Research article Special Issues

A new inconsistent context fusion algorithm based on BP neural network and modified DST

  • As the number of various sensors grows fast in real applications such as smart city and intelligent agriculture, context-aware systems would acquire raw context information from dynamic, asynchronous and heterogeneous context providers, but multi-source information usually leads to the situation uncertainty of the system entities involved, which is harmful to appropriate services, and specially the inconsistency is a kind of main uncertainty problems and should be processed properly. A new inconsistent context fusion algorithm based on back propagation (BP) neural network and modified Dempster-Shafer theory (DST) combination rule is proposed in this paper to eliminate the inconsistency to the greatest extent and obtain accurate recognition results. Through the BP neural network, the situations of entities can be recognized effectively, and based on the modified combination rule, the recognition results can be fused legitimately and meaningfully. In order to verify the performance of the proposed algorithm, several experiments under different error rates of context information sources are conducted in the personal identity verification (PIV) application scenario. The experimental results show that the proposed BP neural network and modified DST based inconsistent context fusion algorithm can obtain good performance in most cases.

    Citation: Hongji Xu, Shi Li, Shidi Fan, Min Chen. A new inconsistent context fusion algorithm based on BP neural network and modified DST[J]. Mathematical Biosciences and Engineering, 2021, 18(2): 968-982. doi: 10.3934/mbe.2021051

    Related Papers:

    [1] Xiong Wang, Zhijun Yang, Hongwei Ding, Zheng Guan . Analysis and prediction of UAV-assisted mobile edge computing systems. Mathematical Biosciences and Engineering, 2023, 20(12): 21267-21291. doi: 10.3934/mbe.2023941
    [2] Biyun Hong, Yang Zhang . Research on the influence of attention and emotion of tea drinkers based on artificial neural network. Mathematical Biosciences and Engineering, 2021, 18(4): 3423-3434. doi: 10.3934/mbe.2021171
    [3] Ming Chen, Yan Qi, Xinxing Zhang, Xueyong Jiang . An intelligent decision support approach for quantified assessment of innovation ability via an improved BP neural network. Mathematical Biosciences and Engineering, 2023, 20(8): 15120-15134. doi: 10.3934/mbe.2023677
    [4] Sukun Tian, Ning Dai, Linlin Li, Weiwei Li, Yuchun Sun, Xiaosheng Cheng . Three-dimensional mandibular motion trajectory-tracking system based on BP neural network. Mathematical Biosciences and Engineering, 2020, 17(5): 5709-5726. doi: 10.3934/mbe.2020307
    [5] Pu Yang, Zhenbo Li, Yaguang Yu, Jiahui Shi, Ming Sun . Studies on fault diagnosis of dissolved oxygen sensor based on GA-SVM. Mathematical Biosciences and Engineering, 2021, 18(1): 386-399. doi: 10.3934/mbe.2021021
    [6] Feiyan Ruan, Xiaotong Ding, Huiping Li, Yixuan Wang, Kemin Ye, Houming Kan . Back propagation neural network model for medical expenses in patients with breast cancer. Mathematical Biosciences and Engineering, 2021, 18(4): 3690-3698. doi: 10.3934/mbe.2021185
    [7] Hong Gao, Cuiyun Wu, Dunnian Huang, Dahui Zha, Cuiping Zhou . Prediction of fetal weight based on back propagation neural network optimized by genetic algorithm. Mathematical Biosciences and Engineering, 2021, 18(4): 4402-4410. doi: 10.3934/mbe.2021222
    [8] Hang Yu, Jiarui Shi, Jin Qian, Shi Wang, Sheng Li . Single dendritic neural classification with an effective spherical search-based whale learning algorithm. Mathematical Biosciences and Engineering, 2023, 20(4): 7594-7632. doi: 10.3934/mbe.2023328
    [9] Xinran Zhang, Yongde Zhang, Jianzhi Yang, Haiyan Du . A prostate seed implantation robot system based on human-computer interactions: Augmented reality and voice control. Mathematical Biosciences and Engineering, 2024, 21(5): 5947-5971. doi: 10.3934/mbe.2024262
    [10] Xiaoyan Su, Shuwen Shang, Leihui Xiong, Ziying Hong, Jian Zhong . Research on dependent evidence combination based on principal component analysis. Mathematical Biosciences and Engineering, 2024, 21(4): 4853-4873. doi: 10.3934/mbe.2024214
  • As the number of various sensors grows fast in real applications such as smart city and intelligent agriculture, context-aware systems would acquire raw context information from dynamic, asynchronous and heterogeneous context providers, but multi-source information usually leads to the situation uncertainty of the system entities involved, which is harmful to appropriate services, and specially the inconsistency is a kind of main uncertainty problems and should be processed properly. A new inconsistent context fusion algorithm based on back propagation (BP) neural network and modified Dempster-Shafer theory (DST) combination rule is proposed in this paper to eliminate the inconsistency to the greatest extent and obtain accurate recognition results. Through the BP neural network, the situations of entities can be recognized effectively, and based on the modified combination rule, the recognition results can be fused legitimately and meaningfully. In order to verify the performance of the proposed algorithm, several experiments under different error rates of context information sources are conducted in the personal identity verification (PIV) application scenario. The experimental results show that the proposed BP neural network and modified DST based inconsistent context fusion algorithm can obtain good performance in most cases.


    A molecular graph in chemical graph theory is the graphical representation of the structural formula of a chemical compound in which the vertices represent atoms and edges represent chemical bond between those atoms. A topological index of a molecular graph G is a real number which characterizes the topology of G. Also it is invariant under graph automorphism. Topological indices have been widely used in Quantitative Structure-Activity Relationship (QSAR) and Quantitative Structure-Property Relationship (QSPR) studies. It has application in many folds, to name a few areas, biochemistry, nanotechnology, pharmacology. Bond energy is a measure of bond strength of a chemical compound. The distance between two atoms is considered as the bond length between them. The higher the bond energy, the smaller is the bond length between those atoms. The recently introduced 2-degree based topological invariants, analogous to novel graph invariants (Zagreb indices), namely leap Zagreb indices, may be applied in studying such bond energy between atoms in a molecular graph of a chemical compound.

    Throughout this paper, G=(V,E) represents a connected molecular graph with the vertex set V(G) and the edge set E(G). Let the number of vertices and edges of G be n and m respectively. The degree of a vertex v in G is the number of vertices adjacent to v in G and denoted by deg(v:G). The 2-degree (or the second-degree) of a vertex v in G is the number of vertices which are at distance two from v in G and denoted by d2(v:G). The Zagreb indices, namely, the first and second Zagreb indices, are the most important and oldest molecular structure descriptors. These indices have been studied extensively in the field of Mathematical Chemistry [3,4,5]. Recently, the concept of Forgotten topological index also known as F-index have attracted many researchers which results in over 100 research articles related to F-index. A.M.Naji et al. [13] have recently introduced and studied some properties of a new topological invariant called Leap Zagreb indices. They are defined as follows:

    Definition 1. (ⅰ) The first leap Zagreb index LM1(G) of a graph G is equal to the sum of squares of the second degrees of the vertices, LM1(G)=uV(G)d2(u)2.

    (ⅱ) The second leap Zagreb index LM2(G) of a graph G is equal to the sum of the products of the second degrees of pairs of adjacent vertices, LM2(G)=uvE(G)d2(u)d2(v).

    (ⅲ) The third leap Zagreb index LM3(G) of a graph G is equal to the sum of the products of the degree with the second degree of every vertex in G, LM3(G)=uV(G)deg(u)d2(u)

    Subsequently, Z. Shao et al. [18] generalized the results of Naji et al.[13] for trees and unicyclic graphs and determined upper and lower bounds on leap Zagreb indices and characterized extremal graphs. Basavanagoud et al.[2] computed exact values for first and second leap hyper Zagreb indices of some nano structures. V. R. Kulli [7,8,9] introduced and studied various leap indices. Shiladhar et al.[17] computed leap Zagreb indices of wind mill graphs. Most recently, Naji et al.[14] have studied some properties of leap graphs.

    Azari et al.[1] found formulae for first and second Zagreb indices of bridge and chain graphs. Nilanjan De [15,16] computed F-index and hyper Zagreb index of bridge and chain graphs. Jerline et al. [6] obtained exact values for harmonic index of bridge and chain graphs. E. Litta et al. [10] worked on modified Zagreb indices of bridge graphs. Mohanad Ali et al. [11] computed F-leap index of some special classes of bridge and chain graphs. Zhang et al.[12] worked on Edge-Version Atom-Bond Connectivity and Geometric Arithmetic Indices of generalized bridge molecular graphs. Motivated by their results, we compute exact values for the first and third leap Zagreb indices of bridges and chain graphs. Also we discuss some applications related to these indices in the last section of this paper. First, we recall the definitions of bridge and chain graphs from [1] as follows:

    Definition 2. Let {Gi}di=1 be a set of finite pairwise disjoint graphs with distinct vertices viV(Gi). The bridge graph B1=B1(G1,G2,,Gd;v1,v2,v3,,vd) of {Gi}di=1 with respect to the vertices {vi}di=1 as shown in Figure 1, is the graph obtained from the graphs G1,G2,,Gd by connecting the vertices vi and vi+1 by an edge for all i=1,2,,d1.

    Figure 1.  The bridge graph B1.

    Definition 3. The bridge graph B2=B2(G1,G2,,Gd;v1,w1,v2,w2,,vd,wd) of {Gi}di=1 with respect to the vertices {vi,wi}di=1 as shown in Figure 2, is the graph obtained from the graphs G1,G2,G3,,Gd by connecting the vertices wi and vi+1 by an edge for all i=1,2,,d1.

    Figure 2.  The bridge graph B2.

    Definition 4. The chain graph C=C(G1,G2,,Gd;v1,w1,v2,w2,,vd,wd) of {Gi}di=1 with respect to the vertices {vi,wi}di=1 as shown in Figure 3, is the graph obtained from the graphs G1,G2,,Gd by identifying the vertices wi and vi+1 for all i=1,2,,d1.

    Figure 3.  The chain graph C.

    The following lemma gives the 2-degree of any arbitrary vertex in the bridge graph B1.

    Lemma 5. Let G1,G2,,Gd be d5 connected graphs. Then the 2-degree of any arbitrary vertex u in the bridge graph B1 formed by these graphs is as follows:

    d2(u:B1)={ν1+μ2+1,ifu=v1νd+μd1+1,ifu=vdν2+μ1+μ3+1,ifu=v2νd1+μd+μd2+1,ifu=vd1νi+μi1+μi+1+2,,ifu=vi,3id2d2(u:G1)+1,ifuNG1(v1)d2(u:Gd)+1,ifuNGd(vd)d2(u:Gi)+2,ifuNGi(vi),2id1d2(u:Gi),ifuV(Gi)NGi[vi],1id, (2.1)

    where νi=d2(vi:Gi) and μi=deg(vi:Gi),1id.

    Next, we compute the first leap Zagreb index of the type-Ⅰ bridge graph B1.

    Let Si=uNGi(vi)d2(u:Gi), 1id.

    Theorem 6. LM1(B1)=di=1LM1(Gi)+d1i=2[(μi1+μi+1+1)2+2νi(μi1+μi+1+1)+4Si+8μi]+2d2i=3νi+2(S1+Sd)+(μ1+μd2μ32μd2)+(μ2+1)(μ2+2ν1+1)+(μd1+1)(μd1+2νd+1)+3d12.

    Proof. By virtue of Lemma 5

    LM1(B1)=uV(B1)d2(u:B1)2=(ν1+μ2+1)2+(νd+μd1+1)2+(ν2+μ1+μ3+1)2+(νd1+μd+μd2+1)2+d2i=3(νi+μi1+μi+1+2)2+uNG1(v1)(d2(u:G1)+1)2+uNGd(vd)(d2(u:Gd)+1)2+d1i=2uNGi(vi)(d2(u:Gi)+2)2+di=1uV(Gi)NGi[vi]d2(u:Gi)2
          =ν21+(μ2+1)2+2ν1(μ2+1)+ν2d+(μd1+1)2+2νd(μd1+1)+ν22+(μ1+μ3+1)2+2ν2(μ1+μ3+1)+ν2d1+(μd+μd2+1)2+2νd1(μd+μd2+1)+d2i=3[(νi+1)2+2(νi+1)(μi1+μi+1+1)+(μi1+μi+1+1)2]+uNG1(v1)[d2(u:G1)2+2d2(u:G1)]+μ1+uNGd(vd)[d2(u:Gd)2+2d2(u:Gd)]+μd+d1i=2uNGi(vi)[d2(u:Gi)2+4d2(u:Gi)]+4d1i=2μi+di=1uV(Gi)NGi[vi]d2(u:Gi)2
    =di=1LM1(Gi)+d1i=2[(μi1+μi+1+1)2+2νi(μi1+μi+1+1)+4Si+8μi]+2d2i=3νi+2(S1+Sd)+(μ1+μd2μ22μ32μd22μd1)+(μ2+1)(μ2+2ν1+1)+(μd1+1)(μd1+2νd+1)+3d12.

    Thus the result follows.

    Corollary 7. If G1=G2==Gd=G in a bridge graph B1, then LM1(B1)=dLM1(G)+(4d6)μ2+(4d8)ν+(12d26)μ+(4d4)(νμ+S)+4d12, where S=uNG(v)d2(u:G).

    Lemma 8. [1] The degree of an arbitrary vertex u of the bridge graph B1,d5 is given by:

    deg(u:B1)={μ1+1,ifu=v1μd+1,ifu=vdμi+2,ifu=vi,2id1deg(u:Gi),ifuV(Gi){vi},1id, (2.2)

    where μi=deg(vi:Gi),1id.

    Next, we compute the third leap Zagreb index of the type-Ⅰ bridge graph B1 Let us denote si=uNGi(vi)deg(u:Gi), 1id.

    Theorem 9. LM3(B1)=di=1LM3(Gi)+(s1+sd)+2d1i=2si+di=1(2νi+6μi)+2di=2(μi1μi)2(μ2+μd1)(ν1+νd)3(μ1+μd)+4d10.

    Proof. By virtue of Lemma 5 and 8

    LM3(B1)=uv(B1)d2(u)deg(u)=(ν1+μ2+1)(μ1+1)+(ν2+μ1+μ3+1)(μ2+2)+(νd+μd1+1)(μd+1)+(νd1+μd+μd2+1)(μd1+2)+d2i=3(νi+μi1+μi+1+2)(μi+2)+uNG1(v1)(d2(u:G1)+1)(deg(u:G1))+uNGd(vd)(d2(u:Gd)+1)(deg(u:Gd))+d1i=2uNGi(vi)(d2(u:Gi)+2)(deg(u:Gi))+di=1uV(Gi)NGi[vi](d2(u:Gi))(deg(u:Gi))
    =(ν1μ1+ν1+μ2μ1+μ2+μ1+1)+(ν2μ2+2ν2+μ1μ2+2μ1+μ3μ2+2μ3+μ2+2)+(νdμd+νd+μd1μd+μd1+μd+1)+(νd1μd1+2νd1+μdμd1+2μd+μd2μd1+2μd2+μd1+2)+d2i=3(νiμi+2νi+μi1μi+2μi1+μi+1μi+2μi+1+2μi+4)+uNG1(v1)(d2(u:G1)deg(u:G1)+deg(u:G1))+uNGd(vd)(d2(u:Gd)deg(u:Gd)+deg(u:Gd))+d1i=2uNGi(vi)(d2(u:Gi)deg(u:Gi)+2deg(u:Gi))+di=1uV(Gi)NGi[vi]d2(u:Gi)deg(u:Gi)

    Thus the result follows.

    Corollary 10. If G1=G2==Gd=G in a bridge graph B1, then LM3(B1)=dLM3(G)+2(d1)(s+ν+μ2)+2μ(3d5)+4d10, where s=uNG(v)deg(u:G).

    For any two nonempty sets A and B, AΔB denotes the symmetric difference of A and B and defined as AΔB=(AB)(BA)=(AB)(AB). First, we obtain the 2-degree of any arbitrary vertex in the type-Ⅱ bridge graph B2 as follows:

    Lemma 11. Let G1,G2,,Gd be d5 triangle free connected graphs. Then 2-degree of any arbitrary vertex u in the bridge graph B2 formed by these graphs is as follows:

    d2(u:B2)={d2(u:G1),ifuV(G1)NG1[w1]d2(u:G1)+1,ifuNG1(w1)d2(u:Gi),ifuV(Gi){NGi[vi]NGi[wi]},2id1d2(u:Gd),ifuV(Gd)NGd[vd]d2(u:Gd)+1,ifuNGd(vd)d2(u:Gi)+1,ifu(NGi(vi)ΔNGi(wi)),2id1d2(u:Gi)+2,ifuNGi(vi)NGi(wi),2id1δi+μi+1,ifu=wi,1id1νi+λi1,ifu=vi,2id. (2.3)

    where νi=d2(vi:Gi),μi=deg(vi:Gi);2id,δi=d2(wi:Gi),λi=deg(wi:Gi);1id1.

    Next, we compute the first leap Zagreb index of type-Ⅱ bridge graph B2.

    Let us denote S1=uNG1(w1)d2(u:G1) and Sd=uNGd(vd)d2(u:Gd)

    Theorem 12. LM1(B2)=di=1LM1(Gi)+2(S1+Sd)+(λ1+μd)+d1i=2uNGi(vi)ΔNGi(wi)[2d2(u:Gi)+1]+4d1i=2uNGi(vi)NGi(wi)[d2(u:Gi)+1]+d1i=1(μ2i+1+2δiμi+1)+di=2(λ2i1+2νiλi1).

    Proof.

    LM1(B2)=uV(B2)d2(u:B2)2=uV(G1)NG1[w1]d2(u:G1)2+d1i=2  uV(Gi){NGi[vi]NGi[wi]}d2(u:Gi)2+uV(Gd)NGd[vd]d2(u:Gd)2+uNG1(w1)(d2(u:G1)+1)2+d1i=2uNGi(vi)ΔNGi(wi)(d2(u:Gi)+1)2+uNGd(vd)(d2(u:Gd)+1)2+d1i=2uNGi(vi)NGi(wi)(d2(u:Gi)+2)2+d1i=1(δi+μi+1)2+di=2(νi+λi1)2
    =LM1(G1)δ21uNG1(w1)d2(u:G1)2+d1i=2[uV(Gi)d2(u:Gi)2uN(vi)N(wi)d2(u:Gi)2ν2iδ2i]+LM1(Gd)ν2duNGd(vd)d2(u:Gd)2+uNG1(w1)d2(u:G1)2+2uNG1(w1)d2(u:G1)+λ1+d1i=2[uNGi(vi)ΔNGi(wi)[d2(u:Gi)2+2d2(u:Gi)+1]]+uNGd(vd)[d2(u:Gd)2+2d2(u:Gd)+1]+d1i=2[uNGi(vi)NGi(wi)[d2(u:Gi)2+4d2(u:Gi)+4]]+d1i=1[δ2i+2δiμi+1+μ2i+1]+di=2[ν2i+2νiλi1+λ2i1]

    Thus,

    LM1(B2)=di=1LM1(Gi)+2(S1+Sd)+(λ1+μd)+d1i=2uNGi(vi)ΔNGi(wi)[2d2(u:Gi)+1]+4d1i=2uNGi(vi)NGi(wi)[d2(u:Gi)+1]+d1i=1(μ2i+1+2δiμi+1)+di=2(λ2i1+2νiλi1).

    Corollary 13. If G1=G2=,Gd=G, in a bridge graph B2, then LM1(B2)=dLM1(G)+λ+μ+2(S+S)+(d2)uNG(v)ΔNG(w)(2d2(u:G)+1)+4(d2)uNG(v)NG(w)(d2(u:G)+1)+(d1)[μ2+λ2]+2(d1)[δμ+νλ], where S=uNG(w)d2(u:G) and S=uNG(v)d2(u:G).

    In what follows next, we compute the third leap Zagreb index of B2.

    Lemma 14. The degree of an arbitrary vertex u of the bridge graph B2, d5 is given by:

    deg(u:B2)={deg(u:G1),ifuV(G1){w1}deg(u:Gd),ifuV(Gd){vd}deg(u:Gi),ifuV(Gi){vi,wi},2id1λi+1,ifu=wi,1id1μi+1,ifu=vi,2id. (2.4)

    where μi=deg(vi:Gi);2id,λi=deg(wi:Gi);1id1.

    Theorem 15. LM3(B2)=di=1LM3(Gi)+uNG1(w1)deg(u:G1)+uNGd(vd)deg(u:Gd)+d1i=2uNGi(wi)NGi(vi)deg(u:Gi)+d1i=2uNGi(vi)NGi(wi)deg(u:Gi)+d1i=2uNGi(vi)NGi(wi)2deg(u:Gi)+d1i=12μi+1λi+d1i=1μi+1+di=2λi1+di=1(δi+νi)ν1δd.

    Proof. By virtue of Lemma 2.7 and 2.10

    LM3(B2)=uV(B2)d2(u)deg(u)=uV(G1)NG1[w1]d2(u:G1)deg(u:G1)+d1i=2uV(Gi){NGi[vi]NGi[wi]}d2(u:Gi)deg(u:Gi)+uV(Gd)NGd[vd]d2(u:Gd)deg(u:Gd)+uNG1(w1)(d2(u:G1)+1)(deg(u:G1))+d1i=2uNGi(wi)NGi(vi)(d2(u:Gi)+1)(deg(u:Gi))+d1i=2uNGi(vi)NGi(wi)(d2(u:Gi)+1)(deg(u:Gi))+uNGd(vd)(d2(u:Gd)+1)(deg(u:Gd))+d1i=2uNGi(vi)NGi(wi)(d2(u:Gi)+2)(deg(u:Gi))+d1i=1(δi+μi+1)(λi+1)+di=2(νi+λi1)(μi+1)

    Thus the result follows.

    Corollary 16. If G1=G2==Gd=G in a bridge graph B2, then LM3(B2)=dLM3(G)+uNG(w)deg(u:G)+uNG(v)deg(u:G)+(d2)(uNG(w)NG(v)deg(u:G)+uNG(v)NG(w)deg(u:G)+uNG(v)NG(w)2deg(u:G))+(d1)(2μλ+μ+λ)+d(δ+ν)(ν+δ).

    In the following lemma, we obtain the 2-degree of any vertex in the chain graph C.

    Lemma 17. Let G1,G2,,Gd, d5 be C3-free connected graphs and let C=C(G1,G2,,Gd;w1,v2,w2,v3,,wd1,vd) be the chain graph formed using these graphs. Then the 2-degree of any vertex u in C is given as follows:

    d2(u:C)={d2(u:G1),ifuV(G1)NG1[w1]d2(u:G1)+μ2,ifuNG1(w1)d2(u:Gd),ifuV(Gd)NGd[vd]d2(u:Gd)+λd1,ifuNGd(vd)d2(u:Gi),ifuV(Gi){NGi[wi]NGi[vi]},2id1d2(u:Gi)+μi+1,ifuNGi(wi)NGi(vi),2id1d2(u:Gi)+λi1,ifuNGi(vi)NGi(wi),2id1d2(u:Gi)+λi1+μi+1,ifuNGi(vi)NGi(wi),2id1δi+νi+1,ifu=wi=vi+1,1id1, (2.5)

    where νi=d2(vi:Gi),μi=deg(vi:Gi),λi=deg(wi:Gi) and δi=d2(wi:Gi) for all 1id.

    Now, we compute the first leap Zagreb index of the chain graph C by applying Lemma 17.

    Theorem 18. For the chain graph C,

    LM1(C)=di=1LM1(Gi)+uNG1(w1)[2μ2d2(u:G1)+μ22]+uNGd(vd)[2λd1d2(u:Gd)+λ2d1]+d1i=2  uNGi(wi)NGi(vi)[2μi+1d2(u:Gi)+μ2i+1]+d1i=2  uNGi(vi)NGi(wi)[2λi1d2(u:Gi)+λ2i1]+2d1i=2  uNGi(vi)NGi(wi)[λi1d2(u:Gi)+μi+1d2(u:Gi)+λi1μi+1]+d1i=2  uNGi(vi)NGi(wi)(λ2i1+μ2i+1)+2d1i=1δiνi+1.

    Proof. By Lemma 17, we have

    LM1(C)=uV(C)d2(u:C)2=uV(G1)NG1[w1]d2(u:G1)2+uNG1(w1)[d2(u:G1)+μ2]2+uV(Gd)NGd[vd]d2(u:Gd)2+uNGd(vd)[d2(u:Gd)+λd1]2+d1i=2  uV(Gi){NGi[vi]NGi[wi]}d2(u:Gi)2+d1i=2  uNGi(wi)NGi(vi)[d2(u:Gi)+μi+1]2+d1i=2  uNGi(vi)NGi(wi)[d2(u:Gi)+λi1]2+d1i=2  uNGi(vi)NGi(wi)[d2(u:Gi)+λi1+μi+1]2+d1i=1[δi+νi+1]2
    =LM1(G1)uNG1(w1)[d2(u:G1)2]δ21+uNG1(w1)[d2(u:G1)2+2d2(u:G1)μ2+μ22]+LM1(Gd)uNGd(vd)d2(u:Gd)2ν2d+uNGd(vd)[d2(u:Gd)2+2λd1d2(u:Gd)+λ2d1]+d1i=2uV(Gi)d2(u:Gi)2d1i=2  uNGi[vi]NGi[wi]d2(u:Gi)2+d1i=2  uNGi(wi)NGi(vi)[d2(u:Gi)2+2μi+1d2(u:Gi)+μ2i+1]+d1i=2  uNGi(vi)NGi(wi)[d2(u:Gi)2+2λi1d2(u:Gi)+λ2i1]+d1i=2uNGi(vi)NGi(wi)[d2(u:Gi)2+2λi1d2(u:Gi)+2μi+1d2(u:Gi)+2λi1μi+1+λ2i1+μ2i+1]+d1i=1[δ2i+ν2i+1]+2d1i=1δiνi+1
    =di=1LM1(Gi)+uNG1(w1)[2μ2d2(u:G1)+μ22]+uNGd(vd)[2λd1d2(u:Gd)+λ2d1]+d1i=2  uNGi(wi)NGi(vi)[2μi+1d2(u:Gi)+μ2i+1]+d1i=2  uNGi(vi)NGi(wi)[2λi1d2(u:Gi)+λ2i1]+2d1i=2  uNGi(vi)NGi(wi)[λi1d2(u:Gi)+μi+1d2(u:Gi)+λi1μi+1]+d1i=2  uNGi(vi)NGi(wi)(λ2i1+μ2i+1)+2d1i=1δiνi+1.

    Corollary 19. In a chain graph C, if G1=G2==Gd=G, then LM1(C)=dLM1(G)+uNG(w)[2μd2(u:G)+μ2]+uNG(v)[2λd2(u:G)+λ2]+(d2)uNG(w)NG(v)[2μd2(u:G)+μ2]+(d2)uNG(v)NG(w)[2λd2(u:G)+λ2]+2(d2)uNG(v)NG(w)[λd2(u:G)+μd2(u:G)+λμ]+(d2)uNG(v)NG(w)(λ2+μ2)+2(d1)δν.

    Lemma 20. Let G1,G2,,Gd, d5 be C3-free connected graphs and let C=C(G1,G2,,Gd;w1,v2,w2,v3,,wd1,vd) be the chain graph formed using these graphs. Then the degree of any vertex u in C is given as follows:

    deg(u:C)={deg(u:G1),ifuV(G1){w1}deg(u:Gd),ifuV(Gd){vd}deg(u:Gi),ifuV(Gi){vi,wi},2id1λi+μi+1,ifu=wi=vi+1,1id1, (2.6)

    where μi=deg(vi:Gi),λi=deg(wi:Gi) for all 1id

    Finally, we compute the third leap Zagreb index of the chain graph C by applying Lemma 17 and 2.16.

    Theorem 21. LM3(C)=di=1LM3(Gi)+uNG1(w1)μ2deg(u:G1)+uNGd(vd)λd1deg(u:Gd)+d1i=2uNGi(wi)NGi(vi)μi+1deg(u:Gi)+d1i=2uNGi(vi)NGi(wi)λi1deg(u:Gi)+d1i=2uNGi(vi)NGi(wi)(λi1deg(u:Gi)+μi+1deg(u:Gi))+d1i=1(δiμi+1+νi+1λi).

    Proof. By virtue of Lemma 17 and 20

    LM3(C)=uV(C)d2(u)deg(u)=uV(G1)NG1[w1]d2(u:G1)deg(u:G1)+uNG1(w1)(d2(u:G1)+μ2)deg(u:G1)+uV(Gd)NGd[vd]d2(u:Gd)deg(u:Gd)+uNGd(vd)(d2(u:Gd)+λd1)deg(u:Gd)+d1i=2uV(Gi){NGi[wi]NGi[vi]}d2(u:Gi)deg(u:Gi)+d1i=2uNGi(wi)NGi(vi)(d2(u:Gi)+μi+1)deg(u:Gi)+d1i=2uNGi(vi)NGi(wi)(d2(u:Gi)+λi1)deg(u:Gi)+d1i=2uNGi(vi)NGi(wi)(d2(u:Gi)+λi1+μi+1)deg(u:Gi)+d1i=1(δi+νi+1)(λi+μi+1).

    Thus the result follows.

    Corollary 22. In a chain graph C, if G1=G2==Gd=G, then LM3(C)=dLM3(G)+uNG(w)μdeg(u:G)+uNG(v)λdeg(u:G)+(d2)(uNG(w)NG(v)μdeg(u:G)+uNG(v)NG(w)λdeg(u:G)+uNG(v)NG(w)(λ+μ)deg(u:G))+(d1)(δμ+νλ).

    In this section, we determine the first and third leap Zagreb indices of some molecular graph structures. Two vertices v and w of a hexagon H (C6) (please refer Figure 4) are said to be in

    Figure 4.  Ortho, meta and para positions of two vertices in a hexagon H.

    (ⅰ) ortho-position, if they are adjacent in H

    (ⅱ) meta-position, if they are distance two in H

    (ⅲ) para-position, if they are distance three in H.

    We connect h5 ortho-hexagons to form a polyphenyl chain denoted by Oh as follows:

    One can observe that the Polyphenyl chain Oh shown in Figure 5 is a B1 type bridge graph. Therefore, from Corollary 7, we get

    LM1(Oh)=hLM1(G)+(4h6)μ2+(4h8)ν+(12h26)μ+(4h4)[νμ+uNG(v)d2(u:G)]+4h12=24h+(4h6)(4)+(4h8)(2)+(12h26)(2)+(4h4)(4)+(4h4)(4)+4h12=108h136.
    Figure 5.  Polyphenyl chain Oh.

    Similarly,

    From Corollary 10, we get

    LM3(Oh)=24h+(2h2)(2)+(2h2)(2)+2(2)(3h5)+2(h1)(2+4)+4h10=60h50

    The polyphenyl chain Mh is formed by connecting h5 meta-hexagons as shown in Figure 6.

    Figure 6.  Polyphenyl chain Mh.

    The polyphenyl chain Ph is formed by connecting h5 para-hexagons as shown in the following Figure 7.

    Figure 7.  Polyphenyl chain Ph.

    It is clear that the Polyphenyl chains Mh and Ph are type-Ⅱ bridge graphs B2.

    Using Corollary 2.9, we get

    LM1(Mh)=hLM1(G)+λ+μ+2uNG(w)d2(u:G)+(h2)[uNG(w)NG(v)(2d2(u:G)+1)]+(h2)uNG(v)NG(w)(2d2(u:G)+1)+4(h2)uNG(v)NG(w)(d2(u:G)+1)+2uNG(v)d2(u:G)+(h1)μ2+2(h1)δμ+2(h1)νλ+(h1)λ2=24h+4+2(4)+(h2)[2(2)+1]+(h2)[2(2)+1]+4(h2)(2+1)+2(4)+(h1)(4)+4(h1)(4)+(h1)(4)

    Thus LM1(Mh)=70h48.

    Similarly, by Corollary 13, we have

    LM1(Ph)=24h+4+2(4)+(h2)[2(4)+2]+(h2)(8+2)+4(h2)(0)+2(4)+(h1)(4)+8(h1)+8(h1)+(h1)(4)

    Therefore, LM1(Ph)=68h44.

    Using Corollary 2.12, we get

    LM3(Mh)=24h+8+(h2)8+(h1)12+h(4)4=48h24
    LM3(Ph)=24h+8+(h2)8+(h1)12+4h4=48h24.

    Next, we shall see an application related to the chain graph C. The spiro-chain SPC4(d,3) is a chain graph formed using d5 copies of the cycle C4.

    Here the number 3 in the construction denotes the position of the vertices v and w in the spiro-chain (refer Figure 8).

    Figure 8.  Spiro-chain SPC4(d,3) formed with d5 copies of C4 connected in 3rd position.

    The spiro-chain SPC6(d,4) is a chain graph formed using d5 copies of the cycle C6 or hexagon where the vertices v and w are connected in the 4th position (refer Figure 9).

    Figure 9.  Spiro-chain SPC6(d,4) formed with d5 copies of C6 connected in 4th position.

    By applying Corollary 19, we get

    LM1(SPC4(d,3))=dLM1(G)+uNG(w)[2μd2(u:G)+μ2]+uNG(v)[2λd2(u:G)+λ2]+(d2)uNG(w)NG(v)[2μd2(u:G)+μ2]+(d2)uNG(v)NG(w)[2λd2(u:G)+λ2]+2(d2)uNG(v)NG(w)[λd2(u:G)+μd2(u:G)+λμ]+(d2)uNG(v)NG(w)(λ2+μ2)+2(d1)δν=54d66.

    Similarly, from Corollary 19, we have LM1(SPC6(d,4))=80d56.

    By applying Corollary 22, we get

    LM3(SPC4(d,3))=8d+2(2+2)+2(2+2)+(d2)(16)+(d1)(4)=28d20

    Similarly, from Corollary 22, we have LM3(SPC6(d,4))=48d24.

    We have computed exact values of one of the recent topological invariants namely first and third leap Zagreb indices for bridge and chain graphs. It is worth mentioning that computing second leap Zagreb index of bridges and chain graphs has not yet addressed and interested researchers may work on it. Also these indices need to be explored for several other interesting graph structures arising from mathematical chemistry and other branches of science.

    The authors wish to thank the referees for their careful reading of the manuscript and valuable suggestions. This work was supported in part by the National Key Technologies R & D Program of China under Grant 2017YFB0802300, 2018YFB0904205, in part by the Key Laboratory of Pattern Recognition and Intelligent Information Processing, Institutions of Higher Education of Sichuan Province under Grant MSSB-2020-12.

    The authors declare that no competing interests exist.



    [1] W. N. Schilit, A system architecture for context-aware mobile computing, PhD thesis, Columbia University, 1995.
    [2] V. T. Anh, P. Q. Cuong, P. C. Vinh, Context-aware mobility in internet of thing: A survey, EAI Endorsed Trans. Context Aware Syst. Appl., 6 (2019), 1–5.
    [3] J. Aguilar, M. Jerez, T. Rodríguez, CAMeOnto: Context awareness meta ontology modeling, Appl. Comput. Inf., 14 (2018), 202–213.
    [4] B. Rakita, Z. Bundalo, D. Bundalo, M. Sajic, Context-aware smartphone applications based on generic context supervision services, Proceedings of the 2018 26th Telecommunications Forum, 2018.
    [5] H. D. Vianna, J. L. Barbosa, A scalable model for building context-aware applications for noncommunicable diseases prevention, Inf. Proces. Lett., 148 (2019), 1–6. doi: 10.1016/j.ipl.2019.03.010
    [6] Y. Li, Y. Pang, J. Shen, J. Cao, L. Shao, NETNet: Neighbor Erasing and Transferring Network for Better Single Shot Object Detection, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, 2020.
    [7] X. Jiang, Y. Pang, M. Sun, X. Li, Cascaded subpatch networks for effective CNNs, IEEE Trans. Neural Network Learn. Syst., 29 (2018), 2684–2694.
    [8] H. Xu, L. Wang, H. Xiong, Z. Du, Z. Xie, Effective context inconsistency elimination algorithm based on feedback and reliability distribution for IoV, China Commun., 11 (2014), 16–28.
    [9] A. A. Al-Shargabi, F. Siewe, A. Zahary, Quality of context in context-aware systems, EAI Endorsed Trans. Context Aware Syst. Appl., 17 (2017), 1–25.
    [10] D. Zheng, J. Wang, B. Kerong, Research of QoC based management for complex sensor networks applications, Proceedings of the IEEE 12th International Conference on Dependable, Autonomic and Secure Computing, 2014.
    [11] S. Bobek, G. J. Nalepa, Uncertainty handling in rule-based mobile context-aware systems, Pervasive Mob. Comput., 39 (2017), 159–179. doi: 10.1016/j.pmcj.2016.09.004
    [12] V. Venkatesh, P. Raj, T. S. Praba, R. Anushiadevi, Cloud-based Dempster-Shafer theory (CDST) for precision-centric activity recognition in smarter environments, Data Eng. Commun. Technol., 7 (2020), 881–891.
    [13] J. Zhang, S. Zhang, J. Yang, P. Zhang, Reasoning mechanism based on the Demspter-Shafer evidence theory for pervasive context aware computing application, Proceedings of Communications and Networking, 2006.
    [14] Q. Jiang, R. Tang, P. Liu, Y. Qiu, H. Xu, Research on dynamic data fusion algorithm based on context awareness, Proceedings of Informatics and Computing, 2014.
    [15] A. A. Al-Shargabi, F. Siewe, Resolving context conflicts using association rules (RCCAR) to improve quality of context-aware systems, Proceedings of the 8th International Conference on Computer Science and Education, 2013.
    [16] Y. Lee, J. Lim, S. J. Hyun, D. Lee, Rule-based approach for context inconsistency management scheme in ubiquitous computing, Proceedings of IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010.
    [17] X. Li, G. Li, A hybrid context inconsistency resolution method, Proceedings of the 7th International Conference on Intelligent Human-Machine Systems and Cybernetics, 2015.
    [18] X. Yang, An adaptive mechanism for inconsistent context resolution in ubiquitous computing, Proceedings of the International Conference on Control Engineering and Communication Technology, 2012.
    [19] A. Manzoor, H. L. Truong, S. Dustdar, On the evaluation of quality of context, Proceedings of 3rd European Conference of Smart Sensing and Context, 2008.
    [20] A. Manzoor, H. L. Truong, S. Dustdar, Quality of context: Models and applications for context-aware systems in pervasive environments, Knowl. Eng. Rev., 29 (2014), 154–170. doi: 10.1017/S0269888914000034
    [21] H. Lee, J. S. Choi, R. Elmasri, A static evidential network for context reasoning in home-based care, IEEE Trans. Syst. Man Cybern., 40 (2010), 1232–1243. doi: 10.1109/TSMCA.2010.2046733
    [22] Y. Chen, Q. Huang, Y. Chen, An improve information fusion algorithm based on BP neural network and DS evidence theory, Proceedings of Digital Manufacturing and Automation, 2012.
    [23] J. Wang, Z. Huang, G. Duan, An information fusion model of customer identification based on ELM-SVM-DS, Proceedings of Information Management, Innovation Management and Industrial Engineering, 2010.
    [24] G. Zhao, A. Chen, G. Lu, W. Liu, Data fusion algorithm based on fuzzy sets and D-S theory of evidence, Tsinghua Sci. Technol., 25 (2020), 12–19. doi: 10.26599/TST.2018.9010138
    [25] M. Chen, H. J. Xu, H. L. Xiong, L. Pan, B. Du, F. Li, A new overall quality indicator OQoC and the corresponding context inconsistency elimination algorithm based on OQoC and Dempster-Shafer theory, Soft Comput., 24 (2020), 10829–10841. doi: 10.1007/s00500-019-04585-0
    [26] A. Padovitz, S. W. Loke, A. Zaslavsky, B. Burg, C. Bartolini, An approach to data fusion for context awareness, Proceedings of International and Interdisciplinary Conference on Modeling and Using Context, 2005.
    [27] A. P. Dempster, Upper and lower probabilities induced by a multivalued mapping, Classic Works of the Dempster-Shafer Theory of Belief Functions, 2008.
    [28] W. Jiang, M. Zhuang, C. Xie, J. Wu, Sensing attribute weights: A novel basic belief assignment method, Sensors, 17 (2017), 721–741. doi: 10.3390/s17040721
    [29] C. K. Murphy, Combining belief functions when evidence conflicts, Decis. Support Syst., 29 (2000), 1–9. doi: 10.1016/S0167-9236(99)00084-6
    [30] X. Yu, Q. Zhou, Y. Li, J. An, Z. Liu, A new self-adaptive fusion algorithm based on DST and DSmT, Proceedings of Information Fusion, 2014.
    [31] B. H. Lee, D. H. Kim, Efficient context-aware selection based on user feedback, IEEE Trans. Consum. Electron., 58 (2012), 978–984. doi: 10.1109/TCE.2012.6311345
    [32] M. Ji, H. Xu, L. Wang, J. Dang, Z. Xu, H. Fang, Approach of measuring PoC of context using limited self-feedback in context-aware systems, IET Wirel. Sens. Syst., 6 (2016), 158–165. doi: 10.1049/iet-wss.2015.0132
    [33] Y. Kim, K. Lee, A quality measurement method of context information in ubiquitous environments, Proceedings of International Conference on Hybrid Information Technology, 2006.
    [34] D. F. McAllister, C. E. Sun, M. A. Vouk, Reliability of voting in fault-tolerant software systems for small output-spaces, IEEE Trans. Reliab., 39 (1990), 524–534. doi: 10.1109/24.61308
  • This article has been cited by:

    1. Yiqin Bao, Hongbing Lu, Qiang Zhao, Zhongxue Yang, Wenbin Xu, Detection system of dead and sick chickens in large scale farms based on artificial intelligence, 2021, 18, 1551-0018, 6117, 10.3934/mbe.2021306
    2. Hailing Sun, Mohamed Elhoseny, Prediction of Building Energy Consumption Based on BP Neural Network, 2022, 2022, 1530-8677, 1, 10.1155/2022/7876013
    3. Shuting Chen, Sen Xu, Xinmiao Hu, Anqing Chen, Samir Ladaci, Suresh Kaswan, 2023, Distribution substation heavy overload data processing method based on BP neural network, 9781510667662, 140, 10.1117/12.2686649
  • Reader Comments
  • © 2021 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2879) PDF downloads(294) Cited by(3)

Figures and Tables

Figures(9)  /  Tables(2)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog