Indoor positioning systems and Air Quality (AQ) monitoring play a crucial role in creating smart environments that promote human well-being and sustainable living.This research paper explores the integration of Software-Defined Networking (SDN) with a Pozyx-based indoor positioning system for advanced AQ monitoring. By addressing the current challenges in network management, scalability, and Quality of Service (QoS) provisioning for indoor AQ monitoring systems, we propose a novel SDN-based routing protocol. Our findings reveal significant enhancements in energy efficiency and Packet Error Rate (PER), showcasing the potential of merging Pozyx and SDN technologies for creating smarter and sustainable living environments. This study contributes to the domain of indoor positioning and AQ monitoring, marking a step forward towards the realization of intelligent environmental monitoring systems.
本研究论文探讨了软件定义网络(SDN)与基于 Pozyx 的室内定位系统的集成,以实现先进的空气质量监测。针对当前室内空气质量监测系统在网络管理、可扩展性和服务质量(QoS)供应方面面临的挑战,我们提出了一种基于 SDN 的新型路由协议。我们的研究结果表明,该协议显著提高了能效和数据包错误率(PER),展示了将 Pozyx 和 SDN 技术相结合以创造更智能和可持续生活环境的潜力。这项研究为室内定位和空气质量监测领域做出了贡献,标志着向实现智能环境监测系统迈进了一步。
{"title":"Pozyx technology with SDN for advanced indoor air quality monitoring and management","authors":"Mohamed Saifeddine Hadj Sassi, Lamia Chaari Fourati","doi":"10.1007/s00500-024-09952-0","DOIUrl":"https://doi.org/10.1007/s00500-024-09952-0","url":null,"abstract":"<p>Indoor positioning systems and Air Quality (AQ) monitoring play a crucial role in creating smart environments that promote human well-being and sustainable living.This research paper explores the integration of Software-Defined Networking (SDN) with a Pozyx-based indoor positioning system for advanced AQ monitoring. By addressing the current challenges in network management, scalability, and Quality of Service (QoS) provisioning for indoor AQ monitoring systems, we propose a novel SDN-based routing protocol. Our findings reveal significant enhancements in energy efficiency and Packet Error Rate (PER), showcasing the potential of merging Pozyx and SDN technologies for creating smarter and sustainable living environments. This study contributes to the domain of indoor positioning and AQ monitoring, marking a step forward towards the realization of intelligent environmental monitoring systems.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"68 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classical cryptosystems. In this paper, we determine the secret key of the monoalphabetic cryptosystem using a recently proposed metaheuristic technique, namely, red deer algorithm. The existing red deer algorithm framework has been tailored to solve the above considered problem. Performance of the developed red deer algorithm is compared with the following metaheuristic techniques: tabu search, genetic algorithm, and cuckoo search using three criteria, namely, effectiveness, efficiency, and accuracy. The results obtained show that the proposed red deer algorithm can compete with all the above three algorithms with respect to all the criteria. This signifies the importance of the proposed red deer algorithm is that it can be utilized to solve the similar problems effectively, efficiently, and with more accuracy.
{"title":"Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem","authors":"Ashish Jain, Sulabh Bansal, Nripendra Narayan Das, Shyam Sunder Gupta","doi":"10.1007/s00500-024-09849-y","DOIUrl":"https://doi.org/10.1007/s00500-024-09849-y","url":null,"abstract":"<p>Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can be successfully determined by utilizing metaheuristic techniques. Monoalphabetic cryptosystem is one of the famous classical cryptosystems. In this paper, we determine the secret key of the monoalphabetic cryptosystem using a recently proposed metaheuristic technique, namely, red deer algorithm. The existing red deer algorithm framework has been tailored to solve the above considered problem. Performance of the developed red deer algorithm is compared with the following metaheuristic techniques: tabu search, genetic algorithm, and cuckoo search using three criteria, namely, effectiveness, efficiency, and accuracy. The results obtained show that the proposed red deer algorithm can compete with all the above three algorithms with respect to all the criteria. This signifies the importance of the proposed red deer algorithm is that it can be utilized to solve the similar problems effectively, efficiently, and with more accuracy.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"23 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-05DOI: 10.1007/s00500-024-09818-5
Mausam Kumari, Vijay K. Yadav, Shainky Ruhela, S. P. Tiwari
The categorical concepts, tools, and techniques advanced not only the theory of automata and languages but also developed the theory of fuzzy automata and languages and played a significant role in many other branches of theoretical computer science. Unlike theory of classical/fuzzy automata with output and their languages, this paper aims to incorporate the concept of fuzziness and roughness together in the theory of automata with output and their languages, to introduce the concepts of crisp deterministic automata with fuzzy rough output, and fuzzy rough language and study their categorical aspects. We have shown that the crisp deterministic automata with fuzzy rough outputs and fuzzy rough languages, along with their morphisms, respectively, form categories CDAFRO and FRL. We have also shown the existence of a functor between the categories CDAFRO and FRL. The categorical concepts of product and coproduct of a subfamily of object-class, equalizer, and coequalizer of a pair of parallel morphisms in category CDAFRO are studied. Finally, for a given fuzzy rough language, a minimal crisp deterministic automaton having fuzzy rough output recognizing it is constructed using the fuzzy generalization of foremost Myhill–Nerode’s theory of automata and languages.
{"title":"On categories associated with crisp deterministic automata with fuzzy rough outputs and fuzzy rough languages","authors":"Mausam Kumari, Vijay K. Yadav, Shainky Ruhela, S. P. Tiwari","doi":"10.1007/s00500-024-09818-5","DOIUrl":"https://doi.org/10.1007/s00500-024-09818-5","url":null,"abstract":"<p>The categorical concepts, tools, and techniques advanced not only the theory of automata and languages but also developed the theory of fuzzy automata and languages and played a significant role in many other branches of theoretical computer science. Unlike theory of classical/fuzzy automata with output and their languages, this paper aims to incorporate the concept of fuzziness and roughness together in the theory of automata with output and their languages, to introduce the concepts of crisp deterministic automata with fuzzy rough output, and fuzzy rough language and study their categorical aspects. We have shown that the crisp deterministic automata with fuzzy rough outputs and fuzzy rough languages, along with their morphisms, respectively, form categories <b>CDAFRO</b> and <b>FRL</b>. We have also shown the existence of a functor between the categories <b>CDAFRO</b> and <b>FRL</b>. The categorical concepts of product and coproduct of a subfamily of object-class, equalizer, and coequalizer of a pair of parallel morphisms in category <b>CDAFRO</b> are studied. Finally, for a given fuzzy rough language, a minimal crisp deterministic automaton having fuzzy rough output recognizing it is constructed using the fuzzy generalization of foremost Myhill–Nerode’s theory of automata and languages.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"13 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141969070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-02DOI: 10.1007/s00500-024-09828-3
Shahab Hosseini, Behshad Jodeiri Shokri, Ali Mirzaghorbanali, Hadi Nourizadeh, Shima Entezam, Amin Motallebiyan, Alireza Entezam, Kevin McDougall, Warna Karunasena, Naj Aziz
In this paper, the potential of the five latest artificial intelligence (AI) predictive techniques, namely multiple linear regression (MLR), multi-layer perceptron neural network (MLPNN), Bayesian regularized neural network (BRNN), generalized feed-forward neural networks (GFFNN), extreme gradient boosting (XGBoost), and their ensemble soft computing models were evaluated to predict of the maximum peak load (PL) and displacement (DP) values resulting from pull-out tests. For this, 34 samples of the fully cementitious grouted rock bolts were prepared and cast. After conducting pull-out tests and building a dataset, twenty-four tests were randomly considered as a training dataset, and the remaining measurements were chosen to test the models’ performance. The input parameters were water-to-grout ratio (%) and curing time (day), while peak loads and displacement values were the outputs. The results revealed that the ensemble XGBoost model was superior to the other models. It was because having higher values of R2 (0.989, 0.979) and VAF (99.473, 98.658) and lower values of RMSE (0.0201, 0.0435) were achieved for testing the dataset of PL and DP’ values, respectively. Besides, sensitivity analysis proved that curing time was the most influential parameter in estimating values of peak loads and displacements. Also, the results confirmed that the ensemble XGBoost method was positioned to predict the axial-bearing capacity of the fully cementitious grouted rock bolting system with extreme performance and accuracy. Eventually, the results of the ensemble XGBoost modeling technique suggested that this novel model was more economical, less time-consuming, and less complicated than laboratory activities.
{"title":"Predicting axial-bearing capacity of fully grouted rock bolting systems by applying an ensemble system","authors":"Shahab Hosseini, Behshad Jodeiri Shokri, Ali Mirzaghorbanali, Hadi Nourizadeh, Shima Entezam, Amin Motallebiyan, Alireza Entezam, Kevin McDougall, Warna Karunasena, Naj Aziz","doi":"10.1007/s00500-024-09828-3","DOIUrl":"https://doi.org/10.1007/s00500-024-09828-3","url":null,"abstract":"<p>In this paper, the potential of the five latest artificial intelligence (AI) predictive techniques, namely multiple linear regression (MLR), multi-layer perceptron neural network (MLPNN), Bayesian regularized neural network (BRNN), generalized feed-forward neural networks (GFFNN), extreme gradient boosting (XGBoost), and their ensemble soft computing models were evaluated to predict of the maximum peak load (PL) and displacement (DP) values resulting from pull-out tests. For this, 34 samples of the fully cementitious grouted rock bolts were prepared and cast. After conducting pull-out tests and building a dataset, twenty-four tests were randomly considered as a training dataset, and the remaining measurements were chosen to test the models’ performance. The input parameters were water-to-grout ratio (%) and curing time (day), while peak loads and displacement values were the outputs. The results revealed that the ensemble XGBoost model was superior to the other models. It was because having higher values of <i>R</i><sup>2</sup> (0.989, 0.979) and VAF (99.473, 98.658) and lower values of RMSE (0.0201, 0.0435) were achieved for testing the dataset of PL and DP’ values, respectively. Besides, sensitivity analysis proved that curing time was the most influential parameter in estimating values of peak loads and displacements. Also, the results confirmed that the ensemble XGBoost method was positioned to predict the axial-bearing capacity of the fully cementitious grouted rock bolting system with extreme performance and accuracy. Eventually, the results of the ensemble XGBoost modeling technique suggested that this novel model was more economical, less time-consuming, and less complicated than laboratory activities.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"366 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141886911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s00500-024-09837-2
M. Das, C. Nahak, M. P. Biswal
The Chinese postman problem (CPP) is a widely recognized combinatorial optimization problem with numerous real-world applications. Modeling such real-world applications often involves considering uncertain variables. Robust optimization is one of the prominent approaches for solving optimization problems when uncertainties are present in the parameters of the optimization problem. In this paper, we delve into the realm of the uncertain multi-objective Chinese postman problem, incorporating budget constraints while simultaneously optimizing profit maximization and time minimization, all within the framework of robust optimization methodology. We formulate the deterministic form of uncertain multi-objective CPP for three different types of uncertainty sets: ellipsoidal, polyhedral, and budgeted. To tackle these formulations, we employ four established multi-objective solution strategies: the global criteria approach, the fuzzy programming method, (epsilon )-constraint, and the Genetic algorithm. Subsequently, we conduct numerical experiments to verify the proposed models.
{"title":"Uncertain Chinese postman problem with budget constraint: a robust optimization approach","authors":"M. Das, C. Nahak, M. P. Biswal","doi":"10.1007/s00500-024-09837-2","DOIUrl":"https://doi.org/10.1007/s00500-024-09837-2","url":null,"abstract":"<p>The Chinese postman problem (CPP) is a widely recognized combinatorial optimization problem with numerous real-world applications. Modeling such real-world applications often involves considering uncertain variables. Robust optimization is one of the prominent approaches for solving optimization problems when uncertainties are present in the parameters of the optimization problem. In this paper, we delve into the realm of the uncertain multi-objective Chinese postman problem, incorporating budget constraints while simultaneously optimizing profit maximization and time minimization, all within the framework of robust optimization methodology. We formulate the deterministic form of uncertain multi-objective CPP for three different types of uncertainty sets: ellipsoidal, polyhedral, and budgeted. To tackle these formulations, we employ four established multi-objective solution strategies: the global criteria approach, the fuzzy programming method, <span>(epsilon )</span>-constraint, and the Genetic algorithm. Subsequently, we conduct numerical experiments to verify the proposed models.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"198 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s00500-024-09945-z
Maurizio Boccia, Andrea Mancuso, Adriano Masone, Claudio Sterle
This paper addresses a real-world Integrated Operating Room Planning and Scheduling (IORPS) problem encountered by a local hospital in Naples, characterized by stringent emergency management constraints, requiring treatment initiation within a 20-minute time-window. We tackle this problem by an original Integer Linear Programming formulation, capable of dealing with different operating room management strategies (open, block and block-modified). Our work differs from conventional cost-focused models by adopting a patient-oriented objective function, aligning with public hospitals obligations. The proposed method has been validated using real-world data provided by the hospital. The performed experimentation demonstrates the efficiency of the approach, capable of determining the optimal solution within an acceptable computation time that aligns with hospital requirements. Moreover, it also highlights the relevance of using our optimization approach to reduce delays in emergency responsiveness. This confirms its practical usage as a substitute for the current manual procedure.
{"title":"Integrated operating room planning and scheduling: an ILP-Based off-line approach for emergency responsiveness at a local hospital in Naples","authors":"Maurizio Boccia, Andrea Mancuso, Adriano Masone, Claudio Sterle","doi":"10.1007/s00500-024-09945-z","DOIUrl":"https://doi.org/10.1007/s00500-024-09945-z","url":null,"abstract":"<p>This paper addresses a real-world Integrated Operating Room Planning and Scheduling (<i>IORPS</i>) problem encountered by a local hospital in Naples, characterized by stringent emergency management constraints, requiring treatment initiation within a 20-minute time-window. We tackle this problem by an original Integer Linear Programming formulation, capable of dealing with different operating room management strategies (open, block and block-modified). Our work differs from conventional cost-focused models by adopting a patient-oriented objective function, aligning with public hospitals obligations. The proposed method has been validated using real-world data provided by the hospital. The performed experimentation demonstrates the efficiency of the approach, capable of determining the optimal solution within an acceptable computation time that aligns with hospital requirements. Moreover, it also highlights the relevance of using our optimization approach to reduce delays in emergency responsiveness. This confirms its practical usage as a substitute for the current manual procedure.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"146 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s00500-024-09858-x
Anand J. Kulkarni, Ishaan R. Kale, Apoorva Shastri, Aayush Khandekar
In this paper, a novel Snail Homing and Mating Search (SHMS) algorithm is proposed. It is inspired from the biological behaviour of the snails. Snails continuously travel to find food and a mate, leaving behind a trail of mucus that serves as a guide for their return. Snails tend to navigate by following the available trails on the ground and responding to cues from nearby shelter homes. The proposed SHMS algorithm is investigated by solving several unimodal and multimodal functions. The solutions are validated using standard statistical tests such as two-sided and pairwise signed rank Wilcoxon test and Friedman rank test. The solutions obtained from the SHMS algorithm exhibited superior robustness as well as search space exploration capabilities with less computational cost. The real-world application of the SHMS algorithm is successfully demonstrated in the engineering design domain by solving three cases of design and economic optimization Shell and Tube Heat Exchanger (STHE) problem. The objective function value and other statistical results obtained using SHMS algorithm are compared with other well-known metaheuristic algorithms. For Solving STHE Case 1 the SHMS algorithm achieved 0.5–35% minimization of the total cost. For Case 2, 0.6–29% minimization of the total cost has been attained. Furthermore, for Case 3, 0.3%, 0.4% and 52% minimization of total cost is achieved when compared with the ARGA & CI, GA, and original study, respectively. The analysis regarding the convergence of the SHMS algorithm is discussed in detail. The contributions in this paper have opened up several avenues for further applicability of the algorithm for solving complex real-world problems.
{"title":"Snail Homing and Mating Search algorithm: a novel bio-inspired metaheuristic algorithm","authors":"Anand J. Kulkarni, Ishaan R. Kale, Apoorva Shastri, Aayush Khandekar","doi":"10.1007/s00500-024-09858-x","DOIUrl":"https://doi.org/10.1007/s00500-024-09858-x","url":null,"abstract":"<p>In this paper, a novel Snail Homing and Mating Search (SHMS) algorithm is proposed. It is inspired from the biological behaviour of the snails. Snails continuously travel to find food and a mate, leaving behind a trail of mucus that serves as a guide for their return. Snails tend to navigate by following the available trails on the ground and responding to cues from nearby shelter homes. The proposed SHMS algorithm is investigated by solving several unimodal and multimodal functions. The solutions are validated using standard statistical tests such as two-sided and pairwise signed rank Wilcoxon test and Friedman rank test. The solutions obtained from the SHMS algorithm exhibited superior robustness as well as search space exploration capabilities with less computational cost. The real-world application of the SHMS algorithm is successfully demonstrated in the engineering design domain by solving three cases of design and economic optimization Shell and Tube Heat Exchanger (STHE) problem. The objective function value and other statistical results obtained using SHMS algorithm are compared with other well-known metaheuristic algorithms. For Solving STHE Case 1 the SHMS algorithm achieved 0.5–35% minimization of the total cost. For Case 2, 0.6–29% minimization of the total cost has been attained. Furthermore, for Case 3, 0.3%, 0.4% and 52% minimization of total cost is achieved when compared with the ARGA & CI, GA, and original study, respectively. The analysis regarding the convergence of the SHMS algorithm is discussed in detail. The contributions in this paper have opened up several avenues for further applicability of the algorithm for solving complex real-world problems.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"74 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NeVer2 is an open-source, cross-platform tool aimed at designing, training, and verifying neural networks. It seamlessly integrates popular learning libraries with our verification backend, offering their functionalities via a graphical interface. Users can design the structure of a neural network by intuitively arranging blocks on a canvas. Subsequently, network training involves specifying dataset sources and hyperparameters through dialog boxes. After training, the verification process entails two steps: (i) incorporating input preconditions and output postconditions via dedicated blocks, and (ii) initiating verification with a simple “push-button” action. To our knowledge, there is currently no other publicly available tool that encompasses all these features. In this paper, we present a comprehensive description of NeVer2, illustrating its complete integration of design, training, and verification through examples. Additionally, we conduct experimental analyses on various verification benchmarks to illustrate the trade-off between completeness and computability using different algorithms. We also include a comparison with state-of-the-art tools such as (alpha ),(beta )-CROWN and NNV for reference.
{"title":"NeVer2: learning and verification of neural networks","authors":"Stefano Demarchi, Dario Guidotti, Luca Pulina, Armando Tacchella","doi":"10.1007/s00500-024-09907-5","DOIUrl":"https://doi.org/10.1007/s00500-024-09907-5","url":null,"abstract":"<p><span>NeVer2</span> is an open-source, cross-platform tool aimed at designing, training, and verifying neural networks. It seamlessly integrates popular learning libraries with our verification backend, offering their functionalities via a graphical interface. Users can design the structure of a neural network by intuitively arranging blocks on a canvas. Subsequently, network training involves specifying dataset sources and hyperparameters through dialog boxes. After training, the verification process entails two steps: (i) incorporating input preconditions and output postconditions via dedicated blocks, and (ii) initiating verification with a simple “push-button” action. To our knowledge, there is currently no other publicly available tool that encompasses all these features. In this paper, we present a comprehensive description of <span>NeVer2</span>, illustrating its complete integration of design, training, and verification through examples. Additionally, we conduct experimental analyses on various verification benchmarks to illustrate the trade-off between completeness and computability using different algorithms. We also include a comparison with state-of-the-art tools such as <span>(alpha )</span>,<span>(beta )</span><span>-CROWN</span> and <span>NNV</span> for reference.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"212 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s00500-024-09928-0
Siyuan Jing, Jun Yang
Current methods for time series ordinal classification (TSOC) methods suffer from low efficiency because the measures used to evaluate the quality of the shapelet need to calculate Information Gain from the Euclidian distances between the shapelet and time series, which incurs tremendous computation for large datasets. This paper introduces a novel method of shapelet discovery for TSOC in which a new measure is adopted, which takes into account the coverage concentration and dominance of shapelet on SAX-represented time series datasets. Moreover, a trie-tree is constructed based on all candidate shapelets and aims to discover a diverse set of high-quality shapelets. The experimental results demonstrated the effectiveness and efficiency when compared to eight SOTA algorithms for time series classification/ordinal classification.
目前用于时间序列序数分类(TSOC)的方法效率较低,因为用于评估形状子质量的方法需要根据形状子与时间序列之间的欧几里得距离计算信息增益(Information Gain),这对于大型数据集来说需要大量计算。本文介绍了一种用于 TSOC 的新的小形发现方法,其中采用了一种新的测量方法,该方法考虑了小形在 SAX 表示的时间序列数据集上的覆盖集中度和主导地位。此外,还根据所有候选小形构建了一个三叉树,旨在发现一组多样化的高质量小形。实验结果表明,与八种 SOTA 算法相比,该算法在时间序列分类/顺序分类方面效果显著、效率高。
{"title":"Method of shapelet discovery for time series ordinal classification","authors":"Siyuan Jing, Jun Yang","doi":"10.1007/s00500-024-09928-0","DOIUrl":"https://doi.org/10.1007/s00500-024-09928-0","url":null,"abstract":"<p>Current methods for time series ordinal classification (TSOC) methods suffer from low efficiency because the measures used to evaluate the quality of the shapelet need to calculate Information Gain from the Euclidian distances between the shapelet and time series, which incurs tremendous computation for large datasets. This paper introduces a novel method of shapelet discovery for TSOC in which a new measure is adopted, which takes into account the coverage concentration and dominance of shapelet on SAX-represented time series datasets. Moreover, a trie-tree is constructed based on all candidate shapelets and aims to discover a diverse set of high-quality shapelets. The experimental results demonstrated the effectiveness and efficiency when compared to eight SOTA algorithms for time series classification/ordinal classification.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"34 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s00500-024-09793-x
Zhen Li, Zining Cao, Fujun Wang, Chao Xing
Cyber-Physical Systems (CPS) are complex systems that integrate information control devices with physical resources, which can be automatically and formalized verified by model checking according to the expected requirements in the formal specification. The counterexamples in model checking are witnesses to the violation of the specification properties of the system and can provide important diagnostic information for debugging, controlling, and synthesizing CPS. Designing a rational specification language for CPS and generating effective counterexamples allows security vulnerabilities to be detected and addressed early in the system development. However, CPS involve frequent interactions between cyber and physical systems and often operate in unreliable environments, which poses new challenges for comprehensive modeling and designing specification languages for CPSs with discrete, continuous, time, probabilistic, and concurrent behaviors. Moreover, finding the smallest counterexample of CPS with probabilistic behavior in the shortest possible time has been identified as a Non-Deterministic Polynomial-complete (NP-complete) problem. Although a number of heuristics have been devised to address this challenge, the accuracy and efficiency of the solved counterexamples need to be improved due to the difficulty in determining the heuristic functions. We first provide a comprehensive model for CPS by introducing the Hybrid Probabilistic Time Labeled Transition System (HPTLTS). Subsequently, we design a specification language HPTLTS Temporal Logic (HPTLTS-TL) that can describe the properties of CPS. In addition, we propose an optimization algorithm CACO-A, which combines the Ant Colony Optimization (ACO) algorithm and the A-algorithm to efficiently generate the counterexample of CPS, which is represented as the diagnostic subgraph. Finally, we discuss a typical CPS example to demonstrate the feasibility of our approach.
{"title":"Specification and counterexample generation for cyber-physical systems","authors":"Zhen Li, Zining Cao, Fujun Wang, Chao Xing","doi":"10.1007/s00500-024-09793-x","DOIUrl":"https://doi.org/10.1007/s00500-024-09793-x","url":null,"abstract":"<p>Cyber-Physical Systems (CPS) are complex systems that integrate information control devices with physical resources, which can be automatically and formalized verified by model checking according to the expected requirements in the formal specification. The counterexamples in model checking are witnesses to the violation of the specification properties of the system and can provide important diagnostic information for debugging, controlling, and synthesizing CPS. Designing a rational specification language for CPS and generating effective counterexamples allows security vulnerabilities to be detected and addressed early in the system development. However, CPS involve frequent interactions between cyber and physical systems and often operate in unreliable environments, which poses new challenges for comprehensive modeling and designing specification languages for CPSs with discrete, continuous, time, probabilistic, and concurrent behaviors. Moreover, finding the smallest counterexample of CPS with probabilistic behavior in the shortest possible time has been identified as a Non-Deterministic Polynomial-complete (NP-complete) problem. Although a number of heuristics have been devised to address this challenge, the accuracy and efficiency of the solved counterexamples need to be improved due to the difficulty in determining the heuristic functions. We first provide a comprehensive model for CPS by introducing the Hybrid Probabilistic Time Labeled Transition System (HPTLTS). Subsequently, we design a specification language HPTLTS Temporal Logic (HPTLTS-TL) that can describe the properties of CPS. In addition, we propose an optimization algorithm CACO-A, which combines the Ant Colony Optimization (ACO) algorithm and the A-algorithm to efficiently generate the counterexample of CPS, which is represented as the diagnostic subgraph. Finally, we discuss a typical CPS example to demonstrate the feasibility of our approach.</p>","PeriodicalId":22039,"journal":{"name":"Soft Computing","volume":"46 1","pages":""},"PeriodicalIF":4.1,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}