首页 > 最新文献

JOURNAL OF INTERCONNECTION NETWORKS最新文献

英文 中文
Embedding Knödel Graph into Cube-like Architectures: Dilation Optimization and Wirelength Analysis 将克诺德尔图嵌入立方体结构:扩张优化和线长分析
IF 0.7 Q4 Computer Science Pub Date : 2023-11-24 DOI: 10.1142/s0219265923500317
Remi Mariam Reji, R. Sundara Rajan, T. M. Rajalaxmi
An important tool for the execution of parallel algorithms and the simulation of interconnection networks is graph embedding. The quality of an embedding can be assessed using some cost metrics. The dilation and wirelength are the commonly used parameters. The Knödel graph [Formula: see text] is a minimum linear gossip network and has minimum broadcasting. It has [Formula: see text] vertices, [Formula: see text] edges, where [Formula: see text] is even, and [Formula: see text]log[Formula: see text]. In this study, we solve the dilation problem of embedding the Knödel graph into certain cube-like architectures such as hypercube, folded hypercube, and augmented cube. In [G. Fertin, A. Raspaud, A survey on Knödel graphs, Discrete Applied Mathematics 137 (2004) 173–195], it is proved that the dilation of embedding the Knödel graph [Formula: see text] into the hypercube [Formula: see text] is at most [Formula: see text]. In this study, we obtain an improved upper bound for dilation of embedding the Knödel graph into the hypercube and it is equal to [Formula: see text]. Also, we calculate the wirelength of embedding the Knödel graph into the above-said cube-like architectures using dilation.
图嵌入是执行并行算法和模拟互连网络的重要工具。嵌入的质量可以通过一些成本指标来评估。扩张和线长是常用参数。克诺德尔图[计算公式:见正文]是最小线性八卦网络,具有最小广播。它有[公式:见正文]顶点、[公式:见正文]边(其中[公式:见正文]为偶数)和[公式:见正文]log[公式:见正文]。在这项研究中,我们解决了将克诺德尔图嵌入某些立方体结构(如超立方体、折叠超立方体和增强立方体)的扩张问题。在[G. Fertin, A. Raspaud, A survey on Knödel graphs, Discrete Applied Mathematics 137 (2004) 173-195] 中,证明了将 Knödel 图[公式:见正文]嵌入超立方体[公式:见正文]的扩张量至多为[公式:见正文]。在本研究中,我们得到了将克诺德尔图嵌入超立方体的扩张的改进上界,它等于[式:见正文]。此外,我们还计算了利用扩张法将克诺德尔图嵌入上述立方体架构的线长。
{"title":"Embedding Knödel Graph into Cube-like Architectures: Dilation Optimization and Wirelength Analysis","authors":"Remi Mariam Reji, R. Sundara Rajan, T. M. Rajalaxmi","doi":"10.1142/s0219265923500317","DOIUrl":"https://doi.org/10.1142/s0219265923500317","url":null,"abstract":"An important tool for the execution of parallel algorithms and the simulation of interconnection networks is graph embedding. The quality of an embedding can be assessed using some cost metrics. The dilation and wirelength are the commonly used parameters. The Knödel graph [Formula: see text] is a minimum linear gossip network and has minimum broadcasting. It has [Formula: see text] vertices, [Formula: see text] edges, where [Formula: see text] is even, and [Formula: see text]log[Formula: see text]. In this study, we solve the dilation problem of embedding the Knödel graph into certain cube-like architectures such as hypercube, folded hypercube, and augmented cube. In [G. Fertin, A. Raspaud, A survey on Knödel graphs, Discrete Applied Mathematics 137 (2004) 173–195], it is proved that the dilation of embedding the Knödel graph [Formula: see text] into the hypercube [Formula: see text] is at most [Formula: see text]. In this study, we obtain an improved upper bound for dilation of embedding the Knödel graph into the hypercube and it is equal to [Formula: see text]. Also, we calculate the wirelength of embedding the Knödel graph into the above-said cube-like architectures using dilation.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139240577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Incentive Routing Protocol with Virtual Projection for Mobile Packet Forwarding Nodes in Wireless Sensor Networks 为无线传感器网络中的移动数据包转发节点设计的带虚拟投影的新型激励路由协议
IF 0.7 Q4 Computer Science Pub Date : 2023-11-18 DOI: 10.1142/s0219265923500287
L. Niranjan, M. Manoj Priyatham
The size of the Packet Forwarding Nodes (PFNs) is becoming very small as the technology advances in Wireless Sensor Networks (WSNs). The node has an additional parameter with low energy levels. The PFNs are distributed in a square cross-sectional area with each node acting as a Sensing Point (SP) that can be used for various kinds of applications like temperature, atmospheric humidity, acoustic, and pressure measurements. The packet is divided into several fragments where each fragment is considered as fixed or variable length. Each of these packets is sent over multiple PFNs toward the data center using PFNs. The selection of PFNs in the path is picked based on the trust level. In the network even special PFNs are placed which are responsible to deliver the packets toward the data center without losing the data during the transmission. The selection of special PFNs is done by computing the meeting probability, remaining energy computation, computation of data weight, and security value computation. The proposed Incentive Routing Protocol with Virtual Projection (IRPVP) method is compared with the conventional approaches concerning the parameters like delay, link count, resource energy, healthy PFNs, non-healthy PFNs, health ratio computation, remaining energy, control to data ratio, and balancing factor. The simulation outcomes show that the performance of the proposed IRPVP algorithm is better than the other conventional algorithms.
随着无线传感器网络(WSN)技术的发展,数据包转发节点(PFN)的体积越来越小。节点还具有低能耗的附加参数。PFN 分布在一个正方形横截面上,每个节点都是一个传感点 (SP),可用于温度、大气湿度、声学和压力测量等各种应用。数据包被分为多个片段,每个片段的长度可固定或可变。每个数据包通过多个 PFN 向数据中心发送。路径中 PFN 的选择基于信任级别。网络中甚至会放置特殊的 PFN,负责将数据包发送到数据中心,而不会在传输过程中丢失数据。特殊 PFN 的选择是通过计算相遇概率、剩余能量计算、数据权重计算和安全值计算来完成的。在延迟、链路数、资源能量、健康 PFN、非健康 PFN、健康比计算、剩余能量、控制与数据比和平衡因子等参数方面,将所提出的虚拟投影激励路由协议(IRPVP)方法与传统方法进行了比较。仿真结果表明,提议的 IRPVP 算法的性能优于其他传统算法。
{"title":"A Novel Incentive Routing Protocol with Virtual Projection for Mobile Packet Forwarding Nodes in Wireless Sensor Networks","authors":"L. Niranjan, M. Manoj Priyatham","doi":"10.1142/s0219265923500287","DOIUrl":"https://doi.org/10.1142/s0219265923500287","url":null,"abstract":"The size of the Packet Forwarding Nodes (PFNs) is becoming very small as the technology advances in Wireless Sensor Networks (WSNs). The node has an additional parameter with low energy levels. The PFNs are distributed in a square cross-sectional area with each node acting as a Sensing Point (SP) that can be used for various kinds of applications like temperature, atmospheric humidity, acoustic, and pressure measurements. The packet is divided into several fragments where each fragment is considered as fixed or variable length. Each of these packets is sent over multiple PFNs toward the data center using PFNs. The selection of PFNs in the path is picked based on the trust level. In the network even special PFNs are placed which are responsible to deliver the packets toward the data center without losing the data during the transmission. The selection of special PFNs is done by computing the meeting probability, remaining energy computation, computation of data weight, and security value computation. The proposed Incentive Routing Protocol with Virtual Projection (IRPVP) method is compared with the conventional approaches concerning the parameters like delay, link count, resource energy, healthy PFNs, non-healthy PFNs, health ratio computation, remaining energy, control to data ratio, and balancing factor. The simulation outcomes show that the performance of the proposed IRPVP algorithm is better than the other conventional algorithms.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139261722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Component Edge Connectivity and Extra Edge Connectivity of Bubble-Sort Star Graphs 冒泡排序星图的分量边连通性和额外边连通性
Q4 Computer Science Pub Date : 2023-11-10 DOI: 10.1142/s0219265923500299
Xiaohui Hua, Yonghao Lai
Connectivity is an important parameter for evaluating the reliability and stability of an interconnection network. Based on the edge connectivity, more refined connectivities have been proposed. The [Formula: see text]-component edge connectivity [Formula: see text] and the [Formula: see text]-extra edge connectivity [Formula: see text] are two important parameters to assess the robustness of an interconnection network, which received attention extensively. In this paper, we determine the [Formula: see text]-component edge connectivity and the [Formula: see text]-extra edge connectivity of bubble-sort star graphs [Formula: see text]. For [Formula: see text]-component edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text]. For [Formula: see text]-extra edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text].
连通性是评价互联网络可靠性和稳定性的重要参数。在边缘连通性的基础上,提出了更精细的连通性。[公式:见文]-组件边缘连通性[公式:见文]和[公式:见文]-额外边缘连通性[公式:见文]是评估互连网络鲁棒性的两个重要参数,受到了广泛关注。在本文中,我们确定了气泡排序星图的[公式:见文]-分量边连通性和[公式:见文]-额外边连通性。对于[公式:见文]-组件边缘连通性,我们证明[公式:见文],[公式:见文]和[公式:见文]对于[公式:见文]。对于[公式:见文]-额外边缘连接,我们证明[公式:见文],[公式:见文]和[公式:见文]对于[公式:见文]。
{"title":"Component Edge Connectivity and Extra Edge Connectivity of Bubble-Sort Star Graphs","authors":"Xiaohui Hua, Yonghao Lai","doi":"10.1142/s0219265923500299","DOIUrl":"https://doi.org/10.1142/s0219265923500299","url":null,"abstract":"Connectivity is an important parameter for evaluating the reliability and stability of an interconnection network. Based on the edge connectivity, more refined connectivities have been proposed. The [Formula: see text]-component edge connectivity [Formula: see text] and the [Formula: see text]-extra edge connectivity [Formula: see text] are two important parameters to assess the robustness of an interconnection network, which received attention extensively. In this paper, we determine the [Formula: see text]-component edge connectivity and the [Formula: see text]-extra edge connectivity of bubble-sort star graphs [Formula: see text]. For [Formula: see text]-component edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text]. For [Formula: see text]-extra edge connectivity, we prove that [Formula: see text], [Formula: see text], and [Formula: see text] for [Formula: see text].","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135190962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Model-Based Intrusion Detection in Wireless Sensor Network on the Basis of Risk and Link Quality 基于风险和链路质量的无线传感器网络混合模型入侵检测
Q4 Computer Science Pub Date : 2023-11-08 DOI: 10.1142/s0219265923500214
Ranjeet B. Kagade, N. Vijayaraj
Nowadays, Wireless Sensor Networks (WSN) face more security threats due to the increased service of data transmission at high speed in almost all applications. The security of the network must be ensured by identifying abnormal traffic and current emerging threats. The most promising model for safeguarding the core network from outside attacks is Intrusion Detection Systems (IDS). This work focuses on the introduction of clustering-based intrusion detection in WSN. Initially, clustering takes place, where the nodes are grouped under certain constraints via selecting the optimal Cluster Head (CH). The considered constraints are energy, delay, distance, risk, and link quality. This optimal selection takes place by a new hybrid optimization algorithm termed as Truncate Combined Bald Eagle Optimization (TCBEO) algorithm. The subsequent process is intrusion detection, where a hybrid detection model combining a Convolutional Neural Network (CNN) & Bi-directional Gated Recurrent unit (Bi-GRU) is employed, which is trained with features like improved entropy and correlation taking into consideration of constraints like energy and distance, respectively. Eventually, the suggested work’s effectiveness is affirmed against existing techniques using various performance metrics.
目前,无线传感器网络(WSN)面临着越来越多的安全威胁,因为它在几乎所有的应用中都需要高速传输数据。通过识别异常流量和当前出现的威胁,保证网络的安全。保护核心网络免受外部攻击最有前途的模型是入侵检测系统(IDS)。本文重点介绍了WSN中基于聚类的入侵检测方法。最初,集群发生,节点通过选择最优簇头(CH)在一定的约束下分组。考虑的约束条件包括能量、延迟、距离、风险和链路质量。这种优化选择是通过一种新的混合优化算法进行的,称为截断组合秃鹰优化(TCBEO)算法。接下来的过程是入侵检测,其中结合卷积神经网络(CNN)的混合检测模型;采用双向门控循环单元(Bi-directional Gated Recurrent unit, Bi-GRU),该单元分别考虑能量约束和距离约束,使用改进熵和相关性等特征进行训练。最后,建议的工作的有效性通过使用各种性能度量来确定。
{"title":"Hybrid Model-Based Intrusion Detection in Wireless Sensor Network on the Basis of Risk and Link Quality","authors":"Ranjeet B. Kagade, N. Vijayaraj","doi":"10.1142/s0219265923500214","DOIUrl":"https://doi.org/10.1142/s0219265923500214","url":null,"abstract":"Nowadays, Wireless Sensor Networks (WSN) face more security threats due to the increased service of data transmission at high speed in almost all applications. The security of the network must be ensured by identifying abnormal traffic and current emerging threats. The most promising model for safeguarding the core network from outside attacks is Intrusion Detection Systems (IDS). This work focuses on the introduction of clustering-based intrusion detection in WSN. Initially, clustering takes place, where the nodes are grouped under certain constraints via selecting the optimal Cluster Head (CH). The considered constraints are energy, delay, distance, risk, and link quality. This optimal selection takes place by a new hybrid optimization algorithm termed as Truncate Combined Bald Eagle Optimization (TCBEO) algorithm. The subsequent process is intrusion detection, where a hybrid detection model combining a Convolutional Neural Network (CNN) & Bi-directional Gated Recurrent unit (Bi-GRU) is employed, which is trained with features like improved entropy and correlation taking into consideration of constraints like energy and distance, respectively. Eventually, the suggested work’s effectiveness is affirmed against existing techniques using various performance metrics.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135392001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Configuration and Self-Healing Framework Using Extreme Gradient Boosting (XGBoost) Classifier for IoT-WSN 基于极限梯度增强(XGBoost)分类器的IoT-WSN自配置自修复框架
Q4 Computer Science Pub Date : 2023-11-03 DOI: 10.1142/s0219265923500226
M. Ganesh Raja, S. Jeyalaksshmi
In most Internet of Things (IoT) systems, Quality of service (QoS) must be confirmed with respect to the requirement of implementation domain. The dynamic nature of the IoT surroundings shapes it to complicate the fulfilment of these commitments. A wide range of unpredictable events endanger the quality of service. While execution the self-adaptive schemes handle with system’s unpredictable. In IoT-based Wireless Sensor Networks (WSNs), the significant self-management objectives are self-configuration (SC) and self-healing (SH). In this paper, Self-Configuration and Self-healing Framework using an extreme gradient boosting (XGBoost) Classifier are proposed. In this framework, the IoT traffic classes are categorized as several types under XGBoost classifier. In SC phase, the IoT devices are self-configured by allocating various transmission slots, contention access period (CAPs) on the basis of its categories with priorities. In SH phase, the source node cardinally establishes a confined route retrieval method if the residual power in-between node is truncated or the node has displaced far away. The proposed framework is executed in NS-2 and the results exhibit that the proposed framework has higher packet delivery ratio with reduced packet drops and computational cost. Therefore, the proposed approach has attained 24.7%, 28.9%, 12.75% higher PDR, and 16.8%, 19.87%, and 13.7% higher residual energy than the existing methods like Self-Healing and Seamless Connectivity using Kalman Filter among IoT Networks (SH-SC-KF-IoT), Provenance aware run-time verification mechanism for self-healing IoT (PA-RVM-SH-IoT), and Fully Anonymous Routing Protocol and Self-healing Capacity in Unbalanced Sensor Networks (FARP-SC-USN) methods, respectively.
在大多数物联网(IoT)系统中,必须根据实现域的要求确定服务质量(QoS)。物联网环境的动态特性使这些承诺的实现变得复杂。各种不可预测的事件危及服务质量。自适应方案在执行过程中处理系统的不可预测性。在基于物联网的无线传感器网络(WSNs)中,重要的自我管理目标是自配置(SC)和自修复(SH)。本文提出了一种基于极限梯度提升(XGBoost)分类器的自配置和自修复框架。在这个框架中,物联网流量类在XGBoost分类器下被分类为几种类型。在SC阶段,物联网设备根据其类别和优先级分配各种传输时隙、争用访问周期(CAPs)进行自配置。在SH阶段,如果中间节点的剩余功率被截断或节点位移较远,源节点基本建立受限路由检索方法。在NS-2中执行了该框架,结果表明该框架具有更高的分组传输率,减少了丢包和计算成本。因此,与现有方法相比,该方法的PDR分别提高了24.7%、28.9%、12.75%,剩余能量分别提高了16.8%、19.87%和13.7%,这些方法包括物联网网络间使用卡尔曼滤波的自愈和无缝连接(SH-SC-KF-IoT),物联网自愈的来源感知运行时验证机制(PA-RVM-SH-IoT),以及不平衡传感器网络中的完全匿名路由协议和自愈能力(FARP-SC-USN)方法。
{"title":"Self-Configuration and Self-Healing Framework Using Extreme Gradient Boosting (XGBoost) Classifier for IoT-WSN","authors":"M. Ganesh Raja, S. Jeyalaksshmi","doi":"10.1142/s0219265923500226","DOIUrl":"https://doi.org/10.1142/s0219265923500226","url":null,"abstract":"In most Internet of Things (IoT) systems, Quality of service (QoS) must be confirmed with respect to the requirement of implementation domain. The dynamic nature of the IoT surroundings shapes it to complicate the fulfilment of these commitments. A wide range of unpredictable events endanger the quality of service. While execution the self-adaptive schemes handle with system’s unpredictable. In IoT-based Wireless Sensor Networks (WSNs), the significant self-management objectives are self-configuration (SC) and self-healing (SH). In this paper, Self-Configuration and Self-healing Framework using an extreme gradient boosting (XGBoost) Classifier are proposed. In this framework, the IoT traffic classes are categorized as several types under XGBoost classifier. In SC phase, the IoT devices are self-configured by allocating various transmission slots, contention access period (CAPs) on the basis of its categories with priorities. In SH phase, the source node cardinally establishes a confined route retrieval method if the residual power in-between node is truncated or the node has displaced far away. The proposed framework is executed in NS-2 and the results exhibit that the proposed framework has higher packet delivery ratio with reduced packet drops and computational cost. Therefore, the proposed approach has attained 24.7%, 28.9%, 12.75% higher PDR, and 16.8%, 19.87%, and 13.7% higher residual energy than the existing methods like Self-Healing and Seamless Connectivity using Kalman Filter among IoT Networks (SH-SC-KF-IoT), Provenance aware run-time verification mechanism for self-healing IoT (PA-RVM-SH-IoT), and Fully Anonymous Routing Protocol and Self-healing Capacity in Unbalanced Sensor Networks (FARP-SC-USN) methods, respectively.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135873445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Local Metric Dimension of Line Graphs 关于线形图的局部度量维数
Q4 Computer Science Pub Date : 2023-10-31 DOI: 10.1142/s0219265923500263
Chenxu Yang, Xingchao Deng, Wen Li
Let [Formula: see text] be a graph. For any [Formula: see text], if there exists [Formula: see text] such that [Formula: see text], we say that [Formula: see text] resolving [Formula: see text]. A set [Formula: see text] of vertices in [Formula: see text] is a local resolving set of [Formula: see text] if there exists [Formula: see text] such that [Formula: see text] for any [Formula: see text]. The local metric dimension [Formula: see text] of [Formula: see text] is the minimum cardinality of all the local resolving sets of [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text]. Furthermore, we construct a graph [Formula: see text] such that [Formula: see text] and [Formula: see text]. Finally, we investigate the local metric dimension of several special line graphs.
设[公式:见文本]为图形。对于任何[公式:见文],如果存在[公式:见文]使得[公式:见文],我们说[公式:见文]消解[公式:见文]。如果存在[公式:见文本]使得[公式:见文本]对于任何[公式:见文本],[公式:见文本]的顶点集[公式:见文本]是[公式:见文本]的局部解析集。[公式:见文本]的局部度量维度[公式:见文本]是[公式:见文本]的所有局部解析集的最小基数。本文研究了[公式:见文]与[公式:见文]之间的关系。此外,我们构造了一个图[公式:见文],使得[公式:见文]和[公式:见文]。最后,我们研究了几种特殊线形图的局部度量维数。
{"title":"On the Local Metric Dimension of Line Graphs","authors":"Chenxu Yang, Xingchao Deng, Wen Li","doi":"10.1142/s0219265923500263","DOIUrl":"https://doi.org/10.1142/s0219265923500263","url":null,"abstract":"Let [Formula: see text] be a graph. For any [Formula: see text], if there exists [Formula: see text] such that [Formula: see text], we say that [Formula: see text] resolving [Formula: see text]. A set [Formula: see text] of vertices in [Formula: see text] is a local resolving set of [Formula: see text] if there exists [Formula: see text] such that [Formula: see text] for any [Formula: see text]. The local metric dimension [Formula: see text] of [Formula: see text] is the minimum cardinality of all the local resolving sets of [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text]. Furthermore, we construct a graph [Formula: see text] such that [Formula: see text] and [Formula: see text]. Finally, we investigate the local metric dimension of several special line graphs.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135871548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tight Toughness, Isolated Toughness and Binding Number Bounds for the Star-Path Factor 星径因子的紧密韧性、孤立韧性和结合数界限
Q4 Computer Science Pub Date : 2023-10-20 DOI: 10.1142/s0219265923500202
Yifan Yao, Jinxia Liang, Yue Li, Rongrong Ma
For a set [Formula: see text] of connected graphs, a spanning subgraph [Formula: see text] of [Formula: see text] is called a [Formula: see text] if each component of [Formula: see text] is isomorphic to a member of [Formula: see text]. In this paper, some sufficient conditions with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the [Formula: see text]-factor and [Formula: see text]-factor for any graph are obtained.
对于连通图的集合[公式:见文],如果[公式:见文]的每个组成部分与[公式:见文]的一个成员同构,则[公式:见文]的生成子图[公式:见文]称为[公式:见文]。本文给出了任意图的紧韧性、孤立韧性和约束数界存在的充分条件,以保证任意图的[公式:见文]因子和[公式:见文]因子的存在。
{"title":"Tight Toughness, Isolated Toughness and Binding Number Bounds for the Star-Path Factor","authors":"Yifan Yao, Jinxia Liang, Yue Li, Rongrong Ma","doi":"10.1142/s0219265923500202","DOIUrl":"https://doi.org/10.1142/s0219265923500202","url":null,"abstract":"For a set [Formula: see text] of connected graphs, a spanning subgraph [Formula: see text] of [Formula: see text] is called a [Formula: see text] if each component of [Formula: see text] is isomorphic to a member of [Formula: see text]. In this paper, some sufficient conditions with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the [Formula: see text]-factor and [Formula: see text]-factor for any graph are obtained.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Monitoring-Edge-Geodetic Numbers of Line Graphs 关于线形图的监测边测地数
Q4 Computer Science Pub Date : 2023-10-20 DOI: 10.1142/s0219265923500251
Gemaji Bao, Chenxu Yang, Zhiqiang Ma, Zhen Ji, Xin Xu, Peiyao Qin
For a vertex set [Formula: see text], we say that [Formula: see text] is a monitoring-edge-geodetic set (MEG-set for short) of graph [Formula: see text], that is, some vertices of [Formula: see text] can monitor an edge of the graph, if and only if we can remove that edge would change the distance between some pair of vertices in the set. The monitoring-edge-geodetic number [Formula: see text] of a graph [Formula: see text] is defined as the minimum cardinality of a monitoring-edge-geodetic set of [Formula: see text]. The line graph [Formula: see text] of [Formula: see text] is the graph whose vertices are in one-to-one correspondence with the edges of [Formula: see text], that is, if two vertices are adjacent in [Formula: see text] if and only if the corresponding edges have a common vertex in [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text], and prove that [Formula: see text]. Next, we have determined the exact values for a MEG-set of some special graphs and their line graphs. For a graph [Formula: see text] and its line graph [Formula: see text], we prove that [Formula: see text] can be arbitrarily large.
对于一个顶点集[公式:见文],我们说[公式:见文]是图[公式:见文]的一个监控边测地集(简称meg集),即[公式:见文]的一些顶点可以监控图的某条边,当且仅当我们可以移除这条边会改变集合中某些顶点对之间的距离。图[公式:见文]的监测边测地线数[公式:见文]定义为[公式:见文]的监测边测地线集合的最小基数。[公式:见文]的直线图[公式:见文]是顶点与[公式:见文]的边一一对应的图,即当且仅当[公式:见文]中两个顶点相邻时,当对应的边有[公式:见文]中的一个公共顶点。本文研究了[公式:见文]与[公式:见文]之间的关系,证明了[公式:见文]。接下来,我们确定了一些特殊图及其线形图的meg集的确切值。对于一个图[公式:见文]和它的线图[公式:见文],我们证明了[公式:见文]可以任意大。
{"title":"On the Monitoring-Edge-Geodetic Numbers of Line Graphs","authors":"Gemaji Bao, Chenxu Yang, Zhiqiang Ma, Zhen Ji, Xin Xu, Peiyao Qin","doi":"10.1142/s0219265923500251","DOIUrl":"https://doi.org/10.1142/s0219265923500251","url":null,"abstract":"For a vertex set [Formula: see text], we say that [Formula: see text] is a monitoring-edge-geodetic set (MEG-set for short) of graph [Formula: see text], that is, some vertices of [Formula: see text] can monitor an edge of the graph, if and only if we can remove that edge would change the distance between some pair of vertices in the set. The monitoring-edge-geodetic number [Formula: see text] of a graph [Formula: see text] is defined as the minimum cardinality of a monitoring-edge-geodetic set of [Formula: see text]. The line graph [Formula: see text] of [Formula: see text] is the graph whose vertices are in one-to-one correspondence with the edges of [Formula: see text], that is, if two vertices are adjacent in [Formula: see text] if and only if the corresponding edges have a common vertex in [Formula: see text]. In this paper, we study the relation between [Formula: see text] and [Formula: see text], and prove that [Formula: see text]. Next, we have determined the exact values for a MEG-set of some special graphs and their line graphs. For a graph [Formula: see text] and its line graph [Formula: see text], we prove that [Formula: see text] can be arbitrarily large.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sharp Bounds and Precise Values for the Ni-Chromatic Number of Graphs 图的ni色数的锐界和精确值
Q4 Computer Science Pub Date : 2023-10-20 DOI: 10.1142/s021926592350024x
Yangfan Yu, Yuefang Sun
Let [Formula: see text] be a connected undirected graph. A vertex coloring [Formula: see text] of [Formula: see text] is an [Formula: see text]-vertex coloring if for each vertex [Formula: see text] in [Formula: see text], the number of different colors assigned to [Formula: see text] is at most [Formula: see text]. The [Formula: see text]-chromatic number of [Formula: see text], denoted by [Formula: see text], is the maximum number of colors which are used in an [Formula: see text]-vertex coloring of [Formula: see text]. In this paper, we provide sharp bounds for [Formula: see text] of a graph [Formula: see text] in terms of its vertex cover number, maximum degree and diameter, respectively. We also determine precise values for [Formula: see text] in some cases.
设[公式:见文本]为连通无向图。如果对于[公式:见文]中的每个顶点[公式:见文],分配给[公式:见文]的不同颜色的数量最多为[公式:见文],则[公式:见文]的顶点着色[公式:见文]是[公式:见文]顶点着色。[公式:见文]-[公式:见文]的色数,用[公式:见文]表示,是在一个[公式:见文]-[公式:见文]的顶点着色中使用的最大颜色数。本文对图[公式:见文]的顶点覆盖数、最大度和直径分别给出了[公式:见文]的锐利界。在某些情况下,我们还确定[公式:见文本]的精确值。
{"title":"Sharp Bounds and Precise Values for the Ni-Chromatic Number of Graphs","authors":"Yangfan Yu, Yuefang Sun","doi":"10.1142/s021926592350024x","DOIUrl":"https://doi.org/10.1142/s021926592350024x","url":null,"abstract":"Let [Formula: see text] be a connected undirected graph. A vertex coloring [Formula: see text] of [Formula: see text] is an [Formula: see text]-vertex coloring if for each vertex [Formula: see text] in [Formula: see text], the number of different colors assigned to [Formula: see text] is at most [Formula: see text]. The [Formula: see text]-chromatic number of [Formula: see text], denoted by [Formula: see text], is the maximum number of colors which are used in an [Formula: see text]-vertex coloring of [Formula: see text]. In this paper, we provide sharp bounds for [Formula: see text] of a graph [Formula: see text] in terms of its vertex cover number, maximum degree and diameter, respectively. We also determine precise values for [Formula: see text] in some cases.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135618394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Strategy to Exchange Road Messages Between Smart Vehicles and Wireless Sensor Networks in Hybrid Sensor and Vehicular Networks 传感器与车辆混合网络中智能车辆与无线传感器网络之间道路信息交换的有效策略
Q4 Computer Science Pub Date : 2023-10-10 DOI: 10.1142/s0219265923500238
Taha Bensiradj
The aim of the intelligent transport system (ITS) is the improvement of road safety. This system is based on intelligent vehicles composing a network called Vehicular Ad hoc NETwork (VANET). This network suffers from a disconnection problem due to its dynamic topology. Therefore, a framework of collaboration between the Wireless Sensor Network (WSN) and VANET called Hybr1id Sensor and Vehicular Networks (HSVN) has been proposed. In HSVN, the WSN can play the role of a relay between disconnected vehicles. This paper aims to propose a strategy allowing the exchange of messages between the two networks. That reduces the number of accidents and improves the management of road traffic. We can summarize our proposition in three essential points. First, an algorithm is proposed to decompose the vehicular network into clusters. This algorithm takes into account the mobile aspect of vehicles and the road model. Second, a data encoding model and a message model have been proposed to improve the quality of messages. That reduces the response time of drivers to a critical situation. Finally, an exchange algorithm is proposed to ensure the transmission of road messages between vehicles and sensors. Its principle of work is based on several scenarios defined relative to the network condition. Obtained results show an improvement in the delivery delays of road messages and the number of exchanged road messages between the vehicles.
智能交通系统(ITS)的目标是改善道路安全。该系统是基于智能车辆组成的车辆自组网(VANET)。该网络由于其动态拓扑结构而存在断连问题。因此,提出了无线传感器网络(WSN)和VANET之间的协作框架,称为混合传感器和车辆网络(HSVN)。在hsn中,WSN可以在断开的车辆之间起到中继的作用。本文旨在提出一种允许在两个网络之间交换消息的策略。这减少了事故的数量,改善了道路交通的管理。我们可以用三个要点来概括我们的主张。首先,提出了一种将车辆网络分解成簇的算法。该算法考虑了车辆的移动特性和道路模型。其次,提出了数据编码模型和消息模型,以提高消息的质量。这减少了司机对紧急情况的反应时间。最后,提出了一种保证车辆与传感器之间道路信息传输的交换算法。它的工作原理是基于相对于网络状况定义的几个场景。获得的结果表明,道路信息的传递延迟和车辆之间交换的道路信息数量有所改善。
{"title":"Efficient Strategy to Exchange Road Messages Between Smart Vehicles and Wireless Sensor Networks in Hybrid Sensor and Vehicular Networks","authors":"Taha Bensiradj","doi":"10.1142/s0219265923500238","DOIUrl":"https://doi.org/10.1142/s0219265923500238","url":null,"abstract":"The aim of the intelligent transport system (ITS) is the improvement of road safety. This system is based on intelligent vehicles composing a network called Vehicular Ad hoc NETwork (VANET). This network suffers from a disconnection problem due to its dynamic topology. Therefore, a framework of collaboration between the Wireless Sensor Network (WSN) and VANET called Hybr1id Sensor and Vehicular Networks (HSVN) has been proposed. In HSVN, the WSN can play the role of a relay between disconnected vehicles. This paper aims to propose a strategy allowing the exchange of messages between the two networks. That reduces the number of accidents and improves the management of road traffic. We can summarize our proposition in three essential points. First, an algorithm is proposed to decompose the vehicular network into clusters. This algorithm takes into account the mobile aspect of vehicles and the road model. Second, a data encoding model and a message model have been proposed to improve the quality of messages. That reduces the response time of drivers to a critical situation. Finally, an exchange algorithm is proposed to ensure the transmission of road messages between vehicles and sensors. Its principle of work is based on several scenarios defined relative to the network condition. Obtained results show an improvement in the delivery delays of road messages and the number of exchanged road messages between the vehicles.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136294789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF INTERCONNECTION NETWORKS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1