[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (37)

Search Parameters:
Keywords = top-k query

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 1007 KiB  
Article
HitSim: An Efficient Algorithm for Single-Source and Top-k SimRank Computation
by Jing Bai, Junfeng Zhou, Shuotong Chen, Ming Du, Ziyang Chen and Mengtao Min
Information 2024, 15(6), 348; https://doi.org/10.3390/info15060348 - 12 Jun 2024
Viewed by 549
Abstract
SimRank is a widely used metric for evaluating vertex similarity based on graph topology, with diverse applications such as large-scale graph mining and natural language processing. The objective of the single-source and top-k SimRank query problem is to retrieve the kvertices with [...] Read more.
SimRank is a widely used metric for evaluating vertex similarity based on graph topology, with diverse applications such as large-scale graph mining and natural language processing. The objective of the single-source and top-k SimRank query problem is to retrieve the kvertices with the largest SimRank to the source vertex. However, existing algorithms suffer from inefficiency as they require computing SimRank for all vertices to retrieve the top-k results. To address this issue, we propose an algorithm named HitSimthat utilizes a branch and bound strategy for the single-source and top-k query. HitSim initially partitions vertices into distinct sets based on their shortest-meeting lengths to the source vertex. Subsequently, it computes an upper bound of SimRank for each set. If the upper bound of a set is no larger than the minimum value of the current top-k results, HitSim efficiently batch-prunes the unpromising vertices within the set. However, in scenarios where the graph becomes dense, certain sets with large upper bounds may contain numerous vertices with small SimRank, leading to redundant overhead when processing these vertices. To address this issue, we propose an optimized algorithm named HitSim-OPT that computes the upper bound of SimRank for each vertex instead of each set, resulting in a fine-grained and efficient pruning process. The experimental results conducted on six real-world datasets demonstrate the performance of our algorithms in efficiently addressing the single-source and top-k query problem. Full article
Show Figures

Figure 1

Figure 1
<p>Directed graph <math display="inline"><semantics> <msub> <mi>G</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 2
<p>Directed graph <math display="inline"><semantics> <msub> <mi>G</mi> <mn>2</mn> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>Reverse reachable tree of <math display="inline"><semantics> <msub> <mi>v</mi> <mn>0</mn> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>Reverse reachable tree of <math display="inline"><semantics> <msub> <mi>v</mi> <mn>7</mn> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>Array <math display="inline"><semantics> <mrow> <mi>d</mi> <mi>p</mi> </mrow> </semantics></math> of each vertex.</p>
Full article ">Figure 6
<p>The performance of <math display="inline"><semantics> <mrow> <mi>A</mi> <mi>E</mi> <mo>@</mo> <mn>50</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 7
<p>The performance of <math display="inline"><semantics> <mrow> <mi>P</mi> <mi>r</mi> <mi>e</mi> <mi>c</mi> <mi>i</mi> <mi>s</mi> <mi>i</mi> <mi>o</mi> <mi>n</mi> <mo>@</mo> <mn>50</mn> </mrow> </semantics></math>.</p>
Full article ">Figure 8
<p>Running time of top-250 results query under the same parameters.</p>
Full article ">Figure 9
<p>Preprocessing and query of <span class="html-italic">HitSim</span> and <span class="html-italic">Hitsim-OPT</span>.</p>
Full article ">Figure 10
<p>Scalability tests of <span class="html-italic">HitSim</span> and <span class="html-italic">HitSim-OPT</span> by varying <math display="inline"><semantics> <mrow> <mo>∣</mo> <mi>E</mi> <mo>∣</mo> </mrow> </semantics></math> from 20% to 100% and <span class="html-italic">k</span> from 20 to 2000 on <tt>WE</tt>.</p>
Full article ">
29 pages, 5173 KiB  
Article
Multi-Objective Decision Support for Irrigation Systems Based on Skyline Query
by Chee-Hoe Loh, Yi-Chung Chen, Chwen-Tzeng Su and Sheng-Hao Lin
Appl. Sci. 2024, 14(3), 1189; https://doi.org/10.3390/app14031189 - 31 Jan 2024
Viewed by 724
Abstract
The steady increase in droughts worldwide has compelled many researchers to focus on water allocation. Multi-objective decision support for irrigation systems is a popular topic due to its relevance to the national economy and food supply. However, the majority of researchers have relied [...] Read more.
The steady increase in droughts worldwide has compelled many researchers to focus on water allocation. Multi-objective decision support for irrigation systems is a popular topic due to its relevance to the national economy and food supply. However, the majority of researchers have relied on conventional top-k designs for their decision support systems despite their limitations with regard to multi-objective systems. Thus, we propose applying a skyline query to the problem. As the input and output formats of skyline queries differ significantly from those of existing systems, we developed a new genetic algorithm and objective ranking. Qualitative and quantitative experiments using real-world data from Taiwan’s largest irrigated region demonstrate the effectiveness of the proposed approach. Full article
(This article belongs to the Section Agricultural Science and Technology)
Show Figures

Figure 1

Figure 1
<p>Irrigation diagrams of the Jhuoshuei River region in the Chiayi-Tainan Plain of Taiwan.</p>
Full article ">Figure 2
<p>Diagram of irrigation example.</p>
Full article ">Figure 3
<p>3D plot representing results of (<b>a</b>) skyline query and (<b>b</b>) top-<span class="html-italic">k</span> query.</p>
Full article ">Figure 4
<p>Flow chart of the proposed algorithm.</p>
Full article ">Figure 5
<p>Irrigation diagrams explaining the problem of using GAs directly in the proposed problem. (<b>a</b>) The water cannot reach Branch 5 from upstream. (<b>b</b>) The total water demand is far greater than the available water amount. (<b>c</b>) The total water demand is far less than the available water amount.</p>
Full article ">Figure 6
<p>Comparisons of temporary skyline results obtained using the GA from different numbers of generations with water supply rates of 0~25%: (<b>a</b>) rice and sugar cane, (<b>b</b>) rice and vegetables, (<b>c</b>) rice and economic benefits, (<b>d</b>) rice and compensation, (<b>e</b>) sugar cane and vegetables, (<b>f</b>) sugar cane and economic benefits, (<b>g</b>) sugar cane and compensation, (<b>h</b>) vegetables and economic benefits, (<b>i</b>) vegetables and compensation, and (<b>j</b>) economic benefits and compensation.</p>
Full article ">Figure 7
<p>Comparisons of temporary skyline results obtained using the GA from different numbers of generations with water supply rates of 25~50%: (<b>a</b>) rice and sugar cane, (<b>b</b>) rice and vegetables, (<b>c</b>) rice and economic benefits, (<b>d</b>) rice and compensation, (<b>e</b>) sugar cane and vegetables, (<b>f</b>) sugar cane and economic benefits, (<b>g</b>) sugar cane and compensation, (<b>h</b>) vegetables and economic benefits, (<b>i</b>) vegetables and compensation, and (<b>j</b>) economic benefits and compensation.</p>
Full article ">Figure 8
<p>Comparisons of temporary skyline results obtained using GA from different numbers of generations with water supply rates of 50~75%: (<b>a</b>) rice and sugar cane, (<b>b</b>) rice and vegetables, (<b>c</b>) rice and economic benefits, (<b>d</b>) rice and compensation, (<b>e</b>) sugar cane and vegetables, (<b>f</b>) sugar cane and economic benefits, (<b>g</b>) sugar cane and compensation, (<b>h</b>) vegetables and economic benefits, (<b>i</b>) vegetables and compensation, and (<b>j</b>) economic benefits and compensation.</p>
Full article ">Figure 9
<p>Number of times branches are selected in skyline solutions under different water supply rates.</p>
Full article ">Figure 10
<p>Results of the skyline and top-<span class="html-italic">k</span> queries for three water supply rates: (<b>a</b>) 0~25%, (<b>b</b>) 25~50%, and (<b>c</b>) 50~75%.</p>
Full article ">Figure 11
<p>Numbers of times branches are selected in top-three and bottom-three skyline solutions using the first combination.</p>
Full article ">Figure 12
<p>Number of times branches are selected in the top three skyline solutions using the second combination.</p>
Full article ">Figure 13
<p>Number of times branches are selected in top three skyline solutions using third ranking.</p>
Full article ">
20 pages, 1590 KiB  
Article
Query Optimization in Distributed Database Based on Improved Artificial Bee Colony Algorithm
by Yan Du, Zhi Cai and Zhiming Ding
Appl. Sci. 2024, 14(2), 846; https://doi.org/10.3390/app14020846 - 19 Jan 2024
Viewed by 1640
Abstract
Query optimization is one of the key factors affecting the performance of database systems that aim to enact the query execution plan with minimum cost. Particularly in distributed database systems, due to the multiple copies of the data that are stored in different [...] Read more.
Query optimization is one of the key factors affecting the performance of database systems that aim to enact the query execution plan with minimum cost. Particularly in distributed database systems, due to the multiple copies of the data that are stored in different data nodes, resulting in the dramatic increase in the feasible query execution plans for a query statement. Because of the increasing volume of stored data, the cluster size of distributed databases also increases, resulting in poor performance of current query optimization algorithms. In this case, a dynamic perturbation-based artificial bee colony algorithm is proposed to solve the query optimization problem in distributed database systems. The improved artificial bee colony algorithm improves the global search capability by combining the selection, crossover, and mutation operators of the genetic algorithm to overcome the problem of falling into the local optimal solution easily. At the same time, the dynamic perturbation factor is introduced so that the algorithm parameters can be dynamically varied along with the process of iteration as well as the convergence degree of the whole population to improve the convergence efficiency of the algorithm. Finally, comparative experiments conducted to assess the average execution cost of Top-k query plans generated by the algorithms and the convergence speed of algorithms under the conditions of query statements in six different dimension sets. The results demonstrate that the Top-k query plans generated by the proposed method have a lower execution cost and a faster convergence speed, which can effectively improve the query efficiency. However, this method requires more execution time. Full article
Show Figures

Figure 1

Figure 1
<p>Query execution process in a distributed database.</p>
Full article ">Figure 2
<p>Data preprocessing.</p>
Full article ">Figure 3
<p>Two-point cross-operator example.</p>
Full article ">Figure 4
<p>Two-point mutation operator example.</p>
Full article ">Figure 5
<p>Data sharding-site matrix.</p>
Full article ">Figure 6
<p>Several alternative query plans.</p>
Full article ">Figure 7
<p>Crossover operation example.</p>
Full article ">Figure 8
<p>The flowchart of overall algorithm.</p>
Full article ">Figure 9
<p>The Top-1 optimal query plan execution cost.</p>
Full article ">Figure 10
<p>The average execution cost of the final Top-10 query plans.</p>
Full article ">Figure 11
<p>The average execution cost of the final Top-20 query plans.</p>
Full article ">Figure 12
<p>The iterative convergence efficiency of each method when DSM is 50 × 100.</p>
Full article ">Figure 13
<p>The iterative convergence efficiency of each method when DSM is 85 × 100.</p>
Full article ">Figure 14
<p>The iterative convergence efficiency of each method when DSM is 50 × 150.</p>
Full article ">Figure 15
<p>The iterative convergence efficiency of each method when DSM is 85 × 150.</p>
Full article ">Figure 16
<p>The iterative convergence efficiency of each method when DSM is 50 × 200.</p>
Full article ">Figure 17
<p>The iterative convergence efficiency of each method when DSM is 85 × 200.</p>
Full article ">Figure 18
<p>The best query plan execution cost.</p>
Full article ">Figure 19
<p>Comparing three algorithms in terms of time metrics.</p>
Full article ">
25 pages, 4418 KiB  
Article
Top-k Graph Similarity Search Algorithm Based on Chi-Square Statistics in Probabilistic Graphs
by Ziyang Chen, Junhao Zhuang, Xuan Wang, Xian Tang, Kun Yang, Ming Du and Junfeng Zhou
Electronics 2024, 13(1), 192; https://doi.org/10.3390/electronics13010192 - 1 Jan 2024
Viewed by 852
Abstract
Top-k graph similarity search on probabilistic graphs is widely used in various scenarios, such as symptom–disease diagnostics, community discovery, visual pattern recognition, and communication networks. The state-of-the-art method uses the chi-square statistics to speed up the process. The effectiveness of the chi-square statistics [...] Read more.
Top-k graph similarity search on probabilistic graphs is widely used in various scenarios, such as symptom–disease diagnostics, community discovery, visual pattern recognition, and communication networks. The state-of-the-art method uses the chi-square statistics to speed up the process. The effectiveness of the chi-square statistics solution depends on the effectiveness of the sample observation and expectation. The existing method assumes that the labels in the data graphs are subject to uniform distribution and calculate the chi-square value based on this. In fact, however, the actual distribution of the labels does not meet the requirement of uniform distribution, resulting in a low quality of the returned results. To solve this problem, we propose a top-k similar subgraph search algorithm ChiSSA based on chi-square statistics. We propose two ways to calculate the expectation vector according to the actual distribution of labels in the graph, including the local expectation calculation method based on the vertex neighbors and the global expectation calculation method based on the label distribution of the whole graph. Furthermore, we propose two optimization strategies to improve the accuracy of query results and the efficiency of our algorithm. We conduct rich experiments on real datasets. The experimental results on real datasets show that our algorithm improves the quality and accuracy by an average of 1.66× and 1.68× in terms of time overhead, it improves by an average of 3.41×. Full article
(This article belongs to the Special Issue Advances in Graph-Based Data Mining)
Show Figures

Figure 1

Figure 1
<p>Result of ChiSeL.</p>
Full article ">Figure 2
<p>Process of ChiSSA.</p>
Full article ">Figure 3
<p>Comparison of accuracy of results.</p>
Full article ">Figure 4
<p>Comparison of sums of result probabilities.</p>
Full article ">Figure 5
<p>Comparisons of time of calculating chi-square values.</p>
Full article ">Figure 6
<p>Total runtime.</p>
Full article ">Figure 7
<p>Influence of <span class="html-italic">k</span> on the accuracy.</p>
Full article ">Figure 8
<p>Influence of <span class="html-italic">k</span> on the probability sum.</p>
Full article ">Figure 9
<p>Influence of <span class="html-italic">k</span> on the time cost.</p>
Full article ">Figure 10
<p>Influence of number of labels on the index size.</p>
Full article ">Figure 11
<p>Influence of number of labels on the index construction time.</p>
Full article ">
15 pages, 959 KiB  
Article
Genomic Selection for Live Weight in the 14th Month in Alpine Merino Sheep Combining GWAS Information
by Chenglan Li, Jianye Li, Haifeng Wang, Rui Zhang, Xuejiao An, Chao Yuan, Tingting Guo and Yaojing Yue
Animals 2023, 13(22), 3516; https://doi.org/10.3390/ani13223516 - 14 Nov 2023
Cited by 4 | Viewed by 1262
Abstract
Alpine Merino Sheep is a novel breed reared from Australian Merino Sheep as the father and Gansu Alpine Fine-Wool Sheep as the mother, living all year in cold and arid alpine areas with exceptional wool quality and meat performance. Body weight is an [...] Read more.
Alpine Merino Sheep is a novel breed reared from Australian Merino Sheep as the father and Gansu Alpine Fine-Wool Sheep as the mother, living all year in cold and arid alpine areas with exceptional wool quality and meat performance. Body weight is an important economic trait of the Alpine Merino Sheep, but there is limited research on identifying the genes associated with live weight in the 14th month for improving the accuracy of the genomic prediction of this trait. Therefore, this study’s sample comprised 1310 Alpine Merino Sheep ewes, and the Fine Wool Sheep 50K Panel was used for genome-wide association study (GWAS) analysis to identify candidate genes. Moreover, the trial population (1310 ewes) in this study was randomly divided into two groups. One group was used as the population for GWAS analysis and screened for the most significant top 5%, top 10%, top 15%, and top 20% SNPs to obtain prior marker information. The other group was used to estimate the genetic parameters based on the weight assigned by heritability combined with different prior marker information. The aim of this study was to compare the accuracy of genomic breeding value estimation when combined with prior marker information from GWAS analysis with the optimal linear unbiased prediction method for genome selection (GBLUP) for the breeding value of target traits. Finally, the accuracy was evaluated using the five-fold cross-validation method. This research provides theoretical and technical support to improve the accuracy of sheep genome selection and better guide breeding. The results demonstrated that eight candidate genes were associated with GWAS analysis, and the gene function query and literature search results suggested that FAM184B, NCAPG, MACF1, ANKRD44, DCAF16, FUK, LCORL, and SYN3 were candidate genes affecting live weight in the 14th month (WT), which regulated the growth of muscle and bone in sheep. In genome selection analysis, the heritability of GBLUP to calculate the WT was 0.335–0.374, the accuracy after five-fold cross-verification was 0.154–0.190, and after assigning different weights to the top 5%, top 10%, top 15%, and top 20% of the GWAS results in accordance with previous information to construct the G matrix, the accuracy of the WT in the GBLUP model was improved by 2.59–7.79%. Full article
(This article belongs to the Section Animal Genetics and Genomics)
Show Figures

Figure 1

Figure 1
<p>(<b>a</b>) Figure indicates that there may be stratification in the population; (<b>b</b>) Figure indicates that LD gradually flattens out when the linkage disequilibrium is equal to 100 kb.</p>
Full article ">Figure 2
<p>(<b>a</b>) represents the Manhattan plot in the genome-wide association studies (GWAS) results, and the starting point in the figure is around 10<sup>−3</sup>; (<b>b</b>) represents the QQ plot in the GWAS result, which sets the two threshold lines (red lines) of 0.05 and 1, respectively.</p>
Full article ">
24 pages, 1274 KiB  
Article
DNS-BC: Fast, Reliable and Secure Domain Name System Caching System Based on a Consortium Blockchain
by Tianfu Gao and Qingkuan Dong
Sensors 2023, 23(14), 6366; https://doi.org/10.3390/s23146366 - 13 Jul 2023
Cited by 2 | Viewed by 2028
Abstract
The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. The [...] Read more.
The Domain Name System (DNS) is a fundamental component of the internet, responsible for resolving domain names into IP addresses. DNS servers are typically categorized into four types: recursive resolvers, root name servers, Top-Level Domain (TLD) name servers, and authoritative name servers. The latter three types of servers store actual records, while recursive resolvers do not store any real data and are only responsible for querying the other three types of servers and responding to clients. Recursive resolvers typically maintain a caching system to speed up response times, but these caching systems have the drawbacks of a low real-time performance, a poor accuracy, and many security and privacy issues. In this paper, we propose a caching system based on a consortium blockchain, namely DNS-BC, which uses the synchronization mechanism of the consortium blockchain to achieve a high real-time performance, uses the immutable mechanism of the consortium blockchain and our designed credibility management system to achieve up to a 100% accuracy, and has been combined with encrypted transmission protocols to solve common security and privacy issues. At the same time, this caching system can greatly reduce the traffic that name servers need to handle, thereby protecting them from Denial-of-Service (DoS) attacks. To further accelerate the data transmission speed, we have designed a new encrypted DNS protocol called DNS over KCP (DoK). The DoK protocol is based on the KCP protocol, which is a fast and reliable transmission protocol, and its latency can reach one-third of that of TCP when the network environment deteriorates. In our experiments, the transmission time of this protocol is about a quarter of that of the widely used encrypted protocols DNS over TLS (DoT) and DNS over HTTPS (DoH). Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Typical architecture of a DNS system.</p>
Full article ">Figure 2
<p>Architecture of DNS-BC.</p>
Full article ">Figure 3
<p>Workflow of the recursive resolvers in DNS-BC.</p>
Full article ">Figure 4
<p>Function modules of the caching system.</p>
Full article ">Figure 5
<p>Electing authoritative nodes.</p>
Full article ">Figure 6
<p>The format of the DoK message. (<b>a</b>) DoK message format; (<b>b</b>) flags field.</p>
Full article ">Figure 7
<p>Workflow of the DoK protocol.</p>
Full article ">Figure 8
<p>Probability distribution of query time. HM stands for Hashmap, which is the hashmap-based traditional caching system. BC stands for Blockchain, which is the consortium-blockchain-based caching system DNS-BC.</p>
Full article ">Figure 9
<p>Probability distribution of query time in different architectures.</p>
Full article ">Figure 10
<p>Probability distribution of query time at different network scales. NC stands for Node and Client, which can be used as a unit to describe the network scale.</p>
Full article ">Figure 11
<p>Cache hit rate. NSs stands for Name Servers.</p>
Full article ">Figure 12
<p>Number of requests to process in 1000 requests. NSs stands for Name Servers and RRs stands for Recursive Resolvers.</p>
Full article ">Figure 13
<p>Probability distribution of query time with different message lengths.</p>
Full article ">Figure 14
<p>Probability distribution of query time with different encryption methods.</p>
Full article ">
19 pages, 3636 KiB  
Review
A Forty-Year Analysis of the Literature on Babesia Infection (1982–2022): A Systematic Bibliometric Approach
by Samson Anjikwi Malgwi, Ropo Ebenezer Ogunsakin, Abolade David Oladepo, Matthew Adekunle Adeleke and Moses Okpeku
Int. J. Environ. Res. Public Health 2023, 20(12), 6156; https://doi.org/10.3390/ijerph20126156 - 16 Jun 2023
Cited by 1 | Viewed by 1838
Abstract
Babesia infection is a tick-borne protozoan disease associated with significant veterinary, economic, and medical importance. This infection affects many hosts, ranging from wild to domestic animals and including man. All vertebrates serve as potential carriers due to the huge diversity of the species. [...] Read more.
Babesia infection is a tick-borne protozoan disease associated with significant veterinary, economic, and medical importance. This infection affects many hosts, ranging from wild to domestic animals and including man. All vertebrates serve as potential carriers due to the huge diversity of the species. Babesiosis has been associated with severe economic loss in livestock production, especially in cattle farming, and is also a major public health concern in man, which could be fatal. The infection is usually opportunistic, ranging from asymptomatic to symptomatic, usually in immunocompromised subjects or under conditions of stressful management. This study was designed to uncover trends in relation to publication growth and further explore research output regarding babesiosis from data indexed in the WoS. The WoS is the only platform used to map publications on Babesia infection. The search term “babesiosis” or “Babesia infection” was used to extract articles published across the study period from 1982 to 2022. The inclusion criteria were restricted to only articles for the analysis. The results from the search query showed that a total of 3763 articles were published during the study period with an average of 91.70 ± 43.87 articles annually and an average total citation (n = 1874.8). An annual growth rate of 2.5% was recorded during the study period. The year 2021 had the highest number of published articles (n = 193, 5.1%) and citations (n = 7039). The analysis of the most relevant keywords and titles showed that infection (n = 606, 16.1%), babesiosis (n = 444, 11.7%), and Babesia (n = 1302, 16%) were the most relevant keyword plus (ID), author keyword (DE), and title, respectively. The common conceptual framework analysis through K-means clustering showed two clusters comprising 4 and 41 elements, respectively. The United States of America is the top-performing country in terms of article production (n = 707, 20.8%) and the leading funder for babesiosis research, with two of its agencies ranked at the top. These are the Department of Health and Human Services (n = 254, 6.7%) and the National Institute of Health (n= 238,6.3%). Igarashi I. is the top-performing author (n = 231, 6.1%), while Veterinary Parasitology is ranked the top journal (n = 393, 10.4%) in terms of babesiosis publications. Overall, an increase in publications was observed in the study period, with significant output from developed nations. Full article
(This article belongs to the Special Issue Chronic Infection of Tropical Diseases)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Flowchart of bibliometric processing of information (source [<a href="#B37-ijerph-20-06156" class="html-bibr">37</a>]). NB: PCA, principal component analysis; MCA, multiple correspondence analysis; MDS, multidimensional scaling.</p>
Full article ">Figure 2
<p>Growth of publications (articles) on babesiosis research (1982–2022).</p>
Full article ">Figure 3
<p>Annual total citations of articles on babesiosis (1982–2022).</p>
Full article ">Figure 4
<p>Tree-map analysis of words used on the title of research in the literature on babesiosis.</p>
Full article ">Figure 5
<p>Analysis of thematic evolution of keywords in research articles on babesiosis from 1982 to 2022. Note: Colour helps in the identification of different research themes. Thicker lines indicate higher significance between the two periods.</p>
Full article ">Figure 6
<p>Authors’ productivity on babesiosis. Note: The larger the circle, the higher the number of documents, and the darker the colour, the higher the number of citations.</p>
Full article ">Figure 7
<p>Conceptual frames associated with babesiosis studies (1982−2022)<b>.</b> The 3763 articles used for the study showed K-means clustering with two clusters with 41 and 4 elements, highlighting the conceptual frameworks linked to babesiosis. Note: The elements closest to the centre are the essential elements.</p>
Full article ">
21 pages, 3063 KiB  
Article
Finding the Top-K Heavy Hitters in Data Streams: A Reconfigurable Accelerator Based on an FPGA-Optimized Algorithm
by Ali Ebrahim
Electronics 2023, 12(11), 2376; https://doi.org/10.3390/electronics12112376 - 24 May 2023
Viewed by 1810
Abstract
This paper presents a novel approach for accelerating the top-k heavy hitters query in data streams using Field Programmable Gate Arrays (FPGAs). Current hardware acceleration approaches rely on the direct and strict mapping of software algorithms into hardware, limiting their performance and practicality [...] Read more.
This paper presents a novel approach for accelerating the top-k heavy hitters query in data streams using Field Programmable Gate Arrays (FPGAs). Current hardware acceleration approaches rely on the direct and strict mapping of software algorithms into hardware, limiting their performance and practicality due to the lack of hardware optimizations at an algorithmic level. The presented approach optimizes a well-known software algorithm by carefully relaxing some of its requirements to allow for the design of a practical and scalable hardware accelerator that outperforms current state-of-the-art accelerators while maintaining near-perfect accuracy. This paper details the design and implementation of an optimized FPGA accelerator specifically tailored for computing the top-k heavy hitters query in data streams. The presented accelerator is entirely specified at the C language level and is easily reproducible with High-Level Synthesis (HLS) tools. Implementation on Intel Arria 10 and Stratix 10 FPGAs using Intel HLS compiler showed promising results—outperforming prior state-of-the-art accelerators in terms of throughput and features. Full article
(This article belongs to the Special Issue Applications Enabled by FPGA-Based Technology)
Show Figures

Figure 1

Figure 1
<p>Probabilistic sampling algorithm.</p>
Full article ">Figure 2
<p>The proposed optimized function for updating the round table.</p>
Full article ">Figure 3
<p>Updating the heavy hitter summary.</p>
Full article ">Figure 4
<p>Architecture overview of the HLS kernel.</p>
Full article ">Figure 5
<p>Pre-count: breaking memory dependency for <span class="html-italic">m</span> loop iterations using forward weight accumulation.</p>
Full article ">Figure 6
<p>Resolving data hazards before the round table update stage.</p>
Full article ">Figure 7
<p>Resolving data hazards before the heavy hitter summary update stage.</p>
Full article ">Figure 8
<p>Scaling performance with parallelism.</p>
Full article ">Figure 9
<p>Results for synthetic data streams modelled as Zipfian distributions.</p>
Full article ">Figure 10
<p>Results for real datasets.</p>
Full article ">
24 pages, 7385 KiB  
Article
Pharmacophore-Based Virtual Screening and In-Silico Explorations of Biomolecules (Curcumin Derivatives) of Curcuma longa as Potential Lead Inhibitors of ERBB and VEGFR-2 for the Treatment of Colorectal Cancer
by Syeda Abida Ejaz, Mubashir Aziz, Mohamed Fawzy Ramadan, Ammara Fayyaz and Muhammad Sajjad Bilal
Molecules 2023, 28(10), 4044; https://doi.org/10.3390/molecules28104044 - 12 May 2023
Cited by 4 | Viewed by 2512
Abstract
The newly FDA-approved drug, Axitinib, is an effective therapy against RTKs, but it possesses severe adverse effects like hypertension, stomatitis, and dose-dependent toxicity. In order to ameliorate Axitinib’s downsides, the current study is expedited to search for energetically stable and optimized pharmacophore features [...] Read more.
The newly FDA-approved drug, Axitinib, is an effective therapy against RTKs, but it possesses severe adverse effects like hypertension, stomatitis, and dose-dependent toxicity. In order to ameliorate Axitinib’s downsides, the current study is expedited to search for energetically stable and optimized pharmacophore features of 14 curcumin (1,7-bis(4-hydroxy-3-methoxyphenyl)hepta-1,6-diene-3,5-dione) derivatives. The rationale behind the selection of curcumin derivatives is their reported anti-angiogenic and anti-cancer properties. Furthermore, they possessed a low molecular weight and a low toxicity profile. In the current investigation, the pharmacophore model-based drug design, facilitates the filtering of curcumin derivatives as VEGFR2 interfacial inhibitors. Initially, the Axitinib scaffold was used to build a pharmacophore query model against which curcumin derivatives were screened. Then, top hits from pharmacophore virtual screening were subjected to in-depth computational studies such as molecular docking, density functional theory (DFT) studies, molecular dynamics (MD) simulations, and ADMET property prediction. The findings of the current investigation revealed the substantial chemical reactivity of the compounds. Specifically, compounds S8, S11, and S14 produced potential molecular interactions against all four selected protein kinases. Docking scores of −41.48 and −29.88 kJ/mol for compounds S8 against VEGFR1 and VEGFR3, respectively, were excellent. Whereas compounds S11 and S14 demonstrated the highest inhibitory potential against ERBB and VEGFR2, with docking scores of −37.92 and −38.5 kJ/mol against ERBB and −41.2 and −46.5 kJ/mol against VEGFR-2, respectively. The results of the molecular docking studies were further correlated with the molecular dynamics simulation studies. Moreover, HYDE energy was calculated through SeeSAR analysis, and the safety profile of the compounds was predicted through ADME studies. Full article
(This article belongs to the Special Issue Computational Drug Discovery: Methods and Applications)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>Curcumin analogues and FDA-approved Axitinib [<a href="#B19-molecules-28-04044" class="html-bibr">19</a>].</p>
Full article ">Figure 2
<p>Generated chemical features of Axitinib based on intermolecular interactions.</p>
Full article ">Figure 3
<p>An Illustration of the pharmacophore-based virtual screening workflow.</p>
Full article ">Figure 4
<p>Optimized structures along with LUMO and HOMO energy transitions for <b>S1</b>, <b>S11</b>, and <b>S14</b>.</p>
Full article ">Figure 5
<p>3D and 2D interaction of reference compound Irinotecan, <b>S11</b> and <b>S14</b> within the active pocket of ERBB tyrosine kinase.</p>
Full article ">Figure 6
<p>3D and 2D interaction of reference compound Irinotecan, <b>S11</b> and <b>S14</b> within the active pocket of VEGFR-2 tyrosine kinase.</p>
Full article ">Figure 7
<p>Root mean square deviation (RMSD) of VEGFR2, and VEGFR2-<b>S14</b> complex as a function of time. The blue colored trajectory indicates the evolution of RMSD for C alpha atoms, whereas the red trajectory is for the protein–ligand complex.</p>
Full article ">Figure 8
<p>Root mean square fluctuation (RMSF) of Cα atoms of VEGFR2 in complex with <b>S14</b>.</p>
Full article ">Figure 9
<p>Illustration of contact map histogram and timeline for 50 ns simulations.</p>
Full article ">Figure 9 Cont.
<p>Illustration of contact map histogram and timeline for 50 ns simulations.</p>
Full article ">Figure 10
<p>Root mean square deviation (RMSD) of ERBB, and the EGFR–<b>S14</b> complex as a function of time. The blue colored trajectory indicates the evolution of RMSD for C alpha atoms, whereas the red trajectory represents the protein–ligand complex.</p>
Full article ">Figure 11
<p>Root mean square fluctuation (RMSF) of Cα atoms of complex ERBB–<b>S14</b>.</p>
Full article ">Figure 12
<p>The contact map analysis and timeline of ERBB–<b>S14</b> complex.</p>
Full article ">Figure 12 Cont.
<p>The contact map analysis and timeline of ERBB–<b>S14</b> complex.</p>
Full article ">Figure 13
<p>3D (<b>A</b>) and 2D (<b>B</b>) interaction of derivative <b>S14</b> within the active pocket of ERBB and VEGFR2 kinase.</p>
Full article ">Figure 14
<p>Binding interactions of Axitinib (green sticks) with VEGFR-2. The pharmacophore features are represented as blue, purple, and orange colored spheres.</p>
Full article ">
14 pages, 3182 KiB  
Article
Locality-Sensitive Hashing of Soft Biometrics for Efficient Face Image Database Search and Retrieval
by Ameerah Abdullah Alshahrani and Emad Sami Jaha
Electronics 2023, 12(6), 1360; https://doi.org/10.3390/electronics12061360 - 13 Mar 2023
Cited by 3 | Viewed by 2042
Abstract
As multimedia technology has advanced in recent years, the use of enormous image libraries has dramatically expanded. In applications for image processing, image retrieval has emerged as a crucial technique. Content-based face image retrieval is a well-established technology in many real-world applications, such [...] Read more.
As multimedia technology has advanced in recent years, the use of enormous image libraries has dramatically expanded. In applications for image processing, image retrieval has emerged as a crucial technique. Content-based face image retrieval is a well-established technology in many real-world applications, such as social media, where dependable retrieval capabilities are required to enable quick search among large numbers of images. Humans frequently use faces to recognize and identify individuals. Face recognition from official or personal photos is becoming increasingly popular as it can aid crime detectives in identifying victims and criminals. Furthermore, a large number of images requires a large amount of storage, and the process of image comparison and matching, consequently, takes longer. Hence, the query speed and low storage consumption of hash-based image retrieval techniques have garnered a considerable amount of interest. The main contribution of this work is to try to overcome the challenge of performance improvement in image retrieval by using locality-sensitive hashing (LSH) for retrieving top-matched face images from large-scale databases. We use face soft biometrics as a search input and propose an effective LSH-based method to replace standard face soft biometrics with their corresponding hash codes for searching a large-scale face database and retrieving the top-k of the matching face images with higher accuracy in less time. The experimental results, using the Labeled Faces in the Wild (LFW) database together with the corresponding database of attributes (LFW-attributes), show that our proposed method using LSH face soft biometrics (Soft BioHash) improves the performance of face image database search and retrieval and also outperforms the LSH hard face biometrics method (Hard BioHash). Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Generic face image retrieval system.</p>
Full article ">Figure 2
<p>Creating an image data index using LSH; each bucket represents a subject in this context.</p>
Full article ">Figure 3
<p>Hash and image similarities.</p>
Full article ">Figure 4
<p>Overview of the proposed methodology.</p>
Full article ">Figure 5
<p>Face detection process.</p>
Full article ">Figure 6
<p>A few random samples from the LFW dataset.</p>
Full article ">Figure 7
<p>Example of top 20 retrieval results of a query image that correctly retrieved at rank 3.</p>
Full article ">Figure 8
<p>Performance comparison of Hard and Soft BioHash methods with various standard evaluation metrics. (<b>a</b>) Represents performance with 1000 samples; (<b>b</b>) represents the performance with 5743 samples.</p>
Full article ">Figure 9
<p>CMC curves of retrieval performance comparing the proposed method and traditional method when examined for different numbers of data samples.</p>
Full article ">
20 pages, 5396 KiB  
Article
Skyline-Based Sorting Approach for Rail Transit Stations Visualization
by Zhi Cai, Fangzhe Liu, Qiong Qi, Xing Su, Limin Guo and Zhiming Ding
ISPRS Int. J. Geo-Inf. 2023, 12(3), 110; https://doi.org/10.3390/ijgi12030110 - 6 Mar 2023
Cited by 1 | Viewed by 1409
Abstract
Urban rail transit is an essential part of the urban public transportation system. The reasonable spatial data visualization of urban rail transit stations can provide a more intuitive way for the majority of travelers to arrange travel plans and find destinations. The map [...] Read more.
Urban rail transit is an essential part of the urban public transportation system. The reasonable spatial data visualization of urban rail transit stations can provide a more intuitive way for the majority of travelers to arrange travel plans and find destinations. The map service of rail transit stations generated by data visualization has gradually become indispensable information guidance in the rail transit system. The existing map service icons block each other when the scale changes, and new stations cannot be displayed dynamically when users drag the map. This paper uses filtering and sorting methods to dynamically query and visualize the relatively more important transportation stations within the users’ visible range, so as to solve the above problems and provide people with better transportation services. Our method introduces three constraints: spatial diversity, time-sharing passenger flow analysis and whether it is a transit station, and calculates the scores of constraint relationships of feature objects to evaluate stations. On the basis of the skyline query, the scores of feature objects are combined and sorted to obtain an ordered object set of the most interesting k points(top-k POIs), and the rail transit stations are dynamically retrieved and visualized. Before sorting POIs, we filter out POIs that need to be fitted, so that only the k most representative POIs in the currently visible range are displayed. When the map scale changes, the displayed POIs are updated. Finally, through the statistics of efficiency calculation of this method under different scales and centers, combined with users’ evaluations, it was proved that our method could better display critical information and improve user experience. Full article
Show Figures

Figure 1

Figure 1
<p>Example of surrounding POIs for existing map services.</p>
Full article ">Figure 2
<p>Example of spatial constraints.</p>
Full article ">Figure 3
<p>Traveler volume over equivalent time (hourly) of entering riders.</p>
Full article ">Figure 4
<p>Examples of overlapping icons.</p>
Full article ">Figure 5
<p>Flow chart of Skyline-based <span class="html-italic">top-k</span> sorting.</p>
Full article ">Figure 6
<p>Area A and s1–s5.</p>
Full article ">Figure 7
<p>Numbers and average values of POIs of <math display="inline"><semantics> <msub> <mi>s</mi> <mn>1</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi>s</mi> <mn>5</mn> </msub> </semantics></math> in different scales.</p>
Full article ">Figure 8
<p>Comparison of POI display effect.</p>
Full article ">Figure 9
<p>Number of POIs and run time of <math display="inline"><semantics> <msub> <mi>s</mi> <mn>1</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi>s</mi> <mn>5</mn> </msub> </semantics></math> in different scales.</p>
Full article ">Figure 10
<p>Number of POIs and calculation time of <math display="inline"><semantics> <msub> <mi>s</mi> <mn>1</mn> </msub> </semantics></math>–<math display="inline"><semantics> <msub> <mi>s</mi> <mn>5</mn> </msub> </semantics></math> under level 12.</p>
Full article ">Figure 11
<p>Number of POIs and the calculation time after dragging the map.</p>
Full article ">Figure 12
<p>Selection results under different <math display="inline"><semantics> <mi>α</mi> </semantics></math>, <math display="inline"><semantics> <mi>β</mi> </semantics></math> and <math display="inline"><semantics> <mi>γ</mi> </semantics></math> values.</p>
Full article ">
24 pages, 1352 KiB  
Article
An Intelligent Platform for Software Component Mining and Retrieval
by Nazia Bibi, Tauseef Rana, Ayesha Maqbool, Farkhanda Afzal, Ali Akgül and Manuel De la Sen
Sensors 2023, 23(1), 525; https://doi.org/10.3390/s23010525 - 3 Jan 2023
Cited by 2 | Viewed by 1689
Abstract
The development of robotic applications necessitates the availability of useful, adaptable, and accessible programming frameworks. Robotic, IoT, and sensor-based systems open up new possibilities for the development of innovative applications, taking advantage of existing and new technologies. Despite much progress, the development of [...] Read more.
The development of robotic applications necessitates the availability of useful, adaptable, and accessible programming frameworks. Robotic, IoT, and sensor-based systems open up new possibilities for the development of innovative applications, taking advantage of existing and new technologies. Despite much progress, the development of these applications remains a complex, time-consuming, and demanding activity. Development of these applications requires wide utilization of software components. In this paper, we propose a platform that efficiently searches and recommends code components for reuse. To locate and rank the source code snippets, our approach uses a machine learning approach to train the schema. Our platform uses trained schema to rank code snippets in the top k results. This platform facilitates the process of reuse by recommending suitable components for a given query. The platform provides a user-friendly interface where developers can enter queries (specifications) for code search. The evaluation shows that our platform effectively ranks the source code snippets and outperforms existing baselines. A survey is also conducted to affirm the viability of the proposed methodology. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

Figure 1
<p>Proposed System Architecture.</p>
Full article ">Figure 2
<p>User query with code fragment.</p>
Full article ">Figure 3
<p>Queries returned results for various component features.</p>
Full article ">Figure 4
<p>Precision and recall.</p>
Full article ">Figure 5
<p>Process suitability to retrieve components.</p>
Full article ">Figure 6
<p>Process completion for retrieving components.</p>
Full article ">Figure 7
<p>Accuracy of recommended components.</p>
Full article ">Figure 8
<p>Component retrieval process effectiveness.</p>
Full article ">Figure 9
<p>Select Language.</p>
Full article ">Figure 10
<p>Select component/function for Search.</p>
Full article ">Figure 11
<p>Crawled Results.</p>
Full article ">
0 pages, 7369 KiB  
Article
RETRACTED: TRUST: A Novel Framework for Vehicle Trajectory Recovery from Urban-Scale Videos
by Wentao Ji and Xing Chen
Sensors 2022, 22(24), 9948; https://doi.org/10.3390/s22249948 - 16 Dec 2022
Cited by 2 | Viewed by 1704 | Retraction
Abstract
We study a new type of path inference query against urban-scale video databases. Given a vehicle image query, our goal is to recover its historical trajectory from the footprints captured by surveillance cameras deployed across the road network. The problem is challenging because [...] Read more.
We study a new type of path inference query against urban-scale video databases. Given a vehicle image query, our goal is to recover its historical trajectory from the footprints captured by surveillance cameras deployed across the road network. The problem is challenging because visual matching inherently suffers from object occlusion, low camera resolution, varying illumination conditions, and viewing angles. Furthermore, with limited computation resources, only a fraction of video frames can be ingested and indexed, causing severe data sparsity issues for visual matching. To support efficient and accurate trajectory recovery, we develop a select-and-refine framework in a heterogeneous hardware environment with both CPUs and GPUs. We construct a proximity graph from the top-k visually similar frames and propose holistic scoring functions based on visual and spatial-temporal coherence. To avoid enumerating all the paths, we also propose a coarse-grained scoring function with monotonic property to reduce search space. Finally, the derived path is refined by examining raw video frames to fill the missing cameras. For performance evaluation, we construct two largest-scale video databases generated from cameras deployed upon real road networks. Experimental results validate the efficiency and accuracy of our proposed trajectory recovery framework. Full article
(This article belongs to the Section Sensing and Imaging)
Show Figures

Figure 1

Figure 1
<p>Example of Trajectory Recovery.</p>
Full article ">Figure 2
<p>Example of vehicle image injection.</p>
Full article ">Figure 3
<p>Distribution of passage time between two cameras.</p>
Full article ">Figure 4
<p>Trajectory recovery algorithm flow.</p>
Full article ">Figure 5
<p>Veri-SG experimental results.</p>
Full article ">Figure 6
<p>Results of Veri-SG adjustment of k.</p>
Full article ">Figure 7
<p>Results of Carla adjustment of k.</p>
Full article ">Figure 8
<p>Results of Veri-SG tuning delta.</p>
Full article ">Figure 9
<p>Results of Carla tuning delta.</p>
Full article ">Figure 10
<p>Module time of TRUST-fine on Veri-SG.</p>
Full article ">Figure 11
<p>Module time of TRUST-coarse on Veri-SG.</p>
Full article ">Figure 12
<p>Module time for TRUST-fine on Carla.</p>
Full article ">Figure 13
<p>Module time for TRUST-coarse on Carla.</p>
Full article ">
12 pages, 436 KiB  
Article
A Novel Knowledge Base Question Answering Method Based on Graph Convolutional Network and Optimized Search Space
by Xia Hou, Jintao Luo, Junzhe Li, Liangguo Wang and Hongbo Yang
Electronics 2022, 11(23), 3897; https://doi.org/10.3390/electronics11233897 - 25 Nov 2022
Cited by 3 | Viewed by 1517
Abstract
Knowledge base question answering (KBQA) aims to provide answers to natural language questions from information in the knowledge base. Although many methods perform well when dealing with simple questions, there are still two challenges for complex questions: huge search space and information missing [...] Read more.
Knowledge base question answering (KBQA) aims to provide answers to natural language questions from information in the knowledge base. Although many methods perform well when dealing with simple questions, there are still two challenges for complex questions: huge search space and information missing from the query graphs’ structure. To solve these problems, we propose a novel KBQA method based on a graph convolutional network and optimized search space. When generating the query graph, we rank the query graphs by both their semantic and structural similarities with the question. Then, we just use the top k for the next step. In this process, we specifically extract the structure information of the query graphs by a graph convolutional network while extracting semantic information by a pre-trained model. Thus, we can enhance the method’s ability to understand complex questions. We also introduce a constraint function to optimize the search space. Furthermore, we use the beam search algorithm to reduce the search space further. Experiments on the WebQuestionsSP dataset demonstrate that our method outperforms some baseline methods, showing that the structural information of the query graph has a significant impact on the KBQA task. Full article
Show Figures

Figure 1

Figure 1
<p>An example of a KBQA task. For the question “In which stadium did Player A’s team win the 1998 World Championship?”, the orange circle and the orange line represent the inference process from Player A (the topic entity) to Stadium B (the answer).</p>
Full article ">Figure 2
<p>An example of the query process. Starting from a topic entity in the question, the <math display="inline"><semantics> <mrow> <mi>e</mi> <mi>x</mi> <mi>t</mi> <mi>e</mi> <mi>n</mi> <mi>d</mi> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mi>c</mi> <mi>o</mi> <mi>n</mi> <mi>s</mi> <mi>t</mi> <mi>r</mi> <mi>a</mi> <mi>i</mi> <mi>n</mi> </mrow> </semantics></math> operations are applied to generate the query graphs and eventually find the answer. The orange circles represent the constraint function to reduce the search space. <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mi>e</mi> <mi>r</mi> </mrow> </semantics></math> is used to select the path with a higher score after ranking the candidate paths, such as the path made up of the orange arrow and the lambda variable <span class="html-italic">X</span>.</p>
Full article ">Figure 3
<p>The structure of the query graph <math display="inline"><semantics> <mrow> <mi>R</mi> <mi>a</mi> <mi>n</mi> <mi>k</mi> <mi>e</mi> <mi>r</mi> </mrow> </semantics></math>.</p>
Full article ">Figure 4
<p>The input and output of RoBERTa for measuring the semantic similarity.</p>
Full article ">Figure 5
<p>Comparison of the F1-score for each variant. (<b>a</b>) Comparison of our method and its variants. (<b>b</b>) Comparison of <b>variant 1</b> and its variant.</p>
Full article ">
32 pages, 2136 KiB  
Article
Privacy-Preserving Top-k Query Processing Algorithms Using Efficient Secure Protocols over Encrypted Database in Cloud Computing Environment
by Hyeong-Jin Kim, Yong-Ki Kim, Hyun-Jo Lee and Jae-Woo Chang
Electronics 2022, 11(18), 2870; https://doi.org/10.3390/electronics11182870 - 11 Sep 2022
Viewed by 1832
Abstract
Recently, studies on secure database outsourcing have been highlighted for the cloud computing environment. A few secure Top-k query processing algorithms have been proposed in the encrypted database. However, the previous algorithms can support either security or efficiency. Therefore, we propose a [...] Read more.
Recently, studies on secure database outsourcing have been highlighted for the cloud computing environment. A few secure Top-k query processing algorithms have been proposed in the encrypted database. However, the previous algorithms can support either security or efficiency. Therefore, we propose a new Top-k query processing algorithm using a homomorphic cryptosystem, which can support both security and efficiency. For security, we propose new secure and efficient protocols based on arithmetic operations. To obtain a high level of efficiency, we also propose a parallel Top-k query processing algorithm using an encrypted random value pool. Through our performance analysis, the proposed Top-k algorithms present about 1.5∼7.1 times better performance with regard to a query processing time, compared with the existing algorithms. Full article
(This article belongs to the Special Issue Digital Trustworthiness: Cybersecurity, Privacy and Resilience)
Show Figures

Figure 1

Figure 1
<p>Encrypted database outsourcing model.</p>
Full article ">Figure 2
<p>Example of the encrypted <span class="html-italic">k</span>d-tree.</p>
Full article ">Figure 3
<p>Overlapping and non-overlapping between two regions in the ASRO protocol.</p>
Full article ">Figure 4
<p>Overlapping between E(<math display="inline"><semantics> <mrow> <mi>r</mi> <mi>a</mi> <mi>n</mi> <mi>g</mi> <msub> <mi>e</mi> <mn>1</mn> </msub> </mrow> </semantics></math>) and E(<math display="inline"><semantics> <mrow> <mi>r</mi> <mi>a</mi> <mi>n</mi> <mi>g</mi> <msub> <mi>e</mi> <mn>2</mn> </msub> <mrow> <mo>)</mo> </mrow> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>Example in node data search phase.</p>
Full article ">Figure 6
<p>Example of Top-<span class="html-italic">k</span> retrieval phase.</p>
Full article ">Figure 7
<p>Example of Top-<span class="html-italic">k</span> result refinement phase.</p>
Full article ">Figure 8
<p>Processing time with varying levels of <span class="html-italic">k</span>d-tree.</p>
Full article ">Figure 9
<p>Processing time with a varying number of data items.</p>
Full article ">Figure 10
<p>Processing time with a varying number of k.</p>
Full article ">Figure 11
<p>Processing time with a varying key size.</p>
Full article ">Figure 12
<p>Processing time with a varying number of threads.</p>
Full article ">Figure 13
<p>Processing time with a varying number of data items in 10 thread.</p>
Full article ">Figure 14
<p>Processing time with a varying number of k in 10 thread.</p>
Full article ">Figure 15
<p>Processing time with a varying level of <span class="html-italic">k</span>d-tree in real dataset.</p>
Full article ">Figure 16
<p>Processing time with a varying number of k in real dataset.</p>
Full article ">Figure 17
<p>Processing time with a varying number of threads in real dataset.</p>
Full article ">
Back to TopTop