首页 > 最新文献

Cluster Computing最新文献

英文 中文
Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound 用区块链、声誉证明和霍夫丁约束连接立场与假新闻检测之间的联系
Pub Date : 2024-06-27 DOI: 10.1007/s10586-024-04637-7
Ilhem Salah, Khaled Jouini, Cyril-Alexandre Pachon, Ouajdi Korbaa

Combating fake news is a crucial endeavor, yet the complexity of the task requires multifaceted approaches that transcend singular technological solutions. Traditional fact-checking, often centralized and human-dependent, faces scalability and bias challenges. This paper introduces a novel blockchain-based framework that leverages the wisdom of the crowd for an authority-free, scalable, automated and reputation-driven fact-checking. Within this framework, stance detection acts as an automated means of opinion retrieval, while the Proof of Reputation consensus mechanism fosters an environment where reputable contributors have greater influence in shaping news credibility. Concurrently, the Hoeffding bound is used to allow the system to adapt to evolving contexts. In contrast to Machine Learning—based approaches, our framework limits the need for periodic retraining to update a model’s frozen knowledge of the world. The experimental study conducted on real-world data demonstrates that the proposed framework offers a promising and efficient solution to combat the spread of fake news.

打击假新闻是一项至关重要的工作,但这项任务的复杂性要求我们采取超越单一技术解决方案的多方面方法。传统的事实核查通常是中心化的,依赖于人力,面临着可扩展性和偏见的挑战。本文介绍了一种基于区块链的新型框架,该框架利用群众的智慧进行无权威、可扩展、自动化和声誉驱动的事实核查。在该框架中,立场检测是一种自动的意见检索手段,而 "声誉证明 "共识机制则营造了一种环境,使声誉良好的贡献者在塑造新闻可信度方面具有更大的影响力。同时,Hoeffding 约束用于使系统适应不断变化的环境。与基于机器学习的方法相比,我们的框架限制了定期重新训练以更新模型对世界的冻结知识的需求。在真实世界数据上进行的实验研究表明,所提出的框架为打击虚假新闻的传播提供了一种前景广阔的高效解决方案。
{"title":"Connecting the dots between stance and fake news detection with blockchain, proof of reputation, and the Hoeffding bound","authors":"Ilhem Salah, Khaled Jouini, Cyril-Alexandre Pachon, Ouajdi Korbaa","doi":"10.1007/s10586-024-04637-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04637-7","url":null,"abstract":"<p>Combating fake news is a crucial endeavor, yet the complexity of the task requires multifaceted approaches that transcend singular technological solutions. Traditional fact-checking, often centralized and human-dependent, faces scalability and bias challenges. This paper introduces a novel blockchain-based framework that leverages the wisdom of the crowd for an authority-free, scalable, automated and reputation-driven fact-checking. Within this framework, stance detection acts as an automated means of opinion retrieval, while the Proof of Reputation consensus mechanism fosters an environment where reputable contributors have greater influence in shaping news credibility. Concurrently, the Hoeffding bound is used to allow the system to adapt to evolving contexts. In contrast to Machine Learning—based approaches, our framework limits the need for periodic retraining to update a model’s frozen knowledge of the world. The experimental study conducted on real-world data demonstrates that the proposed framework offers a promising and efficient solution to combat the spread of fake news.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"84 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment RAPTS:异构雾计算环境中的资源感知优先任务调度技术
Pub Date : 2024-06-26 DOI: 10.1007/s10586-024-04612-2
Mazhar Hussain, Said Nabi, Mushtaq Hussain

The Internet of Things (IoT) is an emerging technology incorporating various hardware devices and software applications to exchange, analyze, and process a huge amount of data. IoT uses cloud and fog infrastructures, comprising different hardware and software components like computing machines, networking components, storage, and virtualization elements. They can receive, process, store, and exchange data in real time. A cloud is a centralized system containing large data centres that are far from client devices. However, as IoT generates massive amounts of data, issues like latency, response time, execution of tasks within their deadline, and bandwidth arise when data is sent to the cloud for processing. Compared to the cloud, fog computing is vital as a distributed system consisting of millions of devices located at the minimum distance from the client devices. In addition, fog infrastructure reduces bandwidth and latency because it is closer to the end-user. However, maximizing utilization of resources, minimizing response time, and ensuring the completion of deadline-constrained tasks within their deadline are important research problems in fog computing. This research proposes a task scheduling technique called Resource Aware Prioritized Task Scheduling (RAPTS) in a heterogeneous fog computing environment. The aim is to execute deadline-constrained tasks within their deadlines, minimize response time and cost, as well as makespan, and maximize resource utilization of the fog layer. The RAPTS is implemented using iFogSim and its performance is evaluated regarding response time, resource utilization, task deadlines, cost, and makespan. The results have been compared with state-of-the-art fog schedulers like RACE (CFP) and RACE (FOP). The results reveal that the RAPTS have shown up to 29%, 53%, 15%, 11%, and 43% improvement in terms of resource utilization, response time, makespan, cost, and meeting task deadlines, respectively.

物联网(IoT)是一项新兴技术,它结合了各种硬件设备和软件应用程序,用于交换、分析和处理海量数据。物联网使用云和雾基础设施,包括不同的硬件和软件组件,如计算机、网络组件、存储和虚拟化元素。它们可以实时接收、处理、存储和交换数据。云是一种集中式系统,包含远离客户端设备的大型数据中心。然而,由于物联网会产生海量数据,当数据被发送到云端进行处理时,就会出现延迟、响应时间、任务执行期限和带宽等问题。与云计算相比,雾计算是一个分布式系统,由数百万台设备组成,与客户端设备的距离最小。此外,由于雾基础设施更接近终端用户,因此可以减少带宽和延迟。然而,资源利用率最大化、响应时间最小化以及确保在截止日期前完成受限任务是雾计算的重要研究课题。本研究在异构雾计算环境中提出了一种名为 "资源感知优先任务调度(RAPTS)"的任务调度技术。其目的是在截止期限内执行受截止期限限制的任务,最大限度地减少响应时间、成本和时间跨度,并最大限度地提高雾层的资源利用率。RAPTS 是通过 iFogSim 实现的,其性能评估涉及响应时间、资源利用率、任务截止日期、成本和时间跨度。评估结果与 RACE (CFP) 和 RACE (FOP) 等最先进的雾调度器进行了比较。结果表明,RAPTS 在资源利用率、响应时间、间隔时间、成本和满足任务期限方面分别提高了 29%、53%、15%、11% 和 43%。
{"title":"RAPTS: resource aware prioritized task scheduling technique in heterogeneous fog computing environment","authors":"Mazhar Hussain, Said Nabi, Mushtaq Hussain","doi":"10.1007/s10586-024-04612-2","DOIUrl":"https://doi.org/10.1007/s10586-024-04612-2","url":null,"abstract":"<p>The Internet of Things (IoT) is an emerging technology incorporating various hardware devices and software applications to exchange, analyze, and process a huge amount of data. IoT uses cloud and fog infrastructures, comprising different hardware and software components like computing machines, networking components, storage, and virtualization elements. They can receive, process, store, and exchange data in real time. A cloud is a centralized system containing large data centres that are far from client devices. However, as IoT generates massive amounts of data, issues like latency, response time, execution of tasks within their deadline, and bandwidth arise when data is sent to the cloud for processing. Compared to the cloud, fog computing is vital as a distributed system consisting of millions of devices located at the minimum distance from the client devices. In addition, fog infrastructure reduces bandwidth and latency because it is closer to the end-user. However, maximizing utilization of resources, minimizing response time, and ensuring the completion of deadline-constrained tasks within their deadline are important research problems in fog computing. This research proposes a task scheduling technique called Resource Aware Prioritized Task Scheduling (RAPTS) in a heterogeneous fog computing environment. The aim is to execute deadline-constrained tasks within their deadlines, minimize response time and cost, as well as makespan, and maximize resource utilization of the fog layer. The RAPTS is implemented using iFogSim and its performance is evaluated regarding response time, resource utilization, task deadlines, cost, and makespan. The results have been compared with state-of-the-art fog schedulers like RACE (CFP) and RACE (FOP). The results reveal that the RAPTS have shown up to 29%, 53%, 15%, 11%, and 43% improvement in terms of resource utilization, response time, makespan, cost, and meeting task deadlines, respectively.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"217 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141529431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel real-time object detection method for complex road scenes based on YOLOv7-tiny 基于 YOLOv7-tiny 的新型复杂道路场景实时物体检测方法
Pub Date : 2024-06-26 DOI: 10.1007/s10586-024-04595-0
Yunfa Li, Hui Li

Road object detection is a key technology in intelligent transportation systems, playing a crucial role in ensuring driving safety and enhancing driving experience. However, due to factors such as weather and visual occlusions, particularly in complex traffic scenes, the recognition rate and accuracy of object detection are often less than satisfactory, far from meeting the application demands of intelligent driving. In order to address the issues of weak generalization and low regression accuracy of image similarity evaluation metrics, we propose a new anchor box calculation algorithm. Building upon this, to tackle the problem of weak graphic attention and feature capture capabilities in the backbone network,We propose an improved CA attention mechanism. In addition, to address the issues of low detection accuracy and imprecise positioning of the model in complex traffic scenarios, we propose a new image enhancement module. we select the road traffic dataset BDD(Berkeley Deep Drive)100K as the benchmark evaluation dataset and divide the training and validation sets into six new categories. Through this series of strategies, a new real-time road object detection method suitable for complex traffic scenes is formed. To validate the effectiveness of this method, we conducted a series of experiments. The experimental results demonstrate that our proposed method achieves a mean average precision improvement of 3.61% compared to the YOLOv7-tiny method.

道路物体检测是智能交通系统中的一项关键技术,在确保驾驶安全和提升驾驶体验方面发挥着至关重要的作用。然而,由于天气、视觉遮挡等因素的影响,特别是在复杂的交通场景中,物体检测的识别率和准确率往往不尽如人意,远远不能满足智能驾驶的应用需求。针对图像相似性评价指标泛化能力弱、回归精度低的问题,我们提出了一种新的锚框计算算法。在此基础上,针对骨干网络图形注意力和特征捕捉能力较弱的问题,我们提出了一种改进的 CA 注意机制。此外,针对复杂交通场景下模型检测精度低、定位不精确等问题,我们提出了新的图像增强模块。我们选择道路交通数据集 BDD(Berkeley Deep Drive)100K 作为基准评估数据集,并将训练集和验证集划分为六个新类别。通过这一系列策略,形成了一种适用于复杂交通场景的新型实时道路物体检测方法。为了验证该方法的有效性,我们进行了一系列实验。实验结果表明,与 YOLOv7-tiny 方法相比,我们提出的方法平均精度提高了 3.61%。
{"title":"A novel real-time object detection method for complex road scenes based on YOLOv7-tiny","authors":"Yunfa Li, Hui Li","doi":"10.1007/s10586-024-04595-0","DOIUrl":"https://doi.org/10.1007/s10586-024-04595-0","url":null,"abstract":"<p>Road object detection is a key technology in intelligent transportation systems, playing a crucial role in ensuring driving safety and enhancing driving experience. However, due to factors such as weather and visual occlusions, particularly in complex traffic scenes, the recognition rate and accuracy of object detection are often less than satisfactory, far from meeting the application demands of intelligent driving. In order to address the issues of weak generalization and low regression accuracy of image similarity evaluation metrics, we propose a new anchor box calculation algorithm. Building upon this, to tackle the problem of weak graphic attention and feature capture capabilities in the backbone network,We propose an improved CA attention mechanism. In addition, to address the issues of low detection accuracy and imprecise positioning of the model in complex traffic scenarios, we propose a new image enhancement module. we select the road traffic dataset BDD(Berkeley Deep Drive)100K as the benchmark evaluation dataset and divide the training and validation sets into six new categories. Through this series of strategies, a new real-time road object detection method suitable for complex traffic scenes is formed. To validate the effectiveness of this method, we conducted a series of experiments. The experimental results demonstrate that our proposed method achieves a mean average precision improvement of 3.61% compared to the YOLOv7-tiny method.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection 利用卷积尖峰神经网络进行鲁棒入侵检测的革命性方法
Pub Date : 2024-06-26 DOI: 10.1007/s10586-024-04603-3
Yongxing Lin, Xiaoyan Xu, Hongyun Xu

In an era dominated by network connectivity, the reliance on robust and secure networks has become paramount. With the advent of 5G and the Internet of Things, networks are expanding in both scale and complexity, rendering them susceptible to a myriad of cyber threats. This escalating risk encompasses potential breaches of user privacy, unauthorized access to transmitted data, and targeted attacks on the underlying network infrastructure. To safeguard the integrity and security of modern networked societies, the deployment of Network Intrusion Detection Systems is imperative. This paper presents a novel lightweight detection model that seamlessly integrates Spiking Neural Networks and Convolutional Neural Networks with advanced algorithmic frameworks. Leveraging this hybrid approach, the proposed model achieves superior detection accuracy while maintaining efficiency in terms of power consumption and computational resources. This paper presents a new style recognition model that seamlessly integrates spiking neural networks and convolutional neural networks with advanced algorithmic frameworks. We call this combined method Spiking-HCCN. Using this hybrid approach, Spiking-HCCN achieves superior detection accuracy while maintaining efficiency in terms of power consumption and computational resources. Comparative evaluations against state-of-the-art models, including Spiking GCN and Spike-DHS, demonstrate significant performance advantages. Spiking-HCCN outperforms these benchmarks by 24% in detection accuracy, 21% in delay, and 29% in energy efficiency, underscoring its efficacy in fortifying network security in the face of evolving cyber threats.

在这个以网络连接为主导的时代,对稳健安全的网络的依赖变得至关重要。随着 5G 和物联网的出现,网络的规模和复杂性都在不断扩大,使其容易受到无数网络威胁的影响。这种不断升级的风险包括潜在的用户隐私泄露、对传输数据的未经授权访问以及对底层网络基础设施的定向攻击。为了保障现代网络社会的完整性和安全性,部署网络入侵检测系统势在必行。本文提出了一种新型轻量级检测模型,它将尖峰神经网络和卷积神经网络与先进的算法框架无缝集成。利用这种混合方法,所提出的模型在保持功耗和计算资源效率的同时,实现了更高的检测精度。本文提出了一种新的风格识别模型,它将尖峰神经网络和卷积神经网络与先进的算法框架完美地结合在一起。我们称这种组合方法为 Spiking-HCCN。利用这种混合方法,Spiking-HCCN 在保持功耗和计算资源效率的同时,实现了更高的检测精度。与包括 Spiking GCN 和 Spike-DHS 在内的最先进模型的比较评估表明,Spiking-HCCN 具有显著的性能优势。Spiking-HCCN 在检测准确率、延迟和能效方面分别比这些基准高出 24%、21% 和 29%,这表明它在面对不断变化的网络威胁时能够有效加强网络安全。
{"title":"A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection","authors":"Yongxing Lin, Xiaoyan Xu, Hongyun Xu","doi":"10.1007/s10586-024-04603-3","DOIUrl":"https://doi.org/10.1007/s10586-024-04603-3","url":null,"abstract":"<p>In an era dominated by network connectivity, the reliance on robust and secure networks has become paramount. With the advent of 5G and the Internet of Things, networks are expanding in both scale and complexity, rendering them susceptible to a myriad of cyber threats. This escalating risk encompasses potential breaches of user privacy, unauthorized access to transmitted data, and targeted attacks on the underlying network infrastructure. To safeguard the integrity and security of modern networked societies, the deployment of Network Intrusion Detection Systems is imperative. This paper presents a novel lightweight detection model that seamlessly integrates Spiking Neural Networks and Convolutional Neural Networks with advanced algorithmic frameworks. Leveraging this hybrid approach, the proposed model achieves superior detection accuracy while maintaining efficiency in terms of power consumption and computational resources. This paper presents a new style recognition model that seamlessly integrates <b>s</b>piking neural networks and convolutional neural networks with advanced algorithmic frameworks. We call this combined method Spiking-HCCN. Using this hybrid approach, Spiking-HCCN achieves superior detection accuracy while maintaining efficiency in terms of power consumption and computational resources. Comparative evaluations against state-of-the-art models, including Spiking GCN and Spike-DHS, demonstrate significant performance advantages. Spiking-HCCN outperforms these benchmarks by 24% in detection accuracy, 21% in delay, and 29% in energy efficiency, underscoring its efficacy in fortifying network security in the face of evolving cyber threats.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm HOGWO:使用混合灰狼算法的雾启发优化负载平衡方法
Pub Date : 2024-06-25 DOI: 10.1007/s10586-024-04625-x
Debashreet Das, Sayak Sengupta, Shashank Mouli Satapathy, Deepanshu Saini

A distributed archetype, the concept of fog computing relocates the storage, computation, and services closer to the network’s edge, where the data is generated. Despite these advantages, the users expect proper load management in the fog environment. This has expanded the Internet of Things (IoT) field, increasing user requests for the fog computing layer. Given the growth, Virtual Machines (VMs) in the fog layer become overburdened due to user demands. In the fog layer, it is essential to evenly and fairly distribute the workload among the segment’s current VMs. Numerous load-management strategies for fog environments have been implemented up to this point. This study aims to create a hybridized and optimized approach for load management (HOGWO), in which the population set is generated using the Invasive Weed Optimisation (IWO) algorithm. The rest of the functional part is done with the help of the Grey Wolf Optimization (GWO) algorithm. This process ensures cost optimization, increased performance, scalability, and adaptability to any domain, such as healthcare, vehicular traffic management, etc. Also, the efficiency of the enhanced approach is analyzed in various scenarios to provide a more optimal solution set. The proposed approach is well illustrated and outperforms the existing algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), etc., in terms of cost and load management. It was found that more than 97% jobs were completed on time, according to the testing data, and the hybrid technique outperformed all other approaches in terms of fluctuation of load and makespan.

作为一种分布式原型,雾计算的概念是将存储、计算和服务迁移到更靠近数据产生地的网络边缘。尽管有这些优势,用户仍希望在雾环境中进行适当的负载管理。这拓展了物联网(IoT)领域,增加了用户对雾计算层的要求。由于用户需求的增长,雾计算层中的虚拟机(VM)变得不堪重负。在雾计算层,必须在网段的现有虚拟机之间均匀、公平地分配工作负载。到目前为止,已有许多针对雾环境的负载管理策略得到了实施。本研究旨在创建一种混合优化的负载管理方法(HOGWO),其中使用入侵杂草优化(IWO)算法生成群体集。其余功能部分则借助灰狼优化(GWO)算法完成。这一过程确保了成本优化、性能提升、可扩展性以及对任何领域(如医疗保健、车辆交通管理等)的适应性。此外,还在各种场景中分析了增强型方法的效率,以提供更优化的解决方案集。所提出的方法很好地说明了这一点,并且在成本和负载管理方面优于粒子群优化(PSO)、遗传算法(GA)等现有算法。测试数据表明,97% 以上的工作都能按时完成,而且混合技术在负载波动和工期方面优于所有其他方法。
{"title":"HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm","authors":"Debashreet Das, Sayak Sengupta, Shashank Mouli Satapathy, Deepanshu Saini","doi":"10.1007/s10586-024-04625-x","DOIUrl":"https://doi.org/10.1007/s10586-024-04625-x","url":null,"abstract":"<p>A distributed archetype, the concept of fog computing relocates the storage, computation, and services closer to the network’s edge, where the data is generated. Despite these advantages, the users expect proper load management in the fog environment. This has expanded the Internet of Things (IoT) field, increasing user requests for the fog computing layer. Given the growth, Virtual Machines (VMs) in the fog layer become overburdened due to user demands. In the fog layer, it is essential to evenly and fairly distribute the workload among the segment’s current VMs. Numerous load-management strategies for fog environments have been implemented up to this point. This study aims to create a hybridized and optimized approach for load management (HOGWO), in which the population set is generated using the Invasive Weed Optimisation (IWO) algorithm. The rest of the functional part is done with the help of the Grey Wolf Optimization (GWO) algorithm. This process ensures cost optimization, increased performance, scalability, and adaptability to any domain, such as healthcare, vehicular traffic management, etc. Also, the efficiency of the enhanced approach is analyzed in various scenarios to provide a more optimal solution set. The proposed approach is well illustrated and outperforms the existing algorithms, such as Particle Swarm Optimization (PSO), Genetic Algorithm (GA), etc., in terms of cost and load management. It was found that more than 97% jobs were completed on time, according to the testing data, and the hybrid technique outperformed all other approaches in terms of fluctuation of load and makespan.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems 捕鱼优化算法:解决聚类问题的新型人类行为算法
Pub Date : 2024-06-25 DOI: 10.1007/s10586-024-04618-w
Heming Jia, Qixian Wen, Yuhao Wang, Seyedali Mirjalili

This paper is inspired by traditional rural fishing methods and proposes a new metaheuristic optimization algorithm based on human behavior: Catch Fish Optimization Algorithm (CFOA). This algorithm simulates the process of rural fishermen fishing in ponds, which is mainly divided into two phases: the exploration phase and the exploitation phase. In the exploration phase, there are two stages to search: first, the individual capture stage based on personal experience and intuition, and second, the group capture stage based on human proficiency in using tools and collaboration. Transition from independent search to group capture during the exploration phase. Exploitation phase: All fishermen will surround the shoal of fish and work together to salvage the remaining fish, a collective capture strategy. CFOA model is based on these two phases. This paper tested the optimization performance of CFOA using IEEE CEC 2014 and IEEE CEC 2020 test functions, and compared it with 11 other optimization algorithms. We employed the IEEE CEC2017 function to evaluate the overall performance of CFOA. The experimental results indicate that CFOA exhibits excellent and stable optimization capabilities overall. Additionally, we applied CFOA to data clustering problems, and the final results demonstrate that CFOA’s overall error rate in processing clustering problems is less than 20%, resulting in a better clustering effect. The comprehensive experimental results show that CFOA exhibits excellent optimization effects when facing different optimization problems. CFOA code is open at https://github.com/Meky-1210/CFOA.git.

本文受到传统农村捕鱼方法的启发,提出了一种基于人类行为的新型元启发式优化算法:捕鱼优化算法(CFOA)。该算法模拟了农村渔民在池塘捕鱼的过程,主要分为两个阶段:探索阶段和开发阶段。在探索阶段,搜索分为两个阶段:一是基于个人经验和直觉的个体捕获阶段,二是基于人类熟练使用工具和协作的群体捕获阶段。在探索阶段,从独立搜索过渡到群体捕捉。开发阶段:所有渔民将包围鱼群,共同打捞剩余的鱼,这是一种集体捕捉策略。CFOA 模型基于这两个阶段。本文使用 IEEE CEC 2014 和 IEEE CEC 2020 测试函数测试了 CFOA 的优化性能,并将其与其他 11 种优化算法进行了比较。我们采用了 IEEE CEC2017 函数来评估 CFOA 的整体性能。实验结果表明,CFOA 在整体上表现出了卓越而稳定的优化能力。此外,我们还将 CFOA 应用于数据聚类问题,最终结果表明,CFOA 在处理聚类问题时的整体错误率低于 20%,聚类效果较好。综合实验结果表明,面对不同的优化问题,CFOA 都表现出了出色的优化效果。CFOA 代码开放于 https://github.com/Meky-1210/CFOA.git。
{"title":"Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems","authors":"Heming Jia, Qixian Wen, Yuhao Wang, Seyedali Mirjalili","doi":"10.1007/s10586-024-04618-w","DOIUrl":"https://doi.org/10.1007/s10586-024-04618-w","url":null,"abstract":"<p>This paper is inspired by traditional rural fishing methods and proposes a new metaheuristic optimization algorithm based on human behavior: Catch Fish Optimization Algorithm (CFOA). This algorithm simulates the process of rural fishermen fishing in ponds, which is mainly divided into two phases: the exploration phase and the exploitation phase. In the exploration phase, there are two stages to search: first, the individual capture stage based on personal experience and intuition, and second, the group capture stage based on human proficiency in using tools and collaboration. Transition from independent search to group capture during the exploration phase. Exploitation phase: All fishermen will surround the shoal of fish and work together to salvage the remaining fish, a collective capture strategy. CFOA model is based on these two phases. This paper tested the optimization performance of CFOA using IEEE CEC 2014 and IEEE CEC 2020 test functions, and compared it with 11 other optimization algorithms. We employed the IEEE CEC2017 function to evaluate the overall performance of CFOA. The experimental results indicate that CFOA exhibits excellent and stable optimization capabilities overall. Additionally, we applied CFOA to data clustering problems, and the final results demonstrate that CFOA’s overall error rate in processing clustering problems is less than 20%, resulting in a better clustering effect. The comprehensive experimental results show that CFOA exhibits excellent optimization effects when facing different optimization problems. CFOA code is open at https://github.com/Meky-1210/CFOA.git.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction 具有注意力机制的自适应时空图卷积网络用于移动边缘网络流量预测
Pub Date : 2024-06-25 DOI: 10.1007/s10586-024-04577-2
Ning Sha, Xiaochun Wu, Jinpeng Wen, Jinglei Li, Chuanhuang Li

In the current era of mobile edge networks, a significant challenge lies in overcoming the limitations posed by limited edge storage and computational resources. To address these issues, accurate network traffic prediction has emerged as a promising solution. However, due to the intricate spatial and temporal dependencies inherent in mobile edge network traffic, the prediction task remains highly challenging. Recent spatio-temporal neural network algorithms based on graph convolution have shown promising results, but they often rely on pre-defined graph structures or learned parameters. This approach neglects the dynamic nature of short-term relationships, leading to limitations in prediction accuracy. To address these limitations, we introduce Ada-ASTGCN, an innovative attention-based adaptive spatio-temporal graph convolutional network. Ada-ASTGCN dynamically derives an optimal graph structure, considering both the long-term stability and short-term bursty evolution. This allows for more precise spatio-temporal network traffic prediction. In addition, we employ an alternative training approach during optimization, replacing the traditional end-to-end training method. This alternative training approach better guides the learning direction of the model, leading to improved prediction performance. To validate the effectiveness of Ada-ASTGCN, we conducted extensive traffic prediction experiments on real-world datasets. The results demonstrate the superior performance of Ada-ASTGCN compared to existing methods, highlighting its ability to accurately predict network traffic in mobile edge networks.

在当前的移动边缘网络时代,克服有限的边缘存储和计算资源带来的限制是一项重大挑战。为解决这些问题,精确的网络流量预测已成为一种前景广阔的解决方案。然而,由于移动边缘网络流量固有的错综复杂的空间和时间依赖性,预测任务仍然极具挑战性。最近基于图卷积的时空神经网络算法取得了可喜的成果,但它们通常依赖于预定义的图结构或学习参数。这种方法忽视了短期关系的动态性质,导致预测准确性受到限制。为了解决这些局限性,我们引入了 Ada-ASTGCN,这是一种基于注意力的创新型自适应时空图卷积网络。Ada-ASTGCN 动态生成最优图结构,同时考虑长期稳定性和短期突发性演变。这使得时空网络流量预测更加精确。此外,我们在优化过程中采用了另一种训练方法,取代了传统的端到端训练方法。这种替代训练方法能更好地引导模型的学习方向,从而提高预测性能。为了验证 Ada-ASTGCN 的有效性,我们在实际数据集上进行了大量交通预测实验。结果表明,与现有方法相比,Ada-ASTGCN 的性能更优越,突出了其在移动边缘网络中准确预测网络流量的能力。
{"title":"Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction","authors":"Ning Sha, Xiaochun Wu, Jinpeng Wen, Jinglei Li, Chuanhuang Li","doi":"10.1007/s10586-024-04577-2","DOIUrl":"https://doi.org/10.1007/s10586-024-04577-2","url":null,"abstract":"<p>In the current era of mobile edge networks, a significant challenge lies in overcoming the limitations posed by limited edge storage and computational resources. To address these issues, accurate network traffic prediction has emerged as a promising solution. However, due to the intricate spatial and temporal dependencies inherent in mobile edge network traffic, the prediction task remains highly challenging. Recent spatio-temporal neural network algorithms based on graph convolution have shown promising results, but they often rely on pre-defined graph structures or learned parameters. This approach neglects the dynamic nature of short-term relationships, leading to limitations in prediction accuracy. To address these limitations, we introduce Ada-ASTGCN, an innovative attention-based adaptive spatio-temporal graph convolutional network. Ada-ASTGCN dynamically derives an optimal graph structure, considering both the long-term stability and short-term bursty evolution. This allows for more precise spatio-temporal network traffic prediction. In addition, we employ an alternative training approach during optimization, replacing the traditional end-to-end training method. This alternative training approach better guides the learning direction of the model, leading to improved prediction performance. To validate the effectiveness of Ada-ASTGCN, we conducted extensive traffic prediction experiments on real-world datasets. The results demonstrate the superior performance of Ada-ASTGCN compared to existing methods, highlighting its ability to accurately predict network traffic in mobile edge networks.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An authentication mechanism based on blockchain for IoT environment 基于区块链的物联网环境认证机制
Pub Date : 2024-06-24 DOI: 10.1007/s10586-024-04565-6
Gholam Reza Zargar, Hamid Barati, Ali Barati

The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the Internet and telecommunications networks. However, the current methods of user authentication in this environment have limitations due to the need for a lightweight authentication process and limited resources. Therefore, this paper proposes a mutual authentication protocol for IoT that uses blockchain technology. The proposed protocol has a lightweight and secure architecture by using of Elliptic-Curve Cryptography and incorporates the AVISPA tool and BAN logic for formal/informal security analysis. Compared to previous protocols, this proposed protocol is more efficient in terms of communication and computation costs and is more resistant to various attacks.

物联网(IoT)是一个具有唯一地址的物理对象可以通过互联网和电信网络相互连接和通信的网络。然而,由于需要轻量级的身份验证过程和有限的资源,目前在这种环境下的用户身份验证方法存在局限性。因此,本文提出了一种使用区块链技术的物联网相互认证协议。该协议采用椭圆曲线加密技术,具有轻量级的安全架构,并结合了 AVISPA 工具和 BAN 逻辑进行形式/形式安全分析。与之前的协议相比,该拟议协议在通信和计算成本方面更加高效,并且更能抵御各种攻击。
{"title":"An authentication mechanism based on blockchain for IoT environment","authors":"Gholam Reza Zargar, Hamid Barati, Ali Barati","doi":"10.1007/s10586-024-04565-6","DOIUrl":"https://doi.org/10.1007/s10586-024-04565-6","url":null,"abstract":"<p>The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the Internet and telecommunications networks. However, the current methods of user authentication in this environment have limitations due to the need for a lightweight authentication process and limited resources. Therefore, this paper proposes a mutual authentication protocol for IoT that uses blockchain technology. The proposed protocol has a lightweight and secure architecture by using of Elliptic-Curve Cryptography and incorporates the AVISPA tool and BAN logic for formal/informal security analysis. Compared to previous protocols, this proposed protocol is more efficient in terms of communication and computation costs and is more resistant to various attacks.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook 无人飞行器辅助通信:应用、挑战和未来展望
Pub Date : 2024-06-23 DOI: 10.1007/s10586-024-04631-z
Yilin Li, Yanxian Bi, Jian Wang, Zhiqiang Li, Hongxia Zhang, Peiying Zhang

With the advancement of wireless communication technology, the number of wireless network terminals has exploded, and various new business scenarios have emerged. The 6G mobile communication technology not only surpasses 5G standards in terms of transmission rate, delay, power and other performances, but also extends the communication range to multiple fields such as air, ground, ocean, etc., which greatly promotes Unmanned Aerial Vehicle (UAV) communication technology research and development. Compared to terrestrial networks, UAV communication has advantages such as high flexibility and easy deployment. However, there are still many problems and challenges in practical applications. In this paper, we will first introduce the functions and application scenarios of UAV communication, then discuss the current challenges and related technical research, and finally look forward to the future development prospects.

随着无线通信技术的发展,无线网络终端数量呈爆炸式增长,各种新的业务场景层出不穷。6G 移动通信技术不仅在传输速率、时延、功率等性能上超越了 5G 标准,还将通信范围扩展到空中、地面、海洋等多个领域,极大地推动了无人机(UAV)通信技术的研发。与地面网络相比,无人机通信具有灵活性高、易于部署等优势。然而,在实际应用中仍存在许多问题和挑战。本文将首先介绍无人机通信的功能和应用场景,然后探讨当前面临的挑战和相关技术研究,最后展望未来的发展前景。
{"title":"Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook","authors":"Yilin Li, Yanxian Bi, Jian Wang, Zhiqiang Li, Hongxia Zhang, Peiying Zhang","doi":"10.1007/s10586-024-04631-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04631-z","url":null,"abstract":"<p>With the advancement of wireless communication technology, the number of wireless network terminals has exploded, and various new business scenarios have emerged. The 6G mobile communication technology not only surpasses 5G standards in terms of transmission rate, delay, power and other performances, but also extends the communication range to multiple fields such as air, ground, ocean, etc., which greatly promotes Unmanned Aerial Vehicle (UAV) communication technology research and development. Compared to terrestrial networks, UAV communication has advantages such as high flexibility and easy deployment. However, there are still many problems and challenges in practical applications. In this paper, we will first introduce the functions and application scenarios of UAV communication, then discuss the current challenges and related technical research, and finally look forward to the future development prospects.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"18 7 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid northern goshawk optimization algorithm based on cluster collaboration 基于集群协作的混合北方大鹰优化算法
Pub Date : 2024-06-23 DOI: 10.1007/s10586-024-04571-8
Changjun Wu, Qingzhen Li, Qiaohua Wang, Huanlong Zhang, Xiaohui Song

To address the problems that the northern goshawk optimization algorithm (NGO) has a slow convergence speed and is highly susceptible to fall into local optimal solutions, this paper proposes a hybrid northern goshawk optimization algorithm based on cluster collaboration (HHNGO), which effectively improves the convergence speed and alleviates the problem of falling into the local optimum. Firstly, piecewise chaotic mapping is used to initialize the population, which makes the initial population more evenly distributed in the search space and improves the quality of the initial solution. Secondly, the prey recognition position update formula in the harris hawk optimization algorithm is introduced to improve the exploration phase. Meanwhile, a nonlinear factor can be added to accelerate the process which reaches the minimum difference between the prey best position and the average position of the eagle group. Thus the iteration number is reduced during the search process, and the convergence speed of the algorithm is improved. Finally, the Cauchy variation strategy is used to perturb the optimal solution of the algorithm. Then, its probability jumping out of the local optimal solution is increased, and the global search capability is enhanced. The experimental comparison is carried out to analyze the 12 standard functions, CEC-2019 and CEC-2021 test functions in HHNGO and PSO, GWO, POA, HHO, NGO, INGO, DFPSO, MGLMRFO, GMPBSA algorithms, and HHNGO is applied in PID parameter rectification. The results prove the feasibility and superiority of the proposed method.

针对北方大鹰优化算法(NGO)收敛速度慢、极易陷入局部最优解的问题,本文提出了一种基于集群协作的混合北方大鹰优化算法(HHNGO),有效提高了收敛速度,缓解了陷入局部最优的问题。首先,采用片状混沌映射对种群进行初始化,使初始种群在搜索空间中的分布更加均匀,提高了初始解的质量。其次,引入哈里斯鹰优化算法中的猎物识别位置更新公式,改善探索阶段。同时,可以加入非线性因子,加速达到猎物最佳位置与鹰群平均位置差值最小的过程。这样就减少了搜索过程中的迭代次数,提高了算法的收敛速度。最后,利用 Cauchy 变异策略对算法的最优解进行扰动。然后,提高其跳出局部最优解的概率,增强全局搜索能力。实验对比分析了 HHNGO 与 PSO、GWO、POA、HHO、NGO、INGO、DFPSO、MGLMRFO、GMPBSA 算法中的 12 个标准函数、CEC-2019 和 CEC-2021 测试函数,并将 HHNGO 应用于 PID 参数整定。结果证明了所提方法的可行性和优越性。
{"title":"A hybrid northern goshawk optimization algorithm based on cluster collaboration","authors":"Changjun Wu, Qingzhen Li, Qiaohua Wang, Huanlong Zhang, Xiaohui Song","doi":"10.1007/s10586-024-04571-8","DOIUrl":"https://doi.org/10.1007/s10586-024-04571-8","url":null,"abstract":"<p>To address the problems that the northern goshawk optimization algorithm (NGO) has a slow convergence speed and is highly susceptible to fall into local optimal solutions, this paper proposes a hybrid northern goshawk optimization algorithm based on cluster collaboration (HHNGO), which effectively improves the convergence speed and alleviates the problem of falling into the local optimum. Firstly, piecewise chaotic mapping is used to initialize the population, which makes the initial population more evenly distributed in the search space and improves the quality of the initial solution. Secondly, the prey recognition position update formula in the harris hawk optimization algorithm is introduced to improve the exploration phase. Meanwhile, a nonlinear factor can be added to accelerate the process which reaches the minimum difference between the prey best position and the average position of the eagle group. Thus the iteration number is reduced during the search process, and the convergence speed of the algorithm is improved. Finally, the Cauchy variation strategy is used to perturb the optimal solution of the algorithm. Then, its probability jumping out of the local optimal solution is increased, and the global search capability is enhanced. The experimental comparison is carried out to analyze the 12 standard functions, CEC-2019 and CEC-2021 test functions in HHNGO and PSO, GWO, POA, HHO, NGO, INGO, DFPSO, MGLMRFO, GMPBSA algorithms, and HHNGO is applied in PID parameter rectification. The results prove the feasibility and superiority of the proposed method.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1