “syntactically important” parts of words. Grammars with energy are also used to extend distances between monotone sequences of finite languages to distances between context-free grammars. A basic toolkit for monotone sequences of finite languages and distances between languages resp. grammars is provided. As part of this toolkit a non-symmetric version of distances is defined, providing additional characterisation of distances in general. Additional properties of distances between grammars are derived by restricting the“energy use” of grammars with energy. Some methods of estimating the distances are presented to be used in cases where the distance is not computable or difficult to compute.
提出了一种新的基于词间距离的形式语言之间和语法之间距离(相似度)度量框架。它基于语言的有限子集逼近,并利用这些有限逼近的单调序列在极限上定义无限语言。有限语言之间的距离被定义并扩展为有限语言单调序列之间的距离,从而导致无限语言之间的距离。该框架涵盖了文献中研究的几个距离。引入了具有能量的上下文无关语法,以实现强调单词“语法重要”部分的有限近似。带能量语法也用于将有限语言单调序列之间的距离扩展到上下文无关语法之间的距离。有限语言的单调序列和语言间距离的基本工具箱。提供语法。作为该工具包的一部分,定义了距离的非对称版本,提供了一般距离的附加特征。语法之间距离的附加属性是通过用能量限制语法的“能量使用”而得到的。在距离不可计算或难以计算的情况下,提出了一些估计距离的方法。
{"title":"Finite Approximations and Similarity of Languages","authors":"B. Rovan, A. Varga","doi":"10.1142/s0129054122500113","DOIUrl":"https://doi.org/10.1142/s0129054122500113","url":null,"abstract":"A new framework to measure distances (similarity) between formal languages and between grammars based on distances between words is introduced. It is based on approximating languages by their finite subsets and using monotone sequences of such finite approximations to define an infinite language in the limit. Distances between finite languages are defined and extended to distances between monotone sequences of finite languages leading to distances between infinite languages. The framework captures several distances studied in the literature. Context-free grammars with energy are introduced to enable finite approximations emphasizing “syntactically important” parts of words. Grammars with energy are also used to extend distances between monotone sequences of finite languages to distances between context-free grammars. A basic toolkit for monotone sequences of finite languages and distances between languages resp. grammars is provided. As part of this toolkit a non-symmetric version of distances is defined, providing additional characterisation of distances in general. Additional properties of distances between grammars are derived by restricting the“energy use” of grammars with energy. Some methods of estimating the distances are presented to be used in cases where the distance is not computable or difficult to compute.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127802185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault-Tolerant Strong Menger (Edge) Connectivity of DCC Linear Congruential Graphs DCC线性同余图的容错强门格(边)连通性
Pub Date : 2022-05-28 DOI: 10.1142/s0129054122500137
Zhengqi Yu, Shuming Zhou, Hong Zhang
With the rapid development and advances of very large scale integration technology and wafer-scale integration technology, multiprocessor systems, taking interconnection networks as underlying topologies, have been widely designed and used in big data era. The topology of an interconnection network is usually represented as a graph. If any two distinct vertices [Formula: see text] in a connected graph [Formula: see text] are connected by min[Formula: see text] vertex (edge)-disjoint paths, then [Formula: see text] is called strongly Menger (edge) connected. In 1996, Opatrny et al. [16] introduced the DCC (Disjoint Consecutive Cycle) linear congruential graph, which consists of [Formula: see text] nodes and is generated by a set of linear functions [Formula: see text] with special properties. In this work, we investigate the strong Menger connectivity of the DCC linear congruential graph [Formula: see text] with faulty vertices or edges, where [Formula: see text], [Formula: see text], gcd[Formula: see text] and [Formula: see text] is a multiple of [Formula: see text]. In detail, we show that [Formula: see text] is strongly Menger connected if [Formula: see text] for any [Formula: see text]. Moreover, we determine that [Formula: see text] is strongly Menger edge connected if [Formula: see text] for any [Formula: see text]. Furthermore, we prove that, under the restricted condition [Formula: see text], [Formula: see text] is strongly Menger edge connected if [Formula: see text] and [Formula: see text] for any [Formula: see text]. In addition, we present some empirical examples to show that the bounds are all optimal in the sense of the maximum number of tolerable edge faults.
随着超大规模集成技术和晶圆级集成技术的快速发展和进步,以互联网络为底层拓扑结构的多处理器系统在大数据时代得到了广泛的设计和应用。互连网络的拓扑结构通常用图表示。如果连通图[公式:见文]中任意两个不同的顶点[公式:见文]通过最小[公式:见文]顶点(边)不相交的路径相连,则称为[公式:见文]强门格尔(边)连通。1996年,Opatrny等[16]引入了DCC (Disjoint continuous Cycle)线性同余图,该图由[公式:见文]个节点组成,由一组具有特殊性质的线性函数[公式:见文]生成。在这项工作中,我们研究了具有错误顶点或边的DCC线性同余图[公式:见文]的强门格尔连通性,其中[公式:见文],[公式:见文],gcd[公式:见文]和[公式:见文]是[公式:见文]的倍数。详细地说,我们证明了[Formula: see text]是强门格尔连接的,如果[Formula: see text]对于任何[Formula: see text]。此外,我们确定对于任何[公式:见文],如果[公式:见文]为[公式:见文],则[公式:见文]为强门格尔边连通。进一步证明了在受限条件下[公式:见文],对于任意[公式:见文],如果[公式:见文]和[公式:见文],[公式:见文]是强门格尔边连通的。此外,我们给出了一些经验例子来证明,在可容忍边缘故障的最大数目意义上,边界都是最优的。
{"title":"Fault-Tolerant Strong Menger (Edge) Connectivity of DCC Linear Congruential Graphs","authors":"Zhengqi Yu, Shuming Zhou, Hong Zhang","doi":"10.1142/s0129054122500137","DOIUrl":"https://doi.org/10.1142/s0129054122500137","url":null,"abstract":"With the rapid development and advances of very large scale integration technology and wafer-scale integration technology, multiprocessor systems, taking interconnection networks as underlying topologies, have been widely designed and used in big data era. The topology of an interconnection network is usually represented as a graph. If any two distinct vertices [Formula: see text] in a connected graph [Formula: see text] are connected by min[Formula: see text] vertex (edge)-disjoint paths, then [Formula: see text] is called strongly Menger (edge) connected. In 1996, Opatrny et al. [16] introduced the DCC (Disjoint Consecutive Cycle) linear congruential graph, which consists of [Formula: see text] nodes and is generated by a set of linear functions [Formula: see text] with special properties. In this work, we investigate the strong Menger connectivity of the DCC linear congruential graph [Formula: see text] with faulty vertices or edges, where [Formula: see text], [Formula: see text], gcd[Formula: see text] and [Formula: see text] is a multiple of [Formula: see text]. In detail, we show that [Formula: see text] is strongly Menger connected if [Formula: see text] for any [Formula: see text]. Moreover, we determine that [Formula: see text] is strongly Menger edge connected if [Formula: see text] for any [Formula: see text]. Furthermore, we prove that, under the restricted condition [Formula: see text], [Formula: see text] is strongly Menger edge connected if [Formula: see text] and [Formula: see text] for any [Formula: see text]. In addition, we present some empirical examples to show that the bounds are all optimal in the sense of the maximum number of tolerable edge faults.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124338274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Approach Towards Degree and Walsh-Transform of Boolean Functions 布尔函数的度和沃尔什变换的一种新方法
Pub Date : 2022-05-24 DOI: 10.1142/s0129054122500101
S. Sushanth Kumar, Harshdeep Singh, Gaurav Mittal
Boolean functions are fundamental bricks in the development of various applications in Cryptography and Coding theory by making benefit from the weights of related Boolean functions (Walsh spectrum). Towards this, the discrete Fourier transform (Walsh–Hadamard) plays a pivotal tool. The work in this paper is dedicated towards the algebraic and numerical degrees, together with the relationship between weights of Boolean function and their Walsh transforms. We introduce Walsh matrices and generalize them to any arbitrary Boolean function. This improves the complexity in computation of Walsh–Hadamard and Fourier transform in certain cases. We also discuss some useful results related to the degree of the algebraic normal form using Walsh–Hadamard transform.
布尔函数利用相关布尔函数(沃尔什谱)的权重,是密码学和编码理论中各种应用开发的基础。为此,离散傅里叶变换(Walsh-Hadamard)起着关键的作用。本文主要研究了代数度和数值度,以及布尔函数的权值与其Walsh变换之间的关系。引入沃尔什矩阵,并将其推广到任意布尔函数。这在某些情况下提高了沃尔什-阿达玛变换和傅里叶变换的计算复杂度。我们还讨论了利用Walsh-Hadamard变换求解代数范式阶的一些有用结果。
{"title":"A Novel Approach Towards Degree and Walsh-Transform of Boolean Functions","authors":"S. Sushanth Kumar, Harshdeep Singh, Gaurav Mittal","doi":"10.1142/s0129054122500101","DOIUrl":"https://doi.org/10.1142/s0129054122500101","url":null,"abstract":"Boolean functions are fundamental bricks in the development of various applications in Cryptography and Coding theory by making benefit from the weights of related Boolean functions (Walsh spectrum). Towards this, the discrete Fourier transform (Walsh–Hadamard) plays a pivotal tool. The work in this paper is dedicated towards the algebraic and numerical degrees, together with the relationship between weights of Boolean function and their Walsh transforms. We introduce Walsh matrices and generalize them to any arbitrary Boolean function. This improves the complexity in computation of Walsh–Hadamard and Fourier transform in certain cases. We also discuss some useful results related to the degree of the algebraic normal form using Walsh–Hadamard transform.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123755110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Isolated Rupture in Thorny Networks 刺状网中的孤立断裂
Pub Date : 2022-05-12 DOI: 10.1142/s0129054122500083
H. Yildirim, Zeynep Nihan Berberler
The robustness evaluates the capability of networks in resisting failures or attacks on some parts of networks. The concept of vulnerability is very important in network analysis. Isolated rupture degree is a novel graph-theoretic concept defined as a measure of network vulnerability. In this paper, the relationships between isolated rupture degree and some other vulnerability parameters such as isolated scattering number and isolated toughness are established. Exact values for isolated rupture degree of thorny networks are obtained.
鲁棒性评估了网络在某些部分抵抗故障或攻击的能力。漏洞的概念在网络分析中非常重要。孤立破裂度是一个新的图论概念,是对网络脆弱性的度量。建立了孤立断裂程度与孤立散射数、孤立韧性等脆性参数之间的关系。得到了刺状网络的孤立破裂度的精确值。
{"title":"Isolated Rupture in Thorny Networks","authors":"H. Yildirim, Zeynep Nihan Berberler","doi":"10.1142/s0129054122500083","DOIUrl":"https://doi.org/10.1142/s0129054122500083","url":null,"abstract":"The robustness evaluates the capability of networks in resisting failures or attacks on some parts of networks. The concept of vulnerability is very important in network analysis. Isolated rupture degree is a novel graph-theoretic concept defined as a measure of network vulnerability. In this paper, the relationships between isolated rupture degree and some other vulnerability parameters such as isolated scattering number and isolated toughness are established. Exact values for isolated rupture degree of thorny networks are obtained.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131643861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Descriptive Complexity of Reversible Languages Having Finitely Many Reduced Automata 具有有限多个约简自动机的可逆语言的描述复杂性
Pub Date : 2022-05-12 DOI: 10.1142/s0129054122410040
Kitti Gelle, Szabolcs Iván
Reversible forms of computations are often interesting from an energy efficiency point of view. When the computation device in question is an automaton, it is known that the minimal reversible automaton recognizing a given language is not necessarily unique, moreover, there are languages having arbitrarily large reversible recognizers possessing no nontrivial “reversible” congruence. Building atop on our earlier result, we show that the corresponding decision problem is [Formula: see text]-complete, and that even in the case when there are only finitely many such reversible recognizers, the largest one among them can be exponentially larger than the minimal automaton. Both results hold for the case of binary alphabets.
从能源效率的角度来看,可逆形式的计算通常是有趣的。当所讨论的计算设备是自动机时,已知识别给定语言的最小可逆自动机不一定是唯一的,此外,存在具有任意大的可逆识别器的语言,这些可逆识别器没有非平凡的“可逆”同余。在我们之前的结果的基础上,我们证明了相应的决策问题是[公式:见文本]完全的,并且即使在只有有限多个这样的可逆识别器的情况下,其中最大的一个可以比最小自动机指数大。对于二进制字母,这两个结果都成立。
{"title":"Descriptive Complexity of Reversible Languages Having Finitely Many Reduced Automata","authors":"Kitti Gelle, Szabolcs Iván","doi":"10.1142/s0129054122410040","DOIUrl":"https://doi.org/10.1142/s0129054122410040","url":null,"abstract":"Reversible forms of computations are often interesting from an energy efficiency point of view. When the computation device in question is an automaton, it is known that the minimal reversible automaton recognizing a given language is not necessarily unique, moreover, there are languages having arbitrarily large reversible recognizers possessing no nontrivial “reversible” congruence. Building atop on our earlier result, we show that the corresponding decision problem is [Formula: see text]-complete, and that even in the case when there are only finitely many such reversible recognizers, the largest one among them can be exponentially larger than the minimal automaton. Both results hold for the case of binary alphabets.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
One-Way Restarting Automata and Their Sensitivitys 单向重启自动机及其灵敏度
Pub Date : 2022-04-30 DOI: 10.1142/s0129054122410106
Martin Plátek, F. Otto, F. Mráz
Here we establish and study some rigorous tools suitable for the lexicalized syntactic analysis (LSA) of natural and formal languages. Motivated by the linguistic method of analysis by reduction, we are interested in correctness preserving LSA. We introduce a suitable model of automata, the h-lexicalized one-way restarting automata (h-RRWW), and compare the properties of their input languages, which are the languages considered traditionally in automata theory, to the properties of the so-called basic and h-proper languages. These languages form the basic components for LSA. With respect to their input languages, h-RRWW-automata are not sensitive to the size of the read/write window and they allow computations that are far from being correctness preserving. On the other hand, for their basic and h-proper languages, h-RRWW-automata ensure that the resulting computations are completely correctness preserving, and they yield infinite ascending hierarchies of language classes within the regular, the context-free, and the context-sensitive languages that are based on the size of the read/write window.
本文建立并研究了一些适用于自然语言和形式语言的词汇化句法分析(LSA)的严谨工具。受约简分析的语言学方法的启发,我们对保持LSA的正确性很感兴趣。我们引入了一种合适的自动机模型,即h-词汇化单向重新启动自动机(h-RRWW),并将其输入语言(自动机理论中传统认为的语言)的性质与所谓的基本语言和h-固有语言的性质进行了比较。这些语言构成了LSA的基本组件。就其输入语言而言,h-RRWW-automata对读/写窗口的大小不敏感,而且它们允许的计算远远不能保持正确性。另一方面,对于它们的基本语言和适当语言,h-RRWW-automata确保结果计算完全保持正确性,并且在基于读/写窗口大小的常规语言、上下文无关语言和上下文敏感语言中产生无限升序的语言类层次结构。
{"title":"One-Way Restarting Automata and Their Sensitivitys","authors":"Martin Plátek, F. Otto, F. Mráz","doi":"10.1142/s0129054122410106","DOIUrl":"https://doi.org/10.1142/s0129054122410106","url":null,"abstract":"Here we establish and study some rigorous tools suitable for the lexicalized syntactic analysis (LSA) of natural and formal languages. Motivated by the linguistic method of analysis by reduction, we are interested in correctness preserving LSA. We introduce a suitable model of automata, the h-lexicalized one-way restarting automata (h-RRWW), and compare the properties of their input languages, which are the languages considered traditionally in automata theory, to the properties of the so-called basic and h-proper languages. These languages form the basic components for LSA. With respect to their input languages, h-RRWW-automata are not sensitive to the size of the read/write window and they allow computations that are far from being correctness preserving. On the other hand, for their basic and h-proper languages, h-RRWW-automata ensure that the resulting computations are completely correctness preserving, and they yield infinite ascending hierarchies of language classes within the regular, the context-free, and the context-sensitive languages that are based on the size of the read/write window.","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subnetwork Preclusion of (n, k)-Star Networks (n, k)-星型网络的子网排除
Pub Date : 2022-04-18 DOI: 10.1142/s0129054122500095
K. Feng
The [Formula: see text]-star graph [Formula: see text], which is introduced to address scaling issues of the star graph, is recognized as an attractive interconnection network topology for building multiprocessor systems because of its desirable properties. Let [Formula: see text] be the minimum number of faulty vertices that make every subgraph isomorphic to [Formula: see text] faulty in [Formula: see text] under vertex-failure model, where [Formula: see text]. In this paper, we prove that [Formula: see text], [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text] and [Formula: see text].
[公式:见文本]-星图[公式:见文本],它被引入来解决星图的缩放问题,由于其理想的特性,被认为是构建多处理器系统的一个有吸引力的互连网络拓扑。设[公式:见文]为顶点失效模型下,使每个子图同构于[公式:见文]的[公式:见文]中有缺陷的[公式:见文]的最小缺陷顶点数,其中[公式:见文]。在本文中,我们证明了[公式:见文],[公式:见文],[公式:见文],[公式:见文],和[公式:见文]对于[公式:见文]和[公式:见文]。
{"title":"Subnetwork Preclusion of (n, k)-Star Networks","authors":"K. Feng","doi":"10.1142/s0129054122500095","DOIUrl":"https://doi.org/10.1142/s0129054122500095","url":null,"abstract":"The [Formula: see text]-star graph [Formula: see text], which is introduced to address scaling issues of the star graph, is recognized as an attractive interconnection network topology for building multiprocessor systems because of its desirable properties. Let [Formula: see text] be the minimum number of faulty vertices that make every subgraph isomorphic to [Formula: see text] faulty in [Formula: see text] under vertex-failure model, where [Formula: see text]. In this paper, we prove that [Formula: see text], [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text] and [Formula: see text].","PeriodicalId":192109,"journal":{"name":"Int. J. Found. Comput. Sci.","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125071345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Found. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1