首页 > 最新文献

WSEAS TRANSACTIONS ON COMPUTERS最新文献

英文 中文
Monotonic and Linear Relations between Growth of Quality vs Growth in Quantity in Open-Source Software Projects 开源软件项目中质量增长与数量增长之间的单调关系和线性关系
Pub Date : 2024-04-08 DOI: 10.37394/23205.2024.23.4
Ekbal Rashid, Nikos E. Mastorakis
Mathematical models have been developed to study the relation between the growth of quantity and the growth of quality of open-source collaborative software repositories of GitHub. GitHub events triggering the growth of quantity and quality have been identified. Linear regression analysis, Pearson’s, Spearman’s, and Kendall’s correlation coefficients have been used. Hypothesis testing has led to the conclusion that there may be a linear relation between quality and quantity within a certain range of values. Positive monotonic relations and dependency between quantity and quality have been strongly established. Scripts for automated testing have been developed.
我们建立了数学模型来研究 GitHub 上开源协作软件仓库的数量增长与质量增长之间的关系。确定了引发数量和质量增长的 GitHub 事件。使用了线性回归分析、皮尔逊相关系数、斯皮尔曼相关系数和肯德尔相关系数。假设检验得出的结论是,在一定的数值范围内,质量和数量之间可能存在线性关系。数量和质量之间的正单调关系和依赖关系已得到有力证实。开发了自动测试脚本。
{"title":"Monotonic and Linear Relations between Growth of Quality vs Growth in Quantity in Open-Source Software Projects","authors":"Ekbal Rashid, Nikos E. Mastorakis","doi":"10.37394/23205.2024.23.4","DOIUrl":"https://doi.org/10.37394/23205.2024.23.4","url":null,"abstract":"Mathematical models have been developed to study the relation between the growth of quantity and the growth of quality of open-source collaborative software repositories of GitHub. GitHub events triggering the growth of quantity and quality have been identified. Linear regression analysis, Pearson’s, Spearman’s, and Kendall’s correlation coefficients have been used. Hypothesis testing has led to the conclusion that there may be a linear relation between quality and quantity within a certain range of values. Positive monotonic relations and dependency between quantity and quality have been strongly established. Scripts for automated testing have been developed.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"47 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140731891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The advent of ChatGPT: Job Made Easy or Job Loss to Data Analysts ChatGPT 的出现:数据分析师工作轻松还是失业
Pub Date : 2024-04-04 DOI: 10.37394/23205.2024.23.3
A. Owolabi, Oluwaseyi Oluwadamilare Okunlola, E. Adewuyi, Janet Iyabo Idowu, Olasunkanmi James Oladapo
Artificial Intelligence (AI) has proven valuable in almost every field of endeavour, including education, sciences, engineering, technology, medical sciences, and numerous other areas of application. Despite its widespread usefulness, concerns have arisen about AI potentially displacing jobs due to its highly advanced capabilities, commonly called the "god-man effect." One remarkable AI product is ChatGPT, a Chatbot developed by an open AI company in the USA that is capable of engaging in conversations that resemble human interactions. This study explores the strengths and limitations of ChatGPT for data analysis, with the primary objective of assessing whether ChatGPT poses a threat to the job of data analysts. An econometric dataset with a sample size of thirty (30), which consists of one dependent variable and three independent variables, was simulated. The dataset was intentionally generated with issues like multicollinearity, outliers, and heteroscedasticity. Subsequently, multiple tests were conducted on the datasets to confirm the presence of these problems. The ChatGPT 3.5 and 4.0 versions were then used to analyse the data to examine this chatbot's prowess in performing data analysis. ChatGPT 3.5 and 4.0 accurately predicted the suitable statistical tool for analyzing the simulated datasets. Both versions of ChatGPT emphasized that the expertise of a professional data analyst would be necessary. While they could offer guidance on data analysis, they cannot perform the analysis themselves as they are solely AI models. ChatGPT can help with what to do next when a data analyst gets stuck. However, they should not be recognized as an authority in making statistical decisions. Therefore, ChatGPT may not replace data analysts but could make their job easier by serving as a helpful resource to turn to when they encounter challenges.
事实证明,人工智能(AI)在教育、科学、工程、技术、医学等几乎所有领域都具有重要价值。尽管人工智能具有广泛的实用性,但由于其高度发达的能力,人们开始担心人工智能可能会取代工作岗位,这就是通常所说的 "神人效应"。ChatGPT 就是一款出色的人工智能产品,它是由美国一家开放式人工智能公司开发的聊天机器人,能够进行类似人类互动的对话。本研究探讨了 ChatGPT 在数据分析方面的优势和局限性,主要目的是评估 ChatGPT 是否会对数据分析师的工作构成威胁。我们模拟了一个计量经济学数据集,样本量为三十(30)个,由一个因变量和三个自变量组成。该数据集是有意生成的,存在多重共线性、异常值和异方差等问题。随后,对数据集进行了多重测试,以确认是否存在这些问题。然后使用 ChatGPT 3.5 和 4.0 版本分析数据,以检验该聊天机器人在执行数据分析方面的能力。ChatGPT 3.5 和 4.0 准确预测了分析模拟数据集的合适统计工具。两个版本的 ChatGPT 都强调了专业数据分析师的专业知识是必要的。虽然它们可以提供数据分析方面的指导,但由于它们只是人工智能模型,因此无法亲自进行分析。当数据分析师遇到困难时,ChatGPT 可以帮助解决下一步该怎么做的问题。但是,它们不应被视为做出统计决策的权威。因此,ChatGPT 不一定能取代数据分析师,但可以在他们遇到困难时提供有用的资源,从而使他们的工作更轻松。
{"title":"The advent of ChatGPT: Job Made Easy or Job Loss to Data Analysts","authors":"A. Owolabi, Oluwaseyi Oluwadamilare Okunlola, E. Adewuyi, Janet Iyabo Idowu, Olasunkanmi James Oladapo","doi":"10.37394/23205.2024.23.3","DOIUrl":"https://doi.org/10.37394/23205.2024.23.3","url":null,"abstract":"Artificial Intelligence (AI) has proven valuable in almost every field of endeavour, including education, sciences, engineering, technology, medical sciences, and numerous other areas of application. Despite its widespread usefulness, concerns have arisen about AI potentially displacing jobs due to its highly advanced capabilities, commonly called the \"god-man effect.\" One remarkable AI product is ChatGPT, a Chatbot developed by an open AI company in the USA that is capable of engaging in conversations that resemble human interactions. This study explores the strengths and limitations of ChatGPT for data analysis, with the primary objective of assessing whether ChatGPT poses a threat to the job of data analysts. An econometric dataset with a sample size of thirty (30), which consists of one dependent variable and three independent variables, was simulated. The dataset was intentionally generated with issues like multicollinearity, outliers, and heteroscedasticity. Subsequently, multiple tests were conducted on the datasets to confirm the presence of these problems. The ChatGPT 3.5 and 4.0 versions were then used to analyse the data to examine this chatbot's prowess in performing data analysis. ChatGPT 3.5 and 4.0 accurately predicted the suitable statistical tool for analyzing the simulated datasets. Both versions of ChatGPT emphasized that the expertise of a professional data analyst would be necessary. While they could offer guidance on data analysis, they cannot perform the analysis themselves as they are solely AI models. ChatGPT can help with what to do next when a data analyst gets stuck. However, they should not be recognized as an authority in making statistical decisions. Therefore, ChatGPT may not replace data analysts but could make their job easier by serving as a helpful resource to turn to when they encounter challenges.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"73 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140741542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reshaping 3PL Operations: Machine Learning Approaches to Mitigate and Manage Damage Parameters 重塑 3PL 运营:减轻和管理损害参数的机器学习方法
Pub Date : 2024-04-04 DOI: 10.37394/23205.2024.23.2
Yunus Emre Yeti̇ş, Safiye Turgay, Bi̇lal Erdemi̇r
In the third-party logistics (3PL) environment, it is very important to reduce damage parameters, increase operational efficiency and reduce costs. This study aims to develop strategies for reshaping 3P operations by analyzing the parameters involved in damage control with machine learning. The logistics sector is gradually growing in the world and the potential of the sector is better understood over time. Damage to products in the logistics sector, especially during transportation and storage, not only causes financial losses but also affects customer productivity and operational efficiency. With the use of artificial intelligence techniques, it is possible to determine consumer expectations, predict damage losses, and develop innovative strategies by applying machine learning algorithms. At the same time, options such as driverless vehicles, robots used in storage and shelves, and the easy use of big data within the system, which have emerged with artificial intelligence, minimize errors in the logistics sector. Thanks to the use of artificial intelligence in the logistics sector, businesses are more efficient. This study includes an estimation study in the field of error parameters for the logistics service sector with machine learning methods. In the application, real data of a 3PL company for the last 5 years is used. For the success of 3PL companies, warehousing and undamaged delivery of products are of great importance. The fewer damaged products they send, the more they increase their value. The company examined in the study kept its damage data and wanted it to be analyzed so that it could take precautions accordingly and follow a more profitable path. For this reason, the study focuses on data on errors and damages. This study shows what kind of problems can occur in such a company and how the 3PL company can evaluate the problems to increase customer service quality and cost efficiency.
在第三方物流(3PL)环境中,减少损坏参数、提高运营效率和降低成本非常重要。本研究旨在通过机器学习分析损坏控制所涉及的参数,制定重塑第三方物流运营的策略。随着时间的推移,人们对物流行业的潜力有了更深入的了解。物流业中的产品损坏,尤其是在运输和存储过程中的损坏,不仅会造成经济损失,还会影响客户的生产率和运营效率。利用人工智能技术,可以确定消费者的期望,预测损坏损失,并通过应用机器学习算法制定创新战略。同时,随着人工智能技术的出现,无人驾驶车辆、用于仓储和货架的机器人以及系统内大数据的便捷使用等方案,都能最大限度地减少物流行业的失误。人工智能在物流业的应用提高了企业的效率。本研究包括利用机器学习方法对物流服务行业的误差参数进行估算。应用中使用了一家第三方物流公司过去 5 年的真实数据。对于 3PL 公司的成功来说,仓储和无损产品交付非常重要。受损产品越少,公司的价值就越高。本研究中考察的公司保留了其损坏数据,并希望对其进行分析,以便采取相应的预防措施,走上更有利可图的道路。因此,研究的重点是错误和损坏数据。本研究说明了这类公司可能会出现哪些问题,以及第三方物流公司如何评估这些问题,以提高客户服务质量和成本效益。
{"title":"Reshaping 3PL Operations: Machine Learning Approaches to Mitigate and Manage Damage Parameters","authors":"Yunus Emre Yeti̇ş, Safiye Turgay, Bi̇lal Erdemi̇r","doi":"10.37394/23205.2024.23.2","DOIUrl":"https://doi.org/10.37394/23205.2024.23.2","url":null,"abstract":"In the third-party logistics (3PL) environment, it is very important to reduce damage parameters, increase operational efficiency and reduce costs. This study aims to develop strategies for reshaping 3P operations by analyzing the parameters involved in damage control with machine learning. The logistics sector is gradually growing in the world and the potential of the sector is better understood over time. Damage to products in the logistics sector, especially during transportation and storage, not only causes financial losses but also affects customer productivity and operational efficiency. With the use of artificial intelligence techniques, it is possible to determine consumer expectations, predict damage losses, and develop innovative strategies by applying machine learning algorithms. At the same time, options such as driverless vehicles, robots used in storage and shelves, and the easy use of big data within the system, which have emerged with artificial intelligence, minimize errors in the logistics sector. Thanks to the use of artificial intelligence in the logistics sector, businesses are more efficient. This study includes an estimation study in the field of error parameters for the logistics service sector with machine learning methods. In the application, real data of a 3PL company for the last 5 years is used. For the success of 3PL companies, warehousing and undamaged delivery of products are of great importance. The fewer damaged products they send, the more they increase their value. The company examined in the study kept its damage data and wanted it to be analyzed so that it could take precautions accordingly and follow a more profitable path. For this reason, the study focuses on data on errors and damages. This study shows what kind of problems can occur in such a company and how the 3PL company can evaluate the problems to increase customer service quality and cost efficiency.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"12 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140744100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Security in Database Grid Infrastructure for Storage Clusters 增强存储集群数据库网格基础设施的安全性
Pub Date : 2023-11-30 DOI: 10.37394/23205.2023.22.27
N. W. C. Lasantha, R. Abeysekara, M. W. P. Maduranga
This research project primarily focused on improving security by addressing vulnerabilities and creating a cost-scalable storage cluster solution, for applications. The Oracle Grid Infrastructure for Storage Clusters (OGISC) represents cutting-edge advancements in this field. The research extensively explores the philosophy of OGISC. Explains its core methodology. Recognizing the weaknesses of existing security mechanisms, we propose a solution to enhance security measures. A key aspect of our investigation involves integrating Glusterfs, a system known for its ability to scale linearly. We delve into the architecture of the solution demystifying the storage scale-out processes to its operation. Our study goes beyond integration by developing an approach and metadata model specifically tailored for Glusterfs ensuring optimal performance and robustness. One noteworthy aspect of our research is the application of Glusterfs compression with OpenVPN. This exploration highlights the benefits derived from this integration emphasizing how OpenVPN enhances Glusterfs capabilities. Rigorous analysis stages serve as the foundation for our findings resulting in a forward-thinking solution. Finally, we conclude this research with an examination of avenues for future exploration in this dynamic field.
该研究项目的主要重点是通过解决漏洞来提高安全性,并为应用程序创建一个成本可控的存储集群解决方案。用于存储集群的 Oracle 网格基础架构 (OGISC) 代表了该领域的前沿进展。本研究广泛探讨了 OGISC 的理念。解释其核心方法。认识到现有安全机制的弱点,我们提出了加强安全措施的解决方案。我们研究的一个关键方面是整合 Glusterfs,这是一个以线性扩展能力著称的系统。我们深入研究了该解决方案的架构,揭开了其运行的存储扩展过程的神秘面纱。我们的研究不仅限于集成,还开发了专门为 Glusterfs 量身定制的方法和元数据模型,以确保最佳性能和稳健性。我们研究中值得注意的一个方面是 Glusterfs 压缩与 OpenVPN 的应用。这一探索突出了这一整合带来的好处,强调了 OpenVPN 如何增强 Glusterfs 的功能。严谨的分析阶段为我们的研究成果奠定了基础,从而产生了具有前瞻性的解决方案。最后,我们对这一动态领域的未来探索途径进行了研究,以此结束本研究。
{"title":"Enhancing Security in Database Grid Infrastructure for Storage Clusters","authors":"N. W. C. Lasantha, R. Abeysekara, M. W. P. Maduranga","doi":"10.37394/23205.2023.22.27","DOIUrl":"https://doi.org/10.37394/23205.2023.22.27","url":null,"abstract":"This research project primarily focused on improving security by addressing vulnerabilities and creating a cost-scalable storage cluster solution, for applications. The Oracle Grid Infrastructure for Storage Clusters (OGISC) represents cutting-edge advancements in this field. The research extensively explores the philosophy of OGISC. Explains its core methodology. Recognizing the weaknesses of existing security mechanisms, we propose a solution to enhance security measures. A key aspect of our investigation involves integrating Glusterfs, a system known for its ability to scale linearly. We delve into the architecture of the solution demystifying the storage scale-out processes to its operation. Our study goes beyond integration by developing an approach and metadata model specifically tailored for Glusterfs ensuring optimal performance and robustness. One noteworthy aspect of our research is the application of Glusterfs compression with OpenVPN. This exploration highlights the benefits derived from this integration emphasizing how OpenVPN enhances Glusterfs capabilities. Rigorous analysis stages serve as the foundation for our findings resulting in a forward-thinking solution. Finally, we conclude this research with an examination of avenues for future exploration in this dynamic field.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139201681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Examination of AI Algorithms for Image and MRI-based Autism Detection 基于图像和核磁共振成像的自闭症检测人工智能算法研究
Pub Date : 2023-11-30 DOI: 10.37394/23205.2023.22.28
Prasenjit Mukherjee, R. S. Gokul, Manish Godse
Precise identification of autism spectrum disorder (ASD) is a challenging task due to the heterogeneity of ASD. Early diagnosis and interventions have positive effects on treatment and later skills development. Hence, it is necessary to provide families and communities with the resources, training, and tools required to diagnose and help patients. Recent work has shown that artificial intelligence-based methods are suitable for the identification of ASD. AI-based tools can be good resources for parents for early detection of ASD in their kids. Even AI-based advanced tools are helpful for health workers and physicians to detect ASD. Facial images and MRI are the best sources to understand ASD symptoms, hence are input required in AI-based model training. The trained models are used for the classification of ASD patients and normal kids. The deep learning models are found to be very accurate in ASD detection. In this paper, we present a comprehensive study of AI techniques like machine learning, image processing, and deep learning, and their accuracy when these techniques are used on facial and MRI images of ASD and normally developed kids.
由于自闭症谱系障碍(ASD)的异质性,准确识别自闭症谱系障碍是一项具有挑战性的任务。早期诊断和干预对治疗和日后的技能发展具有积极影响。因此,有必要为家庭和社区提供诊断和帮助患者所需的资源、培训和工具。最近的研究表明,基于人工智能的方法适用于识别 ASD。基于人工智能的工具可以成为家长早期发现孩子 ASD 的良好资源。即使是基于人工智能的先进工具,也有助于医务工作者和医生检测 ASD。面部图像和核磁共振成像是了解 ASD 症状的最佳来源,因此也是基于人工智能的模型训练所需的输入。训练好的模型可用于对 ASD 患者和正常儿童进行分类。深度学习模型在 ASD 检测中非常准确。在本文中,我们全面研究了机器学习、图像处理和深度学习等人工智能技术,以及这些技术用于 ASD 和正常发育儿童的面部和 MRI 图像时的准确性。
{"title":"Examination of AI Algorithms for Image and MRI-based Autism Detection","authors":"Prasenjit Mukherjee, R. S. Gokul, Manish Godse","doi":"10.37394/23205.2023.22.28","DOIUrl":"https://doi.org/10.37394/23205.2023.22.28","url":null,"abstract":"Precise identification of autism spectrum disorder (ASD) is a challenging task due to the heterogeneity of ASD. Early diagnosis and interventions have positive effects on treatment and later skills development. Hence, it is necessary to provide families and communities with the resources, training, and tools required to diagnose and help patients. Recent work has shown that artificial intelligence-based methods are suitable for the identification of ASD. AI-based tools can be good resources for parents for early detection of ASD in their kids. Even AI-based advanced tools are helpful for health workers and physicians to detect ASD. Facial images and MRI are the best sources to understand ASD symptoms, hence are input required in AI-based model training. The trained models are used for the classification of ASD patients and normal kids. The deep learning models are found to be very accurate in ASD detection. In this paper, we present a comprehensive study of AI techniques like machine learning, image processing, and deep learning, and their accuracy when these techniques are used on facial and MRI images of ASD and normally developed kids.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139198697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of the Growth of Renewable Energies in the European Union using Time Series Analysis 利用时间序列分析预测欧盟可再生能源的增长情况
Pub Date : 2023-11-20 DOI: 10.37394/23205.2023.22.26
Holger Kraenzle, Maximilian Rampp, Daniel Werner, Jürgen Seitz, Neha Sharma
The whole world is affected by climate change and renewable energy plays an important role in combating climate change. To add to the existing precarious situation, the current political events such as the war in Ukraine mean that fossil raw materials such as oil and gas are becoming more and more expensive in the raw material markets. This paper presents the current state of renewable energies in Germany and Europe. Using data from the past 56 years, the predictive models ARIMA and Prophet are used to find out if the conversion to renewable energies and the elimination of fossil raw materials in the energy sector can be achieved in the EU. The results are compared with the target of the EU in 2030 and a long-term outlook until 2050 will be provided.
全世界都受到气候变化的影响,而可再生能源在应对气候变化方面发挥着重要作用。当前,乌克兰战争等政治事件意味着石油和天然气等化石原材料在原材料市场上的价格越来越高,这对目前岌岌可危的形势雪上加霜。本文介绍了德国和欧洲的可再生能源现状。利用过去 56 年的数据,采用 ARIMA 和 Prophet 预测模型,探讨欧盟能否实现能源部门向可再生能源的转换并淘汰化石原材料。研究结果将与欧盟 2030 年的目标进行比较,并提供直至 2050 年的长期展望。
{"title":"Prediction of the Growth of Renewable Energies in the European Union using Time Series Analysis","authors":"Holger Kraenzle, Maximilian Rampp, Daniel Werner, Jürgen Seitz, Neha Sharma","doi":"10.37394/23205.2023.22.26","DOIUrl":"https://doi.org/10.37394/23205.2023.22.26","url":null,"abstract":"The whole world is affected by climate change and renewable energy plays an important role in combating climate change. To add to the existing precarious situation, the current political events such as the war in Ukraine mean that fossil raw materials such as oil and gas are becoming more and more expensive in the raw material markets. This paper presents the current state of renewable energies in Germany and Europe. Using data from the past 56 years, the predictive models ARIMA and Prophet are used to find out if the conversion to renewable energies and the elimination of fossil raw materials in the energy sector can be achieved in the EU. The results are compared with the target of the EU in 2030 and a long-term outlook until 2050 will be provided.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"27 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodology and Multicriteria Algorithm for Group Decision Support in Classification Problems 分类问题中群体决策支持的方法和多标准算法
Pub Date : 2023-11-20 DOI: 10.37394/23205.2023.22.25
Georgios Rigopoulos
In this work, a Group Decision methodology and algorithm for small collaborating teams is introduced. It is based on a multicriteria algorithm for classification decisions, where aggregation of member preferences is executed at the parameter level. The algorithm applies to relatively well-structured problems guided by a process facilitator. Initially, a set of parameters is proposed by the facilitator to the group and next group members evaluate the proposed parameter set and express their preferences in numeric or linguistic format. Individual preferences are aggregated by appropriate operators, and a set of group parameter values is generated, which is used as input for the classification algorithm. NeXClass multicriteria classification algorithm is used for the classification of alternatives, initially at a training set of alternatives and later at the entire set. Finally, group members evaluate results, and consensus, as well as satisfaction metrics, are calculated. In case of a low acceptance level, problem parameters are reviewed by the facilitator, and the aggregation phase is repeated. The methodology is a valid approach for group decision problems and can be utilized in numerous business environments. The algorithm can be also utilized by software agents in multiagent environments for automated decision-making, given the large volume of agent-based decision-making in various settings today.
在这项工作中,介绍了一种适用于小型协作团队的小组决策方法和算法。它以分类决策的多标准算法为基础,在参数层面对成员的偏好进行汇总。该算法适用于由流程促进者指导的结构相对完善的问题。最初,主持人向小组提出一组参数,接下来小组成员对提出的参数集进行评估,并以数字或语言形式表达他们的偏好。通过适当的运算符对个人偏好进行汇总,生成一组小组参数值,并将其作为分类算法的输入。NeXClass 多标准分类算法用于对备选方案进行分类,最初是对一组训练备选方案进行分类,随后对整组备选方案进行分类。最后,小组成员对结果进行评估,并计算出共识和满意度指标。如果接受度较低,则由主持人对问题参数进行审查,并重复汇总阶段。该方法是处理群体决策问题的有效方法,可用于多种商业环境。鉴于目前在各种环境中大量使用基于代理的决策,该算法也可被多代理环境中的软件代理用于自动决策。
{"title":"Methodology and Multicriteria Algorithm for Group Decision Support in Classification Problems","authors":"Georgios Rigopoulos","doi":"10.37394/23205.2023.22.25","DOIUrl":"https://doi.org/10.37394/23205.2023.22.25","url":null,"abstract":"In this work, a Group Decision methodology and algorithm for small collaborating teams is introduced. It is based on a multicriteria algorithm for classification decisions, where aggregation of member preferences is executed at the parameter level. The algorithm applies to relatively well-structured problems guided by a process facilitator. Initially, a set of parameters is proposed by the facilitator to the group and next group members evaluate the proposed parameter set and express their preferences in numeric or linguistic format. Individual preferences are aggregated by appropriate operators, and a set of group parameter values is generated, which is used as input for the classification algorithm. NeXClass multicriteria classification algorithm is used for the classification of alternatives, initially at a training set of alternatives and later at the entire set. Finally, group members evaluate results, and consensus, as well as satisfaction metrics, are calculated. In case of a low acceptance level, problem parameters are reviewed by the facilitator, and the aggregation phase is repeated. The methodology is a valid approach for group decision problems and can be utilized in numerous business environments. The algorithm can be also utilized by software agents in multiagent environments for automated decision-making, given the large volume of agent-based decision-making in various settings today.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"25 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139255047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Penetration Testing for the Cloud-Based Web Application 基于云的Web应用的渗透测试
Pub Date : 2023-08-29 DOI: 10.37394/23205.2023.22.13
R. Al-Khannak, Sajjan Singh Nehal
This paper discusses methods, tools, approaches, and techniques used for the penetration testing on the cloud-based web application on Amazon AWS platform. The findings of a penetration test could be used to fix weaknesses and vulnerabilities, and significantly improve security. The testing is implemented by undertaking a malicious attack aiming to breach system networks and thereby confirm the presence of cloud infrastructure. The research focuses on cloud-based web applications' high-risk vulnerabilities such as unrestricted file upload, command injection, and cross-site scripting. The outcomes expose and approved some vulnerabilities, flaws, and mistakes in the utilised cloud based web application. It is concluded that some vulnerabilities haveto be considered before architecting the cloud system. Recommendations are proposing solutions to testing results.
本文讨论了在Amazon AWS平台上对基于云的web应用程序进行渗透测试所使用的方法、工具、方法和技术。渗透测试的结果可用于修复弱点和漏洞,并显著提高安全性。测试是通过进行恶意攻击来实现的,目的是破坏系统网络,从而确认云基础设施的存在。该研究的重点是基于云的web应用程序的高风险漏洞,如无限制的文件上传、命令注入和跨站点脚本。结果暴露并认可了所使用的基于云的web应用程序中的一些漏洞、缺陷和错误。结论是,在构建云系统之前必须考虑一些漏洞。建议是针对测试结果提出解决办法。
{"title":"Penetration Testing for the Cloud-Based Web Application","authors":"R. Al-Khannak, Sajjan Singh Nehal","doi":"10.37394/23205.2023.22.13","DOIUrl":"https://doi.org/10.37394/23205.2023.22.13","url":null,"abstract":"This paper discusses methods, tools, approaches, and techniques used for the penetration testing on the cloud-based web application on Amazon AWS platform. The findings of a penetration test could be used to fix weaknesses and vulnerabilities, and significantly improve security. The testing is implemented by undertaking a malicious attack aiming to breach system networks and thereby confirm the presence of cloud infrastructure. The research focuses on cloud-based web applications' high-risk vulnerabilities such as unrestricted file upload, command injection, and cross-site scripting. The outcomes expose and approved some vulnerabilities, flaws, and mistakes in the utilised cloud based web application. It is concluded that some vulnerabilities haveto be considered before architecting the cloud system. Recommendations are proposing solutions to testing results.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bearing Fault Diagnosis of WDCNN-LSTM in Siamese Network Siamese网络中WDCNN-LSTM轴承故障诊断
Pub Date : 2023-08-03 DOI: 10.37394/23205.2023.22.10
Daehwan Lee, J. Jeong, Chaegyu Lee, Hakjun Moon, Jaeuk Lee, Dongyoung Lee
In this paper, a Siamese network-based WDCNN + LSTM model was used to diagnose bearing faults using a few shot learning algorithm. Recently, deep learning-based fault diagnosis methods have achieved good results in equipment fault diagnosis. However, there are still limitations in the existing research. The biggest problem is that a large number of training samples are required to train a deep learning model. However, manufacturing sites are complex, and it is not easy to intentionally create equipment defects. Furthermore, it is impossible to obtain enough training samples for all failure types under all working conditions. Therefore, in this study, we propose a few-shot learning algorithm that can effectively learn with limited data. A Few shot learning algorithm and Siamese network based WDCNN + LSTM model bearing fault diagnosis, which can effectively learn with limited data, is proposed in this study.
本文采用基于Siamese网络的WDCNN + LSTM模型,采用少量学习算法进行轴承故障诊断。近年来,基于深度学习的故障诊断方法在设备故障诊断中取得了较好的效果。然而,现有的研究仍然存在局限性。最大的问题是需要大量的训练样本来训练深度学习模型。然而,制造场所是复杂的,故意制造设备缺陷并不容易。此外,不可能在所有工况下获得足够的所有故障类型的训练样本。因此,在本研究中,我们提出了一种能够在有限数据下有效学习的few-shot学习算法。本文提出了基于Siamese网络的WDCNN + LSTM模型轴承故障诊断算法,该算法能在有限数据下进行有效的学习。
{"title":"Bearing Fault Diagnosis of WDCNN-LSTM in Siamese Network","authors":"Daehwan Lee, J. Jeong, Chaegyu Lee, Hakjun Moon, Jaeuk Lee, Dongyoung Lee","doi":"10.37394/23205.2023.22.10","DOIUrl":"https://doi.org/10.37394/23205.2023.22.10","url":null,"abstract":"In this paper, a Siamese network-based WDCNN + LSTM model was used to diagnose bearing faults using a few shot learning algorithm. Recently, deep learning-based fault diagnosis methods have achieved good results in equipment fault diagnosis. However, there are still limitations in the existing research. The biggest problem is that a large number of training samples are required to train a deep learning model. However, manufacturing sites are complex, and it is not easy to intentionally create equipment defects. Furthermore, it is impossible to obtain enough training samples for all failure types under all working conditions. Therefore, in this study, we propose a few-shot learning algorithm that can effectively learn with limited data. A Few shot learning algorithm and Siamese network based WDCNN + LSTM model bearing fault diagnosis, which can effectively learn with limited data, is proposed in this study.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"2012 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114040402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trilattice-Based Access Control Models: How to Secure Current Computer Network Mikhail 基于三重栅格的访问控制模型:如何保证当前计算机网络的安全
Pub Date : 2023-08-03 DOI: 10.37394/23205.2023.22.12
M. Kucherov, N. Bogulskaya
Designing security, from the hardware level, is essential to ensure the integrity of the intelligent cyberphysical infrastructure that is the Industrial Internet of Things (IIoT). If intelligent cyber-physical infrastructure fails to do the right things because it is insecure and vulnerable, then there will be negative social consequences [1]. Security is, in a sense, the access control to IIoT systems, which increasingly relies on the ability to compose different policies. Therefore, the advantage in any framework for compiling policies is that it is intuitive, formal, expressive, application-independent, as well as expandable to create domain-specific instances. Recently, such a scheme was proposed based on Belnap logic FOUR2 [2]. Four values of the Belnap bilattice have been interpreted as grant, deny, conflict, or unspecified with respect to access-control policy. Belnap's four-valued logic has found a variety of applications in various fields, such as deductive database theory, distributed logic programming, and other areas. However, it turns out that the truth order in FOUR2 is a truth-and-falsity order at the same time [3]. The smallest lattice, where the orders of truth and falsity are independent of each other, which is especially important for security policy, is that of Shramko-Wansing’s SIXTEEN3. This generalization is well-motivated and leads from the bilattice FOUR2 with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN3 with an information ordering together with a truth ordering and a (distinct) falsity ordering. Based on SIXTEEN3 and new Boolean predicates to control access [4], we define an expressive access-control policy language, having composition statements based on the statements of Schramko-Wansing’s logic. Natural orderings on politics are obtained by independent lifting the orders of truth and falsity of trilattice, which results in a query language in which conflict freedom analysis can be developed. The reduction of formal verification of queries to that on predicates over access requests enables to carry out policy analysis. We evaluate our approach through examples of control access model policy.
从硬件层面设计安全性对于确保工业物联网(IIoT)的智能网络物理基础设施的完整性至关重要。如果智能网络物理基础设施因为不安全和脆弱而不能做正确的事情,那么将会产生负面的社会后果。从某种意义上说,安全性是对IIoT系统的访问控制,它越来越依赖于组合不同策略的能力。因此,任何用于编译策略的框架的优势在于它是直观的、形式化的、表达性的、与应用程序无关的,并且可以扩展以创建特定于域的实例。最近,基于Belnap逻辑four2[2]提出了这种方案。关于访问控制策略,Belnap双边协议的四个值被解释为授予、拒绝、冲突或未指定。贝尔纳普的四值逻辑已经在各个领域得到了广泛的应用,例如演绎数据库理论、分布式逻辑编程等领域。然而,事实证明,在FOUR2的真理顺序是一个真理和谬误的顺序在同一时间b[3]。最小的格是Shramko-Wansing的SIXTEEN3,其中真假的顺序彼此独立,这对安全策略特别重要。这种推广是有良好动机的,并且从具有信息和真假排序的双格FOUR2引导到另一个代数结构,即具有信息排序、真排序和(不同)假排序的三格SIXTEEN3。基于SIXTEEN3和新的布尔谓词来控制访问[4],我们定义了一种表达性的访问控制策略语言,该语言具有基于Schramko-Wansing逻辑语句的组合语句。通过独立提升三格的真假顺序,得到政治上的自然排序,从而形成一种可以发展冲突自由分析的查询语言。将查询的正式验证简化为访问请求上的谓词验证,从而可以执行策略分析。我们通过控制访问模型策略的示例来评估我们的方法。
{"title":"Trilattice-Based Access Control Models: How to Secure Current Computer Network Mikhail","authors":"M. Kucherov, N. Bogulskaya","doi":"10.37394/23205.2023.22.12","DOIUrl":"https://doi.org/10.37394/23205.2023.22.12","url":null,"abstract":"Designing security, from the hardware level, is essential to ensure the integrity of the intelligent cyberphysical infrastructure that is the Industrial Internet of Things (IIoT). If intelligent cyber-physical infrastructure fails to do the right things because it is insecure and vulnerable, then there will be negative social consequences [1]. Security is, in a sense, the access control to IIoT systems, which increasingly relies on the ability to compose different policies. Therefore, the advantage in any framework for compiling policies is that it is intuitive, formal, expressive, application-independent, as well as expandable to create domain-specific instances. Recently, such a scheme was proposed based on Belnap logic FOUR2 [2]. Four values of the Belnap bilattice have been interpreted as grant, deny, conflict, or unspecified with respect to access-control policy. Belnap's four-valued logic has found a variety of applications in various fields, such as deductive database theory, distributed logic programming, and other areas. However, it turns out that the truth order in FOUR2 is a truth-and-falsity order at the same time [3]. The smallest lattice, where the orders of truth and falsity are independent of each other, which is especially important for security policy, is that of Shramko-Wansing’s SIXTEEN3. This generalization is well-motivated and leads from the bilattice FOUR2 with an information and a truth-and-falsity ordering to another algebraic structure, namely the trilattice SIXTEEN3 with an information ordering together with a truth ordering and a (distinct) falsity ordering. Based on SIXTEEN3 and new Boolean predicates to control access [4], we define an expressive access-control policy language, having composition statements based on the statements of Schramko-Wansing’s logic. Natural orderings on politics are obtained by independent lifting the orders of truth and falsity of trilattice, which results in a query language in which conflict freedom analysis can be developed. The reduction of formal verification of queries to that on predicates over access requests enables to carry out policy analysis. We evaluate our approach through examples of control access model policy.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116321663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
WSEAS TRANSACTIONS ON COMPUTERS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1