首页 > 最新文献

WSEAS TRANSACTIONS ON COMPUTERS最新文献

英文 中文
An Intuitionistic Fuzzy Decision Aid for Neuromarketing Technology Selection Problem 神经营销技术选择问题的直觉模糊决策辅助
Pub Date : 2023-07-05 DOI: 10.37394/23205.2023.22.8
Nazli Goker, M. Dursun
Neuromarketing, which uses neuroimaging technologies for marketing initiatives, is represented as the application of neuroscientific methods for analysing and understanding consumer behaviour with regard to marketing objectives. Medical diagnostic devices for brain imaging are used by marketers as neuromarketing technologies. In this study, the intuitionistic fuzzy COPRAS method, which aims to obtain a solution relative to the ideal solution, is used to rank neuromarketing technology alternatives and identify the best-performing one among them. Intuitionistic fuzzy sets are used to deal with the loss of information and hesitation in data that may occur in operations with fuzzy numbers. The application of the proposed intuitionistic fuzzy decision-making approach is illustrated by conducting a case study
神经营销利用神经成像技术进行营销活动,表现为应用神经科学方法分析和理解与营销目标相关的消费者行为。脑成像的医疗诊断设备被营销人员用作神经营销技术。本研究采用直觉模糊COPRAS方法对神经营销技术方案进行排序,并从中识别出表现最佳的方案,其目的是获得相对于理想方案的解决方案。直觉模糊集用于处理模糊数运算中可能出现的信息丢失和数据犹豫等问题。通过一个案例分析,说明了所提出的直觉模糊决策方法的应用
{"title":"An Intuitionistic Fuzzy Decision Aid for Neuromarketing Technology Selection Problem","authors":"Nazli Goker, M. Dursun","doi":"10.37394/23205.2023.22.8","DOIUrl":"https://doi.org/10.37394/23205.2023.22.8","url":null,"abstract":"Neuromarketing, which uses neuroimaging technologies for marketing initiatives, is represented as the application of neuroscientific methods for analysing and understanding consumer behaviour with regard to marketing objectives. Medical diagnostic devices for brain imaging are used by marketers as neuromarketing technologies. In this study, the intuitionistic fuzzy COPRAS method, which aims to obtain a solution relative to the ideal solution, is used to rank neuromarketing technology alternatives and identify the best-performing one among them. Intuitionistic fuzzy sets are used to deal with the loss of information and hesitation in data that may occur in operations with fuzzy numbers. The application of the proposed intuitionistic fuzzy decision-making approach is illustrated by conducting a case study","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scalable Flow based Management Scheme in Software Define Network (SDN) using sFlow 基于sFlow的SDN (Software Define Network)可扩展流管理方案
Pub Date : 2023-06-22 DOI: 10.37394/23205.2023.22.7
Adeniji Oluwashola David, O. Omotosho
The threats to information privacy while connected to cyber space are capacious and complex which require resilient network and antifragile security mechanisms. Software Define Network (SDN) infrastructure itself is predisposed to severe threats that may damage the provision of its usability as a security provider. The essential qualities of (SDN) are to provide support for high bandwidth and timely content delivery. SDN granular approach to security by centralizing the security control into one entity using the controller to ensure service control and information protection. SDN provides a new paradigm for applications to interact with the network. This interaction with declarative abstraction will instruct the Application Programming Interface (APIs) to direct the configuration and operation of the network. The API is queried to ask the network for information in order to plan and optimize the network operations. In this study, the vulnerability exploited by attackers to perform distributed denial of service (DDoS) attacks is examined. The trust between the control planes and forwarding planes is crucial in SDN. The separation of the control and data planes contributes to open security challenges such as denial of service (DoS) attacks, man-in-the-middle attacks, and network saturation attacks. The platform runs on Mininet 2.2.2, Ubuntu 18.04, Ryu Controller 4.34, and Sflow-RT. The Classification learning is based on Support Vector Machine (SVM). The contribution is to provide monitoring application of Flow RT Status and SFlow RT Packet Monitoring during Normal Traffic Generation. The implication for the monitoring application of SFlow RT Status is to supervise the failure in the status of sFlowAgent, sFlow Byte, and sFlow packet against cyber-attack.
网络空间对信息隐私的威胁是巨大而复杂的,需要有弹性的网络和反脆弱的安全机制。软件定义网络(SDN)基础设施本身容易受到严重的威胁,这些威胁可能会损害其作为安全提供商的可用性。SDN的基本特性是支持高带宽和及时的内容传输。SDN采用细粒度的安全方法,通过将安全控制集中到一个实体中,使用控制器来确保业务控制和信息保护。SDN为应用程序与网络交互提供了一种新的范例。这种与声明性抽象的交互将指示应用程序编程接口(api)指导网络的配置和操作。查询API是为了向网络请求信息,以便规划和优化网络操作。在本研究中,攻击者利用漏洞执行分布式拒绝服务(DDoS)攻击进行了检查。在SDN中,控制平面和转发平面之间的信任是至关重要的。控制平面和数据平面的分离导致了DoS (denial of service)攻击、中间人攻击和网络饱和攻击等开放式安全挑战。该平台运行在Mininet 2.2.2、Ubuntu 18.04、Ryu Controller 4.34和Sflow-RT上。分类学习基于支持向量机(SVM)。贡献是在正常流量生成过程中提供流量RT状态和SFlow RT包监控的监控应用。SFlow RT Status监控应用的含义是监控sFlowAgent、SFlow Byte、SFlow packet状态的失效,防止网络攻击。
{"title":"Scalable Flow based Management Scheme in Software Define Network (SDN) using sFlow","authors":"Adeniji Oluwashola David, O. Omotosho","doi":"10.37394/23205.2023.22.7","DOIUrl":"https://doi.org/10.37394/23205.2023.22.7","url":null,"abstract":"The threats to information privacy while connected to cyber space are capacious and complex which require resilient network and antifragile security mechanisms. Software Define Network (SDN) infrastructure itself is predisposed to severe threats that may damage the provision of its usability as a security provider. The essential qualities of (SDN) are to provide support for high bandwidth and timely content delivery. SDN granular approach to security by centralizing the security control into one entity using the controller to ensure service control and information protection. SDN provides a new paradigm for applications to interact with the network. This interaction with declarative abstraction will instruct the Application Programming Interface (APIs) to direct the configuration and operation of the network. The API is queried to ask the network for information in order to plan and optimize the network operations. In this study, the vulnerability exploited by attackers to perform distributed denial of service (DDoS) attacks is examined. The trust between the control planes and forwarding planes is crucial in SDN. The separation of the control and data planes contributes to open security challenges such as denial of service (DoS) attacks, man-in-the-middle attacks, and network saturation attacks. The platform runs on Mininet 2.2.2, Ubuntu 18.04, Ryu Controller 4.34, and Sflow-RT. The Classification learning is based on Support Vector Machine (SVM). The contribution is to provide monitoring application of Flow RT Status and SFlow RT Packet Monitoring during Normal Traffic Generation. The implication for the monitoring application of SFlow RT Status is to supervise the failure in the status of sFlowAgent, sFlow Byte, and sFlow packet against cyber-attack.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aspects Regarding Knowledge-based Engineering 关于知识工程的几个方面
Pub Date : 2023-03-22 DOI: 10.37394/23205.2023.22.6
D. Ghelase, L. Daschievici
Knowledge management (KM) has become an effective way of managing organization’s intellectual capital or, in other words, organization’s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.
知识管理(KM)已经成为管理组织智力资本的一种有效方式,换句话说,就是管理组织与未来更有效绩效相关的全部经验、技能和知识。本文提出了一种知识管理方法来实现加工系统的竞争控制。然后试图说明知识管理在工程中的应用。该模型可为管理者选择竞争订单提供参考。
{"title":"Aspects Regarding Knowledge-based Engineering","authors":"D. Ghelase, L. Daschievici","doi":"10.37394/23205.2023.22.6","DOIUrl":"https://doi.org/10.37394/23205.2023.22.6","url":null,"abstract":"Knowledge management (KM) has become an effective way of managing organization’s intellectual capital or, in other words, organization’s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conceptual Bases of Gray Transformations and Discrete Vilenkin-Crestenson Functions Systems 灰色变换与离散Vilenkin-Crestenson函数系统的概念基础
Pub Date : 2023-03-07 DOI: 10.37394/23205.2023.22.5
A. Beletsky
The article is devoted to the theoretical foundations of the construction of generalized Gray codes. These include the classical "left-side" and the proposed "right-side" Gray's codes. Left-side codes develop from left to right and right-side codes from right to left. Left- and right-handed Gray's codes augmented with reverse permutation operators form a subset of composite Gray's codes. Such codes have found constructive application in solving synthesis and analysis problems of discrete systems of Vilenkin-Crestenson functions (VCF). Particular cases of VCF systems are systems of discrete exponential functions and Walsh functions. The so-called indicator matrices (IM), bijective connected to the VCF systems, form the basis for VCF systems synthesis. The order of IMs is determined by the logarithmic dependence on the order of the VCF system. Unique Walsh-Cooley function systems, the only ones in the set of Walsh function systems that provide linear connectivity of the frequency scales of DFT processors, are developed. Examples of trees of VCF systems give. The orders of IMs are related by logarithmic dependence with the orders of VCF systems. Using IM: (1) estimates of the number of symmetric VCF systems in an unbounded range of changes of their parameters are obtained, (2) structures are determined and (3) rules of the interconnection of the systems established. The fundamental axioms and lemmas corresponding to the VCF systems formulating and directions for further research are outlined.
本文研究了广义格雷码的理论基础。这些包括经典的“左侧”和提议的“右侧”格雷密码。左侧代码从左向右发展,右侧代码从右向左发展。加反向置换算子的左、右手格雷码构成了复合格雷码的子集。这些代码在求解离散维伦金-克列斯坦森函数(VCF)系统的综合和分析问题中得到了建设性的应用。VCF系统的特殊情况是离散指数函数系统和沃尔什函数系统。所谓的指标矩阵(IM),双射连接到VCF系统,构成了VCF系统综合的基础。IMs的阶数由VCF系统阶数的对数依赖性决定。独特的沃尔什-库利函数系统,唯一的沃尔什函数系统的集合,提供线性连通性的DFT处理器的频率尺度,被开发。给出了VCF系统树的例子。IMs的阶数与VCF系统的阶数呈对数依赖关系。利用IM:(1)获得了对称VCF系统在其参数无界变化范围内的数量估计,(2)确定了系统的结构,(3)建立了系统的互连规则。给出了VCF系统形成的基本公理和引理以及进一步研究的方向。
{"title":"Conceptual Bases of Gray Transformations and Discrete Vilenkin-Crestenson Functions Systems","authors":"A. Beletsky","doi":"10.37394/23205.2023.22.5","DOIUrl":"https://doi.org/10.37394/23205.2023.22.5","url":null,"abstract":"The article is devoted to the theoretical foundations of the construction of generalized Gray codes. These include the classical \"left-side\" and the proposed \"right-side\" Gray's codes. Left-side codes develop from left to right and right-side codes from right to left. Left- and right-handed Gray's codes augmented with reverse permutation operators form a subset of composite Gray's codes. Such codes have found constructive application in solving synthesis and analysis problems of discrete systems of Vilenkin-Crestenson functions (VCF). Particular cases of VCF systems are systems of discrete exponential functions and Walsh functions. The so-called indicator matrices (IM), bijective connected to the VCF systems, form the basis for VCF systems synthesis. The order of IMs is determined by the logarithmic dependence on the order of the VCF system. Unique Walsh-Cooley function systems, the only ones in the set of Walsh function systems that provide linear connectivity of the frequency scales of DFT processors, are developed. Examples of trees of VCF systems give. The orders of IMs are related by logarithmic dependence with the orders of VCF systems. Using IM: (1) estimates of the number of symmetric VCF systems in an unbounded range of changes of their parameters are obtained, (2) structures are determined and (3) rules of the interconnection of the systems established. The fundamental axioms and lemmas corresponding to the VCF systems formulating and directions for further research are outlined.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Framework for Posture and Face Recognition Using Kinect an Ambient-intelligence Method 基于环境智能方法的Kinect姿态和人脸识别框架
Pub Date : 2023-02-22 DOI: 10.37394/23205.2023.22.4
L. Vladutu, Cosmin Marian
This electronic document describes one of the first full open-source frameworks for posture and face detection and classification using Kinect sensors, based entirely on an open-sourced software platform. It has been designed with the possibility of automatic monitoring of either an elderly person who is situated in a closed space (a room with furniture, appliances, and other rigid objects), or a patient who suffers from a physiological disorder. It is also based on an original hardware platform (the AmI-Platform), which includes more Kinect sensors, data acquisition stations, and crunches (data servers). The articles tackle two of the most important issues for ambient intelligence: accurate determination of the person and his or her facial landmarks (to understand emotions) and fast and reliable posture determination (to take appropriate measures in case of an accident).
这个电子文档描述了使用Kinect传感器的姿势和面部检测和分类的第一个完全开源框架之一,完全基于开源软件平台。它被设计成可以自动监测一个处于封闭空间(一个有家具、电器和其他刚性物体的房间)的老人,或患有生理障碍的病人。它还基于一个原始的硬件平台(ami平台),其中包括更多的Kinect传感器,数据采集站和数据服务器。这些文章解决了环境智能的两个最重要的问题:准确地确定人和他或她的面部特征(以理解情绪),快速可靠地确定姿势(在发生事故时采取适当的措施)。
{"title":"Framework for Posture and Face Recognition Using Kinect an Ambient-intelligence Method","authors":"L. Vladutu, Cosmin Marian","doi":"10.37394/23205.2023.22.4","DOIUrl":"https://doi.org/10.37394/23205.2023.22.4","url":null,"abstract":"This electronic document describes one of the first full open-source frameworks for posture and face detection and classification using Kinect sensors, based entirely on an open-sourced software platform. It has been designed with the possibility of automatic monitoring of either an elderly person who is situated in a closed space (a room with furniture, appliances, and other rigid objects), or a patient who suffers from a physiological disorder. It is also based on an original hardware platform (the AmI-Platform), which includes more Kinect sensors, data acquisition stations, and crunches (data servers). The articles tackle two of the most important issues for ambient intelligence: accurate determination of the person and his or her facial landmarks (to understand emotions) and fast and reliable posture determination (to take appropriate measures in case of an accident).","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposed Artificial Intelligence Algorithm for Development of Higher Education 面向高等教育发展的人工智能算法
Pub Date : 2023-01-19 DOI: 10.37394/23205.2023.22.2
Amin H. Al Ka’bi
Higher education has delved into a new stage of rapid development focusing on quality improvement, while encountering new challenges and obstacles. In this research work, an artificial intelligence algorithm for education improvement is proposed. Firstly, deep feature abstraction in temporal and special dimensions is performed using Long Short-Term Memory (LSTM) artificial neural network and convolutional networks. Consequently, multiscale attention fusion techniques are used to improve the articulateness of the characteristics and come up with better recommendations with the assistance of multilayer perceptron. Moreover, the proposed model helps in improving the cognitive capability of students and enhances their overall quality of perception. Moreover, it has been proven that the performance of the proposed model provides better recommendation outcomes and better robustness compared to existing models through conducting extensive experiments based on real data.
高等教育进入了以提高质量为核心的快速发展的新阶段,同时也面临着新的挑战和障碍。在本研究中,提出了一种用于教育改进的人工智能算法。首先,利用长短期记忆(LSTM)人工神经网络和卷积网络对时间维和特殊维进行深度特征提取;因此,在多层感知器的帮助下,采用多尺度注意力融合技术来提高特征的清晰性,并提出更好的推荐。此外,该模型有助于提高学生的认知能力,提高学生的整体感知素质。此外,通过基于真实数据的大量实验证明,与现有模型相比,本文提出的模型提供了更好的推荐结果和更好的鲁棒性。
{"title":"A Proposed Artificial Intelligence Algorithm for Development of Higher Education","authors":"Amin H. Al Ka’bi","doi":"10.37394/23205.2023.22.2","DOIUrl":"https://doi.org/10.37394/23205.2023.22.2","url":null,"abstract":"Higher education has delved into a new stage of rapid development focusing on quality improvement, while encountering new challenges and obstacles. In this research work, an artificial intelligence algorithm for education improvement is proposed. Firstly, deep feature abstraction in temporal and special dimensions is performed using Long Short-Term Memory (LSTM) artificial neural network and convolutional networks. Consequently, multiscale attention fusion techniques are used to improve the articulateness of the characteristics and come up with better recommendations with the assistance of multilayer perceptron. Moreover, the proposed model helps in improving the cognitive capability of students and enhances their overall quality of perception. Moreover, it has been proven that the performance of the proposed model provides better recommendation outcomes and better robustness compared to existing models through conducting extensive experiments based on real data.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Understand Phishing 如何了解网络钓鱼
Pub Date : 2023-01-09 DOI: 10.37394/23205.2023.22.1
Ladislav Burita
The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.
本文在前人研究成果的基础上,重点对网络钓鱼邮件进行了分析和分类,并记录了与网络钓鱼攻击者沟通的结果。在文章的第一部分中,随机选取了一组邮件进行实验,证实了使用文本分析软件进行基于关键词的自动分类的正确结果存在相当大的不确定性。文章的第二部分包含了与网络钓鱼攻击者通信的实验。给出了一个典型的消息交换场景。由于安全防护规则设置正确,没有发生安全事故。文献检索证实了在网络钓鱼领域出版的巨大兴趣。与已发表文章的内容相比,它的焦点完全是原创的。
{"title":"How to Understand Phishing","authors":"Ladislav Burita","doi":"10.37394/23205.2023.22.1","DOIUrl":"https://doi.org/10.37394/23205.2023.22.1","url":null,"abstract":"The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threats Targeting Children on Online Social Networks 在线社交网络上针对儿童的威胁
Pub Date : 2022-12-31 DOI: 10.37394/23205.2023.22.3
Aleksandar Karadimce, Marija Bukalevska
Today, practically everyone has access to the internet and owns some type of digital gadgets, such as a smartphone, laptop, tablet, etc. We live in a digital world where internet use is widespread. Nowadays, a growing number of children have access to the internet via portable electronic devices such as tablets, laptops, and gaming consoles. Online social networks (OSN) have become increasingly popular and are now widely used along with the rise of the internet. A large percentage of children worldwide have profiles on at least one online social networking site. Children register on these platforms so they can communicate with their peers, make new friends, share their interests and hobbies in the hopes of meeting someone who has similar ones, play games, and more. But in addition to the benefits and enjoyment that kids derive from social networks, there are also risks and dangers that specifically target children on OSN platforms. Online harassment, online predators, sexual solicitation, cyberbullying, and cyber grooming are all threats that target children on OSNs. This paper aims to bring awareness to parents and children about the potential dangers present on online social networking platforms and offers guidelines on how to better protect children in the social networking environment.
今天,几乎每个人都可以访问互联网,并拥有某种类型的数字设备,如智能手机,笔记本电脑,平板电脑等。我们生活在一个互联网广泛使用的数字世界。如今,越来越多的孩子可以通过平板电脑、笔记本电脑和游戏机等便携式电子设备上网。随着互联网的兴起,在线社交网络(Online social networks, OSN)越来越受欢迎并得到广泛应用。全世界有很大比例的儿童在至少一个在线社交网站上拥有个人资料。孩子们在这些平台上注册,这样他们就可以与同龄人交流,结交新朋友,分享他们的兴趣和爱好,希望能遇到与他们有相似爱好的人,玩游戏等等。但是,除了孩子们从社交网络中获得的好处和乐趣之外,还存在专门针对OSN平台上的儿童的风险和危险。网络骚扰、网络掠夺者、性引诱、网络欺凌和网络诱骗都是针对osn上儿童的威胁。本文旨在提高家长和儿童对在线社交网络平台上存在的潜在危险的认识,并就如何在社交网络环境中更好地保护儿童提供指导。
{"title":"Threats Targeting Children on Online Social Networks","authors":"Aleksandar Karadimce, Marija Bukalevska","doi":"10.37394/23205.2023.22.3","DOIUrl":"https://doi.org/10.37394/23205.2023.22.3","url":null,"abstract":"Today, practically everyone has access to the internet and owns some type of digital gadgets, such as a smartphone, laptop, tablet, etc. We live in a digital world where internet use is widespread. Nowadays, a growing number of children have access to the internet via portable electronic devices such as tablets, laptops, and gaming consoles. Online social networks (OSN) have become increasingly popular and are now widely used along with the rise of the internet. A large percentage of children worldwide have profiles on at least one online social networking site. Children register on these platforms so they can communicate with their peers, make new friends, share their interests and hobbies in the hopes of meeting someone who has similar ones, play games, and more. But in addition to the benefits and enjoyment that kids derive from social networks, there are also risks and dangers that specifically target children on OSN platforms. Online harassment, online predators, sexual solicitation, cyberbullying, and cyber grooming are all threats that target children on OSNs. This paper aims to bring awareness to parents and children about the potential dangers present on online social networking platforms and offers guidelines on how to better protect children in the social networking environment.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Transformation Projects-Cloud Transformation Concept Holistic Security Integration (CTC-HSI) 企业转型项目-云转型概念整体安全集成(CTC-HSI)
Pub Date : 2022-12-30 DOI: 10.37394/23205.2022.21.41
A. Trad
This chapter presents the fundaments of the Cloud Transformation Concept (CTC) and this concept is a basic component of the author’s transformation framework and in complex transformation projects, where a holistic security concept is a top priority. The implementation of CTC’s Holistic Security Integration (CTCHSI) is supported by the author’s Applied Holistic Mathematical Model (AHMM) for CTC (AHMM4CTC) and his various research works on Holistic Security Integration (HSI), Business Process Management (BPM), Artificial Intelligence (AI), AI Services (AIS), Compute Services (CS), Mathematical Models, cross-functional transformations projects. The AHMM4CTC is based on cross-functional research on an authentic and proprietary mixed research method supported by his own version of an AI learning model, a search tree, combined with an internal heuristic algorithm. In this chapter, the focus is on CTC-HSI’s integration concepts, requirements, services, data management, and corresponding transformation security strategies. The proposed AHMM4CTC-based CTC-HSI is a concept for secured environments, which use real-life cases of a transformation project, which needs scalable and secured Cloud Platform’s (CP) infrastructure and services layer, that are supported by the alignment of CP services, standards, enterprise architecture paradigm, and security development strategies. In a CP-based transformation project, the author recommends integrating a Private CP (PCP); which can use commercial CPs like the Google CP (GCP). The GCP was chosen as a sample CP, but there is a need to define a standardized security architecture and concept/procedures so that the organization builds its own CTC-HSI-based PCP and has to avoid locked-in commercial products.
本章介绍了云转换概念(CTC)的基础,该概念是作者转换框架的基本组成部分,在复杂的转换项目中,整体安全概念是重中之重。CTC整体安全集成(CTCHSI)的实现由作者的CTC应用整体数学模型(AHMM) (AHMM4CTC)以及他在整体安全集成(HSI),业务流程管理(BPM),人工智能(AI),人工智能服务(AIS),计算服务(CS),数学模型,跨职能转换项目方面的各种研究工作提供支持。AHMM4CTC是基于一种真实的、专有的混合研究方法的跨职能研究,由他自己版本的人工智能学习模型、搜索树和内部启发式算法相结合来支持。在本章中,重点是CTC-HSI的集成概念、需求、服务、数据管理和相应的转换安全策略。拟议的基于ahmm4ctc的CTC-HSI是安全环境的概念,它使用转换项目的实际案例,需要可扩展和安全的云平台(CP)基础设施和服务层,这些基础设施和服务层由CP服务、标准、企业架构范例和安全开发策略的一致性提供支持。在基于CP的转换项目中,作者建议集成私有CP (PCP);它可以使用商业CP,如谷歌CP (GCP)。GCP被选为示例CP,但是需要定义一个标准化的安全体系结构和概念/过程,以便组织构建自己的基于ctc - hsi的PCP,并且必须避免锁定的商业产品。
{"title":"Enterprise Transformation Projects-Cloud Transformation Concept Holistic Security Integration (CTC-HSI)","authors":"A. Trad","doi":"10.37394/23205.2022.21.41","DOIUrl":"https://doi.org/10.37394/23205.2022.21.41","url":null,"abstract":"This chapter presents the fundaments of the Cloud Transformation Concept (CTC) and this concept is a basic component of the author’s transformation framework and in complex transformation projects, where a holistic security concept is a top priority. The implementation of CTC’s Holistic Security Integration (CTCHSI) is supported by the author’s Applied Holistic Mathematical Model (AHMM) for CTC (AHMM4CTC) and his various research works on Holistic Security Integration (HSI), Business Process Management (BPM), Artificial Intelligence (AI), AI Services (AIS), Compute Services (CS), Mathematical Models, cross-functional transformations projects. The AHMM4CTC is based on cross-functional research on an authentic and proprietary mixed research method supported by his own version of an AI learning model, a search tree, combined with an internal heuristic algorithm. In this chapter, the focus is on CTC-HSI’s integration concepts, requirements, services, data management, and corresponding transformation security strategies. The proposed AHMM4CTC-based CTC-HSI is a concept for secured environments, which use real-life cases of a transformation project, which needs scalable and secured Cloud Platform’s (CP) infrastructure and services layer, that are supported by the alignment of CP services, standards, enterprise architecture paradigm, and security development strategies. In a CP-based transformation project, the author recommends integrating a Private CP (PCP); which can use commercial CPs like the Google CP (GCP). The GCP was chosen as a sample CP, but there is a need to define a standardized security architecture and concept/procedures so that the organization builds its own CTC-HSI-based PCP and has to avoid locked-in commercial products.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Hybridization of [PIO-GSO] Algorithms in Wireless Sensor Networks 无线传感器网络中[PIO-GSO]混合算法的性能分析
Pub Date : 2022-12-29 DOI: 10.37394/23205.2022.21.40
K. Thamizhmaran, K. Prabu
In wireless sensor networks (WSN), clustering is treated as an energy efficient technique employed to achieve augmenting network lifetime. But, the process of cluster head (CH) selection for stabilized network operation and prolonged network lifetime remains a challenging issue in WSN. In this research, presents a novel Hybridization of Pigeon Inspired with Glowworm Swarm Optimization (HPIGSO) algorithm based clustering innovation in WSN. This innovative HPIGSO algorithm integrates the good characteristics of Pigeon Inspired Optimization (PIO) algorithm and Glowworm Swarm Optimization (GSO) algorithm. The proposed algorithm operates on three major stages namely initialization, cluster head selection and cluster construction. Once the nodes are deployed, the initialization process takes place. Followed by, Base Station (BS) executes the HPIGSO algorithm and selects the cluster heads effectively. Subsequently, nearby nodes joins the cluster head and becomes cluster members, thereby cluster construction takes place. Finally, the cluster members send the data to cluster heads which is then forwarded to the base station via inter-cluster communication. The performance of the proposed HPIGSO method has been evaluated and compared with QOGSO, PIOA-DS, ALO, GOA and FFOA. Finally the proposed HPIGSO algorithm provides prolonged the lifetime of WSN over the existing clustering techniques.
在无线传感器网络(WSN)中,聚类被认为是一种提高网络寿命的节能技术。但是,为了稳定网络运行和延长网络生命周期而选择簇头的过程一直是WSN中一个具有挑战性的问题。本文提出了一种基于聚类创新的WSN中基于萤火虫群优化的鸽子杂交算法(HPIGSO)。这种创新的HPIGSO算法融合了鸽子启发优化(PIO)算法和萤火虫群优化(GSO)算法的优点。该算法主要分为初始化、簇头选择和簇构建三个阶段。部署节点后,将进行初始化过程。其次,基站(BS)执行HPIGSO算法,有效地选择簇头。随后,邻近节点加入簇头并成为簇成员,从而进行簇构建。最后,集群成员将数据发送到集群头,然后通过集群间通信转发到基站。并与QOGSO、PIOA-DS、ALO、GOA和FFOA方法进行了性能评价和比较。最后,本文提出的HPIGSO算法比现有的聚类技术延长了无线传感器网络的生存期。
{"title":"Performance Analysis of Hybridization of [PIO-GSO] Algorithms in Wireless Sensor Networks","authors":"K. Thamizhmaran, K. Prabu","doi":"10.37394/23205.2022.21.40","DOIUrl":"https://doi.org/10.37394/23205.2022.21.40","url":null,"abstract":"In wireless sensor networks (WSN), clustering is treated as an energy efficient technique employed to achieve augmenting network lifetime. But, the process of cluster head (CH) selection for stabilized network operation and prolonged network lifetime remains a challenging issue in WSN. In this research, presents a novel Hybridization of Pigeon Inspired with Glowworm Swarm Optimization (HPIGSO) algorithm based clustering innovation in WSN. This innovative HPIGSO algorithm integrates the good characteristics of Pigeon Inspired Optimization (PIO) algorithm and Glowworm Swarm Optimization (GSO) algorithm. The proposed algorithm operates on three major stages namely initialization, cluster head selection and cluster construction. Once the nodes are deployed, the initialization process takes place. Followed by, Base Station (BS) executes the HPIGSO algorithm and selects the cluster heads effectively. Subsequently, nearby nodes joins the cluster head and becomes cluster members, thereby cluster construction takes place. Finally, the cluster members send the data to cluster heads which is then forwarded to the base station via inter-cluster communication. The performance of the proposed HPIGSO method has been evaluated and compared with QOGSO, PIOA-DS, ALO, GOA and FFOA. Finally the proposed HPIGSO algorithm provides prolonged the lifetime of WSN over the existing clustering techniques.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
WSEAS TRANSACTIONS ON COMPUTERS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1