Advances of Computer Algorithms and Data Structures

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: closed (31 August 2024) | Viewed by 13477

Special Issue Editors


E-Mail Website
Guest Editor
Institute of Information and Decision Sciences, National Taipei University of Business, Taipei 10051, Taiwan
Interests: algorithms; graph theory; network optimization; reliability and fault-tolerance; parallel and distributed computing
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute of Information and Decision Sciences, National Taipei University of Business, Taipei 10051, Taiwan
Interests: design and analysis of algorithms; robot interactive programming; digital exhibition design
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Taitung University, Taitung 95092, Taiwan
Interests: graph theory and algorithms; interconnection networks; fault-tolerant computing; system-level diagnosis; design and analysis of algorithms
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues, 

Computer algorithms and data structures are fundamental fields in computer science for creating machine-efficient and optimized computer programs. However, many problems emerging from cloud computing and multi-access edge computing remain unsolved. This Special Issue on the advance of computer algorithms and data structures aims to motivate international researchers to publish their excellent ideas, latest innovations, and experiences in designing and analyzing algorithms and data structures. This Special Issue welcomes original contributions that address algorithms, theory of computation, computational complexities, combinatorics related to computing, and data structures. All interested researchers are invited to contribute to this Special Issue. Any questions regarding this Special Issue should be sent to the guest editors.

All articles will be thoroughly refereed according to the high standards of Mathematics. All submitted papers will be peer-reviewed and selected based on their originality, significance, relevance, and clarity of presentation. Topics of interest include, but are not limited to:

  • Algorithmic Game Theory;
  • Algorithms and Data Structures;
  • Approximation Algorithms and Online Algorithms;
  • Automata, Languages, Logic, and Computability;
  • Computational Algebra, Geometry, and Number Theory;
  • Computational Biology and Bioinformatics;
  • Computational Complexity;
  • Computational Learning Theory and Knowledge Discovery;
  • Cryptography, Reliability and Security, and Database Theory;
  • Fault Tolerant Computing and Fault Diagnosis;
  • Graph Drawing and Information Visualization;
  • Graph Theory, Communication Networks, and Optimization;
  • Parallel and Distributed Computing.

Prof. Dr. Jou-Ming Chang
Dr. Ling-Ju Hung
Dr. Chia-Wei Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • combinatorial optimization
  • computation theory
  • data structure for massive dataset
  • graph algorithms
  • interconnection networks
  • network optimization
  • parallel and distributed algorithms
  • social networks

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

12 pages, 2791 KiB  
Article
Interpolation Once Binary Search over a Sorted List
by Jun-Lin Lin
Mathematics 2024, 12(9), 1394; https://doi.org/10.3390/math12091394 - 2 May 2024
Viewed by 1230
Abstract
Searching over a sorted list is a classical problem in computer science. Binary Search takes at most log2n+1 tries to find an item in a sorted list of size n. Interpolation Search achieves an average time complexity [...] Read more.
Searching over a sorted list is a classical problem in computer science. Binary Search takes at most log2n+1 tries to find an item in a sorted list of size n. Interpolation Search achieves an average time complexity of O(loglogn) for uniformly distributed data. Hybrids of Binary Search and Interpolation Search are also available to handle data with unknown distributions. This paper analyzes the computation cost of these methods and shows that interpolation can significantly affect their performance—accordingly, a new method, Interpolation Once Binary Search (IOBS), is proposed. The experimental results show that IOBS outperforms the hybrids of Binary Search and Interpolation Search for nonuniformly distributed data. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

14 pages, 2531 KiB  
Article
Efficient List Intersection Algorithm for Short Documents by Document Reordering
by Lianyin Jia, Dongyang Li, Haihe Zhou and Fengling Xia
Mathematics 2024, 12(9), 1328; https://doi.org/10.3390/math12091328 - 26 Apr 2024
Viewed by 689
Abstract
List intersection plays a pivotal role in various domains such as search engines, database systems, and social networks. Efficient indexes and query strategies can significantly enhance the efficiency of list intersection. Existing inverted index-based algorithms fail to utilize the length information of documents [...] Read more.
List intersection plays a pivotal role in various domains such as search engines, database systems, and social networks. Efficient indexes and query strategies can significantly enhance the efficiency of list intersection. Existing inverted index-based algorithms fail to utilize the length information of documents and require excessive list intersections, resulting in lower efficiency. To address this issue, in this paper, we propose the LDRpV (Length-based Document Reordering plus Verification) algorithm. LDRpV filters out documents that are unlikely to satisfy the intersection results by reordering documents based on their length, thereby reducing the number of candidates. Additionally, to minimize the number of list intersection operations, an intersection and verification strategy is designed, where only the first m lists are intersected, and the resulting candidate set is directly verified. This approach effectively improves the efficiency of list intersection. Experimental results on four real datasets demonstrate that LDRpV can achieve a maximum efficiency improvement of 46.69% compared to the most competitive counterparts. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

16 pages, 1049 KiB  
Article
An Improved Fault Diagnosis Algorithm for Highly Scalable Data Center Networks
by Wanling Lin, Xiao-Yan Li, Jou-Ming Chang and Xiangke Wang
Mathematics 2024, 12(4), 597; https://doi.org/10.3390/math12040597 - 17 Feb 2024
Viewed by 853
Abstract
Fault detection and localization are vital for ensuring the stability of data center networks (DCNs). Specifically, adaptive fault diagnosis is deemed a fundamental technology in achieving the fault tolerance of systems. The highly scalable data center network (HSDC) is a promising structure of [...] Read more.
Fault detection and localization are vital for ensuring the stability of data center networks (DCNs). Specifically, adaptive fault diagnosis is deemed a fundamental technology in achieving the fault tolerance of systems. The highly scalable data center network (HSDC) is a promising structure of server-centric DCNs, as it exhibits the capacity for incremental scalability, coupled with the assurance of low cost and energy consumption, low diameter, and high bisection width. In this paper, we first determine that both the connectivity and diagnosability of the m-dimensional complete HSDC, denoted by HSDCm(m), are m. Further, we propose an efficient adaptive fault diagnosis algorithm to diagnose an HSDCm(m) within three test rounds, and at most N+4m(m2) tests with m3 (resp. at most nine tests with m=2), where N=m·2m is the total number of nodes in HSDCm(m). Our experimental outcomes demonstrate that this diagnosis scheme of HSDC can achieve complete diagnosis and significantly reduce the number of required tests. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

12 pages, 1366 KiB  
Article
A Novel Conditional Connectivity and Hamiltonian Connectivity of BCube with Various Faulty Elements
by Yali Lv, Cheng-Kuan Lin and Lantao You
Mathematics 2023, 11(15), 3404; https://doi.org/10.3390/math11153404 - 4 Aug 2023
Viewed by 918
Abstract
BCube is one of the main data center networks because it has many attractive features. In practical applications, the failure of components or physical connections is inevitable. In data center networks in particular, switch failures are unavoidable. Fault-tolerance capability is one main aspect [...] Read more.
BCube is one of the main data center networks because it has many attractive features. In practical applications, the failure of components or physical connections is inevitable. In data center networks in particular, switch failures are unavoidable. Fault-tolerance capability is one main aspect to measure the performance of data center networks. Connectivity, fault tolerance Hamiltonian connectivity, and fault tolerance Hamiltonicity are important parameters that assess the fault tolerance of networks. In general, the distribution of fault elements is scattered, and it is necessary to consider the distribution of fault elements in different dimensions. We research the fault tolerance of BCube when considering faulty switches and faulty links/edges that distribute in different dimensions. We also investigate the connectivity, fault tolerance Hamiltonian connectivity, and Hamiltonicity. This study better evaluates the fault-tolerant performance of data center networks. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

14 pages, 2694 KiB  
Article
Three Edge-Disjoint Hamiltonian Cycles in Folded Locally Twisted Cubes and Folded Crossed Cubes with Applications to All-to-All Broadcasting
by Kung-Jui Pai
Mathematics 2023, 11(15), 3384; https://doi.org/10.3390/math11153384 - 2 Aug 2023
Viewed by 1279
Abstract
All-to-all broadcasting means to distribute the exclusive message of each node in the network to all other nodes. It can be handled by rings, and a Hamiltonian cycle is a ring that visits each vertex exactly once. Multiple edge-disjoint Hamiltonian cycles, abbreviated as [...] Read more.
All-to-all broadcasting means to distribute the exclusive message of each node in the network to all other nodes. It can be handled by rings, and a Hamiltonian cycle is a ring that visits each vertex exactly once. Multiple edge-disjoint Hamiltonian cycles, abbreviated as EDHCs, have two application advantages: (1) parallel data broadcast and (2) edge fault-tolerance in network communications. There are three edge-disjoint Hamiltonian cycles on n-dimensional locally twisted cubes and n-dimensional crossed cubes while n ≥ 6, respectively. Locally twisted cubes, crossed cubes, folded locally twisted cubes (denoted as FLTQn), and folded crossed cubes (denoted as FCQn) are among the hypercube-variant network. The topology of hypercube-variant network has more wealth than normal hypercubes in network properties. Then, the following results are presented in this paper: (1) Using the technique of edge exchange, three EDHCs are constructed in FLTQ5 and FCQ5, respectively. (2) According to the recursive structure of FLTQn and FCQn, there are three EDHCs in FLTQn and FCQn while n ≥ 6. (3) Considering that multiple faulty edges will occur randomly, the data broadcast performance of three EDHCs in FLTQn and FCQn is evaluated by simulation when 5 ≤ n ≤ 9. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

17 pages, 2167 KiB  
Article
Task Scheduling Mechanism Based on Reinforcement Learning in Cloud Computing
by Yugui Wang, Shizhong Dong and Weibei Fan
Mathematics 2023, 11(15), 3364; https://doi.org/10.3390/math11153364 - 1 Aug 2023
Cited by 8 | Viewed by 2540
Abstract
The explosive growth of users and applications in IoT environments has promoted the development of cloud computing. In the cloud computing environment, task scheduling plays a crucial role in optimizing resource utilization and improving overall performance. However, effective task scheduling remains a key [...] Read more.
The explosive growth of users and applications in IoT environments has promoted the development of cloud computing. In the cloud computing environment, task scheduling plays a crucial role in optimizing resource utilization and improving overall performance. However, effective task scheduling remains a key challenge. Traditional task scheduling algorithms often rely on static heuristics or manual configuration, limiting their adaptability and efficiency. To overcome these limitations, there is increasing interest in applying reinforcement learning techniques for dynamic and intelligent task scheduling in cloud computing. How can reinforcement learning be applied to task scheduling in cloud computing? What are the benefits of using reinforcement learning-based methods compared to traditional scheduling mechanisms? How does reinforcement learning optimize resource allocation and improve overall efficiency? Addressing these questions, in this paper, we propose a Q-learning-based Multi-Task Scheduling Framework (QMTSF). This framework consists of two stages: First, tasks are dynamically allocated to suitable servers in the cloud environment based on the type of servers. Second, an improved Q-learning algorithm called UCB-based Q-Reinforcement Learning (UQRL) is used on each server to assign tasks to a Virtual Machine (VM). The agent makes intelligent decisions based on past experiences and interactions with the environment. In addition, the agent learns from rewards and punishments to formulate the optimal task allocation strategy and schedule tasks on different VMs. The goal is to minimize the total makespan and average processing time of tasks while ensuring task deadlines. We conducted simulation experiments to evaluate the performance of the proposed mechanism compared to traditional scheduling methods such as Particle Swarm Optimization (PSO), random, and Round-Robin (RR). The experimental results demonstrate that the proposed QMTSF scheduling framework outperforms other scheduling mechanisms in terms of the makespan and average task processing time. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

14 pages, 3404 KiB  
Article
Dual Protection Routing Trees on Graphs
by Kung-Jui Pai
Mathematics 2023, 11(14), 3255; https://doi.org/10.3390/math11143255 - 24 Jul 2023
Viewed by 1102
Abstract
In IP networks, packet forwarding is destination-based and hop-by-hop, and routes are built as needed. Kwong et al. introduced a protection routing in which packet delivery to the destination node can proceed uninterrupted in the event of any single node or link failure. [...] Read more.
In IP networks, packet forwarding is destination-based and hop-by-hop, and routes are built as needed. Kwong et al. introduced a protection routing in which packet delivery to the destination node can proceed uninterrupted in the event of any single node or link failure. He then showed that “whether there is a protection routing to the destination” is NP-complete. Tapolcai found that two completely independent spanning trees, abbreviated as CISTs, can be used to configure the protection routing. In this paper, we proposed dual protection routing trees, denoted as dual-PRTs to replace CISTs, which are less restrictive than CISTs. Next, we proposed a transformation algorithm that uses dual-PRTs to configure the protection routing. Taking complete graphs Kn, complete bipartite graphs Km,n, hypercubes Qn, and locally twisted cubes LTQn as examples, we provided a recursive method to construct dual-PRTs on them. This article showed that there are no two CISTs on K3,3, Q3, and LTQ3, but there exist dual-PRTs that can be used to configure the protection routing. As shown in the performance evaluation of simulation results, for both Qn and LTQn, we get the average path length of protection routing configured by dual-PRTs is shorter than that by two CISTs. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

12 pages, 295 KiB  
Article
The Diagnosability of the Generalized Cartesian Product of Networks
by Meirun Chen and Cheng-Kuan Lin
Mathematics 2023, 11(12), 2615; https://doi.org/10.3390/math11122615 - 7 Jun 2023
Cited by 2 | Viewed by 1163
Abstract
Motivated by two typical ways to construct multiprocessor systems, matching composition networks and cycle composition networks, we generalize the definition of the Cartesian product of networks and consider the classical diagnosability of the generalized Cartesian product of networks (GCPNs). In this paper, we [...] Read more.
Motivated by two typical ways to construct multiprocessor systems, matching composition networks and cycle composition networks, we generalize the definition of the Cartesian product of networks and consider the classical diagnosability of the generalized Cartesian product of networks (GCPNs). In this paper, we determine the accurate value of the classical diagnosability of the generalized Cartesian product of networks (GCPNs) under the PMC model and the MM* model. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

12 pages, 606 KiB  
Article
Super Spanning Connectivity of the Folded Divide-and-SwapCube
by Lantao You, Jianfeng Jiang and Yuejuan Han
Mathematics 2023, 11(11), 2581; https://doi.org/10.3390/math11112581 - 5 Jun 2023
Cited by 1 | Viewed by 1118
Abstract
A k*-container of a graph G is a set of k disjoint paths between any pair of nodes whose union covers all nodes of G. The spanning connectivity of G, κ*(G), is the largest [...] Read more.
A k*-container of a graph G is a set of k disjoint paths between any pair of nodes whose union covers all nodes of G. The spanning connectivity of G, κ*(G), is the largest k, such that there exists a j*-container between any pair of nodes of G for all 1jk. If κ*(G)=κ(G), then G is super spanning connected. Spanning connectivity is an important property to measure the fault tolerance of an interconnection network. The divide-and-swap cube DSCn is a newly proposed hypercube variant, which reduces the network cost from O(n2) to O(nlog2n) compared with the hypercube and other hypercube variants. The folded divide-and-swap cube FDSCn is proposed based on DSCn to reduce the diameter of DSCn. Both DSCn and FDSCn possess many better properties than hypercubes. In this paper, we investigate the super spanning connectivity of FDSCn where n=2d and d1. We show that κ*(FDSCn)=κ(FDSCn)=d+2, which means there exists an m-DPC(node-disjoint path cover) between any pair of nodes in FDSCn for all 1md+2. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

14 pages, 472 KiB  
Article
All-to-All Broadcast Algorithm in Galaxyfly Networks
by Hongbin Zhuang, Jou-Ming Chang, Xiao-Yan Li, Fangying Song and Qinying Lin
Mathematics 2023, 11(11), 2459; https://doi.org/10.3390/math11112459 - 26 May 2023
Viewed by 1153
Abstract
The design of interconnection networks is a fundamental aspect of high-performance computing (HPC) systems. Among the available topologies, the Galaxyfly network stands out as a low-diameter and flexible-radix network for HPC applications. Given the paramount importance of collective communication in HPC performance, in [...] Read more.
The design of interconnection networks is a fundamental aspect of high-performance computing (HPC) systems. Among the available topologies, the Galaxyfly network stands out as a low-diameter and flexible-radix network for HPC applications. Given the paramount importance of collective communication in HPC performance, in this paper, we present two different all-to-all broadcast algorithms for the Galaxyfly network, which adhere to the supernode-first rule and the router-first rule, respectively. Our performance evaluation validates their effectiveness and shows that the first algorithm has a higher degree of utilization of network channels, and that the second algorithm can significantly reduce the average time for routers to collect packets from the supernode. Full article
(This article belongs to the Special Issue Advances of Computer Algorithms and Data Structures)
Show Figures

Figure 1

Back to TopTop