首页 > 最新文献

Concurrency and Computation-Practice & Experience最新文献

英文 中文
Improving QoS in cloud resources scheduling using dynamic clustering algorithm and SM-CDC scheduling model 利用动态聚类算法和 SM-CDC 调度模型改善云资源调度的 QoS
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-29 DOI: 10.1002/cpe.8279
Tayebeh Varmeziar, Mohamad Ebrahim Shiri, Parisa Rahmani

Quality of Service (QoS) regulates and controls network resources by setting priorities for specific data types. Many clustering algorithms are used to cluster cloud workloads, most of which are static. However, the lack of dynamic algorithms is seen in the face of huge databases that are real-time and according to the existing clustering conditions. Additionally, fair allocation of tasks on servers and efficient resource utilization pose challenges. In this research, two solutions are proposed to improve the quality of service: the first solution uses the chameleon dynamic algorithm, a method to improve service quality. The chameleon algorithm has been able to show significant performance due to its high accuracy in detecting the smallest distance between clusters. This dynamic algorithm outperforms static algorithms with classification accuracy and response speed, which are the most important parameters of service quality. The second part of the proposed solution is to use the Scheduling Model using Cloud Data Centers (SM-CDC) system to select the best service provider based on the clustering done in the previous step. A SM-CDC technique is developed to handle cloud storage center tasks that are stored in electronic devices. According to the comparison with existing scheduling policies, SM-CDC offered 36% decrease on response time, 50% reduction on cost of resources, and 40% improvement on QoS Satisfaction.

服务质量(QoS)通过为特定数据类型设置优先级来调节和控制网络资源。许多聚类算法被用于对云工作负载进行聚类,其中大部分都是静态的。然而,面对实时且符合现有聚类条件的庞大数据库,动态算法却显得不足。此外,服务器上任务的公平分配和资源的高效利用也提出了挑战。本研究提出了两种解决方案来提高服务质量:第一种解决方案采用变色龙动态算法,这是一种提高服务质量的方法。变色龙算法在检测簇间最小距离方面具有很高的准确性,因此能够显示出显著的性能。这种动态算法在分类准确性和响应速度方面优于静态算法,而这正是服务质量最重要的参数。拟议解决方案的第二部分是使用云数据中心调度模型(SM-CDC)系统,根据上一步完成的聚类选择最佳服务提供商。我们开发了一种 SM-CDC 技术,用于处理存储在电子设备中的云存储中心任务。根据与现有调度策略的比较,SM-CDC 的响应时间缩短了 36%,资源成本降低了 50%,服务质量满意度提高了 40%。
{"title":"Improving QoS in cloud resources scheduling using dynamic clustering algorithm and SM-CDC scheduling model","authors":"Tayebeh Varmeziar,&nbsp;Mohamad Ebrahim Shiri,&nbsp;Parisa Rahmani","doi":"10.1002/cpe.8279","DOIUrl":"https://doi.org/10.1002/cpe.8279","url":null,"abstract":"<div>\u0000 \u0000 <p>Quality of Service (QoS) regulates and controls network resources by setting priorities for specific data types. Many clustering algorithms are used to cluster cloud workloads, most of which are static. However, the lack of dynamic algorithms is seen in the face of huge databases that are real-time and according to the existing clustering conditions. Additionally, fair allocation of tasks on servers and efficient resource utilization pose challenges. In this research, two solutions are proposed to improve the quality of service: the first solution uses the chameleon dynamic algorithm, a method to improve service quality. The chameleon algorithm has been able to show significant performance due to its high accuracy in detecting the smallest distance between clusters. This dynamic algorithm outperforms static algorithms with classification accuracy and response speed, which are the most important parameters of service quality. The second part of the proposed solution is to use the Scheduling Model using Cloud Data Centers (SM-CDC) system to select the best service provider based on the clustering done in the previous step. A SM-CDC technique is developed to handle cloud storage center tasks that are stored in electronic devices. According to the comparison with existing scheduling policies, SM-CDC offered 36% decrease on response time, 50% reduction on cost of resources, and 40% improvement on QoS Satisfaction.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Camellia oleifera trunks detection and identification based on improved YOLOv7 基于改进型 YOLOv7 的油茶树干检测和识别技术
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-17 DOI: 10.1002/cpe.8265
Haorui Wang, Yang Liu, Hong Luo, Yuanyin Luo, Yuyan Zhang, Fei Long, Lijun Li

Camellia oleifera typically thrives in unstructured environments, making the identification of its trunks crucial for advancing agricultural robots towards modernization and sustainability. Traditional target detection algorithms, however, fall short in accurately identifying Camellia oleifera trunks, especially in scenarios characterized by small targets and poor lighting. This article introduces an enhanced trunk detection algorithm for Camellia oleifera based on an improved YOLOv7 model. This model incorporates dynamic snake convolution instead of standard convolutions to bolster its feature extraction capabilities. It integrates more contextual information, thus enhancing the model's generalization ability across various scenes. Additionally, coordinate attention is introduced to refine the model's spatial feature representation, amplifying the network's focus on essential target region features, which in turn boosts detection accuracy and robustness. This feature selectively strengthens response levels across different channels, prioritizing key attributes for classification and localization. Moreover, the original coordinate loss function of YOLOv7 is replaced with EIoU loss, further enhancing the model's robustness and convergence speed. Experimental results demonstrate a recall rate of 96%, a mean average precision (mAP) of 87.9%, an F1 score of 0.87, and a detection speed of 18 milliseconds per frame. When compared with other models like Faster-RCNN, YOLOv3, ScaledYOLOv4, YOLOv5, and the original YOLOv7, our improved model shows mAP increases of 8.1%, 7.0%, 7.5%, and 6.6% respectively. Occupying only 70.8 MB, our model requires 9.8 MB less memory than the original YOLOv7. This model not only achieves high accuracy and detection efficiency but is also easily deployable on mobile devices, providing a robust foundation for future intelligent harvesting technologies.

油茶通常生长在非结构化环境中,因此识别其树干对于推动农业机器人实现现代化和可持续发展至关重要。然而,传统的目标检测算法在准确识别油茶树干方面存在不足,尤其是在目标小、光照差的情况下。本文介绍了一种基于改进型 YOLOv7 模型的增强型油茶树干检测算法。该模型采用动态蛇形卷积代替标准卷积,以增强其特征提取能力。它整合了更多的上下文信息,从而增强了模型在各种场景中的泛化能力。此外,还引入了坐标注意力来完善模型的空间特征表征,从而增强网络对重要目标区域特征的关注,进而提高检测的准确性和鲁棒性。这一特征可选择性地加强不同通道的响应水平,优先考虑分类和定位的关键属性。此外,YOLOv7 的原始坐标损失函数被 EIoU 损失所取代,进一步提高了模型的鲁棒性和收敛速度。实验结果表明,该模型的召回率为 96%,平均精度 (mAP) 为 87.9%,F1 分数为 0.87,检测速度为每帧 18 毫秒。与其他模型(如 Faster-RCNN、YOLOv3、ScaledYOLOv4、YOLOv5 和原始 YOLOv7)相比,我们改进的模型的 mAP 分别提高了 8.1%、7.0%、7.5% 和 6.6%。我们的模型仅占用 70.8 MB 内存,比原来的 YOLOv7 少占用 9.8 MB 内存。该模型不仅实现了高精度和高检测效率,而且易于在移动设备上部署,为未来的智能采集技术奠定了坚实的基础。
{"title":"Camellia oleifera trunks detection and identification based on improved YOLOv7","authors":"Haorui Wang,&nbsp;Yang Liu,&nbsp;Hong Luo,&nbsp;Yuanyin Luo,&nbsp;Yuyan Zhang,&nbsp;Fei Long,&nbsp;Lijun Li","doi":"10.1002/cpe.8265","DOIUrl":"https://doi.org/10.1002/cpe.8265","url":null,"abstract":"<div>\u0000 \u0000 <p><i>Camellia oleifera</i> typically thrives in unstructured environments, making the identification of its trunks crucial for advancing agricultural robots towards modernization and sustainability. Traditional target detection algorithms, however, fall short in accurately identifying <i>Camellia oleifera</i> trunks, especially in scenarios characterized by small targets and poor lighting. This article introduces an enhanced trunk detection algorithm for <i>Camellia oleifera</i> based on an improved YOLOv7 model. This model incorporates dynamic snake convolution instead of standard convolutions to bolster its feature extraction capabilities. It integrates more contextual information, thus enhancing the model's generalization ability across various scenes. Additionally, coordinate attention is introduced to refine the model's spatial feature representation, amplifying the network's focus on essential target region features, which in turn boosts detection accuracy and robustness. This feature selectively strengthens response levels across different channels, prioritizing key attributes for classification and localization. Moreover, the original coordinate loss function of YOLOv7 is replaced with EIoU loss, further enhancing the model's robustness and convergence speed. Experimental results demonstrate a recall rate of 96%, a mean average precision (mAP) of 87.9%, an F1 score of 0.87, and a detection speed of 18 milliseconds per frame. When compared with other models like Faster-RCNN, YOLOv3, ScaledYOLOv4, YOLOv5, and the original YOLOv7, our improved model shows mAP increases of 8.1%, 7.0%, 7.5%, and 6.6% respectively. Occupying only 70.8 MB, our model requires 9.8 MB less memory than the original YOLOv7. This model not only achieves high accuracy and detection efficiency but is also easily deployable on mobile devices, providing a robust foundation for future intelligent harvesting technologies.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extreme learning with projection relational algebraic secured data transmission for big cloud data 针对大云数据的极限学习与投影关系代数安全数据传输
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-10 DOI: 10.1002/cpe.8273
G. Sakthivel, P. Madhubala

Cloud Computing (CC) and big data are growing technology in the business. Big data is demonstrated in terms of volume, variety, and velocity. CC is employed for storing, processing, and accessing data. Many cryptographic techniques have been developed to enhance big data security in cloud computing. However, security and privacy are the primary concerns in protecting data, as it is highly sensitive. Yet, it faces the major problems of inefficient performance, increased time consumption, and lack of data confidentiality and integrity. To address this issue, proposed Extreme Learning with Projection Relational Algebraic Secured Data Transmission (ELPRA-SDT) is introduced to secure data transactions from cloud users to cloud servers with enhanced data confidentiality and reduced time consumption for big cloud data. The proposed ELPRA-SDT consists of two major processes namely registration and key generation. At first, the user's IP address is registered employing a transitive advanced set relation theory graph model in a cloud server (CS) for retrieving the numerous services. The CS generates private and public keys for each registered user's IP address using the Transitive Operational and Time Synchronized Random Winternitz Key generation model. After, the user sends a request to the CS for acquiring data. The CS validates the requested user based on security policy attributes. Second, the Projection Relational Algebraic Signcryption and Unsigncryption algorithm performs signature verification to ensure secure data access for protecting the data. Results of experiments carried out by using Coburg Intrusion Detection Data Sets-001 dataset in Java. ELPRA-SDT method is more efficient and more suitable for providing security and privacy to network traces in the Cloud. The result shows maximum performance with data confidentiality by 10% and data integrity by 13%. In addition, delay is reduced by 32%, and data delivery time and communication complexity is decreased by 28% and 24% to other existing methods.

云计算(CC)和大数据是企业中不断发展的技术。大数据表现在数量、种类和速度方面。云计算用于存储、处理和访问数据。为提高云计算中大数据的安全性,人们开发了许多加密技术。然而,由于数据高度敏感,安全和隐私是保护数据的首要问题。然而,它面临着性能效率低下、时间消耗增加、缺乏数据保密性和完整性等主要问题。为解决这一问题,提出了极限学习与投影关系代数安全数据传输(ELPRA-SDT),以确保从云用户到云服务器之间的数据交易安全,提高数据保密性,减少大云数据的时间消耗。所提出的 ELPRA-SDT 包括两个主要过程,即注册和密钥生成。首先,在云服务器(CS)中使用反式高级集合关系理论图模型注册用户的 IP 地址,以便检索众多服务。云服务器使用跨操作和时间同步随机温特尼茨密钥生成模型为每个注册用户的 IP 地址生成私钥和公钥。之后,用户向 CS 发送获取数据的请求。CS 根据安全策略属性验证请求的用户。其次,投影关系代数签名加密和非签名加密算法执行签名验证,以确保安全访问数据,从而保护数据。使用 Java 中的 Coburg Intrusion Detection Data Sets-001 数据集进行的实验结果。ELPRA-SDT 方法更高效,更适合为云中的网络痕迹提供安全和隐私保护。结果表明,该方法性能最高,数据保密性提高了 10%,数据完整性提高了 13%。此外,与其他现有方法相比,延迟减少了 32%,数据传输时间和通信复杂性分别减少了 28% 和 24%。
{"title":"Extreme learning with projection relational algebraic secured data transmission for big cloud data","authors":"G. Sakthivel,&nbsp;P. Madhubala","doi":"10.1002/cpe.8273","DOIUrl":"https://doi.org/10.1002/cpe.8273","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud Computing (CC) and big data are growing technology in the business. Big data is demonstrated in terms of volume, variety, and velocity. CC is employed for storing, processing, and accessing data. Many cryptographic techniques have been developed to enhance big data security in cloud computing. However, security and privacy are the primary concerns in protecting data, as it is highly sensitive. Yet, it faces the major problems of inefficient performance, increased time consumption, and lack of data confidentiality and integrity. To address this issue, proposed Extreme Learning with Projection Relational Algebraic Secured Data Transmission (ELPRA-SDT) is introduced to secure data transactions from cloud users to cloud servers with enhanced data confidentiality and reduced time consumption for big cloud data. The proposed ELPRA-SDT consists of two major processes namely registration and key generation. At first, the user's IP address is registered employing a transitive advanced set relation theory graph model in a cloud server (CS) for retrieving the numerous services. The CS generates private and public keys for each registered user's IP address using the Transitive Operational and Time Synchronized Random Winternitz Key generation model. After, the user sends a request to the CS for acquiring data. The CS validates the requested user based on security policy attributes. Second, the Projection Relational Algebraic Signcryption and Unsigncryption algorithm performs signature verification to ensure secure data access for protecting the data. Results of experiments carried out by using Coburg Intrusion Detection Data Sets-001 dataset in Java. ELPRA-SDT method is more efficient and more suitable for providing security and privacy to network traces in the Cloud. The result shows maximum performance with data confidentiality by 10% and data integrity by 13%. In addition, delay is reduced by 32%, and data delivery time and communication complexity is decreased by 28% and 24% to other existing methods.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A competent CCHFMO with AMDH for QoS improvisation and efficient route protection in MANET 采用 AMDH 的合格 CCHFMO 可改善城域网的服务质量并提供高效路由保护
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-09 DOI: 10.1002/cpe.8272
Gajendra Kumar Ahirwar, Ratish Agarwal, Anjana Pandey

The ability of mobile ad hoc networks (MANET) to be used as communication tools in a variety of industries, including healthcare, the military, smart traffic, and smart cities, has drawn special consideration. Traditional Manet's multicast routing methods seem to be inappropriate to massive with Adaptive systems because the problem is NP-complete, resulting in an enchanting QoS restrictions. In order to conquer that the paper proficiently introduces the Conglomerate Crumb Horde Formicary Meta-Heuristic (CCHFMO) with Asymmetrical Meander Diffie-Hellman (AMDH) to tackle the major obstacles are multicast routing problems and lack of data protection. Initially, the fusion of crumb horde optimization (CHO) and formicary optimization (FO) is exploited to strengthen QoS limitations and reduce QoS data loss. However, the massive and dynamic nature of the network with the combination of more QoS restrictions, deficient security has become extremely difficult. Therefore, the research work establishes the asymmetrical meander Diffie-Hellman (AMDH) to significantly improve performance and concealment while ensuring channel security during data transfer. Finally, the results demonstrated that by employing the novel optimization approaches, the MANET can increase data protection while still achieving high transmission rates and sophistication of communication. As a consequence, it adequately explicates the article to improve QoS performances.

在医疗保健、军事、智能交通和智能城市等各行各业中,移动特设网络(MANET)作为通信工具的能力引起了人们的特别关注。传统的 MANET 组播路由选择方法似乎不适合大规模自适应系统,因为该问题是 NP-complete,会导致令人着迷的 QoS 限制。为了解决这个问题,本文引入了具有非对称漫游 Diffie-Hellman (AMDH) 的 Crumb Horde Formicary Meta-Heuristic (CCHFMO),以解决组播路由问题和缺乏数据保护等主要障碍。最初,人们利用屑群优化(CHO)和格式优化(FO)的融合来加强 QoS 限制并减少 QoS 数据丢失。然而,网络的庞大性和动态性与更多的 QoS 限制、安全性缺陷相结合,变得异常困难。因此,研究工作建立了非对称蜿蜒 Diffie-Hellman(AMDH),在确保数据传输过程中信道安全的同时,显著提高了性能和隐蔽性。最后,研究结果表明,通过采用新颖的优化方法,城域网在实现高传输速率和复杂通信的同时,还能提高数据保护能力。因此,这篇文章充分阐述了如何提高 QoS 性能。
{"title":"A competent CCHFMO with AMDH for QoS improvisation and efficient route protection in MANET","authors":"Gajendra Kumar Ahirwar,&nbsp;Ratish Agarwal,&nbsp;Anjana Pandey","doi":"10.1002/cpe.8272","DOIUrl":"https://doi.org/10.1002/cpe.8272","url":null,"abstract":"<div>\u0000 \u0000 <p>The ability of mobile ad hoc networks (MANET) to be used as communication tools in a variety of industries, including healthcare, the military, smart traffic, and smart cities, has drawn special consideration. Traditional Manet's multicast routing methods seem to be inappropriate to massive with Adaptive systems because the problem is NP-complete, resulting in an enchanting QoS restrictions. In order to conquer that the paper proficiently introduces the Conglomerate Crumb Horde Formicary Meta-Heuristic (CCHFMO) with Asymmetrical Meander Diffie-Hellman (AMDH) to tackle the major obstacles are multicast routing problems and lack of data protection. Initially, the fusion of crumb horde optimization (CHO) and formicary optimization (FO) is exploited to strengthen QoS limitations and reduce QoS data loss. However, the massive and dynamic nature of the network with the combination of more QoS restrictions, deficient security has become extremely difficult. Therefore, the research work establishes the asymmetrical meander Diffie-Hellman (AMDH) to significantly improve performance and concealment while ensuring channel security during data transfer. Finally, the results demonstrated that by employing the novel optimization approaches, the MANET can increase data protection while still achieving high transmission rates and sophistication of communication. As a consequence, it adequately explicates the article to improve QoS performances.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel controllability method on complex temporal networks based on temporal motifs 基于时序图案的复杂时序网络可控性新方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-05 DOI: 10.1002/cpe.8278
Yan Jin, Peyman Arebi

Complex temporal networks have become instrumental in modeling dynamic systems across various disciplines, presenting unique challenges and opportunities in understanding and influencing their behavior. Controllability, a fundamental aspect of network dynamics, plays a pivotal role in manipulating these systems towards desired states. Temporal motifs are important patterns in temporal complex networks that have many applications in solving problems related to this type of networks. In this paper, a novel method for controlling temporal complex networks using temporal motifs is proposed. First, the most important effective temporal motifs in the controllability processes of complex networks have been identified and it has been shown that the network can be fully controlled using these temporal motifs. Then, an algorithm for extracting temporal motifs is proposed. This algorithm has been proposed to identify effective temporal motifs in network controllability to optimally identify control nodes. To increase the efficiency of extracting temporal motifs, a method for predicting the temporal motif-based link has been proposed, which predicts temporal motifs. The results of the simulation of the proposed method based on temporal motifs and its implementation on real-world temporal complex networks demonstrates that its performance was better than the conventional controllability methods.

复杂时态网络已成为各学科动态系统建模的重要工具,为理解和影响这些系统的行为带来了独特的挑战和机遇。可控性是网络动力学的一个基本方面,在操纵这些系统实现理想状态方面发挥着关键作用。时态图案是时态复杂网络中的重要模式,在解决与这类网络相关的问题时有很多应用。本文提出了一种利用时态图案控制时态复杂网络的新方法。首先,确定了复杂网络可控性过程中最重要的有效时态图案,并证明利用这些时态图案可以完全控制网络。然后,提出了一种提取时空图案的算法。该算法旨在识别网络可控性中的有效时序图案,从而优化识别控制节点。为了提高提取时空主题的效率,提出了一种基于时空主题的链接预测方法,该方法可预测时空主题。对所提出的基于时态图案的方法进行了仿真,并在现实世界的时态复杂网络上进行了实施,结果表明其性能优于传统的可控性方法。
{"title":"A novel controllability method on complex temporal networks based on temporal motifs","authors":"Yan Jin,&nbsp;Peyman Arebi","doi":"10.1002/cpe.8278","DOIUrl":"https://doi.org/10.1002/cpe.8278","url":null,"abstract":"<div>\u0000 \u0000 <p>Complex temporal networks have become instrumental in modeling dynamic systems across various disciplines, presenting unique challenges and opportunities in understanding and influencing their behavior. Controllability, a fundamental aspect of network dynamics, plays a pivotal role in manipulating these systems towards desired states. Temporal motifs are important patterns in temporal complex networks that have many applications in solving problems related to this type of networks. In this paper, a novel method for controlling temporal complex networks using temporal motifs is proposed. First, the most important effective temporal motifs in the controllability processes of complex networks have been identified and it has been shown that the network can be fully controlled using these temporal motifs. Then, an algorithm for extracting temporal motifs is proposed. This algorithm has been proposed to identify effective temporal motifs in network controllability to optimally identify control nodes. To increase the efficiency of extracting temporal motifs, a method for predicting the temporal motif-based link has been proposed, which predicts temporal motifs. The results of the simulation of the proposed method based on temporal motifs and its implementation on real-world temporal complex networks demonstrates that its performance was better than the conventional controllability methods.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults 通过考虑永久性故障评估工业应用中无线传感器网络的可靠性和可用性
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-04 DOI: 10.1002/cpe.8252
Arash Heidari, Zahra Amiri, Mohammad Ali Jabraeil Jamali, Nima Jafari

Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions. To make sure network performance, a lot of study needs to be done to improve failure tolerance and stability. This study looks at how to judge the availability and dependability of WSNs that have long-term issues. The suggested method checks how well a network works in various failure cases by using fault trees and Markov chain analysis. Such methods help us find and study possible failure scenarios and how they might impact the network's dependability in a planned way. The results show that WSNs have major flaws and give useful suggestions for making the systems work better. The findings show that using these evaluation methods may greatly enhance the ability to handle faults, lower the risk of damage, and allow developers of WSNs to make smart choices.

无线传感器网络(WSN)对于方圆一英里内的通信和工业应用至关重要。这些网络由于节点数量庞大、硬件和软件限制独特,很容易出现故障。为确保网络性能,需要进行大量研究,以提高故障容限和稳定性。本研究探讨了如何判断存在长期问题的 WSN 的可用性和可靠性。所建议的方法通过使用故障树和马尔可夫链分析来检查网络在各种故障情况下的工作情况。这些方法可以帮助我们找到并研究可能出现的故障情况,以及这些情况会如何有计划地影响网络的可靠性。结果表明,WSN 存在重大缺陷,并为使系统更好地运行提出了有用的建议。研究结果表明,使用这些评估方法可以大大提高处理故障的能力,降低损坏的风险,并让 WSN 的开发人员做出明智的选择。
{"title":"Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults","authors":"Arash Heidari,&nbsp;Zahra Amiri,&nbsp;Mohammad Ali Jabraeil Jamali,&nbsp;Nima Jafari","doi":"10.1002/cpe.8252","DOIUrl":"https://doi.org/10.1002/cpe.8252","url":null,"abstract":"<p>Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions. To make sure network performance, a lot of study needs to be done to improve failure tolerance and stability. This study looks at how to judge the availability and dependability of WSNs that have long-term issues. The suggested method checks how well a network works in various failure cases by using fault trees and Markov chain analysis. Such methods help us find and study possible failure scenarios and how they might impact the network's dependability in a planned way. The results show that WSNs have major flaws and give useful suggestions for making the systems work better. The findings show that using these evaluation methods may greatly enhance the ability to handle faults, lower the risk of damage, and allow developers of WSNs to make smart choices.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/cpe.8252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks 基于 LoRaWAN 的物联网网络的安全设备认证和密钥协议机制
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-03 DOI: 10.1002/cpe.8283
Devishree Naidu, Niranjan K. Ray

The proposed work introduces two schemes for secure device authentication and key agreement (SDA & KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu–Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA & KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.

所提出的工作为安全设备认证和密钥协议(SDA & KA)机制引入了两种方案。首先,在第一阶段开发了一种基于椭圆曲线Qu-Vanstone(EIC-EcQuV)方案的高效隐式证书方法,以即时商定会话密钥。所提出的方案可隐含地对公钥进行快速验证。此外,该方案还能防止攻击者创建虚假密钥组合。通过 EIC-EcQuV,分发的隐式证书(IC)有助于对用户进行隐式认证。这项工作还在第二阶段提出了它开发的公钥无证书密码系统(PKCIC)方案,该方案也适用于 SDA & KA 机制。在 EIC-EcQuV 方案中,验证是有效的,但公钥有可能被盗。然而,在 PKCIC 方案中,认证是通过部分密钥进行的,而公钥则是通过施诺尔(Schnorr)签名来确保安全的。通过将所取得的结果与以前的方案进行比较,证明了所提方案的效率。对于端到端设备,建议方法的计算成本为 0.0583 秒;对于网络服务器,建议方法的计算成本为 0.06111 秒;对于网关,建议方法的计算成本为 0.00071 秒;对于 1000 个设备,建议方法的执行时间为 78.624 秒。提议的 EIC-EcQuV 实现的密钥协议时间为 0.953 秒,PKCIC 为 0.9988 秒。
{"title":"Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks","authors":"Devishree Naidu,&nbsp;Niranjan K. Ray","doi":"10.1002/cpe.8283","DOIUrl":"https://doi.org/10.1002/cpe.8283","url":null,"abstract":"<div>\u0000 \u0000 <p>The proposed work introduces two schemes for secure device authentication and key agreement (SDA &amp; KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu–Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA &amp; KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient dynamic scheduling of dependent tasks for multi-core real-time systems using delay techniques 利用延迟技术为多核实时系统的依赖任务进行节能动态调度
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-02 DOI: 10.1002/cpe.8267
Kalyan Baital, Amlan Chakrabarti

Optimizing energy consumption and maximizing throughput in multi-core real-time architectures through dynamic task scheduling is a critical design challenge. While significant attention has been devoted to addressing this challenge in the domain of real-time multi-core scheduling, the focus has primarily centered on considering periodic tasks as independent. However, the existing literature notably lacks comprehensive study of scheduling methodologies on multi-core systems that consider dependent tasks, though typical real-time systems execute tasks that share resources. Earlier studies have predominantly examined scenarios involving random new tasks and task instances (jobs), which are executed in different power levels. Each task (and job) has distinct execution time corresponding to each power level. By considering these parameters (power levels and execution times of jobs), various combinations of energy signatures have been found to attain an optimum system state. Building upon this prior research, our paper extends the scope to encompass task scheduling in multi-core systems with task dependencies. We introduce a novel approach that categorizes dependent tasks into ASAP (as soon as possible) and ALAP (as late as possible) groups, prioritizing task execution based on task mobility—defined as the disparity between the last cycle the task can be scheduled in and the current cycle. Furthermore, our model demonstrates an approach for efficient scheduling of sporadic and aperiodic tasks within this framework. Through experimental validation using randomized task sets, our results indicate that the proposed model achieves a minimum of 5% reduction in normalized total energy consumption compared to existing methodologies.

在多核实时架构中,通过动态任务调度优化能耗和最大化吞吐量是一项关键的设计挑战。虽然在多核实时调度领域,解决这一难题的工作受到了极大关注,但重点主要集中在将周期性任务视为独立任务上。然而,尽管典型的实时系统会执行共享资源的任务,但现有文献明显缺乏对多核系统调度方法的全面研究,这些方法考虑了依赖性任务。早期的研究主要考察了涉及随机新任务和任务实例(作业)的场景,这些任务和作业在不同的功率级别下执行。每个任务(和作业)都有与每个功率级别相对应的不同执行时间。通过考虑这些参数(功率等级和作业的执行时间),我们发现各种能量特征组合可达到最佳系统状态。在此前研究的基础上,我们的论文将研究范围扩展到具有任务依赖性的多核系统中的任务调度。我们引入了一种新方法,将依赖性任务分为 ASAP(尽快)和 ALAP(尽可能晚)两组,根据任务移动性(即任务可调度的最后周期与当前周期之间的差距)确定任务执行的优先级。此外,我们的模型还展示了在此框架内高效调度零星和非周期性任务的方法。通过使用随机任务集进行实验验证,我们的结果表明,与现有方法相比,我们提出的模型至少能将归一化总能耗降低 5%。
{"title":"Energy efficient dynamic scheduling of dependent tasks for multi-core real-time systems using delay techniques","authors":"Kalyan Baital,&nbsp;Amlan Chakrabarti","doi":"10.1002/cpe.8267","DOIUrl":"https://doi.org/10.1002/cpe.8267","url":null,"abstract":"<div>\u0000 \u0000 <p>Optimizing energy consumption and maximizing throughput in multi-core real-time architectures through dynamic task scheduling is a critical design challenge. While significant attention has been devoted to addressing this challenge in the domain of real-time multi-core scheduling, the focus has primarily centered on considering periodic tasks as independent. However, the existing literature notably lacks comprehensive study of scheduling methodologies on multi-core systems that consider dependent tasks, though typical real-time systems execute tasks that share resources. Earlier studies have predominantly examined scenarios involving random new tasks and task instances (jobs), which are executed in different power levels. Each task (and job) has distinct execution time corresponding to each power level. By considering these parameters (power levels and execution times of jobs), various combinations of energy signatures have been found to attain an optimum system state. Building upon this prior research, our paper extends the scope to encompass task scheduling in multi-core systems with task dependencies. We introduce a novel approach that categorizes dependent tasks into ASAP (as soon as possible) and ALAP (as late as possible) groups, prioritizing task execution based on task mobility—defined as the disparity between the last cycle the task can be scheduled in and the current cycle. Furthermore, our model demonstrates an approach for efficient scheduling of sporadic and aperiodic tasks within this framework. Through experimental validation using randomized task sets, our results indicate that the proposed model achieves a minimum of 5% reduction in normalized total energy consumption compared to existing methodologies.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based transparent and certificateless data integrity auditing for cloud storage 基于区块链的云存储透明无证书数据完整性审计
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-27 DOI: 10.1002/cpe.8285
Yapeng Miao, Ying Miao, Xuexue Miao

Cloud storage provides a convenient way of collaboration and sharing. An increasing number of users are becoming more open to sharing their data with others. Consequently, the integrity of shared data has started to draw significant attention due to the loss control of it. Remote data integrity techniques can solve this problem. To resist the collusion between the third party auditor and the cloud server, existing integrity auditing schemes utilize blockchain to replace the third party auditor to do some work. However, these schemes still involve collusion between the third party auditor and the miners and cannot guarantee the third party auditor to execute the auditing process honestly. Considering this, we propose a blockchain-based transparent and certificateless data integrity auditing scheme. Specifically, we design the smart contract combining the commitment technology to generate the challenge information and record the auditing information. Besides, we combine certificateless cryptography and the blind technology to achieve the privacy-preserving. The proposed scheme can resist collusion, improve the transparency of the auditing process, protect the data privacy and reduce the overhead of certificate management and key management. The security analysis and performance evaluation demonstrate the security and efficiency of the scheme.

云存储提供了一种便捷的协作和共享方式。越来越多的用户越来越愿意与他人共享数据。因此,由于共享数据的失控,其完整性开始引起人们的极大关注。远程数据完整性技术可以解决这一问题。为了抵制第三方审计员与云服务器之间的串通,现有的完整性审计方案利用区块链来替代第三方审计员做一些工作。然而,这些方案仍然涉及第三方审计员与矿工之间的勾结,无法保证第三方审计员诚实地执行审计过程。有鉴于此,我们提出了一种基于区块链的透明无证书数据完整性审计方案。具体来说,我们结合承诺技术设计了智能合约,用于生成挑战信息和记录审计信息。此外,我们还结合了无证书密码学和盲技术来实现隐私保护。所提出的方案可以抵制串通,提高审计过程的透明度,保护数据隐私,减少证书管理和密钥管理的开销。安全分析和性能评估证明了该方案的安全性和高效性。
{"title":"Blockchain-based transparent and certificateless data integrity auditing for cloud storage","authors":"Yapeng Miao,&nbsp;Ying Miao,&nbsp;Xuexue Miao","doi":"10.1002/cpe.8285","DOIUrl":"https://doi.org/10.1002/cpe.8285","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud storage provides a convenient way of collaboration and sharing. An increasing number of users are becoming more open to sharing their data with others. Consequently, the integrity of shared data has started to draw significant attention due to the loss control of it. Remote data integrity techniques can solve this problem. To resist the collusion between the third party auditor and the cloud server, existing integrity auditing schemes utilize blockchain to replace the third party auditor to do some work. However, these schemes still involve collusion between the third party auditor and the miners and cannot guarantee the third party auditor to execute the auditing process honestly. Considering this, we propose a blockchain-based transparent and certificateless data integrity auditing scheme. Specifically, we design the smart contract combining the commitment technology to generate the challenge information and record the auditing information. Besides, we combine certificateless cryptography and the blind technology to achieve the privacy-preserving. The proposed scheme can resist collusion, improve the transparency of the auditing process, protect the data privacy and reduce the overhead of certificate management and key management. The security analysis and performance evaluation demonstrate the security and efficiency of the scheme.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An in-depth study of dimension-extended dragonfly interconnection network 维度扩展蜻蜓互联网络的深入研究
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-27 DOI: 10.1002/cpe.8286
Yaodong Wang, Yamin Li
<div> <p>Dragonfly topology is a commonly utilized design for interconnection networks in parallel and distributed systems. A classical dragonfly can be denoted as dragonfly(<span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation>$$ k $$</annotation> </semantics></math>,<span></span><math> <semantics> <mrow> <mi>m</mi> </mrow> <annotation>$$ m $$</annotation> </semantics></math>,<span></span><math> <semantics> <mrow> <mi>l</mi> </mrow> <annotation>$$ l $$</annotation> </semantics></math>), where<span></span><math> <semantics> <mrow> <mi>m</mi> </mrow> <annotation>$$ m $$</annotation> </semantics></math> is the number of routers in a group,<span></span><math> <semantics> <mrow> <mi>l</mi> </mrow> <annotation>$$ l $$</annotation> </semantics></math> is the number of links per router connected to other groups, and<span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation>$$ k $$</annotation> </semantics></math> is the number of links per router connected to compute nodes. Each router has other<span></span><math> <semantics> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> <annotation>$$ m-1 $$</annotation> </semantics></math> links fully connected to other<span></span><math> <semantics> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> <annotation>$$ m-1 $$</annotation> </semantics></math> routers within a group. Each group has<span></span><math> <semantics> <mrow> <mi>m</mi> <mi>l</mi> </mrow> <annotation>$$ ml $$</annotation> </semantics></math> links connected to other groups. The groups are also fully connected, therefore there are<span></span><math> <semantics> <mrow> <mi>m</mi> <mi>l</mi> <mo>+</mo> <mn>1</mn> </mrow> <annotation>$$ ml+1 $$</annotation> </semantics></math> groups in total. The router radix in a dragonfly(<span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation>$$ k $$</annotation> </semantics><
蜻蜓拓扑是并行和分布式系统中常用的互连网络设计。经典的蜻蜓可以表示为 dragonfly( k $$ k $$ , m $$ m $$ , l $$ l $$),其中 m $$ m $$ 是组中路由器的数量,l $$ l $$ 是每个路由器连接到其他组的链接数,k $$ k $$ 是每个路由器连接到计算节点的链接数。每个路由器都有 m - 1 $$ m-1 $$ 个链接与组内其他 m - 1 $$ m-1 $$ 个路由器完全相连。每个组都有 m l $ m$ ml $ 链接与其他组相连。各组也是完全连接的,因此总共有 m l + 1 $ ml+1 $ $ 组。蜻蜓(k $$ k $$ , m $$ m $$ , l $$ l $$)的路由器半角为 l + k + m - 1 $$ l+k+m-1 $$。构建一个大型蜻蜓系统需要大量高分辨率路由器,从而增加了硬件成本。为了降低硬件成本,本文提出了一种更灵活的拓扑结构,称为维度扩展蜻蜓(DED)。一个组中的每个路由器不是完全连接的,而是排列在一个 n $$ n $$ 的维度矩阵中,相同维度的路由器是完全连接的。我们使用 n $$ n $$ 表示维度,这样 DED 中的每个组都有 m n $$ {m}^n $$ 路由器。本研究从成本、性能、容错和数据包延迟等方面对 DED 进行了全面评估。研究结果表明,与传统的 Dragonfly 和 Cascade 拓扑相比,DED 提供了更经济的硬件解决方案,尤其是在 n ≥ 3 $$ nge 3 $$ 的情况下。除了成本效益,DED 还增强了系统设计的灵活性。它通过直径和弧度的不同组合为系统扩展提供了多种可能性,为系统架构师提供了更多适应性更强的选择。为了进一步增强 DED 的多功能性,我们提出了三种不相交路径路由算法,并通过仿真评估了它们的容错性。仿真结果还表明,DED 的数据包延迟低于蜻蜓和级联。
{"title":"An in-depth study of dimension-extended dragonfly interconnection network","authors":"Yaodong Wang,&nbsp;Yamin Li","doi":"10.1002/cpe.8286","DOIUrl":"https://doi.org/10.1002/cpe.8286","url":null,"abstract":"&lt;div&gt;\u0000 \u0000 &lt;p&gt;Dragonfly topology is a commonly utilized design for interconnection networks in parallel and distributed systems. A classical dragonfly can be denoted as dragonfly(&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ k $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;,&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;,&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ l $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;), where&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is the number of routers in a group,&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ l $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is the number of links per router connected to other groups, and&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ k $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is the number of links per router connected to compute nodes. Each router has other&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m-1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; links fully connected to other&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m-1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; routers within a group. Each group has&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ ml $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; links connected to other groups. The groups are also fully connected, therefore there are&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ ml+1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; groups in total. The router radix in a dragonfly(&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ k $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Concurrency and Computation-Practice & Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1