首页 > 最新文献

Symmetry-Basel最新文献

英文 中文
Elastic Wave Mechanics in Damaged Metallic Plates 损伤金属板的弹性波动力学
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-27 DOI: 10.3390/sym15111989
Samuel Chukwuemeka Olisa, Muhammad A. Khan, Andrew Starr
Human health monitoring (HHM) is essential for continued daily task execution, as is structural health monitoring (SHM) for structures to ensure the continual performance of their designed tasks with optimal efficiency. The existence of damage in a structure affects its optimal use through stiffness deterioration. Damage of different forms could occur in a structure but have the singular objective of material degradation, leading to its underuse for a task. Guided wave ultrasonics has shown strength in detecting sundry damage in structures, but most of the damage monitored and detected is unfilled with substances. However, some damage could trap and accumulate substances that could hasten material degradation through corrosion activities under favorable conditions, especially in the oil and gas industry. This study used the ultrasonic-guided waves’ pitch–catch inspection technique to identify damage filled with different materials. The assessment was based on the RMSD of the dominant Lamb wave mode’s average maximum amplitude and the response signals’ transmission coefficient (TC). A five-cycle tone burst of excitation signals of different frequencies was created to generate propagating Lamb waves in the structure. The fundamental antisymmetric mode was found to be more sensitive than the fundamental symmetric mode when detecting damage filled with various substances. At 80 kHz, the deviation of the current response signals from the baseline response signals due to different filled substances in the damage was distinct and decreased with increased fluid viscosity. Given that structures in the oil and gas sector are particularly susceptible to substance-induced damage, the outcomes of this study are paramount.
人体健康监测(HHM)对于持续的日常任务执行至关重要,结构健康监测(SHM)对于确保结构以最佳效率持续执行其设计任务至关重要。结构损伤的存在通过刚度劣化影响结构的最佳使用。不同形式的损伤可能发生在一个结构中,但有一个单一的目标是材料降解,导致其在任务中使用不足。导波超声在检测各种结构损伤方面显示出强大的能力,但大多数被监测和检测的损伤是未填充物质的。然而,在有利的条件下,特别是在石油和天然气行业,一些损坏可能会捕获和积累物质,从而加速材料的降解。采用超声导波的俯角检测技术对不同材料填充的损伤进行识别。基于主导兰姆波模式的平均最大振幅的RMSD和响应信号的透射系数(TC)进行评估。利用不同频率的激励信号形成五周期的音调突发,在结构中产生传播的兰姆波。在检测充满各种物质的损伤时,基本反对称模态比基本对称模态更灵敏。在80 kHz时,损伤中不同填充物质导致的电流响应信号与基线响应信号的偏差明显,且随流体粘度的增加而减小。考虑到油气行业的结构特别容易受到物质引起的破坏,这项研究的结果是至关重要的。
{"title":"Elastic Wave Mechanics in Damaged Metallic Plates","authors":"Samuel Chukwuemeka Olisa, Muhammad A. Khan, Andrew Starr","doi":"10.3390/sym15111989","DOIUrl":"https://doi.org/10.3390/sym15111989","url":null,"abstract":"Human health monitoring (HHM) is essential for continued daily task execution, as is structural health monitoring (SHM) for structures to ensure the continual performance of their designed tasks with optimal efficiency. The existence of damage in a structure affects its optimal use through stiffness deterioration. Damage of different forms could occur in a structure but have the singular objective of material degradation, leading to its underuse for a task. Guided wave ultrasonics has shown strength in detecting sundry damage in structures, but most of the damage monitored and detected is unfilled with substances. However, some damage could trap and accumulate substances that could hasten material degradation through corrosion activities under favorable conditions, especially in the oil and gas industry. This study used the ultrasonic-guided waves’ pitch–catch inspection technique to identify damage filled with different materials. The assessment was based on the RMSD of the dominant Lamb wave mode’s average maximum amplitude and the response signals’ transmission coefficient (TC). A five-cycle tone burst of excitation signals of different frequencies was created to generate propagating Lamb waves in the structure. The fundamental antisymmetric mode was found to be more sensitive than the fundamental symmetric mode when detecting damage filled with various substances. At 80 kHz, the deviation of the current response signals from the baseline response signals due to different filled substances in the damage was distinct and decreased with increased fluid viscosity. Given that structures in the oil and gas sector are particularly susceptible to substance-induced damage, the outcomes of this study are paramount.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"214 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136316466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Maximum Clique Problem and Integer Programming Models, Their Modifications, Complexity and Implementation 最大团问题与整数规划模型及其修正、复杂性与实现
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111979
Milos Seda
The maximum clique problem is a problem that takes many forms in optimization and related graph theory problems, and also has many applications. Because of its NP-completeness (nondeterministic polynomial time), the question arises of its solvability for larger instances. Instead of the traditional approaches based on the use of approximate or stochastic heuristic methods, we focus here on the use of integer programming models in the GAMS (General Algebraic Modelling System) environment, which is based on exact methods and sophisticated deterministic heuristics incorporated in it. We propose modifications of integer models, derive their time complexities and show their direct use in GAMS. GAMS makes it possible to find optimal solutions to the maximum clique problem for instances with hundreds of vertices and thousands of edges within minutes at most. For extremely large instances, good approximations of the optimum are given in a reasonable amount of time. A great advantage of this approach over all the mentioned algorithms is that even if GAMS does not find the best known solution within the chosen time limit, it displays its value at the end of the calculation as a reachable bound.
最大团问题是最优化及相关图论问题中形式多样的问题,具有广泛的应用。由于它的np完备性(不确定多项式时间),问题出现在更大的实例的可解性。与基于近似或随机启发式方法的传统方法不同,我们将重点放在GAMS(通用代数建模系统)环境中整数规划模型的使用上,该模型基于精确方法和复杂的确定性启发式。我们提出了整数模型的修正,推导了它们的时间复杂度,并展示了它们在GAMS中的直接应用。GAMS可以在几分钟内为具有数百个顶点和数千条边的实例找到最大团问题的最优解。对于非常大的实例,在合理的时间内给出最优的良好近似值。与上述所有算法相比,这种方法的一大优点是,即使GAMS没有在选定的时间限制内找到最知名的解决方案,它也会在计算结束时将其值显示为可到达的边界。
{"title":"The Maximum Clique Problem and Integer Programming Models, Their Modifications, Complexity and Implementation","authors":"Milos Seda","doi":"10.3390/sym15111979","DOIUrl":"https://doi.org/10.3390/sym15111979","url":null,"abstract":"The maximum clique problem is a problem that takes many forms in optimization and related graph theory problems, and also has many applications. Because of its NP-completeness (nondeterministic polynomial time), the question arises of its solvability for larger instances. Instead of the traditional approaches based on the use of approximate or stochastic heuristic methods, we focus here on the use of integer programming models in the GAMS (General Algebraic Modelling System) environment, which is based on exact methods and sophisticated deterministic heuristics incorporated in it. We propose modifications of integer models, derive their time complexities and show their direct use in GAMS. GAMS makes it possible to find optimal solutions to the maximum clique problem for instances with hundreds of vertices and thousands of edges within minutes at most. For extremely large instances, good approximations of the optimum are given in a reasonable amount of time. A great advantage of this approach over all the mentioned algorithms is that even if GAMS does not find the best known solution within the chosen time limit, it displays its value at the end of the calculation as a reachable bound.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"12 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on the Criteria for Starlikeness in Integral Operators Involving Bessel Functions 涉及贝塞尔函数的积分算子星形判据的研究
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111976
Georgia Irina Oros, Gheorghe Oros, Daniela Andrada Bardac-Vlada
The study presented in this paper follows a line of research familiar for Geometric Function Theory, which consists in defining new integral operators and conducting studies for revealing certain geometric properties of those integral operators such as univalence, starlikness, or convexity. The present research focuses on the Bessel function of the first kind and order ν unveiling the conditions for this function to be univalent and further using its univalent form in order to define a new integral operator on the space of holomorphic functions. For particular values of the parameters implicated in the definition of the new integral operator involving the Bessel function of the first kind, the well-known Alexander, Libera, and Bernardi integral operators can be obtained. In the first part of the study, necessary and sufficient conditions are obtained for the Bessel function of the first kind and order ν to be a starlike function or starlike of order α∈[0,1). The renowned prolific method of differential subordination due to Sanford S. Miller and Petru T. Mocanu is employed in the reasoning. In the second part of the study, the outcome of the first part is applied in order to introduce the new integral operator involving the form of the Bessel function of the first kind, which is starlike. Further investigations disclose the necessary and sufficient conditions for this new integral operator to be starlike or starlike of order 12.
本文提出的研究遵循了几何函数理论的研究路线,包括定义新的积分算子,并进行研究,以揭示这些积分算子的某些几何性质,如一元性、星形性或凸性。本文研究了第一类和阶的贝塞尔函数,揭示了该函数为一元的条件,并进一步利用其一元形式在全纯函数空间上定义了一个新的积分算子。对于包含第一类贝塞尔函数的新积分算子的定义中所包含的参数的特定值,可以得到著名的Alexander、Libera和Bernardi积分算子。在研究的第一部分中,得到了第一类和阶ν的Bessel函数是一个星形函数或阶α∈[0,1]的星形函数的充分必要条件。在推理中采用了Sanford S. Miller和Petru T. Mocanu著名的多产的差别从属方法。在第二部分的研究中,应用第一部分的结果,引入新的积分算子,涉及第一类贝塞尔函数的星形形式。进一步的研究揭示了这个新的积分算子是星形或12阶星形的充要条件。
{"title":"Study on the Criteria for Starlikeness in Integral Operators Involving Bessel Functions","authors":"Georgia Irina Oros, Gheorghe Oros, Daniela Andrada Bardac-Vlada","doi":"10.3390/sym15111976","DOIUrl":"https://doi.org/10.3390/sym15111976","url":null,"abstract":"The study presented in this paper follows a line of research familiar for Geometric Function Theory, which consists in defining new integral operators and conducting studies for revealing certain geometric properties of those integral operators such as univalence, starlikness, or convexity. The present research focuses on the Bessel function of the first kind and order ν unveiling the conditions for this function to be univalent and further using its univalent form in order to define a new integral operator on the space of holomorphic functions. For particular values of the parameters implicated in the definition of the new integral operator involving the Bessel function of the first kind, the well-known Alexander, Libera, and Bernardi integral operators can be obtained. In the first part of the study, necessary and sufficient conditions are obtained for the Bessel function of the first kind and order ν to be a starlike function or starlike of order α∈[0,1). The renowned prolific method of differential subordination due to Sanford S. Miller and Petru T. Mocanu is employed in the reasoning. In the second part of the study, the outcome of the first part is applied in order to introduce the new integral operator involving the form of the Bessel function of the first kind, which is starlike. Further investigations disclose the necessary and sufficient conditions for this new integral operator to be starlike or starlike of order 12.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134909244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Regarding the Ideal Convergence of Triple Sequences in Random 2-Normed Spaces 关于随机2赋范空间中三重序列的理想收敛性
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111983
Feras Bani-Ahmad, Mohammad H. M. Rashid
In our ongoing study, we explore the concepts of I3-Cauchy and I3-Cauchy for triple sequences in the context of random 2-normed spaces (RTNS). Moreover, we introduce and analyze the notions of I3-convergence, I3-convergence, I3-limit points, and I3-cluster points for random 2-normed triple sequences. Significantly, we establish a notable finding that elucidates the connection between I3-convergence and I3-convergence within the framework of random 2-normed spaces, highlighting their interrelation. Additionally, we provide an illuminating example that demonstrates how I3-convergence in a random 2-normed space might not necessarily imply I3-convergence. Our observations underscore the importance of condition (AP3) when examining summability using ideals. Furthermore, we thoroughly investigate the relationship between the properties (AP) and (AP3), illustrating through an example how the latter represents a less strict condition compared to the former.
在我们正在进行的研究中,我们探讨了随机2赋范空间(RTNS)下三组序列的I3-Cauchy和I3-Cauchy的概念。此外,我们引入并分析了随机2赋范三重序列的i3收敛、i3收敛、i3极限点和i3聚类点的概念。值得注意的是,我们建立了一个显著的发现,阐明了在随机2赋范空间框架内i3收敛和i3收敛之间的联系,突出了它们之间的相互关系。此外,我们还提供了一个启发性的示例,说明在随机2赋范空间中i3收敛如何不一定意味着i3收敛。我们的观察强调了条件(AP3)在使用理想检查可和性时的重要性。此外,我们深入研究了属性(AP)和属性(AP3)之间的关系,通过一个例子说明了与前者相比,后者如何表示较不严格的条件。
{"title":"Regarding the Ideal Convergence of Triple Sequences in Random 2-Normed Spaces","authors":"Feras Bani-Ahmad, Mohammad H. M. Rashid","doi":"10.3390/sym15111983","DOIUrl":"https://doi.org/10.3390/sym15111983","url":null,"abstract":"In our ongoing study, we explore the concepts of I3-Cauchy and I3-Cauchy for triple sequences in the context of random 2-normed spaces (RTNS). Moreover, we introduce and analyze the notions of I3-convergence, I3-convergence, I3-limit points, and I3-cluster points for random 2-normed triple sequences. Significantly, we establish a notable finding that elucidates the connection between I3-convergence and I3-convergence within the framework of random 2-normed spaces, highlighting their interrelation. Additionally, we provide an illuminating example that demonstrates how I3-convergence in a random 2-normed space might not necessarily imply I3-convergence. Our observations underscore the importance of condition (AP3) when examining summability using ideals. Furthermore, we thoroughly investigate the relationship between the properties (AP) and (AP3), illustrating through an example how the latter represents a less strict condition compared to the former.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Vulnerabilities and Attacks: SILEX Malware Case Study 物联网漏洞和攻击:SILEX恶意软件案例研究
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111978
Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer
The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent research ranked IP cameras as the 2nd highest target for IoT attacks. IoT security exhibits an inherent asymmetry where resource-constrained devices face attackers with greater resources and time, creating an imbalanced power dynamic. In cybersecurity, there is a symmetrical aspect where defenders implement security measures while attackers seek symmetrical weaknesses. The SILEX malware case highlights this asymmetry, demonstrating how IoT devices’ limited security made them susceptible to a relatively simple yet destructive attack. These insights underscore the need for robust, proactive IoT security measures to address the asymmetrical risks posed by adversaries and safeguard IoT ecosystems effectively. In this paper, we present the IoT vulnerabilities, their causes, and how to detect them. We focus on SILEX, one of the famous malware that targets IoT, as a case study and present the lessons learned from this malware.
物联网(IoT)正在迅速发展,预计将在未来几年发展。物联网连接了从闭路电视(CCTV)摄像头到医疗设备,从智能家电到智能汽车以及更多小工具的所有东西。通过在各个行业和部门提供更高的效率、更好的客户服务以及更有效的商品和服务,连接这些小工具正在彻底改变我们今天的生活。随着这种预期的扩张,出现了许多挑战。最近的研究将IP摄像机列为物联网攻击的第二大目标。物联网安全表现出固有的不对称性,资源受限的设备面临着拥有更多资源和时间的攻击者,从而造成了不平衡的权力动态。在网络安全中,防御者实施安全措施,而攻击者寻找对称的弱点,这是一个对称的方面。SILEX恶意软件案例突出了这种不对称性,展示了物联网设备有限的安全性如何使它们容易受到相对简单但具有破坏性的攻击。这些见解强调了强大、主动的物联网安全措施的必要性,以解决对手带来的不对称风险,并有效保护物联网生态系统。在本文中,我们介绍了物联网漏洞,它们的原因,以及如何检测它们。我们专注于SILEX,这是针对物联网的著名恶意软件之一,作为案例研究,并介绍从该恶意软件中吸取的教训。
{"title":"IoT Vulnerabilities and Attacks: SILEX Malware Case Study","authors":"Basem Ibrahim Mukhtar, Mahmoud Said Elsayed, Anca D. Jurcut, Marianne A. Azer","doi":"10.3390/sym15111978","DOIUrl":"https://doi.org/10.3390/sym15111978","url":null,"abstract":"The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, better customer service, and more effective goods and services in a variety of industries and sectors. With this anticipated expansion, many challenges arise. Recent research ranked IP cameras as the 2nd highest target for IoT attacks. IoT security exhibits an inherent asymmetry where resource-constrained devices face attackers with greater resources and time, creating an imbalanced power dynamic. In cybersecurity, there is a symmetrical aspect where defenders implement security measures while attackers seek symmetrical weaknesses. The SILEX malware case highlights this asymmetry, demonstrating how IoT devices’ limited security made them susceptible to a relatively simple yet destructive attack. These insights underscore the need for robust, proactive IoT security measures to address the asymmetrical risks posed by adversaries and safeguard IoT ecosystems effectively. In this paper, we present the IoT vulnerabilities, their causes, and how to detect them. We focus on SILEX, one of the famous malware that targets IoT, as a case study and present the lessons learned from this malware.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"18 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135013084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shifting Pattern Biclustering and Boolean Reasoning Symmetry 移动模式双聚类与布尔推理对称
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111977
Marcin Michalak, Jesús S. Aguilar-Ruiz
There are several goals of the two-dimensional data analysis: one may be interested in searching for groups of similar objects (clustering), another one may be focused on searching for some dependencies between a specified one and other variables (classification, regression, associate rules induction), and finally, some may be interested in serching for well-defined patterns in the data called biclusters. It was already proved that there exists a mathematically proven symmetry between some patterns in the matrix and implicants of data-defined Boolean function. This paper provides the new look for a specific pattern search—the pattern named the δ-shifting pattern. The shifting pattern is interesting, as it accounts for constant fluctuations in data, i.e., it captures situations in which all the values in the pattern move up or down for one dimension, maintaining the range amplitude for all the dimensions. Such a behavior is very common in real data, e.g., in the analysis of gene expression data. In such a domain, a subset of genes might go up or down for a subset of patients or experimental conditions, identifying functionally coherent categories. A δ-shifting pattern meets the necessity of shifting pattern induction together with the bias of the real values acquisition where the original shifts may be disturbed with some outer conditions. Experiments with a real dataset show the potential of our approach at finding biclusters with δ-shifting patterns, providing excellent performance. It was possible to find the 12×9 pattern in the 112×9 input data with MSR=0.00653. The experiments also revealed that δ-shifting patterns are quite difficult to be found by some well-known methods of biclustering, as these are not designed to focus on shifting patterns—results comparable due to MSR had much more variability (in terms of δ) than patterns found with Boolean reasoning.
二维数据分析有几个目标:一个目标可能对搜索相似对象的组(聚类)感兴趣,另一个目标可能专注于搜索指定对象与其他变量之间的一些依赖关系(分类、回归、关联规则归纳),最后,一些目标可能对搜索数据中定义良好的模式(称为双聚类)感兴趣。已经证明了矩阵中的某些模式与数据定义布尔函数的隐含式之间存在数学证明的对称性。本文为一种特殊的模式搜索提供了新的视角- δ移模式。移位模式很有趣,因为它解释了数据的持续波动,即,它捕获了模式中所有值在一个维度上向上或向下移动的情况,保持了所有维度的范围幅度。这种行为在真实数据中非常常见,例如基因表达数据的分析。在这样一个领域中,基因的一个子集可能会为一个子集的患者或实验条件而上升或下降,从而确定功能上连贯的类别。δ移位模式满足移位模式归纳的需要,同时也满足实际值采集的偏差,而原始移位可能受到某些外部条件的干扰。真实数据集的实验显示了我们的方法在寻找具有δ移位模式的双簇方面的潜力,提供了出色的性能。在MSR=0.00653的112×9输入数据中可以找到12×9模式。实验还表明,δ移位模式很难被一些著名的双聚类方法发现,因为这些方法并不是为了关注移位模式而设计的——与布尔推理发现的模式相比,MSR的结果具有更多的可变性(就δ而言)。
{"title":"Shifting Pattern Biclustering and Boolean Reasoning Symmetry","authors":"Marcin Michalak, Jesús S. Aguilar-Ruiz","doi":"10.3390/sym15111977","DOIUrl":"https://doi.org/10.3390/sym15111977","url":null,"abstract":"There are several goals of the two-dimensional data analysis: one may be interested in searching for groups of similar objects (clustering), another one may be focused on searching for some dependencies between a specified one and other variables (classification, regression, associate rules induction), and finally, some may be interested in serching for well-defined patterns in the data called biclusters. It was already proved that there exists a mathematically proven symmetry between some patterns in the matrix and implicants of data-defined Boolean function. This paper provides the new look for a specific pattern search—the pattern named the δ-shifting pattern. The shifting pattern is interesting, as it accounts for constant fluctuations in data, i.e., it captures situations in which all the values in the pattern move up or down for one dimension, maintaining the range amplitude for all the dimensions. Such a behavior is very common in real data, e.g., in the analysis of gene expression data. In such a domain, a subset of genes might go up or down for a subset of patients or experimental conditions, identifying functionally coherent categories. A δ-shifting pattern meets the necessity of shifting pattern induction together with the bias of the real values acquisition where the original shifts may be disturbed with some outer conditions. Experiments with a real dataset show the potential of our approach at finding biclusters with δ-shifting patterns, providing excellent performance. It was possible to find the 12×9 pattern in the 112×9 input data with MSR=0.00653. The experiments also revealed that δ-shifting patterns are quite difficult to be found by some well-known methods of biclustering, as these are not designed to focus on shifting patterns—results comparable due to MSR had much more variability (in terms of δ) than patterns found with Boolean reasoning.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"3 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136381460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solitary Wave Propagation of the Generalized Rosenau–Kawahara–RLW Equation in Shallow Water Theory with Surface Tension 浅水理论中具有表面张力的广义Rosenau-Kawahara-RLW方程的孤立波传播
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111980
Akeel A. AL-saedi, Omid Nikan, Zakieh Avazzadeh, António M. Lopes
This paper addresses a numerical approach for computing the solitary wave solutions of the generalized Rosenau–Kawahara–RLW model established by coupling the generalized Rosenau–Kawahara and Rosenau–RLW equations. The solution of this model is accomplished by using the finite difference approach and the upwind local radial basis functions-finite difference. Firstly, the PDE is transformed into a nonlinear ODEs system by means of the radial kernels. Secondly, a high-order ODE solver is implemented for discretizing the system of nonlinear ODEs. The main advantage of this technique is its lack of need for linearization. The global collocation techniques impose a significant computational cost, which arises from calculating the dense system of algebraic equations. The proposed technique estimates differential operators on every stencil. As a result, it produces sparse differentiation matrices and reduces the computational burden. Numerical experiments indicate that the method is precise and efficient for long-time simulation.
本文讨论了由广义Rosenau-Kawahara方程和Rosenau-RLW方程耦合建立的广义Rosenau-Kawahara - rlw模型的孤立波解的数值计算方法。采用有限差分法和迎风局部径向基函数-有限差分法对该模型进行求解。首先,利用径向核将偏微分方程转化为非线性偏微分方程系统;其次,采用高阶ODE求解器对非线性ODE系统进行离散化。这种技术的主要优点是不需要线性化。全局配置技术由于需要计算密集的代数方程组,计算成本很高。该方法估计每个模板上的微分算子。因此,它产生稀疏的微分矩阵,减少了计算量。数值实验表明,该方法对长时间的模拟精度高、效率高。
{"title":"Solitary Wave Propagation of the Generalized Rosenau–Kawahara–RLW Equation in Shallow Water Theory with Surface Tension","authors":"Akeel A. AL-saedi, Omid Nikan, Zakieh Avazzadeh, António M. Lopes","doi":"10.3390/sym15111980","DOIUrl":"https://doi.org/10.3390/sym15111980","url":null,"abstract":"This paper addresses a numerical approach for computing the solitary wave solutions of the generalized Rosenau–Kawahara–RLW model established by coupling the generalized Rosenau–Kawahara and Rosenau–RLW equations. The solution of this model is accomplished by using the finite difference approach and the upwind local radial basis functions-finite difference. Firstly, the PDE is transformed into a nonlinear ODEs system by means of the radial kernels. Secondly, a high-order ODE solver is implemented for discretizing the system of nonlinear ODEs. The main advantage of this technique is its lack of need for linearization. The global collocation techniques impose a significant computational cost, which arises from calculating the dense system of algebraic equations. The proposed technique estimates differential operators on every stencil. As a result, it produces sparse differentiation matrices and reduces the computational burden. Numerical experiments indicate that the method is precise and efficient for long-time simulation.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
More Variations on Shuffle Squares 洗牌方块的更多变化
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111982
Jarosław Grytczuk, Bartłomiej Pawlik, Mariusz Pleszczyński
We study an abstract variant of squares (and shuffle squares) defined by a constraint graph G, specifying which pairs of words form a square. So, a shuffle G-square is a word that can be split into two disjoint subwords U and W (of the same length), which are joined by an edge. This setting generalizes a recently introduced model of shuffle squares based on word symmetry and permutations. By using the probabilistic method, we provide a sufficient condition for a constraint graph G guaranteeing the avoidability of shuffle G-squares. By a more-elementary method (known as Rosenfeld counting), we prove that G-squares are avoidable over an alphabet of size 4α, α>1, provided that the degree of every word of length n in G is at most αn. We also introduce the concept of the cutting distance between words and state several conjectures involving this notion and various kinds of shuffle squares. We suspect that, for every k⩾2, there is a constant ck such that every even word can be turned into a shuffle square by cutting it in at most ck places and rearranging the resulting pieces. We present some computational, as well as theoretical evidence in favor of this conjecture.
我们研究了由约束图G定义的正方形(和洗牌正方形)的抽象变体,指定哪些单词对构成正方形。因此,洗牌g平方是一个可以分成两个不相交的子词U和W(长度相同)的词,它们由一条边连接。这种设置概括了最近引入的基于单词对称和排列的洗牌方块模型。利用概率方法,给出了约束图G保证洗牌G-squares可避免性的充分条件。通过一种更基本的方法(称为Rosenfeld计数),我们证明了在一个大小为4α, α>1的字母表上,如果G中每个长度为n的单词的度数最多为αn,则G平方是可以避免的。我们还介绍了单词之间切割距离的概念,并提出了几个关于这个概念和各种洗牌方块的猜想。我们怀疑,对于每个k或2,有一个恒定的ck使得每个偶数单词可以通过在最多ck处切割并重新排列结果片段而变成洗牌方块。我们提出了一些支持这一猜想的计算证据和理论证据。
{"title":"More Variations on Shuffle Squares","authors":"Jarosław Grytczuk, Bartłomiej Pawlik, Mariusz Pleszczyński","doi":"10.3390/sym15111982","DOIUrl":"https://doi.org/10.3390/sym15111982","url":null,"abstract":"We study an abstract variant of squares (and shuffle squares) defined by a constraint graph G, specifying which pairs of words form a square. So, a shuffle G-square is a word that can be split into two disjoint subwords U and W (of the same length), which are joined by an edge. This setting generalizes a recently introduced model of shuffle squares based on word symmetry and permutations. By using the probabilistic method, we provide a sufficient condition for a constraint graph G guaranteeing the avoidability of shuffle G-squares. By a more-elementary method (known as Rosenfeld counting), we prove that G-squares are avoidable over an alphabet of size 4α, α>1, provided that the degree of every word of length n in G is at most αn. We also introduce the concept of the cutting distance between words and state several conjectures involving this notion and various kinds of shuffle squares. We suspect that, for every k⩾2, there is a constant ck such that every even word can be turned into a shuffle square by cutting it in at most ck places and rearranging the resulting pieces. We present some computational, as well as theoretical evidence in favor of this conjecture.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberattacks and Security of Cloud Computing: A Complete Guideline 网络攻击与云计算安全:完整指南
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-26 DOI: 10.3390/sym15111981
Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman
Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security.
云计算是一种创新技术,它为库存缓存和服务器管理提供共享资源。云计算为任何组织节省了时间和监控成本,并将大规模系统的技术解决方案转变为服务器到服务框架。然而,就像任何其他技术一样,云计算带来了许多形式的安全威胁和问题。在这项工作中,我们分别重点讨论了不同的云模型和云服务。接下来,我们将讨论云模型中的安全趋势。考虑到这些安全趋势,我们转向安全问题,包括数据泄露、数据机密性、数据访问可控性、身份验证、尽职调查不足、网络钓鱼、密钥暴露、审计、隐私保护和云辅助物联网应用。然后,根据安全趋势和问题,针对不同的云模型提出了安全攻击和对策。最后,我们指出了一些与云模型安全性相关的未来方向和影响。未来的方向将帮助学术界和工业界的研究人员致力于云计算安全。
{"title":"Cyberattacks and Security of Cloud Computing: A Complete Guideline","authors":"Muhammad Dawood, Shanshan Tu, Chuangbai Xiao, Hisham Alasmary, Muhammad Waqas, Sadaqat Ur Rehman","doi":"10.3390/sym15111981","DOIUrl":"https://doi.org/10.3390/sym15111981","url":null,"abstract":"Cloud computing is an innovative technique that offers shared resources for stock cache and server management. Cloud computing saves time and monitoring costs for any organization and turns technological solutions for large-scale systems into server-to-service frameworks. However, just like any other technology, cloud computing opens up many forms of security threats and problems. In this work, we focus on discussing different cloud models and cloud services, respectively. Next, we discuss the security trends in the cloud models. Taking these security trends into account, we move to security problems, including data breaches, data confidentiality, data access controllability, authentication, inadequate diligence, phishing, key exposure, auditing, privacy preservability, and cloud-assisted IoT applications. We then propose security attacks and countermeasures specifically for the different cloud models based on the security trends and problems. In the end, we pinpoint some of the futuristic directions and implications relevant to the security of cloud models. The future directions will help researchers in academia and industry work toward cloud computing security.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134907319","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Trajectory Planning Method for Connected Autonomous Vehicles at Mining Site 矿区联网自动驾驶车辆安全轨迹规划方法
3区 综合性期刊 Q2 MULTIDISCIPLINARY SCIENCES Pub Date : 2023-10-25 DOI: 10.3390/sym15111973
Han Li, Yiming Li, Peng Chen, Guizhen Yu, Yaping Liao
Recently, with the assistance of 5G networks and the Internet of Things, specialized applications of autonomous driving to mining sites have been explored, with the goal of realizing the unmanned operation of mining systems and enhancing the safety of the mining industry. After receiving the loading task, the autonomous driving system will generate a feasible trajectory for the mining truck. It requires that the trajectory be generated in advanced within a limited-time high-latency network. In addition, the secure trajectory planning for mining sites involves factors in the complex environment and an unstable network. Thus, a secure trajectory planning method for autonomous trucks at mining sites is proposed. It simplifies the planning by decoupling the planning into front-end path searching and back-end trajectory generation. First, the planner enhances the Hybrid A* search algorithm to find the hauling path within the boundary of the mining site, and then, it post-processes the path with a well-designed symmetric optimization-based method. Then, considering the interaction with other autonomous trucks, a topology-guided search method for secure decision making is proposed, considering the possibility of cybersecurity. The proposed method was validated in real scenarios of the mining environment. The results verify that the planner can generate the secure trajectory under network delay 2.0 s conditions.
最近,在5G网络和物联网的辅助下,探索了自动驾驶在采矿现场的专门应用,目的是实现采矿系统的无人操作,提高采矿业的安全性。自动驾驶系统接收装载任务后,为矿用卡车生成可行的轨迹。它要求在有限时间的高延迟网络中提前生成轨迹。此外,矿山安全轨迹规划还涉及复杂环境和不稳定网络等因素。在此基础上,提出了矿区自动驾驶卡车安全轨迹规划方法。将规划解耦为前端路径搜索和后端轨迹生成,简化了规划过程。该规划器首先对Hybrid A*搜索算法进行改进,找到矿区边界内的牵引路径,然后对路径进行基于对称优化的后处理。然后,考虑到与其他自动驾驶卡车的交互,考虑到网络安全的可能性,提出了一种拓扑引导的安全决策方法。该方法在采矿环境的实际场景中得到了验证。结果验证了规划器在网络时延2.0条件下能够生成安全轨迹。
{"title":"A Secure Trajectory Planning Method for Connected Autonomous Vehicles at Mining Site","authors":"Han Li, Yiming Li, Peng Chen, Guizhen Yu, Yaping Liao","doi":"10.3390/sym15111973","DOIUrl":"https://doi.org/10.3390/sym15111973","url":null,"abstract":"Recently, with the assistance of 5G networks and the Internet of Things, specialized applications of autonomous driving to mining sites have been explored, with the goal of realizing the unmanned operation of mining systems and enhancing the safety of the mining industry. After receiving the loading task, the autonomous driving system will generate a feasible trajectory for the mining truck. It requires that the trajectory be generated in advanced within a limited-time high-latency network. In addition, the secure trajectory planning for mining sites involves factors in the complex environment and an unstable network. Thus, a secure trajectory planning method for autonomous trucks at mining sites is proposed. It simplifies the planning by decoupling the planning into front-end path searching and back-end trajectory generation. First, the planner enhances the Hybrid A* search algorithm to find the hauling path within the boundary of the mining site, and then, it post-processes the path with a well-designed symmetric optimization-based method. Then, considering the interaction with other autonomous trucks, a topology-guided search method for secure decision making is proposed, considering the possibility of cybersecurity. The proposed method was validated in real scenarios of the mining environment. The results verify that the planner can generate the secure trajectory under network delay 2.0 s conditions.","PeriodicalId":48874,"journal":{"name":"Symmetry-Basel","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135216520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Symmetry-Basel
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1