首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
A Real-World Benchmark Problem for Global Optimization 一个真实世界的全局优化基准问题
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0022
Romasevych Yuriy, Loveikin Viatcheslav, Bakay Borys
Abstract The paper presents the statement of the problem of dynamical system „crane-load” optimal control. The acceleration period is under consideration and control must meet the minimum duration condition as well as load oscillations elimination. The objective function, which ensures the final condition satisfaction, is developed and analyzed in terms of its topology features. It includes three arguments and their searching is the essence of the benchmark problem. Two variants of the problem are proposed with varied objective function parameters. Twelve agent-based optimization algorithms have been applied to find solutions to a bunch of problems. A brief analysis of the performance of the algorithms reveals their weaknesses and advantages. Thus, the proposed real-world problem may be exploited to estimate the optimization algorithms’ search performance.
摘要本文给出了动力系统“起重机负荷”最优控制问题的表述。考虑了加速度周期,控制必须满足最小持续时间条件和消除负载振荡。对保证最终条件满足的目标函数,根据其拓扑特征进行了发展和分析。它包括三个参数,它们的搜索是基准问题的本质。提出了两种不同目标函数参数的问题变体。12种基于智能体的优化算法已经被应用于寻找一系列问题的解决方案。简要分析了这些算法的性能,揭示了它们的优缺点。因此,可以利用所提出的现实问题来估计优化算法的搜索性能。
{"title":"A Real-World Benchmark Problem for Global Optimization","authors":"Romasevych Yuriy, Loveikin Viatcheslav, Bakay Borys","doi":"10.2478/cait-2023-0022","DOIUrl":"https://doi.org/10.2478/cait-2023-0022","url":null,"abstract":"Abstract The paper presents the statement of the problem of dynamical system „crane-load” optimal control. The acceleration period is under consideration and control must meet the minimum duration condition as well as load oscillations elimination. The objective function, which ensures the final condition satisfaction, is developed and analyzed in terms of its topology features. It includes three arguments and their searching is the essence of the benchmark problem. Two variants of the problem are proposed with varied objective function parameters. Twelve agent-based optimization algorithms have been applied to find solutions to a bunch of problems. A brief analysis of the performance of the algorithms reveals their weaknesses and advantages. Thus, the proposed real-world problem may be exploited to estimate the optimization algorithms’ search performance.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dual-Step Hybrid Mechanism for Energy Efficiency Maximization in Wireless Network 无线网络能效最大化的双步混合机制
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0025
Pundalik Chavan, Neelam Malyadri, Husna Tabassum, S. Supreeth, P. V. Bhaskar Reddy, Gururaj Murtugudde, S. Rohith, S. R. Manjunath, H. C. Ramaprasad
Abstract Wireless networks have become essential in daily life, with a growing number of base stations and connected devices. However, increasing traffic and energy consumption pose challenges. This research proposes a Dual Step Hybrid Mechanism (DSHM) for energy optimization, incorporating MIMO technologies. The first step introduces an optimal algorithm that iteratively updates the probability distribution to achieve the best solution. The second step focuses on reducing energy consumption while maximizing energy efficiency, using specific techniques and strategies to minimize usage without compromising energy maximization. The proposed approach is evaluated using parameter settings, including block length, path loss, hardware impairments, and bandwidth. The research investigates the impact of hardware impairments on energy efficiency and analyzes performance under different SINR constraints. The study also examines energy efficiency in active user density and base station density, highlighting the superior energy efficiency achieved by MIMO configurations.
随着越来越多的基站和连接设备的出现,无线网络已经成为人们日常生活中必不可少的一部分。然而,日益增长的交通和能源消耗带来了挑战。本研究提出一种结合MIMO技术的能量优化双阶混合机制(DSHM)。第一步引入最优算法,迭代更新概率分布以获得最佳解。第二步侧重于在最大限度提高能源效率的同时减少能源消耗,使用特定的技术和策略在不损害能源最大化的情况下最大限度地减少使用。所提出的方法使用参数设置进行评估,包括块长度,路径损失,硬件损伤和带宽。研究了硬件损伤对能效的影响,并分析了不同信噪比约束下的性能。该研究还考察了活跃用户密度和基站密度的能源效率,强调了MIMO配置所实现的卓越能源效率。
{"title":"Dual-Step Hybrid Mechanism for Energy Efficiency Maximization in Wireless Network","authors":"Pundalik Chavan, Neelam Malyadri, Husna Tabassum, S. Supreeth, P. V. Bhaskar Reddy, Gururaj Murtugudde, S. Rohith, S. R. Manjunath, H. C. Ramaprasad","doi":"10.2478/cait-2023-0025","DOIUrl":"https://doi.org/10.2478/cait-2023-0025","url":null,"abstract":"Abstract Wireless networks have become essential in daily life, with a growing number of base stations and connected devices. However, increasing traffic and energy consumption pose challenges. This research proposes a Dual Step Hybrid Mechanism (DSHM) for energy optimization, incorporating MIMO technologies. The first step introduces an optimal algorithm that iteratively updates the probability distribution to achieve the best solution. The second step focuses on reducing energy consumption while maximizing energy efficiency, using specific techniques and strategies to minimize usage without compromising energy maximization. The proposed approach is evaluated using parameter settings, including block length, path loss, hardware impairments, and bandwidth. The research investigates the impact of hardware impairments on energy efficiency and analyzes performance under different SINR constraints. The study also examines energy efficiency in active user density and base station density, highlighting the superior energy efficiency achieved by MIMO configurations.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Hypergraph Clustered Gray Relational Analysis HGPSO Algorithm for Data Aggregation in WSN 一种用于WSN数据聚合的超图聚类灰色关联分析HGPSO算法
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0031
Shailendra Pushkin, None Ranvijay
Abstract Wireless Sensor Networks (WSN) aggregate data from multiple sensors and transfer it to a central node. Sensor nodes should use as little energy as possible to aggregate data. This work has focused on optimal clustering and cluster head node selection to save energy. HyperGraphs (HGC) and cluster head selection based on distance and energy consumption are unique approaches to spectral clustering. GRA computes a relational matrix to select the cluster head. The network’s Moving Agent (MA) may use Hypergraphed Particle Swarm Optimization (HGPSO) to collect data from cluster heads. Compared to the clustering algorithm without agent movement, the HGC-GRA-HGPSO approach has increased residual energy by 5.59% and packets by 2.44%. It also has improved residual energy by 2.45% compared to Grey Wolf Optimizer-based Clustering (GWO-C).
无线传感器网络(WSN)将来自多个传感器的数据聚合并传输到一个中心节点。传感器节点应该使用尽可能少的能量来聚合数据。该工作主要集中在最优聚类和簇头节点的选择上,以节省能源。超图(HGC)和基于距离和能量消耗的簇头选择是光谱聚类的独特方法。GRA计算一个关系矩阵来选择簇头。网络的移动代理(MA)可以使用Hypergraphed Particle Swarm Optimization (HGPSO)从簇头收集数据。与不移动智能体的聚类算法相比,HGC-GRA-HGPSO方法的剩余能量和包数分别提高了5.59%和2.44%。与基于灰狼优化器的聚类(GWO-C)相比,它还提高了2.45%的剩余能量。
{"title":"A Novel Hypergraph Clustered Gray Relational Analysis HGPSO Algorithm for Data Aggregation in WSN","authors":"Shailendra Pushkin, None Ranvijay","doi":"10.2478/cait-2023-0031","DOIUrl":"https://doi.org/10.2478/cait-2023-0031","url":null,"abstract":"Abstract Wireless Sensor Networks (WSN) aggregate data from multiple sensors and transfer it to a central node. Sensor nodes should use as little energy as possible to aggregate data. This work has focused on optimal clustering and cluster head node selection to save energy. HyperGraphs (HGC) and cluster head selection based on distance and energy consumption are unique approaches to spectral clustering. GRA computes a relational matrix to select the cluster head. The network’s Moving Agent (MA) may use Hypergraphed Particle Swarm Optimization (HGPSO) to collect data from cluster heads. Compared to the clustering algorithm without agent movement, the HGC-GRA-HGPSO approach has increased residual energy by 5.59% and packets by 2.44%. It also has improved residual energy by 2.45% compared to Grey Wolf Optimizer-based Clustering (GWO-C).","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Programming Based Approach to a Multi-Objective Multi-Echelon Green Closed-Loop Supply Chain Problem 基于模糊规划的多目标多级绿色闭环供应链问题
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0023
Koray Kocken, Beyza Ozkok, Hale Gonce Kocken
Abstract It has become a social and legal obligation to take into account environmental factors as well as economic factors when designing the supply chain network. Reducing the emission of harmful gases in supply chain operations, recycling and efficient use of resources must be taken into consideration for future generations. The supply chain created in this study, in addition to the abovementioned features, includes supplier selection, warehouse and distribution center setup, transportation amounts between facilities, and transportation modes of products to be transported. This model, which is a multi-objective multi-echelon green closed-loop supply chain, is a mixed integer linear mathematical model and tries to maximize the joint satisfaction of the objectives with the help of a fuzzy approach using Zimmermann’s minimum operator.
在设计供应链网络时,兼顾环境因素和经济因素已成为一种社会和法律义务。在供应链运营中减少有害气体的排放,资源的回收和有效利用必须考虑到子孙后代。本研究所创建的供应链,除上述特征外,还包括供应商的选择、仓库和配送中心的设置、设施之间的运输量、被运输产品的运输方式。该模型是一个多目标多梯次绿色闭环供应链,是一个混合整数线性数学模型,利用Zimmermann最小算子的模糊方法,试图使目标的联合满意度最大化。
{"title":"A Fuzzy Programming Based Approach to a Multi-Objective Multi-Echelon Green Closed-Loop Supply Chain Problem","authors":"Koray Kocken, Beyza Ozkok, Hale Gonce Kocken","doi":"10.2478/cait-2023-0023","DOIUrl":"https://doi.org/10.2478/cait-2023-0023","url":null,"abstract":"Abstract It has become a social and legal obligation to take into account environmental factors as well as economic factors when designing the supply chain network. Reducing the emission of harmful gases in supply chain operations, recycling and efficient use of resources must be taken into consideration for future generations. The supply chain created in this study, in addition to the abovementioned features, includes supplier selection, warehouse and distribution center setup, transportation amounts between facilities, and transportation modes of products to be transported. This model, which is a multi-objective multi-echelon green closed-loop supply chain, is a mixed integer linear mathematical model and tries to maximize the joint satisfaction of the objectives with the help of a fuzzy approach using Zimmermann’s minimum operator.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper 用于检测受损用户帐户的用户行为分析:一篇综述论文
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0027
M. Jurišić, I. Tomičić, P. Grd
Abstract The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis within the cybersecurity domain. By exploring these areas, the goal is to combat account takeovers and other fraudulent attempts effectively.
随着网络交易的增多,网络犯罪活动也相应增多。账户接管攻击尤其难以检测,新方法利用机器学习来识别受损账户。本文旨在对网络安全领域的账户接管检测和用户行为分析进行文献综述。通过探索这些领域,目标是有效地打击账户接管和其他欺诈企图。
{"title":"User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper","authors":"M. Jurišić, I. Tomičić, P. Grd","doi":"10.2478/cait-2023-0027","DOIUrl":"https://doi.org/10.2478/cait-2023-0027","url":null,"abstract":"Abstract The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis within the cybersecurity domain. By exploring these areas, the goal is to combat account takeovers and other fraudulent attempts effectively.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling and Simulation of Traffic Light Control 交通信号灯控制的建模与仿真
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0032
Boriana Vatchova, Yordanka Boneva, Alexander Gegov
Abstract This study presents design of traffic light system with feedback control that considers a crossroad in an urban area. Two types of controllers are designed – fuzzy and analytical, which have been tested separately on Aimsun platform through a simulation. The aim of the study is to compare the performance of both controllers in terms of increasing traffic flow and decreasing queue length. The controllers manage the duration of the green light according to the traffic flow. Two different formal models are designed, tested, and compared. They have produced adequate solutions in terms of developing controllers for modeling and simulation of transportation tasks.
摘要:本文研究了一种基于反馈控制的城市十字路口交通灯系统设计。设计了模糊控制器和解析控制器两种类型的控制器,并分别在Aimsun平台上进行了仿真测试。本研究的目的是比较两种控制器在增加交通流量和减少队列长度方面的性能。控制器根据交通流量来管理绿灯的持续时间。设计、测试和比较了两种不同的形式化模型。他们在开发用于建模和模拟运输任务的控制器方面提出了适当的解决方案。
{"title":"Modelling and Simulation of Traffic Light Control","authors":"Boriana Vatchova, Yordanka Boneva, Alexander Gegov","doi":"10.2478/cait-2023-0032","DOIUrl":"https://doi.org/10.2478/cait-2023-0032","url":null,"abstract":"Abstract This study presents design of traffic light system with feedback control that considers a crossroad in an urban area. Two types of controllers are designed – fuzzy and analytical, which have been tested separately on Aimsun platform through a simulation. The aim of the study is to compare the performance of both controllers in terms of increasing traffic flow and decreasing queue length. The controllers manage the duration of the green light according to the traffic flow. Two different formal models are designed, tested, and compared. They have produced adequate solutions in terms of developing controllers for modeling and simulation of transportation tasks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre 基于魔方算法和密钥分发中心的安全点对点图像共享
Q2 Computer Science Pub Date : 2023-09-01 DOI: 10.2478/cait-2023-0029
Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov
Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.
在这项工作中,我们建立了一个点对点图像加密算法的实现:“魔方算法”。该算法利用像素级置乱和基于xor的扩散,通过对称密钥实现。实证分析表明,该算法具有密钥空间大、安全性高、模糊度高、速度快等优点,有助于在不安全的信道上实现图像的安全传输。但是,基本方法的缺点是需要在客户端(在节点上)处理密钥生成,并且由于动态生成密钥,该过程非常耗时。我们的工作通过引入密钥分发中心(KDC)来分发用于传输的对称密钥、提高机密性并减少节点上的密钥生成开销来解决这些问题。提出了三种利用KDC的方法:将维度与KDC通信以生成密钥;将任何映像标准化为固定维度以标准化密钥生成;最后,使用循环迭代的单个会话密钥来模拟不同的维度。
{"title":"A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre","authors":"Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov","doi":"10.2478/cait-2023-0029","DOIUrl":"https://doi.org/10.2478/cait-2023-0029","url":null,"abstract":"Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defending Against Identity Threats Using Risk-Based Authentication 使用基于风险的身份验证防御身份威胁
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0016
Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi
Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk scores. While many adaptive security mechanisms have been proposed, they confine identities only to users. This paper also considers devices as having an identity and categorizes them as safe or unsafe devices. Further, results are displayed on a dashboard, making it easy for security administrators to analyze and make wise decisions like multifactor authentication, mitigation, or any other access control decisions as such.
摘要防范基于身份的威胁,这种威胁在远程访问和工作时代显著增加,需要非常规、动态、智能和战略性的身份验证和授权手段。本文旨在为五个实时用例设计详细的风险评分算法,使身份安全具有自适应性和基于风险的特点。零信任原则是通过收集登录日志并不断分析这些日志来检查任何异常情况而纳入的,使其成为一种动态方法。根据计算出的风险得分,将用户分为有风险和无风险两类。虽然已经提出了许多自适应安全机制,但它们仅将身份限制在用户身上。本文还将设备视为具有身份,并将其归类为安全或不安全设备。此外,结果显示在仪表板上,使安全管理员能够轻松分析并做出明智的决策,如多因素身份验证、缓解或任何其他访问控制决策。
{"title":"Defending Against Identity Threats Using Risk-Based Authentication","authors":"Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi","doi":"10.2478/cait-2023-0016","DOIUrl":"https://doi.org/10.2478/cait-2023-0016","url":null,"abstract":"Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk scores. While many adaptive security mechanisms have been proposed, they confine identities only to users. This paper also considers devices as having an identity and categorizes them as safe or unsafe devices. Further, results are displayed on a dashboard, making it easy for security administrators to analyze and make wise decisions like multifactor authentication, mitigation, or any other access control decisions as such.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41496584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimization of Characteristics for a Stochastic Agent-Based Model of Goods Exchange with the Use of Parallel Hybrid Genetic Algorithm 用并行混合遗传算法优化基于随机Agent的货物交换模型的特性
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0015
A. Akopov, A. Beklaryan, A. Zhukova
Abstract A novel approach to modeling stochastic processes of goods exchange between multiple agents is presented, considering the possibility of optimizing the environment's characteristics and individual decision-making strategies. The proposed model makes it possible to form optimal states when choosing the moments of concluding barter and monetary transactions at the individual level of each agent maximizing the utility function. A new parallel hybrid Real-Coded Genetic Algorithm and Particle Swarm Optimization (RCGA-PSO) has been developed, combining methods of evolutionary selection based on well-known heuristic operators with methods of swarm optimization and machine learning. The algorithm is characterized by the best time efficiency and accuracy in comparison with other methods. The software implementation of the developed algorithm and model has been performed using the FLAME GPU framework. The possibility of using the RCGA-PSO Algorithm to optimize the characteristics of the environment and strategies for making individual decisions by agents involved in barter and monetary interactions is demonstrated.
摘要考虑到优化环境特征和个体决策策略的可能性,提出了一种新的方法来建模多个主体之间货物交换的随机过程。所提出的模型使得在每个主体的个体水平上选择达成易货和货币交易的时刻时能够形成最优状态,从而最大化效用函数。将基于著名启发式算子的进化选择方法与群体优化和机器学习方法相结合,提出了一种新的并行混合实数编码遗传算法和粒子群优化(RCGA-PSO)。与其他方法相比,该算法具有最佳的时间效率和准确性。所开发的算法和模型的软件实现是使用FLAME GPU框架进行的。证明了使用RCGA-PSO算法优化环境特征的可能性,以及参与易货和货币互动的代理人做出个人决策的策略。
{"title":"Optimization of Characteristics for a Stochastic Agent-Based Model of Goods Exchange with the Use of Parallel Hybrid Genetic Algorithm","authors":"A. Akopov, A. Beklaryan, A. Zhukova","doi":"10.2478/cait-2023-0015","DOIUrl":"https://doi.org/10.2478/cait-2023-0015","url":null,"abstract":"Abstract A novel approach to modeling stochastic processes of goods exchange between multiple agents is presented, considering the possibility of optimizing the environment's characteristics and individual decision-making strategies. The proposed model makes it possible to form optimal states when choosing the moments of concluding barter and monetary transactions at the individual level of each agent maximizing the utility function. A new parallel hybrid Real-Coded Genetic Algorithm and Particle Swarm Optimization (RCGA-PSO) has been developed, combining methods of evolutionary selection based on well-known heuristic operators with methods of swarm optimization and machine learning. The algorithm is characterized by the best time efficiency and accuracy in comparison with other methods. The software implementation of the developed algorithm and model has been performed using the FLAME GPU framework. The possibility of using the RCGA-PSO Algorithm to optimize the characteristics of the environment and strategies for making individual decisions by agents involved in barter and monetary interactions is demonstrated.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41246334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cryptocurrency Price Prediction Using Enhanced PSO with Extreme Gradient Boosting Algorithm 基于极限梯度提升算法的增强PSO加密货币价格预测
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0020
Vibha Srivastava, V. Dwivedi, Ashutosh Singh
Abstract Due to the highly volatile tendency of Bitcoin, there is a necessity for a better price prediction model. Only a few researchers have focused on the feasibility to apply various modelling approaches. These approaches may prone to have low convergence issues in outcomes and acquire high computation time. Hence a model is put forward based on machine learning techniques using regression algorithm and Particle Swarm Optimization with XGBoost algorithm, for more precise prediction outcomes of three cryptocurrencies; Bitcoin, Dogecoin, and Ethereum. The approach uses time series that consists of daily price information of cryptocurrencies. In this paper, the XGBoost algorithm is incorporated with an enhanced PSO method to tune the optimal hyper-parameters to yield out better prediction output rate. The comparative assessment delineated that the proposed method shows less root mean squared error, mean absolute error and mean squared error values. In this aspect, the proposed model stands predominant in showing high efficiency of prediction rate.
摘要由于比特币的高度波动性,有必要建立一个更好的价格预测模型。只有少数研究人员关注应用各种建模方法的可行性。这些方法可能倾向于在结果上具有低收敛性问题,并且获得高计算时间。因此,为了更精确地预测三种加密货币的结果,提出了一种基于机器学习技术的回归算法和XGBoost算法的粒子群优化模型;比特币、狗狗币和以太坊。该方法使用由加密货币的每日价格信息组成的时间序列。在本文中,XGBoost算法与增强的PSO方法相结合,以调整最优超参数,从而产生更好的预测输出率。比较评估表明,该方法显示出较小的均方根误差、均绝对误差和均方误差值。在这方面,所提出的模型在显示高预测率的效率方面占主导地位。
{"title":"Cryptocurrency Price Prediction Using Enhanced PSO with Extreme Gradient Boosting Algorithm","authors":"Vibha Srivastava, V. Dwivedi, Ashutosh Singh","doi":"10.2478/cait-2023-0020","DOIUrl":"https://doi.org/10.2478/cait-2023-0020","url":null,"abstract":"Abstract Due to the highly volatile tendency of Bitcoin, there is a necessity for a better price prediction model. Only a few researchers have focused on the feasibility to apply various modelling approaches. These approaches may prone to have low convergence issues in outcomes and acquire high computation time. Hence a model is put forward based on machine learning techniques using regression algorithm and Particle Swarm Optimization with XGBoost algorithm, for more precise prediction outcomes of three cryptocurrencies; Bitcoin, Dogecoin, and Ethereum. The approach uses time series that consists of daily price information of cryptocurrencies. In this paper, the XGBoost algorithm is incorporated with an enhanced PSO method to tune the optimal hyper-parameters to yield out better prediction output rate. The comparative assessment delineated that the proposed method shows less root mean squared error, mean absolute error and mean squared error values. In this aspect, the proposed model stands predominant in showing high efficiency of prediction rate.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41349785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1