首页 > 最新文献

JOURNAL OF INTERCONNECTION NETWORKS最新文献

英文 中文
Bounds of Two Toughnesses and Binding Numbers for Star Factors 两种韧性的界限和星形因子的结合数
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-10 DOI: 10.1142/s0219265923500329
Yujia Gao, Zhen Ji, Xiaojie Sun, Qinghe Tong
For a set [Formula: see text] of connected graphs, a spanning subgraph [Formula: see text] of a graph [Formula: see text] is an [Formula: see text]-factor if every component of [Formula: see text] is isomorphic to some member of [Formula: see text]. In this paper, we give a criterion for the existence of tight toughness, isolated toughness and binding number bounds in a graph of a strong [Formula: see text]-star factor, [Formula: see text]-factor and [Formula: see text]-star factor. Moreover, we show that the bounds of the sufficient conditions are sharp.
对于一个连通图集[式:见文],如果[式:见文]的每个分量都与[式:见文]的某个成员同构,则[式:见文]的跨子图[式:见文]是[式:见文]-因子。本文给出了强[式:见文本]-星因子、[式:见文本]-因子和[式:见文本]-星因子图中存在紧韧度、孤立韧度和结合数边界的判据。此外,我们还证明了充分条件的边界是尖锐的。
{"title":"Bounds of Two Toughnesses and Binding Numbers for Star Factors","authors":"Yujia Gao, Zhen Ji, Xiaojie Sun, Qinghe Tong","doi":"10.1142/s0219265923500329","DOIUrl":"https://doi.org/10.1142/s0219265923500329","url":null,"abstract":"For a set [Formula: see text] of connected graphs, a spanning subgraph [Formula: see text] of a graph [Formula: see text] is an [Formula: see text]-factor if every component of [Formula: see text] is isomorphic to some member of [Formula: see text]. In this paper, we give a criterion for the existence of tight toughness, isolated toughness and binding number bounds in a graph of a strong [Formula: see text]-star factor, [Formula: see text]-factor and [Formula: see text]-star factor. Moreover, we show that the bounds of the sufficient conditions are sharp.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"64 3","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139441178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Local Metric Dimension of Graphs 论图形的局部度量维度
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-10 DOI: 10.1142/s0219265923500330
Chenxu Yang, Xingchao Deng, Jinxia Liang, Yuhu Liu
Let [Formula: see text] be a graph. A set [Formula: see text] is a local resolving set of [Formula: see text] if there exists [Formula: see text] such that [Formula: see text] for any [Formula: see text]. The local metric dimension [Formula: see text] of [Formula: see text] is the minimum cardinality of all the local resolving sets of [Formula: see text]. In this paper, we characterize the graphs with [Formula: see text]. Next, we obtain the Nordhaus–Gaddum-type results for local metric dimension. Finally, the local metric dimension of several graph classes is given.
设[公式:见文本]是一个图。如果存在[公式:见文本],使得任意[公式:见文本]的[公式:见文本]都是[公式:见文本]的局部解析集,那么集合[公式:见文本]就是[公式:见文本]的局部解析集。公式:见文本]的局部度量维度[公式:见文本]是[公式:见文本]所有局部解析集合的最小心数。在本文中,我们用[公式:见正文]来描述图的特征。接着,我们得到了关于局部度量维度的诺德豪斯-加登姆(Nordhaus-Gaddum)式结果。最后,我们给出了几类图的局部度量维度。
{"title":"On the Local Metric Dimension of Graphs","authors":"Chenxu Yang, Xingchao Deng, Jinxia Liang, Yuhu Liu","doi":"10.1142/s0219265923500330","DOIUrl":"https://doi.org/10.1142/s0219265923500330","url":null,"abstract":"Let [Formula: see text] be a graph. A set [Formula: see text] is a local resolving set of [Formula: see text] if there exists [Formula: see text] such that [Formula: see text] for any [Formula: see text]. The local metric dimension [Formula: see text] of [Formula: see text] is the minimum cardinality of all the local resolving sets of [Formula: see text]. In this paper, we characterize the graphs with [Formula: see text]. Next, we obtain the Nordhaus–Gaddum-type results for local metric dimension. Finally, the local metric dimension of several graph classes is given.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"1 2","pages":""},"PeriodicalIF":0.7,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139440348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some Existence Theorems on Star Factors 关于星形因子的一些存在定理
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-29 DOI: 10.1142/s0219265923500275
Xiumin Wang, Fengyun Ren, Dong He, Ao Tan
The [Formula: see text]-factor and [Formula: see text]-factor of a graph are a spanning subgraph whose each component is an element of [Formula: see text] and [Formula: see text], respectively, where [Formula: see text] is a special family of trees. In this paper, we obtain a sufficient condition in terms of tight toughness, isolated toughness and binding number bounds to guarantee the existence of a [Formula: see text]-factor and [Formula: see text]-factor for any graph.
图的[式:见文]因子和[式:见文]因子是一个跨子图,其每个分量分别是[式:见文]和[式:见文]的元素,其中[式:见文]是一个特殊的树族。本文从紧密韧度、孤立韧度和绑定数边界等方面得到了一个充分条件,以保证任何图都存在[式:见正文]因子和[式:见正文]因子。
{"title":"Some Existence Theorems on Star Factors","authors":"Xiumin Wang, Fengyun Ren, Dong He, Ao Tan","doi":"10.1142/s0219265923500275","DOIUrl":"https://doi.org/10.1142/s0219265923500275","url":null,"abstract":"The [Formula: see text]-factor and [Formula: see text]-factor of a graph are a spanning subgraph whose each component is an element of [Formula: see text] and [Formula: see text], respectively, where [Formula: see text] is a special family of trees. In this paper, we obtain a sufficient condition in terms of tight toughness, isolated toughness and binding number bounds to guarantee the existence of a [Formula: see text]-factor and [Formula: see text]-factor for any graph.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"55 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139214630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Krill Herd and Feed Forward Optimization System-Based Routing Protocol for IoT-MANET Environment 面向物联网-MANET 环境的基于克里尔群和前馈优化系统的路由协议
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-27 DOI: 10.1142/s0219265923500305
S. Sugumaran, V. Sivasankaran, M. G. Chitra
The Internet of Things (IoT) is a developing technology in the world of communication and embedded systems. The IoT consists of a wireless sensor network with Internet service. The data size of the sensor node is small, but the routing of the data and energy consumption are important issues that need to be advocated. The Mobile Adhoc Network (MANET) plays a very important role in IoT services. In MANET, nodes are moving within the network. So, routes are created dynamically on demand and do not have any centralized units. The route optimization method addresses issues like selecting the best routes in terms of overhead, loop free, traffic control, balancing, throughput, route maintenance, and so on. In this paper, IoT routes are created between sensors to sink through MANET nodes with WSN routing ideology. The Krill Herd and Feed Forward Optimization (KH-FFO)-based method discovers the routes. The Krill herd algorithm clusters the network. This method increases network speed and reduces energy waste. Feed-forward optimization involves learning all the nodes in the network and identifying the shortest and most energy-efficient route from source to sink. The overall performance of the KH-FFO protocol has improved the network’s capacity, reduced packet loss, and increased the energy utilization of the nodes in the network. The ns-3 simulation for KH-FFO is tested in different node densities and observed energy utilization is increased by 28%, network life is increased by 7%, Packet delivery ratio improved by 7.5%, the End-to-End delay improved by 31% and the Throughput is 3%. These metrices are better than the existing works in the network.
物联网(IoT)是通信和嵌入式系统领域的一项发展中技术。物联网由带有互联网服务的无线传感器网络组成。传感器节点的数据量很小,但数据的路由和能耗是需要提倡的重要问题。移动无线网络(MANET)在物联网服务中扮演着非常重要的角色。在 MANET 中,节点在网络内移动。因此,路由是按需动态创建的,没有任何集中单位。路由优化方法要解决的问题包括在开销、无环路、流量控制、平衡、吞吐量、路由维护等方面选择最佳路由。本文利用 WSN 路由思想,通过 MANET 节点在传感器与水槽之间创建物联网路由。基于克里尔群和前馈优化(KH-FFO)的方法可以发现路由。Krill herd 算法对网络进行聚类。这种方法提高了网络速度,减少了能源浪费。前馈优化涉及学习网络中的所有节点,并确定从源到汇的最短、最节能的路径。KH-FFO 协议的整体性能提高了网络的容量,减少了数据包丢失,并提高了网络中节点的能量利用率。KH-FFO 的 ns-3 仿真在不同节点密度下进行了测试,观察到能量利用率提高了 28%,网络寿命提高了 7%,数据包传送率提高了 7.5%,端到端延迟提高了 31%,吞吐量提高了 3%。这些指标都优于现有的网络工程。
{"title":"Krill Herd and Feed Forward Optimization System-Based Routing Protocol for IoT-MANET Environment","authors":"S. Sugumaran, V. Sivasankaran, M. G. Chitra","doi":"10.1142/s0219265923500305","DOIUrl":"https://doi.org/10.1142/s0219265923500305","url":null,"abstract":"The Internet of Things (IoT) is a developing technology in the world of communication and embedded systems. The IoT consists of a wireless sensor network with Internet service. The data size of the sensor node is small, but the routing of the data and energy consumption are important issues that need to be advocated. The Mobile Adhoc Network (MANET) plays a very important role in IoT services. In MANET, nodes are moving within the network. So, routes are created dynamically on demand and do not have any centralized units. The route optimization method addresses issues like selecting the best routes in terms of overhead, loop free, traffic control, balancing, throughput, route maintenance, and so on. In this paper, IoT routes are created between sensors to sink through MANET nodes with WSN routing ideology. The Krill Herd and Feed Forward Optimization (KH-FFO)-based method discovers the routes. The Krill herd algorithm clusters the network. This method increases network speed and reduces energy waste. Feed-forward optimization involves learning all the nodes in the network and identifying the shortest and most energy-efficient route from source to sink. The overall performance of the KH-FFO protocol has improved the network’s capacity, reduced packet loss, and increased the energy utilization of the nodes in the network. The ns-3 simulation for KH-FFO is tested in different node densities and observed energy utilization is increased by 28%, network life is increased by 7%, Packet delivery ratio improved by 7.5%, the End-to-End delay improved by 31% and the Throughput is 3%. These metrices are better than the existing works in the network.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"52 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139230136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedding Knödel Graph into Cube-like Architectures: Dilation Optimization and Wirelength Analysis 将克诺德尔图嵌入立方体结构:扩张优化和线长分析
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-24 DOI: 10.1142/s0219265923500317
Remi Mariam Reji, R. Sundara Rajan, T. M. Rajalaxmi
An important tool for the execution of parallel algorithms and the simulation of interconnection networks is graph embedding. The quality of an embedding can be assessed using some cost metrics. The dilation and wirelength are the commonly used parameters. The Knödel graph [Formula: see text] is a minimum linear gossip network and has minimum broadcasting. It has [Formula: see text] vertices, [Formula: see text] edges, where [Formula: see text] is even, and [Formula: see text]log[Formula: see text]. In this study, we solve the dilation problem of embedding the Knödel graph into certain cube-like architectures such as hypercube, folded hypercube, and augmented cube. In [G. Fertin, A. Raspaud, A survey on Knödel graphs, Discrete Applied Mathematics 137 (2004) 173–195], it is proved that the dilation of embedding the Knödel graph [Formula: see text] into the hypercube [Formula: see text] is at most [Formula: see text]. In this study, we obtain an improved upper bound for dilation of embedding the Knödel graph into the hypercube and it is equal to [Formula: see text]. Also, we calculate the wirelength of embedding the Knödel graph into the above-said cube-like architectures using dilation.
图嵌入是执行并行算法和模拟互连网络的重要工具。嵌入的质量可以通过一些成本指标来评估。扩张和线长是常用参数。克诺德尔图[计算公式:见正文]是最小线性八卦网络,具有最小广播。它有[公式:见正文]顶点、[公式:见正文]边(其中[公式:见正文]为偶数)和[公式:见正文]log[公式:见正文]。在这项研究中,我们解决了将克诺德尔图嵌入某些立方体结构(如超立方体、折叠超立方体和增强立方体)的扩张问题。在[G. Fertin, A. Raspaud, A survey on Knödel graphs, Discrete Applied Mathematics 137 (2004) 173-195] 中,证明了将 Knödel 图[公式:见正文]嵌入超立方体[公式:见正文]的扩张量至多为[公式:见正文]。在本研究中,我们得到了将克诺德尔图嵌入超立方体的扩张的改进上界,它等于[式:见正文]。此外,我们还计算了利用扩张法将克诺德尔图嵌入上述立方体架构的线长。
{"title":"Embedding Knödel Graph into Cube-like Architectures: Dilation Optimization and Wirelength Analysis","authors":"Remi Mariam Reji, R. Sundara Rajan, T. M. Rajalaxmi","doi":"10.1142/s0219265923500317","DOIUrl":"https://doi.org/10.1142/s0219265923500317","url":null,"abstract":"An important tool for the execution of parallel algorithms and the simulation of interconnection networks is graph embedding. The quality of an embedding can be assessed using some cost metrics. The dilation and wirelength are the commonly used parameters. The Knödel graph [Formula: see text] is a minimum linear gossip network and has minimum broadcasting. It has [Formula: see text] vertices, [Formula: see text] edges, where [Formula: see text] is even, and [Formula: see text]log[Formula: see text]. In this study, we solve the dilation problem of embedding the Knödel graph into certain cube-like architectures such as hypercube, folded hypercube, and augmented cube. In [G. Fertin, A. Raspaud, A survey on Knödel graphs, Discrete Applied Mathematics 137 (2004) 173–195], it is proved that the dilation of embedding the Knödel graph [Formula: see text] into the hypercube [Formula: see text] is at most [Formula: see text]. In this study, we obtain an improved upper bound for dilation of embedding the Knödel graph into the hypercube and it is equal to [Formula: see text]. Also, we calculate the wirelength of embedding the Knödel graph into the above-said cube-like architectures using dilation.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"27 10","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139240577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Incentive Routing Protocol with Virtual Projection for Mobile Packet Forwarding Nodes in Wireless Sensor Networks 为无线传感器网络中的移动数据包转发节点设计的带虚拟投影的新型激励路由协议
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-18 DOI: 10.1142/s0219265923500287
L. Niranjan, M. Manoj Priyatham
The size of the Packet Forwarding Nodes (PFNs) is becoming very small as the technology advances in Wireless Sensor Networks (WSNs). The node has an additional parameter with low energy levels. The PFNs are distributed in a square cross-sectional area with each node acting as a Sensing Point (SP) that can be used for various kinds of applications like temperature, atmospheric humidity, acoustic, and pressure measurements. The packet is divided into several fragments where each fragment is considered as fixed or variable length. Each of these packets is sent over multiple PFNs toward the data center using PFNs. The selection of PFNs in the path is picked based on the trust level. In the network even special PFNs are placed which are responsible to deliver the packets toward the data center without losing the data during the transmission. The selection of special PFNs is done by computing the meeting probability, remaining energy computation, computation of data weight, and security value computation. The proposed Incentive Routing Protocol with Virtual Projection (IRPVP) method is compared with the conventional approaches concerning the parameters like delay, link count, resource energy, healthy PFNs, non-healthy PFNs, health ratio computation, remaining energy, control to data ratio, and balancing factor. The simulation outcomes show that the performance of the proposed IRPVP algorithm is better than the other conventional algorithms.
随着无线传感器网络(WSN)技术的发展,数据包转发节点(PFN)的体积越来越小。节点还具有低能耗的附加参数。PFN 分布在一个正方形横截面上,每个节点都是一个传感点 (SP),可用于温度、大气湿度、声学和压力测量等各种应用。数据包被分为多个片段,每个片段的长度可固定或可变。每个数据包通过多个 PFN 向数据中心发送。路径中 PFN 的选择基于信任级别。网络中甚至会放置特殊的 PFN,负责将数据包发送到数据中心,而不会在传输过程中丢失数据。特殊 PFN 的选择是通过计算相遇概率、剩余能量计算、数据权重计算和安全值计算来完成的。在延迟、链路数、资源能量、健康 PFN、非健康 PFN、健康比计算、剩余能量、控制与数据比和平衡因子等参数方面,将所提出的虚拟投影激励路由协议(IRPVP)方法与传统方法进行了比较。仿真结果表明,提议的 IRPVP 算法的性能优于其他传统算法。
{"title":"A Novel Incentive Routing Protocol with Virtual Projection for Mobile Packet Forwarding Nodes in Wireless Sensor Networks","authors":"L. Niranjan, M. Manoj Priyatham","doi":"10.1142/s0219265923500287","DOIUrl":"https://doi.org/10.1142/s0219265923500287","url":null,"abstract":"The size of the Packet Forwarding Nodes (PFNs) is becoming very small as the technology advances in Wireless Sensor Networks (WSNs). The node has an additional parameter with low energy levels. The PFNs are distributed in a square cross-sectional area with each node acting as a Sensing Point (SP) that can be used for various kinds of applications like temperature, atmospheric humidity, acoustic, and pressure measurements. The packet is divided into several fragments where each fragment is considered as fixed or variable length. Each of these packets is sent over multiple PFNs toward the data center using PFNs. The selection of PFNs in the path is picked based on the trust level. In the network even special PFNs are placed which are responsible to deliver the packets toward the data center without losing the data during the transmission. The selection of special PFNs is done by computing the meeting probability, remaining energy computation, computation of data weight, and security value computation. The proposed Incentive Routing Protocol with Virtual Projection (IRPVP) method is compared with the conventional approaches concerning the parameters like delay, link count, resource energy, healthy PFNs, non-healthy PFNs, health ratio computation, remaining energy, control to data ratio, and balancing factor. The simulation outcomes show that the performance of the proposed IRPVP algorithm is better than the other conventional algorithms.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139261722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Component Edge Connectivity and Extra Edge Connectivity of Bubble-Sort Star Graphs 冒泡排序星图的分量边连通性和额外边连通性
Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-10 DOI: 10.1142/s0219265923500299
Xiaohui Hua, Yonghao Lai
Connectivity is an important parameter for evaluating the reliability and stability of an interconnection network. Based on the edge connectivity, more refined connectivities have been proposed. The [Formula: see text]-component edge connectivity [Formula: see text] and the [Formula: see text]-extra edge connectivity [Formula: see text] are two important parameters to assess the robustness of an interconnection network, which received attention extensively. In this paper, we determine the [Formula: see text]-component edge connectivity and the [Formula: see text]-extra edge connectivity of bubble-sort star graphs [Formula: see text]. For [Formula: see text]-component edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text]. For [Formula: see text]-extra edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text].
连通性是评价互联网络可靠性和稳定性的重要参数。在边缘连通性的基础上,提出了更精细的连通性。[公式:见文]-组件边缘连通性[公式:见文]和[公式:见文]-额外边缘连通性[公式:见文]是评估互连网络鲁棒性的两个重要参数,受到了广泛关注。在本文中,我们确定了气泡排序星图的[公式:见文]-分量边连通性和[公式:见文]-额外边连通性。对于[公式:见文]-组件边缘连通性,我们证明[公式:见文],[公式:见文]和[公式:见文]对于[公式:见文]。对于[公式:见文]-额外边缘连接,我们证明[公式:见文],[公式:见文]和[公式:见文]对于[公式:见文]。
{"title":"Component Edge Connectivity and Extra Edge Connectivity of Bubble-Sort Star Graphs","authors":"Xiaohui Hua, Yonghao Lai","doi":"10.1142/s0219265923500299","DOIUrl":"https://doi.org/10.1142/s0219265923500299","url":null,"abstract":"Connectivity is an important parameter for evaluating the reliability and stability of an interconnection network. Based on the edge connectivity, more refined connectivities have been proposed. The [Formula: see text]-component edge connectivity [Formula: see text] and the [Formula: see text]-extra edge connectivity [Formula: see text] are two important parameters to assess the robustness of an interconnection network, which received attention extensively. In this paper, we determine the [Formula: see text]-component edge connectivity and the [Formula: see text]-extra edge connectivity of bubble-sort star graphs [Formula: see text]. For [Formula: see text]-component edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text]. For [Formula: see text]-extra edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text].","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":" 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135190962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Model-Based Intrusion Detection in Wireless Sensor Network on the Basis of Risk and Link Quality 基于风险和链路质量的无线传感器网络混合模型入侵检测
Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-08 DOI: 10.1142/s0219265923500214
Ranjeet B. Kagade, N. Vijayaraj
Nowadays, Wireless Sensor Networks (WSN) face more security threats due to the increased service of data transmission at high speed in almost all applications. The security of the network must be ensured by identifying abnormal traffic and current emerging threats. The most promising model for safeguarding the core network from outside attacks is Intrusion Detection Systems (IDS). This work focuses on the introduction of clustering-based intrusion detection in WSN. Initially, clustering takes place, where the nodes are grouped under certain constraints via selecting the optimal Cluster Head (CH). The considered constraints are energy, delay, distance, risk, and link quality. This optimal selection takes place by a new hybrid optimization algorithm termed as Truncate Combined Bald Eagle Optimization (TCBEO) algorithm. The subsequent process is intrusion detection, where a hybrid detection model combining a Convolutional Neural Network (CNN) & Bi-directional Gated Recurrent unit (Bi-GRU) is employed, which is trained with features like improved entropy and correlation taking into consideration of constraints like energy and distance, respectively. Eventually, the suggested work’s effectiveness is affirmed against existing techniques using various performance metrics.
目前,无线传感器网络(WSN)面临着越来越多的安全威胁,因为它在几乎所有的应用中都需要高速传输数据。通过识别异常流量和当前出现的威胁,保证网络的安全。保护核心网络免受外部攻击最有前途的模型是入侵检测系统(IDS)。本文重点介绍了WSN中基于聚类的入侵检测方法。最初,集群发生,节点通过选择最优簇头(CH)在一定的约束下分组。考虑的约束条件包括能量、延迟、距离、风险和链路质量。这种优化选择是通过一种新的混合优化算法进行的,称为截断组合秃鹰优化(TCBEO)算法。接下来的过程是入侵检测,其中结合卷积神经网络(CNN)的混合检测模型;采用双向门控循环单元(Bi-directional Gated Recurrent unit, Bi-GRU),该单元分别考虑能量约束和距离约束,使用改进熵和相关性等特征进行训练。最后,建议的工作的有效性通过使用各种性能度量来确定。
{"title":"Hybrid Model-Based Intrusion Detection in Wireless Sensor Network on the Basis of Risk and Link Quality","authors":"Ranjeet B. Kagade, N. Vijayaraj","doi":"10.1142/s0219265923500214","DOIUrl":"https://doi.org/10.1142/s0219265923500214","url":null,"abstract":"Nowadays, Wireless Sensor Networks (WSN) face more security threats due to the increased service of data transmission at high speed in almost all applications. The security of the network must be ensured by identifying abnormal traffic and current emerging threats. The most promising model for safeguarding the core network from outside attacks is Intrusion Detection Systems (IDS). This work focuses on the introduction of clustering-based intrusion detection in WSN. Initially, clustering takes place, where the nodes are grouped under certain constraints via selecting the optimal Cluster Head (CH). The considered constraints are energy, delay, distance, risk, and link quality. This optimal selection takes place by a new hybrid optimization algorithm termed as Truncate Combined Bald Eagle Optimization (TCBEO) algorithm. The subsequent process is intrusion detection, where a hybrid detection model combining a Convolutional Neural Network (CNN) & Bi-directional Gated Recurrent unit (Bi-GRU) is employed, which is trained with features like improved entropy and correlation taking into consideration of constraints like energy and distance, respectively. Eventually, the suggested work’s effectiveness is affirmed against existing techniques using various performance metrics.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"8 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135392001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Configuration and Self-Healing Framework Using Extreme Gradient Boosting (XGBoost) Classifier for IoT-WSN 基于极限梯度增强(XGBoost)分类器的IoT-WSN自配置自修复框架
Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-03 DOI: 10.1142/s0219265923500226
M. Ganesh Raja, S. Jeyalaksshmi
In most Internet of Things (IoT) systems, Quality of service (QoS) must be confirmed with respect to the requirement of implementation domain. The dynamic nature of the IoT surroundings shapes it to complicate the fulfilment of these commitments. A wide range of unpredictable events endanger the quality of service. While execution the self-adaptive schemes handle with system’s unpredictable. In IoT-based Wireless Sensor Networks (WSNs), the significant self-management objectives are self-configuration (SC) and self-healing (SH). In this paper, Self-Configuration and Self-healing Framework using an extreme gradient boosting (XGBoost) Classifier are proposed. In this framework, the IoT traffic classes are categorized as several types under XGBoost classifier. In SC phase, the IoT devices are self-configured by allocating various transmission slots, contention access period (CAPs) on the basis of its categories with priorities. In SH phase, the source node cardinally establishes a confined route retrieval method if the residual power in-between node is truncated or the node has displaced far away. The proposed framework is executed in NS-2 and the results exhibit that the proposed framework has higher packet delivery ratio with reduced packet drops and computational cost. Therefore, the proposed approach has attained 24.7%, 28.9%, 12.75% higher PDR, and 16.8%, 19.87%, and 13.7% higher residual energy than the existing methods like Self-Healing and Seamless Connectivity using Kalman Filter among IoT Networks (SH-SC-KF-IoT), Provenance aware run-time verification mechanism for self-healing IoT (PA-RVM-SH-IoT), and Fully Anonymous Routing Protocol and Self-healing Capacity in Unbalanced Sensor Networks (FARP-SC-USN) methods, respectively.
在大多数物联网(IoT)系统中,必须根据实现域的要求确定服务质量(QoS)。物联网环境的动态特性使这些承诺的实现变得复杂。各种不可预测的事件危及服务质量。自适应方案在执行过程中处理系统的不可预测性。在基于物联网的无线传感器网络(WSNs)中,重要的自我管理目标是自配置(SC)和自修复(SH)。本文提出了一种基于极限梯度提升(XGBoost)分类器的自配置和自修复框架。在这个框架中,物联网流量类在XGBoost分类器下被分类为几种类型。在SC阶段,物联网设备根据其类别和优先级分配各种传输时隙、争用访问周期(CAPs)进行自配置。在SH阶段,如果中间节点的剩余功率被截断或节点位移较远,源节点基本建立受限路由检索方法。在NS-2中执行了该框架,结果表明该框架具有更高的分组传输率,减少了丢包和计算成本。因此,与现有方法相比,该方法的PDR分别提高了24.7%、28.9%、12.75%,剩余能量分别提高了16.8%、19.87%和13.7%,这些方法包括物联网网络间使用卡尔曼滤波的自愈和无缝连接(SH-SC-KF-IoT),物联网自愈的来源感知运行时验证机制(PA-RVM-SH-IoT),以及不平衡传感器网络中的完全匿名路由协议和自愈能力(FARP-SC-USN)方法。
{"title":"Self-Configuration and Self-Healing Framework Using Extreme Gradient Boosting (XGBoost) Classifier for IoT-WSN","authors":"M. Ganesh Raja, S. Jeyalaksshmi","doi":"10.1142/s0219265923500226","DOIUrl":"https://doi.org/10.1142/s0219265923500226","url":null,"abstract":"In most Internet of Things (IoT) systems, Quality of service (QoS) must be confirmed with respect to the requirement of implementation domain. The dynamic nature of the IoT surroundings shapes it to complicate the fulfilment of these commitments. A wide range of unpredictable events endanger the quality of service. While execution the self-adaptive schemes handle with system’s unpredictable. In IoT-based Wireless Sensor Networks (WSNs), the significant self-management objectives are self-configuration (SC) and self-healing (SH). In this paper, Self-Configuration and Self-healing Framework using an extreme gradient boosting (XGBoost) Classifier are proposed. In this framework, the IoT traffic classes are categorized as several types under XGBoost classifier. In SC phase, the IoT devices are self-configured by allocating various transmission slots, contention access period (CAPs) on the basis of its categories with priorities. In SH phase, the source node cardinally establishes a confined route retrieval method if the residual power in-between node is truncated or the node has displaced far away. The proposed framework is executed in NS-2 and the results exhibit that the proposed framework has higher packet delivery ratio with reduced packet drops and computational cost. Therefore, the proposed approach has attained 24.7%, 28.9%, 12.75% higher PDR, and 16.8%, 19.87%, and 13.7% higher residual energy than the existing methods like Self-Healing and Seamless Connectivity using Kalman Filter among IoT Networks (SH-SC-KF-IoT), Provenance aware run-time verification mechanism for self-healing IoT (PA-RVM-SH-IoT), and Fully Anonymous Routing Protocol and Self-healing Capacity in Unbalanced Sensor Networks (FARP-SC-USN) methods, respectively.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"27 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135873445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Local Metric Dimension of Line Graphs 关于线形图的局部度量维数
Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-10-31 DOI: 10.1142/s0219265923500263
Chenxu Yang, Xingchao Deng, Wen Li
Let [Formula: see text] be a graph. For any [Formula: see text], if there exists [Formula: see text] such that [Formula: see text], we say that [Formula: see text] resolving [Formula: see text]. A set [Formula: see text] of vertices in [Formula: see text] is a local resolving set of [Formula: see text] if there exists [Formula: see text] such that [Formula: see text] for any [Formula: see text]. The local metric dimension [Formula: see text] of [Formula: see text] is the minimum cardinality of all the local resolving sets of [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text]. Furthermore, we construct a graph [Formula: see text] such that [Formula: see text] and [Formula: see text]. Finally, we investigate the local metric dimension of several special line graphs.
设[公式:见文本]为图形。对于任何[公式:见文],如果存在[公式:见文]使得[公式:见文],我们说[公式:见文]消解[公式:见文]。如果存在[公式:见文本]使得[公式:见文本]对于任何[公式:见文本],[公式:见文本]的顶点集[公式:见文本]是[公式:见文本]的局部解析集。[公式:见文本]的局部度量维度[公式:见文本]是[公式:见文本]的所有局部解析集的最小基数。本文研究了[公式:见文]与[公式:见文]之间的关系。此外,我们构造了一个图[公式:见文],使得[公式:见文]和[公式:见文]。最后,我们研究了几种特殊线形图的局部度量维数。
{"title":"On the Local Metric Dimension of Line Graphs","authors":"Chenxu Yang, Xingchao Deng, Wen Li","doi":"10.1142/s0219265923500263","DOIUrl":"https://doi.org/10.1142/s0219265923500263","url":null,"abstract":"Let [Formula: see text] be a graph. For any [Formula: see text], if there exists [Formula: see text] such that [Formula: see text], we say that [Formula: see text] resolving [Formula: see text]. A set [Formula: see text] of vertices in [Formula: see text] is a local resolving set of [Formula: see text] if there exists [Formula: see text] such that [Formula: see text] for any [Formula: see text]. The local metric dimension [Formula: see text] of [Formula: see text] is the minimum cardinality of all the local resolving sets of [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text]. Furthermore, we construct a graph [Formula: see text] such that [Formula: see text] and [Formula: see text]. Finally, we investigate the local metric dimension of several special line graphs.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"52 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF INTERCONNECTION NETWORKS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1