首页 > 最新文献

International Journal of Computer Mathematics: Computer Systems Theory最新文献

英文 中文
Temporal Data Modeling and Integrity Constraints in Relational Databases 关系数据库中的时态数据建模和完整性约束
IF 0.8 Q4 Computer Science Pub Date : 2024-01-02 DOI: 10.1080/23799927.2023.2300083
A. Tansel
{"title":"Temporal Data Modeling and Integrity Constraints in Relational Databases","authors":"A. Tansel","doi":"10.1080/23799927.2023.2300083","DOIUrl":"https://doi.org/10.1080/23799927.2023.2300083","url":null,"abstract":"","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Star structure fault tolerance of Bicube networks 双立方网络的星形结构容错
IF 0.8 Q4 Computer Science Pub Date : 2024-01-02 DOI: 10.1080/23799927.2023.2301379
Lulu Yang, Shuming Zhou, Qifan Zhang
{"title":"Star structure fault tolerance of Bicube networks","authors":"Lulu Yang, Shuming Zhou, Qifan Zhang","doi":"10.1080/23799927.2023.2301379","DOIUrl":"https://doi.org/10.1080/23799927.2023.2301379","url":null,"abstract":"","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139390110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Eccentricity based Topological indices of Hexagonal Network 基于偏心率的六边形网络拓扑指标
Q4 Computer Science Pub Date : 2023-11-06 DOI: 10.1080/23799927.2023.2279204
S Deepika, P. Arathi
AbstractChemical graph theory acts as a tool for converting the molecular information to a numerical parameter. Topological indices are numeric quantities that related with physio-chemical properties of chemical compounds. Distance and Degree based topological indices and Counting related polynomials are three prominent and extensively researched classes of topological indices. In all these categories, distance based topological descriptors have significant impact in chemical graph theory. In this paper, the “Total eccentricity index ζ(G), Geometric-arithmetic index GA4(G), Eccentricity based Zagreb indices M1∗(G),M1∗∗(G) and M2∗(G), Average eccentricity index avec(G), and Atom-bond connectivity index ABC5(G)” of hexagonal networks are computed.Keywords: Total eccentricity indexGeometric arithmetic indexEccentricity version of Zagreb indicesAverage eccentricity indexAtom bond connectivity index and hexagonal networkKeywords: Mathematics Subject Classification (2000): 05C12, 05C90, 92E10, 05C92, 05C09DisclaimerAs a service to authors and researchers we are providing this version of an accepted manuscript (AM). Copyediting, typesetting, and review of the resulting proofs will be undertaken on this manuscript before final publication of the Version of Record (VoR). During production and pre-press, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal relate to these versions also. FundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Data availabilityData sharing not applicable to this article as no datasets were generated or analyzed during the current study.Conflicts of interestThe authors have no relevant financial or non-financial interests to disclose.
化学图论是一种将分子信息转化为数值参数的工具。拓扑指数是与化合物的理化性质有关的数值。基于距离和度的拓扑指标和计数相关多项式是拓扑指标中研究最广泛的三类。在所有这些类别中,基于距离的拓扑描述符在化学图论中具有重要的影响。本文计算了六边形网络的“总偏心率指数ζ(G)、几何算术指数GA4(G)、偏心率指数M1∗(G)、M1∗(G)和M2∗(G)、平均偏心率指数avec(G)和原子键连通性指数ABC5(G)”。关键词:总偏心率索引几何算术索引偏心率版本萨格勒布指数平均偏心率索引原子键连通性指数和六边形网络关键词:数学学科分类(2000):055c12, 055c90, 92E10, 055c92, 055c09免责声明作为对作者和研究人员的服务,我们提供此版本的接受稿件(AM)。在最终出版版本记录(VoR)之前,将对该手稿进行编辑、排版和审查。在制作和印前,可能会发现可能影响内容的错误,所有适用于期刊的法律免责声明也与这些版本有关。作者声明在撰写本文期间没有收到任何资金、资助或其他支持。数据可用性数据共享不适用于本文,因为在当前研究期间没有生成或分析数据集。作者没有相关的经济或非经济利益需要披露。
{"title":"Eccentricity based Topological indices of Hexagonal Network","authors":"S Deepika, P. Arathi","doi":"10.1080/23799927.2023.2279204","DOIUrl":"https://doi.org/10.1080/23799927.2023.2279204","url":null,"abstract":"AbstractChemical graph theory acts as a tool for converting the molecular information to a numerical parameter. Topological indices are numeric quantities that related with physio-chemical properties of chemical compounds. Distance and Degree based topological indices and Counting related polynomials are three prominent and extensively researched classes of topological indices. In all these categories, distance based topological descriptors have significant impact in chemical graph theory. In this paper, the “Total eccentricity index ζ(G), Geometric-arithmetic index GA4(G), Eccentricity based Zagreb indices M1∗(G),M1∗∗(G) and M2∗(G), Average eccentricity index avec(G), and Atom-bond connectivity index ABC5(G)” of hexagonal networks are computed.Keywords: Total eccentricity indexGeometric arithmetic indexEccentricity version of Zagreb indicesAverage eccentricity indexAtom bond connectivity index and hexagonal networkKeywords: Mathematics Subject Classification (2000): 05C12, 05C90, 92E10, 05C92, 05C09DisclaimerAs a service to authors and researchers we are providing this version of an accepted manuscript (AM). Copyediting, typesetting, and review of the resulting proofs will be undertaken on this manuscript before final publication of the Version of Record (VoR). During production and pre-press, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal relate to these versions also. FundingThe authors declare that no funds, grants, or other support were received during the preparation of this manuscript.Data availabilityData sharing not applicable to this article as no datasets were generated or analyzed during the current study.Conflicts of interestThe authors have no relevant financial or non-financial interests to disclose.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135636468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some empirical and theoretical attributes of random multi-hooking networks 随机多钩网络的一些经验和理论属性
Q4 Computer Science Pub Date : 2023-11-02 DOI: 10.1080/23799927.2023.2278098
Kiran R. Bhutani, Ravi Kalpathy, Hosam Mahmoud, Achuna Ofonedu
AbstractMulti-hooking networks are a broad class of random hooking networks introduced in [8] wherein multiple copies of a seed are hooked at each step, and the number of copies follows a predetermined building sequence of numbers. For motivation, we provide two examples: one from chemistry and one from electrical engineering. We explore the empirical and theoretical local degree distribution of a specific node during its temporal evolution. We ask what will happen to the degree of a specific node at step n that first appeared in the network at step j. We conducted an experimental study to identify some cases with Gaussian asymptotic distributions, which we then proved. Additionally, we investigate the distance in the network through the lens of the average Wiener index for which we obtain a theoretical result for any building sequence and explore its empirical distribution for certain classes of building sequences that have systematic growth.Keywords: Networksrandom graphsdegree profileWiener indexrecurrenceasymptotic analysisAMS subject classifications:: Primary: 05C82Secondary: 05C1260C0560F0590B15DisclaimerAs a service to authors and researchers we are providing this version of an accepted manuscript (AM). Copyediting, typesetting, and review of the resulting proofs will be undertaken on this manuscript before final publication of the Version of Record (VoR). During production and pre-press, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal relate to these versions also. AcknowledgmentsThe authors would like to thank Dominic Abela for developing and designing the initial prototype of an interactive application.Data availability statementThe data that support the findings of this study are available from the corresponding author upon reasonable request.Notes1 MapleTM is a trademark of Waterloo Maple Inc.2 Note that this theorem does not require the regularity conditions needed in theorem 1; the building sequence is entirely arbitrary.
【摘要】多钩子网络是[8]中引入的一类广泛的随机钩子网络,其中在每一步都钩住一个种子的多个副本,并且副本的数量遵循预定的构建序列。为了激励,我们提供两个例子:一个来自化学,一个来自电气工程。我们探索了特定节点在时间演化过程中的经验和理论局部度分布。我们的问题是,在步骤n的特定节点在步骤j的网络中首次出现的程度会发生什么。我们进行了一项实验研究,以确定高斯渐近分布的一些情况,然后我们证明了这一点。此外,我们通过平均维纳指数的透镜来研究网络中的距离,我们获得了任何建筑序列的理论结果,并探索了具有系统增长的某些类别的建筑序列的经验分布。关键词:网络随机图度谱wiener索引递归性分析ams主题分类:初级:0582次级:051260c0560f0590b15免责声明作为对作者和研究人员的服务,我们提供此版本的接受稿件(AM)。在最终出版版本记录(VoR)之前,将对该手稿进行编辑、排版和审查。在制作和印前,可能会发现可能影响内容的错误,所有适用于期刊的法律免责声明也与这些版本有关。作者要感谢Dominic Abela开发和设计了交互式应用程序的初始原型。数据可得性声明支持本研究结果的数据可根据通讯作者的合理要求获得。注1 MapleTM是Waterloo Maple inc .的商标。注:此定理不需要定理1所需要的正则性条件;建筑顺序完全是任意的。
{"title":"Some empirical and theoretical attributes of random multi-hooking networks","authors":"Kiran R. Bhutani, Ravi Kalpathy, Hosam Mahmoud, Achuna Ofonedu","doi":"10.1080/23799927.2023.2278098","DOIUrl":"https://doi.org/10.1080/23799927.2023.2278098","url":null,"abstract":"AbstractMulti-hooking networks are a broad class of random hooking networks introduced in [8] wherein multiple copies of a seed are hooked at each step, and the number of copies follows a predetermined building sequence of numbers. For motivation, we provide two examples: one from chemistry and one from electrical engineering. We explore the empirical and theoretical local degree distribution of a specific node during its temporal evolution. We ask what will happen to the degree of a specific node at step n that first appeared in the network at step j. We conducted an experimental study to identify some cases with Gaussian asymptotic distributions, which we then proved. Additionally, we investigate the distance in the network through the lens of the average Wiener index for which we obtain a theoretical result for any building sequence and explore its empirical distribution for certain classes of building sequences that have systematic growth.Keywords: Networksrandom graphsdegree profileWiener indexrecurrenceasymptotic analysisAMS subject classifications:: Primary: 05C82Secondary: 05C1260C0560F0590B15DisclaimerAs a service to authors and researchers we are providing this version of an accepted manuscript (AM). Copyediting, typesetting, and review of the resulting proofs will be undertaken on this manuscript before final publication of the Version of Record (VoR). During production and pre-press, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal relate to these versions also. AcknowledgmentsThe authors would like to thank Dominic Abela for developing and designing the initial prototype of an interactive application.Data availability statementThe data that support the findings of this study are available from the corresponding author upon reasonable request.Notes1 MapleTM is a trademark of Waterloo Maple Inc.2 Note that this theorem does not require the regularity conditions needed in theorem 1; the building sequence is entirely arbitrary.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135972980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The regular edge connectivity of regular networks 规则网络的规则边缘连通性
Q4 Computer Science Pub Date : 2023-10-17 DOI: 10.1080/23799927.2023.2260349
Caixi Xue, Shuming Zhou, Hong Zhang, Qifan Zhang
AbstractClassical connectivity is a vital metric to assess the reliability of interconnection networks, while it has defects in the defective assumption that all neighbours of one node may fail concurrently. To overcome this deficiency, many new generalizations of traditional connectivity, such as g-component (edge) connectivity, restricted (edge) connectivity, g-extra (edge) connectivity and so on, have been suggested. For any positive integer a, the a-regular edge connectivity of a connected graph G is the minimum cardinality of an edge cut, whose deletion disconnects G so that each component is a a-regular graph. In this work, we investigate the a-regular edge connectivity of some regular networks, which provides a novel idea for further exploring the reliability of networks. Finally, simulations are carried out to compare the a-regular connectivity with other types of connectivity in some regular networks. The comparison results imply that the a-regular edge connectivity has its superiority.KEYWORDS: Interconnection networksconnectivitya-regular edge connectivityregular networks Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was partly supported by the National Natural Science Foundation of China [grant numbers 61977016, 61572010, and 62277010], Natural Science Foundation of Fujian Province, China [grant numbers 2020J01164 and 2017J01738]. This work was also partly supported by the China Scholarship Council [CSC number 202108350054].
摘要经典连通性是评估互连网络可靠性的重要指标,但经典连通性存在一个缺陷,即一个节点的所有邻居可能同时失效。为了克服这一缺陷,人们提出了许多传统连接的新概括,如g-component (edge)连接、restricted (edge)连接、g-extra (edge)连接等。对于任意正整数a,连通图G的a-正则边连通性是切边的最小基数,切边的删除断开G,使每个分量都是a-正则图。在本工作中,我们研究了一些规则网络的非规则边缘连通性,为进一步研究网络的可靠性提供了一个新的思路。最后,通过仿真比较了非规则网络与某些规则网络中其他类型的连接。对比结果表明,非规则边连通性有其优越性。关键词:互联网络连接常规边缘连接常规网络披露声明作者未报告潜在的利益冲突。基金资助:国家自然科学基金项目[资助号:61977016、61572010和62277010];福建省自然科学基金项目[资助号:2020J01164和2017J01738]。中国国家留学基金委[CSC号202108350054]也资助了本研究。
{"title":"The regular edge connectivity of regular networks","authors":"Caixi Xue, Shuming Zhou, Hong Zhang, Qifan Zhang","doi":"10.1080/23799927.2023.2260349","DOIUrl":"https://doi.org/10.1080/23799927.2023.2260349","url":null,"abstract":"AbstractClassical connectivity is a vital metric to assess the reliability of interconnection networks, while it has defects in the defective assumption that all neighbours of one node may fail concurrently. To overcome this deficiency, many new generalizations of traditional connectivity, such as g-component (edge) connectivity, restricted (edge) connectivity, g-extra (edge) connectivity and so on, have been suggested. For any positive integer a, the a-regular edge connectivity of a connected graph G is the minimum cardinality of an edge cut, whose deletion disconnects G so that each component is a a-regular graph. In this work, we investigate the a-regular edge connectivity of some regular networks, which provides a novel idea for further exploring the reliability of networks. Finally, simulations are carried out to compare the a-regular connectivity with other types of connectivity in some regular networks. The comparison results imply that the a-regular edge connectivity has its superiority.KEYWORDS: Interconnection networksconnectivitya-regular edge connectivityregular networks Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was partly supported by the National Natural Science Foundation of China [grant numbers 61977016, 61572010, and 62277010], Natural Science Foundation of Fujian Province, China [grant numbers 2020J01164 and 2017J01738]. This work was also partly supported by the China Scholarship Council [CSC number 202108350054].","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136033652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unbalanced multi-drawing urn with random addition matrix II 随机加法矩阵的不平衡多拉缸ⅱ
Q4 Computer Science Pub Date : 2023-10-12 DOI: 10.1080/23799927.2023.2262433
Rafik Aguech, Wissem Jedidi, Olfa Selmi
AbstractIn this paper, we give some results about a multi-drawing urn with random addition matrix. The process that we study is described as: at stage n≥1, we pick out at random m balls, say k white balls and m−k black balls. We inspect the colours and then we return the balls, according to a predefined replacement matrix, together with (m−k)Xn white balls and kYn black balls. Here, we extend the classical assumption that the random variables (Xn,Yn) are bounded and i.i.d. We prove a strong law of large numbers and a central limit theorem on the proportion of white balls for the total number of balls after n draws under the following more general assumptions: (i) a finite second-order moment condition in the i.i.d. case; (ii) regular variation type for the first and second moments in the independent case.Keywords: Central limit theoremmartingaleregular variationunbalanced urnstochastic algorithmstrong law of large numbers AcknowledgementsThe authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University for funding their Research group No. (RG-1441-317).Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Deanship of Scientific Research at King Saud University for funding their Research group No. (RG-1441-317).
摘要本文给出了带有随机加法矩阵的多图瓮的一些结果。我们研究的过程描述为:在阶段n≥1时,我们随机挑选m个球,例如k个白球和m - k个黑球。我们检查颜色,然后我们返回球,根据一个预定义的替换矩阵,连同(m−k)Xn白球和kYn黑球。在这里,我们推广了随机变量(Xn,Yn)是有界的和i.i.d的经典假设。在以下更一般的假设下,我们证明了n抽取后白球占总球数的比例的一个强大数定律和一个中心极限定理:(i) i.i.d情况下二阶矩的有限条件;(ii)独立情况下第一阶矩和第二阶矩的正则变化类型。关键词:中心极限定理,鞅,正则变分,非平衡非随机算法,强大数定律致谢作者衷心感谢沙特国王大学科学研究主任对他们的研究小组的资助。(rg - 1441 - 317)。披露声明作者未报告潜在的利益冲突。本研究得到了沙特国王大学科学研究主任的支持,为他们的研究小组提供资金。(rg - 1441 - 317)。
{"title":"Unbalanced multi-drawing urn with random addition matrix II","authors":"Rafik Aguech, Wissem Jedidi, Olfa Selmi","doi":"10.1080/23799927.2023.2262433","DOIUrl":"https://doi.org/10.1080/23799927.2023.2262433","url":null,"abstract":"AbstractIn this paper, we give some results about a multi-drawing urn with random addition matrix. The process that we study is described as: at stage n≥1, we pick out at random m balls, say k white balls and m−k black balls. We inspect the colours and then we return the balls, according to a predefined replacement matrix, together with (m−k)Xn white balls and kYn black balls. Here, we extend the classical assumption that the random variables (Xn,Yn) are bounded and i.i.d. We prove a strong law of large numbers and a central limit theorem on the proportion of white balls for the total number of balls after n draws under the following more general assumptions: (i) a finite second-order moment condition in the i.i.d. case; (ii) regular variation type for the first and second moments in the independent case.Keywords: Central limit theoremmartingaleregular variationunbalanced urnstochastic algorithmstrong law of large numbers AcknowledgementsThe authors would like to extend their sincere appreciation to the Deanship of Scientific Research at King Saud University for funding their Research group No. (RG-1441-317).Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationFundingThis work was supported by the Deanship of Scientific Research at King Saud University for funding their Research group No. (RG-1441-317).","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135923149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tight toughness, isolated toughness and binding number bounds for the path-cycle factors 路径周期因子的紧密韧性、孤立韧性和结合数界限
IF 0.8 Q4 Computer Science Pub Date : 2023-10-02 DOI: 10.1080/23799927.2023.2278109
Weizhen Chen, Suonan Renqian, Qingcuo Ren, Xin Li
In this paper, a sufficient condition with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the $ {K_{2}, C_{n}:ngeq 3} $ {K2,Cn:n≥3}-factor and $ {P_{2}, P_{3}} $ {P2,P3}-factor for any graph is obtained.
本文得到了一个关于紧韧、孤立韧和绑定数边界的充分条件,以保证任意图的 $ {K_{2}, C_{n}:ngeq 3} $ {K2,Cn:n≥3} 因子和 $ {P_{2}, P_{3}} $ {P2,P3} 因子的存在。
{"title":"Tight toughness, isolated toughness and binding number bounds for the path-cycle factors","authors":"Weizhen Chen, Suonan Renqian, Qingcuo Ren, Xin Li","doi":"10.1080/23799927.2023.2278109","DOIUrl":"https://doi.org/10.1080/23799927.2023.2278109","url":null,"abstract":"In this paper, a sufficient condition with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the $ {K_{2}, C_{n}:ngeq 3} $ {K2,Cn:n≥3}-factor and $ {P_{2}, P_{3}} $ {P2,P3}-factor for any graph is obtained.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139324556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel attack on McEliece's cryptosystem 对麦克利埃斯密码系统的新攻击
IF 0.8 Q4 Computer Science Pub Date : 2023-07-03 DOI: 10.1080/23799927.2023.2229278
Henry Gray, Christopher Battarbee, S. F. Shahandashti, Delaram Kahrobaei
This report proposes a new and novel attack on McEliece's cryptosystem that improves on the probability of attacks formerly proposed by Stern, and Lee and Brickell. Modern day encryption standards have been long since proven insecure to quantum attack, and quantum-resistant cryptosystems are now at the forefront of research. Since 2016, the National Institute of Standards and Technology (NIST) has presided over a public competition to establish new standards for public-key encryption that will secure our data in the post-quantum world. Now in its final round, one of the remaining candidates is McEliece's cryptosystem, a code-based cryptosystem proposed in 1978 by Robert J. McEliece. With a few minor alterations since its conception, McEliece's cryptosystem has, so far, proven resistant to quantum attacks, making it an ideal finalist candidate. The cryptosystem has not, however, escaped the attention of attack and, over the last four decades, a variety of algorithms have been proposed with the intention of exploiting it to recover the plaintext. This paper initially provides an overview of McEliece's cryptosystem and two existing attacks proposed by Stern, and Lee and Brickell in the 1980s. Observations are made on the shared probabilistic nature of Stern's algorithm, and Lee and Brickell's attack. It is noted that the first step of both algorithms involves the random selection of a subset of n indexes. In Stern's algorithm, n−k of n columns in a matrix H are chosen at random and, in Lee and Brickell's attack, k of n bits of the ciphertext are selected, also at random. This relationship is exploited to compound the two attacks and propose a new, novel attack. The complexity and probability of the new attack are discussed and an analysis is conducted to compare it against both Stern's algorithm and Lee and Brickell's attack. This analysis suggests that the probability of successful attack comes close to combining those of the two original attacks. Furthermore, the results suggest that the novel attack can successfully recover a message faster than Stern's algorithm. Improvements to the attack are suggested, concluding that further study should be conducted into fully analysing it and its implications on the security of McEliece's cryptosystem.
本报告提出了一种针对McEliece密码系统的新攻击方法,该方法提高了Stern、Lee和Brickell先前提出的攻击概率。现代加密标准早已被证明对量子攻击不安全,而抗量子密码系统现在处于研究的前沿。自2016年以来,美国国家标准与技术研究院(NIST)主持了一项公开竞赛,旨在建立新的公钥加密标准,以在后量子世界中保护我们的数据。现在进入最后一轮,剩下的候选人之一是McEliece的密码系统,这是1978年由Robert J. McEliece提出的基于代码的密码系统。McEliece的密码系统自构想以来进行了一些小的修改,到目前为止,它已经被证明可以抵抗量子攻击,使其成为理想的决赛候选人。然而,密码系统并没有逃过攻击的注意,在过去的四十年里,各种各样的算法被提出,目的是利用它来恢复明文。本文首先概述了McEliece的密码系统以及Stern、Lee和Brickell在20世纪80年代提出的两种现有攻击。对Stern算法和Lee和Brickell攻击的共同概率性质进行了观察。值得注意的是,这两种算法的第一步都涉及到n个索引子集的随机选择。在Stern的算法中,矩阵H的n列中的n - k列是随机选择的,而在Lee和Brickell的攻击中,密文的k位也是随机选择的。这种关系被用来混合两种攻击,并提出一种新的、新颖的攻击。讨论了新攻击的复杂性和概率,并将其与Stern的算法和Lee和Brickell的攻击进行了比较分析。这一分析表明,成功攻击的概率接近于两次原始攻击的总和。此外,结果表明,这种新的攻击可以比Stern的算法更快地成功恢复信息。建议对攻击进行改进,并得出结论,应该进行进一步的研究,以充分分析它及其对McEliece密码系统安全性的影响。
{"title":"A novel attack on McEliece's cryptosystem","authors":"Henry Gray, Christopher Battarbee, S. F. Shahandashti, Delaram Kahrobaei","doi":"10.1080/23799927.2023.2229278","DOIUrl":"https://doi.org/10.1080/23799927.2023.2229278","url":null,"abstract":"This report proposes a new and novel attack on McEliece's cryptosystem that improves on the probability of attacks formerly proposed by Stern, and Lee and Brickell. Modern day encryption standards have been long since proven insecure to quantum attack, and quantum-resistant cryptosystems are now at the forefront of research. Since 2016, the National Institute of Standards and Technology (NIST) has presided over a public competition to establish new standards for public-key encryption that will secure our data in the post-quantum world. Now in its final round, one of the remaining candidates is McEliece's cryptosystem, a code-based cryptosystem proposed in 1978 by Robert J. McEliece. With a few minor alterations since its conception, McEliece's cryptosystem has, so far, proven resistant to quantum attacks, making it an ideal finalist candidate. The cryptosystem has not, however, escaped the attention of attack and, over the last four decades, a variety of algorithms have been proposed with the intention of exploiting it to recover the plaintext. This paper initially provides an overview of McEliece's cryptosystem and two existing attacks proposed by Stern, and Lee and Brickell in the 1980s. Observations are made on the shared probabilistic nature of Stern's algorithm, and Lee and Brickell's attack. It is noted that the first step of both algorithms involves the random selection of a subset of n indexes. In Stern's algorithm, n−k of n columns in a matrix H are chosen at random and, in Lee and Brickell's attack, k of n bits of the ciphertext are selected, also at random. This relationship is exploited to compound the two attacks and propose a new, novel attack. The complexity and probability of the new attack are discussed and an analysis is conducted to compare it against both Stern's algorithm and Lee and Brickell's attack. This analysis suggests that the probability of successful attack comes close to combining those of the two original attacks. Furthermore, the results suggest that the novel attack can successfully recover a message faster than Stern's algorithm. Improvements to the attack are suggested, concluding that further study should be conducted into fully analysing it and its implications on the security of McEliece's cryptosystem.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80805495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fast and efficient teaching-learning-based optimization algorithm for large-scale multi-objective optimization problems 一种快速高效的基于教-学的大规模多目标优化问题优化算法
IF 0.8 Q4 Computer Science Pub Date : 2023-07-03 DOI: 10.1080/23799927.2023.2227147
Wafa Aouadj, Rachid Seghir
ABSTRACT Multi-objective optimization problems with large-scale decision variables, known as LSMOPs, are characterized by their large-scale search space and multiple conflicting objectives to be optimized. They have been involved in many emergent real-world applications, such as feature and instance selection, data clustering, adversarial attack, vehicle routing problem, and others. In this work, we propose a new teaching-learning-based optimization algorithm to effectively tackle large-scale multi-objective optimization problems. The proposed approach ensures both the diversity of solutions, requested for high dimensionality of LSMOPs, and the balance between the exploitation and exploration during the optimization process. The experimental studies conducted on 54 instances of a large-scale multi-objective optimization problems test suite and the comparisons against well-known and state-of-the-art algorithms have shown the superiority of the proposed algorithm in terms of Pareto front approximation and computation time by using limited evaluation budget.
具有大规模决策变量的多目标优化问题(LSMOPs)具有搜索空间大、需要优化的目标相互冲突等特点。他们已经参与了许多紧急的现实世界应用,如特征和实例选择、数据聚类、对抗性攻击、车辆路由问题等。在这项工作中,我们提出了一种新的基于教学的优化算法,以有效地解决大规模的多目标优化问题。该方法在优化过程中既保证了求解方法的多样性(满足LSMOPs的高维要求),又保证了开发与勘探之间的平衡。通过54例大规模多目标优化问题测试集的实验研究,并与国内外知名算法进行比较,结果表明,在有限的评估预算下,本文提出的算法在Pareto front逼近和计算时间方面具有优势。
{"title":"A fast and efficient teaching-learning-based optimization algorithm for large-scale multi-objective optimization problems","authors":"Wafa Aouadj, Rachid Seghir","doi":"10.1080/23799927.2023.2227147","DOIUrl":"https://doi.org/10.1080/23799927.2023.2227147","url":null,"abstract":"ABSTRACT Multi-objective optimization problems with large-scale decision variables, known as LSMOPs, are characterized by their large-scale search space and multiple conflicting objectives to be optimized. They have been involved in many emergent real-world applications, such as feature and instance selection, data clustering, adversarial attack, vehicle routing problem, and others. In this work, we propose a new teaching-learning-based optimization algorithm to effectively tackle large-scale multi-objective optimization problems. The proposed approach ensures both the diversity of solutions, requested for high dimensionality of LSMOPs, and the balance between the exploitation and exploration during the optimization process. The experimental studies conducted on 54 instances of a large-scale multi-objective optimization problems test suite and the comparisons against well-known and state-of-the-art algorithms have shown the superiority of the proposed algorithm in terms of Pareto front approximation and computation time by using limited evaluation budget.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83283780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recursive definition and two edge-disjoint Hamiltonian cycles of bubble-sort star graphs 泡状星图的递归定义和两条边不相交哈密顿环
IF 0.8 Q4 Computer Science Pub Date : 2023-06-25 DOI: 10.1080/23799927.2023.2225049
Dongqin Cheng
The bubble-sort star graph is an interconnection network for multiprocessor systems. Recursive structure is important for interconnection networks, since it can reduce the complex cases into simple cases, and it can keep good properties independent of dimensions. Many algorithms use the idea of recursive construction. Edge-disjoint Hamiltonian cycles not only provide the basis of all-to-all broadcasting algorithm for networks but also provide a replaceable Hamiltonian cycle for transmission when the other Hamiltonian cycle contains faulty edges in an interconnection network. In this paper, we propose the recursive definition of bubble-sort star graphs. Then as an application, we obtain two edge-disjoint Hamiltonian cycles of bubble-sort star graphs.
气泡排序星图是多处理器系统的互连网络。递归结构对于互连网络具有重要意义,它可以将复杂的情况简化为简单的情况,并且可以保持与维数无关的良好性质。许多算法使用递归构造的思想。边不相交的哈密顿环不仅为网络的全对全广播算法提供了基础,而且在互连网络中,当另一个哈密顿环包含故障边时,也为传输提供了一个可替换的哈密顿环。本文给出了气泡排序星图的递归定义。然后作为应用,我们得到了冒泡排序星图的两个边不相交哈密顿环。
{"title":"Recursive definition and two edge-disjoint Hamiltonian cycles of bubble-sort star graphs","authors":"Dongqin Cheng","doi":"10.1080/23799927.2023.2225049","DOIUrl":"https://doi.org/10.1080/23799927.2023.2225049","url":null,"abstract":"The bubble-sort star graph is an interconnection network for multiprocessor systems. Recursive structure is important for interconnection networks, since it can reduce the complex cases into simple cases, and it can keep good properties independent of dimensions. Many algorithms use the idea of recursive construction. Edge-disjoint Hamiltonian cycles not only provide the basis of all-to-all broadcasting algorithm for networks but also provide a replaceable Hamiltonian cycle for transmission when the other Hamiltonian cycle contains faulty edges in an interconnection network. In this paper, we propose the recursive definition of bubble-sort star graphs. Then as an application, we obtain two edge-disjoint Hamiltonian cycles of bubble-sort star graphs.","PeriodicalId":37216,"journal":{"name":"International Journal of Computer Mathematics: Computer Systems Theory","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85585404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International Journal of Computer Mathematics: Computer Systems Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1