首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution 安全气隙计算机遭黑客攻击分析及可能解决方案
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0017
Vrinda Sati, R. Muthalagu
Abstract The world today runs on data, every minuscule task to the large one requires data. All the data is stored in the various technologies that we use. And to keep data safe, air gaps are introduced. Air gaps are a network security measure where secure computer networks are physically isolated from unsecured networks. Yet, different methods to hack the air gap have come forth. The paper analyzes the problem of hacking an air gap via screen brightness modulations. The proposed solution is a software program used to alert the user of a change in the brightness level of the screen. The concept of Windows Management Instrumentation (WMI) has been used to put forth the software. Applied to an air-gapped computer, the program displays an alert box immediately, as the screen brightness changes. The solution is an easy and efficient way to counter the attack. The program can be further implemented in different testing environments and the WMI concept can be applied to various other cyber hacks.
当今世界以数据为基础,从小到大的任务都需要数据。所有的数据都存储在我们使用的各种技术中。为了保证数据安全,还引入了气隙。气隙是一种网络安全措施,将安全的计算机网络与不安全的网络物理隔离。然而,破解气隙的不同方法已经出现。本文分析了通过屏幕亮度调制来破解气隙的问题。提出的解决方案是一个软件程序,用于提醒用户屏幕亮度水平的变化。该软件采用了Windows管理工具(WMI)的概念。应用于气隙计算机时,当屏幕亮度发生变化时,该程序会立即显示一个警告框。解决方案是一种简单而有效的方法来对抗这种攻击。该程序可以在不同的测试环境中进一步实现,WMI概念可以应用于各种其他网络黑客。
{"title":"Analysis on Hacking the Secured Air-Gapped Computer and Possible Solution","authors":"Vrinda Sati, R. Muthalagu","doi":"10.2478/cait-2023-0017","DOIUrl":"https://doi.org/10.2478/cait-2023-0017","url":null,"abstract":"Abstract The world today runs on data, every minuscule task to the large one requires data. All the data is stored in the various technologies that we use. And to keep data safe, air gaps are introduced. Air gaps are a network security measure where secure computer networks are physically isolated from unsecured networks. Yet, different methods to hack the air gap have come forth. The paper analyzes the problem of hacking an air gap via screen brightness modulations. The proposed solution is a software program used to alert the user of a change in the brightness level of the screen. The concept of Windows Management Instrumentation (WMI) has been used to put forth the software. Applied to an air-gapped computer, the program displays an alert box immediately, as the screen brightness changes. The solution is an easy and efficient way to counter the attack. The program can be further implemented in different testing environments and the WMI concept can be applied to various other cyber hacks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43755359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Reference and Relation Extraction from Legal Documents with Enhanced Decoder Input 基于增强解码器输入的法律文件联合参考和关系提取
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0014
Nguyen Thi Thanh Thuy, Nguyen Ngoc Diep, Ngo Xuan Bach, Tu Minh Phuong
Abstract This paper deals with an important task in legal text processing, namely reference and relation extraction from legal documents, which includes two subtasks: 1) reference extraction; 2) relation determination. Motivated by the fact that two subtasks are related and share common information, we propose a joint learning model that solves simultaneously both subtasks. Our model employs a Transformer-based encoder-decoder architecture with non-autoregressive decoding that allows relaxing the sequentiality of traditional seq2seq models and extracting references and relations in one inference step. We also propose a method to enrich the decoder input with learnable meaningful information and therefore, improve the model accuracy. Experimental results on a dataset consisting of 5031 legal documents in Vietnamese with 61,446 references show that our proposed model performs better results than several strong baselines and achieves an F1 score of 99.4% for the joint reference and relation extraction task.
摘要:本文研究了法律文本处理中的一项重要任务,即从法律文件中提取参考文献和关系,包括两个子任务:1)参考文献提取;2)关系确定。基于两个子任务相互关联并共享共同信息的特点,提出了一种同时解决两个子任务的联合学习模型。我们的模型采用基于transformer的编码器-解码器架构,具有非自回归解码,允许放松传统seq2seq模型的顺序性,并在一个推理步骤中提取引用和关系。我们还提出了一种方法来丰富解码器输入的可学习的有意义的信息,从而提高模型的准确性。在包含5031份越南语法律文件和61446条参考文献的数据集上的实验结果表明,我们提出的模型比几个强基线的结果更好,在联合参考和关系提取任务中达到了99.4%的F1分数。
{"title":"Joint Reference and Relation Extraction from Legal Documents with Enhanced Decoder Input","authors":"Nguyen Thi Thanh Thuy, Nguyen Ngoc Diep, Ngo Xuan Bach, Tu Minh Phuong","doi":"10.2478/cait-2023-0014","DOIUrl":"https://doi.org/10.2478/cait-2023-0014","url":null,"abstract":"Abstract This paper deals with an important task in legal text processing, namely reference and relation extraction from legal documents, which includes two subtasks: 1) reference extraction; 2) relation determination. Motivated by the fact that two subtasks are related and share common information, we propose a joint learning model that solves simultaneously both subtasks. Our model employs a Transformer-based encoder-decoder architecture with non-autoregressive decoding that allows relaxing the sequentiality of traditional seq2seq models and extracting references and relations in one inference step. We also propose a method to enrich the decoder input with learnable meaningful information and therefore, improve the model accuracy. Experimental results on a dataset consisting of 5031 legal documents in Vietnamese with 61,446 references show that our proposed model performs better results than several strong baselines and achieves an F1 score of 99.4% for the joint reference and relation extraction task.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48635604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Hybrid Model to Predict Human Age Estimation from Face Images Based on Supervised Machine Learning Algorithms 基于监督机器学习算法的人脸年龄预测混合模型
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0011
Mohammed Jawad Al-dujaili, Hydr jabar sabat Ahily
Abstract Age estimation from face images is one of the significant topics in the field of machine vision, which is of great interest to controlling age access and targeted marketing. In this article, there are two main stages for human age estimation; the first stage consists of extracting features from the face areas by using Pseudo Zernike Moments (PZM), Active Appearance Model (AAM), and Bio-Inspired Features (BIF). In the second step, Support Vector Machine (SVM) and Support Vector Regression (SVR) algorithms are used to predict the age range of face images. The proposed method has been assessed utilizing the renowned databases of IMDB-WIKI and WIT-DB. In general, from all results obtained in the experiments, we have concluded that the proposed method can be chosen as the best method for Age estimation from face images.
摘要基于人脸图像的年龄估计是机器视觉领域的重要课题之一,对控制年龄获取和定向营销具有重要意义。在本文中,人类年龄估计主要分为两个阶段;第一阶段包括通过使用伪泽尼克矩(PZM)、主动外观模型(AAM)和生物启发特征(BIF)从面部区域提取特征。在第二步中,使用支持向量机(SVM)和支持向量回归(SVR)算法来预测人脸图像的年龄范围。利用IMDB-WIKI和WIT-DB的著名数据库对所提出的方法进行了评估。总之,从实验中获得的所有结果来看,我们得出结论,所提出的方法可以被选为从人脸图像中估计年龄的最佳方法。
{"title":"A New Hybrid Model to Predict Human Age Estimation from Face Images Based on Supervised Machine Learning Algorithms","authors":"Mohammed Jawad Al-dujaili, Hydr jabar sabat Ahily","doi":"10.2478/cait-2023-0011","DOIUrl":"https://doi.org/10.2478/cait-2023-0011","url":null,"abstract":"Abstract Age estimation from face images is one of the significant topics in the field of machine vision, which is of great interest to controlling age access and targeted marketing. In this article, there are two main stages for human age estimation; the first stage consists of extracting features from the face areas by using Pseudo Zernike Moments (PZM), Active Appearance Model (AAM), and Bio-Inspired Features (BIF). In the second step, Support Vector Machine (SVM) and Support Vector Regression (SVR) algorithms are used to predict the age range of face images. The proposed method has been assessed utilizing the renowned databases of IMDB-WIKI and WIT-DB. In general, from all results obtained in the experiments, we have concluded that the proposed method can be chosen as the best method for Age estimation from face images.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47489664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Clustering and Feature Extraction by Utilizing an Improvised Unsupervised Learning Approach 利用改进的无监督学习方法进行图像聚类和特征提取
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0010
R. Bhuvanya, M. Kavitha
Abstract The need for information is gradually shifting from text to images due to the technology’s growth and increase in digital images. It is quite challenging for people to find similar color images. To obtain similarity matching, the color of the image needs to be identified. This paper aims at various clustering techniques to identify the color of the digital image. Though many clustering techniques exist, this paper focuses on Fuzzy c-Means, Mean-Shift, and a hybrid technique that amalgamates the agglomerative hierarchies and k-Means, known as hKmeans to cluster the intensity of the image. Applying evaluation metrics of Mean Squared Error, Root Mean Squared Error, Mean Absolute Error, Homogeneity, Completeness, V-Score, and Peak signal-to-noise ratio it is proven that the results obtained demonstrate the good performance of the proposed technique. Then the color histogram is applied to identify the color and differentiate the color distribution on the original and clustered image.
摘要由于数字图像技术的发展和增加,对信息的需求正逐渐从文本转向图像。人们很难找到相似颜色的图像。为了获得相似性匹配,需要识别图像的颜色。本文针对各种聚类技术来识别数字图像的颜色。尽管存在许多聚类技术,但本文侧重于模糊c-均值、均值偏移和一种将聚集层次和k-均值合并的混合技术,即hKmeans,以对图像的强度进行聚类。应用均方误差、均方根误差、均绝对误差、齐性、完整性、V-Score和峰值信噪比的评估指标,证明了所获得的结果证明了所提出的技术的良好性能。然后应用颜色直方图来识别颜色,并区分原始图像和聚类图像上的颜色分布。
{"title":"Image Clustering and Feature Extraction by Utilizing an Improvised Unsupervised Learning Approach","authors":"R. Bhuvanya, M. Kavitha","doi":"10.2478/cait-2023-0010","DOIUrl":"https://doi.org/10.2478/cait-2023-0010","url":null,"abstract":"Abstract The need for information is gradually shifting from text to images due to the technology’s growth and increase in digital images. It is quite challenging for people to find similar color images. To obtain similarity matching, the color of the image needs to be identified. This paper aims at various clustering techniques to identify the color of the digital image. Though many clustering techniques exist, this paper focuses on Fuzzy c-Means, Mean-Shift, and a hybrid technique that amalgamates the agglomerative hierarchies and k-Means, known as hKmeans to cluster the intensity of the image. Applying evaluation metrics of Mean Squared Error, Root Mean Squared Error, Mean Absolute Error, Homogeneity, Completeness, V-Score, and Peak signal-to-noise ratio it is proven that the results obtained demonstrate the good performance of the proposed technique. Then the color histogram is applied to identify the color and differentiate the color distribution on the original and clustered image.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49507823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tunnel Parsing with Ambiguous Grammars 具有歧义语法的隧道解析
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0012
Nikolay Handzhiyski, E. Somova
Abstract The article proposes an addition to the tunnel parsing algorithm that enables it to parse grammars having countable repetitions and configurations of grammar elements generating empty words without refactoring the grammar. The equivalency of trees built by the use of ambiguous grammar is discussed. The class of the ε-ambiguous grammars is defined as a subclass of the ambiguous grammars relative to these trees. The ε-deterministic grammars are then defined as a subclass of the ε-ambiguous grammars. A technique for linearly parsing on the basis of non-left recursive ε-deterministic grammars with the tunnel parsing algorithm is shown.
摘要本文提出了隧道解析算法的一个补充,使其能够在不重构语法的情况下解析具有可计数重复的语法和生成空词的语法元素配置。讨论了使用歧义语法构建的树的等价性。ε-二义性语法类被定义为相对于这些树的二义性语法的子类。然后将ε-确定性语法定义为ε-歧义语法的子类。提出了一种基于非左递归ε-确定性语法的隧道解析技术。
{"title":"Tunnel Parsing with Ambiguous Grammars","authors":"Nikolay Handzhiyski, E. Somova","doi":"10.2478/cait-2023-0012","DOIUrl":"https://doi.org/10.2478/cait-2023-0012","url":null,"abstract":"Abstract The article proposes an addition to the tunnel parsing algorithm that enables it to parse grammars having countable repetitions and configurations of grammar elements generating empty words without refactoring the grammar. The equivalency of trees built by the use of ambiguous grammar is discussed. The class of the ε-ambiguous grammars is defined as a subclass of the ambiguous grammars relative to these trees. The ε-deterministic grammars are then defined as a subclass of the ε-ambiguous grammars. A technique for linearly parsing on the basis of non-left recursive ε-deterministic grammars with the tunnel parsing algorithm is shown.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45564195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Approaches for Searching and Recommending Learning Resources 搜索和推荐学习资源的新方法
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0019
Tran Thanh Dien, Nguyen Thanh-Hai, Nguyen Thai-Nghe
Abstract This study proposes models for searching and recommending learning resources to meet the needs of learners, helping to achieve better student performance results. The study suggests a general architecture for searching and recommending learning resources. It specifically proposes (1) the model of learning resource classification based on deep learning techniques such as MLP; (2) the approach for searching learning resources based on document similarity; (3) the model to predict learning performance using deep learning techniques including learning performance prediction model on all student data using CNN, another model on ability group using MLP, and the other model on per student using LSTM; (4) the learning resource recommendation model using deep matrix factorization. Experimental results show that the proposed models are feasible for the classification, search, ranking prediction, and recommendation of learning resources in higher education institutions.
摘要本研究提出了搜索和推荐学习资源的模型,以满足学习者的需求,帮助学生取得更好的成绩。该研究提出了一个搜索和推荐学习资源的通用架构。具体提出了(1)基于MLP等深度学习技术的学习资源分类模型;(2) 基于文档相似度的学习资源搜索方法;(3) 使用深度学习技术预测学习成绩的模型,包括使用CNN对所有学生数据的学习成绩预测模型,使用MLP对能力组的另一个模型,以及使用LSTM对每个学生的另一模型;(4) 使用深度矩阵分解的学习资源推荐模型。实验结果表明,该模型对高校学习资源的分类、搜索、排名预测和推荐是可行的。
{"title":"Novel Approaches for Searching and Recommending Learning Resources","authors":"Tran Thanh Dien, Nguyen Thanh-Hai, Nguyen Thai-Nghe","doi":"10.2478/cait-2023-0019","DOIUrl":"https://doi.org/10.2478/cait-2023-0019","url":null,"abstract":"Abstract This study proposes models for searching and recommending learning resources to meet the needs of learners, helping to achieve better student performance results. The study suggests a general architecture for searching and recommending learning resources. It specifically proposes (1) the model of learning resource classification based on deep learning techniques such as MLP; (2) the approach for searching learning resources based on document similarity; (3) the model to predict learning performance using deep learning techniques including learning performance prediction model on all student data using CNN, another model on ability group using MLP, and the other model on per student using LSTM; (4) the learning resource recommendation model using deep matrix factorization. Experimental results show that the proposed models are feasible for the classification, search, ranking prediction, and recommendation of learning resources in higher education institutions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46227240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SCLang: Graphical Domain-Specific Modeling Language for Stream Cipher 流密码的图形领域特定建模语言
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0013
Samar A. Qassir, M. Gaata, A. Sadiq
Abstract A Stream Cipher (SC) is a symmetric-key encryption type that scrambles each piece of data in clear text to conceal it from hackers. Despite its advantages, it has a substantial challenge. Correct handwriting of the script code for the cipher scheme is a challenge for programmers. In this paper, we propose a graphical Domain-Specific Modeling Language (DSML) to make it easier for non-technical users and domain specialists to implement an SC domain. The proposed language, SCLang, offers great expressiveness and flexibility. Six different methods of keystream generation are provided to obtain a random sequence. In addition, fifteen tests in the NIST suite are provided for random statistical analysis. The concepts of the SC domain and their relationships are presented in a meta-model. The evaluation of SCLang is based on qualitative analysis and is presented to demonstrate its effectiveness and efficiency.
摘要流密码(Stream Cipher, SC)是一种对称密钥加密类型,它将每条数据以明文形式进行置乱,从而使其不被黑客窃取。尽管有其优势,但它也面临着巨大的挑战。正确书写密码方案的脚本代码对程序员来说是一个挑战。在本文中,我们提出了一种图形化的领域特定建模语言(DSML),使非技术用户和领域专家更容易实现SC领域。被提议的语言SCLang具有很强的表达能力和灵活性。提供了六种不同的密钥流生成方法来获得随机序列。此外,在NIST套件中提供了15个测试用于随机统计分析。在元模型中给出了SC域的概念和它们之间的关系。对slang的评价是基于定性分析的,并展示了它的有效性和效率。
{"title":"SCLang: Graphical Domain-Specific Modeling Language for Stream Cipher","authors":"Samar A. Qassir, M. Gaata, A. Sadiq","doi":"10.2478/cait-2023-0013","DOIUrl":"https://doi.org/10.2478/cait-2023-0013","url":null,"abstract":"Abstract A Stream Cipher (SC) is a symmetric-key encryption type that scrambles each piece of data in clear text to conceal it from hackers. Despite its advantages, it has a substantial challenge. Correct handwriting of the script code for the cipher scheme is a challenge for programmers. In this paper, we propose a graphical Domain-Specific Modeling Language (DSML) to make it easier for non-technical users and domain specialists to implement an SC domain. The proposed language, SCLang, offers great expressiveness and flexibility. Six different methods of keystream generation are provided to obtain a random sequence. In addition, fifteen tests in the NIST suite are provided for random statistical analysis. The concepts of the SC domain and their relationships are presented in a meta-model. The evaluation of SCLang is based on qualitative analysis and is presented to demonstrate its effectiveness and efficiency.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43412404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Reinvestment Policy in Risk-Free Assets with Various Maturities 不同期限无风险资产再投资政策模型
IF 1.2 Q2 Computer Science Pub Date : 2023-06-01 DOI: 10.2478/cait-2023-0018
T. Stoilov, K. Stoilova, D. Kanev
Abstract Logistic tasks are aimed at the optimal distribution of material, energy, financial and human resources. This research has a narrow field aimed at optimal management of financial resources and their redistribution. Specifically, a reinvestment policy model is derived by maximizing the profit of a business entity. Reinvestment is done with risk-free assets, but they have different maturity periods. This makes it difficult to assess the optimal investment strategy, as reinvestment can be done at the end of the maturity period. This study develops a model for a dynamic control process, which leads to the formalization of a discrete integer time optimization problem. Its solution gives a sequence of investments and a total optimal return. The solution to the problem is illustrated in an EXCEL environment. The added value of this study stems from the formalization and quantification of the model for the reinvestment strategy in the optimization problem.
摘要物流任务旨在优化物质、能源、财务和人力资源的分配。这项研究的领域很窄,旨在优化财政资源的管理及其再分配。具体而言,再投资政策模型是通过使商业实体的利润最大化来推导的。再投资是用无风险资产进行的,但它们有不同的到期期。这使得评估最佳投资策略变得困难,因为再投资可以在到期日结束时进行。本研究开发了一个动态控制过程的模型,该模型导致了离散整数时间优化问题的形式化。它的解决方案给出了一系列投资和总的最优回报。在EXCEL环境中给出了该问题的解决方案。本研究的附加值源于优化问题中再投资策略模型的形式化和量化。
{"title":"Model for Reinvestment Policy in Risk-Free Assets with Various Maturities","authors":"T. Stoilov, K. Stoilova, D. Kanev","doi":"10.2478/cait-2023-0018","DOIUrl":"https://doi.org/10.2478/cait-2023-0018","url":null,"abstract":"Abstract Logistic tasks are aimed at the optimal distribution of material, energy, financial and human resources. This research has a narrow field aimed at optimal management of financial resources and their redistribution. Specifically, a reinvestment policy model is derived by maximizing the profit of a business entity. Reinvestment is done with risk-free assets, but they have different maturity periods. This makes it difficult to assess the optimal investment strategy, as reinvestment can be done at the end of the maturity period. This study develops a model for a dynamic control process, which leads to the formalization of a discrete integer time optimization problem. Its solution gives a sequence of investments and a total optimal return. The solution to the problem is illustrated in an EXCEL environment. The added value of this study stems from the formalization and quantification of the model for the reinvestment strategy in the optimization problem.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43546827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Quality Improvement of Watermarked Image Based on Singular Value Decomposition Using Walsh Hadamard Transform 基于Walsh Hadamard变换奇异值分解的水印图像视觉质量改进
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0006
Aris Marjuni, A. Z. Fanani, O. Nurhayati
Abstract Embedding the watermark is still a challenge in image watermarking. The watermark should not reduce the visual quality of the image being watermarked and hard to distinguish from its original. Embedding a watermark of a small size might be a good solution. However, the watermark might be easy to lose if there is any tampering with the watermarked image. This research proposes to increase the visual quality of the watermarked image using the Walsh Hadamard transform, which is applied to the singular value decomposition-based image watermarking. Technically, the watermark image is converted into a low bit-rate signal before being embedded in the host image. Using various watermark sizes, experimental results show that the proposed method could produce a good imperceptibility with 47.10 dB on average and also gives robustness close to the original watermark with a normalized correlation close to 1 on average. The proposed method can also recognize the original watermark from the tampered watermarked image at different levels of robustness.
摘要水印的嵌入仍然是图像水印中的一个难题。水印不能降低被水印图像的视觉质量,不能使被水印图像与原始图像难以区分。嵌入一个小尺寸的水印可能是一个很好的解决方案。但是,如果对水印图像进行任何篡改,水印可能很容易丢失。本研究提出将Walsh Hadamard变换应用于基于奇异值分解的图像水印中,以提高水印图像的视觉质量。从技术上讲,水印图像在嵌入到主机图像之前被转换成一个低比特率信号。实验结果表明,在不同的水印尺寸下,该方法具有较好的不可感度(平均47.10 dB),且具有接近原始水印的鲁棒性,归一化相关系数平均接近1。该方法还能在不同的鲁棒性水平上从被篡改的水印图像中识别出原始水印。
{"title":"Visual Quality Improvement of Watermarked Image Based on Singular Value Decomposition Using Walsh Hadamard Transform","authors":"Aris Marjuni, A. Z. Fanani, O. Nurhayati","doi":"10.2478/cait-2023-0006","DOIUrl":"https://doi.org/10.2478/cait-2023-0006","url":null,"abstract":"Abstract Embedding the watermark is still a challenge in image watermarking. The watermark should not reduce the visual quality of the image being watermarked and hard to distinguish from its original. Embedding a watermark of a small size might be a good solution. However, the watermark might be easy to lose if there is any tampering with the watermarked image. This research proposes to increase the visual quality of the watermarked image using the Walsh Hadamard transform, which is applied to the singular value decomposition-based image watermarking. Technically, the watermark image is converted into a low bit-rate signal before being embedded in the host image. Using various watermark sizes, experimental results show that the proposed method could produce a good imperceptibility with 47.10 dB on average and also gives robustness close to the original watermark with a normalized correlation close to 1 on average. The proposed method can also recognize the original watermark from the tampered watermarked image at different levels of robustness.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47106155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Type-2-Soft-Set Based Uncertainty Aware Task Offloading Framework for Fog Computing Using Apprenticeship Learning 基于学徒学习的雾计算2型软集不确定性感知任务卸载框架
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0002
K. Bhargavi, B. Sathish Babu, S. Shiva
Abstract Fog computing is one of the emerging forms of cloud computing which aims to satisfy the ever-increasing computation demands of the mobile applications. Effective offloading of tasks leads to increased efficiency of the fog network, but at the same time it suffers from various uncertainty issues with respect to task demands, fog node capabilities, information asymmetry, missing information, low trust, transaction failures, and so on. Several machine learning techniques have been proposed for the task offloading in fog environments, but they lack efficiency. In this paper, a novel uncertainty proof Type-2-Soft-Set (T2SS) enabled apprenticeship learning based task offloading framework is proposed which formulates the optimal task offloading policies. The performance of the proposed T2SS based apprenticeship learning is compared and found to be better than Q-learning and State-Action-Reward-State-Action (SARSA) learning techniques with respect to performance parameters such as total execution time, throughput, learning rate, and response time.
摘要雾计算是云计算的一种新兴形式,旨在满足移动应用日益增长的计算需求。有效的任务卸载可以提高雾网络的效率,但同时它也面临着任务需求、雾节点能力、信息不对称、信息缺失、低信任、事务失败等各种不确定性问题。已有几种机器学习技术被提出用于雾环境下的任务卸载,但它们缺乏效率。本文提出了一种新的基于不确定性证明的2型软集(T2SS)支持的学徒学习任务卸载框架,该框架制定了最优任务卸载策略。我们比较了基于T2SS的学徒学习的性能,发现在总执行时间、吞吐量、学习率和响应时间等性能参数方面优于q学习和状态-行动-奖励-状态-行动(SARSA)学习技术。
{"title":"Type-2-Soft-Set Based Uncertainty Aware Task Offloading Framework for Fog Computing Using Apprenticeship Learning","authors":"K. Bhargavi, B. Sathish Babu, S. Shiva","doi":"10.2478/cait-2023-0002","DOIUrl":"https://doi.org/10.2478/cait-2023-0002","url":null,"abstract":"Abstract Fog computing is one of the emerging forms of cloud computing which aims to satisfy the ever-increasing computation demands of the mobile applications. Effective offloading of tasks leads to increased efficiency of the fog network, but at the same time it suffers from various uncertainty issues with respect to task demands, fog node capabilities, information asymmetry, missing information, low trust, transaction failures, and so on. Several machine learning techniques have been proposed for the task offloading in fog environments, but they lack efficiency. In this paper, a novel uncertainty proof Type-2-Soft-Set (T2SS) enabled apprenticeship learning based task offloading framework is proposed which formulates the optimal task offloading policies. The performance of the proposed T2SS based apprenticeship learning is compared and found to be better than Q-learning and State-Action-Reward-State-Action (SARSA) learning techniques with respect to performance parameters such as total execution time, throughput, learning rate, and response time.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44296653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1