首页 > 最新文献

The Journal of Supercomputing最新文献

英文 中文
Improved grey wolf algorithm based on dynamic weight and logistic mapping for safe path planning of UAV low-altitude penetration 基于动态权重和逻辑映射的改进灰狼算法,用于无人机低空穿行的安全路径规划
Pub Date : 2024-08-16 DOI: 10.1007/s11227-024-06430-0
Siwei Wang, Donglin Zhu, Changjun Zhou, Gaoji Sun

Unmanned aerial vehicle (UAV) has been widely used in many fields, especially in low-altitude penetration defence, which showcases superior performance. UAV requires obstacle avoidance for safe flight and must adhere to various flight constraints, such as altitude changes and turning angles, during path planning. Excellent flight paths can enhance flight efficiency and safety, saving time and energy when performing specific tasks, directly impacting mission accomplishment. To address these challenges, this paper improves the original grey wolf algorithm (GWO). In this enhanced version, the three head wolves randomly assign influence weights to execute the position updating mechanism. A dynamic weight influence strategy is designed, which accelerates convergence in the late optimization stages, aiding in finding the global optimum. Meanwhile, the logistic mapping is introduced into the convergence factor, and a micro-vibrational convergence factor is constructed. This allows the algorithm to have a better ability to find a globally optimal solution in the search space while also being able to search deeper using areas near the currently known information. In order to validate the proposed algorithm, a simulated flight environment is established, conducting simulation experiments within safe flight environments featuring 5, 10, and 15 obstacles. Comparative analysis with seven other algorithms demonstrates the superiority of the proposed algorithm. The experimental results demonstrate that the proposed algorithm has better superiority. In terms of path length on three maps, DLGWO paths are 10.3 km, 15.5 km, and 2.6 km shorter than the second-placed MEPSO, SOGWO, and WOA, respectively. Furthermore, the planned path in this study exhibits the smallest fluctuations in altitude and turning angles.

无人驾驶飞行器(UAV)已被广泛应用于多个领域,尤其是在低空渗透防御方面,表现出卓越的性能。无人飞行器需要避障才能安全飞行,在路径规划过程中必须遵守各种飞行限制,如高度变化和转弯角度。优秀的飞行路径可以提高飞行效率和安全性,在执行特定任务时节省时间和精力,直接影响任务的完成。为应对这些挑战,本文改进了原有的灰狼算法(GWO)。在该改进版本中,三只头狼随机分配影响权重,以执行位置更新机制。本文设计了一种动态权重影响策略,可在优化后期加速收敛,帮助找到全局最优。同时,在收敛因子中引入了逻辑映射,构建了微振动收敛因子。这使得算法在搜索空间中找到全局最优解的能力更强,同时还能利用当前已知信息附近的区域进行更深入的搜索。为了验证所提出的算法,建立了一个模拟飞行环境,在有 5、10 和 15 个障碍物的安全飞行环境中进行模拟实验。与其他七种算法的对比分析表明了所提算法的优越性。实验结果表明,提出的算法具有更好的优越性。就三张地图上的路径长度而言,DLGWO 路径分别比排名第二的 MEPSO、SOGWO 和 WOA 短 10.3 千米、15.5 千米和 2.6 千米。此外,本研究中的规划路径在高度和转弯角度方面的波动最小。
{"title":"Improved grey wolf algorithm based on dynamic weight and logistic mapping for safe path planning of UAV low-altitude penetration","authors":"Siwei Wang, Donglin Zhu, Changjun Zhou, Gaoji Sun","doi":"10.1007/s11227-024-06430-0","DOIUrl":"https://doi.org/10.1007/s11227-024-06430-0","url":null,"abstract":"<p>Unmanned aerial vehicle (UAV) has been widely used in many fields, especially in low-altitude penetration defence, which showcases superior performance. UAV requires obstacle avoidance for safe flight and must adhere to various flight constraints, such as altitude changes and turning angles, during path planning. Excellent flight paths can enhance flight efficiency and safety, saving time and energy when performing specific tasks, directly impacting mission accomplishment. To address these challenges, this paper improves the original grey wolf algorithm (GWO). In this enhanced version, the three head wolves randomly assign influence weights to execute the position updating mechanism. A dynamic weight influence strategy is designed, which accelerates convergence in the late optimization stages, aiding in finding the global optimum. Meanwhile, the logistic mapping is introduced into the convergence factor, and a micro-vibrational convergence factor is constructed. This allows the algorithm to have a better ability to find a globally optimal solution in the search space while also being able to search deeper using areas near the currently known information. In order to validate the proposed algorithm, a simulated flight environment is established, conducting simulation experiments within safe flight environments featuring 5, 10, and 15 obstacles. Comparative analysis with seven other algorithms demonstrates the superiority of the proposed algorithm. The experimental results demonstrate that the proposed algorithm has better superiority. In terms of path length on three maps, DLGWO paths are 10.3 km, 15.5 km, and 2.6 km shorter than the second-placed MEPSO, SOGWO, and WOA, respectively. Furthermore, the planned path in this study exhibits the smallest fluctuations in altitude and turning angles.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Degree-aware embedding-based multi-correlated graph convolutional collaborative filtering 基于程度感知嵌入的多相关图卷积协同过滤
Pub Date : 2024-08-16 DOI: 10.1007/s11227-024-06354-9
Chao Ma, Jiwei Qin, Tao Wang, Aohua Gao

In light of the remarkable capacity of graph convolutional network (GCN) in representation learning, researchers have incorporated it into collaborative filtering recommendation systems to capture high-order collaborative signals. However, existing GCN-based collaborative filtering models still exhibit three deficiencies: the failure to consider differences between users’ activity and preferences for items’ popularity, the low-order feature information of users and items has been inadequately employed, and neglecting the correlated relationships among isomorphic nodes. To address these shortcomings, this paper proposes a degree-aware embedding-based multi-correlated graph convolutional collaborative filtering (Da-MCGCF). Firstly, Da-MCGCF combines users’ activity and preferences for items’ popularity to perform neighborhood aggregation in the user-item bipartite graph, thereby generating more precise representations of users and items. Secondly, Da-MCGCF employs a low-order feature fusion strategy to integrate low-order features into the process of mining high-order features, which enhances feature representation capabilities, and enables the exploration of deeper relationships. Furthermore, we construct two isomorphic graphs by employing an adaptive approach to explore correlated relationships at the isomorphic level between users and items. Subsequently, we aggregate the features of isomorphic users and items separately to complement their representations. Finally, we conducted extensive experiments on four public datasets, thereby validating the effectiveness of our proposed model.

鉴于图卷积网络(GCN)在表征学习方面的卓越能力,研究人员已将其纳入协同过滤推荐系统,以捕捉高阶协同信号。然而,现有的基于图卷积网络的协同过滤模型仍然存在三个缺陷:没有考虑用户的活跃度和对项目受欢迎程度的偏好之间的差异;没有充分利用用户和项目的低阶特征信息;忽略了同构节点之间的关联关系。针对这些不足,本文提出了一种基于度感知嵌入的多相关图卷积协同过滤(Da-MCGCF)。首先,Da-MCGCF 将用户的活跃度和对物品受欢迎程度的偏好结合起来,在用户-物品双向图中进行邻域聚合,从而生成更精确的用户和物品表示。其次,Da-MCGCF 采用低阶特征融合策略,在挖掘高阶特征的过程中整合低阶特征,从而增强了特征表示能力,并能探索更深层次的关系。此外,我们还采用自适应方法构建了两个同构图,以探索用户与项目之间同构层面的相关关系。随后,我们分别聚合了同构用户和项目的特征,以补充它们的表征。最后,我们在四个公共数据集上进行了广泛的实验,从而验证了我们提出的模型的有效性。
{"title":"Degree-aware embedding-based multi-correlated graph convolutional collaborative filtering","authors":"Chao Ma, Jiwei Qin, Tao Wang, Aohua Gao","doi":"10.1007/s11227-024-06354-9","DOIUrl":"https://doi.org/10.1007/s11227-024-06354-9","url":null,"abstract":"<p>In light of the remarkable capacity of graph convolutional network (GCN) in representation learning, researchers have incorporated it into collaborative filtering recommendation systems to capture high-order collaborative signals. However, existing GCN-based collaborative filtering models still exhibit three deficiencies: the failure to consider differences between users’ activity and preferences for items’ popularity, the low-order feature information of users and items has been inadequately employed, and neglecting the correlated relationships among isomorphic nodes. To address these shortcomings, this paper proposes a degree-aware embedding-based multi-correlated graph convolutional collaborative filtering (Da-MCGCF). Firstly, Da-MCGCF combines users’ activity and preferences for items’ popularity to perform neighborhood aggregation in the user-item bipartite graph, thereby generating more precise representations of users and items. Secondly, Da-MCGCF employs a low-order feature fusion strategy to integrate low-order features into the process of mining high-order features, which enhances feature representation capabilities, and enables the exploration of deeper relationships. Furthermore, we construct two isomorphic graphs by employing an adaptive approach to explore correlated relationships at the isomorphic level between users and items. Subsequently, we aggregate the features of isomorphic users and items separately to complement their representations. Finally, we conducted extensive experiments on four public datasets, thereby validating the effectiveness of our proposed model.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dual boundary robust verification method for neural networks 神经网络的双边界稳健验证方法
Pub Date : 2024-08-15 DOI: 10.1007/s11227-024-06402-4
Yueyue Yang, Qun Fang, Yajing Tang, Yuchen Feng, Yihui Yan, Yong Xu

As a prominent and appealing technology, neural networks have been widely applied in numerous fields, with one of the most notable applications being autonomous driving. However, the intrinsic structure of neural networks presents a black box problem, leading to emergent security issues in driving and networking that remain unresolved. To this end, we introduce a novel method for robust validation of neural networks, named as Dual Boundary Robust (DBR). Specifically, we creatively integrate adversarial attack design, including perturbations like outliers, with outer boundary defenses, in which the inner and outer boundaries are combined with methods such as floating-point polyhedra and boundary intervals. Demonstrate the robustness of the DBR’s anti-interference ability and security performance, and to reduce the black box-induced emergent security problems of neural networks. Compared with the traditional method, the outer boundary of DBR combined with the theory of convex relaxation can appropriately tighten the boundary interval of DBR used in neural networks, which significantly reduces the over-tightening of the potential for severe security issues and has better robustness. Furthermore, extensive experimentation on individually trained neural networks validates the flexibility and scalability of DBR in safeguarding larger regions.

神经网络作为一项杰出而有吸引力的技术,已被广泛应用于众多领域,其中最引人注目的应用之一是自动驾驶。然而,神经网络的内在结构带来了一个黑箱问题,导致驾驶和网络中出现的安全问题仍未得到解决。为此,我们引入了一种用于神经网络稳健验证的新方法,命名为双边界稳健(DBR)。具体来说,我们创造性地将对抗性攻击设计(包括异常值等扰动)与外部边界防御相结合,其中内部和外部边界与浮点多面体和边界区间等方法相结合。证明 DBR 抗干扰能力和安全性能的鲁棒性,减少黑盒引起的神经网络突发安全问题。与传统方法相比,DBR 的外边界结合凸松弛理论,可以适当收紧神经网络中使用的 DBR 边界区间,大大降低了过度收紧可能带来的严重安全问题,具有更好的鲁棒性。此外,在单独训练的神经网络上进行的大量实验验证了 DBR 在保护较大区域方面的灵活性和可扩展性。
{"title":"A dual boundary robust verification method for neural networks","authors":"Yueyue Yang, Qun Fang, Yajing Tang, Yuchen Feng, Yihui Yan, Yong Xu","doi":"10.1007/s11227-024-06402-4","DOIUrl":"https://doi.org/10.1007/s11227-024-06402-4","url":null,"abstract":"<p>As a prominent and appealing technology, neural networks have been widely applied in numerous fields, with one of the most notable applications being autonomous driving. However, the intrinsic structure of neural networks presents a black box problem, leading to emergent security issues in driving and networking that remain unresolved. To this end, we introduce a novel method for robust validation of neural networks, named as Dual Boundary Robust (DBR). Specifically, we creatively integrate adversarial attack design, including perturbations like outliers, with outer boundary defenses, in which the inner and outer boundaries are combined with methods such as floating-point polyhedra and boundary intervals. Demonstrate the robustness of the DBR’s anti-interference ability and security performance, and to reduce the black box-induced emergent security problems of neural networks. Compared with the traditional method, the outer boundary of DBR combined with the theory of convex relaxation can appropriately tighten the boundary interval of DBR used in neural networks, which significantly reduces the over-tightening of the potential for severe security issues and has better robustness. Furthermore, extensive experimentation on individually trained neural networks validates the flexibility and scalability of DBR in safeguarding larger regions.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MS-GD-P: priority-based service deployment for cloud-edge-end scenarios MS-GD-P:针对云端场景的基于优先级的服务部署
Pub Date : 2024-08-14 DOI: 10.1007/s11227-024-06423-z
Honghua Jin, Haiyan Wang, Jian Luo

In cloud-edge-end scenarios, how to achieve rational resource allocation, implement effective service deployment, and ensure high service quality has become a hot research topic in academic domains. Service providers usually deploy services by considering the characteristics of different geographical regions, which helps to meet the diverse needs of users in different regions and optimize resource allocation and utilization. However, due to the widespread distribution of users and limited server resources, providing all types of services to users in every geographical region is not feasible. In addition, edge servers are prone to operational failures caused by software anomalies, hardware malfunctions, and malicious attacks, which will decrease service reliability. To address the problems above, this paper proposes a metric for service priorities based on user demands and regional characteristics for different geographical regions. Building upon this foundation, a Multi-Service Geographic region Deployment based on Priority (MS-GD-P) is proposed. This method takes user coverage and service reliability into consideration, which facilitates users’ needs for multiple services in different geographical regions. Experimental results on real datasets demonstrate that MS-GD-P outperforms baseline methods in user coverage and service reliability.

在云-边缘-端场景中,如何实现合理的资源分配、实施有效的服务部署、确保高质量的服务已成为学术领域的热门研究课题。服务提供商通常会考虑不同地域的特点来部署服务,这有助于满足不同地域用户的多样化需求,优化资源分配和利用。然而,由于用户分布广泛,服务器资源有限,为每个地理区域的用户提供所有类型的服务并不可行。此外,边缘服务器还容易因软件异常、硬件故障和恶意攻击等原因导致运行故障,从而降低服务的可靠性。针对上述问题,本文提出了一种基于不同地理区域用户需求和区域特征的服务优先级度量方法。在此基础上,提出了基于优先级的多服务地理区域部署(MS-GD-P)。该方法将用户覆盖范围和服务可靠性纳入考虑,满足了不同地理区域用户对多种服务的需求。在真实数据集上的实验结果表明,MS-GD-P 在用户覆盖范围和服务可靠性方面优于基准方法。
{"title":"MS-GD-P: priority-based service deployment for cloud-edge-end scenarios","authors":"Honghua Jin, Haiyan Wang, Jian Luo","doi":"10.1007/s11227-024-06423-z","DOIUrl":"https://doi.org/10.1007/s11227-024-06423-z","url":null,"abstract":"<p>In cloud-edge-end scenarios, how to achieve rational resource allocation, implement effective service deployment, and ensure high service quality has become a hot research topic in academic domains. Service providers usually deploy services by considering the characteristics of different geographical regions, which helps to meet the diverse needs of users in different regions and optimize resource allocation and utilization. However, due to the widespread distribution of users and limited server resources, providing all types of services to users in every geographical region is not feasible. In addition, edge servers are prone to operational failures caused by software anomalies, hardware malfunctions, and malicious attacks, which will decrease service reliability. To address the problems above, this paper proposes a metric for service priorities based on user demands and regional characteristics for different geographical regions. Building upon this foundation, a Multi-Service Geographic region Deployment based on Priority (MS-GD-P) is proposed. This method takes user coverage and service reliability into consideration, which facilitates users’ needs for multiple services in different geographical regions. Experimental results on real datasets demonstrate that MS-GD-P outperforms baseline methods in user coverage and service reliability.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information acquisition optimizer: a new efficient algorithm for solving numerical and constrained engineering optimization problems 信息获取优化器:解决数值和约束工程优化问题的新型高效算法
Pub Date : 2024-08-14 DOI: 10.1007/s11227-024-06384-3
Xiao Wu, Shaobo Li, Xinghe Jiang, Yanqiu Zhou

This paper addresses the increasing complexity of challenges in the field of continuous nonlinear optimization by proposing an innovative algorithm called information acquisition optimizer (IAO), which is inspired by human information acquisition behaviors and consists of three crucial strategies: information collection, information filtering and evaluation, and information analysis and organization to accommodate diverse optimization requirements. Firstly, comparative assessments of performance are conducted between the IAO and 15 widely recognized algorithms using the standard test function suites from CEC2014, CEC2017, CEC2020, and CEC2022. The results demonstrate that IAO is robustly competitive regarding convergence rate, solution accuracy, and stability. Additionally, the outcomes of the Wilcoxon signed rank test and Friedman mean ranking strongly validate the effectiveness and reliability of IAO. Moreover, the time comparison analysis experiments indicate its high efficiency. Finally, comparative tests on five real-world optimization difficulties affirm the remarkable applicability of IAO in handling complex issues with unknown search spaces. The code for the IAO algorithm is available at https://ww2.mathworks.cn/matlabcentral/fileexchange/169331-information-acquisition-optimizer.

针对连续非线性优化领域日益复杂的挑战,本文提出了一种名为信息获取优化器(IAO)的创新算法,该算法受到人类信息获取行为的启发,包含信息收集、信息过滤与评估、信息分析与组织三个关键策略,以适应多样化的优化需求。首先,利用 CEC2014、CEC2017、CEC2020 和 CEC2022 的标准测试功能套件,对 IAO 和 15 种广为认可的算法进行了性能比较评估。结果表明,IAO 在收敛速度、求解精度和稳定性方面都具有很强的竞争力。此外,Wilcoxon 符号秩检验和 Friedman 平均排名的结果也有力地验证了 IAO 的有效性和可靠性。此外,时间比较分析实验也表明了 IAO 的高效性。最后,在五个实际优化难题上进行的对比测试肯定了 IAO 在处理具有未知搜索空间的复杂问题上的显著适用性。IAO 算法的代码可在 https://ww2.mathworks.cn/matlabcentral/fileexchange/169331-information-acquisition-optimizer 上获取。
{"title":"Information acquisition optimizer: a new efficient algorithm for solving numerical and constrained engineering optimization problems","authors":"Xiao Wu, Shaobo Li, Xinghe Jiang, Yanqiu Zhou","doi":"10.1007/s11227-024-06384-3","DOIUrl":"https://doi.org/10.1007/s11227-024-06384-3","url":null,"abstract":"<p>This paper addresses the increasing complexity of challenges in the field of continuous nonlinear optimization by proposing an innovative algorithm called information acquisition optimizer (IAO), which is inspired by human information acquisition behaviors and consists of three crucial strategies: information collection, information filtering and evaluation, and information analysis and organization to accommodate diverse optimization requirements. Firstly, comparative assessments of performance are conducted between the IAO and 15 widely recognized algorithms using the standard test function suites from CEC2014, CEC2017, CEC2020, and CEC2022. The results demonstrate that IAO is robustly competitive regarding convergence rate, solution accuracy, and stability. Additionally, the outcomes of the Wilcoxon signed rank test and Friedman mean ranking strongly validate the effectiveness and reliability of IAO. Moreover, the time comparison analysis experiments indicate its high efficiency. Finally, comparative tests on five real-world optimization difficulties affirm the remarkable applicability of IAO in handling complex issues with unknown search spaces. The code for the IAO algorithm is available at https://ww2.mathworks.cn/matlabcentral/fileexchange/169331-information-acquisition-optimizer.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"55 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fusion of deep belief network and SVM regression for intelligence of urban traffic control system 融合深度信念网络和 SVM 回归实现城市交通控制系统智能化
Pub Date : 2024-08-13 DOI: 10.1007/s11227-024-06386-1
Alireza Soleimani, Yousef Farhang, Amin Babazadeh Sangar

Increasing urban traffic and congestion have led to significant issues such as rising air pollution and wasted time, highlighting the need for an intelligent traffic light control (TLC) system to minimize vehicle waiting times. This paper presents a novel TLC system that leverages the Internet of Things (IoT) for data collection and employs the random forest algorithm for preprocessing and feature extraction. A deep belief network predicts future traffic conditions, and a support vector regression network is integrated to enhance prediction accuracy. Additionally, the traffic light control strategy is optimized using reinforcement learning. The proposed method is evaluated through two different scenarios. The first scenario is compared with fixed-time control and the double dueling deep neural network (3DQN) methods. The second scenario compares it with the SVM, KNN, and MAADAC approaches. Simulation results demonstrate that the proposed method significantly outperforms these alternative approaches, showing substantial improvements in average vehicle waiting times by more than 20%, 32%, and 45%, respectively. Using a deep belief network, supplemented by support vector regression, ensures high precision in forecasting traffic patterns. Furthermore, the reinforcement learning-based optimization of the traffic light control strategy effectively adapts to changing traffic conditions, providing superior traffic flow management. The results indicate that the proposed system can substantially reduce traffic congestion and improve urban traffic flow.

日益增长的城市交通和拥堵已导致空气污染加剧和时间浪费等重大问题,这凸显了对智能交通灯控制系统(TLC)的需求,以最大限度地减少车辆等待时间。本文介绍了一种新型交通灯控制系统,该系统利用物联网(IoT)进行数据收集,并采用随机森林算法进行预处理和特征提取。深度信念网络可预测未来的交通状况,而支持向量回归网络则可提高预测的准确性。此外,还利用强化学习优化了交通灯控制策略。我们通过两种不同的场景对所提出的方法进行了评估。第一种情况是与固定时间控制和双决斗深度神经网络(3DQN)方法进行比较。第二种情况是与 SVM、KNN 和 MAADAC 方法进行比较。仿真结果表明,所提出的方法明显优于这些替代方法,车辆平均等待时间分别大幅提高了 20%、32% 和 45%。使用深度信念网络,辅以支持向量回归,确保了预测交通模式的高精度。此外,基于强化学习的交通灯控制策略优化能有效适应不断变化的交通状况,提供卓越的交通流量管理。研究结果表明,所提出的系统可以大幅减少交通拥堵,改善城市交通流量。
{"title":"Fusion of deep belief network and SVM regression for intelligence of urban traffic control system","authors":"Alireza Soleimani, Yousef Farhang, Amin Babazadeh Sangar","doi":"10.1007/s11227-024-06386-1","DOIUrl":"https://doi.org/10.1007/s11227-024-06386-1","url":null,"abstract":"<p>Increasing urban traffic and congestion have led to significant issues such as rising air pollution and wasted time, highlighting the need for an intelligent traffic light control (TLC) system to minimize vehicle waiting times. This paper presents a novel TLC system that leverages the Internet of Things (IoT) for data collection and employs the random forest algorithm for preprocessing and feature extraction. A deep belief network predicts future traffic conditions, and a support vector regression network is integrated to enhance prediction accuracy. Additionally, the traffic light control strategy is optimized using reinforcement learning. The proposed method is evaluated through two different scenarios. The first scenario is compared with fixed-time control and the double dueling deep neural network (3DQN) methods. The second scenario compares it with the SVM, KNN, and MAADAC approaches. Simulation results demonstrate that the proposed method significantly outperforms these alternative approaches, showing substantial improvements in average vehicle waiting times by more than 20%, 32%, and 45%, respectively. Using a deep belief network, supplemented by support vector regression, ensures high precision in forecasting traffic patterns. Furthermore, the reinforcement learning-based optimization of the traffic light control strategy effectively adapts to changing traffic conditions, providing superior traffic flow management. The results indicate that the proposed system can substantially reduce traffic congestion and improve urban traffic flow.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An accelerated chaotic image secure communication system based on Zynq-7000 platform 基于 Zynq-7000 平台的加速混沌图像安全通信系统
Pub Date : 2024-08-13 DOI: 10.1007/s11227-024-06362-9
Meiting Liu, Wenxin Yu, Zuanbo Zhou

Chaotic systems are often used as random sequence generators due to their excellent pseudo-randomness, but there is limitation that the discretization of complex chaotic systems requires a long computational time. Therefore, a parallel discretization method for chaotic system, and an accelerated chaotic image secure communication system based on the Zynq-7000 platform are proposed in this paper. Firstly, a 3-dimensional (3-D) chaotic system is constructed to generate random sequence, which has high Shannon entropy (SE) complexity. Then, chaotic system is parallelly discretized through finite state machine, which sequences are combined with scrambling and diffusion algorithms to construct an accelerated chaotic image secure communication system. Finally, the secure communication process based on the Zynq-7000 platform is completed, and the analysis of hardware experimental results shows that the system has safe performances, simple structure and excellent operational efficiency.

混沌系统因其出色的伪随机性而常被用作随机序列发生器,但其局限性在于复杂混沌系统的离散化需要较长的计算时间。因此,本文提出了一种混沌系统并行离散化方法,以及基于 Zynq-7000 平台的加速混沌图像安全通信系统。首先,构建一个三维(3-D)混沌系统来生成具有高香农熵(SE)复杂度的随机序列。然后,通过有限状态机对混沌系统进行并行离散化,并将序列与加扰和扩散算法相结合,构建加速混沌图像安全通信系统。最后,完成了基于 Zynq-7000 平台的安全通信过程,硬件实验结果分析表明该系统性能安全、结构简单、运行效率高。
{"title":"An accelerated chaotic image secure communication system based on Zynq-7000 platform","authors":"Meiting Liu, Wenxin Yu, Zuanbo Zhou","doi":"10.1007/s11227-024-06362-9","DOIUrl":"https://doi.org/10.1007/s11227-024-06362-9","url":null,"abstract":"<p>Chaotic systems are often used as random sequence generators due to their excellent pseudo-randomness, but there is limitation that the discretization of complex chaotic systems requires a long computational time. Therefore, a parallel discretization method for chaotic system, and an accelerated chaotic image secure communication system based on the Zynq-7000 platform are proposed in this paper. Firstly, a 3-dimensional (3-D) chaotic system is constructed to generate random sequence, which has high Shannon entropy (SE) complexity. Then, chaotic system is parallelly discretized through finite state machine, which sequences are combined with scrambling and diffusion algorithms to construct an accelerated chaotic image secure communication system. Finally, the secure communication process based on the Zynq-7000 platform is completed, and the analysis of hardware experimental results shows that the system has safe performances, simple structure and excellent operational efficiency.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"13 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attention-based multilayer GRU decoder for on-site glucose prediction on smartphone 基于注意力的多层 GRU 解码器,用于智能手机上的现场葡萄糖预测
Pub Date : 2024-08-13 DOI: 10.1007/s11227-024-06424-y
Ömer Atılım Koca, Halime Özge Kabak, Volkan Kılıç

Continuous glucose monitoring (CGM) devices provide a considerable amount of data that can be used to predict future values, enabling sustainable control of blood glucose levels to prevent hypo-/hyperglycemic events and associated complications. However, it is a challenging task in diabetes management as the data from CGM are sequential, time-varying, nonlinear, and non-stationary. Due to their ability to deal with these types of data, artificial intelligence (AI)-based methods have emerged as a useful tool. The traditional approach is to implement AI methods in baseline form, which results in exploiting less sequential information from the data, thus reducing the prediction accuracy. To address this issue, we propose a novel glucose prediction approach within the encoder–decoder framework, aimed at improving prediction accuracy despite the complex and non-stationary nature of CGM data. Sequential information is extracted using a convolutional neural network-based encoder, while predictions are generated by a gated recurrent unit (GRU)-based decoder. In our approach, the decoder is designed with the multilayer GRU attached to an attention layer to ensure the modulation of the most relevant information so that it leads to a more accurate prediction. The proposed attention-based multilayer GRU approach has been extensively evaluated on the OhioT1DM dataset, and experimental results demonstrate the advantage of our proposed approach over the state-of-the-art approaches. Furthermore, the proposed approach is also integrated with our custom-designed Android application called “GlucoWizard” to perform glucose prediction for diabetes.

连续血糖监测(CGM)设备提供了大量数据,可用于预测未来值,从而实现对血糖水平的可持续控制,防止低血糖/高血糖事件和相关并发症的发生。然而,由于 CGM 的数据是连续的、时变的、非线性的和非稳态的,因此在糖尿病管理中这是一项具有挑战性的任务。基于人工智能(AI)的方法能够处理这些类型的数据,因此成为一种有用的工具。传统的方法是以基线形式实施人工智能方法,这导致从数据中利用的连续信息较少,从而降低了预测准确性。为解决这一问题,我们在编码器-解码器框架内提出了一种新的葡萄糖预测方法,旨在提高预测准确性,尽管 CGM 数据具有复杂性和非平稳性。使用基于卷积神经网络的编码器提取序列信息,而预测则由基于门控递归单元(GRU)的解码器生成。在我们的方法中,解码器的设计是将多层 GRU 连接到注意力层,以确保调制最相关的信息,从而实现更准确的预测。我们提出的基于注意力的多层 GRU 方法已在 OhioT1DM 数据集上进行了广泛评估,实验结果表明我们提出的方法比最先进的方法更具优势。此外,提出的方法还与我们定制设计的安卓应用程序 "GlucoWizard "相结合,用于进行糖尿病血糖预测。
{"title":"Attention-based multilayer GRU decoder for on-site glucose prediction on smartphone","authors":"Ömer Atılım Koca, Halime Özge Kabak, Volkan Kılıç","doi":"10.1007/s11227-024-06424-y","DOIUrl":"https://doi.org/10.1007/s11227-024-06424-y","url":null,"abstract":"<p>Continuous glucose monitoring (CGM) devices provide a considerable amount of data that can be used to predict future values, enabling sustainable control of blood glucose levels to prevent hypo-/hyperglycemic events and associated complications. However, it is a challenging task in diabetes management as the data from CGM are sequential, time-varying, nonlinear, and non-stationary. Due to their ability to deal with these types of data, artificial intelligence (AI)-based methods have emerged as a useful tool. The traditional approach is to implement AI methods in baseline form, which results in exploiting less sequential information from the data, thus reducing the prediction accuracy. To address this issue, we propose a novel glucose prediction approach within the encoder–decoder framework, aimed at improving prediction accuracy despite the complex and non-stationary nature of CGM data. Sequential information is extracted using a convolutional neural network-based encoder, while predictions are generated by a gated recurrent unit (GRU)-based decoder. In our approach, the decoder is designed with the multilayer GRU attached to an attention layer to ensure the modulation of the most relevant information so that it leads to a more accurate prediction. The proposed attention-based multilayer GRU approach has been extensively evaluated on the OhioT1DM dataset, and experimental results demonstrate the advantage of our proposed approach over the state-of-the-art approaches. Furthermore, the proposed approach is also integrated with our custom-designed Android application called “<i>GlucoWizard</i>” to perform glucose prediction for diabetes.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof ECAUT:基于零知识证明的 ECC 注入式物联网系统高效身份验证
Pub Date : 2024-08-13 DOI: 10.1007/s11227-024-06427-9
M. Prakash, K. Ramesh

The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication most. However, this growth has also brought forth significant security challenges, particularly concerning replay attacks, which have troubled previous works. In our study, we introduce an innovative security solution that uses elliptic curve cryptography (ECC) with zero-knowledge proof (ZKP) specifically tailored for RFID-communicated applications. By leveraging ECC with ZKP, we not only improve the security of IoT systems but also reduce the persistent threat of replay attacks. Unlike traditional methods, our approach ensures that sensitive data is securely transmitted and authenticated without the risk of unauthorized duplication. We validated our approach using Scyther and BAN logic, well-known tools for assessing security protocols. These validations confirm the robustness of our solution in addressing security challenges and provide further assurance of its effectiveness in protecting IoT systems against various threats, including replay attacks. Our comprehensive analysis revealed that our approach outperforms existing solutions in terms of communication costs and computation costs. The improved efficiency in these key areas underscores the practicality and viability of our solution, further solidifying its position as a leading option for safeguarding IoT ecosystems against emerging threats.

物联网(IoT)取得了长足的发展,在使用 RFID 通信最多的各个领域实现了连接和智能。然而,这种增长也带来了巨大的安全挑战,尤其是重放攻击,这困扰着以往的研究。在我们的研究中,我们介绍了一种创新的安全解决方案,该方案使用椭圆曲线加密算法(ECC)和零知识证明(ZKP),专为 RFID 通信应用量身定制。通过利用带有 ZKP 的 ECC,我们不仅提高了物联网系统的安全性,还降低了重放攻击的持续威胁。与传统方法不同,我们的方法可确保敏感数据的安全传输和验证,而不会出现未经授权的复制风险。我们使用著名的安全协议评估工具 Scyther 和 BAN 逻辑验证了我们的方法。这些验证证实了我们的解决方案在应对安全挑战方面的稳健性,并进一步保证了它在保护物联网系统免受包括重放攻击在内的各种威胁方面的有效性。我们的综合分析表明,我们的方法在通信成本和计算成本方面优于现有解决方案。在这些关键领域效率的提高凸显了我们解决方案的实用性和可行性,进一步巩固了其作为保护物联网生态系统免受新兴威胁的领先选择的地位。
{"title":"ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof","authors":"M. Prakash, K. Ramesh","doi":"10.1007/s11227-024-06427-9","DOIUrl":"https://doi.org/10.1007/s11227-024-06427-9","url":null,"abstract":"<p>The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication most. However, this growth has also brought forth significant security challenges, particularly concerning replay attacks, which have troubled previous works. In our study, we introduce an innovative security solution that uses elliptic curve cryptography (ECC) with zero-knowledge proof (ZKP) specifically tailored for RFID-communicated applications. By leveraging ECC with ZKP, we not only improve the security of IoT systems but also reduce the persistent threat of replay attacks. Unlike traditional methods, our approach ensures that sensitive data is securely transmitted and authenticated without the risk of unauthorized duplication. We validated our approach using Scyther and BAN logic, well-known tools for assessing security protocols. These validations confirm the robustness of our solution in addressing security challenges and provide further assurance of its effectiveness in protecting IoT systems against various threats, including replay attacks. Our comprehensive analysis revealed that our approach outperforms existing solutions in terms of communication costs and computation costs. The improved efficiency in these key areas underscores the practicality and viability of our solution, further solidifying its position as a leading option for safeguarding IoT ecosystems against emerging threats.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142182386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed approach for persistent homology computation on a large scale 大规模持久同源性计算的分布式方法
Pub Date : 2024-08-12 DOI: 10.1007/s11227-024-06374-5
Riccardo Ceccaroni, Lorenzo Di Rocco, Umberto Ferraro Petrillo, Pierpaolo Brutti

Persistent homology (PH) is a powerful mathematical method to automatically extract relevant insights from images, such as those obtained by high-resolution imaging devices like electron microscopes or new-generation telescopes. However, the application of this method comes at a very high computational cost that is bound to explode more because new imaging devices generate an ever-growing amount of data. In this paper, we present PixHomology, a novel algorithm for efficiently computing zero-dimensional PH on 2D images, optimizing memory and processing time. By leveraging the Apache Spark framework, we also present a distributed version of our algorithm with several optimized variants, able to concurrently process large batches of astronomical images. Finally, we present the results of an experimental analysis showing that our algorithm and its distributed version are efficient in terms of required memory, execution time, and scalability, consistently outperforming existing state-of-the-art PH computation tools when used to process large datasets.

持久同源性(PH)是一种强大的数学方法,可以自动从图像(如电子显微镜或新一代望远镜等高分辨率成像设备获得的图像)中提取相关的洞察力。然而,这种方法的应用需要非常高的计算成本,而且由于新的成像设备产生的数据量不断增加,计算成本势必会激增。在本文中,我们介绍了 PixHomology,这是一种在二维图像上高效计算零维 PH、优化内存和处理时间的新型算法。通过利用 Apache Spark 框架,我们还介绍了我们算法的分布式版本和几个优化变体,能够并发处理大批量的天文图像。最后,我们介绍了实验分析的结果,表明我们的算法及其分布式版本在所需内存、执行时间和可扩展性方面都很高效,在用于处理大型数据集时始终优于现有的最先进的物理计算工具。
{"title":"A distributed approach for persistent homology computation on a large scale","authors":"Riccardo Ceccaroni, Lorenzo Di Rocco, Umberto Ferraro Petrillo, Pierpaolo Brutti","doi":"10.1007/s11227-024-06374-5","DOIUrl":"https://doi.org/10.1007/s11227-024-06374-5","url":null,"abstract":"<p>Persistent homology (PH) is a powerful mathematical method to automatically extract relevant insights from images, such as those obtained by high-resolution imaging devices like electron microscopes or new-generation telescopes. However, the application of this method comes at a very high computational cost that is bound to explode more because new imaging devices generate an ever-growing amount of data. In this paper, we present <i>PixHomology</i>, a novel algorithm for efficiently computing zero-dimensional PH on <span>2D</span> images, optimizing memory and processing time. By leveraging the Apache Spark framework, we also present a distributed version of our algorithm with several optimized variants, able to concurrently process large batches of astronomical images. Finally, we present the results of an experimental analysis showing that our algorithm and its distributed version are efficient in terms of required memory, execution time, and scalability, consistently outperforming existing state-of-the-art PH computation tools when used to process large datasets.</p>","PeriodicalId":501596,"journal":{"name":"The Journal of Supercomputing","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141941719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The Journal of Supercomputing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1