首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer 基于二进制Owl优化器的物联网环境下网络数字取证新方法
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0033
Hadeel Alazzam, Orieb Abualghanam, Qusay M. Al-zoubi, Abdulsalam Alsmady, Esraa Alhenawi
Abstract The Internet of Things (IoT) is widespread in our lives these days (e.g., Smart homes, smart cities, etc.). Despite its significant role in providing automatic real-time services to users, these devices are highly vulnerable due to their design simplicity and limitations regarding power, CPU, and memory. Tracing network traffic and investigating its behavior helps in building a digital forensics framework to secure IoT networks. This paper proposes a new Network Digital Forensics approach called (NDF IoT). The proposed approach uses the Owl optimizer for selecting the best subset of features that help in identifying suspicious behavior in such environments. The NDF IoT approach is evaluated using the Bot IoT UNSW dataset in terms of detection rate, false alarms, accuracy, and f-score. The approach being proposed has achieved 100% detection rate and 99.3% f-score and outperforms related works that used the same dataset while reducing the number of features to three features only.
摘要物联网(IoT)如今在我们的生活中广泛存在(例如,智能家居、智能城市等)。尽管它在为用户提供自动实时服务方面发挥着重要作用,但由于其设计简单以及电源、CPU和内存方面的限制,这些设备极易受到攻击。追踪网络流量并调查其行为有助于建立一个数字取证框架来保护物联网网络。本文提出了一种新的网络数字取证方法,称为(NDF-IoT)。所提出的方法使用Owl优化器来选择有助于识别此类环境中可疑行为的最佳特征子集。NDF-IoT方法使用Bot-IoT UNSW数据集在检测率、误报、准确性和f分数方面进行评估。所提出的方法实现了100%的检测率和99.3%的f-score,并优于使用相同数据集的相关工作,同时将特征数量减少到仅三个特征。
{"title":"A New Network Digital Forensics Approach for Internet of Things Environment Based on Binary Owl Optimizer","authors":"Hadeel Alazzam, Orieb Abualghanam, Qusay M. Al-zoubi, Abdulsalam Alsmady, Esraa Alhenawi","doi":"10.2478/cait-2022-0033","DOIUrl":"https://doi.org/10.2478/cait-2022-0033","url":null,"abstract":"Abstract The Internet of Things (IoT) is widespread in our lives these days (e.g., Smart homes, smart cities, etc.). Despite its significant role in providing automatic real-time services to users, these devices are highly vulnerable due to their design simplicity and limitations regarding power, CPU, and memory. Tracing network traffic and investigating its behavior helps in building a digital forensics framework to secure IoT networks. This paper proposes a new Network Digital Forensics approach called (NDF IoT). The proposed approach uses the Owl optimizer for selecting the best subset of features that help in identifying suspicious behavior in such environments. The NDF IoT approach is evaluated using the Bot IoT UNSW dataset in terms of detection rate, false alarms, accuracy, and f-score. The approach being proposed has achieved 100% detection rate and 99.3% f-score and outperforms related works that used the same dataset while reducing the number of features to three features only.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42331320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic-Based Dynamic Service Adaptation in Context-Aware Mobile Cloud Learning 上下文感知移动云学习中基于语义的动态服务适应
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0030
S. Muhamad, N. Admodisastro, H. Osman, N. M. Ali
Abstract Self-adaptable system concerns on service adaptation whenever errors persist within the system. Changes in contextual information such as networks or sensors will affect the system’s effectiveness because the service adaptation process is not comprehensively handled in those contexts. Besides, the correctness to get the most equivalence services to be substituted is limitedly being addressed from previous works. A dynamic service adaptation framework is introduced to monitor and run a reasoning control to solve these issues. Hence, this paper presents a case study to proof the dynamic service adaptation framework that leverages on semantic-based approach in a context-aware environment. The evaluation of the case study resulted in a significant difference for the effectiveness at a 95% confidence level, which can be interpreted to confirm that the framework is promising to be used in operating dynamic adaptation process in a pervasive environment.
自适应系统关注的是当系统中存在错误时对服务的适应。上下文信息(如网络或传感器)的变化将影响系统的有效性,因为服务适应过程在这些上下文中没有得到全面处理。此外,从以前的工作中有限地解决了获得最多可替换的等价服务的正确性。引入动态服务适应框架来监视和运行推理控制以解决这些问题。因此,本文提出了一个案例研究来证明动态服务适应框架在上下文感知环境中利用基于语义的方法。对案例研究的评估结果显示,在95%的置信水平上,有效性存在显著差异,这可以解释为确认该框架有望用于在普遍环境中操作动态适应过程。
{"title":"Semantic-Based Dynamic Service Adaptation in Context-Aware Mobile Cloud Learning","authors":"S. Muhamad, N. Admodisastro, H. Osman, N. M. Ali","doi":"10.2478/cait-2022-0030","DOIUrl":"https://doi.org/10.2478/cait-2022-0030","url":null,"abstract":"Abstract Self-adaptable system concerns on service adaptation whenever errors persist within the system. Changes in contextual information such as networks or sensors will affect the system’s effectiveness because the service adaptation process is not comprehensively handled in those contexts. Besides, the correctness to get the most equivalence services to be substituted is limitedly being addressed from previous works. A dynamic service adaptation framework is introduced to monitor and run a reasoning control to solve these issues. Hence, this paper presents a case study to proof the dynamic service adaptation framework that leverages on semantic-based approach in a context-aware environment. The evaluation of the case study resulted in a significant difference for the effectiveness at a 95% confidence level, which can be interpreted to confirm that the framework is promising to be used in operating dynamic adaptation process in a pervasive environment.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42870664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Color-Texture-Based Deep Neural Network Technique to Detect Face Spoofing Attacks 基于颜色纹理的深度神经网络人脸欺骗检测技术
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0032
Mayank Kumar Rusia, D. Singh
Abstract Given the face spoofing attack, adequate protection of human identity through face has become a significant challenge globally. Face spoofing is an act of presenting a recaptured frame before the verification device to gain illegal access on behalf of a legitimate person with or without their concern. Several methods have been proposed to detect face spoofing attacks over the last decade. However, these methods only consider the luminance information, reflecting poor discrimination of spoofed face from the genuine face. This article proposes a practical approach combining Local Binary Patterns (LBP) and convolutional neural network-based transfer learning models to extract low-level and high-level features. This paper analyzes three color spaces (i.e., RGB, HSV, and YCrCb) to understand the impact of the color distribution on real and spoofed faces for the NUAA benchmark dataset. In-depth analysis of experimental results and comparison with other existing approaches show the superiority and effectiveness of our proposed models.
摘要鉴于人脸欺骗攻击,通过人脸充分保护人类身份已成为全球面临的重大挑战。人脸欺骗是一种在验证设备前出示重新捕获的帧,以代表合法人员获得非法访问权限的行为,无论是否与合法人员有关。在过去的十年中,已经提出了几种方法来检测人脸欺骗攻击。然而,这些方法只考虑了亮度信息,反映出伪造人脸与真实人脸的区别很差。本文提出了一种结合局部二进制模式(LBP)和卷积神经网络迁移学习模型来提取低级和高级特征的实用方法。本文分析了三个颜色空间(即RGB、HSV和YCrCb),以了解NUAA基准数据集的颜色分布对真实人脸和伪造人脸的影响。对实验结果的深入分析以及与其他现有方法的比较表明了我们提出的模型的优越性和有效性。
{"title":"A Color-Texture-Based Deep Neural Network Technique to Detect Face Spoofing Attacks","authors":"Mayank Kumar Rusia, D. Singh","doi":"10.2478/cait-2022-0032","DOIUrl":"https://doi.org/10.2478/cait-2022-0032","url":null,"abstract":"Abstract Given the face spoofing attack, adequate protection of human identity through face has become a significant challenge globally. Face spoofing is an act of presenting a recaptured frame before the verification device to gain illegal access on behalf of a legitimate person with or without their concern. Several methods have been proposed to detect face spoofing attacks over the last decade. However, these methods only consider the luminance information, reflecting poor discrimination of spoofed face from the genuine face. This article proposes a practical approach combining Local Binary Patterns (LBP) and convolutional neural network-based transfer learning models to extract low-level and high-level features. This paper analyzes three color spaces (i.e., RGB, HSV, and YCrCb) to understand the impact of the color distribution on real and spoofed faces for the NUAA benchmark dataset. In-depth analysis of experimental results and comparison with other existing approaches show the superiority and effectiveness of our proposed models.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48811114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hardware Response and Performance Analysis of Multicore Computing Systems for Deep Learning Algorithms 用于深度学习算法的多核计算系统的硬件响应和性能分析
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0028
Lalit Kumar, D. Singh
Abstract With the advancement in technological world, the technologies like Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) are gaining more popularity in many applications of computer vision like object classification, object detection, Human detection, etc., ML and DL approaches are highly compute-intensive and require advanced computational resources for implementation. Multicore CPUs and GPUs with a large number of dedicated processor cores are typically the more prevailing and effective solutions for the high computational need. In this manuscript, we have come up with an analysis of how these multicore hardware technologies respond to DL algorithms. A Convolutional Neural Network (CNN) model have been trained for three different classification problems using three different datasets. All these experimentations have been performed on three different computational resources, i.e., Raspberry Pi, Nvidia Jetson Nano Board, & desktop computer. Results are derived for performance analysis in terms of classification accuracy and hardware response for each hardware configuration.
摘要随着技术的进步,人工智能(AI)、机器学习(ML)和深度学习(DL)等技术在计算机视觉的许多应用中越来越受欢迎,如物体分类、物体检测、人体检测等。,ML和DL方法是高度计算密集型的,并且需要高级计算资源来实现。具有大量专用处理器核心的多核CPU和GPU通常是满足高计算需求的更普遍、更有效的解决方案。在这份手稿中,我们分析了这些多核硬件技术对DL算法的响应。卷积神经网络(CNN)模型已经使用三个不同的数据集针对三种不同的分类问题进行了训练。所有这些实验都是在三种不同的计算资源上进行的,即Raspberry Pi、Nvidia Jetson Nano Board和台式计算机。根据每个硬件配置的分类精度和硬件响应,导出用于性能分析的结果。
{"title":"Hardware Response and Performance Analysis of Multicore Computing Systems for Deep Learning Algorithms","authors":"Lalit Kumar, D. Singh","doi":"10.2478/cait-2022-0028","DOIUrl":"https://doi.org/10.2478/cait-2022-0028","url":null,"abstract":"Abstract With the advancement in technological world, the technologies like Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) are gaining more popularity in many applications of computer vision like object classification, object detection, Human detection, etc., ML and DL approaches are highly compute-intensive and require advanced computational resources for implementation. Multicore CPUs and GPUs with a large number of dedicated processor cores are typically the more prevailing and effective solutions for the high computational need. In this manuscript, we have come up with an analysis of how these multicore hardware technologies respond to DL algorithms. A Convolutional Neural Network (CNN) model have been trained for three different classification problems using three different datasets. All these experimentations have been performed on three different computational resources, i.e., Raspberry Pi, Nvidia Jetson Nano Board, & desktop computer. Results are derived for performance analysis in terms of classification accuracy and hardware response for each hardware configuration.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43327112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mathematical Modelling of Malware Intrusion in Computer Networks 计算机网络中恶意软件入侵的数学模型
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0026
Andon Lazarov
Abstract Malware attacks cause great harms in the contemporary information systems and that requires analysis of computer networks reaction in case of malware impact. The focus of the present study is on the analysis of the computer network’s states and reactions in case of malware attacks defined by the susceptibility, exposition, infection and recoverability of computer nodes. Two scenarios are considered – equilibrium without secure software and not equilibrium with secure software in the computer network. The behavior of the computer network under a malware attack is described by a system of nonhomogeneous differential equations. The system of the nonhomogeneous differential equations is solved, and analytical expressions are derived to analyze network characteristics in case of susceptibility, exposition, infection and recoverability of computer nodes during malware attack. The analytical expressions derived are illustrated with results of numerical experiments. The conception developed in this work can be applied to control, prevent and protect computer networks from malware intrusions.
摘要恶意软件攻击在当代信息系统中造成了巨大的危害,需要分析计算机网络在受到恶意软件影响时的反应。本研究的重点是分析计算机网络在恶意软件攻击情况下的状态和反应,恶意软件攻击由计算机节点的易感性、暴露性、感染性和可恢复性定义。考虑了两种情况——没有安全软件的平衡和计算机网络中有安全软件的不平衡。计算机网络在恶意软件攻击下的行为由非齐次微分方程组描述。求解了非齐次微分方程组,导出了分析恶意软件攻击过程中计算机节点易受攻击、暴露、感染和可恢复性等情况下网络特性的解析表达式。文中用数值实验结果对推导的解析表达式进行了说明。这项工作中提出的概念可以应用于控制、预防和保护计算机网络免受恶意软件入侵。
{"title":"Mathematical Modelling of Malware Intrusion in Computer Networks","authors":"Andon Lazarov","doi":"10.2478/cait-2022-0026","DOIUrl":"https://doi.org/10.2478/cait-2022-0026","url":null,"abstract":"Abstract Malware attacks cause great harms in the contemporary information systems and that requires analysis of computer networks reaction in case of malware impact. The focus of the present study is on the analysis of the computer network’s states and reactions in case of malware attacks defined by the susceptibility, exposition, infection and recoverability of computer nodes. Two scenarios are considered – equilibrium without secure software and not equilibrium with secure software in the computer network. The behavior of the computer network under a malware attack is described by a system of nonhomogeneous differential equations. The system of the nonhomogeneous differential equations is solved, and analytical expressions are derived to analyze network characteristics in case of susceptibility, exposition, infection and recoverability of computer nodes during malware attack. The analytical expressions derived are illustrated with results of numerical experiments. The conception developed in this work can be applied to control, prevent and protect computer networks from malware intrusions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49571122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Serverless High-Performance Computing over Cloud 基于云的无服务器高性能计算
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0029
Davit Petrosyan, H. Astsatryan
Abstract HPC clouds may provide fast access to fully configurable and dynamically scalable virtualized HPC clusters to address the complex and challenging computation and storage-intensive requirements. The complex environmental, software, and hardware requirements and dependencies on such systems make it challenging to carry out our large-scale simulations, prediction systems, and other data and compute-intensive workloads over the cloud. The article aims to present an architecture that enables HPC workloads to be serverless over the cloud (Shoc), one of the most critical cloud capabilities for HPC workloads. On one hand, Shoc utilizes the abstraction power of container technologies like Singularity and Docker, combined with the scheduling and resource management capabilities of Kubernetes. On the other hand, Shoc allows running any CPU-intensive and data-intensive workloads in the cloud without needing to manage HPC infrastructure, complex software, and hardware environment deployments.
HPC云可以提供对完全可配置和动态扩展的虚拟化HPC集群的快速访问,以解决复杂且具有挑战性的计算和存储密集型需求。复杂的环境、软件和硬件要求以及对此类系统的依赖使得在云上执行我们的大规模模拟、预测系统以及其他数据和计算密集型工作负载具有挑战性。本文旨在介绍一种架构,使HPC工作负载能够在云上无服务器(Shoc),这是HPC工作负载最关键的云功能之一。一方面,Shoc利用了Singularity和Docker等容器技术的抽象能力,并结合了Kubernetes的调度和资源管理能力。另一方面,Shoc允许在云中运行任何cpu密集型和数据密集型工作负载,而无需管理HPC基础设施、复杂的软件和硬件环境部署。
{"title":"Serverless High-Performance Computing over Cloud","authors":"Davit Petrosyan, H. Astsatryan","doi":"10.2478/cait-2022-0029","DOIUrl":"https://doi.org/10.2478/cait-2022-0029","url":null,"abstract":"Abstract HPC clouds may provide fast access to fully configurable and dynamically scalable virtualized HPC clusters to address the complex and challenging computation and storage-intensive requirements. The complex environmental, software, and hardware requirements and dependencies on such systems make it challenging to carry out our large-scale simulations, prediction systems, and other data and compute-intensive workloads over the cloud. The article aims to present an architecture that enables HPC workloads to be serverless over the cloud (Shoc), one of the most critical cloud capabilities for HPC workloads. On one hand, Shoc utilizes the abstraction power of container technologies like Singularity and Docker, combined with the scheduling and resource management capabilities of Kubernetes. On the other hand, Shoc allows running any CPU-intensive and data-intensive workloads in the cloud without needing to manage HPC infrastructure, complex software, and hardware environment deployments.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45007768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
One-vs-All Convolutional Neural Networks for Synthetic Aperture Radar Target Recognition 合成孔径雷达目标识别的一对一卷积神经网络
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0035
B. P. Babu, S. Narayanan
Abstract Convolutional Neural Networks (CNN) have been widely utilized for Automatic Target Recognition (ATR) in Synthetic Aperture Radar (SAR) images. However, a large number of parameters and a huge training data requirements limit CNN’s use in SAR ATR. While previous works have primarily focused on model compression and structural modification of CNN, this paper employs the One-Vs-All (OVA) technique on CNN to address these issues. OVA-CNN comprises several Binary classifying CNNs (BCNNs) that act as an expert in correctly recognizing a single target. The BCNN that predicts the highest probability for a given target determines the class to which the target belongs. The evaluation of the model using various metrics on the Moving and Stationary Target Acquisition and Recognition (MSTAR) benchmark dataset illustrates that the OVA-CNN has fewer weight parameters and training sample requirements while exhibiting a high recognition rate.
摘要卷积神经网络(CNN)在合成孔径雷达(SAR)图像的目标自动识别(ATR)中得到了广泛的应用。然而,大量的参数和巨大的训练数据需求限制了CNN在SAR ATR中的应用。虽然以前的工作主要集中在CNN的模型压缩和结构修改上,但本文在CNN上采用了一对一(OVA)技术来解决这些问题。OVA-NN包括几个二进制分类CNN(BCNN),它们在正确识别单个目标方面充当专家。预测给定目标的最高概率的BCNN确定目标所属的类别。在运动和静止目标获取与识别(MSTAR)基准数据集上使用各种指标对模型进行的评估表明,OVA-NN具有较少的权重参数和训练样本要求,同时表现出较高的识别率。
{"title":"One-vs-All Convolutional Neural Networks for Synthetic Aperture Radar Target Recognition","authors":"B. P. Babu, S. Narayanan","doi":"10.2478/cait-2022-0035","DOIUrl":"https://doi.org/10.2478/cait-2022-0035","url":null,"abstract":"Abstract Convolutional Neural Networks (CNN) have been widely utilized for Automatic Target Recognition (ATR) in Synthetic Aperture Radar (SAR) images. However, a large number of parameters and a huge training data requirements limit CNN’s use in SAR ATR. While previous works have primarily focused on model compression and structural modification of CNN, this paper employs the One-Vs-All (OVA) technique on CNN to address these issues. OVA-CNN comprises several Binary classifying CNNs (BCNNs) that act as an expert in correctly recognizing a single target. The BCNN that predicts the highest probability for a given target determines the class to which the target belongs. The evaluation of the model using various metrics on the Moving and Stationary Target Acquisition and Recognition (MSTAR) benchmark dataset illustrates that the OVA-CNN has fewer weight parameters and training sample requirements while exhibiting a high recognition rate.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42579608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Investigation of Dense Family of Closure Operations 稠密闭包运算族的研究
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0025
Nguyen Hoang Son, J. Demetrovics, V. D. Thi, Nguyen Ngoc Thuy
Abstract As a basic notion in algebra, closure operations have been successfully applied to many fields of computer science. In this paper we study dense family in the closure operations. In particular, we prove some families to be dense in any closure operation, in which the greatest and smallest dense families, including the collection of the whole closed sets and the minimal generator of the closed sets, are also pointed out. More important, a necessary and sufficient condition for an arbitrary family to be dense is provided in our paper. Then we use these dense families to characterize minimal keys of the closure operation under the viewpoint of transversal hypergraphs and construct an algorithm for determining the minimal keys of a closure operation.
闭包运算作为代数中的一个基本概念,已经成功地应用于计算机科学的许多领域。本文研究闭包运算中的密集族。特别地,我们证明了一些族在任何闭包运算中都是密集的,并指出了其中的最大和最小的密集族,包括整个闭集的集合和闭集的最小生成。更重要的是,本文给出了任意族是稠密的一个充分必要条件。然后利用这些密集族在截线超图的视点下刻画了闭包操作的最小键,并构造了一个确定闭包操作最小键的算法。
{"title":"Investigation of Dense Family of Closure Operations","authors":"Nguyen Hoang Son, J. Demetrovics, V. D. Thi, Nguyen Ngoc Thuy","doi":"10.2478/cait-2022-0025","DOIUrl":"https://doi.org/10.2478/cait-2022-0025","url":null,"abstract":"Abstract As a basic notion in algebra, closure operations have been successfully applied to many fields of computer science. In this paper we study dense family in the closure operations. In particular, we prove some families to be dense in any closure operation, in which the greatest and smallest dense families, including the collection of the whole closed sets and the minimal generator of the closed sets, are also pointed out. More important, a necessary and sufficient condition for an arbitrary family to be dense is provided in our paper. Then we use these dense families to characterize minimal keys of the closure operation under the viewpoint of transversal hypergraphs and construct an algorithm for determining the minimal keys of a closure operation.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44378789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward Programmability of Radio Resource Control Based on O-RAN 基于O-RAN的无线电资源控制可编程性研究
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0034
E. Pencheva, I. Atanasov
Abstract Open Radio Access Network (O-RAN) is a concept that aims at embedding intelligence at the network edge and at disaggregating of network functionality from the hardware. The paper studies how the O-RAN concept can be used for optimization of radio resource management. The research focuses on adaptive radio resource allocation based on predictions of device activity. For narrowband devices which send sporadically small volumes of data, a feature is defined which enables a device with no activity for a short time to suspend its session and to resume it moving in active state. Dynamic configuration of the inactivity timer based on prediction of device activity may further optimize radio resource allocation. The paper studies an O-RAN use case for dynamic radio resource control and presents the results of emulation of the RESTful interface defined between the O-RAN non-real-time and near real-time functions.
开放无线接入网(O-RAN)是一个旨在将智能嵌入网络边缘并将网络功能从硬件中分离出来的概念。本文研究了如何将O-RAN概念应用于无线电资源管理的优化。研究的重点是基于设备活动预测的自适应无线电资源分配。对于偶尔发送少量数据的窄带设备,定义了一个特性,使短时间内没有活动的设备能够暂停其会话并恢复其在活动状态下移动。基于设备活动预测的非活动计时器的动态配置可进一步优化无线电资源分配。研究了一个用于动态无线电资源控制的O-RAN用例,给出了O-RAN非实时和近实时功能之间定义的RESTful接口的仿真结果。
{"title":"Toward Programmability of Radio Resource Control Based on O-RAN","authors":"E. Pencheva, I. Atanasov","doi":"10.2478/cait-2022-0034","DOIUrl":"https://doi.org/10.2478/cait-2022-0034","url":null,"abstract":"Abstract Open Radio Access Network (O-RAN) is a concept that aims at embedding intelligence at the network edge and at disaggregating of network functionality from the hardware. The paper studies how the O-RAN concept can be used for optimization of radio resource management. The research focuses on adaptive radio resource allocation based on predictions of device activity. For narrowband devices which send sporadically small volumes of data, a feature is defined which enables a device with no activity for a short time to suspend its session and to resume it moving in active state. Dynamic configuration of the inactivity timer based on prediction of device activity may further optimize radio resource allocation. The paper studies an O-RAN use case for dynamic radio resource control and presents the results of emulation of the RESTful interface defined between the O-RAN non-real-time and near real-time functions.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41311956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Noise Generation Methods Preserving Image Color Intensity Distributions 保持图像颜色强度分布的噪声生成方法
IF 1.2 Q2 Computer Science Pub Date : 2022-09-01 DOI: 10.2478/cait-2022-0031
Tsvetalin Totev, N. Bocheva, S. Stefanov, M. Mihaylova
Abstract In many visual perception studies, external visual noise is used as a methodology to broaden the understanding of information processing of visual stimuli. The underlying assumption is that two sources of noise limit sensory processing: the external noise inherent in the environmental signals and the internal noise or internal variability at different levels of the neural system. Usually, when external noise is added to an image, it is evenly distributed. However, the color intensity and image contrast are modified in this way, and it is unclear whether the visual system responds to their change or the noise presence. We aimed to develop several methods of noise generation with different distributions that keep the global image characteristics. These methods are appropriate in various applications for evaluating the internal noise in the visual system and its ability to filter the added noise. As these methods destroy the correlation in image intensity of neighboring pixels, they could be used to evaluate the role of local spatial structure in image processing.
摘要在许多视觉感知研究中,外部视觉噪声被用作一种方法论,以拓宽对视觉刺激信息处理的理解。基本假设是,两种噪声源限制了感官处理:环境信号中固有的外部噪声和神经系统不同级别的内部噪声或内部可变性。通常,当外部噪声被添加到图像中时,它是均匀分布的。然而,颜色强度和图像对比度是以这种方式修改的,并且不清楚视觉系统是否对它们的变化或噪声的存在做出响应。我们旨在开发几种具有不同分布的噪声生成方法,以保持全局图像特征。这些方法适用于评估视觉系统中的内部噪声及其过滤添加噪声的能力的各种应用。由于这些方法破坏了相邻像素图像强度的相关性,因此可以用来评估局部空间结构在图像处理中的作用。
{"title":"Noise Generation Methods Preserving Image Color Intensity Distributions","authors":"Tsvetalin Totev, N. Bocheva, S. Stefanov, M. Mihaylova","doi":"10.2478/cait-2022-0031","DOIUrl":"https://doi.org/10.2478/cait-2022-0031","url":null,"abstract":"Abstract In many visual perception studies, external visual noise is used as a methodology to broaden the understanding of information processing of visual stimuli. The underlying assumption is that two sources of noise limit sensory processing: the external noise inherent in the environmental signals and the internal noise or internal variability at different levels of the neural system. Usually, when external noise is added to an image, it is evenly distributed. However, the color intensity and image contrast are modified in this way, and it is unclear whether the visual system responds to their change or the noise presence. We aimed to develop several methods of noise generation with different distributions that keep the global image characteristics. These methods are appropriate in various applications for evaluating the internal noise in the visual system and its ability to filter the added noise. As these methods destroy the correlation in image intensity of neighboring pixels, they could be used to evaluate the role of local spatial structure in image processing.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43005683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1