首页 > 最新文献

Computer Journal最新文献

英文 中文
Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher 一种SM4分组密码白盒实现的密码分析
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-09-19 DOI: 10.1093/comjnl/bxad091
Jiqiang Lu, Jingyu Li, Zexuan Chen, Yanan Li
Abstract The SM4 block cipher is a Chinese national standard and an ISO international standard. Since white-box cryptography has many real-life applications nowadays, a few white-box implementations of SM4 has been proposed, among which a type of constructions is dominated, which uses a linear or affine diagonal block encoding to protect the original three 32-bit branches entering a round function and uses its inverse as the input encoding to the S-box layer. In this paper, we analyse the security of this type of constructions against Lepoint et al.’s collision-based attack method. Our experiment under a small fraction of (encodings, round key) combinations shows that the rank of the concerned linear system is much less than the number of the involved unknowns, meaning these white-box SM4 implementations should resist Lepoint et al.’s method, but we leave it as an open problem whether there are such encodings that the rank of the corresponding linear system is slightly less than the number of the involved unknowns, in which scenario Lepoint et al.’s method may be used to recover a round key for the case with linear encodings and to remove most white-box operations until mainly some Boolean masks for the case with affine encodings.
SM4分组密码是中国国家标准和ISO国际标准。由于白盒密码学在现实生活中有许多应用,因此提出了几种SM4的白盒实现,其中以一种结构占主导地位,它使用线性或仿射对角块编码来保护进入圆函数的原始三个32位分支,并使用其逆作为S-box层的输入编码。在本文中,我们针对Lepoint等人基于碰撞的攻击方法分析了这类结构的安全性。我们在一小部分(编码,圆键)组合下的实验表明,相关线性系统的秩远小于所涉及的未知数的数量,这意味着这些白盒SM4实现应该抵制Lepoint等人的方法,但我们将其作为一个开放的问题是否存在这样的编码,即相应线性系统的秩略小于所涉及的未知数的数量。在这种情况下,Lepoint等人的方法可以用来恢复线性编码情况下的圆键,并去除大多数白盒操作,直到主要是一些布尔掩码的情况下,仿射编码。
{"title":"Cryptanalysis Of A Type Of White-Box Implementations Of The SM4 Block Cipher","authors":"Jiqiang Lu, Jingyu Li, Zexuan Chen, Yanan Li","doi":"10.1093/comjnl/bxad091","DOIUrl":"https://doi.org/10.1093/comjnl/bxad091","url":null,"abstract":"Abstract The SM4 block cipher is a Chinese national standard and an ISO international standard. Since white-box cryptography has many real-life applications nowadays, a few white-box implementations of SM4 has been proposed, among which a type of constructions is dominated, which uses a linear or affine diagonal block encoding to protect the original three 32-bit branches entering a round function and uses its inverse as the input encoding to the S-box layer. In this paper, we analyse the security of this type of constructions against Lepoint et al.’s collision-based attack method. Our experiment under a small fraction of (encodings, round key) combinations shows that the rank of the concerned linear system is much less than the number of the involved unknowns, meaning these white-box SM4 implementations should resist Lepoint et al.’s method, but we leave it as an open problem whether there are such encodings that the rank of the corresponding linear system is slightly less than the number of the involved unknowns, in which scenario Lepoint et al.’s method may be used to recover a round key for the case with linear encodings and to remove most white-box operations until mainly some Boolean masks for the case with affine encodings.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135011338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Hybrid Solution For The Cold Start Problem In Recommendation 推荐系统冷启动问题的混合解决方案
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-26 DOI: 10.1093/comjnl/bxad088
Syed Irteza Hussain Jafri, Rozaida Ghazali, Irfan Javid, Yana Mazwin Mohmad Hassim, Mubashir Hayat Khan
Abstract Recommender systems are becoming more and more significant in today’s digital world and in the modern economy. They make a substantial contribution to company operations by offering tailored advice and decreasing overwhelm. Collaborative filtering, being popular in the domain of recommendation, is used to offer recommendations to attract the target audience based on the feedback of people with comparable interests. This method has some limitations, such as a cold-start issue, which makes the system less effective in anticipating unknown objects. We provide a hybrid deep-learning-based strategy centered on a method to enrich user and item profiles to address the cold-start issue in the recommendation process using a collaborative filtering approach. We employ pretrained deep learning models to produce rich user and item feature vectors that aid in the creation of useful suggestions and handling of user and item cold-start issues. The creation of more precise and tailored similarity matrices is made possible by adding metadata to the extracted features of the user and item. The results of the experiment demonstrate that in terms of precision and rate coverage, the proposed method performs better than the baseline techniques.
在当今的数字世界和现代经济中,推荐系统变得越来越重要。他们通过提供量身定制的建议和减少压力,为公司运营做出了重大贡献。协同过滤在推荐领域非常流行,它是基于具有相似兴趣的人的反馈来提供推荐以吸引目标受众。该方法存在一定的局限性,如冷启动问题,这使得系统在预测未知物体时效率较低。我们提供了一种基于深度学习的混合策略,该策略以丰富用户和项目配置文件的方法为中心,使用协同过滤方法解决推荐过程中的冷启动问题。我们使用预训练的深度学习模型来生成丰富的用户和项目特征向量,这些特征向量有助于创建有用的建议并处理用户和项目冷启动问题。通过将元数据添加到提取的用户和项目的特征中,可以创建更精确和定制的相似性矩阵。实验结果表明,该方法在精度和覆盖率方面都优于基线技术。
{"title":"A Hybrid Solution For The Cold Start Problem In Recommendation","authors":"Syed Irteza Hussain Jafri, Rozaida Ghazali, Irfan Javid, Yana Mazwin Mohmad Hassim, Mubashir Hayat Khan","doi":"10.1093/comjnl/bxad088","DOIUrl":"https://doi.org/10.1093/comjnl/bxad088","url":null,"abstract":"Abstract Recommender systems are becoming more and more significant in today’s digital world and in the modern economy. They make a substantial contribution to company operations by offering tailored advice and decreasing overwhelm. Collaborative filtering, being popular in the domain of recommendation, is used to offer recommendations to attract the target audience based on the feedback of people with comparable interests. This method has some limitations, such as a cold-start issue, which makes the system less effective in anticipating unknown objects. We provide a hybrid deep-learning-based strategy centered on a method to enrich user and item profiles to address the cold-start issue in the recommendation process using a collaborative filtering approach. We employ pretrained deep learning models to produce rich user and item feature vectors that aid in the creation of useful suggestions and handling of user and item cold-start issues. The creation of more precise and tailored similarity matrices is made possible by adding metadata to the extracted features of the user and item. The results of the experiment demonstrate that in terms of precision and rate coverage, the proposed method performs better than the baseline techniques.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135236050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32 重新审视软件高效流密码RCR-64和RCR-32
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-14 DOI: 10.1093/comjnl/bxad084
Mabin Joseph, Gautham Sekar, R Balasubramanian
Abstract The synchronous stream ciphers RCR-64 and RCR-32 designed by Sekar, Paul and Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and Seberry), respectively. The RCR ciphers have remained unbroken since they were published in 2007. In this paper, we present arguments that not only support the designers’ security claims but suggest, in general, that the ciphers are secure against several classes of cryptanalytic attacks. We find that the ciphers are best used with 256-bit keys and 384-bit IVs. We also suggest ways to protect software implementations of the RCR ciphers against (cache-)timing and processor flag attacks. Our performance evaluation suggests that the protected implementation of the RCR-64 encrypts long messages at speeds comparable to some of the fastest stream ciphers available today. Consequently, we find that the RCR ciphers may be well suited for PC-based applications in general and streaming audio / video applications in particular. This is the first paper to present a detailed study on the security and performance of the RCR ciphers.
由Sekar、Paul和Preneel设计的同步流密码RCR-64和RCR-32分别是Biham和Seberry设计的同步流密码TPy和typy的增强变体。自2007年发布以来,RCR密码一直未被破解。在本文中,我们提出的论点不仅支持设计者的安全声明,而且建议,一般来说,密码对于几种类型的密码分析攻击是安全的。我们发现密码最好与256位密钥和384位iv一起使用。我们还提出了保护RCR密码的软件实现免受(缓存)定时和处理器标志攻击的方法。我们的性能评估表明,RCR-64的受保护实现加密长消息的速度与目前可用的一些最快的流密码相当。因此,我们发现RCR密码可能非常适合基于pc的应用程序,特别是流音频/视频应用程序。本文首次对RCR密码的安全性和性能进行了详细的研究。
{"title":"Revisiting the Software-Efficient Stream Ciphers RCR-64 and RCR-32","authors":"Mabin Joseph, Gautham Sekar, R Balasubramanian","doi":"10.1093/comjnl/bxad084","DOIUrl":"https://doi.org/10.1093/comjnl/bxad084","url":null,"abstract":"Abstract The synchronous stream ciphers RCR-64 and RCR-32 designed by Sekar, Paul and Preneel are strengthened variants of the ciphers TPy and TPypy (designed by Biham and Seberry), respectively. The RCR ciphers have remained unbroken since they were published in 2007. In this paper, we present arguments that not only support the designers’ security claims but suggest, in general, that the ciphers are secure against several classes of cryptanalytic attacks. We find that the ciphers are best used with 256-bit keys and 384-bit IVs. We also suggest ways to protect software implementations of the RCR ciphers against (cache-)timing and processor flag attacks. Our performance evaluation suggests that the protected implementation of the RCR-64 encrypts long messages at speeds comparable to some of the fastest stream ciphers available today. Consequently, we find that the RCR ciphers may be well suited for PC-based applications in general and streaming audio / video applications in particular. This is the first paper to present a detailed study on the security and performance of the RCR ciphers.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135265441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation 基于知识感知的双通道图神经网络去噪推荐
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-11 DOI: 10.1093/comjnl/bxad085
Hanwen Zhang, Li-e Wang, Zhigang Sun, Xianxian Li
Abstract Knowledge graph (KG) is introduced as side information into recommender systems, which can alleviate the sparsity and cold start problems in collaborative filtering. Existing studies mainly focus on modeling users’ historical behavior data and KG-based propagation. However, they have the limitation of ignoring noise information during recommendation. We consider that noise exists in two parts (i.e. KG and user-item interaction data). In this paper, we propose Knowledge-aware Dual-Channel Graph Neural Networks (KDGNN) to improve the recommendation performance by reducing the noise in the recommendation process. Specifically, (1) for the noise in KG, we design a personalized gating mechanism, namely dual-channel balancing mechanism, to block the propagation of redundant information in KG. (2) For the noise in user-item interaction data, we integrate personalized and knowledge-aware signals to capture user preferences fully and use personalized knowledge-aware attention to denoise user-item interaction data. Compared with existing KG-based methods, we aim to propose a knowledge-aware recommendation method from a new perspective of denoising. We perform performance analysis on three real-world datasets, and experiment results demonstrate that KDGNN achieves strongly competitive performance compared with several compelling state-of-the-art baselines.
摘要将知识图(KG)作为辅助信息引入到推荐系统中,可以缓解协同过滤中的稀疏性和冷启动问题。现有的研究主要集中在用户历史行为数据建模和基于kg的传播上。然而,它们在推荐过程中存在忽略噪声信息的局限性。我们认为噪声存在于两部分(即KG和用户-项目交互数据)。本文提出了知识感知双通道图神经网络(KDGNN),通过降低推荐过程中的噪声来提高推荐性能。具体而言,(1)针对KG中的噪声,我们设计了一种个性化的门控机制,即双通道平衡机制,以阻止冗余信息在KG中的传播。(2)针对用户-物品交互数据中的噪声,我们将个性化和知识感知信号相结合,充分捕捉用户偏好,并利用个性化的知识感知注意力对用户-物品交互数据进行降噪。与现有的基于kg的推荐方法相比,我们旨在从去噪的新角度提出一种知识感知的推荐方法。我们对三个真实世界的数据集进行了性能分析,实验结果表明,与几个引人注目的最先进的基线相比,KDGNN实现了极具竞争力的性能。
{"title":"Knowledge-Aware Dual-Channel Graph Neural Networks For Denoising Recommendation","authors":"Hanwen Zhang, Li-e Wang, Zhigang Sun, Xianxian Li","doi":"10.1093/comjnl/bxad085","DOIUrl":"https://doi.org/10.1093/comjnl/bxad085","url":null,"abstract":"Abstract Knowledge graph (KG) is introduced as side information into recommender systems, which can alleviate the sparsity and cold start problems in collaborative filtering. Existing studies mainly focus on modeling users’ historical behavior data and KG-based propagation. However, they have the limitation of ignoring noise information during recommendation. We consider that noise exists in two parts (i.e. KG and user-item interaction data). In this paper, we propose Knowledge-aware Dual-Channel Graph Neural Networks (KDGNN) to improve the recommendation performance by reducing the noise in the recommendation process. Specifically, (1) for the noise in KG, we design a personalized gating mechanism, namely dual-channel balancing mechanism, to block the propagation of redundant information in KG. (2) For the noise in user-item interaction data, we integrate personalized and knowledge-aware signals to capture user preferences fully and use personalized knowledge-aware attention to denoise user-item interaction data. Compared with existing KG-based methods, we aim to propose a knowledge-aware recommendation method from a new perspective of denoising. We perform performance analysis on three real-world datasets, and experiment results demonstrate that KDGNN achieves strongly competitive performance compared with several compelling state-of-the-art baselines.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135444069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AKGF: Automatic Kernel Generation for DNN on CPU-FPGA AKGF:在CPU-FPGA上自动生成DNN内核
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-08-11 DOI: 10.1093/comjnl/bxad086
Dong Dong, Hongxu Jiang, Boyu Diao
Abstract While tensor accelerated compilers have proven effective in deploying deep neural networks (DNN) on general-purpose hardware, optimizing for FPGA remains challenging due to the complex DNN architectures and the heterogeneous, semi-open compute units. This paper introduces the Automatic Kernel Generation for DNN on CPU-FPGA (AKGF) framework for efficient deployment of DNN on heterogeneous CPU-FPGA platforms. AKGF generates an intermediate representation (IR) of the DNN using TVM’s Halide IR, annotates the operators of model layers in the IR to compute them on the corresponding hardware cores, and further optimizes the operator code for CPU and FPGA using ARM’s function library and the polyhedral model to enhance model inference speed and power consumption. The experimental tests conducted on a CPU-FPGA board validate the effectiveness of AKGF, demonstrating significant acceleration ratios (up to 6.7x) compared to state-of-the-art accelerators while achieving a 2x power optimization. AKGF effectively leverages the computational capabilities of both CPU and FPGA for high-performance deployment of DNN on CPU-FPGA platforms.
虽然张量加速编译器已被证明在通用硬件上部署深度神经网络(DNN)是有效的,但由于复杂的DNN架构和异构、半开放的计算单元,FPGA的优化仍然具有挑战性。为了在异构CPU-FPGA平台上高效部署深度神经网络,本文介绍了基于CPU-FPGA的深度神经网络自动内核生成(AKGF)框架。AKGF使用TVM的Halide IR生成DNN的中间表示(IR),在IR中标注模型层的运算符,在相应的硬件内核上进行计算,并使用ARM的函数库和多面体模型进一步优化CPU和FPGA的运算符代码,以提高模型推理速度和功耗。在CPU-FPGA板上进行的实验测试验证了AKGF的有效性,与最先进的加速器相比,显示出显著的加速比(高达6.7倍),同时实现了2倍的功率优化。AKGF有效地利用CPU和FPGA的计算能力,在CPU-FPGA平台上实现DNN的高性能部署。
{"title":"AKGF: Automatic Kernel Generation for DNN on CPU-FPGA","authors":"Dong Dong, Hongxu Jiang, Boyu Diao","doi":"10.1093/comjnl/bxad086","DOIUrl":"https://doi.org/10.1093/comjnl/bxad086","url":null,"abstract":"Abstract While tensor accelerated compilers have proven effective in deploying deep neural networks (DNN) on general-purpose hardware, optimizing for FPGA remains challenging due to the complex DNN architectures and the heterogeneous, semi-open compute units. This paper introduces the Automatic Kernel Generation for DNN on CPU-FPGA (AKGF) framework for efficient deployment of DNN on heterogeneous CPU-FPGA platforms. AKGF generates an intermediate representation (IR) of the DNN using TVM’s Halide IR, annotates the operators of model layers in the IR to compute them on the corresponding hardware cores, and further optimizes the operator code for CPU and FPGA using ARM’s function library and the polyhedral model to enhance model inference speed and power consumption. The experimental tests conducted on a CPU-FPGA board validate the effectiveness of AKGF, demonstrating significant acceleration ratios (up to 6.7x) compared to state-of-the-art accelerators while achieving a 2x power optimization. AKGF effectively leverages the computational capabilities of both CPU and FPGA for high-performance deployment of DNN on CPU-FPGA platforms.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135444351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction KEFSAR:基于高精度预测的可充电物联网太阳能感知路由策略
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-29 DOI: 10.1093/comjnl/bxad074
Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma
Abstract The high energy density of solar energy gives wireless sensor networks advantages in outdoor monitoring applications. However, long-term stable monitoring is challenging due to frequent weather changes, shading by buildings and trees, etc. The existing research usually uses two technologies to solve the above problems: (1) the energy prediction algorithm, and (2) the energy-aware routing strategy. However, in an actual deployment, frequent weather changes can significantly reduce the accuracy of the existing prediction algorithms. When using the algorithms as the support for energy-aware routing, the network lifetime is less than ideal. The existing routing strategies are in need of further improvement. Because of its lack of environmental adaptability, nodes consume energy quickly and have a high mortality rate. Therefore, aiming at the long-term stability of solar wireless sensor networks, this paper proposes a prediction algorithm based on classification and recurrent neural networks, and integrates the shadow judgement method from our previous research to correct the predicted values. Furthermore, we propose a routing optimization model that can flexibly adjust the target according to the solar intensity. The experimental results show that the prediction and routing scheduling algorithm can significantly improve the energy prediction accuracy (30–50%) and prolong the network lifetime (10–42%) in outdoor small sensor scenarios.
太阳能的高能量密度使无线传感器网络在室外监控应用中具有优势。然而,由于频繁的天气变化、建筑物和树木的遮挡等因素,长期稳定的监测是具有挑战性的。现有的研究通常采用两种技术来解决上述问题:(1)能量预测算法,(2)能量感知路由策略。然而,在实际部署中,频繁的天气变化会大大降低现有预测算法的准确性。当使用这些算法作为能量感知路由的支持时,网络生存期不理想。现有的路由策略需要进一步改进。由于缺乏环境适应性,节点能量消耗快,死亡率高。因此,针对太阳能无线传感器网络的长期稳定性,本文提出了一种基于分类和递归神经网络的预测算法,并结合前人研究的阴影判断方法对预测值进行校正。在此基础上,提出了一种可根据太阳强度灵活调整目标的路径优化模型。实验结果表明,在室外小传感器场景下,该预测和路由调度算法可以显著提高能量预测精度(30-50%),延长网络寿命(10-42%)。
{"title":"KEFSAR: A Solar-Aware Routing Strategy For Rechargeable IoT Based On High-Accuracy Prediction","authors":"Dongchao Ma, Dongmei Wang, Xiaofu Huang, Yuekun Hu, Li Ma","doi":"10.1093/comjnl/bxad074","DOIUrl":"https://doi.org/10.1093/comjnl/bxad074","url":null,"abstract":"Abstract The high energy density of solar energy gives wireless sensor networks advantages in outdoor monitoring applications. However, long-term stable monitoring is challenging due to frequent weather changes, shading by buildings and trees, etc. The existing research usually uses two technologies to solve the above problems: (1) the energy prediction algorithm, and (2) the energy-aware routing strategy. However, in an actual deployment, frequent weather changes can significantly reduce the accuracy of the existing prediction algorithms. When using the algorithms as the support for energy-aware routing, the network lifetime is less than ideal. The existing routing strategies are in need of further improvement. Because of its lack of environmental adaptability, nodes consume energy quickly and have a high mortality rate. Therefore, aiming at the long-term stability of solar wireless sensor networks, this paper proposes a prediction algorithm based on classification and recurrent neural networks, and integrates the shadow judgement method from our previous research to correct the predicted values. Furthermore, we propose a routing optimization model that can flexibly adjust the target according to the solar intensity. The experimental results show that the prediction and routing scheduling algorithm can significantly improve the energy prediction accuracy (30–50%) and prolong the network lifetime (10–42%) in outdoor small sensor scenarios.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134919155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Super Structure Fault-Tolerance Assessment of the Generalized Hypercube 广义超立方体的超结构容错性评估
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-07-29 DOI: 10.1093/comjnl/bxad072
Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang
Abstract Fault-tolerant performance of a network is the prerequisite and guarantee for the normal operation of a network, which is often characterized by connectivity. Let $H$ denote a connected subgraph of $G$ and $H^{*}$ denote the union of the set of all connected subgraphs of $H$ and the set of the trivial graph. Super $H$-connectivity (resp. super $H^{*}$-connectivity) satisfies the conditions of both super connectivity and $H$-structure connectivity (resp. $H$-substructure connectivity). These two kinds of new connectivity provide a new metric to measure the fault-tolerance of the network, that is, the super structure fault-tolerance. The generalized hypercube $G(m_{r}, m_{r-1},..., m_{1})$ is a universal topology of interconnection networks that contains other commonly used topologies and it has been applied in many data center networks because of its excellent qualities. In this paper, we research the super structure fault-tolerance of $G(m_{r}, m_{r-1},..., m_{1})$ by studying super $H$-connectivity $kappa ^{prime}(G|H)$ and super $H^{*}$-connectivity $kappa ^{prime}(G|H^{*})$ for $Hin {K_{1,M}, C_{3}, C_{4}, K_{4}}$.
网络的容错性能是网络正常运行的前提和保证,网络的正常运行往往以连通性为特征。设$H$表示$G$的连通子图,$H^{*}$表示$H$的所有连通子图的集合与平凡图的集合的并集。Super $H$-连接(响应)super $H^{*}$-connectivity)同时满足超级连通性和$H$-结构连通性的条件。H子结构美元连接)。这两种新的连通性提供了一种新的度量网络容错性的指标,即超结构容错性。广义超立方体$G(m_{r}, m_{r-1},…)m_{1})$是一种包含其他常用拓扑结构的互连网络的通用拓扑结构,由于其优异的性能已在许多数据中心网络中得到应用。本文研究了$G(m_{r}, m_{r-1},…, m_{1})通过研究超级H连接美元美元kappa ^ { '} (G | H)和超级美元H ^{*}连接美元kappa ^ { '} (G | H ^{*})为H美元在 {K_ {1, M}, C_ {3}, C_ {4}, K_{4} } $。
{"title":"Super Structure Fault-Tolerance Assessment of the Generalized Hypercube","authors":"Chang Shu, Yan Wang, Jianxi Fan, Guijuan Wang","doi":"10.1093/comjnl/bxad072","DOIUrl":"https://doi.org/10.1093/comjnl/bxad072","url":null,"abstract":"Abstract Fault-tolerant performance of a network is the prerequisite and guarantee for the normal operation of a network, which is often characterized by connectivity. Let $H$ denote a connected subgraph of $G$ and $H^{*}$ denote the union of the set of all connected subgraphs of $H$ and the set of the trivial graph. Super $H$-connectivity (resp. super $H^{*}$-connectivity) satisfies the conditions of both super connectivity and $H$-structure connectivity (resp. $H$-substructure connectivity). These two kinds of new connectivity provide a new metric to measure the fault-tolerance of the network, that is, the super structure fault-tolerance. The generalized hypercube $G(m_{r}, m_{r-1},..., m_{1})$ is a universal topology of interconnection networks that contains other commonly used topologies and it has been applied in many data center networks because of its excellent qualities. In this paper, we research the super structure fault-tolerance of $G(m_{r}, m_{r-1},..., m_{1})$ by studying super $H$-connectivity $kappa ^{prime}(G|H)$ and super $H^{*}$-connectivity $kappa ^{prime}(G|H^{*})$ for $Hin {K_{1,M}, C_{3}, C_{4}, K_{4}}$.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134919156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric 将基于区块链的应用程序从以太坊迁移到超级账本结构的工具箱
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-16 DOI: 10.1093/comjnl/bxad061
Zhonghao Zhai, Subin Shen, Yanqin Mao
Abstract The low transaction capacity, high transaction cost and long-term privacy concerns of the current Ethereum platform are notorious. Developers are seeking alternative blockchain platforms to migrate their blockchain-based applications to reduce their applications’ use-cost and improve their applications’ user experience. The Hyperledger Fabric (HLF) platform with resiliency, flexibility, scalability and confidentiality is preferred for developers to migrate their Ethereum blockchain-based applications. However, it is laborious for developers to migrate blockchain-based applications from the Ethereum platform to the HLF platform. In this paper, we first propose a complete and secure migration solution to ease the migration process. The main idea of our solution is to design a toolbox to help developers automatically eliminate the adverse effects that the differences between Ethereum and HLF may bring to the migrated application. Developers with the toolbox can migrate the application with little time and minimal modification. It is theoretically proved that the migrated application with the toolbox is secure. Besides, a prototype of the toolbox is implemented. The extensive experiments demonstrate that the time for the migration process is acceptable, and the toolbox has little impact on the migrated application’s performance.
当前以太坊平台的低交易容量、高交易成本和长期隐私问题是众所周知的。开发人员正在寻求替代区块链平台来迁移基于区块链的应用程序,以降低应用程序的使用成本并改善应用程序的用户体验。Hyperledger Fabric (HLF)平台具有弹性、灵活性、可扩展性和保密性,是开发人员迁移其基于以太坊区块链的应用程序的首选。然而,对于开发人员来说,将基于区块链的应用程序从以太坊平台迁移到HLF平台是很费力的。在本文中,我们首先提出了一个完整和安全的迁移解决方案,以简化迁移过程。我们的解决方案的主要思想是设计一个工具箱来帮助开发人员自动消除以太坊和HLF之间的差异可能给迁移的应用程序带来的不利影响。使用该工具箱的开发人员可以用很少的时间和最少的修改来迁移应用程序。从理论上证明了使用工具箱迁移的应用程序是安全的。此外,还实现了该工具箱的原型。大量的实验表明,迁移过程的时间是可以接受的,并且工具箱对迁移的应用程序的性能影响很小。
{"title":"A Toolbox for Migrating the Blockchain-Based Application From Ethereum to Hyperledger Fabric","authors":"Zhonghao Zhai, Subin Shen, Yanqin Mao","doi":"10.1093/comjnl/bxad061","DOIUrl":"https://doi.org/10.1093/comjnl/bxad061","url":null,"abstract":"Abstract The low transaction capacity, high transaction cost and long-term privacy concerns of the current Ethereum platform are notorious. Developers are seeking alternative blockchain platforms to migrate their blockchain-based applications to reduce their applications’ use-cost and improve their applications’ user experience. The Hyperledger Fabric (HLF) platform with resiliency, flexibility, scalability and confidentiality is preferred for developers to migrate their Ethereum blockchain-based applications. However, it is laborious for developers to migrate blockchain-based applications from the Ethereum platform to the HLF platform. In this paper, we first propose a complete and secure migration solution to ease the migration process. The main idea of our solution is to design a toolbox to help developers automatically eliminate the adverse effects that the differences between Ethereum and HLF may bring to the migrated application. Developers with the toolbox can migrate the application with little time and minimal modification. It is theoretically proved that the migrated application with the toolbox is secure. Besides, a prototype of the toolbox is implemented. The extensive experiments demonstrate that the time for the migration process is acceptable, and the toolbox has little impact on the migrated application’s performance.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135525799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features 修正:局部融合视觉特征的多模态生物识别的元启发式人工神经网络框架
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-06-02 DOI: 10.1093/comjnl/bxad064
{"title":"Correction to: Metaheuristic-Enabled Artificial Neural Network Framework For Multimodal Biometric Recognition With Local Fusion Visual Features","authors":"","doi":"10.1093/comjnl/bxad064","DOIUrl":"https://doi.org/10.1093/comjnl/bxad064","url":null,"abstract":"","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136041498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
2-Layer k-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth 2层k-平面图密度,交叉引理,关系和路径宽度
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-21 DOI: 10.1093/comjnl/bxad038
Patrizio Angelini, Giordano Da Lozzo, Henry Förster, Thomas Schneck
Abstract The $2$-layer drawing model is a well-established paradigm to visualize bipartite graphs where vertices of the two parts lie on two horizontal lines and edges lie between these lines. Several beyond-planar graph classes have been studied under this model. Surprisingly, however, the fundamental class of $k$-planar graphs has been considered only for $k=1$ in this context. We provide several contributions that address this gap in the literature. First, we show tight density bounds for the classes of $2$-layer $k$-planar graphs with $kin {2,3,4,5}$. Based on these results, we provide a Crossing Lemma for $2$-layer $k$-planar graphs, which then implies a general density bound for $2$-layer $k$-planar graphs. We prove this bound to be almost optimal with a corresponding lower bound construction. Finally, we study relationships between $k$-planarity and $h$-quasiplanarity in the $2$-layer model and show that $2$-layer $k$-planar graphs have pathwidth at most $k+1$ while there are also $2$-layer $k$-planar graphs with pathwidth at least $(k+3)/2$.
$2$层绘图模型是一种成熟的二部图可视化范例,其中两个部分的顶点位于两条水平线上,边缘位于两条水平线之间。在此模型下,研究了几种超越平面的图类。然而,令人惊讶的是,在这种情况下,k -平面图的基本类只在k=1时才被考虑。我们提供了几个贡献,以解决这一差距的文献。首先,我们展示了$k in {2,3,4,5}$的$2$-层$k$-平面图类的紧密密度界。基于这些结果,我们提供了一个2层k图的交叉引理,从而暗示了2层k图的一般密度界。我们用相应的下界构造证明了这个界是几乎最优的。最后,我们研究了$k$-平面性和$h$-拟平面性在$2$层模型中的关系,并证明$2$层$k$-平面图的路径宽度最多为$k+1$,同时也存在$2$层$k$-平面图的路径宽度至少为$(k+3)/2$。
{"title":"2-Layer <i>k</i>-Planar Graphs Density, Crossing Lemma, Relationships And Pathwidth","authors":"Patrizio Angelini, Giordano Da Lozzo, Henry Förster, Thomas Schneck","doi":"10.1093/comjnl/bxad038","DOIUrl":"https://doi.org/10.1093/comjnl/bxad038","url":null,"abstract":"Abstract The $2$-layer drawing model is a well-established paradigm to visualize bipartite graphs where vertices of the two parts lie on two horizontal lines and edges lie between these lines. Several beyond-planar graph classes have been studied under this model. Surprisingly, however, the fundamental class of $k$-planar graphs has been considered only for $k=1$ in this context. We provide several contributions that address this gap in the literature. First, we show tight density bounds for the classes of $2$-layer $k$-planar graphs with $kin {2,3,4,5}$. Based on these results, we provide a Crossing Lemma for $2$-layer $k$-planar graphs, which then implies a general density bound for $2$-layer $k$-planar graphs. We prove this bound to be almost optimal with a corresponding lower bound construction. Finally, we study relationships between $k$-planarity and $h$-quasiplanarity in the $2$-layer model and show that $2$-layer $k$-planar graphs have pathwidth at most $k+1$ while there are also $2$-layer $k$-planar graphs with pathwidth at least $(k+3)/2$.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135463997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computer Journal
全部 Am. J. Phys. Anthropol. Energy Ecol Environ ACTA GEOL POL Ecol. Res. Int. J. Disaster Risk Reduct. 2012 38th IEEE Photovoltaic Specialists Conference INFRARED PHYS TECHN Am. J. Sci. GROUNDWATER Acta Geophys. ENG SANIT AMBIENT EUREKA: Physics and Engineering Carbon Balance Manage. Front. Phys. Ecol. Processes Sediment. Geol. ENVIRON GEOL Toung Pao Int. J. Geomech. Communications Earth & Environment Prog. Oceanogr. 2012 9th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology GEOL BELG ACTA MEDICA PORT Global Biogeochem. Cycles EUR PHYS J-APPL PHYS Int. J. Astrobiol. ACAD EMERG MED Environment and Natural Resources Journal Essentials of Polymer Flooding Technique Gaceta Medica de Caracas Polar Sci. SCI CHINA EARTH SCI 2011 6th International Microsystems, Packaging, Assembly and Circuits Technology Conference (IMPACT) ACTA NEUROL BELG Revista Chilena de Obstetricia y Ginecologia Toxicology and Environmental Health Sciences EUR RESPIR REV BIOGEOSCIENCES [Rinsho ketsueki] The Japanese journal of clinical hematology Commun. Theor. Phys. Journal of Wine Research Revista Colombiana de Obstetricia y Ginecologia Tribhuvan University Journal of Microbiology ACTA ONCOL 2013 IEEE International Conference on Computer Vision Tsvetnye Metally ARCHAEOMETRY ACTA GEOL SIN-ENGL ATMOSPHERE-BASEL Acta Oceanolog. Sin. Basin Res. Atmos. Meas. Tech. Geochim. Cosmochim. Acta Geostand. Geoanal. Res. AAPG Bull. Adv. Atmos. Sci. Am. Mineral. Chin. Phys. C J. Atmos. Chem. Adv. Meteorol. IZV-PHYS SOLID EART+ ECOTOXICOLOGY Clean-Soil Air Water Org. Geochem. Can. J. Phys. Atmos. Chem. Phys. GEOLOGY Acta Geochimica Ecol. Monogr. Appl. Geochem. Annu. Rev. Earth Planet. Sci. Environmental Progress ACTA PETROL SIN Aust. J. Earth Sci. Energy Environ. ECOL RESTOR Big Earth Data J. Hydrol. CRIT REV ENV SCI TEC Int. J. Biometeorol. Contrib. Mineral. Petrol. Ecol. Indic. Int. J. Earth Sci. ERN: Other Macroeconomics: Aggregative Models (Topic) Laser Phys. Geochem. Trans. Environ. Eng. Manage. J. Clean Technol. Environ. Policy 非金属矿 Atmos. Res. Ann. Glaciol. Eur. Rev. Med. Pharmacol. Sci. Aquat. Geochem. Appl. Clay Sci. Round Table ARCT ANTARCT ALP RES Astrophys. J. Suppl. Ser. Ecol. Eng. MNRAS
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1