首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
An Insight on Clustering Protocols in Wireless Sensor Networks 无线传感器网络中的集群协议研究
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0017
M. Raju, K. P. Lochanambal
Abstract Wireless Sensor Networks (WSN) have drawn the attention of many researchers as well as general users in recent years. Since WSN has a wide range of applications, including environmental monitoring, medical applications, and surveillance, their usage is not limited. As energy is a major constraint in WSN, it is necessary to employ techniques that reduce energy consumption in order to extend the network’s lifetime. Clustering, data aggregation, duty cycling, load balancing, and efficient routing are some of the techniques used to reduce energy consumption. In this paper, we discuss in details about clustering, its properties, the existing clustering protocols. The clustering protocols that support data aggregation will also be discussed. The paper concludes with considering the impact of clustering and data aggregation in WSN.
摘要无线传感器网络(WSN)近年来引起了许多研究人员和普通用户的关注。由于无线传感器网络具有广泛的应用,包括环境监测、医疗应用和监测,因此其用途并不局限。由于能量是无线传感器网络的主要限制因素,因此有必要采用降低能量消耗的技术来延长网络的寿命。集群、数据聚合、工作循环、负载平衡和高效路由是用于降低能耗的一些技术。在本文中,我们详细讨论了集群,它的性质,现有的集群协议。还将讨论支持数据聚合的集群协议。文章最后考虑了集群和数据聚合对无线传感器网络的影响。
{"title":"An Insight on Clustering Protocols in Wireless Sensor Networks","authors":"M. Raju, K. P. Lochanambal","doi":"10.2478/cait-2022-0017","DOIUrl":"https://doi.org/10.2478/cait-2022-0017","url":null,"abstract":"Abstract Wireless Sensor Networks (WSN) have drawn the attention of many researchers as well as general users in recent years. Since WSN has a wide range of applications, including environmental monitoring, medical applications, and surveillance, their usage is not limited. As energy is a major constraint in WSN, it is necessary to employ techniques that reduce energy consumption in order to extend the network’s lifetime. Clustering, data aggregation, duty cycling, load balancing, and efficient routing are some of the techniques used to reduce energy consumption. In this paper, we discuss in details about clustering, its properties, the existing clustering protocols. The clustering protocols that support data aggregation will also be discussed. The paper concludes with considering the impact of clustering and data aggregation in WSN.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45368926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of a Scheme for Correcting Arbitrary Errors and Averaging Noise in Quantum Computing 量子计算中任意误差校正和噪声平均方案的发展
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0014
S. Gushanskiy, M. Polenov, V. Potapov
Abstract Intensive research is currently being carried out to develop and create quantum computers and their software. This work is devoted to study of the influence of the environment on the quantum system of qubits. Quantum error correction is a set of methods for protecting quantum information and quantum state from unwanted interactions of the environment (decoherence) and other forms and types of noise. The article discusses the solution to the problem of research and development of corrective codes for rectifying several types of quantum errors that occur during computational processes in quantum algorithms and models of quantum computing devices. The aim of the work is to study existing methods for correcting various types of quantum errors and to create a corrective code for quantum error rectification. The scientific novelty is expressed in the exclusion of one of the shortcomings of the quantum computing process.
摘要目前正在进行深入的研究,以开发和创建量子计算机及其软件。这项工作致力于研究环境对量子位量子系统的影响。量子纠错是一套保护量子信息和量子态免受环境(退相干)和其他形式和类型的噪声的不必要相互作用的方法。本文讨论了在量子算法和量子计算设备模型的计算过程中出现的几种类型的量子误差的校正码的研究和开发问题的解决方案。这项工作的目的是研究现有的校正各种类型量子误差的方法,并创建用于量子误差校正的校正代码。科学的新颖性表现为排除了量子计算过程的一个缺点。
{"title":"Development of a Scheme for Correcting Arbitrary Errors and Averaging Noise in Quantum Computing","authors":"S. Gushanskiy, M. Polenov, V. Potapov","doi":"10.2478/cait-2022-0014","DOIUrl":"https://doi.org/10.2478/cait-2022-0014","url":null,"abstract":"Abstract Intensive research is currently being carried out to develop and create quantum computers and their software. This work is devoted to study of the influence of the environment on the quantum system of qubits. Quantum error correction is a set of methods for protecting quantum information and quantum state from unwanted interactions of the environment (decoherence) and other forms and types of noise. The article discusses the solution to the problem of research and development of corrective codes for rectifying several types of quantum errors that occur during computational processes in quantum algorithms and models of quantum computing devices. The aim of the work is to study existing methods for correcting various types of quantum errors and to create a corrective code for quantum error rectification. The scientific novelty is expressed in the exclusion of one of the shortcomings of the quantum computing process.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48924631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Scrutiny of Honeyword Generation Methods: Remarks on Strengths and Weaknesses Points 蜜语生成方法研究——兼论优势与劣势
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0013
Yasser A. Yasser, A. Sadiq, Wasim Alhamdani
Abstract Honeyword system is a successful password cracking detection system. Simply the honeywords are (False passwords) that are accompanied to the sugarword (Real password). Honeyword system aims to improve the security of hashed passwords by facilitating the detection of password cracking. The password database will have many honeywords for every user in the system. If the adversary uses a honeyword for login, a silent alert will indicate that the password database might be compromised. All previous studies present a few remarks on honeyword generation methods for max two preceding methods only. So, the need for one that lists all preceding researches with their weaknesses is shown. This work presents all generation methods then lists the strengths and weaknesses of 26 ones. In addition, it puts 32 remarks that highlight their strengths and weaknesses points. This research has proved that every honeyword generation method has many weaknesses points.
摘要Honeyword系统是一个成功的密码破解检测系统。简单地说,蜜语是(假密码),伴随着糖词(真实密码)。Honeyword系统旨在通过促进密码破解的检测来提高哈希密码的安全性。密码数据库将为系统中的每个用户提供许多蜜语。如果对手使用蜜语登录,则会发出无声警报,表明密码数据库可能已被破坏。所有先前的研究都只对前两种方法的蜜语生成方法进行了一些评论。因此,有必要列出所有先前的研究及其弱点。这项工作介绍了所有的生成方法,然后列出了26种生成方法的优缺点。此外,它提出了32条意见,突出了它们的长处和短处。这项研究证明,每一种蜜语生成方法都有许多弱点。
{"title":"A Scrutiny of Honeyword Generation Methods: Remarks on Strengths and Weaknesses Points","authors":"Yasser A. Yasser, A. Sadiq, Wasim Alhamdani","doi":"10.2478/cait-2022-0013","DOIUrl":"https://doi.org/10.2478/cait-2022-0013","url":null,"abstract":"Abstract Honeyword system is a successful password cracking detection system. Simply the honeywords are (False passwords) that are accompanied to the sugarword (Real password). Honeyword system aims to improve the security of hashed passwords by facilitating the detection of password cracking. The password database will have many honeywords for every user in the system. If the adversary uses a honeyword for login, a silent alert will indicate that the password database might be compromised. All previous studies present a few remarks on honeyword generation methods for max two preceding methods only. So, the need for one that lists all preceding researches with their weaknesses is shown. This work presents all generation methods then lists the strengths and weaknesses of 26 ones. In addition, it puts 32 remarks that highlight their strengths and weaknesses points. This research has proved that every honeyword generation method has many weaknesses points.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45192389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques 利用机器学习技术可视化网络威胁情报中的有趣模式
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0019
Sarwat Ejaz, Umara Noor, Zahid Rashid
Abstract In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping security analysts understand recent cyber threats and their mitigations. The mass of CTI is exponentially increasing, most of the content is textual which makes it difficult to analyze. The current CTI visualization tools do not provide effective visualizations. To address this issue, an exploratory data analysis of CTI reports is performed to dig-out and visualize interesting patterns of cyber threats which help security analysts to proactively mitigate vulnerabilities and timely predict cyber threats in their networks.
在一个先进和动态的网络威胁环境中,组织需要产生更主动的方法来处理他们的网络防御。以前事件的网络威胁数据,即网络威胁情报(CTI),通过帮助安全分析师了解最近的网络威胁及其缓解措施,发挥了重要作用。CTI的数量呈指数级增长,大部分内容是文本化的,难以分析。目前的CTI可视化工具不能提供有效的可视化。为了解决这个问题,对CTI报告进行了探索性数据分析,以挖掘和可视化有趣的网络威胁模式,帮助安全分析师主动减轻漏洞并及时预测网络中的网络威胁。
{"title":"Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques","authors":"Sarwat Ejaz, Umara Noor, Zahid Rashid","doi":"10.2478/cait-2022-0019","DOIUrl":"https://doi.org/10.2478/cait-2022-0019","url":null,"abstract":"Abstract In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping security analysts understand recent cyber threats and their mitigations. The mass of CTI is exponentially increasing, most of the content is textual which makes it difficult to analyze. The current CTI visualization tools do not provide effective visualizations. To address this issue, an exploratory data analysis of CTI reports is performed to dig-out and visualize interesting patterns of cyber threats which help security analysts to proactively mitigate vulnerabilities and timely predict cyber threats in their networks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45645482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Optimization of Cross Diagonal Pixel Value Differencing and Modulus Function Steganography Using Edge Area Block Patterns 利用边缘区域块模式优化交叉对角线像素值差分和模函数隐写
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0022
Supriadi Rustad, Ignatius Moses Setiadi de Rosal, P. Andono, Abdul Syukur, Purwanto
Abstract The existence of a trade-off between embedding capacity and imperceptibility is a challenge to improve the quality of steganographic images. This research proposes to cross diagonal embedding Pixel Value Differencing (PVD) and Modulus Function (MF) techniques using edge area patterns to improve embedding capacity and imperceptibility simultaneously. At the same time still, maintain a good quality of security. By implementing them into 14 public datasets, the proposed techniques are proven to increase both capacity and imperceptibility. The cross diagonal embedding PVD is responsible for increasing the embedding capacity reaching an average value of 3.18 bits per pixel (bpp), and at the same time, the implementation of edge area block patterns-based embedding is a solution of improving imperceptibility toward an average value of PSNR above 40 dB and that of SSIM above 0.98. Aside from its success in increasing the embedding capacity and the imperceptibility, the proposed techniques remain resistant to RS attacks.
摘要嵌入容量与隐写图像不可感知性之间的权衡是提高隐写图像质量的一个挑战。本研究提出利用边缘面积模式交叉对角嵌入像素值差分(PVD)和模函数(MF)技术,以同时提高嵌入容量和不可感知性。同时还保持了良好的安全质量。通过在14个公共数据集中实现它们,证明了所提出的技术提高了容量和不可感知性。交叉对角嵌入PVD可使嵌入容量提高到平均3.18 bits / pixel (bpp),同时,实现基于边缘区域块模式的嵌入是提高对PSNR平均值大于40 dB和SSIM平均值大于0.98的不可见性的解决方案。除了成功地提高了嵌入容量和不可感知性之外,所提出的技术仍然可以抵抗RS攻击。
{"title":"Optimization of Cross Diagonal Pixel Value Differencing and Modulus Function Steganography Using Edge Area Block Patterns","authors":"Supriadi Rustad, Ignatius Moses Setiadi de Rosal, P. Andono, Abdul Syukur, Purwanto","doi":"10.2478/cait-2022-0022","DOIUrl":"https://doi.org/10.2478/cait-2022-0022","url":null,"abstract":"Abstract The existence of a trade-off between embedding capacity and imperceptibility is a challenge to improve the quality of steganographic images. This research proposes to cross diagonal embedding Pixel Value Differencing (PVD) and Modulus Function (MF) techniques using edge area patterns to improve embedding capacity and imperceptibility simultaneously. At the same time still, maintain a good quality of security. By implementing them into 14 public datasets, the proposed techniques are proven to increase both capacity and imperceptibility. The cross diagonal embedding PVD is responsible for increasing the embedding capacity reaching an average value of 3.18 bits per pixel (bpp), and at the same time, the implementation of edge area block patterns-based embedding is a solution of improving imperceptibility toward an average value of PSNR above 40 dB and that of SSIM above 0.98. Aside from its success in increasing the embedding capacity and the imperceptibility, the proposed techniques remain resistant to RS attacks.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47286665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Tunnel Parsing with the Token’s Lexeme 使用令牌的Lexeme进行隧道解析
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0021
Nikolay Handzhiyski, E. Somova
Abstract The article describes a string recognition approach, engraved in the parsers generated by Tunnel Grammar Studio that use the tunnel parsing algorithm, of how a lexer and a parser can operate on the input during its recognition. Proposed is an addition of the augmented Backus-Naur form syntax that enables the formal language to be expressed with a parser grammar and optionally with an additional lexer grammar. The tokens outputted from the lexer are matched to the phrases in the parser grammar by their name and optionally by their lexeme, case sensitively or insensitively.
摘要本文描述了一种字符串识别方法,该方法刻在Tunnel Grammar Studio生成的使用隧道解析算法的解析器中,描述了lexer和解析器如何在识别过程中对输入进行操作。建议添加增强的Backus-Naur形式语法,使形式语言能够用语法分析器和可选的额外lexer语法来表达。从词法分析器输出的标记通过其名称和可选的词位(区分大小写或不区分大小写)与语法分析器中的短语匹配。
{"title":"Tunnel Parsing with the Token’s Lexeme","authors":"Nikolay Handzhiyski, E. Somova","doi":"10.2478/cait-2022-0021","DOIUrl":"https://doi.org/10.2478/cait-2022-0021","url":null,"abstract":"Abstract The article describes a string recognition approach, engraved in the parsers generated by Tunnel Grammar Studio that use the tunnel parsing algorithm, of how a lexer and a parser can operate on the input during its recognition. Proposed is an addition of the augmented Backus-Naur form syntax that enables the formal language to be expressed with a parser grammar and optionally with an additional lexer grammar. The tokens outputted from the lexer are matched to the phrases in the parser grammar by their name and optionally by their lexeme, case sensitively or insensitively.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43241686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Rule-Generation Model for Class Imbalances to Detect Student Entrepreneurship Based on the Theory of Planned Behavior 基于计划行为理论的班级失衡规则生成模型及其对学生创业精神的检测
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0023
Nova Rijati, Diana Purwitasar, S. Sumpeno, M. Purnomo
Abstract The ability to identify the entrepreneurial potential of students enables higher education institutions to contribute to the economic and social development of a country. Current research trends regarding the detection of student entrepreneurial potential have the greatest challenge in the unequal ratio of datasets. This study proposes a rule-generation model in an imbalanced situation to classify student entrepreneurship based on the Theory of Planned Behavior (TPB). The result is a ruleset that is used for the early detection of student entrepreneurial potential. The proposed method consists of three main stages, namely preprocessing data to classify data based on TPB variables, generating a dataset by clustering and selecting attributes by sampling to balance the data, and finally generating a ruleset. Furthermore, the results of the detecting ruleset have been evaluated with actual data from the student tracer study as ground truth. The evaluation results show high accuracy so that the ruleset can be applied to the higher education environment in the future.
摘要识别学生创业潜力的能力使高等教育机构能够为一个国家的经济和社会发展做出贡献。当前关于学生创业潜力检测的研究趋势在数据集比例不平等方面面临最大挑战。本研究基于计划行为理论(TPB),提出了一个不平衡情境下的规则生成模型来对学生创业进行分类。其结果是一个用于早期发现学生创业潜力的规则集。该方法包括三个主要阶段,即预处理数据以基于TPB变量对数据进行分类,通过聚类生成数据集,通过采样选择属性以平衡数据,最后生成规则集。此外,检测规则集的结果已经用学生追踪研究的实际数据作为基本事实进行了评估。评估结果具有较高的准确性,可以将该规则集应用于未来的高等教育环境中。
{"title":"A Rule-Generation Model for Class Imbalances to Detect Student Entrepreneurship Based on the Theory of Planned Behavior","authors":"Nova Rijati, Diana Purwitasar, S. Sumpeno, M. Purnomo","doi":"10.2478/cait-2022-0023","DOIUrl":"https://doi.org/10.2478/cait-2022-0023","url":null,"abstract":"Abstract The ability to identify the entrepreneurial potential of students enables higher education institutions to contribute to the economic and social development of a country. Current research trends regarding the detection of student entrepreneurial potential have the greatest challenge in the unequal ratio of datasets. This study proposes a rule-generation model in an imbalanced situation to classify student entrepreneurship based on the Theory of Planned Behavior (TPB). The result is a ruleset that is used for the early detection of student entrepreneurial potential. The proposed method consists of three main stages, namely preprocessing data to classify data based on TPB variables, generating a dataset by clustering and selecting attributes by sampling to balance the data, and finally generating a ruleset. Furthermore, the results of the detecting ruleset have been evaluated with actual data from the student tracer study as ground truth. The evaluation results show high accuracy so that the ruleset can be applied to the higher education environment in the future.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43302128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling Activity of a Malicious User in Computer Networks 计算机网络中恶意用户的行为建模
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0018
Andon Lazarov, P. Petrova
Abstract In the present study, an extended classification of Internet users penetrating in computer networks and a definition of the motivation as a psychological and emotional state and main prerequisites for modelling of network intruder’s activity are suggested. A mathematical model as a quadratic function of malicious individual’s behavior and impact on the computer network based on three quantified factors, motivation, satisfaction and system protection is developed. Numerical simulation experiments of the unauthorized access and its effect onto the computer network are carried out. The obtained results are graphically illustrated and discussed.
摘要本文对渗透到计算机网络中的互联网用户进行了扩展分类,将其动机定义为一种心理和情感状态,并提出了网络入侵者活动建模的主要先决条件。建立了基于动机、满意度和系统保护三个量化因素的恶意个体行为及其对计算机网络影响的二次函数数学模型。对非法访问及其对计算机网络的影响进行了数值模拟实验。对所得结果进行了图解说明和讨论。
{"title":"Modelling Activity of a Malicious User in Computer Networks","authors":"Andon Lazarov, P. Petrova","doi":"10.2478/cait-2022-0018","DOIUrl":"https://doi.org/10.2478/cait-2022-0018","url":null,"abstract":"Abstract In the present study, an extended classification of Internet users penetrating in computer networks and a definition of the motivation as a psychological and emotional state and main prerequisites for modelling of network intruder’s activity are suggested. A mathematical model as a quadratic function of malicious individual’s behavior and impact on the computer network based on three quantified factors, motivation, satisfaction and system protection is developed. Numerical simulation experiments of the unauthorized access and its effect onto the computer network are carried out. The obtained results are graphically illustrated and discussed.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47618475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing the Speed of the Learning Vector Quantization (LVQ) Algorithm by Adding Partial Distance Computation 加入部分距离计算提高学习向量量化(LVQ)算法的速度
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0015
Orieb Abualghanam, Omar Y. Adwan, Mohammad A. Al Shariah, Mohammad Qatawneh
Abstract Learning Vector Quantization (LVQ) is one of the most widely used classification approaches. LVQ faces a problem as when the size of data grows large it becomes slower. In this paper, a modified version of LVQ, which is called PDLVQ is proposed to accelerate the traditional version. The proposed scheme aims to avoid unnecessary computations by applying an efficient Partial Distance (PD) computation strategy. Three different benchmark datasets are used in the experiments. The comparisons have been done between LVQ and PDLVQ in terms of runtime and in result, it turns out that PDLVQ shows better efficiency than LVQ. PDLVQ has achieved up to 37% efficiency in runtime compared to LVQ when the dimensions have increased. Also, the enhanced algorithm (PDLVQ) shows clear enhancement to decrease runtime when the size of dimensions, the number of clusters, or the size of data becomes increased compared with the traditional one which is LVQ.
摘要学习矢量量化(LVQ)是应用最广泛的分类方法之一。LVQ面临一个问题,即当数据大小变大时,它会变慢。本文提出了一种LVQ的改进版本,称为PDLVQ,以加速传统版本。所提出的方案旨在通过应用有效的局部距离(PD)计算策略来避免不必要的计算。实验中使用了三个不同的基准数据集。在运行时间方面对LVQ和PDLVQ进行了比较,结果表明,PDLVQ显示出比LVQ更好的效率。与尺寸增加时的LVQ相比,PDLVQ在运行时实现了高达37%的效率。此外,与传统的LVQ算法相比,当维度的大小、集群的数量或数据的大小增加时,增强算法(PDLVQ)显示出明显的增强,以减少运行时间。
{"title":"Enhancing the Speed of the Learning Vector Quantization (LVQ) Algorithm by Adding Partial Distance Computation","authors":"Orieb Abualghanam, Omar Y. Adwan, Mohammad A. Al Shariah, Mohammad Qatawneh","doi":"10.2478/cait-2022-0015","DOIUrl":"https://doi.org/10.2478/cait-2022-0015","url":null,"abstract":"Abstract Learning Vector Quantization (LVQ) is one of the most widely used classification approaches. LVQ faces a problem as when the size of data grows large it becomes slower. In this paper, a modified version of LVQ, which is called PDLVQ is proposed to accelerate the traditional version. The proposed scheme aims to avoid unnecessary computations by applying an efficient Partial Distance (PD) computation strategy. Three different benchmark datasets are used in the experiments. The comparisons have been done between LVQ and PDLVQ in terms of runtime and in result, it turns out that PDLVQ shows better efficiency than LVQ. PDLVQ has achieved up to 37% efficiency in runtime compared to LVQ when the dimensions have increased. Also, the enhanced algorithm (PDLVQ) shows clear enhancement to decrease runtime when the size of dimensions, the number of clusters, or the size of data becomes increased compared with the traditional one which is LVQ.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43521017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Augmented UCAL Model for Predicting Trajectory and Location 一种用于轨迹和位置预测的增强UCAL模型
IF 1.2 Q2 Computer Science Pub Date : 2022-06-01 DOI: 10.2478/cait-2022-0020
Nesrine Kadri, A. Ellouze, S. Turki, M. Ksantini
Abstract Predicting human mobility between locations plays an important role in a wide range of applications and services such as transportation, economics, sociology and other fields. Mobility prediction can be implemented through various machine learning algorithms that can predict the future trajectory of a user relying on the current trajectory and time, learning from historical sequences of locations previously visited by the user. But, it is not easy to capture complex patterns from the long historical sequences of locations. Inspired by the methods of the Convolutional Neural Network (CNN), we propose an augmented Union ConvAttention-LSTM (UCAL) model. The UCAL consists of the 1D CNN that allows capturing locations from historical trajectories and the augmented proposed model that contains an Attention technique with a Long Short-Term Memory (LSTM) in order to capture patterns from current trajectories. The experimental results prove the effectiveness of our proposed methodology that outperforms the existing models.
摘要在交通运输、经济学、社会学等领域,预测人类在不同地点之间的流动性具有广泛的应用和服务作用。移动预测可以通过各种机器学习算法来实现,这些算法可以根据用户当前的轨迹和时间,从用户以前访问过的位置的历史序列中学习,预测用户的未来轨迹。但是,从地点的长历史序列中捕捉复杂的模式并不容易。受卷积神经网络(CNN)方法的启发,我们提出了一种增强联合约定注意- lstm (UCAL)模型。UCAL由1D CNN和增强的提议模型组成,前者允许从历史轨迹中捕获位置,后者包含具有长短期记忆(LSTM)的注意力技术,以便从当前轨迹中捕获模式。实验结果证明了该方法的有效性,优于现有的模型。
{"title":"An Augmented UCAL Model for Predicting Trajectory and Location","authors":"Nesrine Kadri, A. Ellouze, S. Turki, M. Ksantini","doi":"10.2478/cait-2022-0020","DOIUrl":"https://doi.org/10.2478/cait-2022-0020","url":null,"abstract":"Abstract Predicting human mobility between locations plays an important role in a wide range of applications and services such as transportation, economics, sociology and other fields. Mobility prediction can be implemented through various machine learning algorithms that can predict the future trajectory of a user relying on the current trajectory and time, learning from historical sequences of locations previously visited by the user. But, it is not easy to capture complex patterns from the long historical sequences of locations. Inspired by the methods of the Convolutional Neural Network (CNN), we propose an augmented Union ConvAttention-LSTM (UCAL) model. The UCAL consists of the 1D CNN that allows capturing locations from historical trajectories and the augmented proposed model that contains an Attention technique with a Long Short-Term Memory (LSTM) in order to capture patterns from current trajectories. The experimental results prove the effectiveness of our proposed methodology that outperforms the existing models.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45741148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1