首页 > 最新文献

Theor. Comput. Sci.最新文献

英文 中文
Quantitative estimates for the size of an intersection of sparse automatic sets 稀疏自动集交点大小的定量估计
Pub Date : 2023-04-18 DOI: 10.48550/arXiv.2304.09223
Seda Albayrak, J. Bell
A theorem of Cobham says that if $k$ and $ell$ are two multiplicatively independent natural numbers then a subset of the natural numbers that is both $k$- and $ell$-automatic is eventually periodic. A multidimensional extension was later given by Semenov. In this paper, we give a quantitative version of the Cobham-Semenov theorem for sparse automatic sets, showing that the intersection of a sparse $k$-automatic subset of $mathbb{N}^d$ and a sparse $ell$-automatic subset of $mathbb{N}^d$ is finite with size that can be explicitly bounded in terms of data from the automata that accept these sets.
Cobham的一个定理说,如果$k$和$ well $是两个相乘独立的自然数,那么同时是$k$-和$ well $-自动的自然数的子集最终是周期的。后来,Semenov给出了一个多维扩展。本文给出了稀疏自动集的Cobham-Semenov定理的一个定量版本,证明了$mathbb{N}^d$的稀疏$k$-自动子集与$mathbb{N}^d$的稀疏$ell$-自动子集的交集是有限的,其大小可以用接受这些集合的自动机的数据显式地有界。
{"title":"Quantitative estimates for the size of an intersection of sparse automatic sets","authors":"Seda Albayrak, J. Bell","doi":"10.48550/arXiv.2304.09223","DOIUrl":"https://doi.org/10.48550/arXiv.2304.09223","url":null,"abstract":"A theorem of Cobham says that if $k$ and $ell$ are two multiplicatively independent natural numbers then a subset of the natural numbers that is both $k$- and $ell$-automatic is eventually periodic. A multidimensional extension was later given by Semenov. In this paper, we give a quantitative version of the Cobham-Semenov theorem for sparse automatic sets, showing that the intersection of a sparse $k$-automatic subset of $mathbb{N}^d$ and a sparse $ell$-automatic subset of $mathbb{N}^d$ is finite with size that can be explicitly bounded in terms of data from the automata that accept these sets.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"52 1","pages":"114144"},"PeriodicalIF":0.0,"publicationDate":"2023-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81088680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Variety of mutual-visibility problems in graphs 图中各种互可见性问题
Pub Date : 2023-04-03 DOI: 10.48550/arXiv.2304.00864
Searfino Cicerone, G. Stefano, Lara Drozek, J. Hedžet, S. Klavžar, I. Yero
If $X$ is a subset of vertices of a graph $G$, then vertices $u$ and $v$ are $X$-visible if there exists a shortest $u,v$-path $P$ such that $V(P)cap X subseteq {u,v}$. If each two vertices from $X$ are $X$-visible, then $X$ is a mutual-visibility set. The mutual-visibility number of $G$ is the cardinality of a largest mutual-visibility set of $G$ and has been already investigated. In this paper a variety of mutual-visibility problems is introduced based on which natural pairs of vertices are required to be $X$-visible. This yields the total, the dual, and the outer mutual-visibility numbers. We first show that these graph invariants are related to each other and to the classical mutual-visibility number, and then we prove that the three newly introduced mutual-visibility problems are computationally difficult. According to this result, we compute or bound their values for several graphs classes that include for instance grid graphs and tori. We conclude the study by presenting some inter-comparison between the values of such parameters, which is based on the computations we made for some specific families.
如果$X$是图$G$顶点的子集,则$u$和$v$是$X$-可见的,如果存在最短的$u,v$-路径$P$使得$v (P)cap X subseteq {u,v}$。如果$X$中的每两个顶点都是$X$-可见的,则$X$是一个互可见集。$G$的互可见性数是$G$的最大互可见性集的基数,并且已经被研究过。本文介绍了各种互可见性问题,在这些问题的基础上要求顶点的自然对是X -可见的。这将产生总数、双数和外部相互可见性数。首先证明了这些图不变量之间的相互关系以及它们与经典互可视性数的关系,然后证明了这三个新引入的互可视性问题在计算上是困难的。根据这个结果,我们计算或绑定了包括网格图和环面在内的几个图类的值。我们通过这些参数值之间的一些相互比较来结束研究,这是基于我们对一些特定家庭的计算。
{"title":"Variety of mutual-visibility problems in graphs","authors":"Searfino Cicerone, G. Stefano, Lara Drozek, J. Hedžet, S. Klavžar, I. Yero","doi":"10.48550/arXiv.2304.00864","DOIUrl":"https://doi.org/10.48550/arXiv.2304.00864","url":null,"abstract":"If $X$ is a subset of vertices of a graph $G$, then vertices $u$ and $v$ are $X$-visible if there exists a shortest $u,v$-path $P$ such that $V(P)cap X subseteq {u,v}$. If each two vertices from $X$ are $X$-visible, then $X$ is a mutual-visibility set. The mutual-visibility number of $G$ is the cardinality of a largest mutual-visibility set of $G$ and has been already investigated. In this paper a variety of mutual-visibility problems is introduced based on which natural pairs of vertices are required to be $X$-visible. This yields the total, the dual, and the outer mutual-visibility numbers. We first show that these graph invariants are related to each other and to the classical mutual-visibility number, and then we prove that the three newly introduced mutual-visibility problems are computationally difficult. According to this result, we compute or bound their values for several graphs classes that include for instance grid graphs and tori. We conclude the study by presenting some inter-comparison between the values of such parameters, which is based on the computations we made for some specific families.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"300 1","pages":"114096"},"PeriodicalIF":0.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90803211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parameterized Complexity of Perfectly Matched Sets 完全匹配集的参数化复杂度
Pub Date : 2023-04-01 DOI: 10.2139/ssrn.4289703
A. Agrawal, Sutanay Bhattacharjee, Satyabrata Jana, Abhishek Sahu
For an undirected graph G , a pair of vertex disjoint subsets p A, B q is a pair of perfectly matched sets if each vertex in A (resp. B ) has exactly one neighbor in B (resp. A ). In the above, the size of the pair is | A | ( “ | B | ). Given a graph G and a positive integer k , the Perfectly Matched Sets problem asks whether there exists a pair of perfectly matched sets of size at least k in G . This problem is known to be NP -hard on planar graphs and W[1] -hard on general graphs, when parameterized by k . However, little is known about the parameterized complexity of the problem in restricted graph classes. In this work, we study the problem parameterized by k , and design FPT algorithms for: i) apex-minor-free graphs running in time 2 O p? k q ¨ n O p 1 q , and ii) K b,b -free graphs. We obtain a linear kernel for planar graphs and k O p d q -sized kernel for d -degenerate graphs. It is known that the problem is W[1] -hard on chordal graphs, in fact on split graphs, parameterized by k . We complement this hardness result by designing a polynomial-time algorithm for interval graphs. 2012 ACM Subject Classification Theory of computation Ñ Fixed parameter tractability
对于无向图G,一对顶点不相交的子集pa, B q是一对完全匹配的集合,如果a中的每个顶点(p。B)在B中恰好有一个邻居(p。一个)。在上面,这对的大小是| A | (" | B |)。给定一个图G和一个正整数k,完美匹配集问题是问G中是否存在一对大小至少为k的完美匹配集。当用k参数化时,已知该问题在平面图上为NP -hard,在一般图上为W[1] -hard。然而,对于受限图类问题的参数化复杂度,人们知之甚少。在这项工作中,我们研究了用k参数化的问题,并设计了FPT算法,用于:i)运行时间为2 O p?k q¨n O p 1q,和ii) k b,b个自由图。我们得到了平面图的线性核和d -退化图的k O p d q大小的核。已知问题是W[1]——在弦图上,实际上是在分裂图上,用k来参数化。我们通过设计一个区间图的多项式时间算法来补充这个困难的结果。2012 ACM学科分类计算理论Ñ固定参数可追溯性
{"title":"Parameterized Complexity of Perfectly Matched Sets","authors":"A. Agrawal, Sutanay Bhattacharjee, Satyabrata Jana, Abhishek Sahu","doi":"10.2139/ssrn.4289703","DOIUrl":"https://doi.org/10.2139/ssrn.4289703","url":null,"abstract":"For an undirected graph G , a pair of vertex disjoint subsets p A, B q is a pair of perfectly matched sets if each vertex in A (resp. B ) has exactly one neighbor in B (resp. A ). In the above, the size of the pair is | A | ( “ | B | ). Given a graph G and a positive integer k , the Perfectly Matched Sets problem asks whether there exists a pair of perfectly matched sets of size at least k in G . This problem is known to be NP -hard on planar graphs and W[1] -hard on general graphs, when parameterized by k . However, little is known about the parameterized complexity of the problem in restricted graph classes. In this work, we study the problem parameterized by k , and design FPT algorithms for: i) apex-minor-free graphs running in time 2 O p? k q ¨ n O p 1 q , and ii) K b,b -free graphs. We obtain a linear kernel for planar graphs and k O p d q -sized kernel for d -degenerate graphs. It is known that the problem is W[1] -hard on chordal graphs, in fact on split graphs, parameterized by k . We complement this hardness result by designing a polynomial-time algorithm for interval graphs. 2012 ACM Subject Classification Theory of computation Ñ Fixed parameter tractability","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"208 1","pages":"113861"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76425477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining decomposition approaches for the Maximum Weight Stable Set problem 最大权稳定集问题的组合分解方法
Pub Date : 2023-04-01 DOI: 10.2139/ssrn.4055778
A. Brandstädt, R. Mosca
{"title":"Combining decomposition approaches for the Maximum Weight Stable Set problem","authors":"A. Brandstädt, R. Mosca","doi":"10.2139/ssrn.4055778","DOIUrl":"https://doi.org/10.2139/ssrn.4055778","url":null,"abstract":"","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"593 1","pages":"113914"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78514389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transformation and Classification of Ordinal Survey Data 有序测量数据的转换与分类
Pub Date : 2023-03-10 DOI: 10.7494/csci.2023.24.2.4871
Roopam Sadh, Rajeev Kumar
Currently, Machine Learning is being significantly used in almost all of the research domains. However, its applicability in survey research is still in its infancy. We in this paper, attempt to highlight the applicability of Machine Learning in survey research while working on two different aspects in parallel. First, we introduce a pattern-based transformation method for ordinal survey data. Our purpose behind developing such a transformation method is twofold. Our transformation facilitates easy interpretation of ordinal survey data and provides convenience while applying standard Machine Learning approaches. Second, we demonstrate the application of various classification techniques over real and transformed ordinal survey data and interpret their results in terms of their suitability in survey research. Our experimental results suggest that Machine Learning coupled with the Pattern Recognition paradigm has a tremendous scope in survey research.
目前,机器学习在几乎所有的研究领域都得到了广泛的应用。然而,它在调查研究中的适用性还处于起步阶段。在本文中,我们试图突出机器学习在调查研究中的适用性,同时并行研究两个不同的方面。首先,介绍了一种基于模式的有序测量数据转换方法。我们开发这种转换方法的目的有两个。我们的转换简化了对有序调查数据的解释,并在应用标准机器学习方法时提供了便利。其次,我们展示了各种分类技术在真实和转换后的有序调查数据上的应用,并根据其在调查研究中的适用性来解释其结果。我们的实验结果表明,机器学习与模式识别范式相结合在调查研究中具有巨大的应用范围。
{"title":"Transformation and Classification of Ordinal Survey Data","authors":"Roopam Sadh, Rajeev Kumar","doi":"10.7494/csci.2023.24.2.4871","DOIUrl":"https://doi.org/10.7494/csci.2023.24.2.4871","url":null,"abstract":"Currently, Machine Learning is being significantly used in almost all of the research domains. However, its applicability in survey research is still in its infancy. We in this paper, attempt to highlight the applicability of Machine Learning in survey research while working on two different aspects in parallel. First, we introduce a pattern-based transformation method for ordinal survey data. Our purpose behind developing such a transformation method is twofold. Our transformation facilitates easy interpretation of ordinal survey data and provides convenience while applying standard Machine Learning approaches. Second, we demonstrate the application of various classification techniques over real and transformed ordinal survey data and interpret their results in terms of their suitability in survey research. Our experimental results suggest that Machine Learning coupled with the Pattern Recognition paradigm has a tremendous scope in survey research.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85043639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid End-to-End Approach Integrating Online Learning with Face-identification System 集成在线学习与人脸识别系统的混合端到端方法
Pub Date : 2023-03-10 DOI: 10.7494/csci.2023.24.2.4840
Son Van Nguyen, S. T. Nguyen, Anh Pham Thi Hong, Thao Thu Hoang, Ta Minh Thanh
To date, facial recognition has been one of the most intriguing, interesting research topics over years. It requires some specific face-based algorithms such as facial detection, facial alignment, facial representation, and facial recognition as well; however, all of these algorithms derive from heavy deep learning architectures that cause limitations for development, scalability, flawed accuracy, and deployment into publicity with mere CPU servers. It also calls for large datasets containing hundreds of thousands of records for training purposes. In this paper, we propose a full pipeline for an effective face recognition application which only uses a small Vietnamese celebrity dataset and CPU for training that can solve the leakage of data and the need for GPU devices. It is based on a face vector-to-string tokens algorithm then saves face’s properties into Elasticsearch for future retrieval, so the problem of online learning in Facial Recognition is also tackled. Comparison with another popular algorithm on the dataset, our proposed pipeline not only outweighs the accuracy counterpart, but it also achieves a very speedy time inference for a real-time face recognition application.
迄今为止,面部识别一直是多年来最有趣的研究课题之一。它需要一些特定的基于面部的算法,如面部检测、面部对齐、面部表征和面部识别;然而,所有这些算法都来自于沉重的深度学习架构,这导致了开发、可扩展性、有缺陷的准确性以及仅使用CPU服务器进行公开部署的限制。它还需要包含数十万条记录的大型数据集用于培训目的。在本文中,我们提出了一个完整的流水线,用于有效的人脸识别应用程序,该应用程序只使用一个小的越南名人数据集和CPU进行训练,可以解决数据泄漏和对GPU设备的需求。该算法基于人脸向量到字符串标记算法,然后将人脸属性保存到Elasticsearch中以备将来检索,从而解决了人脸识别中的在线学习问题。与另一种流行的数据集算法相比,我们提出的管道算法不仅在精度上优于同类算法,而且在实时人脸识别应用中实现了非常快速的时间推断。
{"title":"Hybrid End-to-End Approach Integrating Online Learning with Face-identification System","authors":"Son Van Nguyen, S. T. Nguyen, Anh Pham Thi Hong, Thao Thu Hoang, Ta Minh Thanh","doi":"10.7494/csci.2023.24.2.4840","DOIUrl":"https://doi.org/10.7494/csci.2023.24.2.4840","url":null,"abstract":"To date, facial recognition has been one of the most intriguing, interesting research topics over years. It requires some specific face-based algorithms such as facial detection, facial alignment, facial representation, and facial recognition as well; however, all of these algorithms derive from heavy deep learning architectures that cause limitations for development, scalability, flawed accuracy, and deployment into publicity with mere CPU servers. It also calls for large datasets containing hundreds of thousands of records for training purposes. In this paper, we propose a full pipeline for an effective face recognition application which only uses a small Vietnamese celebrity dataset and CPU for training that can solve the leakage of data and the need for GPU devices. It is based on a face vector-to-string tokens algorithm then saves face’s properties into Elasticsearch for future retrieval, so the problem of online learning in Facial Recognition is also tackled. Comparison with another popular algorithm on the dataset, our proposed pipeline not only outweighs the accuracy counterpart, but it also achieves a very speedy time inference for a real-time face recognition application.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85661986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Convolutional Neural Network using a New Dataset for Berber Language 基于柏柏尔语新数据集的深度卷积神经网络
Pub Date : 2023-03-10 DOI: 10.7494/csci.2023.24.2.4783
Mokrane Kemiche, Malika Sadou
Currently, Handwritten Character Recognition (HCR) technology has become an interesting and immensely useful technology. It has been explored with highperformance in many languages. However, a few HCR systems are proposed for the Amazigh (Berber) language. Furthermore, the validation of any Amazighhandwritten recognition system remains a major challenge due to no availability of a robust Amazigh database. To address this problem, we first created two new datasets for Tifinagh and Amazigh Latin characters, by extending the well-known EMNIST database with the Amazigh alphabet. And then, we have proposed a handwritten character recognition system, which is based on a deep convolutional neural network to validate the created datasets. The proposed CNN has been trained and tested on our created datasets, and the experimental tests show that it achieves satisfactory results in terms of accuracy and recognition efficiency.
目前,手写字符识别(HCR)技术已成为一项有趣且非常有用的技术。它已经在许多语言中进行了高性能的探索。然而,为Amazigh(柏柏尔)语言提出了一些HCR系统。此外,由于没有强大的Amazigh数据库,任何amazigh手写识别系统的验证仍然是一个主要挑战。为了解决这个问题,我们首先为Tifinagh和Amazigh拉丁字符创建了两个新的数据集,方法是用Amazigh字母扩展著名的EMNIST数据库。然后,我们提出了一个手写字符识别系统,该系统基于深度卷积神经网络来验证所创建的数据集。本文提出的CNN已经在我们创建的数据集上进行了训练和测试,实验测试表明,该方法在准确率和识别效率方面都取得了令人满意的结果。
{"title":"Deep Convolutional Neural Network using a New Dataset for Berber Language","authors":"Mokrane Kemiche, Malika Sadou","doi":"10.7494/csci.2023.24.2.4783","DOIUrl":"https://doi.org/10.7494/csci.2023.24.2.4783","url":null,"abstract":"Currently, Handwritten Character Recognition (HCR) technology has become an interesting and immensely useful technology. It has been explored with highperformance in many languages. However, a few HCR systems are proposed for the Amazigh (Berber) language. Furthermore, the validation of any Amazighhandwritten recognition system remains a major challenge due to no availability of a robust Amazigh database. To address this problem, we first created two new datasets for Tifinagh and Amazigh Latin characters, by extending the well-known EMNIST database with the Amazigh alphabet. And then, we have proposed a handwritten character recognition system, which is based on a deep convolutional neural network to validate the created datasets. The proposed CNN has been trained and tested on our created datasets, and the experimental tests show that it achieves satisfactory results in terms of accuracy and recognition efficiency.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73698951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning-Free Deep Features for Multispectral Palm-Print Classification 多光谱掌纹分类的免学习深度特征
Pub Date : 2023-03-10 DOI: 10.7494/csci.2023.24.2.4685
H. Bendjenna, Asma Aoun Allah, A. Meraoumia
The feature extraction step is a major and crucial step in analyzing and understanding raw data as it has a considerable impact on the system accuracy. Unfortunately, despite the very acceptable results obtained by many handcrafted methods, they can have difficulty representing the features in the case of large databases or with strongly correlated samples. In this context, we proposed a new, simple and lightweight method for deep feature extraction. Our method can be configured to produce four different deep features, each controlled to tune the system accuracy. We have evaluated the performance of our method using a multispectral palmprint based biometric system and the experimental results, using the CASIA database, have shown that our method has high accuracy compared to many current handcrafted feature extraction methods and many well known deep learning based methods.
特征提取是分析和理解原始数据的关键步骤,对系统的精度有很大的影响。不幸的是,尽管许多手工方法获得了非常可接受的结果,但在大型数据库或具有强相关样本的情况下,它们可能难以表示特征。在此背景下,我们提出了一种新的、简单的、轻量级的深度特征提取方法。我们的方法可以配置为产生四种不同的深度特征,每个特征都可以调节系统精度。我们使用基于多光谱掌纹的生物识别系统评估了我们的方法的性能,并且使用CASIA数据库的实验结果表明,与当前许多手工特征提取方法和许多知名的基于深度学习的方法相比,我们的方法具有较高的准确性。
{"title":"Learning-Free Deep Features for Multispectral Palm-Print Classification","authors":"H. Bendjenna, Asma Aoun Allah, A. Meraoumia","doi":"10.7494/csci.2023.24.2.4685","DOIUrl":"https://doi.org/10.7494/csci.2023.24.2.4685","url":null,"abstract":"The feature extraction step is a major and crucial step in analyzing and understanding raw data as it has a considerable impact on the system accuracy. Unfortunately, despite the very acceptable results obtained by many handcrafted methods, they can have difficulty representing the features in the case of large databases or with strongly correlated samples. In this context, we proposed a new, simple and lightweight method for deep feature extraction. Our method can be configured to produce four different deep features, each controlled to tune the system accuracy. We have evaluated the performance of our method using a multispectral palmprint based biometric system and the experimental results, using the CASIA database, have shown that our method has high accuracy compared to many current handcrafted feature extraction methods and many well known deep learning based methods.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"95 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80836386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Centralized SDN control with Distributed Blockchain Technology 利用分布式区块链技术确保集中式SDN控制
Pub Date : 2023-03-06 DOI: 10.7494/csci.2023.24.1.4605
Suhail Ahmad, A. H. Mir
Software Defined Networks (SDN) advocates segregation of network control logic, forwarding functions and management applications into different planes to achieve network programmability, automated and dynamic flow control in next generation networks. It promotes deployment of novel and augmented network management functions to have flexible, robust, scalable and cost-effective network deployments. All these features introduce new research challenges and require secure communication protocols among the segregated network planes. This manuscript focuses on the security issue of southbound interface which operates between the SDN control and data plane. We have highlighted the security threats associated with an unprotected southbound interface and the issues related with the existing TLS based security solution. A lightweight blockchain based decentralized security solution is proposed for southbound interface to secure the resources of logically centralized SDN controllers and distributed forwarding devices from opponents. The proposed mechanism can operate in multi-domain SDN deployment and can be used with wide range of network controllers and data plane devices. In addition to it, the proposed security solution is analyzed in terms of security features, communication and reauthentication overhead.
软件定义网络(SDN)主张将网络控制逻辑、转发功能和管理应用分离到不同的平面,实现下一代网络的网络可编程性、自动化和动态流量控制。它促进了新颖和增强的网络管理功能的部署,以实现灵活、健壮、可扩展和经济高效的网络部署。所有这些特点都给研究带来了新的挑战,并要求在隔离的网络平面之间建立安全的通信协议。本文主要研究SDN控制平面与数据平面之间的南向接口的安全问题。我们强调了与未受保护的南向接口相关的安全威胁,以及与现有基于TLS的安全解决方案相关的问题。为了保证逻辑上集中式SDN控制器和分布式转发设备的资源不受对手攻击,提出了一种基于轻量级区块链的南向接口分散安全解决方案。该机制可以在多域SDN部署中运行,可以与各种网络控制器和数据平面设备一起使用。此外,还从安全特性、通信和重新认证开销等方面分析了所提出的安全解决方案。
{"title":"Securing Centralized SDN control with Distributed Blockchain Technology","authors":"Suhail Ahmad, A. H. Mir","doi":"10.7494/csci.2023.24.1.4605","DOIUrl":"https://doi.org/10.7494/csci.2023.24.1.4605","url":null,"abstract":"Software Defined Networks (SDN) advocates segregation of network control logic, forwarding functions and management applications into different planes to achieve network programmability, automated and dynamic flow control in next generation networks. It promotes deployment of novel and augmented network management functions to have flexible, robust, scalable and cost-effective network deployments. All these features introduce new research challenges and require secure communication protocols among the segregated network planes. This manuscript focuses on the security issue of southbound interface which operates between the SDN control and data plane. We have highlighted the security threats associated with an unprotected southbound interface and the issues related with the existing TLS based security solution. A lightweight blockchain based decentralized security solution is proposed for southbound interface to secure the resources of logically centralized SDN controllers and distributed forwarding devices from opponents. The proposed mechanism can operate in multi-domain SDN deployment and can be used with wide range of network controllers and data plane devices. In addition to it, the proposed security solution is analyzed in terms of security features, communication and reauthentication overhead.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"49 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76573691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of (arc)-connectivity problems involving arc-reversals or deorientations 涉及电弧反转或定向的(电弧)连通性问题的复杂性
Pub Date : 2023-03-06 DOI: 10.2139/ssrn.4399506
J. Bang-Jensen, Florian Hörsch, M. Kriesell
By a well known theorem of Robbins, a graph $G$ has a strongly connected orientation if and only if $G$ is 2-edge-connected and it is easy to find, in linear time, either a cut edge of $G$ or a strong orientation of $G$. A result of Durand de Gevigny shows that for every $kgeq 3$ it is NP-hard to decide if a given graph $G$ has a $k$-strong orientation. Thomassen showed that one can check in polynomial time whether a given graph has a 2-strong orientation. This implies that for a given digraph $D$ we can determine in polynomial time whether we can reorient (=reverse) some arcs of $D=(V,A)$ to obtain a 2-strong digraph $D'=(V,A')$. This naturally leads to the question of determining the minimum number of such arcs to reverse before the resulting graph is 2-strong. In this paper we show that finding this number is NP-hard. If a 2-connected graph $G$ has no 2-strong orientation, we may ask how many of its edges we may orient so that the resulting mixed graph is still 2-strong. Similarly, we may ask for a 2-edge-connected graph $G$ how many of its edges we can orient such that the resulting mixed graph remains 2-arc-strong. We prove that when restricted to graphs satisfying suitable connectivity conditions, both of these problems are equivalent to finding the minimum number of edges we must double in a 2-edge-connected graph in order to obtain a 4-edge-connected graph. Using this, we show that all these three problems are NP-hard. Finally, we consider the operation of deorienting an arc $uv$ of a digraph $D$ meaning replacing it by an undirected edge between the same vertices. In terms of connectivity properties, this is equivalent to adding the opposite arc $vu$ to $D$. We prove that for every $ellgeq 3$ it is NP-hard to find the minimum number of arcs to deorient in a digraph $D$ in order to obtain an $ell$-strong digraph $D'$.
根据著名的罗宾斯定理,当且仅当$G$是2边连通时,图$G$具有强连通方向,并且在线性时间内很容易找到$G$的切边或$G$的强定向。Durand de Gevigny的结果表明,对于每个$kgeq 3$来说,决定给定图$G$是否具有$k$ -强取向是np困难的。Thomassen证明了可以在多项式时间内检验给定图是否具有2强取向。这意味着对于给定的有向图$D$,我们可以在多项式时间内确定是否可以重新定向(=反转)$D=(V,A)$的一些弧以获得2强有向图$D'=(V,A')$。这自然导致了一个问题,即在生成的图形为2强之前,确定要反转的这种弧线的最小数量。在本文中,我们证明了找到这个数是np困难的。如果一个2连通图$G$没有2强定向,我们可以问有多少条边可以定向,这样得到的混合图仍然是2强的。类似地,我们可能会问一个2边连通图$G$,我们可以定向多少条边,这样得到的混合图仍然是2弧强的。我们证明了当图满足适当的连通性条件时,这两个问题等价于求出在2边连通图中为了得到4边连通图而必须加倍的最小边数。利用这一点,我们证明这三个问题都是np困难的。最后,我们考虑对有向图$D$的弧$uv$进行定向操作,这意味着用相同顶点之间的无向边替换它。就连通性而言,这相当于将相反的弧$vu$添加到$D$。我们证明了对于每一个$ellgeq 3$,在一个有向图$D$中,为了得到一个$ell$ -强有向图$D'$,要找到最小的去向弧数是np困难的。
{"title":"Complexity of (arc)-connectivity problems involving arc-reversals or deorientations","authors":"J. Bang-Jensen, Florian Hörsch, M. Kriesell","doi":"10.2139/ssrn.4399506","DOIUrl":"https://doi.org/10.2139/ssrn.4399506","url":null,"abstract":"By a well known theorem of Robbins, a graph $G$ has a strongly connected orientation if and only if $G$ is 2-edge-connected and it is easy to find, in linear time, either a cut edge of $G$ or a strong orientation of $G$. A result of Durand de Gevigny shows that for every $kgeq 3$ it is NP-hard to decide if a given graph $G$ has a $k$-strong orientation. Thomassen showed that one can check in polynomial time whether a given graph has a 2-strong orientation. This implies that for a given digraph $D$ we can determine in polynomial time whether we can reorient (=reverse) some arcs of $D=(V,A)$ to obtain a 2-strong digraph $D'=(V,A')$. This naturally leads to the question of determining the minimum number of such arcs to reverse before the resulting graph is 2-strong. In this paper we show that finding this number is NP-hard. If a 2-connected graph $G$ has no 2-strong orientation, we may ask how many of its edges we may orient so that the resulting mixed graph is still 2-strong. Similarly, we may ask for a 2-edge-connected graph $G$ how many of its edges we can orient such that the resulting mixed graph remains 2-arc-strong. We prove that when restricted to graphs satisfying suitable connectivity conditions, both of these problems are equivalent to finding the minimum number of edges we must double in a 2-edge-connected graph in order to obtain a 4-edge-connected graph. Using this, we show that all these three problems are NP-hard. Finally, we consider the operation of deorienting an arc $uv$ of a digraph $D$ meaning replacing it by an undirected edge between the same vertices. In terms of connectivity properties, this is equivalent to adding the opposite arc $vu$ to $D$. We prove that for every $ellgeq 3$ it is NP-hard to find the minimum number of arcs to deorient in a digraph $D$ in order to obtain an $ell$-strong digraph $D'$.","PeriodicalId":23063,"journal":{"name":"Theor. Comput. Sci.","volume":"45 1","pages":"114097"},"PeriodicalIF":0.0,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87541928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Theor. Comput. Sci.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1