Journal of King Saud University-Computer and Information Sciences最新文献

筛选
英文 中文
CFNet: Cross-scale fusion network for medical image segmentation CFNet:用于医学图像分割的跨尺度融合网络
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-10 DOI: 10.1016/j.jksuci.2024.102123
Amina Benabid , Jing Yuan , Mohammed A.M. Elhassan , Douaa Benabid
{"title":"CFNet: Cross-scale fusion network for medical image segmentation","authors":"Amina Benabid ,&nbsp;Jing Yuan ,&nbsp;Mohammed A.M. Elhassan ,&nbsp;Douaa Benabid","doi":"10.1016/j.jksuci.2024.102123","DOIUrl":"10.1016/j.jksuci.2024.102123","url":null,"abstract":"<div><p>Learning multi-scale feature representations is essential for medical image segmentation. Most existing frameworks are based on U-shape architecture in which the high-resolution representation is recovered progressively by connecting different levels of the decoder with the low-resolution representation from the encoder. However, intrinsic defects in complementary feature fusion inhibit the U-shape from aggregating efficient global and discriminative features along object boundaries. While Transformer can help model the global features, their computation complexity limits the application in real-time medical scenarios. To address these issues, we propose a Cross-scale Fusion Network (CFNet), combining a cross-scale attention module and pyramidal module to fuse multi-stage/global context information. Specifically, we first utilize large kernel convolution to design the basic building block capable of extracting global and local information. Then, we propose a Bidirectional Atrous Spatial Pyramid Pooling (BiASPP), which employs atrous convolution in the bidirectional paths to capture various shapes and sizes of brain tumors. Furthermore, we introduce a cross-stage attention mechanism to reduce redundant information when merging features from two stages with different semantics. Extensive evaluation was performed on five medical image segmentation datasets: a 3D volumetric dataset, namely Brats benchmarks. CFNet-L achieves 85.74% and 90.98% dice score for Enhanced Tumor and Whole Tumor on Brats2018, respectively. Furthermore, our largest model CFNet-L outperformed other methods on 2D medical image. It achieved 71.95%, 82.79%, and 80.79% SE for STARE, DRIVE, and CHASEDB1, respectively. The code will be available at <span><span>https://github.com/aminabenabid/CFNet</span><svg><path></path></svg></span></p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400212X/pdfft?md5=f9e4769e712ba1e0a899046089ca2727&pid=1-s2.0-S131915782400212X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141705259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TortoiseBFT: An asynchronous consensus algorithm for IoT system TortoiseBFT:物联网系统的异步共识算法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102104
Yang Liu , Jianhao Fu , Miaomiao Zhang , Shidong Shi , Jingwen Chen , Song Peng , Yaoqi Wang
{"title":"TortoiseBFT: An asynchronous consensus algorithm for IoT system","authors":"Yang Liu ,&nbsp;Jianhao Fu ,&nbsp;Miaomiao Zhang ,&nbsp;Shidong Shi ,&nbsp;Jingwen Chen ,&nbsp;Song Peng ,&nbsp;Yaoqi Wang","doi":"10.1016/j.jksuci.2024.102104","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102104","url":null,"abstract":"<div><p>Traditional partial synchronous Byzantine fault tolerant (BFT) protocols are confronted with new challenges when applied to large-scale networks like IoT systems, which bring about rigorous demand for the liveness and consensus efficiency of BFT protocols in asynchronous network environments. HoneyBadgerBFT is the first practical asynchronous BFT protocol, which employs a reliable broadcast protocol (RBC) to broadcast transactions and an asynchronous binary agreement protocol (ABA) to determine whether transactions should be committed. DumboBFT is a follow-up proposal that requires fewer instances of ABA and achieves higher throughput than HoneyBadgerBFT, but it does not optimize the communication overhead of HoneyBadgerBFT.</p><p>In this paper, we propose TortoiseBFT, a high-performance asynchronous BFT protocol with three stages. We can significantly reduce communication overhead by determining the order of transactions first and requesting missing transactions after. Our two-phase transaction recovery mechanism enables nodes to recover missing transactions by seeking help from <span><math><mrow><mn>2</mn><mi>f</mi><mo>+</mo><mn>1</mn></mrow></math></span> nodes. To improve the overall throughput of the system, we lower the verification overhead of threshold signatures in HoneyBadgerBFT, DumboBFT, and DispersedLedger from <span><math><mrow><mi>O</mi><mfenced><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup></mrow></mfenced></mrow></math></span> to <span><math><mrow><mi>O</mi><mfenced><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfenced></mrow></math></span>. We develop a node reputation model that selects producers with stable network conditions, which helps to reduce the number of random lotteries. Experimental results show that TortoiseBFT improves system throughput, reduces transaction delays, and minimizes communication overhead compared to HoneyBadgerBFT, DumboBFT, and DispersedLedger.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001939/pdfft?md5=b62b8656b909e9140f73f1274436f4cf&pid=1-s2.0-S1319157824001939-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients CoD-DSSE:实用高效的动态可搜索对称加密与轻量级客户端
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102106
Ze Zhu, Wanshan Xu, Junfeng Xu
{"title":"CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients","authors":"Ze Zhu,&nbsp;Wanshan Xu,&nbsp;Junfeng Xu","doi":"10.1016/j.jksuci.2024.102106","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102106","url":null,"abstract":"<div><p>Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting user’s privacy. However, the majority of existing DSSE schemes exhibit inefficiencies in practical applications because of their complex structure. In addition, to store the status of keywords, the storage requirements of the client increase proportionally with the number of keyword/document pairs. Therefore, the client storage will be overwhelmed when confronted with a substantial increase in the volume of keyword/document pairs. To solve these issues, we propose a practical efficient dynamic searchable symmetric encryption scheme with lightweight clients—CoD-DSSE. A novel index structure similar to a chest of drawers is proposed in CoD-DSSE, which allows users to efficiently search all document indexes through XOR operations and keeps the keyword status on the server to lightweight clients. Furthermore, we use a random number generator to construct new search tokens for forward security and achieve backward security by using a Bloom filter to store the deleted document index, which can significantly reduce communication costs. The experimental and security analyses show that CoD-DSSE is efficient and secure in practice.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001952/pdfft?md5=6ad7ea6cdc4037881ef06012ec4ce876&pid=1-s2.0-S1319157824001952-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECG signal fusion reconstruction via hash autoencoder and margin semantic reinforcement 通过哈希自动编码器和边际语义强化进行心电信号融合重建
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102124
Yixian Fang , Canwei Wang , Yuwei Ren , Fangzhou Xu
{"title":"ECG signal fusion reconstruction via hash autoencoder and margin semantic reinforcement","authors":"Yixian Fang ,&nbsp;Canwei Wang ,&nbsp;Yuwei Ren ,&nbsp;Fangzhou Xu","doi":"10.1016/j.jksuci.2024.102124","DOIUrl":"10.1016/j.jksuci.2024.102124","url":null,"abstract":"<div><p>The ECG signal is often accompanied by noise, which can affect its shape characteristics, so it is important to perform signal de-noising. However, the commonly used signal noise reduction methods, such as wavelet or filter transformation, often prioritize high-frequency signals over low-frequency ones, leading to the loss of low-frequency band features or difficulties in capturing them. We propose a fusion reconstruction framework that combines hash autoencoder and margin semantic reinforcement to enhance low-frequency band features. Specifically, for labeled samples, margin semantic reinforcement identifies and corrects weight discrepancies among bands with similar waveforms but different labels to amplify the low-frequency signals associated with the label and reduce irrelevant ones. Meanwhile, hash autoencoder utilizes a semantic hash dictionary to reconstruct the original signal and mitigate noise pollution. For unlabeled samples, the hash autoencoder is utilized to generate pseudo-labels, followed by the reproduction of the aforementioned enhanced reconstruction process. The final step involves weighting the two types of signals, enhanced with margin semantics and hash autoencoder reconstruction, to achieve the reconstruction objective of the original signal, facilitating recognition and detection tasks. Experiments conducted on different classical classifiers demonstrate that the reconstructed ECG signals can significantly improve their performance.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002131/pdfft?md5=cb705ac9ed204e1395389a7ec4365e45&pid=1-s2.0-S1319157824002131-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey 实现心脏护理人工智能框架的可解释性:全面调查
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102096
Sreeja M.U. , Abin Oommen Philip , Supriya M.H.
{"title":"Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey","authors":"Sreeja M.U. ,&nbsp;Abin Oommen Philip ,&nbsp;Supriya M.H.","doi":"10.1016/j.jksuci.2024.102096","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102096","url":null,"abstract":"<div><p>Artificial Intelligence is extensively applied in heartcare to analyze patient data, detect anomalies, and provide personalized treatment recommendations, ultimately improving diagnosis and patient outcomes. In a field where accountability is indispensable, the prime reason why medical practitioners are still reluctant to utilize AI models, is the reliability of these models. However, explainable AI (XAI) was a game changing discovery where the so-called back boxes can be interpreted using Explainability algorithms. The proposed conceptual model reviews the existing recent researches for AI in heartcare that have found success in the past few years. The various techniques explored range from clinical history analysis, medical imaging to the nonlinear dynamic theory of chaos to metabolomics with specific focus on machine learning, deep learning and Explainability. The model also comprehensively surveys the different modalities of datasets used in heart disease prediction focusing on how results differ based on the different datasets along with the publicly available datasets for experimentation. The review will be an eye opener for medical researchers to quickly identify the current progress and to identify the most reliable data and AI algorithm that is appropriate for a particular technology for heartcare along with the Explainability algorithm suitable for the specific task.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400185X/pdfft?md5=389a533241a27435252f80bcbd075d37&pid=1-s2.0-S131915782400185X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An accurate transformer-based model for transition-based dependency parsing of free word order languages 基于转换器的自由词序语言转换依赖解析模型
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102107
Fatima Tuz Zuhra , Khalid Saleem , Surayya Naz
{"title":"An accurate transformer-based model for transition-based dependency parsing of free word order languages","authors":"Fatima Tuz Zuhra ,&nbsp;Khalid Saleem ,&nbsp;Surayya Naz","doi":"10.1016/j.jksuci.2024.102107","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102107","url":null,"abstract":"<div><p>Transformer models are the state-of-the-art in Natural Language Processing (NLP) and the core of the Large Language Models (LLMs). We propose a transformer-based model for transition-based dependency parsing of free word order languages. We have performed experiments on five treebanks from the Universal Dependencies (UD) dataset version 2.12. Our experiments show that a transformer model, trained with the dynamic word embeddings performs better than a multilayer perceptron trained on the state-of-the-art static word embeddings even if the dynamic word embeddings have a vocabulary size ten times smaller than the static word embeddings. The results show that the transformer trained on dynamic word embeddings achieves an unlabeled attachment score (UAS) of 84.17% for Urdu language which is <span><math><mrow><mo>≈</mo><mn>3</mn><mo>.</mo><mn>6</mn><mtext>%</mtext></mrow></math></span> and <span><math><mrow><mo>≈</mo><mn>1</mn><mo>.</mo><mn>9</mn><mtext>%</mtext></mrow></math></span> higher than the UAS scores of 80.56857% and 82.26859% achieved by the multilayer perceptron (MLP) using two static state-of-the-art word embeddings. The proposed approach is investigated for Arabic, Persian and Uyghur languages, in addition to Urdu, for UAS scores and the results suggest that the proposed solution outperform the MLP-based approaches.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001964/pdfft?md5=9f26f8ea4918de323a897e760f616273&pid=1-s2.0-S1319157824001964-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ORD-WM: A two-stage loop closure detection algorithm for dense scenes ORD-WM:高密度场景的两阶段闭环检测算法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102115
Chengze Wang , Wei Zhou , Gang Wang
{"title":"ORD-WM: A two-stage loop closure detection algorithm for dense scenes","authors":"Chengze Wang ,&nbsp;Wei Zhou ,&nbsp;Gang Wang","doi":"10.1016/j.jksuci.2024.102115","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102115","url":null,"abstract":"<div><p>Loop closure detection is a crucial technique supporting localization and navigation in autonomous vehicles. Existing research focuses on feature extraction in global scenes while neglecting considerations for local dense environments. In such local scenes, there are a large number of buildings, vehicles, and traffic signs, characterized by abundant objects, dense distribution, and interlaced near and far. The current methods only employ a single strategy for constructing descriptors, which fails to provide a detailed representation of the feature distribution in dense scenes, leading to inadequate discrimination of descriptors. Therefore, this paper proposes a multi-information point cloud descriptor to address the aforementioned issues. This descriptor integrates three types of environmental features: object density, region density, and distance, enhancing the recognition capability in local dense scenes. Additionally, we incorporated wavelet transforms and invariant moments from the image domain, designing wavelet invariant moments with rotation and translation invariance. This approach resolves the issue of point cloud mismatch caused by LiDAR viewpoint variations. In the experimental part, We collected data from dense scenes and conducted targeted experiments, demonstrating that our method achieves excellent loop closure detection performance in these scenes. Finally, the method is applied to a complete SLAM system, achieving accurate mapping.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002040/pdfft?md5=46360415eb85c7c1fd6d73aa79f22586&pid=1-s2.0-S1319157824002040-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application 0-1knapsack问题的二元元启发式算法:性能分析、混合变体和实际应用
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102093
Mohamed Abdel-Basset , Reda Mohamed , Safaa Saber , Ibrahim M. Hezam , Karam M. Sallam , Ibrahim A. Hameed
{"title":"Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application","authors":"Mohamed Abdel-Basset ,&nbsp;Reda Mohamed ,&nbsp;Safaa Saber ,&nbsp;Ibrahim M. Hezam ,&nbsp;Karam M. Sallam ,&nbsp;Ibrahim A. Hameed","doi":"10.1016/j.jksuci.2024.102093","DOIUrl":"10.1016/j.jksuci.2024.102093","url":null,"abstract":"<div><p>This paper examines the performance of three binary metaheuristic algorithms when applied to two distinct knapsack problems (0–1 knapsack problems (KP01) and multidimensional knapsack problems (MKP)). These binary algorithms are based on the classical mantis search algorithm (MSA), the classical quadratic interpolation optimization (QIO) method, and the well-known differential evolution (DE). Because these algorithms were designed for continuous optimization problems, they could not be used directly to solve binary knapsack problems. As a result, the V-shaped and S-shaped transfer functions are used to propose binary variants of these algorithms, such as binary differential evolution (BDE), binary quadratic interpolation optimization (BQIO), and binary mantis search algorithm (BMSA). These binary variants are evaluated using various high-dimensional KP01 examples and compared to several classical metaheuristic techniques to determine their efficacy. To enhance the performance of those binary algorithms, they are combined with repair operator 2 (RO2) to offer better hybrid variants, namely HMSA, HQIO, and HDE. Those hybrid algorithms are evaluated using several medium- and large-scale KP01 and MKP instances, as well as compared to other hybrid algorithms, to demonstrate their effectiveness. This comparison is conducted using three performance metrics: average fitness value, Friedman mean rank, and computational cost. The experimental findings demonstrate that HQIO is a strong alternative for solving KP01 and MKP. In addition, the proposed algorithms are applied to the Merkle-Hellman Knapsack Cryptosystem and the resource allocation problem in adaptive multimedia systems (AMS) to illustrate their effectiveness when applied to optimize those real applications. The experimental findings illustrate that the proposed HQIO is a strong alternative for handling various knapsack-based applications.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001824/pdfft?md5=eecc477cb95abd1cca413bd63da31783&pid=1-s2.0-S1319157824001824-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reference architecture for quantum computing as a service 量子计算即服务的参考架构
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102094
Aakash Ahmad , Ahmed B. Altamimi , Jamal Aqib
{"title":"A reference architecture for quantum computing as a service","authors":"Aakash Ahmad ,&nbsp;Ahmed B. Altamimi ,&nbsp;Jamal Aqib","doi":"10.1016/j.jksuci.2024.102094","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102094","url":null,"abstract":"<div><p>Quantum computers (QCs) aim to disrupt the status-quo of computing – replacing traditional systems and platforms that are driven by digital circuits and modular software – with hardware and software that operate on the principle of quantum mechanics. QCs that rely on quantum mechanics can exploit quantum circuits (i.e., quantum bits for manipulating quantum gates) to achieve ‘quantum computational supremacy’ over traditional, i.e., digital computing systems. Currently, the issues that impede mass-scale adoption of quantum systems are rooted in the fact that building, maintaining, and/or programming QCs is a complex and radically distinct engineering paradigm when compared to the challenges of classical computing and software engineering. Quantum service orientation is seen as a solution that synergises the research on service computing and quantum software engineering (QSE) to allow developers and users to build and utilise quantum software services based on pay-per-shot utility computing model. The pay-per-shot model represents a single execution of instruction on quantum processing unit and it allows vendors (e.g., Amazon Braket) to offer their QC platforms, simulators, and software services to end-users. This research contributes by (i) developing a reference architecture for enabling Quantum Computing as a Service (QCaaS), (ii) implementing microservices with the quantum-classic split pattern as an architectural use-case, and (iii) evaluating the architecture based on practitioners’ feedback. The proposed reference architecture follows a layered software pattern to support the three phases of service lifecycle namely <em>development</em>, <em>deployment</em>, and <em>split</em> of quantum software services. In the QSE context, the research focuses on unifying architectural methods and service-orientation patterns to promote reuse knowledge and best practices to tackle emerging and futuristic challenges of architecting QCaaS.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001836/pdfft?md5=c91ee63f1f40c76da5b6c5eb51b9b263&pid=1-s2.0-S1319157824001836-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database 基于操作员迭代感知图数据库执行计划的新型查询执行时间预测方法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102125
Zhenzhen He , Jiong Yu , Tiquan Gu
{"title":"A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database","authors":"Zhenzhen He ,&nbsp;Jiong Yu ,&nbsp;Tiquan Gu","doi":"10.1016/j.jksuci.2024.102125","DOIUrl":"10.1016/j.jksuci.2024.102125","url":null,"abstract":"<div><p>Query execution time prediction is essential for database query optimization tasks, such as query scheduling, progress monitoring, and resource allocation. In the query execution time prediction tasks, the query plan is often used as the modeling object of a prediction model. Although the learning-based prediction models have been proposed to capture plan features, there are two limitations need to be considered more. First, the parent–child dependencies between plan operators can be captured, but the operator’s branch independence cannot be distinguished. Second, each operator’s output row is its following operator input, but the data iterate transfer operations between operators are ignored. In this study, we propose a graph query execution time prediction model containing a plan module, a query module, a plan-query module, and a prediction module to improve prediction effectiveness. Specifically, the plan module is used to capture the data iterate transfer operations and distinguish independent of branch operators; the query module is used to learn features of query terms that have an influence on the composition of operators; the plan-query interaction module is used to learn the logical correlations of plan and query. The experiment on datasets proves the effectiveness of the operator iterate-aware and query-plan interaction method in our proposed graph query execution prediction model.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002143/pdfft?md5=ad7d539faf5eff6c98349863ba86037c&pid=1-s2.0-S1319157824002143-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信