首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
Enhancing Intrusion Detection with Explainable AI: A Transparent Approach to Network Security 用可解释的人工智能加强入侵检测:一种透明的网络安全方法
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0006
Seshu Bhavani Mallampati, Hari Seetha
An Intrusion Detection System (IDS) is essential to identify cyber-attacks and implement appropriate measures for each risk. The efficiency of the Machine Learning (ML) techniques is compromised in the presence of irrelevant features and class imbalance. In this research, an efficient data pre-processing strategy was proposed to enhance the model’s generalizability. The class dissimilarity is addressed using k-Means SMOTE. After this, we furnish a hybrid feature selection method that combines filters and wrappers. Further, a hyperparameter-tuned Light Gradient Boosting Machine (LGBM) is analyzed by varying the optimal feature subsets. The experiments used the datasets – UNSW-NB15 and CICIDS-2017, yielding an accuracy of 90.71% and 99.98%, respectively. As the transparency and generalizability of the model depend significantly on understanding each component of the prediction, we employed the eXplainable Artificial Intelligence (XAI) method, SHapley Additive exPlanation (SHAP), to improve the comprehension of forecasted results.
入侵检测系统(IDS)对于识别网络攻击和针对各种风险采取适当措施至关重要。如果存在无关特征和类不平衡,机器学习(ML)技术的效率就会大打折扣。本研究提出了一种高效的数据预处理策略,以增强模型的普适性。使用 k-Means SMOTE 解决了类的不相似性问题。之后,我们提供了一种结合过滤器和包装器的混合特征选择方法。此外,我们还通过改变最佳特征子集分析了超参数调整光梯度提升机(LGBM)。实验使用了 UNSW-NB15 和 CICIDS-2017 数据集,准确率分别为 90.71% 和 99.98%。由于模型的透明度和通用性在很大程度上取决于对预测各组成部分的理解,因此我们采用了可解释人工智能(XAI)方法--SHapley Additive exPlanation(SHAP),以提高对预测结果的理解。
{"title":"Enhancing Intrusion Detection with Explainable AI: A Transparent Approach to Network Security","authors":"Seshu Bhavani Mallampati, Hari Seetha","doi":"10.2478/cait-2024-0006","DOIUrl":"https://doi.org/10.2478/cait-2024-0006","url":null,"abstract":"\u0000 An Intrusion Detection System (IDS) is essential to identify cyber-attacks and implement appropriate measures for each risk. The efficiency of the Machine Learning (ML) techniques is compromised in the presence of irrelevant features and class imbalance. In this research, an efficient data pre-processing strategy was proposed to enhance the model’s generalizability. The class dissimilarity is addressed using k-Means SMOTE. After this, we furnish a hybrid feature selection method that combines filters and wrappers. Further, a hyperparameter-tuned Light Gradient Boosting Machine (LGBM) is analyzed by varying the optimal feature subsets. The experiments used the datasets – UNSW-NB15 and CICIDS-2017, yielding an accuracy of 90.71% and 99.98%, respectively. As the transparency and generalizability of the model depend significantly on understanding each component of the prediction, we employed the eXplainable Artificial Intelligence (XAI) method, SHapley Additive exPlanation (SHAP), to improve the comprehension of forecasted results.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140404468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Performance and Characteristics of Single Linkage and Complete Linkage Hierarchical Clustering Methods for IoT Sensor Networks 探索物联网传感器网络单链路和全链路分层聚类方法的性能和特点
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0041
Fuad Bajaber
Abstract The research explores applying hierarchical clustering methods, namely single linkage and complete linkage, in IoT Sensor Networks (ISNs). ISNs are distributed systems comprising numerous sensor nodes that collect data from the environment and communicate with each other to transmit the data to a base station. Hierarchical clustering is a technique that groups nodes into clusters based on proximity and similarity. This paper implements and compares the performance of single linkage and complete linkage methods in terms of cluster size, network lifetime, and cluster quality. The study’s findings provide guidance for ISN researchers and designers in selecting the appropriate clustering method that meets their specific requirements.
摘要 该研究探讨了在物联网传感器网络(ISN)中应用分层聚类方法,即单一链接和完全链接。物联网传感器网络是由众多传感器节点组成的分布式系统,这些节点从环境中收集数据,并相互通信,将数据传输到基站。分层聚类是一种根据邻近性和相似性将节点分组的技术。本文从聚类大小、网络寿命和聚类质量等方面,对单一链接法和完全链接法的性能进行了实现和比较。研究结果为 ISN 研究人员和设计人员选择符合其特定要求的适当聚类方法提供了指导。
{"title":"Exploring the Performance and Characteristics of Single Linkage and Complete Linkage Hierarchical Clustering Methods for IoT Sensor Networks","authors":"Fuad Bajaber","doi":"10.2478/cait-2023-0041","DOIUrl":"https://doi.org/10.2478/cait-2023-0041","url":null,"abstract":"Abstract The research explores applying hierarchical clustering methods, namely single linkage and complete linkage, in IoT Sensor Networks (ISNs). ISNs are distributed systems comprising numerous sensor nodes that collect data from the environment and communicate with each other to transmit the data to a base station. Hierarchical clustering is a technique that groups nodes into clusters based on proximity and similarity. This paper implements and compares the performance of single linkage and complete linkage methods in terms of cluster size, network lifetime, and cluster quality. The study’s findings provide guidance for ISN researchers and designers in selecting the appropriate clustering method that meets their specific requirements.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139298587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparing Different Oversampling Methods in Predicting Multi-Class Educational Datasets Using Machine Learning Techniques 比较使用机器学习技术预测多类教育数据集的不同过度取样方法
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0044
Muhammad Arham Tariq, Allah Bux Sargano, Muhammad Aksam Iftikhar, Z. Habib
Abstract Predicting students’ academic performance is a critical research area, yet imbalanced educational datasets, characterized by unequal academic-level representation, present challenges for classifiers. While prior research has addressed the imbalance in binary-class datasets, this study focuses on multi-class datasets. A comparison of ten resampling methods (SMOTE, Adasyn, Distance SMOTE, BorderLineSMOTE, KmeansSMOTE, SVMSMOTE, LN SMOTE, MWSMOTE, Safe Level SMOTE, and SMOTETomek) is conducted alongside nine classification models: K-Nearest Neighbors (KNN), Linear Discriminant Analysis (LDA), Quadratic Discriminant Analysis (QDA), Support Vector Machine (SVM), Logistic Regression (LR), Extra Tree (ET), Random Forest (RT), Extreme Gradient Boosting (XGB), and Ada Boost (AdaB). Following a rigorous evaluation, including hyperparameter tuning and 10 fold cross-validations, KNN with SmoteTomek attains the highest accuracy of 83.7%, as demonstrated through an ablation study. These results emphasize SMOTETomek’s effectiveness in mitigating class imbalance in educational datasets and highlight KNN’s potential as an educational data mining classifier.
摘要 预测学生的学业成绩是一个重要的研究领域,然而以不平等的学业水平代表性为特征的不平衡教育数据集给分类器带来了挑战。之前的研究已经解决了二元类数据集的不平衡问题,而本研究则侧重于多类数据集。本研究比较了十种重采样方法(SMOTE、Adasyn、Distance SMOTE、BorderLineSMOTE、KmeansSMOTE、SVMSMOTE、LN SMOTE、MWSMOTE、Safe Level SMOTE 和 SMOTETomek)和九种分类模型:K-Nearest Neighbors (KNN)、Linear Discriminant Analysis (LDA)、Qadratic Discriminant Analysis (QDA)、Support Vector Machine (SVM)、Logistic Regression (LR)、Extra Tree (ET)、Random Forest (RT)、Extreme Gradient Boosting (XGB) 和 Ada Boost (AdaB)。经过严格的评估,包括超参数调整和 10 倍交叉验证,使用 SmoteTomek 的 KNN 获得了 83.7% 的最高准确率,这在一项消融研究中得到了证明。这些结果表明,SMOTETomek 能有效缓解教育数据集中的类不平衡问题,并凸显了 KNN 作为教育数据挖掘分类器的潜力。
{"title":"Comparing Different Oversampling Methods in Predicting Multi-Class Educational Datasets Using Machine Learning Techniques","authors":"Muhammad Arham Tariq, Allah Bux Sargano, Muhammad Aksam Iftikhar, Z. Habib","doi":"10.2478/cait-2023-0044","DOIUrl":"https://doi.org/10.2478/cait-2023-0044","url":null,"abstract":"Abstract Predicting students’ academic performance is a critical research area, yet imbalanced educational datasets, characterized by unequal academic-level representation, present challenges for classifiers. While prior research has addressed the imbalance in binary-class datasets, this study focuses on multi-class datasets. A comparison of ten resampling methods (SMOTE, Adasyn, Distance SMOTE, BorderLineSMOTE, KmeansSMOTE, SVMSMOTE, LN SMOTE, MWSMOTE, Safe Level SMOTE, and SMOTETomek) is conducted alongside nine classification models: K-Nearest Neighbors (KNN), Linear Discriminant Analysis (LDA), Quadratic Discriminant Analysis (QDA), Support Vector Machine (SVM), Logistic Regression (LR), Extra Tree (ET), Random Forest (RT), Extreme Gradient Boosting (XGB), and Ada Boost (AdaB). Following a rigorous evaluation, including hyperparameter tuning and 10 fold cross-validations, KNN with SmoteTomek attains the highest accuracy of 83.7%, as demonstrated through an ablation study. These results emphasize SMOTETomek’s effectiveness in mitigating class imbalance in educational datasets and highlight KNN’s potential as an educational data mining classifier.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139294540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust Email Spam Filtering Using a Hybrid of Grey Wolf Optimiser and Naive Bayes Classifier 使用灰狼优化器和奈非贝叶斯分类器的混合方法进行稳健的垃圾邮件过滤
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0037
J. Zraqou, Adnan H. Al-Helali, Waleed Maqableh, H. Fakhouri, Wesam Alkhadour
Abstract Effective spam filtering plays a crucial role in enhancing user experience by sparing them from unwanted messages. This imperative underscores the importance of safeguarding email systems, prompting scholars across diverse fields to delve deeper into this subject. The primary objective of this research is to mitigate the disruptive effects of spam on email usage by introducing improved security measures compared to existing methods. This goal can be accomplished through the development of a novel spam filtering technique designed to prevent spam from infiltrating users’ inboxes. Consequently, a hybrid filtering approach that combines an information gain philter and a Wrapper Grey Wolf Optimizer feature selection algorithm with a Naive Bayes Classifier, is proposed, denoted as GWO-NBC. This research is rigorously tested using the WEKA software and the SPAMBASE dataset. Thorough performance evaluations demonstrated that the proposed approach surpasses existing solutions in terms of both security and accuracy.
摘要 有效的垃圾邮件过滤在提高用户体验方面发挥着至关重要的作用,使用户免受不需要的邮件的困扰。这种必要性凸显了保护电子邮件系统的重要性,促使不同领域的学者深入研究这一课题。本研究的主要目标是通过引入比现有方法更好的安全措施,减轻垃圾邮件对电子邮件使用的破坏性影响。这一目标可以通过开发一种新型垃圾邮件过滤技术来实现,该技术旨在防止垃圾邮件渗入用户的收件箱。因此,我们提出了一种混合过滤方法,该方法将信息增益法和 Wrapper Grey Wolf Optimizer 特征选择算法与 Naive Bayes 分类器相结合,称为 GWO-NBC。这项研究使用 WEKA 软件和 SPAMBASE 数据集进行了严格测试。全面的性能评估表明,所提出的方法在安全性和准确性方面都超越了现有的解决方案。
{"title":"Robust Email Spam Filtering Using a Hybrid of Grey Wolf Optimiser and Naive Bayes Classifier","authors":"J. Zraqou, Adnan H. Al-Helali, Waleed Maqableh, H. Fakhouri, Wesam Alkhadour","doi":"10.2478/cait-2023-0037","DOIUrl":"https://doi.org/10.2478/cait-2023-0037","url":null,"abstract":"Abstract Effective spam filtering plays a crucial role in enhancing user experience by sparing them from unwanted messages. This imperative underscores the importance of safeguarding email systems, prompting scholars across diverse fields to delve deeper into this subject. The primary objective of this research is to mitigate the disruptive effects of spam on email usage by introducing improved security measures compared to existing methods. This goal can be accomplished through the development of a novel spam filtering technique designed to prevent spam from infiltrating users’ inboxes. Consequently, a hybrid filtering approach that combines an information gain philter and a Wrapper Grey Wolf Optimizer feature selection algorithm with a Naive Bayes Classifier, is proposed, denoted as GWO-NBC. This research is rigorously tested using the WEKA software and the SPAMBASE dataset. Thorough performance evaluations demonstrated that the proposed approach surpasses existing solutions in terms of both security and accuracy.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization Models and Strategy Approaches Dealing with Economic Crises, Natural Disasters, and Pandemics – An Overview 应对经济危机、自然灾害和大流行病的优化模型和战略方法 - 概述
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0033
V. Guliashki, L. Kirilov, Alsa B. Nuzi
Abstract The occurrence of large-scale crises is a great challenge for people. In such cases, many levels of public life are affected and recovery takes time and considerable resources. Therefore, approaches and tools for predicting and preventing crises, as well as models and methods for crisis management and crisis overcoming, are necessary. In this review, we present approaches, models, and methods that support decision-making in relation to the prevention and resolution of large-scale crises. We divide crises into three types: natural disasters, pandemics, and economic crises. For each type of crisis situation, the types of applied tasks that are solved and the corresponding models and methods that are used to support decision-makers in overcoming the crises are discussed. Conclusions are drawn on the state of the art in this area and some directions for future work are outlined.
摘要 大规模危机的发生对人们来说是一个巨大的挑战。在这种情况下,公共生活的许多层面都会受到影响,恢复需要时间和大量资源。因此,预测和预防危机的方法和工具,以及危机管理和危机克服的模型和方法都是必要的。在本综述中,我们介绍了支持预防和解决大规模危机决策的方法、模式和手段。我们将危机分为三类:自然灾害、大流行病和经济危机。针对每种危机情况,我们讨论了所要解决的应用任务类型,以及用于支持决策者克服危机的相应模型和方法。对这一领域的技术现状得出了结论,并概述了未来工作的一些方向。
{"title":"Optimization Models and Strategy Approaches Dealing with Economic Crises, Natural Disasters, and Pandemics – An Overview","authors":"V. Guliashki, L. Kirilov, Alsa B. Nuzi","doi":"10.2478/cait-2023-0033","DOIUrl":"https://doi.org/10.2478/cait-2023-0033","url":null,"abstract":"Abstract The occurrence of large-scale crises is a great challenge for people. In such cases, many levels of public life are affected and recovery takes time and considerable resources. Therefore, approaches and tools for predicting and preventing crises, as well as models and methods for crisis management and crisis overcoming, are necessary. In this review, we present approaches, models, and methods that support decision-making in relation to the prevention and resolution of large-scale crises. We divide crises into three types: natural disasters, pandemics, and economic crises. For each type of crisis situation, the types of applied tasks that are solved and the corresponding models and methods that are used to support decision-makers in overcoming the crises are discussed. Conclusions are drawn on the state of the art in this area and some directions for future work are outlined.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Improved Product Recommender System Using Collaborative Filtering and a Comparative Study of ML Algorithms 使用协作过滤的改进型产品推荐系统及 ML 算法比较研究
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0035
S. Amutha, R. Vikram Surya
Abstract One of the methods most frequently used to recommend films is collaborative filtering. We examine the potential of collaborative filtering in our paper’s discussion of product suggestions. In addition to utilizing collaborative filtering in a new application, the proposed system will present a better technique that focuses especially on resolving the cold start issue. The suggested system will compute similarity using the Pearson Correlation Coefficient (PCC). Collaborative filtering that uses PCC suffers from the cold start problem or a lack of information on new users to generate useful recommendations. The proposed system solves the issue of cold start by gauging each new user by certain arbitrary parameters and recommending based on the choices of other users in that demographic. The proposed system also solves the issue of users’ reluctance to provide ratings by implementing a keyword-based perception system that will aid users in finding the right product for them.
摘要 最常用于推荐电影的方法之一是协同过滤法。在本文关于产品建议的讨论中,我们研究了协同过滤的潜力。除了在新的应用中使用协同过滤技术外,建议的系统还将提出一种更好的技术,尤其侧重于解决冷启动问题。建议的系统将使用皮尔逊相关系数(PCC)计算相似性。使用 PCC 的协同过滤存在冷启动问题,或者缺乏新用户信息,无法生成有用的推荐。提议的系统解决了冷启动问题,它通过某些任意参数来衡量每个新用户,并根据该人群中其他用户的选择进行推荐。拟议系统还通过实施基于关键字的感知系统,帮助用户找到适合自己的产品,从而解决了用户不愿提供评价的问题。
{"title":"An Improved Product Recommender System Using Collaborative Filtering and a Comparative Study of ML Algorithms","authors":"S. Amutha, R. Vikram Surya","doi":"10.2478/cait-2023-0035","DOIUrl":"https://doi.org/10.2478/cait-2023-0035","url":null,"abstract":"Abstract One of the methods most frequently used to recommend films is collaborative filtering. We examine the potential of collaborative filtering in our paper’s discussion of product suggestions. In addition to utilizing collaborative filtering in a new application, the proposed system will present a better technique that focuses especially on resolving the cold start issue. The suggested system will compute similarity using the Pearson Correlation Coefficient (PCC). Collaborative filtering that uses PCC suffers from the cold start problem or a lack of information on new users to generate useful recommendations. The proposed system solves the issue of cold start by gauging each new user by certain arbitrary parameters and recommending based on the choices of other users in that demographic. The proposed system also solves the issue of users’ reluctance to provide ratings by implementing a keyword-based perception system that will aid users in finding the right product for them.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139305308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convex Least Angle Regression Based LASSO Feature Selection and Swish Activation Function Model for Startup Survival Rate 基于 LASSO 特征选择和 Swish 激活函数模型的凸最小角回归法计算启动存活率
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0039
Ramakrishna Allu, V. N. R. Padmanabhuni
Abstract A startup is a recently established business venture led by entrepreneurs, to create and offer new products or services. The discovery of promising startups is a challenging task for creditors, policymakers, and investors. Therefore, the startup survival rate prediction is required to be developed for the success/failure of startup companies. In this paper, the feature selection using the Convex Least Angle Regression Least Absolute Shrinkage and Selection Operator (CLAR-LASSO) is proposed to improve the classification of startup survival rate prediction. The Swish Activation Function based Long Short-Term Memory (SAFLSTM) is developed for classifying the survival rate of startups. Further, the Local Interpretable Model-agnostic Explanations (LIME) model interprets the predicted classification to the user. Existing research such as Hyper Parameter Tuning (HPT)-Logistic regression, HPT-Support Vector Machine (SVM), HPT-XGBoost, and SAFLSTM are used to compare the CLAR-LASSO. The accuracy of the CLAR-LASSO is 95.67% which is high when compared to the HPT-Logistic regression, HPT-SVM, HPT-XGBoost, and SAFLSTM.
摘要 初创企业是最近成立的企业,由创业者领导,创造并提供新产品或服务。对于债权人、决策者和投资者来说,发现有前途的初创企业是一项具有挑战性的任务。因此,需要开发初创企业存活率预测工具来预测初创企业的成败。本文提出使用凸最小角回归最小绝对收缩和选择操作符(CLAR-LASSO)进行特征选择,以改进初创企业存活率预测的分类。开发了基于 Swish 激活函数的长短期记忆(SAFLSTM),用于对初创企业的存活率进行分类。此外,本地可解释模型-不可知解释(LIME)模型可向用户解释预测的分类。现有的研究,如超参数调整(HPT)-逻辑回归、HPT-支持向量机(SVM)、HPT-XGBoost 和 SAFLSTM,都被用于比较 CLAR-LASSO。与 HPT 逻辑回归、HPT-SVM、HPT-XGBoost 和 SAFLSTM 相比,CLAR-LASSO 的准确率高达 95.67%。
{"title":"Convex Least Angle Regression Based LASSO Feature Selection and Swish Activation Function Model for Startup Survival Rate","authors":"Ramakrishna Allu, V. N. R. Padmanabhuni","doi":"10.2478/cait-2023-0039","DOIUrl":"https://doi.org/10.2478/cait-2023-0039","url":null,"abstract":"Abstract A startup is a recently established business venture led by entrepreneurs, to create and offer new products or services. The discovery of promising startups is a challenging task for creditors, policymakers, and investors. Therefore, the startup survival rate prediction is required to be developed for the success/failure of startup companies. In this paper, the feature selection using the Convex Least Angle Regression Least Absolute Shrinkage and Selection Operator (CLAR-LASSO) is proposed to improve the classification of startup survival rate prediction. The Swish Activation Function based Long Short-Term Memory (SAFLSTM) is developed for classifying the survival rate of startups. Further, the Local Interpretable Model-agnostic Explanations (LIME) model interprets the predicted classification to the user. Existing research such as Hyper Parameter Tuning (HPT)-Logistic regression, HPT-Support Vector Machine (SVM), HPT-XGBoost, and SAFLSTM are used to compare the CLAR-LASSO. The accuracy of the CLAR-LASSO is 95.67% which is high when compared to the HPT-Logistic regression, HPT-SVM, HPT-XGBoost, and SAFLSTM.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Self-Exploration Scheme for Learning Optimal Policies against Dynamic Jamming Attacks in Cognitive Radio Networks 认知无线电网络中针对动态干扰攻击学习最优策略的新型自我探索方案
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0040
Y. Sudha, V. Sarasvathi
Abstract Cognitive Radio Networks (CRNs) present a compelling possibility to enable secondary users to take advantage of unused frequency bands in constrained spectrum resources. However, the network is vulnerable to a wide range of jamming attacks, which adversely affect its performance. Several countermeasures proposed in the literature require prior knowledge of the communication network and jamming strategy that are computationally intensive. These solutions may not be suitable for many real-world critical applications of the Internet of Things (IoT). Therefore, a novel self-exploration approach based on deep reinforcement learning is proposed to learn an optimal policy against dynamic attacks in CRN-based IoT applications. This method reduces computational complexity, without prior knowledge of the communication network or jamming strategy. A simulation of the proposed scheme eliminates interference effectively, consumes less power, and has a better Signal-to-Noise Ratio (SNR) than other algorithms. A platform-agnostic and efficient anti-jamming solution is provided to improve CRN’s performance when jamming occurs.
摘 要 认知无线电网络(CRN)为次级用户利用有限频谱资源中的闲置频段提供了令人信服的可能性。然而,这种网络容易受到各种干扰攻击,对其性能产生不利影响。文献中提出的一些对策需要事先了解通信网络和干扰策略,计算量很大。这些解决方案可能不适合物联网(IoT)在现实世界中的许多关键应用。因此,我们提出了一种基于深度强化学习的新型自我探索方法,用于在基于 CRN 的物联网应用中学习对抗动态攻击的最优策略。这种方法降低了计算复杂度,无需事先了解通信网络或干扰策略。对所提方案进行了仿真,与其他算法相比,该方案能有效消除干扰,功耗更低,信噪比(SNR)更好。该方案提供了一种与平台无关的高效抗干扰解决方案,可在发生干扰时提高 CRN 的性能。
{"title":"A Novel Self-Exploration Scheme for Learning Optimal Policies against Dynamic Jamming Attacks in Cognitive Radio Networks","authors":"Y. Sudha, V. Sarasvathi","doi":"10.2478/cait-2023-0040","DOIUrl":"https://doi.org/10.2478/cait-2023-0040","url":null,"abstract":"Abstract Cognitive Radio Networks (CRNs) present a compelling possibility to enable secondary users to take advantage of unused frequency bands in constrained spectrum resources. However, the network is vulnerable to a wide range of jamming attacks, which adversely affect its performance. Several countermeasures proposed in the literature require prior knowledge of the communication network and jamming strategy that are computationally intensive. These solutions may not be suitable for many real-world critical applications of the Internet of Things (IoT). Therefore, a novel self-exploration approach based on deep reinforcement learning is proposed to learn an optimal policy against dynamic attacks in CRN-based IoT applications. This method reduces computational complexity, without prior knowledge of the communication network or jamming strategy. A simulation of the proposed scheme eliminates interference effectively, consumes less power, and has a better Signal-to-Noise Ratio (SNR) than other algorithms. A platform-agnostic and efficient anti-jamming solution is provided to improve CRN’s performance when jamming occurs.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139295169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Competitive Parkinson-Based Binary Volleyball Premier League Metaheuristic Algorithm for Feature Selection 基于帕金森二元排球超级联赛元搜索算法的特征选择竞争算法
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0038
Edjola K. Naka
Abstract A novel proposed Binary Volleyball Premier League algorithm (BVPL) has shown some promising results in a Parkinson’s Disease (PD) dataset related to fitness and accuracy [1]. This paper evaluates and provides an overview of the efficiency of BVPL in feature selection compared to various metaheuristic optimization algorithms and PD datasets. Moreover, an improved variant of BVPL is proposed that integrates the opposite-based solution to enlarge search domains and increase the possibility of getting rid of the local optima. The performance of BVPL is validated using the accuracy of the k-Nearest Neighbor Algorithm. The superiority of BVPL over the competing algorithms for each dataset is measured using statistical tests. The conclusive results indicate that the BVPL exhibits significant competitiveness compared to most metaheuristic algorithms, thereby establishing its potential for accurate prediction of PD. Overall, BVPL shows high potential to be employed in feature selection.
摘要 一种新提出的二进制排球超级联赛算法(BVPL)在帕金森病(PD)数据集的适配性和准确性方面取得了一些有希望的结果[1]。本文评估并概述了 BVPL 在特征选择方面与各种元启发式优化算法和帕金森病数据集相比的效率。此外,本文还提出了 BVPL 的改进变体,该变体集成了基于相反方向的解决方案,从而扩大了搜索域,增加了摆脱局部最优的可能性。BVPL 的性能通过 k 近邻算法的准确性得到了验证。在每个数据集上,BVPL 相对于竞争算法的优越性都是通过统计检验来衡量的。最终结果表明,与大多数元启发式算法相比,BVPL 表现出了明显的竞争力,从而确立了其准确预测 PD 的潜力。总体而言,BVPL 在特征选择中显示出了巨大的应用潜力。
{"title":"A Competitive Parkinson-Based Binary Volleyball Premier League Metaheuristic Algorithm for Feature Selection","authors":"Edjola K. Naka","doi":"10.2478/cait-2023-0038","DOIUrl":"https://doi.org/10.2478/cait-2023-0038","url":null,"abstract":"Abstract A novel proposed Binary Volleyball Premier League algorithm (BVPL) has shown some promising results in a Parkinson’s Disease (PD) dataset related to fitness and accuracy [1]. This paper evaluates and provides an overview of the efficiency of BVPL in feature selection compared to various metaheuristic optimization algorithms and PD datasets. Moreover, an improved variant of BVPL is proposed that integrates the opposite-based solution to enlarge search domains and increase the possibility of getting rid of the local optima. The performance of BVPL is validated using the accuracy of the k-Nearest Neighbor Algorithm. The superiority of BVPL over the competing algorithms for each dataset is measured using statistical tests. The conclusive results indicate that the BVPL exhibits significant competitiveness compared to most metaheuristic algorithms, thereby establishing its potential for accurate prediction of PD. Overall, BVPL shows high potential to be employed in feature selection.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139298959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DoSRT: A Denial-of-Service Resistant Trust Model for VANET DoSRT:适用于 VANET 的抗拒绝服务信任模型
IF 1.2 Q2 Computer Science Pub Date : 2023-11-01 DOI: 10.2478/cait-2023-0042
Niharika Keshari, Dinesh Singh, Ashish Kumar Maurya
Abstract The Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack. The centralized approach is less efficient because the attack on the central trust manager leads to the overall failure of services. In comparison, the cluster-based decentralized approach faces overhead because of frequent changes in cluster members due to the high speed of the vehicles. Therefore, we have proposed a cluster-based Denial-of-Service Resistant Trust model (DoSRT). It improves decentralized trust management using speed deviation-based clustering and detects DoS attack based on the frequency of messages sent. Through performance evaluation, we have found that DoSRT improves precision, recall, accuracy, and F-Score by around 19%, 16%, 20%, and 17% in the presence of 30% DoS attackers.
摘要 拒绝服务(DoS)攻击威胁着车载无线网络(VANET)关键组件的可用性。为了确保 VANET 免受 DoS 攻击,人们提出了各种基于信任的集中式和分散式方法。集中式方法的效率较低,因为对中央信任管理器的攻击会导致整体服务失效。相比之下,基于集群的分散式方法由于车辆的高速行驶而导致集群成员的频繁变化,因此面临着开销问题。因此,我们提出了一种基于集群的抗拒绝服务信任模型(DoSRT)。它利用基于速度偏差的聚类改进了分散式信任管理,并根据发送信息的频率检测 DoS 攻击。通过性能评估,我们发现在存在 30% DoS 攻击者的情况下,DoSRT 的精确度、召回率、准确度和 F-Score 分别提高了约 19%、16%、20% 和 17%。
{"title":"DoSRT: A Denial-of-Service Resistant Trust Model for VANET","authors":"Niharika Keshari, Dinesh Singh, Ashish Kumar Maurya","doi":"10.2478/cait-2023-0042","DOIUrl":"https://doi.org/10.2478/cait-2023-0042","url":null,"abstract":"Abstract The Denial of Service (DoS) attack threatens the availability of key components of Vehicular Ad-hoc Network (VANET). Various centralized and decentralized trust-based approaches have been proposed to secure the VANET from DoS attack. The centralized approach is less efficient because the attack on the central trust manager leads to the overall failure of services. In comparison, the cluster-based decentralized approach faces overhead because of frequent changes in cluster members due to the high speed of the vehicles. Therefore, we have proposed a cluster-based Denial-of-Service Resistant Trust model (DoSRT). It improves decentralized trust management using speed deviation-based clustering and detects DoS attack based on the frequency of messages sent. Through performance evaluation, we have found that DoSRT improves precision, recall, accuracy, and F-Score by around 19%, 16%, 20%, and 17% in the presence of 30% DoS attackers.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139304633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1