Outer-independent Roman domination on graphs originates from the defensive strategy of Ancient Rome, which is that if any city without an army is attacked, a neighboring city with two armies could mobilize an army to ...
详细信息
Outer-independent Roman domination on graphs originates from the defensive strategy of Ancient Rome, which is that if any city without an army is attacked, a neighboring city with two armies could mobilize an army to support it and any two cities that have no army cannot be adjacent. The outer-independent Roman domination on graphs is an attractive topic in graph theory, and the definition is described as follows. Given a graph G =(V, E), a function f : V(G) → {0, 1, 2} is an outer-independent Roman dominating function(OIRDF) if f satisfies that every vertex v ∈ V with f(v) = 0 has at least one adjacent vertex u ∈ N(v) with f(u) = 2,where N(v) is the open neighborhood of v, and the set V0 = {v|f(v) = 0} is an independent set. The weight of an OIRDF f is w(f) =∑v∈Vf(v). The value of minf w(f) is the outerindependent Roman domination number of G, denoted as γoiR(G). This paper is devoted to the study of the outer-independent Roman domination number of the Cartesian product of paths Pn□Pm. With the help of computer, we find some recursive OIRDFs and then we present an upper bound of γoiR(Pn□Pm). Furthermore, we prove the lower bound of γoiR(Pn□Pm)(n ≤ 3)is equal to the upper bound. Hence, we achieve the exact value of γoiR(Pn□Pm) for n ≤ 3 and the upper bound of γoiR(Pn□Pm) for n ≥ 4.
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt...
详细信息
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being *** cloud computation,data processing,storage,and transmission can be done through laptops andmobile *** Storing in cloud facilities is expanding each day and data is the most significant asset of *** important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s *** have to be dependent on cloud service providers for assurance of the platform’s *** security and privacy issues reduce the progression of cloud computing and add ***;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured *** this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of *** implementation of a modified RSA algorithm results guaranteed the security of data in the cloud *** enhance the user data security level,a neural network is used for user authentication and ***;the proposed technique develops the performance of detection as a loss function of the bounding *** Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training.
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surv...
详细信息
Social media(SM)based surveillance systems,combined with machine learning(ML)and deep learning(DL)techniques,have shown potential for early detection of epidemic *** review discusses the current state of SM-based surveillance methods for early epidemic outbreaks and the role of ML and DL in enhancing their ***,every year,a large amount of data related to epidemic outbreaks,particularly Twitter data is generated by *** paper outlines the theme of SM analysis for tracking health-related issues and detecting epidemic outbreaks in SM,along with the ML and DL techniques that have been configured for the detection of epidemic *** has emerged as a promising ML technique that adaptsmultiple layers of representations or features of the data and yields state-of-the-art extrapolation *** recent years,along with the success of ML and DL in many other application domains,both ML and DL are also popularly used in SM *** paper aims to provide an overview of epidemic outbreaks in SM and then outlines a comprehensive analysis of ML and DL approaches and their existing applications in SM ***,this review serves the purpose of offering suggestions,ideas,and proposals,along with highlighting the ongoing challenges in the field of early outbreak detection that still need to be addressed.
In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common *** this paper,we propose a prioritized random access scheme based on comput...
详细信息
In wireless networks,the prioritized transmission scheme is essential for accommodating different priority classes of users sharing a common *** this paper,we propose a prioritized random access scheme based on compute-and-forward,referred to as expanding window sign-compute diversity slotted ALOHA(EW-SCDSA).We improve the expanding window technique and apply it to a high-throughput random access scheme,i.e.,the signcompute diversity slotted ALOHA(SCDSA)scheme,to implement prioritized random *** analyze the probability of user resolution in each priority class utilizing a bipartite graph and derive the corresponding lower bounds,the effectiveness of which is validated through simulation *** results demonstrate that the EW-SCDSA scheme can provide heterogeneous reliability performance for various user priority classes and significantly outperforms the existing advanced prioritized random access scheme.
Correction: The Visual computer https://***/10.1007/s00371-024-03572-3 The publication of this article unfortunately contained mistakes. Figure 3 was not correct. The corrected figure is given below. Wrong figure...
Cardiovascular diseases are a major global health challenge, with electrocardiography (ECG) being critical for diagnosis and monitoring. As artificial intelligence and automated ECG diagnostic technologies rapidly adv...
详细信息
Cloud computing is a new super computing paradigm, which has greatly changed the way users store and process data. Meanwhile, with the prosperity of cloud computing, there are many hidden dangers in data privacy and s...
详细信息
We give the first O(1)-approximation for the weighted Nash Social Welfare problem with additive valuations. The approximation ratio we obtain is e1/e + ϵ ≈ 1.445 + ϵ, which matches the best known approximation ratio ...
详细信息
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency ...
详细信息
Preserving privacy is imperative in the new unmanned aerial vehicle(UAV)-assisted mobile edge computing(MEC)architecture to ensure that sensitive information is protected and kept secure throughout the ***,efficiency must be considered while developing such a privacy-preserving scheme because the devices involved in these architectures are resource *** study proposes a lightweight and efficient authentication scheme for *** proposed scheme is a hardware-based password-less authentication mechanism that is based on the fact that temporal and memory-related efficiency can be significantly improved while maintaining the data security by adopting a hardwarebased solution with a simple *** proposed scheme works in four stages:system initialization,EU registration,EU authentication,and session *** is implemented as a single hardware chip comprising registers and XOR gates,and it can run the entire process in one clock ***,the proposed scheme has significantly higher efficiency in terms of runtime and memory consumption compared to other prevalent methods in the *** are conducted to evaluate the proposed authentication *** results show that the scheme has an average execution time of 0.986 ms and consumes average memory of 34 *** hardware execution time is approximately 0.39 ns,which is a significantly less than the prevalent schemes,whose execution times range in ***,the security of the proposed scheme is examined,and it is resistant to brute-force *** 1.158×10^(77) trials are required to overcome the system’s security,which is not feasible using fastest available processors.
暂无评论