Journal of Computer Applications ›› 2023, Vol. 43 ›› Issue (12): 3875-3881.DOI: 10.11772/j.issn.1001-9081.2022111719
Special Issue: 先进计算
• Advanced computing • Previous Articles Next Articles
					
						                                                                                                                                                                                                                    Kai FENG( ), Jiande LI, Zhangjian JI
), Jiande LI, Zhangjian JI
												  
						
						
						
					
				
Received:2022-11-18
															
							
																	Revised:2023-04-10
															
							
																	Accepted:2023-04-30
															
							
							
																	Online:2023-06-15
															
							
																	Published:2023-12-10
															
							
						Contact:
								Kai FENG   
													About author:LI Jiande, born in 1997, M. S. candidate. His research interests include fault tolerance of interconnection network.Supported by:通讯作者:
					冯凯
							作者简介:李建德(1997—),男,山西太原人,硕士研究生,CCF会员,主要研究方向:互连网络的容错性基金资助:CLC Number:
Kai FENG, Jiande LI, Zhangjian JI. Approximate evaluation method of k-ary (n-1)-cube subnetwork reliability[J]. Journal of Computer Applications, 2023, 43(12): 3875-3881.
冯凯, 李建德, 姬张建. k元(n-1)方体子网络可靠性的近似评估方法[J]. 《计算机应用》唯一官方网站, 2023, 43(12): 3875-3881.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2022111719
| [0,0.688 8] | |
| [0,0.855 5] | |
| [0,0.867 5] | |
| [0,0.967 9] | |
| [0,0.942 3] | |
| [0,0.978 6] | 
Tab.1 Validity analysis on upper and lower bounds of Rn,n-1k(p)
| [0,0.688 8] | |
| [0,0.855 5] | |
| [0,0.867 5] | |
| [0,0.967 9] | |
| [0,0.942 3] | |
| [0,0.978 6] | 
| 数据集 | RMSE平均值 | 数据集 | RMSE平均值 | 
|---|---|---|---|
| 0.001 8 | 0.000 9 | ||
| 0.001 3 | 0.001 0 | ||
| 0.001 1 | 0.000 9 | 
Tab. 2 Mean values of root mean square error on test sets ofdifferent datasets
| 数据集 | RMSE平均值 | 数据集 | RMSE平均值 | 
|---|---|---|---|
| 0.001 8 | 0.000 9 | ||
| 0.001 3 | 0.001 0 | ||
| 0.001 1 | 0.000 9 | 
| 基于BP神经网络的评估方法的耗时/s | 基于蒙特卡洛模拟的评估方法的耗时/s | ||
|---|---|---|---|
| 35.830 8 | 87.124 9 | 0.003 4 | |
| 41.399 8 | 103.177 7 | 0.003 2 | |
| 43.346 8 | 113.514 3 | 0.003 2 | |
| 64.238 6 | 158.609 7 | 0.004 1 | |
| 50.139 6 | 121.206 7 | 0.003 6 | |
| 69.456 5 | 172.031 8 | 0.004 6 | 
Tab.3 Evaluation time and RMSE of two methods
| 基于BP神经网络的评估方法的耗时/s | 基于蒙特卡洛模拟的评估方法的耗时/s | ||
|---|---|---|---|
| 35.830 8 | 87.124 9 | 0.003 4 | |
| 41.399 8 | 103.177 7 | 0.003 2 | |
| 43.346 8 | 113.514 3 | 0.003 2 | |
| 64.238 6 | 158.609 7 | 0.004 1 | |
| 50.139 6 | 121.206 7 | 0.003 6 | |
| 69.456 5 | 172.031 8 | 0.004 6 | 
| 1 | DAS C R, KIM J. A unified task-based dependability model for hypercube computers[J]. IEEE Transactions on Parallel and Distributed Systems, 1992, 3(3): 312-324. 10.1109/71.139205 | 
| 2 | CHANG Y, BHUYAN L N. A combinatorial analysis of subcube reliability in hypercubes[J]. IEEE Transactions on Computers, 1995, 44(7): 952-956. 10.1109/12.392856 | 
| 3 | WU X, LATIFI S. Substar reliability analysis in star networks [J]. Information Sciences, 2008, 178(10): 2337-2348. 10.1016/j.ins.2007.11.015 | 
| 4 | LIN L, XU L, ZHOU S, et al. The reliability of subgraphs in the arrangement graph[J]. IEEE Transactions on Reliability, 2015, 64(2): 807-818. 10.1109/tr.2015.2413372 | 
| 5 | LI X, ZHOU S, XU X, et al. The reliability analysis based on subsystems of (n,k)-star graph[J]. IEEE Transactions on Reliability, 2016, 65(4): 1700-1709. 10.1109/tr.2016.2570544 | 
| 6 | HUANG Y, LIN L, WANG D. On the reliability of alternating group graph-based networks[J]. Theoretical Computer Science, 2018, 728: 9-28. 10.1016/j.tcs.2018.03.010 | 
| 7 | ZHANG Q, XU L, ZHOU S, et al. Reliability analysis of subsystem in dual cubes [J]. Theoretical Computer Science, 2020, 816: 249-259. 10.1016/j.tcs.2020.02.028 | 
| 8 | FENG K, MA X, WEI W. Subnetwork reliability analysis of bubble-sort graph networks[J]. Theoretical Computer Science, 2021, 896: 98-110. 10.1016/j.tcs.2021.10.007 | 
| 9 | LV M, FAN J, FAN W, et al. Fault diagnosis based on subsystem structures of data center network BCube [J]. IEEE Transactions on Reliability, 2022, 71(2): 963-972. 10.1109/tr.2021.3140069 | 
| 10 | LIU X, ZHOU S, LIU J, et al. Reliability analysis of the cactus-based networks based on subsystem[J]. The Computer Journal, 2022,2022: No.bxac163. 10.1093/comjnl/bxac163 | 
| 11 | ANDERSON E, BROOKS J, GRASSL C, et al. Performance of the CRAY T3E multiprocessor [C]// Proceedings of the 1997 ACM/IEEE Conference on Supercomputing. New York: ACM, 1997: 1-17. 10.1145/509593.509632 | 
| 12 | ADIGA N R, BLUMRICH M A, CHEN D, et al. Blue Gene/L torus interconnection network[J]. IBM Journal of Research and Development, 2005, 49(2/3): 265-276. 10.1147/rd.492.0265 | 
| 13 | FENG K, JI Z, WEI W. Subnetwork reliability analysis in k-ary n-cubes [J]. Discrete Applied Mathematics, 2019, 267: 85-92. 10.1016/j.dam.2019.07.003 | 
| 14 | LV Y, FAN J, HSU D F, et al. Structure connectivity and substructure connectivity of k-ary n-cube networks[J]. Information Sciences, 2018, 433/434: 115-124. 10.1016/j.ins.2017.11.047 | 
| 15 | LIU A, WANG S, YUAN J, et al. The h-extra connectivity of k-ary n-cubes[J]. Theoretical Computer Science, 2019, 784: 21-45. 10.1016/j.tcs.2019.03.030 | 
| 16 | WANG S, ZHANG G, FENG K. Fault tolerance in k-ary n-cube networks [J]. Theoretical Computer Science, 2012, 460: 34-41. 10.1016/j.tcs.2012.06.013 | 
| 17 | YANG Y, LI J, WANG S. Embedding various cycles with prescribed paths into k-ary n-cubes[J]. Discrete Applied Mathematics, 2017, 220: 161-169. 10.1016/j.dam.2016.12.006 | 
| 18 | 冯凯,李婧. k元n方体的子网络可靠性研究[J]. 计算机科学, 2020, 47(7): 31-36. 10.11896/jsjkx.190700170 | 
| FENG K, LI J. Study on subnetwork reliability of k-ary n-cubes [J]. Computer Science, 2020, 47(7): 31-36. 10.11896/jsjkx.190700170 | |
| 19 | LV M, FAN J, CHEN G, et al. The reliability analysis of k-ary n-cube networks [J]. Theoretical Computer Science, 2020, 835: 1-14. 10.1016/j.tcs.2020.05.003 | 
| 20 | CHEN X B. Paired 2-disjoint path covers of faulty k-ary n-cubes[J]. Theoretical Computer Science, 2016, 609(Pt 2): 494-499. 10.1016/j.tcs.2015.11.007 | 
| 21 | 谢丽霞,王志华. 基于布谷鸟搜索优化BP神经网络的网络安全态势评估方法[J]. 计算机应用, 2017, 37(7): 1926-1930. 10.11772/j.issn.1001-9081.2017.07.1926 | 
| XIE L X, WANG Z H. Network security situation assessment method based on cuckoo search optimized back propagation neural network[J]. Journal of Computer Applications, 2017, 37(7): 1926-1930. 10.11772/j.issn.1001-9081.2017.07.1926 | |
| 22 | 戴宏亮,罗裕达. 基于蝙蝠算法优化反向传播神经网络模型的无线网络流量预测[J]. 计算机应用, 2021, 41(S1):185-188. 10.11772/j.issn.1001-9081.2020101679 | 
| DAI H L, LUO Y D. Wireless network traffic prediction based on bat algorithm optimized back propagation neural network model[J]. Journal of Computer Applications, 2021, 41(S1): 185-188. 10.11772/j.issn.1001-9081.2020101679 | |
| 23 | HORNIK K, STINCHCOMBE M, WHITE H. Multilayer feedforward networks are universal approximators[J]. Neural Networks, 1989, 2(5): 359-366. 10.1016/0893-6080(89)90020-8 | 
| 24 | 盛骤,谢式千,潘承毅. 概率论与数理统计[M]. 4版. 北京:高等教育出版社, 2008: 119-126. | 
| SHENG Z, XIE S Q, PAN C Y. Probability Theory and Mathematical Statistics[M]. 4th ed. Beijing: Higher Education Press, 2008: 119-126. | 
| [1] | Kai FENG, Tong LIU. Reliability of k-ary (n-m)-cube subnetworks under probabilistic fault condition [J]. Journal of Computer Applications, 2023, 43(4): 1198-1205. | 
| [2] | Jialiang DUAN, Guoming CAI, Kaiyong XU. Memory combined feature classification method based on multiple BP neural networks [J]. Journal of Computer Applications, 2022, 42(1): 178-182. | 
| [3] | CHU Surong, NIU Zhixian, SONG Chunhua, NIU Baoning. Progressive mesh simplification algorithm for mobile devices [J]. Journal of Computer Applications, 2020, 40(3): 806-811. | 
| [4] | HAN Ying, ZHAO Meng, CHEN Shengyong, WANG Zhaoxi. Automatic screening of abnormal cervical nucleus based on maximum section feature [J]. Journal of Computer Applications, 2019, 39(4): 1189-1195. | 
| [5] | FENG Kai, LI Jing. Reliability assessment of k-ary n-cube networks [J]. Journal of Computer Applications, 2019, 39(11): 3323-3327. | 
| [6] | CHEN Wanzhi, LI Dongzhe. Intrusion detection method in industrial control network combining white list filtering and neural network [J]. Journal of Computer Applications, 2018, 38(2): 363-369. | 
| [7] | HE Chun, LI Qi, WU Ranghao, LIU Bangxin. Diagnosis of fault circuit by modularized BP neural network based on fault propagation [J]. Journal of Computer Applications, 2018, 38(2): 602-609. | 
| [8] | FENG Kai. Conditional strong matching preclusion for k-ary n-cubes [J]. Journal of Computer Applications, 2017, 37(9): 2454-2456. | 
| [9] | CHEN Haoguang, WANG Yinhe. Adaptive control design for a class of nonlinear systems based on extended BP neural network [J]. Journal of Computer Applications, 2017, 37(6): 1670-1673. | 
| [10] | ZHENG Cha, JI Lixin, LI Shaomei, GAO Chao. Face annotation in news images based on multi-modal information fusion [J]. Journal of Computer Applications, 2017, 37(10): 3006-3011. | 
| [11] | LI Mingxu, DENG Xin, WANG Jin, WANG Xiao, ZHANG Xiaomou. Modeling and simulating thermotaxis behavior of Caenorhabditis elegans based on artificial neural network [J]. Journal of Computer Applications, 2016, 36(7): 1909-1913. | 
| [12] | QIU Yana, YANG Yuxing. Link connectivity and restricted link connectivity of augmented bubble-sort networks [J]. Journal of Computer Applications, 2016, 36(11): 3006-3009. | 
| [13] | YANG Kangkang, WU Shijing, LIU Yujie, ZHOU Lu. Conflict detection model in collaborative design based on constraint [J]. Journal of Computer Applications, 2015, 35(8): 2215-2220. | 
| [14] | ZHANG Binlian, XU Hongzhi. Energy-efficient scheduling algorithm under reliability constraint in multiprocessor system [J]. Journal of Computer Applications, 2015, 35(6): 1590-1594. | 
| [15] | SHAO Liangshan, GUO Yachan. Flame recognition algorithm based on Codebook in video [J]. Journal of Computer Applications, 2015, 35(5): 1483-1487. | 
| Viewed | ||||||
| Full text |  | |||||
| Abstract |  | |||||