Abstract The paper presents the statement of the problem of dynamical system „crane-load” optimal control. The acceleration period is under consideration and control must meet the minimum duration condition as well as load oscillations elimination. The objective function, which ensures the final condition satisfaction, is developed and analyzed in terms of its topology features. It includes three arguments and their searching is the essence of the benchmark problem. Two variants of the problem are proposed with varied objective function parameters. Twelve agent-based optimization algorithms have been applied to find solutions to a bunch of problems. A brief analysis of the performance of the algorithms reveals their weaknesses and advantages. Thus, the proposed real-world problem may be exploited to estimate the optimization algorithms’ search performance.
{"title":"A Real-World Benchmark Problem for Global Optimization","authors":"Romasevych Yuriy, Loveikin Viatcheslav, Bakay Borys","doi":"10.2478/cait-2023-0022","DOIUrl":"https://doi.org/10.2478/cait-2023-0022","url":null,"abstract":"Abstract The paper presents the statement of the problem of dynamical system „crane-load” optimal control. The acceleration period is under consideration and control must meet the minimum duration condition as well as load oscillations elimination. The objective function, which ensures the final condition satisfaction, is developed and analyzed in terms of its topology features. It includes three arguments and their searching is the essence of the benchmark problem. Two variants of the problem are proposed with varied objective function parameters. Twelve agent-based optimization algorithms have been applied to find solutions to a bunch of problems. A brief analysis of the performance of the algorithms reveals their weaknesses and advantages. Thus, the proposed real-world problem may be exploited to estimate the optimization algorithms’ search performance.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134995291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pundalik Chavan, Neelam Malyadri, Husna Tabassum, S. Supreeth, P. V. Bhaskar Reddy, Gururaj Murtugudde, S. Rohith, S. R. Manjunath, H. C. Ramaprasad
Abstract Wireless networks have become essential in daily life, with a growing number of base stations and connected devices. However, increasing traffic and energy consumption pose challenges. This research proposes a Dual Step Hybrid Mechanism (DSHM) for energy optimization, incorporating MIMO technologies. The first step introduces an optimal algorithm that iteratively updates the probability distribution to achieve the best solution. The second step focuses on reducing energy consumption while maximizing energy efficiency, using specific techniques and strategies to minimize usage without compromising energy maximization. The proposed approach is evaluated using parameter settings, including block length, path loss, hardware impairments, and bandwidth. The research investigates the impact of hardware impairments on energy efficiency and analyzes performance under different SINR constraints. The study also examines energy efficiency in active user density and base station density, highlighting the superior energy efficiency achieved by MIMO configurations.
{"title":"Dual-Step Hybrid Mechanism for Energy Efficiency Maximization in Wireless Network","authors":"Pundalik Chavan, Neelam Malyadri, Husna Tabassum, S. Supreeth, P. V. Bhaskar Reddy, Gururaj Murtugudde, S. Rohith, S. R. Manjunath, H. C. Ramaprasad","doi":"10.2478/cait-2023-0025","DOIUrl":"https://doi.org/10.2478/cait-2023-0025","url":null,"abstract":"Abstract Wireless networks have become essential in daily life, with a growing number of base stations and connected devices. However, increasing traffic and energy consumption pose challenges. This research proposes a Dual Step Hybrid Mechanism (DSHM) for energy optimization, incorporating MIMO technologies. The first step introduces an optimal algorithm that iteratively updates the probability distribution to achieve the best solution. The second step focuses on reducing energy consumption while maximizing energy efficiency, using specific techniques and strategies to minimize usage without compromising energy maximization. The proposed approach is evaluated using parameter settings, including block length, path loss, hardware impairments, and bandwidth. The research investigates the impact of hardware impairments on energy efficiency and analyzes performance under different SINR constraints. The study also examines energy efficiency in active user density and base station density, highlighting the superior energy efficiency achieved by MIMO configurations.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Wireless Sensor Networks (WSN) aggregate data from multiple sensors and transfer it to a central node. Sensor nodes should use as little energy as possible to aggregate data. This work has focused on optimal clustering and cluster head node selection to save energy. HyperGraphs (HGC) and cluster head selection based on distance and energy consumption are unique approaches to spectral clustering. GRA computes a relational matrix to select the cluster head. The network’s Moving Agent (MA) may use Hypergraphed Particle Swarm Optimization (HGPSO) to collect data from cluster heads. Compared to the clustering algorithm without agent movement, the HGC-GRA-HGPSO approach has increased residual energy by 5.59% and packets by 2.44%. It also has improved residual energy by 2.45% compared to Grey Wolf Optimizer-based Clustering (GWO-C).
{"title":"A Novel Hypergraph Clustered Gray Relational Analysis HGPSO Algorithm for Data Aggregation in WSN","authors":"Shailendra Pushkin, None Ranvijay","doi":"10.2478/cait-2023-0031","DOIUrl":"https://doi.org/10.2478/cait-2023-0031","url":null,"abstract":"Abstract Wireless Sensor Networks (WSN) aggregate data from multiple sensors and transfer it to a central node. Sensor nodes should use as little energy as possible to aggregate data. This work has focused on optimal clustering and cluster head node selection to save energy. HyperGraphs (HGC) and cluster head selection based on distance and energy consumption are unique approaches to spectral clustering. GRA computes a relational matrix to select the cluster head. The network’s Moving Agent (MA) may use Hypergraphed Particle Swarm Optimization (HGPSO) to collect data from cluster heads. Compared to the clustering algorithm without agent movement, the HGC-GRA-HGPSO approach has increased residual energy by 5.59% and packets by 2.44%. It also has improved residual energy by 2.45% compared to Grey Wolf Optimizer-based Clustering (GWO-C).","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract It has become a social and legal obligation to take into account environmental factors as well as economic factors when designing the supply chain network. Reducing the emission of harmful gases in supply chain operations, recycling and efficient use of resources must be taken into consideration for future generations. The supply chain created in this study, in addition to the abovementioned features, includes supplier selection, warehouse and distribution center setup, transportation amounts between facilities, and transportation modes of products to be transported. This model, which is a multi-objective multi-echelon green closed-loop supply chain, is a mixed integer linear mathematical model and tries to maximize the joint satisfaction of the objectives with the help of a fuzzy approach using Zimmermann’s minimum operator.
{"title":"A Fuzzy Programming Based Approach to a Multi-Objective Multi-Echelon Green Closed-Loop Supply Chain Problem","authors":"Koray Kocken, Beyza Ozkok, Hale Gonce Kocken","doi":"10.2478/cait-2023-0023","DOIUrl":"https://doi.org/10.2478/cait-2023-0023","url":null,"abstract":"Abstract It has become a social and legal obligation to take into account environmental factors as well as economic factors when designing the supply chain network. Reducing the emission of harmful gases in supply chain operations, recycling and efficient use of resources must be taken into consideration for future generations. The supply chain created in this study, in addition to the abovementioned features, includes supplier selection, warehouse and distribution center setup, transportation amounts between facilities, and transportation modes of products to be transported. This model, which is a multi-objective multi-echelon green closed-loop supply chain, is a mixed integer linear mathematical model and tries to maximize the joint satisfaction of the objectives with the help of a fuzzy approach using Zimmermann’s minimum operator.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis within the cybersecurity domain. By exploring these areas, the goal is to combat account takeovers and other fraudulent attempts effectively.
{"title":"User Behavior Analysis for Detecting Compromised User Accounts: A Review Paper","authors":"M. Jurišić, I. Tomičić, P. Grd","doi":"10.2478/cait-2023-0027","DOIUrl":"https://doi.org/10.2478/cait-2023-0027","url":null,"abstract":"Abstract The rise of online transactions has led to a corresponding increase in online criminal activities. Account takeover attacks, in particular, are challenging to detect, and novel approaches utilize machine learning to identify compromised accounts. This paper aims to conduct a literature review on account takeover detection and user behavior analysis within the cybersecurity domain. By exploring these areas, the goal is to combat account takeovers and other fraudulent attempts effectively.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135587780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Boriana Vatchova, Yordanka Boneva, Alexander Gegov
Abstract This study presents design of traffic light system with feedback control that considers a crossroad in an urban area. Two types of controllers are designed – fuzzy and analytical, which have been tested separately on Aimsun platform through a simulation. The aim of the study is to compare the performance of both controllers in terms of increasing traffic flow and decreasing queue length. The controllers manage the duration of the green light according to the traffic flow. Two different formal models are designed, tested, and compared. They have produced adequate solutions in terms of developing controllers for modeling and simulation of transportation tasks.
{"title":"Modelling and Simulation of Traffic Light Control","authors":"Boriana Vatchova, Yordanka Boneva, Alexander Gegov","doi":"10.2478/cait-2023-0032","DOIUrl":"https://doi.org/10.2478/cait-2023-0032","url":null,"abstract":"Abstract This study presents design of traffic light system with feedback control that considers a crossroad in an urban area. Two types of controllers are designed – fuzzy and analytical, which have been tested separately on Aimsun platform through a simulation. The aim of the study is to compare the performance of both controllers in terms of increasing traffic flow and decreasing queue length. The controllers manage the duration of the green light according to the traffic flow. Two different formal models are designed, tested, and compared. They have produced adequate solutions in terms of developing controllers for modeling and simulation of transportation tasks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.
{"title":"A Secure Peer-to-Peer Image Sharing Using Rubik’s Cube Algorithm and Key Distribution Centre","authors":"Aswani Kumar Cherukuri, Shria Sannuthi, Neha Elagandula, Rishita Gadamsetty, Neha Singh, Arnav Jain, I. Sumaiya Thaseen, V. Priya, Annapurna Jonnalagadda, Firuz Kamalov","doi":"10.2478/cait-2023-0029","DOIUrl":"https://doi.org/10.2478/cait-2023-0029","url":null,"abstract":"Abstract In this work, we build upon an implementation of a peer-to-peer image encryption algorithm: “Rubik’s cube algorithm”. The algorithm utilizes pixel-level scrambling and XOR-based diffusion, facilitated through the symmetric key. Empirical analysis has proven this algorithm to have the advantage of large key space, high-level security, high obscurity level, and high speed, aiding in secure image transmission over insecure channels. However, the base approach has drawbacks of key generation being handled client-side (at nodes) and the process is time-consuming due to dynamically generating keys. Our work solves these issues by introducing a Key Distribution Center (KDC) to distribute symmetric keys for transmission, increasing confidentiality, and reducing key-generation overhead on nodes. Three approaches utilizing the KDC are presented, communicating the dimensions with KDC to generate keys, standardizing any image to fixed dimensions to standardize key-generation, and lastly, using a single session key which is cyclically iterated over, emulating different dimensions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135588228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk scores. While many adaptive security mechanisms have been proposed, they confine identities only to users. This paper also considers devices as having an identity and categorizes them as safe or unsafe devices. Further, results are displayed on a dashboard, making it easy for security administrators to analyze and make wise decisions like multifactor authentication, mitigation, or any other access control decisions as such.
{"title":"Defending Against Identity Threats Using Risk-Based Authentication","authors":"Lalitha Sravanti Dasu, Mannav Dhamija, Gurram Dishitha, Ajith Vivekanandan, V. Sarasvathi","doi":"10.2478/cait-2023-0016","DOIUrl":"https://doi.org/10.2478/cait-2023-0016","url":null,"abstract":"Abstract Defending against identity-based threats, which have predominantly increased in the era of remote access and working, requires non-conventional, dynamic, intelligent, and strategic means of authenticating and authorizing. This paper aims at devising detailed risk-scoring algorithms for five real-time use cases to make identity security adaptive and risk-based. Zero-trust principles are incorporated by collecting sign-in logs and analyzing them continually to check for any anomalies, making it a dynamic approach. Users are categorized as risky and non-risky based on the calculated risk scores. While many adaptive security mechanisms have been proposed, they confine identities only to users. This paper also considers devices as having an identity and categorizes them as safe or unsafe devices. Further, results are displayed on a dashboard, making it easy for security administrators to analyze and make wise decisions like multifactor authentication, mitigation, or any other access control decisions as such.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41496584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract A novel approach to modeling stochastic processes of goods exchange between multiple agents is presented, considering the possibility of optimizing the environment's characteristics and individual decision-making strategies. The proposed model makes it possible to form optimal states when choosing the moments of concluding barter and monetary transactions at the individual level of each agent maximizing the utility function. A new parallel hybrid Real-Coded Genetic Algorithm and Particle Swarm Optimization (RCGA-PSO) has been developed, combining methods of evolutionary selection based on well-known heuristic operators with methods of swarm optimization and machine learning. The algorithm is characterized by the best time efficiency and accuracy in comparison with other methods. The software implementation of the developed algorithm and model has been performed using the FLAME GPU framework. The possibility of using the RCGA-PSO Algorithm to optimize the characteristics of the environment and strategies for making individual decisions by agents involved in barter and monetary interactions is demonstrated.
{"title":"Optimization of Characteristics for a Stochastic Agent-Based Model of Goods Exchange with the Use of Parallel Hybrid Genetic Algorithm","authors":"A. Akopov, A. Beklaryan, A. Zhukova","doi":"10.2478/cait-2023-0015","DOIUrl":"https://doi.org/10.2478/cait-2023-0015","url":null,"abstract":"Abstract A novel approach to modeling stochastic processes of goods exchange between multiple agents is presented, considering the possibility of optimizing the environment's characteristics and individual decision-making strategies. The proposed model makes it possible to form optimal states when choosing the moments of concluding barter and monetary transactions at the individual level of each agent maximizing the utility function. A new parallel hybrid Real-Coded Genetic Algorithm and Particle Swarm Optimization (RCGA-PSO) has been developed, combining methods of evolutionary selection based on well-known heuristic operators with methods of swarm optimization and machine learning. The algorithm is characterized by the best time efficiency and accuracy in comparison with other methods. The software implementation of the developed algorithm and model has been performed using the FLAME GPU framework. The possibility of using the RCGA-PSO Algorithm to optimize the characteristics of the environment and strategies for making individual decisions by agents involved in barter and monetary interactions is demonstrated.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41246334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abstract Due to the highly volatile tendency of Bitcoin, there is a necessity for a better price prediction model. Only a few researchers have focused on the feasibility to apply various modelling approaches. These approaches may prone to have low convergence issues in outcomes and acquire high computation time. Hence a model is put forward based on machine learning techniques using regression algorithm and Particle Swarm Optimization with XGBoost algorithm, for more precise prediction outcomes of three cryptocurrencies; Bitcoin, Dogecoin, and Ethereum. The approach uses time series that consists of daily price information of cryptocurrencies. In this paper, the XGBoost algorithm is incorporated with an enhanced PSO method to tune the optimal hyper-parameters to yield out better prediction output rate. The comparative assessment delineated that the proposed method shows less root mean squared error, mean absolute error and mean squared error values. In this aspect, the proposed model stands predominant in showing high efficiency of prediction rate.
{"title":"Cryptocurrency Price Prediction Using Enhanced PSO with Extreme Gradient Boosting Algorithm","authors":"Vibha Srivastava, V. Dwivedi, Ashutosh Singh","doi":"10.2478/cait-2023-0020","DOIUrl":"https://doi.org/10.2478/cait-2023-0020","url":null,"abstract":"Abstract Due to the highly volatile tendency of Bitcoin, there is a necessity for a better price prediction model. Only a few researchers have focused on the feasibility to apply various modelling approaches. These approaches may prone to have low convergence issues in outcomes and acquire high computation time. Hence a model is put forward based on machine learning techniques using regression algorithm and Particle Swarm Optimization with XGBoost algorithm, for more precise prediction outcomes of three cryptocurrencies; Bitcoin, Dogecoin, and Ethereum. The approach uses time series that consists of daily price information of cryptocurrencies. In this paper, the XGBoost algorithm is incorporated with an enhanced PSO method to tune the optimal hyper-parameters to yield out better prediction output rate. The comparative assessment delineated that the proposed method shows less root mean squared error, mean absolute error and mean squared error values. In this aspect, the proposed model stands predominant in showing high efficiency of prediction rate.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41349785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}