Pub Date : 2024-07-24DOI: 10.1007/s11227-024-06305-4
Zaki Mrzog Alaofi, K. R. Raslan, Amira Abd-Elall Ibrahim, Khalid K. Ali
In this work, we study the coupled system of fractional integro-differential equations, which includes the fractional derivatives of the Riemann–Liouville type and the fractional q-integral of the Riemann–Liouville type. We focus on the utilization of two significant fixed-point theorems, namely the Schauder fixed theorem and the Banach contraction principle. These mathematical tools play a crucial role in investigating the existence and uniqueness of a solution for a coupled system of fractional q-integro-differential equations. Our analysis specifically incorporates the fractional derivative and integral of the Riemann–Liouville type. To illustrate the implications of our findings, we present two examples that demonstrate the practical applications of our results. These examples serve as tangible scenarios where the aforementioned theorems can effectively address real-world problems and elucidate the underlying mathematical principles. By leveraging the power of the Schauder fixed theorem and the Banach contraction principle, our work contributes to a deeper understanding of the solutions to coupled systems of fractional q-integro-differential equations. Furthermore, it highlights the potential practical significance of these mathematical tools in various fields where such equations arise, offering a valuable framework for addressing complex problems.
{"title":"Comprehensive analysis on the existence and uniqueness of solutions for fractional q-integro-differential equations","authors":"Zaki Mrzog Alaofi, K. R. Raslan, Amira Abd-Elall Ibrahim, Khalid K. Ali","doi":"10.1007/s11227-024-06305-4","DOIUrl":"https://doi.org/10.1007/s11227-024-06305-4","url":null,"abstract":"<p>In this work, we study the coupled system of fractional integro-differential equations, which includes the fractional derivatives of the Riemann–Liouville type and the fractional <i>q</i>-integral of the Riemann–Liouville type. We focus on the utilization of two significant fixed-point theorems, namely the Schauder fixed theorem and the Banach contraction principle. These mathematical tools play a crucial role in investigating the existence and uniqueness of a solution for a coupled system of fractional <i>q</i>-integro-differential equations. Our analysis specifically incorporates the fractional derivative and integral of the Riemann–Liouville type. To illustrate the implications of our findings, we present two examples that demonstrate the practical applications of our results. These examples serve as tangible scenarios where the aforementioned theorems can effectively address real-world problems and elucidate the underlying mathematical principles. By leveraging the power of the Schauder fixed theorem and the Banach contraction principle, our work contributes to a deeper understanding of the solutions to coupled systems of fractional <i>q</i>-integro-differential equations. Furthermore, it highlights the potential practical significance of these mathematical tools in various fields where such equations arise, offering a valuable framework for addressing complex problems.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-23DOI: 10.1007/s11227-024-06363-8
Yunyi Zhang, Hongbin Huang, Ye Du, Wei He
In current researches on belief rule base (BRB), input parameters are tended to be expressed in the form of quantitative values through expert knowledge combined with optimization methods. A singular quantitative value fails to capture the statistical properties, leading to irrational outcomes. Therefore, an attempt on attribute weights is made in this paper, and a new model with probability distribution attribute weights (pdw) called BRB-pdw is proposed. The combination of two attributes is in detail discussed, where attribute weights are described as random variables with specific probability distribution. To characterize the output of probability distribution attribute weight, a new concept of expectation of activation weight is proposed. In addition, the BRB-pdw is extended to multiple attributes to demonstrate its universality. Furthermore, fundamental properties and characteristics of the BRB-pdw are further validated by rigorous mathematical derivation. Finally, practicability of the BRB-pdw is validated with NASA lithium battery open dataset, and experiments show that the BRB-pdw model is more robust while maintaining precision.
{"title":"On the continuous probability distribution attribute weight of belief rule base model","authors":"Yunyi Zhang, Hongbin Huang, Ye Du, Wei He","doi":"10.1007/s11227-024-06363-8","DOIUrl":"https://doi.org/10.1007/s11227-024-06363-8","url":null,"abstract":"<p>In current researches on belief rule base (BRB), input parameters are tended to be expressed in the form of quantitative values through expert knowledge combined with optimization methods. A singular quantitative value fails to capture the statistical properties, leading to irrational outcomes. Therefore, an attempt on attribute weights is made in this paper, and a new model with probability distribution attribute weights (pdw) called BRB-pdw is proposed. The combination of two attributes is in detail discussed, where attribute weights are described as random variables with specific probability distribution. To characterize the output of probability distribution attribute weight, a new concept of expectation of activation weight is proposed. In addition, the BRB-pdw is extended to multiple attributes to demonstrate its universality. Furthermore, fundamental properties and characteristics of the BRB-pdw are further validated by rigorous mathematical derivation. Finally, practicability of the BRB-pdw is validated with NASA lithium battery open dataset, and experiments show that the BRB-pdw model is more robust while maintaining precision.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-23DOI: 10.1007/s11227-024-06370-9
Caixia Huang, Sen Yang
The existing I2C interfaces require significant CPU intervention for data communication. In SOC systems, when using internally integrated I2C modules as masters, software control of I/O ports is necessary to emulate the I2C protocol for data transmission. This paper proposes a Mini I2C bus interface circuit design scheme that supports both master and slave modes. The I2C interface features minimal CPU intervention during data transmission, ease of use, small circuit area, and low power consumption. Additionally, the internal state machine design employs independent finite state machines (FSMs) for master and slave modes, enabling flexible configuration of the I2C module to operate in either mode. In comparison to reference (ShenZhen in Microelectronics Technology CO.BJ8M306A, Datasheet.2019.12.2., 2019), the proposed I2C solution reduces CPU instructions by 50% during data transmission, and by 33% compared to reference (GigaDevice Semiconductor Inc. GD32F1x0, Datasheet, 2022). After DC synthesis, the proposed design occupies only 14% of the area and consumes only 3.6% of the power of the Open Source I2C Design (Forencich in verilog-i2c. GitHub repository. Retrieved from https://github.com/alexforencich/verilog-i2c, n.d.). Therefore, this design scheme is better suited for low-power systems. The proposed design was validated through simulation using Xilinx ISE 14.7 with a SPARTAN 3 FPGA model xc3s500e-5pq208, and finally implemented using Huahong 95 nm CMOS technology, demonstrating high integration and low power consumption.
{"title":"A mini I2C bus interface circuit design and its VLSI implementation","authors":"Caixia Huang, Sen Yang","doi":"10.1007/s11227-024-06370-9","DOIUrl":"https://doi.org/10.1007/s11227-024-06370-9","url":null,"abstract":"<p>The existing I<sup>2</sup>C interfaces require significant CPU intervention for data communication. In SOC systems, when using internally integrated I<sup>2</sup>C modules as masters, software control of I/O ports is necessary to emulate the I<sup>2</sup>C protocol for data transmission. This paper proposes a Mini I<sup>2</sup>C bus interface circuit design scheme that supports both master and slave modes. The I<sup>2</sup>C interface features minimal CPU intervention during data transmission, ease of use, small circuit area, and low power consumption. Additionally, the internal state machine design employs independent finite state machines (FSMs) for master and slave modes, enabling flexible configuration of the I<sup>2</sup>C module to operate in either mode. In comparison to reference (ShenZhen in Microelectronics Technology CO.BJ8M306A, Datasheet.2019.12.2., 2019), the proposed I<sup>2</sup>C solution reduces CPU instructions by 50% during data transmission, and by 33% compared to reference (GigaDevice Semiconductor Inc. GD32F1x0, Datasheet, 2022). After DC synthesis, the proposed design occupies only 14% of the area and consumes only 3.6% of the power of the Open Source I<sup>2</sup>C Design (Forencich in verilog-i2c. GitHub repository. Retrieved from https://github.com/alexforencich/verilog-i2c, n.d.). Therefore, this design scheme is better suited for low-power systems. The proposed design was validated through simulation using Xilinx ISE 14.7 with a SPARTAN 3 FPGA model xc3s500e-5pq208, and finally implemented using Huahong 95 nm CMOS technology, demonstrating high integration and low power consumption.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In pattern recognition, statistics, machine learning, and data mining, feature or attribute selection is a standard dimensionality reduction method. The goal is to apply a set of rules to select essential and relevant features from the original dataset. In recent years, unsupervised feature selection approaches have garnered significant attention across various research fields. This study presents a well-organized summary of the latest and most effective unsupervised feature selection techniques in the scientific literature. We introduce a taxonomy of these strategies, elucidating their significant features and underlying principles. Additionally, we outline the pros, cons, challenges, and practical applications of the broad categories of unsupervised feature selection approaches reviewed in the literature. Furthermore, we conducted a comparison of several state-of-the-art unsupervised feature selection methods through experimental analysis.
{"title":"A taxonomy of unsupervised feature selection methods including their pros, cons, and challenges","authors":"Rajesh Dwivedi, Aruna Tiwari, Neha Bharill, Milind Ratnaparkhe, Alok Kumar Tiwari","doi":"10.1007/s11227-024-06368-3","DOIUrl":"https://doi.org/10.1007/s11227-024-06368-3","url":null,"abstract":"<p>In pattern recognition, statistics, machine learning, and data mining, feature or attribute selection is a standard dimensionality reduction method. The goal is to apply a set of rules to select essential and relevant features from the original dataset. In recent years, unsupervised feature selection approaches have garnered significant attention across various research fields. This study presents a well-organized summary of the latest and most effective unsupervised feature selection techniques in the scientific literature. We introduce a taxonomy of these strategies, elucidating their significant features and underlying principles. Additionally, we outline the pros, cons, challenges, and practical applications of the broad categories of unsupervised feature selection approaches reviewed in the literature. Furthermore, we conducted a comparison of several state-of-the-art unsupervised feature selection methods through experimental analysis.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Multimodal named entity recognition (MNER) is an emerging foundational task in natural language processing. However, existing methods have two main limitations: 1) previous methods have focused on the visual representation of the entire image or target objects. However, they overlook the fine-grained semantic correspondence between entities and visual target objects, or ignore the visual cues of the overall scene and background details in the image. 2) Existing methods have not effectively overcome the semantic gap between different modalities due to the heterogeneity between text and images. To address these issues, we propose a novel multimodal heterogeneous graph entity-level fusion method for MNER (HGMVG) to achieve cross-modal feature interaction from coarse to fine between text and images under the guidance of visual information at different granularities, which can improve the accuracy of named entity recognition. Specifically, to resolve the first issue, we cascade cross-modal semantic interaction information between text and vision at different visual granularities to obtain a comprehensive and effective multimodal representation. For the second issue, we describe the precise semantic correspondences between entity-level words and visual target objects via multimodal heterogeneous graphs, and utilize heterogeneous graph attention networks to achieve cross-modal fine-grained semantic interactions. We conduct extensive experiments on two publicly available Twitter datasets, and the experimental results demonstrate that HGMVG outperforms the current state-of-the-art models in the MNER task.
{"title":"Multimodal heterogeneous graph entity-level fusion for named entity recognition with multi-granularity visual guidance","authors":"Yunchao Gong, Xueqiang Lv, Zhu Yuan, ZhaoJun Wang, Feng Hu, Xindong You","doi":"10.1007/s11227-024-06347-8","DOIUrl":"https://doi.org/10.1007/s11227-024-06347-8","url":null,"abstract":"<p>Multimodal named entity recognition (MNER) is an emerging foundational task in natural language processing. However, existing methods have two main limitations: 1) previous methods have focused on the visual representation of the entire image or target objects. However, they overlook the fine-grained semantic correspondence between entities and visual target objects, or ignore the visual cues of the overall scene and background details in the image. 2) Existing methods have not effectively overcome the semantic gap between different modalities due to the heterogeneity between text and images. To address these issues, we propose a novel multimodal heterogeneous graph entity-level fusion method for MNER (HGMVG) to achieve cross-modal feature interaction from coarse to fine between text and images under the guidance of visual information at different granularities, which can improve the accuracy of named entity recognition. Specifically, to resolve the first issue, we cascade cross-modal semantic interaction information between text and vision at different visual granularities to obtain a comprehensive and effective multimodal representation. For the second issue, we describe the precise semantic correspondences between entity-level words and visual target objects via multimodal heterogeneous graphs, and utilize heterogeneous graph attention networks to achieve cross-modal fine-grained semantic interactions. We conduct extensive experiments on two publicly available Twitter datasets, and the experimental results demonstrate that HGMVG outperforms the current state-of-the-art models in the MNER task.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"48 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141773611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-22DOI: 10.1007/s11227-024-06349-6
Elahe Kholdi, Seyed Morteza Babamir
The proper positioning of Virtual Machines (VMs) on the hosts in a cloud environment reduces the need for the VM migration and its consequences. The positioning becomes more significant when there exists a multi-cloud environment where the hosts exist on multi-site datacenters. Based on user’s requests, VMs should be dynamically positioned; however, if the users’ future demands can be predicted, the positioning can be adaptively done in advance, which is both more cost-effective for users and more requests are met. To this end, at the request of their users, VMs’ providers can reserve VMs for the users’ future needs. However, if some users would not like to reserve VMs or if the number of reserved VMs is less than users’ needs, VMs should be allocated on demand. However, the reserve or on-demand policy cannot be applied freely if users have constraints and objectives. Among others, cost of using resources and response time are the most important users’ objectives, and load balancing hosts and datacenters for the proper resource utilization is the most important providers’ objective. To consider the reserve policy, a multi-layered model is presented in this paper where a multi-objective optimization is used to meet the objectives. The proposed model was applied to Google, Wikipedia, and NASA datasets. The results show: (1) The number of predicted VMs for reserve is closer to the real VMs requested in datasets NASA, Wikipedia, and Google than the related work. This was due to the use of a dynamic neural network, called NARX; (2) objective cost is regarded more than the related work, while it respects more trade-off between the user’s objectives and provider’s one; (3) placement of VMs on hosts is done in a balanced way, leading to the reduction of overloaded hosts and response time.
在云环境中,虚拟机(VM)在主机上的正确定位可减少虚拟机迁移的需要及其后果。在多云环境中,主机位于多站点数据中心,因此定位变得更加重要。虚拟机应根据用户的要求进行动态定位;但如果能预测用户的未来需求,则可以提前自适应地进行定位,这对用户来说更经济实惠,也能满足更多要求。为此,虚拟机提供商可以应用户的要求,为用户的未来需求预留虚拟机。但是,如果有些用户不愿意预留虚拟机,或者预留的虚拟机数量少于用户的需求,则应按需分配虚拟机。但是,如果用户有限制条件和目标,就不能随意采用预留或按需分配政策。其中,使用资源的成本和响应时间是用户最重要的目标,而为合理利用资源而平衡主机和数据中心的负载则是提供商最重要的目标。为了考虑储备政策,本文提出了一个多层模型,其中使用了多目标优化来实现目标。提出的模型被应用于 Google、维基百科和 NASA 数据集。结果表明:(1) 与相关研究相比,NASA、维基百科和谷歌数据集的预测预留虚拟机数量更接近实际申请的虚拟机数量。这是由于使用了一种名为 NARX 的动态神经网络;(2)与相关研究相比,该模型更重视目标成本,同时更尊重用户目标和提供商目标之间的权衡;(3)以均衡的方式将虚拟机放置在主机上,从而减少了主机过载和响应时间。
{"title":"Reserve policy-aware VM positioning based on prediction in multi-cloud environment","authors":"Elahe Kholdi, Seyed Morteza Babamir","doi":"10.1007/s11227-024-06349-6","DOIUrl":"https://doi.org/10.1007/s11227-024-06349-6","url":null,"abstract":"<p>The proper positioning of Virtual Machines (VMs) on the hosts in a cloud environment reduces the need for the VM migration and its consequences. The positioning becomes more significant when there exists a multi-cloud environment where the hosts exist on multi-site datacenters. Based on user’s requests, VMs should be dynamically positioned; however, if the users’ future demands can be predicted, the positioning can be adaptively done in advance, which is both more cost-effective for users and more requests are met. To this end, at the request of their users, VMs’ providers can <i>reserve</i> VMs for the users’ future needs. However, if some users would not like to reserve VMs or if the number of reserved VMs is less than users’ needs, VMs should be allocated <i>on demand</i>. However, the reserve or on-demand policy cannot be applied freely if users have constraints and objectives. Among others, <i>cost</i> of using resources and <i>response time</i> are the most important users’ <i>objectives</i>, and load balancing hosts and datacenters for the proper resource utilization is the most important providers’ objective. To consider the reserve policy, a multi-layered model is presented in this paper where a multi-objective optimization is used to meet the objectives. The proposed model was applied to Google, Wikipedia, and NASA datasets. The results show: (1) The number of predicted VMs for reserve is closer to the real VMs requested in datasets NASA, Wikipedia, and Google than the related work. This was due to the use of a dynamic neural network, called NARX; (2) objective cost is regarded more than the related work, while it respects more trade-off between the user’s objectives and provider’s one; (3) placement of VMs on hosts is done in a balanced way, leading to the reduction of overloaded hosts and response time.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-21DOI: 10.1007/s11227-024-06350-z
Dhanya K. Sudhish, Latha R. Nair, Shailesh Sivan
Clinical images of brain tumors (BT) are crucial in the diagnostic process and contain substantial medical information. In neurosurgery and neurology, AI’s application in retrieving and analyzing brain tumors leads to earlier, more accurate diagnoses and improves treatment planning. However, the accuracy of the existing methods for the physical retrieval of similar images needs to be improved. This paper introduces Gradient Ladybug Beetle Optimization-based LeNet (GLBO-LeNet) for the retrieval of brain tumor magnetic resonance images (MRI) from the medical datasets. This approach processes both input MRI images and query MRIs using the same pipeline. Tumor segmentation process is performed on these images using a 3D Convolutional Neural Network (CNN). Features are extracted from segmented images, incorporating a novel feature extraction method, LTDP based on Discrete Wavelet Transform (DWT) with Pyramid Histogram of Orientation (PHoG). The extracted features are utilized for tumor classification using LeNet-5, tuned by Gradient Ladybug Beetle Optimization (GLBO). The classified outputs from input MRI images are indexed in an image database. Similar images are retrieved and ranked using a proposed hybrid similarity measure, enabling efficient brain MRI image retrieval. In this study, the GLBO-LeNet-based brain tumor MRI retrieval system achieved an accuracy of 91.5%, a Prue-positive rate (TPR) of 91.9%, a True-negative rate (TNR) of 92.5%, a Positive predictive value (PPV) of 90.8% and a Negative predictive value (NPV) of 89.4%.
{"title":"Hybrid similarity measure-based image indexing and Gradient Ladybug Beetle optimization for retrieval of brain tumor using MRI","authors":"Dhanya K. Sudhish, Latha R. Nair, Shailesh Sivan","doi":"10.1007/s11227-024-06350-z","DOIUrl":"https://doi.org/10.1007/s11227-024-06350-z","url":null,"abstract":"<p>Clinical images of brain tumors (BT) are crucial in the diagnostic process and contain substantial medical information. In neurosurgery and neurology, AI’s application in retrieving and analyzing brain tumors leads to earlier, more accurate diagnoses and improves treatment planning. However, the accuracy of the existing methods for the physical retrieval of similar images needs to be improved. This paper introduces Gradient Ladybug Beetle Optimization-based LeNet (GLBO-LeNet) for the retrieval of brain tumor magnetic resonance images (MRI) from the medical datasets. This approach processes both input MRI images and query MRIs using the same pipeline. Tumor segmentation process is performed on these images using a 3D Convolutional Neural Network (CNN). Features are extracted from segmented images, incorporating a novel feature extraction method, LTDP based on Discrete Wavelet Transform (DWT) with Pyramid Histogram of Orientation (PHoG). The extracted features are utilized for tumor classification using LeNet-5, tuned by Gradient Ladybug Beetle Optimization (GLBO). The classified outputs from input MRI images are indexed in an image database. Similar images are retrieved and ranked using a proposed hybrid similarity measure, enabling efficient brain MRI image retrieval. In this study, the GLBO-LeNet-based brain tumor MRI retrieval system achieved an accuracy of 91.5%, a Prue-positive rate (TPR) of 91.9%, a True-negative rate (TNR) of 92.5%, a Positive predictive value (PPV) of 90.8% and a Negative predictive value (NPV) of 89.4%.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s11227-024-06353-w
Mojtaba Ahmadian Mahmoudabadi, Mehdi Jafari Shahbazzadeh, Malihe Hashemipour
Ongoing research is focused on underwater wireless sensor networks (UWSNs), which hold great promise for various applications to improve human lives. Many sensor nodes have been strategically positioned in rivers and oceans to closely monitor and analyze the underwater ecosystem. UWSNs face significant challenges due to energy limitations, unreliable communication channels, hole occurrence, and low packet delivery ratio. This paper introduces effective energy routing, hole detection and mitigation, and reliable delivery schemes to address these issues. In ERR-UWSN, a single-path routing strategy optimizes energy consumption by selecting the best-sending node through a unique weight function. However, the reliability of this approach is compromised in the harsh and unpredictable submarine environment. To overcome this limitation, co-ERR-UWSN combines cooperative routing with relay nodes between source–destination pairs. A carefully selected weight function ensures low energy consumption, reliability, and optimal node selection for data transmission. The simulation results show that ERR-UWSN is better than CEER, Co-EPRR, and FB-DBR in terms of residual energy, end-to-end delay, energy consumption, and total number of alive nodes. Also, Co-ERR-UWSN has a special advantage in the PDR criterion compared to other schemes.
{"title":"ERR-UWSN: energy-efficient and reliable routing for void hole mitigation in underwater wireless sensor networks","authors":"Mojtaba Ahmadian Mahmoudabadi, Mehdi Jafari Shahbazzadeh, Malihe Hashemipour","doi":"10.1007/s11227-024-06353-w","DOIUrl":"https://doi.org/10.1007/s11227-024-06353-w","url":null,"abstract":"<p>Ongoing research is focused on underwater wireless sensor networks (UWSNs), which hold great promise for various applications to improve human lives. Many sensor nodes have been strategically positioned in rivers and oceans to closely monitor and analyze the underwater ecosystem. UWSNs face significant challenges due to energy limitations, unreliable communication channels, hole occurrence, and low packet delivery ratio. This paper introduces effective energy routing, hole detection and mitigation, and reliable delivery schemes to address these issues. In ERR-UWSN, a single-path routing strategy optimizes energy consumption by selecting the best-sending node through a unique weight function. However, the reliability of this approach is compromised in the harsh and unpredictable submarine environment. To overcome this limitation, co-ERR-UWSN combines cooperative routing with relay nodes between source–destination pairs. A carefully selected weight function ensures low energy consumption, reliability, and optimal node selection for data transmission. The simulation results show that ERR-UWSN is better than CEER, Co-EPRR, and FB-DBR in terms of residual energy, end-to-end delay, energy consumption, and total number of alive nodes. Also, Co-ERR-UWSN has a special advantage in the PDR criterion compared to other schemes.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"63 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s11227-024-06352-x
Sijia Guo, Xiaomin Hu, Weihua Yang, Shuang Zhao
The super edge-connectivity of a connected graph G, denoted by ({lambda }'left( G right) ), if exists, is the minimum number of edges whose deletion disconnects the graph such that each component has no isolated vertices. The direct product of graphs G and H, denoted by (Gtimes H), is the graph with vertex set (Vleft( Gtimes H right) =Vleft( G right) times Vleft( H right) ), where two vertices (left( {{u}_{1}},{{v}_{1}} right) ) and (left( {{u}_{2}},{{v}_{2}} right) ) are adjacent in (Gtimes H) if and only if ({{u}_{1}}{{u}_{2}}in Eleft( G right) ) and ({{v}_{1}}{{v}_{2}}in Eleft( H right) ). In this paper, it is proved that ({lambda }'left( Gtimes {{C}_{n}} right) = min { 2n{lambda }'left( G right) ,2underset{xyin Eleft( G right) }{{min }},left( {{deg }_{G}}left( x right) +{{deg }_{G}}left( y right) right) -2 }) for (i) any connected graph G with (left| G right| le n) or (Delta left( G right) le n-1) and an odd cycle ({{C}_{n}}), or (ii) any split graph G with (left| G right| le n) or (Delta left( G right) le n-1) and a cycle ({{C}_{n}}).
如果存在连通图 G 的超边连通性,用 ({lambda }'left( G right) )来表示,它是删除使图断开连接的边的最小数目,这样每个部分就没有孤立顶点了。图 G 和 H 的直积,用 (Gtimes H) 表示,是顶点集为 (Vleft( Gtimes Hright) =Vleft( Gright) times Vleft( Hright) ) 的图,其中两个顶点 (left( {{u}_{1}}、{{v}_{1}} 右)和({{u}_{2}}、{当且仅当({{u}_{1}}{{u}_{2}}in Eleft( G right) )和({{v}_{1}}{{v}_{2}}in Eleft( H right) )在 (Gtimes H) 中相邻。本文证明了({lambda }'left( Gtimes {{C}_{n}} right) = min { 2n{lambda }'left( Gright) ,2underset{xyin Eleft( Gright) }{{min }})、left( {{deg }_{G}}left( x right) +{{deg }_{G}}left( y right) right) -2 }) for (i) any connected graph G with (left| G right| le n) or (Delta left( G right) le n-1) and an odd cycle ({{C}_{n}})、或 (ii) 任何分裂图 G,具有 (left| G right| le n) 或 (Delta left( G right) le n-1) 和一个循环 ({{C}_{n}})。
{"title":"The super edge-connectivity of direct product of a graph and a cycle","authors":"Sijia Guo, Xiaomin Hu, Weihua Yang, Shuang Zhao","doi":"10.1007/s11227-024-06352-x","DOIUrl":"https://doi.org/10.1007/s11227-024-06352-x","url":null,"abstract":"<p>The super edge-connectivity of a connected graph <i>G</i>, denoted by <span>({lambda }'left( G right) )</span>, if exists, is the minimum number of edges whose deletion disconnects the graph such that each component has no isolated vertices. The direct product of graphs <i>G</i> and <i>H</i>, denoted by <span>(Gtimes H)</span>, is the graph with vertex set <span>(Vleft( Gtimes H right) =Vleft( G right) times Vleft( H right) )</span>, where two vertices <span>(left( {{u}_{1}},{{v}_{1}} right) )</span> and <span>(left( {{u}_{2}},{{v}_{2}} right) )</span> are adjacent in <span>(Gtimes H)</span> if and only if <span>({{u}_{1}}{{u}_{2}}in Eleft( G right) )</span> and <span>({{v}_{1}}{{v}_{2}}in Eleft( H right) )</span>. In this paper, it is proved that <span>({lambda }'left( Gtimes {{C}_{n}} right) = min { 2n{lambda }'left( G right) ,2underset{xyin Eleft( G right) }{{min }},left( {{deg }_{G}}left( x right) +{{deg }_{G}}left( y right) right) -2 })</span> for (i) any connected graph <i>G</i> with <span>(left| G right| le n)</span> or <span>(Delta left( G right) le n-1)</span> and an odd cycle <span>({{C}_{n}})</span>, or (ii) any split graph <i>G</i> with <span>(left| G right| le n)</span> or <span>(Delta left( G right) le n-1)</span> and a cycle <span>({{C}_{n}})</span>.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-20DOI: 10.1007/s11227-024-06366-5
Raed Shatnawi
Software evolution measurement is required to control software costs and aid in the development of cost-effective software. Early detection of potential changes gives developers time to plan for change. Simple techniques to detect the change-proneness of classes are required such as thresholds, particularly in incremental software development. In this study, we propose to derive thresholds to detect the change-proneness of classes using ROC analysis. The analysis is conducted on the evolution of five systems for six object-oriented metrics, Chidamber and Kemerer. Thresholds are considered in software evolution in three intervals: 6 months, 12 months, and 3 years. Thresholds are reported for four metrics that can predict change-proneness. Similar thresholds are reported at 6 and 12 months. For the same metrics, fault-proneness thresholds are identified, and the results are compared to their counterparts in change-proneness thresholds. The change-proneness thresholds derived are smaller and identify more classes for further investigation.
{"title":"Deriving change-prone thresholds from software evolution using ROC curves","authors":"Raed Shatnawi","doi":"10.1007/s11227-024-06366-5","DOIUrl":"https://doi.org/10.1007/s11227-024-06366-5","url":null,"abstract":"<p>Software evolution measurement is required to control software costs and aid in the development of cost-effective software. Early detection of potential changes gives developers time to plan for change. Simple techniques to detect the change-proneness of classes are required such as thresholds, particularly in incremental software development. In this study, we propose to derive thresholds to detect the change-proneness of classes using ROC analysis. The analysis is conducted on the evolution of five systems for six object-oriented metrics, Chidamber and Kemerer. Thresholds are considered in software evolution in three intervals: 6 months, 12 months, and 3 years. Thresholds are reported for four metrics that can predict change-proneness. Similar thresholds are reported at 6 and 12 months. For the same metrics, fault-proneness thresholds are identified, and the results are compared to their counterparts in change-proneness thresholds. The change-proneness thresholds derived are smaller and identify more classes for further investigation.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}