首页 > 最新文献

Networks and Heterogeneous Media最新文献

英文 中文
High-order schemes for the fractional coupled nonlinear Schrödinger equation 分数阶耦合非线性Schrödinger方程的高阶格式
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023063
Fengli Yin, Dongliang Xu, Wenjie Yang
This paper considers the fractional coupled nonlinear Schrödinger equation with high degree polynomials in the energy functional that cannot be handled by using the quadratic auxiliary variable method. To this end, we develop the multiple quadratic auxiliary variable approach and then construct a family of structure-preserving schemes with the help of the symplectic Runge-Kutta method for solving the equation. The given schemes have high accuracy in time and can both inherit the mass and Hamiltonian energy of the system. Ample numerical results are given to confirm the accuracy and conservation of the developed schemes at last.
本文研究了能量泛函中不能用二次辅助变量法处理的具有高次多项式的分数阶耦合非线性Schrödinger方程。为此,我们提出了多重二次辅助变量方法,并利用辛龙格-库塔法构造了一类保结构格式。所给出的格式在时间上具有较高的精度,并且可以同时继承系统的质量和哈密顿能量。最后给出了数值结果,验证了所提方案的准确性和守恒性。
{"title":"High-order schemes for the fractional coupled nonlinear Schrödinger equation","authors":"Fengli Yin, Dongliang Xu, Wenjie Yang","doi":"10.3934/nhm.2023063","DOIUrl":"https://doi.org/10.3934/nhm.2023063","url":null,"abstract":"This paper considers the fractional coupled nonlinear Schrödinger equation with high degree polynomials in the energy functional that cannot be handled by using the quadratic auxiliary variable method. To this end, we develop the multiple quadratic auxiliary variable approach and then construct a family of structure-preserving schemes with the help of the symplectic Runge-Kutta method for solving the equation. The given schemes have high accuracy in time and can both inherit the mass and Hamiltonian energy of the system. Ample numerical results are given to confirm the accuracy and conservation of the developed schemes at last.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influence maximization in social networks using role-based embedding 利用基于角色的嵌入实现社交网络中的影响力最大化
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023068
Xu Gu, Zhibin Wang, Xiaoliang Chen, Peng Lu, Yajun Du, Mingwei Tang
Influence maximization (IM), a central issue in optimizing information diffusion on social platforms, aims to spread posts or comments more widely, rapidly, and efficiently. Existing studies primarily focus on the positive effects of incorporating heuristic calculations in IM approaches. However, heuristic models fail to consider the potential enhancements that can be achieved through network representation learning techniques. Some recent work is keen to use representation learning to deal with IM issues. However, few in-depth studies have explored the existing challenges in IM representation learning, specifically regarding the role characteristics and role representations. This paper highlights the potential advantages of combining heuristic computing and role embedding to solve IM problems. First, the method introduces role granularity classification to effectively categorize users into three distinct roles: opinion leaders, structural holes and normal nodes. This classification enables a deeper understanding of the dynamics of users within the network. Second, a novel role-based network embedding (RbNE) algorithm is proposed. By leveraging the concept of node roles, RbNE captures the similarity between nodes, allowing for a more accurate representation of the network structure. Finally, a superior IM approach, named RbneIM, is recommended. RbneIM combines heuristic computing and role embedding to establish a fusion-enhanced IM solution, resulting in an improved influence analysis process. Exploratory outcomes on six social network datasets indicate that the proposed approach outperforms state-of-the-art seeding algorithms in terms of maximizing influence. This finding highlights the effectiveness and efficacy of the proposed method in achieving higher levels of influence within social networks. The code is available at https://github.com/baiyazi/IM2.
影响最大化是优化社交平台信息传播的核心问题,其目的是使帖子或评论更广泛、更快速、更有效地传播。现有的研究主要集中在将启发式计算纳入IM方法的积极影响上。然而,启发式模型没有考虑到通过网络表示学习技术可以实现的潜在增强。最近的一些工作热衷于使用表征学习来处理IM问题。然而,很少有深入的研究探讨即时消息表征学习中存在的挑战,特别是在角色特征和角色表征方面。本文强调了将启发式计算和角色嵌入相结合来解决IM问题的潜在优势。首先,该方法引入角色粒度分类,将用户有效地划分为意见领袖、结构洞和正常节点三种不同的角色。这种分类可以更深入地了解网络中用户的动态。其次,提出了一种新的基于角色的网络嵌入算法。通过利用节点角色的概念,RbNE捕获节点之间的相似性,从而允许更准确地表示网络结构。最后,推荐一种更高级的IM方法,称为RbneIM。RbneIM结合了启发式计算和角色嵌入,建立了融合增强的IM解决方案,从而改进了影响分析过程。在六个社交网络数据集上的探索性结果表明,所提出的方法在最大化影响方面优于最先进的播种算法。这一发现突出了所提出的方法在社会网络中实现更高水平影响力的有效性和功效。代码可在https://github.com/baiyazi/IM2上获得。
{"title":"Influence maximization in social networks using role-based embedding","authors":"Xu Gu, Zhibin Wang, Xiaoliang Chen, Peng Lu, Yajun Du, Mingwei Tang","doi":"10.3934/nhm.2023068","DOIUrl":"https://doi.org/10.3934/nhm.2023068","url":null,"abstract":"Influence maximization (IM), a central issue in optimizing information diffusion on social platforms, aims to spread posts or comments more widely, rapidly, and efficiently. Existing studies primarily focus on the positive effects of incorporating heuristic calculations in IM approaches. However, heuristic models fail to consider the potential enhancements that can be achieved through network representation learning techniques. Some recent work is keen to use representation learning to deal with IM issues. However, few in-depth studies have explored the existing challenges in IM representation learning, specifically regarding the role characteristics and role representations. This paper highlights the potential advantages of combining heuristic computing and role embedding to solve IM problems. First, the method introduces role granularity classification to effectively categorize users into three distinct roles: opinion leaders, structural holes and normal nodes. This classification enables a deeper understanding of the dynamics of users within the network. Second, a novel role-based network embedding (RbNE) algorithm is proposed. By leveraging the concept of node roles, RbNE captures the similarity between nodes, allowing for a more accurate representation of the network structure. Finally, a superior IM approach, named RbneIM, is recommended. RbneIM combines heuristic computing and role embedding to establish a fusion-enhanced IM solution, resulting in an improved influence analysis process. Exploratory outcomes on six social network datasets indicate that the proposed approach outperforms state-of-the-art seeding algorithms in terms of maximizing influence. This finding highlights the effectiveness and efficacy of the proposed method in achieving higher levels of influence within social networks. The code is available at https://github.com/baiyazi/IM2.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology 基于安全密钥数据分发的用户存储传输服务器身份验证过程数学后量子密码学模型
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023057
Santosh Kumar Henge, Gitanjali Jayaraman, M. Sreedevi, Rajakumar R, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, A. Alghamdi
The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.
中央远程服务器对于存储和处理用于云计算评估的数据至关重要。然而,传统系统需要提高其提供技术数据安全解决方案的能力。在当今快速发展的技术中,许多数据安全挑战和复杂性等待着技术解决方案。这些复杂性不能通过组合所有安全加密技术来解决。量子计算有效地发展了复合算法,使网络安全、取证、人工智能和基于机器学习的复杂系统得以自然发展。它还演示了云计算安全中许多具有挑战性问题的解决方案。本文提出了一种基于安全密钥数据分发和数学后量子密码学方法的用户-存储-传输-服务器身份验证过程模型。本研究采用后量子密码数学算法,涉及基于量子计算的安全密钥分发。它提供了在传输、存储、用户和服务器模式下保护数据的安全场景和技术选项。后量子密码学定义并包含了生成分布式安全密钥和传输、存储和编辑中的数据的数学算法。它涉及对许多不同数字的可逆计算,通过超级定位量子位来提供量子服务和其他基于产品的云在线访问,用于处理最终用户基于人工智能的硬件服务组件。这项研究将帮助研究人员和行业专家准备与医疗、金融、工程和银行云服务器同步数据的具体场景。所提出的方法是通过单租户、多租户和云租户级别的服务器以及数据库服务器实现的。该模型是为拥有245个用户的4家企业设计的,它采用了使用盐化技术实现的集成奇偶规则。实验场景考虑从24到8248的纯文本大小,用于分析安全密钥数据分发、密钥生成、加密和解密时间变化。密钥生成和加密时间变化在量子级1为2.3233 ~ 8.7277 ms,在量子级2为0.0355 ~ 1.8491 ms。密钥生成和解密时间变化在量子级1为2.1533 ms ~ 19.4799 ms,在量子级2为0.0525 ms ~ 3.3513 ms。
{"title":"Secure keys data distribution based user-storage-transit server authentication process model using mathematical post-quantum cryptography methodology","authors":"Santosh Kumar Henge, Gitanjali Jayaraman, M. Sreedevi, Rajakumar R, Mamoon Rashid, Sultan S. Alshamrani, Mrim M. Alnfiai, A. Alghamdi","doi":"10.3934/nhm.2023057","DOIUrl":"https://doi.org/10.3934/nhm.2023057","url":null,"abstract":"The central remote servers are essential for storing and processing data for cloud computing evaluation. However, traditional systems need to improve their ability to provide technical data security solutions. Many data security challenges and complexities await technical solutions in today's fast-growing technology. These complexities will not be resolved by combining all secure encryption techniques. Quantum computing efficiently evolves composite algorithms, allowing for natural advances in cyber security, forensics, artificial intelligence, and machine learning-based complex systems. It also demonstrates solutions to many challenging problems in cloud computing security. This study proposes a user-storage-transit-server authentication process model based on secure keys data distribution and mathematical post-quantum cryptography methodology. The post-quantum cryptography mathematical algorithm is used in this study to involve the quantum computing-based distribution of security keys. It provides security scenarios and technical options for securing data in transit, storage, user, and server modes. Post-quantum cryptography has defined and included the mathematical algorithm in generating the distributed security key and the data in transit, on-storage, and on-editing. It has involved reversible computations on many different numbers by super positioning the qubits to provide quantum services and other product-based cloud-online access used to process the end-user's artificial intelligence-based hardware service components. This study will help researchers and industry experts prepare specific scenarios for synchronizing data with medicine, finance, engineering, and banking cloud servers. The proposed methodology is implemented with single-tenant, multi-tenant, and cloud-tenant-level servers and a database server. This model is designed for four enterprises with 245 users, and it employs integration parity rules that are implemented using salting techniques. The experimental scenario considers the plain text size ranging from 24 to 8248 for analyzing secure key data distribution, key generation, encryption, and decryption time variations. The key generation and encryption time variations are 2.3233 ms to 8.7277 ms at quantum-level 1 and 0.0355 ms to 1.8491 ms at quantum-level 2. The key generation and decryption time variations are 2.1533 ms to 19.4799 ms at quantum-level 1 and 0.0525 ms to 3.3513 ms at quantum-level 2.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-order finite difference approximation of the Keller-Segel model with additional self- and cross-diffusion terms and a logistic source 具有附加自扩散项和交叉扩散项和逻辑源的Keller-Segel模型的高阶有限差分逼近
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023065
Panpan Xu, Y. Ge, Lin Zhang
In this paper, we consider the Keller-Segel chemotaxis model with self- and cross-diffusion terms and a logistic source. This system consists of a fully nonlinear reaction-diffusion equation with additional cross-diffusion. We establish some high-order finite difference schemes for solving one- and two-dimensional problems. The truncation error remainder correction method and fourth-order Padé compact schemes are employed to approximate the spatial and temporal derivatives, respectively. It is shown that the numerical schemes yield second-order accuracy in time and fourth-order accuracy in space. Some numerical experiments are demonstrated to verify the accuracy and reliability of the proposed schemes. Furthermore, the blow-up phenomenon and bacterial pattern formation are numerically simulated.
本文考虑具有自扩散项和交叉扩散项和逻辑源的Keller-Segel趋化性模型。该系统由一个带有附加交叉扩散的全非线性反应扩散方程组成。建立了求解一维和二维问题的高阶有限差分格式。采用截断误差余数校正法和四阶pad压缩格式分别逼近空间导数和时间导数。数值格式在时间上具有二阶精度,在空间上具有四阶精度。数值实验验证了所提方案的准确性和可靠性。此外,数值模拟了爆炸现象和细菌模式的形成。
{"title":"High-order finite difference approximation of the Keller-Segel model with additional self- and cross-diffusion terms and a logistic source","authors":"Panpan Xu, Y. Ge, Lin Zhang","doi":"10.3934/nhm.2023065","DOIUrl":"https://doi.org/10.3934/nhm.2023065","url":null,"abstract":"In this paper, we consider the Keller-Segel chemotaxis model with self- and cross-diffusion terms and a logistic source. This system consists of a fully nonlinear reaction-diffusion equation with additional cross-diffusion. We establish some high-order finite difference schemes for solving one- and two-dimensional problems. The truncation error remainder correction method and fourth-order Padé compact schemes are employed to approximate the spatial and temporal derivatives, respectively. It is shown that the numerical schemes yield second-order accuracy in time and fourth-order accuracy in space. Some numerical experiments are demonstrated to verify the accuracy and reliability of the proposed schemes. Furthermore, the blow-up phenomenon and bacterial pattern formation are numerically simulated.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic homogenization on perforated domains III–General estimates for stationary ergodic random connected Lipschitz domains 穿孔区域的随机均匀化iii -平稳遍历随机连通Lipschitz区域的一般估计
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023062
M. Heida
This is Part III of a series on the existence of uniformly bounded extension operators on randomly perforated domains in the context of homogenization theory. Recalling that randomly perforated domains are typically not John and hence extension is possible only from $ W^{1, p} $ to $ W^{1, r} $, $ r < p $, we will show that the existence of such extension operators can be guaranteed if the weighted expectations of four geometric characterizing parameters are bounded: The local Lipschitz constant $ M $, the local inverse Lipschitz radius $ delta^{-1} $ resp. $ rho^{-1} $, the mesoscopic Voronoi diameter $ {mathfrak{d}} $ and the local connectivity radius $ {mathscr{R}} $.
本文是关于均匀化理论下随机穿孔区域上一致有界扩展算子的存在性的系列文章的第三部分。回顾随机穿孔区域通常不是John,因此只能从$ W^{1, p} $到$ W^{1, r} $, $ r < p $进行扩展,我们将证明,如果四个几何表征参数的加权期望是有界的:局部Lipschitz常数$ M $,局部逆Lipschitz半径$ delta^{-1} $ resp,则可以保证这种扩展算子的存在性。$ rho^{-1} $,介观Voronoi直径$ {mathfrak{d}} $和局部连通性半径$ {mathscr{R}} $。
{"title":"Stochastic homogenization on perforated domains III–General estimates for stationary ergodic random connected Lipschitz domains","authors":"M. Heida","doi":"10.3934/nhm.2023062","DOIUrl":"https://doi.org/10.3934/nhm.2023062","url":null,"abstract":"This is Part III of a series on the existence of uniformly bounded extension operators on randomly perforated domains in the context of homogenization theory. Recalling that randomly perforated domains are typically not John and hence extension is possible only from $ W^{1, p} $ to $ W^{1, r} $, $ r < p $, we will show that the existence of such extension operators can be guaranteed if the weighted expectations of four geometric characterizing parameters are bounded: The local Lipschitz constant $ M $, the local inverse Lipschitz radius $ delta^{-1} $ resp. $ rho^{-1} $, the mesoscopic Voronoi diameter $ {mathfrak{d}} $ and the local connectivity radius $ {mathscr{R}} $.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronization of the generalized Kuramoto model with time delay and frustration 具有时滞和挫折的广义Kuramoto模型的同步
4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023077
Tingting Zhu

We studied the collective behaviors of the time-delayed Kuramoto model with frustration under general network topology. For the generalized Kuramoto model with the graph diameter no greater than two and under a sufficient regime in terms of small time delay and frustration and large coupling strength, we showed that the complete frequency synchronization occurs exponentially fast when the initial configuration is distributed in a half circle. We also studied a complete network, which is a small perturbation of all-to-all coupling, as well as presented sufficient frameworks leading to the exponential emergence of frequency synchronization for the initial data confined in a half circle.

< < >我们研究了在一般网络拓扑下具有挫折的延时Kuramoto模型的集体行为。对于图径不大于2的广义Kuramoto模型,在足够的时滞和挫折小、耦合强度大的条件下,我们证明了当初始构型分布在半圆内时,完全频率同步以指数速度发生。我们还研究了一个完整的网络,这是一个小的全对全耦合的扰动,并提出了足够的框架,导致限制在半圆内的初始数据呈指数级出现频率同步。</p></abstract>
{"title":"Synchronization of the generalized Kuramoto model with time delay and frustration","authors":"Tingting Zhu","doi":"10.3934/nhm.2023077","DOIUrl":"https://doi.org/10.3934/nhm.2023077","url":null,"abstract":"<abstract><p>We studied the collective behaviors of the time-delayed Kuramoto model with frustration under general network topology. For the generalized Kuramoto model with the graph diameter no greater than two and under a sufficient regime in terms of small time delay and frustration and large coupling strength, we showed that the complete frequency synchronization occurs exponentially fast when the initial configuration is distributed in a half circle. We also studied a complete network, which is a small perturbation of all-to-all coupling, as well as presented sufficient frameworks leading to the exponential emergence of frequency synchronization for the initial data confined in a half circle.</p></abstract>","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135052318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cardiovascular disease classification based on a multi-classification integrated model 基于多分类集成模型的心血管疾病分类
4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023071
Ai-Ping Zhang, Guang-xin Wang, Wei Zhang, Jing-Yu Zhang

Cardiovascular disease (CVD) has now become the disease with the highest mortality worldwide and coronary artery disease (CAD) is the most common form of CVD. This paper makes effective use of patients' condition information to identify the risk factors of CVD and predict the disease according to these risk factors in order to guide the treatment and life of patients according to these factors, effectively reduce the probability of disease and ensure that patients can carry out timely treatment. In this paper, a novel method based on a new classifier, named multi-agent Adaboost (MA_ADA), has been proposed to diagnose CVD. The proposed method consists of four steps: pre-processing, feature extraction, feature selection and classification. In this method, feature extraction is performed by principal component analysis (PCA). Then a subset of extracted features is selected by the genetics algorithm (GA). This method also uses the novel MA_ADA classifier to diagnose CVD in patients. This method uses a dataset containing information on 303 cardiovascular surgical patients. During the experiments, a four-stage multi-classification study on the prediction of coronary heart disease was conducted. The results show that the prediction model proposed in this paper can effectively identify CVDs using different groups of risk factors, and the highest diagnosis accuracy is obtained when 45 features are used for diagnosis. The results also show that the MA_ADA algorithm could achieve an accuracy of 98.67% in diagnosis, which is at least 1% higher than the compared methods.

& lt; abstract>心血管疾病(CVD)目前已成为世界范围内死亡率最高的疾病,冠状动脉疾病(CAD)是最常见的CVD形式。本文有效利用患者的病情信息,识别心血管疾病的危险因素,并根据这些危险因素进行疾病预测,从而根据这些因素指导患者的治疗和生活,有效降低疾病发生的概率,保证患者能够及时进行治疗。本文提出了一种基于多智能体Adaboost (MA_ADA)分类器的CVD诊断方法。该方法包括预处理、特征提取、特征选择和分类四个步骤。在该方法中,通过主成分分析(PCA)进行特征提取。然后通过遗传算法(GA)选择提取的特征子集。该方法还使用了新的MA_ADA分类器来诊断患者的CVD。该方法使用包含303例心血管手术患者信息的数据集。在实验过程中,对冠心病的预测进行了四阶段多分类研究。结果表明,本文提出的预测模型可以有效地识别不同危险因素组的cvd,当使用45个特征进行诊断时,诊断准确率最高。结果还表明,MA_ADA算法的诊断准确率达到98.67%,比对比方法提高至少1%。</p>& lt; / abstract>
{"title":"Cardiovascular disease classification based on a multi-classification integrated model","authors":"Ai-Ping Zhang, Guang-xin Wang, Wei Zhang, Jing-Yu Zhang","doi":"10.3934/nhm.2023071","DOIUrl":"https://doi.org/10.3934/nhm.2023071","url":null,"abstract":"<abstract> <p>Cardiovascular disease (CVD) has now become the disease with the highest mortality worldwide and coronary artery disease (CAD) is the most common form of CVD. This paper makes effective use of patients' condition information to identify the risk factors of CVD and predict the disease according to these risk factors in order to guide the treatment and life of patients according to these factors, effectively reduce the probability of disease and ensure that patients can carry out timely treatment. In this paper, a novel method based on a new classifier, named multi-agent Adaboost (MA_ADA), has been proposed to diagnose CVD. The proposed method consists of four steps: pre-processing, feature extraction, feature selection and classification. In this method, feature extraction is performed by principal component analysis (PCA). Then a subset of extracted features is selected by the genetics algorithm (GA). This method also uses the novel MA_ADA classifier to diagnose CVD in patients. This method uses a dataset containing information on 303 cardiovascular surgical patients. During the experiments, a four-stage multi-classification study on the prediction of coronary heart disease was conducted. The results show that the prediction model proposed in this paper can effectively identify CVDs using different groups of risk factors, and the highest diagnosis accuracy is obtained when 45 features are used for diagnosis. The results also show that the MA_ADA algorithm could achieve an accuracy of 98.67% in diagnosis, which is at least 1% higher than the compared methods.</p> </abstract>","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135401856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal secret share distribution in degree splitting communication networks 度拆分通信网络中最优秘密共享分配
4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023075
Raúl M. Falcón, Venkitachalam Aparna, Nagaraj Mohanapriya

Dynamic coloring has recently emerged as a valuable tool to optimize cryptographic protocols based on secret sharing, which enforce data security in communication networks and have significant importance in both online storage and cloud computing. This type of graph labeling enables the dealer to distribute secret shares among the nodes of a communication network so that everybody can recover the secret after a minimum number of rounds of communication. This paper delves into this topic by dealing with the dynamic coloring problem for degree splitting graphs. The topological structure of the latter enables the dealer to avoid dishonesty by adding control nodes that supervise all those participants with a similar influence in the network. More precisely, we solve the dynamic coloring problem for degree splitting graphs of any regular graph. The irregular case is partially solved by establishing a lower bound for the corresponding dynamic chromatic number. As illustrative examples, we solve the dynamic coloring problem for the degree splitting graphs of cycles, cocktail, book, comb, fan, jellyfish, windmill and barbell graphs.

动态着色最近成为一种有价值的工具,用于优化基于秘密共享的加密协议,它增强了通信网络中的数据安全性,并且在在线存储和云计算中都具有重要意义。这种类型的图标记使经销商能够在通信网络的节点之间分发秘密共享,使得每个人都可以在最少的通信轮数后恢复秘密。本文通过对度分裂图的动态着色问题进行研究。后者的拓扑结构使经销商能够通过增加控制节点来监督网络中具有相似影响力的所有参与者,从而避免不诚实行为。更准确地说,我们解决了任意正则图的度分裂图的动态着色问题。通过建立相应动态色数的下界,部分地解决了不规则情况。作为示例,我们解决了循环图、鸡尾酒图、书图、梳子图、扇形图、水母图、风车图和杠铃图的度分裂图的动态着色问题。</p></abstract>
{"title":"Optimal secret share distribution in degree splitting communication networks","authors":"Raúl M. Falcón, Venkitachalam Aparna, Nagaraj Mohanapriya","doi":"10.3934/nhm.2023075","DOIUrl":"https://doi.org/10.3934/nhm.2023075","url":null,"abstract":"<abstract><p>Dynamic coloring has recently emerged as a valuable tool to optimize cryptographic protocols based on secret sharing, which enforce data security in communication networks and have significant importance in both online storage and cloud computing. This type of graph labeling enables the dealer to distribute secret shares among the nodes of a communication network so that everybody can recover the secret after a minimum number of rounds of communication. This paper delves into this topic by dealing with the dynamic coloring problem for degree splitting graphs. The topological structure of the latter enables the dealer to avoid dishonesty by adding control nodes that supervise all those participants with a similar influence in the network. More precisely, we solve the dynamic coloring problem for degree splitting graphs of any regular graph. The irregular case is partially solved by establishing a lower bound for the corresponding dynamic chromatic number. As illustrative examples, we solve the dynamic coloring problem for the degree splitting graphs of cycles, cocktail, book, comb, fan, jellyfish, windmill and barbell graphs.</p></abstract>","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136305114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Iterative learning algorithms for boundary tracing problems of nonlinear fractional diffusion equations 非线性分数扩散方程边界跟踪问题的迭代学习算法
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023059
Jungang Wang, Qingyang Si, Jun Bao, Qian Wang
In this paper, the iterative learning control technique is extended to distributed parameter systems governed by nonlinear fractional diffusion equations. Based on $ P $-type and $ PI^{theta} $-type iterative learning control methods, sufficient conditions for the convergences of systems are given. Finally, numerical examples are presented to illustrate the efficiency of the proposed iterative schemes. The numerical results show that the closed-loop iterative learning control scheme converges faster than the open-loop iterative learning control scheme and the $ PI^{theta} $-type iterative learning control scheme converges faster than the $ P $-type and the $ PI $-type iterative learning control scheme.
本文将迭代学习控制技术推广到由非线性分数扩散方程控制的分布参数系统。基于$ P $型和$ PI^{theta} $型迭代学习控制方法,给出了系统收敛的充分条件。最后,通过数值算例说明了所提迭代格式的有效性。数值结果表明,闭环迭代学习控制方案收敛速度快于开环迭代学习控制方案,$ PI^{theta} $型迭代学习控制方案收敛速度快于$ P $型和$ PI $型迭代学习控制方案。
{"title":"Iterative learning algorithms for boundary tracing problems of nonlinear fractional diffusion equations","authors":"Jungang Wang, Qingyang Si, Jun Bao, Qian Wang","doi":"10.3934/nhm.2023059","DOIUrl":"https://doi.org/10.3934/nhm.2023059","url":null,"abstract":"In this paper, the iterative learning control technique is extended to distributed parameter systems governed by nonlinear fractional diffusion equations. Based on $ P $-type and $ PI^{theta} $-type iterative learning control methods, sufficient conditions for the convergences of systems are given. Finally, numerical examples are presented to illustrate the efficiency of the proposed iterative schemes. The numerical results show that the closed-loop iterative learning control scheme converges faster than the open-loop iterative learning control scheme and the $ PI^{theta} $-type iterative learning control scheme converges faster than the $ P $-type and the $ PI $-type iterative learning control scheme.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bicriteria multi-machine scheduling with equal processing times subject to release dates 双标准多机器调度,处理时间相同,取决于发布日期
IF 1 4区 数学 Q2 Mathematics Pub Date : 2023-01-01 DOI: 10.3934/nhm.2023060
Zhimeng Liu, Shuguang Li, Muhammad Ijaz Khan, Shaimaa A M Abdelmohsen, S. M. Eldin
This paper addresses the problem of scheduling $ n $ equal-processing-time jobs with release dates non-preemptively on identical machines to optimize two criteria simultaneously or hierarchically. For simultaneous optimization of total completion time (and makespan) and maximum cost, an algorithm is presented which can produce all Pareto-optimal points together with the corresponding schedules. The algorithm is then adapted to solve the hierarchical optimization of two min-max criteria, and the final schedule has a minimum total completion time and minimum makespan among the hierarchical optimal schedules. The two algorithms provided in this paper run in $ O(n^3) $ time.
本文解决了在同一机器上非抢占地调度n个具有发布日期的等处理时间作业的问题,以同时或分层地优化两个标准。针对总完工时间(和最大完工时间)和最大成本的同时优化问题,提出了一种能产生所有帕累托最优点和相应调度的算法。然后将该算法应用于求解两个最小-最大准则的分层优化问题,使最终方案在分层最优方案中具有总完工时间和最大完工时间最小的方案。本文提供的两种算法运行时间为$ O(n^3) $。
{"title":"Bicriteria multi-machine scheduling with equal processing times subject to release dates","authors":"Zhimeng Liu, Shuguang Li, Muhammad Ijaz Khan, Shaimaa A M Abdelmohsen, S. M. Eldin","doi":"10.3934/nhm.2023060","DOIUrl":"https://doi.org/10.3934/nhm.2023060","url":null,"abstract":"This paper addresses the problem of scheduling $ n $ equal-processing-time jobs with release dates non-preemptively on identical machines to optimize two criteria simultaneously or hierarchically. For simultaneous optimization of total completion time (and makespan) and maximum cost, an algorithm is presented which can produce all Pareto-optimal points together with the corresponding schedules. The algorithm is then adapted to solve the hierarchical optimization of two min-max criteria, and the final schedule has a minimum total completion time and minimum makespan among the hierarchical optimal schedules. The two algorithms provided in this paper run in $ O(n^3) $ time.","PeriodicalId":54732,"journal":{"name":"Networks and Heterogeneous Media","volume":null,"pages":null},"PeriodicalIF":1.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70228395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Networks and Heterogeneous Media
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1