首页 > 最新文献

Cluster Computing最新文献

英文 中文
G-SAM: GMM-based segment anything model for medical image classification and segmentation G-SAM:基于 GMM 的医学影像分类和分段模型
Pub Date : 2024-07-17 DOI: 10.1007/s10586-024-04679-x
Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei

In medical imaging, the classification and segmentation of lesions have always been significant topics in clinical research. Different categories of lesions require different treatment strategies, and accurate segmentation helps to assist in improving the effect of the clinical treatment. The Segment anything model (SAM) is an image segmentation model trained on a large-scale dataset with strong prompt segmentation capability, but it cannot be directly applied to the classification and segmentation tasks of medical images due to insufficient training on medical image data. In this paper, we propose a deep learning method for the classification and segmentation of lesions, called GMM-based segment anything model (G-SAM). Prompt-tuning is utilized in the model with the LoRA strategy, and the lesion feature extraction (GFE) module based on the Gaussian mixture model (GMM), is designed to effectively improve the effect of lesion classification and segmentation on the basis of the SAM. Notably, G-SAM exhibits greater sensitivity to early stage of the lesions, aiding in tumor detection and prevention, which holds important clinical value. G-SAM overcomes the limitation that SAM is not suitable for the medical image classification and segmentation tasks due to insufficient training data with minimal cost. Moreover, it enhances classification accuracy and segmentation precision compared to traditional Gaussian model-based methods. The effectiveness of G-SAM in classifying and segmenting lesions is validated on the LIDC dataset, demonstrating advantages over state-of-the-art (SOTA) methods. The study further validates the applicability of G-SAM on large publicly available datasets across three different image modalities, achieving superior performance.

在医学影像领域,病变的分类和分割一直是临床研究的重要课题。不同类别的病变需要不同的治疗策略,准确的分割有助于辅助提高临床治疗效果。Segment anything model(SAM)是一种在大规模数据集上训练的图像分割模型,具有很强的及时分割能力,但由于对医学图像数据的训练不足,无法直接应用于医学图像的分类和分割任务。本文提出了一种用于病变分类和分割的深度学习方法,称为基于 GMM 的分割模型(G-SAM)。该模型利用 LoRA 策略进行提示调整,并设计了基于高斯混合模型(GMM)的病变特征提取(GFE)模块,从而在 SAM 的基础上有效提高了病变分类和分割的效果。值得注意的是,G-SAM 对早期病变表现出更高的灵敏度,有助于肿瘤的检测和预防,具有重要的临床价值。G-SAM 以最小的成本克服了 SAM 因训练数据不足而不适用于医学图像分类和分割任务的局限性。此外,与传统的基于高斯模型的方法相比,它还提高了分类准确率和分割精度。研究在 LIDC 数据集上验证了 G-SAM 在病变分类和分割方面的有效性,证明了它比最先进的(SOTA)方法更具优势。研究进一步验证了 G-SAM 在三种不同图像模式的大型公开数据集上的适用性,并取得了优异的性能。
{"title":"G-SAM: GMM-based segment anything model for medical image classification and segmentation","authors":"Xiaoxiao Liu, Yan Zhao, Shigang Wang, Jian Wei","doi":"10.1007/s10586-024-04679-x","DOIUrl":"https://doi.org/10.1007/s10586-024-04679-x","url":null,"abstract":"<p>In medical imaging, the classification and segmentation of lesions have always been significant topics in clinical research. Different categories of lesions require different treatment strategies, and accurate segmentation helps to assist in improving the effect of the clinical treatment. The Segment anything model (SAM) is an image segmentation model trained on a large-scale dataset with strong prompt segmentation capability, but it cannot be directly applied to the classification and segmentation tasks of medical images due to insufficient training on medical image data. In this paper, we propose a deep learning method for the classification and segmentation of lesions, called GMM-based segment anything model (G-SAM). Prompt-tuning is utilized in the model with the LoRA strategy, and the lesion feature extraction (GFE) module based on the Gaussian mixture model (GMM), is designed to effectively improve the effect of lesion classification and segmentation on the basis of the SAM. Notably, G-SAM exhibits greater sensitivity to early stage of the lesions, aiding in tumor detection and prevention, which holds important clinical value. G-SAM overcomes the limitation that SAM is not suitable for the medical image classification and segmentation tasks due to insufficient training data with minimal cost. Moreover, it enhances classification accuracy and segmentation precision compared to traditional Gaussian model-based methods. The effectiveness of G-SAM in classifying and segmenting lesions is validated on the LIDC dataset, demonstrating advantages over state-of-the-art (SOTA) methods. The study further validates the applicability of G-SAM on large publicly available datasets across three different image modalities, achieving superior performance.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141717442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis 基于随机生物地理学学习的改进型 RIME 算法:狼疮性肾炎图像分割的应用
Pub Date : 2024-07-17 DOI: 10.1007/s10586-024-04628-8
Boli Zheng, Yi Chen, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen, Xiaowei Chen, Peirong Chen

Lupus nephritis (LN) is the most common symptom of systemic lupus erythematosus, emphasizing its importance in the field of medicine. The growing frequency of LN has increased the need for effective image segmentation algorithms. With the increasing prevalence of LN, the demand for efficient image segmentation techniques has grown. To enhance the efficiency of image segmentation of LN, many researchers employ a methodology that integrates multi-threshold image segmentation (MTIS) with metaheuristic algorithms (MAs). However, conventional MAs-based MTIS methods tend to converge towards local optima and have slow convergence rates, resulting in poor segmentation results within a limited iteration number. To address these challenges, this study proposes an advanced optimization algorithm termed Biogeography-based Learning Rime Optimization Algorithm (BLRIME) and integrates it with the MTIS approach for LN image segmentation. MTIS employs a non-local means 2D histogram to gather image information and uses 2D Renyi’s entropy as the fitness function. BLRIME builds upon the foundation of the RIME algorithm, incorporating two significant strategies. Firstly, the introduction of piecewise chaotic mapping (PCM) ameliorates the quality of the initial solution provided by the algorithm. Secondly, a stochastic biogeography-based learning strategy (SBLS) prevents the RIME algorithm from falling into the local optimum early. SBLS is proposed by this study based on the biogeography-based learning strategy. In order to assess the efficacy of the BLRIME, this paper devises a series of experiments to compare it with similar algorithms presented at IEEE CEC 2017. Experimental studies have been conducted to provide empirical evidence demonstrating the superior rates of convergence and precision achieved by BLRIME. Subsequently, the BLRIME-based MTIS algorithm is employed to segment the LN images compared to other peer algorithms. Furthermore, the peak signal-to-noise ratio, feature similarity index, and structural similarity index are utilized as evaluation metrics to assess the image segmentation outcomes. The experimental results prove that BLRIME demonstrates superior global search capabilities, resulting in remarkable outcomes in the segmentation of LN images.

狼疮性肾炎(LN)是系统性红斑狼疮最常见的症状,在医学领域的重要性不言而喻。狼疮性肾炎的发病率越来越高,因此更加需要有效的图像分割算法。随着 LN 发病率的增加,对高效图像分割技术的需求也随之增加。为了提高 LN 图像分割的效率,许多研究人员采用了一种将多阈值图像分割(MTIS)与元启发式算法(MAs)相结合的方法。然而,传统的基于元启发式算法的 MTIS 方法往往趋于局部最优,收敛速度较慢,导致在有限的迭代次数内分割效果不佳。为应对这些挑战,本研究提出了一种先进的优化算法,即基于生物地理学的学习时间优化算法(BLRIME),并将其与 MTIS 方法整合用于 LN 图像分割。MTIS 采用非局部手段二维直方图收集图像信息,并使用二维仁义熵作为拟合函数。BLRIME 算法建立在 RIME 算法的基础上,融入了两个重要策略。首先,引入了片断混沌映射(PCM),改善了算法提供的初始解的质量。其次,基于随机生物地理学的学习策略(SBLS)可防止 RIME 算法过早陷入局部最优。本研究在基于生物地理学的学习策略基础上提出了 SBLS。为了评估 BLRIME 的功效,本文设计了一系列实验,将其与 IEEE CEC 2017 上提出的类似算法进行比较。实验研究提供了经验证据,证明 BLRIME 实现了卓越的收敛率和精度。随后,与其他同类算法相比,基于 BLRIME 的 MTIS 算法被用于分割 LN 图像。此外,还利用峰值信噪比、特征相似性指数和结构相似性指数作为评价指标,评估图像分割结果。实验结果证明,BLRIME 具有卓越的全局搜索能力,在 LN 图像分割方面取得了显著的成果。
{"title":"Stochastic biogeography-based learning improved RIME algorithm: application to image segmentation of lupus nephritis","authors":"Boli Zheng, Yi Chen, Chaofan Wang, Ali Asghar Heidari, Lei Liu, Huiling Chen, Xiaowei Chen, Peirong Chen","doi":"10.1007/s10586-024-04628-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04628-8","url":null,"abstract":"<p>Lupus nephritis (LN) is the most common symptom of systemic lupus erythematosus, emphasizing its importance in the field of medicine. The growing frequency of LN has increased the need for effective image segmentation algorithms. With the increasing prevalence of LN, the demand for efficient image segmentation techniques has grown. To enhance the efficiency of image segmentation of LN, many researchers employ a methodology that integrates multi-threshold image segmentation (MTIS) with metaheuristic algorithms (MAs). However, conventional MAs-based MTIS methods tend to converge towards local optima and have slow convergence rates, resulting in poor segmentation results within a limited iteration number. To address these challenges, this study proposes an advanced optimization algorithm termed Biogeography-based Learning Rime Optimization Algorithm (BLRIME) and integrates it with the MTIS approach for LN image segmentation. MTIS employs a non-local means 2D histogram to gather image information and uses 2D Renyi’s entropy as the fitness function. BLRIME builds upon the foundation of the RIME algorithm, incorporating two significant strategies. Firstly, the introduction of piecewise chaotic mapping (PCM) ameliorates the quality of the initial solution provided by the algorithm. Secondly, a stochastic biogeography-based learning strategy (SBLS) prevents the RIME algorithm from falling into the local optimum early. SBLS is proposed by this study based on the biogeography-based learning strategy. In order to assess the efficacy of the BLRIME, this paper devises a series of experiments to compare it with similar algorithms presented at IEEE CEC 2017. Experimental studies have been conducted to provide empirical evidence demonstrating the superior rates of convergence and precision achieved by BLRIME. Subsequently, the BLRIME-based MTIS algorithm is employed to segment the LN images compared to other peer algorithms. Furthermore, the peak signal-to-noise ratio, feature similarity index, and structural similarity index are utilized as evaluation metrics to assess the image segmentation outcomes. The experimental results prove that BLRIME demonstrates superior global search capabilities, resulting in remarkable outcomes in the segmentation of LN images.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA sequences design under many objective evolutionary algorithm 多目标进化算法下的 DNA 序列设计
Pub Date : 2024-07-16 DOI: 10.1007/s10586-024-04675-1
Huaiyu Guo, Donglin Zhu, Changjun Zhou, Chengye Zou
{"title":"DNA sequences design under many objective evolutionary algorithm","authors":"Huaiyu Guo, Donglin Zhu, Changjun Zhou, Chengye Zou","doi":"10.1007/s10586-024-04675-1","DOIUrl":"https://doi.org/10.1007/s10586-024-04675-1","url":null,"abstract":"","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141643801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal power scheduling of microgrid considering renewable sources and demand response management 考虑可再生能源和需求响应管理的微电网优化电力调度
Pub Date : 2024-07-16 DOI: 10.1007/s10586-024-04669-z
Abhishek Srivastava, D. Das, Siseyiekuo Khatsu
{"title":"Optimal power scheduling of microgrid considering renewable sources and demand response management","authors":"Abhishek Srivastava, D. Das, Siseyiekuo Khatsu","doi":"10.1007/s10586-024-04669-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04669-z","url":null,"abstract":"","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141641648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach 异构云数据中心的高能效虚拟机放置:一种集群增强型多目标、多回报强化学习方法
Pub Date : 2024-07-15 DOI: 10.1007/s10586-024-04657-3
Arezoo Ghasemi, Amin Keshavarzi
{"title":"Energy-efficient virtual machine placement in heterogeneous cloud data centers: a clustering-enhanced multi-objective, multi-reward reinforcement learning approach","authors":"Arezoo Ghasemi, Amin Keshavarzi","doi":"10.1007/s10586-024-04657-3","DOIUrl":"https://doi.org/10.1007/s10586-024-04657-3","url":null,"abstract":"","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141645098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lattice-based ring signcryption scheme for smart healthcare management 基于网格的智能医疗保健管理环形签名加密方案
Pub Date : 2024-07-15 DOI: 10.1007/s10586-024-04611-3
Sourav, Rifaqat Ali
{"title":"Lattice-based ring signcryption scheme for smart healthcare management","authors":"Sourav, Rifaqat Ali","doi":"10.1007/s10586-024-04611-3","DOIUrl":"https://doi.org/10.1007/s10586-024-04611-3","url":null,"abstract":"","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141648439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A quantitative analysis of the security of PoW-based blockchains 基于 PoW 的区块链安全性定量分析
Pub Date : 2024-07-14 DOI: 10.1007/s10586-024-04645-7
Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel

This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification process. The stale block rate is a crucial security metric that quantifies the proportion of rejected blocks in the blockchain network. The absence of a block verification process represents another critical security concern, as it permits the potential for invalid transactions within the network. In this article, we propose and implement a quantitative and analytical model to capture the primary operations of Proof-of-Work blockchains utilizing the Performance Evaluation Process Algebra. The proposed model can assist blockchain designers, architects, and analysts in achieving the ideal security level for blockchain systems by determining the proper network and consensus settings. We conduct extensive experiments to determine the sensitivity of security to four aspects: the number of active miners and their mining hash rates, the duration between blocks, the latency in block propagation, and the time required for block verification, all of which have been shown to influence the outcomes. We contribute to the findings of the existing research by conducting the first analysis of how the number of miners affects the frequency of stale block results, as well as how the delay in block propagation influences the incentives received by rational miners who choose to avoid the block verification process.

本研究分析了 "工作证明 "区块链在陈旧区块率和缺乏区块验证过程方面的安全影响。陈旧区块率是一个重要的安全指标,它量化了区块链网络中被拒绝区块的比例。缺乏区块验证过程是另一个重要的安全问题,因为它允许在网络中进行无效交易。在本文中,我们提出并实施了一个定量分析模型,利用性能评估过程代数来捕捉工作证明区块链的主要操作。所提出的模型可以帮助区块链设计者、架构师和分析师通过确定适当的网络和共识设置来实现区块链系统的理想安全级别。我们进行了大量实验,以确定安全性对以下四个方面的敏感性:活跃矿工的数量及其挖矿哈希率、区块之间的持续时间、区块传播的延迟以及区块验证所需的时间。我们首次分析了矿工数量如何影响陈旧区块结果的出现频率,以及区块传播延迟如何影响选择避开区块验证过程的理性矿工获得的奖励,从而为现有研究成果做出了贡献。
{"title":"A quantitative analysis of the security of PoW-based blockchains","authors":"Maher Alharby, Ali Alssaiari, Saad Alateef, Nigel Thomas, Aad van Moorsel","doi":"10.1007/s10586-024-04645-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04645-7","url":null,"abstract":"<p>This study analyzes the security implications of Proof-of-Work blockchains with respect to the stale block rate and the lack of a block verification process. The stale block rate is a crucial security metric that quantifies the proportion of rejected blocks in the blockchain network. The absence of a block verification process represents another critical security concern, as it permits the potential for invalid transactions within the network. In this article, we propose and implement a quantitative and analytical model to capture the primary operations of Proof-of-Work blockchains utilizing the Performance Evaluation Process Algebra. The proposed model can assist blockchain designers, architects, and analysts in achieving the ideal security level for blockchain systems by determining the proper network and consensus settings. We conduct extensive experiments to determine the sensitivity of security to four aspects: the number of active miners and their mining hash rates, the duration between blocks, the latency in block propagation, and the time required for block verification, all of which have been shown to influence the outcomes. We contribute to the findings of the existing research by conducting the first analysis of how the number of miners affects the frequency of stale block results, as well as how the delay in block propagation influences the incentives received by rational miners who choose to avoid the block verification process.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent and efficient task caching for mobile edge computing 移动边缘计算的智能高效任务缓存
Pub Date : 2024-07-13 DOI: 10.1007/s10586-024-04658-2
Amir Moradi, Fatemeh Rezaei

Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it has been found that novel methods are needed to support centralized cloud technology. Mobile edge computing is one of the solutions to mitigate these challenges. In this paper, we study task caching at Device to Device (D2D)-assisted network edge. In the proposed scheme, we predict the possibility of re-requesting tasks in the future using convolutional neural networks (CNN). Based on this predicted possibility, the number of last requests, and the number of cached versions of this task type in the neighbors, in addition to the characteristics of a task itself, including the required cache volume and processing resources, we rank the tasks using the proposed Multi-Criteria Task Ranking using Predicted requests (MCTRP) scheme and select the best replacement option in the cache of each Mobile User Equipment (MUE). The proposed scheme has proved to be of considerable benefit in terms of reducing delay and energy consumption and improving the utility of MUEs.

鉴于集中式云计算存在的问题、超低延迟应用的出现以及物联网(IoT)的需求,人们发现需要新的方法来支持集中式云计算技术。移动边缘计算是缓解这些挑战的解决方案之一。本文研究了设备到设备(D2D)辅助网络边缘的任务缓存。在提出的方案中,我们使用卷积神经网络(CNN)预测了未来重新请求任务的可能性。除了任务本身的特性(包括所需的缓存容量和处理资源)外,我们还根据这种预测可能性、上次请求的数量、邻域中该任务类型的缓存版本数量,使用所提出的使用预测请求的多标准任务排序(MCTRP)方案对任务进行排序,并在每个移动用户设备(MUE)的缓存中选择最佳替换选项。事实证明,建议的方案在减少延迟和能源消耗以及提高 MUE 的效用方面具有相当大的优势。
{"title":"Intelligent and efficient task caching for mobile edge computing","authors":"Amir Moradi, Fatemeh Rezaei","doi":"10.1007/s10586-024-04658-2","DOIUrl":"https://doi.org/10.1007/s10586-024-04658-2","url":null,"abstract":"<p>Given the problems with a centralized cloud and the emergence of ultra-low latency applications, and the needs of the Internet of Things (IoT), it has been found that novel methods are needed to support centralized cloud technology. Mobile edge computing is one of the solutions to mitigate these challenges. In this paper, we study task caching at Device to Device (D2D)-assisted network edge. In the proposed scheme, we predict the possibility of re-requesting tasks in the future using convolutional neural networks (CNN). Based on this predicted possibility, the number of last requests, and the number of cached versions of this task type in the neighbors, in addition to the characteristics of a task itself, including the required cache volume and processing resources, we rank the tasks using the proposed Multi-Criteria Task Ranking using Predicted requests (MCTRP) scheme and select the best replacement option in the cache of each Mobile User Equipment (MUE). The proposed scheme has proved to be of considerable benefit in terms of reducing delay and energy consumption and improving the utility of MUEs.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification 基于主标签空间转换和脊回归的多标签分类混合猩猩部队优化和水母搜索算法
Pub Date : 2024-07-09 DOI: 10.1007/s10586-024-04501-8
Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh

Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc. With the evolution of data collection tools and the unceasing efforts of researchers, new datasets with huge dimensions are obtained so that each data sample has multiple labels. This kind of classification is called Multi-Class Classification (MLC) and demands new techniques to predict the set of labels for a data instance. To date, a variety of methods have been proposed to solve MLC problems. However, new high-dimensional datasets with challenging patterns are being developed, making it necessary for new research to be conducted to develop more efficient methods. This paper presents a novel framework named QLHA to solve MLC problems more efficiently. In the QLHA, the Principal Label Space Transformation (PLST) and Ridge Regression (RR) are recruited to predict the labels of data. Next, an effective objective function is introduced. Also, a hybrid metaheuristic algorithm called QGTOJS is provided to optimize objective value and enhance the predicted labels by selecting the most relevant features. In the QGTOJS, the Gorilla Troops Optimization (GTO) and Jellyfish Search algorithm (JS) are binarized and hybridized through a modified variant of the Q-learning algorithm. Besides, an adjusted Hill Climbing strategy is adopted to balance the exploration and exploitation and improve local optima departure. Likewise, a local search mechanism is provided to enhance searchability as much as possible. Eventually, the QLHA is applied to ten multi-label datasets and the obtained results are compared with heuristic and metaheuristic-based MLC methods numerically and visually. The experimental results disclosed the effectiveness of the contributions and superiority of the QLHA over competitors.

分类作为机器学习和数据挖掘的重要组成部分,在工程、医学、农业、军事等领域发挥着重要作用。随着数据收集工具的发展和研究人员的不懈努力,人们获得了具有巨大维度的新数据集,因此每个数据样本都有多个标签。这种分类被称为多类分类(MLC),需要新的技术来预测数据实例的标签集。迄今为止,已经提出了多种方法来解决 MLC 问题。然而,具有挑战性模式的新高维数据集正在开发中,因此有必要开展新的研究,以开发更有效的方法。本文提出了一种名为 QLHA 的新型框架,用于更高效地解决 MLC 问题。在 QLHA 中,采用了主标签空间变换(PLST)和岭回归(RR)来预测数据的标签。接着,引入了一个有效的目标函数。此外,还提供了一种名为 QGTOJS 的混合元启发式算法,以优化目标值,并通过选择最相关的特征来增强预测标签。在 QGTOJS 中,猩猩部队优化算法(GTO)和水母搜索算法(JS)被二值化,并通过 Q-learning 算法的修改变体进行混合。此外,还采用了调整后的爬坡策略,以平衡探索和利用,改善局部最优出发。同样,还提供了一种局部搜索机制,以尽可能提高可搜索性。最后,QLHA 被应用于十个多标签数据集,并与基于启发式和元启发式的 MLC 方法进行了数值和视觉比较。实验结果表明了 QLHA 所做贡献的有效性以及优于竞争对手的优势。
{"title":"A principal label space transformation and ridge regression-based hybrid gorilla troops optimization and jellyfish search algorithm for multi-label classification","authors":"Seyed Hossein Seyed Ebrahimi, Kambiz Majidzadeh, Farhad Soleimanian Gharehchopogh","doi":"10.1007/s10586-024-04501-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04501-8","url":null,"abstract":"<p>Classification as an essential part of Machine Learning and Data Mining has significant roles in engineering, medicine, agriculture, military, etc. With the evolution of data collection tools and the unceasing efforts of researchers, new datasets with huge dimensions are obtained so that each data sample has multiple labels. This kind of classification is called Multi-Class Classification (MLC) and demands new techniques to predict the set of labels for a data instance. To date, a variety of methods have been proposed to solve MLC problems. However, new high-dimensional datasets with challenging patterns are being developed, making it necessary for new research to be conducted to develop more efficient methods. This paper presents a novel framework named QLHA to solve MLC problems more efficiently. In the QLHA, the Principal Label Space Transformation (PLST) and Ridge Regression (RR) are recruited to predict the labels of data. Next, an effective objective function is introduced. Also, a hybrid metaheuristic algorithm called QGTOJS is provided to optimize objective value and enhance the predicted labels by selecting the most relevant features. In the QGTOJS, the Gorilla Troops Optimization (GTO) and Jellyfish Search algorithm (JS) are binarized and hybridized through a modified variant of the Q-learning algorithm. Besides, an adjusted Hill Climbing strategy is adopted to balance the exploration and exploitation and improve local optima departure. Likewise, a local search mechanism is provided to enhance searchability as much as possible. Eventually, the QLHA is applied to ten multi-label datasets and the obtained results are compared with heuristic and metaheuristic-based MLC methods numerically and visually. The experimental results disclosed the effectiveness of the contributions and superiority of the QLHA over competitors.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141575841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient quantum oblivious transfer protocol 高效量子遗忘传输协议
Pub Date : 2024-07-08 DOI: 10.1007/s10586-024-04642-w
Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager

Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of information and a receiver having a choice bit. The choice bit represents the piece of information that the receiver wants to obtain as an output of OT. At the end of the protocol, sender remains oblivious about the choice bit and receiver remains oblivious to the contents of the information that were not chosen. It has applications ranging from secure multi-party computation, privacy-preserving protocols to cryptographic protocols for secure communication. Most of the classical OT protocols are based on number theoretic assumptions which are not quantum secure and existing quantum OT protocols are not so efficient and practical. Herein, we present the design and analysis of a simple yet efficient quantum OT protocol, namely qOT. qOT is designed by using the asymmetric key distribution proposed by Gao et al. (Opt Express 20(16):17411–17420, 2012) as a building block. The designed qOT requires only single photons as a source of a quantum state, and the measurements of the states are computed using single particle projective measurement. These make qOT efficient and practical. Our proposed design is secure against quantum attacks. Moreover, qOT also provides long-term security.

遗忘传输(OT)是一种重要的保护双方隐私的加密原语。OT 包括发送方和接收方,发送方有几条信息,接收方有一个选择位。选择位代表接收方希望作为 OT 输出获得的信息。协议结束时,发送方对选择位保持未知,接收方对未选择的信息内容保持未知。它的应用范围包括安全多方计算、隐私保护协议和安全通信加密协议。大多数经典加时协议都基于数论假设,不具备量子安全性,而且现有的量子加时协议并不高效实用。在此,我们介绍了一种简单而高效的量子 OT 协议(即 qOT)的设计和分析。qOT 是以 Gao 等人提出的非对称密钥分配(《光快报》20(16):17411-17420, 2012)为基础设计的。所设计的 qOT 只需要单光子作为量子态的来源,而量子态的测量是通过单粒子投射测量来计算的。这些都使得 qOT 高效而实用。我们提出的设计可以安全地抵御量子攻击。此外,qOT 还具有长期安全性。
{"title":"An efficient quantum oblivious transfer protocol","authors":"Sushmita Sarkar, Vikas Srivastava, Tapaswini Mohanty, Sumit Kumar Debnath, Sihem Mesnager","doi":"10.1007/s10586-024-04642-w","DOIUrl":"https://doi.org/10.1007/s10586-024-04642-w","url":null,"abstract":"<p>Oblivious transfer (OT) is a significant two party privacy preserving cryptographic primitive. OT involves a sender having several pieces of information and a receiver having a choice bit. The choice bit represents the piece of information that the receiver wants to obtain as an output of OT. At the end of the protocol, sender remains oblivious about the choice bit and receiver remains oblivious to the contents of the information that were not chosen. It has applications ranging from secure multi-party computation, privacy-preserving protocols to cryptographic protocols for secure communication. Most of the classical OT protocols are based on number theoretic assumptions which are not quantum secure and existing quantum OT protocols are not so efficient and practical. Herein, we present the design and analysis of a simple yet efficient quantum OT protocol, namely <span>qOT</span>. <span>qOT</span> is designed by using the asymmetric key distribution proposed by Gao et al. (Opt Express 20(16):17411–17420, 2012) as a building block. The designed <span>qOT</span> requires only single photons as a source of a quantum state, and the measurements of the states are computed using single particle projective measurement. These make <span>qOT</span> efficient and practical. Our proposed design is secure against quantum attacks. Moreover, <span>qOT</span> also provides long-term security.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141575842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1