首页 > 最新文献

Concurrency and Computation-Practice & Experience最新文献

英文 中文
A competent CCHFMO with AMDH for QoS improvisation and efficient route protection in MANET 采用 AMDH 的合格 CCHFMO 可改善城域网的服务质量并提供高效路由保护
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-09 DOI: 10.1002/cpe.8272
Gajendra Kumar Ahirwar, Ratish Agarwal, Anjana Pandey

The ability of mobile ad hoc networks (MANET) to be used as communication tools in a variety of industries, including healthcare, the military, smart traffic, and smart cities, has drawn special consideration. Traditional Manet's multicast routing methods seem to be inappropriate to massive with Adaptive systems because the problem is NP-complete, resulting in an enchanting QoS restrictions. In order to conquer that the paper proficiently introduces the Conglomerate Crumb Horde Formicary Meta-Heuristic (CCHFMO) with Asymmetrical Meander Diffie-Hellman (AMDH) to tackle the major obstacles are multicast routing problems and lack of data protection. Initially, the fusion of crumb horde optimization (CHO) and formicary optimization (FO) is exploited to strengthen QoS limitations and reduce QoS data loss. However, the massive and dynamic nature of the network with the combination of more QoS restrictions, deficient security has become extremely difficult. Therefore, the research work establishes the asymmetrical meander Diffie-Hellman (AMDH) to significantly improve performance and concealment while ensuring channel security during data transfer. Finally, the results demonstrated that by employing the novel optimization approaches, the MANET can increase data protection while still achieving high transmission rates and sophistication of communication. As a consequence, it adequately explicates the article to improve QoS performances.

在医疗保健、军事、智能交通和智能城市等各行各业中,移动特设网络(MANET)作为通信工具的能力引起了人们的特别关注。传统的 MANET 组播路由选择方法似乎不适合大规模自适应系统,因为该问题是 NP-complete,会导致令人着迷的 QoS 限制。为了解决这个问题,本文引入了具有非对称漫游 Diffie-Hellman (AMDH) 的 Crumb Horde Formicary Meta-Heuristic (CCHFMO),以解决组播路由问题和缺乏数据保护等主要障碍。最初,人们利用屑群优化(CHO)和格式优化(FO)的融合来加强 QoS 限制并减少 QoS 数据丢失。然而,网络的庞大性和动态性与更多的 QoS 限制、安全性缺陷相结合,变得异常困难。因此,研究工作建立了非对称蜿蜒 Diffie-Hellman(AMDH),在确保数据传输过程中信道安全的同时,显著提高了性能和隐蔽性。最后,研究结果表明,通过采用新颖的优化方法,城域网在实现高传输速率和复杂通信的同时,还能提高数据保护能力。因此,这篇文章充分阐述了如何提高 QoS 性能。
{"title":"A competent CCHFMO with AMDH for QoS improvisation and efficient route protection in MANET","authors":"Gajendra Kumar Ahirwar,&nbsp;Ratish Agarwal,&nbsp;Anjana Pandey","doi":"10.1002/cpe.8272","DOIUrl":"https://doi.org/10.1002/cpe.8272","url":null,"abstract":"<div>\u0000 \u0000 <p>The ability of mobile ad hoc networks (MANET) to be used as communication tools in a variety of industries, including healthcare, the military, smart traffic, and smart cities, has drawn special consideration. Traditional Manet's multicast routing methods seem to be inappropriate to massive with Adaptive systems because the problem is NP-complete, resulting in an enchanting QoS restrictions. In order to conquer that the paper proficiently introduces the Conglomerate Crumb Horde Formicary Meta-Heuristic (CCHFMO) with Asymmetrical Meander Diffie-Hellman (AMDH) to tackle the major obstacles are multicast routing problems and lack of data protection. Initially, the fusion of crumb horde optimization (CHO) and formicary optimization (FO) is exploited to strengthen QoS limitations and reduce QoS data loss. However, the massive and dynamic nature of the network with the combination of more QoS restrictions, deficient security has become extremely difficult. Therefore, the research work establishes the asymmetrical meander Diffie-Hellman (AMDH) to significantly improve performance and concealment while ensuring channel security during data transfer. Finally, the results demonstrated that by employing the novel optimization approaches, the MANET can increase data protection while still achieving high transmission rates and sophistication of communication. As a consequence, it adequately explicates the article to improve QoS performances.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASCL: Accelerating semi-supervised learning via contrastive learning ASCL: 通过对比学习加速半监督学习
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-08 DOI: 10.1002/cpe.8293
Haixiong Liu, Zuoyong Li, Jiawei Wu, Kun Zeng, Rong Hu, Wei Zeng

SSL (semi-supervised learning) is widely used in machine learning, which leverages labeled and unlabeled data to improve model performance. SSL aims to optimize class mutual information, but noisy pseudo-labels introduce false class information due to the scarcity of labels. Therefore, these algorithms often need significant training time to refine pseudo-labels for performance improvement iteratively. To tackle this challenge, we propose a novel plug-and-play method named Accelerating semi-supervised learning via contrastive learning (ASCL). This method combines contrastive learning with uncertainty-based selection for performance improvement and accelerates the convergence of SSL algorithms. Contrastive learning initially emphasizes the mutual information between samples as a means to decrease dependence on pseudo-labels. Subsequently, it gradually turns to maximizing the mutual information between classes, aligning with the objective of semi-supervised learning. Uncertainty-based selection provides a robust mechanism for acquiring pseudo-labels. The combination of the contrastive learning module and the uncertainty-based selection module forms a virtuous cycle to improve the performance of the proposed model. Extensive experiments demonstrate that ASCL outperforms state-of-the-art methods in terms of both convergence efficiency and performance. In the experimental scenario where only one label is assigned per class in the CIFAR-10 dataset, the application of ASCL to Pseudo-label, UDA (unsupervised data augmentation for consistency training), and Fixmatch benefits substantial improvements in classification accuracy. Specifically, the results demonstrate notable improvements in respect of 16.32%, 6.9%, and 24.43% when compared to the original outcomes. Moreover, the required training time is reduced by almost 50%.

SSL(半监督学习)被广泛应用于机器学习中,它利用有标签和无标签数据来提高模型性能。SSL 的目标是优化类互信息,但由于标签的稀缺性,嘈杂的伪标签会带来虚假的类信息。因此,这些算法往往需要大量的训练时间来反复改进伪标签以提高性能。为了应对这一挑战,我们提出了一种名为 "通过对比学习加速半监督学习(Accelerating semi-supervised learning via contrastive learning,ASCL)"的即插即用新方法。这种方法将对比学习与基于不确定性的选择相结合,以提高性能并加速 SSL 算法的收敛。对比学习最初强调样本间的互信息,以此来减少对伪标签的依赖。随后,它逐渐转向最大化类之间的互信息,这与半监督学习的目标一致。基于不确定性的选择为获取伪标签提供了一种稳健的机制。对比学习模块和基于不确定性的选择模块相结合,形成了一个良性循环,从而提高了所提模型的性能。大量实验证明,ASCL 在收敛效率和性能方面都优于最先进的方法。在 CIFAR-10 数据集中,每个类别只分配了一个标签,在这种实验场景下,将 ASCL 应用于伪标签、UDA(用于一致性训练的无监督数据增强)和 Fixmatch 可显著提高分类准确性。具体来说,与原始结果相比,结果显示分类准确率分别提高了 16.32%、6.9% 和 24.43%。此外,所需的训练时间也减少了近 50%。
{"title":"ASCL: Accelerating semi-supervised learning via contrastive learning","authors":"Haixiong Liu,&nbsp;Zuoyong Li,&nbsp;Jiawei Wu,&nbsp;Kun Zeng,&nbsp;Rong Hu,&nbsp;Wei Zeng","doi":"10.1002/cpe.8293","DOIUrl":"https://doi.org/10.1002/cpe.8293","url":null,"abstract":"<div>\u0000 \u0000 <p>SSL (semi-supervised learning) is widely used in machine learning, which leverages labeled and unlabeled data to improve model performance. SSL aims to optimize class mutual information, but noisy pseudo-labels introduce false class information due to the scarcity of labels. Therefore, these algorithms often need significant training time to refine pseudo-labels for performance improvement iteratively. To tackle this challenge, we propose a novel plug-and-play method named Accelerating semi-supervised learning via contrastive learning (ASCL). This method combines contrastive learning with uncertainty-based selection for performance improvement and accelerates the convergence of SSL algorithms. Contrastive learning initially emphasizes the mutual information between samples as a means to decrease dependence on pseudo-labels. Subsequently, it gradually turns to maximizing the mutual information between classes, aligning with the objective of semi-supervised learning. Uncertainty-based selection provides a robust mechanism for acquiring pseudo-labels. The combination of the contrastive learning module and the uncertainty-based selection module forms a virtuous cycle to improve the performance of the proposed model. Extensive experiments demonstrate that ASCL outperforms state-of-the-art methods in terms of both convergence efficiency and performance. In the experimental scenario where only one label is assigned per class in the CIFAR-10 dataset, the application of ASCL to Pseudo-label, UDA (unsupervised data augmentation for consistency training), and Fixmatch benefits substantial improvements in classification accuracy. Specifically, the results demonstrate notable improvements in respect of 16.32%, 6.9%, and 24.43% when compared to the original outcomes. Moreover, the required training time is reduced by almost 50%.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 28","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel controllability method on complex temporal networks based on temporal motifs 基于时序图案的复杂时序网络可控性新方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-05 DOI: 10.1002/cpe.8278
Yan Jin, Peyman Arebi

Complex temporal networks have become instrumental in modeling dynamic systems across various disciplines, presenting unique challenges and opportunities in understanding and influencing their behavior. Controllability, a fundamental aspect of network dynamics, plays a pivotal role in manipulating these systems towards desired states. Temporal motifs are important patterns in temporal complex networks that have many applications in solving problems related to this type of networks. In this paper, a novel method for controlling temporal complex networks using temporal motifs is proposed. First, the most important effective temporal motifs in the controllability processes of complex networks have been identified and it has been shown that the network can be fully controlled using these temporal motifs. Then, an algorithm for extracting temporal motifs is proposed. This algorithm has been proposed to identify effective temporal motifs in network controllability to optimally identify control nodes. To increase the efficiency of extracting temporal motifs, a method for predicting the temporal motif-based link has been proposed, which predicts temporal motifs. The results of the simulation of the proposed method based on temporal motifs and its implementation on real-world temporal complex networks demonstrates that its performance was better than the conventional controllability methods.

复杂时态网络已成为各学科动态系统建模的重要工具,为理解和影响这些系统的行为带来了独特的挑战和机遇。可控性是网络动力学的一个基本方面,在操纵这些系统实现理想状态方面发挥着关键作用。时态图案是时态复杂网络中的重要模式,在解决与这类网络相关的问题时有很多应用。本文提出了一种利用时态图案控制时态复杂网络的新方法。首先,确定了复杂网络可控性过程中最重要的有效时态图案,并证明利用这些时态图案可以完全控制网络。然后,提出了一种提取时空图案的算法。该算法旨在识别网络可控性中的有效时序图案,从而优化识别控制节点。为了提高提取时空主题的效率,提出了一种基于时空主题的链接预测方法,该方法可预测时空主题。对所提出的基于时态图案的方法进行了仿真,并在现实世界的时态复杂网络上进行了实施,结果表明其性能优于传统的可控性方法。
{"title":"A novel controllability method on complex temporal networks based on temporal motifs","authors":"Yan Jin,&nbsp;Peyman Arebi","doi":"10.1002/cpe.8278","DOIUrl":"https://doi.org/10.1002/cpe.8278","url":null,"abstract":"<div>\u0000 \u0000 <p>Complex temporal networks have become instrumental in modeling dynamic systems across various disciplines, presenting unique challenges and opportunities in understanding and influencing their behavior. Controllability, a fundamental aspect of network dynamics, plays a pivotal role in manipulating these systems towards desired states. Temporal motifs are important patterns in temporal complex networks that have many applications in solving problems related to this type of networks. In this paper, a novel method for controlling temporal complex networks using temporal motifs is proposed. First, the most important effective temporal motifs in the controllability processes of complex networks have been identified and it has been shown that the network can be fully controlled using these temporal motifs. Then, an algorithm for extracting temporal motifs is proposed. This algorithm has been proposed to identify effective temporal motifs in network controllability to optimally identify control nodes. To increase the efficiency of extracting temporal motifs, a method for predicting the temporal motif-based link has been proposed, which predicts temporal motifs. The results of the simulation of the proposed method based on temporal motifs and its implementation on real-world temporal complex networks demonstrates that its performance was better than the conventional controllability methods.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults 通过考虑永久性故障评估工业应用中无线传感器网络的可靠性和可用性
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-04 DOI: 10.1002/cpe.8252
Arash Heidari, Zahra Amiri, Mohammad Ali Jabraeil Jamali, Nima Jafari

Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions. To make sure network performance, a lot of study needs to be done to improve failure tolerance and stability. This study looks at how to judge the availability and dependability of WSNs that have long-term issues. The suggested method checks how well a network works in various failure cases by using fault trees and Markov chain analysis. Such methods help us find and study possible failure scenarios and how they might impact the network's dependability in a planned way. The results show that WSNs have major flaws and give useful suggestions for making the systems work better. The findings show that using these evaluation methods may greatly enhance the ability to handle faults, lower the risk of damage, and allow developers of WSNs to make smart choices.

无线传感器网络(WSN)对于方圆一英里内的通信和工业应用至关重要。这些网络由于节点数量庞大、硬件和软件限制独特,很容易出现故障。为确保网络性能,需要进行大量研究,以提高故障容限和稳定性。本研究探讨了如何判断存在长期问题的 WSN 的可用性和可靠性。所建议的方法通过使用故障树和马尔可夫链分析来检查网络在各种故障情况下的工作情况。这些方法可以帮助我们找到并研究可能出现的故障情况,以及这些情况会如何有计划地影响网络的可靠性。结果表明,WSN 存在重大缺陷,并为使系统更好地运行提出了有用的建议。研究结果表明,使用这些评估方法可以大大提高处理故障的能力,降低损坏的风险,并让 WSN 的开发人员做出明智的选择。
{"title":"Assessment of reliability and availability of wireless sensor networks in industrial applications by considering permanent faults","authors":"Arash Heidari,&nbsp;Zahra Amiri,&nbsp;Mohammad Ali Jabraeil Jamali,&nbsp;Nima Jafari","doi":"10.1002/cpe.8252","DOIUrl":"https://doi.org/10.1002/cpe.8252","url":null,"abstract":"<p>Wireless Sensor Networks (WSNs) are critical for communication within a mile radius and industrial applications. These networks are very prone to failure due to their enormous number of nodes and their unique hardware and software restrictions. To make sure network performance, a lot of study needs to be done to improve failure tolerance and stability. This study looks at how to judge the availability and dependability of WSNs that have long-term issues. The suggested method checks how well a network works in various failure cases by using fault trees and Markov chain analysis. Such methods help us find and study possible failure scenarios and how they might impact the network's dependability in a planned way. The results show that WSNs have major flaws and give useful suggestions for making the systems work better. The findings show that using these evaluation methods may greatly enhance the ability to handle faults, lower the risk of damage, and allow developers of WSNs to make smart choices.</p>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/cpe.8252","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks 基于 LoRaWAN 的物联网网络的安全设备认证和密钥协议机制
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-03 DOI: 10.1002/cpe.8283
Devishree Naidu, Niranjan K. Ray

The proposed work introduces two schemes for secure device authentication and key agreement (SDA & KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu–Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA & KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.

所提出的工作为安全设备认证和密钥协议(SDA & KA)机制引入了两种方案。首先,在第一阶段开发了一种基于椭圆曲线Qu-Vanstone(EIC-EcQuV)方案的高效隐式证书方法,以即时商定会话密钥。所提出的方案可隐含地对公钥进行快速验证。此外,该方案还能防止攻击者创建虚假密钥组合。通过 EIC-EcQuV,分发的隐式证书(IC)有助于对用户进行隐式认证。这项工作还在第二阶段提出了它开发的公钥无证书密码系统(PKCIC)方案,该方案也适用于 SDA & KA 机制。在 EIC-EcQuV 方案中,验证是有效的,但公钥有可能被盗。然而,在 PKCIC 方案中,认证是通过部分密钥进行的,而公钥则是通过施诺尔(Schnorr)签名来确保安全的。通过将所取得的结果与以前的方案进行比较,证明了所提方案的效率。对于端到端设备,建议方法的计算成本为 0.0583 秒;对于网络服务器,建议方法的计算成本为 0.06111 秒;对于网关,建议方法的计算成本为 0.00071 秒;对于 1000 个设备,建议方法的执行时间为 78.624 秒。提议的 EIC-EcQuV 实现的密钥协议时间为 0.953 秒,PKCIC 为 0.9988 秒。
{"title":"Secure device authentication and key agreement mechanism for LoRaWAN based IoT networks","authors":"Devishree Naidu,&nbsp;Niranjan K. Ray","doi":"10.1002/cpe.8283","DOIUrl":"https://doi.org/10.1002/cpe.8283","url":null,"abstract":"<div>\u0000 \u0000 <p>The proposed work introduces two schemes for secure device authentication and key agreement (SDA &amp; KA) mechanisms. Initially, an efficient implicit certificate approach based on the Elliptic curve Qu–Vanstone (EIC-EcQuV) scheme is developed in the first stage to instantly concur on the session key. The proposed scheme implicitly performs quick authentication of the public key. Also, this scheme prevents the attacker from creating fake key combinations. Through EIC-EcQuV, the implicit certificate (IC) is distributed which helps to implicitly authenticate the user. This work also proposes ithe developed Public Key Certificateless Cryptosystem (PKCIC) scheme in the second stage, whch was also for the SDA &amp; KA mechanism. In the EIC-EcQuV scheme, efficient authentication is enabled, but public key theft is possible. However, in the PKCIC scheme, authentication is performed through partial keys, and the public key is secured via the Schnorr signature. The efficiency of the proposed schemes is proved by comparing the attained results with previous schemes. The proposed method obtains the computational cost of 0.0583 s for end-to-end devices, 0.06111 for network servers, and 0.00071 s for the gateway, with an execution time of 78.624 for 1000 devices. The attained key agreement of the proposed EIC-EcQuV is 0.953 s, and PKCIC is 0.9988 s.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel superposition coding scheme based on polar code for multi-user detection in underwater acoustic OFDM communication system 基于极性码的新型叠加编码方案,用于水下声学 OFDM 通信系统中的多用户检测
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-02 DOI: 10.1002/cpe.8296
Wen Meiqi, Xing Siyu, Wei Bo, Yu Yanting

Superposition coding (SC) is a non-orthogonal multiple access (NOMA) scheme for the downlink communication system, which allows signals of different users to be stacked and forwarded simultaneously in the same frequency band. The codeword for each user is assigned a different weight at the transmitter to avoid signal conflicts and interference after stacking, and successive interference cancellation (SIC) is adopted to decode. A novel SC scheme based on polar code, suitable for the downlink multi-user underwater acoustic (UWA) communication system using orthogonal frequency division multiplexing (OFDM), is proposed in this paper. Polar code is utilized to create a nested code structure that is divided into several subsets. We exploit this feature of the polar codes and assign each subset to the corresponding user in the channel coding process. The information bits are placed on the independent subset for each user, and the random bits are placed on the subset of other users while all the users share the same set of frozen bits. Then, the codewords are stacked with different weights. The selection range of power factors can be expanded through the double superposition of the coding and the power domains, and higher system throughput and fairness can be achieved. The simulation and tank experiment results significantly verify the effectiveness of the proposed scheme, making it most suitable for the downlink UWA multi-user communication systems.

叠加编码(SC)是一种用于下行链路通信系统的非正交多址(NOMA)方案,它允许不同用户的信号在同一频段内叠加并同时转发。每个用户的码字在发射器被赋予不同的权重,以避免堆叠后的信号冲突和干扰,并采用连续干扰消除(SIC)进行解码。本文提出了一种基于极性码的新型 SC 方案,适用于使用正交频分复用(OFDM)技术的下行多用户水下声学(UWA)通信系统。极地编码被用来创建一个嵌套编码结构,该结构被分为多个子集。我们利用极地编码的这一特点,在信道编码过程中将每个子集分配给相应的用户。信息比特放在每个用户的独立子集上,随机比特放在其他用户的子集上,而所有用户共享同一组冻结比特。然后,用不同的权重堆叠编码词。通过编码域和功率域的双重叠加,可以扩大功率因数的选择范围,实现更高的系统吞吐量和公平性。仿真和坦克实验结果极大地验证了所提方案的有效性,使其最适用于下行 UWA 多用户通信系统。
{"title":"A novel superposition coding scheme based on polar code for multi-user detection in underwater acoustic OFDM communication system","authors":"Wen Meiqi,&nbsp;Xing Siyu,&nbsp;Wei Bo,&nbsp;Yu Yanting","doi":"10.1002/cpe.8296","DOIUrl":"https://doi.org/10.1002/cpe.8296","url":null,"abstract":"<div>\u0000 \u0000 <p>Superposition coding (SC) is a non-orthogonal multiple access (NOMA) scheme for the downlink communication system, which allows signals of different users to be stacked and forwarded simultaneously in the same frequency band. The codeword for each user is assigned a different weight at the transmitter to avoid signal conflicts and interference after stacking, and successive interference cancellation (SIC) is adopted to decode. A novel SC scheme based on polar code, suitable for the downlink multi-user underwater acoustic (UWA) communication system using orthogonal frequency division multiplexing (OFDM), is proposed in this paper. Polar code is utilized to create a nested code structure that is divided into several subsets. We exploit this feature of the polar codes and assign each subset to the corresponding user in the channel coding process. The information bits are placed on the independent subset for each user, and the random bits are placed on the subset of other users while all the users share the same set of frozen bits. Then, the codewords are stacked with different weights. The selection range of power factors can be expanded through the double superposition of the coding and the power domains, and higher system throughput and fairness can be achieved. The simulation and tank experiment results significantly verify the effectiveness of the proposed scheme, making it most suitable for the downlink UWA multi-user communication systems.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 28","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient dynamic scheduling of dependent tasks for multi-core real-time systems using delay techniques 利用延迟技术为多核实时系统的依赖任务进行节能动态调度
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-02 DOI: 10.1002/cpe.8267
Kalyan Baital, Amlan Chakrabarti

Optimizing energy consumption and maximizing throughput in multi-core real-time architectures through dynamic task scheduling is a critical design challenge. While significant attention has been devoted to addressing this challenge in the domain of real-time multi-core scheduling, the focus has primarily centered on considering periodic tasks as independent. However, the existing literature notably lacks comprehensive study of scheduling methodologies on multi-core systems that consider dependent tasks, though typical real-time systems execute tasks that share resources. Earlier studies have predominantly examined scenarios involving random new tasks and task instances (jobs), which are executed in different power levels. Each task (and job) has distinct execution time corresponding to each power level. By considering these parameters (power levels and execution times of jobs), various combinations of energy signatures have been found to attain an optimum system state. Building upon this prior research, our paper extends the scope to encompass task scheduling in multi-core systems with task dependencies. We introduce a novel approach that categorizes dependent tasks into ASAP (as soon as possible) and ALAP (as late as possible) groups, prioritizing task execution based on task mobility—defined as the disparity between the last cycle the task can be scheduled in and the current cycle. Furthermore, our model demonstrates an approach for efficient scheduling of sporadic and aperiodic tasks within this framework. Through experimental validation using randomized task sets, our results indicate that the proposed model achieves a minimum of 5% reduction in normalized total energy consumption compared to existing methodologies.

在多核实时架构中,通过动态任务调度优化能耗和最大化吞吐量是一项关键的设计挑战。虽然在多核实时调度领域,解决这一难题的工作受到了极大关注,但重点主要集中在将周期性任务视为独立任务上。然而,尽管典型的实时系统会执行共享资源的任务,但现有文献明显缺乏对多核系统调度方法的全面研究,这些方法考虑了依赖性任务。早期的研究主要考察了涉及随机新任务和任务实例(作业)的场景,这些任务和作业在不同的功率级别下执行。每个任务(和作业)都有与每个功率级别相对应的不同执行时间。通过考虑这些参数(功率等级和作业的执行时间),我们发现各种能量特征组合可达到最佳系统状态。在此前研究的基础上,我们的论文将研究范围扩展到具有任务依赖性的多核系统中的任务调度。我们引入了一种新方法,将依赖性任务分为 ASAP(尽快)和 ALAP(尽可能晚)两组,根据任务移动性(即任务可调度的最后周期与当前周期之间的差距)确定任务执行的优先级。此外,我们的模型还展示了在此框架内高效调度零星和非周期性任务的方法。通过使用随机任务集进行实验验证,我们的结果表明,与现有方法相比,我们提出的模型至少能将归一化总能耗降低 5%。
{"title":"Energy efficient dynamic scheduling of dependent tasks for multi-core real-time systems using delay techniques","authors":"Kalyan Baital,&nbsp;Amlan Chakrabarti","doi":"10.1002/cpe.8267","DOIUrl":"https://doi.org/10.1002/cpe.8267","url":null,"abstract":"<div>\u0000 \u0000 <p>Optimizing energy consumption and maximizing throughput in multi-core real-time architectures through dynamic task scheduling is a critical design challenge. While significant attention has been devoted to addressing this challenge in the domain of real-time multi-core scheduling, the focus has primarily centered on considering periodic tasks as independent. However, the existing literature notably lacks comprehensive study of scheduling methodologies on multi-core systems that consider dependent tasks, though typical real-time systems execute tasks that share resources. Earlier studies have predominantly examined scenarios involving random new tasks and task instances (jobs), which are executed in different power levels. Each task (and job) has distinct execution time corresponding to each power level. By considering these parameters (power levels and execution times of jobs), various combinations of energy signatures have been found to attain an optimum system state. Building upon this prior research, our paper extends the scope to encompass task scheduling in multi-core systems with task dependencies. We introduce a novel approach that categorizes dependent tasks into ASAP (as soon as possible) and ALAP (as late as possible) groups, prioritizing task execution based on task mobility—defined as the disparity between the last cycle the task can be scheduled in and the current cycle. Furthermore, our model demonstrates an approach for efficient scheduling of sporadic and aperiodic tasks within this framework. Through experimental validation using randomized task sets, our results indicate that the proposed model achieves a minimum of 5% reduction in normalized total energy consumption compared to existing methodologies.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EBWO-GE: An innovative approach to dynamic VM consolidation for cloud data centers EBWO-GE:云数据中心动态虚拟机整合的创新方法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-30 DOI: 10.1002/cpe.8295
Sahul Goyal, Lalit Kumar Awasthi

Cloud data centers (CDCs) have revolutionized global computing by offering extensive storage and processing capabilities. Nevertheless, the environmental impact of these processes, including their substantial energy consumption and carbon emissions, calls for implementing more efficient techniques. Efficient virtual machine (VM) consolidation is crucial in optimizing resource utilization and reducing energy consumption. Current methods for enhancing energy efficiency often lead to issues such as service level agreements (SLAs) violations and quality of services (QoS) degradation. This study presents a novel approach to host selection using a grey-extreme (GE) machine learning model, which accurately predicts over and underutilized hosts. In addition, a VM placement technique called enhanced black widow optimization (EBWO) utilizes black widow optimization heuristic techniques and a differential evolutionary approach to optimize VM placement. The proposed dynamic VM consolidation technique optimizes energy utilization while meeting strict SLA requirements and enhancing QoS metrics in CDCs. Extensive analyses were conducted using the Cloudsim toolkit to validate the approach's effectiveness. These analyses encompassed conditions such as random workloads in heterogeneous environments. The simulation results showed that GE-EBWO outperforms other techniques and improves energy efficiency by 12%–15%. In addition, it significantly decreases VM migrations by 11%–14% compared to other advanced methods. The study validates the practicality of the proposed technique in moving towards environmentally friendly CDCs.

云数据中心(CDC)通过提供广泛的存储和处理能力,为全球计算带来了革命性的变化。然而,这些过程对环境的影响,包括大量的能源消耗和碳排放,要求我们采用更高效的技术。高效的虚拟机(VM)整合对于优化资源利用和降低能耗至关重要。目前提高能效的方法往往会导致服务水平协议(SLA)违约和服务质量(QoS)下降等问题。本研究提出了一种利用灰色极端(GE)机器学习模型进行主机选择的新方法,该模型可准确预测过度利用和利用不足的主机。此外,一种名为增强型黑寡妇优化(EBWO)的虚拟机放置技术利用黑寡妇优化启发式技术和差分进化方法来优化虚拟机放置。所提出的动态虚拟机整合技术可优化能源利用率,同时满足严格的 SLA 要求并提高 CDC 的 QoS 指标。我们使用 Cloudsim 工具包进行了大量分析,以验证该方法的有效性。这些分析包括异构环境中的随机工作负载等条件。仿真结果表明,GE-EBWO 的性能优于其他技术,能效提高了 12%-15%。此外,与其他先进方法相比,它还能大幅减少 11%-14% 的虚拟机迁移。这项研究验证了拟议技术在实现环境友好型 CDC 方面的实用性。
{"title":"EBWO-GE: An innovative approach to dynamic VM consolidation for cloud data centers","authors":"Sahul Goyal,&nbsp;Lalit Kumar Awasthi","doi":"10.1002/cpe.8295","DOIUrl":"https://doi.org/10.1002/cpe.8295","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud data centers (CDCs) have revolutionized global computing by offering extensive storage and processing capabilities. Nevertheless, the environmental impact of these processes, including their substantial energy consumption and carbon emissions, calls for implementing more efficient techniques. Efficient virtual machine (VM) consolidation is crucial in optimizing resource utilization and reducing energy consumption. Current methods for enhancing energy efficiency often lead to issues such as service level agreements (SLAs) violations and quality of services (QoS) degradation. This study presents a novel approach to host selection using a grey-extreme (GE) machine learning model, which accurately predicts over and underutilized hosts. In addition, a VM placement technique called enhanced black widow optimization (EBWO) utilizes black widow optimization heuristic techniques and a differential evolutionary approach to optimize VM placement. The proposed dynamic VM consolidation technique optimizes energy utilization while meeting strict SLA requirements and enhancing QoS metrics in CDCs. Extensive analyses were conducted using the Cloudsim toolkit to validate the approach's effectiveness. These analyses encompassed conditions such as random workloads in heterogeneous environments. The simulation results showed that GE-EBWO outperforms other techniques and improves energy efficiency by 12%–15%. In addition, it significantly decreases VM migrations by 11%–14% compared to other advanced methods. The study validates the practicality of the proposed technique in moving towards environmentally friendly CDCs.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 28","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142737616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-based transparent and certificateless data integrity auditing for cloud storage 基于区块链的云存储透明无证书数据完整性审计
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-27 DOI: 10.1002/cpe.8285
Yapeng Miao, Ying Miao, Xuexue Miao

Cloud storage provides a convenient way of collaboration and sharing. An increasing number of users are becoming more open to sharing their data with others. Consequently, the integrity of shared data has started to draw significant attention due to the loss control of it. Remote data integrity techniques can solve this problem. To resist the collusion between the third party auditor and the cloud server, existing integrity auditing schemes utilize blockchain to replace the third party auditor to do some work. However, these schemes still involve collusion between the third party auditor and the miners and cannot guarantee the third party auditor to execute the auditing process honestly. Considering this, we propose a blockchain-based transparent and certificateless data integrity auditing scheme. Specifically, we design the smart contract combining the commitment technology to generate the challenge information and record the auditing information. Besides, we combine certificateless cryptography and the blind technology to achieve the privacy-preserving. The proposed scheme can resist collusion, improve the transparency of the auditing process, protect the data privacy and reduce the overhead of certificate management and key management. The security analysis and performance evaluation demonstrate the security and efficiency of the scheme.

云存储提供了一种便捷的协作和共享方式。越来越多的用户越来越愿意与他人共享数据。因此,由于共享数据的失控,其完整性开始引起人们的极大关注。远程数据完整性技术可以解决这一问题。为了抵制第三方审计员与云服务器之间的串通,现有的完整性审计方案利用区块链来替代第三方审计员做一些工作。然而,这些方案仍然涉及第三方审计员与矿工之间的勾结,无法保证第三方审计员诚实地执行审计过程。有鉴于此,我们提出了一种基于区块链的透明无证书数据完整性审计方案。具体来说,我们结合承诺技术设计了智能合约,用于生成挑战信息和记录审计信息。此外,我们还结合了无证书密码学和盲技术来实现隐私保护。所提出的方案可以抵制串通,提高审计过程的透明度,保护数据隐私,减少证书管理和密钥管理的开销。安全分析和性能评估证明了该方案的安全性和高效性。
{"title":"Blockchain-based transparent and certificateless data integrity auditing for cloud storage","authors":"Yapeng Miao,&nbsp;Ying Miao,&nbsp;Xuexue Miao","doi":"10.1002/cpe.8285","DOIUrl":"https://doi.org/10.1002/cpe.8285","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud storage provides a convenient way of collaboration and sharing. An increasing number of users are becoming more open to sharing their data with others. Consequently, the integrity of shared data has started to draw significant attention due to the loss control of it. Remote data integrity techniques can solve this problem. To resist the collusion between the third party auditor and the cloud server, existing integrity auditing schemes utilize blockchain to replace the third party auditor to do some work. However, these schemes still involve collusion between the third party auditor and the miners and cannot guarantee the third party auditor to execute the auditing process honestly. Considering this, we propose a blockchain-based transparent and certificateless data integrity auditing scheme. Specifically, we design the smart contract combining the commitment technology to generate the challenge information and record the auditing information. Besides, we combine certificateless cryptography and the blind technology to achieve the privacy-preserving. The proposed scheme can resist collusion, improve the transparency of the auditing process, protect the data privacy and reduce the overhead of certificate management and key management. The security analysis and performance evaluation demonstrate the security and efficiency of the scheme.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An in-depth study of dimension-extended dragonfly interconnection network 维度扩展蜻蜓互联网络的深入研究
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-27 DOI: 10.1002/cpe.8286
Yaodong Wang, Yamin Li
<div> <p>Dragonfly topology is a commonly utilized design for interconnection networks in parallel and distributed systems. A classical dragonfly can be denoted as dragonfly(<span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation>$$ k $$</annotation> </semantics></math>,<span></span><math> <semantics> <mrow> <mi>m</mi> </mrow> <annotation>$$ m $$</annotation> </semantics></math>,<span></span><math> <semantics> <mrow> <mi>l</mi> </mrow> <annotation>$$ l $$</annotation> </semantics></math>), where<span></span><math> <semantics> <mrow> <mi>m</mi> </mrow> <annotation>$$ m $$</annotation> </semantics></math> is the number of routers in a group,<span></span><math> <semantics> <mrow> <mi>l</mi> </mrow> <annotation>$$ l $$</annotation> </semantics></math> is the number of links per router connected to other groups, and<span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation>$$ k $$</annotation> </semantics></math> is the number of links per router connected to compute nodes. Each router has other<span></span><math> <semantics> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> <annotation>$$ m-1 $$</annotation> </semantics></math> links fully connected to other<span></span><math> <semantics> <mrow> <mi>m</mi> <mo>−</mo> <mn>1</mn> </mrow> <annotation>$$ m-1 $$</annotation> </semantics></math> routers within a group. Each group has<span></span><math> <semantics> <mrow> <mi>m</mi> <mi>l</mi> </mrow> <annotation>$$ ml $$</annotation> </semantics></math> links connected to other groups. The groups are also fully connected, therefore there are<span></span><math> <semantics> <mrow> <mi>m</mi> <mi>l</mi> <mo>+</mo> <mn>1</mn> </mrow> <annotation>$$ ml+1 $$</annotation> </semantics></math> groups in total. The router radix in a dragonfly(<span></span><math> <semantics> <mrow> <mi>k</mi> </mrow> <annotation>$$ k $$</annotation> </semantics><
蜻蜓拓扑是并行和分布式系统中常用的互连网络设计。经典的蜻蜓可以表示为 dragonfly( k $$ k $$ , m $$ m $$ , l $$ l $$),其中 m $$ m $$ 是组中路由器的数量,l $$ l $$ 是每个路由器连接到其他组的链接数,k $$ k $$ 是每个路由器连接到计算节点的链接数。每个路由器都有 m - 1 $$ m-1 $$ 个链接与组内其他 m - 1 $$ m-1 $$ 个路由器完全相连。每个组都有 m l $ m$ ml $ 链接与其他组相连。各组也是完全连接的,因此总共有 m l + 1 $ ml+1 $ $ 组。蜻蜓(k $$ k $$ , m $$ m $$ , l $$ l $$)的路由器半角为 l + k + m - 1 $$ l+k+m-1 $$。构建一个大型蜻蜓系统需要大量高分辨率路由器,从而增加了硬件成本。为了降低硬件成本,本文提出了一种更灵活的拓扑结构,称为维度扩展蜻蜓(DED)。一个组中的每个路由器不是完全连接的,而是排列在一个 n $$ n $$ 的维度矩阵中,相同维度的路由器是完全连接的。我们使用 n $$ n $$ 表示维度,这样 DED 中的每个组都有 m n $$ {m}^n $$ 路由器。本研究从成本、性能、容错和数据包延迟等方面对 DED 进行了全面评估。研究结果表明,与传统的 Dragonfly 和 Cascade 拓扑相比,DED 提供了更经济的硬件解决方案,尤其是在 n ≥ 3 $$ nge 3 $$ 的情况下。除了成本效益,DED 还增强了系统设计的灵活性。它通过直径和弧度的不同组合为系统扩展提供了多种可能性,为系统架构师提供了更多适应性更强的选择。为了进一步增强 DED 的多功能性,我们提出了三种不相交路径路由算法,并通过仿真评估了它们的容错性。仿真结果还表明,DED 的数据包延迟低于蜻蜓和级联。
{"title":"An in-depth study of dimension-extended dragonfly interconnection network","authors":"Yaodong Wang,&nbsp;Yamin Li","doi":"10.1002/cpe.8286","DOIUrl":"https://doi.org/10.1002/cpe.8286","url":null,"abstract":"&lt;div&gt;\u0000 \u0000 &lt;p&gt;Dragonfly topology is a commonly utilized design for interconnection networks in parallel and distributed systems. A classical dragonfly can be denoted as dragonfly(&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ k $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;,&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;,&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ l $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;), where&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is the number of routers in a group,&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ l $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is the number of links per router connected to other groups, and&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ k $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is the number of links per router connected to compute nodes. Each router has other&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m-1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; links fully connected to other&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mo&gt;−&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ m-1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; routers within a group. Each group has&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ ml $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; links connected to other groups. The groups are also fully connected, therefore there are&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;m&lt;/mi&gt;\u0000 &lt;mi&gt;l&lt;/mi&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ ml+1 $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; groups in total. The router radix in a dragonfly(&lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;k&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt;$$ k $$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 27","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142674391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Concurrency and Computation-Practice & Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1