首页 > 最新文献

Concurrency and Computation-Practice & Experience最新文献

英文 中文
Blockchain-Powered Framework for Trust Enhancement in FinTech: A Comprehensive Trust Evaluation Approach
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8357
Rupali Sachin Vairagade, Priya Parkhi, Yogita Hande, Bhagyashree Hambarde

The rapid advancement of financial technology (FinTech) has led to the integration of advanced technologies like data science, blockchain, cloud computing, and artificial intelligence. However, trust evaluation remains a critical challenge in dynamic landscape. Existing trust evaluation methods often neglect key aspects of timeliness, reliability, and non-invasiveness, leading to imprecise trust assessments and insufficient detection of malicious user behavior. This paper introduces a robust four-layer architectural framework with the blockchain layer, edge computing service layer, cloud computing service layer, and terminal user application layer leveraging blockchain technology for authentication and trust evaluation. Blockchain technology transforms FinTech data into linked data, ensuring data security and decentralization during information transfers. A novel hybrid consensus protocol combining Proof of Elapsed Time (PoET) and Proof of Stake (PoS) is introduced to enhance the efficiency and security of the blockchain. Extensive simulation experiments have demonstrated significant improvements in data security, reliability, and accuracy of trust assessments compared to existing methods. This paper presents a comprehensive solution for enhancing trust evaluation in FinTech, emphasizing timeliness, reliability, and non-invasiveness of assessments.

{"title":"Blockchain-Powered Framework for Trust Enhancement in FinTech: A Comprehensive Trust Evaluation Approach","authors":"Rupali Sachin Vairagade,&nbsp;Priya Parkhi,&nbsp;Yogita Hande,&nbsp;Bhagyashree Hambarde","doi":"10.1002/cpe.8357","DOIUrl":"https://doi.org/10.1002/cpe.8357","url":null,"abstract":"<div>\u0000 \u0000 <p>The rapid advancement of financial technology (FinTech) has led to the integration of advanced technologies like data science, blockchain, cloud computing, and artificial intelligence. However, trust evaluation remains a critical challenge in dynamic landscape. Existing trust evaluation methods often neglect key aspects of timeliness, reliability, and non-invasiveness, leading to imprecise trust assessments and insufficient detection of malicious user behavior. This paper introduces a robust four-layer architectural framework with the blockchain layer, edge computing service layer, cloud computing service layer, and terminal user application layer leveraging blockchain technology for authentication and trust evaluation. Blockchain technology transforms FinTech data into linked data, ensuring data security and decentralization during information transfers. A novel hybrid consensus protocol combining Proof of Elapsed Time (PoET) and Proof of Stake (PoS) is introduced to enhance the efficiency and security of the blockchain. Extensive simulation experiments have demonstrated significant improvements in data security, reliability, and accuracy of trust assessments compared to existing methods. This paper presents a comprehensive solution for enhancing trust evaluation in FinTech, emphasizing timeliness, reliability, and non-invasiveness of assessments.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Integer Factorization: A Paradigm in Cryptography
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8365
Boykuziev Ilkhom, Angshuman Khan, Rupayan Das, Bakhtiyor Abdurakhimov

This article proposes a solution to the factorization problem in cryptographic systems by leveraging the steps of the Toom-Cook algorithm for large-number multiplication. This approach can factor a 200-bit number, with performance varying depending on memory and processing power. Experiments demonstrate that the factorization problem in cryptography can be solved more efficiently by employing algorithms designed for fast and straightforward multiplication of large numbers. Examples include the Schönhage–Strassen algorithm, which is based on polynomials and Fourier transforms, the Fürer algorithm, the second Schönhage–Strassen algorithm using modular arithmetic, and Karatsuba's algorithm. This advancement significantly impacts modern computing and cryptography, enhancing both security and reliability. The proposed technique was extensively tested through simulations using the MATLAB simulator. Experimental results indicate improvements of 91% in efficiency and 95% in accuracy compared to state-of-the-art techniques.

{"title":"A Novel Approach to Integer Factorization: A Paradigm in Cryptography","authors":"Boykuziev Ilkhom,&nbsp;Angshuman Khan,&nbsp;Rupayan Das,&nbsp;Bakhtiyor Abdurakhimov","doi":"10.1002/cpe.8365","DOIUrl":"https://doi.org/10.1002/cpe.8365","url":null,"abstract":"<div>\u0000 \u0000 <p>This article proposes a solution to the factorization problem in cryptographic systems by leveraging the steps of the Toom-Cook algorithm for large-number multiplication. This approach can factor a 200-bit number, with performance varying depending on memory and processing power. Experiments demonstrate that the factorization problem in cryptography can be solved more efficiently by employing algorithms designed for fast and straightforward multiplication of large numbers. Examples include the Schönhage–Strassen algorithm, which is based on polynomials and Fourier transforms, the Fürer algorithm, the second Schönhage–Strassen algorithm using modular arithmetic, and Karatsuba's algorithm. This advancement significantly impacts modern computing and cryptography, enhancing both security and reliability. The proposed technique was extensively tested through simulations using the MATLAB simulator. Experimental results indicate improvements of 91% in efficiency and 95% in accuracy compared to state-of-the-art techniques.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Execution of a Numerical Weather Forecast Model in a Cloud Cluster
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8374
Mateus S. de Melo, Roberto Pinto Souto, Lúcia M. A. Drummond

This study proposes strategies to reduce the financial cost of using cloud clusters, through Amazon Web Services (AWS) ParallelCluster, to run the weather forecast model Brazilian developments on the Regional Atmospheric Modeling System (BRAMS). We developed an instance selection algorithm that obtains and compares the costs of various instance types in different regions and markets, recommending those with the lowest costs. If the suggested instance is a Spot instance and is revoked by the cloud provider, the proposed strategy resumes the application execution from a pre-recorded checkpoint by rescheduling it on On-Demand instances. This study also presents a detailed analysis of BRAMS execution across various instance architectures and proposes a novel three-queue architecture for managing BRAMS execution on On-Demand and Spot instances within AWS ParallelCluster. The results obtained from small and large spatial domains executed in AWS ParallelCluster using the proposed strategies show that adopting a cloud cluster is a promising alternative for this type of High-Performance Computing application, compared with execution on a supercomputer.

{"title":"Optimized Execution of a Numerical Weather Forecast Model in a Cloud Cluster","authors":"Mateus S. de Melo,&nbsp;Roberto Pinto Souto,&nbsp;Lúcia M. A. Drummond","doi":"10.1002/cpe.8374","DOIUrl":"https://doi.org/10.1002/cpe.8374","url":null,"abstract":"<div>\u0000 \u0000 <p>This study proposes strategies to reduce the financial cost of using cloud clusters, through Amazon Web Services (AWS) ParallelCluster, to run the weather forecast model Brazilian developments on the Regional Atmospheric Modeling System (BRAMS). We developed an instance selection algorithm that obtains and compares the costs of various instance types in different regions and markets, recommending those with the lowest costs. If the suggested instance is a Spot instance and is revoked by the cloud provider, the proposed strategy resumes the application execution from a pre-recorded checkpoint by rescheduling it on On-Demand instances. This study also presents a detailed analysis of BRAMS execution across various instance architectures and proposes a novel three-queue architecture for managing BRAMS execution on On-Demand and Spot instances within AWS ParallelCluster. The results obtained from small and large spatial domains executed in AWS ParallelCluster using the proposed strategies show that adopting a cloud cluster is a promising alternative for this type of High-Performance Computing application, compared with execution on a supercomputer.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Throughput Mutational Scanning of a Protein via Alchemistry on a High-Performance Computing Resource
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8371
Tandac F. Guclu, Busra Tayhan, Ebru Cetin, Ali Rana Atilgan, Canan Atilgan

Antibiotic resistance presents a significant challenge to public health, as bacteria can develop resistance to antibiotics through random mutations during their life cycles, making the drugs ineffective. Understanding how these mutations contribute to drug resistance at the molecular level is crucial for designing new treatment approaches. Recent advancements in molecular biology tools have made it possible to conduct comprehensive analyses of protein mutations. Computational methods for assessing molecular fitness, such as binding energies, are not as precise as experimental techniques like deep mutational scanning. Although full atomistic alchemical free energy calculations offer the necessary precision, they are seldom used to assess high throughput data as they require significantly more computational resources. We generated a computational library using deep mutational scanning for dihydrofolate reductase (DHFR), a protein commonly studied in antibiotic resistance research. Due to resource limitations, we analyzed 33 out of 159 positions, identifying 16 single amino acid replacements. Calculations were conducted for DHFR in its drug-free state and in the presence of two different inhibitors. We demonstrate the feasibility of such calculations, made possible due to the enhancements in computational resources and their optimized use.

{"title":"High Throughput Mutational Scanning of a Protein via Alchemistry on a High-Performance Computing Resource","authors":"Tandac F. Guclu,&nbsp;Busra Tayhan,&nbsp;Ebru Cetin,&nbsp;Ali Rana Atilgan,&nbsp;Canan Atilgan","doi":"10.1002/cpe.8371","DOIUrl":"https://doi.org/10.1002/cpe.8371","url":null,"abstract":"<div>\u0000 \u0000 <p>Antibiotic resistance presents a significant challenge to public health, as bacteria can develop resistance to antibiotics through random mutations during their life cycles, making the drugs ineffective. Understanding how these mutations contribute to drug resistance at the molecular level is crucial for designing new treatment approaches. Recent advancements in molecular biology tools have made it possible to conduct comprehensive analyses of protein mutations. Computational methods for assessing molecular fitness, such as binding energies, are not as precise as experimental techniques like deep mutational scanning. Although full atomistic alchemical free energy calculations offer the necessary precision, they are seldom used to assess high throughput data as they require significantly more computational resources. We generated a computational library using deep mutational scanning for dihydrofolate reductase (DHFR), a protein commonly studied in antibiotic resistance research. Due to resource limitations, we analyzed 33 out of 159 positions, identifying 16 single amino acid replacements. Calculations were conducted for DHFR in its drug-free state and in the presence of two different inhibitors. We demonstrate the feasibility of such calculations, made possible due to the enhancements in computational resources and their optimized use.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monitoring and Characterizing GPU Usage
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8341
Le Mai Weakley, Scott Michael, Laura Huber, Abhinav Thota, Ben Fulton, Matthew Kusz

For systems with an accelerator component, it is important from an operational and planning perspective to understand how and to what extent the accelerators are being used. Having a framework for tracking the utilization of accelerator resources is important both for judging how efficiently used a system is and for capacity and configuration planning of future systems. In addition to tracking total utilization and accelerator efficiency numbers, some attention should also be paid to the types of research and workflows that are being executed on the system. In the past, the demand for accelerator resources was largely driven by more traditional simulation codes, such as molecular dynamics. But with the growing popularity of deep learning and artificial intelligence workflows, accelerators have become even more highly sought after and are being used in new ways. Provisioning resources to researchers via an allocation system allows sites to track a project's usage and workflow as well as the scientific impact of the project. With such tools and data in hand, characterizing the GPU utilization of deep learning frameworks versus more traditional GPU-enabled applications becomes possible. In this paper we present a survey of GPU monitoring tools used in sites and a framework for tracking the utilization of NVIDIA GPUs on Slurm-scheduled HPC systems used at Indiana University. We also present an analysis of accelerator utilization on multiple systems, including an HPE Apollo system targeting AI workflows and a Cray EX system.

{"title":"Monitoring and Characterizing GPU Usage","authors":"Le Mai Weakley,&nbsp;Scott Michael,&nbsp;Laura Huber,&nbsp;Abhinav Thota,&nbsp;Ben Fulton,&nbsp;Matthew Kusz","doi":"10.1002/cpe.8341","DOIUrl":"https://doi.org/10.1002/cpe.8341","url":null,"abstract":"<div>\u0000 \u0000 <p>For systems with an accelerator component, it is important from an operational and planning perspective to understand how and to what extent the accelerators are being used. Having a framework for tracking the utilization of accelerator resources is important both for judging how efficiently used a system is and for capacity and configuration planning of future systems. In addition to tracking total utilization and accelerator efficiency numbers, some attention should also be paid to the types of research and workflows that are being executed on the system. In the past, the demand for accelerator resources was largely driven by more traditional simulation codes, such as molecular dynamics. But with the growing popularity of deep learning and artificial intelligence workflows, accelerators have become even more highly sought after and are being used in new ways. Provisioning resources to researchers via an allocation system allows sites to track a project's usage and workflow as well as the scientific impact of the project. With such tools and data in hand, characterizing the GPU utilization of deep learning frameworks versus more traditional GPU-enabled applications becomes possible. In this paper we present a survey of GPU monitoring tools used in sites and a framework for tracking the utilization of NVIDIA GPUs on Slurm-scheduled HPC systems used at Indiana University. We also present an analysis of accelerator utilization on multiple systems, including an HPE Apollo system targeting AI workflows and a Cray EX system.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Contextual Information Aggregation and Multi-Scale Feature Fusion for Single Image De-Raining in Generative Adversarial Networks 生成式对抗网络中用于单张图像去重的上下文信息聚合和多尺度特征融合
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8355
Jia Zhao, Ming Chen, Jeng-Shyang Pan, Longzhe Han, Shenyu Qiu, Zhaoxiu Nie

Aiming to address issues such as non-uniform rain density and misjudgment caused by noise in image de-raining, we propose a single-image de-raining method based on a generative adversarial network with contextual information aggregation and multi-scale feature fusion. First, we design a generator composed of encoding, context information aggregation, and decoding stages. Features are extracted using convolution, while expansion convolution effectively aggregates context information. Transposition convolution is then used to restore the image, enhancing the model's ability to perceive image details and achieve accurate image information judgment and content reconstruction. Second, we design a multi-scale feature fusion discriminator structure to capture different image details using convolution kernels of different scales and connect feature maps from different scales. This improves the model's ability to understand image details and differentiate between authentic and fake images. Finally, we propose a new refinement loss function to reduce grid artifact generation and add Lipschitz constraints to further minimize the imaging gap. In this paper, peak signal-to-noise ratio and structural similarity are used as evaluation criteria, and experiments conducted on real and synthesized rain maps demonstrate the superior rain removal performance of the proposed method.

{"title":"Contextual Information Aggregation and Multi-Scale Feature Fusion for Single Image De-Raining in Generative Adversarial Networks","authors":"Jia Zhao,&nbsp;Ming Chen,&nbsp;Jeng-Shyang Pan,&nbsp;Longzhe Han,&nbsp;Shenyu Qiu,&nbsp;Zhaoxiu Nie","doi":"10.1002/cpe.8355","DOIUrl":"https://doi.org/10.1002/cpe.8355","url":null,"abstract":"<div>\u0000 \u0000 <p>Aiming to address issues such as non-uniform rain density and misjudgment caused by noise in image de-raining, we propose a single-image de-raining method based on a generative adversarial network with contextual information aggregation and multi-scale feature fusion. First, we design a generator composed of encoding, context information aggregation, and decoding stages. Features are extracted using convolution, while expansion convolution effectively aggregates context information. Transposition convolution is then used to restore the image, enhancing the model's ability to perceive image details and achieve accurate image information judgment and content reconstruction. Second, we design a multi-scale feature fusion discriminator structure to capture different image details using convolution kernels of different scales and connect feature maps from different scales. This improves the model's ability to understand image details and differentiate between authentic and fake images. Finally, we propose a new refinement loss function to reduce grid artifact generation and add Lipschitz constraints to further minimize the imaging gap. In this paper, peak signal-to-noise ratio and structural similarity are used as evaluation criteria, and experiments conducted on real and synthesized rain maps demonstrate the superior rain removal performance of the proposed method.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ising Models for Solving the N-Queens Puzzle Based on the Domain-Wall Vectors
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8364
Shunsuke Tsukiyama, Koji Nakano, Yasuaki Ito, Takumi Kato, Yuya Kawamata
<div> <p>An Ising model is a mathematical model defined by an objective function comprising a quadratic formula of multiple spin variables, each taking values of either <span></span><math> <semantics> <mrow> <mo>−</mo> <mn>1</mn> </mrow> <annotation>$$ -1 $$</annotation> </semantics></math> or <span></span><math> <semantics> <mrow> <mo>+</mo> <mn>1</mn> </mrow> <annotation>$$ +1 $$</annotation> </semantics></math>. The task of determining a spin value assignment to these variables that minimizes the resulting value of an Ising model is a challenging optimization problem. Recently, quantum annealers, consisting of qubit cells interconnected according to principles of quantum mechanics, have emerged as a solution for tackling such problems. Ising models characterized by fewer quadratic terms are preferable as they reduce the resource requirements of quantum annealers. Additionally, it is advantageous for the absolute values of coefficients associated with linear and quadratic terms to be small to facilitate the discovery of good solutions, given the inherent limitations in the resolution of quantum annealers. The primary contribution of this article lies in presenting Ising models tailored for solving the <span></span><math> <semantics> <mrow> <mi>n</mi> </mrow> <annotation>$$ n $$</annotation> </semantics></math>-Queens puzzle. The conventional Ising model for this puzzle involves <span></span><math> <semantics> <mrow> <mfrac> <mrow> <mn>5</mn> </mrow> <mrow> <mn>3</mn> </mrow> </mfrac> <msup> <mrow> <mi>n</mi> </mrow> <mrow> <mn>3</mn> </mrow> </msup> <mo>−</mo> <mn>2</mn> <msup> <mrow> <mi>n</mi> </mrow> <mrow> <mn>2</mn> </mrow> </msup> <mo>+</mo> <mfrac> <mrow> <mi>n</mi> </mrow> <mrow> <mn>3</mn> </mrow> </mfrac> </mrow> <annotation>$$ frac{5}{3}{n}^3-2{n}^2+frac{n}{3} $$</annotation> </semantics></math> quadratic terms, with the maximum absolute value
{"title":"Ising Models for Solving the N-Queens Puzzle Based on the Domain-Wall Vectors","authors":"Shunsuke Tsukiyama,&nbsp;Koji Nakano,&nbsp;Yasuaki Ito,&nbsp;Takumi Kato,&nbsp;Yuya Kawamata","doi":"10.1002/cpe.8364","DOIUrl":"https://doi.org/10.1002/cpe.8364","url":null,"abstract":"&lt;div&gt;\u0000 \u0000 &lt;p&gt;An Ising model is a mathematical model defined by an objective function comprising a quadratic formula of multiple spin variables, each taking values of either &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ -1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; or &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ +1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;. The task of determining a spin value assignment to these variables that minimizes the resulting value of an Ising model is a challenging optimization problem. Recently, quantum annealers, consisting of qubit cells interconnected according to principles of quantum mechanics, have emerged as a solution for tackling such problems. Ising models characterized by fewer quadratic terms are preferable as they reduce the resource requirements of quantum annealers. Additionally, it is advantageous for the absolute values of coefficients associated with linear and quadratic terms to be small to facilitate the discovery of good solutions, given the inherent limitations in the resolution of quantum annealers. The primary contribution of this article lies in presenting Ising models tailored for solving the &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;n&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ n $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;-Queens puzzle. The conventional Ising model for this puzzle involves &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mfrac&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;5&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;3&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/mfrac&gt;\u0000 &lt;msup&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;n&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;3&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/msup&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;mn&gt;2&lt;/mn&gt;\u0000 &lt;msup&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;n&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;2&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/msup&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mfrac&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;n&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mn&gt;3&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;/mfrac&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ frac{5}{3}{n}^3-2{n}^2+frac{n}{3} $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; quadratic terms, with the maximum absolute value ","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced IPv6 Addressing Scheme: Irreversible Elegant Pairing for Reconnaissance Attack Prevention
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8376
Pragya, Bijendra Kumar

In scenarios where network resources are restricted, IPv6 addresses are frequently allocated to devices via SLAAC-based EUI-64 addressing to ensure their uniqueness. The consistent interface identifier (IID) resulting from this approach across networks poses a vulnerability to diverse reconnaissance attacks, encompassing activities like tracking locations, correlating network actions, scanning addresses, and targeting specific devices and so on. In response to this concern, our study introduces an innovative addressing strategy by utilizing the elegant pairing function. This technique ensures the creation of IPv6 addresses that are both nonpredictable and unique and effectively counteracts various reconnaissance attacks. Through empirical assessment, our proposed method achieves a 100% address success rate (ASR), effectively mitigating reconnaissance attacks without introducing additional communication overhead or heightened energy consumption.

{"title":"Enhanced IPv6 Addressing Scheme: Irreversible Elegant Pairing for Reconnaissance Attack Prevention","authors":"Pragya,&nbsp;Bijendra Kumar","doi":"10.1002/cpe.8376","DOIUrl":"https://doi.org/10.1002/cpe.8376","url":null,"abstract":"<div>\u0000 \u0000 <p>In scenarios where network resources are restricted, IPv6 addresses are frequently allocated to devices via SLAAC-based EUI-64 addressing to ensure their uniqueness. The consistent interface identifier (IID) resulting from this approach across networks poses a vulnerability to diverse reconnaissance attacks, encompassing activities like tracking locations, correlating network actions, scanning addresses, and targeting specific devices and so on. In response to this concern, our study introduces an innovative addressing strategy by utilizing the elegant pairing function. This technique ensures the creation of IPv6 addresses that are both nonpredictable and unique and effectively counteracts various reconnaissance attacks. Through empirical assessment, our proposed method achieves a 100% address success rate (ASR), effectively mitigating reconnaissance attacks without introducing additional communication overhead or heightened energy consumption.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Use of Embedding Techniques for Modeling User Navigational Behavior in Intelligent Prefetching Strategies
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-16 DOI: 10.1002/cpe.8356
Tolga Buyuktanir, Mehmet S. Aktas

In today's data-intensive client-server systems, traditional caching methods often fail to meet the demands of modern applications, especially in mobile environments with unstable network conditions. This research addresses the challenge of improving data delivery by proposing an advanced prefetching framework that utilizes various embedding techniques. We explore how to model user navigation using graph-based, autoencoder-based, and sequence-to-sequence-based embedding methods and assess their impact on prefetching accuracy and efficiency. Our study shows that utilizing these embedding techniques with supervised learning models improves prefetching performance. We also present a software architecture that blends supervised and unsupervised learning approaches, along with user-specific and collective learning models, to create a robust prefetching mechanism. The contributions of this study include developing a scalable prefetching solution using machine learning/deep learning algorithms and providing an open-source prototype of the proposed architecture. This paper offers a significant improvement over previous research and provides valuable insights for enhancing the performance of data-intensive applications.

{"title":"On the Use of Embedding Techniques for Modeling User Navigational Behavior in Intelligent Prefetching Strategies","authors":"Tolga Buyuktanir,&nbsp;Mehmet S. Aktas","doi":"10.1002/cpe.8356","DOIUrl":"https://doi.org/10.1002/cpe.8356","url":null,"abstract":"<div>\u0000 \u0000 <p>In today's data-intensive client-server systems, traditional caching methods often fail to meet the demands of modern applications, especially in mobile environments with unstable network conditions. This research addresses the challenge of improving data delivery by proposing an advanced prefetching framework that utilizes various embedding techniques. We explore how to model user navigation using graph-based, autoencoder-based, and sequence-to-sequence-based embedding methods and assess their impact on prefetching accuracy and efficiency. Our study shows that utilizing these embedding techniques with supervised learning models improves prefetching performance. We also present a software architecture that blends supervised and unsupervised learning approaches, along with user-specific and collective learning models, to create a robust prefetching mechanism. The contributions of this study include developing a scalable prefetching solution using machine learning/deep learning algorithms and providing an open-source prototype of the proposed architecture. This paper offers a significant improvement over previous research and provides valuable insights for enhancing the performance of data-intensive applications.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Density Peak Clustering Algorithm Based on Shared Neighbors and Natural Neighbors and Analysis of Electricity Consumption Patterns
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2025-01-15 DOI: 10.1002/cpe.8387
Qingpeng Li, Xinyue Hu, Jia Zhao, Hao Cao

The Density Peaks Clustering (DPC) algorithm is well-known for its simplicity and efficiency in clustering data of arbitrary shapes. However, it faces challenges such as inconsistent local density definitions and sample assignment errors. This paper introduces the Shared Neighbors and Natural Neighbors Density Peaks Clustering (SN-DPC) algorithm to address these issues. SN-DPC redefines local density by incorporating weighted shared neighbors, which enhances the density contribution from distant samples and provides a better representation of the data distribution. It also establishes a new similarity measure between samples using shared and natural neighbors, which increases intra-cluster similarity and reduces assignment errors, thereby improving clustering performance. Compared with DPC-CE, IDPC-FA, DPCSA, FNDPC, and traditional DPC, SN-DPC demonstrated superior effectiveness on both synthetic and real datasets. When applied to the analysis of electricity consumption patterns, it more accurately identified load consumption patterns and usage habits.

{"title":"Density Peak Clustering Algorithm Based on Shared Neighbors and Natural Neighbors and Analysis of Electricity Consumption Patterns","authors":"Qingpeng Li,&nbsp;Xinyue Hu,&nbsp;Jia Zhao,&nbsp;Hao Cao","doi":"10.1002/cpe.8387","DOIUrl":"https://doi.org/10.1002/cpe.8387","url":null,"abstract":"<div>\u0000 \u0000 <p>The Density Peaks Clustering (DPC) algorithm is well-known for its simplicity and efficiency in clustering data of arbitrary shapes. However, it faces challenges such as inconsistent local density definitions and sample assignment errors. This paper introduces the Shared Neighbors and Natural Neighbors Density Peaks Clustering (SN-DPC) algorithm to address these issues. SN-DPC redefines local density by incorporating weighted shared neighbors, which enhances the density contribution from distant samples and provides a better representation of the data distribution. It also establishes a new similarity measure between samples using shared and natural neighbors, which increases intra-cluster similarity and reduces assignment errors, thereby improving clustering performance. Compared with DPC-CE, IDPC-FA, DPCSA, FNDPC, and traditional DPC, SN-DPC demonstrated superior effectiveness on both synthetic and real datasets. When applied to the analysis of electricity consumption patterns, it more accurately identified load consumption patterns and usage habits.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 3","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Concurrency and Computation-Practice & Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1