首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice 基于约束交集格的敏感高效用频繁项集隐藏
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0001
Huynh Trieu Vy, Le Quoc Hai, Nguyen Thanh Long, Trương Ngọc Châu, Le Quoc Hieu
Abstract Hiding high utility and frequent itemset is the method used to preserve sensitive knowledge from being revealed by pattern mining process. Its goal is to remove sensitive high utility and frequent itemsets from a database before sharing it for data mining purposes while minimizing the side effects. The current methods succeed in the hiding goal but they cause high side effects. This paper proposes a novel algorithm, named HSUFIBL, that applies a heuristic for finding victim item based on the constrained intersection lattice theory. This algorithm specifies exactly the condition that allows the application of utility reduction or support reduction method, the victim item, and the victim transaction for the hiding process so that the process needs the fewest data modifications and gives the lowest number of lost non-sensitive itemsets. The experimental results indicate that the HSUFIBL algorithm achieves better performance than previous works in minimizing the side effect.
摘要隐藏高实用性和频繁项集是模式挖掘过程中用来保护敏感知识不被泄露的方法。其目标是在出于数据挖掘目的共享数据库之前,从数据库中删除敏感的高实用性和频繁的项目集,同时将副作用降至最低。目前的方法成功地实现了隐藏目标,但它们会造成很高的副作用。本文提出了一种新的算法,名为HSUFIBL,该算法基于约束交集格理论,应用启发式方法来寻找受害者项。该算法准确地指定了允许应用效用减少或支持减少方法的条件、隐藏过程的受害者项目和受害者事务,以便该过程需要最少的数据修改,并提供最少数量的丢失非敏感项目集。实验结果表明,HSUFIBL算法在最小化副作用方面取得了比以往更好的性能。
{"title":"Hiding Sensitive High Utility and Frequent Itemsets Based on Constrained Intersection Lattice","authors":"Huynh Trieu Vy, Le Quoc Hai, Nguyen Thanh Long, Trương Ngọc Châu, Le Quoc Hieu","doi":"10.2478/cait-2022-0001","DOIUrl":"https://doi.org/10.2478/cait-2022-0001","url":null,"abstract":"Abstract Hiding high utility and frequent itemset is the method used to preserve sensitive knowledge from being revealed by pattern mining process. Its goal is to remove sensitive high utility and frequent itemsets from a database before sharing it for data mining purposes while minimizing the side effects. The current methods succeed in the hiding goal but they cause high side effects. This paper proposes a novel algorithm, named HSUFIBL, that applies a heuristic for finding victim item based on the constrained intersection lattice theory. This algorithm specifies exactly the condition that allows the application of utility reduction or support reduction method, the victim item, and the victim transaction for the hiding process so that the process needs the fewest data modifications and gives the lowest number of lost non-sensitive itemsets. The experimental results indicate that the HSUFIBL algorithm achieves better performance than previous works in minimizing the side effect.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"3 - 23"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45833732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Citation and Similarity in Academic Texts: Colombian Engineering Case 学术文本中的引文与相似性:哥伦比亚工程案例
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-03-01 DOI: 10.2478/cait-2022-0006
Marco Aguilera-Prado, O. Salcedo, Eduardo Avendaño Fernández
Abstract This article provides the results of a citation determinants model for a set of academic engineering texts from Colombia. The model establishes the determinants of the probability that a text receives at least one citation through the relationship among previous citations, journal characteristics, the author and the text. Through a similarity matrix constructed by Latent Semantic Analysis (LSA), a similarity variable has been constructed to capture the fact that the texts have similar titles, abstracts and keywords to the most cited texts. The results show: i) joint significance of the variables selected to characterize the text; ii) direct relationship of the citation with similarity of keywords, published in an IEEE journal, research article, more than one author; and authored by at least one foreign author; and iii) inverse relationship between the probability of citation with the similarity of abstracts, published in 2016 or 2017, and published in a Colombian journal.
摘要本文提供了一组来自哥伦比亚的学术工程文本的引文决定因素模型的结果。该模型通过先前引文、期刊特征、作者和文本之间的关系,建立了文本至少被一次引用的概率的决定因素。通过潜在语义分析(LSA)构建的相似性矩阵,构建了一个相似性变量,以捕捉文本具有与引用最多的文本相似的标题、摘要和关键词的事实。研究结果表明:(1)选择变量表征文本的联合显著性;ii)引用与关键词相似性的直接关系,发表在IEEE期刊、研究文章、多个作者上;并由至少一位外国作者撰写;以及iii)引用概率与2016年或2017年发表在哥伦比亚期刊上的摘要相似性之间的反比关系。
{"title":"Citation and Similarity in Academic Texts: Colombian Engineering Case","authors":"Marco Aguilera-Prado, O. Salcedo, Eduardo Avendaño Fernández","doi":"10.2478/cait-2022-0006","DOIUrl":"https://doi.org/10.2478/cait-2022-0006","url":null,"abstract":"Abstract This article provides the results of a citation determinants model for a set of academic engineering texts from Colombia. The model establishes the determinants of the probability that a text receives at least one citation through the relationship among previous citations, journal characteristics, the author and the text. Through a similarity matrix constructed by Latent Semantic Analysis (LSA), a similarity variable has been constructed to capture the fact that the texts have similar titles, abstracts and keywords to the most cited texts. The results show: i) joint significance of the variables selected to characterize the text; ii) direct relationship of the citation with similarity of keywords, published in an IEEE journal, research article, more than one author; and authored by at least one foreign author; and iii) inverse relationship between the probability of citation with the similarity of abstracts, published in 2016 or 2017, and published in a Colombian journal.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"22 1","pages":"95 - 103"},"PeriodicalIF":1.2,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48687734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Regression Trust Management System for IoT Systems 物联网系统线性回归信任管理系统
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0040
Ananda Kumar Subramanian, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, S. Shiaeles, Anish Mahendran
Abstract This paper aims at creating a new Trust Management System (TMS) for a system of nodes. Various systems already exist which only use a simple function to calculate the trust value of a node. In the age of artificial intelligence the need for learning ability in an Internet of Things (IoT) system arises. Malicious nodes are a recurring issue and there still has not been a fully effective way to detect them beforehand. In IoT systems, a malicious node is detected after a transaction has occurred with the node. To this end, this paper explores how Artificial Intelligence (AI), and specifically Linear Regression (LR), could be utilised to predict a malicious node in order to minimise the damage in the IoT ecosystem. Moreover, the paper compares Linear regression over other AI-based TMS, showing the efficiency and efficacy of the method to predict and identify a malicious node.
摘要本文旨在为节点系统创建一种新的信任管理系统(TMS)。已经有很多系统只使用一个简单的函数来计算节点的信任值。在人工智能时代,对物联网(IoT)系统学习能力的需求出现了。恶意节点是一个反复出现的问题,目前还没有一种完全有效的方法来预先检测它们。在物联网系统中,在与节点发生交易后检测到恶意节点。为此,本文探讨了如何利用人工智能(AI),特别是线性回归(LR)来预测恶意节点,以尽量减少物联网生态系统中的损害。此外,本文还将线性回归与其他基于人工智能的TMS进行了比较,显示了该方法预测和识别恶意节点的效率和有效性。
{"title":"Linear Regression Trust Management System for IoT Systems","authors":"Ananda Kumar Subramanian, Aritra Samanta, Sasmithaa Manickam, Abhinav Kumar, S. Shiaeles, Anish Mahendran","doi":"10.2478/cait-2021-0040","DOIUrl":"https://doi.org/10.2478/cait-2021-0040","url":null,"abstract":"Abstract This paper aims at creating a new Trust Management System (TMS) for a system of nodes. Various systems already exist which only use a simple function to calculate the trust value of a node. In the age of artificial intelligence the need for learning ability in an Internet of Things (IoT) system arises. Malicious nodes are a recurring issue and there still has not been a fully effective way to detect them beforehand. In IoT systems, a malicious node is detected after a transaction has occurred with the node. To this end, this paper explores how Artificial Intelligence (AI), and specifically Linear Regression (LR), could be utilised to predict a malicious node in order to minimise the damage in the IoT ecosystem. Moreover, the paper compares Linear regression over other AI-based TMS, showing the efficiency and efficacy of the method to predict and identify a malicious node.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"15 - 27"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46247088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
COVID-19 Confirmed Cases Prediction in China Based on Barnacles Mating Optimizer-Least Squares Support Vector Machines 基于藤壶配对优化-最小二乘支持向量机的中国新冠肺炎确诊病例预测
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0043
Z. Mustaffa, M. Sulaiman
Abstract The Covid19 has significantly changed the global landscape in every aspect including economy, social life, and many others. After almost two years of living with the pandemic, new challenges are faced by the research community. It may take some time before the world can be declared as totally safe from the virus. Therefore, prediction of Covid19 confirmed cases is vital for the sake of proper prevention and precaution steps. In this study, a hybrid Barnacles Mating Optimizer with Least Square Support Vector Machines (BMO-LSSVM) is proposed for prediction of Covid19 confirmed cases. The employed data are the Covid19 cases in China which are defined in daily periodicity. The BMO was utilized to obtain optimal values of LSSVM hyper-parameters. Later, with the optimized values of the hyper-parameters, the prediction task will be executed by LSSVM. Through the experiments, the study recommends the superiority of BMO-LSSVM over the other identified hybrid algorithms.
新冠肺炎疫情深刻改变了全球经济、社会生活等方方面面的格局。在经历了近两年的疫情后,研究界面临着新的挑战。世界可能需要一段时间才能宣布完全远离病毒。因此,预测新冠肺炎确诊病例对于采取适当的预防措施至关重要。本研究提出了一种基于最小二乘支持向量机(BMO-LSSVM)的混合藤壶配对优化算法,用于预测新冠肺炎确诊病例。使用的数据为中国境内新冠肺炎病例数,按每日周期定义。利用BMO得到LSSVM超参数的最优值。之后,利用超参数的优化值,由LSSVM执行预测任务。通过实验,研究表明BMO-LSSVM算法优于其他已识别的混合算法。
{"title":"COVID-19 Confirmed Cases Prediction in China Based on Barnacles Mating Optimizer-Least Squares Support Vector Machines","authors":"Z. Mustaffa, M. Sulaiman","doi":"10.2478/cait-2021-0043","DOIUrl":"https://doi.org/10.2478/cait-2021-0043","url":null,"abstract":"Abstract The Covid19 has significantly changed the global landscape in every aspect including economy, social life, and many others. After almost two years of living with the pandemic, new challenges are faced by the research community. It may take some time before the world can be declared as totally safe from the virus. Therefore, prediction of Covid19 confirmed cases is vital for the sake of proper prevention and precaution steps. In this study, a hybrid Barnacles Mating Optimizer with Least Square Support Vector Machines (BMO-LSSVM) is proposed for prediction of Covid19 confirmed cases. The employed data are the Covid19 cases in China which are defined in daily periodicity. The BMO was utilized to obtain optimal values of LSSVM hyper-parameters. Later, with the optimized values of the hyper-parameters, the prediction task will be executed by LSSVM. Through the experiments, the study recommends the superiority of BMO-LSSVM over the other identified hybrid algorithms.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"62 - 76"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45097313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modal Type of Weak Intuitionistic Fuzzy Implications Generated by the Operation Δ 操作产生的弱直觉模糊含义的模态类型Δ
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0047
P. Dworniczak, Lilija Atanassova, Nora A. Angelova
Abstract In 2020 L. Atanassova has been introduced the new operation Δ over intuitionistic fuzzy sets and over intuitionistic fuzzy pairs. Some of its properties have been studied in 2021 from L. Atanassova and P. Dworniczak. In 2021 L. Atanassova and P. Dworniczak generated an intuitionistic fuzzy implication by the operation Δ, and it has been introduced and some of its basic properties have been described. Here, eight modal type of intuitionistic fuzzy implications are generated by the first one and some of their properties are discussed.
在2020年,L. Atanassova在直觉模糊集和直觉模糊对上引入了新的运算Δ。2021年,L. Atanassova和P. Dworniczak研究了它的一些特性。在2021年,L. Atanassova和P. Dworniczak通过Δ运算生成了一个直觉模糊暗示,并介绍了它,并描述了它的一些基本性质。本文以第一种直觉模糊暗示为基础,生成了八种模态类型的直觉模糊暗示,并讨论了它们的一些性质。
{"title":"Modal Type of Weak Intuitionistic Fuzzy Implications Generated by the Operation Δ","authors":"P. Dworniczak, Lilija Atanassova, Nora A. Angelova","doi":"10.2478/cait-2021-0047","DOIUrl":"https://doi.org/10.2478/cait-2021-0047","url":null,"abstract":"Abstract In 2020 L. Atanassova has been introduced the new operation Δ over intuitionistic fuzzy sets and over intuitionistic fuzzy pairs. Some of its properties have been studied in 2021 from L. Atanassova and P. Dworniczak. In 2021 L. Atanassova and P. Dworniczak generated an intuitionistic fuzzy implication by the operation Δ, and it has been introduced and some of its basic properties have been described. Here, eight modal type of intuitionistic fuzzy implications are generated by the first one and some of their properties are discussed.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"137 - 144"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47650023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Neural Networks in Engineering Design: Robust Practical Stability Analysis 工程设计中的神经网络:鲁棒实用稳定性分析
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0039
T. Stamov
Abstract In recent years, we are witnessing artificial intelligence being deployed on embedded platforms in our everyday life, including engineering design practice problems starting from early stage design ideas to the final decision. One of the most challenging problems is related to the design and implementation of neural networks in engineering design tasks. The successful design and practical applications of neural network models depend on their qualitative properties. Elaborating efficient stability is known to be of a high importance. Also, different stability notions are applied for differently behaving models. In addition, uncertainties are ubiquitous in neural network systems, and may result in performance degradation, hazards or system damage. Driven by practical needs and theoretical challenges, the rigorous handling of uncertainties in the neural network design stage is an essential research topic. In this research, the concept of robust practical stability is introduced for generalized discrete neural network models under uncertainties applied in engineering design. A robust practical stability analysis is offered using the Lyapunov function method. Since practical stability concept is more appropriate for engineering applications, the obtained results can be of a practical significance to numerous engineering design problems of diverse interest.
摘要近年来,我们目睹了人工智能在日常生活中被部署在嵌入式平台上,包括从早期设计思想到最终决策的工程设计实践问题。最具挑战性的问题之一与工程设计任务中神经网络的设计和实现有关。神经网络模型的成功设计和实际应用取决于其定性性质。众所周知,制定有效的稳定性是非常重要的。此外,不同的稳定性概念被应用于不同行为的模型。此外,不确定性在神经网络系统中普遍存在,可能导致性能下降、危险或系统损坏。在现实需求和理论挑战的驱动下,神经网络设计阶段对不确定性的严格处理是一个必不可少的研究课题。在本研究中,将鲁棒实际稳定性的概念引入到工程设计中不确定条件下的广义离散神经网络模型中。利用李雅普诺夫函数方法,给出了一个鲁棒的实际稳定性分析。由于实用稳定性概念更适合工程应用,所获得的结果对许多不同兴趣的工程设计问题具有实际意义。
{"title":"Neural Networks in Engineering Design: Robust Practical Stability Analysis","authors":"T. Stamov","doi":"10.2478/cait-2021-0039","DOIUrl":"https://doi.org/10.2478/cait-2021-0039","url":null,"abstract":"Abstract In recent years, we are witnessing artificial intelligence being deployed on embedded platforms in our everyday life, including engineering design practice problems starting from early stage design ideas to the final decision. One of the most challenging problems is related to the design and implementation of neural networks in engineering design tasks. The successful design and practical applications of neural network models depend on their qualitative properties. Elaborating efficient stability is known to be of a high importance. Also, different stability notions are applied for differently behaving models. In addition, uncertainties are ubiquitous in neural network systems, and may result in performance degradation, hazards or system damage. Driven by practical needs and theoretical challenges, the rigorous handling of uncertainties in the neural network design stage is an essential research topic. In this research, the concept of robust practical stability is introduced for generalized discrete neural network models under uncertainties applied in engineering design. A robust practical stability analysis is offered using the Lyapunov function method. Since practical stability concept is more appropriate for engineering applications, the obtained results can be of a practical significance to numerous engineering design problems of diverse interest.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"3 - 14"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47492831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks 在IPV6网络中提高IP电话性能的有效方法
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0048
Mosleh M Abualhaj, Sumaya N. Al-Khatib, Qusai Y. Shambour, A. Abu-Shareha
Abstract IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation. This paper proposes a Smallerize/Zeroize (SmlZr) method to enhance bandwidth exploitation. The SmlZr method is explicitly designed for the P2P IP telephony calls over IPv6 networks. The essence concept of the proposed method is to use the unnecessary fields in the header to keep the voice media of the packet. Doing so leads to smallerize or zeroize the packet payload and, thus, enhance the bandwidth exploitation. The SmlZr method has outperformed the RTP method for all the comparison parameters. For instance, the SmlZr method shrinks the bandwidth by 25% compared to the RTP protocol. Bandwidth saving is helpful for P2P IP telephony calls because it alleviates the traffic load. Thus, improve the call capacity boosts the call clarity.
IP电话在COVID - 19大流行期间发挥了至关重要的作用。降低IP电话解决方案服务水平的问题之一是带宽利用效率低下。本文提出了一种提高带宽利用率的Smallerize/Zeroize (SmlZr)方法。SmlZr方法是专门为IPv6网络上的P2P IP电话呼叫而设计的。该方法的核心思想是利用报头中不需要的字段来保留数据包的语音媒体。这样做会使数据包的有效负载更小或为零,从而提高带宽利用率。SmlZr方法在所有比较参数上都优于RTP方法。例如,与RTP协议相比,SmlZr方法减少了25%的带宽。节省带宽有助于P2P IP电话,因为它减轻了流量负载。因此,提高通话容量可以提高通话清晰度。
{"title":"An Efficient Method to Enhance IP Telephony Performance in IPV6 Networks","authors":"Mosleh M Abualhaj, Sumaya N. Al-Khatib, Qusai Y. Shambour, A. Abu-Shareha","doi":"10.2478/cait-2021-0048","DOIUrl":"https://doi.org/10.2478/cait-2021-0048","url":null,"abstract":"Abstract IP telephony have played an essential role during the COVID 19 pandemic lockdown. One of the issues that lower the service level of the IP telephony solutions is the inefficient bandwidth exploitation. This paper proposes a Smallerize/Zeroize (SmlZr) method to enhance bandwidth exploitation. The SmlZr method is explicitly designed for the P2P IP telephony calls over IPv6 networks. The essence concept of the proposed method is to use the unnecessary fields in the header to keep the voice media of the packet. Doing so leads to smallerize or zeroize the packet payload and, thus, enhance the bandwidth exploitation. The SmlZr method has outperformed the RTP method for all the comparison parameters. For instance, the SmlZr method shrinks the bandwidth by 25% compared to the RTP protocol. Bandwidth saving is helpful for P2P IP telephony calls because it alleviates the traffic load. Thus, improve the call capacity boosts the call clarity.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"145 - 157"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42480000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Approach to Multi-Objective Solid Transportation Problem with Mixed Constraints Using Hyperbolic Membership Function 用双曲隶属函数模糊求解混合约束下多目标固体运输问题
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0049
Nurdan Kara, H. Kocken
Abstract Multi-objective Solid Transportation Problem (MSTP) is known as a special class of vector-minimization (or maximization) problems and has three parameters: source, destination, and conveyance. The objectives such as transportation cost, transportation time, transportation safety level, and objectives in terms of environmental and social issues are generally in conflict with each other. In this paper, we present a fuzzy approach to bring these conflicting objectives together as high as possible. Instead of using the linear membership function, which is frequently used in the literature for ease of use, we use the hyperbolic membership function in our approach. Also, while most of the papers in the literature deal with the standard equality constrained form of MSTP, the mixed constrained form is addressed in this paper. Finally, a numerical example from the literature is used to illustrate the construction of the hyperbolic membership function and how well it represents the objective functions’ degree of satisfaction.
多目标固体运输问题(MSTP)是一类特殊的矢量最小化(或最大化)问题,它有三个参数:源、目的地和运输工具。运输成本、运输时间、运输安全水平等目标与环境和社会问题方面的目标通常是相互冲突的。在本文中,我们提出了一种模糊的方法来尽可能高地将这些相互冲突的目标结合在一起。为了方便使用,在文献中经常使用线性隶属函数,而在我们的方法中,我们使用双曲隶属函数。此外,虽然文献中的大多数论文都是讨论MSTP的标准等式约束形式,但本文讨论的是混合约束形式。最后,用文献中的一个数值例子说明了双曲隶属函数的构造以及它如何很好地表示了目标函数的满意度。
{"title":"A Fuzzy Approach to Multi-Objective Solid Transportation Problem with Mixed Constraints Using Hyperbolic Membership Function","authors":"Nurdan Kara, H. Kocken","doi":"10.2478/cait-2021-0049","DOIUrl":"https://doi.org/10.2478/cait-2021-0049","url":null,"abstract":"Abstract Multi-objective Solid Transportation Problem (MSTP) is known as a special class of vector-minimization (or maximization) problems and has three parameters: source, destination, and conveyance. The objectives such as transportation cost, transportation time, transportation safety level, and objectives in terms of environmental and social issues are generally in conflict with each other. In this paper, we present a fuzzy approach to bring these conflicting objectives together as high as possible. Instead of using the linear membership function, which is frequently used in the literature for ease of use, we use the hyperbolic membership function in our approach. Also, while most of the papers in the literature deal with the standard equality constrained form of MSTP, the mixed constrained form is addressed in this paper. Finally, a numerical example from the literature is used to illustrate the construction of the hyperbolic membership function and how well it represents the objective functions’ degree of satisfaction.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"158 - 167"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43651052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Decision Making in Real Estate: Portfolio Approach 房地产决策:投资组合法
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0041
T. Stoilov, K. Stoilova, Miroslav Vladimirov
Abstract An investment policy is suggested about assets on real estate markets. Such analysis recommends investments in non-financial assets and optimization of the results from such decisions. The formalization of the investment policy is based on the portfolio theory for asset allocation. Two main criteria are applied for the decision making: return and risk. The decision support is based on Mean-Variance portfolio model. A dynamical and adaptive investment policy is derived for active portfolio management. Sliding procedure in time with definition and solution of a set of portfolio problems is applied. The decision defines the relative value of the investment to which real estates are to be allocated. The regional real estate markets of six Bulgarian towns, which identify the regions with potential for investments, are compared. The added value of the paper results in development of algorithm for a quantitative analysis of real estate markets, based on portfolio theory.
摘要本文提出了房地产市场上的资产投资策略。这种分析建议对非金融资产进行投资,并对这些决策的结果进行优化。投资政策的形式化是基于资产配置的投资组合理论。两个主要标准适用于决策:回报和风险。决策支持基于均值-方差组合模型。提出了一种动态的自适应投资策略,用于主动投资组合管理。应用了一组组合问题的定义和求解的时间滑动过程。该决定确定了分配给房地产的投资的相对价值。比较了六个保加利亚城镇的区域房地产市场,确定了具有投资潜力的地区。本文的附加价值是基于投资组合理论的房地产市场定量分析算法的发展。
{"title":"Decision Making in Real Estate: Portfolio Approach","authors":"T. Stoilov, K. Stoilova, Miroslav Vladimirov","doi":"10.2478/cait-2021-0041","DOIUrl":"https://doi.org/10.2478/cait-2021-0041","url":null,"abstract":"Abstract An investment policy is suggested about assets on real estate markets. Such analysis recommends investments in non-financial assets and optimization of the results from such decisions. The formalization of the investment policy is based on the portfolio theory for asset allocation. Two main criteria are applied for the decision making: return and risk. The decision support is based on Mean-Variance portfolio model. A dynamical and adaptive investment policy is derived for active portfolio management. Sliding procedure in time with definition and solution of a set of portfolio problems is applied. The decision defines the relative value of the investment to which real estates are to be allocated. The regional real estate markets of six Bulgarian towns, which identify the regions with potential for investments, are compared. The added value of the paper results in development of algorithm for a quantitative analysis of real estate markets, based on portfolio theory.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"28 - 44"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48806535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography 用于密码学的短weerstrass椭圆曲线计算方法的评价
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-12-01 DOI: 10.2478/cait-2021-0045
Kunal Abhishek, E. Raj
Abstract The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem (ECDLP) and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and non-standard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
摘要本文介绍了短Weierstrass椭圆曲线在密码学中引入后的发展。随后,这种演变导致了目前椭圆曲线计算标准的建立。我们讨论了对椭圆曲线离散对数问题(ECDLP)的攻击时序,并研究了它们的对策,以突出密码安全椭圆曲线的进化选择标准。此外,从计算、安全和信任的角度评估了密码学中选择Short-Wierstrass椭圆曲线的两种流行的确定性和随机性方法,并展示了现有计算标准的趋势。最后,对标准和非标准椭圆曲线进行了分析,为其可用性提供了新的见解。据我们所知,过去从未进行过此类调查。
{"title":"Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography","authors":"Kunal Abhishek, E. Raj","doi":"10.2478/cait-2021-0045","DOIUrl":"https://doi.org/10.2478/cait-2021-0045","url":null,"abstract":"Abstract The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem (ECDLP) and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and non-standard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":"21 1","pages":"105 - 118"},"PeriodicalIF":1.2,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49245453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1