{"title":"The λ4-Connectivity of the Cartesian Product of Trees","authors":"Hengzhe Li, Jiajia Wang, Rongxia Hao","doi":"10.1142/s0219265922500074","DOIUrl":"https://doi.org/10.1142/s0219265922500074","url":null,"abstract":"Given a connected graph [Formula: see text] and [Formula: see text] with [Formula: see text], an [Formula: see text]-tree is a such subgraph [Formula: see text] of [Formula: see text] that is a tree with [Formula: see text]. Two [Formula: see text]-trees [Formula: see text] and [Formula: see text] are edge-disjoint if [Formula: see text]. Let [Formula: see text] be the maximum size of a set of edge-disjoint [Formula: see text]-trees in [Formula: see text]. The [Formula: see text]-connectivity of [Formula: see text] is defined as [Formula: see text]. In this paper, we first show some structural properties of edge-disjoint [Formula: see text]-trees by Fan Lemma and König-ore Formula. Then, the [Formula: see text]-connectivity of the Cartesian product of trees is determined. That is, let [Formula: see text] be trees, then [Formula: see text] if [Formula: see text] for each [Formula: see text], otherwise [Formula: see text]. As corollaries, [Formula: see text]-connectivity for some graph classes such as hypercubes and meshes can be obtained directly.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114131090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distance-Edge-Monitoring Sets in Hierarchical and Corona Graphs","authors":"Gang Yang, Changxiang He","doi":"10.1142/s0219265922500037","DOIUrl":"https://doi.org/10.1142/s0219265922500037","url":null,"abstract":"Let [Formula: see text] and [Formula: see text] be the vertex set and edge set of graph [Formula: see text]. Let [Formula: see text] be the distance between vertices [Formula: see text] and [Formula: see text] in the graph [Formula: see text] and [Formula: see text] be the graph obtained by deleting edge [Formula: see text] from [Formula: see text]. For a vertex set [Formula: see text] and an edge [Formula: see text], let [Formula: see text] be the set of pairs [Formula: see text] with a vertex [Formula: see text] and a vertex [Formula: see text] such that [Formula: see text]. A vertex set [Formula: see text] is distance-edge-monitoring set, introduced by Foucaud, Kao, Klasing, Miller, and Ryan, if every edge [Formula: see text] is monitored by some vertex of [Formula: see text], that is, the set [Formula: see text] is nonempty. In this paper, we determine the smallest size of distance-edge-monitoring sets of hierarchical and corona graphs.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130459025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Directed Tree Connectivity of Symmetric Digraphs and Complete Bipartite Digraphs","authors":"Junran Yu","doi":"10.1142/s0219265922500086","DOIUrl":"https://doi.org/10.1142/s0219265922500086","url":null,"abstract":"Sun and Yeo introduced the concept of directed tree connectivity, including the generalized [Formula: see text]-vertex-strong connectivity, [Formula: see text] and generalized [Formula: see text]-arc-strong connectivity, [Formula: see text] [Formula: see text], which could be seen as a generalization of classical connectivity of digraphs and a natural extension of the well-established undirected tree connectivity. In this paper, we study the directed tree connectivity of symmetric digraphs and complete bipartite digraphs. We give lower bounds for the two parameters [Formula: see text] and [Formula: see text] on symmetric digraphs. We also determine the precise values of [Formula: see text] for every [Formula: see text] and [Formula: see text] for [Formula: see text], where [Formula: see text] is a complete bipartite digraph of order [Formula: see text].","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129058252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Sensor Network Security Analysis for Data and Aggregation","authors":"Maravarman Manoharan, S. Babu, R. Pitchai","doi":"10.1142/s0219265922500025","DOIUrl":"https://doi.org/10.1142/s0219265922500025","url":null,"abstract":"Data security is critical in wireless sensor networks (WSNs) because communication signals are highly available due to data transmission in free space. Attacks ranging from passive eavesdropping to active snooping are more common on these networks. This paper proposes secure data transfer using data encryption based on the improved Rivest–Shamir–Adleman (RSA) with Diffie–Hellman (DH) key exchange algorithm (IRSA-DH). For this purpose, the adaptive distance-based agglomerative hierarchical (ADAH)-based clustering method is used. Then the cluster head (CH) is selected using the improved weight-based rain optimization (IWRO) to improve the network’s lifespan. This study aims to design a secure group communication method for WSNs. In order to generate and distribute the key to the group, the RSA and DH and key exchange algorithm had been hybridized with the Key Management Center (KMC). For safe communication between users, the key exchange technique is investigated. The performance measures such as throughput, packet loss ratio (PLR), packet delivery ratio (PDR), latency, energy consumption, end-to-end delay (EED) and network lifetime are analyzed and compared with the existing approaches.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"429 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116012989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Driss Ait Omar, Hamid Garmani, Mohamed EL Amrani, Es-said Azougaghe, Mohamed Baslam, M. Jourhmane
{"title":"Towards Intelligent Control of Beaconing Power and Beaconing Rate in Vehicular Ad Hoc Networks","authors":"Driss Ait Omar, Hamid Garmani, Mohamed EL Amrani, Es-said Azougaghe, Mohamed Baslam, M. Jourhmane","doi":"10.1142/s0219265922500013","DOIUrl":"https://doi.org/10.1142/s0219265922500013","url":null,"abstract":"In this paper, to avoid congestion in the wireless channel of vehicular ad hoc networks (VANETs), a joint beaconing rate and beaconing power based on game theory are proposed in this paper. The game is formulated as a non-cooperative game, a Bayesian game, and a cooperative game. Three distributed and iterative algorithms (Best Response Algorithm, Fictitious Play Algorithm, and Cooperative Bargaining Algorithm) are proposed for computing the beaconing power and beaconing rate of each vehicle. Extensive simulations show the convergence of a proposed algorithm to the equilibrium beaconing power and beaconing rate and give some insights on how the game parameters may vary the game outcome.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134017495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security and Energy Aware Clustering-Based Routing in Wireless Sensor Network: Hybrid Nature-Inspired Algorithm for Optimal Cluster Head Selection","authors":"Mallanagouda Biradar, Basavaraj Mathapathi","doi":"10.1142/s0219265921500390","DOIUrl":"https://doi.org/10.1142/s0219265921500390","url":null,"abstract":"One of the significant approaches in implementing the routing of WSNs is clustering that leads to scalability and extending of network lifetime. In the clustered WSN, cluster heads (CHs) utilize maximum energy to another node. Moreover, it balanced the load present in the sensor nodes (SNs) between the CHS for enhancing the network lifespan. Moreover, the CH plays an important part in efficient routing, as well as it must be selected in an optimal way. Thus, this work intends to introduce a cluster-based routing approach in WSN, where it selects the CHs by the optimization algorithm. A new hybrid seagull rock swarm with opposition-based learning (HSROBL) is introduced for this purpose, which is the hybridized concept of rock hyraxes swarm optimization (RHSO) and seagull optimization algorithm (SOA). Further, the optimal CH selection is based on various parameters including distance, security, delay, and energy. At the end, the outcomes of the presented approach are analyzed to extant algorithms based on delay, alive nodes, average throughput, and residual energy, respectively. Based on throughput, alive node, residual energy, as well as delay, the overall improvement in performance is about 28.50%.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125005655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xueli Sun, Jianxi Fan, B. Cheng, Yan Wang, Jingya Zhou
{"title":"Reliability of Augmented 3-Ary n-Cubes with Extra Faults","authors":"Xueli Sun, Jianxi Fan, B. Cheng, Yan Wang, Jingya Zhou","doi":"10.1142/s0219265921500407","DOIUrl":"https://doi.org/10.1142/s0219265921500407","url":null,"abstract":"Fault tolerance is critical to reliability analysis of interconnection networks since the vulnerability of component failure increases with the growth of network scale. Extra connectivity and extra diagnosability are two decisive indicators of the ability of parallel and distributed systems to tolerate and diagnose faulty nodes. This paper mainly establishes the [Formula: see text]-extra connectivity and [Formula: see text]-extra diagnosability of augmented [Formula: see text]-ary [Formula: see text]-cubes [Formula: see text], which is a generalization of [Formula: see text]-ary [Formula: see text]-cubes and augmented cubes. In addition, we explore the [Formula: see text]-extra diagnosis algorithm of [Formula: see text] under the MM* model.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132675655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhengqi Yu, Shuming Zhou, Hong Zhang, Xiaoqing Liu
{"title":"Distance Optimally Edge Connectedness of Arrangement Graph Based on Subgraph Fault Pattern","authors":"Zhengqi Yu, Shuming Zhou, Hong Zhang, Xiaoqing Liu","doi":"10.1142/s0219265921500389","DOIUrl":"https://doi.org/10.1142/s0219265921500389","url":null,"abstract":"Large-scale multiprocessor systems or multicomputer systems based on networking have been extensively used in the big data era and social network. Fault tolerance is becoming an essential attribute in multiprocessor systems with the increase of the system scale. For any distinct vertices [Formula: see text], the local connectivity of [Formula: see text] and [Formula: see text], denoted by [Formula: see text], is the maximum number of independent [Formula: see text]-paths in system graph [Formula: see text]. The local edge connectivity of [Formula: see text], [Formula: see text], [Formula: see text], is defined similarly. For any [Formula: see text], [Formula: see text], if [Formula: see text] (or [Formula: see text], then [Formula: see text] is [Formula: see text]-distance optimally (edge) connected, where [Formula: see text] is the diameter of [Formula: see text] and [Formula: see text] is the degree of [Formula: see text]. For any integers [Formula: see text] subject to [Formula: see text], if [Formula: see text] is [Formula: see text]-distance optimally (edge) connected, then we call [Formula: see text] is [Formula: see text]-distance local optimally (edge) connected. In this work, we show that [Formula: see text] ([Formula: see text] is [Formula: see text]-arrangement graph) is [Formula: see text]-distance local optimally edge connected for [Formula: see text] and [Formula: see text].","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121292333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Precise Values for the Strong Subgraph 3-Arc-Connectivity of Cartesian Products of Some Digraph Classes","authors":"Yiling Dong","doi":"10.1142/s0219265921500365","DOIUrl":"https://doi.org/10.1142/s0219265921500365","url":null,"abstract":"Let [Formula: see text] be a digraph of order [Formula: see text], [Formula: see text] a subset of [Formula: see text] of size [Formula: see text] and [Formula: see text]. A strong subgraph [Formula: see text] of [Formula: see text] is called an [Formula: see text]-strong subgraph if [Formula: see text]. A pair of [Formula: see text]-strong subgraphs [Formula: see text] and [Formula: see text] is said to be arc-disjoint if [Formula: see text]. Let [Formula: see text] be the maximum number of arc-disjoint [Formula: see text]-strong subgraphs in [Formula: see text]. Sun and Gutin defined the strong subgraph [Formula: see text]-arc-connectivity as [Formula: see text] The new parameter [Formula: see text] could be seen as a generalization of classical edge-connectivity of undirected graphs. In this paper, we get precise values for the strong subgraph 3-arc-connectivity of Cartesian products of some digraph classes. Also, we prove that there is no upper bound on [Formula: see text] depending on [Formula: see text] and [Formula: see text].","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129251601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Gholami, Hovhannes A. Harutyunyan, Edward Maraachlian
{"title":"Optimal Broadcasting in Fully Connected Trees","authors":"M. Gholami, Hovhannes A. Harutyunyan, Edward Maraachlian","doi":"10.1142/s0219265921500377","DOIUrl":"https://doi.org/10.1142/s0219265921500377","url":null,"abstract":"Broadcasting is disseminating information in a network where a specific message must spread to all network vertices as quickly as possible. Finding the minimum broadcast time of a vertex in an arbitrary network is proven to be NP-complete. However, this problem is solvable for a few families of networks. In this paper, we present an optimal algorithm for finding the broadcast time of any vertex in a fully connected tree ([Formula: see text]) in [Formula: see text] time. An [Formula: see text] is formed by attaching arbitrary trees to vertices of a complete graph of size [Formula: see text] where [Formula: see text] is the total number of vertices in the graph.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114633425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}