首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
APVNFC: Adaptive Placement of Virtual Network Function Chains 虚拟网络功能链的自适应布局
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0003
B. K. Umrao, Dharmendar Kumar Yadav
Abstract Designing efficient and flexible approaches for placement of Virtual Network Function (VNF) chains is the main success of Network Function Virtualization (NFV). However, most current work considers the constant bandwidth and flow processing requirements while deploying the VNFs in the network. The constant (immutable) flow processing and bandwidth requirements become critical limitations in an NFV-enabled network with highly dynamic traffic flow. Therefore, bandwidth requirements and available resources of the Point-of-Presence (PoP) in the network change constantly. We present an adaptive model for placing VNF chains to overcome this limitation. At the same time, the proposed model minimizes the number of changes (i.e., re-allocation of VNFs) in the network. The experimental evaluation shows that the adaptive model can deliver stable network services. Moreover, it reduces the significant number of changes in the network and ensures flow performance.
摘要设计高效灵活的虚拟网络功能(VNF)链布局方法是网络功能虚拟化(NFV)的主要成功。然而,当前的大多数工作在网络中部署VNF时都考虑了恒定的带宽和流处理要求。在具有高度动态流量的支持NFV的网络中,恒定(不可变)流量处理和带宽要求成为关键限制。因此,网络中存在点(PoP)的带宽要求和可用资源不断变化。为了克服这一限制,我们提出了一个用于放置VNF链的自适应模型。同时,所提出的模型最小化了网络中的变化数量(即VNF的重新分配)。实验评估表明,自适应模型能够提供稳定的网络服务。此外,它减少了网络中的大量更改,并确保了流性能。
{"title":"APVNFC: Adaptive Placement of Virtual Network Function Chains","authors":"B. K. Umrao, Dharmendar Kumar Yadav","doi":"10.2478/cait-2023-0003","DOIUrl":"https://doi.org/10.2478/cait-2023-0003","url":null,"abstract":"Abstract Designing efficient and flexible approaches for placement of Virtual Network Function (VNF) chains is the main success of Network Function Virtualization (NFV). However, most current work considers the constant bandwidth and flow processing requirements while deploying the VNFs in the network. The constant (immutable) flow processing and bandwidth requirements become critical limitations in an NFV-enabled network with highly dynamic traffic flow. Therefore, bandwidth requirements and available resources of the Point-of-Presence (PoP) in the network change constantly. We present an adaptive model for placing VNF chains to overcome this limitation. At the same time, the proposed model minimizes the number of changes (i.e., re-allocation of VNFs) in the network. The experimental evaluation shows that the adaptive model can deliver stable network services. Moreover, it reduces the significant number of changes in the network and ensures flow performance.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42371369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Barnacle Mating Optimizer-Based Least Square Support Vector Machine to Predict COVID-19 Confirmed Cases with Total Vaccination 改进的基于Barnacle匹配优化的最小二乘支持向量机预测新冠肺炎确诊病例
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0007
Marzia Ahmed, M. Sulaiman, A. Mohamad
Abstract Every country must have an accurate and efficient forecasting model to avoid and manage the epidemic. This paper suggests an upgrade to one of the evolutionary algorithms inspired by nature, the Barnacle Mating Optimizer (BMO). First, the exploration phase of the original BMO is enhanced by enforcing and replacing the sperm cast equation through Levy flight. Then, the Least Square Support Vector Machine (LSSVM) is partnered with the improved BMO (IBMO). This hybrid approach, IBMO-LSSVM, has been deployed effectively for time-series forecasting to enhance the RBF kernel-based LSSVM model since vaccination started against COVID-19 in Malaysia. In comparison to other well-known algorithms, our outcomes are superior. In addition, the IBMO is assessed on 19 conventional benchmarks and the IEEE Congress of Evolutionary Computation Benchmark Test Functions (CECC06, 2019 Competition). In most cases, IBMO outputs are better than comparison algorithms. However, in other circumstances, the outcomes are comparable.
每个国家都必须有一个准确、高效的预测模型来避免和管理疫情。本文提出了一种由自然界启发的进化算法——藤壶交配优化器(BMO)的升级。首先,通过Levy飞行执行和替换精子投注方程,增强了原始BMO的探索阶段。然后,将最小二乘支持向量机(LSSVM)与改进的BMO (IBMO)结合使用。自马来西亚开始接种COVID-19疫苗以来,这种IBMO-LSSVM混合方法已被有效地用于时间序列预测,以增强基于RBF核的LSSVM模型。与其他知名算法相比,我们的结果是优越的。此外,IBMO还在19个常规基准和IEEE进化计算基准测试函数大会(CECC06, 2019年竞赛)上进行了评估。在大多数情况下,IBMO输出比比较算法更好。然而,在其他情况下,结果是可比较的。
{"title":"Improved Barnacle Mating Optimizer-Based Least Square Support Vector Machine to Predict COVID-19 Confirmed Cases with Total Vaccination","authors":"Marzia Ahmed, M. Sulaiman, A. Mohamad","doi":"10.2478/cait-2023-0007","DOIUrl":"https://doi.org/10.2478/cait-2023-0007","url":null,"abstract":"Abstract Every country must have an accurate and efficient forecasting model to avoid and manage the epidemic. This paper suggests an upgrade to one of the evolutionary algorithms inspired by nature, the Barnacle Mating Optimizer (BMO). First, the exploration phase of the original BMO is enhanced by enforcing and replacing the sperm cast equation through Levy flight. Then, the Least Square Support Vector Machine (LSSVM) is partnered with the improved BMO (IBMO). This hybrid approach, IBMO-LSSVM, has been deployed effectively for time-series forecasting to enhance the RBF kernel-based LSSVM model since vaccination started against COVID-19 in Malaysia. In comparison to other well-known algorithms, our outcomes are superior. In addition, the IBMO is assessed on 19 conventional benchmarks and the IEEE Congress of Evolutionary Computation Benchmark Test Functions (CECC06, 2019 Competition). In most cases, IBMO outputs are better than comparison algorithms. However, in other circumstances, the outcomes are comparable.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45161764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimized Parameter Tuning in a Recurrent Learning Process for Shoplifting Activity Classification 车间提升活动分类递归学习过程中的参数优化调整
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0008
Mohd. Aquib Ansari, D. Singh
Abstract From recent past, shoplifting has become a serious concern for business in both small/big shops and stores. It customarily involves the buyer concealing store items inside clothes/bags and then leaving the store without payment. Unfortunately, no cost-effective solution is available to overcome this problem. We, therefore intend to build an expert monitoring system to automatically recognize shoplifting events in megastores/shops by recognizing object-stealing actions of humans. The method proposed utilizes a deep convolutional-based InceptionV3 architecture to mine the prominent features from video clips. These features are used to custom Long Short Term Memory (LSTM) network to discriminate human stealing actions in video sequences. Optimizing recurrent learning classifier using different modeling parameters such as sequence length and batch size is a genuine contribution of this work. The experiments demonstrate that the system proposed has achieved an accuracy of 89.36% on the synthesized dataset, which comparatively outperforms other existing methods.
摘要:近年来,入店行窃已成为小/大商店和商店严重关注的问题。它通常涉及买家将商店物品藏在衣服/袋子里,然后不付款就离开商店。不幸的是,没有经济有效的解决方案可以克服这个问题。因此,我们打算建立一个专家监控系统,通过识别人类的物品盗窃行为来自动识别大型商店/商店的入店行窃事件。该方法利用基于深度卷积的InceptionV3架构从视频片段中挖掘突出特征。将这些特征用于自定义长短期记忆(LSTM)网络,以识别视频序列中的人类偷窃行为。使用不同的建模参数(如序列长度和批大小)优化循环学习分类器是这项工作的真正贡献。实验表明,该系统在合成数据集上的准确率达到89.36%,相对优于现有的其他方法。
{"title":"Optimized Parameter Tuning in a Recurrent Learning Process for Shoplifting Activity Classification","authors":"Mohd. Aquib Ansari, D. Singh","doi":"10.2478/cait-2023-0008","DOIUrl":"https://doi.org/10.2478/cait-2023-0008","url":null,"abstract":"Abstract From recent past, shoplifting has become a serious concern for business in both small/big shops and stores. It customarily involves the buyer concealing store items inside clothes/bags and then leaving the store without payment. Unfortunately, no cost-effective solution is available to overcome this problem. We, therefore intend to build an expert monitoring system to automatically recognize shoplifting events in megastores/shops by recognizing object-stealing actions of humans. The method proposed utilizes a deep convolutional-based InceptionV3 architecture to mine the prominent features from video clips. These features are used to custom Long Short Term Memory (LSTM) network to discriminate human stealing actions in video sequences. Optimizing recurrent learning classifier using different modeling parameters such as sequence length and batch size is a genuine contribution of this work. The experiments demonstrate that the system proposed has achieved an accuracy of 89.36% on the synthesized dataset, which comparatively outperforms other existing methods.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47513298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Competent Time Synchronization Mac Protocols to Attain High Performance of Wireless Sensor Networks for Secure Communication 有效的时间同步Mac协议实现无线传感器网络的高性能安全通信
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0004
I. Hababeh, Issa M. Khalil, R. Al-Sayyed, Mahmoud Moshref, Samer Nofal, Ali Rodan
Abstract Clock synchronization in the Mac layer plays a vital role in wireless sensor network communication that maintains time-based channel sharing and offers a uniform timeframe among different network nodes. Most wireless sensor networks are distributed where no common clock exists among them. Therefore, joint actions are realized by exchanging messages, with time stamps using local sensor clocks. These clocks can easily drift seconds and cause functional problems to the applications that depend on time synchronization. Time synchronization is a major and challenging factor in wireless sensor networks that needs to be studied and explored. In this paper, we propose integrated time synchronization protocols that serve wireless sensor network applications under normal, secured, and unreliable environments. The proposed protocols are discussed and evaluated based on their accuracy, cost, hierarchy, reliability, and security. Simulation results show that the proposed time synchronization protocols outperform the state-of-the-art techniques in achieving a minimum synchronization time.
Mac层时钟同步在无线传感器网络通信中起着至关重要的作用,它保持了基于时间的信道共享,并在不同的网络节点之间提供了统一的时间框架。大多数无线传感器网络分布在它们之间没有共同时钟的地方。因此,联合行动是通过交换消息来实现的,并使用本地传感器时钟作为时间戳。这些时钟很容易漂移秒数,并对依赖时间同步的应用程序造成功能问题。时间同步是无线传感器网络中一个重要且具有挑战性的问题,需要深入研究和探索。在本文中,我们提出了集成时间同步协议,以服务于正常、安全和不可靠环境下的无线传感器网络应用。本文从准确性、成本、层次、可靠性和安全性等方面对所提出的协议进行了讨论和评估。仿真结果表明,所提出的时间同步协议在实现最小同步时间方面优于目前最先进的技术。
{"title":"Competent Time Synchronization Mac Protocols to Attain High Performance of Wireless Sensor Networks for Secure Communication","authors":"I. Hababeh, Issa M. Khalil, R. Al-Sayyed, Mahmoud Moshref, Samer Nofal, Ali Rodan","doi":"10.2478/cait-2023-0004","DOIUrl":"https://doi.org/10.2478/cait-2023-0004","url":null,"abstract":"Abstract Clock synchronization in the Mac layer plays a vital role in wireless sensor network communication that maintains time-based channel sharing and offers a uniform timeframe among different network nodes. Most wireless sensor networks are distributed where no common clock exists among them. Therefore, joint actions are realized by exchanging messages, with time stamps using local sensor clocks. These clocks can easily drift seconds and cause functional problems to the applications that depend on time synchronization. Time synchronization is a major and challenging factor in wireless sensor networks that needs to be studied and explored. In this paper, we propose integrated time synchronization protocols that serve wireless sensor network applications under normal, secured, and unreliable environments. The proposed protocols are discussed and evaluated based on their accuracy, cost, hierarchy, reliability, and security. Simulation results show that the proposed time synchronization protocols outperform the state-of-the-art techniques in achieving a minimum synchronization time.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43637514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Energy-Aware QoS Load Balance Scheduling Using Hybrid GAACO Algorithm for Cloud 基于混合GAACO算法的云QoS负载均衡调度
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0009
Arivumathi Ilankumaran, S. Narayanan
Abstract In recent days, resource allocation is considered to be a complex task in cloud systems. The heuristics models will allocate the resources efficiently in different machines. Then, the fitness function estimation plays a vital role in cloud load balancing, which is mainly used to minimize power consumption. The optimization technique is one of the most suitable options for solving load-balancing problems. This work mainly focuses on analyzing the impacts of using the Genetic Algorithm and Ant Colony Optimization (GAACO) technique for obtaining the optimal solution to efficiently balance the loads across the cloud systems. In addition to that, the GA and ACO are the kinds of object heuristic algorithms being proposed in the work to increase the number of servers that are operated with better energy efficiency. In this work, the main contribution of the GAACO algorithm is to reduce energy consumption, makespan time, response time, and degree of imbalance.
摘要近年来,资源分配被认为是云系统中的一项复杂任务。启发式模型将在不同的机器中有效地分配资源。然后,适应度函数估计在云负载平衡中起着至关重要的作用,它主要用于最小化功耗。优化技术是解决负载平衡问题的最合适的选择之一。这项工作主要集中在分析使用遗传算法和蚁群优化(GAACO)技术来获得最优解以有效平衡云系统负载的影响。除此之外,GA和ACO是工作中提出的对象启发式算法,旨在增加以更好的能效运行的服务器数量。在这项工作中,GAACO算法的主要贡献是减少能耗、完成时间、响应时间和不平衡程度。
{"title":"An Energy-Aware QoS Load Balance Scheduling Using Hybrid GAACO Algorithm for Cloud","authors":"Arivumathi Ilankumaran, S. Narayanan","doi":"10.2478/cait-2023-0009","DOIUrl":"https://doi.org/10.2478/cait-2023-0009","url":null,"abstract":"Abstract In recent days, resource allocation is considered to be a complex task in cloud systems. The heuristics models will allocate the resources efficiently in different machines. Then, the fitness function estimation plays a vital role in cloud load balancing, which is mainly used to minimize power consumption. The optimization technique is one of the most suitable options for solving load-balancing problems. This work mainly focuses on analyzing the impacts of using the Genetic Algorithm and Ant Colony Optimization (GAACO) technique for obtaining the optimal solution to efficiently balance the loads across the cloud systems. In addition to that, the GA and ACO are the kinds of object heuristic algorithms being proposed in the work to increase the number of servers that are operated with better energy efficiency. In this work, the main contribution of the GAACO algorithm is to reduce energy consumption, makespan time, response time, and degree of imbalance.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49293564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Blockchain-Fog Computing Integration Applications: A Systematic Review 区块链-雾计算集成应用:系统回顾
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0001
Y. Alzoubi, A. Aljaafreh
Abstract The Fog computing concept has been introduced to aid in the data processing of Internet of things applications using Cloud computing. Due to the profitable benefits of this combination, several papers have lately been published proposing the deployment of Blockchain alongside Fog computing in a variety of fields. A comprehensive evaluation and synthesis of the literature on Blockchain-Fog computing integration applications that have emerged in recent years is required. Although there have been several articles on the integration of Blockchain with Fog computing, the applications connected with this combination are still fragmented and require further exploration. Hence, in this paper, the applications of Blockchain-Fog computing integration are identified using a systematic literature review technique and tailored search criteria generated from the study objectives. This article found and evaluated 144 relevant papers. The findings of this article can be used as a resource for future Fog computing research and designs.
摘要雾计算概念的引入是为了帮助使用云计算的物联网应用进行数据处理。由于这种组合的有利优势,最近发表了几篇论文,建议在各种领域中部署区块链和雾计算。需要对近年来出现的区块链-雾计算集成应用的文献进行全面的评估和综合。尽管已经有几篇文章讨论了区块链与雾计算的集成,但与这种组合相关的应用程序仍然是碎片化的,需要进一步探索。因此,在本文中,使用系统的文献综述技术和从研究目标生成的定制搜索标准来确定区块链-雾计算集成的应用。本文检索并评价了144篇相关论文。本文的研究结果可以作为未来雾计算研究和设计的参考资料。
{"title":"Blockchain-Fog Computing Integration Applications: A Systematic Review","authors":"Y. Alzoubi, A. Aljaafreh","doi":"10.2478/cait-2023-0001","DOIUrl":"https://doi.org/10.2478/cait-2023-0001","url":null,"abstract":"Abstract The Fog computing concept has been introduced to aid in the data processing of Internet of things applications using Cloud computing. Due to the profitable benefits of this combination, several papers have lately been published proposing the deployment of Blockchain alongside Fog computing in a variety of fields. A comprehensive evaluation and synthesis of the literature on Blockchain-Fog computing integration applications that have emerged in recent years is required. Although there have been several articles on the integration of Blockchain with Fog computing, the applications connected with this combination are still fragmented and require further exploration. Hence, in this paper, the applications of Blockchain-Fog computing integration are identified using a systematic literature review technique and tailored search criteria generated from the study objectives. This article found and evaluated 144 relevant papers. The findings of this article can be used as a resource for future Fog computing research and designs.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42595598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance of Optimized Security Overhead Using Clustering Technique Based on Fuzzy Logic for Mobile ad hoc Network 基于模糊逻辑的聚类技术在移动adhoc网络安全开销优化中的应用
IF 1.2 Q2 Computer Science Pub Date : 2023-03-01 DOI: 10.2478/cait-2023-0005
A. S. Yadav, Avjeet Singh, Ankit Vidyarthi, R. K. Barik, D. S. Kushwaha
Abstract MANET is an autonomous wireless network without any centralized authority, consisting of a dynamic topology with a multi-hop scenario. Clustering provides centralized authority within MANET and makes the network stable up to some extent. Security is one of the most challenging aspects, directly proportional to load and overhead over the network. The model being proposed uses a cluster-based technique and modified secure routing protocol, which minimizes the network’s load and overhead, improving the network’s security and performance. Two major factors are used as contribution level and stability factor for the choice of cluster head, which minimizes the method of re-selection for cluster head. The node addition using authentication and the Modified Secure Routing Protocol increases the security of the network. The Modified Secure Routing Protocol, based on limited and efficient use of the certificates with encryption and decryption of packets, minimizes the overhead and load over the network. Hence, it provides more efficiency and security.
摘要MANET是一个没有任何集中授权的自主无线网络,由多跳场景的动态拓扑结构组成。集群在MANET中提供了集中的权限,使网络在一定程度上保持稳定。安全性是最具挑战性的方面之一,与网络上的负载和开销成正比。该模型采用了基于集群的技术和改进的安全路由协议,最大限度地减少了网络的负载和开销,提高了网络的安全性和性能。在簇头的选择中,使用了两个主要因素作为贡献水平和稳定性因素,最大限度地减少了簇头的重新选择方法。使用身份验证和修改的安全路由协议添加节点提高了网络的安全性。改进的安全路由协议基于对证书的有限有效使用以及对数据包的加密和解密,最大限度地减少了网络开销和负载。因此,它提供了更高的效率和安全性。
{"title":"Performance of Optimized Security Overhead Using Clustering Technique Based on Fuzzy Logic for Mobile ad hoc Network","authors":"A. S. Yadav, Avjeet Singh, Ankit Vidyarthi, R. K. Barik, D. S. Kushwaha","doi":"10.2478/cait-2023-0005","DOIUrl":"https://doi.org/10.2478/cait-2023-0005","url":null,"abstract":"Abstract MANET is an autonomous wireless network without any centralized authority, consisting of a dynamic topology with a multi-hop scenario. Clustering provides centralized authority within MANET and makes the network stable up to some extent. Security is one of the most challenging aspects, directly proportional to load and overhead over the network. The model being proposed uses a cluster-based technique and modified secure routing protocol, which minimizes the network’s load and overhead, improving the network’s security and performance. Two major factors are used as contribution level and stability factor for the choice of cluster head, which minimizes the method of re-selection for cluster head. The node addition using authentication and the Modified Secure Routing Protocol increases the security of the network. The Modified Secure Routing Protocol, based on limited and efficient use of the certificates with encryption and decryption of packets, minimizes the overhead and load over the network. Hence, it provides more efficiency and security.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49406412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach for Securing JSON Objects through Chaotic Synchronization 一种通过混沌同步保护JSON对象的方法
IF 1.2 Q2 Computer Science Pub Date : 2022-11-01 DOI: 10.2478/cait-2022-0037
Omar S. Gómez, Raúl H. Rosero, Juan C Estrada-Gutiérrez, M. Jiménez-Rodríguez
Abstract Nowadays the interoperability of web applications is carried out by the use of data exchange formats such as XML and JavaScript Object Notation (JSON). Due to its simplicity, JSON objects are the most common way for sending information over the HTTP protocol. With the aim of adding a security mechanism to JSON objects, in this work we propose an encryption approach for cipher JSON objects through the use of chaotic synchronization. Synchronization ability between two chaotic systems offers the possibility of securing information between two points. Our approach includes mechanisms for diffusing and confusing JSON objects (plaintext), which yields a proper ciphertext. Our approach can be applied as an alternative to the existing securing JSON approaches such as JSON Web Encryption (JWE).
目前,web应用程序的互操作性是通过使用数据交换格式(如XML和JavaScript Object Notation (JSON))来实现的。由于其简单性,JSON对象是通过HTTP协议发送信息的最常用方式。为了给JSON对象增加一个安全机制,在这项工作中,我们提出了一种通过使用混沌同步来加密JSON对象的加密方法。两个混沌系统之间的同步能力为两点间的信息安全提供了可能。我们的方法包括扩散和混淆JSON对象(明文)的机制,从而产生适当的密文。我们的方法可以作为现有安全JSON方法(如JSON Web加密(JWE))的替代方案。
{"title":"An Approach for Securing JSON Objects through Chaotic Synchronization","authors":"Omar S. Gómez, Raúl H. Rosero, Juan C Estrada-Gutiérrez, M. Jiménez-Rodríguez","doi":"10.2478/cait-2022-0037","DOIUrl":"https://doi.org/10.2478/cait-2022-0037","url":null,"abstract":"Abstract Nowadays the interoperability of web applications is carried out by the use of data exchange formats such as XML and JavaScript Object Notation (JSON). Due to its simplicity, JSON objects are the most common way for sending information over the HTTP protocol. With the aim of adding a security mechanism to JSON objects, in this work we propose an encryption approach for cipher JSON objects through the use of chaotic synchronization. Synchronization ability between two chaotic systems offers the possibility of securing information between two points. Our approach includes mechanisms for diffusing and confusing JSON objects (plaintext), which yields a proper ciphertext. Our approach can be applied as an alternative to the existing securing JSON approaches such as JSON Web Encryption (JWE).","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44092719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
B-Morpher: Automated Learning of Morphological Language Characteristics for Inflection and Morphological Analysis 词形语言特征的自动学习及词形分析
IF 1.2 Q2 Computer Science Pub Date : 2022-11-01 DOI: 10.2478/cait-2022-0042
L. Kovács, G. Szabó
Abstract The automated induction of inflection rules is an important research area for computational linguistics. In this paper, we present a novel morphological rule induction model called B-Morpher that can be used for both inflection analysis and morphological analysis. The core element of the engine is a modified Bayes classifier in which class categories correspond to general string transformation rules. Beside the core classification module, the engine contains a neural network module and verification unit to improve classification accuracy. For the evaluation, beside the large Hungarian dataset the tests include smaller non-Hungarian datasets from the SIGMORPHON shared task pools. Our evaluation shows that the efficiency of B-Morpher is comparable with the best results, and it outperforms the state-of-theart base models for some languages. The proposed system can be characterized by not only high accuracy, but also short training time and small knowledge base size.
屈折规则的自动归纳是计算语言学的一个重要研究领域。本文提出了一种新的词形规则归纳模型B-Morpher,该模型可以同时用于词形分析和词形分析。引擎的核心元素是一个改进的贝叶斯分类器,其中类类别对应于一般的字符串转换规则。除了核心分类模块外,该引擎还包含神经网络模块和验证单元,以提高分类精度。对于评估,除了大型匈牙利数据集之外,测试还包括来自SIGMORPHON共享任务池的较小的非匈牙利数据集。我们的评估表明,B-Morpher的效率与最佳结果相当,并且在某些语言中优于最先进的基础模型。该系统不仅准确率高,而且训练时间短,知识库规模小。
{"title":"B-Morpher: Automated Learning of Morphological Language Characteristics for Inflection and Morphological Analysis","authors":"L. Kovács, G. Szabó","doi":"10.2478/cait-2022-0042","DOIUrl":"https://doi.org/10.2478/cait-2022-0042","url":null,"abstract":"Abstract The automated induction of inflection rules is an important research area for computational linguistics. In this paper, we present a novel morphological rule induction model called B-Morpher that can be used for both inflection analysis and morphological analysis. The core element of the engine is a modified Bayes classifier in which class categories correspond to general string transformation rules. Beside the core classification module, the engine contains a neural network module and verification unit to improve classification accuracy. For the evaluation, beside the large Hungarian dataset the tests include smaller non-Hungarian datasets from the SIGMORPHON shared task pools. Our evaluation shows that the efficiency of B-Morpher is comparable with the best results, and it outperforms the state-of-theart base models for some languages. The proposed system can be characterized by not only high accuracy, but also short training time and small knowledge base size.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48734682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Attribute-Based Access Control Model for RDBMS 一种新的基于属性的RDBMS访问控制模型
IF 1.2 Q2 Computer Science Pub Date : 2022-11-01 DOI: 10.2478/cait-2022-0036
J. Al-Saraireh, Majid Hassan
Abstract One of the challenges in Attribute-Based Access Control (ABAC) implementation is acquiring sufficient metadata against entities and attributes. Intelligent mining and extracting ABAC policies and attributes make ABAC implementation more feasible and cost-effective. This research paper focuses on attribute extraction from an existing enterprise relational database management system – RDBMS. The proposed approach tends to first classify entities according to some aspects of RDBMS systems. By reverse engineering, some metadata elements and ranking values are calculated for each part. Then entities and attributes are assigned a final rank that helps to decide what attribute subset is a candidate to be an optimal input for ABAC implementation. The proposed approach has been tested and implemented against an existing enterprise RDBMS, and the results are then evaluated. The approach enables the choice to trade-off between accuracy and overhead. The results score an accuracy of up to 80% with no overhead or 88% of accuracy with 65% overhead.
摘要基于属性的访问控制(ABAC)实现面临的挑战之一是针对实体和属性获取足够的元数据。智能挖掘和提取ABAC策略和属性使ABAC实现更加可行和经济高效。本文主要研究从现有的企业关系数据库管理系统RDBMS中提取属性。所提出的方法倾向于首先根据RDBMS系统的某些方面对实体进行分类。通过逆向工程,为每个部分计算一些元数据元素和排名值。然后,实体和属性被分配一个最终排名,这有助于决定哪个属性子集是ABAC实现的最佳输入。所提出的方法已经在现有的企业RDBMS上进行了测试和实现,然后对结果进行了评估。该方法允许在准确性和开销之间进行权衡。结果在没有开销的情况下准确率高达80%,在开销为65%的情况下,准确率为88%。
{"title":"A New Attribute-Based Access Control Model for RDBMS","authors":"J. Al-Saraireh, Majid Hassan","doi":"10.2478/cait-2022-0036","DOIUrl":"https://doi.org/10.2478/cait-2022-0036","url":null,"abstract":"Abstract One of the challenges in Attribute-Based Access Control (ABAC) implementation is acquiring sufficient metadata against entities and attributes. Intelligent mining and extracting ABAC policies and attributes make ABAC implementation more feasible and cost-effective. This research paper focuses on attribute extraction from an existing enterprise relational database management system – RDBMS. The proposed approach tends to first classify entities according to some aspects of RDBMS systems. By reverse engineering, some metadata elements and ranking values are calculated for each part. Then entities and attributes are assigned a final rank that helps to decide what attribute subset is a candidate to be an optimal input for ABAC implementation. The proposed approach has been tested and implemented against an existing enterprise RDBMS, and the results are then evaluated. The approach enables the choice to trade-off between accuracy and overhead. The results score an accuracy of up to 80% with no overhead or 88% of accuracy with 65% overhead.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43562175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1