首页 > 最新文献

JOURNAL OF INTERCONNECTION NETWORKS最新文献

英文 中文
Sufficient Conditions of (Isolated) Toughness and Binding Number for the Existence of Component Factors 构件因素存在的(隔离)韧性和结合数的充分条件
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-07-27 DOI: 10.1142/s0219265923500135
Zhiqiang Ma, Fengyun Ren, Meiqin Wei, Gemaji Bao
For a family of connected graphs [Formula: see text], a spanning subgraph [Formula: see text] of [Formula: see text] is called an [Formula: see text]-factor if each component of [Formula: see text] is isomorphic to a member of [Formula: see text]. In this paper, sufficient conditions with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the [Formula: see text]-factor, [Formula: see text]-factor or [Formula: see text]-factor for [Formula: see text] are obtained.
对于一组连通图[公式:见文],如果[公式:见文]的每个分量与[公式:见文]的一个成员同构,则[公式:见文]的一个生成子图[公式:见文]称为[公式:见文]因子。本文得到了[式:文]的[式:文]-因子、[式:文]-因子、[式:文]-因子、[式:文]-因子存在的紧韧性、孤立韧性和约束数界的充分条件。
{"title":"Sufficient Conditions of (Isolated) Toughness and Binding Number for the Existence of Component Factors","authors":"Zhiqiang Ma, Fengyun Ren, Meiqin Wei, Gemaji Bao","doi":"10.1142/s0219265923500135","DOIUrl":"https://doi.org/10.1142/s0219265923500135","url":null,"abstract":"For a family of connected graphs [Formula: see text], a spanning subgraph [Formula: see text] of [Formula: see text] is called an [Formula: see text]-factor if each component of [Formula: see text] is isomorphic to a member of [Formula: see text]. In this paper, sufficient conditions with regard to tight toughness, isolated toughness and binding number bounds to guarantee the existence of the [Formula: see text]-factor, [Formula: see text]-factor or [Formula: see text]-factor for [Formula: see text] are obtained.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90853715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Ordinal Consistency of a Hesitant Fuzzy Preference Relation 一类犹豫模糊偏好关系的序一致性
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-07-19 DOI: 10.1142/s0219265923500093
Xue Feng, Shenglin Geng, Banghe Han
An efficient solution to the misleading solutions of decision-making problems is the study of consistency when the decision makers express their opinions by means of fuzzy preference relations. To elucidate the consistency of HFPRs, the S-ordinal consistency of HFPRs was proposed, and S-OCI was also proposed to evaluate the degree of consistency of a hesitant fuzzy preference relation by calculating the unreasonable 3-cycles in the directed graph. Two novel methods were also proposed for calculation of the S-OCI. Moreover, the inconsistent judgment in hesitation fuzzy preference relation was developed. In order to repair the inconsistency of a hesitant fuzzy preference relation, an algorithm for finding and removing 3-cycles in digraph was developed. Finally, some illustrative examples were given to prove the effectiveness of the method.
研究决策者利用模糊偏好关系表达意见时的一致性是解决决策问题的有效方法。为了阐明hfpr的一致性,提出了hfpr的s序数一致性,并提出了S-OCI,通过计算有向图中不合理的3圈来评价犹豫不决模糊偏好关系的一致性程度。提出了计算S-OCI的两种新方法。提出了犹豫模糊偏好关系中的不一致判断。为了修复犹豫不决模糊偏好关系的不一致性,提出了一种有向图中3圈的查找和去除算法。最后,通过算例验证了该方法的有效性。
{"title":"The Ordinal Consistency of a Hesitant Fuzzy Preference Relation","authors":"Xue Feng, Shenglin Geng, Banghe Han","doi":"10.1142/s0219265923500093","DOIUrl":"https://doi.org/10.1142/s0219265923500093","url":null,"abstract":"An efficient solution to the misleading solutions of decision-making problems is the study of consistency when the decision makers express their opinions by means of fuzzy preference relations. To elucidate the consistency of HFPRs, the S-ordinal consistency of HFPRs was proposed, and S-OCI was also proposed to evaluate the degree of consistency of a hesitant fuzzy preference relation by calculating the unreasonable 3-cycles in the directed graph. Two novel methods were also proposed for calculation of the S-OCI. Moreover, the inconsistent judgment in hesitation fuzzy preference relation was developed. In order to repair the inconsistency of a hesitant fuzzy preference relation, an algorithm for finding and removing 3-cycles in digraph was developed. Finally, some illustrative examples were given to prove the effectiveness of the method.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"12 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75870466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Strong Menger Connectivity of the Directed k-Ary n-Cube 有向k-Ary n-立方体的强Menger连通性
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-07-19 DOI: 10.1142/s0219265923500123
Guoqiang Xie, J. Meng
A strong digraph [Formula: see text] is strongly Menger (arc) connected if, for [Formula: see text], [Formula: see text] can reach [Formula: see text] by min[Formula: see text] internally (arc) disjoint-directed paths. A digraph [Formula: see text] is [Formula: see text](-arc)-fault-tolerant strongly Menger([Formula: see text]-(A)FTSM, for short) (arc) connected if [Formula: see text] is strongly Menger (arc) connected for every [Formula: see text](respectively, [Formula: see text]) with [Formula: see text]. A digraph [Formula: see text] is [Formula: see text]-conditional (arc)-fault-tolerant strongly Menger ([Formula: see text]-C(A)FTSM, for short) (arc) connected if [Formula: see text] is strongly Menger (arc) connected for every [Formula: see text](respectively, [Formula: see text]) with [Formula: see text] and [Formula: see text]. The directed [Formula: see text]-ary [Formula: see text]-cube [Formula: see text] [Formula: see text] and [Formula: see text] is a digraph with vertex set [Formula: see text]. For two vertices [Formula: see text] and [Formula: see text], [Formula: see text] dominates [Formula: see text] if there exists an integer [Formula: see text], [Formula: see text], satisfying [Formula: see text]mod [Formula: see text] and [Formula: see text], when [Formula: see text]. In this paper, we show that [Formula: see text] [Formula: see text] is [Formula: see text]-AFTSM arc connected when [Formula: see text], [Formula: see text]-FTSM connected when [Formula: see text], [Formula: see text]-CAFTSM arc connected when [Formula: see text], and [Formula: see text]-CFTSM connected when [Formula: see text].
一个强有向图[公式:见文]是强门格尔(弧)连通的,如果对于[公式:见文],[公式:见文]可以通过最小的[公式:见文]内部(弧)不相交的路径到达[公式:见文]。有向图[公式:见文]是[公式:见文](-弧)-容错强门格尔([公式:见文]-(A)FTSM,简称)(弧)连接,如果[公式:见文]与[公式:见文](分别为[公式:见文])是强门格尔(弧)连接。有向图[公式:见文]是[公式:见文]-条件(弧)-容错强门格尔([公式:见文]-C(A)FTSM,简称)(弧)连接,如果[公式:见文]与[公式:见文]和[公式:见文]的每一个[公式:见文](分别为[公式:见文]和[公式:见文])是强门格尔(弧)连接。有向[公式:见文]-ary[公式:见文]-cube[公式:见文][公式:见文]和[公式:见文]是具有顶点集[公式:见文]的有向图。对于两个顶点[公式:见文]和[公式:见文],如果存在整数[公式:见文],[公式:见文],[公式:见文]优于[公式:见文],满足[公式:见文]mod[公式:见文]和[公式:见文],当[公式:见文]。在本文中,我们证明了[公式:见文][公式:见文]是[公式:见文]-AFTSM在[公式:见文]时连接,[公式:见文]-FTSM在[公式:见文]时连接,[公式:见文]-CAFTSM在[公式:见文]时连接,[公式:见文]-CFTSM在[公式:见文]时连接。
{"title":"The Strong Menger Connectivity of the Directed k-Ary n-Cube","authors":"Guoqiang Xie, J. Meng","doi":"10.1142/s0219265923500123","DOIUrl":"https://doi.org/10.1142/s0219265923500123","url":null,"abstract":"A strong digraph [Formula: see text] is strongly Menger (arc) connected if, for [Formula: see text], [Formula: see text] can reach [Formula: see text] by min[Formula: see text] internally (arc) disjoint-directed paths. A digraph [Formula: see text] is [Formula: see text](-arc)-fault-tolerant strongly Menger([Formula: see text]-(A)FTSM, for short) (arc) connected if [Formula: see text] is strongly Menger (arc) connected for every [Formula: see text](respectively, [Formula: see text]) with [Formula: see text]. A digraph [Formula: see text] is [Formula: see text]-conditional (arc)-fault-tolerant strongly Menger ([Formula: see text]-C(A)FTSM, for short) (arc) connected if [Formula: see text] is strongly Menger (arc) connected for every [Formula: see text](respectively, [Formula: see text]) with [Formula: see text] and [Formula: see text]. The directed [Formula: see text]-ary [Formula: see text]-cube [Formula: see text] [Formula: see text] and [Formula: see text] is a digraph with vertex set [Formula: see text]. For two vertices [Formula: see text] and [Formula: see text], [Formula: see text] dominates [Formula: see text] if there exists an integer [Formula: see text], [Formula: see text], satisfying [Formula: see text]mod [Formula: see text] and [Formula: see text], when [Formula: see text]. In this paper, we show that [Formula: see text] [Formula: see text] is [Formula: see text]-AFTSM arc connected when [Formula: see text], [Formula: see text]-FTSM connected when [Formula: see text], [Formula: see text]-CAFTSM arc connected when [Formula: see text], and [Formula: see text]-CFTSM connected when [Formula: see text].","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"11 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90673121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The k-Total-Proper Index of Graphs 图的k-全固有索引
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-07-17 DOI: 10.1142/s0219265923500111
Ying-zi Ma, Hui Zhang
Given a set [Formula: see text] with [Formula: see text], a tree [Formula: see text] is considered as a total proper [Formula: see text]-tree or a total proper tree connecting [Formula: see text] if any two adjacent or incident elements of edges and [Formula: see text] of [Formula: see text] differ in color. Let [Formula: see text] be a connected graph of order [Formula: see text], and [Formula: see text] be an integer with [Formula: see text]. A total-colored graph is total proper[Formula: see text]-tree connected if for every set [Formula: see text] of [Formula: see text] vertices, there exists a total proper [Formula: see text]-tree in [Formula: see text]. The [Formula: see text]-total-proper index of [Formula: see text], denoted by [Formula: see text], is the minimum number of colors required to make [Formula: see text] total proper [Formula: see text]-tree connected. In this paper, we first investigate the [Formula: see text]-total-proper index of some special graphs. Moreover, we characterize the graphs with [Formula: see text]-total-proper index [Formula: see text] and [Formula: see text], respectively.
给定一个集[公式:见文]和[公式:见文],如果[公式:见文]的边和[公式:见文]的[公式:见文]的[相邻或相关元素]中有任何两个颜色不同,则树[公式:见文]被认为是一个总固有树[公式:见文]或连接[公式:见文]的总固有树。设[公式:见文]为有序的连通图[公式:见文],[公式:见文]为带[公式:见文]的整数。如果对于[公式:见文本]顶点的每一组[公式:见文本],在[公式:见文本]中存在一个总固有[公式:见文本]-树,则全彩色图为总固有[公式:见文本]-树连通。[公式:见文]的[公式:见文]-total-proper索引,用[公式:见文]表示,是使[公式:见文]总proper[公式:见文]-树连通所需的最小颜色数。本文首先研究了一些特殊图的[公式:见文]-全-固有索引。此外,我们分别用[公式:见文]-total-proper index[公式:见文]和[公式:见文]来表征图。
{"title":"The k-Total-Proper Index of Graphs","authors":"Ying-zi Ma, Hui Zhang","doi":"10.1142/s0219265923500111","DOIUrl":"https://doi.org/10.1142/s0219265923500111","url":null,"abstract":"Given a set [Formula: see text] with [Formula: see text], a tree [Formula: see text] is considered as a total proper [Formula: see text]-tree or a total proper tree connecting [Formula: see text] if any two adjacent or incident elements of edges and [Formula: see text] of [Formula: see text] differ in color. Let [Formula: see text] be a connected graph of order [Formula: see text], and [Formula: see text] be an integer with [Formula: see text]. A total-colored graph is total proper[Formula: see text]-tree connected if for every set [Formula: see text] of [Formula: see text] vertices, there exists a total proper [Formula: see text]-tree in [Formula: see text]. The [Formula: see text]-total-proper index of [Formula: see text], denoted by [Formula: see text], is the minimum number of colors required to make [Formula: see text] total proper [Formula: see text]-tree connected. In this paper, we first investigate the [Formula: see text]-total-proper index of some special graphs. Moreover, we characterize the graphs with [Formula: see text]-total-proper index [Formula: see text] and [Formula: see text], respectively.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"83 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74470764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tight Toughness, Isolated Toughness and Binding Number Bounds for the [1,n]-Factors and the {K2,Ci≥4}-Factors [1,n]-因子和{K2,Ci≥4}-因子的紧密韧性、孤立韧性和结合数界限
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-06-21 DOI: 10.1142/s021926592350010x
Xiao Xu, Zhuoma Gao, Lei Meng, Qin Tong
Let [Formula: see text] be an integer. The [Formula: see text]-factor of a graph [Formula: see text] is a spanning subgraph [Formula: see text] if [Formula: see text] for all [Formula: see text], and the [Formula: see text]-factor is a subgraph whose each component is either [Formula: see text] or [Formula: see text]. In this paper, we give the lower bounds with regard to tight toughness, isolated toughness and binding number to guarantee the existence of the [Formula: see text]-factors and [Formula: see text]-factors for a graph.
设[公式:见文本]为整数。如果所有的[公式:见文本]都是[公式:见文本],则图[公式:见文本]的[公式:见文本]因子是一个生成子图[公式:见文本],而[公式:见文本]因子是一个子图,其每个组件要么是[公式:见文本],要么是[公式:见文本]。本文给出了图的紧韧性、孤立韧性和结合数的下界,以保证图的[公式:见文]因子和[公式:见文]因子的存在。
{"title":"Tight Toughness, Isolated Toughness and Binding Number Bounds for the [1,n]-Factors and the {K2,Ci≥4}-Factors","authors":"Xiao Xu, Zhuoma Gao, Lei Meng, Qin Tong","doi":"10.1142/s021926592350010x","DOIUrl":"https://doi.org/10.1142/s021926592350010x","url":null,"abstract":"Let [Formula: see text] be an integer. The [Formula: see text]-factor of a graph [Formula: see text] is a spanning subgraph [Formula: see text] if [Formula: see text] for all [Formula: see text], and the [Formula: see text]-factor is a subgraph whose each component is either [Formula: see text] or [Formula: see text]. In this paper, we give the lower bounds with regard to tight toughness, isolated toughness and binding number to guarantee the existence of the [Formula: see text]-factors and [Formula: see text]-factors for a graph.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"27 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80472320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To Secure the Cloud Application Using a Novel Efficient Deep Learning-Based Forensic Framework 使用新颖高效的基于深度学习的取证框架来保护云应用程序
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-06-21 DOI: 10.1142/s0219265923500081
Sheena Mohammed, Sridevi Rangu
Privacy and security are the most concerning topics while using cloud-based applications. Malware detection in cloud applications is important in identifying application malware activity. So, a novel Goat-based Recurrent Forensic Mechanism (GbRFM) is used to detect the attack and provide the attack type in cloud-based applications. At first, the dataset is pre-processed in the hidden phase, and the errorless features are extracted. The proposed model also trains the output of the hidden layer to identify and classify the malware. The wild goat algorithm enhances the identification rate by accurately detecting the attack. Using the NSL-KDD data, the preset research was verified, and the outcomes were evaluated. The performance assessment indicates that the developed model gained a 99.26% accuracy rate for the NSL-KDD dataset. Moreover, to validate the efficiency of the proposed model, the outcomes are compared with other techniques. The comparison analysis proved that the proposed model attained better results.
在使用基于云的应用程序时,隐私和安全是最受关注的话题。云应用程序中的恶意软件检测对于识别应用程序恶意软件活动非常重要。为此,本文提出了一种基于山羊的循环取证机制(GbRFM)来检测攻击并提供基于云的应用中的攻击类型。首先在隐藏阶段对数据集进行预处理,提取无差错特征;该模型还训练隐藏层的输出来识别和分类恶意软件。野山羊算法通过准确检测攻击,提高了识别率。利用NSL-KDD数据对前期研究进行验证,并对结果进行评价。性能评估表明,该模型对NSL-KDD数据集的准确率达到了99.26%。此外,为了验证该模型的有效性,将结果与其他技术进行了比较。对比分析表明,该模型取得了较好的效果。
{"title":"To Secure the Cloud Application Using a Novel Efficient Deep Learning-Based Forensic Framework","authors":"Sheena Mohammed, Sridevi Rangu","doi":"10.1142/s0219265923500081","DOIUrl":"https://doi.org/10.1142/s0219265923500081","url":null,"abstract":"Privacy and security are the most concerning topics while using cloud-based applications. Malware detection in cloud applications is important in identifying application malware activity. So, a novel Goat-based Recurrent Forensic Mechanism (GbRFM) is used to detect the attack and provide the attack type in cloud-based applications. At first, the dataset is pre-processed in the hidden phase, and the errorless features are extracted. The proposed model also trains the output of the hidden layer to identify and classify the malware. The wild goat algorithm enhances the identification rate by accurately detecting the attack. Using the NSL-KDD data, the preset research was verified, and the outcomes were evaluated. The performance assessment indicates that the developed model gained a 99.26% accuracy rate for the NSL-KDD dataset. Moreover, to validate the efficiency of the proposed model, the outcomes are compared with other techniques. The comparison analysis proved that the proposed model attained better results.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"27 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89833021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nordhaus–Gaddum-Type Results for the k-Independent Number of Graphs 图的k独立数的nordhaus - gaddum型结果
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-06-10 DOI: 10.1142/s021926592350007x
Zhao Wang, Hongfang Liu, Yuhu Liu
The concept of [Formula: see text]-independent set, introduced by Fink and Jacobson in 1986, is a natural generalization of classical independence set. A k-independent set is a set of vertices whose induced subgraph has maximum degree at most [Formula: see text]. The k-independence number of [Formula: see text], denoted by [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-independent set of [Formula: see text]. As a natural counterpart of the [Formula: see text]-independence number, we introduced the concept of [Formula: see text]-edge-independence number. An edge set [Formula: see text] in [Formula: see text] is called k-edge-independent if the maximum degree of the subgraph induced by the edges in [Formula: see text] is less or equal to [Formula: see text]. The k-edge-independence number, denoted [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-edge-independent set. In this paper, we study the Nordhaus–Gaddum-type results for the parameter [Formula: see text] and [Formula: see text]. We obtain sharp upper and lower bounds of [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] for a graph [Formula: see text] of order [Formula: see text]. Some graph classes attaining these bounds are also given.
Fink和Jacobson于1986年提出的[公式:见文]独立集的概念是对经典独立集的自然推广。k无关集是指诱导子图最多具有最大度的顶点集合[公式:见文]。[公式:见文]的k独立数,用[公式:见文]表示,定义为[公式:见文]的[公式:见文]的[公式:见文]独立集合的最大基数。作为[公式:见文]-独立数的自然对应,我们引入了[公式:见文]-边缘独立数的概念。如果由[公式:见文]中的边引起的子图的最大程度小于或等于[公式:见文],则称为[公式:见文]中的边集[公式:见文]中的边集[k-edge-independent]。k-边无关数,记为[公式:见文],定义为[公式:见文]-边无关集的最大基数。本文研究了参数[公式:见文]和[公式:见文]的nordhaus - gaddum型结果。对于有序的[公式:见文]图[公式:见文],我们得到了[公式:见文],[公式:见文],[公式:见文],[公式:见文],[公式:见文],[公式:见文]的清晰的上界和下界。并给出了达到这些边界的一些图类。
{"title":"Nordhaus–Gaddum-Type Results for the k-Independent Number of Graphs","authors":"Zhao Wang, Hongfang Liu, Yuhu Liu","doi":"10.1142/s021926592350007x","DOIUrl":"https://doi.org/10.1142/s021926592350007x","url":null,"abstract":"The concept of [Formula: see text]-independent set, introduced by Fink and Jacobson in 1986, is a natural generalization of classical independence set. A k-independent set is a set of vertices whose induced subgraph has maximum degree at most [Formula: see text]. The k-independence number of [Formula: see text], denoted by [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-independent set of [Formula: see text]. As a natural counterpart of the [Formula: see text]-independence number, we introduced the concept of [Formula: see text]-edge-independence number. An edge set [Formula: see text] in [Formula: see text] is called k-edge-independent if the maximum degree of the subgraph induced by the edges in [Formula: see text] is less or equal to [Formula: see text]. The k-edge-independence number, denoted [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-edge-independent set. In this paper, we study the Nordhaus–Gaddum-type results for the parameter [Formula: see text] and [Formula: see text]. We obtain sharp upper and lower bounds of [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] for a graph [Formula: see text] of order [Formula: see text]. Some graph classes attaining these bounds are also given.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"36 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90752123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nordhaus–Gaddum-Type Results for the Strong Equitable Vertex k-Arboricity of Graphs 图的强公平顶点k-拟性的nordhaus - gaddum型结果
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-31 DOI: 10.1142/s0219265923500068
Zhiwei Guo
For a graph [Formula: see text] and positive integers [Formula: see text], [Formula: see text], a [Formula: see text]-tree-vertex coloring of [Formula: see text] refers to a [Formula: see text]-vertex coloring of [Formula: see text] satisfying every component of each induced subgraph generated by every set of vertices with the same color forms a tree with maximum degree not larger than [Formula: see text], and it is called equitable if the difference between the cardinalities of every pair of sets of vertices with the same color is at most [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of [Formula: see text], denoted by [Formula: see text], is defined as the least positive integer [Formula: see text] satisfying [Formula: see text], which admits an equitable [Formula: see text]-tree-vertex coloring for each integer [Formula: see text] with [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of a graph is very useful in graph theory applications such as load balance in parallel memory systems, constructing timetables and scheduling. In this paper, we present the tight upper and lower bounds on [Formula: see text] for an arbitrary graph [Formula: see text] with [Formula: see text] vertices and a given integer [Formula: see text] with [Formula: see text], and we characterize the extremal graphs [Formula: see text] with [Formula: see text], [Formula: see text], [Formula: see text], respectively. Based on the above extremal results, we further obtain the Nordhaus–Gaddum-type results for [Formula: see text] of graphs [Formula: see text] with [Formula: see text] vertices for a given integer [Formula: see text] with [Formula: see text].
对于图[公式:见文]和正整数[公式:见文]、[公式:见文],[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[顶点着色]满足由每一组相同颜色的顶点所生成的每一个诱导子图的每一个分量形成一棵最大度不大于[公式:如果每一对相同颜色的顶点集合的基数之差不超过[公式:见文本],则称为公平。强公平顶点[公式:见文]-[公式:见文]的树性,用[公式:见文]表示,定义为满足[公式:见文]的最小正整数[公式:见文],它允许每个整数[公式:见文]具有[公式:见文]的公平[公式:见文]-树顶点着色。图的强均衡顶点(公式:见文本)-树性在图论应用中非常有用,例如并行存储系统的负载平衡,构造时间表和调度。本文给出了具有[公式:见文]顶点的任意图[公式:见文]和具有[公式:见文]的给定整数[公式:见文]的紧上界和下界,并分别用[公式:见文]、[公式:见文]、[公式:见文]对极值图[公式:见文]进行了表征。在上述极值结果的基础上,我们进一步得到了给定整数[公式:见文]的顶点[公式:见文]与[公式:见文]的图[公式:见文]的[公式:见文]的[公式:见文]的[诺德豪斯-加德姆型结果。
{"title":"Nordhaus–Gaddum-Type Results for the Strong Equitable Vertex k-Arboricity of Graphs","authors":"Zhiwei Guo","doi":"10.1142/s0219265923500068","DOIUrl":"https://doi.org/10.1142/s0219265923500068","url":null,"abstract":"For a graph [Formula: see text] and positive integers [Formula: see text], [Formula: see text], a [Formula: see text]-tree-vertex coloring of [Formula: see text] refers to a [Formula: see text]-vertex coloring of [Formula: see text] satisfying every component of each induced subgraph generated by every set of vertices with the same color forms a tree with maximum degree not larger than [Formula: see text], and it is called equitable if the difference between the cardinalities of every pair of sets of vertices with the same color is at most [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of [Formula: see text], denoted by [Formula: see text], is defined as the least positive integer [Formula: see text] satisfying [Formula: see text], which admits an equitable [Formula: see text]-tree-vertex coloring for each integer [Formula: see text] with [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of a graph is very useful in graph theory applications such as load balance in parallel memory systems, constructing timetables and scheduling. In this paper, we present the tight upper and lower bounds on [Formula: see text] for an arbitrary graph [Formula: see text] with [Formula: see text] vertices and a given integer [Formula: see text] with [Formula: see text], and we characterize the extremal graphs [Formula: see text] with [Formula: see text], [Formula: see text], [Formula: see text], respectively. Based on the above extremal results, we further obtain the Nordhaus–Gaddum-type results for [Formula: see text] of graphs [Formula: see text] with [Formula: see text] vertices for a given integer [Formula: see text] with [Formula: see text].","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"31 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74424181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 23 (2023) 作者索引第23卷(2023)
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-05-29 DOI: 10.1142/s0219265923990013
{"title":"Author Index Volume 23 (2023)","authors":"","doi":"10.1142/s0219265923990013","DOIUrl":"https://doi.org/10.1142/s0219265923990013","url":null,"abstract":"","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78759893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Big Data Analytics for Human Behavior Recognition in Wireless Sensor Network Based on Transfer Learning 基于迁移学习的无线传感器网络中人类行为识别的移动大数据分析
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-05 DOI: 10.1142/s0219265922420038
Zhexiong Cui, J. Ren
Big data analysis of human behavior can provide the basis and support for the application of various scenarios. Using sensors for human behavior analysis is an effective means of identification method, which is very valuable for research. To address the problems of low recognition accuracy, low recognition efficiency of traditional human behavior recognition (HBR) algorithms in complex scenes, in this paper, we propose an HBR algorithm for Mobile Big data analytics in wireless sensor network using improved transfer learning. First, different wireless sensors are fused to obtain human behavior mobile big data, and then by analyzing the importance of human behavior features (HBF), the dynamic change parameters of HBF extraction threshold are calculated. Second, combined with the dynamic change parameters of threshold, the HBF of complex scenes are extracted. Finally, the best classification function of human behavior in complex scenes is obtained by using the classification function of HBF in complex scenes. Human behavior in complex scenes is classified according to the HBF in the feature set. The HBR algorithm is designed by using the improved transfer learning network to realize the recognition of human behavior in complex scenes. The results show that the proposed algorithm can accurately recognize up to 22 HBF points, and can control the HBR time within 2 s. The human behavior false recognition rate of miscellaneous scenes is less than 10%. The recognition speed is above 10/s, and the recall rate can reach more than 98%, which improves the HBR ability of complex scenes.
人类行为的大数据分析可以为各种场景的应用提供依据和支撑。利用传感器进行人体行为分析是一种有效的识别手段,具有十分重要的研究价值。针对传统人类行为识别(HBR)算法在复杂场景下识别精度低、识别效率低等问题,提出了一种基于改进迁移学习的无线传感器网络移动大数据分析HBR算法。首先融合不同的无线传感器获取人体行为移动大数据,然后通过分析人体行为特征(HBF)的重要性,计算HBF提取阈值的动态变化参数。其次,结合阈值的动态变化参数,提取复杂场景的HBF;最后,利用复杂场景中HBF的分类函数,得到复杂场景中人类行为的最佳分类函数。根据特征集中的HBF对复杂场景中的人类行为进行分类。利用改进的迁移学习网络设计了HBR算法,实现了复杂场景下人类行为的识别。结果表明,该算法可以准确识别多达22个HBF点,并将HBR时间控制在2 s以内。人类行为对杂项场景的错误识别率小于10%。识别速度在10/s以上,召回率可达98%以上,提高了复杂场景的HBR能力。
{"title":"Mobile Big Data Analytics for Human Behavior Recognition in Wireless Sensor Network Based on Transfer Learning","authors":"Zhexiong Cui, J. Ren","doi":"10.1142/s0219265922420038","DOIUrl":"https://doi.org/10.1142/s0219265922420038","url":null,"abstract":"Big data analysis of human behavior can provide the basis and support for the application of various scenarios. Using sensors for human behavior analysis is an effective means of identification method, which is very valuable for research. To address the problems of low recognition accuracy, low recognition efficiency of traditional human behavior recognition (HBR) algorithms in complex scenes, in this paper, we propose an HBR algorithm for Mobile Big data analytics in wireless sensor network using improved transfer learning. First, different wireless sensors are fused to obtain human behavior mobile big data, and then by analyzing the importance of human behavior features (HBF), the dynamic change parameters of HBF extraction threshold are calculated. Second, combined with the dynamic change parameters of threshold, the HBF of complex scenes are extracted. Finally, the best classification function of human behavior in complex scenes is obtained by using the classification function of HBF in complex scenes. Human behavior in complex scenes is classified according to the HBF in the feature set. The HBR algorithm is designed by using the improved transfer learning network to realize the recognition of human behavior in complex scenes. The results show that the proposed algorithm can accurately recognize up to 22 HBF points, and can control the HBR time within 2 s. The human behavior false recognition rate of miscellaneous scenes is less than 10%. The recognition speed is above 10/s, and the recall rate can reach more than 98%, which improves the HBR ability of complex scenes.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"84 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73336443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF INTERCONNECTION NETWORKS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1