Pub Date : 2023-07-05DOI: 10.37394/23205.2023.22.8
Nazli Goker, M. Dursun
Neuromarketing, which uses neuroimaging technologies for marketing initiatives, is represented as the application of neuroscientific methods for analysing and understanding consumer behaviour with regard to marketing objectives. Medical diagnostic devices for brain imaging are used by marketers as neuromarketing technologies. In this study, the intuitionistic fuzzy COPRAS method, which aims to obtain a solution relative to the ideal solution, is used to rank neuromarketing technology alternatives and identify the best-performing one among them. Intuitionistic fuzzy sets are used to deal with the loss of information and hesitation in data that may occur in operations with fuzzy numbers. The application of the proposed intuitionistic fuzzy decision-making approach is illustrated by conducting a case study
{"title":"An Intuitionistic Fuzzy Decision Aid for Neuromarketing Technology Selection Problem","authors":"Nazli Goker, M. Dursun","doi":"10.37394/23205.2023.22.8","DOIUrl":"https://doi.org/10.37394/23205.2023.22.8","url":null,"abstract":"Neuromarketing, which uses neuroimaging technologies for marketing initiatives, is represented as the application of neuroscientific methods for analysing and understanding consumer behaviour with regard to marketing objectives. Medical diagnostic devices for brain imaging are used by marketers as neuromarketing technologies. In this study, the intuitionistic fuzzy COPRAS method, which aims to obtain a solution relative to the ideal solution, is used to rank neuromarketing technology alternatives and identify the best-performing one among them. Intuitionistic fuzzy sets are used to deal with the loss of information and hesitation in data that may occur in operations with fuzzy numbers. The application of the proposed intuitionistic fuzzy decision-making approach is illustrated by conducting a case study","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134562100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-22DOI: 10.37394/23205.2023.22.7
Adeniji Oluwashola David, O. Omotosho
The threats to information privacy while connected to cyber space are capacious and complex which require resilient network and antifragile security mechanisms. Software Define Network (SDN) infrastructure itself is predisposed to severe threats that may damage the provision of its usability as a security provider. The essential qualities of (SDN) are to provide support for high bandwidth and timely content delivery. SDN granular approach to security by centralizing the security control into one entity using the controller to ensure service control and information protection. SDN provides a new paradigm for applications to interact with the network. This interaction with declarative abstraction will instruct the Application Programming Interface (APIs) to direct the configuration and operation of the network. The API is queried to ask the network for information in order to plan and optimize the network operations. In this study, the vulnerability exploited by attackers to perform distributed denial of service (DDoS) attacks is examined. The trust between the control planes and forwarding planes is crucial in SDN. The separation of the control and data planes contributes to open security challenges such as denial of service (DoS) attacks, man-in-the-middle attacks, and network saturation attacks. The platform runs on Mininet 2.2.2, Ubuntu 18.04, Ryu Controller 4.34, and Sflow-RT. The Classification learning is based on Support Vector Machine (SVM). The contribution is to provide monitoring application of Flow RT Status and SFlow RT Packet Monitoring during Normal Traffic Generation. The implication for the monitoring application of SFlow RT Status is to supervise the failure in the status of sFlowAgent, sFlow Byte, and sFlow packet against cyber-attack.
{"title":"Scalable Flow based Management Scheme in Software Define Network (SDN) using sFlow","authors":"Adeniji Oluwashola David, O. Omotosho","doi":"10.37394/23205.2023.22.7","DOIUrl":"https://doi.org/10.37394/23205.2023.22.7","url":null,"abstract":"The threats to information privacy while connected to cyber space are capacious and complex which require resilient network and antifragile security mechanisms. Software Define Network (SDN) infrastructure itself is predisposed to severe threats that may damage the provision of its usability as a security provider. The essential qualities of (SDN) are to provide support for high bandwidth and timely content delivery. SDN granular approach to security by centralizing the security control into one entity using the controller to ensure service control and information protection. SDN provides a new paradigm for applications to interact with the network. This interaction with declarative abstraction will instruct the Application Programming Interface (APIs) to direct the configuration and operation of the network. The API is queried to ask the network for information in order to plan and optimize the network operations. In this study, the vulnerability exploited by attackers to perform distributed denial of service (DDoS) attacks is examined. The trust between the control planes and forwarding planes is crucial in SDN. The separation of the control and data planes contributes to open security challenges such as denial of service (DoS) attacks, man-in-the-middle attacks, and network saturation attacks. The platform runs on Mininet 2.2.2, Ubuntu 18.04, Ryu Controller 4.34, and Sflow-RT. The Classification learning is based on Support Vector Machine (SVM). The contribution is to provide monitoring application of Flow RT Status and SFlow RT Packet Monitoring during Normal Traffic Generation. The implication for the monitoring application of SFlow RT Status is to supervise the failure in the status of sFlowAgent, sFlow Byte, and sFlow packet against cyber-attack.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133457822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-22DOI: 10.37394/23205.2023.22.6
D. Ghelase, L. Daschievici
Knowledge management (KM) has become an effective way of managing organization’s intellectual capital or, in other words, organization’s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.
{"title":"Aspects Regarding Knowledge-based Engineering","authors":"D. Ghelase, L. Daschievici","doi":"10.37394/23205.2023.22.6","DOIUrl":"https://doi.org/10.37394/23205.2023.22.6","url":null,"abstract":"Knowledge management (KM) has become an effective way of managing organization’s intellectual capital or, in other words, organization’s full experience, skills and knowledge that is relevant for more effective performance in future. The paper proposes a knowledge management to achieve a competitive control of the machining systems. Then an application of Knowledge Management in engineering has been attempted to explain. The model can be used by the manager for the choosing of competitive orders.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124081180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-07DOI: 10.37394/23205.2023.22.5
A. Beletsky
The article is devoted to the theoretical foundations of the construction of generalized Gray codes. These include the classical "left-side" and the proposed "right-side" Gray's codes. Left-side codes develop from left to right and right-side codes from right to left. Left- and right-handed Gray's codes augmented with reverse permutation operators form a subset of composite Gray's codes. Such codes have found constructive application in solving synthesis and analysis problems of discrete systems of Vilenkin-Crestenson functions (VCF). Particular cases of VCF systems are systems of discrete exponential functions and Walsh functions. The so-called indicator matrices (IM), bijective connected to the VCF systems, form the basis for VCF systems synthesis. The order of IMs is determined by the logarithmic dependence on the order of the VCF system. Unique Walsh-Cooley function systems, the only ones in the set of Walsh function systems that provide linear connectivity of the frequency scales of DFT processors, are developed. Examples of trees of VCF systems give. The orders of IMs are related by logarithmic dependence with the orders of VCF systems. Using IM: (1) estimates of the number of symmetric VCF systems in an unbounded range of changes of their parameters are obtained, (2) structures are determined and (3) rules of the interconnection of the systems established. The fundamental axioms and lemmas corresponding to the VCF systems formulating and directions for further research are outlined.
{"title":"Conceptual Bases of Gray Transformations and Discrete Vilenkin-Crestenson Functions Systems","authors":"A. Beletsky","doi":"10.37394/23205.2023.22.5","DOIUrl":"https://doi.org/10.37394/23205.2023.22.5","url":null,"abstract":"The article is devoted to the theoretical foundations of the construction of generalized Gray codes. These include the classical \"left-side\" and the proposed \"right-side\" Gray's codes. Left-side codes develop from left to right and right-side codes from right to left. Left- and right-handed Gray's codes augmented with reverse permutation operators form a subset of composite Gray's codes. Such codes have found constructive application in solving synthesis and analysis problems of discrete systems of Vilenkin-Crestenson functions (VCF). Particular cases of VCF systems are systems of discrete exponential functions and Walsh functions. The so-called indicator matrices (IM), bijective connected to the VCF systems, form the basis for VCF systems synthesis. The order of IMs is determined by the logarithmic dependence on the order of the VCF system. Unique Walsh-Cooley function systems, the only ones in the set of Walsh function systems that provide linear connectivity of the frequency scales of DFT processors, are developed. Examples of trees of VCF systems give. The orders of IMs are related by logarithmic dependence with the orders of VCF systems. Using IM: (1) estimates of the number of symmetric VCF systems in an unbounded range of changes of their parameters are obtained, (2) structures are determined and (3) rules of the interconnection of the systems established. The fundamental axioms and lemmas corresponding to the VCF systems formulating and directions for further research are outlined.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133632318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-22DOI: 10.37394/23205.2023.22.4
L. Vladutu, Cosmin Marian
This electronic document describes one of the first full open-source frameworks for posture and face detection and classification using Kinect sensors, based entirely on an open-sourced software platform. It has been designed with the possibility of automatic monitoring of either an elderly person who is situated in a closed space (a room with furniture, appliances, and other rigid objects), or a patient who suffers from a physiological disorder. It is also based on an original hardware platform (the AmI-Platform), which includes more Kinect sensors, data acquisition stations, and crunches (data servers). The articles tackle two of the most important issues for ambient intelligence: accurate determination of the person and his or her facial landmarks (to understand emotions) and fast and reliable posture determination (to take appropriate measures in case of an accident).
{"title":"Framework for Posture and Face Recognition Using Kinect an Ambient-intelligence Method","authors":"L. Vladutu, Cosmin Marian","doi":"10.37394/23205.2023.22.4","DOIUrl":"https://doi.org/10.37394/23205.2023.22.4","url":null,"abstract":"This electronic document describes one of the first full open-source frameworks for posture and face detection and classification using Kinect sensors, based entirely on an open-sourced software platform. It has been designed with the possibility of automatic monitoring of either an elderly person who is situated in a closed space (a room with furniture, appliances, and other rigid objects), or a patient who suffers from a physiological disorder. It is also based on an original hardware platform (the AmI-Platform), which includes more Kinect sensors, data acquisition stations, and crunches (data servers). The articles tackle two of the most important issues for ambient intelligence: accurate determination of the person and his or her facial landmarks (to understand emotions) and fast and reliable posture determination (to take appropriate measures in case of an accident).","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130798824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-19DOI: 10.37394/23205.2023.22.2
Amin H. Al Ka’bi
Higher education has delved into a new stage of rapid development focusing on quality improvement, while encountering new challenges and obstacles. In this research work, an artificial intelligence algorithm for education improvement is proposed. Firstly, deep feature abstraction in temporal and special dimensions is performed using Long Short-Term Memory (LSTM) artificial neural network and convolutional networks. Consequently, multiscale attention fusion techniques are used to improve the articulateness of the characteristics and come up with better recommendations with the assistance of multilayer perceptron. Moreover, the proposed model helps in improving the cognitive capability of students and enhances their overall quality of perception. Moreover, it has been proven that the performance of the proposed model provides better recommendation outcomes and better robustness compared to existing models through conducting extensive experiments based on real data.
{"title":"A Proposed Artificial Intelligence Algorithm for Development of Higher Education","authors":"Amin H. Al Ka’bi","doi":"10.37394/23205.2023.22.2","DOIUrl":"https://doi.org/10.37394/23205.2023.22.2","url":null,"abstract":"Higher education has delved into a new stage of rapid development focusing on quality improvement, while encountering new challenges and obstacles. In this research work, an artificial intelligence algorithm for education improvement is proposed. Firstly, deep feature abstraction in temporal and special dimensions is performed using Long Short-Term Memory (LSTM) artificial neural network and convolutional networks. Consequently, multiscale attention fusion techniques are used to improve the articulateness of the characteristics and come up with better recommendations with the assistance of multilayer perceptron. Moreover, the proposed model helps in improving the cognitive capability of students and enhances their overall quality of perception. Moreover, it has been proven that the performance of the proposed model provides better recommendation outcomes and better robustness compared to existing models through conducting extensive experiments based on real data.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.37394/23205.2023.22.1
Ladislav Burita
The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.
{"title":"How to Understand Phishing","authors":"Ladislav Burita","doi":"10.37394/23205.2023.22.1","DOIUrl":"https://doi.org/10.37394/23205.2023.22.1","url":null,"abstract":"The article is based on the results of previous research, is focused on the analysis and classification of phishing emails, and documents the results of communication with the phisher attacker. In the first part of the article, an experiment carried out with a randomly selected set of emails confirms the considerable uncertainty of the correct result of automatic classification based on keywords using text analysis software. The second part of the article contains the experiment of communication with phishing attackers. A typical scenario of message exchange is presented. Thanks to the correct setting of security and protection rules, no security incident occurred. The literature search confirms the great interest in publishing in the field of phishing. Compared to the content of the published article, it turned out that its focus is completely original.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130799858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-31DOI: 10.37394/23205.2023.22.3
Aleksandar Karadimce, Marija Bukalevska
Today, practically everyone has access to the internet and owns some type of digital gadgets, such as a smartphone, laptop, tablet, etc. We live in a digital world where internet use is widespread. Nowadays, a growing number of children have access to the internet via portable electronic devices such as tablets, laptops, and gaming consoles. Online social networks (OSN) have become increasingly popular and are now widely used along with the rise of the internet. A large percentage of children worldwide have profiles on at least one online social networking site. Children register on these platforms so they can communicate with their peers, make new friends, share their interests and hobbies in the hopes of meeting someone who has similar ones, play games, and more. But in addition to the benefits and enjoyment that kids derive from social networks, there are also risks and dangers that specifically target children on OSN platforms. Online harassment, online predators, sexual solicitation, cyberbullying, and cyber grooming are all threats that target children on OSNs. This paper aims to bring awareness to parents and children about the potential dangers present on online social networking platforms and offers guidelines on how to better protect children in the social networking environment.
今天,几乎每个人都可以访问互联网,并拥有某种类型的数字设备,如智能手机,笔记本电脑,平板电脑等。我们生活在一个互联网广泛使用的数字世界。如今,越来越多的孩子可以通过平板电脑、笔记本电脑和游戏机等便携式电子设备上网。随着互联网的兴起,在线社交网络(Online social networks, OSN)越来越受欢迎并得到广泛应用。全世界有很大比例的儿童在至少一个在线社交网站上拥有个人资料。孩子们在这些平台上注册,这样他们就可以与同龄人交流,结交新朋友,分享他们的兴趣和爱好,希望能遇到与他们有相似爱好的人,玩游戏等等。但是,除了孩子们从社交网络中获得的好处和乐趣之外,还存在专门针对OSN平台上的儿童的风险和危险。网络骚扰、网络掠夺者、性引诱、网络欺凌和网络诱骗都是针对osn上儿童的威胁。本文旨在提高家长和儿童对在线社交网络平台上存在的潜在危险的认识,并就如何在社交网络环境中更好地保护儿童提供指导。
{"title":"Threats Targeting Children on Online Social Networks","authors":"Aleksandar Karadimce, Marija Bukalevska","doi":"10.37394/23205.2023.22.3","DOIUrl":"https://doi.org/10.37394/23205.2023.22.3","url":null,"abstract":"Today, practically everyone has access to the internet and owns some type of digital gadgets, such as a smartphone, laptop, tablet, etc. We live in a digital world where internet use is widespread. Nowadays, a growing number of children have access to the internet via portable electronic devices such as tablets, laptops, and gaming consoles. Online social networks (OSN) have become increasingly popular and are now widely used along with the rise of the internet. A large percentage of children worldwide have profiles on at least one online social networking site. Children register on these platforms so they can communicate with their peers, make new friends, share their interests and hobbies in the hopes of meeting someone who has similar ones, play games, and more. But in addition to the benefits and enjoyment that kids derive from social networks, there are also risks and dangers that specifically target children on OSN platforms. Online harassment, online predators, sexual solicitation, cyberbullying, and cyber grooming are all threats that target children on OSNs. This paper aims to bring awareness to parents and children about the potential dangers present on online social networking platforms and offers guidelines on how to better protect children in the social networking environment.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115032007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-30DOI: 10.37394/23205.2022.21.41
A. Trad
This chapter presents the fundaments of the Cloud Transformation Concept (CTC) and this concept is a basic component of the author’s transformation framework and in complex transformation projects, where a holistic security concept is a top priority. The implementation of CTC’s Holistic Security Integration (CTCHSI) is supported by the author’s Applied Holistic Mathematical Model (AHMM) for CTC (AHMM4CTC) and his various research works on Holistic Security Integration (HSI), Business Process Management (BPM), Artificial Intelligence (AI), AI Services (AIS), Compute Services (CS), Mathematical Models, cross-functional transformations projects. The AHMM4CTC is based on cross-functional research on an authentic and proprietary mixed research method supported by his own version of an AI learning model, a search tree, combined with an internal heuristic algorithm. In this chapter, the focus is on CTC-HSI’s integration concepts, requirements, services, data management, and corresponding transformation security strategies. The proposed AHMM4CTC-based CTC-HSI is a concept for secured environments, which use real-life cases of a transformation project, which needs scalable and secured Cloud Platform’s (CP) infrastructure and services layer, that are supported by the alignment of CP services, standards, enterprise architecture paradigm, and security development strategies. In a CP-based transformation project, the author recommends integrating a Private CP (PCP); which can use commercial CPs like the Google CP (GCP). The GCP was chosen as a sample CP, but there is a need to define a standardized security architecture and concept/procedures so that the organization builds its own CTC-HSI-based PCP and has to avoid locked-in commercial products.
{"title":"Enterprise Transformation Projects-Cloud Transformation Concept Holistic Security Integration (CTC-HSI)","authors":"A. Trad","doi":"10.37394/23205.2022.21.41","DOIUrl":"https://doi.org/10.37394/23205.2022.21.41","url":null,"abstract":"This chapter presents the fundaments of the Cloud Transformation Concept (CTC) and this concept is a basic component of the author’s transformation framework and in complex transformation projects, where a holistic security concept is a top priority. The implementation of CTC’s Holistic Security Integration (CTCHSI) is supported by the author’s Applied Holistic Mathematical Model (AHMM) for CTC (AHMM4CTC) and his various research works on Holistic Security Integration (HSI), Business Process Management (BPM), Artificial Intelligence (AI), AI Services (AIS), Compute Services (CS), Mathematical Models, cross-functional transformations projects. The AHMM4CTC is based on cross-functional research on an authentic and proprietary mixed research method supported by his own version of an AI learning model, a search tree, combined with an internal heuristic algorithm. In this chapter, the focus is on CTC-HSI’s integration concepts, requirements, services, data management, and corresponding transformation security strategies. The proposed AHMM4CTC-based CTC-HSI is a concept for secured environments, which use real-life cases of a transformation project, which needs scalable and secured Cloud Platform’s (CP) infrastructure and services layer, that are supported by the alignment of CP services, standards, enterprise architecture paradigm, and security development strategies. In a CP-based transformation project, the author recommends integrating a Private CP (PCP); which can use commercial CPs like the Google CP (GCP). The GCP was chosen as a sample CP, but there is a need to define a standardized security architecture and concept/procedures so that the organization builds its own CTC-HSI-based PCP and has to avoid locked-in commercial products.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126068219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-29DOI: 10.37394/23205.2022.21.40
K. Thamizhmaran, K. Prabu
In wireless sensor networks (WSN), clustering is treated as an energy efficient technique employed to achieve augmenting network lifetime. But, the process of cluster head (CH) selection for stabilized network operation and prolonged network lifetime remains a challenging issue in WSN. In this research, presents a novel Hybridization of Pigeon Inspired with Glowworm Swarm Optimization (HPIGSO) algorithm based clustering innovation in WSN. This innovative HPIGSO algorithm integrates the good characteristics of Pigeon Inspired Optimization (PIO) algorithm and Glowworm Swarm Optimization (GSO) algorithm. The proposed algorithm operates on three major stages namely initialization, cluster head selection and cluster construction. Once the nodes are deployed, the initialization process takes place. Followed by, Base Station (BS) executes the HPIGSO algorithm and selects the cluster heads effectively. Subsequently, nearby nodes joins the cluster head and becomes cluster members, thereby cluster construction takes place. Finally, the cluster members send the data to cluster heads which is then forwarded to the base station via inter-cluster communication. The performance of the proposed HPIGSO method has been evaluated and compared with QOGSO, PIOA-DS, ALO, GOA and FFOA. Finally the proposed HPIGSO algorithm provides prolonged the lifetime of WSN over the existing clustering techniques.
{"title":"Performance Analysis of Hybridization of [PIO-GSO] Algorithms in Wireless Sensor Networks","authors":"K. Thamizhmaran, K. Prabu","doi":"10.37394/23205.2022.21.40","DOIUrl":"https://doi.org/10.37394/23205.2022.21.40","url":null,"abstract":"In wireless sensor networks (WSN), clustering is treated as an energy efficient technique employed to achieve augmenting network lifetime. But, the process of cluster head (CH) selection for stabilized network operation and prolonged network lifetime remains a challenging issue in WSN. In this research, presents a novel Hybridization of Pigeon Inspired with Glowworm Swarm Optimization (HPIGSO) algorithm based clustering innovation in WSN. This innovative HPIGSO algorithm integrates the good characteristics of Pigeon Inspired Optimization (PIO) algorithm and Glowworm Swarm Optimization (GSO) algorithm. The proposed algorithm operates on three major stages namely initialization, cluster head selection and cluster construction. Once the nodes are deployed, the initialization process takes place. Followed by, Base Station (BS) executes the HPIGSO algorithm and selects the cluster heads effectively. Subsequently, nearby nodes joins the cluster head and becomes cluster members, thereby cluster construction takes place. Finally, the cluster members send the data to cluster heads which is then forwarded to the base station via inter-cluster communication. The performance of the proposed HPIGSO method has been evaluated and compared with QOGSO, PIOA-DS, ALO, GOA and FFOA. Finally the proposed HPIGSO algorithm provides prolonged the lifetime of WSN over the existing clustering techniques.","PeriodicalId":332148,"journal":{"name":"WSEAS TRANSACTIONS ON COMPUTERS","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122352309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}